text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
ANCHORAGE — Crews at Denali National Park in Alaska have cleared a landslide from a road that is a major tourist destination each summer.
The landslide discovered last week covered 200 feet of the Denali Park Road with rock and soil.
Crews finished clearing the road at day's end Monday. Park officials say it's not clear if instability of the terrain will affect visitors next summer.
Park spokeswoman Maureen Gualtieri (gall-tee-EHR'-ee) says the road — 37 miles from the park entrance— appears intact.
An estimated 30,000 yards of debris fell from 500 feet above the road. Gualtieri says the debris was pushed downslope off the road.
She says the road and slide area will be assessed next spring before it opens to traffic. | <urn:uuid:3e7ebdf7-1ce0-4439-bdee-1c610091ee68> | CC-MAIN-2017-04 | http://juneauempire.com/state/2013-11-01/crews-clear-huge-alaska-landslide-road | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00213-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.933971 | 167 | 2.125 | 2 |
302 DevLearn Hyperdrive Showcase
3:00 PM - 4:00 PM Wednesday, November 16
Back by popular demand, Hyperdrive returns to DevLearn this fall. This year’s Hyperdrive competition focuses on innovation, showcasing projects that are using technology and solutions to create new and exciting opportunities for learning and performance support.
In this session, you will learn from the three winning entries in DevLearn Hyperdrive, the competition that took place before DevLearn began. You will learn from individuals and organizations that are pushing the boundaries of what learning and performance support looks like, and you’ll explore examples of technology being harnessed in ways that most others have yet to consider.
In this session, you will learn:
- From cutting-edge examples of innovative learning
- How the projects provide business value
- Why a design decision was made
- About the technologies used in innovative projects
Novice to advanced designers, developers, project managers, and managers.
discussed in this session:
Director of Event Programming
The Learning Guild
Mark Britz is the director of event programming at The Learning Guild. Previously he worked for more than 15 years designing and managing learning solutions with organizations such as Smartforce, Pearson Digital Learning, the SUNY Research Foundation, Aspen Dental Management, and Systems Made Simple. Mark is also an organizational social designer, helping businesses achieve the benefits of becoming more connected and collaborative to improve learning and engagement. Mark is the author of Social By Design: How to create and scale a collaborative company, and regularly presents and writes about the use of social media for learning, collaborative networks, and organizational design. | <urn:uuid:1ef763b5-97db-4cf7-8734-dc38b7d4f920> | CC-MAIN-2022-33 | https://www.learningguild.com/devlearn/sessions/session-details.cfm?event=498&fromselection=doc.4412&from=sessionslist&session=7872 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00065.warc.gz | en | 0.932677 | 354 | 1.773438 | 2 |
This week, the Norwegian Army’s sharpshooting exercise Thunderbolt takes place in Finnmark, Norway. Similar exercise activity was recently conducted in Troms with British participation.
Thunderbolt is an annual sharp-shooting exercise for the Army in the north, with units from the Home Guard and the Air Defense also participating.
The first part of the exercise took place in Setermoen in inland areas of Troms two weeks ago, when Brigade North exercised along with British troops.
This week, exercise activity continued for Finnmark land defense in Porsangmoen, Finnmark. No foreign forces participated here, due to self-imposed Norwegian restrictions related to its proximity to the Russian border.
“In this exercise we find important training on complex interaction between artillery, fighter planes simulating bombing, mortars, armored cars, and armor-fighting weapons, footsoldiers, paramedics and lots more, as well as a larger logistical part”, says Commanding Sergeant and Spokesperson of the Norwegian Army Rolf Ytterstad to High North News.
On Monday, artillery, tracked vehicles, and light armored vehicles were transported from Troms to Porsangmoen, Finnmark by the Tren regiment, escorted by the Home Guard. There was a total of six columns.
Defense of Finnmark is the defense of Norway
Part of strengthening Finnmark land defense
“The defense of Finnmark is the defense of Norway. That is why Finnmark land defense is now strengthened with the building up of Porsanger Battalion and this training activity in Porsangmoen is also part of it”, Ytterstad says.
On Wednesday, there was practicing of shooting with sharp ammunition.
“There will be [was] a.o. practicing of shooting with far-reaching rocket artillery. This is new and has twice the range of the artillery supplies Norway recently sent to Ukraine”, he says.
The exercise in Porsangmoen involves some 500 soldiers, four K9 Thunder artillery, some 20 light armored cars, as well as about 70 vehicles on wheels and tracked vehicles.
More interaction with British forces
During the exercise activities in Setermoen, Great Britain participated with army and air forces and some 2,500 soldiers as well as 200 field vehicles were at work.
This Norwegian-British exercise also took place within the framework of the Joint Expeditionary Force (JEF). This is a British-led multinational rapid reaction force involving the Nordic and the Baltic countries as well as the Netherlands.
"For the first time in a long time, a mechanized infantry company from the British army participated, in addition to British fighter planes”, Ytterstad says and continues:
“As part of Great Britain’s new Arctic strategy, British forces are to be more present in the High North. The British Navy infantry has exercised in Troms for years, and now the British Army is considering doing the same”.
JEF meeting in Norway
On Tuesday and Wednesday this week, the ten states of the Joint Expeditionary Force met and had a tabletop exercise in Oslo. Amongst the participants were the British Defense Minister Ben Wallace and his Swedish colleague Peter Hultqvist.
The meeting agenda included the war in Ukraine and the North European security situation, as well as the further development of JEF. Furthermore, participants have conducted exercises in how to act if and when a crisis were to occur, and the rapid reaction force is to be activated.
“In a demanding security policy situation, our having close cooperation with our near allies and partners is crucial. Through the JEF we can rapidly place forces at disposal to respond to a crisis together”, Norwegian Minister of Defense Bjørn Arild Gram (Center Party) says in a press release.
Last week, the same countries met in Iceland within the framework of the North European security and defense forum Northern Group.
This article was originally published in Norwegian and has been translated by HNN's Elisabeth Bergquist. | <urn:uuid:13513932-bd7d-4bc1-92a9-96fd5c668d30> | CC-MAIN-2022-33 | https://www.highnorthnews.com/en/norwegian-army-practicing-sharpshooting-high-north | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00471.warc.gz | en | 0.962312 | 839 | 1.929688 | 2 |
Ulcerative Colitis: Understanding the Physical and Emotional Pain
Ulcerative colitis is an inflammatory bowel disease (IBD) that causes inflammation of the digestive tract, usually the large intestine (colon) and rectum. While the condition can strike people of any age, it usually starts between the ages of 15 and 30 and affects men and women equally.
Although there are no definitive known causes of ulcerative colitis, some scientists think the problem may be the result of an abnormal autoimmune reaction to bacteria in the digestive tract. Heredity may play a role as well since you're more likely to develop the disorder if you have a parent or sibling with the disease. What doesn't seem to trigger ulcerative colitis is stress, although stress can exacerbate symptoms.
Symptoms of Ulcerative Colitis
The most common symptoms of ulcerative colitis are stomach pain and bloody diarrhea. Other symptoms may include:
- Weight loss
- Loss of appetite
- Rectal bleeding
- Loss of body fluids and nutrients
- Skin lesions
- Joint pain
Be sure to see your doctor if you have a persistent change in your bowel habits or if you experience any one of the following:
- Abdominal pain
- Blood in your stool
- Ongoing bouts of diarrhea that don't respond to over-the-counter medications
- An unexplained fever lasting more than a day or two
Tests and Diagnosis
In addition to giving you a physical exam and taking your medical history, your doctor may also prescribe a number of tests to confirm a diagnosis of ulcerative colitis. Some tests include:
- Blood tests to check for anemia or infection.
- Stool sample to look for the presence of white blood cells, which can indicate an inflammatory disease. A stool sample can also help rule out other disorders.
- Colonoscopy exam to view your entire colon and extract a small tissue sample to confirm a diagnosis.
- X-ray or CT scan to help diagnose ulcerative colitis or determine its complications.
Although there's no cure for ulcerative colitis, there are several categories of drugs that control inflammation and alleviate symptoms. Surgery is also an option for people whose disease can't be controlled by lifestyle changes or drug therapy. Because the severity of disease varies from person to person, your doctor will determine which treatment plan is best for you. Some types of drugs include:
- Anti-inflammatory drugs. These drugs are often used first and include sulfasalazine, mesalamine, balsalazide, olsalazine and corticosteroids
- Immune system suppressors. These drugs also reduce inflammation. They include azathioprine, mercaptopurine, cyclosporine, infliximab
Your doctor may prescribe other medications such as antibiotics, anti-diarrheals, pain relievers or iron supplements.
While diet doesn't appear to cause ulcerative disease, what you eat may aggravate your symptoms. Keeping a food diary and eliminating any foods from your diet that cause you problems may help reduce symptoms.
Sign Up for Free Newsletters
Ask Your Doctor the RIGHT Questions!
the most from your doctor visit.
Emailed right to you!
The Ask Your Doctor email series
may contain sponsored content.
18+, US residents only please. | <urn:uuid:cf023072-0cfa-4be5-a0ad-6c702e01bcf9> | CC-MAIN-2017-04 | https://www.qualityhealth.com/digestion-articles/ulcerative-colitis-understanding-physical-emotional-pain | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00062-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.92467 | 691 | 3.1875 | 3 |
HEADQUARTERS, MS: Natchez Trace Parkway officials closed a 7-mile stretch of road from milepost 93.1 to milepost 100.7 on October 31, 2019 to replace a culvert that reached is operational life span. Continuous rain throughout the southern district since October has delayed repairs.
The culvert was replaced the week of January 5, 2020 but work near the road is not complete. Rain has saturated the ground, which has not allowed contractors to accommodate the heavy equipment. The Parkway needs at least two weeks without rain for the ground to sufficiently dry enough to move the equipment in where it needs to be. Rain continues to be in the forecast for the foreseeable future. “Visitor and staff safety remains our top priority. We apologize for the inconvenience and request the public’s patience and understanding as we wait out the weather.” stated Acting Superintendent Laura Perdices.
For more information about the Natchez Trace Parkway, go to www.nps.gov/natr or call 1-800-305-7417. | <urn:uuid:b3034987-662a-4372-8c21-723179417efb> | CC-MAIN-2022-33 | https://www.scenictrace.com/update-natchez-trace-parkway-road-closure-near-ridgeland-ms/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00471.warc.gz | en | 0.961662 | 218 | 1.523438 | 2 |
You are looking to start your first business. You have solidified your idea. You have completed your market research and created a business plan. All of the puzzle pieces you need to kick off a successful start-up are finally falling into place, but there is still one obstacle you must overcome: the final business pitch. This is the Shark Tank moment that you have been waiting for!
Business pitches are an opportunity to explain the core mission of your start-up, and more importantly, why it will succeed amongst competitors. Learning how to discuss your business idea and encourage investors to support you financially can be a strenuous process, but UNLV DECA is here to help! We have reached out to several business professionals who have experience in the investing world and can give you tips on how to formulate an effective business pitch. Let’s start off by introducing our panelists!
Get to Know our Panelists
“I am Professor Mike Sullivan. I have taught Finance courses at UNLV since 1991. I have taught a Student Managed Fund class (Rebel Investment Group) since its inception in 2010.”
“I currently serve as the Secretary/Treasurer of the Nevada Registered Agents Association and also sit on their Board of Directors. I have over 16 years’ experience in the corporate and financial world and am one of the Founders of Corporate Capital, Inc. Previously, I served as the general manager, where I consistently had over 30 sales professionals working under me and was in charge of all day-to-day operations, with peak sales at 12 million.”
“My name is Greg Phelps and I’ve been a financial planner for 25 years. I’ve had my own practice for 15 years, and I focus on helping people achieve the retirement they’ve dreamed of without the worry most retirees have.” To learn more about Greg Phelps’ work as a financial planner and the services he offers, check out his website: https://redrockwealth.com/.
We have asked our panelists a variety of questions that focus on the basics of a business pitch presentation. These responses should help you understand what investors typically look for and how you can tell the story of your business.
What does a good business idea typically look like?
“A great business puts the client first in every aspect of their services and interaction. A great business is a fiduciary business, where the company owes the highest standard of care to the client above all else. I don’t know what a good business looks like because anything less than the ultimate duty of care to help the client achieve financial prosperity is a bad business, by this I specifically mean companies who are more focused on their own profits than their customers results.” – Greg Phelps
What differentiates a good business pitch from a great one?
“Giving a clear understanding of your product but more importantly how you can help your customer. Your customer ultimately wants to know what is in it for them and how you can help solve their problems. Make sure you are able to separate yourself from the competition.” – Brent Carlson
How long should a business pitch typically be?
“Length will vary. Long enough to provide the most important information, but short enough to keep the listeners’ attention.” – Michael Sullivan
What do investors typically want to see from someone’s business pitch?
“What their ROI is going to be and how quickly will they see that return. I know it sounds blunt but it’s true. Investors really only care about one thing and that is money. This is okay! That is why they invest.” – Brent Carlson
“People want to know what’s in it for them. They don’t care about numbers or bells or whistles as much as they do feeling confident that the company or advisor can help them live the life they want. Most companies focus on how great they are instead of how they can help the client/customer so it’s a win-win all around. So my pitch is really we can help you live the retirement you’ve always dreamed of through brilliant planning and exceptional management. NOTE I didn’t say my annuity is best or my investments will earn more. It’s about the client not the products.” – Greg Phelps
What are some of the best ways that a student can prepare for their pitch delivery?
“Practice! Present in front of other students or friends and have them ask you questions. Make sure you let them know that constructive criticism is appreciated.” – Michael Sullivan
What are some red flags you might hear during a business pitch that would discourage you from investing?
“Inaccuracies. Especially numbers. If I hear inconsistencies, especially with numbers I start to feel like they are guessing rather than knowing the true numbers. If I am going to invest I want to know what I am investing in and my risk…This is why we recommend and even help write business plans for our clients….” – Brent Carlson
“Red flags are everything I described. If the company/advisor pitch is how great they are and how much better the stuff they sell is, people should run the other way.” – Greg Phelps
What questions do investors typically ask after hearing a business pitch?
“Depends on the pitch. Obviously, an investor wants answers to questions pertaining to product sales growth, margins, and expenses.” – Michael Sullivan
Coming up with a business idea is easy; convincing strangers to invest in your business and believe in your idea is the hard part. Completing your first business pitch can be a daunting task, but hopefully these tips can help make your pitch a bit more perfect! Special thanks to our panelists, Professor Michael Sullivan, Brent Carlson, and Greg Phelps, for sharing these pointers with our chapter. If you would like to learn more about these professionals and the work they do, please email our chapter at firstname.lastname@example.org. Good luck with your future business pitches, Rebels! | <urn:uuid:67219de1-6e25-4e15-99a3-48d4a985224f> | CC-MAIN-2022-33 | http://unlvdeca.com/2020/04/29/pitch-perfect-how-to-perfect-your-business-pitch/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00067.warc.gz | en | 0.967041 | 1,261 | 1.703125 | 2 |
Now the Java Sea had yielded up a shipload, many perfectly preserved—protected in the stoneware jars from the scouring action of sand on the seafloor. Sponged clean, their glazes shone as brightly as the day they were fired.
The handmade bowls give evidence of "factory-like production," says John Miksic, an American professor at Singapore's National University who is an expert on Southeast Asian archaeology. They are the earliest known exported examples of their kind. "The cargo also implies an organizer with managerial skill," Miksic says, "and huge quantities of imported raw materials." Cobalt for blue-and-white ceramics, for example, came from Iran; it was not recovered from ore in China until much later.
Although Arab mariners clearly plied the Maritime Silk Route, trading on a large scale over great distances, "this is the first Arab dhow discovered in Southeast Asian waters," says John Guy, senior curator of South and Southeast Asian Art at the Metropolitan Museum in New York, "and the richest and largest consignment of early ninth-century southern Chinese gold and ceramics ever discovered in a single hoard."
A reconstruction suggests the craft was similar to a kind of sailing vessel still found in Oman and known as a baitl qarib. Almost 60 feet long, with a raked prow and stern, it was built of African and Indian wood and fitted with a square sail. Its most distinctive feature was that instead of being held together with dowels or nails, its planks and beams were literally sewn together, probably with coir, a coconut-husk fiber.
The dhow's port of departure and destination are still uncertain. No logbooks survived, no bills of lading, no maps. But most scholars believe that it was bound for the Middle East, possibly the Iraqi port city of Al Basrah (now Basra). It probably set sail from Guangzhou, the largest of the ports linked by the Maritime Silk Route. In the ninth century an estimated 10,000 foreign traders and merchants, many of them Arabs and Persians, lived in Guangzhou.
Among the tens of thousands of Changsha bowls found in the wreck, one was inscribed with this message: "the 16th day of the seventh month of the second year of the Baoli reign," or A.D. 826 on the Western calendar. This is almost certainly when the bowl was fired. Then, as now, goods did not sit around on the wharf for long, so the ship probably embarked not long afterward. | <urn:uuid:b56d6022-be07-4a69-af51-ee1d34eead23> | CC-MAIN-2017-04 | http://ngm.nationalgeographic.com/2009/06/tang-shipwreck/worrall-text/3 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00122-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.975464 | 529 | 3.109375 | 3 |
Cush, also spelled as Kush, (/, /; Biblical: כּוּשׁ Kûš) was, according to the Bible, the eldest son of Ham, who was a son of Noah. He was the brother of Mizraim (Egypt), Canaan (land of Canaan), and Phut, and the father of the Biblical Nimrod mentioned in the "Table of Nations" in the Genesis 10:6 and I Chronicles 1:8. Cush is traditionally considered the eponymous ancestor of the people of the "land of Cush," an ancient territory that is believed to have been located on either side or both sides of the Red Sea. As such, "Cush" is alternately identified in Scripture with the kingdom of Kush, ancient Aethiopia, and/or the Arabian peninsula.
The Book of Numbers 12:1 calls the wife of Moses "a Cushite woman", whereas Moses's wife Zipporah is usually described as hailing from Midian. Ezekiel the Tragedian's Exagoge 60-65 (fragments reproduced in Eusebius) has Zipporah describe herself as a stranger in Midian, and proceeds to describe the inhabitants of her ancestral lands in North Africa:
"Stranger, this land is called Libya. It is inhabited by tribes of various peoples, Ethiopians, dark men. One man is the ruler of the land: he is both king and general. He rules the state, judges the people, and is priest. This man is my father and theirs."
The rhetorical question "Can the Cushite change his skin?" in Jeremiah 13:23 implies people of a markedly different skin color from the Israelites, most likely a Nubian people; also, the Septuagint uniformly translates Cush as Αἰθιοπία "Aithiopia."
Josephus gives an account of the nation of Cush, son of Ham and grandson of Noah: "For of the four sons of Ham, time has not at all hurt the name of Cush; for the Ethiopians, over whom he reigned, are even at this day, both by themselves and by all men in Asia, called Cushites." (Antiquities of the Jews 1.6).
The Persian historian Muhammad ibn Jarir al-Tabari (c. 915) recounts a tradition that the wife of Cush was named Qarnabil, daughter of Batawil, son of Tiras, and that she bore him the "Abyssinians, Sindis and Indians".
The Cushitic-speaking peoples today comprise the Agaw, Oromo, Somali, Afar, and several other tribes, and were considered offspring of Cush in Masudi's Meadows of Gold from 947 AD. The Beja people, who also speak a Cushitic language, have specific genealogical traditions of descent from Cush.
Explorer James Bruce, who visited the Ethiopian Highlands c. 1770, wrote of "a tradition among the Abyssinians, which they say they have had since time immemorial", that in the days after the Deluge, Cush, the son of Ham, traveled with his family up the Nile until they reached the Atbara plain, then still uninhabited, from where they could see the Ethiopian table-land. There they ascended and built Axum, and sometime later returned to the lowland, building Meroe. He also states that European scholars of his own day had summarily rejected this account on grounds of their established theory, that Cush must have arrived in Africa via Arabia and the Bab el Mandab, a strait located between Yemen on the Arabian Peninsula, and Djibouti and Eritrea on the Horn of Africa. Further, the great obelisk of Axum was said to have been erected by Cush in order to mark his allotted territory, and his son Ityopp'is was said to have been buried there, according to the Book of Aksum, which Bruce asserts was revered throughout Abyssinia equally with the Kebre Negest.
Hebrew scholar David M. Goldenberg has suggested that the Hebrew name is derived from Kash, the Egyptian name of Lower Nubia and later of the Nubian kingdom at Napata, known as the Kingdom of Kush. The form Kush appears in Egyptian records as early as the reign of Mentuhotep II (21st century BC), in an inscription detailing his campaigns against the Nubian region. At the time of the compilation of the Hebrew Bible, and throughout classical antiquity, the Nubian kingdom was centered at Meroe in the modern-day nation of Sudan.
Scholars like Johann Michaelis and Rosenmuller have pointed out that the name Cush was applied to tracts of country on both sides of the Red Sea, in the Arabian Peninsula (Yemen) and Northeast Africa.
- The Encyclopaedia Britannica: A Dictionary of Arts, Sciences, and General Literature, Volume 6. C. Scribner's Sons. 1878. p. 729.
- Tabari's Prophets and patriarchs
- Masudi's The Meadows of Gold (947 AD); Wahb ibn Munabbih (738) included among Cush's offspring "the "Qaran", the Zaghawa, the Habesha, the Qibt, and the Barbar".
- A History of the Beja Tribes of the Sudan, Andrew Paul, p. 20
- The Peopling of Ancient Egypt and the Deciphering of Meroitic Script, Unesco, p. 54.
- Bruce, Travels to Discover the Source of the Nile, p. 305
- David M. Goldenberg, The Curse of Ham: Race and Slavery in Early Judaism, Christianity, and Islam, p. 18.
- Historical Dictionary of Ancient and Medieval Nubia, Richard A. Lobban Jr., p. 254. | <urn:uuid:fd599e4d-aa85-429c-ba6f-bc9a16c5e126> | CC-MAIN-2017-04 | https://en.wikipedia.org/wiki/Biblical_Cush | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00154-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960666 | 1,237 | 2.796875 | 3 |
Can we talk in English in Philippines?
The Philippines is recognized globally as one of the largest English-speaking nations with majority of its population having at least some degree of fluency in the language. English has always been one of the official languages of the Philippines and is spoken by more than 14 million Filipinos.
Can you live in Philippines without knowing Tagalog?
Most Filipinos don’t live in Tagalog-speaking lands, and because of that, they have a regional language that they speak. … That’s why the Filipino and Tagalog languages are very similar to each other, and are even dialects of each other as people who speak Filipino can understand Tagalog and vice versa.
Do Filipinos need to be good in English?
English is very important in the Philippines and it is the international language all over the world. At present English is the most useful language in the Philippines. From the education, industries, business, employment, and everyday life of Filipino it is very common to speak English to people.
Do they speak English in Manila?
English is widely spoken in Manila, and far beyond. In fact, it’s one of the Philippines’ two official languages alongside Tagalog (a.k.a. Filipino). … These days, English is almost everybody’s second language but almost nobody’s first. That has made it an ideal lingua franca in areas where very few people speak Tagalog.
Why Philippines can speak English?
Its origins as an English language spoken by a large segment of the Philippine population can be traced to the American introduction of public education, taught in the English medium of instruction. … At the end of Spanish colonization, only 3-5% of the colonial population could speak Spanish.
Is Tagalog difficult to learn?
Tagalog is relatively difficult for English speakers to learn. This is mostly because of major grammatical differences (especially verb-pronoun relationships) and the origins of its vocabulary. However, Tagalog pronunciation and writing are straightforward, and a few grammatical features are refreshingly simple.
How long does it take to learn Tagalog?
According to their research, Tagalog is a Category III language and takes a total of 1100 hours to learn. That means Tagalog is more difficult to learn than French, Italian, or Spanish! Tagalog is a Category III language and takes a total of 1100 hours to master.
Why do Filipinos have bad grammar?
ALTHOUGH most Filipinos are not native English speakers, they have little difficulty in speaking grammatically correct English. Fifty percent of the problems in English grammar are because of changes in the ending of words. This is because Filipino languages do not have words that change their endings.
Why do Filipino students have difficulty speaking in English?
Discrimination as a Problem
Most Filipinos from the age of teens to middle-aged who have not been able to pursue college can speak basic English because they’ve learned it from school for many years since elementary to high school.
What is the rank of Philippines in speaking English?
|2020 Rank||Country||2020 Score|
Is Philippine English one of the more correct varieties of English?
Philippine English is a legitimate nativized variety of English. While it shares some of the linguistic properties ascribed to other varieties of English, especially those used in Asia, it has features that are unique to it. … | <urn:uuid:ead67cc8-ebef-4ab9-b8e4-4a6271751668> | CC-MAIN-2022-33 | https://jogjabromotour.com/southeast-asian-countries/can-you-get-by-with-english-in-the-philippines.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00473.warc.gz | en | 0.955673 | 742 | 2.1875 | 2 |
20 years after the U.S. made their first commitment to medical marijuana Australia has finally followed suit, announcing federal plans to allow for the cultivation and sale of cannabis for medicinal use. But what does that really mean for the country, and where will it go from here?
For a country that was once considered forward thinking and progressive, Australia has well and truly dropped the ball in recent years, with anti-marijuana campaigns that have left the country justifiably embarrassed on a global scale.
After some absolutely mind-numbing enforcement decisions, such as the arrest of a man for administering cannabis oil to his cancer-stricken daughter, and with a meagre 7% of the nation opposed to medicinal cannabis, we can finally say that the stigma surrounding cannabis is lifting, and the potential benefits of the plant are at last coming out of the shadows.
Thankfully, on the back of the Victorian State government decision to regulate the growth and sale of cannabis, the Federal Government has come on board with a bill which is not only expected to pass- allowing for nationwide regulation of medicinal growth and sales- but will also allow faster and more efficient access to cannabis treatment for patients.
Initially, the program hopes to administer cannabis in the treatment of immune and neural diseases such as Multiple Sclerosis and epilepsy, and can also be used in the treatment of brain health, such as Alzheimer’s.
Aside from the overwhelming economic and therapeutic benefits the policy change is due to bring about, it brings the nation in line with international thinking and also opens up more efficient avenues to research.
After a record $33 million donation in 2015 for cannabinoid research, and already touting world-class research facilities, Australia is poised to become a leading authority in medicinal developments from this wonder plant.
As it stands, Australia will continue to be slow-moving and cautious with reform, and as the co-ordinators of cannabis policy within NSW have said there will be “no decriminalisation or legalisation of the drug,” rather the national development will become the basis for “compassionate policy.”
With a potential market of up to $1 billion annually, however, a number of companies are already set up and ready to pounce when this new legislation gives them the green light, three of which are already trading on the Australian Stock Exchange.
Whilst this is only the first hurdle in the marijuana revolution for Australia, it is a large step, and if trends in the U.S. are anything to go by it shouldn’t be long before the stigma well and truly dissipates, opening up avenues for ongoing reform and hopefully recreational use.
What do you think about the new policy announcement? Will it change anything or is this just media hype? Let us know on osocial media or in the comments below! | <urn:uuid:9a8e7c6e-d744-499f-8784-593091512cac> | CC-MAIN-2022-33 | https://herb.co/news/legalization/australia-marijuana-coming-shadows/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00466.warc.gz | en | 0.959988 | 575 | 1.890625 | 2 |
This document might give you valuable information in exploring research techniques and methodologies on how to correctly search, analyze and proceed in a scientific manner when given a certain subject.
The project consisted of developing an application for joining RSS feeds content using semantic relatedness and the WordNet knowledgebase taking into consideration the threshold value entered by the user. The semantic relatedness is calculated upon a distance-oriented measure, computed on semantic networks.This project is ready to be implemented.
|Project - RSS Semantic Join - Scientific approach - Elie MATTA.pdf||649.33 KB||1080||16 hours 19 min ago|
|RSS Semantic Join - Presentation - Elie MATTA.pdf||902.31 KB||607||2 weeks 1 day ago| | <urn:uuid:a6d5ce22-b3ec-45e4-af35-b0a9dbe11502> | CC-MAIN-2017-04 | http://www.eliematta.com/academic-expertise/upa/rss-join-engine | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00001-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.754137 | 157 | 1.960938 | 2 |
Most hardware stores have a wide range of poly pipe fittings. Poly pipe fittings come in many different shapes and sizes. You can easily visit your nearby supermarket to get your desired pipe. Most poly pipe fittings are made using plastic. The name of poly pipe fittings is derived from the material used to build them. They are made using polyvinyl chloride in the vast majority of cases. Polyvinyl chloride is often abbreviated as PVC. PVC is extended durable and is corrosion resistant. Its resistance to corrosion makes it invaluable for making poly pipe fittings. It has many other industrial uses too. This makes it extremely important from a commercial point of view. PVC was first invented over thirty years ago. It had grown in popularity since then. PVC can be used to make dozens of different items. It is waterproof and does not corrode over time. These qualities make it excellent for using in plumbing.
Poly pipe fittings for offices:
Poly pipe fittings are also very useful at offices. They are also very useful at schools and colleges. Plumbing systems often use more than one poly pipe fittings. Poly pipe fittings are also known as PVC pipe fittings. Both terms refer to the same thing and are often used interchangeably. PVC is a highly stable plastic. It is very durable and does not break under pressure. The melting point of poly pipe fittings is fifty degree Celsius. This is much higher than the melting point of other similar plastics and is almost as high as that or iron. This makes it much more useful than other varieties of plastic. This also makes it suitable for using with hot water. Poly pipe fittings are not damaged by superheated water.
Purchasing poly pipe fittings online:
You can easily purchase poly pipe fittings and related products from any major hardware stores. Most hardware stores have an extensive variety of poly pipe fittings for customers to choose from. The wide range of polyvinyl fittings makes it easier for the customer to make a choice. Poly pipe fittings come in many different colours. However, most customers prefer buying grebe or yellow versions. Both green and yellow coloured poly pipe fittings are very popular. This is because these colours are bright and this makes them easy to spot. Other colours such as blue and red are popular too. The average thickness of a poly pipe fittings is three to four millimetres. This makes them ideal for using in plumbing systems. Most plumbers prefer working with poly pipe fittings as opposed to metallic parts. This is because they are easier to work with. For more information please visit our website. | <urn:uuid:4771b174-afd0-4029-8dcf-5c4c5890f1e9> | CC-MAIN-2022-33 | http://az-utrecht.com/purchasing-the-best-poly-pipe-fittings/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00669.warc.gz | en | 0.97254 | 530 | 2.578125 | 3 |
U.S. liquor sales come up short in 2008
By Martinne Geller
NEW YORK (Reuters) - Americans slowed their consumption of hard liquor last year, a trade group said on Friday, proving that spirits are not immune to a recession.
Sales slowed throughout the year, but likely declined in the fourth quarter, which is often the industry's most important, said officials from the Distilled Spirits Council of the United States (DISCUS).
The industry group abandoned its practice of giving industry forecasts for 2009, citing marketplace volatility.
The trade group joins a growing list of companies, including Fortune Brands Inc, Microsoft Corp, eBay Inc and Coach Inc, that say it is too hard to forecast results in the recession.
"(Last year) wasn't a great year and yet we did ease up a little bit, despite the fact that the fourth quarter was not strong," said DISCUS CEO Peter Cressy. "We're hopeful we'll continue some modest increase, but I don't think I can tell you any more than that."
Cressy said that, if economic conditions and excise tax levels remain as they are, performance in 2009 should not be any worse than last year.
"If the economy slides into an even deeper recession, the downside risk could be greater," he added.
Revenue for spirits companies rose 2.8 percent to $18.7 billion in 2008 and sales by volume rose 1.6 percent to 184 million 9-liter cases. Continued... | <urn:uuid:5ad6c186-272b-4774-8f26-f1ce58201ab5> | CC-MAIN-2017-04 | http://ca.reuters.com/article/lifestyleNews/idCATRE50T6OE20090130 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00077-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964649 | 305 | 1.5 | 2 |
Souper Chicken? Beautiful Yetta by Daniel Pinkwater
Yetta, beautiful Yetta, brave and clever, will not be soup.
She will not be roast chicken on Friday night.
She is free. She is in Brooklyn.
When Yetta flees Mr. Flegelman, chicken rancher, just as she is about to be delivered into an unpromising future at Phil's Poultry World, she finds herself in another world, the mean streets of Brooklyn--obviously outside the ordinary purview of organic poultry.
But Yetta is brave and clever, and after battling buses and repelling dangerous rats whose intentions clearly are not benign, she is even insulted by the portly pigeons she approaches in hopes of sisterly avian assistance:
"Go back to the farm, silly hen!"Then Yetta's attention is diverted to an unfolding street drama before her. A strange little green bird is about to become the end product of a successful stalk by a dangerous-looking cat.
"GAY AHVEK, DU FAHRSHTUNKEHNEH KAHTZ!"
("Go away, you stinking cat!") Yetta yells.
The cat may or may not understand Yiddish, but it certainly gets the message, as a large, white bird, wings flapping and beak snapping, bears down on it.
The cat skedaddles and Yetta is a heroine! Eduardo, one of the famous wild parrots of Brooklyn, invites her back to join his flock and shares the tale of his heroic rescue.
"YO AMO ESTA GALLINA!" ("I love this beautiful chicken!") says Eduardo.Daniel Pinkwater's latest, Beautiful Yetta: The Yiddish Chicken (Feiwel & Friends, 2010), provides both a rousing tale of a hen who dodges becoming dinner and a group of environmental expatriates who find a common cause in survival in the big city. Yetta chases cats and Eduardo shows her how to procure the best pizza crusts, and the streets of Brooklyn are made safer for Yiddish hens and Hispanic parrots.
"POR FAVOR, QUEDATE CON NOSOTROS, GALLINA HERMOSA!" ("Please, stay with us, beautiful hen!") say the wild parrots.
With speech bubbles in Yiddish and phonetic English for Yetta and in Spanish and phonetic English for the parrots, reading this one aloud is a picnic in the park (or a fiesta in Flatbush), one that lends itself to exuberant retellings. Long live Yetta, the Yiddish hen. You go, girl! | <urn:uuid:2d5d08e8-9ef5-4567-9f7a-5f315a822def> | CC-MAIN-2016-44 | http://booksforkidsblog.blogspot.com/2010/11/souper-chicken-beautiful-yetta-by.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00046-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.907579 | 561 | 1.828125 | 2 |
The Fifth Issue of Cross-Currents: East Asian History and Culture Review Now Online
The fifth issue of IEAS's interactive e-journal Cross-Currents: East Asian History and Culture Review is now online. This is a special issue devoted to the theme of "Transcolonial Film Coproductions in the Japanese Empire: Antinomies in the Colonial Archive" (guest edited by Takashi Fujitani (U Toronto) and Nayoung Aimee Kwon (Duke University). The issue also features book review essays and a photo essay about historical Changchun.
Read the co-editors’ Note to Our Readers for a description of the contents, or visit http://cross-currents.berkeley.edu/e-journal/issue-5.
We are also pleased to announce the publication of the second print issue of Cross-Currents in November 2012. Visit this page to view the table of contents. Complimentary copies of the inaugural print issue are still available; simply email your name and mailing address to: firstname.lastname@example.org.
A joint enterprise of the Research Institute of Korean Studies at Korea University (RIKS) and the Institute of East Asian Studies at the University of California at Berkeley (IEAS), Cross-Currents offers its readers up-to-date research findings, emerging trends, and cutting-edge perspectives concerning East Asian history and culture from scholars in both English-speaking and Asian language-speaking academic communities. This English-language journal includes scholarship on material from the sixteenth century to the present day that has significant implications for current models of understanding East Asian history and culture. Embedded in a web-based platform with functions for collaboration, discussion, and an innovative editing and publishing process, the journal uses new technologies to facilitate a dialogue among East Asia scholars around the world that is enhanced by audio-visual and multilingual capabilities. The semiannual print issues of Cross-Currents (University of Hawaii Press) feature content selected from the peer-reviewed, quarterly online journal for its scholarly excellence and relevance to the journal's mission. An editorial board consisting of established scholars in Asia and North America provides oversight of the journal. | <urn:uuid:efdd9619-f186-418a-b0d3-f3727ec803b7> | CC-MAIN-2017-04 | http://ieas.berkeley.edu/news/cc_february_2013.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00046-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.899897 | 448 | 1.609375 | 2 |
Sarangi Bowed Strings Stringed Instruments
The sarangi is revered for its great flexibility of timbre and inflection, and the intensity of emotional expression to which it lends itself. The melody strings are stopped not with the pads of the fingers but with the cuticles or the upper nails or the skin above the nails of the left hand.
Top: Arts: Music: Instruments: Stringed: Bowed Strings: Sarangi
- Mohan Samant: Sarangi - Reflection about the instrument from the point of view of stringed an artist.
- Musical Instruments of India - Sarangi - Sales of instruments and recordings, sound sample, and links.
- Sangi Rangi - Provides instrument information and history, player archive, and bowed strings research article. By Nicolas Magriel, performer, teacher and bowed strings researcher.
MySQL - Cache Direct | <urn:uuid:a1d1e848-3c82-4020-be7b-c32d3b9836d5> | CC-MAIN-2016-44 | https://www.iaswww.com/apr/Arts/Music/Instruments/Stringed/Bowed_Strings/Sarangi/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.849263 | 185 | 2.171875 | 2 |
Over the centuries, goats have gotten a bad rap. In the Old Testament, a goat was used as a representation of people’s sins (the “scapegoat“). In the New Testament, when Jesus talked about separating “the sheep and the goats,” it was clear you didn’t want to side with the goats.
Back in the Middle Ages, Christians were suspicious of goats because they associated them with evil. If any animal could be Satanic, they reasoned, it would be a goat. After all, the lecherous and profoundly pagan Greek god Pan was part goat. The devil himself was often depicted with goat-looking features (horns and a goatee). Superstitions involving the satanic Black Mass always involved the sacrifice of a goat.
Is there a sillier-looking animal on the planet than a goat? I’m not sure. A solitary goose is a pretty goofy creature, what with the honking and all, but several geese together in flight can be impressive. But there is nothing impressive about a flock of goats, other than their cumulative digestive power.
But this week, my friend Matthew Paul Turner (whose birthday is today) is helping out World Vision this Christmas season by promoting their Give a Goat campaign. For $75, you can give a goat to a family somewhere in the world. And if you do it, that family will be happy — despite having received a doofus-y and possibly demonic animal.
Here’s why: Goats can provide up to 16 cups of milk a day, which is ideal for hungry children and families who’ll be nourished by that milk, along with cheese and yogurt. The calcium, protein and calories these products provide can be lifesaving.
Goats help in a lot of other ways, too. Families can sell the extra dairy products at the market, sell baby goats when/if they come along, and use manure for fertilizer.
Give me a goat and I’ll be annoyed, because what am I going to do with a goat? You know what happened when Greg Brady stole a rival team’s goat and brought it home? Hijinks happened. And hilarious 70s-era mayhem. That’s not for me. Personally, I’d rather have a $75 gift card.
But give a goat to a family that needs one and they’ll thrive. Their kids won’t go hungry. They’ll use it for renewable income. They will treasure that goat.
Perhaps it’s time, this Christmas, to redeem the goat.
To donate a goat to a needy family for Christmas, visit World Vision’s online goat donation page here. | <urn:uuid:e10c3345-4720-4e5c-aee2-c482af047dab> | CC-MAIN-2017-04 | http://www.beliefnet.com/columnists/omeoflittlefaith/2010/11/christmas-redeem-the-goat.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00004-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.959166 | 568 | 2.1875 | 2 |
That is the idea behind the Lens of Empowerment project, a three-course program undertaken by 11 UFV students that examines the lives and experiences of women in Stó:lō territory.
The Fraser Valley audience will have the chance to view the results of the project on Friday, March 30 at the opening and premiere of the Lens of Empowerment exhibition. The photographic and video exhibit opening ceremony will be at 3 pm in the gallery in Room B136 on the Abbotsford campus. The students will then show their videos in the lecture theatre (B101) at 5 pm. The public is welcome and attendance is free.
Part of the inspiration for this project came from a desire to acknowledge Stó:lō territory for future generations.
“Women are mothers, teachers, aunties and mentors,” explains UFV Senior Advisor on Indigenous Affairs Shirley Hardman. “The stories of every woman in Stó:lō territory have an impact on nation. The telling of these stories through photography and video strengthens connections and nurtures awareness for coming generations because storytelling connects us to the land, and to each other. Historically, newcomer communities in the Fraser Valley, especially, have been agriculturally based and very connected to the land, and that’s what we all have in common in Stó:lō territory.”
The exhibit will be presented at a conference in Loughborough, UK, in July. UFV visual arts instructor Sarah Ciurysek will also be an artist-in-residence at the same event.
The 10 women and one man enrolled in the Lens of Empowerment project each took Visual Arts 180 (Digital Photography) with Ciurysek and Visual Arts 160 (Video Production) with Gould in the fall. During the winter semester, they worked on bringing the exhibition together in the VA 390 (Community Arts Practice) course, team-taught by Ciurysek and Gould.
Some of the students had previous photo or video experience or were already enrolled at UFV; others came to the university specifically to take the program and had no or little visual arts experience. Some are Stó:lō or from another aboriginal community; others are not.
The photos and videos that have resulted from the project include biographical pieces about local women.
Instructor Stephanie Gould says the intensive seven-month experience has been “extraordinary” for all involved.
“It is fantastic to be part of something larger than ourselves and so community-based. We have got to know each other much better than one does in a normal course,” she said. “Across differences in culture, gender, and experience, this group of students has brought focused attention to stories of place, and women’s stories, through lens-based art. This attentiveness through art to one another’s stories is as critical to understanding our diverse local communities as it is communities and home places across the world.”
The instructors, UFV Dean of Arts Jacqueline Nolte, and some students will be travelling to England to participate in an international conference in July. Other shows in Stó:lō territory are also planned. | <urn:uuid:453d18ca-992c-4016-9752-7e108dee8d06> | CC-MAIN-2022-33 | https://blogs.ufv.ca/blog/2012/03/lens-of-empowerment-exhibit-focuses-on-women-in-stolo-territory/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00670.warc.gz | en | 0.953389 | 662 | 1.648438 | 2 |
Las Vegas has a population of 478,434 and is located in Clark county.
The average in-state tuition for full time undergraduate students in legal assistant schools in Las Vegas during the 2009 - 2010 school year was $10,897.00. The average tuition was $15,529.00 for non-residents studying in Nevada.
The cost, on average, for books and supplies needed for legal assistant schools in Las Vegas is $1,093.00. The average cost for room and board for students living on campus at legal assistant schools in Las Vegas was $10,456.00. The average cost for students living at home was $5,250.00 for the 2009 - 2010 school year. There is one legal assistant college in Las Vegas. In the 2008 - 2009 school year, reportedly 12 students completed legal assistant programs in Las Vegas. | <urn:uuid:cf194372-542f-47d6-a6ad-2877fab35600> | CC-MAIN-2016-44 | http://www.unixl.com/dir/legal-assistant/nevada/las-vegas/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721595.48/warc/CC-MAIN-20161020183841-00479-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.977704 | 178 | 1.617188 | 2 |
Organization management tools are the means, methods, calculators, systems, software, and so forth, used by corporations in order to deal with changing market segments, keep a powerful competitive position in them, increase business performance and achieve goals. There are many sorts of business tools used by businesses. There are also many varieties of business management equipment. A good example of a tool is the interior database management, which in turn helps to keep the info for the company’s staff and departments. Another well-liked tool may be the customer relationship management or CRM, which will keep track of consumer contacts, preferences, interests and goals.
Some other well-liked business control tools incorporate business method modeling, economic management equipment, business procedure optimization, hrm tools, facts system tools, manufacturing method modeling and software engineering tools. In order to keep a record of the changes in the market, one can avail economic indicators such as Purchasing Managers Index (PMI), Purchasing Director Cost (PMCO), Purchasing supervisor Growth Index (PMGI), Getting Index Percentages (PIRE), Getting Manager Seasonality (PMFS), Advertising indices including Marketing Period Equals Purchase Type, Revenue Volume Equates to Purchase Type and Marketing Selling price Index. There are plenty of more such indicators. All of these economic indications help businesses keep track of the changes in the market.
There are various advantages for using these tools. Among the key advantages is that they help businesses reduce costs. In addition , they also support businesses gain greater competitive advantage. The biggest advantages of they are: improve organization profitability, and lower costs. With these methods, firms are now able to deal with the issues easily. These types of resources also provide companies with the biggest advantage, that is certainly the opportunity to pull in new customers.
A major advantage of using this kind of application is that it increases firm production. With this kind of feature, managers get the option to access all the info about the current circumstance, as well as package the technique to deal with the current situation. They will also schedule the resources which will be helpful for these people in future. The very best features of this kind of application will be: customer cooperation, shared understanding, and interaction.
Some other major good thing about this application is that it delivers ease of tracking the values and revenue. This includes the capability setting fixed prices for the items, which helps to control costs. A major good thing about this is so it allows businesses to develop buyer relationships. In addition , additionally, it allows for better pricing. With the assistance of this characteristic, the businesses get the ability to incorporate multiple rates plans.
With the help of a CRM software, you get to understand the goals of your company. When you analysis the features offered by a particular type of application, www.suaritmax.com you will be able to identify the top attributes of this tool. The top features of a management device include: conversation, analysis, and planning.
A third crucial feature is the ability of the application to produce use of the Gantt charts. The top attributes of a Crm application program that use the00 Gantt graphs include: conversation, planning, and pricing. The podio software program has been known to provide the ideal solutions for the needs, and overall functionality. Therefore , you can easily identify what is special about it tool.
The third primary advantage of the podio is the fact it can be personalized according to your company needs. To put it succinctly that you get the data you need, if you want it. Applying this program, you will need the chance to efficiently manage your business. Furthermore, the characteristics provided by this program allow you to gain accurate ideas, which help one to increase profitability and lower costs. The very best features of a project management device such as the plataforma are what you need to make the very best use of this software in order to effectively manage your company. | <urn:uuid:f059f784-90b0-45da-ae3c-e5cdf28fc801> | CC-MAIN-2022-33 | https://bklaw.ge/2021/03/09/the-top-features-of-a-project-management-tool-to-your-business/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00674.warc.gz | en | 0.948928 | 803 | 2.125 | 2 |
|Publication number||US5905867 A|
|Application number||US 08/759,359|
|Publication date||18 May 1999|
|Filing date||12 Nov 1996|
|Priority date||12 Nov 1996|
|Publication number||08759359, 759359, US 5905867 A, US 5905867A, US-A-5905867, US5905867 A, US5905867A|
|Inventors||Paul J. Giorgio|
|Original Assignee||The United States Of America As Represented By The Secretary Of The Navy|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (3), Referenced by (136), Classifications (13), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The invention described herein may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefor.
This patent application is co-pending with related patent applications entitled Method for Optimizing the Rotational Speed of Cooling Fans (Navy Case No. 77438); Method for Monitoring Environmental Parameters At Network Sites (Navy Case No. 77500); and Apparatus for Optimizing the Rotational Speed of Cooling Fans (Navy Case No. 77502), by the same inventor as this application.
(1) Field of the Invention
This invention is generally directed to determining the status of a network and more particularly to an apparatus for enabling the determination of various environmental and operating parameters at different nodes on a network.
(2) Description of the Prior Art
Networks incorporate personal computers, workstations and other electronic systems that form network nodes. These systems typically utilize internal power supplies to deliver power to components and peripherals disposed within the systems. In a computer environment, peripheral devices are added using expansion slots. As more peripheral devices or other components are added, the internal power supply must deliver more current with a concomitant increase in heat being dissipated. Consequently the cooling requirements increase.
Forced convection cooling is the most widely used method for dissipating heat in such electronic systems. With forced convection cooling, fans direct air across the surface of electronic components typically inside a chassis. Some forced convection cooling system fans operate on alternating current (AC). Generally, rotational speed of AC fans cannot be easily changed. Consequently, AC fans rotate at a fixed speed that is determined by the maximum power requirement. If the power requirement reduces, the fan speed remains constant and therefore is excessive for these less demanding conditions. This excessive speed results in unnecessarily high levels of airborne noise caused by airflow through filters and over components, and structureborne noise caused by mechanical vibrations of the fans during operation. Excessive noise, as is known, can be disadvantageous in a number of applications.
Brushless direct current (DC) fans are becoming popular. They are reliable and are as capable as standard AC fans in cooling electronic components. The speed and resulting airflow of DC fans is proportional to the DC voltage applied. The ability to match fan speed to cooling requirements at any given time would lead to the possibility of reducing fan speed if the power supply were not operating at its maximum. Reducing fan speed by 20% produces a 5 db sound level decrease; a 40% reduction in fan speed produces a 10 db reduction in noise due to airflow and structureborne noise. There are several examples of control systems that control fan speed in response to operating parameters.
