text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
- Standard Number: OSHA requirements are set by statute, standards and regulations. Our interpretation letters explain these requirements and how they apply to particular circumstances, but they cannot create additional employer obligations. This letter constitutes OSHA's interpretation of the requirements discussed. Note that our enforcement guidance may be affected by changes to OSHA rules. Also, from time to time we update our guidance in response to new information. To keep apprised of such developments, you can consult OSHA's website at https://www.osha.gov. July 18, 2000 Mr. Larry Janssen, CIH Technical Service Specialist 3M Occupational Health and Environmental Safety Division 3M Center Building 260-3B-09 St. Paul, MN 55144-1000 Dear Mr. Janssen: Thank you for your December 10, 1999 letter to the Occupational Safety and Health Administration's (OSHA's) Directorate of Compliance Programs (DCP). You requested clarification regarding OSHA's position on the selection of air purifying respirators (APRs) for gases and vapors with poor warning properties, particularly the common diisocyanates such as Toluene-2,4-diisocyanate (TDI), Hexamethylene-1,6-diisocyanate (HDI) and Methylene bisphenyl isocyanate (MDI). We apologize for the delay in this response. The Preamble to the revised standard points out that there is a great variation between individuals in their sensory detection of chemicals and most toxic substances do not have appropriate sensory warning properties. The standard no longer permits the use of warning properties as the sole basis for determining that an air-purifying respirator affords adequate protection against exposures to vapors and gases. For atmospheres which are not Immediately Dangerous to Life or Health (IDLH), APRs are now considered acceptable as long as appropriate precautions and change out schedules are in place, even for use against substances with poor warning properties. Paragraph 1910.134(d)(1)(i) of the revised Respiratory Protection Standard states "the employer shall select and provide an appropriate respirator based on the respiratory hazard(s) to which the worker is exposed and the workplace and user factors that affect respirator performance and reliability." Paragraph(d)(3)(iii) further states that for protection against gases and vapors an air-purifying respirator may be used provided that: (1) The respirator is equipped with an end-of-service life indicator (ESLI) certified by NIOSH for the contaminant; or (2) If there is no ESLI appropriate for conditions in the workplace, the employer implements a change schedule for canisters and cartridges that is based on objective data that will ensure that canisters and cartridges are changed before the end of their service life. The employer shall describe in the respirator program the information and data relied upon and the basis for the change schedule and the basis for reliance on the data. Currently, there are few respirators available on the market with end-of-service life indicators (ESLI), and none for MDI. An employer must select a cartridge or canister recommended for that chemical by the manufacturer. The employer must then implement a change schedule for the canister or cartridges that is based on objective information or data that will ensure that the canister and cartridges are changed before the end of their service life. The data relied upon and the information forming the basis of the determination must be included in the written respirator program. If more information becomes available, an employer would be expected to review and if necessary, revise the change out schedule. The employer is required to select the appropriate respirator for each situation. Some factors that should be included in the evaluation by the employer are: - The concentration of contaminant in the air to which employees will be exposed. Most substances which have permissible exposure limits, have 8-hour time-weighted-averages. Other substances (including TDI and MDI) have Ceiling Limits. For these substances, employee exposure may at no time exceed the exposure limit for the substance. 29 CFR 1910.134(d)(3)(i) requires the employer to "provide a respirator that is adequate to protect the health of the employee and ensure compliance with all other OSHA statutory and regulatory requirements under routine and reasonably foreseeable emergency situations." Therefore, when selecting a respirator for protection against substances that have Ceiling Limits, the employer must not only consider if exposure levels may be reached or exceeded during routine operations but also if they may be exceeded during reasonably foreseeable emergency situations. The employer must then select a respirator that would provide adequate protection against these levels. - Negative pressure respirators carry a greater risk of leakage than positive pressure respirators. If the face-to-facepiece seal is compromised, more contaminated air is likely to leak in than would be the case with positive pressure respirators. - Vapors of diisocyanates are corrosive and severely damaging to the eyes. Contact may cause permanent eye damage. If a half mask respirator is selected, an employer would also be required under 29 CFR 1910.133(a)(1) to ensure that the employee uses appropriate eye or face protection. - Vapors of isocyanates may cause skin irritation and sensitization. The employer is required under 29 CFR 1910.132(d) to assess the workplace and select appropriate personal protective equipment. Additional personal protective equipment to protect the skin of the face and neck may be required if an employer elects respirators which leave these areas exposed. - Exposure to diisocyanates can cause various respiratory ailments. If an employee using an APR reports any medical signs or symptoms which could be attributed to isocyanate exposure, the employer must take appropriate action. If the symptoms may affect an employee's ability to use a respirator, 1910.134(e)(7)(i) requires additional medical monitoring. We anticipate that some employers who perform the required evaluation will determine that APRs are appropriate for their circumstances. Others may prefer to provide powered-air purifying respirators (PAPRs). Under some circumstances, other employers may determine that SARs may be the only appropriate type of respirator for these hazards. As with any other situation requiring the use of respirators, an effective written respiratory protection program must be developed and implemented. Key provisions include fit testing, medical evaluations, proper use of respirators, training and information (including the need for a user seal check each time the respirator is donned), maintenance and care of respirators, program evaluation and recordkeeping. You also noted that the OSHA website contains six letters of interpretation which predate the revision to the respiratory protection standard as well as statements on the "Isocyanates" Technical Links page which reflect that diisocyanates have poor warning properties, are sensitizers, or are too hazardous to allow air purifying respirators. OSHA is currently reviewing all letters on our website for inconsistencies with OSHA policy and appropriate action for these letters will be taken. Thank you for your interest in occupational safety and health. We hope you find this information helpful. Please be aware that OSHA's enforcement guidance is subject to periodic review and clarification, amplification, or correction. Such guidance could also be affected by subsequent rulemaking. In the future, should you wish to verify that the guidance provided herein remains current, you may consult OSHA's website at http://www.osha.gov. If you have further questions please feel free to call OSHA's Office of Health Compliance Assistance at (202) 693-2190. Richard E. Fairfax, Director Directorate of Compliance Programs
<urn:uuid:215cab5d-80cf-43da-a0c2-7f1229443d8e>
CC-MAIN-2022-33
https://www.osha.gov/laws-regs/standardinterpretations/2000-07-18
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00670.warc.gz
en
0.915247
1,601
2.109375
2
OSAKA, Japan, Aug. 30, 2016 /PRNewswire/ -- Mitsubishi Tanabe Pharma Corporation (MTPC) (Head Office: Osaka; President & Representative Director, CEO: Masayuki Mitsuka), today announced that the U.S. Food and Drug Administration (FDA) has accepted the company's New Drug Application (NDA) for edaravone (MCI-186) an intravenous treatment for amyotrophic lateral sclerosis (ALS), a rapidly progressive neurological disease. A decision on the application is anticipated on June 16, 2017 based on the Prescription Drug User Fee Act. If approved, the medicine will be commercialized, under the brand name RADICAVA™, through the newly-formed MT Pharma America, Inc. "This is an important milestone for Mitsubishi Tanabe Pharma and for the U.S. ALS community," said Joseph M. Palumbo, MD, Vice President, Head of Clinical Research, Mitsubishi Tanabe Pharma Development America, Inc. "There is an urgent need for new treatment options in ALS and we are now an important step closer to potentially making that a reality. We look forward to working with the FDA as part of the review process." ALS, sometimes called Lou Gehrig's disease, attacks the nerve cells in the brain and the spinal cord responsible for controlling voluntary muscles, such as those needed to move, speak, eat and breathe.2,3 It is one of the most well-known neuromuscular diseases, affecting approximately two in 100,000 people worldwide.4,5 While it is inherited in 5%–10% of cases, the cause for the majority of cases is not well understood but may involve genetic and environmental factors.6,7 There is currently no cure.6 The edaravone NDA is supported by a clinical research program in patients diagnosed with ALS in Japan. In 2015, edaravone was approved for use as a treatment for ALS in Japan and South Korea. In the same year, the FDA and the European Commission granted Orphan Drug Designation for edaravone. It is not currently approved by the FDA for any use in the U.S. Discovered by Mitsubishi Tanabe Pharma Corporation, edaravone is described as a free radical scavenger that is believed to relieve the effects of oxidative stress, a likely factor in the onset and progression of ALS.3,8 Oxidative stress is thought to be an imbalance between the production of free radicals and the ability of the body to counteract or detoxify their harmful effects.9 In patients with ALS, there are consistent increases in oxidative stress biomarkers.7 About MT Pharma America, Inc. Based in Jersey City, NJ, MT Pharma America is a wholly-owned subsidiary of MTPC's 100% owned U.S. holding company, Mitsubishi Tanabe Pharma Holdings America, Inc. MT Pharma America is dedicated to delivering innovative solutions that address the unmet medical needs of patients in the United States. It was established by MTPC to commercialize approved pharmaceutical products in the U.S. with plans to expand its product line through collaborations with partners. For more information, go to www.mt-pharma-america.com. About Mitsubishi Tanabe Pharma Corporation Mitsubishi Tanabe Pharma Corporation is a research-driven pharmaceutical company with a Head Office based in Dosho-machi Osaka, the birthplace of Japan's pharmaceutical industry. As part of its "Medium-Term Management Plan 16-20: Open Up the Future," the company is focused on discovering drugs that address unmet medical needs in several priority disease areas, including central nervous system diseases, autoimmune disorders, diabetes, kidney disease and vaccines. Through this work, the company contributes to the healthier lives of people around the world. For more information, go to www.mt-pharma.co.jp/e. For more information: Last updated on: 30/08/2016 PharmiWeb.com is Europe's leading industry-sponsored portal for the Pharmaceutical sector, providing the latest jobs, news, features and events listings. The information provided on PharmiWeb.com is designed to support, not replace, the relationship that exists between a patient/site visitor and his/her physician.
