text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
When San Antonio Trinity University used 15 backward passes to score the winning touchdown on the last play of an October 2008 game against Millsaps College, the film showed up on more than just sports highlight shows. The play took a full minute, nine different players were involved and it covered 61 yards. The play may have set a record for backward passes; it surely surpassed the 1982 game in which California defeated Stanford on the last play of the game that included five backward passes and covered 55 yards. That play also included the unwitting participation of the Stanford band running interference for the California runners as they snaked their way through the band on the way to a touchdown and victory. The Stanford band, thinking the game was over, had rushed onto the field prematurely. At least one non-sportscaster (and probably dozens of regular sports commentators) used the term “lateral” when viewing the video. As all good officials will tell you, there is no such thing as a lateral; the correct term is backward pass. It is annoying that people, especially reporters and announcers, continue saying, “It’s a lateral, it’s a lateral!” Even worse are those who gush, “It’s a backward lateral!” or, “That was a forward lateral!” The word lateral (in terms of a thrown ball) does not appear in either rulebook. Every ball thrown in a game is either thrown forward or backward, period, despite the dictionary definition of lateral. Thus the misnomer for a backward or forward pass that is approximately parallel with the line of scrimmage. The cry for a forward or backward lateral is something that most officials will hear sometime in their career. Any fan listening to a broadcast will hear it quite often; it seems that there isn’t an announcer on the air that knows the term shouldn’t be used. Officials spend hours in pregame conferences discussing possible game situations. One that most assuredly needs to be covered is the forward and backward pass play. Officials have to make a determination as to whether a pass had been thrown forward or backward. If backward, the covering official has most likely indicated that by punching his arm toward the offensive team’s goal. The determination whether the pass was forward or backward is based on where the ball left the thrower’s hand and where it was first touched by a player, offensive or defensive, the ground or (in NCAA) an official. That is extremely important and can be a game-changer. If the ball hits the ground, whether it was touched by either an offensive or a defensive player and it was determined to have been thrown forward, the ball is declared dead and ruled an incomplete pass. If it has been determined to have been originally thrown backward, the ball remains live. A player from either team may pick up the ball and run with it. Wing officials have to be in position and ready to rule on whether a pass is forward or backward on every pass play. While some pass plays that are forward or backward are very obvious, a problem can occur when the quarterback turns and throws quickly toward a sideline. Such a pass may be thrown laterally in the dictionary sense, but for football situations, it’s going to be ruled either forward or backward. Some teams are now dropping a tackle (ineligible by number, not position as he’s stationed on the end of the line) into the backfield and throwing a screen pass to him. If the pass is ruled forward, the tackle should be ruled ineligible by number and a flag thrown for illegal touching. If it was backward, since all players are eligible to receive a backward pass, the play is legal. The legality of the receiver in that case is critical as he has an ineligible number. We may never see a day that announcers, coaches, players and others cease referring to backward passes as laterals. But officials can certainly work hard at getting the calls correct. What's Your Call? Leave a Comment: Note: This article is archival in nature. Rules, interpretations, mechanics, philosophies and other information may or may not be correct for the current year. This article is the copyright of ©Referee Enterprises, Inc., and may not be republished in whole or in part online, in print or in any capacity without expressed written permission from Referee. The article is made available for educational use by individuals.
<urn:uuid:48e15a11-bb1c-43ff-94bc-0c3194767d0e>
CC-MAIN-2022-33
https://www.referee.com/literally-lateral/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00268.warc.gz
en
0.968695
912
2.828125
3
In his annual address before the Federal Assembly on December 22, Russian President Dmitry Medvedev announced limited concessions to the liberal free-market opposition, while again insisting that the results of the parliamentary elections on December 4 were valid. His speech came after protests on December 10, the biggest demonstration in Russia in 20 years, as tens of thousands of protested in Moscow against ballot fraud. While dominated by the urban middle classes and right-wing, pro-Western opposition parties, the protests reflected wider social discontent with the Kremlin reflected in the collapse of the ruling United Russia party’s vote on December 4. It received 49.5 percent of the vote. Over 50,000 people are expected to attend the next protest rally in Moscow, on December 24. In his speech, Medvedev announced plans to reintroduce popular election of governors and a liberalization of electoral laws. At the same time, Medvedev confirmed the outcome of the recent parliamentary elections, adding that the government would not tolerate foreign meddling in Russia or that “provocateurs and extremists” undermine stability. This was a reference to pressure on the Kremlin from Western powers; US Secretary of State Hilary Clinton condemned the elections as “unfair” and “rigged”. Organizations involved in the protests, such as Solidarnost of Garry Kasparov or Parnas, led by businessman Boris Nemtsov, maintain close ties with US imperialism. None of Medvedev’s announcements went beyond the comments of Prime Minister Putin in his appearance on national television on December 15. Commentators have repeatedly called President Medvedev “a lame duck”, after the announcement that Putin would replace Medvedev as United Russia’s presidential candidate, in September. As his nomination for the post of Prime Minister depended on “United Russia’s” performance in the elections—which was very poor—it is not unlikely that Medvedev will soon take his leave from the political scene. In any case, it has become clear that Medvedev acts as a mere appendage to Putin’s administration. His remarks were aimed at appeasing the liberal opposition, promising it a greater share in the political system, while at the same time signaling to the ruling elite that the Kremlin has the situation under control. Both sides are eager to quickly reach a negotiated settlement, for fear that the protests which so far have been limited to sections of the urban middle classes might spread to the working class. In the run-up to the rally on Saturday, many liberals have cautioned not to insist on their demands for a recount and new elections, fearing that this might lead to a serious confrontation between the protesters and the ruling elites—something both the liberal opposition and the Kremlin desperately seek to avoid. The liberal Nezavisimaya Gazeta, for instance, wrote on December 22, that the opposition should confine itself to the demand for a liberalization of the electoral law: “The demand for an admission of a real, legal and institutionalized struggle for power is promising, as the ruling elite has already declared (at least in words) its readiness to make such concessions. (…) If the protesters prioritize such demands, putting them before other popular slogans, they will be able to achieve real political independence within the framework of the present system. Otherwise, a substantial stimulus for change will be difficult, not to say impossible—at least in a peaceful way.” Stanislav Belkovsky, the director of the Institute for National Strategy, commented on the speeches by Putin and Medvedev: “All this has one goal: to legitimize both the recent parliamentary and the up-coming presidential elections. This is an address to the active citizen: “Accept the election results, content yourself with them, and we will offer you some changes in return.” Liberal commentators have tried to present Medvedev’s announcements as a significant concession to the protesters, describing them as “a complex reform of the political system” (Kommersant)—which they are not, in fact. Putting aside the question of their implementation, the reforms Medvedev proposed are very limited and will have no significant impact on the general population, whose social and democratic rights are under attack from both the ruling elites and the liberal opposition. The first convention of the newly elected parliament on December 21, furthermore, was a clear signal that the Kremlin would not give in to demands for a recount or new elections. The newly elected Chairman of the Duma is United Russia’s Sergey Naryshkin, the former head of the Kremlin administration and a close confident of Putin. The parliamentary opposition—the Stalinist Communist Party of the Russian Federation (CPRF), the LDPR and Just Russia—voted against Naryshkin in an obvious attempt to distance itself from the ruling party in the run-up to the Saturday rally. However, all three parties demonstrated their support for the Kremlin’s policy by backing a resolution dismissing a European Union resolution protesting the rigged Duma elections. Underlying the Kremlin’s attempts to steal the protest movement’s thunder by making compromises with the liberals is the anxiety of a movement by the working class which none of the parties—“oppositional” or otherwise—could control. The ruling elites well remember the case of Pikolyovo: in the spring of 2009, the population of the town protested the layoff of the entire city’s workforce after the bankruptcy of the factory-owner, oligarch Oleg Deripaska. The trade unions and the CPRF were unable to appease the protests, and control over the situation was only regained when Putin himself went to Pikolyovo. He rebuked Deripaska for the wage arrears, warning that the state might take over his private company. However, since then Putin’s popularity has declined significantly. Since December 4 approval ratings for both the work of Putin and Medvedev have dropped by 9 and 10 percent respectively, to 51 percent each, according to a report by the Public Opinion Fund and the All-Russian Center for the Research of Public Opinion. Analysts suggest that Putin will not be able to win the presidential elections in the first round, with only 42 percent of the population ready to vote for him. Social tensions in Russia remain explosive. In his speech, Medvedev fraudulently tried to present his legacy as successful, claiming that wages and pensions had increased, while inflation and unemployment had declined. In reality, wages have increased by a mere 0.2 percent since the beginning of this year; given an inflation rate of 7 percent this effectively means a significant lowering of living standards. Large sections of the Russian population subsist with absurdly low wages and pensions. Furthermore, the alleged success of Medvedev’s modernization-campaign was proven a mere sham by the recent sinking of the obsolete oil-rig “Kolskaya” in the Sea of Orkhotsk on December 17. Neither Putin nor Medvedev deemed it necessary to comment on the tragedy, which claimed the lives of over 50 people.
<urn:uuid:9a4a9d47-674e-48ce-9372-1002e8f3a8d0>
CC-MAIN-2022-33
https://www.wsws.org/en/articles/2011/12/medv-d23.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00276.warc.gz
en
0.964805
1,471
2.1875
2
Would the book have been more effective if Krakauer had used a different organizing strategy? Answers 1Add Yours The narrative is very circular. Krakauer does this to build on Chris's character. There is some dramatic irony here in that most people knew what happened to Chris before they started the book. What fascinates us is the progression of Chris's character as well as the reflections of people he met. Krakauer chooses to build his narrative intersecting the past and the present in order for the reader to gain a deeper perspective on Chris and his motivations. I think this was a good way to really do service to such a unique soul.
<urn:uuid:e1c9648c-b8ac-4d73-8675-5fc4ebc23181>
CC-MAIN-2017-04
http://www.gradesaver.com/into-the-wild/q-and-a/into-the-wild-by-jon-krakauer-279900
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00364-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981522
134
2.0625
2
Table of Contents Hide - How Do You Train A German Shepherd? – Related Questions - Are German shepherds easy to train? - How do you discipline a German Shepherd? - What is the easiest way to train a German Shepherd? - What is the best age to start training a German Shepherd? - What are some bad things about German Shepherds? - Why German Shepherds bite their owners? - Should you hit a German Shepherd? - Do German shepherds bark a lot? - How long should I walk my German Shepherd puppy? - Are German shepherds aggressive? - How much is a trained German Shepherd? - How do you train a German Shepherd puppy to pee outside? - How much do German Shepherd puppies cost? - How do you train a German Shepherd not to bite? - How do you stop a German shepherd from biting? Given the intelligence of a German Shepherd, training a German Shepherd can be a difficult task. These dogs do not respond to negative reinforcement as well as positive reinforcement Hence, the two major ways to train a German Shepherd are positive reinforcement and negative reinforcement . Negative reinforcement is the most commonly used technique among dog trainers. Negative reinforcement is a technique in which a behavior is followed by a stimulus or stimuli that is unpleasant . In other words, the dog is given a stimulus as a response to its negative behavior.. How Do You Train A German Shepherd? – Related Questions Are German shepherds easy to train? German Shepherds are intelligent dogs, but they are not easy to train. Proper training for German shepherds can be difficult. They are sensitive, intelligent and strong-willed dogs. German shepherds are trainable, but they require that their owner be firm. You must be consistent and confident when training a German Shepherd. The best way to achieve the desired results is to have a treat in your hand whenever you are training your dog. The treats should not be the only reason you are training your dog. Rather, they are a reward for successful training. You should start off with simple commands like “sit” or “come”. When you are training your dog, it is important to understand that it will take up to 30 repetitions before they begin to understand the command. If you need to, practice the command during the day and reinforce it during the training session. Once your dog is used to the command, make it more challenging. For example, if you want to teach him something like sitting and staying, require him to stay sitting for longer periods of time.. How do you discipline a German Shepherd? There are some great solutions mentioned here, I’d like to add something I found out since I started caring about dogs, too. The best way to discipline a dog is to praise it only when it’s behaving correctly. So I use positive reinforcement for everything my dog does that I like. If he doesn’t understand what I want from him, I don’t scold him, I just try to explain him “this is what I want from you” and then praise him when he understands.. What is the easiest way to train a German Shepherd? The easiest method to train a German Shepherd is to use a proper training collar. The best choice is a strong prong collar. This collar sends a negative, painful stimulus to the dog’s neck whenever he misbehaves. In a matter of minutes, the dog will learn to control its behavior and start behaving well.. What is the best age to start training a German Shepherd? It is generally best to wait until your German Shepherd pup is at least 6 months old before you start training them. Before that, they will have too many accidents in the house, eat random things they shouldn’t, have no concept of how to communicate to you, and have no compulsion to listen to you (since they haven’t had much experience with people, don’t know any better, and haven’t had to listen to anyone before you). What are some bad things about German Shepherds? German Shepherds are great dogs! They can do a wide variety of things, like search and rescue, police, and as a guide dog. Although German Shepherds can be great, there are some bad things about them too. They require a lot of exercise, and need to be walked every day. They can also be very stubborn and dominant, and need a lot of discipline. They love to eat bones and to chew on things, and should be watched closely for this. Also, they grow very quickly. Their arms and legs can become too long for them, and they can get injured.. Why German Shepherds bite their owners? Dogs that bite for no reason, whether they belong to a specific breed or not, usually show aggression because of one or a combination of the following reasons:. Should you hit a German Shepherd? If a German Shepherd is hurting a human or another animal, the first thing to do is to make a loud noise near its ear. If that does not work, hit it on the back of the head. Make sure not to hit the dog too hard. Use a stick, a rolled-up magazine or a fist. In worst cases, you can use a tranquilizer gun. Do not hesitate. German Shepherds that attack humans have to be put down. So if there is no other alternative, do it.. Do German shepherds bark a lot? Yes and no. German shepherds do bark a lot compared to other breeds of dogs. But it depends on the dog. German shepherds were originally bred for herding and guard dog duties, and during such times, constant barking was necessary. However, it is incorrect to assume that they bark a lot just because they were bred that way.. How long should I walk my German Shepherd puppy? __% of the dog experts suggest that puppies should be walked every day. But some experts say that some breeds need more exercise than others. German Shepherds are active breeds which need a lot of exercise. They love running and hiking. They need sufficient physical activity for better health. Before taking them out for a walk, remember to take their physical condition into consideration. If they are too tired or they have been ill, do not take them for a long walk. This will prove harmful for their health, and they will have a hard time recovering from it. Take them out only when they are well and healthy.. Are German shepherds aggressive? No, German shepherds are not aggressive animals. However, they can be taught to be aggressive, and therefore, they can be made aggressive. This is because of simple cause and effect: if you train your German shepherd to be aggressive, he will be aggressive.. How much is a trained German Shepherd? A trained German shepherd will cost you anywhere between $1,500 and $3,000. Some of the most popular and proven guard dogs, police dogs and rescue dogs are German Shepherds. If you need a guard dog, then a German shepherd will do the job perfectly. And, if you are an aspiring police officer, you need to consider a trained German shepherd. German Shepherds are extremely fast and have quick reflexes, and because of this they make very good police dogs. Some of the most popular police dogs are German Shepherds.. How do you train a German Shepherd puppy to pee outside? Get yourself a plastic potty training tray with a lid. Put it in the spot you want the pup to use as a toilet, right next to the door, you can put some pee pads in it too. Also, you can put some old newspapers in there also. You are going to put some pee pads or some newspapers in there. You are going to take your puppy outside every hour on the hour, you are going to make him sit, and wait until he pees. If he doesn’t pee, put him back in the house. Do not let him in the house until he pees. You need to do this until he’s about 8 months old. After this, take him outside and say “potty”, and if he goes, make a big deal out of it and praise him.. How much do German Shepherd puppies cost? German Shepherd Puppies are widely used as working dogs. They are used by police, fire departments, rescue teams, by the military and by search and rescue organizations. They are also used as guide dogs, by the blind. The price of a German shepherd puppy will depend on its gender, color, pedigree, the place of purchase and the person selling the puppy. On an average, the price of a German shepherd puppy ranges from $200 to $2000.. How do you train a German Shepherd not to bite? The best way to train a German Shepherd is to not get one for a pet! Seriously, if you get a GSD, you should know that it is one of the most energetic and active breeds around. All the energy of this dog is spent in one direction: biting. If you train your dog to bite things then there is no way to stop it in the future, even if you use gentle methods in the beginning. Don’t think that your dog will disobey you in the future, there is an order in which the dog understands the commands. If you tell the dog to bite something it will do it. That’s why training a GSD requires much more energy than, for example, training a Labrador Retriever. However, it is possible to teach almost any dog to behave in a manner that can be described as “civilized” but the real results are achieved only when the dog is young.. How do you stop a German shepherd from biting? There are a lot of German Shepherd owners out there who are worried about their dog biting them or anyone around them. This is a natural behavior of a dog, biting. In fact, a dog would bite for a number of reasons. Here are a few reasons why a German Shepherd might bite:.
<urn:uuid:0e768b8a-c93d-4a75-8e92-98f06d1d6db3>
CC-MAIN-2022-33
https://zoowies.com/how-do-you-train-a-german-shepherd/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00267.warc.gz
en
0.97099
2,104
2.015625
2
Traditional medical treatments for tendonitis use a pharmacological approach to treating the injury accompanied by ice to control inflammation. But recent clinical trials have determined these injuries are the result of damage to the tendon at the cellular level. This damage results from micro tears in the connective tissue in and around the tendon. The healing response presents extended inflammation which retards healing combined with a rapid and unorganized formation of repair tissues in an effort to quickly heal the dysfunctional tendon. One approach to assisting in the natural tissue repair process is called transcutaneous tissue decompression (TTD) therapy. The treatment is applied with the use of a differential negative pressure applied along the functional direction of the tendon. This process accomplishes several objectives. The pressure extends to the cellular level reducing accumulated fluids, increasing vascular profusion within the entire tissue region and it aligning the the formation of the repair cells in an organized fashion. Clinical studies on negative pressure therapy have revealed its ability to reduce healing and rehabilitation time. The treatment is performed by certified massage therapist, physical therapist or chiropractors using specialized tools that are moved firmly along the muscle and tendon. The adhesions can be prevented or quickly released where they are absorbed as the new tissue lays down in a health manner. Howard Bailes is the manufacture of the FDA Class I DMS-2000 powerhead and tools used to treat a variety of soft tissue injuries. He can be reached at [email protected] (713) 501-0075
<urn:uuid:c6f6e058-9e13-4448-90f1-87132df1e7ab>
CC-MAIN-2022-33
https://dmthealth.com/healing-chronic-tendonitis-in-half-the-time-as-traditional-approaches/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00471.warc.gz
en
0.938464
299
2.375
2
Home > Student Accounting Services > Perkins/Institutional Loan Office > Loan Repayment Information Federal Perkins Loan Information A Perkins Loan borrower is not charged origination or insurance fees. However, if a payment is skipped, late, or made for less than the full payment amount, late charges may be incurred. If failure to make payments persists, collection costs may be incurred as well. Borrowers who have been attending school at least half time, have nine months after graduating, leaving school, or dropping below half-time status before entering into repayment status. This is called a grace period. At the end of the grace period, the borrower must begin repayment of the loan. Borrowers may be allowed up to 10 years to repay their loans. The monthly payment amount will depend on the size of the debt and the length of the repayment period. The minimum monthly payment is $40. Whitworth University is the holder of the loans and payments are made directly to Whitworth. Prepayment of some or all of the loan is allowed at anytime *Note: While attending Whitworth University the borrower's loan is automatically deferred. However, if the borrower leaves Whitworth to attend another school, submission of a deferment form is required each quarter or semester. Deferment of Loan Payments Under certain circumstances, the borrower can receive a deferment or forbearance on his/her loan. During a deferment, the borrower is allowed to temporarily postpone payment on the loan, and no interest accrues. Deferment may be received under certain conditions, such as unemployment. Click here for a list of deferments available. Deferments are not automatic. The borrower must apply for deferment through the school holding the loan by using the request form provided by that school. The deferment request must be filed on time or late charges may apply. For more details on deferment, contact the Student Loan Office. A borrower, who is temporarily unable to meet his/her repayment schedule but is not eligible for a deferment, may be eligible for forbearance for a limited and specific period. During forbearance payments are postponed or reduced. Interest continues to accrue and it becomes part of the borrower's Forbearance is not automatic. It may be granted in up to 12-month periods for up to three years. Forbearance must be applied for in writing through the school. Documentation must be provided to support the request for forbearance. Scheduled payments must continue being made until there is notification that deferment or forbearance has been granted. A loan can qualify for cancellation under certain conditions, provided that it is not in default; for example, if the borrower dies or becomes totally and permanently disabled, the loan can be cancelled. To see the list of cancellation conditions, click here. For more information, contact the Whitworth Student Loan Office. The Department of Defense may, as an enlistment incentive for students serving as enlisted persons in certain specialties of the U.S. Armed Forces, repay a portion of a borrower's student loans. This is not a cancellation. Those who think they qualify should contact their recruiting officer. For any questions regarding Federal Perkins Loan terms, repayment, deferment, forbearance, or cancellation, contact the Whitworth Student Loan Office. Only Whitworth may grant deferment, forbearance, or cancellation, or make other decisions concerning the loan. *Default: Is the failure to repay a loan according to the terms agreed upon in the signed promissory note. Default also may result from failure to submit requests for deferment or cancellation on time. The consequences of default are severe. Whitworth University offers automatic withdrawal from the borrower's checking account for monthly loan payments. Click here to access authorization form (PDF).
<urn:uuid:894f5074-2561-4814-8fbf-f275369e7c7d>
CC-MAIN-2017-04
http://whitworth.edu/Administration/BusinessAffairs/StudentAccountingServices/LoanOffice/LoanRepayment/LoanRepaymentInformation.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00480-ip-10-171-10-70.ec2.internal.warc.gz
en
0.931464
823
1.609375
2
New challenges face the health care system, the federal government and the American public now that elected representatives have completed action on historic health care legislation. President Obama signed the main health care bill into law early last week; two days later Congress gave final approval to a "reconciliation" package of changes that had been previously negotiated by the White House and congressional leaders. Deep partisanship remained on display as Republicans delayed the final Senate vote with a flurry of procedural objections and amendments that had no hope of passage. The reconciliation package included an overhaul of loan programs for college students. Like the health care reform legislation, the student-loan overhaul saved the government some money but then directed most of the savings into additional spending. The new health plan promises to increase the number of Americans with health insurance by 32 million. As The Concord Coalition has repeatedly argued, however, such an expansion in coverage makes it even more critical for doctors, hospitals, patients, insurance companies and federal agencies to work together to curb rising medical costs. Similarly, persistent tuition increases above the general inflation rate must be addressed. These increases are leaving young people with heavy debts and putting pressure on Washington to increase student aid programs. The new legislation, for example, will raise the maximum Pell grant to $5,900 over the next decade, up from $5,500 for the coming school year. Yet that will cover only a small portion of the expected tuition increases over that period. The Congressional Budget Office estimates that the new health care plan, through tax increases and funding cuts, could cut federal deficits by a total of $124 billion over the next 10 years. While such deficit reduction would be welcome, that estimate assumes there will be no backsliding from some very ambitious Medicare cost savings. Moreover, more than half of the promised deficit reduction ($70 billion) comes from premiums dedicated to future benefit payments for a new long-term care entitlement (CLASS). And even if all goes according to plan, $124 billion in deficit reduction is just a drop in the bucket compared to the trillions of dollars in addition debt that the United States is expected to rack up in the next decade. So the President and Congress must continue to search for more substantial deficit reduction. Furthermore, Washington must eventually pursue legislation in which deficit reduction is the primary goal.
<urn:uuid:2be7de19-275b-4fc8-b789-870fbcb115cf>
CC-MAIN-2016-44
http://www.concordcoalition.org/print/washington-budget-report/251229/13-2010
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00270-ip-10-171-6-4.ec2.internal.warc.gz
en
0.957074
465
2.09375
2
SAN FRANCISCO, CA – 01-16-2020 (PRDistribution.com) — San Francisco – In an effort to shake up Silicon Valley’s staid venture capital funding model, Sky 21 is announcing the launch of a first-of-its-kind idea stage fund. The studio will be helmed by 32 year-old Rohan Mathur with $1M in initial assets from US based investors. While venture capital partners typically enter the picture at the seed money stage when a proven Minimum Viable Product (MVP) has been established, Sky 21 aims to Fund, Build and Launch the Proof of Concept (POC) for startups, single entrepreneurs and even working professionals who wish to startup without quitting their existing jobs.Idea stage concepts typically emerge prior to the establishment of business plans, 3 year financial projections, defined product teams and other demands that venture capital funds typically require. Due to the gap, numerous ideas with significant market potential are abandoned due to necessary funding and strategic guidance. Sky 21 launched Startup Studio with the goal of addressing this gap and to take advantage of the significant opportunity in this stage.The studio aims to launch many ideas simultaneously and work quickly to vet out the most promising concepts through iterative adaptation. POCs that establish traction will then be pitched to venture capital firms for seed funding.“The world is changing quickly and so are the methods of doing business. With the rapid growth of technology and globalization, it has become extremely easy these days to get a product developed, marketed, tested and even discarded within a few weeks. The faster we try out new ideas, the sooner we are going to discover the unicorns. We believe that every business idea deserves to see the light of day, even if it is not yet backed by a sound team, financial projections & marketing strategy.” says Rohan Mathur (CEO – Sky 21 Venture Partners Inc.).Sky 21 is a micro venture capital firm with startup studio model that invests in startups at idea stage. It is headquartered in San Francisco, with chapters in Bengaluru, London, Tel Aviv, Stockholm, Helsinki, Berlin and Paris.For more information, please visit www.sky21.xyz For the original news story, please visit https://prdistribution.com/news/silicon-valley-based-startup-studio-announces-1mn-idea-stage-fund-will-be-investing-in-startups-having-just-an-idea.html.
<urn:uuid:74c323a4-a787-4835-b751-c862a928bca3>
CC-MAIN-2022-33
https://social.prdistribution.com/2020/01/17/silicon-valley-based-startup-studio-announces-1mn-idea-stage-fund-will-be-investing-in-startups-having-just-an-idea/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00275.warc.gz
en
0.913321
520
1.539063
2
Hi my dear foodie friends, This post is exclusive for those who are always hungry, lol. North Indian cuisines are appreciated all over India. I guess that’s the reason why one can easily find North Indian foods with some little variation in its taste and flavor in any part of India. North Indian cuisines are basically referred to the dishes from the state of Uttar Pradesh, Delhi, Punjab, and Rajasthan. Especially states like Punjab and Uttar Pradesh are known for very rich food in India. Uttar Pradesh is known for its different varieties of North Indian foods. Most of the sweets that you can find in any part of India have their origin in Uttar Pradesh, Punjab and Rajasthan. North Indian foods are also called “Punjabi food. The specialty of North Indian foods lies in its excessive use of dairy products like milk, ghee, paneer, butter and yogurt. North Indian vegetables and curries are largely dominated by thick gravy. Milk products are the main ingredients of gravy for these cuisines. In North Indian foods, breads come in different forms such as chapatti, roti, phulka, naan and puris, kulcha and paratha. In paratha - there are numerous varieties, depending upon the ingredients used in stuffing. Due to the Mughal influence meat foods became an integral part of North Indian cuisines. If you are in Pune and missing North Indian foods, then you can visit these restaurants. They are rated very high for North Indian cuisines in Pune. Barbeque Nation-J M Road Barbeque Nation has a chain of restaurants in various cities of India. In Pune too, it has numerous branches. But the one I am referring to is the one located on JM Road, near Deccan Gymkhana, R Deccan Mall. Though it is mainly famous for non vegetarian North Indian foods, but here you can also have some of the best vegetarian North Indian cuisines. It scores on all fronts, from service till ambience. Paasha- J W Marriot This is one of the most sought after place for North Indian foods in Pune. So whenever you plan to go there, book your table well in advance. It is very famous for Mughlai food too. Good ambience, sweet melodies, excellent view of the city, outstanding service and some lip smacking foods- if you want an excellent combination of all these things at one place then you should definitely go to this place. For North Indian vegetarian food lovers this is an ideal place in Pune. But if you are planning to go there, and then be mentally prepared for a waiting time of 30 minutes on weekdays and approx. one hour on weekends. Though the ambience is not that much opulent but you will like it. It offers a good value for money. Located at ITI Road, Aundh, Pune- Segree is much famous for North India Buffet. Its ambiance is quite vibrant and attractive. In desserts it has lots of varieties. In starters and main course too, you will find the things to be adequate and tasty. Best place for romantic and candle light dinner! There is a swallow pool inside the Hotel which is its main attraction. Hospitality and service are also very good and of highest standards. Its ambience is so good that it leaves its visitors calling forever! Keep reading my posts
<urn:uuid:d4dd8d8d-d804-4e91-9d95-97c73308563a>
CC-MAIN-2017-04
http://www.reviewandwriteup.com/2015/04/top-5-north-indian-food-restaurants-in.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00245-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959204
713
1.820313
2
It’s open enrollment time for millions of Californians who’ve enjoyed health insurance and quality medical care through the Affordable Care Act. And Covered California, the state agency that administers the law, once again is leading the charge to get people signed up. “The Affordable Care Act is now irrevocably woven into the fabric of America,” said Peter V. Lee, executive director of Covered California. “We are not going back to the days when health insurance companies could turn people away because of a pre-existing condition. Instead, we are looking forward to strengthening a system that is working and building on the historic gains we have made.” Consumers must sign up for new health insurance and renew or change existing health plans by Dec. 15 to have their coverage begin on Jan. 1, 2019. Covered California enrollment will continue through Jan. 15. “We know that life can change in an instant, and it’s important to have health coverage when it does,” Lee said. More than 3.5 million consumers have been enrolled through Covered California at one time or another since 2014. About 1.3 million consumers were enrolled in 2018, with nine out of 10 getting financial assistance to help them pay for coverage. In fact, Covered California has helped cut the state’s uninsured rate to a historic low of 6.8 percent. “Covered California has been a key factor for what we’re doing for our community, and we right away saw the tie-in between good health and economic health,” said Pepi Jackson, President Riverside County Black Chamber of Commerce. “A lot of people don’t know that they can now afford health insurance. It’s almost like, you can’t afford not to have it.” “Utilization is the key,” Jackson added. ”Even with health insurance, if you don’t utilize it, it’s almost like not having it. We want to make sure people understand their access to health insurance.” An estimated 1.1 million uninsured Californians are eligible to enroll in Covered California and new research shows that 82 percent of uninsured consumers surveyed, who are eligible for financial help to pay their monthly health care costs, do not know that they qualify for subsidies that can help bring that life-saving coverage within reach. Last month Covered California launched an ad campaign that shows that the average consumer pays $5 a day for health insurance, with many paying much less. Consumers can find out whether they qualify for financial help, and see which plans are available in their area with the Shop and Compare Tool. In addition, Covered California took its message to the streets by again launching its iconic statewide bus tour to encourage sign-ups, with a theme that “life can change in an instant.” The 10-day, 23-stop tour traveled more than 1,600 miles, beginning in Sacramento and visiting Oakland, San Jose, Salinas, Monterey, Santa Barbara, Los Angeles, San Diego, Palm Desert, Riverside, Bakersfield and Fresno. Covered California sought to top previous outreach efforts with attention-grabbing, local dance crews depicting unexpected health hazards and joyous events like the birth of a child at each bus stop. “No one wants to face a million-dollar medical bill alone, which is why you need health insurance, and a plan through Covered California will protect you and your family when you need it,” Lee said. Those interested in learning more about their health coverage options can go to www.CoveredCA.com, where they can enroll online or get free, confidential help to sign up for health plans from local certified enrollers in their area. Consumers can also enroll by calling Covered California’s service center toll-free at (800) 300-1506.
<urn:uuid:1edaeb23-b27a-4fe4-8008-4eaf4221e625>
CC-MAIN-2022-33
https://ourweekly.com/news/2018/12/14/theres-still-time-enroll-covered-california-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00071.warc.gz
en
0.95688
814
1.96875
2
Commercial Natural Gas Prices Drop to 12-Year Low in February, Saving Companies Billions of Dollars In a December 2011 report “Shale Gas: A Renaissance in U.S. Manufacturing,” PriceWaterhouseCoppers (PwC) predicted that cheap natural gas will spark an energy-related manufacturing renaissance that has the potential to create one million new American manufacturing jobs by 2025. Further, PwC estimates that lower natural gas costs will generate cost savings of $11 billion annually for U.S. manufacturers, which will make them more competitive globally, and will contribute to greater profitability, increased investment in domestic production, and increased employment opportunities. The drop in commercial natural gas prices to below $8 in February (and industrial prices, see update below), and to levels less than 50% of the spikes in 2005 and 2008 above $16, provides evidence that American manufacturers are saving billions of dollars collectively in energy costs as inflation-adjusted prices fall to 12-year lows. Thanks to having access to the world's cheapest natural gas, the U.S. has now emerged as one of the world’s lowest-cost manufacturing locations for producing chemicals, nitrogen fertilizers, ethylene, steel and iron. Welcome to the U.S. manufacturing renaissance, which has the potential to boost manufacturing employment by one million jobs by the middle of the next decade, according to PwC. Update: The chart below shows the monthly inflation-adjusted industrial price of natural gas, which was close to an 11-year low in February of $4.25 per thousand cubic feet. Industrial users are currently paying a price that is about 42% below the $7.31 average between 2001-2012, and about 70% below the peak price in 2008 of almost $14 per mcf.
<urn:uuid:86894179-1fed-4f50-8ee1-f4e256a0c145>
CC-MAIN-2017-04
http://mjperry.blogspot.com/2012/05/commercial-natural-gas-prices-drop-to.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00366-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950327
365
2.390625
2
North Wales Fire and Rescue Service are still on scene to douse remaining hotspots. Public Health Wales now advise that residents can leave their properties and open windows and doors as long as they are not affected by any further smoke or odours coming from the site. Council officers are in regular communications with our partners in NRWF, Emergency Planning, Natural Resources Wales and Public Health Wales and we will continue this work for as long as required. The roads that were closed are now in the process of being reopened. We would like to thank you for your continued cooperation during this incident. Please be aware that Wrexham Council has no connections to this site which is privately owned and operated. We do not use the facility for any of our household waste and have no financial interests in its operation. The site gained planning approval on appeal in 2004 by the Welsh Government Planning Inspectorate. The site is regulated by Natural Resources Wales. A large fire broke out last night (27.05.20) at Hafod Quarry and North Wales Fire Service remain in attendance this morning. The wind direction changed overnight and smoke is now affecting Wrexham town. Residents are advised to keep all windows and doors closed as the incident progresses. Cllr Hugh Jones, Lead Member for Communities, Partnerships, Public Protection and Community Safety, said: Our Public Protection Officers have been working closely with Natural Resources Wales who are the lead authority and will continue to do so as the incident progresses. It is important that residents stay in doors and keep all windows and doors closed.” Cllr David Kelly, Lead Member for Planning and Corporate Services, said: “The Council has worked closely with its partners throughout the night and ensured the necessary road closures were in place. Road closures continue in the area and everyone is advised to stay indoors and close all windows. We will remain on hand to assist as required as this incident progresses.” North Wales Fire and Rescue Incident Commander at the scene, Jeff Hall, said: “The nature of this fire is such that we expect to remain in attendance at the site for some time, probably for the next 24 hours. We are working on a multi-agency basis with our partners at National Resources Wales, Wrexham County Borough Council and North Wales Police to ensure the incident is brought under control and to protect local residents.”