In U.S. Pat. No. 3,230,293 (1966) to Turgeon a current transformer monitors the load on a phase conductor in a multiphase electrical system. The output from the current transformer then serves to control an air foil fan that directs a cooling medium over the conductor. Thus in this reference, fan speed is dependent only upon the electrical load.
U.S. Pat. No. 5,436,827 (1995) to Gunn et al. discloses an alternative approach whereby the control boards in a power mixing circuit sense the speed of a fan and select one or the other of control boards for energizing the system. This provides parallel energizing circuits for the fan and prevents the inadvertent deenergization of the fan. The control in this patent is dependent upon fan speed as the loss of fan speed while powered by one control board will cause a shift to the other control board.
U.S. Pat. No. 5,484,012 (1996) to Hiratsuka discloses an electronic system with two fans. The electronic apparatus to be cooled is located in a housing and includes at least one heat source. The housing has an intake port and an exhaust port. The electronic apparatus comprises a cooling fan mounted in the exhaust port and an auxiliary cooling fan placed near the heat source. A first control portion controls fan speed in accordance with the temperature of intake air. A second control portion determines fan speed for the auxiliary cooling fan in a first mode when the fan speed of the cooling fan is less than a reference speed and in a second mode when the fan speed of the cooling fan is greater than the reference speed. Thus this patent discloses a control system in which fan speed is dependent upon the ambient temperature as represented by the temperature of the incoming air. This system does not provide for electrical load monitoring.
Still other patents disclose other systems for maintaining operating temperatures for electronic circuits. U.S. Pat. No. 4,685,303 (1987) to Branc et al. discloses a disk drive isolation system in which a thermo-electric heat pump maintains conditions within a disk drive in response to humidity. U.S. Pat. No. 5,121,291 (1992) to Cope et al. discloses a system in which internal temperature controls fan speed. U.S. Pat. No. 5,249,741 (1993) to Bistline describes a system that establishes fan speed based upon a particular configuration of equipment monitored during a computer operation start-up or "boot" operation. This system does not automatically adjust fan speed when an unknown device is installed.
Each of the foregoing references disclose systems for controlling fan speed. However, none of them disclose a system that is readily adapted for enabling a network manager to monitor status, such as the level of electronic load, ambient temperature and fan operation at each network node from another network node, particularly where that node might be remote from network nodes of interest. In some situations it might even be desirable to obtain such status by establishing a modem link between the network and a remote site.
More specifically, in recent years, as digital computers and the associated system have become more sophisticated, an individual at each node has less interest in monitoring environmentally related parameters. The responsibility for such monitoring parameters and responding to various malfunctions is becoming the responsibility of the network manager. Moreover, as networks become more complex and widespread, it becomes important from an operational standpoint to enhance network power and environmental management from any node on a network. Yet no such capability exists particularly in the form of a network addressable unit.
Therefore it is an object of this invention to enable a network manager to monitor the environmental status of individual network nodes.
Another object of this invention is to enable a network manager to monitor the operation of cooling fans to determine whether they are operating at a state that minimizes the noise introduced by the operation.
Another object of this invention is to enable a network manager to monitor environmentally related ambient temperature, electrical load and fan speed parameters.
In accordance with one aspect of this invention, parameters such as electrical load, ambient temperature and the rate of airflow are measured at a first digital computer attached to a network. The airflow rate is controlled in response to the monitored parameters and the parameters are save periodically. A connection exists to enable a network request to be received and to transfer the values of corresponding operating parameters back to the requesting node on the network.
In accordance with another aspect of this invention, it is possible to transfer operating parameters from a digital computer system in response to a request received over a network wherein the digital computer includes a cooling fan that directs cooling air past the electrical device that has a variable electrical load energized by a switching power supply and that operates in an environment with a variable ambient temperature. A controller associated with the digital computer monitors the power being coupled from the switching power supply to the electric load as a first parameter, ambient temperature as a second parameter and fan speed as a third parameter. The controller generates a fan speed control signal in response to the monitoring of the power ambient temperature and fan speed. In addition, the controller transfers, in response to a received operating parameter request, the value of at least one of the monitored parameters.
The appended claims particularly point out and distinctly claim the subject matter of this invention. The various objects, advantages and novel features of this invention will be more fully apparent from a reading of the following detailed description in conjunction with the accompanying drawings in which like reference numerals refer to like parts, and in which:
FIG. 1 is a block diagram of a network incorporating this invention;
FIG. 2 is a block diagram of an electrical device with a cooling system constructed in accordance with this invention;
FIG. 3 depicts the internal construction of a controller shown in FIG. 1;
FIG. 4 is a flow chart depicting the operation of the system shown in FIG. 2 and controller shown in FIG. 3; and
FIG. 5 is a flow chart depicting the operation of a network node shown in FIG. 1.
FIG. 1 depicts a network that includes network sites 200A, 200B . . . 200N. Each of these sites generally comprises a digital computer system, such as a system represented by digital computer 202A and display device 204A at the network site 200A. In this particular network the computers 202A and 202B are network nodes by virtue of connections 206A and 206B, respectively, to a network represented by a connection or path 208. In this particular embodiment the digital computer 202N at site 200N does not connect to the network.
FIG. 1 also depicts another network site 210 that represents a network administration site. This could be a remote site directly connected to the network path 208. In the alternative, the node 210 could comprise a modem connection to a geographically remote system. Such connections are well known in the art.
Each of the network sites 200A, 200B . . . 200N includes a controller 212A, 212B . . . 212N respectively. Each of these controllers includes a connection 214A, 214B . . . 214N to the path 208 and constitutes a separate and unique address or node in the network. Network topologies such as these are well known in the art and it is sufficient to merely indicate that for this architecture a network manager at the administration system 210 can address and transfer messages with the computers 200A and 200B and, independently, the controllers 212A, 212B . . . 212N. Looking at the site 200N, it will now be apparent that while it may be desired to isolate the digital computer from the network, such a system can still be monitored from the network through the controller 212N.
FIG. 2 depicts a digital system 10 such as constituted by any of the network nodes 200A, 200B . . . 200N. The system 10 includes, as basic operating elements, a switching DC power supply 12 and an output conductor 14 to a variable electrical load device 16. The variable electrical load device is represented by a plurality of fixed and variable resistors 16A . . . 16N representing constant and variable loads. In a digital computer environment each of the resistors 16A through 16N could be constituted by individual circuit cards that are constant or variable loads and are located within a chassis also represented as variable electrical load device 16. It can be seen that the device 16 also identifies the total electrical load of the power supply 12. In the following discussion the numeral 16 refers to the variable or total electrical load, the chassis of the digital computer or the digital computer itself, as the context dictates.
During operation, the switching power supply 12 connects to an external power source that provides a DC voltage VIN at a connection 18. A switching transistor 20 produces current pulses that an LC filter 22 smooths for transfer over the output conductor 14 to the electrical load 16 as a VOUT signal. A comparator 24 generates an error signal in response to the output signal (VOUT) and a reference signal VREF corresponding to the desired output voltage. A pulse-width modulated (PWM) control unit 26 converts the error signal into a PWM control signal that establishes the duty cycle for the operation of the switching transistor 20, as known in the art. Typically the PWM control unit 26 will vary the duty cycle of the control signal between minimum and maximum values that correspond to the minimum and maximum expected loads.
Stated differently, the DC output voltage, VOUT, for the switching power supply 12 is proportional to the input unregulated voltage, VIN, and the ratio of the "ON" time, TON, to the total time period T of the signal from PWM control unit 26. This relationship can be expressed mathematically as:
VOUT =VIN (TON /T)
As the transistor switches from "ON" to "OFF", the periodicity of the current waveform is identical to the TON /T period of the PWM signal. This current is fed to a series inductor 22a and shunt capacitor 22b and supplies the output load, such as the computer 16. As the output load current changes with variable loads, the input current changes in a like manner, and the DC or average value of the current flowing into the inductor 22a of the LC filter 22 equals the output load current This average value is a function of the TON /T ratio established by the PWM control circuit. Hence, if the TON /T ratio, i.e., the duty cycle, of the signal from the PWM control unit 26, is measured, the average value of DC load current can also be accurately computed. Consequently, the switching power supply 12 and electrical load 16 shown in FIG. 2 constitute a variable load energized by a power supply in response to a load control signal generated by the PWM control unit 26.
Forced convection cooling maintains the electrical load within appropriate operating temperature limits by directing ambient air as a cooling medium past the electrical load elements. A fan assembly 30 provides this air and may comprise one or more variable speed fans generally mounted on the chassis 16. In the particular system 10 of FIG. 2 the fan assembly 30 includes a plurality of variable-speed fans 32A, 32B . . . 32N. A plurality of tachometers 34A, 34B . . . 34N provide signals on conductors 36A, 36B . . . 36N representing the speeds of the respective fans. Each tachometer may be added to or integral with a corresponding fan.
In this particular embodiment the fans are connected electronically in parallel, so that the voltage applied to a common input conductor 38 controls the fan speed. Typically increasing the voltage will increase fan speed. Consequently the voltage on the input conductor 38 will vary between minimum and maximum values that correspond to the minimum and maximum fan speeds for adequate cooling at minimum and maximum load conditions respectively. The capacity and speed range of each fan will determine the number of fans required for a given range of load conditions.
In accordance with one aspect of this invention, a system 40 for monitoring various operating parameters and controlling the fan speed includes, as its basic elements, a microcontroller 42, a data selector 44 with a data bus 46 to the microcontroller 42. The data selector 44 responds to signals on a SELECT bus 48 by conveying data from one of several sources, namely the PWM control unit 26 and the tachometers 34A, 34B . . . 34N. Specifically, the PWM control signal transfers to the data selector over a transfer conductor 50 thereby enabling the control system 40 to monitor the load of the electrical device. Signals from the tachometers 34A, 34B . . . 34N enable the control system 40 to monitor fan speed that indicates the airflow past the electrical device.
The microcontroller 42 also monitors the ambient temperature by means of a thermistor 52 coupled to the microcontroller 42 by a thermistor conductor 54. In one embodiment, as described in more detail later, the thermistor 52 produces an analog signal that the microcontroller 42 converts into a digital form. A thermistor that provides digital signals could also be used.
The microcontroller 42 uses these monitored conditions to establish a fan speed set point signal that establishes the voltage on the input conductor 38. In this particular embodiment the fan speed set point signal appears on converter conductor 56. A D/A converter 58 produces an analog output signal that an amplifier 60 uses to provide the necessary voltage and power to the fans 32A, 32B . . . 32N.
FIG. 2 also depicts a display 62 that can provide a display representative of the load and rotational speed of the fans. A Local Area Network (LAN) interface 64, typically an Ethernet Interface or Fiber Distributed Data Interface (FDDI), provides a means for connecting the control system to a network 66 in parallel with any digital computer. This interface 64 enables the microcontroller 42 to provide status information onto the network 66 in response to a request from any site on the network. The operation of the microcontroller in response to network requests is described later.
FIG. 3 depicts the various functions and organization of the microcontroller 42 that can be implemented with any number of devices. One such device is a Motorola MC68HC11 microcontroller. Such a microcontroller contains a central processing unit (CPU) 70, an analog-to-digital (A/D) converter 72, a random access memory (RAM) 74 and a control memory 76 for establishing particular procedures. The control memory 76 typically will be constituted by an electrically erasable programmable memory (EEPROM). This particular microcontroller also includes a pulse accumulator 78 and a selection address generator 80 for producing the SELECT signals on the SELECT bus 48. Integral input port 82 receives the selected one of the PWM control signals and the tachometer signals on data bus 46; thermistor input port 84 receives the ambient temperature signal on thermistor conductor 54. SELECT output port 86 transfers SELECT signals onto the SELECT bus 48; signal output port 88 transfers the fan speed set point signal onto converter conductor 56.
The memory 74 comprises a number of buffers and tables that are useful in controlling fan speed. These include a monitored duty cycle buffer 90 for receiving a value indicative of the duty cycle of the PWM control signal from the control unit 26 from FIG. 2 in digital format. In a typical application the particular duty cycle value could be encoded into a four-bit word that, in turn, would effectively divide the duty cycles in sixteen duty cycle ranges.
A monitored fan speed buffer 92 includes locations 92A, 92B . . . 92N for storing the fan speeds for fans 32A, 32B . . . 32N respectively generated by a corresponding one of the tachometers 34A, 34B . . . 34N. These would also be provided from the pulse accumulator 78. As will be apparent, each of the values stored in the buffers 90 and 92 will require some processing to convert the data in the pulse accumulator 78 into an appropriate value.
A monitored ambient temperature buffer 94 receives the output from the A/D converter 72 through some type of sample gate 96. The buffer 94 contains a value that represents the ambient temperature as recorded by the thermistor 52 in FIG. 2.
A fan speed set point buffer 98 receives the fan speed set point in digital form. This signal is coupled through the signal output port 88 onto the converter conductor 56 for controlling the energy level of the fans.
The memory 74 additionally contains two tables. Table 100 includes at successive addresses therein values designated as V(LOAD) voltages. The monitored duty cycle contained in the buffer 90 can be used as an index into the table 100 thereby to select a voltage value. Assuming that the load is converted into a four-bit load value, the resulting ranges from 0000 to 1111 can define sixteen V(LOAD) voltages designated as VL (0) to VL (15).
Table 102 correlates ambient temperature (typically in °C.) into a set of values or V(TEMP) voltages. As shown in FIG. 3, table 102 includes locations having an address corresponding to 25° C. that is a desired operating temperature for the equipment. The V(TEMP) voltage value for this temperature is 0. For lower ambient temperatures (i.e., from 20° C. to 0° C.) the V(TEMP) voltage values will be negative because the cooling effect of the ambient air will be greater. The cooler the air, the less airflow is needed, so the fan speed can be reduced. Conversely as the ambient temperature increases above 25° C., additional fan speed is required. The increments above 25° C. have increasing positive values.
The control memory 76 may contain instructions for a plurality of procedures including a control procedure. The control procedure operates essentially continuously and iteratively, unless interrupted, as known in the art. LAN port 104 enables a connection with the LAN interface 64 in FIG. 2 and a response to messages received from the network. Display port 108 serves as an output port to the display 62 in FIG. 2.
The control procedure contained in the control memory 76 operates, after initialization, in an iterative loop. Essentially it uses the entries into the tables 100 and 102 during each iteration to establish an updated fan speed set point. More particularly, and referring to FIG. 4, when power is applied to the system 10 in FIG. 2, step 110 initiates the procedure. In step 112 the fan speed set point in buffer 98 is set to a maximum value, i.e., the voltage from the amplifier 60 in FIG. 2 is at a maximum. This may be a preset value or may be the sum of the maximum values in the tables 100 and 102. That is, the initial fan speed set point could be based on the sum of the V(LOAD) and V(TEMP) voltage values. This assures maximum cooling on start-up and until a positive determination of the actual operating conditions can be made.
Steps 114, 116 and 118 then define a control loop that monitors the outputs from the tachometers 34A . . . 34N. The delay in step 114 allows the fans to reach maximum speed. Step 116 retrieves the fan speed signals from tachometers 34A . . . 34N in FIG. 2 and transfers the corresponding information into the fan speed buffer 92 in FIG. 3. In step 118, the fan speeds in buffer 92 in FIG. 3 are compared to the maximum fan speed. When the fans reach maximum speed, control diverts from step 118 to step 120 where the microcontroller 42 reads the PWM signal from the PWM control unit 26 through the port 82 and the pulse accumulator 78 of FIG. 3, processes that information and transfers and saves the corresponding digital representation of the duty cycle range and hence the load range into the monitored duty cycle buffer 90. In step 122 the microcontroller 42 uses the table 100 to obtain the corresponding V(LOAD) voltage values.
In step 124 the microcontroller 42 reads the thermistor 52 of FIG. 2 through the port 84, A/D converter 72 and sample gate 96. After the microcontroller processes the resulting signal it saves the ambient temperature in digital form in the monitored ambient temperature buffer 94. In step 126 the microcontroller uses table 102 to retrieve the corresponding V(TEMP) voltage value.
In step 128 the microcontroller 42 sums the V(LOAD) and V(TEMP) voltage values to produce an updated set point signal. After a delay, defined by step 130 to assure a stable control function, the microcontroller 42 retrieves the fan speed signals from the tachometers 34A . . . 34N in FIG. 2 to be saved individually in the monitored fan speed buffer 92. Step 134 determines whether the measured fan speed equals the fan speed obtained in step 128. If the fan speed does not correspond to that updated set point, step 136 replaces the contents of the fan speed set point buffer 98 with the sum obtained in step 128 plus some increment to adjust for particular atmospheric or wear problems. Steps 130, 132 and 134 continue the loop until the fan speed reaches the correct value. When the fan speed reaches a value corresponding to the updated set point value or if it is already at that value, step 134 branches back to step 120 to begin another iteration of the control procedure in the control memory 76.
Referring again to FIG. 1, protocols for communicating over various networks are well known. The construction of the microcontroller 42 in FIGS. 2 and 3 facilitates the ability of a network manager to determine the status at any one of the network nodes 200A, 200B . . . 200N. Known protocols may operate with or without security. Security can be provided for limiting access to a particular network manager and, as previously indicated, the network manager could gain access from the network node 210 or through any of the other network nodes that were properly configured.
In a simple system, the network manager can request any one of several operating parameters based upon information in each of the controllers 212A, 212B . . . 212N. Each controller would have an independent network address as previously indicated and the network manager, upon formulating a request, would send a request through a network interface card. That request would contain, among other information, the address of a particular controller to be monitored and a command requesting a monitored status. In this particular example it will be assumed that a separate command exists for requesting the status of each parameter.
FIG. 5 depicts a procedure whereby a request from a network manager operates by transferring to the digital computer of the network manager an operating parameter. During this procedure codes are detected sequentially and each request only produces one code. As will be apparent, it is also possible to establish a request that would define at least one or more or all of the operating parameters. In such a situation appropriate changes would be made to the procedure set forth in FIG. 5. The procedure begins at step 220 when the microcontroller receives a request from the network transferred from the port 104 and the LAN interface 64 shown in FIG. 3 and FIG. 2, respectively. In response the procedure decodes the address of the request at step 222 to determine whether the request is for the corresponding network node as represented by the related computer. If it is, step 224 diverts to step 226 where the microcontroller 42 in FIG. 3 retrieves the command portion for decoding.
The next sequence of steps decodes individual commands. For example, if the request is a request for the electrical load at the network node, step 228 diverts to step 230 to retrieve the saved electrical load value from the buffer 90 in FIG. 3. If the request is for the ambient temperature, steps 228 and 232 shift the procedure to step 234 to retrieve the ambient temperature value from the buffer 94 in FIG. 3. For a fan voltage, steps 228 and 232 transfer control to step 236. In turn step 236 shifts control to step 238 to retrieve the fan speed set point from the buffer 98 in FIG. 3.
If the command is for fan speed, steps 228, 232 and 236 divert to step 240. The procedure of FIG. 5 tests the fan speed at step 242 and determines whether the fan is running at speed in step 244. If it is, the system uses FIG. 3 to retrieve the fan speed from the buffer 98 in FIG. 3. Otherwise step 244 diverts to step 248 to interpose a delay before testing the fan speed again in step 242.
Once any of the commands is decoded and the corresponding steps, such as steps 234, 238 and 246, obtain a corresponding value, control shifts to step 250. Step 250 generates a message with the corresponding value for transfer back to the requesting network node. Thus, a network manager can obtain the value of any of the foregoing operating parameters from any site in the network.
If, however, the address is not for the computer 224 or the command is not one of the foregoing commands, steps 224 and steps 240 will transfer control to some other procedure that might be constituted by an error or other procedure.
Therefore in accordance with this invention the circuitry in FIGS. 2 and 3 operate in accordance with the procedures of FIG. 4 to provide a method and apparatus for controlling fan speed. In addition they provide an apparatus and method for monitoring the various operating parameters for each digital computer such as electrical load, ambient temperature and fan speed. By interposing an LAN interface, such as the LAN interface 64 in FIG. 2, between the microcontroller 42 shown in FIG. 3 and the network, it is possible to expand the capabilities of the circuitry shown in FIGS. 2 and 3 by allowing a network manager to retrieve those parameters essentially independently of the operation of any attached data processing system at a particular network site. This enables the network manager to make decisions concerning the administration of the system and to analyze the system for potential failures as might be recorded by for example retrieving fan speeds from parallel fans at a single network node and noting wide diversity in those speeds. Consequently this invention allows the network manager to take over significant responsibilities concerning the monitoring of environmental conditions related to each network node and the equipment attached thereto.
This invention has been disclosed in terms of certain embodiments. It will be apparent that many modifications can be made to the disclosed apparatus without departing from the invention. For example, the substitution of a request that could obtain the total operating status for all monitored computer operating parameters can, as previously indicated, be substituted for the single-parameter request. Parallel decoding of commands can be substituted for the requested decoding disclosed in FIG. 5. Still other parameters might be monitored and made available. Step 118 in FIG. 4 and step 244 in FIG. 5 may incorporate an error checking sequence which will provide an indication or transfer control to steps 120 and 246, respectively, if the fans do not reach maximum speed within a sufficient time. Therefore, it is the intent of the appended claims to cover all such variations and modifications as come within the true spirit and scope of this invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5019717 *||14 Nov 1988||28 May 1991||Elegant Design Solutions Inc.||Computer-controlled uninterruptable power supply|
|US5727928 *||14 Dec 1995||17 Mar 1998||Dell Usa L.P.||Fan speed monitoring system for determining the speed of a PWM fan|
|US5761085 *||12 Nov 1996||2 Jun 1998||The United States Of America As Represented By The Secretary Of The Navy||Method for monitoring environmental parameters at network sites|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6009541||1 Oct 1997||28 Dec 1999||Micron Electronics, Inc.||Apparatus for performing an extensive diagnostic test in conjunction with a bios test routine|
|US6065053||1 Oct 1997||16 May 2000||Micron Electronics, Inc.||System for resetting a server|
|US6073255||1 Oct 1997||6 Jun 2000||Micron Electronics, Inc.||Method of reading system log|
|US6088816||1 Oct 1997||11 Jul 2000||Micron Electronics, Inc.||Method of displaying system status|
|US6122746||1 Oct 1997||19 Sep 2000||Micron Electronics, Inc.||System for powering up and powering down a server|
|US6122758||1 Oct 1997||19 Sep 2000||Micron Electronics, Inc.||System for mapping environmental resources to memory for program access|
|US6134668||1 Oct 1997||17 Oct 2000||Micron Electronics, Inc.||Method of selective independent powering of portion of computer system through remote interface from remote interface power supply|
|US6134673||1 Oct 1997||17 Oct 2000||Micron Electronics, Inc.||Method for clustering software applications|
|US6138179||1 Oct 1997||24 Oct 2000||Micron Electronics, Inc.||System for automatically partitioning and formatting a primary hard disk for installing software in which selection of extended partition size is not related to size of hard disk|
|US6138250||1 Oct 1997||24 Oct 2000||Micron Electronics, Inc.||System for reading system log|
|US6145098||1 Oct 1997||7 Nov 2000||Micron Electronics, Inc.||System for displaying system status|
|US6148355||1 Oct 1997||14 Nov 2000||Micron Electronics, Inc.||Configuration management method for hot adding and hot replacing devices|
|US6154835||1 Oct 1997||28 Nov 2000||Micron Electronics, Inc.||Method for automatically configuring and formatting a computer system and installing software|
|US6163825||24 Mar 1999||19 Dec 2000||Micron Electronics, Inc.||Method for hot adding a network adapter by identifying and executing the adapter driver based upon the logical board number of the network adapter|
|US6163849||1 Oct 1997||19 Dec 2000||Micron Electronics, Inc.||Method of powering up or powering down a server to a maintenance state|
|US6163853||1 Oct 1997||19 Dec 2000||Micron Electronics, Inc.||Method for communicating a software-generated pulse waveform between two servers in a network|
|US6170028||1 Oct 1997||2 Jan 2001||Micron Electronics, Inc.||Method for hot swapping a programmable network adapter by using a programmable processor to selectively disabling and enabling power thereto upon receiving respective control signals|
|US6170067||1 Oct 1997||2 Jan 2001||Micron Technology, Inc.||System for automatically reporting a system failure in a server|
|US6173346||1 Oct 1997||9 Jan 2001||Micron Electronics, Inc.||Method for hot swapping a programmable storage adapter using a programmable processor for selectively enabling or disabling power to adapter slot in response to respective request signals|
|US6175490||1 Oct 1997||16 Jan 2001||Micron Electronics, Inc.||Fault tolerant computer system|
|US6179486||1 Oct 1997||30 Jan 2001||Micron Electronics, Inc.||Method for hot add of a mass storage adapter on a system including a dynamically loaded adapter driver|
|US6182180||1 Oct 1997||30 Jan 2001||Micron Electronics, Inc.||Apparatus for interfacing buses|
|US6192434||1 Oct 1997||20 Feb 2001||Micron Electronics, Inc||System for hot swapping a programmable adapter by using a programmable processor to selectively disabling and enabling power thereto upon receiving respective control signals|
|US6195717||1 Oct 1997||27 Feb 2001||Micron Electronics, Inc.||Method of expanding bus loading capacity|
|US6199173||1 Oct 1997||6 Mar 2001||Micron Electronics, Inc.||Method for mapping environmental resources to memory for program access|
|US6202111||1 Oct 1997||13 Mar 2001||Micron Electronics, Inc.||Method for the hot add of a network adapter on a system including a statically loaded adapter driver|
|US6202160||1 Oct 1997||13 Mar 2001||Micron Electronics, Inc.||System for independent powering of a computer system|
|US6205503||17 Jul 1998||20 Mar 2001||Mallikarjunan Mahalingam||Method for the hot swap and add of input/output platforms and devices|
|US6212585||1 Oct 1997||3 Apr 2001||Micron Electronics, Inc.||Method of automatically configuring a server after hot add of a device|
|US6219734||1 Oct 1997||17 Apr 2001||Micron Electronics, Inc.||Method for the hot add of a mass storage adapter on a system including a statically loaded adapter driver|
|US6223234||17 Jul 1998||24 Apr 2001||Micron Electronics, Inc.||Apparatus for the hot swap and add of input/output platforms and devices|
|US6243773||1 Oct 1997||5 Jun 2001||Micron Electronics, Inc.||Configuration management system for hot adding and hot replacing devices|
|US6243838||1 Oct 1997||5 Jun 2001||Micron Electronics, Inc.||Method for automatically reporting a system failure in a server|
|US6247079||1 Oct 1997||12 Jun 2001||Micron Electronics, Inc||Apparatus for computer implemented hot-swap and hot-add|
|US6247080||1 Oct 1997||12 Jun 2001||Micron Electronics, Inc.||Method for the hot add of devices|
|US6249828||1 Oct 1997||19 Jun 2001||Micron Electronics, Inc.||Method for the hot swap of a mass storage adapter on a system including a statically loaded adapter driver|
|US6249834||1 Oct 1997||19 Jun 2001||Micron Technology, Inc.||System for expanding PCI bus loading capacity|
|US6249885 *||1 Oct 1997||19 Jun 2001||Karl S. Johnson||Method for managing environmental conditions of a distributed processor system|
|US6253334||1 Oct 1997||26 Jun 2001||Micron Electronics, Inc.||Three bus server architecture with a legacy PCI bus and mirrored I/O PCI buses|
|US6263387||1 Oct 1997||17 Jul 2001||Micron Electronics, Inc.||System for automatically configuring a server after hot add of a device|
|US6266721||1 Oct 1997||24 Jul 2001||Micron Electronics, Inc.||System architecture for remote access and control of environmental management|
|US6269412||1 Oct 1997||31 Jul 2001||Micron Technology, Inc.||Apparatus for recording information system events|
|US6269417||1 Oct 1997||31 Jul 2001||Micron Technology, Inc.||Method for determining and displaying the physical slot number of an expansion bus device|
|US6292905||2 Oct 1997||18 Sep 2001||Micron Technology, Inc.||Method for providing a fault tolerant network using distributed server processes to remap clustered network resources to other servers during server failure|
|US6304929||1 Oct 1997||16 Oct 2001||Micron Electronics, Inc.||Method for hot swapping a programmable adapter by using a programmable processor to selectively disabling and enabling power thereto upon receiving respective control signals|
|US6324608||1 Oct 1997||27 Nov 2001||Micron Electronics||Method for hot swapping of network components|
|US6330690||1 Oct 1997||11 Dec 2001||Micron Electronics, Inc.||Method of resetting a server|
|US6332202||11 Oct 2000||18 Dec 2001||Micron Technology, Inc.||Method of remote access and control of environmental conditions|
|US6341322||25 Feb 1999||22 Jan 2002||Micron Electronics, Inc.||Method for interfacing two buses|
|US6353854 *||1 Oct 1998||5 Mar 2002||International Business Machines Corporation||Automatic reconfiguration system for change in management servers having protocol destination addresses|
|US6363497||1 Oct 1997||26 Mar 2002||Micron Technology, Inc.||System for clustering software applications|
|US6418492||1 Oct 1997||9 Jul 2002||Micron Electronics||Method for computer implemented hot-swap and hot-add|
|US6428282||14 Jun 1999||6 Aug 2002||Hewlett-Packard Company||System with fan speed synchronization control|
|US6459705||8 Oct 1999||1 Oct 2002||National Semiconductor Corporation||Network interface for transmitting data from a networked computer in a reduced power state|
|US6484226||19 Jun 2001||19 Nov 2002||Micron Technology, Inc.||System and method for the add or swap of an adapter on an operating computer|
|US6499073||1 Oct 1997||24 Dec 2002||Micron Electronics, Inc.||System using programmable processor for selectively enabling or disabling power to adapter in response to respective request signals|
|US6523131||8 Sep 2000||18 Feb 2003||Micron Technology, Inc.||Method for communicating a software-generated pulse waveform between two servers in a network|
|US6598173||11 Oct 2000||22 Jul 2003||Micron Technology, Inc.||Method of remote access and control of environmental conditions|
|US6604207 *||23 Mar 2001||5 Aug 2003||Micron Technology, Inc.||System architecture for remote access and control of environmental management|
|US6625519 *||1 Oct 2001||23 Sep 2003||Veeder-Root Company Inc.||Pump controller for submersible turbine pumps|
|US6662234 *||26 Mar 1998||9 Dec 2003||National Semiconductor Corporation||Transmitting data from a host computer in a reduced power state by an isolation block that disconnects the media access control layer from the physical layer|
|US6697963||7 Nov 2000||24 Feb 2004||Micron Technology, Inc.||Method of updating a system environmental setting|
|US6701453||11 Jun 2001||2 Mar 2004||Micron Technology, Inc.||System for clustering software applications|
|US6742069||30 Oct 2001||25 May 2004||Micron Technology, Inc.||Method of providing an interface to a plurality of peripheral devices using bus adapter chips|
|US6772207 *||28 Jan 1999||3 Aug 2004||Brocade Communications Systems, Inc.||System and method for managing fibre channel switching devices|
|US7095321||13 Apr 2004||22 Aug 2006||American Power Conversion Corporation||Extensible sensor monitoring, alert processing and notification system and method|
|US7148796||14 Apr 2004||12 Dec 2006||American Power Conversion Corporation||Environmental monitoring device|
|US7151349||8 Apr 2004||19 Dec 2006||Analog Devices, Inc.||Fan speed control|
|US7159022||25 Jan 2002||2 Jan 2007||American Power Conversion Corporation||Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability|
|US7330886||27 Mar 2002||12 Feb 2008||American Power Conversion Corporation||Network appliance management|
|US7340598 *||9 Jul 2004||4 Mar 2008||Computer Associates Think, Inc.||Method and system for monitoring a computer system for dynamic reconfiguration|
|US7392309||27 Mar 2002||24 Jun 2008||American Power Conversion Corporation||Network appliance management|
|US7456733||6 Nov 2006||25 Nov 2008||American Power Conversion Corporation||Environmental monitoring device|
|US7456736||30 Jun 2006||25 Nov 2008||American Power Conversion Corporation||Extensible sensor monitoring, alert processing and notification system and method|
|US7483270||24 Jun 2002||27 Jan 2009||Semiconductor Components Industries, L.L.C.||Fan speed control system|
|US7529838||11 Oct 2006||5 May 2009||American Power Conversion Corporation||Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability|
|US7542963||14 Apr 2004||2 Jun 2009||American Power Conversion Corporation||Method and system for journaling and accessing sensor and configuration data|
|US7552364 *||29 Sep 2003||23 Jun 2009||Micron Technology, Inc.||Diagnostic and managing distributed processor system|
|US7627651||26 Oct 2004||1 Dec 2009||American Power Conversion Corporation||System and method for network device communication|
|US7669064||25 Oct 2006||23 Feb 2010||Micron Technology, Inc.||Diagnostic and managing distributed processor system|
|US7711814||13 Dec 2005||4 May 2010||American Power Conversion Corporation||Method and system for remote monitoring of a power supply device with user registration capability|
|US7720054 *||2 Mar 2004||18 May 2010||Cisco Technology, Inc.||Router configured for outputting update messages specifying a detected attribute change of a connected active path according to a prescribed routing protocol|
|US7779026||2 May 2003||17 Aug 2010||American Power Conversion Corporation||Method and apparatus for collecting and displaying network device information|
|US7859237 *||28 Jun 2007||28 Dec 2010||Texas Instruments Incorporated||Method and apparatus for voltage to current conversion|
|US7958170||16 Nov 2006||7 Jun 2011||American Power Conversion Corporation||Method and apparatus for collecting and displaying data associated with network devices|
|US7986224||24 Nov 2008||26 Jul 2011||American Power Conversion Corporation||Environmental monitoring device|
|US8005944||8 Dec 2006||23 Aug 2011||American Power Conversion Corporation||Method and system for monitoring computer networks and equipment|
|US8015255||30 Nov 2009||6 Sep 2011||American Power Conversion Corporation||System and method for network device communication|
|US8019798||16 Nov 2006||13 Sep 2011||American Power Conversion Corporation||Method and apparatus for collecting and displaying network device information|
|US8024451||10 Feb 2004||20 Sep 2011||American Power Conversion Corporation||Method and system for monitoring computer networks and equipment|
|US8090817||10 Feb 2004||3 Jan 2012||American Power Conversion Corporation||Method and system for monitoring computer networks and equipment|
|US8145748||7 Mar 2008||27 Mar 2012||American Power Conversion Corporation||Remote monitoring system|
|US8224953||11 Feb 2008||17 Jul 2012||American Power Conversion Corporation||Method and apparatus for replay of historical data|
|US8271626||24 Jun 2008||18 Sep 2012||American Power Conversion Corporation||Methods for displaying physical network topology and environmental status by location, organization, or responsible party|
|US8468372||17 Dec 2009||18 Jun 2013||Round Rock Research, Llc||Diagnostic and managing distributed processor system|
|US8566292||23 Jul 2004||22 Oct 2013||Schneider Electric It Corporation||Method and system for journaling and accessing sensor and configuration data|
|US8566624 *||14 Sep 2012||22 Oct 2013||Round Rock Research, Llc||Diagnostic and managing distributed processor system|
|US8719319||16 Aug 2010||6 May 2014||Schneider Electric It Corporation||Method and apparatus for collecting and displaying network device information|
|US8966044||7 Sep 2012||24 Feb 2015||Schneider Electric It Corporation||Methods for displaying physical network topology and environmental status by location, organization, or responsible party|
|US8990536||1 Jun 2011||24 Mar 2015||Schneider Electric It Corporation||Systems and methods for journaling and executing device control instructions|
|US9166870||26 Mar 2012||20 Oct 2015||Schneider Electric It Corporation||Remote monitoring system|
|US9348722||21 Oct 2013||24 May 2016||Round Rock Research, Llc||Diagnostic and managing distributed processor system|
|US20020124081 *||25 Jan 2002||5 Sep 2002||Netbotz Inc.||Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability|
|US20020133728 *||16 Jan 2001||19 Sep 2002||Sanjay Agarwal||Network traffic based adaptive power management system for computer networks|
|US20020161885 *||27 Mar 2002||31 Oct 2002||Netbotz Inc.||Methods for displaying physical network topology and environmental status by location, organization, or responsible party|
|US20020174223 *||27 Mar 2002||21 Nov 2002||Netbotz Inc.||Method and apparatus for replay of historical oath|
|US20030137267 *||18 Dec 2000||24 Jul 2003||John Blake||Fan speed control system|
|US20030208480 *||2 May 2003||6 Nov 2003||Netbotz, Inc.||Method and apparatus for collecting and displaying network device information|
|US20030234630 *||24 Jun 2002||25 Dec 2003||John Blake||Fan speed control system|
|US20040158627 *||11 Feb 2003||12 Aug 2004||Thornton Barry W.||Computer condition detection system|
|US20040160897 *||10 Feb 2004||19 Aug 2004||Netbotz, Inc.||Method and system for monitoring computer networks and equipment|
|US20040163102 *||10 Feb 2004||19 Aug 2004||Netbotz, Inc.||Method and system for monitoring computer networks and equipment|
|US20040201471 *||13 Apr 2004||14 Oct 2004||Netbotz, Inc.||Extensible sensor monitoring, alert processing and notification system and method|
|US20040236718 *||14 Apr 2004||25 Nov 2004||Netbotz, Inc.||Method and system for journaling and accessing sensor and configuration data|
|US20040263351 *||14 Apr 2004||30 Dec 2004||Netbotz, Inc.||Environmental monitoring device|
|US20050038989 *||9 Jul 2004||17 Feb 2005||Computer Associates Think, Inc||Method and system for monitoring a computer system for dynamic reconfiguration|
|US20050195835 *||2 Mar 2004||8 Sep 2005||Savage Donnie V.||Router configured for outputting update messages specifying a detected attribute change of a connected active path according to a prescribed routing protocol|
|US20060171662 *||17 Aug 2005||3 Aug 2006||Hitachi, Ltd.||Control apparatus and method of operating same|
|US20060238339 *||30 Jun 2006||26 Oct 2006||Michael Primm||Extensible Sensor Monitoring, Alert Processing and Notification system and Method|
|US20070088688 *||16 Nov 2006||19 Apr 2007||Gary Faulkner||Method and apparatus for collecting and displaying network device information|
|US20070088823 *||8 Dec 2006||19 Apr 2007||Fowler John J||Method and System for Monitoring Computer Networks and Equipment|
|US20080088346 *||28 Jun 2007||17 Apr 2008||Coleman Edward P||Method and apparatus for voltage to current conversion|
|US20090064046 *||11 Feb 2008||5 Mar 2009||American Power Conversion Corporation||Method and apparatus for replay of historical data|
|US20100138505 *||30 Nov 2009||3 Jun 2010||American Power Conversion Corporation||System and method for network device communication|
|US20110040781 *||16 Aug 2010||17 Feb 2011||American Power Conversion Corporation||Method and apparatus for collecting and displaying network device information|
|US20130073110 *||14 Sep 2012||21 Mar 2013||Karl S. Johnson||Diagnostic and managing distributed processor system|
|US20150067406 *||27 Aug 2014||5 Mar 2015||Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd.||Testing system and method for fan module|
|DE102009034369B3 *||23 Jul 2009||26 Aug 2010||Sinitec Vertriebsgesellschaft Mbh||Control signal adjusting method for presetting desired rotational speed of fan in computer system, involves loading control signal with fan-specific information, where control signal is utilized for controlling fan|
|EP1061787A2 *||13 Jun 2000||20 Dec 2000||Hewlett-Packard Company||System with fan speed synchronization control|
|EP1061787A3 *||13 Jun 2000||14 Feb 2001||Hewlett-Packard Company||System with fan speed synchronization control|
|EP1300736A2||26 Sep 2002||9 Apr 2003||Alcatel Canada Inc.||System and method for element equipment status monitoring using a network|
|EP1300736A3 *||26 Sep 2002||17 Oct 2007||Alcatel Canada Inc.||System and method for element equipment status monitoring using a network|
|EP1679574A1 *||18 Aug 2005||12 Jul 2006||Hitachi, Ltd.||Control apparatus and method of operating same|
|WO2001049093A1 *||18 Dec 2000||5 Jul 2001||Analog Devices, Inc.||Fan speed control system|
|WO2004072809A2 *||10 Feb 2004||26 Aug 2004||Clearcube Technology Inc.||Computer condition detection system|
|WO2004072809A3 *||10 Feb 2004||13 Jan 2005||Clearcube Technology Inc||Computer condition detection system|
|U.S. Classification||709/224, 714/E11.179|
|International Classification||G06F11/30, G06F1/20, H05K7/20|
|Cooperative Classification||G06F11/3058, G06F1/206, H05K7/20209, G06F11/3006|
|European Classification||G06F11/30A1, G06F11/30E, G06F1/20T, H05K7/20B90|
|12 Feb 1997||AS||Assignment|
Owner name: NAVY, SECRETARY OF, UNITED STATES OF AMERICA, THE,
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GIORGIO, PAUL J.;REEL/FRAME:008411/0760
Effective date: 19961024
|4 Dec 2002||REMI||Maintenance fee reminder mailed|
|19 May 2003||LAPS||Lapse for failure to pay maintenance fees|
|15 Jul 2003||FP||Expired due to failure to pay maintenance fee|
Effective date: 20030518 | <urn:uuid:06f91687-ad9a-4e1f-880e-11981a7c0ea5> | CC-MAIN-2017-04 | http://www.google.ca/patents/US5905867 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00348-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.816003 | 11,398 | 1.976563 | 2 |
The Al Nasseem mixed-use development in Al Ain, chosen by Estidama as one of its first pilot projects for 2008, will have completely pedestrian zones in public areas.
The master plan for the Al Nasseem is inspired by the natural features of Al Ain and traditional Islamic cities. It will provide housing for approximately 1450 residents.
“It’s a car free development; we used the topography in an interesting way. We created the car parking at a basement or underground level. The public realm is all pedestrian,” said Ahmed Al-Ali, co-founder, X-Architects.
Parking is available in subterranean space to reduce pollution and congestion, while providing safer walk-friendly public spaces.
Al-Ali said the firm is working on the project, thinking from all aspects of sustainability, and is aiming for a three Pearl-rating with Estidama.
He said the plot is self-sufficient in retail needs and public spaces, and will have its own amenities like mosques, hospitals and women centres.
While X-Architects has won the contract for masterplanning, it hopes to be able to work on its architecture as well. | <urn:uuid:4abb49e8-f3da-4c77-91af-83a59cb74d4b> | CC-MAIN-2017-04 | http://www.designmena.com/thoughts/completely-pedestrian-zones-al-ain-mixeduse-development | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00330-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963615 | 247 | 1.65625 | 2 |
Kodaikanal meaning “gift of the forest” in local language is also known as the “princess
of hill stations”. The dense forest with many varieties of trees, the huge rocks
in the wilderness and the enchanting waterfalls makes it a real gift for the tourists
visiting this place. Kodaikanal is one of the very few unaltered and unadulterated
destinations of southern India. Kodaikanal has created a niche for itself with its
intoxicating air, breathtaking scenery and serenity that you can hardly find in
any hill station in the Himalayas.
Following are a few important places which you can visit in Kodaikanal:
Kodaikanal Lake is an artificial lake that takes the shape of a star and is spread
over 60 acres with greenery all around it. This lake was created in 1863 by Sir
Vere Hendry Levinge, who was the collector of Madurai. By spending his own money
he converted the marshy land with several streams into a lake by constructing a
strong bund. He brought boats from Tuticorin and arranged boat rides in the lake
and stocked the lake with fish. He introduced several foreign trees and fruits such
as Pine forms and Pears; and planned and executed several approach roads to Kodaikanal.
This lake is surrounded by fine tarred road of 5 km length which takes about 45min
to walk. Tourists can not find a boat club which offers pedaling and rowing boats
with different seating capacities at nominal charges. Apart from boating, cycles
and horses are available for rental in the lake area.
Bear Shola Falls
The Bear Shola falls is a favorite tourist point in Kodaikanal. It is named so because
in earlier days bears used to come and drink water from this fall. Bear Shola Falls
is located about 1.6 Kms from the lake, and 2 kms from the bus stand. Bear Shola
Falls can be reached through a scenic rough hill path. Hence for your safety suitable
means of transportation is necessary to reach the falls.
Berijam Lake is an artificial lake in the upper regions of palani hills. It is a
fine picnic spot offering beautiful scenery. This lake is situated about 23 km from
the local bus stand. It was first discovered and reclaimed in 1864 by Colonel Hamilton
of the British Army. Berijam Lake is a must see place as sighting of bison, leopard
and other chirping birds are very common. One cannot see this beautiful lake without
the permission of District Forest Officer.
Bryant Park is a famous and an important botanical park located just 0.3km away
from the bus stand. This Park is named after a British forest officer named H. D.
Bryant, who landscaped this park in 1980. The beautifully maintained park extends
over an area of 20.5 acres and is noted for flowers, hybrids and grafts. There are
around 325 species of trees and shrubs along with a glass house which shelters over
fine varieties of flowers. A big section is allotted for nearly 740 varieties of
roses. A Flower show is conducted every year during May, as a part of Summer Festival.
A must see in this park is the 150 years old Eucalyptus tree along with the 'Bodhi'
Coaker's walk is a one and half km stretch that runs parallel to the Lake. This
walk offers a magnificent view of the valley. Coaker's walk is named after Lt. Coaker,
who prepared the map of Kodaikanal. The ideal time to visit this place is before
2:30 pm in the afternoon as mist will start to set in over the valleys by late afternoons.
A phenomenon called `Brachem Spectre' in the Coakers walk occurs very rarely where
one can see his shadow on the clouds with a rainbow halo, when sun is behind him
with cloud & mist in front. To enable the visitors to have a Panoramic view
of the valley and nearby towns, one telescope house is also found at Coakers walk.
Devil's Kitchen is a very dangerous deep hidden narrow valley that looks like small
dark gutters but are actually a deep fall. Devil's Kitchen is found between Green
Valley View and Pillar Rocks. We recommend you to seek help of the locals while
visiting the Devil's Kitchen as they are fully aware of the place.
Kodaikanal has the presence of pre-historic remains dating back to 5000 BC. These
are known as Dolmens and Kistavens which are nothing but the dwelling and burial
places of people of Stone Age and Iron Age. A visit to the Dolmen Circle will help
you understand the Stone and Iron Age culture.
Flora & Fauna Museum
The Flora & Fauna museum is an educative tourist location in Kodaikanal and
is maintained by Sacred Heart College which is a Theological Seminary that was formed
in the year 1895. This museum is also known as Shenbaganur Museum. This museum preserves
fossils as well as wide varieties of the flora and fauna of this hilly region and
has an orchidorium that has a collection of about 300 species of indigenous as well
as exotic orchids. A Spanish Father Ugarthe, contributed his major collections to
the Museum. This museum is located about a distance of 5.6 km from the lake.
Green Valley View
Green Valley View and it provides a picturesque and panoramic view of the plains,
valleys, hills and the Vaigai dam. The deep, dense and dangerous valley below this
point is more than 5000 feet drop. In order to get a good view from this point,
it is better to visit the place between 10 am and 3 pm as early mornings and evenings
have mist covering the valleys. As the valley is very deep, dense and dangerous
it is always recommended to see this valley with precautionary measures.
Kurinji Andavar Temple
Kurinji Andavar Temple is dedicated to Lord Muruga. Lord Muruga is also known as
Lord Karthik – Son of Shiva and Parvathy, brother of Lord Ganesha. Kurinji Andavar
Temple is named after the abundant Kurinji flowers that bloom once in twelve years.
Kurinji Andavar Temple was constructed in the year 1936. This temple is located
at about 5 km from the bus station. Summer festival is the most anticipated event
by the locals and is celebrated in the month of May every year. Thousands of devotees
visit this temple during the summer festival to seek the blessings of Lord Muruga.
From this temple one can see a view of Palani and Vaigai Dam.
Palani is located 64 kms away from Kodaikanal and is one of the key tourist attractions
in Kodaikanal. Palani is a famous pilgrim center of the South and one of the six
abodes of Lord Dhandayuthapani. Direct frequent buses are available from Kodaikanal.
Pambar Falls is situated on the Pambar River which is a zip zapping stream that
crusaded over a serious of rock formations. Pambar Falls are also known as Grand
Cascade. It can be reached by a steep, abrupt path behind the Pambar house. Hence
for your safety suitable means of transportation is necessary to reach the falls.
The Pillar rocks are three granite boulders which are seen standing vertically shoulder
to shoulder. These rocks are measuring a height of about 400 feet from the ground
and the chambers that are seen between the two pillars are known as Devil's Kitchen.
The Pillar rock is full of caves and chasms which prove to be a delight for all
adventure seekers. This is the best place to view sunset and the glittering Kodaikanal
Silver Cascade waterfall is located just about 8 kms from Kodaikanal. The overflow
of Kodaikanal Lake comes down here as 180 feet high falls. The crystal clear water
contains various minerals and taking a bath in this fall is very refreshing. Any
nature lover can sit and enjoy the beauty of this falls for hours provided he is
strong enough to take the force of the water.