<urn:uuid:33a5cef1-e345-4c7f-95b0-5459cd0b5c87>
CC-MAIN-2017-04
http://www.pharmiweb.com/PressReleases/pressrel.asp?ROW_ID=180546
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00445-ip-10-171-10-70.ec2.internal.warc.gz
en
0.922075
888
1.632813
2
Nielsen’s One-Stop Shop for Media Audiences The Nielsen Company, the company best known for providing television ratings, recently announced its plans to go public. Nielsen had been a publicly traded company in the 1990s, before being taken over by a group of private equity firms. This planned return to being publicly traded is the latest significant change for a company that has become much more than the primary source of television ratings, but rather has evolved into the primary arbiter of media audiences of virtually all types. Whether one works in (or studies) television, radio, music, film, gaming, publishing, or the Web, it is the Nielsen Company that is a primary window onto the audiences for these media. And its reach is expanding. In 2008, after some substantial acquisitions on the European television audience measurement front, Nielsen proudly informed its clients that it now controlled three quarters of the world’s television currency data. But again, traditional television ratings represent only the tip of the iceberg for a company that is also a primary source of information about video sales (Nielsen VideoScan), book sales (Nielsen BookScan), video game sales (Nielsen Games), music consumption (Nielsen SoundScan), newspaper audiences (Scarborough Research), mobile device usage (Nielsen Mobile Media) and Web traffic (Nielsen NetRatings). Nielsen has even begun competing head to head with Arbitron in the measurement of radio audiences (Nielsen Radio Audience Measurement). And yet there remain many more media audiences – or at least aspects of these audiences – to capture. Today, Nielsen’s growth involves expansion across three dimensions. The first is geographic. For instance, Nielsen now provides television audience data in over 30 countries around the world. The company’s NetRatings service has established panels and site-centric measurement systems in countries around the world, to the extent that Nielsen now claims to monitor 90 percent of global Internet activity. The second dimension involves expansion across platforms. One of Nielsen’s most significant ongoing initiatives is the development of its Anytime, Anywhere Media Measurement (A2/M2) system, which seeks to provide comprehensive audience data integrated across the “three screens” (television, computer, mobile device) by which the bulk of electronic media consumption takes place. Nielsen also measures audiences for what it calls the “fourth screen” – location-based video outlets such as those found in health clubs, bars, gas stations, and elevators. As new media platforms enter the mediascape, Nielsen is there. And the third, and perhaps least discussed, involves expansion across the criteria by which audiences are valued. That is, today, buying media audiences has become about much more than simply buying audience exposure. Data on the size and demographics of the audience that consumed a particular piece of media content represent only scratches the surface of audience understanding in today’s rapidly changing media environment. Today, advertisers and marketers also want information about how engaged those audiences were, how well they recalled what they consumed, and how their behaviors were affected (to name just a few of the emerging currencies). Nielsen is continuing to expand to meet these demands as well. For instance, Nielsen recently invested in a firm called NeuroFocus, which specializes in applying brainwaves research to the analysis of advertising and content effectiveness. And just this month, Nielsen acquired an online audience measurement firm called GlanceGuide, whose primary product is an “attentiveness score” for online video content. Nielsen IAG measures the extent to which television audiences recall the details of the programs they watched. And Nielsen BuzzMetrics measures how much online conversation is taking place about various media products – both in advance of and after they are released. The obvious question that arises from this scenario is whether it is a good or a bad thing for one firm to play such a dominant role in the construction of media audiences. Even Congress has looked into this question. I’m not going to try to answer the question of whether this situation is good or bad. It’s too big a question to try to answer here. But what I will say is that this situation may very well be inevitable. Media companies and advertisers hate uncertainty, and what a sole audience measurement service provides is a bit less uncertainty. Competing providers means competing – often contradictory – numbers. And such contradictions equal uncertainty. This isn’t to say that Nielsen’s numbers are necessarily right. But as long as everyone involved chooses to treat them as right, uncertainty is reduced. Such are the somewhat bizarre machinations of the audience marketplace.
<urn:uuid:5e460fdc-2aab-4030-886d-a060d956ec74>
CC-MAIN-2017-04
http://blog.commarts.wisc.edu/2010/05/14/nielsens-one-stop-shop-for-media-audiences/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00192-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955641
939
1.617188
2
When Sunday School curriculum focuses on morals and good behavior we are missing an opportunity to teach children about God. Should we be surprised then when teens are Moralistic Therapeutic Deists? I often find myself in conversation with other church ministry staff and the topic of curriculum often comes up. We talk about ease of use, how well the activities work, and how the materials help us connect to parents but it is surprising how often the theology of the curriculum does not come up. Theology matters — even to 5-year-olds.