<urn:uuid:ad5c6123-199d-49ea-97c4-2d74fc2b2eda>
CC-MAIN-2022-33
https://newyddion.wrecsam.gov.uk/fire-at-hafod-quarry/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00675.warc.gz
en
0.972025
503
1.59375
2
Copyright©2010 Antony Williams The functionality discussed below will be released at the ACS Spring Meeting during the week of March 21st 2010 The Royal Society of Chemistry has a whole series of databases. None of them have been structure searchable…until now. As with our PubMed integration and our Google Patents integration rolling out shortly, just because a database hasn’t had the chemical structures extracted and indexed doesn’t mean that those resources cannot be made “structure searchable”. It’s not a subtle distinction however, as discussed in the Google Patents blog post. These types of integrations depend on the correct association between chemical names and structures, access to an API allowing facile and flexible searching and, something that is purely serendipitous in nature, the absence of overlaps between chemical names and common language. We have used the recently announced RSC Publishing beta platform and the API made available to us to enable the searching. As my colleague Graham McCann announced recently “(the) platform gives access to over 500,000 journal articles, book chapters and database records through one simple search interface. The new platform delivers faster browsing, intelligent searching and more intuitive navigation and is open for beta testing now.” Our approach has been to search the title and the abstract for each of the databases for all of the validated identifiers. It works. It is FAST and it provides “structure-related” access to all six RSC databases. An example screen shot is below where a search on chlorobenzene retrieves data on each of the following databases: Mass Spectrometry Bulletin, Laboratory Hazards Bulletin, Methods in Organic Synthesis, Catalysts and Catalysed Reactions, Natural Product Updates and Analytical Abstracts. The screen shot below shows the analytical abstracts linked by the term chlorobenzene in the title or abstract itself. 284 hits..in a fraction of a second. The abstract is linked out to the original article via DOI, where possible. My personal favorites in the set of databases are the Natural Product Updates (NPU) and the Methods in Organic Synthesis (MOS) databases. The NPU database contains tens of thousands of natural product chemical structures, together with chemical names, references and some physical properties. Rich resources for ChemSpider. MOS includes includes reaction schemes, title and bibliographic details. Rich resources to connect to ChemSpider SyntheticPages in the future. We have only just started to tap into the riches contained within the RSC archive. It’s like stumbling across a roomful of rubies to pick up diamonds. There is content all around us waiting for us to connect. We will connect this up to ChemSpider and make it available. Access to the databases will be shown at the ACS Meeting in San Francisco.Stumble it!
<urn:uuid:6723c914-d499-4f6d-bcbf-69b297429157>
CC-MAIN-2017-04
http://www.chemspider.com/blog/integrated-rsc-databases-new-chemspider-functionality-at-acs-spring-2010-part-4.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00550-ip-10-171-10-70.ec2.internal.warc.gz
en
0.892951
583
1.78125
2
WASHINGTON (Jun. 14) The House Foreign Affairs Committee has taken vigorous exception to official U.S. tolerance of Arab discrimination against American Jews, publication of the report of the Committee’s Foreign Assistance Bill showed today. “The Committee was deeply disturbed to receive, during its consideration of the Foreign Assistance Act of 1962, evidence that certain foreign nations continue to make distinctions between American citizens because of color, religion or race in the granting of personal or commercial access and in the exercise of other rights available to American citizens,” the report states. It labels such discrimination “totally unwarranted and repugnant to our principles.” The report characterizes as a “strong expression” the amendment by Democratic Congressman Leonard Farbstein of New York which the Committee wrote into the bill. The amendment which was included in the measure as cleared today by the House Rules Committee for House debate, reiterates Congressional opposition to Arab discrimination and calls for adherence to the principle of equal rights for all Americans in U.S. negotiations with foreign powers under terms of the aid bill. The amendment provides also for the filing of regular annual reports by the Secretary of State to Congress on steps being taken to counter Arab discrimination. Democratic Congressman Emanuel Celler of New York told the House of Representatives today that a majority of its members–232–have now attached their names to a resolution he sponsored last month congratulating Israel on its 14th anniversary and calling for an Arab-Israel peace. Mr. Celler told the House that an additional 61 members signed the statement subsequent to its original sponsorship by 171 members. The New York lawmaker placed in the record the full list of the names of all the signatories who represented every section of the nation.
<urn:uuid:6e816426-4f15-4d66-a4e7-7cd5671e71d3>
CC-MAIN-2017-04
http://www.jta.org/1962/06/15/archive/congressional-body-deeply-disturbed-over-arab-action-against-u-s-jews
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00108-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958344
354
1.96875
2
Bloggers, tweeters, and techies met last week at a three-day forum – the Click Festival – intending to discuss and promote social media and technology. The setting would have been all too familiar in Tel Aviv, San Francisco, or New York, but this time, it was taking place in La Habana. In a country where Internet penetration is intentionally low, it is not surprising to hear the Cuban government sounding subversion alarms and accusing the attendees of seeking to incite political action. Despite its unsurprisingly anachronistic language, the aging Cuban political apparatus is somewhat in step yet appropriately afraid of the kind of expression that new media affords. The focus on technology, access, and communication as a means of empowerment and building social, economic, and political capital is admirable. But the road to achieving a critical mass of information hubs, of bloggers, of connected youth is ambiguous and often derailed by intolerance and repression. It begs the question: do virtual masses stand a better chance at unity or at change? From personal experience, I can recall standing mid-trivial-thought during a requested moment of silence at Pope Benedict’s mass in Santiago de Cuba at the end of March, when I heard a loud yell followed by the single loudest communal gasp I had ever heard. Andres Carrion Alvarez – a dissident on the island – had overcome the barriers and rushed out yelling in Spanish, “Down with communism!” before being pummeled by secret service officers. In turn, the masses began clamoring for his arrest, either from genuine disagreement or to hide personal concurrence and be safe from arrest themselves. I held back my excitement, not only because it would have been imprudent to yell out, but also because I was a prodigal child returning after 20 years of absence. My recently renewed Cuban passport gave me neither the right to clamor nor to judge those who remained silent. The sight looked like a Zimbardo experiment someone had left unattended: a group of subjects with assigned roles – some in power, some not – forgetting their humanity. Someone in a Red Cross t-shirt struck Alvarez with a portable stretcher, twice. These men seemed drunk on the kind of fabricated superiority a plutocrat would envy, secure in the certainty of their monopoly on morality on the island. On the ground, Alvarez stood alone among thousands that day. This incident was reported first in the blogosphere and in 140-character snippets full of abbreviations and Twitterisms. Mainstream media around the world was playing catch up. In part, it was not shocking that a brave man would yell so publicly; dissident groups on the island had been clamoring for the Pope’s attention for weeks before his arrival. Nor was the affront on human dignity that constituted his beating and detention a surprise; such treatment has been the modus operandi of the Cuban security apparatus for decades. In the Kafka-esque theater of absurdity that Cuba panders as reality to tourists – restaurant food beyond the budgets of average Cubans, dancing and singing in hotel lobbies that Cubans were legally barred from until recently – doubt and dissension have always been criminalized. But, during the Pope’s visit Santiago and Havana were brimming with additional tension. Plain-clothed security walked by freshly painted facades as strategically placed Cuban flags, branded with the creases of their recently removed packaging, flew above them. Demonstrators were banned from protesting in the weeks leading up to the papal visit, but commentary on Cuban reality, repression, and human rights appeared often in online dialogue, both formal and informal, on and off the island. The tools we normally use for recreation – cell phones, social media outlets – became the building blocks of the elephant in the plaza – what the Cuban people were not allowed to do and what the Pope was or was not saying were reported instantaneously through clicks and texts – loudspeakers for Cuban voices. But the connectivity of the Cuban people remains tightly controlled. Just a few days ago, when Google blocked Google Analytics on the island in accordance with laws governing the embargo, Cuba criticized the censorship and oppression this implied. Sadly, the acute irony of such accusations is too blatant to reflect the least bit of humor. The future of new technology in Cuba lies between a rock and a hard place, limited from both sides of The Florida Straights.
<urn:uuid:b6887534-7209-4aa7-9db8-0646c4b0d94e>
CC-MAIN-2017-04
https://mic.com/articles/10349/cuba-freedom-of-speech-dissident-voices-try-spreading-the-truth-through-texts-and-tweets
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00280-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967848
899
1.65625
2
Flagstaff, AZ – The first real snow of the winter is falling outside the Flagstaff Family Food Center. A man who simply calls himself, Davis, hunkers in next to the building and smokes hand-rolled cigarettes down to his fingertips. Davis says he knows snow makes a lot of people happy, but to him and his friends, it only brings worry. 1/1:35 it's too cold now 1/ 4:28 I don't know where they're gonna be sleeping at now Davis is in his late forties and is a native Arizonan. He worked for Union Pacific Railroad for fifteen years. But, Davis says a series of bad luck and bad choices forced him to live on the streets. 1/1:19 I got problems with my family my wife, my kids I got restraining order from her, that's why I'm over here now, two years now, two years on the street now Davis isn't alone on the streets. In fact, Coconino County Community Services estimates nearly a thousand people are homeless in the Flagstaff community. There are no city-run shelters and only a handful of independently run shelters and food centers. The Flagstaff City Council also recently passed an ordinance banning people from sleeping in cars on city streets. This is likely what landed Flagstaff on The Meanest Cities in America List issued this month by the National Coalition for the Homeless. So says Flagstaff's City Councilman and Vice Mayor, Al White, who opposed the ordinance. 1/1:55 there are so many people in America that are one paycheck away from being homeless, and my concern was when those people are forced into the streets that this ordinance didn't afford them any protections White says the ordinance was aimed at protecting the public by focusing on a core group of repeat indigent offenders, well known to law enforcement for substance abuse and mental illness. my problem with the ordinance as it was presented is that it didn't discriminate between those folks and people who are homeless for legitimate reasons, domestic problems, loss of work, those kinds of things In fact, many of the nation's homeless fall into this category. That's according to Louisa Stark, founding president of The National Coalition for the Homeless, the organization that puts out the annual meanest cities list. 1/17:45 a fair amount of homeless families become homeless because of an illness because of incredible bills which they feel incumbent to try to deal with Stark has worked with thousands of indigent people across the country. She says they often report feeling invisible or forgotten by the more fortunate around them. That's one of the factors the Coalition bases its annual list on, which, along with Flagstaff, included much larger cities like Las Vegas and San Francisco. 1/32:25 I think the National Coalition felt somewhat strongly about communities, or towns, or cities that were in denial they say either we don't have homeless people or it's not our issue, it's not our responsibility to deal with them 1/12:00 I think there's a tendency on the part of our cities to blame the homeless for their situation Stark says cities need to show political will in dealing with homelessness and also work on its root causes such as affordable housing, mental illness and substance abuse. Flagstaff City Councilman, Al White, says the council plans to discuss these exact issues in the near future. He says he would like to see Flagstaff ranked as one of the nicest cities for the treatment of indigent people. But the National Coalition for the Homeless does not currently compile such a list. For Arizona Public Radio, I'm Gillian Ferris Kohl.
<urn:uuid:42b266c3-ef49-4d8f-8563-bd699fe05faa>
CC-MAIN-2017-04
http://knau.org/post/mean-streets-flagstaff
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00191-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978833
748
1.789063
2
The Computer Laboratory is an academic department throughout the University of Cambridge that encompasses Computer Science, along with many features of Engineering, Know-how and Mathematics. That’s all there was to added the videos to your account at TVS. Listed below are our best selling kits to assist children all around the world learn science, expertise, engineering and math. Gore’s Information Infrastructure and Know-how Act of 1992, which addresses a broad spectrum of points ranging from high performance computing to expanded community entry and the need to make forefront technologies available to educators from kindergarten through graduate college. Or create new services and products by building your expertise in net design, computer graphics, or software engineering. Ethiopia has additionally seen impressive development this yr, with a further 2.3 million new customers translating to annual progress of more than 60 p.c. The minor in computer info expertise (CIT) teaches students in regards to the improvement and administration of business databases, computer networks, net purposes, and software program techniques. Students who choose to enroll in a doctoral program in computers and technology can anticipate their courses to be grounded in analysis. Pengertian dari media sosial adalah sarana untuk berinteraksi antara orang-orang dimana mereka dapat menciptakan, berbagi, dan bertukar informasi serta gagasan-gagasan dalam komunitas dan jaringan digital. MCIT is meant for students without a background in computer science or associated fields, and expects no prior experience in programming or software growth. In actual fact, cultural evolutionary studies have proven that power-regulation distributions are present in lots of domains where social affect is necessary, resembling child names, dog breeds, scientific citations (Bentley et al., 2004 ), and even decoration kinds in neolithic pottery (Neimann, 1995 ), the place one can safely exclude the influence of digital media. Our full suite of Digital 2019 studies consists of in depth insights into individuals’s use of the world’s prime social platforms in more than 230 countries and territories around the world. Here’s good news for all Google Chrome customers Google has announced that it’s going to quickly be eradicating these Chrome browser extensions that take consumer knowledge and usually are not complying to the corporate’s new coverage.
<urn:uuid:ff868a6c-9557-490e-a3e9-1dc0d8acc590>
CC-MAIN-2022-33
https://ymlp228.net/americas-bogus-wars-lower-the-defense-funds-in-half.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00071.warc.gz
en
0.864867
488
2.625
3
Non Alcoholic Drinks Non-alcoholic beverages are drinks with less than .05% alcohol in them. It is easy to mistake a non-alcoholic drink for one that does not have any alcohol at all in it. For many of the alcohol free drinks this is the case (zero alcohol content), but for non-alcoholic beers and wines there is a small amount of alcohol left behind by the process that removes the alcohol. Because of the minute amount of alcohol, it is illegal in many states for those under age 21 to purchase, possess, or drink them. Even though it is said that it would take more non-alcohol beers than you could actually consume in order to get a buzz or any level of intoxication from them, they are still illegal. As well, they are a potential danger for those who are in recovery from substance addiction, particularly alcohol. Some think that it is alright to drink non-alcoholic beverages and others argue that it is unhealthy and unsafe, mainly because when any amount of alcohol gets into the brain of someone once dependent then it can restart a biological process. So, it seems it may be best for some to stick to the zero alcohol, non-alcoholic beverages, such as ginger ale, Shirley Temples, soda pop, and best of all, water. Mocktails are the name given to cocktails without alcohol. When you are at the bar or tavern and do not want to order a drink with alcohol in it then you can order a non-alcoholic mocktail. There are many different types of mocktails. Usually a mocktail is made by removing the alcohol and replacing it with either the exact same ingredients minus alcohol or adding a dash of some other flavoring. Mocktails can taste just as good as the alcohol counterparts, and better yet drinking them will not get your license revoked for driving under the influence. Mocktails are excellent to serve at holiday functions like Thanksgiving, Christmas, Halloween, New Year's Eve, and other parties and gatherings where you would normally have regular drinks. Those looking for a simple non-alcohol drink for Christmas can try Egg Nog. Since Egg Nog can be fattening try buying the light version. If you don't do that then you can mix it with regular milk. Shake it up and then pour it out. Add cinnamon sprinkled on top. Non-alcoholic beverages are good for using at baby showers, weddings, parties, and any other times that you would traditionally think to serve alcoh0l. There are many types of non-alcoholic drinks. Some examples of non-alcoholic mocktail drinks are a Roy Rogers (diet Coke and Grenadine), Arnold Palmer (iced tea and lemonade), Safe Sex on the Beach (cranberry juice, grapefruit juice, and peach nectar) instead of Sex on the Beach, or a Virgin Daiquiri. There are hundreds of other mocktails and non-alcoholic drinks. Many times if you are in a restaurant or bar you can get the non-alcohol type of the drink by ordering it as a "virgin" which means without the alcohol or alcohol free. Mocktails for kids are also something to consider. Oftentimes, alcoholic drinks are appealing to younger folks, so allowing them the non-alcohol versions of some drinks is exciting for them. This is not to encourage drinking. Thinking about what the kids want to drink though should be done. Making neat or fancy drinks for the kids is fun for them. A Shirley Temple is a great mocktail for kids. When you make mocktails for kids, especially during the holidays, make them feel special. If you are making Christmas mocktails for kids then make sure they enjoy it. Add clean snow to a cup and a beverage of choice to make an awesome kids mocktail during the winter. One rising trend in the non-alcoholic drink department are energy drinks. The consumption of energy drinks has risen and continues to be a very popular non-alcoholic drink. However, because some energy drinks have such a high amount of caffeine and other herbal stimulants in them, they can be quite dangerous. The over-consumption of energy drinks has resulted in heart and other health problems. Drinking them in moderation or on occasion is better than using them as your non-alcoholic beverage substitute. Overall, drinking non-alcoholic beverages can be quite advantageous. By doing so, it is less calorie consumption and leaves you with a clear mind. Serving non-alcoholic drinks instead of alcohol is a fine choice. The pressure to consume alcohol is very strong, so deciding that your wedding shower, holiday party, or other event is going to be alcohol free is a good idea. At the bare minimum there should always be a non-alcoholic drink alternative for those who do not wish to get intoxicated or for those who cannot drink.
<urn:uuid:95282dae-4bfc-4a59-95a4-eb5f0498f7cd>
CC-MAIN-2017-04
http://www.infobarrel.com/Non-alcoholic_Beverages
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00283-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952033
989
1.953125
2
Thursday, 03 February 2022 The government’s Nationality and Borders Bill risks causing damage to the survivors the government intends to protect, modern slavery experts warn in a new report. Research undertaken by the University of Nottingham’s Rights Lab to investigate the proposals set out in Part 5 (Modern Slavery) of the Bill being debated in the House of Lords has found that, in its current form, will have negative unintended consequences on victims of trafficking and slavery. The work of the university’s world-renowned Rights Lab will serve as an evidence base to support amendments to Part 5 of the Bill. The news comes after a letter, signed by more than 100 leaders in the anti-slavery sector, called for Part 5 (Modern Slavery) of the Bill to be completely removed. The findings are summarised in a report, written in partnership with the Human Trafficking Foundation and with input from Catherine Meredith, of the Anti-Trafficking Team at Doughty Street Chambers, which details the potentially harmful consequences of the Bill, if it were to remain unchanged. The report shows evidence that the Bill will: - Create extra barriers to the identification of victims - Exclude significant numbers of victims, including those who are children and/or British, from receiving protection and support - Narrow the support victims will receive - Risk damaging prosecutions by preventing victims’ access to protection and support, allowing dangerous criminals to evade justice. Leaders from the entire anti-slavery sector attest that the Bill will reduce the number of criminal prosecutions for trafficking offences as, they say, there is no incentive for victims trapped in criminal exploitation, and conversely this Bill would make it risky and precarious to come forward. Lead author Kate Garbers, Rights Lab Research Fellow in Policy Evidence and Survivor Support, said: “The Bill in its current form is woefully at odds with the government’s intention to tackle modern slavery and human trafficking. The Bill poses risks to victim protection, criminal justice, and the UK’s fulfilment of its obligations under international law. Our research has found that Part 5 in particular, could have long-term impacts including reduction in: victim protection, ability to break trafficking cycles, and prosecution of perpetrators. Tamara Barnett, Director of Operations at the Human Trafficking Foundation, said: “Various clauses in Part 5 on Modern Slavery of the Bill have raised alarm bells in the antislavery sector. A government that has historically taken pride in leading the world in its response to modern slavery, and has recently restated its commitment to fight this heinous crime, therefore should listen when the entire antislavery sector, when chief modern slavery prosecutors and when leading police voice their concern that this Bill, as it is currently drafted, will make it harder for the most vulnerable to come forward and so reduce the rate of prosecutions and empower traffickers.” Trafficking should be removed from the face of the Bill, which is about immigration, not trafficking at all. The Bill contravenes the UK’s anti-trafficking obligations and will undermine the ability to protect victims and prosecute traffickers. Ahmed Aydeed, Director of Public Law at Duncan Lewis Solicitors, said: “There is a dichotomy between the Bill, as it’s currently drafted, and the commitment of successive governments to prioritise combatting modern slavery. The Bill in its current form further enshrines the hostile environment, a policy which has already led to a significant reduction in support and assistance for survivors. “The Bill, in particular Part 5, will likely lead to survivors not being identified, provided with inadequate support and will also likely lead to victims being re-trafficked. For example, Clause 58 in Part 5 sets a deadline for potential victims to disclose the full details of their exploitation or face a new statutory obligation that late provision of evidence must damage their credibility. It has long been recognised in domestic policy, domestic legal frameworks, by medical practitioners and other experts, that victims may be reluctant to come forward with information. The act of trafficking itself leaves victims extremely vulnerable and often leads to victims being distrustful of authorities. This distrust of authorities is used by the traffickers themselves to control victims and prevent them from reporting their exploitation. Aydeed continued: “Clause 58 enshrines misconceptions about modern slavery into primary legislation and will punish victims’ inability to readily share full details of the significant trauma they’ve suffered at the hands of their traffickers. It will therefore increase the control traffickers have over victims, and will discourage victims from coming forward and reporting their trafficking to the police.” The Rights Lab report has led to several follow up briefings being written to assist the Lords and MPs as the Bill continues its passage through the parliamentary process. It has also been used as an evidence base from which amendments have been drafted. In addition, two online virtual briefing sessions with Peers have been held in conjunction with others in the sector. On the 27th of January, the Bill entered Committee stage in the House of Lords where a detailed line by line examination of the separate parts (clauses and schedules) of the Bill takes place. Part 5 is set to be discussed next week (week commencing 7 February 2022). Kate Garbers added: “Amendments to be voted on at the Report stage will only be where the House of Lords believe there will be support or room for persuasion in the House of Commons. Members of the public can influence their local MP and have a say on this Bill by writing to their MP.” An example letter can be found at: https://www.humantraffickingfoundation.org/policy More information is available from Kate Garbers, in the Rights Lab at the University of Nottingham at firstname.lastname@example.org Notes to editors: The University of Nottingham Our academics can now be interviewed for broadcast via our Media Hub, which offers a Quicklink fixed camera and ISDN line facilities at Jubilee campus. For further information please contact a member of the Press Office on +44 (0)115 951 5798, email email@example.com For up to the minute media alerts, follow us on Twitter The University of Nottingham is a research-intensive university with a proud heritage. Studying at the University of Nottingham is a life-changing experience, and we pride ourselves on unlocking the potential of our students. We have a pioneering spirit, expressed in the vision of our founder Sir Jesse Boot, which has seen us lead the way in establishing campuses in China and Malaysia - part of a globally connected network of education, research and industrial engagement. Ranked 18th in the UK by the QS World University Rankings 2023, the University’s state-of-the-art facilities and inclusive and disability sport provision is reflected in its crowning as The Times and Sunday Times Good University Guide Sports University of the Year twice in three years, most recently in 2021. We are ranked seventh for research power in the UK according to REF 2021. We have six beacons of research excellence helping to transform lives and change the world; we are also a major employer and industry partner - locally and globally. Alongside Nottingham Trent University, we lead the Universities for Nottingham initiative, a pioneering collaboration which brings together the combined strength and civic missions of Nottingham’s two world-class universities and is working with local communities and partners to aid recovery and renewal following the COVID-19 pandemic.
<urn:uuid:cd95e553-db83-4788-a8eb-c3704a53036f>
CC-MAIN-2022-33
https://www.nottingham.ac.uk/news/anti-slavery-sector-urges-government-to-make-major-changes-to-dangerous-nationality-and-borders-bill
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00479.warc.gz
en
0.94559
1,560
2.234375
2
What are the functions of any successful marital relationship? In most cases, a healthy relationship is seen as a commitment and avoidance of infidelity. Cheating find your wife online damages trust as well as the meaning of the monogamous romantic relationship, while determination and understanding make the relationship work. In the long run, dedication and appreciate are the best materials for a successful relationship. But , how can a lot achieve these kinds of high specifications? Here are some suggestions. First, consider if the romantic relationship is really with respect to love or perhaps money. One of the most important characteristics of any healthy matrimony is forgiveness. Couples exactly who are willing to reduce one another happen to be closer than individuals who do not. Partnerships based on trust are more likely to last a lifetime than kinds based on too little of trust. To develop trust in your marriage, both partners must be sufferer and show common admiration. It takes equally partners’ dedication and willingness to forgive to make a stable matrimony. Responsibility is another crucial characteristic of an successful marital relationship. Both associates should take responsibility for their activities and functions in the romantic relationship. This does not mean alike responsibility. However , if a person partner certainly is the sole responsibility of a home, that may lead to the other being underappreciated and overworked. In addition , it is important to remember that each spouse needs the other to be able to thrive. Finally, this makes every partner come to feel more grateful of each other. The last of these characteristics is definitely friendship. The both of you must have strong friendships. This will likely prevent conflicts out of escalating. If you and your hubby are close friends, you will be able to communicate better and avoid a whole lot of unnecessary disputes. Furthermore, you have to listen to the husband and his goals, and become ready to help him if he needs that. A strong relationship is the key to a successful relationship. Mutual motivation is usually important. A great marriage requires couples who share the same desired goals. They should be content for each and every other’s successes and do not hold on what you believe is the best. It is necessary to talk about the future plans regularly. Make sure your loved one understands aims and supports you as you reach them. As a result, you’ll have a better chance of a sustainable marriage. Commitment and mutual beliefs are essential to get a happy matrimony. Commitment and shared values will certainly lead to a long-lasting romantic relationship, free of quarrelling and method credit cards. When these qualities https://www.zionempilhadeiras.com.br/2021/05/03/the-right-way-to-be-a-great-asian-better-half/ are in a relationship, it will not be hard for possibly partner to continue to keep it together. A very good marriage needs a powerful commitment right from both associates, and can last for the rest of your life. For anyone who is truly devoted to each other, you will see happiness and joy in the union.
<urn:uuid:027ea4de-c43e-4fc7-b404-31365bff9b29>
CC-MAIN-2022-33
https://www.comveritas.se/2021/12/18/the-functions-of-a-good-marriage/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00466.warc.gz
en
0.967337
635
1.757813
2
C++/difference between pointers and mem location I still dont understand what is the difference between pointers(*var) and memory locations (&var) what should each return?? also, what is the difference between calling a function as objectName->function() and 1. int i; 2. int *i; 3. int &i; 1. i defines a location in memory that holds an integer. The compiler reads/writes the integer using 'i'; 2. *i defines a location in memory holding an address. If the location is an address of an integer (i = &x), the compiler accesses the address using 'i' and it accesses the integer using *i. A pointer is an address and * tells the compiler to load what is at the address (as opposed to the address itself) 3. &i is a pointer (called a reference) and it, in essence saves from having to use the * operator. A reference to a struct allows you to use the . operator instead of the -> operator for a pointer to struct. Returning a reference is unusual in code other than operators. The reason it's used in operators is because you want the object returned to be the final result. Without the reference the operator returns a temporary which has to be created and copied. There really isn't a difference in the 2 return statements - one would have a reference passed in (you wouldn't return a reference to a stack-based object) and the other would have an address. objectName->function() means objectName is a pointer to the class. objectName.function() means objectName is an instantiation, not allocated. class someClass x, *px; These are the same: and these are the same: Hope this helps some.
<urn:uuid:c848b664-a85a-41f2-84bb-7fadd52eef34>
CC-MAIN-2016-44
http://en.allexperts.com/q/C-1040/2008/9/difference-pointers-mem-location.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00045-ip-10-171-6-4.ec2.internal.warc.gz
en
0.890009
377
3.09375
3
Creating Worker Role in Windows Azure Application Windows Azure has a project type i.e. worker role. Worker role applications are background processing application like windows process which runs on the background. In this article I am going to explain how to create worker role project and the various fundamental methods which are executed in worker role projects. Follow the steps given below to create or add Worker role in windows azure: · Open Microsoft Visual Studio 2010 as an administrator. · To create a new project File – New – Project. · Select Cloud template from the Installed Templates. · Select Windows Azure Project and enter the name of the project as WorkRoleExample. · Click OK to proceed. · To add a worker role to the solution, choose Worker Role and then choose the right arrow. The roles are displayed in the Windows Azure solution pane of the dialog box. · Click OK to add. In the below code snippet we have created a simple 'WorkerRole' class which inherits from 'RoleEntryPoint'. We have also defined as simple loop count variable called as 'intLoops' which is initialized to value 5. This value is initialized in the 'OnStart' method. 'OnStart' method is executed the first time when your worker role is executed. public class WorkerRole : RoleEntryPoint int intLoop = 0; public override bool OnStart() // Set the maximum number of concurrent connections ServicePointManager.DefaultConnectionLimit = 12; intLoop = 5; bool result = true; Trace.WriteLine("This is loop number " + intLoop, "Information"); if (intLoop == 0) result = false; After modifying the code in WorkerRole class, press F5 in order to debug your application. While debugging an application open Output window (Ctrl + W + O). The output should something like below: To check the running instance, open the shortcut menu for the Windows Azure icon in the notification area and then choose Show Compute Emulator UI. The Windows Azure Compute Emulator is displayed. Here you can also check the output as output indicated with the white line in the above figure. After reading this article you can easily create and use worker role in a windows azure application. I think this will help a lot.
<urn:uuid:93be0677-54ac-4e78-a19f-78dc3bc9d786>
CC-MAIN-2017-04
https://www.mindstick.com/Beginner/861/creating-worker-role-in-windows-azure-application
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00136-ip-10-171-10-70.ec2.internal.warc.gz
en
0.824223
482
1.828125
2
I need someone to explain to me what's the difference between decrement and increment and give me an example please(in real life) 11/30/2021 3:40:45 PM Revisit JS tutorial section. I tried to post link here but it's bugged for some reason. Maybe you would like to check out this one? let coins = 5; coins++; //Now coins=6 (increment) coins--; //Now coins=5 again (decrement) google is your friend btw ein siedler thank you 😊 Artur btw thanks too Send us a message
<urn:uuid:bf21b2b0-dc08-4779-8e36-2ae1b6e91749>
CC-MAIN-2022-33
https://www.sololearn.com/Discuss/2932659/all-about-increment-and-decrement-please/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00675.warc.gz
en
0.856403
181
2.75
3
Many of these applications advertise across social media platforms to lure customers. They charge ridiculously high interest rates (from 35-65 per cent). They are illegal and are not registered lenders as they are neither connected to banks nor NBFCs. Investigators reveal that upon downloading these loan apps and applying for a loan, the phone numbers of the borrowers/customers and their family members are instantly shared by the lending firm to their tele-callers and loan agents. The local/international tele-callers follow instructions from heads sitting in Jakarta (Indonesia) who have Chinese bosses. These tele-callers then reach out to the relatives and friends of the borrowers via WhatsApp groups or social media messages. The most attractive thing about these apps is that the loan amount is instantly transferred to the borrowers’ account upon approval. These mobile applications mandatorily require access to contacts, image and video gallery in the phone. The major documents required are Aadhaar and PAN card images. The security fall back is the access to contacts and gallery. TECHNICAL DETAILS OF THESE MOBILE APPS Google Play Store played host to hundreds of such apps that mushroomed as India went into a lockdown. Ever since complaints started flowing, Google has taken actions to curb such apps from being hosted on the Play Store. But these apps continue to change their avatars and exist under different forms and names. Recently, Google had taken down apps like Ok Cash, Go Cash, Flip Cash, ECash and SnapItLoan. But, creating and hosting such apps is not difficult in a place like Play Store. There needs to be a stricter protocol for fintech and finance-based mobile applications. Lack of digital and data literacy is the primary reason for all of these. These apps usually target Android phone users between the age of 21 and 40, cyber experts claim. Most of these apps give iOS platforms a miss, owing to the higher security in the platform when it comes to hosting applications. These applications also get their KYC (know your customer) done via 3rd party companies. Data is another grave concern about these Chinese-based lending applications. Data of millions of Indians are in the hands of these apps which are in turn controlled by Chinese companies. Recently, a popular Chinese micro-lending app ‘MoNeed’ was said to have exposed personal details in the form of over 350 million records of Indian users. The data was apparently stored in a Chinese data server. The Cyble reported that more than 150,000 IDs of Indians were leaked on the dark web by a Mandarin-speaking actor. The information fields include names and phone numbers, type and model of phone, list of apps in the phone, IP addresses, etc. The online payday loans Mississippi mobile app also requires a long list of permissions before installation; some even unwanted for a micro-lending app. This is a pattern we have seen across most Chinese applications. The same has been extensively covered before by India Today. This app, in particular, requires a host of unwanted permissions like connect and disconnect from Wi-Fi, full network access, control vibration, read phone status and identity, modify or delete the contents of your USB storage, directly call phone numbers, precise location (GPS and network-based), modify your contacts, etc. Moreover, the pandemic has made millions of Indians vulnerable to these loan sharks MoNeed has denied these allegations and has promised to investigate the “imperfections” in their technology implementations. MoNeed issued a statement stating that it follows all laws and regulations of India. While the company didn’t acknowledge the data breach, it said that the team has taken suggestions from cybersecurity researchers for “strengthening our firewall and security protection to completely meet the standards and requirements according to the laws and regulations set forth by authorities.”