Solar Physical Observatory
Built in the year 1889, the Solar Physical Observatory stands on the highest point
of the city of Kodaikanal. Positioned at an elevation of 850 feet above the lake,
the Observatory is mostly utilized for research purpose in the areas of meteorology
and solar physics. It also houses a small museum that has models explaining the
complex scientific phenomenon in simple ways.
Thalaiyar Falls is the widest falls on the Ghat road to Kodaikanal. It is one of
the highest falls in India with a 975 feet drop. Thalaiyar Falls is also known as
Rat tail falls. | <urn:uuid:1f2b6c4f-3a53-4afd-a431-f9354ea60d0b> | CC-MAIN-2017-04 | http://www.travelhot.in/TravelExperience/Kodaikanal/Places_To_Visit_In_Kodaikanal.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00338-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953776 | 1,903 | 2.484375 | 2 |
They're here! The London 2012 Olympics organizing committee has unveiled not one, but two Olympic Mascots -- Wenlock and Mandeville:
After 18 months, 40 focus groups and a secret operation worthy of MI5, London 2012 on Wednesday finally revealed the mascots that will help define the capital’s Olympic experience, and just as importantly help pay for it.
The pair are based on a short story by children's author Michael Morpurgo that tells how they were fashioned from droplets of the steel used to build the Olympic stadium. They will be crucial in raising funds and spreading messages about the games.
Wenlock, named after the Shropshire town of Much Wenlock that helped inspire Pierre de Coubertin to launch the modern Olympics, and Mandeville, inspired by the Buckinghamshire town of Stoke Mandeville, where the Paralympics were founded, will become very familiar in the next two years. The chairman of the London organising committee of the Olympic games (Locog), Lord Coe, said the mascots were aimed squarely at children and designed with the digital age in mind. He said they had the most positive reaction in workshops to road test them.
Among the designs rejected at the start of an open pitch process were anthropomorphic pigeons, an animated tea pot and a Big Ben with arms and legs.
Children will be encouraged to interact with the characters, inviting them via Facebook, Twitter and the web to visit their school...
Despite the negative media reaction, organizers say the mascots will be good at reaching their target audience: children -- and their parent's pocketbooks:
With a metallic finish, a single large eye made out of a camera lens, a London taxi light on their heads and the Olympic rings represented as friendship bracelets on their wrists, they resemble characters dreamed up for a Pixar animation.
But London 2012 organisers, for whom the launch of the mascots marks the start of a crucial period in which the games will become public property, pointed to the delighted reaction of a hall full of primary school children at today's launch as evidence that they would connect with their target audience.
"They remind you of aliens, which is really weird and cool," said 10-year-old Ali. "It reminds you of the Olympics, which is worldwide so it's something you'll want to remember forever," added 11-year-old Zanyab as they cavorted with life-size mascots for the cameras.
Children will be encouraged to interact with the characters, inviting them via Facebook, Twitter and the web to visit their school and, said Coe, inspiring them to take up different sports.
The pair were introduced in an animated film that followed their story from the Bolton steelworks where the frame of the Olympic stadium was made. They will become a range of up to 30 cuddly toys, including versions based on celebrities and sports stars, as well as adorning badges, T-shirts, mugs and more.
So, what do you think? Great; good; meh; bad; egads? | <urn:uuid:f2558b10-6765-4b71-8f05-c97d72e10895> | CC-MAIN-2017-04 | https://carloz.newsvine.com/_news/2010/05/20/4314178-london-2012-olympic-mascots-unveiled-what-do-you-think-of-wenlock-and-mandeville-newsvine-poll | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00301-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97264 | 630 | 2.125 | 2 |
Drones could provide updated intelligence on North Korean missile sites
By SETH ROBSON | STARS AND STRIPES Published: September 12, 2011
TOKYO — The U.S. is negotiating with South Korea to fly the RQ-4 Global Hawk surveillance drone near the Demilitarized Zone, a move that could provide an unprecedented view of goings-on in reclusive North Korea and draw the ire of China.
Flown extensively in Afghanistan and Iraq for the past 10 years, the first Global Hawk arrived on Guam late last year and there are now three flying in the Asia Pacific theater.
South Korea is among a large group of nations in the region with whom U.S. officials are negotiating for flyover rights, according to Lt. Col. Terran Reneau, chief of intelligence, surveillance and reconnaissance for the 13th Air Force in Hawaii.
Reneau did not give a timetable for the negotiations with the South Koreans but added: “I think we are very close” to flying in Korea. South Korean officials would not comment on the Global Hawk issue.
Lt. Col. David Gerhardt, Pacific Air Forces’ chief of command and control, intelligence, surveillance and reconnaissance requirements, added: “Global Hawk will likely fly over land in Korea as soon as agreements have been solidified to do that.”
Gerhardt did not name other nations in negotiations over Global Hawk flyover rights but said those closest to Guam with potential emergency landing sites are among the first to be approached by the U.S.
South Korean media have also reported that Seoul is interested in buying its own Global Hawks, which carry long-range and infrared cameras, RADAR and listening devices that can intercept foreign military signals.
According to the aircraft’s manufacturer, Northrop Grumman, the Global Hawk flies at 60,000 feet and has a line of sight to targets more than 340 miles away. The range of the aircraft’s cameras and sensors is classified but the line of sight from a Global Hawk flying near the DMZ would extend well beyond the Yalu River that marks North Korea’s border with China.
The drone, conceived in 1995 as a replacement for the U-2 spy plane, will enable U.S. intelligence agencies to update databases on military movement and missile sites in North Korea, said retired Air Force Col. Ralph Cossa, who is the president of the Pacific Forum Center for Strategic and International Studies in Hawaii.
Of particular interest to U.S. intelligence officers is North Korea’s development of nuclear weapons. In 2006 the regime, which has a long track record of using terrorism and unprovoked military attacks on its neighbors, announced that it had tested a nuclear bomb.
Once approved to use the South’s airways, the Global Hawk’s cameras could focus on places where experts believe the North might be developing weapons of mass destruction.
“One never knows what Pyongyang is up to, and watching sudden moves could provide an indication of an impending provocative action,” Cossa said.
North Korea’s record of violent provocation is long and varied. Last year a North Korean torpedo sank the South Korean navy ship Cheonan, killing 46 sailors. In November, North Korean artillery shelled South Korea’s Yeonpyeong island, killing four.
The North Koreans and their Chinese neighbors won’t be happy about the presence of the Global Hawk so close to their borders, Cossa said.
“The Chinese in particular are raising concerns about U.S. reconnaissance off their coast,” Cossa said. “At least Global Hawk is more out of sight and [has] greater stand-off range, which might make it appear less provocative ... but [it] will still hurt the feelings of 1.3 billion Chinese people who resent being spied upon.”
In July, China’s Defense Ministry demanded an end to the U.S. military surveillance flights near China, according to a report in the Global Times newspaper, which is part of the Communist Party-controlled news media.
“We demand that the U.S. respect China’s sovereignty and security interests, and take concrete measures to boost a healthy and stable development of military relations,” the ministry said.
The Chinese demand followed revelations that two Chinese Su-27 jets chased a U-2 aircraft over the Taiwan Strait on June 29, and that one jet crossed over the dividing line between Taiwan and the mainland along the 100-mile-wide waterway.
Chairman of the Joint Chiefs of Staff Adm. Mike Mullen told the Washington Times that he discussed the reconnaissance flights during a visit to China and at earlier talks in Washington with Chinese Gen. Chen Bingde, chief of the general staff.
“This is international airspace in this case, and we won’t be deterred from flying in international airspace,” Mullen was quoted as saying in the newspaper.
Mullen said halting the reconnaissance flights and giving in to Chinese demands would violate long-established international rules for freedom of navigation.
“The Chinese would see us move out of there,” he said. “I don’t see that as the case. We’re not going to do that, from my perspective. These reconnaissance flights are important.”
Not surprisingly, the Chinese appear to be working on their own version of the Global Hawk. Photographs of a Chinese drone — dubbed the Xianglong, which bears a striking resemblance to Northop Grumman’s aircraft — were posted in June on websites that monitor the Chinese military. | <urn:uuid:9b676294-279c-49de-bf27-2afba81c2ee2> | CC-MAIN-2017-04 | http://www.stripes.com/news/drones-could-provide-updated-intelligence-on-north-korean-missile-sites-1.154892 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00161-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.944601 | 1,175 | 1.9375 | 2 |
This concert from the Royal Scottish National Orchestra under the baton of Peter Oundjian seemed to be particularly affected by the layout and acoustic of the Albert Hall. Sometimes the venue aided the sound while on other occasions it worked against it, although the effect for each listener would also have been influenced by where they sat within the vast interior.
From the stalls, the hall seemed to work to the orchestra’s advantage during the performance of Bruckner’s Symphony No. 7 in E major in its 1885 version (and Haas edition). This was partly because the piece’s vision-like qualities may actually work best in a venue that does not lend itself to hearing a pin drop, but also because the large cylindrical space enabled the sound to reverberate around it during the most climactic passages. In addition, the tiered stage placed the wind slightly above the strings, and the brass generally above the wind, which helped the sounds of each section to come across, thus maintaining a good overall balance across the orchestra.
For a vision of the unconscious to be produced, however, the playing itself needs to be precise, and in this performance every line was rendered with exemplary clarity. The symphony’s Wagnerian elements, such as the allusion to the single chord crescendo in Das Rheingold at the end of the Allegro moderato, were readily conveyed, while on several occasions brass lines came across with spellbinding effectiveness. If, however, the performance was characterised more by tenderness and precision than energy and charge, it did have its share of thrilling moments, although on the negative side the focus occasionally slipped.
The acoustic may conversely have worked against the orchestra in the performance of Mozart’s Piano Concerto No. 27 in B flat major, K595 (1788-91) before the interval. Soloist Igor Levit’s playing revealed immense delicacy and intricacy, although it never lacked in clarity as he shaped the phrases to perfection. However, in some of his quieter moments the strings tended to swamp him because the piano’s sound went directly forwards while theirs tended to expand outwards, thus impacting on anyone sitting towards the sides. The small group of wind and brass also suffered on this occasion, but in the less overwhelming passages the piano came across exquisitely, while one duet between piano and flute was particularly affecting.
Levit’s encore was Shostakovich’s Waltz-Scherzo from his Dances of the Dolls Suite, which seemed to display his playing at its very best because the piece demands such a detailed and intimate approach. This was the pianist’s Proms debut (excepting a Cadogan Hall contribution in 2012), and we can certainly hope for many more appearances from him in the years to come.
The evening opened with a performance of Messiaen’s Hymne, reconstructed from memory by the composer in 1947 after the 1932 original was lost during the Second World War. Although it was dogged by some of the balance problems that affected the Mozart, which were again attributable to the acoustic far more than the orchestra, overall it was effective. The strings employed a light, delicate approach that also brought an intriguing sense of depth to the sound, and here, as elsewhere in the concert, there was some very fine playing. | <urn:uuid:aeeacbaa-d020-4207-805e-1ea317743f5d> | CC-MAIN-2022-33 | https://www.musicomh.com/classical/reviews-classical/prom-63-royal-scottish-national-orchestra-oundjian-royal-albert-hall-london | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00478.warc.gz | en | 0.975854 | 694 | 1.5625 | 2 |
- Increased expression of SLNCR1 is associated with reduced overall melanoma survival
- SLNCR1 knockdown decreases melanoma invasion
- The transcription factors AR and Brn3a bind adjacent sequences in SLNCR1
- SLNCR1, AR, and Brn3a are all required for upregulating the matrix metalloproteinase MMP9
Long non-coding RNAs (lncRNAs) have been implicated in numerous physiological processes and diseases, most notably cancers. However, little is known about the mechanism of many functional lncRNAs.
Researchers from the Dana-Farber Cancer Institute identified an abundantly expressed lncRNA associated with decreased melanoma patient survival. Increased expression of this lncRNA, SLNCR1, mediates melanoma invasion through a highly conserved sequence similar to that of the lncRNA SRA1. Using a sensitive technique they term RATA (RNA-associated transcription factor array), the researchers show that the brain-specific homeobox protein 3a (Brn3a) and the androgen receptor (AR) bind within and adjacent to SLNCR1’s conserved region, respectively. SLNCR1, AR, and Brn3a are specifically required for transcriptional activation of matrix metalloproteinase 9 (MMP9) and increased melanoma invasion. Their observations directly link AR to melanoma invasion, possibly explaining why males experience more melanoma metastases and have an overall lower survival in comparison to females.
Model for SLNCR1-Induced MMP9 Transcriptional Upregulation
When SLNCR1 increases, AR and Brn3a bind to conserved, adjacent regions of SLNCR1. The SLNCR1/AR/Brn3a ternary complex has high affinity for adjacent Brn3a and AR binding sites located upstream of the MMP9 transcriptional start site. Cooperative binding of AR and Brn3a to its promoter increases MMP9 expression and activity and thus increases invasion of melanoma cells. | <urn:uuid:d6b490ea-c375-4751-9d93-17624af3325f> | CC-MAIN-2022-33 | https://www.lncrnablog.com/the-lncrna-slncr1-mediates-melanoma-invasion/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00268.warc.gz | en | 0.905209 | 428 | 1.882813 | 2 |
This recipe comes straight out of our family cookbook that my Grandfather created back in 1996. This recipe is one of his that he used to sell at fairs and festivals. I learned how to can food by watching and helping him. I loved going out to the garden and picking blueberries or grapes and then canning.
Many of you may know this jelly for its appetizer. You take a brick of cream cheese and spoon some of the pepper jelly over it - serve with crackers, especially Triscuits. However, the most important way to eat pepper jelly in my opinion is after Thanksgiving on turkey sandwiches. Spread a little mayo, pepper jelly, lettuce and fresh roasted turkey - serious good food!! How do you use pepper jelly?
Makes 8 pints
1 c ground bell peppers OR 1/2 c bell and 1/2 c jalapeno
1 1/2 c vinegar
1 c water
1 pkg pectin
1/8 tsp green or red food coloring
5 1/2 c sugar
The easiest way to grind the peppers is to clean them and cut them into sections. Then put them in a bag in the freezer. When you are ready to make the jelly, take them out and pulse them in the food processor. When they are frozen, they will mince into little pieces easily like this. Depending on how hot you want your jelly, you can use the jalapenos or not. But if you do use those, be sure to wear gloves when cleaning them or else wash your hands REALLY well after you clean them.
In a large dutch oven or saucepan, put the ground peppers, vinegar, water, pectin and coloring. Stir well. Bring this mixture to a boil and then add the sugar. Stir until the sugar is dissolved. Bring it back to a boil (watch carefully because it can and will boil up and over if you aren't careful - the voice of experience here). Boil about 1 minute. You can skim the foam off the top if you don't like the look of it in your jelly, but I'm too lazy and never do.
Pour hot jelly into prepared clean canning jars. Leave 1/4 headspace. Put screw tops on. Process the jars in hot water for 10 minutes. When they have cooled, you can take the rings off and store them in your pantry with just the lids.
This jelly makes a great gift for Christmas due to it's beautiful red or green color. | <urn:uuid:b349aa8d-ebbd-49e9-87e9-ec91f7b1c920> | CC-MAIN-2017-04 | http://fromchapelhilltochickenville.blogspot.com/2010/12/sparkling-green-pepper-jelly.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00523-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.943908 | 516 | 1.507813 | 2 |
In a divorce, Iowa law provides the Court may grant an order requiring spousal support, i.e. alimony, to either party of a divorce. Alimony may be ordered for a limited or indefinite length of time. Generally, situations where alimony is awarded are in longer term marriages where one spouse is the primary breadwinner and the spouse seeking support has considerably less earning capacity.
Federal tax laws regarding alimony have been such that the payor of alimony can deduct alimony payments from his/her income for tax purposes. Likewise, the recipient of the alimony is required to report the amount of alimony received as income on his/her income tax return. However, for all divorce decrees in 2019 and beyond, things change quite dramatically. The Tax Cuts and Jobs Act (TCJA) eliminates the deduction for alimony payments after 12/31/2018 for post-2018 decrees. The payor of alimony will no longer be able to deduct the alimony payments from taxable income, and the recipient of alimony payments will no longer include the payments in taxable income.
It is important to note that for all divorces finalized in or before 2018, the income tax treatment for future alimony payments into 2019 and beyond will not change from how the payments have been treated before. The law is prospective in nature and will only apply to divorce decrees entered in 2019 and the future.
Due to this recent change, it has been advantageous in divorce proceedings for potential payors of alimony to try to accelerate the decree so that the judge enters an order in 2018. On the flip side, potential recipients of alimony would rather have the decree entered after 12/31/2018 so they would not have to report alimony as income.
Divorce can be quite stressful and generally unpleasant for both parties. However, not knowing the tax ramifications of alimony can amplify this stress, as this alimony deductibility change could mean substantial changes to your tax bill, which could be a distressing surprise. It is always advised that parties to a divorce seek legal assistance to address issues like this and various other issues that ultimately spring up in divorces.
Marijuana Possession – What Happens When You Are in the Wrong Place at the Wrong Time?
Youth Activities and the Actual Effect of Parental Waivers | <urn:uuid:960f2a15-c4a3-42eb-ac9b-0c65544dd894> | CC-MAIN-2022-33 | https://hhlawpc.com/resources/legal-articles/income-tax-changes-spousal-support | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00074.warc.gz | en | 0.957165 | 476 | 1.554688 | 2 |
Covers 3.0i, 4.4i, 4.6is & 4.8is with 5 & 6 speed manual and 5 & 6 speed automatic. The BMW X5 (E53) repair manual: 2000-2006 contains in-depth maintenance, service and repair information. The aim throughout has been simplicity and clarity, with practical explanations, step-by-step procedures and accurate specifications. Whether you're a professional or a do-it-yourself BMW owner, this manual helps you understand, care for and repair your BMW. The do-it-yourself BMW owner will find this manual indispensable as a source of detailed maintenance and repair information. Even if you have no intention of working on your car, you will find that reading and owning this manual makes it possible to discuss repairs more intelligently with a professional technician. Technical highlights: Maintenance procedures from changing the ATF to replacing the fresh air microfilter. This manual tells you what to do and how and when to do it. Step-by-step variable camshaft timing (VANOS) service for M54 and M62 TU engines. Cylinder head cover gasket and crankshaft seal replacement. Cooling system and radiator service. Fuel injection and ignition system diagrams and explanations. Information about advanced technical features such as Valvetronic, xDrive and DSC (dynamic stability control). Suspension repair procedures. Brakes, steering and ABS troubleshooting and repair. Heating and air-conditioning repair, including A/C component replacement. Body, hood and sunroof repairs and adjustments. Electrical system service, with an easy-to-use illustrated component locator section. Comprehensive wiring schematics, including power distribution and grounds. BMW OBD II diagnostic trouble codes, SAE-defined OBD II P-codes, as well as basic scan tool operation. BMW factory tolerance, wear limits, adjustments and tightening torques. Models and engines: 3.0i M54 engine, 6-cylinder 3.0 liter, 4.4i M62 TU engine, V8 4.4 liter, 4.4i N62 engine, V8 4.4 liter (Valvetronic), 4.6is M62 TU engine, V8 4.6 liter & 4.8is N62 engine, V8 4.8 liter (Valvetronic). Engine management systems (Motronic): Siemens DME MS 43, Bosch DME ME 7.2 & Bosch DME 9.2.1. Transmissions (remove, install, external service): Manual 5-speed S5D 280Z, Manual 6-speed GS6-37BZ, Automatic 5-speed A5S 390R, Automatic 5-speed A5S 440Z & Automatic 6-speed GA6HP26Z. | <urn:uuid:aa588a2e-790c-44ec-bc72-9ab01564ce6c> | CC-MAIN-2017-04 | http://www.libromotor.com/libros/BMW-X5-E53-2000-2006-SERVICE-MANUAL/18692/978-0-8376-1534-9 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00328-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.867767 | 580 | 1.546875 | 2 |
Leukemias, lymphomas, and other hematologic cancers:
Indications for: TASIGNA
Newly diagnosed chronic phase (CP) Philadelphia chromosome positive chronic myeloid leukemia (Ph+ CML) in adults and children. Chronic and accelerated phase Ph+ CML in adults resistant or intolerant to prior therapy including imatinib. Chronic and accelerated phase Ph+ CML in children resistant or intolerant to prior tyrosine-kinase inhibitor therapy.
Take on an empty stomach. Swallow whole with water; if unable, may disperse capsule contents in 1 tsp of applesauce, then take immediately (within 15 mins). Newly diagnosed Ph+ CML: 300mg every 12hrs. Hepatic impairment (mild, moderate, severe): initially 200mg twice daily, followed by dose increase to 300mg twice daily if tolerated. Resistant or intolerant Ph+ CML: 400mg every 12hrs. Hepatic impairment (mild or moderate): initially 300mg twice daily, followed by dose increase to 400mg twice daily if tolerated; severe: initially 200mg twice daily, followed by sequential dose increase to 300mg twice daily, and then 400mg twice daily if tolerated. Concomitant strong CYP3A4 inhibitors (newly diagnosed): if unavoidable, reduce to 200mg once daily; (resistant or intolerant): if unavoidable, reduce to 300mg once daily; monitor for QT prolongation. May give concomitant hematopoietic growth factors, hydroxyurea, or anagrelide if clinically indicated. Dose modifications for QT prolongation, hematological and non-hematological toxicities, and criteria for treatment discontinuation and re-initiation: see full labeling.
<1yr: not established. Take on an empty stomach. Swallow whole with water; if unable, may disperse capsule contents in 1 tsp of applesauce, then take immediately (within 15 mins). ≥1yr: Newly diagnosed, resistant or intolerant Ph+ CML: 230mg/m2 every 12hrs (round to the nearest 50mg); max 400mg/dose. Continue if clinically beneficial or until unacceptable toxicity. May give concomitant hematopoietic growth factors, hydroxyurea, or anagrelide if clinically indicated. Dose modifications for QT prolongation, hematological and non-hematological toxicities, and criteria for treatment discontinuation and re-initiation: see full labeling.
Hypokalemia. Hypomagnesemia. Long QT syndrome.
QT prolongation. Sudden deaths.
QT prolongation, sudden deaths have been reported. Correct electrolyte abnormalities prior to initiating; monitor periodically. Obtain ECGs at baseline, after 7 days, then periodically and after dose adjustments. Evaluate cardiovascular status; monitor risk factors and actively manage during therapy. Uncontrolled or significant CVD (eg, recent MI, CHF, unstable angina, significant bradycardia). History of pancreatitis. Monitor for myelosuppression; withhold or reduce dose if occurs; perform CBCs every 2 weeks for 1st 2 months then once monthly. Monitor serum lipase, liver function monthly or as clinically indicated; adjust dose appropriately. Monitor lipids and glucose periodically during first year, then yearly. Total gastrectomy (monitor frequently); consider dose increase or alternative therapy. Tumor lysis syndrome possible; maintain adequate hydration, correct uric acid levels prior to initiating therapy. Monitor for signs/symptoms of bleeding. Hereditary galactose intolerance, severe lactase deficiency, glucose-galactose malabsorption: not recommended. Monitor BCR-ABL transcript levels in patients eligible for treatment discontinuation or those who re-initiate treatment due to loss of molecular response, using an FDA authorized test (see full labeling). Monitor growth and development in children. Hepatic impairment: reduce dose. Embryo-fetal toxicity. Pregnancy: exclude status prior to initiation. Advise females of reproductive potential to use effective contraception during and for ≥14 days after the last dose. Nursing mothers: not recommended (during and for ≥14 days after the last dose).
Avoid concomitant food (for at least 2hrs before and 1hr after dose), antiarrhythmics, or other drugs that may prolong QT interval. Avoid strong CYP3A4 inhibitors (eg, ketoconazole), grapefruit, grapefruit juice (see Adults). Avoid strong CYP3A4 inducers (eg, rifampicin), St. John's wort. Concomitant proton pump inhibitors: not recommended. Administer H2-blockers at least 10hrs before or 2hrs after nilotinib dose. Separate dosing of antacids by at least 2hrs of nilotinib dose.
Nausea, rash, headache, fatigue, pruritus, vomiting, diarrhea, cough, constipation, arthralgia, nasopharyngitis, pyrexia, night sweats, myelosuppression (thrombocytopenia, neutropenia, anemia); QT prolongation, elevated serum lipase, electrolyte abnormalities (hypophosphatemia, hypo- and hyperkalemia, hypocalcemia, hyponatremia), hemorrhage, hepatotoxicity, cardiac and arterial vascular occlusive events, severe fluid retention (monitor), growth retardation in children.
Testing considerations: BCR-Abl t(9;22)
Generic Drug Availability:
Caps 50mg—120; 150mg, 200mg—28, 112 | <urn:uuid:e2923994-5ae8-4ba8-8950-9a6d606c5300> | CC-MAIN-2022-33 | https://www.hematologyadvisor.com/drug/tasigna/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00675.warc.gz | en | 0.82671 | 1,255 | 1.609375 | 2 |
Micajah Autry Died Defending the Alamo
In 1823 Autry moved to Tennessee, where he practiced law and tried his hand as a merchant. In Jackson, Tennessee, he met David Crockett, who some believe influenced Autry’s decision to investigate the Texas frontier. Autry set out for Texas with a companion in late 1835 and sent a series of remarkably descriptive letters home to his wife. Those letters survived and one is on display at the Alamo to this day. In that letter he states, “I go the whole Hog in the cause of Texas. I expect to help them gain their independence and also to form their government, for it is worth risking many lives for.” A postscript to the letter reads, “Col. Crockett has joined our company.”
In Texas Autry and Crockett enlisted in the Volunteer Auxiliary Corps and arrived at the Alamo in February. Autry was likely among the first to die in the Mexican’s siege of the mission.
For more about North Carolina’s history, arts and culture, visit Cultural Resources online. To receive these updates automatically each day, subscribe by email using the box on the right and follow us on Facebook, Twitter and Pinterest. | <urn:uuid:b51de821-0bac-4e84-91f2-7e578758d081> | CC-MAIN-2017-04 | https://nchistorytoday.wordpress.com/2013/03/06/micajah-autry-died-defending-the-alamo/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00514-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.951242 | 262 | 2.71875 | 3 |
update A Telstra official allegedly implied that Optus, using Huawei gear in its bid for the roll-out of the National Broadband Network (NBN) in 2008, would pose a national security risk, according to a leaked confidential US Embassy cable from Wikileaks.
The 2008 cable from the US Embassy in Canberra outed today refers to allegations made in a 2008 article in The Australian, and said that in an embassy meeting with Telstra officials, it was implied that the Chinese network vendor might pose a risk if it was charged with rolling out the national infrastructure because of alleged links with the Chinese People's Liberation Army.
"There is speculation that Telstra leaked this story, coming so soon after Telstra's bid was disqualified; a Telstra official told econoff in mid November that Optus would use Huawei, and implied that would be a security risk for Australia," the cable stated.
The cable referred to Telstra being excluded from initial bidding for the NBN project in 2008, before the government ultimately decided to not award any party the tender, instead opting to embark on the $35.9 billion project on its own.
According to the cable, the embassy also had a meeting with the attorney-general's cybersecurity branch director Lionel Markey, who admitted that there would be "contention" about NBN components.
"[The department] is consulting with a range of Australian government agencies, including the Defence Signals Directorate (DSD) and the Australian Security Intelligence Organisation (ASIO). Although he could not confirm whether or not Huawei was included in Optus' bid due to strict [government] guidelines concerning disclosure of information related to the NBN tender process, Markey said the [government] was well aware of issues related to Huawei," the cable stated, adding that the government would consult the US for more information.
Telstra also uses a number of Huawei consumer devices, such as the Telstra 3G Hotspot and T-Touch Tab.
The telco declined to comment when contacted by ZDNet Australia.
In a statement, Huawei Australia spokesperson Luke Coleman said the company works with all the major Australian telcos.
"Huawei's record speaks for itself — we're working with all major Australian operators, including Telstra, and we're the number-one builder of fibre broadband networks around the world with deployments in the UK, Singapore, Malaysia, the UAE and Brunei."
In an earlier classified cable on Telstra's exclusion, also published today, the Canberra Embassy said that the government's rejection of Telstra's "bare-bones" bid for the NBN project was a "a watershed moment in Australia's telecommunications history."
Telstra too big for AFACT
Another leaked cable to appear on Wikileaks today revealed why the Australian Federation Against Copyright Theft (AFACT) targeted iiNet for its piracy case in 2008. In a meeting with US Ambassador to Australia, Robert McCallum, the president for Asia Pacific of the Motion Picture Association, Mike Ellis, said that iiNet was big enough to be noticed, but not as big as Telstra, which would be able to fight back.
"It was clear Ellis did not want to begin by tangling with Telstra, Australia's former telecom monopoly and still-dominant player in telephony and internet, and a company with the financial resources and demonstrated willingness to fight hard and dirty, in court and out. Ellis also said iiNet users had a particularly high copyright violation rate, and that its management has been consistently unhelpful on copyright infringements," the cable stated.
The US Embassy said that it would monitor the case, which is now set to go before the High Court, to see whether the case "spawns a 'giant American bullies vs. little Aussie battlers' sequel"
Updated at 2:56pm 30 August 2011: added comment from Huawei | <urn:uuid:99ab4dc9-a6f9-4b98-89c2-527f90e6dab7> | CC-MAIN-2017-04 | http://www.zdnet.com/article/telstra-rep-implied-huawei-a-risk-cable/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00285-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.959087 | 782 | 1.601563 | 2 |
Human Frontier Science Programme
HFSP supports international scientific collaborations and Research Grants are therefore awarded for innovative research projects involving extensive collaboration among teams of independent scientists working in different countries and in different disciplines. For information on funding opportunities, please click here.
European Commission for Research and Innovation
The Directorate-General for Research and Innovation’s mission is to develop and implement the European research and innovation policy with a view to achieving the goals of Europe 2020 and the Innovation Union. The Directorate-General for Research and Innovation supports research and innovation through European Framework Programmes, coordinates and supports national and regional research and innovation programmes, contributes to the creation of the European Research Area by developing the conditions for researchers and knowledge to circulate freely, and supports European organisations and researchers in their cooperation at international level. For information on India specific cooperation please click here.
European programmes such as Horizon 2020, Erasmus+ and Creative Europe are also providers of grants. CORDIS is the European Commission’s primary public repository and portal to disseminate information on all EU-funded research projects and their results in the broadest sense. European Union and India Enhanced Cooperation Framework for Improved Bilateral Dialogue in the Fields of Science and Technology , INNOINDIGO Policy are also India sepcific useful resources.
European Research Council
The main goal of the European Research Council (ERC) is to encourage high quality research in Europe through competitive funding. For more information on funding opportunities, please click here.
NordForsk is an organisation under the Nordic Council of Ministers that provides funding for Nordic research cooperation as well as advice and input on Nordic research policy. To know about their call for proposals please click here.
Nordic Master Programme
Nordic Master Program allows Nordic higher education institutions to apply for funding of up to DKK 1 million per project aimed at developing the Nordic Master Programmes. For more information, kindly click here.
Nordic Research Councils for the Humanities and the Social Sciences (NOS-HS)
NOS-HS provides research funding for studies within the fields of Humanities and Social Sciences. The principal recipients of funding are universities, university colleges and research institutes. For more information about calls for proposals, please click here.
Nordic Institute of Asian Studies: Support Programme for Asian Studies
The Studies Support Programme for Asian Studies (SUPRA) of the Nordic Institute of Asian Studies (NIAS), comprises multiple forms of research support specially aimed at students and researchers, including a number of online services available both at NIAS, and outside the institute. For more information about calls for proposals, please click here.
Nordic Innovation Centre
Working under the auspices of the Nordic Council of Ministers, Nordic Innovation is a key player in implementing the Nordic trade, industry and innovation partnership programme. For more information about calls for proposals, please click here.
Nordic Publications Committee for Humanist and Social Sciences Periodicals (NOP-HS) funding for periodicals
Humanist and social sciences periodicals can apply for funding from the Nordic Publications Committee for Humanist and Social Sciences Periodicals (NOP-HS) every year. Grants are available for Nordic based humanities and social sciences publications, which have a broad Nordic editorial composition and a broad Nordic spread of both writers and subscribers. For more information about calls for proposals, please click here.
NORDITA – Scientific Programmes
NORDITA – Nordic Institute for Theoretical Physics, annually awards funding for a number of scientific programmes. A Nordita Scientific programme is an extended workshop where a limited number of scientists work together on specific topics for a period of up to 4 weeks. For more information about calls for proposals, please click here.
Nordic Summer University funding scheme
Nordic Summer University (NSU) provides funding for study and research activities. Project funds are primarily allocated to types of work in NSU done by the circles, that is the three year study projects which every year hold a winter symposium, organise a programme at the summer session and publish publications. Separate projects, for example, an academic symposium may obtain funding with a justified application. For more information about calls for proposals, please click here.
Nordic Energy Research is the funding institution for energy research under the Nordic Council of Ministers – the intergovernmental body between Denmark, Finland, Iceland, Norway and Sweden. For more information about calls for proposals, please click here. | <urn:uuid:9a242db0-1f04-462b-a739-91944eb76415> | CC-MAIN-2022-33 | http://www.nordiccentreindia.com/granting-insitutions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00478.warc.gz | en | 0.878772 | 915 | 1.648438 | 2 |
Tiger of the Stripe Books on Historical Subjects
With the exception of Bede and and Diana Dennis's two books, Everything I Ever Wanted and Finding a Way, the following are not so much histories as glimpses of life in bygone eras: Richard Atkyns's The Original and Growth of Printing together with A Vindication of the Life of Richard Atkyns; An Apology for the Life of Major General Gunning, which may or may not be by the General; and Bede's Ecclesiastical History of the English People.
All I Ever Wanted
Living with the intrigue of the unsaid
Diana Dennis, in a masterly and insightful piece of writing, evokes a past – from the back streets of Paddington to the foreign concessions of pre- revolutionary China and the horrific Japanese occupation, the post-war Orient, and London’s Mayfair that provides the backdrop to a profound and moving tale of loss, separation, survival and ultimately success. The times have changed as have many of the places, but the dilemmas and complexities of the human condition remain unaltered. They are explored here in a moving family memoir that excites one’s interest at so many levels. Paul Boateng, Politician, Diplomat and Broadcaster
All I Ever Wanted will take you along a fascinating journey across time and space. Diana Dennis uncovers a complex transnational history through the lens of a unique personal story. Maurizio Marinelli, Associate Professor of East Asian History University of Sussex<\cite>
Reublished 2022 102pp Pbk List Price £10.00 ISBN 978-1-904799-73-3
Finding a Way
Self-discovery through family research
Finding a Way describes Diana Dennis’s fascinating journey of self-exploration through family research. She discovered her family heritage to be remarkably rich and diverse. It includes chief rabbis, senior Anglican clergy (one of whom was imprisoned for Ritualism), lawyers, politicians, and businessmen, as well as the incredible women to whom they were married. Chapters on family history are interweaved with chapters on Diana’s own extraordinary life.
Diana Dennis, a vicar’s daughter, was born in Brentwood in 1936 and grew up in Essex, Herefordshire, and Buckinghamshire before training as a nurse and then as an air-hostess. In the 1960s she married Hong Kong-based British lawyer, Dick Dennis, and she lived with him in Hong Kong, Kent, and Mayfair. After having three sons, she returned to studies and became a Jungian psychologist. She has spent many years living in Mayfair, where she is involved with the Church and politics. In 2015, she published her first book, All I Ever Wanted, which explored the mysteries surrounding the life of her late husband Dick.
This rich reflection of a fascinating family is beautifully researched and insightfully written. Understanding where we come from allows us to be more of who we are. The patterns in their lives influence and shape our hopes, fears and aspirations; as Diana shows us, adding her analytic insights, warmth and humour. I commend this book Dale Mathers, Psychiatrist, Jungian analyst and author
Finding a Way through Huguenot and Jewish ancestors, this personal journey traces the parallel lives of rabbis and merchants in Geneva, Amsterdam and London. As refugees from minority cultures, they established new lives in their adopted country. The excitement with which Diana Dennis shares her discoveries shows that family sagas enliven history. Dr Tessa Murdoch, Acting Chair of the Huguenot Museum, Rochester
Published 2021 208pp Pbk List Price £12.00 ISBN 978-1-904799-72-6
As well as ordering from Amazon, you can also order direct from us. We can only accept UK orders. We are not currently charging P&P but that will probably change as the margins are slim! The card processing will be handled by PayPal but you don't need a PayPal account:
Both the Kindle version and Apple Books versions of Finding a Way are £3.99 in the UK and $5.99 in the US.
We don't publish Diana's All I Ever Wanted but we also provide links to the Kindle version of that book below.
The Original and Growth of Printing
A Vindication of the Life of Richard Atkyns Esquire
Richard Atkyns was an officer in the Royalist forces during the English Civil War. His Vindication contains fascinating eye-witness accounts of the battles in which he fought. Atkyns also held a patent for printing law books. His legal battles with the Stationers’ Company prompted him to publish the Original and Growth, an early and rather fanciful history of printing in England.
Published 2013 168pp Pbk List Price £9.99 ISBN 978-1-904799-53-5
An Apology for the Life of Major General Gunning
John Gunning, edited and annotated by Gerrish Gray
Mentioned in despatches at Bunker Hill, brother to the Duchess of Argyll and the Countess of Coventry, Major General John Gunning occupied an enviable position in Georgian society, but in 1792 his whole life started to unravel…
The Apology, published in 1792, gives a first-hand account of General Gunning's many seductions (including apparently 2 duchesses, 14 countesses, 4 viscountesses and 7 baronesses) and purports to explain the so-called ‘Gunning Mystery,’ the authorship of forged love letters between his daughter Elizabeth and the Marquess of Blandford. It also tells how the General, described by Lord Kenyon as ‘an hoary, abominable, degraded creature,’ betrayed the man who had rescued him from a debtors’ prison by seducing his wife. But is the Apology itself a forgery? Although there are indications that it may be, this memoir displays an extremely good understanding of the Gunnings, perhaps too good to be the work of an outsider.
In this new, annotated edition, Gerrish Gray unearths prosecutions for other forgeries (and capital offences at that) perpetrated by one of the suspects in the Gunning Mystery. He suggests that these may point to the true culprit.
Publication 2012 120pp Hbk List Price £14.99 ISBN 978-1-904799-46-7
Publication 2012 120pp Pbk List Price £8.99 ISBN 978-1-904799-49-8
Ecclesiastical History of the English People
The Venerable Bede, Edited by J. A. Giles & Gerrish Gray
Tiger of the Stripe is proud to present a beautiful new edition of Bede's great classic of English (and British) history, the Historia Ecclesiastica Gentis Anglorum.
Bede (c. AD 672–735) was the first historian of the English people and, by the standards of his day, made careful use of documentary sources and first-hand accounts. It was finished in about AD 731.
His opening description of Britain drew on Pliny, Solinus, Orosius and Gildas, and much of his account of the Roman occupation relied on Orosius, Eutropius, and Gildas. However, for the rest of his History, he made use of English diocesan and monastic records and the copious correspondence held in the Vatican archives.
Published 2007 400pp Hbk List Price £25.00 ISBN 978-1-904799-15-3
Published 2008 400pp Pbk List Price £12.99 ISBN 978-1-904799-31-3
The Architectural History of Canterbury Cathedral
The Rev. R. Willis MA, FRS
Since the arrival of Augustine in Kent in AD 597, Canterbury has been the very heart of the Church in England. The Saxon cathedral, much enlarged over the years, burnt down in 1067. Its replacement suffered a similar fate in 1174, to be rebuilt again. As a result, the modern visitor is presented with a confusing historical patchwork which needs some explanation.
Eadmer the singer was an eyewitness to the demolition of the Anglo-Saxon cathedral and the construction of the new one by Archbishop Lanfranc. He also describes the building of Conrad's 'glorious choir' at the time of Archbishop Anselm. Gervase of Canterbury likewise describes the destruction of Lanfranc's church by fire in 1174 and the rebuilding by William of Sens and English William.
Professor Willis connects these and other sources, such as William of Malmesbury and Matthew Paris, to his own acute observations, creating a vivid impression of the Saxon, Norman and later cathedral. The text is interspersed with many superb wood engravings which, in many cases, offer a clarity which is hard to achieve with photography.
Robert Willis (1800–1875) was Jacksonian Professor of natural and experimental philosophy at the University of Cambridge and lecturer in applied mechanics at the Metropolitan School of Science, Jermyn Street, London. He brought a new scientific rigour (but also an artistic eye) to the fields of archaeology and architectural history.
Published 2006 264pp Pbk List Price £8.99 ISBN 978-1-904799-04-7 | <urn:uuid:bf856552-f2e7-496f-b78a-95304f9d7d57> | CC-MAIN-2022-33 | https://tigerofthestripe.co.uk/history/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00072.warc.gz | en | 0.940313 | 1,991 | 1.890625 | 2 |
The Science Behind Collagen Supplements
Here at Absolute Collagen, we want you to know the facts as well as feel good. Find out a bit more about collagen, how it helps your skin & the science behind collagen supplements.
First Things First, What is Collagen?
Collagen is most commonly found in the skin, bones and connective tissue within the body, providing structural support, strength and a degree of elasticity (in combination with elastin). In particular, collagen can be found in the dermis. Collagen fibers in the dermis provide the infrastructure for elastin, this maintains the skin’s elasticity, the dermis also houses hyaluronic acid, to hold moisture.
Collagen is secreted by a variety of different cells, but primarily by connective tissue cells and in the skin, the fibroblasts are responsible for production. While young, the body consistently produces collagen but production naturally declines with age, reducing the structural integrity of the skin and leading to the formation of lines and wrinkles and sagging skin.
Indeed, research shows that, unfortunately, collagen levels begin to deplete from the age of 25. By the time we get to 40, we will have lost around a third of our collagen, which can cause our skin to wrinkle and sag.
As the fibroblasts cells responsible for producing collagen naturally decrease due to ageing, the visible signs of ageing become more prominent. In the dermis - collagen helps form a fibrous network, upon which new cells can grow. Collagen is also required for the replacement and restoration of dead skin cells.
Collagen is a major structural protein found inside and outside of our bodies. It is a unique building material composed of amino acids that provide strength and structural support to our skin, hair, nails, tendons, ligaments and blood vessels.
What Does Marine Collagen Do?
Now for the collagen supplements science. Absolute Collagen contains fish collagen, also known as ‘marine collagen’. Extracted from cold-water fish, Tilapia and Pangasius, we refine it to remove the unpleasant fishy odour and taste while retaining the collagen’s nutritional value.
Marine collagen is bioavailable when ingested, because it’s been hydrolysed which means broken down into tiny pieces. Collagen in its native form cannot be ulitised by the body. Bioavailability refers to the rate at which a substance is absorbed into the body when ingested. Marine collagen is absorbed through the intestinal barrier into the bloodstream and then carried throughout the body as amino acids. Here’s the clever part, this then stimulates your own body to create more collagen where it’s needed. This may be in your skin, hair, nails, tissue or joints.
How Does Absolute Collagen Work?
Our liquid formula provides you with a high dose of collagen in a concentrated daily dose in a convenient travel-friendly sachet. Each 10ml serving of our supplement contains 8000mg of hydrolysed marine collagen. Our advanced formula is also infused with vitamin C, essential in stimulating collagen synthesis and assisting in antioxidant protection against UV-induced damage.
Collagen Research Articles & Studies
While we have accumulated over 1,000+ positive reviews via phone, email & social media, we understand the importance of clinical research, peer-reviewed studies and collagen supplement science. Below is a list of studies relevant to marine collagen and its effects on the body. We update this list regularly when new and credible studies are published.
To date several controlled clinical trials have been performed proving the efficacy and benefits of collagen peptides on skin properties, such as hydration, elasticity and reduction of wrinkles and recently a number of therapeutic formulations of hydrolysed collagen have been developed for the treatment of skin ageing.
A randomized, placebo-controlled, double-blind clinical study with a daily supplementation of Peptan (the collagen brand used in Absolute Collagen) or placebo over 90 days showed a reduction in wrinkles:
- 13% around the eyes
- 10% around the mouth
In a further double-blind, randomised, placebo controlled clinical trial was carried out in France on 47 women aged 35-55 years with normal to dry skin. The positive outcome showed a 30% decrease in the formation of deep wrinkles, after supplementation of 10g of hydrolysed collagen.
Improved hair strength
Peptan, the collagen type used in Absolute Collagen, effectively increased the break force of hair making it healthier and stronger:
- 13% increase of hair strength
Skin hydration improvement
Peptan has been demonstrated to not only increase skin's collagen density but also its moisture level. In this clinical study, Peptan collagen has been shown to:
- Increase skin hydration by 28% after 8 weeks
91% of the Peptan-supplemented group reported higher skin hydration levels during the same period.
Peptan reduces collagen fragmentation
Fragmentation is responsible for the breakdown in strength and resilience causing our skin to age. In a randomized, placebo‐controlled, double‐blind trial with 10g Peptan supplementation or placebo per day for a period of three months, Peptan has been shown to:
- decrease the fragmentation of the collagen network by 31% after twelve weeks of intake
All clinical trials mentioned can be found here, along with further research.
- The effect of oral collagen peptide supplementation on skin moisture and the dermal collagen network
- An Overview of the Beneficial Effects of Hydrolysed Collagen as a Nutraceutical on Skin Properties
- Hydrolyzed collagen contributes to osteoblast differentiation in vitro and subsequent bone health in vivo
- Collagen peptides improve knee osteoarthritis in elderly women: A 6-month randomized, double-blind, placebo-controlled study
- Vitamin C-enriched gelatin supplementation before intermittent activity augments collagen synthesis
Our Own Marine Collagen Studies
In November 2019 we conducted a survey of 714 customers who had been taking Absolute Collagen for just 6 weeks.
- 93% said their skin felt softer
- For those suffering with hair loss 81% said the hair texture had improved
- 77% had noticed an increase in firmness in their skin
Our recent hair trial also revealed that Absolute Collagen for women improved hair texture.
This product is not intended to diagnose, treat, cure or prevent any disease. Individual results will vary and are dependent on skin type and skin condition. | <urn:uuid:a21dd197-a27d-430b-a5ea-0061819fac56> | CC-MAIN-2022-33 | https://ie.absolutecollagen.com/pages/collagen-supplements-science | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00466.warc.gz | en | 0.92211 | 1,339 | 2.4375 | 2 |
In a transcript of his comments reported by Bloomberg
,“The social cost this program implies will be limited compared to the economic and social catastrophe that would follow if we don’t adopt it. The completion of the program and financial support will cement our country’s future in the euro area.”
Six members of his cabinet have already resigned rather than vote for the measures. The leader of rightist political party, LAOS, Mr George Karatzaferis, announced in a press conference on Friday that he will not vote for the measures when they are put to parliament even though he continues to support the government. Four of the resignations submitted to Papademos were from the LAOS party.
Milena Apostolaki,an MP for the leftist PASOK party, has also announced that she will also vote against the measures, contrary to the official party line. Party leader George Papandreou said in Ta Nea
that "We have reached the well and now the country must drink". Antonios Samaras, leader of the conservative New Democracy party, has also directed his lawmakers to pass the legislation which will not only bring in over $170 billion but also ratify the reduction of the debt to private creditors by over $130 billion.
The choice of accepting the second package of financial aid is seen as the lesser of two evils but an increasing number of financial analysts, national and international, are saying that the Greek debt is unsustainable. In the words of Simon Johnson, professor of finance at Massachusetts Institute of Technology and former IMF analyst, "Greece is effectively in default."
He said in an interview with Bloomberg
that Greece is playing for time and that, when the actual default ineviteably occurs, it will be all the more painful. "Greece is in default. It is not paying its debt. This whole fiction of voluntary restructuring is a fiction made possible by regulators twisting the arms of European banks. It's a default situation and should be treated as such."
"The situation in Europe is seriously out of control and no-one is really addressing the fundamental problems and the way those can spill over and affect the American economy. The politicians in charge have really acted in a most irresponsible manner for the past three or four years."
In the Wall Street Journal,
Willem Buiter and Ebrahim Rahbari of Citigroup give Greece 50-50 odds on leaving the single currency within the next 18 months. | <urn:uuid:7650355e-1b3a-4676-9b4a-98801d9206f0> | CC-MAIN-2017-04 | http://www.digitaljournal.com/article/319443 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00048-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.966268 | 501 | 1.53125 | 2 |
Creating healthy children begins pre-conception!
Let's reclaim our children's health.
The physical condition of your child-to-be is a direct factor of the health of the mother and the father prior to the time of conception.