<urn:uuid:1dbb8b3e-939c-40cc-bdee-e1350f09256a>
CC-MAIN-2022-33
https://network.crcna.org/topics/author/Laura%20Keeley/topic/curriculum-0/language/english
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00671.warc.gz
en
0.974962
111
1.695313
2
Starting Electronics is unrivalled as a highly practical introduction for technicians, non-electronic engineers, software engineers, students, and hobbyists. Keith Brindley introduces readers to the functions of the main component types, their uses, and the basic principles of building and designing electronic circuits. Breadboard layouts make this very much a ready-to-run book for the experimenter, and the use of readily available, inexpensive components makes this practical exploration of electronics easily accessible to all levels of engineer and hobbyist. Other books tell readers what to do, but sometimes fail to explain why – Brindley gives readers hands-on confidence in addition to real scientific knowledge, and insight into the principles as well as the practice. All written explanations and steps are supplemented with numerous photos, charts, tables and graphs. Concepts and practical aspects are explained thoroughly with mathematical formulae and technical schematic drawings. Each chapter introduces a concept or tool, explains the basic theory, and provides clear instructions for a simple experiment to apply the concept or tool, with quiz sections and answers, at the end of each chapter. New chapters on multimeters and soldering will be added, covering the fundamentals and experiments, with a basic parts list and an expanded and updated buyer’s guide. - Guides the reader through the basics of electronics, from fundamentals of theory to practical work and experiments - Structured for learning and self-study: each chapter introduces a concept or tool, explains the basic theory, and provides clear instructions for a simple experiment to apply the concept or tool, with quiz sections and answers, at the end of each chapter - New chapters on multimeters and soldering, covering the fundamentals and experiments, with a basic parts list. Expanded and updated buyer’s guide to accompany parts lists Technicians, non-electronic engineers, software engineers, first year undergraduate students, vocational students, secondary/high school teachers and students, hobbyists. Anyone requiring a basic introduction to electronics theory and practice. Chapter 1. The Very First Steps Chapter 2. On the Boards Chapter 3. Measuring Current and Voltage Chapter 4. Capacitors Chapter 5. ICs, Oscillators, and Filters Chapter 6. Diodes I Chapter 7. Diodes II Chapter 8. Transistors Chapter 9. Analog Integrated Circuits Chapter 10. Digital Integrated Circuits I Chapter 11. Digital Integrated Circuits II Chapter 12. Soldering Component Suppliers (UK) - No. of pages: - © Newnes 2011 - 2nd August 2011 - Paperback ISBN: - eBook ISBN: Keith is a freelance journalist whose whole life (well, apart from the wife, the kids, the music and the mountain bike) is computers. He's been writing about them (computers, that is) for over 18 years, in the meantime working as a teacher, lecturer, engineer, journalist and finally (for the last 12 years) freelance in the computing field. He fondly remembers his first contacts with the Commodore Pet, the various Sinclair oddities, the BBC, PC-DOS, MS-DOS, the Mac, and the various incarnations of Windows. He dreams of new software and hardware, he realises that writing about computers makes little compared to making computers or writing the software for them, he is fully committed to passing his experience along to and making computer-life easier for his readers, yet still enjoys what he's doing. Which can't be all bad! Freelance writer and journalist on electronics. Independent PC Consultant
<urn:uuid:8df52cb8-81be-457b-bf1c-04a0b3c94679>
CC-MAIN-2017-04
https://www.elsevier.com/books/starting-electronics/brindley/978-0-08-096992-3
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00056-ip-10-171-10-70.ec2.internal.warc.gz
en
0.904477
736
3.09375
3
It’s hard not to love mediocre, bad, or even awful movies that portray a post-apocalyptic or utterly dysfunctional future. If you’ve watched Logan’s Run, Water World, The Day After Tomorrow, AI, or Soylent Green more than once, you’ll know what we mean. But there’s nothing to love about the real-life disasters that flit across our headlines and quickly vanish from consciousness. Consider the Freedom Industries toxic leak. Thanks to corporate negligence, a gusher of the coal-cleaning chemical crude MCHM poisoned the water near Charleston, West Virginia, earlier this year. And remember the fertilizer plant explosion and fire that devastated West, Texas? That disaster, which the small rural community blames on corporate malfeasance, killed 12 first responders and three others, injured 200 people, and unleashed an estimated $100 million in property damage. Recuperating and rebuilding will take years. The town of West is sure to be back in the news for a split second on April 17 when the town marks the first anniversary of its catastrophe. Blink and you’ll miss it. Other new disasters have fouled the land, air, and water too. A Duke Energy coal ash spill in North Carolina poisoned the Dan River on Feb. 2, unleashing — you guessed it — allegations of corporate shenanigans. The latest calamities may never rank among the world’s biggest man-made disasters. That distinction mainly belongs to epic fails recognizable with just one or two words, such as Bhopal, Exxon Valdez, and Chernobyl. But they’re definitely contenders. And while people clearly suffer after the media moves on, it’s hard to lengthen our collective attention span. After all, how many disasters can you worry about at once? Meanwhile, scientific certainty about the urgency of doing something about the worldwide menace of climate change before it’s too late has coalesced. Here’s the good news: Movies about how society will adapt after life as we know it ends are bound to get better.
<urn:uuid:4b4c4f39-8c6d-4ad7-9b85-884c1fa9c9b6>
CC-MAIN-2022-33
https://otherwords.org/recipe-for-better-disaster-movies-freedom-industries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00276.warc.gz
en
0.904632
435
2.03125
2
Refine search resultsSkip to search results Schimmel, Paul (organizer) et al. © MURAKAMI. 328 pp., illustrated throughout, mostly in color, including several gatefolds. 4to, cloth. Los Angeles, The Museum of Contemporary Art, New York, Rizzoli International, and Tokyo/New York, Kaikai Kiki Co., Ltd./Kaikai Kiki New York, LLC, 2007. Takashi Murakami is one of the most important and..... Item nr. 123929 Ratcliff, Carter, with an essay by John B. Ravenal. DONALD SULTAN: The Theater of the Object. 272 pages, beautifully illustrated throughout in color. Large 4to, cloth. New York, Vendome Press, 2008. "What is it that art gives to us? Art transfers the unknown to the known without losing the spirit in..... Item nr. 130135 Govan, Michael. JAMES TURRELL: A Retrospective. 303 pages, including 250 color plates. 4to, cloth. New York, Prestel in association with Los Angeles County Museum of Art, 2013. There isn't another in-print book on James Turrell that rivals this one. Given the near impossibility of a reprint of the catalogue raisonné, this..... Item nr. 148293 Spies, Werner. ANDREAS GURSKY. 2 volumes. Vol. I: 76 pp., with 4 b&w plates of installation views, and 11 color plates, 3 of which are fold-outs; Vol. II: 57 pp., with 5 b&w plates of installation views, and 9 color plates, 5 of which are fold-outs. Folio, cloth in slipcase..... Item nr. 141748 Butler, Cornelia (organisor) et al. MARLENE DUMAS: Measuring Your Own Grave. 284 pp., over 200 illustrations, the majority in color. 4to, boards. Los Angeles, Museum of Contemporary Art in association with New York, D.A.P., 2008. Comprehensive examination of Dumas' work; includes writings by the artist. Exhibition in Los Angeles, New York..... Item nr. 127358 Schwenk, Bernhart, Veit Gorner, and Hilke Wagner. PETER DOIG: Metropolitain. 96 pp., roughly 50 color illustrations. 4to, boards. Cologne, Verlag der Buchhandlung Walther Konig, in association with Munich, Pinakothek der Moderne, and Hannover, Kestnergesellschaft, 2004. Text in English and German. Item nr. 114029 van den Bosch, Paula et al. PETER DOIG: Charley's Space. 144 pp., roughly 50 color plates. 4to, wraps. Ostfildern-Ruit, Hatje Cantz, 2003. Published to accompany an exhibition at the Bonnefantenmuseum, Maastricht and Carre d'Art - Musee d'art contemporain de Nimes. Text in English and German. Item nr. 108314 Morgan, Jessica, Leslie Jones et al. JOHN BALDESSARI: Pure Beauty. 330 pages, illustrated throughout in color and b&w. 4to, cloth. Los Angeles, Los Angeles County Museum of Art, in association with Munich, Berlin, London, New York, DelMonico Books - Prestel, 2009. Exhibition in Los Angeles, London, Barcelona, and New York... Item nr. 138789 Kellian, Thomas et al. HIROSHI SUGIMOTO: Conceptual Forms. 168 pp., 44 b&w and 8 color plates. 4to, cloth. Paris, Fondation Cartier, in association with Paris, Actes Sud, 2004. A series of photographs of plaster models made as visual illustrations of complex mathematical concepts and mechanical movements. Text in English and French..... Item nr. 115785 Stritzler-Levine, Nina (editor), Arthur C. Danto and Joan Simon. SHEILA HICKS: Weaving as Metaphor. 416 pp., 100 color and 25 b&w plates. Stout 4to, boards. New York, The Bard Graduate Center for Studies in the decorative Arts, Design and Culture in association with New Haven and London, Yale University Press..... Item nr. 166383 Brinson, Katherine. CHRISTOPHER WOOL. 288 pages and 150 color and b&w plates. 4to, cloth. New York, Guggenheim Museum, 2013. This fall's Guggenheim exhibition will draw together Wool's agile, monochromatic works from his career to date, featuring a selection of paintings, photographs, and works on paper. Item nr. 148957 Thuring, Reto et al. ALBERT OEHLEN: Woods Near Oehle. 104 pages, including 70 color plates. 4to, boxed set. Cleveland, Cleveland Museum of Art, 2017. Multimedia boxed edition contains the catalogue of the winter 2016-17 exhibition at the Cleveland Museum of Art as well as an anthology of texts and images edited..... Item nr. 164160 Kentridge, William. WILLIAM KENTRIDGE: Domestic Scenes. 160 pages, including 140 color and 5 b&w plates. 4to, cloth. Steidl, 2022. Framed by detailed research by Warren Siebrits, the compiler of Kentridge's upcoming catalogue raisonné of prints and posters, Domestic Scenes provides some of the earliest evidence of the artist "stalking the drawing"..... Item nr. 169833
<urn:uuid:a841c1df-ac1c-4da5-af22-a97907349336>
CC-MAIN-2022-33
https://www.ursusbooks.com/advSearchResults.php?action=search&cat_conj=or&category_id=480&orderBy=mostrecent&recordsLength=25&view=list
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00276.warc.gz
en
0.779234
1,309
1.6875
2
Installing The PHP-MemCache Module On CentOS 5.0 Author & Content by Tim Haselaars (http://www.trinix.be) “MemCached” is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. In this howto I explain how you can very easily install it and make it avaible in PHP. You need to activate the RPMForge custom repository (formely known as Dag Wieers): http://dag.wieers.com/rpm/packages/rpmforge-release/ Grab your specific RPM and install it: rpm --install rpmforge-release-*.rpm yum install --enablerepo=rpmforge memcached Now memcached is installed. You can test it: memcached -m 512 -u nobody -vv First, you start up the memcached daemon on as many spare machines as you have. The daemon has no configuration file, just a few command line options, only 3 or 4 of which you'll likely use: ./memcached -d -m 2048 -l 10.0.0.40 -p 11211 -u nobody This starts memcached up as a daemon, using 2GB of memory, and listening on IP 10.0.0.40, port 11211. The -m switch specifies the amount of memory in megabytes. The -l switch specifies the IP to listen on and finally the -p switch specifies the port to listen on. The default port is 11211 and if your machine has just 1 IP you can omit the -l parameter. In the above example I set the amount of memory to 2GB. Of course you should use a sensible amount of memory. Making your machine swap to disk sort of defeats the purpose of a memory cache daemon. Note that it's perfectly fine to run the memcached daemon on another machine than the one you're running your actual PHP project on. You could even set up a machine totally dedicated to being a memory cache server. And if that's not even enough you can set up multiple servers as well. The sky is the limit. Note: if you try to start the memcached as root it will require you to specify a user under which it should run with an additional -u nobody. Installation of the PHP MemCache extension: tar -xvf memcache-2.1.2.tgz phpize && ./configure --enable-memcache && make Copy the file memcache.so to the default module directory. If you check your phpinfo() you should see a MemCache section appear. You can now fully use the MemCache functionality in your PHP.