<urn:uuid:ed1acebd-994b-417f-8453-d55380b7dde2>
CC-MAIN-2022-33
https://amoozesh.skfardad.com/defaulters-were-threatened-with-messages-17/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00074.warc.gz
en
0.955533
790
1.835938
2
Major histocompatibility complex |This article needs additional citations for verification. (October 2015) (Learn how and when to remove this template message)| The major histocompatibility complex (MHC) is a set of cell surface proteins essential for the acquired immune system to recognize foreign molecules in vertebrates, which in turn determines histocompatibility. The main function of MHC molecules is to bind to antigens derived from pathogens and display them on the cell surface for recognition by the appropriate T-cells. MHC molecules mediate interactions of leukocytes, also called white blood cells (WBCs), which are immune cells, with other leukocytes or with body cells. The MHC determines compatibility of donors for organ transplant, as well as one's susceptibility to an autoimmune disease via crossreacting immunization. The human MHC is also called the HLA (human leukocyte antigen) complex (often just the HLA). The mouse MHC is called the H-2 complex or H-2. In a cell, protein molecules of the host's own phenotype or of other biologic entities are continually synthesized and degraded. Each MHC molecule on the cell surface displays a molecular fraction of a protein, called an epitope. The presented antigen can be either self or non-self, thus preventing an organism's immune system targeting its own cells. In its entirety, the MHC population is like a meter indicating the balance of proteins within the cell. The MHC gene family is divided into three subgroups: class I, class II, and class III. Class I MHC molecules have β2 subunits so can only be recognised by CD8 co-receptors. Class II MHC molecules have no β2 subunits so can be recognised by CD4 co-receptors. In this way MHC molecules chaperone which type of lymphocytes may bind to the given antigen with high affinity, since different lymphocytes express different TCR co-receptors. Diversity of antigen presentation, mediated by MHC classes I and II, is attained in at least three ways: (1) an organism's MHC repertoire is polygenic (via multiple, interacting genes); (2) MHC expression is codominant (from both sets of inherited alleles); (3) MHC gene variants are highly polymorphic (diversely varying from organism to organism within a species). Major histocompatibility complex and sexual selection has been observed in male mice making mate choices of females with different MHCs and thus demonstrating sexual selection. Also, at least for MHC I presentation, there has been evidence of antigenic peptide splicing which can combine peptides from different proteins, vastly increasing antigen diversity. - 1 Discovery - 2 In immunity - 3 Genes - 4 Proteins - 5 Antigen processing and presentation - 6 T lymphocyte recognition restrictions - 7 In sexual mate selection - 8 Evolutionary diversity - 9 In transplant rejection - 10 HLA biology - 11 See also - 12 Notes and references - 13 Bibliography - 14 External links The first descriptions of the MHC were made by British immunologist Peter Gorer in 1936. MHC genes were first identified in inbred mice strains. Clarence Little transplanted tumors across differing strains and found rejection of transplanted tumors according to strains of host versus donor. George Snell selectively bred two mouse strains, attained a new strain nearly identical to one of the progenitor strains, but differing crucially in histocompatibility—that is, tissue compatibility upon transplantation—and thereupon identified an MHC locus. For this work, Snell was awarded the 1980 Nobel Prize in Physiology or Medicine, together with Baruj Benacerraf and Jean Dausset. Of the three MHC classes identified, attention commonly focuses on classes I and II. By interacting with CD4 molecules on surfaces of helper T cells, MHC class II mediates establishment of specific immunity (also called acquired immunity or adaptive immunity). By interacting with CD8 molecules on surfaces of cytotoxic T cells, MHC class I mediates destruction of infected or malignant host cells, the aspect of specific immunity termed cellular immunity. (The other arm of specific immunity is humoral immunity, whose relation to MHC is more indirect.) MHC is the tissue-antigen that allows the immune system (more specifically T cells) to bind to, recognize, and tolerate itself (autorecognition). MHC is also the chaperone for intracellular peptides that are complexed with MHCs and presented to TCRs as potential foreign antigens. MHC interacts with TCR and its co-receptors to optimize binding conditions for the TCR-antigen interaction, in terms of antigen binding affinity and specificity, and signal transduction effectiveness. Essentially, the MHC-peptide complex is a complex of autoantigen/alloantigen. Upon binding, T cells should in principle tolerate the auto-antigen, but activate when exposed to the allo-antigen. Disease states occur when this principle is disrupted. Antigen presentation: MHC molecules bind to both T cell receptor and CD4/CD8 co-receptors on T lymphocytes, and the antigen epitope held in the peptide-binding groove of the MHC molecule interacts with the variable Ig-Like domain of the TCR to trigger T-cell activation Autoimmune reaction: Having some MHC molecules increases the risk of autoimmune diseases more than having others. HLA-B27 is an example. It is unclear how exactly having the HLA-B27 tissue type increases the risk of ankylosing spondylitis and other associated inflammatory diseases, but mechanisms involving aberrant antigen presentation or T cell activation have been hypothesized. Tissue allorecognition: MHC molecules in complex with peptide epitopes are essentially ligands for TCR. T cells become activated by binding to the peptide-binding grooves of any MHC molecule that T cells were not trained to recognize during thymus positive selection. As a lineage of leukocytes, lymphocytes reside in peripheral lymphoid tissues, including lymphoid follicles and lymph nodes, and include B cells, T cells, and natural killer cells (NK cells). B cells, which act specifically, secrete antibody molecules, but do not bind MHC. T cells, which act specifically, as well as NK cells, which act innately, interact with MHC. NK cells express Killer Ig-like receptors (KIRs) that bind to MHC I molecules and signal through ITIM (immunoreceptor tyrosine inhibition motif) recruitment and activation of protein tyrosine phosphatases. This means in contrast to CD8/TCR interaction that activates Tc lymphocytes, NK cells becomes deactivated when bound to MHC I. When MHC class I expression is low, as is typically the case with abnormal cell function during viral infection or tumourigenesis, NK cells lose the inhibitory KIR signal and trigger programmed cell death of the abnormal cell. NK cells thus help prevent progress of cancerous cells by contributing to tumor surveillance. MHC class II MHC class II can be conditionally expressed by all cell types, but normally occurs only on professional antigen-presenting cells (APCs): macrophages, B cells, and especially dendritic cells (DCs). An APC takes up an antigen, performs antigen processing, and returns a molecular fraction of it—a fraction termed the epitope—to the APC's surface, coupled within an MHC class II molecule mediating antigen presentation by displaying this epitope. On the cell's surface, the epitope can contact its cognate region on immunologic structures recognizing that epitope. That molecular region which binds to—or, in jargon, ligates—the epitope is the paratope. On surfaces of helper T cells are CD4 receptors, as well as T cell receptors (TCRs). When a naive helper T cell's CD4 molecule docks to an APC's MHC class II molecule, its TCR can meet and be imprinted by the epitope coupled within the MHC class II. This event primes the naive helper T cell. According to the local milieu, that is, the balance of cytokines secreted by APCs in the microenvironment, the naive helper T cell (Th0) polarizes into either a memory Th cell or an effector Th cell of phenotype either type 1 (Th1), type 2 (Th2), type 17 (Th17), or regulatory/suppressor (Treg), as so far identified, the Th cell's terminal differentiation. MHC class II thus mediates immunization to—or, if APCs polarize Th0 cells principally to Treg cells, immune tolerance of—an antigen. The polarization during primary exposure to an antigen is key in determining a number chronic diseases, such as inflammatory bowel diseases and asthma, by skewing the immune response that memory Th cells coordinate when their memory recall is triggered upon secondary exposure to similar antigens. (B cells express MHC class II to present antigen to Th0, but when their B cell receptors bind matching epitopes, interactions which are not mediated by MHC, these activated B cells secrete soluble immunoglobulins: antibody molecules mediating humoral immunity.) MHC class I MHC class I occurs on all nucleated cells and also in platelets—in essence all cells but red blood cells. It presents epitopes to killer T cells, also called cytotoxic T lymphocytes (CTLs). A CTL expresses CD8 receptors, in addition to TCRs. When a CTL's CD8 receptor docks to a MHC class I molecule, if the CTL's TCR fits the epitope within the MHC class I molecule, the CTL triggers the cell to undergo programmed cell death by apoptosis. Thus, MHC class I helps mediate cellular immunity, a primary means to address intracellular pathogens, such as viruses and some bacteria, including bacterial L forms, bacterial genus Mycoplasma, and bacterial genus Rickettsia. In humans, MHC class I comprises HLA-A, HLA-B, and HLA-C molecules. MHC gene families are found in all vertebrates, though they vary widely. In humans, the MHC region occurs on chromosome 6, between the flanking genetic markers MOG and COL11A2 (from 6p22.1 to 6p21.3 about 29Mb to 33Mb on the hg19 assembly), and contains 240 genes spanning 3.6 megabase pairs (3 600 000 bases). About half have known immune functions. The same markers in the gray short-tailed opossum (Monodelphis domestica), a marsupial, span 3.95 Mb, yielding 114 genes, 87 shared with humans. Marsupial MHC genotypic variation lies between eutherian mammals and birds, taken as minimal MHC encoding, but is closer in organization to that of nonmammals, and MHC class I genes of marsupials have amplified within the class II region, yielding a unique class I/II region. |I||(1) peptide-binding proteins, which select short sequences of amino acids for antigen presentation, as well as (2) molecules aiding antigen-processing (such as TAP and tapasin).||One chain, called α, whose ligands are the CD8 receptor—borne notably by cytotoxic T cells—and inhibitory receptors borne by NK cells| |II||(1) peptide-binding proteins and (2) proteins assisting antigen loading onto MHC class II's peptide-binding proteins (such as MHC II DM, MHC II DQ, MHC II DR, and MHC II DP).||Two chains, called α & β, whose ligands are the CD4 receptors borne by helper T cells.| |III||Other immune proteins, outside antigen processing and presentation, such as components of the complement cascade (e.g., C2, C4, factor B), the cytokines of immune signaling (e.g., TNF-α), and heat shock proteins buffering cells from stresses||Various| MHC proteins have immunoglobulin-like structure. MHC I occurs as an α chain composed of three domains—α1, α2, and α3. The α1 rests upon a unit of the non-MHC molecule β2 microglobulin (encoded on human chromosome 15). The α3 domain is transmembrane, anchoring the MHC class I molecule to the cell membrane. The peptide being presented is held by the floor of the peptide-binding groove, in the central region of the α1/α2 heterodimer (a molecule composed of two nonidentical subunits). The genetically encoded and expressed sequence of amino acids, the sequence of residues, of the peptide-binding groove's floor determines which particular peptide residues it binds. Classical MHC molecules present epitopes to the TCRs of CD8+ T lymphocytes. Nonclassical molecules (MHC class IB) exhibit limited polymorphism, expression patterns, and presented antigens; this group is subdivided into a group encoded within MHC loci (e.g., HLA-E, -F, -G), as well as those not (e.g., stress ligands such as ULBPs, Rae1, and H60); the antigen/ligand for many of these molecules remain unknown, but they can interact with each of CD8+ T cells, NKT cells, and NK cells. MHC class II is formed of two chains, α and β, each having two domains—α1 and α2 and β1 and β2—each chain having a transmembrane domain, α2 and β2, respectively, anchoring the MHC class II molecule to the cell membrane. The peptide-binding groove is formed of the heterodimer of α1 and β1. MHC class II molecules in humans have five to six isotypes. Classic molecules present peptides to CD4+ lymphocytes. Nonclassic molecules, accessories, with intracellular functions, are not exposed on cell membranes, but in internal membranes in lysosomes, normally loading the antigenic peptides onto classic MHC class II molecules. Class III molecules have physiologic roles unlike classes I and II, but are encoded between them in the short arm of human chromosome 6. Class III molecules include several secreted proteins with immune functions: components of the complement system (such as C2, C4, and B factor), cytokines (such as TNF-α, LTA, and LTB), and heat shock proteins. Antigen processing and presentation Peptides are processed and presented by two classical pathways: - In MHC class II, phagocytes such as macrophages and immature dendritic cells take up entities by phagocytosis into phagosomes—though B cells exhibit the more general endocytosis into endosomes—which fuse with lysosomes whose acidic enzymes cleave the uptaken protein into many different peptides. Via physicochemical dynamics in molecular interaction with the particular MHC class II variants borne by the host, encoded in the host's genome, a particular peptide exhibits immunodominance and loads onto MHC class II molecules. These are trafficked to and externalized on the cell surface. - In MHC class I, any nucleated cell normally presents cytosolic peptides, mostly self peptides derived from protein turnover and defective ribosomal products. During viral infection, intracellular microorganism infection, or cancerous transformation, such proteins degraded in the proteosome are as well loaded onto MHC class I molecules and displayed on the cell surface. T lymphocytes can detect a peptide displayed at 0.1%-1% of the MHC molecules. |Characteristic||MHC-I pathway||MHC-II pathway| |Composition of the stable peptide-MHC complex||Polymorphic chain α and β2 microglobulin, peptide bound to α chain||Polymorphic chains α and β, peptide binds to both| |Types of antigen presenting cells (APC)||All nucleated cells||Dendritic cells, mononuclear phagocytes, B lymphocytes, some endothelial cells, epithelium of thymus| |T lymphocytes able to respond||Cytotoxic T lymphocytes (CD8+)||Helper T lymphocytes (CD4+)| |Origin of antigenic proteins||cytosolic proteins (mostly synthetized by the cell; may also enter from the extracellular medium via phagosomes)||Proteins present in endosomes or lysosomes (mostly internalized from extracellular medium)| |Enzymes responsible for peptide generation||Cytosolic proteasome||Proteases from endosomes and lysosomes (for instance, cathepsin)| |Location of loading the peptide on the MHC molecule||Endoplasmic reticulum||Specialized vesicular compartment| |Molecules implicated in transporting the peptides and loading them on the MHC molecules||TAP (transporter associated with antigen processing)||DM, invariant chain| T lymphocyte recognition restrictions In their development in the thymus, T lymphocytes are selected to recognize MHC molecules of the host, but not recognize other self antigens. Following selection, each T lymphocyte shows dual specificity: The TCR recognizes self MHC, but only non-self antigens. MHC restriction occurs during lymphocyte development in the thymus through a process known as positive selection. T cells that do not receive a positive survival signal — mediated mainly by thymic epithelial cells presenting self peptides bound to MHC molecules — to their TCR undergo apoptosis. Positive selection ensures that mature T cells can functionally recognize MHC molecules in the periphery (i.e. elsewhere in the body). The TCRs of T lymphocytes recognise only sequential epitopes, also called linear epitopes, of only peptides and only if coupled within an MHC molecule. (Antibody molecules secreted by activated B cells, though, ligate diverse epitopes—peptide, lipid, carbohydrate, and nucleic acid—and recognize conformational epitopes, which have three-dimensional structure.) In sexual mate selection MHC molecules enable immune system surveillance of the population of protein molecules in a host cell, and greater MHC diversity permits greater diversity of antigen presentation. In 1976, Yamazaki et al demonstrated a sexual selection mate choice by male mice for females of a different MHC. Similar results have been obtained with fish. Some data find lower rates of early pregnancy loss in human couples of dissimilar MHC genes. MHC may be related to mate choice in some human populations, a theory that found support by studies by Ober and colleagues in 1997, as well as by Chaix and colleagues in 2008. However, the latter findings have been controversial. If it exists, the phenomenon might be mediated by olfaction, as MHC phenotype appears strongly involved in the strength and pleasantness of perceived odour of compounds from sweat. Fatty acid esters—such as methyl undecanoate, methyl decanoate, methyl nonanoate, methyl octanoate, and methyl hexanoate—show strong connection to MHC. In 1995, Claus Wedekind found that in a group of female college students who smelled T-shirts worn by male students for two nights (without deodorant, cologne, or scented soaps), by far most women chose shirts worn by men of dissimilar MHCs, a preference reversed if the women were on oral contraceptives. Results of a 2002 experiment likewise suggest HLA-associated odors influence odor preference and may mediate social cues. In 2005 in a group of 58 subjects, women were more indecisive when presented with MHCs like their own, although with oral contraceptives, the women showed no particular preference. No studies show the extent to which odor preference determines mate selection (or vice versa). Most mammals have MHC variants similar to those of humans, who bear great allelic diversity, especially among the nine classical genes—seemingly due largely to gene duplication—though human MHC regions have many pseudogenes. The most diverse loci, namely HLA-A, HLA-B, and HLA-DRB1, have roughly 1000, 1600, and 870 known alleles, respectively. Many HLA alleles are ancient, sometimes of greater homology to a chimpanzee MHC alleles than to some other human alleles of the same gene. MHC allelic diversity has challenged evolutionary biologists for explanation. Most posit balancing selection (see polymorphism (biology)), which is any natural selection process whereby no single allele is absolutely most fit, such as frequency-dependent selection and heterozygote advantage. Recent models suggest a high number of alleles is implausible via heterozygote advantage alone. Pathogenic coevolution, a counterhypothesis, posits that common alleles are under greatest pathogenic pressure, driving positive selection of uncommon alleles—moving targets, so to say, for pathogens. As pathogenic pressure on the previously common alleles decreases, their frequency in the population stabilizes, and remain circulating in a large population. Despite great MHC polymorphism at the population level, an individual bears at most 18 MHC I or II alleles. Relatively low MHC diversity has been observed in the cheetah (Acinonyx jubatus), Eurasian beaver (Castor fiber), and giant panda (Ailuropoda melanoleuca). In 2007 low MHC diversity was attributed a role in disease susceptibility in the Tasmanian devil (Sarcophilus harrisii), native to the isolated island of Tasmania, such that an antigen of a transmissible tumor, involved in devil facial tumour disease, appears to be recognized as a self antigen. To offset inbreeding, efforts to sustain genetic diversity in populations of endangered species and of captive animals have been suggested. In transplant rejection In a transplant procedure, as of an organ or stem cells, MHC molecules act themselves as antigens and can provoke immune response in the recipient, thus causing transplant rejection. MHC molecules were identified and named after their role in transplant rejection between mice of different strains, though it took over 20 years to clarify MHC's role in presenting peptide antigens to cytotoxic T lymphocytes (CTLs). Each human cell expresses six MHC class I alleles (one HLA-A, -B, and -C allele from each parent) and six to eight MHC class II alleles (one HLA-DP and -DQ, and one or two HLA-DR from each parent, and combinations of these). The MHC variation in the human population is high, at least 350 alleles for HLA-A genes, 620 alleles for HLA-B, 400 alleles for DR, and 90 alleles for DQ. Any two individuals who are not identical twins will express differing MHC molecules. All MHC molecules can mediate transplant rejection, but HLA-C and HLA-DP, showing low polymorphism, seem least important.[clarification needed] When maturing in the thymus, T lymphocytes are selected for their TCR incapacity to recognize self antigens, yet T lymphocytes can react against the donor MHC's peptide-binding groove, the variable region of MHC holding the presented antigen's epitope for recognition by TCR, the matching paratope. T lymphocytes of the recipient take the incompatible peptide-binding groove as nonself antigen. The T lymphocytes' recognition of the foreign MHC as self is allorecognition.[clarification needed] Transplant rejection has various types known to be mediated by MHC (HLA): - Hyperacute rejection occurs when, before the transplantation, the recipient has preformed anti-HLA antibodies, perhaps by previous blood transfusions (donor tissue that includes lymphocytes expressing HLA molecules), by anti-HLA generated during pregnancy (directed at the father's HLA displayed by the fetus), or by previous transplantation; - Acute cellular rejection occurs when the recipient's T lymphocytes are activated by the donor tissue, causing damage via mechanisms such as direct cytotoxicity from CD8 cells. - Acute humoral rejection and chronic disfunction occurs when the recipient's anti-HLA antibodies form directed at HLA molecules present on endothelial cells of the transplanted tissue. In all of the above situations, immunity is directed at the transplanted organ, sustaining lesions. A cross-reaction test between potential donor cells and recipient serum seeks to detect presence of preformed anti-HLA antibodies in the potential recipient that recognize donor HLA molecules, so as to prevent hyperacute rejection. In normal circumstances, compatibility between HLA-A, -B, and -DR molecules is assessed. The higher the number of incompatibilities, the lower the five-year survival rate. Global databases of donor information enhance the search for compatible donors. Human MHC class I and II are also called human leukocyte antigen (HLA). To clarify the usage, some of the biomedical literature uses HLA to refer specifically to the HLA protein molecules and reserves MHC for the region of the genome that encodes for this molecule, but this is not a consistent convention. The most studied HLA genes are the nine classical MHC genes: HLA-A, HLA-B, HLA-C, HLA-DPA1, HLA-DPB1, HLA-DQA1, HLA-DQB1, HLA-DRA, and HLA-DRB1. In humans, the MHC gene cluster is divided into three regions: classes I, II, and III. The A, B and C genes belong to MHC class I, whereas the six D genes belong to class II. - Each person carries 2 alleles of each of the 3 class-I genes, (HLA-A, HLA-B and HLA-C), and so can express six different types of MHC-I (see figure). - In the class-II locus, each person inherits a pair of HLA-DP genes (DPA1 and DPB1, which encode α and β chains), a couple of genes HLA-DQ (DQA1 and DQB1, for α and β chains), one gene HLA-DRα (DRA1), and one or more genes HLA-DRβ (DRB1 and DRB3, -4 or -5). That means that one heterozygous individual can inherit six or eight functioning class-II alleles, three or more from each parent. The role of DQA2 or DQB2 is not verified. The DRB2, DRB6, DRB7, DRB8 and DRB9 are pseudogenes. The set of alleles that is present in each chromosome is called the MHC haplotype. In humans, each HLA allele is named with a number. For instance, for a given individual, his haplotype might be HLA-A2, HLA-B5, HLA-DR3, etc... Each heterozygous individual will have two MHC haplotypes, one each from the paternal and maternal chromosomes. The MHC genes are highly polymorphic; many different alleles exist in the different individuals inside a population. The polymorphism is so high, in a mixed population (nonendogamic), no two individuals have exactly the same set of MHC molecules, with the exception of identical twins. The polymorphic regions in each allele are located in the region for peptide contact. Of all the peptides that could be displayed by MHC, only a subset will bind strongly enough to any given HLA allele, so by carrying two alleles for each gene, a much larger set of peptides can be presented.[why?] On the other hand, inside a population, the presence of many different alleles ensures there will always be an individual with a specific MHC molecule able to load the correct peptide to recognize a specific microbe. The evolution of the MHC polymorphism ensures that a population will not succumb to a new pathogen or a mutated one, because at least some individuals will be able to develop an adequate immune response to win over the pathogen. The variations in the MHC molecules (responsible for the polymorphism) are the result of the inheritance of different MHC molecules, and they are not induced by recombination, as it is the case for the antigen receptors. - Cell-mediated immunity - Disassortative sexual selection - Humoral immunity - MHC multimer - Transplant rejection Notes and references - Janeway CA Jr, Travers P, Walport M, et al. Immunobiology: The Immune System in Health and Disease. 5th edition. New York: Garland Science; 2001 The Major Histocompatibility Complex and Its Functions - Kimball's Biology Histocompatibility Molecules - Janeway CA Jr, Travers P, Walport M, et al, Immunobiology: The Immune System in Health and Disease, 5th edn (New York: Garland Science, 2001), "The major histocompatibility complex and its functions". - Yamazaki, K.; Boyse, E. A.; Miké, V.; Thaler, H. T.; Mathieson, B. J.; Abbott, J.; Boyse, J.; Zayas, Z. A.; Thomas, L. (1976-11-02). "Control of mating preferences in mice by genes in the major histocompatibility complex.". Journal of Experimental Medicine. 144 (5): 1324–1335. doi:10.1084/jem.144.5.1324. ISSN 0022-1007. PMC . PMID 1032893. - Vigneron, Nathalie; Stroobant, Vincent; Chapiro, Jacques; Ooms, Annie; Degiovanni, Gérard; Morel, Sandra; Bruggen, Pierre van der; Boon, Thierry; Eynde, Benoît J. Van den (2004-04-23). "An Antigenic Peptide Produced by Peptide Splicing in the Proteasome". Science. 304 (5670): 587–590. doi:10.1126/science.1095522. ISSN 0036-8075. PMID 15001714. - Klein J (1986). "Seeds of time: Fifty years ago Peter A. Gorer discovered the H-2 complex". Immunogenetics. 24: 331–338. doi:10.1007/bf00377947. - Little CC 1941, "The genetics of tumor transplantation", pp 279–309, in Biology of the Laboratory Mouse, ed by Snell GD, New York: Dover. - Snell GD, Higgins GF (1951). "Alleles at the histocompatibility-2 locus in the mouse as determined by tumor transplantation". Genetics. 36: 306–310. - Thomas J. Kindt; Richard A. Goldsby; Barbara Anne Osborne; Janis Kuby (2007). Kuby immunology. Macmillan. ISBN 978-1-4292-0211-4. Retrieved 28 November 2010. - MHC Sequencing Consortium (1999). "Complete sequence and gene map of a human major histocompatibility complex". Nature. 401 (6756): 921–923. doi:10.1038/44853. PMID 10553908. - Belov K, Deakin JE, Papenfuss AT, Baker ML, Melman SD, Siddle HV, Gouin N, Goode DL, Sargeant TJ, Robinson MD, Wakefield MJ, Mahony S, Cross JG, Benos PV, Samollow PB, Speed TP, Graves JA, Miller RD (March 2006). "Reconstructing an ancestral mammalian immune supercomplex from a marsupial major histocompatibility complex". PLoS Biol. 4 (3): e46. doi:10.1371/journal.pbio.0040046. PMC . PMID 16435885. - Toh H, Savoie CJ, Kamikawaji N, Muta S, Sasazuki T, Kuhara S (October 2000). "Changes at the floor of the peptide-binding groove induce a strong preference for proline at position 3 of the bound peptide: molecular dynamics simulations of HLA-A*0217". Biopolymers. 54 (5): 318–27. doi:10.1002/1097-0282(20001015)54:5<318::AID-BIP30>3.0.CO;2-T. PMID 10935972. - Abbas; Lichtman A.H. (2009). "Ch.3 Antigen capture and presentation to lymphocytes". Basic Immunology. Functions and disorders of the immune system (3rd ed.). p. A.B. ISBN 978-1-4160-4688-2. - Aderem A, Underhill DM (1999). "Mechanisms of phagocytosis in macrophages". Annu. Rev. Immunol. 17: 593–623. doi:10.1146/annurev.immunol.17.1.593. PMID 10358769. - K. Murphy, “Antigen recognition by T cells,” in Janeway's Immunobiology, 8th, Ed., Garland Science, 2012, pp. 138-153. - Boehm T; Zufall F (2006). "MHC peptides and the sensory evaluation of genotype". Trends Neurosci. 29 (2): 100–107. doi:10.1016/j.tins.2005.11.006. PMID 16337283. - Haig D (November 1997). "Maternal-fetal interactions and MHC polymorphism". J. Reprod. Immunol. 35 (2): 101–9. doi:10.1016/s0165-0378(97)00056-9. PMID 9421795. - Ober C, Weitkamp LR, Cox N, Dytch H, Kostyu D, Elias S (September 1997). "HLA and mate choice in humans.". Am. J. Hum. Genet. 61 (3): 497–504. doi:10.1086/515511. PMC . PMID 9326314. - Chaix R, Chen C, Donnelly P (September 2008). "Is Mate Choice in Humans MHC-Dependent?". PLoS Genetics. 4 (9): e1000184. doi:10.1371/journal.pgen.1000184. PMC . PMID 18787687. - Derti A, Cenik C, Kraft P, Roth FP (April 2010). "Absence of evidence for MHC-dependent mate selection within HapMap populations". PLoS Genetics. 6 (4): e1000925. doi:10.1371/journal.pgen.1000925. PMC . PMID 20442868. - Janeš D, Klun I, Vidan-Jeras B, Jeras M, Kreft S (2010). "Influence of MHC on odour perception of 43 chemicals and body odor". Central European Journal of Biology. 5 (3): 324–330. doi:10.2478/s11535-010-0020-6. - Wedekind C, Seebeck T, Bettens F, Paepke AJ (June 1995). "MHC-dependent mate preferences in humans". Proc. Biol. Sci. 260 (1359): 245–9. doi:10.1098/rspb.1995.0087. PMID 7630893. - Jacob S, McClintock MK, Zelano B, Ober C (February 2002). "Paternally inherited HLA alleles are associated with women's choice of male odor". Nat. Genet. 30 (2): 175–9. doi:10.1038/ng830. PMID 11799397. - Santos, P S; Schinemann JA; Gabardo J; Bicalho MG (April 2005). "New evidence that the MHC influences odor perception in humans: A study with 58 southern Brazilian students". Horm Behav. 47 (4): 384–388. doi:10.1016/j.yhbeh.2004.11.005. PMID 15777804. - "The pill makes women pick bad mates" - HLA Alleles Numbers - Castro-Prieto A, Wachter B, Sommer S (April 2011). "Cheetah paradigm revisited: MHC diversity in the world's largest free-ranging population". Mol. Biol. Evol. 28 (4): 1455–68. doi:10.1093/molbev/msq330. PMID 21183613. - Babik W, Durka W, Radwan J (December 2005). "Sequence diversity of the MHC DRB gene in the Eurasian beaver (Castor fiber)". Mol. Ecol. 14 (14): 4249–57. doi:10.1111/j.1365-294X.2005.02751.x. PMID 16313590. - Zhu L, Ruan XD, Ge YF, Wan QH, Fang SG (2007). "Low major histocompatibility complex class II DQA diversity in the Giant Panda (Ailuropoda melanoleuca)". BMC Genet. 8: 29. doi:10.1186/1471-2156-8-29. PMC . PMID 17555583. - Siddle HV, Kreiss A, Eldridge MD, Noonan E, Clarke CJ, Pyecroft S, Woods GM, Belov K (October 2007). "Transmission of a fatal clonal tumor by biting occurs due to depleted MHC diversity in a threatened carnivorous marsupial". Proc. Natl. Acad. Sci. U.S.A. 104 (41): 16221–6. doi:10.1073/pnas.0704580104. PMC . PMID 17911263. - Abbas; Lichtman A.H. (2009). "Ch.10 Immune responses against tumors and transplant". Basic Immunology. Functions and disorders of the immune system (3rd ed.). p. A.B. ISBN 978-1-4160-4688-2. - Spurgin, Lewis G.; Richardson, David S. (2010-04-07). "How pathogens drive genetic diversity: MHC, mechanisms and misunderstandings". Proceedings of the Royal Society of London B: Biological Sciences. 277 (1684): 979–988. doi:10.1098/rspb.2009.2084. ISSN 0962-8452. PMC . PMID 20071384. - Major Histocompatibility Complex at the US National Library of Medicine Medical Subject Headings (MeSH) - Molecular individuality (German online-book 2012) - NetMHC 3.0 server — predicts binding of peptides to a number of different MHC (HLA) alleles - T-cell Group - Cardiff University - The story of 2YF6: A Chicken MHC - RCSB Protein Data Bank: Molecule of the Month - Major Histocompatibility Complex - dbMHC Home, NCBI's database of the Major Histocompatibility Complex
<urn:uuid:12283ef9-0a76-4c80-93e7-cbfbe8818eaa>
CC-MAIN-2017-04
https://en.wikipedia.org/wiki/Major_histocompatibility_complex
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00558-ip-10-171-10-70.ec2.internal.warc.gz
en
0.856355
8,474
3.78125
4
With a strike on Syria imminent and major budget battles on the horizon, Americans aren't counting on Congress to get anything done about illegal immigration this year. A new Rasmussen Report shows just 28 percent of voters believe comprehensive legislation will be passed by Congress and signed by the President. Confidence levels about the federal government security the border are also very low. But is President Obama actually waiting on Congress for reform? Not according to the Heritage Foundation. A continuing problem for the reformers is that just 32% of voters think it is at least somewhat likely that the federal government would actually secure the border and prevent illegal immigration, and that includes only eight percent (8%) who feel it’s Very Likely. Fifty-eight percent (58%) believe the government is unlikely to follow through with tighter border control, with 27% who say it’s Not At All Likely. Confidence in the likelihood of the federal government actually securing the border fell to a low of 28% in late June from a high of 45% in January. Just 28% of voters now think it is even somewhat likely that comprehensive immigration reform legislation will pass the Senate and the House and be signed by the president this year. Sixty-three percent (63%) view passage as unlikely. This includes seven percent (7%) who think it’s Very Likely and 20% who say it’s Not At All Likely. Congress hasn’t passed immigration legislation, but that hasn’t stopped President Obama from issuing directives that grant amnesty to illegal immigrants.Meanwhile, our southern border with Mexico is still wide open. Last week, the Obama Administration issued the latest in a line of policy directives granting amnesty by default. This latest directive instructs Immigration and Customs Enforcement (ICE) officials not to enforce immigration laws in cases where an illegal alien is the primary provider for any minor child—regardless of the child’s immigration status—or the parent or guardian of a child who is a U.S. citizen or legal permanent resident.
<urn:uuid:c75896ba-43da-4403-b360-10add87bc45c>
CC-MAIN-2017-04
http://townhall.com/tipsheet/katiepavlich/2013/09/03/america-yeah-immigration-reform-probably-wont-happen-n1690132
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00528-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952114
412
1.648438
2
Bharti Airtel has announced that it has acquired 19,800 MHz spectrum by securing a pan-India footprint of 3.5 GHz and 26 GHz bands. India's largest ever auction of spectrum used to carry mobile signals saw bids of Rs 1.45 lakh crore for 5G airwaves from groups run by tycoons Mukesh Ambani, Sunil Bharti Mittal and Gautam Adani on the first day on Tuesday. India's auction of the 5G spectrum, capable of offering lag-free connectivity and ultra-high speed internet, has garnered Rs 1.49 lakh crore worth of bids so far as the sale stretched to the third day. Firms run by tycoons Mukesh Ambani, Sunil Bharti Mittal and Gautam Adani as well as Vodafone Idea had put in bids worth Rs 1.45 lakh crore on the opening day on Tuesday and incremental demand for airwaves came in five rounds held on Wednesday. Firms run by tycoons Mukesh Ambani, Sunil Bharti Mittal and Gautam Adani as well as Vodafone Idea are participating in the e-auction to buy fifth-generation (5G) airwaves. The government netted a record Rs 1.45 lakh crore on the first day of 5G spectrum sale on Tuesday, much higher than the Rs 1.1 lakh crore it made in 2015. Mukesh Ambani’s Reliance Jio is expected to have contributed to the surge in collections, with Airtel and Vodafone Idea following behind. The coveted high-speed services are expected to be offered across top cities from September-October. The battle for India’s fifth-generation airwaves is luring some of the country’s richest tycoons, with billionaires Mukesh Ambani and Gautam Adani joining a raft of players expected to bid as much as $14 billion for frequency rights that could decide who dominates the digital era. The auction of 5G spectrum for telephony services will stretch to the fourth day on Friday after 16 rounds of bidding fetched bids worth Rs 1,49,623 crore. Telecom minister Ashwini Vaishnaw on Thursday said 16 rounds of bidding have been completed in three days and the auction will continue on Friday. A record over Rs 1.5 lakh crore worth of 5G telecom spectrum was sold in a seven-day auction ending on Monday, which saw billionaire Mukesh Ambani's Jio emerging as the top bidder to consolidate its leadership position. India's biggest-ever auction of spectrum that carries telephone and internet data signals, began on Tuesday with a total of 72 GHz (gigahertz) of 5G airwaves worth Rs 4.3 lakh crore on offer. India's 5G spectrum auctions entered Day 3 on Thursday with tenth round of bidding for airwaves that would power lag-free connectivity and ultra-high speed internet. The Chandigarh Housing Board (CHB) is poised to auction 154 properties - 101 commercial and 53 residential -from August 16 in the city. All eyes will be on the upcoming Pro Kabaddi League Season 9 player auctions as some of the biggest names will go under the hammer on Friday and Saturday from 6.30 PM onwards. The auction this year, to be telecasted Live & Exclusive action on the Star Sports Network and Disney+ Hotstar, will consist of over 500 players with 24 players from the top two teams of the Khelo India University Games. Reliance Jio has acquired spectrum in the 700MHz, 800MHz, 1800MHz, 3300MHz and 26GHz bands in the auctions conducted by the Department of Telecommunications, Government of India. Reliance Industries' Jio emerged as the biggest spender in India's $19 billion 5G spectrum auction, with the top telco player winning airwaves worth $11 billion to scale up its wireless network across the world's no.2 mobile market. The Gandhinagar Urban Development Authority (GUDA) plans to conduct an online auction of three plots in Kudasan, Sargasan and Vavol on September 15, claimed a senior official at the apex planning body. Indore district administration, with help of Madhya Pradesh Public Assets Management Department, is expecting to generate at least Rs 350 Crores of revenue by selling as many as three state government-owned properties of different departments, which are either lying vacant or are of no use For the first time in East Coast Railway, two commercial contracts were awarded by Waltair Division through e-auction. The e-auction was conducted for leasing the parcel space in Front SLR of Train no. 20805 AP Express running daily from Vizag to New Delhi. Art lovers can avail an opportunity to own prints by Lalitha Lajmi, one of India's best known artists, at an online auction August 10.