Approximately 3 months before conception, ovum that will become your child go through a ripening process, and 3 months before conception, sperm are generated.
The ecosystem of your body, and your partners body determines the vitality of the seeds of life. These seeds set then set the stage for your pregnancy, birth, and the entire life of your offspring.
One cannot put a value on the joy of having a vigorous and vibrant child. And equally one cannot give solace to the tragedy that befalls too many parents, who have children who are deformed or who die before the age of one. Not to mention the countless couples who have miscarriages, and who are infertile.
This web site is dedicated to the end of the tragedy of infertility, birth defects and miscarriage, and to the creation of more joy through physical wholeness.
Miscarriage, infertility, and birth defects are not usually the result not of a damaged genetic map, but of a map whose criteria has not been fulfilled. In modern science this is referred to as epigenetics. It means that the expression of your genes can change based upon environmental factors, such as diet, or stress levels.
Due to the industrialized word's wrong way of living, the DNA, or genetic heritage of your baby-to-be can become damage. That is because the modern world has lost harmony with the symphony of Nature and has forgotten HER divine plan. The result then is that the seeds for life (sperm and egg) which we produce are incomplete, and out of balance. For many couples who do not face miscarriage and birth defects, the result of these imbalances are less obvious. They could result in a difficult birth, an uncomfortable pregnancy, or a baby who is frequently ill or has many allergies.
Mainstream medical establishments such as the media, and the government refuse to be aware that birth defects, miscarriages, early infant mortality, and infertility arise significantly from imperfect seeds for life. By changing the conditions of the sperm and the egg, you can change the resulting genetic map for your baby. This can then substantially reduce, and even over a period of one generation, virtually eliminate miscarriage, birth defects, and baby's who are born with less than ideal well-being.
About the Author
I want to tell you about myself briefly to establish some type of credibility. I am Ramiel Nagel, a father devoted to spreading Indigenous wisdom. I based my information from the word of Dr. Weston Price who studied Indigenous cultures and their fertility practices. I do not have any "official" medical training. I stumbled across preconception health in researching the cause of my daughter's tooth decay. I learned that her condition, like countless other conditions faced by infants and toddlers, could have been prevented during the time prior to conception. I did not know this at the time, because hardly anybody else in the modern industrialized world knows how to influence the well being of a baby using nutrition.
I offer this website in humble service to you. All the information here is offered for free. I feel called upon to support an Earth that puts higher values such as love, truth and service, in front of materialism and a quick profit. With that I offer you a program for achieving preconception health.
Through their Foresight's Preconceptual Care in the UK ; eliminating toxic food and drink, eliminating allergies, mineral balancing, cleansing, and natural family planning, higher risk couples have achieved a 1276% reduction in birth defects to the national average, a 714% reduction in miscarriages, a 400% reduction in pre-mature births, and a 78% success rate in reversing infertility.
The plan that I offer is not their plan, but rather an adaptation based on my personal experience.
Prior to fertilization, both the mother, and father need to significantly change their health.
A Preconception Nutrition Plan for A Vibrant Baby
It is never too late to begin preconception nutrition program . (Well it is too late if you are pregnant:) ). Every little bit of effort you make before fertilization, will blossom with a several fold reward towards a strong constitution for your new baby. Ideally preconception care should begin 2-5 years before conception for the father and mother. 3-6 months before conception is less ideal, but important progress can be made. Below is an overview of the preconception care plan.
Creating a vibrant body for ourselves begins with an internal felt belief of, "I want to take care of and honor myself." You need to believe that you are really important and deserving enough, to take the time, effort, and energy required to look and listen within. You and your child are worth it.
Program Outline for Preconception Health
Create Physical Health
Create Emotional Health
Taking time to breathe, notice and feel your feelings.
Journal and engage in nurturing relationships.
Create Mental Health
Clarify you thoughts and feelings, especially around your intentions around parenting, family and community; through meditation, journaling, talking to friends, and through reading spiritual or other harmonious texts.
Create Spiritual Health
Align with your life’s purpose as a parent. Parenting lies at the center of our longing.
Engage in spiritual practice such as prayer, meditation, reading religious or spiritual texts, yoga, selfless service, and communication with God and/ or your higher (divine) self.
Overview of this website
On this website you will find several detailed pages.
- A Preconception Health Plan, including all of the preconception essentials based on the plan outlined above.
- An explanation of the cause of birth defects and what you can do about it.
- An explanation about the cause of miscarriage and how to prevent it.
- Understanding the cause of infertility and how to reverse it.
Learn more natural and holistic information about fertility, pregnancy, birth, and parenting.
Having a healthy child requires a special diet before you concieve. Only Healing Our Children teaches a preconception program based on wisdom from Indigenous cultures so that you can have a truley bright-eyed baby.
A happier baby means life with less stress, less sickness and knowing that you are giving your best to your children. Book topics also include, natural parenting, pregnancy diets, and how to have a safe birth.
Feedback From Readers Who Have Nurtured Their Children with advice from Healing Our Children
This truly is a book to heal our future generation of children! - Hally Cuttner
Ramiel Nagel's book "Healing Our Children", lovingly provides holistic perspectives on the many facets of parenting and family life. Through the guidance of this book we have become more aware and enlightened parents. Overall, this book exudes an energy of life and honesty. It is a refreshing addition to the run of the mill parenting guide. Thank you Rami! - Jamie Busch, New Jersey
This book is a treasure for new families, for all those who are planning on having children or already have young kids. - Olga
In this book Rami explains the basics of how nutrition is linked to so many of these so-called "incurable" diseases. At the end of the day, there are no shortcuts. We do need to take full responsibility of raising our children properly. - Sandeep Agarwal
Healing Our Children reveals that each disease of pregnancy and childhood can be prevented naturally. The secrets of having a vibrant, bright-eyed baby are explained in easy to grasp terms.
Learn how to:
·substantially reduce your child's risk for disease.
·reduce your risk of birth defects by 1602%, miscarriage by 640%, and premature births by 315%.
·reverse infertility with 78.4% success eating real food.
·raise your child so they feel loved, honored and cherished.
Healing Our Children will serve as an important tool in reversing the now obvious trend to physical degeneration and restoring vibrant health to all children.
Weston A. Price Foundation
My daughter just turned 5 and we adopted the recommendations you mention in the book. I have to say that I have never seen her that happy. Always in a good mood and I've never seen a baby that smiley.
If you are planning to have a child, be sure to read the book, "Healing Our Children."
"Healing Our Children" will help you prepare for a healthy pregnancy and also contribute to the health and wellness of your entire family.
NY Times Best selling Author | <urn:uuid:891412a3-4d56-4a18-b6d3-e1e6e417b08e> | CC-MAIN-2017-04 | http://www.preconceptionhealth.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00436-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946298 | 1,804 | 2.6875 | 3 |
1. The art or work of a poet.
a. Poems regarded as forming a division of literature.
b. The poetic works of a given author, group, nation, or kind.
3. A piece of literature written in meter; verse.
4. Prose that resembles a poem in some respect, as in form or sound.
5. The essence or characteristic quality of a poem.
6. A quality that suggests poetry, as in grace, beauty, or harmony: the poetry of the dancer's movements.
[Middle English poetrie, from Old French, from Medieval Latin potria, from Latin pota, poet; see poet.] | <urn:uuid:262ea0dc-5066-48ef-b4c5-2e7f087cfec1> | CC-MAIN-2017-04 | https://www.sophia.org/tutorials/elements-of-poetry | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00243-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.91603 | 138 | 3.453125 | 3 |
Local News Matters weekly newsletter
Start your week with a little inspiration. Sign up for our informative, community-based newsletter, delivered on Mondays with news about the Bay Area.
Gov. Gavin Newsom signed a bill in San Jose on Thursday to extend development regulations that allow for expedited reviews of environmental effects.
Senate Bill 7, authored by Sen. Toni Atkins, D-San Diego, will allow developments like housing and mixed-use projects to qualify for an expedited review process under the California Environmental Quality Act.
The legislation extends, for four years, the provisions of a 2011 law that initially created the expedited judicial review under CEQA for large housing, clean energy and manufacturing projects.
SB 7 also makes it easier for projects to qualify for the expedited process, lowering the threshold to those with investments between $15 million and $100 million that also dedicated at least 15 percent of a project to building and maintaining affordable housing.
“This bill is about an investment in the future of the state of California,” Newsom said Thursday during the bill-signing ceremony. “This bill is about our comeback. This bill is about our grit, our tenacity. This bill represents the best of California.”
Newsom, Atkins and Santa Clara County officials held the ceremony at the site of Google’s Downtown West project, which would include 4,000 housing units, 25 percent of which Google has pledged will be affordable and rent controlled, and retail and office space.
Newsom originally certified the project for an expedited CEQA review in 2019.
“This legislation … defeats many of the false narratives about California and our valley,” San Jose Mayor Sam Liccardo said. “The pessimistic pronouncements and downcast declarations of the ‘Eeyore caucus,’ about California not being able to get red tape out of the way to make big things happen.”
SB 7 will take effect immediately, as it was approved as a so-called emergency statute. | <urn:uuid:757bf6f6-82fc-4963-aa39-5ecafe05fe8d> | CC-MAIN-2022-33 | https://localnewsmatters.org/2021/05/23/newsom-streamlines-environmental-review-process-green-lighting-s-j-google-project/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00273.warc.gz | en | 0.950617 | 417 | 1.65625 | 2 |
a pip in forex | 2022-05-18 07:47:51
As a Forex trader, it is important to develop a strategy and plan before entering the market. You should know your trading skills and risk tolerance before investing your money. An experienced forex portfolio manager has a defined plan that keeps them focused and avoids costly errors. They know when to stop trading mentally, and they have a high level of self-discipline. Here are five tips to be a successful forex trader:
Before jumping into forex trading, you need to recognize your goals and risk tolerance. You should also know your financial goal and stick to it. Remember that Forex trading is not rocket science - you do not need to be an economics professor or mathematical genius to get started. What you do need is a clear vision, well-defined goals, and a disciplined approach to your practice. The biggest mistake most traders make is focusing on one currency pair and going against the market. To avoid this, you must be patient and disciplined.
Start with small amounts, low leverage, and focus on one currency pair. Once you are able to manage the account, you can start adding more funds. You should also remember that larger accounts do not mean bigger profits! For beginners, focus on a single currency pair and expand as you become more skilled. You should be realistic about your risk tolerance and your needs, and stick to your plan and goals. The best way to start trading is to learn the basics and build from there. You should also keep an eye out for scams.
The most important thing to remember when starting a trading career is to always remember that you are not a robot. You are an individual and you cannot expect the market to change overnight. You need to have the discipline to make sound decisions. There are no magic pills that can help you win at forex. However, there are several techniques that can help you develop into a successful Forex trader. A few of them are listed below.
Be humble and avoid trying to predict the future. Forex trading is not rocket science, and it is not a matter of being a mathematician or an economist. All it takes is patience and a clear vision. Nevertheless, it is crucial to be patient and follow the market's movements as closely as possible. The best Forex traders are observant and take note of market signals. They also keep a close eye on their trading accounts.
It is important to have thick skin and learn to deal with losses. No forex trader is immune to losses. While all traders will have to deal with loss, it is important to remain calm and rationale. Attempting to predict the market can lead to greater losses and frustration. In other words, forex traders should not try to predict the market. Instead, they should focus on the changes that happen in the market and trade according to them.Top Traded Forex Pairs
Does Forex.com trade Bitcoin? It is a logical question to ask as the cryptocurrency is growing in popularity and is widely used in the global financial market. Many brokers offer this service, and the best ones will be able to provide you with excellent customer support and award-winning trading platforms. Some of them even have 24-hour live chat support. If you're interested in learning about Bitcoin trading, keep reading to find out what makes them stand out from the rest.
Unlike other brokers, a broker that does not follow the rules of the FSA can charge you much more than Coinbase. Regardless of your reason for using a Forex broker, a regulated broker will give you a competitive advantage over the competition. The spreads on these platforms are also extremely low compared to the ones offered by Coinbase. Then, you can trade with a minimum of EUR100.
The main reason why the cryptocurrency has become so popular is that the barrier to entry is low. The currency is traded on several exchanges around the world, and there's no national or regional restriction for traders or brokers. As such, you can trade with brokers in South Africa or the United Kingdom and benefit from very low trading costs. However, you should be aware of the possibility of loss if you're unfamiliar with the markets.
In order to benefit from the benefits of bitcoin, you'll need to make sure you choose a legitimate and regulated company. Look for a firm that accepts small deposits and offers promotions. This way, you won't have to worry about hefty brokerage fees. You'll never have to worry about your funds being frozen as you wait for the perfect opportunity to trade in the virtual currency. And because of its low fees, the process of depositing and withdrawing your profits is very easy.
While there's no regulation for trading in bitcoin, it's possible to trade with a bitcoin broker in your own country. But, the risks associated with bitcoin trading are significant and may prevent you from withdrawing your profits. In the United States, the majority of currency exchanges offer these services. Ava Trade is a well-established company in the U.S. and is regulated in six jurisdictions. Its platform offers short and long positions, and it accepts many different payment methods.
As far as regulation goes, the forex market has been regulated since 2009. However, it's not yet widely used in retail markets. There are a few unregulated brokers, but most regulated companies are in the US and Europe. These brokers offer a wide range of products, including a PAMM service. It has been around for nine years, and is a good choice for those who want to trade Bitcoin.Why Trade Forex Instead of Stocks?
While many traders swear by the benefits of using an auto trader for forex, there are also some drawbacks to be aware of. Although these robots are usually highly profitable, the market is constantly changing and a profitable system may not be so profitable in the future. While most auto trading systems make use of technical analysis, this approach can break down at times when the currency market is rapidly adjusting. The bottom line is that an auto trader for forex is not a replacement for an experienced forex trader.
An auto trader for forex can be both a good and bad investment. Using a robot will help you manage your risks while you take care of other tasks, such as analyzing the market. It will also open and close trades automatically and analyze trends. Using a forex auto trader can graduate you from a gambler to an investor who makes six figures a month. While it is not possible to fully replace your expertise in the field of forex, an auto trader will save you a lot of time and effort.
A forex auto trader relies on software to make decisions for you. It can analyze the market, make trades, and manage risks without human supervision. You can learn a lot from other traders' experiences and backtest a program to find a system that is right for you. Often, auto traders can even graduate you from a mere gambler to an investor earning six figures a month. The software works by making the decisions for you, so you can focus on other tasks.
Before purchasing an auto trader, it's important to understand what your trading needs are. Some of the best automated trading programs offer a variety of features and capabilities, so it's important to determine what you need in your auto trader before investing. To make the best decision, consider the size of your trading account, what the risk level is, and whether you can afford it. A proper cost-benefit analysis and projected return on capital are essential to finding the right program.
There are several advantages to using an auto trader for forex. The main benefit is that it can handle risk for you. If you're busy and can't monitor your account, you can let the robot do the work for you. Moreover, you can use your laptop or mobile device to monitor your account and avoid risky transactions with auto trader for forex. It's also beneficial to keep in mind that auto traders can be expensive.
If you're interested in using an auto trader for forex, read reviews written by other traders who've used it. Not only are the reviews written by other traders honest, they're also true. While some of these reviews are written by the software developers, there are also plenty of fakes that are simply written by people who have no experience with auto traders. You should read the reviews to be sure of what to look for and avoid.How to Avoid Auto Trader Forex Futures Scams | <urn:uuid:1559ad5d-e589-455e-a878-b8df34815c6f> | CC-MAIN-2022-33 | http://www.zithromax-buyazithromycin.com/658 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00077.warc.gz | en | 0.965533 | 1,720 | 1.742188 | 2 |
Photo by Dallas Museum of Art
A lover of the arts but remembered only for the tragedy that befell him, President John F. Kennedy surrounded himself with beautiful artwork and those works will now go on display in Houston. Dubbed “Hotel Texas: An Art Exhibition for the President and Mrs. John F. Kennedy,” the exhibition will display a collection of works from the 1963 Presidential Suite.
No one standing in the Dallas Museum of Art on Wednesday morning felt the pain of President John F. Kennedy’s assassination more than Mark M. Connally.
As he told members of the news media gathered for the preview showing of “Hotel Texas: An Art Exhibition for the President and Mrs. John F. Kennedy,” his own father, the late John B. Connally, then in his first year as governor of Texas, was “gravely wounded” by the gunfire that killed the president.
Mark’s mother, the late Nellie Connally, was riding in the motorcade that carried her husband, President Kennedy and First Lady Jacqueline Bouvier Kennedy.
Read More on artsblog.dallasnews.com | <urn:uuid:0f7c84f4-ae1a-4d75-af9a-7a4403113ae4> | CC-MAIN-2017-04 | http://www.justluxe.com/travel/travel-guide-article.php?cid=1927432 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00327-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953625 | 240 | 1.835938 | 2 |
|The operation of a digital SLR is been going through quite a change lately. With the arrival of large LCD monitors and Live View, the monitor is bound to start playing a much bigger role. The small displays on top of Canon cameras seem to disappear, also due to the more compact size of the cameras. And since the new monitors are at least 3 inches in size, a wealth of information can be displayed in order to make the user interface even more graphical, just as is the case with the Canon EOS 500D. A small disadvantage is the increased energy consumption, since the monitor will be activated a lot more often. |
|Different monitor colors
The layout of the monitor's reproduction has been changed slightly. Additionally, four different colors can be selected through the Settings mode. It is not only a case of being trendy; changing the monitor's color may also prove handy in situations with scarce light. A lower contrast display is sometimes easier to read. The way of activating the quick menu is also convenient. Pressing the SET button activates the quick menu and the arrow keys let you scroll through the various settings. By pressing the SET button once more, adjustments can be made.
Live View function on the Canon EOS 500D
The speed and ease of navigation are remarkable and are extremely user-friendly. The large monitor provides a beautiful and, especially, a clearly readable reproduction, and in combination with Live View, this makes the life of a photographer considerably more pleasant. Naturally, there are some comments to be made; in particular when it comes to the speed of focusing in Live View, however, for now, the advantages are plenty.
|Canon EOS 500D exposure programs
The Canon EOS 500D DSLR has a lot of functionality to offer. Whether it is simple auto programs or enhanced creative settings; the Canon 500D has it all. Exposure programs such as Program, Aperture and Shutter priority and full Manual exposure are naturally also available. In addition, the Canon 500D features several preset scenes, (Image Zone) such as Portrait, Scenery, Close-up, Macro, Sports etc. These programs come in particularly handy to those who know how to make a composition and how the result should come out, but at the same time still lack the experience of setting the correct parameters.
Canon EOS 500D SLR camera settings
If you're ready to leave the auto program of the Canon EOS 500D, you will enter a world full of functions. Nearly every exposure, whether it has to do with white balance, ISO, exposure compensation, editing an image, color parameters etc., can be changed at wish. If you start working with these, you may call yourself an enhanced photographer. In practice, you may not even bother to use them, however, while the intelligent parameters and programs of the Canon 500D deliver such high quality that it is more than likely to satisfy most people. | <urn:uuid:f6d726d9-addc-4270-b7e7-7adedd86738f> | CC-MAIN-2017-04 | http://www.letsgodigital.org/en/camera/review/205/page_3.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00144-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.938213 | 596 | 1.539063 | 2 |
In the Garden:
Here are the remaining leeks in my garden ready for harvest.
I'm a selective allium fan. I like garlic but don't like onions. However, there is one onion-family crop I have grown to love. Leeks are easy to grow, milder-flavored than onions, and mature in November and even December when the rest of the vegetable world is slowing down.
Leeks I Have Known
Unlike garlic and onions, whose bulbs we eat, leeks are grown for their leaves. Actually, it's the stalk of the leeks that has the mild flavor and creamy, tender consistency that cooks crave. Leeks need a long season to mature, so I start my transplants indoors 8 to 10 weeks before the last frost date in spring. I like the 'King Richard' variety for its small size and delicate flavor. But for a real hardy winter plant, I also grow 'Winter Giant', which can withstand 20F temperatures.
Leeks grow best in a well-drained soil amended with compost. I plant my transplants in 6- to 8-inch-deep trenches, and as they grow, I fill in the trench with soil as they grow. I also hill up the soil around the stalks a month or so after they're transplanted to help keep the stalk white and, therefore, more tender.
I add a supplemental complete organic fertilizer such as 5-3-3 a month after transplanting to keep the leaves and stalks growing strong and keep them weeded early in the season.
Leeks? What Leeks?
Then I forget about them. Leeks will just slowly grow as the lettuce, peas, tomatoes, cucumbers, squash, and almost all the other vegetables come and go. Finally, when cool weather sets in, I remember the leeks, which now have grown 1 to 2 feet tall, with strapping blue-green leaves, standing tall like soldiers.
With the cool fall temperatures, the flavor of leeks becomes mild, and they are great sauteed with butter as a stand-alone vegetable dish or added to soups and stir-fries. They give a hint of onion flavor, with a soft, melt-in-your-mouth texture. Just be sure to clean the stalks well, because soil tends to lodge between the sheaths of the leaves and can give your soft leeks a gritty texture.
Care to share your gardening thoughts, insights, triumphs, or disappointments with your fellow gardening enthusiasts? Join the lively discussions on our FaceBook page and receive free daily tips! | <urn:uuid:bfd037e5-ca43-4fe1-87dc-b65419970b89> | CC-MAIN-2017-04 | https://garden.org/regional/report/arch/inmygarden/967 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00535-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946965 | 533 | 1.960938 | 2 |
(CNN) – The State Department is unable to provide a complete list and accounting of gifts presented to former President Donald Trump, former Vice President Mike Pence and other officials during the final year of the Trump administration, according to a report published in the Federal Register.
The State Department’s Office of Protocol said the Executive Office of the President did not send the department information about gifts received by Trump and others from foreign officials in 2020, according to the report.
The department has made attempts to collect the missing information from the National Archives and Records Administration and the General Services Administration, but has been told that “potentially relevant records are not available” to the protocol office “under applicable access rules for retired records,” the report says.
A footnote in the report does say that the lack of information available is complicated by the timing of the request from the State Department. It notes that the “Office of the Chief of Protocol did not submit the request for data to all reporting agencies prior to January 20, 2021 (at which time there was a change in administrations).”
A subsequent footnote in the report, though, does note a “lack of accurate recordkeeping pertaining to diplomatic gifts maintained by the Office of the Chief of Protocol’s Gift Unit” between January 20, 2017, after Trump took office, and through the end of his term in January 2021.
CNN has reached out to spokespersons for Trump.
The Associated Press first reported on the findings of the report.
The report comes as the US Justice Department has begun investigating the handling of 15 boxes of White House records, including classified information, which were taken to Trump’s Mar-a-Lago resort after he left office. | <urn:uuid:04047363-d410-4fe2-bfa4-f08e7d741716> | CC-MAIN-2022-33 | https://www.egyptindependent.com/state-department-unable-to-provide-full-account-of-foreign-gifts-given-to-trump-and-officials/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00074.warc.gz | en | 0.978165 | 355 | 1.640625 | 2 |
After numerous unsuccessful attempts to kill Superman in Metropolis, Lex traveled to Gotham in hopes of checking out the local super villain talent to see if any of them were a match for The Man Of Steel.
Lex Luthor controlled Superman using Poison Ivy’s plant spores and built a massive army of robots to control the worlds weapon’s systems but was eventually defeated when Batman managed to counter act Luthor’s control over Superman. After that,the World’s Finest Superheroes finally apprehended him.
- This version of the character is exclusive to the continuity of the television series The Batman and is an adaptation of Luthor. The original character was created by Jerry Siegel and Joe Shuster and first appeared in Action Comics #23.
- Luthor was voiced by Clancy Brown.
- 2 Appearances of Lex Luthor (The Batman)
- 1 Images featuring Lex Luthor (The Batman)
- 1 Quotations by or about Lex Luthor (The Batman)
- Character Gallery: Lex Luthor (The Batman)
|Superman Villain(s) |
This character is or was primarily an enemy of Superman in any of his various incarnations, or members of the Superman Family. This template will categorize articles that include it into the "Superman Villains category."
|Batman Villain(s) from the 2004 series |
This character, team or organization, was primarily an enemy of the Batman in either the 2004 television show The Batman. This template will categorize articles that include it into the "The Batman (TV Series) Villains category." | <urn:uuid:ed497109-51e3-4b95-891d-42abe5bfb229> | CC-MAIN-2017-04 | http://dc.wikia.com/wiki/Lex_Luthor_(The_Batman) | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00215-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.942156 | 322 | 1.5625 | 2 |
Cost segregation studies may help you realize significant tax savings by carving out shorter-lived assets that are normally embedded in a building's construction or acquisition cost.
Traditionally, businesses depreciate the costs of physical property, including buildings and associated costs over the course of decades. Recently the IRS began to allow taxpayers to recoup depreciation deductions that were understated in prior years. Now, businesses can take advantage of over 80 prior IRS revenue rulings and court cases not only to accelerate depreciation of certain assets, but also to recapture unclaimed depreciation deductions. In both instances, substantial tax savings could result.
Through a process called cost segregation, a business separates and reclassifies costs of certain business property from the buildings in which property is located.
Uncovering tax savings can be an excellent way for organizations to improve cash flow. However, with so much riding on accurately assessing what property can and cannot be reclassified, it is critical to work with experts. Beach Freeman Lim & Cleland work closely with the top appraisal and engineering firms to bring you the best options iin cost segregation. | <urn:uuid:1ea2ffc9-fc58-44ea-b079-b70d362b8238> | CC-MAIN-2022-33 | https://bflc.com/cost-segregation.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00274.warc.gz | en | 0.961187 | 220 | 1.523438 | 2 |
Windows 95, 98
The ECHO PDA from Oregon Scientific
is a REX-like device. As a PC card sized PDA, the REX
became popular in 1997. An updated version named the REX
Pro was released a year or so later. There have been subsequent other
upgrades with the REX 6000 by Xircom being the
latest. These very small PDAs can actually be inserted into the PC Card slot of
a notebook computer to sync or transfer data.
The ECHO PDA while similar in looks to the REX series, can not be inserted
into a PC Card slot. It does however have a touch screen like the latest REX
LCD: Gray Scale
Powered by: two CR2025 3V lithium cell batteries (included)
Size: 3.34 x 2.13 x 0.25 in
Size-wise the ECHO is great. You can stick this thing in your pocket (don’t
sit on it though), or your purse and you’ll pretty much forget that it is there.
The front and back of the device are made of metal with the middle being
plastic. It feels very sturdy. I tried the to twist the unit to see how flexible
that it was, and it didn’t budge.
The screen takes up most of the front real estate. The ECHO uses a mono LCD
that isn’t the easiest on the eyes. There’s no comparison between this display
and that of REX PDAs or even the older Palm Pilots for that matter. The ECHO
screen has a major glare problem. I found it very hard to read in different
lighting conditions… especially low light. Unfortunately it does not have a
The screen is a touch screen also. The ECHO does not have any type of
handwriting recognition, but you can tap the screen with the included stylus to
navigate and use the onscreen menus / keyboard. The sensitivity of the screen
isn’t very good. I found myself tapping more than 1 time to get the desired menu
item or letter to appear. This can become very annoying…
The left side of the ECHO has a small rubber cover that hides the sync port.
You remove this cover and then insert the ECHO into the included serial docking
cradle. When the ECHO is inserted correctly, a small LED glows green on the
cradle. I had quite a bit of trouble with the cradle and syncing the ECHO with a
PC. I don’t think the connection between my PDA and the cradle was very
reliable. The LED indicator when go on and off or would glow dim. However,
adjusting the position of the PDA in the cradle would most often fix the
problem…. until it occurred again.
The right side has two coin cell battery compartments. The lithium batteries
are included with the ECHO. I’m not sure how long they are rated to last in the
PDA before replacement. I have had the ECHO for several months and am still on
the first set of batteries.
The back of the unit has a reset switch which requires a paperclip or other
pointy object to activate.
The main interface of the ECHO is thru the screen. There are no buttons on
the device. There is however a button bar on the left side of the screen. These
buttons can be pressed with the stylus and allow you to turn the unit on/off,
bring up the main menu, escape menus, scroll, delete, edit and press return in
All data input is done thru an onscreen keyboard. Entering data this way is
VERY tedious. You are much better off entering data thru the desktop
The desktop application reminds me of an old Windows 3.1 application.
Although the documentation on the packaging says that the ECHO syncing software
syncs with Outlook, Act!, Goldmine, Lotus Organizer and Schedule+, you actually
have to import comma separated files from those programs into the ECHO desktop
program. It’s clumsy and requires you to map fields that you want to sync. I
wasn’t successful in syncing my Outlook data to the ECHO and finally gave up
after the several tries. The included manual does not give you any instruction
for importing data.
Now let’s take a look at each of the built-in applications.
This is the application where you keep names, addresses and phone numbers. You
are allowed 3 categories with which to sort the contacts: Business, Friends, and
Others. There is also the All category where all the names will be listed.
When you create a new contact, you can enter the following information for
each person: Name, Telephone Number, Home Address, Company Name, Company
Telephone Number, Company Address, Company Fax Number, Email Address, Mobile
Phone Number, Job Title, Birthday and Remark.
Because the screen on the ECHO is so small, the list view of the Phonebook
can only show part of the name and part of the phone number. You can’t change
anything with the view. I think there should be an option to just show the name.
The list view is sorted by name, But the problem is that it is sorted by the
first name instead of last name. So, if you want the names sorted by last name,
you need to input the names last name first. I think this is a major gotcha with
This is just a small memo type application. The thing that makes it pretty much
useless is the fact that each memo can only be 100 characters total. And just so
you know, 100 characters is about the length of the previous sentence. One
annoying fact is that you can add larger memos to the desktop application, but
it will tell you that they won’t sync to the ECHO if they are longer than 100
chars. The thing is that they DO sync the first 100 chars and then you get an
The Calendar application allows you to look keep track of your appointments.
There are two views, the full month view and the daily schedule view. The full
month view shows the current month with those days that you have appointments,
underlined. You can then tap on a date and see that day’s schedule.
You can also set alarms to go off to remind you of an appointment. The alarm
sound is very soft and hard to hear unless the ECHO is taped to the side of your
head. So if you have it in your pocket, don’t count on noticing the beeping. You
also can not set the alarm time to go off a few minutes before the actual
appointment, it will go off at the start time of the appointment.
3 different calculators; basic, metric conversion, and currency conversion are
included on the ECHO.
This is a simple time application that shows an analog clock with a moving hour,
minute and second hand. You can choose your home city from a list of 100 cities.
Unfortunately, you can’t add your own city to the list, you have to pick the one
nearest you. A small button lets you toggle Daylight Savings time on and off.
This application also allows you to set a daily alarm.
This application lets you collect website addresses. Why you’d want to do this
is really beyond me… It’s not like you can do anything the info except look at
it. The info is also stored in the desktop application which also doesn’t let
you do anything with it. I could see it being minimally useful if you could at
least click on the URLs in the desktop app and have it launch a browser with
You have to initiate this application in order to sync with the desktop.
With this app, you can turn the key tone on/off, change the time format, date
format, screen contrast, password and delete records.
Bottom line, the ECHO is too expensive for what it can do. Sure, it’s small
and easy to carry… But it is slow, hard to see, has a lousy user interface and
is not that powerful. For about $30 more, a person would be much better off
buying a Palm m100 instead. Or, if money is a
real issue, I think a much cheaper pocket databank type PDA would be a better
choice than the ECHO.
Less than friendly user interface | <urn:uuid:6c3c7afe-f8f8-472d-aec0-662a85d984e5> | CC-MAIN-2022-33 | https://the-gadgeteer.com/2001/04/20/oregon_scientific_echo_pda_pda_293_review/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00469.warc.gz | en | 0.92047 | 1,904 | 1.875 | 2 |
“From Angola we take with us a close friendship that unites us with this heroic nation, the gratitude of its people and the remains of the dear brothers killed in the line of duty,” Army General Raúl Castro stated back in 1976, summing up the contribution of the Cuban people in the definitive liberation of the African country.
The proclamation of Angola’s independence on November 11, 1975, by the forces of the People’s Movement for the Liberation of Angola, led by Agostinho Neto, opened the way not only to the building of a new Angola, but also to external threats, such as that from South Africa’s apartheid regime, which wished to expand across the continent.
In response to a request from Neto, thousands of Cuban soldiers and civilian collaborators crossed the Atlantic, committed to assisting their Angolan brothers and sisters in a struggle that had plunged the country into a serious crisis.
A ceremony presided by the President of the Councils of State and Ministers, Raúl Castro, was held on Wednesday, November 11, in Havana, to mark the 40th anniversary of Angola’s independence and Cuba’s contribution.
We witnessed the birth of a free and independent state, each battle was a lesson that cemented the faith in victory, expressed Army Corps General Álvaro López Miera, a member of the Politburo and first deputy minister of the FAR, during his speech at the event.
He went on to stress the heroic resistance of the Angolan people and the strategic vision of the leader of the Revolution, Fidel Castro.
Cuba is filled with joy at seeing Angola celebrating four decades of independence, López Miera, also chief of the Army General Staff, stated, while noting that the cooperation of the island in the African nation continues today, in areas such as health, sports and civil construction.
Thanks to the “Yes, I can” Cuban literacy method, over a million Angolans have learned to read and write; through Operation Miracle more than 34,000 have been operated on; and 7,500 young Angolans have graduated in Cuba, he added.
Angolan Minister of Former Combatants and Homeland Veterans, General Candido Van-Dunem, attended the ceremony on behalf of Angolan President José Eduardo dos Santos. During his speech, he expressed the gratitude of the Angolan people to Cuba and noted the strong bilateral ties between the two nations.
The date is a matter of pride but also of reflection on the long and glorious struggle up until today, the Angolan General added, noting that both countries continue to be united by the ideals and the blood shed by their people.
An emotive moment was the posthumous presentation by the Cuban President of the title of Hero of the Republic of Cuba and the Máximo Gómez Order, First Degree, to the daughters of Brigadier General Raúl Díaz-Argüelles and Victor Schueg Colás.
These decorations were also awarded to Major General Carlos Fernández Rondín, minister of the Interior, following a proposal from the State Council.
In turn, the head of the Political Directorate of the Interior Ministry, Major General Romárico Sotomayor, received the title of Hero of the Republic of Cuba and the Order of Playa Girón. | <urn:uuid:d8b22186-8d4c-4902-97a3-906bc38c8302> | CC-MAIN-2017-04 | http://en.cubadebate.cu/news/2015/11/12/angolas-independence-struggle-commemorated-cuba/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00220-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954142 | 697 | 2.296875 | 2 |
As the American people prepare to honor those who died at the hands of radical Islamic terrorists on the 9-11 Tenth Anniversary, Rep. Mike Rogers (R-MI), chairman of the House Intelligence Committee warned that the U.S. must make certain Libya dictator Moamar Khadhafi's stockpiles of weapons don't end up in the hands of terrorist organizations such as al-Qaeda.
Rogers appeared on the CNN news with Sen. Joe Lieberman (I-CT), the chairman of the Senate Homeland Security Committee.
"And I'm not talking about boots on the ground or big military. We need to use our special capabilities that really only the United States has to secure, account for those weapons and render them safe. And we need to do it now," he added.
"I will tell you al Qaeda and other terrorist organizations identified by the State are very interested in getting their hands on those missile systems, other weapons, even the chemical stockpile precursors," cautioned Rogers.
Lieberman added that the U.S. officials are working with the Libyan rebels to make certain the weapons stockpiles are secured. "We're working with them to try to secure both the mustard gas and the munitions that I worry would fall otherwise in the hand of enemies of the U.S., including terrorists," Lieberman said.
Rogers also said Libya's transition government needed to avoid the same kind of mistakes that were made in Iraq after the fall of Saddam Hussein: mistakes such as dismissing all of their military and their intelligence apparatus. They need to co-opt some of that in the next few weeks, Rogers stated.
The lawmakers also claims federal government made much progress in fighting terrorism and said that Americans are "safer" a decade after the attacks on September 11, 2001.
"I believe we are safer, but there are still plenty of folks that get up every single morning with the sole intention of planning, conducting, financing an operation against the United States of America," said Rogers.
"I don't think anybody on September 12, 2001, would have predicted in the following ten years there would not be another major terrorist attack on the homeland, and there has not been," he added. "We're still in a war … tragically it's going to go on for a while, but we are a lot safer."
He's former chief at a New York City housing project in Washington Heights nicknamed "Crack City" by reporters covering the drug war in the 1980s. In addition, he served as director of public safety at a New Jersey university and director of security for several major organizations. He's also served on the National Drug Task Force and trained police and security officers throughout the country. Kouri writes for many police and security magazines including Chief of Police, Police Times, The Narc Officer and others. He's a news writer and columnist for AmericanDaily.Com, MensNewsDaily.Com, MichNews.Com, and he's syndicated by AXcessNews.Com. Kouri appears regularly as on-air commentator for over 100 TV and radio news and talk shows including Fox News Channel, Oprah, McLaughlin Report, CNN Headline News, MTV, etc. | <urn:uuid:b7fb866a-48b6-4d3f-9f10-01ce145418aa> | CC-MAIN-2016-44 | http://worth-reading-blog.blogspot.com/2011/09/al-qaeda-may-capture-khadhafis-weapons.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00045-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.977875 | 645 | 1.671875 | 2 |
Public debt and financial development: A theoretical exploration
In countries where the government is the major recipient of bank lending, public debt is likely to harm financial development. Moreover, the lower the financial depth, the greater the adverse effects of public borrowing on financial development and macroeconomic outcomes.
If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- King, Robert G. & Levine, Ross, 1993. "Finance, entrepreneurship and growth: Theory and evidence," Journal of Monetary Economics, Elsevier, vol. 32(3), pages 513-542, December.
- F. Giavazzi & M. Pagano, 1990.
"Can Severe Fiscal Contractions Be Expansionary? Tales of two Small Euopean Countries,"
89, Dipartimento Scienze Economiche, Universita' di Bologna.
- Francesco Giavazzi & Marco Pagano, 1990. "Can Severe Fiscal Contractions Be Expansionary? Tales of Two Small European Countries," NBER Chapters, in: NBER Macroeconomics Annual 1990, Volume 5, pages 75-122 National Bureau of Economic Research, Inc.
- Giavazzi, Francesco & Pagano, Marco, 1990. "Can Severe Fiscal Contractions Be Expansionary? Tales of Two Small European Countries," CEPR Discussion Papers 417, C.E.P.R. Discussion Papers.
- Francesco Giavazzi & Marco Pagano, 1990. "Can Severe Fiscal Contractions be Expansionary? Tales of Two Small European Countries," NBER Working Papers 3372, National Bureau of Economic Research, Inc.
- Ricardo J. Caballero & Arvind Krishnamurthy, 2004. "Fiscal Policy and Financial Depth," NBER Working Papers 10532, National Bureau of Economic Research, Inc.
- F. Gulcin Ozkan & Ahmet Kipici & Mustafa Ismihan, 2008.
"The Banking Sector, Government Bonds and Financial Intermediation: The Case of Emerging Market Countries,"
08/11, Department of Economics, University of York.
- F. Gulcin Ozkan & Ahmet Kipici & Mustafa Ismihan, 2010. "The Banking Sector, Government Bonds, and Financial Intermediation: The Case of Emerging Market Countries," Emerging Markets Finance and Trade, M.E. Sharpe, Inc., vol. 46(4), pages 55-70, January.
- F. Gulcin Ozkan & Ahmet Kipici & Mustafa Ismihan, 2010. "The Banking Sector, Government Bonds, and Financial Intermediation: The Case of Emerging Market Countries," Emerging Markets Finance and Trade, Taylor & Francis Journals, vol. 46(4), pages 55-70, January.
- Beetsma, Roel & Bovenberg, A Lans, 1995.
"Does Monetary Unification Lead to Excessive Debt Accumulation?,"
CEPR Discussion Papers
1299, C.E.P.R. Discussion Papers.
- Beetsma, Roel M. W. J. & Bovenberg, A. Lans, 1999. "Does monetary unification lead to excessive debt accumulation?," Journal of Public Economics, Elsevier, vol. 74(3), pages 299-325, December.
- Beetsma, R.M.W.J. & Bovenberg, A.L., 1995. "Does monetary unification lead to excessive debt accumulation," Discussion Paper 1995-112, Tilburg University, Center for Economic Research.
- Beetsma, R.M.W.J. & Bovenberg, A.L., 1995. "Does Monetary Unification Lead to Excessive Debt Accumulation?," DELTA Working Papers 95-23, DELTA (Ecole normale supérieure).
- Xavier Freixas & Jean-Charles Rochet, 1997. "Microeconomics of Banking," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262061937, December.
- Coccorese, Paolo, 2005. "Competition in markets with dominant firms: A note on the evidence from the Italian banking industry," Journal of Banking & Finance, Elsevier, vol. 29(5), pages 1083-1093, May.
- Ross Levine, 1997.
"Financial Development and Economic Growth: Views and Agenda,"
Journal of Economic Literature,
American Economic Association, vol. 35(2), pages 688-726, June.
- Levine, Ross, 1996. "Financial development and economic growth : views and agenda," Policy Research Working Paper Series 1678, The World Bank.
- Arvid Raknerud & Bjørn Helge Vatne & Ketil Rakkestad, 2011. "How do banks’ funding costs affect interest margins?," Working Paper 2011/09, Norges Bank.
- Ismihan, Mustafa & Gulcin Ozkan, F., 2004. "Does central bank independence lower inflation?," Economics Letters, Elsevier, vol. 84(3), pages 305-309, September.
- M. Shahe Emran & Subika Farazi, 2009. "Lazy Banks? Government Borrowing and Private Credit in Developing Countries," Working Papers 2009-09, The George Washington University, Institute for International Economic Policy.
- Hauner, David, 2008. "Credit to government and banking sector performance," Journal of Banking & Finance, Elsevier, vol. 32(8), pages 1499-1507, August.
- Hauner, David, 2009. "Public debt and financial development," Journal of Development Economics, Elsevier, vol. 88(1), pages 171-183, January.
- von Hagen, Jurgen & Strauch, Rolf R, 2001. "Fiscal Consolidations: Quality, Economic Conditions, and Success," Public Choice, Springer, vol. 109(3-4), pages 327-46, December.
When requesting a correction, please mention this item's handle: RePEc:eee:ecolet:v:115:y:2012:i:3:p:348-351. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Shamier, Wendy)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services. | <urn:uuid:bb9372e3-3133-4eba-9b34-e009c2bcb4c5> | CC-MAIN-2016-44 | https://ideas.repec.org/a/eee/ecolet/v115y2012i3p348-351.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00404-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.797846 | 1,672 | 2.0625 | 2 |
Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.
Emission reductions that qualify as emission credits may be achieved by a number of means, including but not limited to installation of control equipment, changes in process inputs, formulations, products, product mix, or raw materials, reductions in actual emission rates, reductions in operating hours, production curtailment, shutdown of emitting sources or facilities in certain circumstances, or any other enforceable method as approved by the department or adopted as a rule by the board.
The following methods are acceptable for calculating the quantity of emission reductions:
Note: AP-42 is the recommended source of air pollutant emission factors for both criteria and toxic emissions.
Modifications typically include the following: installation of control equipment; changes in process inputs, formulations, products, product mix, or raw materials; reductions in actual emission rates; and reductions in operating hours. To calculate the amount of emission reduction that can be quantified as an emission credit from a modification:
Reductions are calculated differently for production curtailment and shutdown of emitting sources or equipment. To calculate the amount of emission reduction that can be quantified as an emission credit from a curtailment:
Emission reductions from any regulated air pollutant for which the United States Environmental Protection Agency (U.S. EPA) has established a National Ambient Air Quality Standard may be registered in the Emission Credit Registry. The criteria air pollutants are carbon monoxide (CO), lead (Pb), particulate matter with a diameter less than 10 microns (PM10), particulate matter with a diameter less than 2.5 microns (PM 2.5)*, nitrogen oxides (NOX), ozone (O3), and sulfur dioxide (SO2). Since ozone is a secondary pollutant, emission reductions must be quantified with the precursor pollutants, volatile organic compounds (VOC) or nitrogen oxides (NOX).
Currently, Indiana has areas of nonattainment for NAAQS for 8-hour Ozone and Fine Particulate Matter (PM2.5).
* Until U.S. EPA adopts specific New Source Review rules for PM2.5 emissions, it has directed states to regulate PM10 emissions as surrogate for PM2.5 emissions; therefore, all PM reductions will be listed as PM10 in the Emission Credit Registry.
Hazardous air pollutants may only be registered as VOC or PM10 since the new source review rules do not include a provision for offsetting HAP emissions.
Sources must submit an application to list credits in the Emission Credit Registry. Data cannot be added to the Emission Credit Registry until the appropriate permits have been modified through the normal permit review process. The reduction becomes permanent when the source generating the emission credits receives its air permit. In most cases the source will need to obtain a permit modification to make the emissions reductions permanent. If the source will be adding one or more control devices to reduce emissions, a source modification is required. If the source does not have such a permit, it will need to apply to modify the current operating permit. Refer to the Air Permit Applications page for guidance and forms regarding submittal of air permit applications.
All information submitted to IDEM will be made available to the public unless it is submitted under a claim of confidentiality. Claim of confidentiality must be made at the time the information is submitted to IDEM, and must follow the requirements set out in 326 IAC 17.1-4-1 [PDF]. Failure to follow these requirements exactly will result in your confidential information becoming a public record, available for public inspection. To ensure that your information remains confidential, refer to the IDEM, OAQ information regarding submittal of confidential business information.
For more information on confidentiality for certain types of business information, please review Air-031-NPD regarding Emission Data (available on the IDEM Nonrule Policies page).
Upon receipt of a complete Emission Credit (EC) Registry application and issuance of the appropriate permit (or source) modification, IDEM will:
If all of the appropriate permitting approvals have been issued* and the application is complete, you can expect to receive a confirmation letter from IDEM regarding the registration or update to your amount of registered credits in 60 days. The information should be posted to the website shortly after issuance of the letter, usually within one week.
* Time periods for the approval of permit modifications (or source modifications) are established in 326 IAC 2, and may take up to 120 or 270 days, depending on the level of review required.
Sources may submit concurrent applications. For example, a source may wish to submit emissions reductions for inclusion in the Emission Credit Registry and at the same time apply to have a portion of those emission credits withdrawn from the Emission Credit Registry for internal use. Likewise, a source may have already agreed to sell a portion of the emission credits they are generating so the source using those credits may wish to submit the application to use the emission credits at the same time the generating source applies to have them added to the Emission Credit Registry. If a situation like this occurs, IDEM recommends that the application to use the emission credits reference the pending application to submit the emission reductions. Since the emission credits are not truly available until the modification creating the permanence of the emission reductions is issued, the permit action that results in withdrawal of the credits may need to be placed on hold until the first permit is issued.
At the present time, the registration of emission reductions that qualify as emission credits is limited to stationary point sources.
There is no deadline for registering emission credits; however, emission credits are no longer usable after they are 5 years old (plus time for construction).
The Emission Credit Registry was created on June 15, 2004. All emission reductions created on or after this date, and emission reductions generated up to five years prior to this date may be submitted for inclusion in the Emission Credit Registry. | <urn:uuid:a99ee18e-f2bb-45cb-9ece-535b52e102c9> | CC-MAIN-2017-04 | http://in.gov/idem/airquality/2502.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00129-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.917937 | 1,236 | 2.8125 | 3 |
Learn something new every day
More Info... by email
A scavenger hunt is a game in which participants try to find all the items or complete all the activities on a list. It can be played in teams or by individuals, and is often timed. The winner in a scavenger hunt is the person or team that first returns with a completed list.
Scavenger lists for hunts can be wide and varied, and often include challenges that need to be completed creatively. If a list asks for “a picture of a George Washington” for example, you might get around the requirement by photographing a United States one-dollar bill, which features the president. Usually, creative interpretations are highly appreciated in a scavenger hunt, as long as the submission comes with a convincing argument as to why it fits the description.
Making a lists for scavenger hunts can be a lot of fun. Consider theming all the items required around one idea, or including a mix of activities and items. Completion of activities needs to be proven by the team or individual in some way; if the task is to ride the local Ferris wheel, teams should have to provide a photo from the top. If the game will be played in teams, be sure to add items to the list that will require good teamwork in order to complete.
A scavenger hunt is often a feature of children’s parties, but it is also used by many workplaces as a team-building exercise. In addition to giving workers a chance to get out of the office and have some fun on the job, friendships and bonds can strengthen as a result, giving you a happier, more motivated workforce. The game can also be a good way to create bonds and teach lessons about creative thinking and teamwork to students. As a teaching tool and a team-building game, a scavenger hunt can truly enrich a work or learning environment.