<urn:uuid:81397cc8-7e19-4f5d-bff4-a811f0e6f8c8>
CC-MAIN-2017-04
https://www.howtoforge.com/php_memcache_centos5.0
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00007-ip-10-171-10-70.ec2.internal.warc.gz
en
0.794226
585
1.945313
2
Evel ‘will prevent Scottish MPs becoming prime minister’ English votes for English laws would make it “almost impossible” for a Scottish MP to become prime minister, a senior SNP member said yesterday. In a Westminster debate, Pete Wishart insisted that if the government pushes ahead with its Evel proposals, Scottish parliamentarians would not be able to lead the UK. After the debate, Mr Wishart, the Scottish Nationalists’ shadow Commons leader, told The Times: “English votes for English laws would make it very, very difficult — almost impossible — for a Scottish MP to become prime minister. It would also be almost impossible for a Scottish MP to be secretary of state in a devolved department such as health any more. They wouldn’t be able to turn up to debates.” He added that it
<urn:uuid:0e047c05-2466-40f9-a02c-1640a7fe37c2>
CC-MAIN-2022-33
https://www.thetimes.co.uk/article/evel-will-prevent-scottish-mps-becoming-prime-minister-j99zmt5hh8s
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00666.warc.gz
en
0.970285
174
1.5
2
Title Story of Three Kings Melchior, Balthasar and Jaspar, Which Originally Was Written by John of Hildesheim in the Fourteenth Century. Binding Hardcover in dj Book Condition Good Jacket Condition Good Publisher Metropolitan Museum of Art 1979 Seller ID 2016b 80 pp "The illustrations and the general format are from Leben der heiligen Drei Konigen published by Heinrich Knoblochtzer in Strassburg about 1484.
<urn:uuid:954f4ea7-9e32-43ed-8262-58218a5b0c57>
CC-MAIN-2016-44
http://www.thehauntedbookshoponline.com/?page=shop/flypage&product_id=3272
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721405.66/warc/CC-MAIN-20161020183841-00313-ip-10-171-6-4.ec2.internal.warc.gz
en
0.738133
101
1.578125
2
California Spangled Cat The Spangled Cat was bred in the 1980s to resemble wild cats like the ocelot and leopard. Although they were initially expensive due to their rarity, the breed has since been overshadowed by the Ocicat and Bengal. At first sight this cat looks like a miniature version of the leopard. In fact, the California Spangled Cat's long, cylindrical body helps it move like a hunter on the prowl. Often in the shape of blocks, these leopard-like spots especially stand out when they are in contrast with the coat's background color. Personality and Temperament The California Spangled Cat is energetic, active, and, though it sports a wild look, easy to tame. Affectionate and intelligent, it will return its owner's love in full measure, though it will also scheme to get its way. A born athlete, the California Spangled Cat is capable of acrobatic high jumps. Therefore, it would be prudent to keep fragile valuables safely stored. The cat is also fascinated by moving objects and loves to hunt. History and Background Paul Casey, a physicist and screenwriter from Los Angeles, is credited with launching the breed. Determined to create a cat with a wild look, Casey drew his inspiration a cat with glamorous coat (like that of a leopard or cheetah) from a conversation with the late anthropologist Dr. Louis Leakey. While he was working at the Olduvai digs in Africa in 1971, Casey was shocked to learn that one of the last leopards in the area had fallen victim to poachers. Casey and Leakey came up with the idea that if people owned a domestic cat which resembled a mini-leopard they would show greater inclination to conserve the wild beast. Casey went about his mission scientifically, and in the early 1970s made an 11-generation blueprint, beginning with a female Traditional Siamese (also called the Old Style or Applehead) and a long-haired, spotted silver Angora. The result of this union was a silver male with block-shaped spots. Casey then added British Shorthair, American Shorthair, spotted-brown tabby Manx, and Abyssinian to create the core bloodline. Each breed was introduced according to plan, and mating results were recorded on a computer. In the final generation, street cats from Malay and Egypt were added to achieve a wild look. By 1985, Casey achieved the desired look, which was immediately lauded by a small group of cat fanciers. Casey would eventually form the California Spangled Cat Association (CSCA), whose aim was to take measures to protect all endangered wild cats as well as to promote the Spangled Cat. In 1986, Casey introduced the Spangled Cat to the public through an advertising campaign with the Neiman Marcus Christmas catalog, where he sold them for $1,400 each. However, protests from animal activists would ensue because the catalog also featured fox, beaver, and ermine coats. Despite the public relations controversy, the new cat became a hot commodity, especially since demand far exceeded the supply. Media outlets sought every opportunity to interview prospective owners. This newfound publicity helped Casey spread his message of conservation, but greatly depleted his stock. Though breeders all over the world are working hard to make the California Spangled Cat more popular, there are only around 200 such cats in existence today. It has also proved more successful abroad than in its native country. The breed is slowly inching its way towards attaining Championship Status from The International Cat Association (TICA) and American Cat Association (ACA) -- it has been accepted for New Breed and Color status. The breed now has two International Grand Champions in Europe. And in 1994, a Grand Champion Spangled named Lassik won Best of Show at the summer competition in Paris.
<urn:uuid:f2edc6cb-308f-406f-b612-5558aecaa142>
CC-MAIN-2016-44
http://www.petmd.com/cat/breeds/c_ct_california_spangled_cat
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719468.5/warc/CC-MAIN-20161020183839-00528-ip-10-171-6-4.ec2.internal.warc.gz
en
0.968882
799
2.53125
3
Printing For Digital Photographers Photographs: 362 colour photographs Printing can be one of the great frustrations for digitalphotographers. Just how do you make sure that your print matcheswhat's on your screen? And how do you get the most from the filestaken on your digital camera? Experienced photographer and authorTim Daly answers these questions and many more, using jargon-freelanguage to debunk the myths and mysteries of printing for digitalphotographers. Step-by-step sequences and screengrabs show you howto create a wide range of different print effects. There is alsocomprehensive guidance on controlling image quality andtroubleshooting print results.ISBN13: 9781861085283 |Currently no stock Available| |Not available in store| If you require further information about "Printing For Digital Photographers" please contact us.
<urn:uuid:a30118e9-4761-4ba8-a5d2-d9cc783a556d>
CC-MAIN-2017-04
http://www.mackay.co.uk/printing-for-digital-photographers-photography-books-dvds-stationery.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00479-ip-10-171-10-70.ec2.internal.warc.gz
en
0.833969
179
1.734375
2
Published by Galerie De France, Paris, 1987, 96 pages (colour & b/w ill.), 23 × 30 cm, FrenchPrice: €45 Produced on the occasion of the exhibition Calligraphies, Permutations, Cut Ups at Galerie De France, Paris, 16 December, 1986 – 17 January, 1987 Brion Gysin was a painter, writer, sound poet, performance artist and inventor of experimental devices born in Taplow, Buckinghamshire. He is best known for his use of the cut-up technique, alongside his close friend, the novelist William S. Burroughs. With the engineer Ian Sommerville he also invented the Dreamachine, a flicker device designed as an art object to be viewed with the eyes closed. It was in painting and drawing, however, that Gysin devoted his greatest efforts, creating calligraphic works inspired by cursive Japanese “grass” script and Arabic script. *Please note this publication is secondhand and has some traces of previous ownership, including library stamps and stickers.