<urn:uuid:3fa657a1-e21b-45b9-9d9c-978708907261>
CC-MAIN-2022-33
https://timesofindia.indiatimes.com/topic/auction
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00474.warc.gz
en
0.953682
1,018
1.578125
2
In early April 2015, the Polish Internal Security Agency’s Governmental Computer Security Incident Response Team (also known as CERT—Computer Emergency Response Team), released its annual report on cyber security in Poland (Cert.gov.pl, April 3). According to the report’s findings, Poland came under a record number of hacker and cyber attacks in 2014—7,498 specific cyber attack “incidents” last year, compared to 5,670 confirmed incidents in 2013, 457 in 2012, and 249 attacks verified by CERT in 2011 (Cert.gov.pl, accessed April 28). In addition to a marked escalation in cases, the threat and level of sophistication of the registered cyber attacks also increased compared to previous years, in many cases pointing to state backing. The report highlights a series of high-profile hacking and distributed denial-of-service (DDoS) attacks against key Polish state and financial websites in mid-August 2014, including the homepage of Poland’s president and the Warsaw stock exchange. Those incidents were promptly claimed by an online group calling itself “Cyber Berkut,” which stated it was acting in retaliation against the Polish government’s support of the post-EuroMaidan Ukrainian authorities. However, what is novel about the 2014 issue of the CERT report, compared to all previous years, is the fact that, for the first time, it discusses an emerging “new trend” of “information war” directed against Poland via the Internet. As CERT notes, examples of such efforts include the dissemination of foreign “propaganda-disinformation” by bloggers and contributors to online discussion forums or website comments sections. Many such individuals, the report states, are on the payroll of a foreign state; while others may simply be naïve, misinformed or ideologically driven “useful idiots [sic]” whose viewpoints or standing can be exploited. Though the report does not specifically single out the Russian government as being behind this effort, CERT does highlight the veritable “deluge” of pro-Russia “trolling” commentary on the Polish Internet and blogosphere immediately following the Russian Federation’s annexation of Crimea (Cert.gov.pl, April 3). The Polish news outlet Niezalezna quickly pointed to these findings as examples of Russian hybrid warfare being waged against Poland (Niezalezna.pl, April 14). Cyber attacks and the weaponization of information—whether through propaganda, misinformation or disinformation (see Hot Issue, August 13, 2014)—are key elements of what has popularly become known as “hybrid warfare.” Those tactics, combined with the use of energy as a weapon, economic pressure, corruption or blackmail, intelligence operations, nuclear brinkmanship, all the way up to the use of special forces, support for irregular “partisan” formations and regular armed forces, among others, have exemplified Russia’s hybrid war against Ukraine in particular, and the West more generally. This hybrid war has been in effect since at least early 2014—if not arguably earlier (see EDM, October 10, 2013). The Kremlin also has Poland in its sights, though the recent CERT report is certainly not the first clear indication of Russian hybrid war tactics targeting this Central European country. In February, Russia’s newly revamped state news agency, Sputnik, opened a Polish-language version of its service, broadcast over the radio airwaves in Warsaw and via its website, Pl.sputniknews.com. The Kremlin created Sputnik—which brought together now defunct print and broadcast services Voice of Russia and RIA Novosti—in November 2014. This Russian propaganda outlet targets over 30 countries and is available in at least 27 languages (see EDM, November 12, 2014). Polish authorities reacted to the news of Sputnik’s Polish-language service with serious apprehension. In light of Sputnik’s launch in his country, Polish Foreign Minister Grzegorz Schetyna took the opportunity to warn of the subversive nature of Russian propaganda within the European Union that is being generously funded directly by Moscow. Moreover, he announced that his ministry would be looking into the newly formed oppositionist political party Zmiana (“Change”), founded by the openly pro-Kremlin Polish politician Mateusz Piskorski. Alluding to Zmiana’s suspected support from Moscow, Foreign Minister Schetyna stressed the need to monitor such groups and pay particular attention to where their funds are coming from (Polskie Radio, February 20). Whether or not this political party actually receives any direct monetary assistance from Russia, it seemed to have been formed rather suddenly several months ago, and its first party congress was held in Warsaw within days of Sputnik’s Polish edition launch. Zmiana’s leader, Piskorski, appears regularly on Sputnik-Poland to denounce the government, criticize the level of Poland’s democratic system, complain of Polish “extreme rightist” politicians, and assert that Polish and Russian national interest are (and need to be) fully aligned (Salon24, February 25; Pl.sputniknews.com, February 24). Yet, Russia’s hybrid war against Poland is not aimed only at spreading propaganda among Poles or creating potential client factions in the country’s political system—as Zmiana seems to exemplify. The objective of Russian informational warfare is also to sow distrust and exacerbate tensions between Poland and its closest neighbors. Illustratively, at the beginning of 2015, shadowy individuals created a pair of Facebook pages dedicated to so-called Vilnius and Lviv “people’s republics.” Photos at the top of both pages appeared to show armed soldiers with Polish insignia, and the two called for referenda on separating Polish-majority areas in Lithuania and Ukraine and annexing them to Poland. The virtual groups’ striking resemblance to the Moscow-backed separatist Donetsk and Luhansk “people’s republics” currently operating in eastern Ukraine is unmistakable (Defense24.pl, February 18). Though both Warsaw and the European Commission issued official protest notes against the creators of these cyber “statelets” (Gazeta Wyborcza, February 14), the existence of these Facebook groups nonetheless raised anxiety in the region—particularly in Lithuania, which is already worried about the political loyalties of its heavily pro-Russian Polish minority (Dziennik.pl, February 21; Wirtualna Polska, February 26). Indeed, around 60 percent of Lithuanian ethnic Poles receive their news primarily from Russian media sources (Rzeczpospolita, April 26). Poland lacks any significant Russian or Russian-speaking minority and it is too deeply entrenched in the Euro-Atlantic security architecture to expect that Moscow’s hybrid war directed against it could soon escalate to the point of “little green men” appearing on Polish territory any time soon. Nonetheless, Moscow’s moves seem to have at least three major goals. First, Russia aims to sow confusion, doubt and fear of economic-political instability domestically through propaganda such as the Polish edition of Sputnik as well as cyber attacks against government and financial institutions. Second it is trying to cultivate a cadre of pro-Moscow political elites in Poland, not only to criticize the government in power or to push Russia-friendly political policies, but also in the hopes that its “fifth column” may eventually enter parliament or even a future government. And third, Moscow is trying to undermine Warsaw’s ability to cultivate positive relations with its neighbors so as to break up the region’s ability to collectively stand up to Russian pressure. Since the start of the Ukraine crisis, Warsaw has been at the forefront in Europe in terms of supporting Kyiv in its fight against Moscow. This makes Poland a logical target for Russia’s hybrid war tactics. The Kremlin’s play book in this regard is easy to recognize, but it will take a focused and resolute effort on Warsaw’s part to successfully combat it.
<urn:uuid:1c939472-c668-47b5-962b-9959f3a65019>
CC-MAIN-2022-33
https://jamestown.org/program/russias-hybrid-war-against-poland/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00470.warc.gz
en
0.955008
1,688
1.679688
2
Indigenous Communities are at the Heart of Conserving Biodiversity and Protecting Mother Earth A photo essay by our member PACOS Trust, Malaysia. On Earth Day, this photo essay celebrates the beautiful interdependence between indigenous communities and nature. It shows various indigenous communities from Malaysia and some of their customary practices that reveal their strong role in biodiversity conservation. Strengthening Indigenous Peoples’ rights over their territories, and supporting their traditional community conservation practices are fundamental for protecting Mother Earth.
<urn:uuid:7a63863b-6727-4e08-9630-fa4959d3bf12>
CC-MAIN-2022-33
https://globalforestcoalition.org/indigenous-communities-heart-conserving-biodiversity-protecting-mother-earth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00478.warc.gz
en
0.930124
99
2.75
3
We’re lucky that we have an excellent local museum which brings history to life with amazing stories, brilliant re-creations, and displays that visitors can touch and try out. Explore Milton Keynes Museum. This month the museum is offering an Easter Egg Hunt. Everyone wins something – and gets to enjoy a tour of the whole site while searching for eggs they can trade in for a delicious chocolate treat. Sounds too good to miss! All you have to do is solve the clues to find all the eggs hidden across the museum. Each egg has a letter on it. When you have found all seven letters, you unscramble them and reach the final clue. If you get the answer right, you’ll win chocolate eggs (yay!) and you can also enter a daily raffle to win a bigger prize. While you’re there, there are a number of other Easter activities. Have a go at making our Victorian peg doll inspired ‘peek-a-boo’ Easter eggs. Another option is the bunny book marks drop in. If you keep losing your place in the book you’re reading, make your own Easter Bunny origami bookmarks. Both are drop-in sessions, suitable for all ages, running on 19th April and 22nd April, from 12.00pm to 3.00pm, in the stables. The Easter egg hunt is only one of the ways Milton Keynes Museum plans to entertain visitors over the four-day weekend. The museum has several other popular attractions. The Connected Earth gallery, telling the story of human communication, is always a huge hit, while the Victorian farmhouse is packed with things to try out and experience, from playing puff billiards in the parlour to taking a turn in the stocks in our courtyard. Other highlights include the chance to discover the history of transport in this area, experience an air raid in the wartime garden, and make a brass rubbing to take home. The museum is now in its summer opening hours which means throughout the Easter school holidays visitors are welcome from Wednesday-Sunday, 11am-4.30. Booking accommodation in Milton Keynes couldn’t be easier. Just call us on 01908 266602 to check availability and make your reservation.
<urn:uuid:be4da550-a6d0-416d-8a3e-a65b15afb4b2>
CC-MAIN-2022-33
https://butterflyloft.co.uk/tally-ho-the-easter-egg-hunt-is-on-at-milton-keynes-museum/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00071.warc.gz
en
0.931564
470
1.8125
2
The claimed invention describes methods to diagnose or aid in the diagnosis of cancer. The claimed methods are based on the identification of biomarkers which are particularly well suited to discriminate between cancer subjects and healthy subjects. These biomarkers were identified using a unique and novel screening method described herein. The biomarkers identified herein can also be used in the prognosis and monitoring of cancer. The invention comprises the use of leptin, prolactin, OPN and IGF-II for diagnosing, prognosis and monitoring of ovarian cancer.
<urn:uuid:6d137c2d-dbb5-4cee-8b25-376ecb97c8d4>
CC-MAIN-2016-44
http://techportal.eere.energy.gov/patent.do/ID=28024
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00096-ip-10-171-6-4.ec2.internal.warc.gz
en
0.949229
103
1.625
2
Just about two years ago I spent some time in Nara Old Town, in Nara Prefecture in Western Japan, Kansai. Walking around in the quite back streets of Nara’s older parts is a perfect way to spend a quiet evening and get some exercise as well. I especially love the different style of roofs in older Japanese towns, and one of my favorite types of buildings are the Sento, or public bath houses. The last two photos are of one bath house I passed in Nara Old Town. If Nara City in Western Japan is know for anything it is the Big Buddha and for the hundreds of wild deer roaming the streets. If there ever was a popularity contest I wonder who would win, the temple or the deer? Although I have never really had the time to focus an hour or so to taking photos of the deer it is hard to miss them just walking through the city and I took these snaps as I visited Nara a couple of years ago. Nara is one of my favorite places in Japan and I am always looking for excuses to visit. It is also a good place to base yourself for tourism to western Japan if the Kyoto hotels are full or the big city feel of Osaka is too intimidating. Nara is full of the old time small city charm even though there are close to 340 000 people living there. One of the greatest tourist attractions in Japan is the Nara Daibutsu, a huge buddha statue housed in the famous temple of Todaiji in Nara City, Nara Prefecture. Apart from the big statue itself there are plenty of smaller statues scattered around the main hall of the temple. The atmosphere is fantastic, air thick with incense smoke, prayers bells and the sunlight filtering in through the high windows. Well, at least if you go off season and on a weekday. Weekends and high season tends to get quite crowded especially recently with the absolute boom in overseas tourism. There is statuary of all kinds of materials, millennium old wood carvings, bronzes and clay to name a few materials. If you have the opportunity to visit, spare a few minutes for the “other” art treasures of the Todaiji! One of the most tourist friendly cities in Japan is Nara, famous for its many deers, huge parks, massive temples and last but certainly not least, the Daibutsu, the big Buddha statue at the Todaiji temple. The main temple building was constructed in the 8th century A.D., but it has been rebuilt twice du to fires. The present structure is from 1709 and it was the largest wooden building in the world until 1998. Unfortunately none of these photos gives any hint of how large the statue really is, but at 15m he is similar in height to a normal four storey building. Next time I will make sure I have enough time there to get some decent photos!
<urn:uuid:557f91bf-e14f-47de-9f48-a717a1a8aa5b>
CC-MAIN-2017-04
https://tokyobling.wordpress.com/tag/nara-prefecture/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00115-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968366
598
1.8125
2
Connecticut’s state bonding commission approved more than $40 million in borrowing on Friday. The bonding includes 1-point-1 million dollars for facility and exhibit improvements at the Discovery Museum and Planetarium in Bridgeport. At the beginning of this year, something changed for energy users in Connecticut. People who turned on lights or used a washing machine wouldn’t have noticed it, but some of the electricity powering those devices came from sources it had never come from before. Long Islanders are seeing more seals this year. It's tempting to say the reason there have been more sightings is all the cold weather we've been having, but researchers are still scratching their heads about it. New York State Department of Environmental Conservation Commissioner Joe Martens testifies during a joint legislative budget hearing on the environment on Wednesday, Jan. 29, 2014, in Albany, N.Y. Martens says his agency has “absolutely no plans” to issue permits for shale gas drilling and fracking in the 2014-15 fiscal year. One day after President Obama touted the hydro fracking of natural gas as a “bridge fuel,” New York's environmental commissioner says it’s “extremely unlikely” that permits for drilling wells will be issued in the next year. Three patients across three different states have new kidneys as a result of a six-person exchange that took place in December. The transplants happened in Connecticut, Ohio and Maine, and the results were announced at press conferences in all three states on Thursday.
<urn:uuid:68f21c78-139c-4a34-bffb-cf5ca9570af3>
CC-MAIN-2017-04
http://wshu.org/term/science?page=4
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00247-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965846
310
1.578125
2
| || | Ask Marilyn: Our Grading Practices Need to Change Kasi Allen at Lewis & Clark College in Portland, Oregon, writes: Marilyn: I'm writing regarding your response to a Baltimore teacher. (February 3, 2013) I am concerned that your response inadvertently misrepresents the issues at play with respect to our 0-100 grading system and perpetuates the misconception that we can support the academic success of all students with grading practices that stack the deck against many from the outset. I began my career as a high school math teacher and have been involved in mathematics education in one form or another for almost 27 years. I currently serve as a professor in a small college where I help prepare pre-service middle school and high school math teachers. In this capacity, I teach a course on quantitative literacy and grading that addresses the issue your reader writes about. The critical question, as I see it, is not whether teachers should "pad the grades," but how they should handle zeroes. Many teachers give students a "zero" for any form of missing work. This practice ensures a high failure rate for many students because, mathematically speaking, 0 out of 100 is a nearly unrecoverable score. The practice privileges students from backgrounds where there is strong support for completing homework. It further disadvantages students from households that can't offer such support and that often need students to work in order to make ends meet. Over the last decade, my home state has moved increasingly towards a proficiency-based grading system, whereby students receive grades based on what they know and have learned, rather than on the points they have accumulated. Advocates for proficiency grading often talk about how using a 0-4 grading scale, like the GPA scale, more fairly distributes the range of grades. In a 0-100 scale, the range for F (0-59) is almost 60 percent of the total scale, while the range for all the passing grades combined is just over of 40 percent of the scale. This is a problem. And what does the grade represent? Most people agree that a course grade communicates how well a student has mastered a particular subject. However, any teacher can tell you about brilliant students who fail classes because of missing assignments (even though they do quite well on tests) and others who receive high grades (despite failing scores on tests) because they have parents who help them complete homework assignments, take advantage of extra credit opportunities, and so on. Who really knows the material? Shouldn't the grade reflect this in some way? Like many of my colleagues, I believe the 0-100 grading scale is an outdated relic from a time that valued sorting children rather than supporting the success of every child. In my lifetime, I hope to see our grading practices change to better match our nation's educational goals. Thank you for your helpful contribution to this ongoing dialogue. Yet any grading system is ultimately in the hands of teachers who must tailor it for fairness in their own classrooms. This is necessary for a system to function across such a broad range of educational situations. I see this as part of their jobs, and I trust them to do it well. If a teacher has no sense about how to award grades appropriately, that's a fault of that particular teacher, not teachers in general or the overall grading system.
<urn:uuid:b57ba883-f6f6-4779-8108-05d62d9012cb>
CC-MAIN-2017-04
http://www.cape-coral-daily-breeze.com/page/dataFeeds_parade.display/ID/534321/PID/2/Ask-Marilyn--Our-Grading-Practices-Need-to-Change.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00164-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965611
675
2.265625
2
This is a second programming course for Computer Science majors with a focus on object-oriented programming. The course provides an introduction to the use of computers to solve problems using software engineering principles. Design, build, test, and debug medium-size software systems and learn to use relevant tools. Use object-oriented methods to create effective and efficient problem solutions. Use and implement application programming interfaces (APIs). Programming done in Java. Course CoordinatorFawzi Emad For office hours and other contact information, visit the contact web page. - Modern Software Development Using Java, Paul Tymann & Michael Schneider, Thompson (2004), ISBN: 0-534-38449-8 - Java Precisely, Peter Sestoft, MIT Press (2002), ISBN 0-262-69276-7 - Object-oriented software development - Software life cycle - Requirements & specifications - Designing objects & classes - Testing & code coverage - Unified Modeling Language (UML) - Programming paradigms - Design patterns - Algorithms & data structures - Asymptotic efficiency - Lists, stacks, queues - Trees, tries, heaps - Sets, maps, graphs - Programming skills - Java collection framework - Threads, synchronization There will be projects assigned continually. Some are considered "closed" assignments which you must complete by yourself and others are considered "open" assignments where collaboration is permitted. (More information about the open policy will be provided in class and can be found in the Policy Regarding Open/Closed Projects.) There will also be two midterms, a final exam, and occasional (announced) quizzes. All assignments can be done on the machines of your choice. You are welcome to do the work on a home computer if you have one. There should not be any machine-specific dependencies in your code. However, if we are not able to run your program because there is a difference between your and our computer environments, you must work with us to get your program to work in our environment. All assignments are due at 11pm on the day they are due. They are to be submitted electronically according to instructions given with the assignments. Late assignments will be strictly penalized. Exceptional circumstances will be considered only if discussed with the instructor before the assignment is due. Late assignments will have points deducted as follows: - -20% of the total if submitted within 24 hours. - No late assignments will be accepted after 24 hours. Final grades will be computed according the following weights. (These weights are tentative and subject to future adjustment.) All individual assignments/exams must be done individually. (The only exception to this are "open" assignments, which will be discussed in class.) Please visit the webpage of the Student Honor Council for a detailed explanation of what constitutes academic dishonesty. Note that it includes not only cheating, fabrication, and plagiarism, but also includes helping other students commit acts of academic dishonesty by allowing them to obtain copies of your work. You are allowed to use the Web for reference purposes, but you may not copy code from any website or any other source. In short, all submitted work must be your own. Cases of academic dishonesty will be dealt with harshly. Each such case will be referred to the University's Office of Judicial Programs. If the student is found to be responsible of academic dishonesty, the typical sanction results in a special grade "XF", indicating that the course was failed due to academic dishonesty. More serious instances can result in expulsion from the university. If you have any doubt as to whether an act of yours might constitute academic dishonesty, please contact your TA or one of the course coordinators. Excused Absence and Academic Accommodations Students claiming an excused absence from an exam must apply in writing and furnish documentary support (such as from a health care professional who treated the student) for any assertion that the absence qualifies as an excused absence. The support should explicitly indicate the dates or times the student was incapacitated due to illness. Self-documentation of illness is not itself sufficient support to excuse the absence. The course coordinators are not obligated to offer a make-up exam unless the failure to perform was due to an excused absence. Important: An excused absence does not typically translate into an extension for a project as we have a reasonable late policy for projects. It is also the student's responsibility to inform the instructor of any intended absences from exams for religious observances in advance. Notice should be provided as soon as possible but no later than the Monday prior to the exam for both the midterms and the final. Any student eligible for and requesting reasonable academic accommodations due to a disability is requested to provide, to the instructor in office hours, a letter of accommodation from the Office of Disability Support Services within the first two weeks of the semester.
<urn:uuid:94c37d50-910d-4589-9213-2c949a9d45cd>
CC-MAIN-2016-44
http://www.cs.umd.edu/class/sum2005/cmsc132/syllabus.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00096-ip-10-171-6-4.ec2.internal.warc.gz
en
0.929014
1,007
2.59375
3
Editorial: Clam Bayou inhabitants need your help May 11, 2011 When the Sanibel-Captiva Conservation Foundation announced last fall that it needed the assistance — to the tune of $5.3 million — of island residents, businesses and visitors in order to acquire the 28.3-acre Bailey Homestead, it seemed like a tall task. Yet in less than the nine month deadline imposed on the proposed purchase, the generosity of islanders was confirmed when earlier this week, SCCF proclaimed that their financial goal had been met. In this column, we urged our readers to open their hearts — and their wallets — in support of that noble cause, which will not only preserve a historic property for generations to come but help protect the island's precious wildlife. This week, we are again calling upon islanders to offer aide to another ongoing effort by SCCF... but this campaign won't cost you a dime. On Tuesday, May 17 and Tuesday, May 31, representatives from SCCF's Marine Lab will gather in a staging area at Bowman's Beach (adjacent to the main parking lot) to bag oyster shells from 8:30 a.m. to noon. Those bags will eventually be deployed into Clam Bayou, where critical reef habitat for several species — fish, birds, reptiles and mammals alike — have diminished over the years, hindering their health and jeopardizing their future existence in local waterways. According to event coordinator Sabrina Lartz, oysters form living reefs that provide nursery habitat for both adult and juvenile fish, shrimp and crabs, as well as feeding sites for many larger animals. Oysters also filter significant volumes of water, improving water clarity, stabilize sediment and shorelines. As a result of deploying bagged shells into Clam Bayou, the oyster-enhanced habitats will provide feeding areas for endangered species such as wood storks, snowy plovers, manatees and smalltooth sawfish. Since October, more than 17,000 pounds of oyster shells have been collected by island restaurants for this effort. Now, SCCF needs a bit of help in bagging those shells. We are requesting that the able-bodied members of our community contribute to this effort and volunteer at either clam bagging event. Or, better yet, both. Volunteers must register in advance by calling Lartz at 395-4617 or sending an e-mail to email@example.com. Participants will also be allowed to park free of charge at Bowman's Beach during these events, so it truly is a cost-free way to support SCCF. And offer a little bit of help to the fish, birds, reptiles and fellow mammals who inhabit Clam Bayou. — Reporter editorial
<urn:uuid:bc434227-a531-4f69-9fa0-8256d67bb7cb>
CC-MAIN-2016-44
http://www.captivasanibel.com/page/content.detail/id/511529/Editorial--Clam-Bayou-inhabitants-need-your-help.html?nav=5048
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00385-ip-10-171-6-4.ec2.internal.warc.gz
en
0.949886
570
1.835938
2
Facebook’s new Timeline layout will soon be every user’s default, and it will be like all other layout updates – a big pain. It will be annoying, confusing and frustrating. Facebook pages will be made to protest it which will like all the protest pages before it, be useless. The new layout presents issues that have Facebook users worried and techie bloggers in an uproar. A new series of security issues have come up since the Timeline layout was first presented by Facebook in late 2011. Butler University students need to learn from these security issues and take into account the dangers of carelessly posting information online. Facebook has sent some users warnings to “clean up” their profile within seven days before the Timeline layout goes into effect. In other words Facebook is saying to take down that picture somebody took of you shotgunning a beer last weekend, or that nasty post you made the other day. Employers can and will find these things and, when they do, best of luck finding a job. The Timeline layout is designed with pictures as the main focus, blown up on users’ walls, and the ability to look at your entire Facebook history just a click away. Now, Facebook users have to worry not just about the pictures and posts that have been put up recently but items that were put online years ago. Jordan Murphy, a freshman computer engineering and computer science major and IT Helpdesk technician, does not use Facebook because of the security risks. “Facebook takes so much of your information.,” Murphy said, “People put their lives on Facebook, and they have that information, and people can find it. I’ve also heard of companies hiring other companies to look into potential employees’ Facebook accounts and other online information. They can get a hold of nearly anything that is put online.” Regardless of what Facebook has or has yet to do with user information, Butler students would be wise to double-and triple-check their privacy settings on sites like Facebook and Twitter. Students should be careful of what they post and what pictures are on their accounts. The whole Facebook phenomenon and the numerous incidents that have happened as a result should be a lesson for everyone that uses the Internet. Do not post anything that a grandparent should not see, and always act like an employer is watching when online. Nobody wants to be the person who loses their job or gets kicked out of school because of something they posted on Facebook. Online, nothing is truly safe, nothing is truly private and we are all vulnerable.
<urn:uuid:68991a86-d2e8-4681-80ec-476b1a8ec39d>
CC-MAIN-2022-33
https://thebutlercollegian.com/2012/02/opinion-timeline-lesson-security/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00465.warc.gz
en
0.9606
527
1.9375
2
Around Christmas time you see the same, familiar words plastered on home decor, woven through songs and even printed on cookies. Hope, Peace, Joy. But I feel like a lot of people don’t really know what those words mean. Especially Joy. It’s funny how most people’s goal in life is “to be happy” because I’m discovering more and more that happiness is essentially impossible. Happiness is based on circumstance, so yes, you can achieve happiness if everything is right in the world, but there’s the problem. Nothing is right in the world. To get everything (and I mean everything) right in your world you would have to have piles of money and be really selfish. But even if you had everything right in your world, you flip on the news and learn that the rest of the world is messed up, so in order to achieve happiness now, you would have to live in denial that everything around you is as it should be. For a long time I used to get caught up in doing things that made me happy, but I’ve realized that these ‘things’ I’ve expended so much energy and time seeking are ultimately temporary and unsatisfying. What I should be seeking is joy. I think maybe people want to be happy so bad because they don’t really understand what joy is. See, happiness is easy to understand, but almost impossible to get, but joy is hard to understand, but easy to get. Take the Christmas story for example. If you really read the story and what it’s saying, it’s not a pretty story. There’s a tax audit coming from a country that’s not even their own and Joseph has to walk his 8-month pregnant fiance 90 miles to Bethlehem. (Not sure about you but walking 90 miles when your 8-months pregnant sounds awful) When they arrive, they’re notified that there’s no room for them to sleep, so Mary has to go have a baby in a barn with a bunch of stinky animals, and who shows up to support and take pictures to post on instagram? Some shepherds. I could go on, but you get the picture. None of these circumstances were ideal, yet it says that everyone that experienced the baby, experienced joy. “But the angel said to them, “Do not be afraid. I bring you good news that will cause great joy for all the people.” – Luke 2:10 Joy is not based on circumstance. It’s based on something much deeper and lasting. It can exist in any environment because it doesn’t require everything to be right with the world. It requires a Savior who has made everything right by His love and sacrifice. You can have joy when things aren’t all as they should be because it stems from confidence in knowing that Jesus is in control and makes all things as they should be. He knows what’s best for me better than I know what’s best for me, so when I release control of my life to Him, I take a huge pressure off my shoulders and enable the best plan for my life to become reality. Joy is amazing because you don’t have to have a bunch of “stuff” to have it. The longevity of joy manifests itself in your heart, then flows out of you and into other people, which changes their lives! I’ve changed my goal from the pursuit of happiness to the pursuit of Jesus because the more I hang out with Him, the more I experience joy and more I encounter His grace and love for us. “In Your presence is fullness of joy, at your right hand are pleasures forevermore.” -Psalm 16:11 If you’re going through a season of life where nothing is right and you are far from happiness, that’s okay. You can still rejoice in the JOY of the Lord. xx Nicole #DoStuff #BeStuff
<urn:uuid:64ac280d-0c7d-4c0b-8f5d-8e9d5f9b0958>
CC-MAIN-2022-33
https://nicolethenomad.com/2016/12/19/when-i-stopped-trying-to-be-happy/?replytocom=41
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00076.warc.gz
en
0.960696
858
1.617188
2
Maryland’s Department of Juvenile Services did not consistently implement or review treatment plans for its young charges, says a new state audit reported by the Baltimore Sun, a failure that cost the state $3 million in Medicaid money at a time when officials were cutting programs to close budget gaps. The agency also neglected to document properly the supervision of some troubled teens, including those in its hallmark Violence Prevention Initiative, a community program for young people most at risk of killing or being killed. “This has got to be one of the more depressing audits I’ve ever read,” said Matthew Joseph, director of Baltimore’s Advocates for Children and Youth, a watchdog of Juvenile Services. “It goes to the heart of the agency’s functions. It questions how the agency is even able to operate.” The Department of Juvenile Services said it has corrected problems documented in the audit, which covered August 2006 to mid-October 2009. In 2009, the agency had contact with about 33,000 juveniles – teenagers and children who have been charged with or found responsible for crimes – and spent about $275 million handling everything from intake and detention to treatment and community supervision. The agency is working to eliminate paper documentation of juvenile supervision in favor of an electronic system. It appeared to take a haphazard approach to contracts with private group home providers. Judges can sentence juveniles to live in those community-based settings instead of sending them to more secure state-run facilities.
<urn:uuid:a6012ab4-6be8-4779-a7aa-d74f0c103bdb>
CC-MAIN-2016-44
http://thecrimereport.org/2010/10/07/md-juvenile-crime-agency-failed-to-get-3-million-in-medicaid/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00509-ip-10-171-6-4.ec2.internal.warc.gz
en
0.958463
303
1.617188
2
Dogs/Few Questions About My Golden Hey there ^^ i was wondering i have a 8 month old female golden and she started her period so i was beginning to wonder how long she will have it? and how often does it come to her?.and about pregnancy,how long can she carry the pups? and how to deal with her in the period time and pregnancy time Thanks for your time ^^ Thank you for writing to me about your Golden. Here are some reasons to have your dog spayed at this stage before she goes into heat: neuter your pet! 1.Your female pet will live a longer, healthier life. Spaying helps prevent uterine infections and breast cancer, which is fatal in about 50 percent of dogs and 90 percent of cats. Spaying your pet before her first heat offers the best protection from these diseases. For every heat that a female goes through the chances of cancer increase dramatically so please have it done before her first heat. 2.Neutering provides major health benefits for your male. Besides preventing unwanted litters, neutering your male companion prevents testicular cancer, if done before six months of age. 3.Your spayed female won't go into heat. While cycles can vary, female felines usually go into heat four to five days every three weeks during breeding season. In an effort to advertise for mates, they'll yowl and urinate more frequently—sometimes all over the house! 4.Your male dog won't want to roam away from home. An intact male will do just about anything to find a mate! That includes digging his way under the fence and making like Houdini to escape from the house. And once he's free to roam, he risks injury in traffic and fights with other males. 5.Your neutered male will be much better behaved. Neutered cats and dogs focus their attention on their human families. On the other hand, unneutered dogs and cats may mark their territory by spraying strong-smelling urine all over the house. Many aggression problems can be avoided by early neutering. 6.Spaying or neutering will NOT make your pet fat. Don’t use that old excuse! Lack of exercise and overfeeding will cause your pet to pack on the extra pounds—not neutering. Your pet will remain fit and trim as long as you continue to provide exercise and monitor food intake. 7.It is highly cost-effective. The cost of your pet's spay/neuter surgery is a lot less than the cost of having and caring for a litter. It also beats the cost of treatment when your unneutered tom escapes and gets into fights with the neighborhood stray! 8.Spaying and neutering your pet is good for the community. Stray animals pose a real problem in many parts of the country. They can prey on wildlife, cause car accidents, damage the local fauna and frighten children. Spaying and neutering packs a powerful punch in reducing the number of animals on the streets. 9.Your pet doesn't need to have a litter for your children to learn about the miracle of birth. Letting your pet produce offspring you have no intention of keeping is not a good lesson for your children—especially when so many unwanted animals end up in shelters. There are tons of books and videos available to teach your children about birth in a more responsible way. 10.Spaying and neutering helps fight pet overpopulation. Every year, millions of cats and dogs of all ages and breeds are euthanized or suffer as strays. These high numbers are the result of unplanned litters that could have been prevented by spaying or neutering. For every puppy born there is one less home for a dog on death row. The tragedy and heartache of overpopulation if you take a close look at it would likely convince you to enjoy your dog and if you want another one to adopt a rescue. There are lots of Goldens that are desperate for homes and many that are killed in shelters that you could help. Professional breeders do not do it for profit. They only will do it to keep the integrity of the breed which means things like x-rays to insure that there are no defects, blood tests to insure that there are no congenital deformities, etc. If you are not a full time professional breeder, and believe me, we don't need any more on this planet, then just enjoy the wonder of your dog and focus on rescue instead. I know this is probably not what you expected to hear but as someone involved in rescue I must share this information with you.
<urn:uuid:0377a401-43df-47d0-9f83-acbebe54e96f>
CC-MAIN-2017-04
http://en.allexperts.com/q/Dogs-701/2013/2/few-questions-golden.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00158-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963013
965
2.109375
2
FROM PAGE TO STAGE Now in its eighth year in London, the National Theatre’s production of War Horse has become a theatre favourite. It’s an unforgettable experience and has gained global fame partly due to its life-like puppetry. Based on the Michael Morpurgo novel, it focuses on the relationship between a boy named Albert and his horse Joey. Joey is taken away from Albert and is sold to the cavalry at the outbreak of World War One. The story focuses on Albert’s search to find his beloved horse. Joey and Topthorn, a large sleek horse who together steal the show, are intricately made in South Africa by the Handspring Puppet Company and maintained at the onsite workshop at the theatre in London. Each horse weighs around twelve stone and is controlled by three actors, who undergo an eight week rehearsal period, two of which are solely learning puppetry and how to work together as a team to play their positions within the horse. The head, the heart and the legs are the three main movements of the puppets. This makes sure that the puppets are never static on stage, allowing them to always come to life. The puppets are joined on stage by 32 other cast members, with every actor taking on multiple character roles throughout the performance. As an official outfitter to the officers of the H.M Forces and Woman Services, one particular interest to us was the costumes used in the show, which are mainly military uniform, made to the original specifications that were worn by the armed forces during World War One. Made using tweed sourced in Britain, each characters’ costume is duplicated so that they have a clean version and a more ‘worn’ version with mud splattered across the pieces. For your chance to win tickets to the show and find out more about the War Horse performance, click here. Photo Credits: Ellie Kurttz, National Theatre, Brinkhoff Mogenburg, Handspring Shop.