Several groups take the game even further, competing in nation and international scavenger games. The University of Chicago Scavenger Hunt is held annually and attracts over 300 teams vying for fame. Items from the 2008 list includes a cartoon-animal balloon up to Macy’s Thanksgiving Day Parade standards and a bust of Abraham Lincoln constructed from pennies. This scavenger hunt is based on points, rather than fully-completed list, and some items have famously never been found.
A scavenger hunt can be a great way to have some fun while jump starting the creative brain. It can also be a wonderful way to introduce children to the concepts of riddles and thinking outside the box. Check local community activities to see if there are any nearby local hunts for you and your family and friends. Or organize one yourself for your neighborhood or office; coming up with the clues and lists can be as much fun as hunting for yourself!
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK! | <urn:uuid:31dd6669-7a3a-4a62-a1be-16743e5de7b2> | CC-MAIN-2017-04 | http://www.wisegeek.com/what-is-a-scavenger-hunt.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00069-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960678 | 621 | 2.859375 | 3 |
New technologies: turning barriers into opportunities
Patrick Charette launched his own business as a financial security advisor and a mutual fund dealer representative under the name Services Financiers Patrick Charette in January 2020. A few weeks later, Quebec went into lockdown and put all economic activity on hold. Without an established client base, it wasn’t easy for him to kick-start his career under these circumstances.
But Patrick didn’t give up. Instead, he rolled up his sleeves and got to work. “First, I started using Microsoft Teams videoconferencing to meet my clients. At first, people weren’t used to it, but by the second meeting, they felt more comfortable. Now, most say they like this approach because it’s more practical and saves time.”
But that’s not all. Patrick has created a website and a blog, and has been actively engaged on social networks, in particular Facebook and LinkedIn, so that more people can benefit from his expertise.
Share knowledge to make yourself known
As well as posting information daily on a range of financial health topics, Patrick answers questions from people who contact him through his Facebook or LinkedIn page. “I explain general aspects of financial services, and every two weeks, I offer a webinar on a variety of topics, such as critical illness insurance, disability insurance, RRSPs and TFSAs.”
Those interested can then call on his expertise if they so wish. Patrick’s office is in Saint-Jérôme, but he has clients from all over the province, and even in Nunavut! “In this difficult period full of uncertainty, people are keen to ask questions and review their financial situation,” says Patrick. “They need advice to help them make better choices. I’ve also found that they feel reassured when I contact them regularly to see how things are going.”
Patrick, a responsible investment specialist, says telework and the possibilities opened up by new technologies (paperless work, remote meetings, electronic signatures, etc.) are in line with his values. “It’s an opportunity to educate my clients about sustainable development,” he says. “I hope some things are here to stay.”
A 100% virtual approach
Philippe Vézina-Tardif, a financial security advisor, is also using social networks a lot. Philippe holds a finance degree from HEC Montréal and previously worked in a marketing agency. He joined ProAssurance as an associate one year ago and has developed a platform so the firm can offer services and information entirely online.
“With this platform, initial contact can be made through social networks,” explains Philippe. “For example, people seeking information about insurance products can click our ad on Facebook or Google. This will bring them to our website where, if they wish, they can complete a form, indicating their needs.”
An advisor will then contact them to provide an overview of what we can do for them.
“Due to the current crisis, we’ve received a lot of requests from people looking for information as well as firms wanting to create a platform so they can offer this type of service,” he says. Philippe thinks that a virtual approach has a lot of advantages for professionals starting out in their career.
Same level of professionalism
It’s true that social networks provide access to a wide audience, but it’s important not to overlook ethical requirements. The CSF would like to point out that representatives must, at all times, conduct their activities with competence, integrity and professionalism, and need to be even more vigilant when using websites and social media.
It’s important to act with the same level of professionalism as in face-to-face, phone and written interactions with clients. Be sure to provide content that is educational rather than promotional: content that is valuable, informative, clear and accessible to the public. And remember to provide sources and references to support your content. The aim is to earn people’s respect and trust, with a view to maintaining the image and credibility of the profession. | <urn:uuid:f3d52cf5-2109-4cd3-9305-ba2b1eef0e5e> | CC-MAIN-2022-33 | https://www.chambresf.com/en/news/articles/new-technologies-turning-barriers-opportunities | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00270.warc.gz | en | 0.963992 | 866 | 1.5 | 2 |
2 Answers | Add Yours
In my mind, one of the fundamental statement of conflict rests with Hannah in the outset of the story. From being a typical adolescent teen that is concerned with social avenues and "blending in," she must wrestle with her own identity of being Jewish. How she is able to address both becomes one of the first conflicts we see. The disdain which she possesses for the Seder traditions on the High Holy Days is quite evident and her internal dilemma between what she initially wants to do against what she is supposed to do represents one conflict. The second conflict is her attempt to stay alive as she feels the realities of life of being Jewish at the time of the Nazis. In this conflict, she no longer can deny her identity as being Jewish, and the condition of survival constitutes a conflict between what her own desires are and the societal demands of the time.
In the book The Devil's Arithmetic, Hannah opens a door and finds herself suddenly sent back in time to a polish village where the Nazis have arrived. On the day of a cousin's wedding the soldiers come and load them into trucks and take them to the trains and send them to concentration camps.
The first conflict with the Nazis occurred on page 65 when the rabbi was told that they would have to accompany the soldiers.
"He spoke gently.”They insist that we go with them in those trucks."(65)
Another conflict occurs when they are all ordered to undress for the showers. Hannah knows about the showers sometimes being gas showers instead of ones to wash in. She becomes afraid when they are told to take all of their clothing off. She stars talking about the showers.
"Now, all of you undress. Schnell!"(90) a guards words.
We’ve answered 319,199 questions. We can answer yours, too.Ask a question | <urn:uuid:9582aa55-005e-4c1b-ba05-a1a5c77828a7> | CC-MAIN-2017-04 | https://www.enotes.com/homework-help/what-two-statements-conflict-story-162065 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00330-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.979409 | 379 | 2.90625 | 3 |
German insurers are set to pay out €7 billion, which is approximately $9.6 billion, as a result of the weather catastrophes which struck the region in 2013, which the Association of German Insurers (GDV) has termed an exceptional year.
“The accumulation of various weather extremes within a few months made 2013 an exceptional year,” commented Alexander Erdland, President of the General Association of German Insurers (GDV).
Insurers responded to more than 2 million claims in just a few months, which Erdland called a ‘gigantic task’, but one which insurers responded to well and the majority of claims are already settled.
€5.5 billion ($7.5 billion) of the claims paid relate to property insurance, with €1.8 billion from the June flooding, €3.1 billion from hailstorms from summer to early autumn, between €300m and €400m from European windstorm Christian in October and between €100m and €200m from European windstorm Xaver in December.
Another €1.5 billion (over $2 billion) is attributed to motor claims from the June floods, hailstorms and European windstorms.
The GDV said that 2013 was not an exception and that comparable years of losses have been seen in the past. The last comparable years were in 1990 and in 2002. However losses are expected to rise as frequency of catastrophic weather events increases, with storm and hail damage expected to increase by 50% to 60% by 2050.
Germany has suffered not far off one-quarter of the global insured natural disaster losses based on these figures and Swiss Re’s early estimate of the annual total for 2013. That is quite unusual but shows the importance of the reinsurance market to German insurers.
It’s no surprise that at least one collateralized reinsurance and ILS fund suffered some losses from the German events this year, according to our sources. The hail events in particular caused a small loss on one exposed fund which had participated in a major German insurers reinsurance program in 2013.
With ILS and collateralized reinsurance funds expected to grow their involvement in European markets, in fact renewal commentary said that this was noticed during the January reinsurance renewals, we should expect to see more losses trickling into the ILS market from natural catastrophe and weather events in Germany and other European nations in years to come.
Interestingly, these figures from the German insurance association appear at odds with early estimates of natural catastrophe insured losses from reinsurers Swiss Re and Munich Re. The figures from the GDV would suggest that both reinsurance firms early estimates of 2013 natural catastrophe losses, $31 billion globally according to Munich Re and $38 billion of global losses from Swiss Re, look a little on the light side.
Subscribe for free and receive weekly Artemis email updates
Sign up for our regular free email newsletter and ensure you never miss any of the news from Artemis. | <urn:uuid:0a70f319-4a14-4749-b795-96f94ba207c8> | CC-MAIN-2017-04 | http://www.artemis.bm/blog/2014/01/10/insured-losses-from-2013-german-catastrophes-near-9-6-billion/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00412-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968033 | 607 | 1.78125 | 2 |
Canada: Forecasters Need $100 Million Overhaulgreenspun.com : LUSENET : Grassroots Information Coordination Center (GICC) : One Thread
Forecasters need $100M overhaul
Environment Canada wants to update all its weather systems
Kate Jaimet The Ottawa Citizen
Canada's weather forecasters need more than $100 million in new equipment to keep the country's meteorological service running, Environment Minister David Anderson says.
"We're talking scores of millions of dollars. Well over $100 million," Mr. Anderson said. "If we don't get the equipment we need in the relatively near future, we will have to run the risk of declining services."
The meteorological service has a technological infrastructure worth $375 million, but much of the equipment is so old that it is beyond the manufacturer's recommended lifespan. Environment Canada wants to update everything from computer systems to weather observation stations over the next three to five years.
"We need to have a refinancing and re-equipping," Mr. Anderson said.
High on the environment minister's wish list are 18 $2.5-million Doppler radars to detect tornados and severe storms. Environment Canada now operates 13 Doppler radars across the country, but wants a total of 31 to cover the areas where 95 per cent of Canada's population lives.
Conventional radars can pinpoint the location of storm clouds and rain, but only Doppler radars can identify movement within the storm clouds, detecting the swirling air currents that mark a tornado.
In 1994, a conventional radar failed to detect a tornado that touched down in Aylmer, Que., injuring 25 people and damaging 330 homes. Environment Canada later estimated that a Doppler radar could have warned of the tornado 15 to 20 minutes before it touched down.
"The tornado forecasting (is) particularly important on a straight safety basis," Mr. Anderson said. "You can't do that without improved equipment."
Environment Canada's meteorologists are also worried about the 440 weather observation stations across the country that measure such basic information as air pressure, wind, precipitation and visibility. These stations are the backbone of the meteorological service, providing data for daily weather forecasts and airport weather information.
But 60 of those stations are more than 20 years old, while another 100 to 200 will be obsolete within the next two years, Environment Canada estimates.
The stations will cost between $50,000 and $300,000 each to replace.
Bringing those stations up-to-date is necessary to provide the weather forecasts that people and businesses rely on, Mr. Anderson said.
"Heating oil companies get predictions on a daily basis so they know whether to have (extra) people on staff tomorrow," he said.
"The same is true for FedEx and all these other courier services.
"They phone in to find out what rerouting has to be done," he said.
In the ocean, meteorologists rely on buoys to collect information on weather and sea conditions.
Worth $200,000 each, these buoys often need replacement as they are ripped from their moorings by ships or during storms.
In the High Arctic, the ministry needs millions of dollars to refurbish the Eureka weather station and its adjacent housing, some of which has not been upgraded since it was built in the 1960s.
That weather station is becoming more and more important as scientists study the first signs of global warming in the Arctic.
Elsewhere in Canada, the Environment Department wants to set up 30 to 50 air quality monitoring sites that will keep track of smog and air pollution.
These stations will range in cost from $50,000 for the most basic type of air quality testing to $400,000 for comprehensive pollution monitoring.
The air testing stations are necessary if the government wants to force industries to cut their emissions and enforce the smog-reduction agreement signed last fall between Canada and the United States, Mr. Anderson said.
Finally, the ministry is asking for a $15-million to $20-million computer upgrade, enabling meteorologists to process an ever-increasing amount of weather data using ever more sophisticated models.
It all adds up to a hefty weather bill. But Mr. Anderson is confident he can convince the federal cabinet to approve the money. "This is a service of government issue," he said. "This is what the Canadian people expect."
-- Rachel Gibson (firstname.lastname@example.org), January 07, 2001 | <urn:uuid:839a8e74-77cc-41b3-b70f-801a760f884b> | CC-MAIN-2022-33 | http://greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=004Mn6 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00270.warc.gz | en | 0.951162 | 935 | 1.765625 | 2 |
The conventional wisdom says that the United States is more divided than ever.
At least, that’s according to network number crunchers and political pundits armed with snazzy, interactive maps. They tell the perennially sad story of the United States’ deep divisions in distinct juxtapositions of red and blue. But the simple, mathematical fact is that these stark divides of party, race, gender and religion belie the obvious truth that the overwhelming majority of Americans are more united than ever.
They are united in a state of indebtedness to the tune of $11.86 trillion worth of mortgages, credit card bills, consumer debt and student loans.
A recent New York Times/CBS poll shows they are also united in their concerns over the widening gap between those at the top of the United States’ pyramid and them. Only 35 percent of Americans believe “anyone” regardless of their station in life can “get ahead” in the post-crash economy. A full 66 percent think wealth should be more evenly distributed, and another 57 percent believe government should do something about it.
This emerging consensus on inequality might have something to do with a stunning 36 percent drop in net household worth in just 10 years. No doubt it also accounts for their overwhelming support for big changes on a variety of economic issues – from expanding paid family leave to increasing the minimum wage to raising taxes on those earning $1 million or more per year.
Simply put, they want government action to preserve the American dream.
Yet, only 33 percent of Americans favored additional taxes on financial transactions. Strangely, Americans see the need for government intervention on a host of issues, but they prefer to keep financial markets unfettered by taxes. This is odd because there is a direct link between the relentless swirl of financial transactions, the unremitting financialization of the economy and the epic loss of wealth troubling a large majority of Americans. This is also why so many Americans live in states of indebtedness.
The Drawbacks of Financialization
So, what is “financialization,” anyway?
Financialization refers to the growing importance of financial institutions relative to industry, agriculture or other “hard” sectors of the economy. In other words, it is the relative value of the economy of “financial services” vis-à-vis the economy of actual “things.”
Financialization transforms squishy things like leverage, risk, debt, derivatives, insurance and, in the final analysis, financial speculation itself into tradable “financial instruments” they can buy, sell, repackage, hedge and short. In the case of the subprime mortgage market at the molten core of the financial crisis, think of an “exotic financial instrument” like a “credit default swap” as a way to place a new bet (by buying and selling exotic forms of insurance) on a growing pool of risky, existing bets placed by unfettered financial institutions on incredibly risky borrowers. In essence, it’s the commoditization of betting on multiple levels.
According to a 2013 article by two Harvard economists, this highly profitable version of the “service economy” rose from 2.8 percent of GDP in 1950 to 4.9 percent in 1980, and then grew to a stunning 8.3 percent of GDP on the eve of the crash of 2008. That’s when financial wizards were packaging subprime mortgages into securities (another tradable product), thus turning growing risk and potential liabilities into huge profits by selling them as assets. The beauty of this system is that regardless of the market’s vicissitudes or the viability of the exotic instrument, the financial institutions always collect their transaction fees.
Yet, most Americans surveyed are not interested in raising taxes on financial transactions.
Of course, that’s in spite of mounting evidence that a risk-embracing, debt-repacking, hyper-financialized economy overwhelmingly benefits “the few” at the cost of “the many.” And it ignores the inexorable link between Americans’ declining fortunes, their increasing household debt and the recurring pain of financially driven boom-and-bust cycles that disproportionately hit those who can least afford it.
Even worse, it might just be bad economics.
Too Much Finance
In a starkly worded report released on June 11, 2015, the Organization for Economic Cooperation and Development (OECD) determined that “too much finance may hamper economic growth and worsen income inequality.”
Well, is there “too much” finance?
The OECD tracked the 50-year spike in financialization and found that credit floated “by banks and other intermediaries to households and businesses has grown three times as fast as economic activity.”
Yes, three times.
Not coincidentally, that’s the ratio of all the debt in the world relative to the world’s total GDP. The McKinsey Global Institute found that total global debt hit a mindboggling $199 trillion in 2014. That’s up $57 trillion since the crash. Surprisingly, government debt only makes up $58 trillion of the $199 trillion. The rest is a mountain of interest-addled household, financial and corporate debt. And the grand total represents 286 percent of GDP, meaning all the world’s debts are nearly three times the size of the world’s economic output.
According to the OECD’s report, the size of a debt ratio really does matter.
In fact, for every 10 percent rise in bank-issued credit, financialized economies see a 0.3 percent decline in GDP growth. Additionally, the OECD regards the staggering rise in credit as a troubling “misallocation” of capital that “magnifies” the cost of “implicit guarantees” to too-big-to-fail banks. And it also “generates boom-bust cycles” that ultimately force taxpayers to pay out on those “implicit guarantees,” according to the report.
But wait, there’s more.
The report’s authors warn that further expansion of credit “is likely to slow rather than boost growth.”
Well, that certainly seems important.
According to the OECD, more credit equals less growth. It’s worth repeating because lackluster growth has bedeviled central bankers since the crash of 2008, even as the rising stock market has exceeded Wall Street’s loftiest dreams of avarice.
So, how are these two trends possible?
The OECD believes steadily increasing private sector credit not only “slows growth in most OECD countries,” but it also has the opposite effect on stock markets. In other words, there is a direct, inverse relationship between the rise of the financialized economy and the decline of something recognizable as a “real” economy of production and growth. Simply put, a growing flood of credit is decoupling the health of the “widget-making” economy from the ever more vigorous “deal-making” economy.
More troubling is that the deal-making economy is a self-reinforcing system. The recent trend in stock buybacks is a perfect example.
How Corporations Cook the Books
Companies with sagging profits and low “earnings per share” have found a novel way to spike their profitability. Instead of earning more profits, they just reduce the number of shares. To do this they’ve been buying back their own shares on the open market. This raises “earnings per share,” thus masking flat or declining profits. It’s an easy way to alter a basic market benchmark in quarterly reports.
But it is much more than that.
Much of the money for these buybacks doesn’t come from surplus cash from rising profits because their profits are not rising. With interest rates so darn low and Wall Street increasingly indifferent to fundamentals like profits, corporate book cookers are leveraging debt into the illusion of profitability. They just borrow the money, buy back their own stock and profit off the difference between the minuscule interest rate on the debt and the sudden rise in stock prices from the debt-fueled buyback.
This also means corporations and financiers are not leveraging the Federal Reserve’s policy of cheap money into “hard” investments in new, improved widget-factories that employ actual people. Instead, they are leveraging their exclusive access to cheap money into short-term spikes in stock valuations and bigger compensation packages for executives. That’s not credit in the service of a “real” economy. That’s financialization.
Compounding the financialized problem of credit misallocation, according to the OECD, is the fact that the biggest drag on growth occurs when credit floods into “households rather than businesses.” Most households simply cannot use debt like financiers use it. They don’t get to enjoy the unbearable lightness of being highly leveraged in an artificially rising stock market. Ironically, many households rely on the flood of credit just to keep from going underwater.
Meanwhile, the OECD sees high-powered wheelers and dealers stoking “greater income inequality because higher income people can benefit more from the greater availability of credit and because the [financial] sector pays high wages.” The trick is that they can easily afford to place their bets, service their debts and live well … all at the same time.
So, why haven’t debt-plagued, wage-challenged Americans connected the dots (and the bottom lines) between the rising world of finance and their deepening world of hurt?
Perhaps it’s the byzantine, almost impenetrable and “exotic” nature of its jargon-encoded financial instruments. There also may be a little bit of Stockholm syndrome and a touch of Horatio Alger-ism contributing to this disconnection. As John Steinbeck pointed out, impoverished Americans do like to think of themselves as “temporarily embarrassed millionaires.” This is the United States, after all.
Unfortunately, the captains of finance exhibited little embarrassment as they floated the whole economy on a sea of red ink. Unlike their fellow Americans, they’ve enjoyed a unique ability to socialize the risk of their private borrowing through well-paid political influence and with government-sponsored bailouts. Their nearly exclusive access to liquidity empowers them to use credit as a tool of wealth reallocation … and it’s sinking the American dream.
Understanding the Debt Tsunami
Since deregulatory floodgates were first opened by the Supreme Court in 1978, the United States has been drowning in a wave of consumer credit. The wave swelled as globalization and wage stagnation transformed the United States into a debt-driven economic system. Debt really is the fuel that propels contemporary capitalism. Debt blows bubbles on Wall Street that pop all over Main Street. Debt leads governments to socialize risk and externalize financial pain. And debt is a dangerous trap for the poor, a powerful drain on the dwindling middle class and a reliable revenue stream for the unfettered financiers of Wall Street.
Of course, debt in the abstract is not necessarily a problem. Collateralized debt (meaning it is tied to a hard asset like a house) has long been a reliable path to the American dream. Governments can use debt to build socioeconomic “goods” like roads, schools and power grids that contribute to economic productivity and growth. And debt is crucial to businesses quickly scaling up production or expanding into new markets.
However, household debt, which has skyrocketed over the last three-plus decades, is mostly non-collateralized or “unsecured” debt. A vast amount of the debt load carried by US households – including credit cards, medical bills and student loans – is not tied to a hard asset. Automobile loans are tied to cars. And some household debt is leveraged against an actual asset, like a line of credit attached to home equity. But much of the United States’ household debt is not tied to an asset that can be quickly and easily liquidated to settle outstanding accounts.
Since the early 1980s, more and more Americans filled their household troughs of red ink with general consumer debt – accumulating loans and charges and fees through the simple act of buying stuff. For instance, over the last two decades a lot of televisions and plastic tchotchkes have been converted into profitable, revenue-bearing debts managed by credit card companies. Those debts are often serviced by US households long after the plastic tchotchke breaks or the television becomes obsolete.
The key is that the asset acquired rarely holds any liquid value once the purchase is made. This lack of liquidity is a serious problem because any asset not convertible to cash is just a financial liability. And long-term servicing of that liability only compounds the loss.
More pernicious, though, are debts accrued to bridge the gap on basics like food, shelter, health care, education, taxes and utilities. These purchases are services that also lack liquidity, so there is no easy way out of those debts. There is no appreciation of those “assets” and no chance to convert them into cash when the going gets tough. The interest is often inescapable. And income spent or wealth reallocated toward that interest is lost forever.
The upshot is that people who really couldn’t afford the widget or the medical care are forced to redirect much needed income to service interest payments on those debts. In terms of opportunity cost, that’s also income that doesn’t generate more wealth. It doesn’t get invested in a rising stock market or help households keep pace with inflation. This debt acts like a wealth removal machine.
The Trickle-Up Economy
With wages also persistently flat – or worse – the two factors (debt and income) swirl into a perfect storm of wealth reallocation. That debt tsunami is also fed by an increasingly financialized, post-industrial economy that rewards those with liquidity and/or with specialized access to ultra-cheap money doled out by Federal Reserve policy makers.
And that’s the maelstrom that transformed the United States into a “trickle-up” economy. No, this economy is not a drip system. It is a percolator.
As bubbles rise and pop, this recurring action presents profitable opportunities to those with either the liquidity or the leverage to exploit the crash. Each new boom-and-bust cycle compounds this effect as financial elites concentrate more wealth into their coffers as it drains out of the middle and working classes. When bubbles pop and assets drop in value – stocks, real estate, whole companies and industries – those armed with cash or easy, exclusive access to politically greased financial leverage (like a taxpayer-funded bailout or the perpetually low Fed lending rate) simply hoard those assets for pennies on the dollar.
On the other hand, those outside the walnut-burled boardrooms of the financial system – but ever more beholden to it – must return to square one. They lack the protective armor of corporate personhood or the expertise of high-priced lawyers needed to escape pre-crash purchases. Some debts that don’t “disappear” must be serviced during a prolonged period of recessionary pressure. That pressure means new debts are likely to accumulate until another bubble starts to pop out of Wall Street’s financialized factory. This cyclical process drains off middle- and working-class wealth at rates higher than it can be replaced, while those at the top flourish.
For recent evidence of the growing divide, look no further than the last five years of income growth for CEOs versus income stagnation for their employees. Since the crash, CEO compensation in the biggest corporations spiked 54.3 percent, outpacing both the epic rise in the stock market and the lagging wage growth for their employees.
In fact, “top” CEOs of “leading firms” now earn 300 times these firms’ “average” employees, according to the Economic Policy Institute. And a new International Monetary Fund study found that the top 1% in developed nations like the United States now take home 10 percent of the income, even as poverty has risen in those nations. Add the fact that the middle class has been waiting 15 years for a raise, and the picture is quite clear: The people who have liquidity are swimming in a wider and deeper ocean while the pool for everyone else is drying up.
Frankly, it’s a zero-sum game.
The way the game is currently rigged, income rewards those playing financial games while debt compounds the loss of wealth for those being played by financial gamers. And if the OECD is right and credit hampers growth, the future looks fairly grim. With slow growth comes slow recovery. With slow recovery and stagnant wages comes the need to use widely available credit – both by financial speculators looking for bigger yields and by consumers looking to make ends meet. And debt that is not leveraged into hard assets or wealth generation soaks household debtors in a rising sea of red ink.
Return on Investment
In The Washington Times, an analyst at Bankrate.com explained the slow bleed of credit card debt: “If you owed $2,000 on a credit card with a 15.76 percent rate, it would take more than 10 years to pay off that card if you only made the minimum payment each month, and you’d pay an extra $1,330 in total interest.”
That $1,330 is significant in two ways.
It’s significant to the household trying to make ends meet during a slow “recovery.” But it’s also significant to a bank or financial company looking for reliable revenue. Even better, it is revenue that can be tallied on its quarterly reports during a period of otherwise hollow, financialized growth. The stock market likes any signs of “growth.” And personal credit card debt becomes corporate balance sheet “revenue” that can be used to leverage the acquisition of more assets.
But it’s worse than that.
As the OECD points out, debt leads to “low and slow” growth in the “hard” economy of wages and things. To counter “low and slow,” the Federal Reserve handed out money through “quantitative easing” and continues to pass out nearly free money to Wall Street in the form of a low benchmark lending rate. So, the Fed’s policy of lending and spending not only reinforced the financialized economy right after the crash, but it also rewarded it by doubling down after it lost all its bets. And the Fed’s easy money not only made the stock market high and mighty, but it also discouraged personal savings while also making the margins on consumer debt incredibly rewarding.
The Fed’s financial-friendly policy is, in fact, an engine of wealth reallocation.
A study by MagnifyMoney.com illustrates how the perpetual profit machine is fueled by the 75.7 percent of Americans who pay credit card interest of 15 percent or higher with an average monthly payment of $408. As Brian O’Connell of MainStreet.com starkly explains, just nudging that up to a “not-uncommon 18 percent” turns that debt into $1,707 of interest paid in just one year. That’s a serious opportunity cost for many Americans. But, as the researchers at MagnifyMoney.com point out, “Banks will pay 0.01 percent for money [for savings account deposits]. So for $10,902 a bank would pay about $1 in interest. Then they turn around and charge the average American $1,707 in interest.”
And those interest rate numbers may be conservative.
Many people wield plastic issued by margin-hungry retailers. The average APR on those “Do you want 15 percent off today’s purchase?” cards is a painfully high 23 percent, while some top out as high as 28 percent. The equation of 15 percent off this one balance plus 23 percent added to everything you ever buy equals ka-ching for retailers.
And if you avoid those bait-and-switch tactics by sticking with bank-issued cards?
There is (of course) the dreaded “fine print” that can spike credit card interest as high as 36 percent by tripping up consumers in a tangled obstacle course of clauses and penalties. Most deadly are the sky-high fees on cash advances. It is part of the “complex web of fees and charges” that allowed Capital One to generate a “net revenue margin of 17.29 percent during the last three months of 2014,” according to Forbes.
Talk about a return on investment! But it’s actually a double whammy.
The same low Fed lending rate that makes consumer lending so profitable also translates into sparse returns on the simple savings accounts once used by average Americans as a slow, steady way to accumulate wealth. But savings accounts have slowly become worthless to ordinary Americans. That worthlessness stoked middle-income earners to engage in a risky “reach for yield” (meaning risk-taking in a low-income environment) as they tried to keep pace with the well-heeled Joneses playing Fed-sanctioned Monopoly on Wall Street.
In the 1990s, yield-hungry baby boomers turned to the stock market. The rise of 401ks and tech-fueled day trading gave Wall Street access to a pool of wealth that’d long been held in banks and other less-risky investments. Expanding 401ks stoked dreams of a lively retirement filled with Viagra, golf and Caribbean cruises. It also stoked the dotcom bubble. Those dreams quickly disappeared when the bubble popped. And just a few years later, that wealth-removing cycle was repeated again as Americans gambled on a superheated housing bubble stoked by yet another risky reach for yield.
It’s all about the yield … or lack thereof.
By the start of 2015, “the 10 best” savings accounts had annual percentage yields ranging from .95 percent (APY) to 1.05 percent (APY), but the average is 0.1 percent (APY). By comparison, savings accounts paid around 3 percent in the mid-1950s and 5.75 percent in the mid-1980s. This miniscule, “downside-free” return for the 99% is all upside for financially minded money managers.
Really, it’s a no-brainer.
Just take a chunk of the $2 trillion worth of capital that Americans deposited into savings accounts and lend it back to them in the form of credit cards they probably need to get by because they are getting little or no yield from their savings accounts. The kicker is that the Fed’s low rate also makes it profitable for financial elites to borrow money at the institutional level and, among other speculative ventures, turn it into unsecured loans like credit cards.
Facing Debt Collection
Simply put, household debt is money in the bank for the United States’ financial industry. But it’s also the cost of doing business for the majority of “average” Americans. As of June 2015, figures compiled by Nerdwallet detailed the overall debt load for the “average” US household – with an “average” credit card debt at $15,706, an “average” mortgage at $156,333 and an “average” load of student loans at $32,953.
And the iron law of averages is catching up with more people.
In 2014, an Urban Institute study titled “Delinquent Debt in America” estimated that 35 percent of adults with a credit file have a delinquent account “in collections.” That’s roughly 77 million Americans who cannot service their non-mortgage debts, including credit cards, medical or utility bills that are more than 180 days past due. When debts go into collections, an individual’s earnings are an easy target for creditors endowed with the legal resources needed to seek recourse in lieu of liquid assets. Unlike cunning “corporate persons” who are “too big to fail,” these “economically fragile” folks get trapped in a Charybdis of non-collateralized debt.
In its recently issued “Report on the Economic Well-Being of US Households in 2014,” the Federal Reserve shows the extent of the “economic fragility” crippling nearly half of all Americans. Their survey of 50,000 Americans found that just 53 percent could “easily” absorb an unexpected “financial disruption” costing a paltry $400 by turning to savings or a credit card. As for the other 47 percent, they said a $400 surprise would be a serious financial curveball. But that’s just the tip of the iceberg:
- 76 percent of respondents have at least one credit card
- 56 percent said they “always” paid credit card bills “in-full” (the other 44 percent doesn’t)
- 31 percent passed on medical care during 2014 because they could not afford it
- 37 percent said they saved no money in 2014
- 31 percent have no retirement savings or pensions
- 45 percent of future retirees expect to continue working during retirement to cover expenses
Not a True Economic Recovery
And as for those consistent reports of the United States’ “recovery”?
In October 2012, The New York Times heralded the United States’ mounting “recovery” from the debt-fueled, mortgage-driven disaster of 2008 with the following headline: “Rise in Household Debt Might Be Sign of a Strengthening Recovery.” Obviously, it is an oddity of highly financialized capitalism that this headline makes any sense at all. Isn’t it strange that rising household debt is even seen as a viable measuring stick for the “recovery”?
There’s no doubt consumer spending is important. And Americans are spending. They’re just not spending on widgets or buttressing retirement savings or buying big-ticket items that, truth be told, would’ve been made by workers in overseas factories, anyway.
Instead, Gallup reported in May 2015 that 55 percent of Americans are “spending more” on groceries, with utilities, gasoline, cable/satellite and rent or mortgage rounding out the top five expenses. It’s not quite the kind of consumer spending that fuels “hard” economic growth. And Gallup’s tracking poll for July 2015 showed consumer spending was “flat” – much like the wages many people need to service debts or to actually accumulate real wealth. It’s no wonder that many Americans rely on the once-yearly “windfall” from a tax refund to help close the widening gap so many Americans desperately paper over with bank-issued plastic.
Still, the White House and the mainstream media consistently talk about “the recovery” as if it’s a thing, even though the economy is still heavily stained with red ink. Nearly seven years after the crash, some 4 million US homeowners still find themselves “drowning” in mortgage debt that exceeds the value of the home by 20 percent. According to MarketWatch, that’s $579 billion “negative equity” still floating around in the housing market. Yes, it is a far cry from the 15 million homes that went underwater after the crash. But that number dropped in no so small part because the rate of homeownership keeps on dropping to new record lows as former homeowners flood the rental market.
But the “trickle-up” percolator economy kept on working.
After the bust, big financial players like Blackstone and Carrington Investments were well positioned to gobble up suddenly dirt-cheap foreclosures. Then they exploited readymade demand for their growing inventory of rentals, which of course was stoked by people losing their homes to foreclosure. Many of those were liquidated and purchased by future landlords like Blackstone and Kentucky billionaire B. Wayne Hughes.
It seems that a rising tide of debt does not lift all boats, only the yachts.
While much of the United States is drowning in debt, many of these luxurious yachts are buoyed on a sea of liquidity. Those at the very top – Blackstone, Goldman Sachs, JPMorgan Chase and other titans of financialization – are not in the same boat as those who went inexorably underwater, or the growing number of economically fragile Americans. Unlike the 99% of Americans who cannot seem to get ahead on the economic treadmill of constant borrowing, stagnant wages and persistent underemployment, the well-heeled 1% has stoked a renaissance in luxury goods, high-priced mansions and high-rise condos.
In the post-crash United States, liquidity is the true measure of wealth. Financialization has turned leveraged assets into the measure of economic “growth.” Debt is the United States’ leading product. And the debt-driven system became a wealth reallocation machine that reordered the red and blue political map into a red and black economic imbalance sheet. Now, a majority of Americans find themselves united below the bottom line in a sea of red ink. | <urn:uuid:c5c2fb74-8ebf-4d51-aae7-a369a92ac4d8> | CC-MAIN-2022-33 | https://truthout.org/articles/our-united-states-of-indebtedness/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz | en | 0.947742 | 6,168 | 2.21875 | 2 |
J. D. Heyes
July 9, 2013
One of the biggest problems with the massive (and growing) Administrative Branch of government is that it is a punitive entity devoid of the ability to reason. The “one-size-fits-all” approach to rule-making and regulations has made it impossible for the bureaucracy – either on the state or federal level – to utilize rational thought-processing when particular cases or issues don’t fit the mold, so to speak.
Take the case of 24-year-old Elizabeth Mort, a Pennsylvania woman who had her newborn child taken from her by Lawrence County child welfare agents, all for eating a bagel that contained poppy seeds.
Per ABC News:
In 2010 [Mort], with help from the Pennsylvania office of the American Civil Liberties Union, filed a lawsuit against Lawrence County child welfare authorities and Jameson Hospital in Pittsburgh. When Mort was in the hospital to deliver her baby, Isabella Rodriguez, in April 2010, she tested positive for opiates after eating a bagel, her lawyer said. The hospital alerted the county Department of Public Welfare, which, along with two police officers, forcibly removed a 3-day-old Isabella from Mort’s home for five days.
‘I was devastated’
Apparently no one bothered to ask her about her dietary habits for the previous few days. If they had, maybe – just maybe – someone would have put two and two together.
“I was devastated. I just cried and cried and cried. I didn’t want to let her go. I was heartbroken,” said Mort at a news conference after she filed her suit.
It took almost a week before authorities finally figured out she was no drug addict and returned her daughter to her.
According to Mort she had purchased a single poppy seed bagel from a local Dunkin’ Donuts shop on her way to the hospital. Reports said the child never tested positive for drugs – which should have been another indicator that Mort wasn’t on anything.
In her suit she said Jameson Hospital had used a threshold for its tests that was simply too low, which resulted in false positives from things like foods and common medicines. The federal standard for opiates is 2,000 nanograms per ML, but Jameson officials alert authorities if they find only 300 nanograms in a patient’s system.
Besides agreeing to the payout, the hospital said it would also change its policies for drug testing, according to officials who spoke to ABC News. “The hospital will now alert county authorities only if a baby, and not the mother, tests positive for drugs, according to ACLU staff attorney Sara Rose, who represented Mort,” the news affiliate reported.
The Administrative State continues to grow
Also, Lawrence County has also agreed to inform mothers when hospital workers obtain a positive drug test before they seek a court order to remove a child from a home.
“I think they are pleased this has been resolved,” said Rose regarding her client’s family. “This was a painful, horrific experience. Isabella is now 3. She’s very cute and doing very well.”
These sorts of things are what happens when we allow those who are supposed to “represent” us construct layer after layer of bureaucracy – a bureaucracy that crushes, stifles, harasses, intimidates and subjugates We the People in ways we don’t even always realize. It is all-consuming and self-serving.
Worse, this massive Administrative State, which talk-show host Mark Levin has deemed “the fourth branch of government,” continues growing in size and power every week. It is just a matter of time before it consumes the entire nation.
This article was posted: Tuesday, July 9, 2013 at 4:03 am | <urn:uuid:b9c4ff48-2a6b-4d0a-b412-7f3f16f7e5ac> | CC-MAIN-2017-04 | http://www.prisonplanet.com/state-seizes-child-from-new-mom-because-she-ate-a-poppy-seed-bagel.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00346-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.974069 | 798 | 1.765625 | 2 |
The thinness of Frenchwomen has long been a mystery—especially given their high-fat diet. Now a study suggests that red wine may play a role. Biochemists at the Rovira i Virgili University in Spain fed 15 rats one of three diets: moderate-fat, high-fat, or high-fat plus red wine (equivalent to one to two glasses per day for people). In eight weeks, not surprisingly, both groups on the high-fat diet packed on much more weight than the moderate-fat group—but the wine-drinking rats gained only half as much excess weight as the wine-abstinent rats. Procyanidins, a type of antioxidant found in red wine, but not white, may help curb overeating or boost the body's ability to break down fats, says researcher Mayte Blay Olivé. What works for rats may not work for people, she cautions, but if it does, she stresses that these results apply only to moderate wine intake—for women, no more than eight ounces a day—and adds that wine should be consumed with a complete meal and plenty of water. | <urn:uuid:ca59aa1c-a96f-42b4-90a9-a7bf50fd7036> | CC-MAIN-2016-44 | http://www.allure.com/story/the-red-wine-diet | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.938885 | 235 | 2.203125 | 2 |
Tax Return and Planning Services
Tax Payer Registration is FREE.
Time has come to get ready for filing your Income-tax Return. For all those tax payers who are going to file their Income-tax Returns for the first time in particular, it would be a taxing time for them. But, please do not worry at all. I am going to tell you a real very interesting idea whereby it will be possible for you to get your Income-tax Return filled up and too without wasting your time and even without paying a single rupee for filling up and submitting your Income-tax Return. All readers who would hear this news would surely be excited with this news and now without keeping you in suspense let me give you the answer for getting your Income-tax Return
Please go ahead and take advantage of the services of “Tax Return Preparer” who have been appointed by the Government of India and they are located in different parts of India. These Tax Return Preparers popularly known as TRPs have specially been trained by the Government to fill-up your Income-tax Returns. You may visit this website to know the approved list of Tax Return Preparers in whole of India. Now looking to your convenience you may call any one of the Tax Return Preparer to your office or residence to prepare your Income-tax Return for the Assessment year 2013-2014 and thereafter to file the said Income-tax Return and then submit the acknowledgement to you
Why we Pay Taxes to Government.
All citizens of a country are morally andlegally bound to pay their fair share of tax. So it is important of paying taxes to the government and why we should not do the mistake of hiding money or avoiding taxes. A large percentage of people who pay tax think as if government is trying to steal their hard earned money .. well thats not true. Money collected from taxes help a country to become stronger and help government provide a variety of services to its citizens.
Example of some services that government provides with our tax money:
1. Infrastructure Projects: Government needs money to build roads, bridges, dams and number of other projects which are available to the society as a whole.
2. Public Security: Money collected from taxes is used to provide police and fire departments. It also helps to fund money needed to maintain defense forces (army, navy and air-force) and buy arms for them.
3. General services: Keeping roads clean, water treatment, street lights, trash removal and maintenance of public parks requires lot of money.
4. Health Services: Almost all governments provide some level of free or subsidized health services to its citizens. This may include preventive immunization shots, disaster relief and many others. All this money is funded by the tax money you and I pay.
5. The list goes on: Maintenance of historic monuments, government aid, emergency relief, conduct elections, run several government institutions like department for agriculture, commerce, energy, urban development, treasury, judiciary, department of motor vehicles etc.
Types of Taxes
Government can impose taxes in many forms, for example: Income tax, Sales tax, Excise tax, Toll Tax, Recreation tax, social security, medicare etc ..
Does everyone has to pay tax?
It depends on country to country, but in most cases people with very low income do not have to pay tax.
Does everyone pay same tax?
Usually people with higher income pay a higher percentage of tax than the people with lower income.
Why should I still have to pay tax?
Think about this, if we only paid for the services we need then there is no way we could afford it. For example if you wanted to go from City A to City B, can you afford to pay for the construction of road that connects those two cities.. NO. You open tap and clean water flows out of it, if we were to put a filtration system on our own and a pipe that connects all the way to the nearby reservoir, it will cost just too much. Therefore we pay for these services in form of tax and use them as a whole society.
The result of not paying taxes could result in penalty and prison time. So next time when the time comes to pay taxes, do not feel too bad. It is your contribution to the services you receive in return.
So here we the members from the TRP, being associated with this website in different forms plans and helps the Government of India to collect the Income Tax from different Persons in due course. The Tax Consultants of this website are either the member of the TRP Scheme of the Income Tax of India or the Specially Trained and Certified by Tax Return and Planning Services. | <urn:uuid:718eca1b-c81e-45ce-8e68-a0b1e98e8d90> | CC-MAIN-2017-04 | http://incometaxtrp.com/process.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00016-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964686 | 954 | 1.75 | 2 |
I learned many, many years ago that the lifetime of the red blood cell (RBC) was 80 to 120 days. For my purpose in training athletes, I used 90 days as the average. To me it was nice to know the lifeline of our body was refreshing itself each season, or 4 times per year. If the body was refreshing, then my training schedules would also refresh each season, or 4 times per year. Yes, there would be a common theme throughout, but each year would comprise 4 distinct phases.
Phase I – Building the Foundation
No matter what your sport or competition, a strong foundation or aerobic base is imperative. To know where you are going, you must know where you start. First measure your maximum aerobic effort. For example, max aerobic HR is approximately 220 minus your age, x 85 %. For the purposes of this article, lets say this number is a heart rate of 140. Now determine what intensity of exercise is required to achieve this HR. In this example, jogging on a treadmill at 5.0 MPH, will be used. For the next 90 days your training will be primarily (not totally) aerobic to increase this performance. When creating an aerobic base, you must do aerobic work. Pure aerobic activity can be offset by open chain proprioceptive work. (Open chain – not holding on, or not connected; proprioceptive – where the various parts of the body are located in relation to each other). Standing on a balance board or ball will accomplish this. When this becomes too easy, try standing on one leg, or with your eyes closed. This technique will vastly enhance core strength. Fuel it with proper nutrition. Remember, you are what you eat. Eat junk – be junk. Now what are we training for? This phase is a good place to start to learn game enhancing visualization. Standing on a balance ball in your garage, no I don’t think so. Close your eyes and you are now standing on the field, playing 3rd base. As you move from side to side on the ball, imagine you are picking off all the shots hit to the “hot corner”. Remember, what the mind perceives, the body achieves. During this phase you should see an increase in the intensity needed to get to a certain HR. If it took a 5.0 MPH effort to reach 140 HR, by the end of this phase you may need a speed of 6.0 MHP or more to get to the same HR. A good aerobic base has been started, but eventually your improvement will start to level off. Then, it is time to kick it up a notch!
PHASE II – High End Endurance Work
Sport specific strength training, power, speed and agility drills—bring it on. Yes, anaerobic exposures are needed but you must control it. Knowing that anaerobic excess is a fundamental flaw in many training programs you must make sure you do not fall victim to the over trained syndrome. Remember the 3Rs – rest, repair, recovery. Chart your aerobic threshold. You started at 5.0 MPH on the treadmill and went to 6.0. During this phase, you should be able to increase your speed again to get to the 140 HR. If this is not happening you might be trying too hard. During this phase visualization will be aided by biofeedback to help the athlete learn to cope with the emotional stress of the game. A heart rate monitor is an excellent biofeedback tool. HR is directly related to your emotional level. Increased emotion and stress results in increased HR. Visualizing the bottom of the 9th in the World Series is one thing, learning to control your emotions in it so you can perform properly is another. As you visualize, learn proper breathing, learn what you need to say to yourself to relax, so that optimal performance can be achieved. Interval training, intense core work have all been part of this phase. Just when we feel like we have improved all we can, it is time again to change our training.
PHASE III – Enhancing the Foundation
Through proper conditioning, what used to be difficult has now become easy. We started our example at 5.0 MPH on a treadmill to attain a 140 HR. Now we need to go 6.5 MPH to get the same result. Advanced core work, agility and strength will build throughout this phase. Proper fat burning is essential to fuel the needed tasks. Understanding insulin “ the fat hormone” is imperative. There is no ‘Hitting The Wall’. The athlete does not run out of energy at the wall, the athlete runs out of ability to access their energy at the wall. In this phase, barriers to excellence are removed. Cardio Strength Training with sport specific techniques are employed. Skills are repeated to the point that they become reflexive to the subconscious mind. Visualization work is enhanced. ‘See the Game; Feel the Game’. Whether running the mile or playing 1st base, strategies and tactics are reviewed ad nauseum. But again, it is time to change.
PHASE IV – Peak Performance
Playing a sport or entering a specific competition is the time for a well trained athlete to have fun and excel. So much work has been done to get here, we must make sure that the line between training and abusing is not crossed. The 3Rs will be respected, active rest will be constantly employed. Competing is one aspect of the sport; getting ready for the next competition is where the art of training lies. Playing a game on Monday night followed by a game on Tuesday afternoon needs skills that go beyond yelling “c’mon you can do it”. Training now is an adjunct to the sport or competition. The physiological blend of aerobic and anaerobic is closely scrutinized. All training techniques are fair game to keep the athlete honed to excellence. You see it is not enough to say “put me in coach; I’m ready to play”. That is how they make songs. The true athlete will say “put me in coach; I’m ready to win”. That’s how legends are made, even if they are only in the athlete’s mind.
I JUICE and I AM PROUD. | <urn:uuid:936f433f-3257-4acf-b48c-247b775c9308> | CC-MAIN-2022-33 | http://ijuice.org/blog/2009/10/four-phases-of-training/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00273.warc.gz | en | 0.955556 | 1,289 | 2.359375 | 2 |
Introduction to Dendrochronology GEOS/ANTH/WSM/GEOG 439A/539A Fall 2019
Tuesdays and Thursdays, 9:30 – 10:45
Associate Professor Valerie Trouet (firstname.lastname@example.org)
Professor David Frank (email@example.com)
Regents' Professor Malcolm Hughes (firstname.lastname@example.org)
Bannister Tree-Ring Building Rm 320 (Trouet)
Rm 421 (Hughes)
Trouet: Thursdays, 2:00–4:00pm or after appointment.
Matt Meko (email@example.com)
In this course students will learn the scientific basis, techniques, and applications of dendrochronology. We will review the historical development and key discoveries of the field. We will study the biological basis of tree-ring research and the central principles of dendrochronology. After studying fundamental concepts students will learn about applications of dendrochronology in different disciplines via lectures and discussions with leading dendrochronologists at the Laboratory of Tree-Ring Research. During intensive, weekly laboratory sessions and a weekend field trip students will learn the practical skills of specimen collection, preparation, observation, and the most important method and principle of dendrochronology — crossdating. At the end of the course, students will be able to collect tree-ring samples, prepare and date the samples, and build a local chronology. Finally, students will be able to evaluate dendrochronological analyses, and interpret their own data for specific research issues.
There is no required textbook for the course.
Required readings may be downloaded as Adobe Acrobat pdf files at a password protected site at: https://www.ltrr.arizona.edu/introdendro/Readings/.
The username and password for this site will be provided by the instructors.
Note that a full listing of the readings is at the bottom of this page. If you are unable to access the readings, tell one of the instructors.
Readings should be completed before the class on that particular topic. It would also be a good idea for all students to browse the LTRR web site at https://ltrr.arizona.edu, and especially the link to online bibliography, software and other dendrochronology information resources at https://ltrr.arizona.edu/resources.
Lab is required for the course and will meet once a week for approximately 3 hours. The Lab constitutes a very important part of the course and of your grade. Topics covered in the lab include the practical aspects of crossdating, sample preparation and mounting, chronology building and interpretation, and the interpretation of different types of dendrochronological samples.
A general Lab syllabus is posted here: Lab Syllabus 2019.
A detailed guide to Lab exercises and sample sets, and a suggested pace of work is posted here: Lab Schedule 2019.