<urn:uuid:01504758-a0a0-435e-a0b9-82e657434662>
CC-MAIN-2022-33
http://booksatrib.com/calligraphies-permutations-cut-ups/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00076.warc.gz
en
0.972771
219
2.171875
2
A new analysis of sudden rises in global food prices puts the blame on biofuel policy and mortgage-meltdown-style speculation, which may have fundamentally changed how food markets function. Many other explanations have been proposed, and the latest analysis – a series of mathematical models and statistical evaluations that seem to match theory with real-world patterns – is not conclusive. But it does make a strong case. "There's a literature of a hundred-plus articles, saying this might be the cause, or that might be the cause," said network theorist Yaneer Bar-Yam of the New England Complex Systems Institute. "We looked quantitatively, and found two important factors. Speculators cause the bubbles and crashes, and ethanol causes the background rise." Bar-Yam and the NECSI team, whose analysis was published Sept. 21 on arxiv, work at the intersection of social phenomena and network analysis. In earlier research, they've explored the global economy's changing structure and early-warning signals that may precede crashes. More recently, they've studied how social unrest may have been fueled by food price spikes in 2008 and again in 2011. It's not only the rise in food prices that's proved troubling, but the rapidity. Shifts have been big and sudden, in stark contrast to the generally slow fluctuation of food prices since the mid-20th century. Among the possible causes put forward by economists are drought, meat-intensive dietary habits and market hypersensitivity to supply and demand. Another is corn-based biofuel: In less than a decade, some 15 percent of the world's corn production has been converted from food to fuel. Perhaps most controversially, some economists have blamed a flood of speculators betting on the rise or fall of food prices. Speculating on food isn't new, but it was long restricted to farmers and companies involved in food production. For them, speculation was a classic form of hedging: A farmer could, for example, make a bet that crop prices would fall. If they didn't, he'd benefit from his harvest's high prices; but if they did fall, winning his bet would offset the losses. Speculation was, on the whole, a stabilizing force. In the late 1990s, however, a financial industry-led push for deregulation – which would later result in the Enron debacle and the California energy crisis, and the 2008 mortgage meltdown – changed how food speculation worked. Anyone could participate. Bets on food were suddenly made by investment companies who could package and repackage their bets into the sorts of derivatives made famous by the mortgage crisis. According to some economists, this disconnected food prices from basic laws of supply and demand, and made them prone to wild swings. But others disagreed, saying the mathematical signs of cause-and-effect were hazy or absent. "In the last three to four years, many things have happened in the economy that weren't anticipated by most folks, and are not explained even today. I don't know if that means the basic laws of supply and demand aren't operating, but the way supply and demand is manifested is not understood," said Jeffrey Fuhrer, research director at the Federal Reserve Bank of Boston. "We don't have an understanding of the role of speculative markets."
<urn:uuid:ab6633bd-c2dd-4a99-9171-622fff6183a1>
CC-MAIN-2022-33
https://www.wired.com/2011/10/food-price-rises/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00277.warc.gz
en
0.973495
677
2.828125
3
What the security industry can learn from the World Health Organization The discovery of computer bugs can be marketing boons for cybersecurity firms. But one critic says the industry should take a page from the health profession and select names for flaws that aren't designed to stoke fear or generate buzz. As soon as the cybersecurity firm CrowdStrike announced its discovery last week of a computer vulnerability it dubbed "Venom," the ominous headlines began. "Venom vulnerability: Serious computer bug shatters cloud security," wrote Fortune. But as buzz died down and more experts weighed in, much of the initial dread about Venom turned to a collective shrug. "Blinked and you may have missed [Venom]," The Wall Street Journal wrote just a day after it said the vulnerability was sending companies "scrambling." The vulnerability is indeed widespread, but most agreed it would be difficult to exploit. The initial surge of press attention may not match the actual danger. “The sexier the name, the more media attention," says Christopher Dawson, editor-at-large for the blog from network security firm Fortinet. "Yet when you [name bugs], it creates this sensational thing.” The National Vulnerability Database, a government-hosted repository of computer bugs, ranks Venom just past the borderline between medium and high risk – a 7.5 out of 10. But this year alone, it has listed nearly 800 bugs as high risk, and there is no shortage of 10s. Many of those involve extraordinarily popular software programs such major operating systems and Web browsers. But few rivaled the publicity that Venom generated for CrowdStrike. And that's because most bugs just go by their serial numbers assigned before being listed in the database. Venom, which even had a slick logo, had a marketing and public relations team working behind it. Drumming up attention for some bugs can turn into a victory for cybersecurity firms, but may pose a problem for the broader computer security field, says Mr. Dawson and other experts, because it steals attention from other, more dangerous flaws. But he's come up with a solution: When it comes to selecting names for computer flaws, the security industry should look to another industry that knows a thing or two about naming maladies. The World Health Organization, he says, gets it right. And its recently released standards, he says, could perfectly translate to the computer security industry. The WHO has been examining the problems that arise from naming for more than a decade but just released guidelines for the process on May 8. Typically, the piece of information people hear about a disease isn’t a symptom. It’s the name. And first impression can carry consequences. In 2009, Egypt ordered the slaughter of 300,000 pigs, believing it would help stop transmission of the Swine Flu. But doctors who diagnosed patients with swine flu are usually thought to have contracted it from other humans – killing pigs likely would do very little. “We did an intensive process over more than a decade to investigate all the ways naming could be misleading or just not provide a good description of a disease, including both past and potential problems,” says Dr. Elizabeth Mumford, a researcher who worked on the WHO guidelines. Past problems included names that were misleading (such as Swine Flu), diseases named after people rather than describing the problem, names that were hard to pronounce or remember, and – in a move that generated criticism that the WHO was being overly politically correct – names that seemed to imply a disease was specific to a certain location. “The Spanish Flu didn’t originate in Spain, and wasn’t confined there,” Mumford says, as an example. The same kinds of misleading, not descriptive, and hard to remember names abound in the computer security realm, too. Malware, vulnerabilities, and hacking outfits that choose not to identify themselves are now named by the security researchers who discover them. Usually that means names are chosen more for marketing value than for conveying information. And that’s where the security industry would run afoul to key WHO guideline: Don’t choose names that cause “undue fear.” The trend of naming all vulnerabilities isn't that old. It started with Heartbleed in April of last year. The name was fitting; it was a glitch that bled data from the “heartbeat” function that verified connections stayed open in a massively popular Web encryption platform. And more than that, it was vulnerability historic in the terms of its size and potential damage. It deserved a name. That didn’t mean the name wasn’t also a marketing effort on the part of Codenomicon, the vulnerability detection tool company that discovered it. Codenomicon registered the domain “heartbleed.com” and designed what would become a ubiquitously used bleeding heart logo before they notified all of the developers who would be affected by the vulnerability. Then there was ShellShock, WinShock, Sandworm, and an entire legion of cute names derived from acronyms – Poodle, Ghost, Freak, and, last week, Venom. It seems almost impossible to announce a big vulnerability without a name, whether you want to not. The consulting firm JAS Global Advisors expected a major Windows bug they made public in February to be known by its vulnerability serial number, called a Common Vulnerabilities and Exposures number, or CVE. It still became known as JASBug. Most often, those names aren't particularly telling when it comes to conveying what actually needs to be fixed. "Sandworm wasn’t even a worm," says Dawson. In computer jargon, worms are specific types of malware. Sandworm referred to both a Russian hacking group and the vulnerability it frequently exploited. Venom was a bit more descriptive; it stands for Virtualized Environment Neglected Operations Manipulation and is, in fact, a bug that affects the networking process called virtualization. But many other bugs affect this process. A more descriptive name, for example, could have mentioned that the bug was in the code for floppy drives. CrowdStrike declined to comment for this story. “What ends up happening is named vulnerabilities get more attention regardless of how much they deserve it,” says Chris Eng, vice president of research at the Massachusetts cybersecurity firm Veracode. “The intuition is, if it’s branded, it’s more dangerous.” Applying the WHO Guidelines Mr. Eng suggests that, in an ideal world, the industry could go back to the old days, and refer to vulnerabilities by their Common Vulnerabilities and Exposures numbers. “They’re only eight numbers,” he says. “They aren’t that hard to remember. And the first four are the year.” But he also acknowledged that the cat was out of the bag, and research companies are now accustomed to having their own individually named, marketable vulnerabilities. Even if they weren’t, there are times where it’s extremely useful to be able to discuss vulnerabilities without worrying about typing CVE 2009-1324 when you meant CVE 2009-1423. This is where the WHO guidelines could be useful. WHO suggests short, pronounceable acronyms for names. Its prototypical disease name is SARS: memorable enough as an acronym without causing the same undue fear as a name like Venom. Venom, and bugs like it, for instance could just as easily be described as a Virtualization Escape Vulnerability, or VEV, says Dawson of Fortinet. But unlike the cybersecurity industry, the healthcare profession has strong governing bodies such as WHO at its center, and hospitals don't see the same marketing value in a threatening disease name. Dawson says trade groups could play a similar role and dissuade the industry from racing to come up with the coolest names and marketing campaigns. When it comes down to it, Dawson doubts the names are what most people in the industry want anyway. "Developers don't want logos," he says. "Marketing wants logos."