<urn:uuid:498b4127-3772-42d1-afeb-adca329379e6>
CC-MAIN-2017-04
http://www.daks.com/dnnsite/products/notebook/notebook.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00489-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972753
407
2
2
The New South Wales Department of Planning & Environment (DPE) undertook a number of inspections a coal mines in the Australian state in July – including two at Rio Tinto’s Mount Thorley Warkworth coal mine. The DPE also visited all of Whitehaven Coal’s properties, including the Canyon, Maules Creek, Narrabri, Rocglen, Sunnyside, Tarrawonga and Vickery mines, as well as the company’s coal handling and preparation plant in Gunnedah. In addition, Peabody Energy’s Metroplitan and Wambo mines were also inspected, as well and Boggrabri mine, which is majority owned by a subsidiary of Japanese company, Idemitsu Kosan. No enforcement actions were taken against the inspected coal mines. Mines and quarries comprised 22 of the 96 inspections undertaken by the DPE in July. The majority of inspections (61) took place at infrastructure and other projects, while 11 took place a industrial sites. Edited by Jonathan Rowland. Read the article online at: https://www.worldcoal.com/mining/12092016/dpe-inspects-eleven-coal-mines-in-july-2016-2400/
<urn:uuid:7e4a85ff-3b85-46ae-a0ea-27674a777954>
CC-MAIN-2022-33
https://www.worldcoal.com/mining/12092016/dpe-inspects-eleven-coal-mines-in-july-2016-2400/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00068.warc.gz
en
0.955956
262
1.664063
2
Los contagios de la viruela del mono han ido creciendo...Leer más Globally, the push to introduce booster shots has prompted pushback from the World Health Organization (WHO) and rights groups, who say the focus should remain on getting first doses to the world’s most vulnerable. The decision to offer some people third doses comes as Israel, which was among the fastest countries to vaccinate in the winter and then among the first to begin reopening in the spring, is experiencing a surge in new cases, spurred by the prevalence of the highly transmissible delta variant, first identified in India. Over the past month, infection rates in Israel have spiked from single digits to more than 400 a day. And on the same day, Pfizer officials met with top U.S. federal health officials to make their case for administering some Americans — particularly the elderly and the immunocompromised — a third dose six to 12 months after receiving the companies’ two-shot regimen. That meeting came after the Department of Health and Human Services publicly rebuked Pfizer when it and the German company BioNTech announced last week they planned to seek an emergency use authorization for its booster shot. HHS said that fully vaccinated Americans do not need a booster for now. Pfizer suggests booster shots will be needed this year, but government officials say science will dictate the timing During the meeting on Monday, Pfizer officials provided U.S. health officials a similar briefing to one they gave the Europeans this month. The White House meeting was largely focused on the science and data Pfizer presented. The company cited data from Israel showing a rise in infections among the vaccinated population, as well as interim data from the company’s trial of its booster shot showing a third dose stimulates a much stronger antibody response that is five to 10 times the level seen after the second dose of its vaccine. There were no decisions made about how to proceed, and officials acknowledged there is still a significant amount of data that has yet to be evaluated, according to a person with knowledge of the meeting. It remained unclear on Monday where U.S. officials stood on the need for a third shot for vulnerable Americans. While several senior officials believe it will be appropriate to recommend boosters for the elderly and immunocompromised, Pfizer still must receive emergency authorization from the Food and Drug Administration for its third dose and a CDC advisory panel must decide whether and to whom to recommend boosters. That process could take several weeks or months. Pfizer officials and some U.S. health officials are worried that if the U.S. government takes too long to make a decision on whether to begin administering another dose of the vaccine, the delta variant will cause another surge of the virus this fall among the unvaccinated and could infect the vulnerable who are vaccinated. What you need to know about the highly contagious delta variant An HHS spokesperson who spoke on the condition of anonymity to share information on an internal meeting said health officials are briefed routinely by manufacturers and others on the latest data on coronavirus vaccines. The spokesperson also reiterated that, “at this time, fully vaccinated Americans do not need a booster shot,” but added that the administration is prepared for booster doses “if and when the science demonstrates that they are needed.” But the discussion of booster shots has also raised concerns about the impact it could have on vaccine hesitancy, as well as questions about the ethics of providing fully vaccinated residents of wealthy countries a third shot when the majority of the world has yet to receive a single dose. The director general of the World Health Organization, Tedros Adhanom Ghebreyesus, in a statement Monday admonished vaccine manufacturers for seeking to push booster doses to wealthy countries when many places still do not have access to doses. “The global gap in vaccine supply is hugely uneven and inequitable,” he said at a news briefing. In recent months, as a small number of relatively wealthy countries have pressed ahead with vaccination campaigns, the U.N. health agency, public health experts and advocates have warned of a widening global vaccine gap and urged governments to do more to share doses and increase supply. They argue that unequal distribution of doses is not only unethical but also could extend the pandemic by prolonging shutdowns and giving the virus room to spread and mutate in unvaccinated populations. “We will look back in anger, and we will look back in shame if countries use precious doses on booster shots, at a time when vulnerable people are still dying without vaccines elsewhere,” Mike Ryan, head of the WHO’s emergency program, said Monday. But Pfizer officials have pointed to worrisome data in Israel as a case study. Just weeks after lifting most covid restrictions, the government has reinstated the mask mandate for indoor spaces and public transportation. It is expected to introduce stricter quarantines for travelers returning from abroad and rapid testing stations for students, and to revive the recently retired “green pass” system granting vaccinated people broader access to such public events as concerts and movie showings. Pfizer and its partner BioNTech last year sold Israel millions of doses, which were delivered on cargo planes that were greeted with fanfare by then-Israeli Prime Minister Benjamin Netanyahu at Ben Gurion Airport. Pfizer views Israel — with its small size, heterogenous population and meticulously digitized national health-care system, which serves as the basis for a data-sharing agreement signed by the Israeli government and the pharmaceutical giant — as a test case for vaccine rollouts in the rest of the world. Recent studies show that the Pfizer vaccine remains effective against the delta variant in preventing hospitalizations and serious illness, though it also has shown declining effectiveness at preventing milder cases. The company expects to publish data from the current study on booster shots provided to at-risk adults in Israel. It said Thursday that it will ask U.S. and European regulators within weeks to authorize booster shots. Israeli Prime Minister Naftali Bennett announced that he has coordinated a fast-tracked delivery of the next batch of Pfizer doses to arrive Aug. 1, to allow the country to replenish its dwindling supplies and continue its campaign to inoculate 12-to-15-year-olds. Eyal Leshem, an infectious-disease specialist at Sheba Medical Center, said that even though Israel will probably not make a third shot available to the general public any time soon, the move may open the path toward targeting specific vulnerable populations that are known to have reduced protection when compared with the healthy population. He said that vaccine hesitancy and lack of access to the vaccine around the globe, including in the nearby Palestinian territories, remain persistent challenges that would prevent general booster shots from becoming widespread health policy, but that approaches could continue to change as the virus mutates and countries open up. “A possible scenario is that as the virus mutates and changes, the vaccines will be modified accordingly, and boosters will enhance immunity against circulating viruses,” he said. Lena H. Sun contributed to this report. Créditos: Comité científico Covid
<urn:uuid:ef8348a9-f4c8-4899-b658-3f226371f2cc>
CC-MAIN-2022-33
https://www.mhcluster.org/2021/07/12/israel-starts-administering-third-dose-of-pfizer-vaccine-to-at-risk-adults/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00076.warc.gz
en
0.949424
1,483
2.4375
2
Recently, Microsoft officially launched two Azure data centres in the country, one in Johannesburg and one in Cape Town. This will fundamentally change the cloud landscape in South Africa, and indeed, the telecoms landscape. By Colin Thornton, MD of Turrito To the uninitiated, Azure is the Microsoft cloud computing platform. Launched in 2010, it is designed for the development, deployment, and management of applications and services through Microsoft-managed data centres. At the time, many industry onlookers were sceptical about how Microsoft would be able to compete with more established companies (think Amazon Web Services and Google) in the segment. However, in its fourth quarter results of last year, Microsoft reported that revenue in server products and cloud services increased 23%, driven by Azure revenue growth of 89%. And while Amazon might still be the leader of the pack, the Microsoft market growth rate was nearly double the growth rate of its more established rival. Clearly, Microsoft has momentum in its favour. But the question many local organisations are asking (and particularly those still undecided about migrating to the cloud), is ‘what is the true significance of having Microsoft data centres in South Africa?’ Does it make such a difference? The short answer revolves around two factors: speed and compliance. Previously, companies that opted to go for multinational cloud offerings had to rely on their data being stored on European or American servers. Even related [cloud] services had to be accessed from servers distributed around the world. With fibre and 4G technologies becoming commonplace in organisations, this might not seem like a problem. But the reality is that poor latency (the amount of time it takes to send or receive data over the internet) is still a significant challenge for many local businesses. When stakeholders expect virtually real-time response times to queries, the difference between seconds and minutes could result in either a happy customer or one looking at moving to a competitor. The presence of local Azure data centres will change that. Accessing apps and data on these servers will align local organisations to service levels that companies in more developed countries have come to expect as standard practice. In turn, these faster speeds (accessing data, using apps, delivering services) will stimulate increased innovation as organisations can focus more on strategic deliverables and less on connectivity. With the Protection of Personal Information Act (PoPI) in South Africa and the General Data Protection Regulation (GDPR) in Europe focused on how personal data is stored, accessed, and analysed, companies face severe financial fines if they are not compliant. A big part of these regulations revolves around data residency (or data sovereignty), for instance, the physical location where data is stored. South African businesses are under pressure to ensure that personal data stays within the borders of the country unless certain criteria are met. This complicates the process of customers submitting data and puts the focus more on ticking boxes around compliance instead of delivering value-added business services. Having Azure data centres in South Africa addresses this as all data is stored within the confines of the country. No more worrying about what happens to offsite data on international servers. Again, as with improved latency, this addresses a significant stumbling block to IT adoption and growth. Given how the worldwide public cloud services market is expected to grow to more than $200 billion this year (and 90% of companies will be using the public cloud by 2022), local companies would do well to capitalise on the foundation that the new Azure data centres will provide.
<urn:uuid:f776baab-0b27-4c8e-85ed-b6528922211f>
CC-MAIN-2022-33
https://channelwise.co.za/what-hyperscale-data-centres-mean-for-sa-business/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00071.warc.gz
en
0.945934
712
1.789063
2
Music Production, Sound for Film, Game Sound, Live Sound, whatever your ambitions, making them a reality starts here. - Recording and Mixing - Post Production - Sound Design - Live Sound Unleash your passion and go from music consumer to music producer Take those music ideas and turn them into living creations. Our hands-on, tutor supported course empowers you to turn production tools into an extension of your mind. Formerly entitled 'Electronic Music Producer', this course is for those that want to get into music production quickly and want to learn hands-on with the support of professionals who do this everyday. Learn songwriting techiques coupled with powerful music production skills. Record and produce your own music. Learn from industry thought-leaders, collaborate with your peers, extend your network through our global reach and solidify your own reputation within the creative media industry. Whether you’ve worked within the creative industries for years, or are seeking to to pursue greater career prospects. SAE Institute’s online MA/MSc course is the next step to defining your creative niche. Experience the audio industry up-close and personal in this exciting, new and highly practical course. The SAE Diploma in Engineering programme has been specifically designed for those who are looking for a course that will be both engaging and highly practical but without the commitment of longer-term study. At SAE, we strongly believe in learning by doing, and this practical approach is the foundation of our one-year Diploma programme. All SAE students will have the opportunity to take advantage of our fully equipped recording studios and book their own practical time. This gives students the opportunity to practice what they have learned while working with experienced musicians, and produce quality recordings as they continue to gain experience. The expansion of your skillset, and portfolio creation, will prove very beneficial when looking to further your career in the industry. The course provides options for each student to pursue their preference between specific training in live sound engineering or electronic music production. During your training at SAE you will have access to all of our in house facilities and will be able to accumulate countless hours of valuable practical experience on site. Both of these options offer a first class, in-depth learning experience that will allow you become extremely versatile within the various fields of Audio Production and Performance. This will both broaden your horizons and provide you with a range of options in your future audio career. Although the course is fundamentally aimed at those who do not initially wish to pursue our two–year Audio Production Degree course, there is the option for you to change your mind should you wish to continue with your studies. Successful completion of our Academic Bridge module will allow entry into the second year studies for the BA/BSc award. Applications should be made directly to the Glasgow campus. - Full Time - Part Time £300 Registration fee 1x £1800 payment at start of each module 19 June 2017 - Entry Requirements Prosepctive students should be able to demonstrate a strong interest in music technology and want to develop their skills as a professional creative media practitioner. You will need to submit a personal statement with your application, outlining relevant experiences, your motivations for studying the course and what you expect to gain from the programme. Your personal statements is important as it will help selectors to decide whether you are good match for the course. Applicants are also required to have achieved National 5s at Grade C for entry, with English, Maths or Physics the preferred subject choice. English Language not your first language? You will need a qualification Students applying for short courses (up to 6 months duration) and whose first language is not English will need a qualification that demonstrates competence in English to CEFR level B1. IELTS (Academic and General) : Minimum 4 in each component Pearson PTE Minimum 36 in each component Non-EU applicants are advised that the Home Office no longer accept ETS exams as evidence of English language ability. This includes the TOEFL iBT test, provided by ETS. Students without a formal language qualification will need an interview with the programme leader. Non UK/EU students will need a student visitor VISA in order to attend the course. For more information please visit the UKBA student visitor page. - Fees & Funding Enrol today and get ready to start your music production career. There are no formal entry requirements, just bring your ideas and passion. Course Cost £5700 Payable in 3 Installments of £1800 *Course cost includes £300 registration fee. The course opens up the world of audio and sound production to those that succesfully complete it. Career options include: - Sound recording studio engineer - Live sound engineer (elective module) - Front of house engineer - Monitor engineer - Electronic music producer (elective module) - Sales and marketing for audio equpment companies - Audio editor - Radio and broadcast - Theatre technician
<urn:uuid:6bda80b8-3ff4-4d09-ab72-726265508bd1>
CC-MAIN-2017-04
http://www.sae.edu/gbr/diploma-sound-engineering
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00310-ip-10-171-10-70.ec2.internal.warc.gz
en
0.925338
1,035
1.929688
2
[ verb ] bother persistently with trivial complaints "She nags her husband all day long" Used in print(Joseph Chadwick, No Land Is Free....) Conchita nagged at the younger children , attempting without success to keep her thoughts off Tom_Brannon . [ verb ] worry persistently "nagging concerns and doubts" Used in print(Francis Pollini, Night....) The thought came_back , the one nagging at him these past four days . [ verb ] remind or urge constantly "she nagged to take a vacation"
<urn:uuid:38e77767-87cb-4c9c-84e8-f6ddd3b9c3d7>
CC-MAIN-2017-04
http://www.definition.com.co/nag.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00080-ip-10-171-10-70.ec2.internal.warc.gz
en
0.807182
123
1.570313
2
Factchecker: Bread not subject to VAT Bread will not attract value added tax (VAT) at the rate of 16 per cent from July 1 as widely reported. While, the 2021 Finance Bill carries a proposal to remove the supply of ordinary bread from the zero-rate list of goods, its supply remains listed under tax exempt supplies. According to an analysis of the Value Added Tax of 2013 by Citizen Digital and collaborated by analysts at PwC, the supply of ordinary bread is categorized under both the zero rated and exempt schedules. This implies that the deletion of ordinary bread from the zero rated schedule, does not through its supply to the scope of VAT. Nevertheless, the cost of bread is still tipped to increase slightly with manufacturers being barred from lodging claims to recover input taxes. “We expect this to lead to an increase in the cost of bread since suppliers will not be eligible to recover input tax incurred. This contravenes the Government’s Big Four Agenda of ensuring food security for its citizens,” noted analysts at PwC. On Thursday, the Bakers Association of Kenya (BAKE) and the Bakers Sub-sector of Kenya Association of Manufacturers wrote an open letter to the National Treasury and the National Assembly protesting the deletion of bread from the zero-rated category. Despite, the supply of bread remaining within the exempt category, the association is likely still to protest the inability to recover input taxes which would lead to the firms passing on the unrecoverable costs to consumers. If adopted by Parliament, the deletion of bread from zero-rated supplies will likely see an immediate rise in the cost of bread to Kenyans when the provisions of the Finance Bill take effect on July 1. The listing of bread among both exempt and zero-rated supplies in nevertheless puzzling as it is surprising. This is as goods are generally listed in either one of the categories but not both. Zero-rated supplies are not subject to VAT while manufacturers (suppliers) are at the same time cleared to lodge claims for input tax compensation. Meanwhile, exempt goods remain outside the scope of VAT but suppliers cannot lodge claims to recover input tax. No comments yet.
<urn:uuid:f9b9fe60-2de1-47fe-8130-de2b55d1adb7>
CC-MAIN-2022-33
https://www.citizen.digital/business/factchecker-bread-not-subject-vat-11517637/?utm_source=relatedarticles&utm_medium=deeplinking&utm_campaign=AlsoRead
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00469.warc.gz
en
0.95162
453
1.726563
2
Interactive Week: Open source, closed mindsMar 25, 1999, 12:53 (3 Talkback[s]) (Other stories by Charles Babcock) "But what transpired was a display of how far the open source code movement has to go if it is to integrate its own objectives with the mainstream that it hopes to conquer." "Stallman reminded the crowd that it was the Gnu Project that had set out to create an open Unix operating system. When Linus Torvalds created the Linux kernel, he was "filling the last gap" of that effort; many Gnu elements surround the kernel, such as the emacs editor for which Stallman received the Grace Hopper Award from the Association for Computing Machinery. So, henceforth, we should refer to Linux as "Gnu Linux," Stallman said. As it turns out, he wasn't joking." "As the questions rolled in, Stallman corrected any speaker who referred to just "Linux." When a reporter stood and asked a Linux question, Stallman interrupted to say he must refer to "Gnu Linux." "For you to stand in front of me and call it 'Linux' to my face is, like, extreme," Stallman said." 0 Talkback[s] (click to add your comment)
<urn:uuid:66f01a09-3252-486e-8672-8aa99398413b>
CC-MAIN-2017-04
http://www.linuxtoday.com/developer/1999032501410PS
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00045-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963973
269
2.0625
2
My Seven Black Fathers: A Young Activist’s Memoir Of Race, Family, and the Mentors Who Made By Will Jawando Will Jawando is a civil rights lawyer, an activist, and a loving husband and father of four. Currently a councilmember in Montgomery County, Maryland, he has worked for Nancy Pelosi, Sherrod Brown, and Barack Obama. My Seven Black Fathers is the story of how Will grew from a young boy with a white mother and an absent father to a successful adult. In his book, Will celebrates the Black men who stepped up to provide guidance and support – from a fourth grade teacher to the President of the United States. My Seven Black Fathers is an enjoyable, inspiring, and hopeful read. The book is also a call to action. The author encourages Black men to become mentors, and encourages white people to “relearn and retell the story of Black men in this country and in turn help to shape a new story about who America is… help enable mentoring relationships between Black men and boys…” Will Jawando is “…working for a future that’s less like the past, a future where race and gender are less predictive of our outcomes, especially those of Black boys.” Book Recommendations for Families Created in Transracial Adoption Our Transracial Journeys families regularly seek out books to share with their children and to read for themselves, as white parents of black children. We are fortunate to have a resource in the Transracial Journey's Board of Direcors Secretary, Avril McInally. With a Master of Library Science from Kent State University and over 35 years as a public librarian, Avril and her colleague, Vicki Richards, collaborate to curate phenomenal book recommendations for our children and parents. The Book Corner is a regular feature in our Transracial Journeys monthly newsletters. If you would like to receive monthly book recommendations via email, please subscribe.
<urn:uuid:3617063f-fda6-4316-a858-8f6bac9189e5>
CC-MAIN-2022-33
https://www.transracialjourneys.org/blog/book-corner-my-seven-black-fathers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00267.warc.gz
en
0.936754
408
1.617188
2
Hello Deirdre. My ancestors came over from Ireland to NYC in 1849 (John & 1/2 the kids; February 23, 1849) & 1850 )Margaret & the other 1/2; February 22, 1850). They show up in the 1850 Federal Census, living in Astoria/Long Island City. The family remained in this general vicinity until WWII when the 2nd Irish diaspora occurred. Do you have any information about those famine Delahunty's?
<urn:uuid:5af083ef-ef79-422c-9ca4-7fb981bbc655>
CC-MAIN-2017-04
http://www.genealogy.com/forum/surnames/topics/delahunty/89/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00362-ip-10-171-10-70.ec2.internal.warc.gz
en
0.914348
99
1.742188
2
Conheça o livro e compre online. Livro Indenpendence Day, Or How I Learned To Stop – Rogin, Michael Paul. – ISBN: 0851706622. Independence Day created a worldwide sensation when it was released in 1996, and has gone on to be one of the all-time highest grossing films. Comic-book science fiction on the grandest scale with spectacular special effects, Independence Day delighted audiences with its depiction of alien invaders reducing the White House to an inferno. President Bill Clinton and presidential candidate Bob Dole both endorsed the film breathlessly. ‘We won in the end’, said Dole. ‘Bring your family. You’ll be proud of it. Diversity. America. Leadership. Good over Evil’.
<urn:uuid:0c41075c-dc85-41e2-83bd-9a81ed5d5e64>
CC-MAIN-2017-04
http://mairipa.com.br/indenpendence-day-or-how-i-learned-to-stop.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00508-ip-10-171-10-70.ec2.internal.warc.gz
en
0.91125
164
1.625
2
Among the many interesting things in Online Journalism Review’s article about using eyetracking to increase the effectiveness of news article design is this odd result: Although both men and women look at the image of George Brett when directed to find out information about his sport and position, men tend to focus on private anatomy as well as the face. For the women, the face is the only place they viewed. Coyne adds that this difference doesn’t just occur with images of people. Men tend to fixate more on areas of private anatomy on animals as well, as evidenced when users were directed to browse the American Kennel Club site. That is absolutely fascinating. I’d love to hear an evolutionary biologist’s take on why that is. I’m also heartened by the article’s first featured finding: that tighter writing, more white space, and jettisoning unnecessary imagery helps readers read faster and retain more of what they’ve read.
<urn:uuid:a43132b5-028d-4c87-a09c-4ff8e73f82d6>
CC-MAIN-2017-04
http://www.kottke.org/07/03/men-look-at-crotches
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00327-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968488
203
2.03125
2
I once asked a good friend of mine if she had ever used female contraceptives, specifically the morning-after pill. She replied that if she had known about this pill, she would not have become a mother in her second year at Wits. Contraceptives allow women to be responsible for their bodies and give multiple options to prevent ‘oops situations’ and unplanned nappy-changing sessions or trips to Marie Stopes. Nicole Barnes, voluntary counselling and testing counsellor at Campus Health, breaks down what contraceptives are, what they do and the common myths surrounding them. She explains that contraceptives take various forms, with the most commonly used being the barrier method (male and female condom) and the hormonal contraceptives (the pill and the injection). Hormonal contraceptives prevent a woman from ovulating. The biggest myth about the pill is that it can make you fat. “What the pill can do is increase one’s appetite, and how one responds to the change in appetite is what affects the body,” Barnes says. When on the pill, your menstrual cycle continues as normal but no egg is released, so you can’t fall pregnant. There are two types of hormonal injections, but the one generally used for young women is Noristerat. The injection tricks your body into believing that you are pregnant. You don’t have your period and you don’t ovulate. Noristerat is given at two-monthly intervals. A common myth about the injection is that it affects a woman’s fertility. Barnes says this is incorrect. “Once you withdraw from the injection, after six months you return to the fertility level you had before you went on the injection.” The ‘morning-after’ pill Sister Yvonne Matimba, head of Campus Health, says morning-after pills contain oestrogen and testosterone, two hormones produced by the ovaries daily. The pill has to be taken immediately after unprotected sex or no later than 72 Matimba says the pill can be used at any time of the month, but is best used during mid-cycle, when conception is most likely to take place. The pills have a high failure rate when used regularly rather than occasionally. Their side effects are minimal, and include nausea and vomiting. Campus Health gives out morning-after pills as well ‘the pill’ and ‘the injection’ for free. Consultation is R50 for day students and R20 for residence students.
<urn:uuid:0088fc8a-fecc-4f2d-8caf-1110e316737b>
CC-MAIN-2022-33
https://witsvuvuzela.com/2011/08/18/the-lowdown-on-contraceptives/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00071.warc.gz
en
0.941253
542
2.6875
3
What comes to mind when you think of Nebraska? The wide open plains; the tall, windswept, prairie grass; the acres and acres of golden grain..... this state is the very eastern edge of the Wild West. Lewis and Clark traveled through here, the Indian wars swept through the western part of the state, even Buffalo Bill Cody killed the war chief Yellow Hand in Nebraska. But think harder.... behind this colorful history and the pleasant images is a darker side. Picture the miles and miles that you can drive here without seeing another soul. For every pair of adventurers like Lewis and Clark there are killers like Charles Starkweather and Caril Ann Fugate... for every historic monument there is a bloody battleground. The ghosts of the past does not rest peacefully here.... Nebraska is a very haunted place. THE HAT CREEK BATTLEGROUND THE O'HANLON HOUSE GHOST THE LEGEND OF BLACKBIRD HILL NEBRASKA'S HAUNTED COLLEGES THE STATE CAPITOL BUILDING Return to the Main Page Copyright 1998 by Troy Taylor, All Rights Reserved
<urn:uuid:891a17fd-b697-4829-ab02-38d1d08a69af>
CC-MAIN-2016-44
http://www.prairieghosts.com/hauntne.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00116-ip-10-171-6-4.ec2.internal.warc.gz
en
0.828946
233
1.898438
2
Our scripture this week is John 14:1-14. “Do not let your hearts be troubled. You believe in God; believe also in me. My Father’s house has many rooms; if that were not so, would I have told you that I am going there to prepare a place for you? And if I go and prepare a place for you, I will come back and take you to be with me that you also may be where I am. You know the way to the place where I am going.” Thomas said to him, “Lord, we don’t know where you are going, so how can we know the way?” Jesus answered, “I am the way and the truth and the life. No one comes to the Father except through me. If you really know me, you will know my Father as well. From now on, you do know him and have seen him.” Philip said, “Lord, show us the Father and that will be enough for us.” Jesus answered: “Don’t you know me, Philip, even after I have been among you such a long time? Anyone who has seen me has seen the Father. How can you say, ‘Show us the Father’? Don’t you believe that I am in the Father, and that the Father is in me? The words I say to you I do not speak on my own authority. Rather, it is the Father, living in me, who is doing his work. Believe me when I say that I am in the Father and the Father is in me; or at least believe on the evidence of the works themselves. Very truly I tell you, whoever believes in me will do the works I have been doing, and they will do even greater things than these, because I am going to the Father. And I will do whatever you ask in my name, so that the Father may be glorified in the Son. You may ask me for anything in my name, and I will do it. In this passage, Jesus speaks of what He will do for the disciples (and us) because we believe in Him. He says plainly “no one comes to the Father except through me” (verse 6). The disciples, Philip in particular, still have questions about the relationship between Jesus and our Heavenly Father, and ask to be shown. Jesus doesn’t mind when we ask Him questions to better understand His teaching, but He doesn’t approve of asking for signs. This is why He seems concerned when Philip asks “show us the Father” (verse 8). He tells them if they have seen Him, they have seen the Father. Jesus explains that the things He says and does reflect God living in Him. Jesus expects us to share His love with others by reflecting Him living in us. The very best way to honor Him and show we believe is to treat each other the way He treats us, with love and respect. Let the world know Jesus is in you! Loving Lord, the world is a hard place sometimes, wrapped up in “proving” things. May we give proof of Your love by our outreach to everyone everywhere, sharing the joy of our connection to You. Amen.
<urn:uuid:2aa52a59-2252-47ab-b595-667008748049>
CC-MAIN-2022-33
https://www.pastordougolson.com/2020/05/04/5-4-20/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00268.warc.gz
en
0.976688
688
1.703125
2
This document describes and provides access to finite element analysis software via the Internet. The main index follows this introduction. We list all public domain and shareware programs which have come to our notice, and a selection of pointers to commercial packages. We also include references to useful URL's, ftp sites, newsgroups, listservers, bulletin boards etc, and to some books which contain source code. Please help us to keep our list up-to-date, and a continuing valuable resource for the FE community, by informing the authors (Roger Young at firstname.lastname@example.org, or Ian MacPhedran at email@example.com) of any changes or additions to the entries. Disclaimer: These resources are provided for reference only. Their inclusion in this document does not represent any endorsement on the part of the document authors. The use of any of these programs and the interpretation of any results obtained remains the responsibility of the user. Keywords: finite element software, finite element analysis (fea), finite element method (fem)
<urn:uuid:06375e3a-05b7-4485-85e4-c950902b21f4>
CC-MAIN-2016-44
http://homepage.usask.ca/~ijm451/finite/fe_resources/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00437-ip-10-171-6-4.ec2.internal.warc.gz
en
0.85792
226
1.835938
2
Dealing with uncertainty is the new normal, whether you’re looking through the lens of a parent, a CEO, or an individual contributor. With so many questions floating around in our heads, a natural reaction is to avoid thinking about the future and focus on what’s right in front of us today and tomorrow. However, it turns out that thinking about the future, in fact thinking about multiple possible futures, can provide the secret to working through all that uncertainty today. A good friend of mine, Peter Scoblic, recently published an article in Foreign Affairs entitled “A Better Crystal Ball: The Right Way to Think About the Future.” While Peter’s focus is on a business and organizational context, the more I’ve talked over his research that underlies the article, the more I believe his findings apply to us as individuals as well. The basic premise is this: By imagining multiple plausible futures - think 10-15 years out - and then working backwards to identify the events that would have occurred on the way to each future scenario, we can identify common threads and identify patterns that drive our decision making today. While Peter and his co-author, Philip Tetlock incorporate forecasting in their approach, let’s focus on the idea of imagination and scenarios. If we map out five future scenarios based on our personal and professional lives, what would they look like? Don’t limit yourself to what you think is likely. In fact, it’s important that you stretch the boundaries and pick five different scenarios. For example, one might have you create a foundation for charitable work. Another might have you start a company. Another might have you lose your job and have to sell your house. While this last one isn’t a positive outcome, going through the exercise of laying out these scenarios gives us a powerful tool for making decisions today, tomorrow, and next month. Once you have your different scenarios laid out, look at the common threads. What commonalities do you see? What would be the signposts that would tell you if you’re headed down the path to one or more of these possible futures? Peter and Philip push business and organizational leaders to develop question clusters: “Questions should be chosen not only for their individual diagnostic value but also for their diversity as a set, so that each cluster provides the greatest amount of information about which imagined future is emerging—or which elements of which envisioned futures are emerging.” We can apply the same technique for ourselves. As we start to find answers to these questions, we can adapt and develop new questions. This exercise is key to help us escape what Scoblic and Tetlock refer to as “the tyranny of the present.” This requires imagination and a willingness to put our biases aside while we think about possible futures to in turn guide the decisions we make in the present. | MORE ARTICLES Nick is a serial entrepreneur with deep product and operational experience built through leadership roles across multiple Fortune 500 companies and startups, including a successful exit to Microsoft for BlueStripe Software where Nick was the VP of Product.