Mandatory Field Trip
There will be two mandatory one-day field trips in September to conduct dendrochronological sampling and to observe and learn about classic dendrochronology research topics and areas. Additional information about the field trip will be discussed in class. Methods demonstrated on the field trip will include site and tree selection criteria, increment coring techniques, and other field procedures in a problem-oriented context.
Evaluation and Grading
Four homework exercises are required for undergraduate students (see below for topics and due dates), and are designed to require students to read and evaluate relevant literature. For undergraduate students, there will be two exams, a mid-term and a final exam, covering the lecture materials. Graduate students will only take the mid-term exam. There will also be a practical Lab exam for all students covering the information and skills learned in the Lab. Finally, graduate students are required to (a) submit both electronically and as hard copy one annotated bibliography of the dendrochronological literature that includes at least 10 references-(see schedule for due dates), and (b) conduct, report, and present a research project specific to their area of interest (see below). The result should be in the form of a publishable paper or section of a thesis, dissertation, or proposal, and is due on the last regular day of class. Topics must be agreed with the instructors prior to submission.
|Undergraduate students||Graduate students|
|Homework 1–4 (25 × 4)||100 points||Annotated bibliography||100 points|
|Mid-term Exam||200 points||Mid-term Exam||200 points|
|Final Exam||250 points||-||-|
|Laboratory Exam||70 points||Laboratory Exam||70 points|
|Lab Exercises||180 points||Lab Exercises||180 points|
|-||-||Graduate Paper||200 points|
|-||-||Graduate Paper presentation||50 points|
|Undergraduate TOTAL||800 points||Graduate TOTAL||800 points|
|Undergraduate grades||Graduate grades|
|A||720 points||A||720 points|
|B||640 points||B||640 points|
|C||540 points||C||540 points|
|D||460 points||D||460 points|
|E||< 460 points||E||< 460 points|
- Mid-Term and Final Exams are a combination of questions requiring short answers (a word, phrase or single sentence), and questions requiring longer answers (a paragraph or more). No incompletes will be given in this course, except under extraordinary circumstances.
- There is no extra credit.
|Tu Aug 27||-||Introduction, Course Structure, Lab Intro, LTRR Tour|
|Th Aug 29||-||Introduction to Dendrochronology [notes]|
|Tu Sep 3||Stokes and Smiley 1968, Lamarche and Harlan 1973||cross-dating [notes]|
|Th Sep 5||Bowyer et al., CH 1||Biological basis of annual ring formation [notes]|
|Tu Sep 10||Moser et al (2011)||High-resolution investigations [notes]|
|Th Sep 12||Bowyer et al., CH 3- 6||wood anatomy, structure, and function [notes]|
|Tu Sep 17||Fritts et al. 1965||Site and tree selection [notes]|
|Th Sep 19||Hughes 2011||chronology building: signal extraction [notes]|
|Tu Sep 24||Hughes et al. 2011, Trouet et al. 2010||chronology building: networks [notes]|
|Th Sep 26||Trouet et al. 2012a||chronology building: what can you measure? [notes]|
|Tu Oct 1||-||Archives, data management (Dr. Peter Brewer) [notes]|
|Th Oct 3||Dean et al. 1996, Towner 2002||Southwestern dendroarcheology (Nick Kessler)|
|Tu Oct 8||Haneca et al. 2009, Tegel et al 2012||European dendroarcheology (Dr. Charlotte Pearson) [notes]|
|Th Oct 10||-||Review session for midterm|
|Tu Oct 15||-||Mid-Term Exam|
|Th Oct 17||Jacoby et al 1988, Yamagchi & Lawrence 1993||Tree rings and natural hazards (Dr. Paul Sheppard) [notes]|
|Tu Oct 22||Evans et al. in press||Demographics and dendrochronology (Dr. Margaret Evans) [notes]|
|Th Oct 24||Falk et al. 2011, Kipfmueller and Swetnam 2001||Fire Ecology (Dr. Don Falk) [notes]|
|Tu Oct 29||O'Connor et al. 2015, Flower et al. 2014||Dendro-entomology (Dr. Ann Lynch) [notes]|
|Th Oct 31||Stahle et al 1999; Jacoby et al 1989||Dendrochronology in the Tropics (Dr. Tom De Mil)|
|Tu Nov 5||Fritts et al.1979, Stahle and Cleaveland 1992, Jacoby and D’Arrigo 1989||Dendroclimatology (Dr. David Frank) [notes]|
|Th Nov 7||Buckley et al. 2010, Pederson et al. 2014||Human-environment interactions (Dr. Kevin Anchukaitis) [notes]|
|Tu Nov 12||Rice et al. 2009; Woodhouse and Lukas 2006||Dendrohydrology (Dr. Connie Woodhouse) [notes]|
|Th Nov 14||Meko and Woodhouse 2011||Dendrohydrology (Dr. David Meko) [notes]|
|Tu Nov 19||Hudson 1976, Reynolds et al 2016||Sclerochronology (Dr. Bryan Black) [notes]|
|Th Nov 21||Hughes and Brown, 1992; Hughes and Funkhouser 2003; Salzer et al, 2013||Charismatic paleoflora - working with trees that have lived for millennia (Dr. Malcolm Hughes) [notes] [refs]|
|Tu Nov 26||Leavitt 2010||Isotopes in dendrochronology (Dr. Steve Leavitt) [notes]|
|Th Nov 28||-||No class — Thanksgiving|
|Tu Dec 3||Babst et al. 2014||Tree rings in the carbon cycle (Dr. David Frank) [notes]|
|Th Dec 5||-||Graduate students present term paper to whole class|
|Th Dec 5||-||Lab final exam (1pm–4pm)|
|Tu Dec 10||prior lectures and readings||Review session for Final (all undergraduate students attend)|
|Th Dec 12||-||Reading Day — no class|
|Tu Dec 17||-||FINAL EXAM 9.30–11.30am|
|September 24||Homework #1 due (Undergrad students)|
|September 24||Grad paper provisional topic due|
|October 10||Homework #2 due (Undergrad students)|
|October 15||Mid-Term Exam (in class)|
|October 22||Annotated Bibliography due (Grad students)|
|November 5||Homework #3 due (Undergrad students)|
|November 21||Homework #4 due (Undergrad students)|
|December 5||Grad Student paper due and presentations|
|December 5, 1–4pm||Lab Practical Final Exam|
|December 17, 9:30–11:30am||Final Exam|
Undergraduate Homework Assignments
These assignments consist of a 1-page summary of an article (not a web page!) pertaining to dendrochronology. The summary should include (a) the full reference of the article (i.e. how & where do I find it), (b) a summary of the main points of the work, and (c) a critical evaluation of the work (i.e. is it worth reading, and why?). The assignments must be submitted electronically to Professor Trouet at: firstname.lastname@example.org and must have the word “Assignment_IntroDendro” as the first words in the subject field.
Keep in mind that the quality and clarity of your writing, and spelling, punctuation, and grammar count! Spell-check, grammar-check, and proof-read your summaries before submitting them.
Find, summarize and evaluate a peer-reviewed paper or part of a book containing information on site selection, chronology building, or climatic signals in dendrochronology. 25 points.
Find, summarize and evaluate a peer-reviewed paper or part of a book containing information on an application of dendrochronology in archeology. 25 points.
Find, summarize and evaluate a peer-reviewed paper or part of a book containing information on an application of dendrochronology in ecology. 25 points.
Find, summarize and evaluate a peer-reviewed paper or part of a book containing information on an application of dendrochronology in climatology or hydrology. 25 points.
The format is:
Nesvetajlo, V.D., Consequences of the Tunguska catastrophe: dendrochronoindication inference Planet. Space Sci., 1998, 46 (2/3): 155–161.
An explosion or impact by an unknown, large body occurred at about 6 to 8 km. elevation above the region of Tunguska in east-central Siberia on June 30, 1908. This resulted in damage for 60-80 km around an epicenter, with many millions of trees being blown down. The author visited the epicenter in 1990 and took increment cores from some of the trees left standing at the epicenter. He reports an attempt to infer details of the event from the nature of the rings formed in these trees in 1908 and subsequent years. His main findings were???. The data provided only partially support these conclusions because?... The importance of these results is?... The study could be extended and improved if the following were done??... This is an informative and readable paper, based on careful work, although I found the author's interpretation of his observations to be somewhat unconvincing. Even so, he has laid the groundwork for future studies that could be informative.
Graduate Student Annotated Biblography
Graduate students are required to prepare an annotated bibliography of scientific literature relating to dendrochronology and specifically to the topic of their graduate paper. At least 10 separate papers, book chapters, reports, monographs, etc. must be included. The required class readings can be included in this bibliography, but they do not count toward the minimum 10 papers. In addition to a full citation for the work, a succinct summary of the most important points of the paper should be provided, along with your own assessment and judgement of the findings and values of the paper. These summary statements should not simply be condensed versions of the paper's abstract, but should clearly show your own evaluation of the paper.
Graduate Student Papers
The Graduate Student Paper should be a 10–15 page report (minimum type size 11 point, double spaced, 1 inch margins) on some original research, a pertinent literature review, or a proposal soliciting funding for a specific project. Depending on the type of project you choose, your paper should include (at a minimum) introduction, background research/discussion of the problem, field and lab methods, results, discussion, conclusion, and references cited sections. (A literature review is somewhat different—see me if you have questions).
The paper should be formatted in the style used by the major journal in your field (i.e. American Antiquity for archaeologists, The Holocene or International Journal of Climatology for paleoclimatologists, etc.). References, figures, and tables are included in the page limit. Figures and tables should be legible, but I do not require that they be publication quality. The paper will be assessed both in terms of its content and in terms of the quality of the writing and presentation. Grammar, spelling, punctuation, style, and layout all count!
I encourage you to write something that fits precisely the requirements of this class, but that also serves some other purpose, for example a chapter of your thesis or dissertation, a paper for publication, or a proposal. This economy of effort, however, does not extend to using the same paper for two or more classes!
Attendance and Rules of Conduct
- Students are expected to adhere to the ABOR code of conduct and the UA Code of Academic Integrity. (Click on highlighted text to see further information on these rules and policies.)
- Attendance at all lectures and lab sessions is important and is expected, but is not included in grade calculation. All holidays or special events observed by organized religions will be honored for those students who show affiliation with that particular religion.
- Absences pre-approved by the UA Dean of Students (or Dean's designee) will be honored. Excessive absences may be grounds for dropping a student from the course. It is, however, the student's responsibility to drop the course officially; failure to do so will result in a grade of E or I, at the instructor's discretion.
- If you must arrive late or leave early (something not encouraged), please do so quietly; noisy entrants will be required to leave immediately.
- Cell phone usage, web browsing or reading of materials unrelated to the lecture or lab (e.g., newspapers, magazines, etc.) are disruptive, and are prohibited in class. Students who exhibit disruptive behavior may be administratively dropped from the course at the Instructor's discretion.
- Discrimination on the basis or race, religion, ethnicity, gender, sexual orientation, physical disability is prohibited by UA and other policies. Violence will not be tolerated in the classroom. This prohibition includes, but is not limited to, verbal, written, or internet activities. Anyone observed using any racist or derogatory language, writing offensive materials, or downloading pornography or other objectionable materials will be required to leave the class and may be administratively dropped from the course at the Instructor's discretion.
- Cheating will not be tolerated and is grounds for expulsion from the course; cheating includes, but is not limited to: copying work of others during exams or homework; turning in any work of others as your own, including work of students from past semesters; plagiarism on papers. The University Library provides definitions and discussion of plagiarism.
- Students found cheating on any assigned work will receive a score of 0 for that assignment and will be reported to the Dean of Students. A second violation is grounds for expulsion from the course.
- In compliance with Title III of the Americans With Disabilities Act (1990), students who require special assistance will be suitably accommodated. Students must be registered with the University and a minimum of 5 days notice for such accommodations is requested.
- If the schedule conflicts with major religious observances, please let the professor know.
- If English is not your native language and you believe that you must use a translation dictionary during exams, please contact the professor.
- Students requiring accommodation in testing or note taking: Please notify the professor and provide the Disability Resource Center letter within the first few days of the course.
- Student athletes and others who need signatures periodically: Please notify the professor that you'll be needing signatures generally, and please alert the professor before a particular signing period is due so that your most up-to-date grade can be calculated.
- Honors College students: An Honors Contract is allowable. See the instructor to arrange those details.
Babst et al. (2014) A tree-ring perspective on the terrestrial carbon cycle. Oecologia DOI 10.1007/s00442-014-3031-6
Babst et al. (2018) When tree rings go global: Challenges and opportunities for retro- and prospective insight. Quaternary Science Reviews 197, 1–20.
Black, BA, GW Boehlert, MM Yoklavich (2005) Using tree-ring crossdating techniques to validate annual growth increments in long-lived fishes Canadian Journal of Fisheries and Aquatic Sciences 62 (10), 2277–2284
Black, BA, WJ Sydeman, DC Frank, D Griffin, DW Stahle, M García-Reyes, et al. (2014) Six centuries of variability and extremes in a coupled marine-terrestrial ecosystem. Science 345 (6203), 1498–1502
Bowyer, J.L., Shmulsky, R. and Haygreen, J.G. (2007) Forest Products and Wood Science: An Introduction. See schedule for details.
Dean, J.S., M.C. Slaughter and D.O. Bowden (1996). Desert dendrochronology: tree-ring dating prehistoric sites in the Tucson Basin. Kiva 62, 7 – 26.
Diaz and Trouet (2014) Some Perspectives on Societal Impacts of Past Climatic Changes. History Compass doi:10.1111/hic3.12140
Falk et al. (2011) Multi-scale controls of historical forest-fire regimes: new insights from fire-scar networks. Frontiers in Ecology and the Environment doi:10.1890/100052
Fritts, H.C. (1976). Tree Rings and Climate. Academic Press, London. Pages 55 – 68.
Fritts, H.C., G.R. Lofgren and G.A. Gordon (1979) Variations in climate since 1602 as reconstructed from tree rings. Quaternary Research 12, 18 – 46.
Fritts, H.F., D.G. Smith, J.W. Cardis and C.A. Budelsky (1965). Tree-ring characteristics along a vegetation gradient in Northern Arizona.Ecology 46, 393–401.3.
Haneca et al. (2009) Oaks, tree rings and wooden cultural heritage: a review of the main characteristics and applications of oak dendrochronology in Europe. Journal of Archaeological Science 36:1–11.
Hughes, M.K. (2011) Dendroclimatology in high-resolution paleoclimatology. IN M.K. Hughes et al. (eds.), Dendroclimatology, Progress and Prospects. Springer, Berlin, pp. 17 – 34.
Jacoby, G.C., P.R. Sheppard and K.E. Sieh (1988). Irregular recurrence of large earthquakes along the San Adreas Fault: Evidence from trees. Science 241:196–199.
Kipfmueller, K. F. and T. W. Swetnam (2001) Using dendrochronology to reconstruct the history of ecosystems. Chapter 8, pages 199–228, In D. Egan and E. A. Howell eds., Techniques for Discovering Historic Ecosystems. Island Press, Washington.
LaMarche, Jr., V.C., and T.P. Harlan (1973). Accuracy of tree-ring dating of bristlecone pine for calibration of the radiocarbon time scale. Journal of Geophysical Research 78, 8849 – 8857.
Leavitt, S.W. (2010). Tree-ring C-H-O isotope variability and sampling. Science of the Total Environment in press
McCarroll, D, and N.J. Loader. (2004) Stable isotopes in tree rings. Quaternary Science Reviews 23:771–801.
Meko, D.M. (2006) Tree ring inferences on water-level fluctuations of Lake Athabasca. Canadian Water Resources Journal 31(4):1–20.
Meko, D.M. and Woodhouse, C. (2011) Application of streamflow reconstruction to water resources management. IN M.K. Hughes et al. (eds.), Dendroclimatology, Progress and Prospects. Springer, Berlin, pp. 231 – 261.
Moser, L. et al., (2011) Timing and duration of European larch growing season along altitudinal gradients in the Swiss Alps. Tree Physiology 30: 225–233.
Pederson et al. (2014) Pluvials, droughts, the Mongol Empire, and modern Mongolia. Proceedings of the National Academy of Sciences 111: 4375–4379.
Rice, J.L. et al. (2009) Science and decision making: water management and tree-ring data in the Western United States. Journal of the American Water Resources Association 45: 1248–1259.
Rozendaal, D.M.A. and Zuidema, P.A. (2011) Dendroecology in the tropics: a review. Trees 25: 3–16.
Salzer, M.W., Hughes, M.K., Bunn, A.G. and Kipfmueller, K.F. (2009) Recent unprecedented tree-ring growth in bristleone pine at the highest elevations and possible causes. Proceedings of the National Academy of Sciences 106: 20348–20353.
Stahle, D. W. and M.K. Cleaveland (1992) Reconstruction and analysis of spring rainfall over the southeastern U.S. for the past 1000 years. Bulletin of the American Meteorological Society 73, 1947 – 1961.
Stokes, M.A., and T. L. Smiley (1968). An Introduction to Tree-Ring Dating, University of Arizona Press, Tucson. (Reprinted 1995). Pages xi – xiii, xv – xvii, 3 – 20.
Towner, R.H. (2002) Archeological Dendrochronology in the Southwestern United States. Evolutionary Anthropology 11: 68–84.
Trouet V, Taylor AH, Wahl ER, Skinner CN, Stephens SL (2010) Fire-climate interactions in the American West since 1400 CE. Geophysical Research Letters DOI:10.1029/2009GL041695
Trouet V, Panayotov M, Ivanova A, Frank DC (2012b) A pan-European summer teleconnection mode revealed by a new temperature reconstruction from the northeastern Mediterranean (1868–2008). The Holocene DOI: 10.1177/0959683611434225
Trouet et al. (2012b) Cambial growth season of brevi-deciduous Brachystegia spiciformis trees from South Central Africa restricted to four months. PLoS ONE 7(10): e47364.
Woodhouse, C.A., S.T. Gray, and D.M. Meko (2006) Updated streamflow reconstructions for the Colorado River. Water Resources Research 42, W05415, doi:10.1029/2005WR004455.
Yamaguchi, D. K. and D.B. Lawrence (1993) Tree-ring evidence for 1842 – 1843 eruptive activity at the Goat Rocks dome, Mount St. Helens, Washington. Bulletin of Volcanology 55, 264 – 272.
Information contained in this course syllabus, other than the grade, absence and other UA policies, may be subject to change with reasonable advance notice, as deemed appropriate by the instructor. | <urn:uuid:3d55aa0a-478c-4005-942b-7d416bdf788d> | CC-MAIN-2022-33 | https://www.ltrr.arizona.edu/introdendro/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00277.warc.gz | en | 0.841469 | 5,736 | 2.75 | 3 |
Cathy Martin is helping Action Cancer promote the importance of breast screening with a video of herself getting a mammogram.
Action Cancer is the only UK and Ireland charity offering breast screening for women who fall outside the NHS age bracket (50-70). The charity is offering a free mammogram to women who are 40-49 and 70+.
Cathy said: "With my mum having breast cancer it makes me genetically more predisposed to actually contracting this illness. The other factor is I'm within the age bracket now, I'm 42 now and the screening is offered for free by Action Cancer between the ages of 40-49 every year. I also know some friends who have died and some who are in recovery from breast cancer.
"It's touched me quite a few times and I do some stuff with Action Cancer already and I said I would get a mammogram and we came up with the concept that I would film it and share it."
The charity has been screening women in Northern Ireland for breast cancer for 37 years, 10 years longer than the NHS.
Cathy added: "I appreciate without sounding arrogant that I have some influence so I decided to do the video with the view to potentially encouraging others to do it.
"It literally takes two minutes to book online and the whole process takes 10 minutes in total. And then I thought I would condense it into 1 minute and have a video that's easy to watch.
"I said if it [the video] gets to 10,000 views by the end of the day I'd make a donation of£100 to Action Cancer."
The video currently has just over 9,000 views on Facebook.
Breast screening is an X-ray of the breast. It's used as a preventative measure in women to reduce their risk of developing breast cancer.
Four X-rays are taken in total, two of each breast, a radiographer positions you in the mammogram machine to get the highest quality images possible. This requires compression of the breast, however it's more uncomfortable rather than painful.
Cathy said her experience with the mammogram "was fine, absolutely fine".
She added: "The radiographer who I was with was lovely, very professional but also very friendly and very reassuring. Also, she explained in very clear and concise way and with clear and concise instructions what I had to do.
"Lift this arm here, put your boobs in here, this lid is going to close down on your boob and it might feel slightly uncomfortable. The instructions are very easy and therefore like anything else if your prepared for it, it's fine.
"I didn't find it uncomfortable at all, some women do. The worst of it for me was the two week wait to get my results because my mum does have breast cancer and thankfully I got the all-clear this time."
To book a breast screening appointment, go online or call 028 9080 3344. | <urn:uuid:13d3d919-c016-4812-b6e3-324de262b3af> | CC-MAIN-2017-04 | http://www.belfastlive.co.uk/news/cathy-martin-promotes-importance-breast-9022200 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00060-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97956 | 604 | 2.078125 | 2 |
With the emergence of the wet spraying trolley, it not only solves the problem that traditional small wet spraying machines cannot meet the insufficiency of concrete spraying in long tunnels, but also improves the working environment of tunnel construction personnel, and reduces the consumption of concrete.
Concrete wet spraying trolley, also known as concrete wet spraying manipulator, concrete spraying manipulator, is widely used in railways, highway tunnels, slopes, water conservancy, hydropower tunnels and culverts, as well as subways, civil construction projects, etc.
Advantages of wet spray trolley:
1. High efficiency and low energy consumption: It is equipped with a large-capacity hopper and uses a strong and stable intelligent hydraulic system to control mechanical feeding. In terms of feeding of the shotcrete machine, the feeding speed and feeding continuity are the same as manual feeding. Often affected by the impact of human body function, compared with qualitative improvement. Thereby, the idling rate of the shotcrete machine is reduced, and the efficiency of the shotcrete machine is improved. The efficiency of the shotcrete machine is increased by about 30% compared with the artificial feeding of the shotcrete under the test conditions. Due to the improvement of efficiency, the shotcrete time to complete the same amount of work is reduced, thereby reducing the power consumption of the shotcrete machine and the power consumption of auxiliary equipment in the construction face. According to incomplete statistics, it can save about 35% of the construction site. power.
2. Save labor and materials: Save labor: Tunnel engineering construction is one of the harsh environments in existing engineering construction, and it belongs to high-risk environment operations. This product is a mechanical automatic feeding equipment, which only needs 2~3 people to operate the machine easily. Compared with manual feeding, 6~10 workers are required to load the material to ensure that a shotcrete machine can work normally. A large amount of manpower reduces the number of personnel working in high-risk environments. Material saving: The discharge port of the hopper is equipped with a gate to adjust the feeding speed, and the feeding speed can be adjusted at will according to the shotcrete speed so as not to spill the mixed material out of the lower barrel of the shotcrete machine and cause the waste of the mixed material. It avoids the manual shovel cutting with a shovel, and the rising process causes a large amount of mixing material to be scattered around and in the air and cannot be fully utilized.
3. Reduce pollution: First of all, the automatic feeding process of the hopper is that the discharge port of the hopper is directly aligned with the feeding barrel of the shotcrete machine, and the mixed material does not go through the artificial upward process, which can avoid a large amount of mixed material generated during the feeding process. waste and dust pollution. Secondly, the air return structure of the original shotcrete machine was changed to eliminate the dust in the air return.
4. Simple operation and wide operation area: The equipment operation is quite simple, and it can be started after simple training. | <urn:uuid:3af87139-dee1-4fec-9d0c-f23ab75acbbc> | CC-MAIN-2022-33 | https://www.saintyoldawin.com/n1875431/The-benefits-of-the-appearance-of-wet-concrete-spray-trolleys.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00065.warc.gz | en | 0.939823 | 626 | 2.3125 | 2 |
David Beckmann is president of Bread for the World.
With U.S. funding, nongovernmental organizations have helped immunize millions of babies. Thanks to debt relief, most African children are in school, and in the last six years the number of people receiving HIV/AIDS medicines in developing countries has increased tenfold. Our country provides assistance through the Foreign Assistance Act of 1961. But the world has changed dramatically since then. It's time for the U.S. to get smarter about how it delivers foreign aid.
Why would any relief agency reject U.S. food aid? Beginning in 2009, CARE will do just that, forgoing $45 million a year in U.S. food aid because of its disagreement with monetization, the process of selling U.S. food abroad in order to raise needed cash for development projects and administrative costs. CARE maintains that the sale of U.S. food in the fragile markets of recipient countries competes with the sale of food produced by local farmers, causing prices to drop and lowering farmers’ income.
- 1 of 2
- next › | <urn:uuid:27d3c846-cd90-4cb3-b500-72ac6141f945> | CC-MAIN-2017-04 | https://www.christiancentury.org/contributor/david-beckmann | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00133-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.945793 | 226 | 2.40625 | 2 |
Armageddon in 2012? The truth behind the doomsday theories
The picturesque French village of Bugarach, southwestern France braces for invasion of UFO campaigners who believe it will be only place to survive Armageddon in 2012. Here we examine the fact and the fiction behind the most popular doomsday scenarios.
21 Dec 2010
1. Alien invasion/government confirmation of extraterrestrial contact
Alien invasion has been the subject of great works of fiction since HG Wells published War of the Worlds in 1898. Fear of such an attack such as from Mars, a species from outside our galaxy or beings from other dimensions, ebbs and flows with the general state of anxiety on Earth.
Researchers have found that fear of attack by aliens tends to rise at times of heightened fear about more terrestrial threats.
Believers cite increasing numbers of UFO sightings, the alleged crash of a disc at Roswell, New Mexico, in 1947 and several seemingly credible photographs and videos of strange craft in our skies as evidence that such a threat is increasing.
Evidence: Photographs, videos, official releases that prove how governments around the world have monitored UFO activity for more than 50 years, stories by abductees and other claims by campaigners. But do any of these suggest that we're about to be taken over by a race of grey humanoids with large black eyes at any time in the future, let alone in 2012?
2. Nibiru/Planet X/Wormwood
Thousands of web forums and sites propose the belief that sometime in the early years of the 21st century, a previously undiscovered planet will collide with or pass very close to the Earth destroying civilisation or causing a massive planetary cataclysm.
Nibiru was invented in the late 1960s by Zechariah Sitchin in a book. According to Sitchin, Nibiru is a planet in our solar system which follows an erratic orbit bringing it into the inner system every 3,700 years. But Sitchin never suggested that it would threaten the Earth.
Some even suggest that Nibiru is a brown dwarf sister to our own sun and will first be seen towards the end of this year.
Evidence: Very little. Some point to the 2005 announcement by Nasa that a 10th planet had been discovered on the outer fringes of our solar system and many think that it will pass close to the Earth in 2012. But this 10th planet is most certainly not moving into the inner solar system.
3. Solar catastrophe
This is one of the few doomsday scenarios connected with the end of the Mayan calendar that may actually be based on science. In this scenario a vast solar flare or expulsion of gases from the sun in December 2012 will engulf the Earth wreaking havoc upon mankind and the planet's ecosystems. There is no evidence that such catastrophic events happened in the past.
Evidence: There may be some correlation between the observed 11-year solar cycle and the time cycles seen in the Mayan calendar although this evidence is rather weak. But whilst a solar flare from the sun could cause problems such as satellite damage and injury to unprotected astronauts and blackouts, the flare itself would not be powerful enough to destroy Earth, certainly not in 2012. In the far future, when the sun runs out of fuel, most scientists accept that it will swell into a red giant and engulf the Earth. But rather than happening in 2012, this event will happen no sooner than five billion years from now. Last year a Mayan elder dubunked the claims, insisting that time will not "run out" on December 21 of that year. Apolinario Chile Pixtun said he was tired of being bombarded with frantic questions about the end of the world. "I came back from England last year and, man, they had me fed up with this stuff," he said last year. Nasa has also said that the world was not coming to an end on December 21, 2012.
4. Magnetic pole shift
A large section of doomsday believers believe a dramatic reversal of Earth's magnetic poles is imminent and that it will trigger a reversal of the planet's rotation and the subsequent catastrophic events.
They point to evidence of pole shifts in Earth's past and claim that these reversals can be calculated by studying sunspots or magnetic field theory. Many believe the Mayans and the ancient Egyptians discovered evidence of pole reversal events in the future and that the secrets have been covered up by today's governments.
Evidence: Work by scientists at Princeton University and Paul Sabatier University in Toulouse, France, indicates that Earth did rebalance itself 800 million years ago. They studied magnetic minerals in sedimentary rocks in Norway and found that the north pole shifted by more than 50 degrees (a quarter the distance from pole to pole, in effect) in under 20 million years.
Other scientists have also discovered that seasonal movements in both polar regions do effect the positioning of the poles. But where the scientists and the "doomers" differ greatly is over the timescale of any potential pole shift.
While the apocalyptic visionaries believe such a switch could happen in a very short time scale, geologists think that it would happen over a period of one million years.
A supervolcanic eruption would be larger than any volcanic eruption in modern history. Researchers believe this will happen when magma rose into the Earth's crust but would be unable to break through.
The resulting build in pressure would mean that at some point a huge area of land would be devastated as the magma blasted skyward. Such an event would, campaigners say, blast millions of tons of debris and poisonous gases into the atmosphere, and could either plunge the world into a so-called nuclear winter triggering an ice age or, at worst, wipe out life in parts or all of the planet.
Evidence: Most of the concern about 2012 and supervolanoes centres on the so-called super-caldera underneath Yellowstone Park in the United States.
Satellite images have over the past few years shown changes in the the movement of molten rock 10 miles under the surface.
Wayne Thatcher of the US Geological Survey recently told Nature magazine: "We know now how mobile and restless the Yellowstone caldera actually is."
Nobody actually knows whether the caldera will blow or, if it does, when such an event could take place.
6. World War III
Almost as soon as the Second World War in 1945 ended and with a standoff between the Western Allies and the Eastern bloc in place through the middle of Europe, there was rising anxiety that the world would be consumed by another epic conflict.
When Russia exploded its first atomic bomb just two years later, a nuclear arms race between East and West began. The invention of hydrogen (thermonuclear) devices only accelerated the race which peaked in 1962 during the Cuban Missile Crisis when the world came closest to an all-out nuclear exchange between the United States and the Soviet Union.
The build-up of weapons continued throughout the 1970s and 1980s but a dedicated hotline between the Kremlin and the White House and some arms control treaties reduced the threat of an accidental nuclear war. The threat diminished in the 1990s with the collapse of the Soviet Union. Some believe the latest "war games" between North and South Korea
Evidence: Today, the fears of a nuclear exchange centre on the rising power of China and the American response and the possibility of wars between India and Pakistan or North and South Korea escalating into global conflicts.
7. Mass casualty terrorism
Since September 11, 2001 and the deaths of nearly 3,000 people in New York and Washington DC there have been fears about al Qaeda or another terrorist network acquiring weapons of mass destruction and devastating a major western city or releasing a chemical or biological attack.
Statements by governments about the risk of such an attack have done little to lessen the anxiety with both the British and American administrations raising the spectre of a stray nuclear weapon being detonated in a major city.
Dick Cheney, the former US vice president, is reported to have stated that he is haunted by thoughts of a mushroom cloud rising over an American downtown skyline.
Many conspiracy theories, particularly those who believe that the 9/11 attacks were actually planned and executed by rogue elements in the US administration, believe that there will be a so-called "false flag" nuclear attack to divert attention from the west's woes and usher in an era of martial law and totalitarian government. The UK's terror level was raised to "severe" in January. After the arrest of 12 men around Britain on Monday, Metropolitan Police Assistant Commissioner John Yates, the country’s most senior counter-terrorism officer, said the raids had been “absolutely necessary” to keep the public safe.
Evidence: Osama bin Laden famously declared a few years ago that his organisation has several nuclear devices but they were only a "deterrent". There has been some concern about several "loose" nukes from the former Soviet Union, particularly six so-called "suitcase" nukes.
But there is no evidence that al-Qaeda or anybody else holds nuclear weapons and several attempts by terrorists in the UK to make nerve or biological agents have proved inept failures. Nevertheless, concern now centres upon the instability of the Pakistan regime - a nuclear-equipped country - and fears that al-Qaeda or a Taliban group could topple the government and get its hands on nuclear weapons.
8. Peak oil
The reduction of global oil stocks is a reality with the world's economies consuming - financial collapses excepted - ever-increasing amounts of the black gold.
But peak oil theory centres around supply and demand and postulates that, at some point, demand will outstrip supply. When is this likely to happen? Some believe that it already has while others think that it is likely to happen some time between now and 2020.
A number of doomer sites link peak oil with the end of the Mayan calendar in 2012. Demand for oil outstripping supply would have huge consequences around the world given that most economies are powered by oil, agriculture is completely dependent upon it for fertilisers and pesticides and the plastics industry is based on oil extraction. A collapse in social order following a peak in oil production is, therefore, something to be taken seriously.
Evidence: Peak oil is a near certainty but two questions remain: when will it happen and will the world have developed alternative sources of fuel in time?
M. King Hubbert created the theory behind peak oil in 1956 to accurately predict that United States oil production would peak between 1965 and 1970. The theory has successfully predicted the decline from oil fields and regions subsequently.
Optimistic observers do not believe that peak oil will occur before 2020 but admissions by some oil companies that they have overstated the reserves held underground have raised fears that we are at or may already have passed the peak.
A decline in investment in new oil fields and plant during the global recession has only served to emphasise our total dependence upon a finite resource.
9. Bee colony collapse
More than a third of the commercial beehives in the US were lost to colony colapse disorder [CCD] in the winter of 2008. The syndrome, in which all of the worker bees in a colony die off suddenly, leaving nothing but a solitary queen wandering alone on empty frames, has spread to several countries in Europe already including France, Belgium, Italy, Portugal and Spain.
Several causes of the disease have been suggested, including the almost universally present varroa mite, certain pesticides, Israeli acute paralysis virus, climate change and mobile phone broadcasts, but none have yet been proved to be the culprit.
No cure has been found either, and as cases are reported in new countries the likelihood of a global pandemic leading to the extinction of the honeybee becomes a real possibility.
Evidence: Apart from the loss of the honey crop, without the honeybee several crops key to human life would be wiped out, including the soya bean, cotton, brassicas, several kinds of nut including brazil nuts and almonds, grapes, apples and sunflowers, the source of a large proportion of the world's vegetable oil. Almost a third of the world's food is directly traceable to the action of bees. If they became extinct severe shortages, starvation, violence and riots would surely follow.
10. Environmental collapse
Today's mantra is climate change or man-made global warming. In previous decades pollution, soil depletion, the destruction of the ozone layer and an imminent ice age were the ecological catastrophes that faced us.
There is, of course, no doubt that man's impact upon his environment is getting worse although a large body of opinion believes that global warming is a liberal conspiracy and that the world has actually been cooling over the last decade.
A total environmental collapse brought about by runaway warming, toxic poisoning of the seas of parts of the inhabited areas of the world or a tipping point with some of the most crucial species (see Bee colony collapse above) would have a huge impact upon civilisation and could render parts of the world near uninhabitable. The world is however, attempting to combat this with key summits in Copenhagen, Denmark last December, and Cancun, Mexico, this month seeking to reduce greenhouse gas emissions. After two weeks of tense negotiations, the United Nations finally agreed on a way forward to keep global temperature rise below 2C (3.6F). David Cameron expressed his satisfaction at the climate change package that will see the rich world committed to forking out billions of pounds every year to stop global warming, but delay plans to cut carbon emissions.
Evidence: Few scientists dispute that the global average temperature has been rising for at least a century. This is despite rows over an Intergovernmental Panel on Climate Change (IPCC) report into rising temperatures and another controversy surrounding the science behind climate change, dubbed “Climategate”, when leaked e-mails appeared to suggest that scientists at the University of East Anglia had manipulated climate change data.
The Government's chief scientific adviser Prof John Beddington has insisted that uncertainty about some aspects of climate science should not be used as an excuse for inaction. Nasa scientists have reported that the past decade was the warmest on record, proving that global warming had continued “unabated”. Nasa's Goddard Institute for Space Studies (GISS) in New York, found average global temperatures have increased by about 1.5F (0.8C) since 1880, when records began. | <urn:uuid:6b0745cc-4169-4831-a65f-b2ae67c29b8f> | CC-MAIN-2016-44 | http://robalini.blogspot.com/2010/12/armageddon-in-2012-truth-behind.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00188-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.95377 | 2,946 | 2.21875 | 2 |
What is Diabetes?
Diabetes is a chronic disease in which the body has trouble regulating blood sugar. Diabetes affects the way the body metabolizes, or uses, digested food to make glucose, the main source of fuel for the body.
The two most common types of diabetes are type 1 and type 2. These two types result from the body's inability to produce and use insulin, respectively. A third type, gestational diabetes, occurs only during pregnancy and may lead to type 2 diabetes.
Insulin is the hormone that controls the movement of glucose from the blood into cells. The pancreas produces insulin. Glucose--also called blood sugar--constantly moves through the bloodstream to supply the body with the energy needed for muscle contractions and metabolism.
The job of insulin is to make sure the glucose actually moves into the body's cells. Without insulin, the glucose builds up in the bloodstream. Over time, elevated glucose levels can damage the linings of blood vessels, leading to damage to the eyes, kidneys, and other sensitive tissues. This vascular damage can cause blindness (diabetic retinopathy), impotence, kidney failure (diabetic nephropathy and end-stage renal disease), increased risk for heart attack, and the deterioration of nerves or blood vessels. It also can cause poor blood flow to the arms and legs, resulting in poor wound healing and possible amputation. Diabetes is the leading cause of new blindness in adults. It is also the most common condition leading to dialysis and kidney transplants, and the most common reason for below-the-knee amputations.
Type 1 Diabetes:
Type 1 diabetes is caused when the cells in the pancreas (called beta islet cells) that produce insulin are destroyed. Although type 1 diabetes can occur at any age, it is usually diagnosed in children and young adults. Genetic, autoimmune, and environmental factors are considered risk factors for type 1 diabetes. Currently, there is no known way to prevent type 1 diabetes.
Type 2 Diabetes:
Type 2 diabetes affects about nine out of 10 people with diabetes. In type 2 diabetes, the pancreas either does not produce enough insulin, or the body becomes less and less efficient at getting insulin to move glucose into the cells (insulin resistance). You can inherit the potential for type 2 diabetes, but whether you actually develop it may depend on a number of environmental factors, such as poor eating habits and lack of exercise. Other risk factors include older age and history of gestational diabetes. Race and ethnicity can also influence the occurrence of type 2 diabetes. African-Americans, Hispanic Americans, American Indians, and Native Hawaiians are at a particularly high risk of developing type 2 diabetes and its complications.
For more information related to diabetes basics, health complications, and other general tools, check out the Eat Right for Life resources for Understanding Diabetes.
What type of diet helps manage diabetes?
According to the American Diabetes Association, following a diabetes meal plan can help you keep your blood glucose levels on track. Carbohydrates are foods that have the biggest effect on your blood glucose levels. After you eat carbohydrates, your blood glucose rises. Fruit, sweet foods, starchy foods (such as bread, potatoes and rice), and milk and milk products contain carbohydrates. Although carbohydrates are important for health, when you eat too many at once, your blood glucose can go too high.
Some carbohydrates--potatoes, sweets and white bread, for instance--may raise blood glucose more than others. Better choices are less processed foods with more fiber and nutrients, such as 100 percent whole wheat bread, oatmeal, brown rice, and non-starchy vegetables.
You can manage your blood glucose better if you eat the same amount of food at the same time every day. That keeps your glucose levels stable and helps your medication work best. Physical activity is an important way to control blood glucose, too. Try to exercise at the same time every day. That way you can build the extra calories you need for exercise into your meal plan.
For more information related to this topic, visit the Eat Right for Life Diabetes Health Center. | <urn:uuid:e63fc927-32ea-4a45-b416-09b8fcb04320> | CC-MAIN-2022-33 | http://www.eatrighthealthyliving.com/eat-right-for-life/?pageid=125 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00473.warc.gz | en | 0.917191 | 843 | 3.765625 | 4 |
The sudden rupture of a vulnerable arterial plaque is a major cause of cerebral ischemic attack. Triggering of sudden rupture is a result of unfavourable plaque morphology, and is also a result of local stress concentration acting on the plaque. Computational stress analysis on a realistic plaque model is an important tool to assess the vulnerability of plaque rupture. However, the accuracy of the stress analysis is heavily dependent on the accuracy of the 3D reconstruction of the plaque geometry. The derivation of accurate vessel geometries from medical imaging has proved to be difficult due to limited image spatial resolution (at about 0.3mm in-plane) and the lack of contrast between the plaque components.
- Bioengineering Division
High Resolution 3D Reconstruction of an Atherosclorotic Plaque by a Combination of Histology and 3D Ultrasound
- Views Icon Views
- Share Icon Share
- Search Site
Choudhury, A, Luppi, M, Hopkins, W, Gao, H, Das, S, Kill, I, Pinelli, M, & Long, Q. "High Resolution 3D Reconstruction of an Atherosclorotic Plaque by a Combination of Histology and 3D Ultrasound." Proceedings of the ASME 2009 Summer Bioengineering Conference. ASME 2009 Summer Bioengineering Conference, Parts A and B. Lake Tahoe, California, USA. June 17–21, 2009. pp. 189-190. ASME. https://doi.org/10.1115/SBC2009-206684
Download citation file: | <urn:uuid:18f141d7-edc8-40c4-9252-c6ad49f92418> | CC-MAIN-2022-33 | https://appliedmechanicsreviews.asmedigitalcollection.asme.org/SBC/proceedings-abstract/SBC2009/48913/189/288054 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00274.warc.gz | en | 0.853324 | 330 | 1.859375 | 2 |
Hip-strengthening exercises may relieve discomfort, study finds
FRIDAY, June 4 (HealthDay News) -- Hip exercises can reduce a common type of knee pain in female runners, according to a new study.
Patellofemoral pain (PFP) occurs when the thigh bone rubs against the back of the knee cap. Typically, pain doesn't occur when someone with PFP first starts a run. But once the pain begins, it gets increasingly worse. The pain disappears almost immediately after the person stops running.
This study included five runners with PFP who did hip-strengthening exercises twice a week for six weeks and a control group of four runners. The hip-strengthening exercises lasted for 30 to 45 minutes and involved single-leg squats and exercises with a resistance band. These exercises can be done at home.
The exercise program reduced and, in some cases, eliminated knee pain, according to the Indiana University-Purdue University Indianapolis researchers.
The study was to be presented Friday at the annual meeting of the American College of Sports Medicine in Baltimore.
Previous studies have found an association between PFP in women and weak hips. This is the first study to test a possible treatment for PFP, Tracy Dierks, assistant professor in the department of physical therapy, said in a university news release.
The American Academy of Family Physicians has more about patellofemoral pain.
-- Robert Preidt
SOURCE: Indiana University-Purdue University Indianapolis, news release, June 4, 2010
All rights reserved | <urn:uuid:c701488e-bf7c-4fb3-a8e0-525950f77ab9> | CC-MAIN-2017-04 | http://www.bio-medicine.org/medicine-news-1/Help-for-Women-Runners-With-Knee-Pain-73203-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00494-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.939456 | 320 | 2.6875 | 3 |
I have a question regarding how to proceed with the following problem. I am required to produce a moment generating function for the following problem. I would like to know if the operation I performed is valid for this question. I never understood mgf's that well.
A balanced coin is flipped repeatedly until a head appears. Let X denote the number of flips needed. Define Y = 2X-1.
Find the moment generating function for Y.
This is a geometric distribution (discrete random variable).
I applied the definition of the m.g.f.
Note: I'm new to latex. Please consider the (2X-1) as raised to the power of e, along with the t.
Is this the valid first step for this problem, and others like it?
Thanks for your time! | <urn:uuid:0b6af29b-bba2-4099-b0ff-605745459994> | CC-MAIN-2017-04 | http://mathhelpforum.com/advanced-statistics/113086-discrete-geometric-moment-generating-function.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00125-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.925234 | 169 | 1.875 | 2 |
Journal of the House of Lords: Volume 8, 1645-1647. Originally published by His Majesty's Stationery Office, London, 1767-1830.
This free content was digitised by double rekeying. All rights reserved.
Die Saturni, 13 die Decembris.
Prayers, by Mr. Cawdrey.
Ds. Grey de Warke, Speaker.
Wardours of The Tower, Petition.
Upon reading the Petition of the Yeomen Wardours of The Tower of London: It is Ordered, To be recommended to the House of Commons.
E. of Carlisle and his Creditors.
Ordered, That the Cause between the Earl of Carlile and his Creditors shall be heard, by Counsel on both Sides, at this Bar, on Tuesday next come Sevennight, whereof the Earl of Carlile is to have Notice of it.
L. Say & Seale's Petition, for some Allowance, on Account of his great Losses during this War.
Upon reading the Petition of Wm. Viscount Say & Seale; shewing, "That, in the Beginning of these Troubles, to manifest his good Affection to the Parliament, he did lend, upon the Propositions, a Thousand Pounds, which for his Estate was a very great Sum of Money; that, soon after, the King's Forces possessing themselves of Oxfordshire and Glostershire, where all his Lands lieth, have ever since had the same in their Power, and taken the Profit thereof, whereby he hath sustained very great Losses, as may appear by the Particulars annexed: As yet he hath received nothing from the Estate; but did forbear to petition, seeing the great Occasions there were for Monies, so long as he could possibly subsist without it; but now, having sold all his Plate, and borrowed so long as he could, to supply Necessaries for himself and Family, his Lordship is enforced to become an humble Suitor to the Houses, that, by some such Way as to their Wisdom shall seem fit, he may have wherewithall to maintain himself and Family.
Particulars of his Losses.
An Estimate of the Losses which the Lord Viscount Say & Seale hath sustained, in his Real and Personal Estate, since the Beginning of (fn. 1) these unnatural Wars.
1. In the Year before the War began, having ploughed up a good Part of his ancient Pasture Grounds, to raise Portions for his Younger Children, and to pay his Debts, and having a very great Crop of Corn and Wood; presently after Keinton Battle, it was seized upon by the King's Forces, being of a great Value.
2. At the same Time, they plundered him of all the Stock that was upon his Grounds, and the Furniture in his Houses, to a great Value; defacing, tearing, and burning, his principal House, at Broughton, in Oxfordshire.
3. They have likewise for these Three Years last past detained from him the Profits of all his Lands, from when he hath not received in all that Time above the Sum of Four Hundred Pounds.
4. And for the Profit of the Court of Wards, by reason of the present Distractions, and the several Votes that have passed for the taking away of that Court, he hath received very little Profit from thence these Three Years last past, save only Two Hundred Thirty-three Pounds per Annum for his Fee; but hath maintained his Family for the most Part by Monies borrowed, many of those whom he owes good Sums of Money to being brought into great Streights for Want thereof, which is a great Grief to him, being not able to pay them; all which Losses amount to above Ten Thousand Pounds, besides the Ruin of his Houses, which will not be made good again with Two Thousand Pounds, though the Enemy should pull no more down than they have done already."
To be sent to the H. C.
Ordered, That this Petition be specially recommended to the House of Commons; and Sir Edward Leech and Mr. Page is appointed to deliver it on Monday Morning next.
Judgements in the Star-chamber against Prynn & al.
Ordered, That the Records in the Star Chamber, where the Judgement against Mr. Prynn, Doctor Bastwicke, and Mr. Burton, shall be brought into this House upon Tuesday Morning next, that so they may be vacated in this House.
E. of Carnarvon to be assessed by this House.
Upon Information to this House, "That the Earl of Carnarvan is sent to, by a Ticket, to pay Two Thousand Pounds, for his Fifth and Twentieth Part;" and considering that he is a Peer of this Kingdom, and a Ward: It is Ordered, That it shall be signified to the Committee at Haberdashers Hall, that, in regard his Lordship is a Peer of this Kingdom, he ought to be assessed by this House.
Passes for Col. Fisher & al. lately in the King's Service, to go beyond Sea.
The Earl of Manchester reported from the Committee of both Kingdoms, as their Opinion, "That Passes may be granted, to Colonel John Fisher, Colonel Wm. Willis, Colonel Wm. Rolston, and Colonel Phillip Honywood, lately in the King's Service, to go beyond the Seas:" Which this House approved of, and Ordered to be communicated to the House of Commons.
Papers from the Scots Commissioners.
Likewise he reported some Papers from the Scotts Commissioners, touching their Answer concerning the Answer to be sent to the King's Letter.
Message to the H. C. about the Passes for Col. Fisher & al.
A Message was sent to the House of Commons, by Sir Edward Leech and Mr. Page:
1. To desire their Concurrence to the Passes for the Colonels to go beyond the Seas, which were reported this Day from the Committee of both Kingdoms.