<urn:uuid:d861aa2e-3fa6-4b5f-856b-e2097197e9a5>
CC-MAIN-2017-04
http://www.csmonitor.com/World/Passcode/2015/0522/What-the-security-industry-can-learn-from-the-World-Health-Organization
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00226-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959624
1,674
2.609375
3
Please click on any Training title below to see pricing and full description. Note: Please read all Registration Terms and Conditions carefully. Training courses include full access to the Business Hall, Sponsor Workshops and Sponsor Sessions. Briefings are not included with the purchase of a Training pass, however, you may purchase a Briefings pass to complement your Trainings once you register. All Briefings and Trainings will be presented in English. The current threat landscape has shifted. Traditional defenses are failing us. This class is about new strategies to defend ourselves as well as to provide tools to better find out who is attacking us and why. Some of the things we talk about you may implement immediately, others may take you a while to implement. Either way, consider what we discuss as a collection of tools at your disposal to annoy attackers, attribute who is attacking you and, finally, attack the attackers. Looking to conduct more effective penetration tests? This challenging, fast-paced course will teach you how to best use available tools and methodologies to accurately emulate modern threats; all while adapting to tightening budgets, limited timeframes and diverse skillsets. Attackers are constantly evolving, becoming more sophisticated in how they attack and evade security measures. It’s time penetration testers do as well. Develop stealth, evasion, and persistence techniques to effectively emulate the enemy and demonstrate the impact of an advanced attacker. The days of running grep to find simple stack overflows are gone. Finding exploitable vulnerabilities, such as use-after-frees, often requires a thorough understanding of more complex code patterns such as reference counting and garbage collection. This two-day course teaches students how to dive into large C/C++ source code projects and find exploitable memory corruption vulnerabilities armed with nothing more than a text editor. Students will learn the necessary skills by focusing on real world vulnerabilities found in open source web browsers. Learn about threats to your embedded design capable of revealing secret keys or causing faults, even if you have a bug-free and secure implementation. Focuses mainly on side-channel power analysis with the open-source ChipWhisperer software & hardware, but also covers related topics such as clock glitching. Looking to sharpen you malware analysis skills? Then take this fast-paced class to develop skills in dealing with anti-reversing, packers and special case malware. You will practice your new skills by dissecting real malware via hands-on labs. In this hands-on, lab driven course students will be taught a methodology and series of techniques used to perform penetration testing of mobile devices and applications. This course, created by the project leads for the OWASP MobiSec project, uses intense lab driven learning that allows the student to learn techniques, tools and a methodology for testing mobile applications. Learn how to profile a target with devastating accuracy without ever sending a packet to their network. Taught by the 2-time winner of the Defcon Social Engineering CTF, get extensive hands on experience utilizing OSINT tools to optimize your next pentest/SE attacks. Lots of labs and practical coursework makes sure you get actual experience with the tools. From mind-bending XSS attacks, to exploiting CSRF vulnerabilities, to advanced SQL injection attacks, Advanced Web Attacks and Exploitation will broaden your knowledge of web application hacking and help you identify and circumvent various protection mechanisms in use on the web today. This training is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide participants with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools. During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out against live CTF challenges. These include - cracking WPA Enterprise (PEAP, EAP-TTLS), MITM attacks over Wireless, Creating Wi-Fi Backdoors, Scripting and Attack automation, Wireless Forensics and Security Best Practices. Advanced Windows Exploitation provides an in-depth and hardcore drilldown into topics ranging from precision heap spraying to DEP and ASLR bypass techniques to real-world 64-bit kernel exploitation. This course is extremely hands-on and includes a lab environment, which is tailored to challenging and bringing the most out of you. The case studies covered include vulnerabilities discovered by our research team or exploits written by us. This course will focus on the techniques and tools for testing the security of Android mobile applications. During this course the students will learn about important topics such as the Android Security model, the Android runtime, how to perform static analysis, traffic manipulation, memory dumps, debugging , code modification and dynamic analysis - from zero knowledge of the APK to full exploitation. Students of this course will learn how to operate and make the best of the AppUse custom VM for Android application penetration testing, from its own creators. By taking this course you will be able to perform penetration testing on Android mobile applications and expose potential vulnerabilities in the tested application such as insecure storage, traffic manipulation, malicious intents, authentication and authorization problems, client side SQLi, bad cryptography, and more. There are four technical skills required by security researchers, software quality assurance and test engineers, or developers concerned about security: Source code auditing, fuzzing, reverse engineering, and exploitation. Each of these domains is covered in detail. Learn advanced techniques in SQL Injection as well as some lesser known injection flaws such as LDAP Injection, Hibernate Query Language Injection, XPATH Injection, XML External Entity Injection, Direct Code injection etc. All attendees will receive FREE access to on-line labs related to the class. This is not your traditional SCADA security course! This course teaches hands-on penetration testing techniques used to test embedded electronic field devices, network protocols, RF communications, and controlling servers of ICS and Smart Grid systems like PLCs, RTUs, smart meters, Home Area Networks (HAN), smart appliances, SCADA, substation automation, and synchrophasors. The official Samurai-WTF (Web Testing Framework) training course given by one of the founders and lead developers of the project! You will learn the latest Samurai-WTF open source tools and the latest techniques to perform an end-to-end web penetration tests. This two day course will take a deep-dive into the fundamentals of SCADA security and provide students with the knowledge that they need to safely perform penetration testing against live SCADA environments. The course will also provide students with methodologies through which security research may be performed against SCADA devices in order to identify 0day flaws in some of the world’s most critical systems. During the course, students will have the opportunity to engage in live attacks against programmable logic controllers (PLC’s) and other industrial control systems, to include activities such as SCADA RTOS firmware reversing and SCADA protocol fuzzing. Secure boot, trusted execution environments and many other security mechanisms depend on the security of the underlying hardware. What if we can break the actual hardware? And what if that's EASIER than breaking the software? This course provides an understanding of the possibilities and impact of hardware attacks such as side channel analysis and fault injection through a hands-on approach. Besides the necessary theory, students will perform exercises themselves in which they will, for instance, break a DES key through power analysis. Bypassing Security Defenses is a course designed to rapidly teach students how to become penetration testers using the latest and greatest attack methods. This course is designed to teach you effective ways of getting around today's preventive technologies and further attack an organization as a penetration tester. Information Assurance Associates (IA2) provides comprehensive CNSS-4016 Risk Analysis certification and the federal Risk Management Framework (RMF) training for Information System Security Managers (ISSM's), Certification Agents and Security Control Assessors (SCA's). The IA2 Risk Analysis Certification and Risk Management Framework (RMF) curriculum was specifically designed for cybersecurity practitioners that exercise security or Assessment and Authorization (A&A) as well as Program or Acquisition Management control over critical information infrastructures. This course provides four days of intense, highly concentrated, non-technical professional training necessary to achieve the fundamental knowledge, skills, and abilities needed to analyze, assess, control, determine, mitigate and manage risks within computer systems that store, process, display or transmit classified or sensitive information. This course provides training in knowledge factors and functional requirements established for Entry and Intermediate Level Risk Analysts and addresses professional processes and policy requirements established within the federal Risk Management Framework (RMF). Specific focus is directed on identifying, implementing and integrating management, acquisition and administrative risk methodologies for securing critical information infrastructures and establishing standards necessary to help protect the confidentiality, maintain the integrity and ensure the availability of critical organizational computing resources within a risk managed framework. Topical areas include those actions and activities necessary to facilitate risk centric analysis and assessment requirements as well as RMF actions and activities necessary to ensure that Authorizing Officials (AO's) have the information necessary to make informed, risk-based decisions. Special attention is directed on analyzing, evaluating, and assessing information system security risks and the procedures necessary to assess the impact and consequence of a realized risk on critical information infrastructures. This course provides a solid foundation in cloud security, and includes a full day of hands-on labs to apply the