<urn:uuid:96d2c022-901c-400a-8fb2-c0a86dba7073>
CC-MAIN-2022-33
https://www.illumehire.com/author/nburling/paged-8/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00077.warc.gz
en
0.953775
641
1.882813
2
Definitions of traction n. - The act of drawing, or the state of being drawn; as, the traction of a muscle. 2 n. - Specifically, the act of drawing a body along a plane by motive power, as the drawing of a carriage by men or horses, the towing of a boat by a tug. 2 n. - Attraction; a drawing toward. 2 n. - The adhesive friction of a wheel on a rail, a rope on a pulley, or the like. 2 The word "traction" uses 8 letters: A C I N O R T T. No direct anagrams for traction found in this word list. All words formed from traction by changing one letter Browse words starting with traction by next letter
<urn:uuid:06f8a441-6bdf-4ca2-8681-f47f49691447>
CC-MAIN-2017-04
http://www.morewords.com/word/traction/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00518-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936684
162
2.765625
3
Master Class: The keys to great composition by Bob Holmes Sit down with AYP studios and photographer Bob Holmes for part two of the Marc Silber Show - Advancing Your Photography! He shares some remarkable photos from his latest trip to Cuba, and digs deep into the art of composition. In order to capture this photograph below, Bob said it took 100 percent of his concentration for at least 30 minutes. He loves looking for composition that grabs you and his unique tip is that you need to “get in the zone” and be fully responsible for everything in the frame. And the key to learning composition is to practice -- you can't become a great photographer in a week, but you will get there by shooting as much as you can. If you like this video you can watch part one: Photo Composition Tips from four-time Travel Photographer of the Year Bob HolmesHERE And of course, thank you so much to Bob, for sitting down with us and our AYP friends to share all of his amazing advice and experience. Most photographs need a punctuation point to give them interest. I loved the color of this butchers shop in Trinidad, Cuba but a straight shot of the shop didn’t do it for me. A dog looking hopefully for scraps of meat provided exactly the point of interest I was looking for. The perfect punctuation. #Cuba #nikon #nikonusa #NikonNoFilter #Trinidad #dog #butcher #shop #travelphotography #travelherenext #theglobewanderer #awesome_globepix If you want to consult the full list with all Bob´s tips read the original post of this video on www.silberstudios.tv/blog Text and video via Advancing Your Photography | Thanks Marc
<urn:uuid:7c201672-f3fe-49eb-bec6-2b93801f1cf6>
CC-MAIN-2017-04
http://www.iso1200.com/2016/04/master-class-keys-to-great-composition.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00559-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945457
373
1.546875
2
This is an example of a simple form used used to send information. It does not have any 'form checking', that is, if no information is entered and the form is just sent, then it will not complain and ask for e-mail addresses, etc. You can always find the e-mail address from the e-mail anyway. If you wished to prevent the user sending the form until all the information you require is included, then you would java script or cgi to validate the form. This form uses a simple POST to work. You can enter some values and click on the submit button. The form will be put in your e-mail client's SEND folder. You can then look at it and then delete it. Do not send it to me! Use my feedback form for that! You have already learned about forms. The only points about this one are The method is post The action is mailto:firstname.lastname@example.org?SUBJECT='Sent from my form' > Which enters some text in the subject line of the e-mail. The enctype is "text/plain" This formats the text so you don't get one word after another. The form elements are named in a way I can understand them - that is, not B1, T3, etc! So the name box is called NAMER. This is a very simple form that anyone can put on their website to get feedback. Copy of the code for the form above formmethod=" post "enctype=" text/plain "action=" mailto:email@example.com?subject='Sent from my form' ">
<urn:uuid:c2af82fc-ce84-4f2f-8145-3be761f1cbfa>
CC-MAIN-2022-33
https://www.trans4mind.com/personal_development/HTMLGuide/form-post.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00674.warc.gz
en
0.907181
361
2.65625
3
Originally published in HUCK: https://www.huckmag.com/perspectives/reportage-2/belarus-protests-young-photographers-capturing-a-country-in-flux/ As protests continue to erupt across the country, a new generation of self-taught photographers find themselves at the forefront of direct action, documenting demonstrations in real time. A sea of people fill the streets in the European sunlight. There are flags, banners, chants and songs. They dominate the wide boulevards, walking past grand facades, monumental architecture and litters of history. A couple of confident young men climb a statue of Lenin and hang a flag around the concrete body. This is Minsk, the capital of Belarus. To those accustomed to the imagery that best defines protests, this kind of scene probably sounds familiar. But to those in Belarus, the landlocked Eastern European state with a population of just under nine and a half million, this is uncharted territory. For the past two and a half decades, Belarus has existed in a way that did not fall on the radar of many outside of the region. This all changed when Alexander Lukashenko, Belarus’ strongman president since the establishment of the office in 1994, secured a sixth re-election on 9 August of this year. He cruised through with an apparent 80 per cent of the vote, marking his 26th year in power. Immediate uproar followed, with widespread accusations of voter repression and ballot burning. The fraudulence of the election was not unexpected. Indeed, each of Lukashenko’s re-elections have been defined by censorship, raids, police brutality, stifling of dissent and arrests of opposition figures. What was unprecedented, though, was the reaction on the streets – leagues of marches, protests and rallies in direct opposition to the president. Though many taking part in the protests are supportive of the main opposition candidate Sviatlana Tsikhanouskaya, who ran in her husband’s absence after his arrest for participating in an anti-government rally, it contains a mix of people uniting against the regime after two decades of built-up hostility. People are fed up of corruption and intimidation. 9 August was a breaking point. But amid the current turmoil, a new generation has been exploring creative ways to call for change. In recent weeks, photography has found itself at the forefront of direct action, as young Belarusians take to the streets, cameras in hand, to communicate their feelings and record demonstrations in real time. “There are so many other outstanding photographers shooting our streets these days!”, says Alyona Savitskaya, 22, a keen photographer herself. “Once you realise [to look] for it, you start noticing people with soap dishes on the streets,” adds Vasily Sakharchuk, another young photographer – soap dishes being an affectionate name for compact cameras based on the mutual resemblance. There is a small but growing culture around film photography in Belarus, which was recently bolstered by a surge of new film development labs, the formation of youthful photo collectives and, in Minsk especially, a host of new exhibitions introducing the medium to a larger audience. Its newfound popularity, when paired with the limitations of independent media in Belarus, has seen a wave of amateur photographers use it to document the drastic changes occurring in the country themselves. “So many creative people take to the streets. They are all very different, but each with a great sense of humour,” explains 27-year-old photographer Alesia Skidan. “Many see a great sense in documenting everything that happens – [they] ask serious questions, mock the absurd and support others.” The 2020 election was odd even by Belarusian standards. It was a “dramatically short” and chaotic campaign, with the ruling regime making “numerous mistakes” according to Maria Shkumayeva, who, at just 23 years old, manages a development lab in Minsk. This, alongside the abrasive conduct of Lukashenko throughout the election, had a particularly politicising effect. “Belarusians were politically indifferent before this campaign,” says Maria. “But during the pandemic, people realised that self-organisation principles could be applied to the political sphere of life.” This helps illustrate why this election, despite the predictable outcome of a Lukashenko win, feels different for Belarusians. Amid the chaos of a global health crisis, the stakes feel higher. Increased levels of participation and political awareness have become an urgent task and photography has quickly revealed itself as a universally accessible way for people to begin doing that. Instagram has been at the forefront of this. A video of an elderly woman moving past an intimidating riot policeman, stating “I’m Walking” to crowd applause, recently went viral: her phrase – #ягуляю – quickly become a popular hashtag as a show of solidarity. Moments like these are becoming increasingly rife in digital spaces. While it could be argued that higher levels of social media activism lead to less of an onus on direct action, the increase in photography as a tool of protesting Lukashenko’s Belarus contributes to the strength of feeling on the ground, getting the message out there to an even wider demographic. It lies in stark contrast to the lack of direct political participation in previous years. “It is always scary in our country not only to attend protests as a protester, but also as a photographer or even officially accredited media representative,” says Alyona. “These days protests seem safer…but you never know what to expect from our government, whoever you are.” The enduring image of the protests has been the national red and white flag of Belarus, a historical symbol for sovereignty which has taken on the meaning of opposition to – and liberation from – what Maria refers to as Lukashenko’s “bloody regime”. The powerful simplicity of the symbol has been a constant through protest photography: the sea of red and white has created a uniform aesthetic. Flowers, other historical flags and symbols such as the traditional Belarusian coat of arms flourish alongside the more expected scenes of signs and banners. “A white ribbon on the wrist indicates a desire for peaceful change, freedom and truth,” explains Alesia, “Creativity is very important during the protests – without it, this would all be harder.” “I’m trying to create a frame that will represent the whole situation. Then there [will be] a lot of awareness,” Vasily adds. “You see how families, different subcultures, or ordinary people take to the streets, and then you realise that everyone understands the situation.” Documenting the peacefulness of the protests is of key importance for those like Vasily, as it helps depict the unnecessary brutality of the crackdown. Representing different communities as united is also vital to countering the state narrative about protestors. In this sense, Vasily views his photos as his activism. “I promote [them] to the masses. And I make it clear that I am the same as everyone else at peaceful actions.” Protesting on this scale in an authoritarian state can, of course, quickly turn dangerous. As the country’s main opposition leader, Tsikhanouskaya was forced to flee Belarus weeks ago ‘for the sake of her children’. Taking photos of police and government authorities poses comes with obvious risks, but this only makes the masses of people taking part all the more remarkable. A testimony from Minsk resident Anton Efremov, 33, who was detained for participating in a peaceful protest, is harrowing but necessary to understand the whole picture. Detentions started in the run-up to the election campaign, outnumbering previous instances of police brutality during elections. Any interaction with OMON (Special Purpose Police Unit), the militia detachment often used as riot police, can lead to beatings. “Active but peaceful protestors, those who run, clap or shout mottos, are shot with rubber bullets,” Anton says. “This is done in order to choke up any form of resistance.” Other photographers have confirmed, and tried to document, the use of tear gas, water cannons and flash grenades on protestors. But what overshadows police conduct at rallies is what occurs at the detainment facility if protestors are actually arrested. “All the detainees, except those [who are] underage and journalists, are packed into cells of 25 square metres – I have seen cells with approximately 120 people in them,” says Anton, who describes the conditions as squalid (“no water, no toilet, no food,”), in which the minimum detainment period is 24 hours. He also states that he has witnessed some inmates losing consciousness, while others were seen not breathing. “Unfortunately, we do not know about the fate of those people.” Anton’s testimony, which is one of many, signifies how these protests can be a case of life or death. Recent reports that Maria Kolesnikova, a key ally of Tsikhanouskaya and one of the few opposition leaders still in the country, has been detained at the Ukrainian border, just a day after witnesses claimed to have seen her ‘snatched from the street’ by masked men, are especially concerning. But young photographers are helping lead the charge by making sure the narrative of the people is not lost, demonstrating how the struggle involves all aspects of society. It feels like Belarus is on the cusp of forging a new path as a nation – but it is not going to be easy. “The most drastic change [in the country] is happening right now,” says Arseniy Savin, 25, one of Maria’s colleagues at the development lab. “We are hoping [for] the most peaceful scenario – but we need to be prepared to have more victims.”
<urn:uuid:d037f0dd-f4df-47af-8658-4e1b1932c910>
CC-MAIN-2022-33
https://tommyhodgson.weebly.com/articles/archives/09-2020
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00068.warc.gz
en
0.960357
2,102
1.726563
2
A recent report released by the World Bank has revealed that the decline of Ghana’s manufacturing sector has adversely impacted the industry sector. This, it says, has resulted in the industry sector reaching its peak at a time when the total value of the country’s output is lower. Comparing the situation in Ghana to other countries, the report noted that, unlike Ghana, the growth of the share of manufacturing in employment in countries like Malaysia, Korea, and Brazil, grew with their national income. The World Bank report titled, Ghana’s Economic Update: Structural Transformation and Labour Market Performance, Challenges and Opportunities, notes that, “Traditionally, manufacturing is a marker of industrialization. But economic indicators show that Ghana’s economy may have begun to deindustrialize prematurely… In Ghana, the share of manufacturing in employment peaked in 1978, at a time when the country’s national income was lower than what it was in other countries when their manufacturing employment peaked, such as in the Republic of Korea (which peaked in 1989), Malaysia (1997), and Brazil (1986). As a further indication of deindustrialization in Ghana, the share of manufacturing in exports fell by 7 percentage points between 1990 and 2017. The country’s premature deindustrialization can partly be attributed to economic openness, which accelerated between 1990 and 2019″. While some may argue that the comparison with non-African countries in itself may have some limitations, the report pointed out the impact Ghana’s dependence on primary goods such as gold and cocoa for export has magnificently hindered the nation’s Industry sector. “Ghana’s economy also lacks complexity, as suggested by its exports, which are dominated by primary products, such as oil, cocoa, and gold. And the level of complexity in the economy appears to have changed little over the last decade.” The report, which is the fifth in the World Bank’s annual series on Ghana’s economic development and prospects and was published in October 2020 is coming at a time the government is celebrating its achievements in increasing industrial activities to grow the economy.
<urn:uuid:9aee01c4-b3ef-4e89-a14f-84c36ba229a2>
CC-MAIN-2022-33
https://gobnewsonline.com/ghana-has-reduced-industrial-activities-prematurely-world-bank-report/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00078.warc.gz
en
0.963071
442
2.96875
3
PARIS — The head of one of the world's largest airlines has called for an international meeting of carriers to agree a response to the downing of a Malaysian airliner, including a potential rethink of the threats posed by regional conflicts. Tim Clark, president of Dubai's Emirates, the world's largest international airline by number of passengers, also said domestic regulators worldwide may decide to be more involved in giving their carriers guidance on where it is safe to fly. "The international airline community needs to respond as an entity, saying this is absolutely not acceptable and outrageous, and that it won't tolerate being targeted in internecine regional conflicts that have nothing to do with airlines," Clark told Reuters in a telephone interview. He said the International Air Transport Association could call an international conference to see what changes need to made in the way the industry tackles regional instability. He dismissed suggestions that airliners should be equipped with anti-missile devices, an idea previously aired when an Airbus A300 cargo plane was struck by a shoulder-launched missile after taking off from Baghdad in 2003. - Why Commercial Jets Aren't Equipped to Avoid Missiles - World Presses Russia for Access to MH17 Site and Remains
<urn:uuid:8a1f6a27-0e79-4466-a617-2199ad987387>
CC-MAIN-2017-04
http://www.nbcnews.com/storyline/ukraine-plane-crash/emirates-calls-airlines-summit-outrageous-mh17-attack-n160761?cid=par-aff-gray-wsaz-world_20140721
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00499-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961382
243
1.867188
2
New images released of Cornell’s Tech Campus on Roosevelt Island by Morphosis To mark the beginning of the land use review process for its new 12-acre campus on Roosevelt Island, New York, Cornell University has released new images of the project including preliminary renderings of its first academic building. Designed by Thom Mayne of Morphosis Architects the academic building will be the first structure to realized on the net zero energy campus, which is being master planned by Skidmore Owings and Merrill, LLP. The campus “won’t look like any other university campus that exists today,” said by Daniel Httenlocher, Dean of Cornell Tech. “We are determined to innovate in every aspect of the development, from the way that students, faculty, researchers, industry and local community are intermingled, to the sustainability of our buildings and their iconic architecture.” The campus is being designed to connect with the city and with Roosevelt Island, welcoming the public via a new north-south pedestrian spine that opens onto a series of central open spaces, highlighted by a large public cafe on the ground floor of the academic building that spills into the open space in good weather. The current plan to achieve net-zero energy for the academic building is via a rooftop photovoltaic canopy that will generate much of the energy needed to make it one of the largest energy neutral buildings in the country. The review process for the entire campus kicks off this week. Construction is slated to beginning 2014 with the first phase of the campus to open in 2017. The first phase of the project includes the new academic building, a corporate co-location building, an executive education center with hotel facilities, a residential building for students and faculty and 125,000 sq ft of open space. At full build in 2037, the campus will accommodate up to 2.1 million sq ft of development and house approximately 2,000 full-time graduate students. Cornell University, with its academic partner the Technion-Israel Institute of Technology, was selected in December 2011 by Mayor Michael Bloomberg to build the applied science and engineering campus, currently located in Chelsea until the permanent campus opens. The new campus is offering a distinctive model of graduate tech education that fuses educational excellence with real-world commercial applications and entrepreneurship, rooted in the latest academic research.
<urn:uuid:8fd5da77-985f-488d-a595-8370c68c264b>
CC-MAIN-2017-04
http://www.worldarchitecturenews.com/project/2012/21013/morphosis/roosevelt-island-campus-cornell-university-in-new-york.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00447-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953819
474
1.6875
2
Karl Holbrook is taking part in a 1,000-mile cycle challenge this year. In his third feature he speaks to catering manager Lulu Cowley about keeping the riders fed To cycle more than 100 miles every day for nine days is no easy feat. And cyclists taking part in the epic Deloitte Ride Across Britain will burn a whopping 7,000 calories a day thanks to their efforts. That’s an eye watering 38 million calories burned across the whole nine-day event. The person responsible for filling the riders’ stomachs is catering manager Lulu Cowley, from Beau Nosh, who has given us an insight into the massive logistical operation involved in feeding so many people across such a large area. For the past six years the firm, which specialises in catering in unusual venues, has led the catering for the event that sweeps the full length of the UK from the craggy coast of Land’s End to the windswept cliffs of John O’Groats. “For any endurance event,” Lulu explains, “food is a hugely important factor. The riders train hard for the event and on the ride Beau Nosh are responsible for all their nutritional needs. “The 850 hungry cyclists eat a huge amount over the course, averaging about 7,000 calories per day, and the thought of a good meal and a warm welcome at the end keeps the riders going when the going is tough. “Cooking in a field is Beau Nosh’s speciality, but the unique nature of the event means that the landscape is always changing.” During this event Lulu and her team cater entirely out of field kitchens. They have two teams, each with 18 staff, who leapfrog each other up the country setting up and catering out of temporary kitchens. “The reality of a field kitchen is that you have to bring absolutely everything with you,” she explains. “Two trusty trucks travel with us taking everything from work surfaces, ovens and even the kitchen sink from venue to venue. “When we arrive the kitchen and restaurant tents are completely empty and we set it all up, right down to welcoming flowers on the table.” To make the event work each team has an alternately long day starting with afternoon tea at a venue and catering everything right through to breakfast the next morning. First service is afternoon tea, typically served from about 2.30pm. The riders arrive fresh from the road and devour mounds of toast, cakes and gallons of hot soup. Dinner starts at about 6pm and is served until the last rider comes in, usually around 10pm. Beau Nosh typically provides five choices of main meal per night and caters for all types of diet and accommodates all allergies. Lulu says: “We carefully plan our menus to ensure that evening meals are protein rich and contain plenty of carbs to replenish energy reserves for the miles ahead the next day. “An average dinner service requires about 200 kilos of meat as well as a fish option, high protein veggie dishes and a pasta dish. “The riders also get through tons of salads enriched with pulses. All that exercise means that there’s always room for a pudding or two, and for those having an Oliver Twist moment the supply is plentiful enough for seconds and even thirds.” The early bird catches the worm (or the empty roads) and breakfast starts as early as 5am – meaning that the team are back in the kitchen at 2:30am to prep. “As you might expect breakfast is all about the porridge and honey,” Lulu says. “And we get through vats of it. Cooked and continental breakfast options are also popular as the riders load up for a long day in the saddle.” After breakfast the crew dispatch 1,000 pit stop sandwiches. These, together with chocolate and energy drinks, provide the energy boost needed to keep the riders going, particularly over the last few miles of the day. “After that all that’s left is for us to pack up the kitchen sink, climb back in the lorry and get ourselves on the road,” Lulu says. “We travel on for about 200 miles to set up another kitchen and start again the next day with afternoon tea service.” Award-winning Lancashire chef STEVEN SMITH, from the Freemasons at Wiswell, shares two brilliant recipes to keep you fuelled during your training: Homemade granola bars 2 cups rolled oats 1/2 cup smooth peanut butter 1/2 cup maple syrup 1/2 teaspoon sea salt (optional) Line a baking tray with baking paper and set aside. In a small saucepan over a medium heat, bring the maple syrup to a boil, for one minute. In the meantime, place the oats in a large bowl and set aside. Remove the pan of syrup from the heat and stir in the peanut butter and salt. Immediately pour the warm mixture over the oats, and use a spatula to stir well, coating the oats evenly. As the mixture cools, it will become sticky and difficult to mix, so move quickly! Transfer the mixture to the tray, and pack it into the base. Pressing firmly will ensure that the bars stick together well later. Place the pan in the fridge or freezer to cool, then use a large knife to cut the bars. Stored at room temperature, these bars should last for up to a week. Jersey Royals with eggs, ham and mushrooms 1 large handful of button mushrooms Chives, finely chopped 1 dash of dry sherry 1 dash of rapeseed oil 4 organic eggs 12 Jersey Royal potatoes 50ml of ham stock 4 slices of good quality cured ham Place a pan over a medium heat and add a large knob of butter. Once the butter begins to foam, fry the mushrooms until lightly golden. Add a splash of sherry and pinch of salt and simmer briefly to glaze. Remove from the heat and finish with chives and oil. To prepare the eggs, bring a large pot of water to the boil. Once boiling, turn down to a simmer and poach each egg for one minute each, then remove from the water and cool in ice water. For the Jersey Royals, boil until soft then remove the potatoes. Add to a hot pan with a knob of butter and a generous squeeze of lemon juice, cook until glazed. To prepare a sauce, heat the ham hock stock in a small pan. Once warm, add a dash of lemon juice and a knob of butter, remove from the heat and stir to emulsify. Dress each plate with swirls of the sauce, then place the egg in the middle with a piece of ham and chunks of pork scratching on top. Arrange the warm mushrooms and potatoes alongside and scatter with chopped chives.
<urn:uuid:7b9c2695-6a8c-4742-a6b1-5bec5510567c>
CC-MAIN-2016-44
http://www.lep.co.uk/your-lancashire/how-do-you-fuel-hundreds-of-cyclists-on-an-epic-1-000-mile-challenge-1-7824382
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719155.26/warc/CC-MAIN-20161020183839-00333-ip-10-171-6-4.ec2.internal.warc.gz
en
0.929469
1,446
1.632813
2
In 1970, Warren Schwab had a vision for a school that would revolutionize deaf education in Massachusetts. Schwab set out to create an educational environment grounded in respect and enjoyment, where language and communication were paramount. The result was the first school in Massachusetts to use American Sign Language and spoken English instead of relying solely on the oral teaching method. Today—after more than 35 years as a true pioneer in deaf education—TLC embodies his vision. - Senator John F. Kerry, May 2007 Since its founding in 1970, The Learning Center for the Deaf has grown from one school in a rented facility to a multi-service educational organization serving over 1,500 children and adults a year in more than 94 towns in Massachusetts and in 15 states. Through all of the growth and program development, the informal creative atmosphere of the early years continues, as does TLC’s commitment to full communication access, student-centered learning, academic challenges, and rich, meaningful learning experiences. 1970: The Learning Center for the Deaf, the first school of the Deaf in Massachusetts to depart from the “oral method” of education and to advocate the use of signs in addition to spoken English, is established. 1975: Opens a pre-school program and launches an outpatient audiology service. The following year, introduces the Parent Infant Program (PIP), one of the first programs in the country to provide deaf infants and toddlers exposure to American Sign Language in addition to spoken English and to offer parents instruction in the use of ASL. 1978: Establishes a special needs program for deaf children who have cognitive or behavioral disabilities. 1980: Launches a high school program. A group residence for high school students begins the following year. 1987: Opens Walden House, a 365-day residential treatment program for deaf students challenged by severe social and emotional difficulties, resulting from childhood trauma, mental illness and/or organic dysfunction. 1990: Affirms its commitment to bilingual bicultural education where American Sign Language and written English are the primary languages of instruction. 1994: Introduces TLC’s Randolph Campus, which serves children from infants and toddlers through 5th grade. The innovative Language Access Program (LAP) for students with no hearing loss who benefit from signing for access to the curriculum is established as well. 1995: Completes construction of a new facility, now called Walden School, to meet the needs of deaf students facing emotional, social and psychological challenges that warrant a residential treatment program. 2002: Launches The Outreach Partnership Program (TOPP) to provide comprehensive consultative and direct services to deaf and hard-of-hearing students in public schools. 2005: Establishes Walden School’s Wraparound Program to provide community-based services to families with deaf children who have behavioral and emotional problems. The program is designed to help reduce the need for residential placement. 2010: The Learning Center for the Deaf is awarded accreditation by the New England Association of Schools and Colleges (NEASC), Conference of Educational Administrators of Schools and Programs for the Deaf (CEASD) and the Council on Accreditation (COA). 2011: Opens a new Early Childhood Center, Library and Conference center on the site of the Barn. Consolidates the Early Childhood Programs to its Framingham Campus and closes the Randolph location. Today: Headquartered on a 14-acre campus with 16 buildings, The Learning Center for the Deaf employs more than 300 staff, more than 30% of whom are deaf.
<urn:uuid:284d985d-4ea0-426c-8459-30d7bd1e6765>
CC-MAIN-2017-04
http://www.tlcdeaf.org/page.cfm?p=363
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00443-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945021
731
2.71875
3
Listen free for 30 days Add to Cart failed. Add to Wish List failed. Remove from wish list failed. Follow podcast failed Unfollow podcast failed $14.95 a month Buy Now for $9.26 This book by Dr. Seuss, about making up one's mind, is the literary equivalent of buried treasure! What happens when a brother and sister visit a pet store to pick a pet? Naturally they can't choose just one! The tale captures a classic childhood moment - choosing a pet - and uses it to illuminate a life lesson: that it is hard to make up your mind, but sometimes you just have to do it! Told in Dr. Seuss' signature rhyming style, this is a must-have for Seuss fans and a perfect choice for the holidays, birthdays, and happy occasions of all kinds. What listeners say about What Pet Should I Get?Average Customer Ratings Reviews - Please select the tabs below to change the source of reviews. Caring for a pet The story is classic and is great and the voice over is amazing. Unfortunately, the additional content is very condescending and ridiculous. I don’t need you as the publisher assuming that, we the readers, don’t know how to care for a pet. 1 person found this helpful
<urn:uuid:59026426-ee68-4ff5-86a5-90c98ae7257c>
CC-MAIN-2022-33
https://www.audible.ca/pd/What-Pet-Should-I-Get-Audiobook/B0711C29WC
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00472.warc.gz
en
0.899983
310
1.578125
2
The Neoliberal Lives of Jesus By Robert J. Myles - Faculty of Arts - The University of Auckland - New Zealand Publicado em The Bible and Interpretation - Maio de 2016 The key to the quest for the historical Jesus, I would argue, is not history or theology—as typically assumed—but, in fact, ideology. With some notable exceptions relegated to the margins of the scholarly canon, historical Jesus research—embroiled in a kind of soft-positivism—has overwhelmingly avoided extensive engagement with its own ideological commitments, assumptions, and discursive contexts. The most common scholarly understanding of ideology, as Terry Eagleton describes it, refers not necessarily to a “false consciousness”, but rather to “the ways in which what we say and believe connects to the power-structure and power-relations of the society we live in… [T]hose modes of feeling, valuing, perceiving and believing which have some kind of relation to the maintenance and reproduction of social power” [Terry Eagleton, Literary Theory: An Introduction, 2nd ed. (Malden: Blackwell, 1996), 13]. Schweitzer already recognized this dimension to the quest. Jesus is not merely an object of historical interest, but a figure of immense cultural significance and authority today, in that any statement made about him is simultaneously a statement about the contemporary world we inhabit. He famously coined the phrase “The Liberal Lives of Jesus” to refer to the plethora of books written in the nineteenth century that domesticated Jesus to then dominant forms of liberal ideology. In addition to diminishing the eschatological outlook driving Jesus’s prophetic activity, the liberal lives of Jesus heightened his “natural psychology” in ways that anachronistically solidified the modern, bourgeois individual. The “neoliberal lives of Jesus”, then, is a useful catch-all designation for the varied and extensive work done on the historical Jesus over the past forty years. This “quest” has taken place when neoliberalism has transitioned from an emerging political ideology into a firmly entrenched governing rationality exerting influence over almost every domain of life in every realm from politics and the state to the academy. According to the political theorist Wendy Brown, neoliberalism is best understood “not simply as economic policy, but as a governing rationality that disseminates market values and metrics to every sphere of life… [I]t formulates everything, everywhere, in terms of capital investment and appreciation, including and especially humans themselves” [Wendy Brown, Undoing the Demos: Neoliberalism’s Stealth Revolution (Cambridge: MIT Press, 2015), 176]. Under neoliberalism we even conceive of ourselves as subjects to be marketed and self-promoted, whether by social media, blogs, or personal websites. Neoliberalism is intensely focused on the individual, specifying entrepreneurial conduct everywhere, and constraining the subject to act in a capital-enhancing fashion. Neoliberal subjects themselves are interpellated as individual consumers, “intersectionally constructed” by complex categories of identity like gender, sexuality, race, and class. Neoliberal ideology has saturated the conditions under which recent historical Jesus research has been produced, marketed, and consumed.
<urn:uuid:2d1fbc19-3410-4ad5-bd3f-b45a19bdff6d>
CC-MAIN-2017-04
http://blog.airtonjo.com/2016/05/as-vidas-neoliberais-de-jesus.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00015-ip-10-171-10-70.ec2.internal.warc.gz
en
0.920883
664
2
2
Watch Out for This New DMCA Link Scam Sent from Fake Lawyers Have you been receiving suspicious emails from law firms alleging you violated DMCA copyright law? If so, you are not alone. All over the country, people have been receiving emails from fraudulent lawyers and law firms claiming that their website has by some means violated DMCA. DMCA stands for the Digital Millennium Copyright Act, which was instituted to protect copyright infringements on owned intellectual property and deter misuse of owned media. DMCA link requests are typically sent out to give notice of possible violations of copyright law. However, in this scam, these deceptive DMCA link requests have no factual basis and are simply link spam. Link spams are deceitful links that are meant to exploit search-ranking algorithms and can have a significantly negative impact on your SEO practices. This particular scam has been using fake firms and AI-generated lawyers to ensure the fake emails come across as more realistic. How the Scam Looks As pictured, this realistic-looking email scam disguises as a DMCA infringement but only vaguely presents information. The scam also poses behind the well-thought-out character of Billy to build credibility and legitimacy. You can inspect how the email does not explicitly describe the specific details of the alleged violation. Instead, it names a violation under the law without describing why it was actually violated. The scam is also known to use realistic AI-generated lawyers to put a face to the scam and attempt to lend credibility to the email. So, when receiving emails, it’s best not to assume their profile picture is legitimate either. If you encounter one of these emails, you can observe that some of the details in their profile pictures don’t entirely match up when investigating in closer detail. As a result, when receiving emails from unknown senders, it’s wise to question whether the email has any of the elements above or any other typical elements of a scam. How to Avoid Falling Prey to This Scam To prevent being link-scammed, be careful of mail you receive from previously unknown people and businesses. Make sure you are examining who sent you the mail and verify it is a legitimate business or person who sent the mail. It’s also essential to avoid clicking on links that may be fraudulent. Additionally, you can notice the vagueness of the email and the lack of supporting details present. This scam and other similar digital scams are not uncommon at all in this digital age and may only increase as fraudulent technology improves. It is in your best interest to learn how to correctly identify these scams and protect yourself and your business from being duped. Contact Our Team to Combat Link Scams Fortunately, with the right help these hoaxes can be dealt with. If scams like these are negatively impacting your practices, reach out to our team at BluShark Digital to learn more about what we can do to enhance your business’s digital presence and improve your ability to withstand scams like these.
<urn:uuid:ccec01ee-564f-4357-8d07-23dc2925eb48>
CC-MAIN-2022-33
https://blusharkdigital.com/blog/watch-out-for-this-new-dmca-link-scam-sent-from-fake-lawyers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00066.warc.gz
en
0.949577
601
1.609375
2
Read Cynthia Peters’ article originally published in World Education’s E-newsletter on this topic: Using the Technology Issue of The Change Agent to Teach to the College and Career Readiness (CCR) Standards College and Career Readiness Standards and The Change Agent The Change Agent has a long history of using socially relevant material to teach reading, writing, and math. Our lesson plans and extensions help students distinguish fact from opinion, build their knowledge, assess the author’s point of view, analyze evidence, and build math skills based on real-world problems. These skills represent some of the key shifts in the new College and Career Readiness Standards (see the Key Shifts below), so if you’re already using The Change Agent, you’re a step ahead when it comes to teaching to these standards. Key Shifts in English Language Arts - Complexity: regular practice with complex text and its academic language; includes a staircase of increasing complexity for students to read independently and proficiently + attention to academic vocabulary. - Evidence: reading, writing, and speaking grounded in evidence from text, both literary and informational; for reading – to present careful analysis; for writing – analyzing sources; for speaking and listening – purposeful academic talk in which students contribute accurate, relevant information about a multitude of ideas they have studied or researched in various domains. - Knowledge: building knowledge through content-rich nonfiction – science, history, and technical subject areas. Key Shifts in Mathematics - Focus: instructors need to narrow and deepen their teaching; this shift finds expression in clearer understanding of place value, properties of operations, and the application of properties in a variety of situations. - Coherence: refers to the idea that standards at higher levels become extensions of previous learning rather than discrete new lessons. One example of this: connection between properties of operations (eg., multiplication) and geometric applications (eg., area). - Rigor: conceptual understanding, procedural skill and fluency, and rigorous application of mathematics in real-world contexts. Know more than “how to get the answer.” Real world applications for calculating probabilities as fractions, decimals or percent; statistical analysis of rational data. Adapted from “College and Career Readiness Standards for Adult Education,” Susan Pimentel, 2013; and with thanks to www.teachingthecore.com. To see exactly which articles and lesson plans are aligned with which standards, a chart is available for each recent issue of The Change Agent. Charts are available for the following issues: - Stand Up and Be Counted - Indigenous Peoples - Career Pathways - When We Fight, We Win - Talking about Race - Prisons and Justice? - All About Food - Good Jobs, Not Just Any Jobs! Sample Standards Chart: Use the Technology issue of The Change Agent to teach College and Career Readiness (CCR) Standards The following chart is also available as a printable PDF. THE 10 ANCHOR STANDARDS FOR READING CAN BE BROKEN UP INTO 4 GROUPS |Anchor Standards||In Everyday English||TCA Excerpts| |Key Ideas and Details (R.CCR.1-3)||What does the text say? What does it not say? What does it mean? How can you prove it?||pp. 3, 6-7, 10, 16, 23, 37, 44, 46, 47, 52-53| |Craft & Structure (R.CCR.4-6)||How does author use language to commu-nicate? How is the text organized? Who wrote this and how/why does that matter?||pp. 22-23| |Integration of Knowledge and Ideas (R.CCR.7-9)||How does this connect with other sources? Does it measure up? Is it valid?||pp. 36, 42-43, 45, 50-51| |Range and Level of Text Complexity (R.CCR.10)||Can students read widely and deeply from a broad range of high-quality texts?||pp. 8-9, 24-25| THE 9 ANCHOR STANDARDS FOR WRITING CAN BE BROKEN UP INTO 3 GROUPS |Text Types and Purposes (W.CCR.1-3)||Write arguments. Write explanatory texts. Write narratives. Stress complexity, reasoning, evidence, and details.||pp. 14, 18, 38-39, 46| |Production and Distribution of Writing (W.CCR4-6)||Know your audience. Speak clearly to them. Plan, revise, re-write. Use technology, including the Internet, to produce and publish writing and to collaborate and interact.||pp. 14-15, 27| |Research to Build and Present Knowledge (W.CCR.7-9)||Research. Gather information from various sources. Assess credibility of those sources. DO NOT plagiarize.||pp. 14-15, 27| THE 6 ANCHOR STANDARDS FOR SPEAKING AND LISTENING CAN BE BROKEN UP INTO 2 GROUPS |Comprehension and Collaboration (SL.CCR.1-3)||Be able to converse by expressing yourself and building on others’ ideas. Integrate information from diverse formats. Be able to evaluate a speaker’s point of view.||pp. 6-7, 8-9, 10, 16, 18, 28-30, 46| |Presentation of Knowledge and Ideas (SL.CCR. 4-6)||Present information in an organized way. Use various media in your presentations. Use formal English when necessary.||p. 10| THE 6 ANCHOR STANDARDS FOR LANGUAGE CAN BE BROKEN UP INTO 3 GROUPS |Conventions of Standard English (L.CCR.1-2)||Get that grammar down! And spelling and punctuation too!| |Knowledge of Language (L.CCR.3)||Choose words, phrases, and punctuation for effect. Vary sentence patterns. Notice how language is used in poetry, drama, etc.||pp. 4-5, 12, 35, 43| |Vocabulary Acquisition and Use (L.CCR4-6)||Use context clues to determine meaning. Use a dictionary. Understand figurative language and nuance. Use academic and domain-specific words. Be able to independently acquire new vocabulary.||pp. 26-27, 43| KEY MATH SHIFT: RIGOROUS APPLICATION OF MATHEMATICS IN REAL-WORLD CONTEXTS. |Real world applications for calculating probabilities as fractions, decimals or percent; statistical analysis of rational data.||pp. 11, 13, 21, 22, 25, 29, 42-43|
<urn:uuid:ecd3a70e-d84d-4fe7-867d-421508b272f1>
CC-MAIN-2022-33
https://changeagent.nelrc.org/in-the-classroom/ccr/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00065.warc.gz
en
0.868545
1,493
3.703125
4
40 CFR 63.11169 - What is the purpose of this subpart? Except as provided in paragraph (d) of this section, this subpart establishes national emission standards for hazardous air pollutants (HAP) for area sources involved in any of the activities in paragraphs (a) through (c) of this section. This subpart also establishes requirements to demonstrate initial and continuous compliance with the emission standards contained herein. (a) Paint stripping operations that involve the use of chemical strippers that contain methylene chloride (MeCl), Chemical Abstract Service number 75092, in paint removal processes; (b) Autobody refinishing operations that encompass motor vehicle and mobile equipment spray-applied surface coating operations; (c) Spray application of coatings containing compounds of chromium (Cr), lead (Pb), manganese (Mn), nickel (Ni), or cadmium (Cd), collectively referred to as the target HAP to any part or product made of metal or plastic, or combinations of metal and plastic that are not motor vehicles or mobile equipment. (d) This subpart does not apply to any of the activities described in paragraph (d)(1) through (6) of this section. (1) Surface coating or paint stripping performed on site at installations owned or operated by the Armed Forces of the United States (including the Coast Guard and the National Guard of any such State), the National Aeronautics and Space Administration, or the National Nuclear Security Administration. (2) Surface coating or paint stripping of military munitions, as defined in § 63.11180, manufactured by or for the Armed Forces of the United States (including the Coast Guard and the National Guard of any such State) or equipment directly and exclusively used for the purposes of transporting military munitions. (3) Surface coating or paint stripping performed by individuals on their personal vehicles, possessions, or property, either as a hobby or for maintenance of their personal vehicles, possessions, or property. This subpart also does not apply when these operations are performed by individuals for others without compensation. An individual who spray applies surface coating to more than two motor vehicles or pieces of mobile equipment per year is subject to the requirements in this subpart that pertain to motor vehicle and mobile equipment surface coating regardless of whether compensation is received. (4) Surface coating or paint stripping that meets the definition of “research and laboratory activities” in § 63.11180. (5) Surface coating or paint stripping that meets the definition of “quality control activities” in § 63.11180. (6) Surface coating or paint stripping activities that are covered under another area source NESHAP. Title 40 published on 2015-07-01 The following are ALL rules, proposed rules, and notices (chronologically) published in the Federal Register relating to 40 CFR Part 63 after this date.