2. To recommend to them the Petition of Colonel Searle.
3. To deliver to them the Petition of Sir Robert Coke, and desire the Consideration of it may be referred to the Committee of Lords and Commons for Sequestrations; and that he may be bailed, to prosecute his Business.
4. To deliver to them the Petition of the Wardours of The Tower, with Recommendations.
and about L. Digby's, &c. Letters taken at Sherborn.
5. To desire that the Committee which were formerly appointed to consider of the Letters taken at Sherborne may (fn. 2) meet this Afternoon, at Three a Clock.
The Scotts Papers were read, as follow:
Paper from the Scots Commissioners, that they do not agree to the Answer to the King's Letter.
Having receved from your Lordships His Majesty's Letter of the Fifth of this Instant to the House of Peeres, and at the same Time a Draught of the Answere of both Houses to that Letter; we finde in that Answere some Particulers wherein we are named as Consenters, to which we cannott agree; nether would it (we are consident) have ben expected from us, if our former Papers had ben considered, or we consulted therein, as formerly upon the like Occasions; concerning which we are ready to give your Lordships Satisfaction by Conference.
12 Dec. 1645.
By Comand of the Commissioners for the Parliament of Scotland.
Paper from them, proposing an Amendment to it, and for Propositions for Peace to be prepared.
Whereas, according to the Order of both Houses of Parliament, a Draught of their Answere to His Majesty's late Letter is by this Honorable Comittee comunicated to us the Comissioners of the Parliament of Scotland; we have taken both the Letter and the Draught of the Answere into our serious Consideration, and, with the Honorable Houses, doe, in the Name of the Parliament of Scotland, from our Harts pray and desire, according to our former Wishes and Endeavours, that a safe and wellgrounded Peace may be setled in His Majesty's Dominions, which we are apt to conceve may now, by the Blessinge of God, be brought to passe, when both His Majesty hath made the Motion upon the one Hand, and the Honorable Houses of Parliament have resolved and agreed to send Propositions and Bills unto His Majesty upon the other, for the same much-desired Ende.
Only, according to our Interest and Affection, and in relation to soe great an Happines, we doe expresse our Sense concerning some Particulers in the Answere: First, That, if it may seeme good to the Wisedome of the Honorable Houses, instead of these Words ["and should have accounted it a great Happines if Your Majesty's Actions had ben answerable"], that the Expression might runn thus, ["and shall account it a great Happines that Your Majesty's Actions be answerable"].
"Next, concerning that Parte of the Answere which seemeth to barr all further Treaty, we referr ourselves to our Paper of the 14th of August, wherein we declared ourselves most willing, that not only the Three maine Propositions debated at Uxbridge, but alsoe all or any of the other Propositions of Peace already agreed upon by the joynte Consent of both Kingdomes, which upon mutuall Debate should be judged necessary, be sent, with a Desire of a positive Answere, without any Treaty; but withall did shew, if any new Propositions of Peace, or any materiall Additions to, or Alterations of, the former Propositions, were to be sent, in that Case we were necessitated to send them to the Kingdome of Scotland, to be there considered and approved, (fn. 3) as is more fully conteyned in that our Paper, which we desire may be taken into Consideration at this Tyme: And this is all that is in our Power, or can be expected from us, in Matters of soe great Concernment, as cannot be determined without the particuler Knowledge and express Consent of the Parliaments of both Kingdomes, united by so many Bonds of Covenante, and of doeing and suffering in this common Cause. To the Point of denying the safe Conduct (the Houses havinge declared their Opinion), wee do agree; and earnestly desier, that, without Delay, the Propositions already agreed upon may be sent to His Majesty, for a positive Answer; but if any of them be altered, or any other materially different be intended, which may lay a Necessity upon us of sending them to the Parliament of Scotl. to be there considered and retorned hither, with their Sence, and so the Winter (the fittest Season for a Treaty) spent in Debates upon new Propositions, the present Oportunity lossed, Occasion given to our Enemies to use the more Art and Industry for bringinge in Forreyn Forces, when they apprehend by our Delayes their Motions of Peace not to be enterteyned; besides many other Inconveniencies, well knowne to the Honorable Houses, and felt of all the 3 Kingdomes, which accompany our present Distractions; the Contynuance or Increase of the commons Misseries through the not setling of a happy Peace cannot be imputed unto us, who have not seised constantly to express the sending of the Propositions agreed upon by both Kingdomes ever since the 20th of June last, have used our best Endeavors upon all Occasions with the Honorable Houses from Time to Time, and have left no good Meanes or Waies in our Power unessayed, which might deliver these Kingdomes out of their Trobles and Sufferings, and setle them in a blessed Peace: It is therfore our earnest Desire, that the presente Oportunity of Pacification be improved, unto which wee are ready to joyne our uttermost Endeavors, wayting for the Success from the Blessing of God.
Dec. 12th, 1645.
"By Comaund of the Commissioners for the Parliament of Scotland.
Message from the H. C. with an Ordinance, &c.
A Message was brought from the House of Commons, by Sir John Evelyn Knight, &c.
1. To desire Concurrence in an Ordinance for Two Thousand Pounds for the Lyncolneshire Forces.
(Here enter it.)
2. Instructions to be given to the Committees that are to be sent from the Houses of Parliament, to reside with the Forces at Newarke, being in Two Papers.
Sheriffs of Counties.
"Resolved, by the Lords and Commons in Parliament assembled, That Sir Richard Bettenson shall be High Sheriff of the County of Surrey; and that the Commissioners of the Great Seal do grant him a Commission accordingly.
"Resolved, &c. That Mr. William Phillips shall be High Sheriff of the County of Pembrooke; and that the Commissioners of the Great Seal do grant him a Commission accordingly.
"Resolved, &c. That Sir Thomas Henley Knight shall be High Sheriff of the County of Sussex; and that the Commissioners of the Great Seal do grant a Commission accordingly.
"Resolved, &c. That James Lewes Esquire, of Cardigan Castle, shall be High Sheriff of the County of Cardigan; and that the Commissioners of the Great Seal do grant him a Commission accordingly.
"Resolved, &c. That Mr. Charles Gwyn shall be High Sheriff of the County of Carmarthen; and that the Commissioners of the Great Seal do grant a Commission accordingly.
"Resolved, &c. That Mr. Howell Gwin, of Glanbraine, shall be High Sheriff of the County of Brecon; and that the Commissioners of the Great Seal do grant him a Commission accordingly.
"Resolved, &c. That Onslow Winch Esquire shall be High Sheriff of the Counties of Hunt. and Cambridge; and that the Commissioners of the Great Seal do grant him a Commission for Sheriff, in Form usual, accordingly
Resolved, &c. That Colonel Thomas Mitton shall be High Sheriff of the County of Salop; and that the Commissioners of the Great Seal do grant him a Patent accordingly.
Resolved, &c. That Edward Carne, of Ewenny, Esquire, shall be High Sheriff of the County of Glamorgan; and that the Commissioners of the Great Seal do grant him a Commission for High Sheriff, in Form usual, accordingly.
"Resolved, &c. That Sir John Norwich Baronet shall be High Sheriff of the County of North'ton; and that the Commissioners of the Great Seal do grant him a Patent accordingly."
Order for 2000l. for the Forces of Lincoln and Lynn.
"It is this Day Ordained, by the Lords and Commons in Parliament assembled, That Two Thousand Pounds, with Interest for the same, after the Rate of Eight Pounds per Centum, until the Payment thereof shall be paid in due Course (after other Assignments first satisfied), out of the Receipts of the Excise, by Ordinance of the 11th of September, 1643, for Provisions made by an Order of the Commons House of Parliament, dated the 2d of this Instant December, for the Service of the Forces of Lincolne and Lynn, unto Thomas Toll Esquire, a Member of the House of Commons: And it is further Ordained, That if any Person or Persons shall advance and lend the said Two Thousand Pounds, or any Part thereof, that then every such Person or Persons respectively, their respective Executors or Administrators, shall be satisfied and paid the respective Sum or Sums of Money so lent, with Interest for the same as aforesaid, for so long Time as the same, or any Part thereof, shall be unpaid, out of the said Receipts of Excise, in Order and Course aforesaid; and that the Interest for the said Two Thousand Pounds shall be paid to the respective Person or Persons lending the same, or any Part thereof, their respective Executors, Administrators, or Assigns, at the End of every Six Months (from the respective Times of the Advance thereof, or any Part thereof), until the said Two Thousand Pounds and Interest shall be paid, out of the said Receipts of Excise; and the Commissioners of Excise and new Impost are hereby authorized to make Payment of the said Two Thousand Pounds and Interest accordingly; and the Receipt of the said Thomas Toll, testifying the Receipt of the respective Sum or Sums of Money advanced for the Purposes aforesaid, together with the respective Receipt or Receipts of the Person or Persons lending the same, or any Part thereof, their respective Executors, Administrators, or Assigns, shall be a sufficient Discharge to the Commissioners of Excise, and every of them, for Payment of the said Two Thousand Pounds and Interest as aforesaid." | <urn:uuid:4f1e7c4d-2fb3-4640-8ef4-c43afc9f3a61> | CC-MAIN-2017-04 | http://www.british-history.ac.uk/lords-jrnl/vol8/pp39-41 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00451-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.95355 | 3,646 | 1.640625 | 2 |
Jun 10, 2012
How long does a minor cut remain susceptible to HIV infection?
Response from Ms. Southall
Hi Our bodies start instantly to protect open wounds from getting infected. Depending on the size of the cut as long as there no active oozing from the wound then it is safe.
Be well and stay safe, Shannon
Get Email Notifications When This Forum Updates or Subscribe With RSS
This forum is designed for educational purposes only, and experts are not rendering medical, mental health, legal or other professional advice or services. If you have or suspect you may have a medical, mental health, legal or other problem that requires advice, consult your own caregiver, attorney or other qualified professional.
Experts appearing on this page are independent and are solely responsible for editing and fact-checking their material. Neither TheBody.com nor any advertiser is the publisher or speaker of posted visitors' questions or the experts' material. | <urn:uuid:20bdc2be-aa22-403f-95cd-60e637b756af> | CC-MAIN-2016-44 | http://www.thebody.com/Forums/AIDS/SafeSex/Q222890.html?ic=4003 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00127-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.91337 | 190 | 2.25 | 2 |
Publisher synopsis: We think the way we do because Socrates thought the way he did. His aphorism 'The unexamined life is not worth living' may have originated twenty-five centuries ago, but it is a founding principle of modern life. For seventy years Socrates was a vigorous citizen of Golden Age Athens, philosophising in the squares and public arenas rather than in the courts of kings, before his beloved city turned on him, condemning him to death by poison. Socrates lived in and contributed to a city that nurtured key ingredients of contemporary civilisation - democracy, liberty, science, drama, rational thought - yet, as he wrote almost nothing down, he himself is an enigmatic figure. In The Hemlock Cup, acclaimed historian Bettany Hughes gives Socrates the biography he deserves, painstakingly piecing together Socrates' life and using fresh evidence to get closer to the man who asked 'how should we live?' - a question as relevant now as it has ever been. | <urn:uuid:562c18b4-b29f-47e3-b52c-d66abfbe94d3> | CC-MAIN-2017-04 | http://www.mrbsemporium.com/index.php/books/9780099554059/hemlock_cup | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00233-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.965066 | 195 | 3.328125 | 3 |
We talk a lot about mobile optimization for surveys, but we don’t always get into the nitty-gritty of why it’s so important.
Sure, more than 35% of SurveyMonkey respondents are now completing surveys on mobile devices. But how do we know that their experience is any different on a smartphone than on, say, a desktop computer?
Think about all the good and bad experiences you’ve had using your phone’s apps and web browser.
Mobile-optimized actions—like using your map app to find that hot new restaurant—are easy. It probably took just a few taps to get the information you needed.
But when you try to find the dinner menu? You’ve got to use your browser to find the restaurant website, click through tiny text links using your big ol’ finger, and go through several pages before you even find it. Then it’s a matter of pinching in to expand the menu, swiping left, then right, up then down, to view it bit by bit by…
Does that make you want to throw your phone across the room, or at least never visit that website again? That kind of frustration is exactly what we want SurveyMonkey customers to avoid.
Let’s get to the research
For completed surveys, we can measure that frustration in minutes and seconds.
Web surveys collect paradata—information about how the survey was completed—that can provide a lot of insight into the survey experience itself. For example, paradata can tell us what device a survey was taken on and when a survey was begun and completed.
Armed with that data, we know the time it takes to complete a survey on a mobile device compared to how long it takes to complete the same survey on a desktop or laptop computer.
But before we dive into that data, let’s take a look at what the academic literature on surveys says!
Web surveys take longer on mobile devices. Pretty much every published article on this topic agrees, from those in the very early days of web surveys to those examining modern, mobile-optimized surveys. It doesn’t matter if respondents were randomly assigned to use a particular device or allowed them to use whichever they prefer—mobile just takes longer.
Sometimes they can take a lot longer. Most studies find that surveys completed on mobile devices take about 50% longer than those on PCs. Some found that this could be as much as 2 or 3 times longer.
Scrolling is the culprit. Couper and Peterson (2016) propose several possible reasons for why surveys take longer on mobile, including:
- Slower connection to the server on cellular networks compared to high-speed internet
- A worse user experience reading and responding to questions on a small screen
- More distractions for users who are responding on-the-go.
Importantly, they find evidence that the biggest time drag for mobile surveys comes from something that survey designers actually have some control over: the survey-taker experience.
Matrix questions are particularly problematic. Their dimensions often force respondents to scroll both up and down and left and right, and the smaller screens of cell phones make this problem even worse.
SurveyMonkey findings and recommendations
Does SurveyMonkey data back that up? Yep.
Our Research team ran a survey where we asked more than 3,000 SurveyMonkey Audience respondents in the U.S. 21 very straightforward questions (including one 5-question, 5-response option matrix question) 1 open-ended question, and 1 question that included images.
We found that respondents who completed the survey on a mobile device took 11% longer than respondents who completed the survey on a computer (6.28 minutes to 7.01 minutes).
So, what does this mean for you the next time you’re designing a survey?
- Consider alternatives to matrix questions. They cause the most delays with scrolling and resizing.
- Including images or videos can make your survey take extra time to load for respondents who are answering on their phones on-the-go.
- Test your survey on different devices (PC, Android phone, iPhone) to see how different questions show up.
- Keep your survey short, as mobile respondents are more likely to drop out as it takes them more time to complete.
Check out our other resources for mobile surveys, such as:
Couper, M., & Peterson, G. (2016). Why Do Web Surveys Take Longer on Smartphones? Social Science Computer Review, 1-21. ()
Questions, comments for Laura? Let her know below! | <urn:uuid:8af37f86-648f-42b6-b51a-00039b74da21> | CC-MAIN-2017-04 | https://www.surveymonkey.com/blog/2016/04/04/why-do-surveys-take-longer-on-mobile/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00331-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.933614 | 953 | 1.515625 | 2 |
You are here
CANTON, Mass. -- This New Year's Eve, Cumberland Farms is making it a little easier for its customers to say so long to 2007 and hello to 2008 by giving away free cups of coffee from 5 p.m. on New Year's Eve until 5 a.m. on New Year’s Day.
The free coffee is available at all the company's stores across the Northeast and Florida, except for those with Dunkin' Donuts service. The chain said it is encouraging drivers to take advantage of this community service, as fatigue on the road is a dangerous issue. The National Sleep Foundation said the combination of caffeine and naps is one of the best ways to help fight drowsiness, which it cites as a leading cause of accidents.
"We want to thank our customers this holiday season," Ari Haseotes, vice president of marketing for Canton, Mass.-based Cumberland Farms, said in a statement. "The goal of our free coffee program is to help them stay alert, and keep safe on the roads."
Cumberland Farms' network of retail stores, gas stations and a support system, including petroleum, dairy and grocery distribution operations, spans 11 states across the Northeast and Florida, making it the largest c-store/petroleum marketer in the region. | <urn:uuid:1204956e-e484-4689-b459-f8a0d03fb1f7> | CC-MAIN-2017-04 | http://www.csnews.com/swapping-champagne-coffee | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00090-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.941648 | 271 | 1.570313 | 2 |
The best way to find out whether you have bad breath or not is to sniff your own breath after cupping your mouth with your hands. There’s another easy self-test.
Just lick your wrist and smell it after a few seconds when it has dried.
Well, blame it on Poor dental hygiene, Dental caries, Dry mouth, Certain foods like onion and garlic, Smoking, Gum diseases, Oral thrush, Dentures, Sinus and other respiratory tract infections.
Eat aromatic spices
The simplest one could be to eat aromatic spices such as cloves, fennel, cardamom, etc. to refresh your breath, especially after having an odorous meal.
Cinnamon water in a pan
Take a cup of water in a pan. Boil 1 teaspoon of cinnamon powder in it. You can also add bay leaves, which is also known as tej patta and cardamom (elaichi). And use this solution as mouth wash.
Fenugreek Seeds Home remedy
Take a cup of water in a pan. Boil 1 teaspoon of fenugreek seeds in it. Finally, strain this solution and drink this fenugreek tea. This will help you eliminate your bad breath caused by catarrhal infections.
Few more tips:
- You can also chew parsley leaves or have a cup of strong mini tea to combat bad breath, or
- Take a daily dose of yogurt, it helps keep this problem at bay. | <urn:uuid:dfebe0f4-83bf-4e1b-8681-9e69d82bf926> | CC-MAIN-2017-04 | http://www.wellmindness.com/home-remedies-for-bad-breath-halitosis/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00486-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.935966 | 305 | 2.453125 | 2 |
How Postman and Google Cloud Build helps you ship Cloud Functions faster!
A Google Cloud Function is a Function-as-a-Service (FaaS) which runs with zero server management. What serverless really means is that as a developer, you can write and deploy code without the hassle of managing the underlying infrastructure. Instead of running an over-provisioned server infrastructure, you’re just running a piece of code. Yeah, we are really living in the future now!
In an agile development environment, small teams work autonomously and add a lot of churn to the codebase. Each developer works on different aspects of the project and commits code frequently. This is a healthy practice, but to minimize manual scrutiny and redundant communication across teams, we need to invest in automating CI/CD processes. This is exactly the point where Postman and Cloud Build helps to ship cloud functions faster with quality in a team space.
Let’s start with the checklist.
Google Cloud Platform
Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products. You can signup with the Free Tier if already haven’t. You will get $300 credit and access to 20+ GCP products for the first year. Pretty decent!
Postman is a collaboration platform for API development and testing. The features are designed in a way to enable you to deliver better APIs faster. In our case, we will be testing the deployed cloud functions using its command-line collection runner, called Newman. You can get the latest version of the Postman or try their latest web version. Believe me, Postman’s free tier is a real gem!
Google Cloud Build
Cloud Build is a service that executes your builds on Google Cloud Platform infrastructure. Once you get access to the GCP console, you get the access for Cloud build automatically. It basically resembles the nature of any CI/CD tools available in the market (like CircleCI, Travis, etc). While it is lagging behind in the UI features from the competitors, it has a definite edge over the pricing. Surprisingly, it provides you 120 build minutes free per day. If your other infrastructure is already based on GCP, Cloud Build probably the best option to look at.
You will also need the CLI tool called GCloud.
Now, if you already have ticked the items in the checklist, let's start the real game.
You should check out this Github repository where I have designed a sample cloud function and added a postman collection to test it. I will use heavy references from this repository.
Create your first project in GCP
Google Cloud projects form the basis for creating, enabling, and using all Google Cloud services including managing APIs, enabling billing, adding and removing collaborators, and managing permissions for Google Cloud resources. You can easily create your first project following these steps. Once the project is created, your dashboard will look similar to
Let's define our API
I am going to use NodeJS environment to build my backend. Specifically, I am using ExpressJS as a Middleware that has access to the request object (
req), the response object (
res). If you are not familiarized with ExpressJs, it is a light-weight web application framework to help organize your web application into an MVC architecture on the server-side. So, this is what the Application-Level-Middleware (app.js)looks like for my sample project.
Once the middleware is defined, let's define the routes. Again, I am using Express as Routing-Level-Middleware here.
So, we have explicitly set a
portfolio to get specific data. Now, this is the time to run it locally and check there is no glitches. If you already cloned the template project, you just need to hit the below commands
# install dependencies
> npm i# run the local server to host the backend
> npm start
It should listen to the port
8081 in your
localhost . So, if you navigate to
http://localhost:8081/api/portfolio , you should be able to receive the data returned by the API.
Create unit tests
Unit tests are really important to test the service in isolation by mocking out the dependencies. I have used
chai-http to construct the mocks and call the middleware.
To execute the tests, hit the below command:
npm run test:unit
Tests are passing! Yahoo! You achieved all the success in the world! just kidding, we haven’t started the fun part yet. Kick start your Postman to write some dope system level API tests.
Create a collection using Postman
Once the service is running in your localhost, it’s a better idea to develop solid API tests. These tests will be handy to check the functionalities post-deployment. Fire up the Postman client.
- First of all, I created an
Environmentand store the localhost as
- I created a
- Added a
Get requestin the Collection and used the
urlparam defined in the
- Defined a few tests using intuitive
pmhelper provide by
- Finally, hit the request and verify the run results
See how easy it is to write API tests, no hasstle of maintaining your own API framework! Postman is fun as always!
Once you are happy with your collection,
Export the collection along with the environment. Store it in a folder in your code repository. You probably noticed, we have a step in our
package.json to test the collection locally.
So, here we are using Newman to run the collections. Notice how we are setting the
url param dynamically with an environment variable called
URL . Post-deployment, we can easily swap
URL with a hosted URL.
Now we are ready to move to the Cloud! Give me a high-five.
Deploy the Cloud Function from the local machine
Once you are satisfied with your local development, you can make use of
gcloudCLI tool to deploy the cloud function. It sounds fancy and complex, but it’s a matter of a single command. hail, Google!
gcloud functions deploy myWebsiteBackend --trigger-http --runtime nodejs10
I named my function as
myWebsiteBackend . You need to choose a couple of options like the region and IAM access. For keeping things simple, provide anonymous access to the deployed function. Should be good for testing out stuff! If you move to the
Cloud Function console in GCP, you can see the function is already deployed.
Don’t forget to grab the hosted URL of the cloud function. We need it later.
Create the Cloud Build configuration
CI/CD enablers always provide you the ability to configure the build, test, and deploy steps. Cloud Build is no different. Here you need to create a YAML/JSON configuration file to store the desired steps. Here is how our configuration file looks like:
Basically, we are telling Cloud Build to
install the dependencies first, followed by the deployment of the
Function. once the deployment is completed, it will fire up the Postman tests automatically. I know, you already noticed we are setting the
env URL dynamically. We will set the substituted value when we set the trigger — the most fun part.
Setup the Trigger for Cloud Build
We now have what we need to make the process automated. Cloud Build is so smart that it can easily identify whether a new commit has been pushed to the Github repository or any pull request is merged. This ability enables it to trigger a new build on the incoming event. Let’s set a new trigger.
- Go to your GCP console and select the
Cloud BuildTrigger from the side menu.
- Create a New Trigger
- Select the Github Repository and explicitly select the Cloud Build configuration
- Now, provide the
user substitutionvariable value. Provide the hosted URL as :
- Save the trigger
You are all set now
It’s time to verify everything is working. Update a file in the repository, and push a commit. It should trigger the event of re-deploying the cloud function and test the function with Postman collections.
Send the Build notification to Slack
Cloud Build can notify you of updates to your build status by sending you notifications to desired channels. Cloud Build sends all build status updates, along with build metadata, to Pub/Sub on the
cloud-builds topic. Cloud Build notifiers can be configured to listen to that topic, filter the messages it receives, and send messages to your service. Setting up Slack notifications is not straightforward though. You need to follow a number of steps to get it done. I have added a sample slack.yml configuration file to help you out in your journey. Once the configuration is done, you get the build notification directly on your favorite channel.
Phew! We have come a long way. The serverless CI/CD is still walking on the path to maturity. But, selective tooling and approaches can help us deliver robust cloud functions with quality. I hope you’ve enjoyed the journey. | <urn:uuid:ef064a20-c5a4-4eee-92ae-5f4347ecd2b0> | CC-MAIN-2022-33 | https://abhinaba-ghosh.medium.com/how-postman-and-google-cloud-build-helps-you-ship-cloud-functions-faster-cbfd4c424bac?source=post_internal_links---------4---------------------------- | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00476.warc.gz | en | 0.880325 | 1,984 | 1.828125 | 2 |
Homebuyers and sellers have blamed solicitors more than estate agents for delays during the conveyancing process, according to research published by the Office of Fair Trading.
The consumer watchdog published four reports undertaken as part of its market study into home buying and selling. One showed that most consumer complaints concerned the individual on the other side of the transaction or their solicitor, rather than the estate agent involved.
Overall, 255 sellers were interviewed. Of the 108 who said they experienced delays in the process, 20% blamed their own or the buyer’s solicitor, with poor communication cited as the main cause. They blamed buyers in 39% of cases.
In general, satisfaction levels with the service provided by solicitors and estate agents were evenly matched; 89% were satisfied with their solicitor and 88% with their estate agent.
Peter Rodd, chairman of the Law Society’s property section, said: ‘Solicitors are often the ones in the process who have to break bad news to the client when things have gone wrong, whereas estate agents are able to be more positive.’
He added that the Law Society is developing its own internet portal to bring about electronic exchange of contracts to speed up the process.
Richard Barnett, chairman of the Law Society’s conveyancing and land law committee, said: ‘If it is the client’s perception that it is the solicitor’s fault, that does not mean solicitors are to blame – it could be that the blame is wrongly being put on them by others.’
The OFT will publish a full study on improving the buying and selling process in early 2010. | <urn:uuid:7c37d77c-a252-4ab8-a3ae-26fcff467575> | CC-MAIN-2017-04 | https://www.lawgazette.co.uk/53222.article | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00556-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.975961 | 337 | 1.53125 | 2 |
Solar energy reaches major milestone in New MexicoFebruary 8, 2013
Economic prospects of solar energy may be on display in the US
Though solar energy has become popular in the U.S., its widespread adoption has been stymied by the issue of cost. Photovoltaic solar panels have, in the past, been expensive pieces of technology. The cost of these energy systems has been falling rapidly however, due to advances in technology and a massive abundance of supply throughout the world. With the cost of solar energy technology plummeting, this form of alternative energy is becoming much more viable than it had been in the past.
Solar energy is cheaper than coal
New Mexico is one of the first states in the U.S. to show the economic potential of solar energy. The state will, for the first time, purchase electricity generated by solar energy for a lower price than that derived from coal. El Paso Electric, one of the southwest’s major utilities, has agreed to purchase this energy from First Solar. The energy is being generated by the company’s Macho Springs solar energy project, which is capable of producing up to 50 megawatts of electrical power.
Clean energy may finally be competitive with fossil-fuels
El Paso Electric will purchase solar energy from First Solar at $5.79 per kilowatt-hour, less than the $12.80 per kilowatt-hour price for electricity produced through the use of coal. The deal represents the lower solar energy purchase agreement in the U.S. and shows that solar energy can actually be priced competitively with traditional forms of power. This agreement may serve as a powerful example that alternative energy is not as far-fetched of an idea as skeptics may believe.
US solar energy to account for 10% of global market in the future
The U.S. solar energy market is growing quickly, largely due to the support that the federal and state governments have been showing for this forms of clean power. Recent analysis from GTM Research suggests that the U.S. will account for 10% of the global solar energy market in the near future. This may be good news for the U.S. energy industry, which has been working to recover from the numerous challenges it had been faced with in 2011 and during the early months of 2012. | <urn:uuid:2ce86a29-4b98-4891-b468-19949afefccd> | CC-MAIN-2022-33 | https://www.hydrogenfuelnews.com/solar-energy-reaches-major-milestone-in-new-mexico/858745/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00675.warc.gz | en | 0.96406 | 469 | 2.59375 | 3 |
+ Reply to Thread
Results 1 to 5 of 5
Thread: Potatoes in the Shade
- 18-03-2008, 08:23 PM #1Seedling
- Join Date
- Nov 2006
Potatoes in the Shade
Running out of space to plant anything and all I have left is under trees in partial shade.
Does anyone know if potatoes need full sun or will they be OK?
cheersBefore you criticise someone, you should walk a mile in their shoes.
That way, when you criticise them, you're a mile away and you have their shoes.
- 18-03-2008, 10:28 PM #2
I think I posted this about two weeks ago but my veg patch is tree shaded in part. Last seasons spuds were definately poorer nearer the trees, less foliage and poorer yield. It could also be that the trees were taking nourishment and moisture out of the ground and starving the potatoes.I you'st to have a handle on the world .. but it BROKE!!
- 19-03-2008, 11:40 AM #3Seedling
- Join Date
- Jul 2007
- Maldon, Essex
I grew potatoes in containers last year and found they did grow in the shade but did much better in the sun when I moved them.My organic gardening etc blog - http://thecornflake.blogspot.com
- 20-03-2008, 08:16 PM #4
I think the trees will take too much water and nutrients from your potatoes. Have you got anywhere else you can put them? Even in a pot?
All gardeners know better than other gardeners." -- Chinese Proverb.
- 20-03-2008, 10:36 PM #5Sprouter
- Join Date
- Mar 2008
- Co Kerry, Ireland
I have a raised bed about seven feet away from a twenty feet high Leylandii hedge. The hedge is to the South-west of the bed, but doesn't actually overhang it. I dug a trench about 18 inches deep between the hedge and the bed, and I've successfully grown potatoes, celery, onions, lettuce and beetroot in that bed. Every year it gets heavy dressings of good garden compost (and NO artificial fertilizer). The only extra attention it gets is lots of watering. Hereabouts the prevailing winds are from the South and West, and the hedge shelters the bed from most of the rain.
- By BUFFS in forum Vegging OutReplies: 11Last Post: 27-07-2010, 09:32 PM
- By glut in forum The Herb BedReplies: 3Last Post: 27-03-2009, 03:04 PM
- By Tigerella in forum Allotment AdviceReplies: 3Last Post: 05-04-2008, 06:52 AM
- By margotay in forum The Herb BedReplies: 9Last Post: 31-03-2008, 09:34 PM
- By peanut in forum New ShootsReplies: 2Last Post: 01-05-2007, 07:54 PM | <urn:uuid:db8d0423-b13e-44e5-9589-1b97fa03dfd2> | CC-MAIN-2016-44 | http://www.growfruitandveg.co.uk/grapevine/vegging-out/potatoes-shade_14150.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00283-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.921318 | 647 | 1.914063 | 2 |
The last issue of Smithsonian Magazine had a fascinating article on Dwight Eisenhower in the days before D-Day. There is only an excerpt of the article up online, but most public libraries will have the full magazine for you to read from (I personally subscribe to the magazine). The article is also only an excerpt of a book by Michael Korda called Ike: An American Hero so if this is a topic you enjoy, you can find lots more on it.
What I found interesting about this article is how it talked about how the decision was made to go forth with the D-Day invasion and what helped the Allies out (the article quotes Napoleon saying that he liked lucky generals and luck was with Ike in June of 1944). The Allies had better weather radar and could tell that the weather would clear on June 6th, while the Germans, who did not, thought the bad weather would continue, meaning they were caught unprepared. The original assault was planned for June 5th, but moved back due to bad weather. This was a major decision as it meant 24 more hours for the Germans to find them and it was hard on the soldiers, who were already on the ships.
When the time for the decision about the 6th to be made, Eisenhower listened to his commanders, but it was completely his decision. In preparation on the 5th for the invasion the next day, he even wrote out what he would tell the news if the landing failed and in it he took full responsibility for the failure, "If any blame or fault attaches to the attempt it is mine alone." (55) He spent a lot of the day with VIPs, but in the afternoon went out to visit the airborne troops. The causality rate for this group was predicted to go as high as 80%, but Ike believed that an airborne strike was paramount to success. Kay Summersby remembers that Ike told her after talking with these men that, "It's very hard really to look a soldier in the eye...when you fear that you are sending him to his death." (58) An American correspondent reported seeing tears on Ike's face as the C-47s rolled down the runways.
Ike's gamble paid off and after about three hours (the demolition of underwater mines started at 6:30 AM), he had his press aide announce that landings were underway in France and the Allied countries (even Stalin) rejoiced. The airborne causalities were not even as high as expected, but did prove to be critical in success. Of the 23,000 airborne troops, about 3700 were lost (58). | <urn:uuid:4e4dd227-4a92-4869-b38d-71bc41c98b39> | CC-MAIN-2017-04 | http://www.american-presidents.org/2007/12/ike-at-d-day.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00123-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.991141 | 523 | 2.421875 | 2 |
When British archaeologist Howard Carter cracked open King Tutankhamun’s tomb in 1922, he reported seeing „great issues.“ Tut’s tomb was full of extraordinary treasures, together with the golden dying masks of Tutankhamun, a golden throne and even gold sandals. However did all royal tombs in historical Egypt have such plush grave items?
The reply is not any. Whereas the Nice Pyramid of Giza and different historical Egyptian pyramids are unimaginable monuments, the burial items inside them had been possible comparatively modest in contrast with these buried within the tombs of later pharaohs, similar to Tutankhamun.
„The burials within the largest pyramids may need regarded fairly easy compared to Tutankhamun,“ Wolfram Grajetzki, an honorary senior analysis fellow at College Faculty London within the U.Okay. who has studied and written extensively about historical Egyptian burial customs and burial items, advised Dwell Science in an e-mail.
Pyramids had been used as Egyptian pharaohs‘ tombs from the time of Djoser (reign circa 2630 B.C. to 2611 B.C.) to Ahmose I (reign circa 1550 B.C. to 1525 B.C.). Most of those pyramids had been plundered centuries in the past, however a couple of royal tombs have remained comparatively intact and supply clues about their treasures, Grajetzki mentioned.
Associated: Who constructed the Egyptian pyramids?
As an example, Princess Neferuptah (who lived round 1800 B.C.) was buried in a pyramid on the web site of Hawara, round 60 miles (100 kilometers) south of Cairo. Her burial chamber was excavated in 1956 and „contained pottery, a set of coffins, some gilded private adornments and a set of royal insignia that establish her with the Underworld god Osiris,“ Grajetzki mentioned.
King Hor (who lived round 1750 B.C.) was buried with the same set of objects, though he wasn’t buried in a pyramid, Grajetzki mentioned. „The physique of [Hor] was wrapped in linen, the entrails positioned into particular containers, referred to as canopic jars,“ Grajetzki mentioned. „His face was coated with a mummy masks.“
The tomb of Queen Hetepheres, the mom of Khufu (the pharaoh who constructed the Nice Pyramid), is a little more elaborate. Constructed at Giza, the tomb had a mattress and two chairs that had been embellished with gold, together with pottery and miniature copper instruments, Grajetzki wrote in an article revealed in January 2008 within the journal „Heritage of Egypt.“
The substructure (the decrease half) of the unfinished pyramid of King Sekhemkhet (circa 2611 B.C. to 2605 B.C.) was discovered unrobbed at Saqqara, Reg Clark, an Egyptologist who’s writer of the e book „Securing Eternity: Historic Egyptian Tomb Safety from Prehistory to the Pyramids“ (American College in Cairo Press, 2019), advised Dwell Science in an e-mail. The king’s sarcophagus was empty, however archaeologists did discover „21 gold bracelets, a golden wand or sceptre and varied different objects of gold jewelry“ in a hall, Clark mentioned. Whereas these are spectacular burial items, they do not come near the riches present in Tutankhamun’s tomb.
The artifacts present in these royal burials recommend that pharaohs entombed in pyramids had been most likely buried with grave items that had been extra modest than these discovered buried with Tutankhamun, Grajetzki famous. Not like the early pharaohs, Tutankhamun’s tomb was positioned within the Valley of the Kings — a distant valley close to modern-day Luxor that was used as a royal burial web site for over 500 years through the New Kingdom, based on Britannica.
„This doesn’t imply that he [Khufu] was poorer [than Tutankhamun]. His pyramid proves the other. He was simply buried following the customs of his day,“ Grajetzki wrote within the article.
Giant treasures have not been found in any of the recognized Egyptian pyramids. „There have been no giant ‚treasures‘ within the pyramids, like within the tomb of Tut,“ Hans-Hubertus Münch, a scholar who has researched and written about historical Egyptian burial finds, advised Dwell Science in an e-mail. As well as, no tomb containing huge quantities of lavish grave items has been discovered relationship to earlier occasions when pyramids had been constructed, Münch mentioned. He famous that through the New Kingdom (circa 1550 B.C. to 1070 B.C.), a time when pyramid constructing ended, the quantity of lavish grave items buried with royal and non-royal people elevated.
Throughout the New Kingdom, individuals, if that they had the power, tried to place giant numbers of ornate objects of their tombs. „This huge mass of objects in tombs is barely an invention of the New Kingdom,“ Münch mentioned. Why precisely they wished to do that just isn’t solely clear.
Whereas the burial items contained in the pyramids had been modest in contrast with later historical Egyptian tombs, a few of the pyramids had prolonged hieroglyphic inscriptions on their partitions, which students at the moment name the „pyramid texts.“ The texts file a lot of „spells“ (as Egyptologists name them) and rituals.
The pyramid of Unis or Unas (reign circa 2353 B.C. to 2323 B.C.) was the primary pyramid to have these texts on its inside partitions, whereas the pyramid of Ibi (reign circa 2109 B.C. to 2107 B.C.) was the final recognized case, James Allen, an Egyptology professor at Brown College, wrote within the e book „The Historic Egyptian Pyramid Texts“ (Society of Biblical Literature, 2005).
The operate of the pyramid texts „was to allow the deceased to grow to be an akh,“ a spirit that exists within the afterlife, Allen wrote. The spells aimed to reunite the „ka“ and „ba“ — components of an individual’s soul that the Egyptians believed had been separated at dying.
The looks of those texts „most likely displays a shift or innovation within the historical Egyptians‘ concepts of the royal afterlife,“ Allen advised Dwell Science. In earlier occasions, paperwork just like the Pyramid Texts could have existed, however, for no matter motive, they began being written on the pyramid partitions within the time of Unis.
Initially revealed on Dwell Science. | <urn:uuid:5cb6878a-e2f1-4b1b-838f-7791943e59c9> | CC-MAIN-2022-33 | https://www.thegreatturning.net/what-did-historical-egypts-pharaohs-stash-contained-in-the-pyramids/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00666.warc.gz | en | 0.940941 | 1,467 | 2.796875 | 3 |
Nora laughed, threw him a friendly nod, and vanished up the steps of the Bodleian.
Poets, in the Bodleian, says that the second edition was in 8vo.
During his leisure at Oxford he collected material at the Bodleian and college libraries for his books.
One of these, from the Bodleian Library, is here figured (fig. 79).
A second edition of them both seems from the Bodleian Catalogue to have been published in 1664.
This library—now the central portion of the Bodleian—had been completed about 1480.
The old Keeper of the Bodleian was a crusty bachelor, who liked nothing young but calf, and preferred morocco to that.
Mr. Blades mentions a white book-worm, slain by the librarian of the Bodleian.
But there it seems to have stopped, for the Bodleian does not contain any volumes traceable to this source.
There is not one either in the Bodleian or the British Museum.
from Sir Thomas Bodley (1545-1613), who in 1597 refounded the library at Oxford University. | <urn:uuid:c4b7742c-7a5e-4344-aaaf-bc94ce8086bb> | CC-MAIN-2017-04 | http://www.dictionary.com/browse/bodleian | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00301-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.958364 | 244 | 1.539063 | 2 |
In this article, we will cover what the Ethereum platform is, how to trade Ethereum, and what technology is on the Ethereum platform.
Ethereum is a crypto platform like Bitcoin. It uses the proof of work protocol to add blocks to the blockchain. It is also a payment protocol.
Yet, it is capable of much more. Ethereum also uses smart contracts for application development. This technology will allow developers to rent computing power from miners on the blockchain.
Trading Ethereum requires traders to research and analyze different crypto exchanges to determine the best investment strategy.
What Is Ethereum?
Vitalik Buterin created the Ethereum crypto platform. It is the second biggest cryptocurrency behind Bitcoin. It is a currency but also a platform where developers can use decentralized computing power to create applications.
The Ethereum platform employs smart contracts using blockchain technology. Crypto miners rent out their resources to developers for a gas fee. Developers and businesses pay ether (Ethereum’s main currency) to Ethereum miners.
There are many nodes across the Ethereum blockchain. It is the most decentralized crypto in existence. This means that there is much computing power available to developers to create decentralized apps or dApps.
Ethereum’s initial coin offering (ICO) raised $18 million in 2014. It has been live since 2015.
The Difference Between Bitcoin and Ethereum
Bitcoin is only a payment protocol. Users and traders can sell or buy bitcoin for purchasing goods or services, or they could trade and invest coins to get short or long-term returns.
Ethereum can do the same, but its potential lies in its use of smart contracts for app development. Though how to trade Ethereum is similar to Bitcoin.
Bitcoin uses the proof of work mining method. Miners use their dedicated hardware to solve complex problems to add more blocks to the blockchain. This requires lots of resources, namely electricity, due to the hardware.
They receive coins as a reward, depending on how complex the problem was. Many companies and individuals created mining farms to get the most out of the proof of work method.
Ethereum, on the other hand, will soon implement the proof of stake method for mining. It does not require any dedicated hardware because it is virtual. There are validators in place of miners. Validators need to put up some of their Ethereum currency (ether) as a stake. Accordingly, they bet on whether a block will be validated and added to the blockchain.
When a validator bets on a valid block, they get rewarded based on the amount of ether they invested in that block.
For now, Ethereum will mainly use proof of work, but every 100th transaction will be proof of stake. Validators choose which blocks to bet on, so it lowers the cost involved with adding more blocks to the chain.
Additionally, validators put up their own ether, so there are low odds for a validator choosing a malicious block. This removes the chances of a 51% attack, where a single group owns most of the world’s hashing power.
What Are Smart Contracts?
Nick Szabo coined the term smart contracts in 1994. Smart contracts are programs that developers write on a blockchain. They are not essential to learning how to trade Ethereum, but developers and businesses can use these programs to define contractual obligations between parties.
It runs on the blockchain, so validators check instructions and conditions of a smart contract, and these are accepted or rejected across the nodes on the platform.
Furthermore, these contracts, once executed, cannot be edited or rolled back. This means that developers and businesses only need to write the program, and it validates and executes by itself.
For example, if a tenant signs a rental agreement using a smart contract, they need to meet the conditions set out by the smart contract. These could be credit rating or monthly income. If they meet these conditions set by the agency or landlord, they could sign the rental agreement.
The entire process is on the blockchain, so there would be no long waiting times for approval from a centralized system like a bank.
Developers use a programming language called solidity. It is based on the IFTTT logic, which follows the IF-THIS-THEN-THAT order of instructions.
To illustrate, if the tenant has enough monthly income, then the smart contract can check the tenant’s credit rating. If that checks out, the agreement is valid. Developers can add many instructions or conditions to this logic. The smart contract will validate and execute these until the end of the contract.
What Is Ether?
Ether is the name of Ethereum’s main currency. It functions as a mode of payment, a store of value, a reward for miners, and staking for validators in the future. It is important to know ether if you want to know how to trade Ethereum.
Ether is a decentralized (not fiat) currency. Therefore, a single institution or economy cannot control it.
Unlike traditional stock markets, crypto markets have no closing times for trading. They remain open 24/7 because there are hundreds of exchanges that allow ether trading and investment.
Cryptocurrencies are volatile on exchanges. They encounter daily price fluctuations, so they provide an opportunity for day traders to receive short term returns on their coins.
Smart contracts also use ether to meet contractual conditions. Developers or businesses that create smart contracts need to pay gas fees to execute their conditions or instructions. They set a gas limit before submitting the contract to miners. If the gas limit is not enough to pay for the contract, it cancels all previous instructions, and the developer needs to pay the miners’ gas fees.
Additionally, developers set a gas limit, but their code (instructions and conditions) might require more computing power than they anticipated, so miners might reject their contract or pass over it. That is why developers need to take care when setting their gas limits.
How To Trade Ethereum
Like with most cryptocurrencies, traders and investors can use two general trading strategies. These are long term positions called holding, and short-term positions called active trading. Each has its advantages and disadvantages but have the potential for providing investors and traders with significant returns on investment.
Traders just learning how to trade Ethereum can use a holding strategy. Traders and investors purchase coins (usually Bitcoin or Ether) and wait for them to increase in value over a longer period. They work on the assumption that coin values will trend upwards, providing them with long-term returns.
Holding saves time and effort. Investors do not need to conduct too much research about the exchange they use or the trends in the market. This is because they are not concerned with daily price rises or drops.
Another advantage is that investors and traders do not need to pay heavy fees for conducting trades. This means that they pay for having their coins on the exchange and transaction fees when exiting the market.
A major disadvantage of holding is that investors and traders cannot gain returns on short term price fluctuations.
Accordingly, investors need to research the appropriate coins to invest in because their entire stake is based on the coin’s long-term performance. They do not need to research minute details, but they should at least choose a reputable and upward trending cryptocurrency (Ether or Bitcoin).
Investors and traders need to know when to exit the market to maximize their profits. They need to determine when to sell, how to sell, and how much to sell depending on the coin.
2. Active Trading
Investors and traders who know how to trade Ethereum and other cryptocurrencies can use active trading. They need to know how to analyze and monitor individual crypto exchanges and cryptocurrencies. They attempt to profit off volatile price fluctuations by short selling or buying the dips and selling the rips.
Therefore, investors and traders need to know how to trade Ethereum during price movements and market trends. They also need to pay attention to market cycles to ensure optimal return on investment.
Short-term returns are a clear advantage for traders. Due to the volatile nature of cryptocurrencies, they could see large profits in a matter of days or weeks. They can short sell their coins, which entails loaning coins from a broker and immediately selling them. They then buy back the coins at a lower price and return them to the broker. The trader pockets the difference.
They could also buy coins when the market is in a downward trend and sell them when the market is trending upwards again. The value of the coin increases during the upward trend, so the trader profits from the price increase.
Ethereum is a crypto platform that functions as a payment protocol and as a decentralized technology with the ability to power software applications virtually.
It has the most nodes of any crypto platform, which means that developers and businesses can rent powerful resources straight from the blockchain with smart contract implementation.
Finally, traders need to learn how to trade Ethereum by either employing a holding or active trading strategy. | <urn:uuid:029d1c57-2aaa-49b2-a363-80a3ad8a7d44> | CC-MAIN-2022-33 | https://blog.bc.game/how-to-trade-ethereum/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00070.warc.gz | en | 0.937988 | 1,825 | 2.515625 | 3 |
At the Terry Road Pawn Shop in Jackson, military-style long guns don’t stay in the cases long. What’s more, it has become increasingly difficult during the last few months for owner Kevin McDonald to stock his shop with auto-loading rifles such as AR-15s and SKSes.
“The demand has gotten so high, I don’t think the manufacturers can make them fast enough to keep everybody supplied,” McDonald said. “Often when we get them, we go ahead and sell them online because we can sell them at retail price or better.”
Mississippi apparently is not immune to the national surge in gun sales in response to the election of Democratic President Barack Obama and widespread speculation over a possible reinstated federal ban on assault weapons, based on the latest Federal Bureau of Investigation statistics.
FBI gun checks, an indication of gun sales because they are required for purchases, numbered more than 181,000 in the state 2008 – the highest yearly total since 1999.
“The people in Congress and the presidential administration are too wishy-washy (on gun control). There is a perception there will possibly be a ban on guns like when (former President Bill) Clinton was in office,” said Randy Reeves, owner of Randy’s Sporting Goods in Oak Grove. “At the present, people are buying all the guns they can get their hands on and all the ammo they can get their hands on.”