principles in practice. We cover all the material needed to pass the Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK) exam, but add a pragmatic approach to immediate kick start your cloud security projects. For Black Hat we also add expanded material to show you how to take cloud security to the next level by leveraging DevOps techniques and the characteristics of the cloud. Covering everything necessary to successfully manage an incident, students will work through various scenarios building response plans for each situation. From what should be in place prior to an incident, to knowing when to trust your network again, this practical course will teach you how to appropriately respond in real world incidents. The US Special Operations Forces pioneered a methodology called F3EAD, which enabled amongst other things the ability to take out insurgent and terrorist networks. This class focuses on modifying the F3EAD methodology for utility in Cyber Defense Operations to allow cyber defenders to incorporate intelligence practices into their daily operations to focus not just on one off indicators but the overall threat actor. Intelligence enables cyber defense teams to look at the cyber battlefield from the 50,000-foot view and piece together all aspects of the cyber adversary's operations. From what altitude are you viewing the cyber battlefield? Digital forensics and incident response are two of the most critical fields in all of information security. The staggering number of reported breaches in the last year has shown that the ability to rapidly respond to attacks is a vital capability for all organizations. During this course, we will help you unlock the true potential and raw power of Maltego - from helping you to understand the underlying technologies to exploring the full potential of Maltego's analytic capabilities. Join us and we'll show you how to navigate and map the Internet's darkest rivers... Security of Microsoft kernel is becoming hot topic nowadays.With the rise of sandbox technologies compomising sandboxed applications via kernel vulnerablities is nice approach. Attendees will learn the various internals of the kernel exploit development, will face verious problem and will learn how to solve them. This course will familiarize attendees with development of Microsoft Windows kernel exploit on 32-bit and 64-bit editions of Microsoft Windows. Today all the companies business lays on Enterprise Business applications. It is a big systems that store and process all the companies critical data. Unfortunately there is still very low information about Security of those systems like how to bleak them during penetration tests and how to securely configure them. We will cover different software like ERP’s, Service Buses, CRM, Process Integration, SRM, and also software from other vendors like: SAP, Oracle and Microsoft and some of the less popular and custom business applications. This training will empower you to understand which are the most critical security threats affecting your SAP platform. Learn how to assess your organization for SAP-specific vulnerabilities using opensource tools, and use exploits in a controlled environment to better understand and communicate the potential business risk. Learn how to mitigate existing vulnerabilities to protect yourself against the most common attack vectors. No previous SAP expertise required! Get hands-on learning, exploring and defeating advanced exploit mitigation techniques including ASLR and DEP. Develop and hone your return oriented programming (ROP) skills, exploit browsers, embed and trigger reverse shells in PDFs, perform advanced heap sprays and work on complex "pwn2own style" exploits which involve info leaks and dynamic ROP chains. Our custom lab environment, included for you to take home at the end of the class, has been designed and refined to provide a stable environment for exploit writing so we can deep dive early and often across 32 and 64-bit platforms. Join us for a truly challenging two days! Can be combined with Exploit Lab: Red Team as a 4-day class. Attendees of the Exploit Lab: Red Team will have a challenging and intense two day experience digging deep into the art of craft of software exploitation. This Lab focuses on providing hands-on experience discovering and exploiting vulnerabilities across Linux and Windows platforms. By the end of the class attendees will have learned all about memory corruption techniques such as stack overflows, exception handler abuse, in-memory object corruption, vftable overwrites and exploiting use-after-free bugs. Even better, our Lab environment will be made available to all attendees to take with them and continue learning after the two days are complete! Can be combined with Exploit Lab: Black Belt as a 4-day class. The cat and mouse game from the perspectives of both the cat AND the mouse. Hack it and Track it, is the only class of it's kind that will teach you how to pentest as well as retrace your steps through forensic analysis. Hacking By Numbers Reloaded - BlackOps is a students final course in the Hacking By Numbers series before being deployed into "Combat". Here, they will sharpen their skills in real-world scenarios before being shipped off to battle. Reality, Theory and Practice! This course is the "How did they do that?" of modern hacking attacks. We will lead you through the full compromise of a company's IT systems, explaining the tools and technologies, but especially the thinking, strategies and the methodologies for every step along the way. As mobile phone usage continues to grow at an outstanding rate, this course shows you how you’d go about testing the mobile platforms, and installed applications to ensure they have been developed in a secure manner. Hacking By Numbers Reloaded - Mobile Bootcamp will give you a complete and practical window into the methods used when attacking mobile platforms. Web applications are the backbone of the modern, interactive Internet experience. We will lead you through the full compromise of various web application and associated infrastructure, explaining the tools and technologies, but especially the thinking, strategies and the methodologies for every step along the way. This intensive, hands-on course covers examples of exploiting basic memory corruption vulnerabilities up through modern protections such as ASLR and DEP. This course dives deep into the problems encountered when developing real exploits such as space and character set issues. Attendees will learn the tools and techniques to find vulnerabilities and build working exploits as well as the mindset required to tackle exploitation techniques that are new to you. Grand Idea Studio's Hardware Hacking and Reverse Engineering training course focuses on teaching board-level hardware hacking and reverse engineering techniques and skills. The course is a combination of lecture and hands-on exercises. It covers the hardware hacking processes, circuit board analysis and modification, embedded security, and common hardware attack vectors. The course concludes with a final hardware hacking challenge in which students must apply what they've learned in the course to defeat the security mechanism of a custom circuit board. Ida Pro is touted as the premier disassembler available today, capable of disassembling machine languages for a large number of microprocessors and micro controllers. This course will cover advanced features of Ida that may be used to work through challenging reverse engineering problems. This course is taught using primarily x86 and ARM assembly language. Ida Pro is touted as the premier disassembler available today, capable of disassembling machine languages for a large number of microprocessors and micro controllers. This course will cover essential features of Ida that anyone looking to begin using this tool should be familiar with. This course is taught using x86, 32-bit, assembly language. This intensive two-day course is designed to teach the fundamental investigative techniques needed to respond to today’s landscape of threat actors and intrusion scenarios. Completely redeveloped with all-new material in 2013, the class is built upon a series of hands-on labs that highlight the phases of a targeted attack, key sources of evidence, and the forensic analysis know-how required to analyze them. This course will focus on the techniques and tools for testing the security of iOS mobile applications. During this course the students will learn about important topics such as the iOS Security model, the Simulator, how to perform static analysis, traffic manipulation, and dynamic analysis. By taking this course you will be able to perform penetration testing on iOS mobile applications and expose potential vulnerabilities in the tested application. The objectives of the course are: • Understand the iOS application threat landscape • Perform penetration testing on iOS mobile apps • Identify vulnerabilities and exploit them • Operate AppSec Labs' unique Open-Source iNalyzer customized dashboard for iOS pen-testing Learn how to thoroughly lock down Linux and UNIX systems from Jay Beale, the creator of Bastille Linux. In this fully hands-on course, you’ll harden not only the operating system, but also the server programs running on it. You’ll massively increase their resiliency to attack, whether they are web, mail, FTP or DNS servers. You’ll also learn to use security tools to build in intrusion prevention system (IPS) functionality, advanced firewalling, spam filtering, and attack detection. Almost every computer incident involves a trojan, backdoor, virus, or rootkit. Incident responders must be able to perform rapid analysis on the malware encountered in an effort to cure current infections and prevent future ones. This course provides a rapid introduction to the tools and methodologies used to perform malware analysis on executables found on Windows systems using a practical, hands-on approach. The medical field is befoming more connected, and we are just beginning to see security issues related to that. Learn about where those security problems are appearing, how to identify them and develop techniques to protect the patients using those devices. Step up your game with the latest advanced techniques for penetrating networks with the Metasploit Framework. Taught by a pair of shell-addicted, password-crazed, ruby fiends, so leave you python at the door Updated: 6/7/14 (*NEW* Detailed Information) This class gives you the latest insight in areas such as Android, iOS, and Software Defined Radio Hacking with 9 expanded