<urn:uuid:c8248408-4022-4450-8c2e-cfa1afd3cfd8>
CC-MAIN-2017-04
https://www.law.cornell.edu/cfr/text/40/63.11169
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00135-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919169
592
1.921875
2
There May Be Such a Thing as 'Too Much Exercise' WEDNESDAY, May 14, 2014 -- Is there a limit to the benefits of exercise? Two studies suggest that, for certain people, keeping to a moderate physical activity regimen may be best for heart health. One study found that a schedule of intense workouts actually boosted the risk of death from heart attack or stroke in older people with pre-existing heart disease, while the other found that young men who did a lot of endurance exercise were at higher risk for heart rhythm problems later in life. However, one expert unconnected to the studies stressed that, on the whole, exercise is good medicine. "Folks with heart disease should continue to engage in some form of daily physical activity," urged Barbara George, director of The Center for Cardiovascular Lifestyle Medicine at Winthrop-University Hospital in Mineola, N.Y. But she said moderation is key. "You shouldn't feel you have to become a marathon runner to reap the benefits," George said. The first study was led by Dr. Ute Mons of the German Cancer Research Center in Heidelberg, Germany, and included more than 1,000 people. Most of the participants were in their 60s, had stable heart disease and were tracked for 10 years. About 40 percent exercised two to four times a week, 30 percent worked out more often, and 30 percent exercised less often. Compared to those who got regular exercise, the most inactive people were about twice as likely to have a heart attack or stroke, and were about four times more likely to die of heart disease and all causes, the researchers said. However, Mons' team also found that those who did the most strenuous daily exercise were more than twice as likely to die of a heart attack compared to those who exercised more moderately. The second study was led by Dr. Nikola Drca of the Karolinska Institute in Stockholm, Sweden, and included more than 44,000 Swedish men, aged 45 to 79. All of the men were asked about their physical activity levels at ages 15, 30, 50 and during the previous year. Their heart health was then tracked for an average of 12 years. Those who had done intensive exercise for more than five hours a week when they were younger were 19 percent more likely to have developed a heart rhythm disorder called atrial fibrillation by age 60 than those who exercised for less than an hour a week. That risk increased to 49 percent among those who did more than five hours of exercise at age 30 but did less than an hour a week by the time they were 60. Participants who cycled or walked briskly for an hour or more a day at age 60 were 13 percent less likely to develop atrial fibrillation. The studies were published online May 14 in the journal Heart. Another expert said the findings shouldn't alter standard recommendations. "It is not standard practice to recommend strenuous activity to individuals with coronary heart disease," said Dr. Nieca Goldberg, director of the Tisch Center for Women's Health at NYU Langone Medical Center, New York City. "This study, although interesting, does not change current recommendations for moderate physical activity in coronary patients." For her part, George said it's clear that a moderate exercise program can provide real benefit for everyone. "A large body of scientific research has consistently shown that a sedentary lifestyle is one of the risk factors for cardiovascular disease, which includes heart disease, and that becoming more physically active can decrease your risk by as much as 50 percent," she said. Current American Heart Association guidelines advise 30 minutes of moderate-intensity aerobic exercise most days a week or 20 minutes of vigorous activity three days a week, George added. And in a journal editorial, a team led by Dr. Lluis Mont of the Hospital Clinic of Barcelona, Spain, agreed with the two U.S. experts. "The benefits of exercise are definitely not to be questioned; on the contrary, they should be reinforced," the team wrote. But studies like the two published in Heart are fine-tuning recommendations for exercise, to "maximize benefits obtained by regular exercise while preventing undesirable effects -- just like all other drugs and therapies," the editorialists said. The U.S. National Heart, Lung, and Blood Institute offers a guide to physical activity. Posted: May 2014 Recommended for you
<urn:uuid:f20a45fa-1102-47fc-84db-38eb00cbd1ee>
CC-MAIN-2016-44
https://www.drugs.com/news/there-may-such-thing-much-exercise-51602.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00386-ip-10-171-6-4.ec2.internal.warc.gz
en
0.98053
903
2.546875
3
Synopsys has announced the availability of the first products in the new DesignWare ARC EV Family of vision processors. The EV52 and EV54 vision processors are fully programmable and configurable vision processor IP cores that combine the flexibility of software solutions with the low cost and low power consumption of dedicated hardware. The EV Processors implement a convolutional neural network (CNN) that can operate at more than 1000 GOPS/W, enabling fast and accurate detection of a wide range of objects such as faces, pedestrians and hand gestures at a fraction of the power consumption of competing vision solutions. To speed application software development, the ARC EV Processor Family is supported by a comprehensive software programming environment based on existing and emerging embedded vision standards including OpenCV and OpenVX, as well as Synopsys’ ARC MetaWare Development Toolkit. The combination of high-performance hardware optimised for vision data processing and high productivity programming tools make the ARC EV Processors an ideal solution for a broad range of embedded vision applications including video surveillance, gesture recognition and object detection. “The ability of embedded systems to extract meaning from visual inputs is becoming increasingly important in a broad range of products including security equipment, gaming devices and automobiles. This is driving demand for more performance- and power-efficient vision processing capabilities,” said Jeff Bier, founder of the Embedded Vision Alliance. “Specialised processors like the Synopsys’ DesignWare ARC EV Processors help designers attain the performance they need for their vision applications at levels of power consumption suitable for portable devices.” High-Performance Multicore Hardware The ARC EV Processors include multiple high-performance processing cores that can operate at up to 1 GHz in typical 28-nanometer process technologies. The ARC EV Processors also implement a feed-forward CNN structure that supports a programmable point-to-point streaming interconnect for fast and accurate object detection, a critical task in vision processing. The processors’ configurable number of execution units enables developers to exploit the task- and data-level parallelism common in vision applications, executing complex image and video recognition algorithms with as little as one-fifth the power consumption of other vision processors available on the market. High Productivity Programming Tools A complete software programming environment, including OpenVX and OpenCV libraries, and Synopsys’ MetaWare Development Toolkit, simplifies the development of application software for the Synopsys ARC EV Processor Family. The OpenCV source libraries available for ARC EV Processors provide more than 2500 functions for real-time computer vision. The processors are programmable and can be trained to support any object detection graph. The OpenVX framework includes 43 standard computer vision kernels that have been optimised to run on the EV Processors, such as edge detection, image pyramid creation and optical flow estimation. Users can also define new OpenVX kernels, giving them flexibility for their current vision applications and the ability to address future object detection requirements. The OpenVX runtime distributes tiled kernel execution over the EV Processors’ multiple execution units, simplifying the programming of the processor. The full suite of tools and libraries, along with available reference designs, enable designers to efficiently build, debug, profile and optimise their embedded vision systems. Easing SoC Integration The ARC EV Processors are designed to integrate seamlessly into a SoC. They can be used with any host processors and operate in parallel with the host. The ARC EV Family includes support for synchronisation with the host through message passing and interrupts. In addition, the ARC EV Processor memory map is accessible to the host. These features enable the host to maintain control while allowing all vision processing to be offloaded to the ARC EV Processor, reducing power and accelerating results. The ARC EV processors can access image data stored in a memory mapped area of the SoC or from off-chip sources independently from the host through the ARM AMBA AXI standard system interface if required. “Embedded vision is driving innovation in a broad spectrum of applications, from surveillance to consumer and gaming devices,” said John Koeter, vice president of marketing for IP and prototyping at Synopsys. “Synopsys’ new ARC EV Processor Family delivers state-of-the-art object detection accuracy with 5X better power efficiency, along with comprehensive vision libraries and a robust software programming environment. This combination enables design teams to integrate embedded vision functionality into more systems faster with much lower power consumption than existing solutions.”
<urn:uuid:d74185ab-c191-4c87-ad49-f3f02c1bbc8b>
CC-MAIN-2022-33
https://www.cieonline.co.uk/synopsys-launches-high-performance-embedded-vision-processor-ip/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00672.warc.gz
en
0.902649
920
1.765625
2
Hello, Interesting article however the copyright on it is 2003 so it is 5 years old already and like els, I have never seen this as criteria for dx depression. My reference of 2008 indicates studies have shown the severe zinc deficiency significantly depress immune function because zinc is needed for both the development and the activation of a very important class of white blood cells (lymphocytes) called T-cells. When people with low zinc are given zinc supplements, their T-cell count goes up and they're better able to fight off disease. The symptoms of decreased B6 are many so please do see your physician before you start buying a lot of supplements as natural cures may interact with your regular medications. Thank you for sharing this article. Kitt, Moderator: Anxiety, Panic & Depression http://www.healingwell.com/donate *~* Not a mental health professional of any kindIt is health that is real wealth and not pieces of gold and silver.~Mahatma Gandhi~
<urn:uuid:f8197767-44c3-45f5-9cb6-e03a19339918>
CC-MAIN-2017-04
http://www.healingwell.com/community/default.aspx?f=19&m=1156001
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00355-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947351
205
2.09375
2
Congress had its own civics lesson Thursday, as a bipartisan group of 135 lawmakers prepared to take turns reading passages of the Constitution on the House floor. Rep. Bob Goodlatte (R., Va.), who organized the reading, decided that it shouldn’t include parts of the Constitution that have been nullified via amendment. That would include the passage that counts slaves as three-fifths of a person or the one outlawing booze. That didn’t sit well with some Democrats. “This is very emotional for me given the struggle of African Americans,” said Chicago Democratic Rep. Jesse Jackson Jr. “Many of us don’t that to be lost on the reading of our sacred document.” At least one Republican agreed. “They are not deletions, they are amendments,” said Rep. Louie Gohmert (R., Texas). In doing the reading, lawmakers included the repeal of Prohibition and when House Majority Leader Eric Cantor (R., Va.) got to the passage on how to count the U.S. population (“adding to the whole Number of free Persons, including those bound to Service for a Term of Years, and excluding Indians not taxed, three fifths of all other Persons”) he skipped it…
<urn:uuid:067ccc15-fd59-4c5b-80d8-4c93c94587f4>
CC-MAIN-2017-04
http://blogs.wsj.com/washwire/2011/01/06/house-reads-constitution-gets-civics-lesson/?mod=rss_WSJBlog&mod=WSJ_Election_Blog
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00088-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956896
266
1.78125
2
The origins of the university date to 1578 when members of the Jesuit Order established the Colegio Seminario de San Jerónimo in a building that currently houses the Department of Psychology. In 1825 the institution became a state college and was declared a university in 1937. Following a period of turmoil, the university was declared Autónoma (self-governing and free of governmental intervention) in 1957 and was awarded the title of Benemérita (“most worthy”) by the Legislature of the State of Puebla in 1987. The BUAP is today one of Mexico’s leading public universities and unquestionably the premier national research and teaching center south of Mexico City. These qualities make the institution a focal point for students and scholars from states other than Puebla, including Chiapas and Oaxaca. Through its various divisions or facultades, the BUAP offers 55 undergraduate licenciaturas (degrees), and 86 programas de posgrado (graduate degrees) in the humanities, social sciences and natural sciences, as well as in technical fields, business administration, law, education and health. Just over 50,000 are enrolled at the BUAP, which includes students from all divisions. The city campus is divided into two primary areas: one in Puebla’s historic downtown, which houses programs dedicated to the humanities and some social sciences, and the other in the newer “Ciudad Universitaria” on the outskirts of town, which houses programs dedicated to natural sciences, most social sciencies, and information services, as well as sports facilities. Both campuses are easily accessible by public transportation from almost anywhere in the city. With its extensive course curriculum, the BUAP relies on several research institutes that bring together prominent scholars with an interdisciplinary focus. Many of these scholars work with advanced students on specialized research projects. Of particular interest to program students is the Instituto de Ciencias Sociales y Humanidades (ICSyH) in the historic center of Puebla. Public Mexican universities have a long tradition of social awareness and involvement. Quite a few specialized degrees require a period of internship in either an urban or rural setting. The BUAP has been at the forefront of this commitment. As bona fide students at the university, PMCSP participants may wish to collaborate in one of many service activities focusing on health, literacy and social awareness coordinated through the university or by PMCSP staff. The BUAP hosts an impressive array of concerts, lectures, dance performances and academic symposia to which interested PMCSP students will have access. Through the schools of music, dance and drama, the BUAP sponsors a Mexican folkloric dance troupe, several choirs and an active dramatic performance series—open to PMCSP students depending on interest and achievement.
<urn:uuid:9c8c5442-cdcd-4130-b2ab-f76abd126958>
CC-MAIN-2016-44
http://pueblaprogram.com/buap/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00417-ip-10-171-6-4.ec2.internal.warc.gz
en
0.941668
583
1.789063
2
Kate Forsyth is best known for her historical novel Bitter Greens, which interweaves a retelling of the Rapunzel fairy tale with the true life story of the woman who first told the tale, the 17th century French writer Charlotte-Rose de Caumont de La Force. Kate has continued her fascination with entwining fairy tales with historical fiction in The Wild Girl and The Beast’s Garden. Her latest novel, Beauty in Thorns, blends the Sleeping Beauty legend with the world of the Pre-Raphaelite painters. Kate is also the author of several children’s books and has also published two heroic fantasy series, The Witches of Eileanan and Rhiannon’s Ride. She is a five-time Aurealis Award winner. She is married with three children, and lives in Sydney. She is also a direct descendant of Charlotte Barton, the author of Australia’s earliest known children’s book. What is the inspiration for Beauty in Thorns? Is there a particular theme you wished to explore? Beauty in Thorns tells the story of the passions, scandals and tragedies behind the Pre-Raphaelite artist Edward Burne-Jones’s lifelong fascination with the Sleeping Beauty fairy-tale, which he painted half-a-dozen times over the course of his life. I have been interested in the Pre-Raphaelites since discovering their work as an undergraduate. My interest was reignited while I was studying my Doctorate of Creative Arts in fairy-tale studies. I wrote a thesis chapter on William Morris, who wrote the first creative response to ‘Rapunzel’ in the mid-19th century. I got interested in the Pre-Raphaelites’ use of fairy-tales, which echoed my own, and one day stumbled upon the story of Edward Burne-Jones and his famous ‘Legend of Briar Rose’ quartet of paintings, which in 1890 sold for the largest sum ever paid a British artist. It was just such an intriguing story, and contained within it all the things that interest me – art, poetry, mythology, love, death, and obsession. What particular aspect of this period of history inspired? Why? It is always the story that compels me to write a novel, not the setting. However, I’ve always loved the Victorian era and have read a great many books set during that period, both fiction and non-fiction. It was such a time of change and unrest, and the psychology of the time is just fascinating, with its twin obsessions with sex and death. I was really excited to have the chance to study it and bring it to life on the page. What resources did you use to research Beauty in Thorns? How long did it take to finish the novel? I began work on the novel in November 2014 and finished the final edit in March 2017, so it was a long and challenging project to work on. I read all the books about the Pre-Raphaelites that I could find, plus countless journal articles and blog posts. I spent a lot of time examining the art and poetry of the Pre-Raphaelites, and trying to understand the thoughts and motivations of the artists and their models. What do you do if stuck for a word or a phrase? Keep on writing. The perfect phrase rarely comes with the first draft anyway. Sometimes the subconscious mind needs time to dwell on something before it comes up with the answer. Is there anything unusual or even quirky that you would like to share about your writing? I like to start a new book when the moon is new. It means that I can try and get everything else done first and get my desk cleared, and be ready to focus all my energies on the next project. It gives me a clear start date, and feels somehow energising and inspiring. It also stops me from procrastinating or taking on too much other work. Do you use a program like Scrivener to create your novel? Do you ever write in long hand? I keep a notebook where I jot down ideas, questions, and lists of things to do, as well as word counts, diagrams, maps, photos and other sources of information and inspiration. I write most of my poetry long hand, as well as songs, spells, charms and incantations that I might be working into the book. However, I type the narrative straight into Word, which I find very simple and easy to move around in. I work away steadily, usually writing in a linear fashion, though I often circle back to rewrite a scene or chapter as needed, or to add in a new scene. Is there a particular photo or piece of art that strikes a chord with you? Why? The key works of art that helped inspire Beauty in Thorns were ‘Proserpina’ by Dante Gabriel Rossetti, and the sequence of ‘Sleeping Beauty’ paintings by Edward Burne-Jones. What advice would you give an aspiring author? Read as much and as widely as you can. Make writing a natural part of your daily routine. Be steadfast and unshakeable in your faith in both yourself and your story. Have courage, in both your writing and your life. A spellbinding reimagining of ‘Sleeping Beauty’ set amongst the wild bohemian circle of Pre-Raphaelite artists and poets. The Pre-Raphaelites were determined to liberate art and love from the shackles of convention. Ned Burne-Jones had never had a painting lesson and his family wanted him to be a parson. Only young Georgie Macdonald – the daughter of a Methodist minister – understood. She put aside her own dreams to support him, only to be racked with grief and scandal. Dante Gabriel Rossetti was smitten with his favourite model, Lizzie Siddal. She wanted to be an artist herself, but was seduced by the irresistible lure of laudanum. William Morris fell head-over-heels for a ‘stunner’ from the slums, seventeen-year-old Janey Burden. Discovered by Ned, married to William, she embarked on a passionate affair with Gabriel that led inexorably to tragedy. Meanwhile, fifteen-year-old Margot Burne-Jones was her father’s muse. He painted her as the ‘Sleeping Beauty’, a fairy-tale that had haunted him all his life. Yet Margot was growing up, and longed to be awakened to love. Bringing to life the dramatic true story of love, obsession and heartbreak that lies behind the Victorian era’s most famous paintings, Beauty in Thorns is the story of awakenings of all kinds. HNSA 2017 Conference As a co founder of the Historical Novel Society Australasia (HNSA) and programme director of the 2017 HNSA Melbourne conference, I am delighted that Kate Forsyth is our patron and will be celebrating Beauty in Thorns at our History with a Twist cocktails on 8 September. There will be lots of prizes including the chance to win a 1:1 Skype session with Kate for yourself or your book club.Come and join the fun. More information is at the HNSA website. Kate is also appearing in conversation with Deborah Challinor on 10 September, and will join Anna Campbell and Luke Devenish to read their saucier scenes in our Beyond the Comfort Zone: Writing Sex and Violence. The HNSA 2017 Melbourne Conference is being held on 8-10 September 2017 at Swinburne University. This celebration of the historical fiction genre will showcase over 60 speakers discussing inspiration, writing craft, research, publishing pathways and personal histories in our weekend programme. Among the many acclaimed historical novelists participating are Kerry Greenwood, Kate Forsyth, Deborah Challinor, Libby Hathorn, Lucy Treloar, Sophie Masson, Sulari Gentill, Robert Gott and Arnold Zable. The HNSA’s speakers’ list is available on the HNSA website. In addition to the two stream weekend programme, there will be ten craft based super sessions and two research masterclasses.You won’t want to miss our interactive sessions on armour and historical costumes either! Purchase a ticket and you will be entered in the draw to win a $100 Dymocks Gift Card. Manuscript assessments will be conducted by industry experts, Alison Arnold and Irina Dunn. Our free extended academic programme is open for general admission but bookings are essential. Our First Pages Pitch Contest offers an opportunity for submissions to be read aloud to a panel of publishers. And we are delighted to announce the introduction of our inaugural HNSA Short Story Contest with a $500 prize! Let’s make a noise about historical fiction!
<urn:uuid:5aaf084c-637a-4bba-b3a3-13870b54c39d>
CC-MAIN-2022-33
https://www.elisabethstorrs.com/interview-with-kate-forsyth/?replytocom=75917
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.958952
1,832
2.0625
2
William Armstrong, the Greater Norfolk coroner, made his comments at hearing into the death of Roger Prosser, 64, who was found to have a blood-alcohol level more than six time the drink-drive limit when he collapsed and died. Tests showed he had a level of almost 500 milligrams of alcohol im his blood; the legal limit for drivers is 80. Mr Armstrong said: "The huge amount that he drank could have been purchased at a supermarket for around £10. It is alarming that alcohol can be purchased at supermarkets at a price less than bottled water. "One of the witnesses said told me that wine and cider were Mr Prosser's poison – sadly that proved to be literally as well as metaphorically true." Earlier this week, the Government unveiled new measures to cut down on irresponsible drinking in England and Wales, including a ban on all-you-can-drink promotions and a move to force bars and pubs to offer smaller glasses of wine. The Conservatives have also promised to review the "open all hours" policy introduced by the Government. However, moves in Scotland to set a minimum price for alcohol in supermarkets – which offer lager for as little as 25p a can and wine for £2.50 a bottle – have faltered. Mr Armstrong first attacked low-price drink offers last July after he dealt with three inquests into alcohol-related deaths. He said then: "The cost of alcohol is a factor – because it is so cheap it is not a costly business to get drunk. It has become an entrenched part of our culture not just among the young but older people as well. "In my role I deal with death and disaster every day but I am still surprised and shocked by the extent of excessive alcohol consumption going on and the effect it is having – it is a major public health problem."This week's hearing in Norwich into the death of Mr Prosser, who lived in Loddon, Norfolk, was told that he had been a heavy drinker for more than 30 years. Mr Armstrong said:"A substantial number of deaths are now linked to alcohol abuse – and there is a relationship between the cost of alcohol and the damage that abuse causes. Doing something about this should be a priority."
<urn:uuid:c5fd0221-8ec0-4470-8baf-c2cb33320665>
CC-MAIN-2017-04
http://www.telegraph.co.uk/finance/newsbysector/retailandconsumer/7042815/Coroner-criticises-supermarket-cheap-alcohol-after-fatal-10-binge.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00469-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98315
465
2.109375
2
Android Stack Integration in Embedded Systems Smartphone usage has increased manifold upon introduction of Google's Android. Since its introduction, Android has evolved at an outstanding pace in terms of application development, commercialization and market share of Android powered devices. Although originally developed for Smartphones, now the embedded system industry has realized the capabilities of Android. Due to open source nature, rich user interface, wide range of connectivity, secure communication, data encryption and multitasking, Android is being integrated and ported to various embedded systems.
<urn:uuid:9f324240-6ba7-4eaa-9b0e-01cc69c3e4ef>
CC-MAIN-2017-04
http://www.techrepublic.com/resource-library/whitepapers/android-stack-integration-in-embedded-systems/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00146-ip-10-171-10-70.ec2.internal.warc.gz
en
0.926138
102
1.953125
2
The case for an economy driven by innovation, science and imagination We can no longer see the world merely as an object. To create a sustainable world, we cannot simply carry on as we do today. A sustainable world calls for more imagination and innovation in science, uses and economic models. For the last two centuries our production methods and lifestyles have been constructed using a limited number of processed natural resources, a limited amount of knowledge — mainly chemistry — and, above all, knowledge that has been kept separate in silos, in order to achieve economies of scale. While this 'normalization' of the economy has resulted in tremendous progress, it has overly focused on the product of human labor to the detriment of nature and life. And yet everything points to the current era as one of transition from a resource-based economy to an experience-based economy in which the way we use and experience a product has more value than the product itself. "The world is watching us just as we are watching the world." Science, uses and the economy all go hand-in-hand. A marvelous example of this is additive manufacturing. 3D modeling and 3D printing are revolutionizing the world of production. We are seeing a shift from mass production to mass customization. At the same time, new uses are emerging (miniaturization; reshored production) which in turn call for greater scientific innovation (the focus is being put back on fundamental research into material components; new materials are being developed; production is being fine-tuned at the scale of the atom). Solutions for a more sustainable world A leader in sustainable innovation, Dassault Systèmes delivers digital technologies, which have helped companies make headway in areas such as energy transition, sustainable mobility, and in the creation of intelligent cities designed to satisfy the evolving needs of the urban citizen. Its solutions simulate real-world experiences that help people foresee the impact of their decisions and allow them to make the necessary adjustments. In the face of dire statistics, repeated climate warnings and dying ecosystems, it is encouraging to know that ground-breaking and promising alternatives, which can save our ailing planet, exist. See how Dassault Systèmes’ technologies have contributed to the development of renewable energy solutions in the exciting success stories below. Solar Impulse: Pushing back the limits of the impossible Fly a plane powered only by the sun? With vision and dedication, Bertrand Piccard and André Borschberg and the Solar Impulse team rose to the challenge and built a solar aircraft capable of flying day and night. Convinced that clean energies can change the world they demonstrated that a plane does not need fuel to fly, only the sun’s energy. Groundbreaking technologies were built into the aircraft some of which include insulating foam for the cockpit to protect the pilots from temperatures extremes, a device that accurately monitors pilot fatigue and vigilance, and ultra-thin, highly efficient solar cells that are more efficient than those habitually used in the housing industry. These and many other innovations contributed to the plane’s successful flight. Their round-the-world, round-the-clock adventure was thoroughly planned, designed and tested using Dassault Systèmes’ cutting-edge virtual technologies, without which Solar Impulse would have never been able to get off the ground. CHIDI improves hydropower project efficiency with 3DEXPERIENCE Chidi: Award-winning hydropower champion Dams are built to either facilitate navigation or to generate hydroelectric power, an increasingly popular form of green energy. They are massive undertakings that require careful planning and sophisticated design and construction techniques to minimize the harmful effect they can have on the surrounding ecosystem. This is why Dassault Systèmes joined with HYDROCHINA Chengdu Engineering Corporation (HYDROCHINA CHENGDU), a leading hydropower engineering design and consulting firm for hydroelectricity in China and Simu Tech Inc to create a joint research and development center in China. Among the center’s objectives is to streamline design and construction processes, enhance hydropower engineering capabilities, and help minimize the impact on the environment and the surrounding fauna and flora. As HYDROCHINA Chengdu, responsible for designing over 250 hydropower stations in China, expanded its activities nationally and abroad, it adopted virtual technology based on the 3DEXPERIENCE platform from Dassault Systèmes to create more precise designs, to simulate construction and operations, to more efficiently manage its projects and to deliver better services to its customers. Vestas Wind Systems A/S: Powered by the wind and 3DEXPERIENCE With four fifths of the world’s energy still generated by non-renewables such as coal, gas and oil, the wind is increasingly emerging as a viable clean-energy alternative as illustrated by the rise of wind plant manufacturers like Vestas Wind Systems A/S. By 2020 experts estimate that approximately 10 percent of global electricity consumption will come from wind energy. Vestas, the world’s largest wind turbine manufacturer, represents an installed park of more than 54,000 wind turbines globally. With offices in 24 countries and plans to expand even further, Vestas needed to standardize its manufacturing processes to better coordinate people, equipment, tooling and materials across global manufacturing sites and with other departments including maintenance, warehouse and quality assurance. It adopted Dassault Systèmes’ 3DEXPERIENCE platform to create a single virtual manufacturing referential that will promote re-usability, collaboration and greater agility when responding to local requirements. Virtual simulation helps improve the execution of complex and highly engineered fabrication processes, which reduces the chances of defects in composite blades such as delamination, voids and wrinkles that can drive up the cost of scrap and rework. The 3DEXPERIENCE platform helps remove unpredictability by formalizing manufacturing knowledge and lessons learned into meaningful rules that promote first time right production. Vestas achieves greater operational efficiency with 3DEXPERIENCE Akka Research: Inventing mobility's future The experience economy has transformed the way people interact with the products they buy. “How” has replaced “what” as focus has shifted from the products themselves to the experiences they deliver. As cloud-based services gain ground, connectivity becomes a key part of this experience. For AKKA Research, the mobility experience involves a connected, fully autonomous electric urban vehicle that can communicate with a city’s smart infrastructures and coordinated via sensors and apps running on the cloud. The company partnered with Dassault Systèmes to address the challenges of a connected mobility market. Using technologies from the 3DEXPERIENCE platform, AKKA developed the Link & Go 2.0, a self-driving electric concept car to showcase technological innovations that automotive OEMs can incorporate in their future vehicles. As Philippe Obry, President of AKKA Research said: “The best way to predict the future is to invent it.” Akka revolutionizes mobility with intellligent, connected concept car Singapore: Pioneering the urban experience Can augmented intelligence meet cities’ challenges of sustainability and mobility? One thing is certain, as urban populations continue to grow, the infrastructures and services of today’s cities will no longer meet the needs of its inhabitants who are increasingly green-conscious, connected and social. The Internet of Things and artificial intelligence will enable individuals to not only benefit from new services but to become actors in their city’s evolution by, for example, reporting failing infrastructures, volunteering their assistance, suggesting improvements. Singapore’s National Research Foundation and Dassault Systèmes have partnered to develop Virtual Singapore, a 3D model of the city, based on Dassault Systèmes’ 3DEXPERIENCity solution powered by the 3DEXPERIENCE platform. Digitizing and simulating Singapore’s architecture and infrastructure and combining all this information on one collaborative platform will allow city officials and businesses to make better decisions with respect to urban planning, security, and ecology and provide citizens with a better urban experience. Dassault Systèmes will showcase 3DEXPERIENCity and Virtual Singapore at COP21. Virtual Singapore addresses urban sustainability challenges Rennes: planning the future of urban infrastructures Rennes: Champion of urban sustainability Closer to home, Dassault Systèmes’ 3DEXPERIENCity Lab created a digital twin of the French city of Rennes - the first of its kind in France - that depicts its architectural layout and infrastructures using the 3D design and virtual simulation features of the 3DEXPERIENCE platform. Today, more people live in urban areas than in the countryside and as two billion more people will walk the earth by 2050, innovative solutions will be needed to manage water supplies, provide clean air and sustainable energies, deliver efficient mobility services and to ensure the safety of every citizen. The resulting virtual laboratory of the city of Rennes is the foundation on which city actors - construction, energy, water, waste treatment, transportation, communications, and inhabitants - can collaborate and innovate together to plan and build the city of tomorrow. Dassault Systèmes will present the virtual city of Rennes at COP21.
<urn:uuid:e807dc3c-04c0-4fb3-a90a-5f341ac14b1f>
CC-MAIN-2017-04
http://www.3ds.com/stories/sustainable-innovation/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00332-ip-10-171-10-70.ec2.internal.warc.gz
en
0.922359
1,924
3.046875
3
New versions of electronics products are constantly introduced. And the same applies to the HDMI cable. Engineers have upgraded HDMI technology to introduce higher spec versions of the cable with advanced capabilities. Since the launch of the HDMI 1.0 there have been upgrades to the HDMI family. And, each of these upgrades has benefits over the others. The latest entrant is HDMI 1.4 and is taking the electronics world by storm. HDMI 1.4 explained HDMI 1.4 was introduced early in 2009. This version was introduced to the market as a competitor to DisplayPort. It is compatible with various HD devices and its technology enhances gaming, viewing and listening experiences. HDMI 1.4 offers various benefits over its predecessors. HDMI 1.4 is better than other HDMI versions The introduction of HDMI 1.4 has seen the increase of resolutions from 2560 x 1600 to 4096 x 2160. This is very useful for those who utilise HDMI cables on large computer screens. HDMI 1.4 also supports higher 3D resolutions unlike the previous version (1.3) which only allowed 3D resolutions up to 1080 pixels. The cable also improves colour spaces. The other two improvements to the HDMI standard have been audio and Ethernet enhancements. The audio return channel allows audio signals to travel both ways. This negates the need for separate audio cables. The audio return channel has also improved sound quality. The Ethernet channel allows connection of internet devices to a network using a single cable.
<urn:uuid:5ddad77d-5ae2-4722-91aa-73a64da34235>
CC-MAIN-2016-44
http://www.cablesuk.co.uk/articles/hdmi-1-4-taking-your-digital-experience-to-new-heights-252/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00292-ip-10-171-6-4.ec2.internal.warc.gz
en
0.945834
299
1.796875
2
Ballads are a fascinating subject of study not least because of their endless variety. It is quite remarkable that ballads taken down or recorded from singers separated by centuries in time and by hundreds of kilometres in distance, should be both different and yet recognizably the same. In The English Traditional Ballad, David Atkinson examines the ways in which the body of ballads known in England make reference both to ballads from elsewhere and to other English folk songs. The book outlines current theoretical directions in ballad scholarship: structuralism, traditional referentiality, genre and context, print and oral transmission, and the theory of tradition and revival. These are combined to offer readers a method of approaching the central issue in ballad studies - the creation of meaning(s) out of ballad texts. Atkinson focuses on some of the most interesting problems in ballad studies: the 'wit-combat' in versions of The Unquiet Grave; variable perspectives in comic ballads about marriage; incest as a ballad theme; problems of feminine motivation in ballads like The Outlandish Knight and The Broomfield Hill; murder ballads and murder in other instances of early popular literature. Through discussion of these issues and themes in ballad texts, the book outlines a way of tracing tradition(s) in English balladry, while recognizing that ballad tradition is far from being simply chronological and linear. Publisher: Taylor & Francis Ltd
<urn:uuid:e9e80514-49dd-4845-b8c4-096b8134c873>
CC-MAIN-2016-44
https://www.waterstones.com/book/the-english-traditional-ballad/david-atkinson/professor-derek-b-scott/9780754606345
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00158-ip-10-171-6-4.ec2.internal.warc.gz
en
0.91246
288
2.640625
3
Teen Commits Suicide After Chronic Bullying A 15-year-old girl took her own life after a heartbreaking experience with cyber-bullying. Amanda Todd of Vancouver took to YouTube a month ago with ‘My story: Struggling, bullying, suicide, self harm.’ It’s a nearly 9-minute video of Amanda showing cue cards, telling the story of her bullying. Amanda went on a webcam as a seventh grader, and a man talked her into flashing the camera. She was later blackmailed by a man who knew her friends, family, and address. He said he would put the naked photo of Amanda on the Internet if she didn’t put on a show for him. Soon the photo was all over her school. Amanda developed depression and anxiety and turned to drugs and alcohol. She changed schools and the blackmailer returned, naming her new friends. This time he created a Facebook page, using Amanda’s naked picture as the profile photo. You can see Amanda’s story in her own words: Subscribe to 94.3 The Point on The point is, enough is enough. Regardless of who it was that was blackmailing her, the ‘friends’ who left her, and the fact that yes, she made a bad decision which affected her whole life, this was a 15-year-old girl. We all make mistakes as kids, but in the age of social media, these mistakes are harder to move on from. Talk to your kids about this stuff. Tell your children that bullying in all of its forms is not okay. If you’re a teen, and you need help, don’t be afraid to ask for it. If you’re embarrassed to tell your parents, or your teachers, that’s fine…but tell someone. Talk to your friends’ parents, or tell your doctor. Call me at the radio station if you have to, but please, speak up. I won’t tell you it’s easy, it’s not. I was embarrassed when I first admitted out loud that I have depression, but in the end, believe me when I tell you that it will be okay. There is help out there in various forms. If you are being bullied, speak up. If you are depressed, speak up. Suicide is not the answer. If you are bullying others, stop and think about what you are doing. Focus on bettering yourself — and not by taking others down. My heart goes out to Amanda’s family and true friends. Let this be a lesson to us all.