Reeves estimated his sales have shot up 50 percent in the last six months. Read more
Source: The Clarion-Ledger | <urn:uuid:6f63943a-2904-4a79-bc09-c0937a056208> | CC-MAIN-2016-44 | http://www.gundigest.com/gun-rights/gunrights_042709_gunsalesrise | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717954.1/warc/CC-MAIN-20161020183837-00509-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.96337 | 334 | 1.539063 | 2 |
Supplementary MaterialsDocument S1. both G2/M and G1/S transitions are clogged. G2/M transition is repressed by AZD7762 distributor maternal Nanos through suppression of Cyclin B production. However, the molecular mechanism underlying blockage of G1/S transition remains elusive. We found that repression of miR-10404 expression is required to block G1/S transition in pole cells. Expression of miR-10404, a microRNA encoded AZD7762 distributor within the internal transcribed spacer 1 of rDNA, is repressed in early pole cells by maternal mRNA, which encodes an inhibitor of G1/S transition. Moreover, derepression of G1/S transition in pole cells causes defects in their maintenance and their migration into the gonads. Our observations reveal the mechanism inhibiting G1/S transition in pole cells and its requirement for proper germline development. (Asaoka-Taguchi et?al., 1999, Fukuyama et?al., 2006, Juliano et?al., 2010, Kalt and Joseph, 1974, Seki et?al., 2007, Su et?al., 1998), its regulatory mechanism is poorly understood. It has been reported that Nanos (Nos) protein produced from maternal mRNA inhibits G2/M transition in pole cells by suppressing translation of maternal (((in pole cells causes their failure to migrate properly into the gonads, and AZD7762 distributor their elimination in embryos, implying the importance of the cell-cycle quiescence in germline development. Considering that cell-cycle quiescence is a common feature of germline development among animals (Nakamura and Seydoux, 2008), our results give a basis for understanding the importance and system of cell-cycle quiescence in germline advancement. Results and Dialogue miR-10404 Expression Can be Inhibited by Maternal in Early Pole Cells A earlier electron microscopic research revealed that recently shaped pole AZD7762 distributor cells absence nucleoli in the blastodermal stage, whereas all of those Rabbit polyclonal to TPT1 other somatic nuclei possess prominent nucleoli (Mahowald, 1968). To look for the embryonic stage of which pole cells start nucleolar development, we performed immunostaining to identify fibrillarin, a nucleolar marker. We discovered that nucleoli had been undetectable in pole cells at stage 4C5 (Numbers 1A and 1E), at the same time when they had been seen in all somatic nuclei (Figure?1A). In pole cells, nucleoli began to form at stage 6C7 (Figures 1B and E) and became detectable in almost all pole cells by stage 8C9 (Figure?1E). This is compatible with the observations that pre-rRNA transcription can be faintly observed in newly formed pole cells at stage 4 and is subsequently upregulated in these cells at stage 5 (Seydoux and Dunn, 1997), whereas it is detected in all somatic nuclei from stage 4 onward (Falahati et?al., 2016, Seydoux and Dunn, 1997). Thus, nucleolar formation is delayed in pole cells relative to somatic cells and is initiated following pre-rRNA transcription. Open in a separate window Figure?1 Derepression of Nucleolar Formation and miR-10404 Expression in (A and B) and (blue) and and and gene. is encoded within the ITS1 region encompassed by the 18S and 5.8S rRNA genes. Nucleolus (gray), gene (red), and rRNA genes (green) are shown. (G) Relative expression level of miR-10404 in pole cells and whole AZD7762 distributor embryos derived from (control) and (mRNA in control and mRNA and is represented as a log2(fold change) relative to the level of miR-10404 in controls. Error bars indicate standard errors of three biological replicates. Significance was calculated between control and mRNA is localized in pole plasm to produce the Pgc peptide only in pole cells (Hanyu-Nakamura et?al., 2008, Martinho et?al., 2004). Pgc peptide remains detectable until stage 5 but rapidly disappears by stage 6 (Hanyu-Nakamura et?al., 2008), when nucleolar formation initiates (Figure?1E). As expected, in pole cells lacking maternal (inhibits nucleolar formation in newly formed pole cells. Because the Pgc peptide represses RNA polymerase II (RNAP-II) activity in early pole cells (Hanyu-Nakamura et?al., 2008, Martinho et?al., 2004), we assume that RNAP-II-dependent transcription is required to initiate nucleolar formation in pole cells. Because the nucleolus is the site of ribosome biogenesis, it is plausible that protein synthesis is lower in early pole cells lacking nucleoli relative to that in somatic cells. However, this is not the case: uptake of radioactive amino acids is higher in pole cells than in the somatic region (Zalokar, 1976); the higher rate of translation in pole cells is presumably due to maternally contributed ribosomes. We noted that the microRNA gene is encoded within the NOR of the nuclear genome, which encodes rRNAs (Chak et?al., 2015). The hairpin sequence for is located in the internal transcribed spacer 1 region (ITS1) of the NOR (Figure?1F) and is highly conserved among Dipteran species (Chak et?al., 2015). miR-10404 expression was significantly elevated in mRNA in Pole Cells Luciferase assays. | <urn:uuid:8efd123d-5258-4c16-8bfb-536fb887e65e> | CC-MAIN-2022-33 | http://complextraitgenomics.com/%EF%BB%BFsupplementary-materialsdocument-s1/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00677.warc.gz | en | 0.919977 | 1,189 | 1.59375 | 2 |
BANDUNG, Indonesia (AP) — Rescuers were searching Wednesday for dozens of asylum seekers still believed missing after their boat sank in Indonesian waters on the way to Australia. More than 150 survivors were brought to safety and three bodies were recovered.
The incident comes days after Prime Minister Kevin Rudd changed Australia’s refugee policy so that people who arrive by boat will no longer be allowed to settle there. The move was a response to domestic political pressure and a string of accidents involving rickety boats packed with asylum seekers bound for Australia.
Local police spokesman Col. Martinus Sitompul said 157 people have been recovered from the boat that sank Tuesday night about 5 kilometers (3 miles) off the coast of West Java’s Cianjur district.
Among the survivors was a pregnant Sri Lankan woman who was being treated at a health center in the town of Cidaun. A baby boy, a 10-year-old girl and a woman were identified as the dead, he added.
Sitompul said the group was believed to consist of around 204 migrants from Sri Lanka, Iran and Iraq. They departed Tuesday morning from Jayanti, a coastal town in Cianjur, using a smaller boat that was supposed to meet a larger ship at sea to complete the journey to Australia.
Their overloaded boat, built to carry only 150 passengers, sank about nine hours into the trip due to a leak. Some of the migrants scrambled for the lifeboat, while others swam before being rescued, he said citing Iraqi survivor Ali Akbar.
A search for the 44 migrants believed missing continued Wednesday with police, fishermen and local villagers scouring the waters.
Rochmali, a rescuer at the scene who goes by one name, said the exact number missing remains unclear since some survivors may have fled to avoid authorities.
The asylum seeker issue has been a longstanding dilemma for both Indonesia and Australia.
Last week, Indonesia decided to stop issuing visas on arrival to Iranians because a growing number of them have been caught smuggling drugs or using Indonesia as a transit point for seeking asylum in Australia.
As of last Friday, Australia said all newly arrived refugees would be resettled on the island nation of Papua New Guinea, though their claims for asylum will still be assessed in Australia and at detention camps in Papua New Guinea and the tiny island nation of Nauru.
Australia will help genuine refugees settle in Papua New Guinea. Others can return to their home nations or a third country other than Australia.
The move, condemned by refugee and human rights advocates, is an attempt to stem the flood of asylum seekers who travel to Australia from ports in Indonesia and Malaysia. Hundreds have died attempting the journey in recent years.
Indonesia is a popular exit point because its capital, Jakarta, lies just 500 kilometers (310 miles) from Australia’s Christmas Island. More than 15,000 asylum seekers have arrived in Australia by boat this year.
Rudd said the latest boat incident highlights the need for the policy shift.
“Too many innocent people have been lost at sea,” he told reporters in Melbourne on Wednesday.
“The asylum seeker policy we’ve adopted is about sending a very clear message to people smugglers that if you try to come to Australia by boat you will not be settled in Australia. … That is all about destroying the people smugglers’ business model,” Rudd added.
Associated Press writers Niniek Karmini and Ali Kotarumalos in Jakarta, Indonesia and Kristen Gelineau in Sydney contributed to this report. | <urn:uuid:f430d8be-489b-4c9a-9f8a-5e74c564d467> | CC-MAIN-2017-04 | http://wkbn.com/2013/07/24/asylum-seeker-boat-sinks-off-indonesia-157-saved-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00315-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955105 | 732 | 1.78125 | 2 |
It said in a statement that the embassy was in "close contact" with both the companies and had been carefully following the discussion over the quality of drinks sold by them in India.
Coca Cola and Pepsi are working intensively with the Indian Government to clarify these issues with the assistance of independent scientific experts and laboratories, the statement said.
Both Coca Cola and Pepsi are confident that their products meet or exceed the highest national and international quality and safety standards, it added.
Coca Cola and Pepsi are highly reputable and responsible firms with worldwide operations. They have repeatedly emphasized it is their top priority to provide the consumer with safe products, the embassy said.
The Centre for Science and Environment (CSE), an independent environment watchdog, last week said that its tests showed drinks sold by the Indian units of Coca-Cola and Pepsi, contained "dangerously high levels" of the toxic chemicals lindane, DDT, malathion and chlorpyrifos.
"Coca Cola and Pepsi are highly reputable and responsible firms with worldwide operations."
-- US embassy in New Delhi
The CSE accused both companies of using polluted water. Both the companies have denied the charges and questioned the manner in which the tests were conducted.
Meanwhile, India's Supreme Court on Wednesday threw out a plea by Coca-Cola's Indian bottler for an independent evaluation of CSE's report.
The three-judge bench refused to allow the plea by Hindustan Coca-Cola Beverages Private Limited and observed that people were free to choose what they wanted to drink or whether they wanted to drink at all. | <urn:uuid:9fb56e29-cd11-4835-bb55-8ebc5ab5c093> | CC-MAIN-2017-04 | http://www.aljazeera.com/archive/2003/08/200849155311453760.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00450-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.971155 | 330 | 1.59375 | 2 |
Mentally ill people detained because they pose a risk to themselves or others are routinely taken to police cells rather than hospital - despite years of warnings against the dangerous practice, official figures reveal for the first.
Nearly 9,000 vulnerable people taken off the streets last year by officers using emergency powers under the Mental Health Act ended up in police stations across England. Official guidelines state police cells should only be used as a place of safety for mentally ill people in “exceptional” circumstances.
Yet these figures are undoubtedly an underestimate as they exclude all those arrested rather than detained using a Section 136, such as Sean Rigg, an acutely unwell man who died under arrest in Brixton police station in 2008.
These figures come amid growing concerns about the dangers of police contact for people with mental health problems. Around half of all deaths in police custody involve people with known mental health problems, according to the Independent Police Complaints Commission.
The figures, released by the NHS Information Centre, were described as “shocking” by Deborah Coles from the campaign group INQUEST.
Ms Coles told The Independent: “We know that police cells are dangerous and inappropriate places for people with mental health problems yet these shocking figures show that this is where they routinely end up. This should send shockwaves through government departments and get a decisive response.”
Simon Cole, the mental health lead for the Association of Chief Police Officers, said police cells were clearly not the right place for mentally ill people but officers often had no choice “These figures show mental health is currently making significant demands on policing. Better diversion and support could free up officers to fight crime, and more importantly ensure improved services for those who are ill.”
Andy Bell, chief executive of the Centre for Mental Health, said the NHS had to do more. “Health services must ensure there are suitable, properly staffed places of safety in every area, which the police know how to use.”
Other figures released by the Information Centre show that the total number of people compelled to accept psychiatric treatment continues to rise year-on-year.
Last year almost 48,600 people were detained in psychiatric hospitals in England against their will last year - a 5 per cent increase in 12 months.
There was an even bigger rise in the number of people subjected to involuntary treatment and living restrictions at home as the number of community treatment orders (CTOs) increased by 10 per cent to 4,200.
The use of the controversial CTOs – which were opposed by dozens of mental health and human rights organisations – is much more widespread than ever predicted by the government. The number of CTOs has grown exponentially since being introduced in 2008, doubling in just four years, yet the impact of the restrictive orders has yet to be properly evaluated.
- More about:
- Human Rights
- Independent Police Complaints Commission
- Mental Health | <urn:uuid:2ee5acd2-b914-4664-aaca-71c85f85615a> | CC-MAIN-2017-04 | http://www.independent.co.uk/news/uk/home-news/mentally-ill-people-detained-over-risk-to-themselves-or-others-routinely-taken-to-police-cells-8224943.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00086-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969155 | 592 | 2.015625 | 2 |
By Joseph Dalton
It’s difficult to even imagine the anger and frenzy that greeted the premiere of “The Rite of Spring.” The ballet debuted in Paris 100 years ago with a violent orchestral score by Igor Stravinsky and radical choreography by Vaslav Nijinsky. Scholars are still talking about it and more often than not concert audiences still squirm when the music is performed.
In three concerts this weekend at Williams College, “The Rite” will be performed again and come spring new choreography will be unveiled.
“The audience rioted – screaming, fighting, throwing things,” say Anthony Sheppard, who is chairman of the department of music at Williams. “It actually doesn’t matter much what really happened in the riot or whether it was the music or the dance that was most provoking. What matters is that everyone continued to talk about the event long after it took place.”
In Nijinsky’s choreography a primitive ritual culminates in a human sacrifice. The must enduring element of the legendary collaboration though is Stravinsky’s propulsive score, which starts with an unusually high and quietly wailing bassoon.
“The music really did jump start the new wave of 20th century music,” says conductor Ronald Feldman, also a Williams faculty member. “But it’s no longer radical. There are things today that are much more difficult.”
Feldman will lead this weekend’s performances by the Berkshire Symphony Orchestra, which is made up of about equal portions of students and professionals. Younger players began practicing the score’s tricky rhythms and meters months ago.
“They’re taking it in stride,” he says. “When very contemporary pieces are offered or we invite composers, the students really pack those concerts. They’re very interested in new music and this to them is new in terms of being asked to perform it. But they’ll be pretty comfortable.”
Perhaps it’s not easy to shock people these days, especially a generation that’s accustomed to the continual blaring bombardment of media. Nevertheless, Williams College is making sure its students understand the deep cultural impact of “Rite.” It’s been a subject of study in various classes — not just music and dance, but also film and 20th century culture — since the fall.
Credit conductor Ronald Feldman with promoting the idea. According to Sheppard, the conductor had been anticipating this centennial year for some time. But Sheppard didn’t need much convincing. He’s been fascinated with the piece for most of his career.
“I’ve been listening to it since I was 13 when my clarinet teacher gave me an album, and I still find it exciting,” says Sheppard. “Walt Disney chopped it up in interesting ways in ‘Fantasia,’ during World War II Frank Capra used clips of the ‘Rite’ to show how barbaric the Japanese were, and it shows up in many works of John Adams, including his operas ‘Doctor Atomic,’ and ‘Nixon in China.’”
As part of this weekend’s programs, Sheppard will discuss these and other touchstones of “Rite” lore, and also play video excerpts of the Joffrey Ballet’s re-creation of Nijinsky’s original choreography. After his talk, the Berkshire Symphony will perform the work in a reduced version.
Soon after, the Williams dance department will be taking its turn with enacting “The Rite.” Erica Dankmeyer, Nia Love and Janine Parker are sharing choreography duties and their combined efforts will be accompanied by the two-piano version. The performances will take place May 3-4.
Of course with such a major centennial at hand, the folks at Williams College aren’t the only ones taking part. In our region alone, other institutions are getting on board. The Fisher Center at Bard College recently announced that its Summerscape program will open on July 6-7 with “The Rite” in a new version created by choreographer Bill T. Jones and theater director Anne Bogart. In August, the Bard Music Festival will focus on “Stravinsky and His World.”
“It’s probably the most legendary premiere in all of European music and dance history,” says Sheppard. “Stravinsky’s score features sections of aggressive, energetic, head-banging music that prefigured heavy metal by some six decades as well as sections of delicate mystery evoking an ancient culture that never existed.”
Joseph Dalton is a freelance writer in Troy and can be reached at Dalton@HudsonSounds.org.
“The Rite of Spring”
Berkshire Symphony, Ronald Feldman, conductor
As part of each program, musicologist Anthony Sheppard discusses the music, shows excerpts of the original choreography and gives examples of the work’s enduring influence.
When: 8 p.m. Friday, 3 p.m. and 8 p.m. Saturday (3/8-9)
Where: ’62 Center for Music & Dance, Williams College, 1000 Main Street, Williamstown, Mass.
Coming up: The Contemporary Dance Ensemble of Williams College will perform “The Rite” with new choreography, May 3-4. More information at: http://62center.williams.edu | <urn:uuid:9448c84e-8712-4d86-bf0d-a9ea42f68692> | CC-MAIN-2017-04 | http://blog.timesunion.com/localarts/rite-of-spring-at-williams-college/26790/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00291-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953434 | 1,172 | 1.734375 | 2 |
Horray, there are antioxidants in chocolate! This means we have an excuse to eat chocolate more. To further promote this concept of why we need to eat chocolate, we need to know the health benefits, or more precisely, the antioxidant type benefits that chocolate can have towards our bodies.
Benefit #1: Helps Fight Diseases
The antioxidants in chocolate can help fight diseases and conditions such as:
- heart disease
- Alzheimer’s disease
- some cancers
- some arthritis conditions.
Benefit #2: Helps Fight General Aging
The antioxidants in chocolate can help fight the symptoms of general aging. This can include memory loss and even help the skin to appear smoother.
Benefit #3: Helps Keep from Developing Cataracts
The antioxidants in chocolate can help keep one from developing cataracts (a condition that can lead to blindness, if left untreated).
Benefit #4: Helps to Build the Immune System
The antioxidants in chocolate can help build one’s immune system. A stronger immune system can help a person fight off diseases from the common cold to more potent and life threatening conditions.
Benefit #5: Helps One Feel Better
Eating chocolate just seems to help improve one’s overall mood. Does it really matter if this is due to the antioxidants in chocolate or its natural taste?
Other Rich Foods in Antioxidants
If you become sick of chocolate and still are looking for some foods to eat (that are filled with antioxidants), you may consider some other food choices such as:
- red cabbage
- pomegranate fruit
- pinto beans
As for drinks, if you ever get tired of chocolate drinks, such as cocoa and chocolate milk (yes, low fat counts), you could try drinking a glass of red wine. Red wine is loaded with antioxidants.
Why not enjoy the benefits of antioxidants in chocolate today? Remember, most dark chocolates are also vegan friendly. | <urn:uuid:121907b0-37e2-4ce6-8173-e9827f5d0895> | CC-MAIN-2017-04 | http://www.3fatchicks.com/top-benefits-of-antioxidants-in-chocolate/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00086-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.917479 | 405 | 2.59375 | 3 |
External comments: This is a debate article. The analysis and point of view are the author’s own.
Norway is centralized. People from the villages moved to towns and cities across the country. The people of these cities and towns were drawn to the capital’s territory. The struggle against Norwegian centralization is not only important for places like Vgå, Sokndal and verbygd. The struggle against centralization is equally important for cities such as Mandal, Lesung and Mo i Rana. In fact, Bergen, Trondheim, Stavanger, and Troms can also be added to the list of cities affected by the country being sucked into the capital.
I listen some time ago a speech from the chairman of the Oslo city council Raymond Johansen. He boasted that since 2000, Oslo has grown as much as Trondheim. I understand that Johansen City Councilor is happy with the thought of growing his own empire, but I’m more than sure if that growth is good for the people living in Oslo.
Oslo currently has about 700,000 inhabitants. The Norwegian Statistical forecast from July 5 this year states that this number will increase to over 800,000 residents by 2050. In addition, we see, and further expect, significant growth in the municipalities around Oslo. The central point for me is to point out that it is not a desirable development that the capital is growing significantly more than the rest of the country. The capital wouldn’t be a better city with close to a million inhabitants, but Norway would be a worse country if it did.
We are a big country with few people. Then we have to spread out to create viable local communities across the country. Because I do not doubt for a moment that most share the slogan of the Central Party to use the whole country. Then we must boldly point out the problem and we must propose measures to slow down self-reinforcing centralization.
Discussions about where we should live in this country often end with someone feeling stepped on and offended. There is no reason why anyone in Oslo, whether they are city councilors or ordinary people, should feel trampled on by debate. Because it would be better in Oslo if space on buses, trams, subways or queues at E6 and E18 became more limited? Is it better to be an Oslo resident if house prices continue to rise? Would it be better in Oslo if there was another building site with cranes? Of course not.
We have steps to successfully create dynamic local communities in villages and towns across the country. In many areas, Norway’s district policy is a success story, but it shows in others. It won’t be a measure that solves everything – but a policy that in all areas emphasizes the perspective of taking advantage of the whole country. The list of instruments is long: Better schemes for housing finance in rural areas, tax rules that reduce the consequences of distance, cheaper travel, workplace relocation, broadband and mobile coverage, good welfare services, and a strong local environment and good environment . a functioning local democracy is an example of some action. In addition, we must make private businesses use technology to secure jobs for people across the country.
No doubt that there is an ongoing battle for resources, power and money between city and state in Norway. The distribution of resources between different parts of the country is part of the priorities undertaken at Storting both in the budget process and in other matters, for example when seeking government employment. Should we spend millions to bring down monthly ticket prices in Oslo by a hundred or should we use that money to make flights in Northern Norway cheaper.
The battle to take advantage of the entire land is often described as a battle between the outermost village and the largest city. It will be too narrow. If we are to succeed in positive development across the country, we must also manage balanced development between cities across the country and capital cities.
Struggle for developing the whole country is a battle against those who want to make Oslo as big as possible, but it is a battle together with the people of Oslo who want the best city. In a vast country with just under 5.5 million inhabitants, we can tolerate the fact that the capital city is not a city of a million. Oslo’s most important task is to be a good capital city for both those who live here and for people throughout Norway.
In my opinion, the bigger Oslo, the bigger the difference between people and parts of the city. Therefore, it is very important to come to an agreement with the mindset that as much growth as possible, as many people and jobs as possible is good for Oslo. Oslo residents must be at the forefront of the demonstration train to use the rest of the country and to slow growth in Oslo.
Most in Norway happy in their capital. We appreciate buildings like the Palace, Holmenkollen, Stortinget and the opera. We are even willing to admit that this NOK 6 billion national museum has become a large and important building. This applies whether you have traveled to the national museum and paid NOK 78 for a bus ticket or you have paid NOK 6,000 for a plane ticket.
Oslo is the one that grows and absorbs capital and people. So the policy must be used in the opposite direction to create a balance in development. Norway needs its capital city, but the capital city also needs its country. The policies that have been pursued in recent years have taken this premise too little into account.
“Subtly charming web junkie. Unapologetic bacon lover. Introvert. Typical foodaholic. Twitter specialist. Professional travel fanatic.” | <urn:uuid:0406301c-4e65-49e8-99db-c3e79975ed59> | CC-MAIN-2022-33 | https://welshnet.co.uk/oslo-wont-be-a-city-of-millions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00274.warc.gz | en | 0.966971 | 1,164 | 2.09375 | 2 |
Tags: Afghanistan, Politics
When, even in a political context, is it fair game to criticize a President in a time of war in his role as CINC? Is this a good thing? Is this a healthy thing? Does the CINC own the war he wages, or does his nation?
As for the middle two questions above, the answer is both yes and no; it all depends on the context. In a Representative Republic such as ours, criticism of public officials is an essential cleansing agent and self-correcting mechanism. It ensures flawed policies are discovered and mistakes corrected, and it assists weak policies to be strengthened.
There is a problem with criticism when the motivation for criticism is not to point out areas for improvement, but to destroy one domestic political entity strictly to strengthen another.
When a nation is involved in war, when non-value added criticism divides a nation against itself for political advantage, then the whole national enterprise’s effort is weakened. We have that problem now in Afghanistan, and it is getting worse – both parties are to blame.
During the previous administration, the political and media classes of this nation re-started a bad political play for a nation at war: the integration of party politics and the political personalization.
President George Washington did not like party politics – and for good reason. Though perhaps a necessary evil, in his farewell address – among other warnings – came this.
Without looking forward to an extremity of this kind, (which nevertheless ought not to be entirely out of sight,) the common and continual mischiefs of the spirit of party are sufficient to make it the interest and duty of a wise people to discourage and restrain it.It serves always to distract the Public Councils, and enfeeble the Public Administration. It agitates the Community with ill-founded jealousies and false alarms; kindles the animosity of one part against another, foments occasionally riot and insurrection. It opens the door to foreign influence and corruption, which find a facilitated access to the government itself through the channels of party passions. Thus the policy and the will of one country are subjected to the policy and will of another.
Of course this isn’t new. The election of 1864 makes what we do now look tame, but does not excuse our behavior. At recent example of today’s version of what Washington warned us about can be found in the infamous Rockefeller Memo. Sadly, on both sides of the political aisle – this cancerous activity did not end when the Democrats took the White House in 2008.
From the start of this present conflict, I did not like the personalization of this conflict in the person of the President; pro or con. I still refer to this as The Long War. It will last multiple Presidents for many decades. We cannot wage this war on election cycles and expect to win.
After his victory in 2008’s election, President Obama had an opportunity to mitigate the interplay between national security and domestic politics. You can never get rid of it, but it needed to be decreased after the disgraceful overheating from 2003-2008. Our nation would be better for it. The foundation was there, and in many ways I think the instinct was as well; SECDEF Gates was kept on from President Bush’s administration. Old habits die hard though, and that did not happen. No, instead we got “the Obama surge in Afghanistan.”
Let’s review some fundamentals on the plan being executed in AFG now. The strategy, though revised as all plans are, predates President Obama and General McChrystal. Fact.
The pedigree is clear; the shortcomings identified by General McNeill in “NewWar” (smaller, lighter forces laden with caveat-encumbered allied forces leavened with wishful thinking and Tiffany Theories) combined with the lessons of Iraq – resulted in General McKiernan’s “Shape-Clear-Hold-Build” COIN strategy and the uplift of USA forces in AFG starting in mid-08. The concept development of Uncle Sam taking back the keys from NATO – the latest chapter being the creation of Regional Command Southwest – can be traced back to late 2007. Even “AfPak” predated the present administration.
I grudgingly accepted the new administration’s desire to “get their stink” on the plan in early 2009 – after all they needed to remove all the political mud thrown at the enduring AFG challenge, often by their own party, during the rule of the previous administration – but on balance, like the SECDEF, the plan is fundamentally unchanged.
In the last year, we have seen from both sides of the aisle a repeat of the “AFG is Obama‘s War” mantra. No, it is American’s War. It is the West’s War.
Because the political parties decided to continue the personalization of our Nation’s war, the inevitable has happened. As President Obama’s domestic political standing starts to wobble and he starts to show significant weakness, politicians are doing what they have a habit of doing – looking for any weapon to attack him. From the Left and the Right, they see the Obama Stamp on an item, and they grab it and attack it. The Left want him to leave now; the Right wants him to move the knob to 11.
Sadly, the AFG campaign now has an Obama sticker on it. The Obama Administration is not blameless in this – any fair minded person has to admit that they are at least 51% responsible for the personalization of AFG, and it didn‘t have to be that way. Remember the previous Administration‘s mantra? “I will follow the best advice from my Commanders on the Ground?” They should have picked that up, but they haven’t. As a matter of fact – with their immature “Smarter” spin, they are even more entwined with it. They could have turned a de-personlization of the conflict to political advantage, but they blew it to their detriment and ours.
Infuriating, we now have this;
Downbeat news reports and second-guessing in Congress about the course of the war in Afghanistan have touched a nerve in the Pentagon, where some worry the negativity is undercutting public sentiment before President Barack Obama’s strategy even has a chance to work.Defense Secretary Robert Gates is among those to privately voice concerns about a wave of pessimism that they believe stems partly from embedding journalists solely with military units in Afghanistan’s south, where fighting is fiercest. Some officials talk of changes to make embeds go elsewhere too.
As I warned over at my homeblog – the timeline of JUL 11 and the resulting STRATCOM cross-messaging is a Strategic blunder on multiple levels.
The Pentagon’s growing sensitivities put a spotlight on what some see as increasingly shaky support for a six-month-old war strategy that hinges on surging U.S. forces into the restive south, heartland of the Taliban, before starting a gradual withdrawal in July 2011, conditions permitting.Asked in a Senate hearing on Tuesday whether he still supported beginning a withdrawal in July 2011 given recent setbacks in the south, General David Petraeus, who oversees the Afghan war as head of U.S. Central Command, said: “I support the policy of the president.”
But he added: “In a perfect world … we have to be very careful with timelines.”
Oh, and in case you were wondering – I am not this source – though I think we have the same background. Maybe this guy is a Salamander reader?
But some top military officials say they won’t really know whether the counterinsurgency strategy is working or not until next summer, around the time Obama hopes to begin a draw down.”It’s a war. It’s not a political campaign,” one military official said. “The negativity (in the press and in Congress) can go too far. There are parts of Afghanistan that aren’t going well. It’s a mixed bag.”
SECDEF gets it too.
Gates let his frustrations show last week after a meeting with NATO ministers in Brussels.”I, frankly, get a little impatient with some of the coverage because of the lack of historical context,” he told reporters, noting that the 30,000-troop surge ordered by Obama in December was only now beginning to be felt on the ground.
“So as far as I’m concerned, this endeavor began in full, and reasonably resourced, only a few months ago,” he said.
Strategic patience. That is what we need. What we also need is the Obama Administration and members of both parties in Congress to back off. De-personalize and de-politicize as much as practical. Stop saying that the 30,000 is Obama’s surge. It was planned by the military prior to Obama taking office. It is America’s surge. Give the military the time – the Strategic patience – it needs to finish the job. This can be done.
Oh, that is from one to three decades BTW. Will someone please beat that into the head of Geoff Morrell please? He isn’t helping anyone but the Taliban with talk like this. This isn’t a political campaign ….. and oh; don’t go into comments and quote Carl to me – read him in the original German if you want to know what he is talking about. Here is Geoff giving prima facie evidence that he needs a new job.
“While I understand the fact that there have been developments, such as the increase in casualties, that would cause concern, there also needs to be a recognition that we know and warned this fight was going to get harder before it got easier,” said Pentagon press secretary Geoff Morrell.
“We do expect, by the end of the year, we’ll be able to show that they are making progress,” Morrell said. “Let’s at least allow them the next six months to prove that General McChrystal’s strategy will work.”
Six months? What is his Operational Planning training, Risk? Somehow, we need to get back to fundamentals. And yes, I am repeating myself – for a reason. Some things need repeating 2, 3, a thousand times.
Though not always true, this plan was developed and is being executed via the best military advice in response to the direction and guidance by the Commander in Chief. Though there have been modifications on the edges and a natural adjustment as we move forward – the fundamental plan in place has been with us through two administrations. It is a good plan and the right plan. Sure, there are some good points about how to perhaps better execute it in places – but that is an Operational and Tactical issue.
This plan will need to be in place for many more administrations, from both parties. It is in the interest of the military and this nation to back away from personalization and politicization. We endanger our own Center of Gravity – the support of the American People – if we do not.
Is there a place for criticism? Absolutely. Criticism and hard questions are essential to make sure the best plan is there. Where does it go to far? When it gets mindless in pursuit of partisan politics.
There are two places where the CINC is 100% fair game during a time of war; those appointments at the highest levels that he makes to run the conflict at the Strategic and Operational Levels, and his direct intervention in sound military policy.
His top appointment that are at the Operational and Strategic levels WRT AFG? Gen. McChrystal and Gen. Petraeus? ADM Stavridis? No complaints there.
Sound military policy? Well, LBJ’s micro-managing of the air war in Vietnam is one example of bad – and this “JUL 2011” is another. If the CINC’s critics want a legitimate topic to attack the President’s conduct of the war – that is your target. That is fixable – as you hear SECDEF Gates and others trying to do as they look for a face-saving path for the CINC to back away from his comments.
The rest of the attacks on the conduct of the war in AFG? Shipmate – that ain’t President Obama; that is the military.
- A Polite Rozhestvenski Whisper to the Trump Transition Team
- On Midrats 8 Jan 2017 – Episode 366: Is it Time for a General Staff?
- “Ameri-Straya”: The Story of the People Behind the U.S.-Australian Partnership In Electronic Warfare
- There Are Bad Ideas and Then There is This Bad Idea
- Missile Gap? Warhead Gap? No. Try Strategic Spending Gap | <urn:uuid:c763fb31-8aab-408c-a887-10adca3f8a35> | CC-MAIN-2017-04 | https://blog.usni.org/2010/06/17/politics-in-a-time-of-war | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00210-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.96137 | 2,716 | 2.390625 | 2 |
A recent article about wireless devices, distraction, and engagement in the classroom noted that the University of Chicago Law School has eliminated Internet access in most of its classrooms.
On the surface, this move makes sense: most professors know that bored students with laptops tend to drift off onto email and social networking sites. But, when used properly, Internet access can improve engagement, and, perhaps most importantly, keep students on-task and off social networking sites.
Students are not dependent on Wi-Fi for connectivity or distractions
Disabling wireless Internet in the classroom will certainly hinder the ability for many students to access the web. But the number of smartphones and bundled data plans is on the rise. At Ball State, nearly half of students reported owning a smartphone.
This means students can still access Facebook, Twitter, and the web. Additionally, even students without data plans can use their traditional “dumbphones” to text friends. Plainly, students are always connected, with or without campus Wi-Fi.
There was a time when doing newspaper crossword puzzles and whispering to neighbors were the only source of distraction. Even without the Internet, there is still no guarantee students will find a passive lecture more engaging than these unplugged sources of distraction.
The Internet has legitimate educational applications, even during class
At the very least, taking Internet access away from students punishes each of them, even those who were using their connectivity responsibly. Engaged students can find many on-task uses for the Internet during lecture.
The most obvious application for students in class is using one of many online note-taking tools to build review materials during class. In an increasingly online world, some students may opt for Google Docs over its desktop counterparts. Others might use a more specialized tool such as Evernote or Ubernote.
Curious or resourceful students might utilize Google to quickly brush up on or discover more information about topics that pass by quickly during lecture. Such curiosity could range from simple recollection to active learning and exploration.
With so many websites full of games, instant messaging, and other tempting distractions, many see the Internet as an easy scapegoat for student inattentiveness. It is always important, however, to ask whether students would pay attention even without Internet access.
Engaging students and making class more interactive can make students more attentive, regardless of whether there is Internet access in the classroom or not. “Rather than seeing distraction as a challenge,” the Educause article concludes, “educators can see it as an opportunity to reflect upon and change the design of their entire instructional approach.”
Passive lectures result in worse learning outcomes than more interactive pedagogical styles. In those classes, it’s difficult to blame students for wandering off onto distracting websites and sending emails. Between ubiquitous access, legitimate uses, and passive lectures, turning off the Wi-Fi simply won’t solve problems with attentiveness during class.
Sign-up for an upcoming webinar to learn more about how making class more interactive with LectureTools can keep students off of Facebook while improving engagement and attentiveness. | <urn:uuid:1882cd53-e791-48f2-beee-fc80258ccee8> | CC-MAIN-2016-44 | http://blog.echo360.com/blog/bid/46525/Why-Banning-Internet-Access-from-Classrooms-Won-t-Fix-Lectures | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00302-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.949844 | 636 | 3.296875 | 3 |
Marine Plankton Found On Surface Of International Space Station
by Justine Alford
Photo credit: NASA
Scientists examining samples taken from the exterior of the International Space Station (ISS) have made a rather unexpected discovery- traces of marine plankton and other microbes growing on the surface of the illuminators. What’s more, it seems they could have been living there for years.
The intriguing discovery was made after ISS cosmonauts took surface samples during a routine spacewalk around the satellite. The samples were later analyzed by high-precision equipment as part of a so-called “Test” experiment, ITAR-TASS revealed. Scientists were then able to confirm that these organisms are capable of living in space despite the hostile conditions experienced. Furthermore, some of the studies demonstrated that the organisms could even develop in the vacuum of space.
“Results of the experiment are absolutely unique,” chief of the Russian ISS orbital mission Vladimir Solovyev told ITAR-TASS. He believes that further study is warranted, but admits he is puzzled as to how the organisms arrived on the ISS surface as they’re not native to the launch site.
“[Plankton in] such phases of development is found on the surface of the ocean. It isn’t characteristic to Baikonur,” Solovyev explained, referring to the Baikonur Cosmodrome in Kazakhstan where crew and cargo are launched for the ISS. “It turns out that there are some rising air currents, which settle on the surface of the station.”
According to Solovyev, the surface of the ISS is heavily polluted due to engines from delivery spacecrafts and other factors. Crew members have therefore initiated a cleanup operation to put the illuminators in order. | <urn:uuid:29626911-887e-479e-8b79-4f1b5bb1c3fe> | CC-MAIN-2017-04 | http://parsseh.com/31148/marine-plankton-found-on-surface-of-international-space-station.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00094-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964074 | 373 | 3.078125 | 3 |
This book was selected because it won the Booker Prize and only one person in the group had read a Peter Carey book before.
The novel is a love story but the characters are very repressed. The background details of country NSW and Parramatta in the 1850’s and 1860’s were wonderful.
The way the book is written – moving between Oscar’s story, Lucinda’s story and the narrators memories can be confusing and disjointed at times.
The characters are so unique and often comical and makes the book interesting to read.
Carey’s writing style can be compared to Dickens with the convoluted plot, and
Most of the book group found the ending disappointing, not because of its unexpectedness, but because there are so many loose ends. | <urn:uuid:8596f5a3-b320-4a05-a167-b6bbc99725b8> | CC-MAIN-2017-04 | http://parrareads.parracity.nsw.gov.au/blog/2013/04/12/2nd-tuesday-evening-book-group-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00188-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.970649 | 165 | 1.5625 | 2 |
Co. Roscommon →
Elphin Civil Parish →
Annaghmore Electoral Division →
Annaghbeg is in the Electoral Division of Annaghmore, in Civil Parish of Elphin, in the Barony of Roscommon, in the County of Roscommon
Annaghbeg is not matched up to Logainm.ie yet.
It is located at 53° 47' 21" N, 8° 8' 24" W.
Annaghbeg has an area of:
- 1,107,988 m² / 110.80 hectares / 1.1080 km²
- 0.43 square miles
- 273.79 acres / 273 acres, 3 roods, 6 perches
Nationwide, it is the 26055th largest townland that we know about
Within Co. Roscommon, it is the 813th largest townland
Annaghbeg borders the following other townlands:
We don't know about any subtownlands in Annaghbeg.
Genealogy / Ancestry / Records Search
Curious to see who lived in Annaghbeg in the past? Maybe even seeing scans of their handwritten census returns?
Annaghbeg was added to OpenStreetMap on 22 May 2015 by NoelB. | <urn:uuid:c8318643-cf03-4ea9-b09b-a0e2b0aeb9c7> | CC-MAIN-2022-33 | https://www.townlands.ie/roscommon/roscommon/elphin/annaghmore/annaghbeg/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00074.warc.gz | en | 0.913877 | 298 | 1.5625 | 2 |
Turning Hard Rock into Premium Sand
Listed inMaterials Processing
First published in the September 2020 issue of Quarry Management
BHS-Sonthofen RPM 1513 impact mill benefits Indian sand manufacturer, whilst two RSMX centrifugal crushers help Stevin Rock create high-quality concrete sands
Sand manufacturers Kasprs Build Mate inaugurated a new plant for processing off-spec particles in mid-2019. The centrepiece of the plant in Pune, India, is a rotor impact mill from BHS-Sonthofen, which, in contrast to conventional vertical-shaft impact (VSI) rotor crushers, is designed to further reduce fine grain sizes. As a result, Kasprs can make use of off-spec material from other companies to produce high-quality plaster sand and dry mortar sand for the construction industry.
Sand production using conventional VSI rotor crushers, which are commonly used in India, produces large volumes of off-spec particles 10–15mm in size, which remain in the circuit without being crushed any further. These particles, which can account for up to 35% of the total volume, are often backfilled, which is why Kasprs Build Mate were looking for a way to turn this surplus material into high-quality sand.
Himanshu Mavadiya, production applications manager at BHS India, identified the RPM 1513 rotor impact mill as the perfect tool for this task: ‘Our RPM 1513 delivers a targeted and very high crushing ratio, which has a consistent grading curve over the entire tool lifetime,’ he said. ‘It is, therefore, able to produce sand of the highest quality with an excellent particle shape from the surplus material of conventional rotor crushers. The producer benefits considerably from this and, in addition, every tonne of sand that can be produced from off-spec particles slows down the depletion of natural sand deposits.’
BHS-Sonthofen have a modern test centre where the material to be processed can be tested in advance in various machines. ‘In this particular case, we are dealing with basalt – a magmatic rock that presents some challenges,’ said Mr Mavadiya. ‘The BHS experts in Germany were able to carry out tests using a rock sample, allowing them to select the ideal machine and determine the best settings too.’
Not wanting to leave anything to chance in this project, Kasprs inspected the machine at the German manufacturing site. The goal was not only to find the right technology for the application, but also one that stood out from competing suppliers in the Indian region in terms of quality. From the outset, the RPM 1513 rotor impact mill fulfilled all expectations.
In total, several hundred thousand tonnes of high-quality sand have already been produced and Anup Karwa, project manager at Kasprs Build Mate, is extremely satisfied. He said: ‘For our company, efficient value creation and thus resource savings is an enormously important decision factor when it comes to choosing new technology. BHS-Sonthofen convinced us on site with their modern test centre, experienced experts and robust high-performance machines.’
The sand produced by the BHS rotor impact mill has actually become a brand in its own right. ‘Customers have taken to calling this high-quality product Kasprs Sand,’ continued Mr Karwa. ‘This name stands for an optimal, homogeneous particle shape, and despite its somewhat higher price, it has become a sought-after construction material, especially for ambitious projects. In contrast to naturally occurring sand, which often has to be shipped over vast distances and is sometimes of dubious origin, this sand is also a local product: the basalt rock extracted in the vicinity of the plant has been made fully usable by BHS technology.’
RSMXs add the finishing touch
Meanwhile, in the United Arab Emirates (UAE), the sand component of the high-strength concrete used to construct Dubai’s prestigious skyscrapers must be pure and the particle shape needs to be cubical, but as the large quantities of natural sand in the region do not possess these properties, local producers Stevin Rock manufacture the much sought-after commodity from the local limestone.
Stevin Rock’s limestone quarry in the northern Al-Hajar mountains of the UAE, around a 2h drive from Dubai, is the third-largest site of its kind in the world. More than 60 million tonnes of high-quality limestone are extracted here every year, the majority of which is processed on site in a complex, multi-stage process. The limestone is gradually reduced to 5–10mm in size, whereupon two BHS-Sonthofen RSMX rotor centrifugal crushers with TwinDrive, which were installed in September 2018, are used for the crucial final step – breaking the limestone particles down to 0–5mm while also turning it into the ideal cubical shape.
‘In other words, our rotor centrifugal crushers perform the final finishing step. They put the finishing touches on the sand and ultimately determine the quality of the product. The sand is then washed one final time and that’s it, done,’ explained Hans Traut, BHS-Sonthofen’s area sales manager for the Middle East and North Africa.
Mr Traut has worked with Stevin Rock for eight years – although BHS-Sonthofen experts have been working in the region for several decades. Today, 15 quarries and multiple dry-mortar plants in the region use BHS impact crushers. Over the years, BHS-Sonthofen have examined hundreds of tonnes of samples from different sites across the Gulf region at their technical centre in Sonthofen, Germany, examining how each rock behaves, how it breaks up, and what flow speed generates the optimum result.
Mr Traut was able to draw upon this expertise with the rotor centrifugal crushers at Stevin Rock, defining important parameters before installation and adjusting the machines to suit the customer’s plant to ensure the two RSMX units achieved the desired result.
In their first fourth months of operation, the two BHS machines helped Stevin Rock to produce around 300,000 tonnes of high-quality sand – and the plant is still not at full capacity. At present, only one of the two rotor centrifugal crushers operates at a time, as only one washing system is connected. However, a second washing system is planned, which means production will soon increase even further.
The RSMXs have already proven themselves and are setting the standard in terms of both product quality and the use of wear parts. The latter, in particular, can be an important cost factor during continuous operation, but after his first two inspections Mr Traut was happy to report ‘zero wear’, thanks in part to the patented twin-chamber design of the rotor.
Whilst every single particle of the input material undergoes extreme acceleration due to the centrifugal force in the rotor and is hurled against an anvil ring that acts as the impact wall, the rock material also rubs and breaks against itself and not – as is the case with competing technologies – exclusively against the metallic wear parts.
BHS-Sonthofen also utilize especially high-quality and durable materials, with special spin profiles made from tungsten carbide protecting the RSMX in the area where the finished material leaves the rotor. ‘We have constantly improved the design of our rotor centrifugal crushers over the years,’ explained Mr Traut. ‘The RSMX is a unique solution that is characterized by both its precision and its flexibility.’
Mr Traut carries out an in-depth on-site inspection of Stevin Rock’s rotor centrifugal crushers at least once a year. This close contact and dialogue with the customer is what’s important to us,’ he said. ‘Ultimately, a product is being manufactured here that is contributing, literally, to shaping the future of the region. The sand that our crushers manufacture is used in practically every major construction project in the Gulf.’
For further information, please visit: www.bhs-sonthofen.eu
- Subscribe to Quarry Management, the monthly journal for the mineral products industry, to read articles before they appear on Agg-Net.com | <urn:uuid:efae4938-2440-4592-967c-1064d073c492> | CC-MAIN-2022-33 | https://agg-net.com/resources/articles/materials-processing/turning-hard-rock-into-premium-sand | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00075.warc.gz | en | 0.94235 | 1,742 | 1.5 | 2 |
Want to take better care of your houseplants?
Join thousands of plant parents who get our latest plant care tips directly to their inbox.
Jewel Orchid Care
Basic Jewel Orchid Care
Jewel Orchids are fast becoming one of the most popular houseplants due to their lightning bolt veined leaves! Below you find everything you need to know to care for your incredible Jewel Orchid.
I prefer areas that aren't too bright or shady. Finding a balance is important.
I like my soil to be moist so make sure to water me often.
I thrive in humid environments so please mist my leaves every so often.
I need soil specifically for indoor plants as it retains the right amount of water.
Detailed Jewel Orchid Care Information
Whether you're looking to make sure your Jewel Orchid is in it's perfect conditions, or looking to see if one could work for your space. We've got you covered.
Keep them far away from direct light
Jewel Orchid plants will wilt quickly if placed in direct light so you want to find a spot with medium light levels.
Keep the soil moist
Jewel Orchids need frequent watering to keep the soil moist. If the soil is dry for too long it can cause your Jewel Orchid to die.
Jewel Orchids love humidity
Along with frequent watering, we recommend misting your Jewel Orchid several times a week. Other simple tips to increase humidity include using a pebble tray or buying a humidifier.
They need warmer temperatures
Jewel Orchids cannot tolerate cold so you want to keep it away from draft windows or AC vents. Room temperature or above is what they need.
Only fertilise during spring and summer
Jewel Orchids only need fertiliser in the warmer growth months so hold off during winter. We recommend diluting the feed more than it says on the bottle to avoid fertiliser burn.
Propagate by division of the mother plant
The best way to propagate a Jewel Orchid is by dividing the mother plant into several smaller plants.
Jewel Orchids are safe for pets
Luckily Jewel Orchids are non-toxic for pets and humans so you don’t need to worry about having them around your home.
Jewel Orchid FAQs
Quick and simple answers to the most common questions we see about the Jewel Orchid.
Don’t be fooled by the orchid part of its name as Jewel Orchids are actually pretty simple to care for.
Jewel Orchids need frequent watering, which means at least once a week during summer and fortnightly during winter. They don’t like their soil to dry out for too long so monitor the moisture levels to find the right routine for your plant.
Jewel Orchids actually need medium light levels to thrive. If exposed to bright intense light, they can wilt and dry out. If they don’t receive enough light, then will become leggy, straggly and droopy.
Although their leaves might not look it, the Jewel Orchid is actually safe and non-toxic.
Jewel Orchids don’t grow very quickly so you’ll need a little patience with this one. The good thing about this though is that they won’t outgrow the pot very quickly.
Jewel Orchid Care Starter Kit
We've put together this great little starter kit that includes all of the equipment and information you'll need to take proper care of your Jewel Orchid.
Common Problems with your Jewel Orchid
Here are some common issues that you might run into. It's important to diagnose any issues early to give your plant the best chance of bouncing back.
If you notice that your Jewel Orchid has mushy stems or leaves then overwatering is the most probable cause. Check the moisture levels in the soil and replace if waterlogged.
Underwatering and a lack of humidity is the most common cause of dry crispy leaves on a Jewel Orchid. Check the soil moisture to confirm before increasing how much you water and mist going forward.
Jewel Orchids won’t grow flowers unless they are mature plants so don’t worry too much if it takes a while to see any appear. Make sure you keep your Jewel Orchid in the right environment and give it the right care. If you still aren’t seeing any flowers appearing in spring/summer then you might want to increase how often you fertilise.
Simple Jewel Orchid Care Requirements
It sometimes helps to take caring for your plants back to the basics, here's the key considerations that you should take into account when caring for your Ludisia discolor.
These simple points should give you all you need to keep your plant happy and healthy for years to come.
|Common Name||Jewel Orchid|
|Latin Name||Ludisia discolor|
|Soil Type||Potting Soil| | <urn:uuid:4a2e2ba3-f086-4e5e-903a-652c3c5c8a46> | CC-MAIN-2022-33 | https://fiddleandthorn.com/plants/jewel-orchid/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00267.warc.gz | en | 0.914552 | 1,084 | 2.0625 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.