<urn:uuid:4785096d-ad8e-448c-a99f-030dd657b377>
CC-MAIN-2017-04
http://943thepoint.com/teen-commits-suicide-after-chronic-bullying/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00244-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970599
555
1.875
2
It is one of the most common images in the aftermath of a severe tropical cyclone — a pile of damaged boats, maybe washed ashore, with their hulls cracked, their masts and rigging resembling limp spiderwebs. The wide, open bays of Darwin make them a sailor's delight during the dry season. But this same environment turns boats into sitting ducks when a severe storm or cyclone rolls over the harbour in the wet. Captain Ian Niblock, who handled a number of cyclone events in his seven years managing operations for the Darwin Port, said preparation was key for vessels big and small wanting to get out of harm's way. "We're all in the same patch of water, so we've really got to make sure everyone does the right thing," he said. If you are keeping a vessel on the water in cyclone-prone area, here are a few things you should be aware of. Boats have cyclone refuges too As a cyclone approaches land, it would not be unusual to see boats making a beeline for one of the many creeks that branch away from the harbour. Much like our own shelters, these are called cyclone refuges. The difference is they are more of a best bet rather than an absolute guarantee of safety. "Cyclone refuges tend to be a little bit more sheltered," Captain Niblock said. "You've got mangrove fringe on either side and relatively deep water that's not too exposed, so they offer the best protection we can get in the harbour." The nine refuges around the harbour in Darwin have a first in, best dressed principle. That means owners of recreational boats may want to have a back-up plan handy, especially if they are keeping their craft on water. "If they're in a marina, they need to make sure that they're well tied up and that their mooring lines have been checked for UV deterioration or chafing," Captain Niblock said. The risk is that the mooring line will snap, or that an unmoored but anchored ship will move, dragging its anchor behind it. "Then they're effectively a little wrecking ball moving through the harbour." Outpacing the storm Captain Niblock stands by the 12-hour rule: if a cyclone is less than 12 hours from making landfall, it is too late to move your vessel. With enough notice, the port can issue a direction for larger vessels in the path of cyclones to move away and effectively outpace the cyclone. "But remember if we push a ship out of the port, we're pushing them into a cyclone, so we've got to make sure we can get them out in plenty of time," Captain Niblock said. Weather mapping technology is today so advanced that unexpected changes in cyclone direction can be spotted before they upend this plan. "In 2017 we have got so much more information than was available when Tracey decided to hit Darwin all those years ago," Captain Niblock said. But the risks remain the same, and as Captain Niblock heads into this season he is wary of worst-case scenarios. "If we had a ship sink and we have to block the channel, it means we've effectively closed our port," he said. "Then we've got pollution and environmental damage to our harbour, and we've got to raise the ship."
<urn:uuid:20754af5-92f9-4be7-8b3f-7f906f307d0f>
CC-MAIN-2022-33
https://www.abc.net.au/news/2017-11-02/where-do-boats-go-during-a-cyclone/9111448
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00467.warc.gz
en
0.970086
714
2.296875
2
In December 2015, Zac Easter, a twenty-four-year-old from small-town Iowa, decided to take his own life rather than continue his losing battle against the traumatic brain injuries he had sustained as a no-holds-barred high school football player. For this deeply reported and powerfully moving true story, award-winning writer Reid Forgrave was given access to Zac’s own diaries and was able to speak with Zac’s family, friends, and coaches. He explores Zac’s tight-knit, football-obsessed Midwestern community; he interviews leading brain scientists, psychologists, and sports historians; and he takes a deep dive into the triumphs and sins of the sports entertainment industry. Forgrave shows us how football mirrors America, from the fighting spirit the game has helped inscribe in our national character to the side effects of the traditional notions of manhood that it affirms. But above all, Love, Zac is a warning to parents and those entrusted with the care of our kids not to ignore concussions and warning signs of CTE (chronic traumatic encephalopathy). For parents struggling to decide whether to allow their kids to play football, this eye-opening, heart-wrenching, and ultimately inspiring story may be one of the most important books they will read. Buy Your Own Copy of Love, Zac Love, Zac in the News: PEOPLE Magazine: "Disease Caused by Concussions Led to Football Player’s Suicide: 'He Wanted Us to Tell His Story'" (September 10, 2020) The Guardian: "Depression, memory loss and mood swings: Football's toll on one man's promising life" (September 9, 2020) CBS Sports Radio: “Author Reid Forgrave Discusses New Book, Love, Zac" (September 8, 2020) Star Tribune (MN): "Book excerpt: In death, difficulties of a football life are revealed." (September 7, 2020) Sports Illustrated: "'Is This Worth It?' Football, a Suicide and a Path Forward" (Sept. 2, 2020) Des Moines Register (IA): “Iowa family continues work on concussion awareness as book comes out about son's death” (Aug. 7, 2020)
<urn:uuid:b2a764d2-89ba-4e67-afc8-9d5789cb5ff1>
CC-MAIN-2022-33
https://ctehope.com/love-zac/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00466.warc.gz
en
0.951872
468
1.632813
2
Young women of the Mende people are traditionally initiated at puberty into Sande (SAHN-day), a society of women who are keepers of secret knowledge. A masquerade called sowei (SOH-way) is performed during an initiation ritual or celebration. Sowei is nearly the only time African dance masks are worn by women. This mask’s features express Mende (MEN-day) ideals of womanly beauty and virtue. The downcast eyes and small mouth symbolize dignity, composure, and restraint; the elaborately braided coiffure represents cosmetic skill and sexuality; the creases around the neck signify desirable plumpness and good health; and the shiny black surface imitates youthful, luminous skin and symbolizes moral purity. Mende people, Sewa subgroup (African, Sierra Leone, Sande society), Helmet Mask: Sowei, wood and pigment with raffia fringe, late 19th–early 20th century. H. 30 in. Gallery 4 Post a Comment
<urn:uuid:945bf2ba-517a-4bd4-a75a-ba1f049cf611>
CC-MAIN-2017-04
http://www.toledomuseum.org/2014/05/30/artwork-of-the-week-may-30/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.912945
211
3.109375
3
Child care manager Andee Harrison is excited about the high quality statewide pre-kindergarten program scheduled to start next fall. She says it’s high time the state focused on teacher training for little kids. Andee says, “As children go into kindergarten more and more is expected of them, so it’s really important to have developmental programs for the children, particularly all through their preschool years.” But the additional training will come at a price. Lawmakers are leaning toward requiring college degrees for pre-k teachers, and no more than 10 kids per teacher. At a starting salary of $25,000, that’s more than $187 million just for teacher salaries. The governor insists he’ll find the money for the pre-k program, but first he has to find the cash and then convince lawmakers to spend it. The experts warn the costs will be even higher if lawmakers drop the ball. Dominic Calabro of the budget watchdog group "TaxWatch" says Floridians are already shelling out big bucks to make unprepared children repeat grades each year. Dominic says, “It’s hundreds of millions of dollars, so the getting it right at pre-k levels is really critically important not only for the kids' learning, but also for the taxpayers of Florida." Jeb Bush promises he’ll make it happen. Gov. Jeb Bush says, "I will put in my budget. My commitment to the Legislature is I will lead this in terms of the amount of money that we believe will be necessary." But lawmakers have already balked once, and whether they can pull it together this time is still a big question mark.
<urn:uuid:d841b0ed-012e-420b-a11c-2734d8e5e77c>
CC-MAIN-2017-04
http://www.wctv.tv/home/headlines/1214776.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00494-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952871
354
2.03125
2
Dog Painting The European Breeds by William Secord Click thumbnails for expanded view. - Quantity Available: 3 The founder of the Dog Museum in St. Louis and author of Dog Painting: 1840-1940, A Social History of the Dog in Art, Secord here returns with a sort of catalogue raisonne eight years in the makingAand worth the wait. Focusing on the 19th century, Secord first delves into the "dog world" of the different European countriesAhounds on the hunt in France were more likely to be in front of a cart in BelgiumAshowing how their milieus affected the paintings that resulted. Next, he turns to the paintings themselves, and lingers. Many of the 580 illustrations are published here for the first time, with Secord's lively commentary and captions identifying artist, title and provenance of each painting. An appendix of biographies of dog artists will help hardcore buffs keep track, while The Dog Address Book, also available from ACC, lifts many of the best illustrations. This coffee-table book is produced with the kind of care that makes much of the dog-centered stuff out there look crass. Secord's passion for his subject translates readily, even for those not willing to follow him into dog-painting minutiae; anyone with an interest in realist painting will like this book. - Edina, Minnesota - View Storefront - View Seller Website - Contact Seller About This Item - View Store Policies - Reference # - Books, Paper & Magazines - Width: 0 inch - Height: 0 inch - Depth: 0 inch - Weight: 0 pound Items Similar To "Dog Painting The European Breeds by William Secord" Dog Eat Dog. Jane and Michael Stern. Dog Shows. 1998. First Fireside Paperback Edition. Dog Eat Dog. Jane and Michael Stern. Dog Shows. 1997. First Edition. Great 1930s Pekingese Dog Postcard Vintage Postcard Embossed Golden Retriever Early 20th Century Antique Dog Postcard Great Artist Puppies/Dogs Vintage Postcard Some wear on edges and corners. Used with no postmark Appears to be Spanish Circa: 1915 Condition: Used Publisher: Great Artist Puppies/Dogs Vintage Postcard Dogs of the World from Rival Dog Food
<urn:uuid:92140df6-fb03-4ba7-ae9a-8e046dcfc31f>
CC-MAIN-2017-04
http://www.goantiques.com/dog-painting-the-2298350
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00015-ip-10-171-10-70.ec2.internal.warc.gz
en
0.891576
488
1.640625
2
The United States is promising to accept more refugees fleeing from wars in Syria and other areas. Secretary of State John Kerry met with members of Congress Wednesday. After the meeting, he said, “We are looking hard at the number that we can specifically manage with respect to the crisis in Syria and Europe.” Later, Senator John McCain went to the Senate floor to urge stronger leadership from President Barack Obama. He called on Mr. Obama to stop violence in the Middle East and North Africa. On Tuesday, the president’s spokesman said the administration has been looking at a number of ways to help U.S. allies with the thousands of people arriving from the Middle East, Africa and Asia. Al-Qaida-led rebels seize airport from Syrian forces Islamist rebels have captured a major airbase from Syrian government forces in the country’s northwest. Reports say the rebels expelled all Syrian forces from the Aby Duhur military airport in Idlib province. The Britain-based Syrian Observatory for Human Rights says the al-Qaida-linked Nusra Front and allied Islamist groups are now in control of the airport. Syrian state TV confirmed that Syrian forces have left the area. In related news, Russia has confirmed that members of its armed forces are present in Syria. A Foreign Ministry official said Wednesday that “Russian military experts” are in Syria to help its military become skilled in the use of Russian weaponry and other equipment. A U.S. State Department official said Wednesday that Secretary of State Kerry spoke to Russian Foreign Minister Sergei Lavrov. Mr. Kerry reportedly expressed concern over the reports of Russian military involvement in Syria. He said that, if they were true, it could “leader to greater violence” in the country. Iran: No talks with US outside nuclear deal Iran's top leader says any future talks with the United States will only involve issues related to the nuclear deal reached with world powers, not other areas. Ayatollah Ali Khameini said, "We approved talks with the United States about nuclear issues specifically. In other areas, we did not and will not allow negotiations with the U.S." The comments appeared in a statement on his website Wednesday. On Tuesday, Iranian President Hassan Rouhani said that Iran was ready to hold talks with the U.S. on ways to settle Syria’s civil war. Ayatollah Khamanei’s comments are seen as a possible reaction to the president’s statement. China cancels Bon Jovi performances over Dalai Lama statements China has cancelled Bon Jovi's first ever planned concerts in China. Some reports say the shows were cancelled because of what Chinese officials consider the American group's past expressions of support for the Dalai Lama. Bon Jovi was set to perform next week in both Beijing and Shanghai. The Financial Times reported Tuesday the cancelation came after the Communist Party's Culture Ministry found that Bon Jovi included a video of the Dalai Lama at a show in Taiwan in 2010. The BBC also said that Chinese government officials canceled the performances. The Chinese government considers the Tibetan spiritual leader a dangerous separatist. US Apple product launch The American company Apple on Wednesday demonstrated its largest-ever tablet computer, the iPad Pro. The product is equipped with a new "smart" keyboard and an Apple "Pencil" stylus device. Chief Executive Tim Cook showed off the new iPad at the company's media event in San Francisco. He called the product "the biggest news in iPad since the iPad." The new iPad Pro will become available for purchase in November. The starting price is $799. VOANews.com provided all the information for this newscast. George Grow adapted the newscast for Learning English. Words in This Story manage – v. to have control or take care of concerts – n. a public performance of music tablet – n. a flat object that is used for writing keyboard – n. the set of keys that are used for a computer
<urn:uuid:943e36e0-d723-42c9-a4a4-93cf7d2b6226>
CC-MAIN-2017-04
http://learningenglish.voanews.com/a/in-the-news-september-9/2954889.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00216-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949326
825
1.921875
2
Multiple in vivo studies have shown that retinol and retinoids applied topically can stimulate the natural process of photoaging repair. They induce collagen synthesis, limit the fragmentation of elastic fibers or decrease the metalloproteinase activity. However, based on the amount and area of application, retinol and its derivatives can present irritating side effects in local applications. As a result, some cosmetic formulators look for molecules presenting biological properties identical to those of retinol but without the side effects, such as cutaneous irritation. After screening several raw materials, we describe the biological properties of oligosaccharides obtained by enzymatic hydrolysis of Medicago sativa. Tested in vitro, the oligosaccharides support the synthesis of the major components of the skin, which are collagens type I, and limit the extracellular matrix degradation by decreasing the metalloproteinase-1 activity. Biological properties comparable with those of the retinol could also be observed on epidermal cells. The oligosaccharides significantly increased the synthesis of the cytokeratines 4 and 19, which are specific markers of retinoid activity. Moreover, tested on young and old epidermal cells, the oligosaccharides improve cell proliferation and stimulated synthesis of Heat Shock Protein 27 (HSP 27), a marker of keratinocyte differentiation. The molecules described are likely to limit the harmful effects of photoaging and represent an innovative alternative to retinol and its derivatives. The action of the active ingredient was determined by isolating several fractions of the product. These fractions were then tested on models of collagen I and cytokeratin 4 synthesis. We found that one fraction among those isolated behaved comparably to Medicago sativa extract in terms of the synthesis of collagen I and cytokeratin 4. The chromatographic analysis of this fraction showed that the active fraction is composed of oligosccharides primarily of galactomannans (Figure 1). For the complete article, click on "Purchase this article."
<urn:uuid:dbd1a440-6865-4f9b-91dd-568325e178d0>
CC-MAIN-2017-04
http://www.cosmeticsandtoiletries.com/formulating/function/active/2113427.html?mobi=y
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00217-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919683
418
2.0625
2
Adam's Bridge or Rama's Bridge (räˈmə) [key], chain of shoals, c.18 mi (30 km) long, SW Palk Strait, between India and island nation of Sri Lanka. At high tide it is covered by c.4 ft (1.2 m) of water, forcing oceangoing vessels to travel around Sri Lanka instead of through the Palk Strait. According to Hindu tradition, the bridge was built to transport Rama, hero of the Ramayana, to the island to rescue his wife from the demon king Ravanna. A proposed ship channel through the Palk Strait and Adam's Bridge has been protested by devout Hindus and environmentalists. The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
<urn:uuid:3561747c-3495-470b-80c8-0e48552e64bd>
CC-MAIN-2017-04
http://www.factmonster.com/encyclopedia/world/adam-bridge.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00144-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936537
166
3.125
3
Schule & Referate This Be the Verse von Philip Larkin(233x gelesen) |Philip Larkin - This Be The Verse| They ****you up, your mum and dad. They may not mean to, but they do. They fill you with the faults they had And add some extra, just for you. But they were fucked up in their turn By fools in old-style hats and coats, Who half the time were soppy-stern And half at one another's throats. Man hands on misery to man. It deepens like a coastal shelf. Get out as early as you can, And don't have any kids yourself. bitte helft mir das gedicht zu übersetzen!!! danke Help . Verse Gedichte, sprüche... I LOVE PHILIP!!!!! <3 <3 <3
<urn:uuid:8af29026-e838-4c3e-8a89-aa5a6d439207>
CC-MAIN-2017-04
http://www.pausenhof.de/forum/this-be-the-verse-von-philip-larkin/108633
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00170-ip-10-171-10-70.ec2.internal.warc.gz
en
0.737231
196
1.71875
2
In the coming weeks, the European Parliament will pass a Europe-wide Trade Secrets Directive (the "Directive"). Within two years, all 28 member states of the EU will pass laws implementing the Directive, significantly altering the European approach to protecting sensitive business information. Many organisations are now planning to exploit the opportunities it creates. What Will The Trade Secrets Directive Do? The aim of the Directive is to harmonise the protection of trade secrets across the EU, to create an innovation friendly environment for business. It will harmonise laws across the EU in three main areas: - the definition of a "trade secret" and the ways in which they can be protected; - the remedies available to trade secret holders after theft or unauthorised use; and - the measures available in litigation to prevent trade secrets leaking during proceedings. Certainty at Last When the Directive is implemented, businesses will have certainty for the first time that their sensitive or confidential information can be protected throughout Europe – as long as they make sure they keep it within the following definition: - that it is "secret" in the sense that it is not generally known by, or readily accessible to, people in the wider community who normally deal with that kind of information. This applies to single pieces of information, as well as to collections of information such as manuals, processes and recipes; and - it has commercial value because it is "secret"; and - it has been subject to reasonable steps to keep it "secret" by those who lawfully hold it. This means that as long as a businesses' supply chain, licensees, franchise holders and other business partners are required to observe its security requirements for the information (and do so), then it will remain "secret" and protectable. Employees and contractors can be a particular threat to trade secret security, even if they are not malicious. According to the FBI, just under a quarter of insider incidents each year are due to employee mistakes. When it comes to staff that are malicious, they usually only need their normal levels of access to company data and systems. Even where employees have deliberately taken trade secrets, the EU Council has proposed a looser regime in comparison to other cases of unlawful trade secret acquisition. If that is adopted, it will reduce the effectiveness of the Directive to properly compensate businesses for employee trade secret theft. As a result, there is now a greater imperative for international organisations to plan for a harmonised European approach to their employment contracts and rules around confidential materials. Under the latest draft of the Directive, any unlawful acquisition, use or disclosure of trade secrets without the consent of the holder will be "infringement" where it is considered contrary to honest commercial practices. Note here, that the holder of the trade secret can take action and enforcement is not limited to the information's ultimate owner. The Directive does not propose to create exclusive rights, however, so competitors will stay free to conduct independent research. This can include reverse engineering, so long as it doesn't infringe the Directive. Some commentators, such as the Max Planck Institute, have taken issue with this relaxed approach to reverse engineering. They see it as a move which will eventually kill innovation in industries that rely on research to arrive at formulas and recipes for relatively low cost consumer products. Whilst contractual provisions can protect trade secrets from disclosure by former business partners or staff, protection against abuse by third parties has presented difficulties in the past. The Directive offers considerable advancement in this area. The concept of unlawful use will make it possible to enforce the protection of trade secrets against unlawful use by third parties, including passive receivers of a trade secret, even if they initially acted in good faith. We have already seen signs in the UK of the Court's emerging willingness to restrict ex-franchisees in cases such as Oven Clean Domestic –v- Read (QBD 23/1/15), in which we acted. In that case, a non-competition obligation was enforced against an ex-franchisee for 12 months by an injunction. If a trade secret is used, copied or disclosed unlawfully, or in breach of an agreement (such as a licence, franchise agreement, staff contract or NDA), then the remedies include: - Injunctions to prevent further use or disclosure; - Court orders prohibiting infringing goods from being produced, marketed, sold, stored, imported or exported; - Seizure and/or destruction of goods and imports; and - Product recalls. A New Asset Class An additional consequence of keeping any type of commercial information "secret" in this way, is that information can become commercially exploitable in its own right. Some businesses are already exploring new charging structures based on their new ability to classify specific sets of data as "trade secrets". There is clear potential for the exploitation of previously private processes, recipes or datasets in similar ways or through licensing or franchising. What Does This Mean for Food and Beverage Companies? The Directive undoubtedly creates new protections and opportunities for companies that need to protect recipes, formulas and production methods. Apart from increasing the range of protective steps available across Europe and increased business certainty, both the exploitation of new product lines and increased leverage from existing products will now definitely be possible in future. The key to taking advantage of these possibilities lies in satisfying the two core requirements: that the information stays "secret" and is subject to reasonable steps to keep it "secret" throughout the supply chain. This is not always taken seriously by international businesses, however, as reported by PwC: "the supply chain is a potential weak link in cybersecurity… Companies often struggle to get their suppliers to comply with privacy policies – a baseline indicator of data protection capabilities."1 In preparation for the new legal framework, it is now a good time to start to introduce measures to show that "reasonable steps" are in place to protect manuals, processes, formulas, recipes, software and CRM data at all levels: - Identify any trade secrets within the business. This may entail an IP audit as well. - Focus on the steps to protect those secrets: - Security arrangements across Europe should be reviewed and updated to ensure that effective and consistent measures are implemented all the way from employees, contractors and freelancers through to suppliers and franchisees. - Measures should range from making sure that documents are appropriately marked as "confidential" to pre-employment vetting of R&D staff (in compliance with local data protection rules) and physical and electronic segregation of the information you need to protect. - What will be a "reasonable step" will depend upon the nature of the secret, but will necessarily involve positive steps to create and maintain secrecy. For a recipe, for example, this may include separating components of the process, so that knowledge of the entire recipe is limited to a very small number of people and is not entirely revealed to third parties. - Contractual confidentiality and security obligations with staff and throughout the supply chain need to be updated and applied consistently across business units and jurisdictions: - Ensure that franchise agreements and licences are appropriately drafted and also include positive obligations on franchisees and licensees to use the trade secrets only for their permitted use. There should also be a clear mechanism for the return of the trade secrets upon termination of the agreement. Those arrangements should then be diligently followed on termination. - Effective post-employment restrictions and staff confidentiality agreements are important in helping protect not only the trade secret, but also the use of the know-how generated from using those secrets for a period of time after termination of the agreement. These will remain protectable and enforceable through existing restraint of trade laws, so contractual protections remain important here. The Near Future The EU Council plans to meet again on 28 April 2015, at which point it is hoped that the Directive will be in its final form for implementation by Member States. Now is a good opportunity to assess the steps needed to protect trade secrets, given that the text of the Directive is unlikely to change significantly from its latest draft.
<urn:uuid:cf6ca0e4-2b84-4109-bf4c-b45c3a9f5623>
CC-MAIN-2017-04
http://www.lexology.com/library/detail.aspx?g=322c41d5-9ad2-4790-9704-8bfa3b4343a8
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00290-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946027
1,636
2.1875
2
The center is opening “Civil War to Civil Rights,” a series of exhibitions and programs exploring American history from the 1860s through the 1960s, with the exhibit “Let Your Motto Be Resistance: African American Portraits” on Jan. 30. The exhibit will feature 100 photographic portraits, of subjects from Frederick Douglass to Jimi Hendrix, from the Smithsonian’s National Portrait Gallery collection. “With the Big Read kick-off event in mid-February and programs through mid-March, we are celebrating both Black History Month and Women’s History Month while honoring the contributions of Zora Neale Hurston,” Whitman said. Selected as one of Time magazine’s 100 best English-language novels in 2005, “Their Eyes,” experienced another wave of popularity after the 2005 TV movie starring Halle Berry. The Oprah Winfrey-produced movie will be shown repeatedly at the History Center on Feb. 27. Other Big Read events include talks by Hurston scholars Deborah Plant (Feb. 24-25) and Valerie Boyd (March 8). More information and to register: AtlantaHistory Center.com/BigRead.
<urn:uuid:f41ec7ed-7f7f-47e9-8e06-f4f5d803dfd2>
CC-MAIN-2022-33
https://www.ajc.com/entertainment/calendar/hurston-their-eyes-choice-for-big-read-event/R69jWfy5BIaGFJQhBtaRsN/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00267.warc.gz
en
0.913073
244
2.453125
2
Air Force Education Programs Like the other military branches the Air Force offers its members great opportunities to get a college education. These programs are generally referred to as Voluntary Education or Vol. Ed. The Community College of the Air Force offers the following programs to help airmen reach their education goals. If you are Active Duty, the Air Force will pay up to 100% of your college Tuition. Click here to get more information. Tip: You may be eligible for more than one educational benefit. Knowing when each is best for your situation can save you money and ensure you get the most out of your benefits. Click here to get "Answers-at-Glance" before you start using your benefits. The Community College of the Air Force (CCAF) CCAF is the only degree-granting institution of higher learning in the world dedicated exclusively to enlisted people. If you are a motivated, career-oriented airmen or NCO, CCAF can offer you a unique opportunity to earn a job-related, two-year Associate in Applied Science degree. CCAF is regionally accredited by the Southern Association of Colleges and Schools/Commission on Colleges. Servicemembers Opportunity Colleges (SOC) SOC colleges and universities are dedicated to helping you and your family get college degrees. You can take courses in your off-duty hours at or near military installations in the United States, and overseas. Other Air Force Education Resources Student Loan Repayment Program (LRP) If you are a college student or graduate who qualifies for the Loan Repayment Program (LRP), the Air Force will pay, upon enlistment, up to $10,000 of your student loans acquired from a college level education. Click here to learn more about the Loan Repayment Program. Air Force Aid Society (AFAS) General Henry H. Arnold Education Grant Program The centerpiece of the Air Force Aid Society's education initiatives is the General Henry H. Arnold Education Grant Program which provides grants to selected sons and daughters of active duty, Title 10 AGR/Reserve, Title 32 AGR performing full-time active duty, retired, retired reserve and deceased Air Force members; spouses (stateside) of active duty members and Title 10 AGR/Reservists; and surviving spouses of deceased personnel for their undergraduate studies. The value and success of this program, is demonstrated in the 74,679 grants disbursed since the first awards were made for the 1988-1989 academic year. In recognition of escalating college costs, the Society has increased the award amount to $2,000 for all qualifying applicants. This grant program remains competitive in its need-based selection criteria, uniquely tailored to recognize the proper weighing of family income and education cost factors, and is administered by ACT Recognition Program Services. ACT, located in Iowa City IA, is an independent, not-for-profit organization with over 40 years experience in providing support services to scholarship sponsors. Awards for each academic year are announced in June each year. Use of funds is limited to tuition, books and fees, or other direct educational expenses. Click here for details and learn how to apply for the AFAS Grant. General George S. Brown Spouse Tuition Assistance Program (STAP) The purpose of the Spouse Tuition Assistance Program (STAP) is to provide partial tuition assistance for spouses of Active Duty airmen or officers, who accompany members to overseas locations and will be attending college programs. The focus of the program is on the completion of degree or certificate programs that provide increased occupational opportunities for spouses. The program provides tuition Assistance (TA) at a rate of 50% of unmet tuition charge per course, with a maximum of $1,500 per academic year and a term maximum, which is calculated by dividing the annual maximum ($1,500) by the number of terms within the academic year. For purposes of this program, "academic year" is defined as the 12-month period beginning August 1 through July 31 of each year. Click here for more details on how to apply for the STAP. |Tuition Assistance College College Student Loans Higher Education Grants| Sound Off...What do you think? Join the discussion...
<urn:uuid:ad14ca33-7ab2-4769-8bfe-817c667286c1>
CC-MAIN-2016-44
http://www.military.com/education/money-for-school/air-force-education-programs.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00076-ip-10-171-6-4.ec2.internal.warc.gz
en
0.947437
873
1.617188
2
Welcome to a beautiful Jewish experience! We believe that Judaism is joyous, and so our school is both a place of learning and a place of fun and friendship. Through our engaging programs, your child will discover the meaning of Judaism: that there is a purpose to our lives and that each of us has a responsibility to leave the world a better place. Our teaching relies on parents as our partners in living meaningful Jewish lives every day. Shalom! Please call the Religious School Office at (424) 208-8906 or email firstname.lastname@example.org if you have any questions. You can also visit and "like" us on Facebook.
<urn:uuid:e52567a1-3bb1-4bbb-a140-ea6506387f5b>
CC-MAIN-2017-04
https://www.wbtla.org/religiousschool
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00227-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958335
133
1.59375
2
traversable as the country was, however, there was one reason for extreme anxiety. Most of Toledo is traversable only for pedestrians and donkeys. Roads, traversable by artillery and excellent for cavalry, ran thence in every direction. The Heimliche Acht is a presentment not traversable by the offender. Arriving at the limit of traversable sea-ice, we now paused before sloping cliffs of glacial land-ice which we had to climb. That being judges of the matter, what they had adjudged was not traversable. The northern Quarken is covered with traversable ice every third or fourth year. This flat and marshy land offers no points of defense and has no traversable and continuous roads. For it appears the fact was voluntary, and his intention and knowledge are not traversable; they can't be known. While the trails are traversable during the greater part of the summer, some of them may be blocked by snow early in the season. early 14c., "pass across, over, or through," from Old French traverser "to cross, thwart" (11c.), from Vulgar Latin *traversare, from Latin transversare "to cross, throw across," from Latin transversus "turn across" (see transverse). The noun meaning "act of passing through a gate, crossing a bridge, etc." is recorded from mid-14c.; meaning "a passage by which one may traverse" is recorded from 1670s. Military foritifcation sense of "barrier, barricade" is recorded from 1590s. Related: Traversed; traversing.
<urn:uuid:f0ba7000-83c4-41d2-a572-3c4284d370b5>
CC-MAIN-2017-04
http://www.dictionary.com/browse/traversable
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00180-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970161
349
2.734375
3
Legislation: UK secondary law (VAT Regulations 1995): Regulation 91 royalties and similar payments 91 Where the whole amount of the consideration for a supply of services was not ascertainable at the time when the services were performed and subsequently the use of the benefit of those services by a person other than the supplier gives rise to any payment of consideration for that supply which is - (a) in whole or in part determined or payable periodically or from time to time or the end of any period, (b) additional to the amount, if any, already payable for the supply, and (c) not a payment to which regulation 90 applies, a further supply shall be treated as taking place each time that a payment in respect of the use of the benefit of those services is received by the supplier or a VAT invoice is issued by the supplier, whichever is the earlier This applies to supplies of rights, where the consideration takes the form of royalties and the like, and where the extent of those royalties is dependent on future events. This type of supply frequently arises in the entertainment industry where regulation 91 will apply to royalties generated, for example, by record sales. It is often necessary to confirm the precise nature of the supply before deciding whether this regulation applies. For further information see VATTOS9500.
<urn:uuid:24c3bb51-3155-45ad-b459-212d8c4e815c>
CC-MAIN-2017-04
https://www.gov.uk/hmrc-internal-manuals/vat-time-of-supply/vattos2360
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00051-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957733
265
1.632813
2
HxD - Freeware Hex Editor and Disk Editor HxD is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size. The easy to use interface offers features such as searching and replacing, exporting, checksums/digests, insertion of byte patterns, a file shredder, concatenation or splitting of files, statistics and much more. Editing works like in a text editor with a focus on a simple and task-oriented operation, as such functions were streamlined to hide differences that are purely technical. For example, drives and memory are presented similar to a file and are shown as a whole, in contrast to a sector/region-limited view that cuts off data which potentially belongs together. Drives and memory can be edited the same way as a regular file including support for undo. In addition memory-sections define a foldable region and inaccessible sections are hidden by default. Furthermore a lot of effort was put into making operations fast and efficient, instead of forcing you to use specialized functions for technical reasons or arbitrarily limiting file sizes. This includes a responsive interface and progress indicators for lengthy operations. - Available as a portable and installable edition - To edit the main memory - Memory sections are tagged with data-folds - Disk-Editor (Hard disks, floppy disks, ZIP-disks, USB flash drives, CDs, ...) - RAW reading and writing of disks and drives - for Win9x, WinNT and higher - Instant opening regardless of file-size - Up to 8EB; opening and editing is very fast - Liberal but safe file sharing with other programs - Flexible and fast searching/replacing for several data types - Data types: text (including Unicode), hex-values, integers and floats - Search direction: Forward, Backwards, All (starting from the beginning) - File compare (simple) - View data in Ansi, DOS, EBCDIC and Macintosh character sets - Checksum-Generator: Checksum, CRCs, Custom CRC, SHA-1, SHA-512, MD5, ... - Exporting of data to several formats - Source code (Pascal, C, Java, C#, VB.NET) - Formatted output (plain text, HTML, Richtext, TeX) - Hex files (Intel HEX, Motorola S-record) - Insertion of byte patterns - File tools - File shredder for safe file deletion - Splitting or concatenating of files - Basic data analysis (statistics) - Graphical representation of the byte/character distribution - Helps to identify the data type of a selection - Byte grouping - 1, 2, 4, 8 or 16 bytes packed together into one column - "Hex only" or "text only"-modes - Progress-window for lengthy operations - Shows the remaining time - Button to cancel - Modified data is highlighted - Unlimited undo - "Find updates..."-function - Easy to use and modern interface - Goto address - Overwrite or insert mode - Cut, copy, paste insert, paste write - Clipboard support for other hex editors - Visual Studio/Visual C++, WinHex, HexWorkshop, ... - Ctrl+Shift+Number (0-9) sets a bookmark - Ctrl+Number (0-9) goes to a bookmark - Navigating to nibbles with Ctrl+Left or Ctrl+Right - Flicker free display and fast drawing |Version||126.96.36.199 (April 3, 2009) What's new?| |OS||Windows 95, 98, ME, NT 4, 2000, XP, 2003, Vista, or 7| HxD is free of charge for private and commercial use. Selling HxD is not allowed. Distributing it as part of magazine addon CDs / DVDs / other media or putting it on download portals or private websites is allowed and welcome. For details, please see the HxD License. To use the disk editor under Windows NT/2000/XP/2003/Vista/7 and higher you have to be an administrator or have the appropriate privileges. Starting with Vista you need to manually unmount the hard disk to successfully write to it, or in other words: make sure the disk you edit has no mounted file system. More details in this forum thread. A system drive (the one where Windows is installed on) cannot be written to while Windows is running. In order to still accomplish that, you will have to execute HxD from a boot CD/DVD like PartBE or VistaPE and edit the system disk from there. Windows NT 4 If the RAM-editor doesn't show any processes under Windows NT 4 you most likely don't have PSAPI.DLL installed on your system. You can get it from Microsoft (PSAPI.DLL Download) and copy the DLL into the %windir%\System directory. HxD was only tested for Windows NT 4 SP 6, though it should work with versions prior to service pack 6. Articles about HxD TranslatorsThanks to the translators, HxD is available in many languages. More useful links - Interesting pages about data recovery, disk structure, boot managers, hex editing, assembler and other low level stuff: The Starman's Realm - A list of free tools specialized in Data Recovery at "thefreecountry" - EEClip - Universal In-circuit SOP8 Serial Eeprom USB Device Programmer |Copyright © 2003-2015 Maël Hörz.|
<urn:uuid:8f998ceb-d621-48e3-a375-633b8af642e6>
CC-MAIN-2017-04
https://mh-nexus.de/en/hxd/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00310-ip-10-171-10-70.ec2.internal.warc.gz
en
0.866263
1,202
1.554688
2
|This is one area we have sadly neglected over the past ten years, which is a shame as Froyle is located in the middle of the most beautiful countryside. We hope to expand this section with photographs of wildlife and plants and, to start off, we have two documents that record the flora of Froyle in 1952 and 1991. The 1952 survey is from the WI Scrapbook and, since it was handwritten, is in Adobe Acrobat (pdf) format. The later one was typewritten and transcribed for us by Sue Clark. In 2010, the International Year of Biodiversity, we have began a new section which introduces the concept of biodiversity globally, nationally and here in Froyle, featuring photographs, information and links to other sites. The Bees is a short still and video record of a swarm of bees in Lower Froyle. The latest addition is an up to date map (2013) showing all Sites of Importance for Nature Conservation in Froyle
<urn:uuid:bc4a5547-9e7c-480c-99b4-04c451c27ec3>
CC-MAIN-2022-33
http://www.froyle.com/nature.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00671.warc.gz
en
0.960853
199
2.25
2