course modules covering 6 areas. We provide fresh content, new tools, and cutting edge techniques in the world of mobile security. • Advanced Mobile App Auditing (iOS, Android) • Advanced Android Exploitation • Advanced iOS Exploitation -taught by an Evad3rs (Jailbreaker) • Android Data Extraction via JTAG, and direct emmc access • Advanced Baseband Hacking (iOS and Android) • Software Defined Radio Attacks against Mobile Devices Learn to recognize hackers' tracks and uncover network-based evidence. This fast-paced class includes packet analysis, flow record analysis, wireless forensics, intrusion detection and analysis, covert tunneling, malware network behavior — all packed into a dense 4 days with intensive hands-on technical labs. Do you want to find intruders in your network, but don't know where to begin? If the answer is yes, NSM 101 is the course for you. Join Richard Bejtlich as he explains Network Security Monitoring from the ground-up in this brand-new, hands-on course. The first comprehensive hands-on fuzzing course centered on the industry standard Peach Fuzzing Platform. Learn how to fuzz just about anything with Peach. Embedded Edition is an advanced course offering from Deja vu Security. It teaches students the fundamentals of using Peach to fuzz embedded devices. This course covers the targeting, monitoring, and collection of crashes on custom hardware. Premiering for the first time the newly revised "Penetration Testing with Kali Linux". This is an intense, hands-on security class by Offensive Security, the creators of BackTrack Linux and now Kali Linux. Those who attend this session will leave with a full awareness of how to best protect buildings and grounds from unauthorized access, as well as how to compromise most existing physical security in order to gain access themselves. Distinguish good locks and access control from poor ones and become well-versed in picking and bypassing in order to assess your own company's security posture or augment your career as a penetration tester. You will learn practical hands-on skills to implement Threat Intelligence into your organization. Create an Intelligence-Based Security Strategy. Develop your Intelligence Capabilities. Perform Intelligence Aggregation. Understand the Cyber Kill Chain. Identify Indicators of Compromise. Carry out Threat Analysis including Data Visualization. Identify, Profile and Track Hackers. Develop Actionable Intelligence. Respond and Disseminate Threats. Participants will learn how to transmit, receive, and analyze radio signals by attacking smartphones and embedded devices wirelessly. This class will encompass: • Android Over-the-Air Attacks (Cellular, GPS) • GNU Radio • Wireless SCADA Armageddon • Advanced Software Defined Radio Hacking Learn how to create custom exploit shellcode for Windows, Linux and Mac OS X, and integrate your shellcode into Metasploit and public exploits. The Shellcode Lab holds your hand to take your security skills to the next level. Register for The Shellcode Lab now! An introduction to digital signal processing, software radio, and the powerful tools that enable the growing array of SDR projects within the hacker community, this course takes a unique "software radio for hackers" approach, building on the participants' knowledge of computer programming and introducing them to the forefront of digital radio technology. Participants will learn how to transmit, receive, and analyze radio signals and will be prepared to use this knowledge in the research of wireless communication security. Each student will receive a HackRF One software defined radio transceiver, a $300 value. "Hardware Enabled Software Exploitation" is a hands-on course covering tools and methods for manipulating, modifying, debugging, reverse engineering, interacting with, and exploiting the software and hardware of embedded systems. Students will learn how to use and develop tools and techniques for exploiting embedded devices: from mobiles to off-the-shelf-consumer electronics. Penetration testing often focuses on individual vulnerabilities and services, but the quickest ways to exploit are often hands on and brute force. This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, attendees will learn how to compromise systems without depending on standard exploits. Tactical Response is a multidisciplinary approach to understanding the methodologies, techniques, and tools for both offensive and defensive security. This four-day course introduces a tactical approach for instrumenting and weaponizing your infrastructure. Using a combination of new tools, and uncommon techniques students will learn how to defend a network against today’s evolving threats. Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments. Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice. Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques for Wi-Fi, Bluetooth, Zigbee, Z-Wave, RFID, and other wireless technologies that go far beyond what automated analysis tools can do. These are the wireless technologies used by corporate infrastructures, “The Internet of Things”, and personal electronics across the world. You will get hands on experience with breaking into wireless networks and be involved in live hacking demos by some of the guys who wrote the tools. This course is the definitive training for learning how to perform large scope wireless penetration assessments. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice. Learn to detect lies and find the TRUTH through the application of proven human-memory retrieval techniques while observing behavioral and emotional clues, and micro-expressions. Master the art of asking questions, how to phrase them, and when to ask them. Develop practical skills to establish rapport and gain trust which can be immediately applied in any situation, with anyone. Hands-On Training of Vehicle Networking Systems, Vehicle Embedded Systems, and the Security Systems Enabled to Prevent Manipulation of These Systems. Learn everything about security visualization to make your log analysis and forensic investigations more efficient and effective. We explore situational awareness and learn how to uncover new insights and hidden attacks on your environment. MDSec's course is delivered by the authors of the Web Application Hacker's Handbook, and the author of Burp Suite. It features hands-on hacking from the 2nd Edition of the Handbook, with 150+ examples including a CTF contest.
<urn:uuid:0a66611e-bc94-40e3-911a-31c5196063ef>
CC-MAIN-2017-04
http://blackhat.com/us-14/training/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00509-ip-10-171-10-70.ec2.internal.warc.gz
en
0.911352
5,422
1.5
2
Dr. Charlie Miller -- a man who has been covered extensively here at Engadget -- snagged a doctorate in Mathematics from the University of Notre Dame. He spent five years working on cryptography for the National Security Agency. And, after heading into the wilds of security analysis, he was the first to find a bug in the battery of the first MacBook Air, various bugs within Mac OS X and the Safari web browser and assorted bugs within iOS itself, all while racking up thousands of dollars in hacking contest prize money. Last week, this came to a head, as Miller created a controversial proof of concept application that both proved the existence of an iOS security hole as well as got him expelled from the App Store's developer network. Given that he's driven Apple Inc. somewhat nuts over the past few years, we sat down with the good doctor to see how he felt about Apple, iOS, security, technology, sandboxing, the pros and cons of modern security and the ups and downs of one of the weirdest career paths for any aspiring technologist today. Join us after the break for the full interview in both textual and audio form. Your profile says that you completed a PhD in mathematics at Notre Dame and then went to go work in the bowels of the government, specifically the NSA for five years. What got you into software security and how did this lead to hacking? So when I got to the NSA, I started out as a Cryptographer, and my PhD is in Math, so this was a good match there. But as it turns out, when I got there, I didn't really like that, so one of the cool things about the NSA is that they'll train you in whatever they have a need for and that you want to do. So I thought it was cool, and they trained me up. I worked for them and when I came out, I got a job, sort of a more traditional software security job that I could actually talk about. What prompted you to first enter the PWN 2 OWN contest back in '08 and essentially take on the first generation of MacBook Air? These are just computers, they have bugs, and they have exploits too. Believe it or not, back then, people didn't believe Macs were vulnerable to anything. So I would say to people who would listen, "Hey, these are just computers, they have bugs, and they have exploits, too." But they really didn't see anything like that... I would say that and no one would really believe me. One of the main things I wanted to do was to show that Macs were vulnerable, and at the time, actually quite a bit more vulnerable than say a comparable Windows system. So that's why I entered... to sort of prove a point. Flaws in that security, and unfortunately it didn't work. So if you would read the comments on that, people were posting on articles about it, no one really believed it. They were like "Oh, well sure, if you give him physical access," and of course I didn't have physical access. Basically, I did it to prove that Macs were as vulnerable as anything else, and actually more so at the time and no one really believed me. And that's why I went back the second year. Where were you finding the vulnerabilities back then? They were all in the browser, Safari. I think the first one were a bunch of bugs, and then, the next year in 2009 was a bug and the way they parsed fonts, which again was accessible through the browser. The good news was that after the second time the people kind of started to believe that I wasn't just full of it, that these things really were as vulnerable as other devices and actually more so. A lot of people are kind of saying that your efforts are intentionally focused on Apple, is there something inherent about the company's products, philosophy or are these just pieces of your work that are tending to garner more notice? It's a direct bonus for me when I find bugs and they get fixed. One of the main reasons is that I use Apple products. I'm talking to you on an iPhone right now, and my computer is a MacBook. I'm familiar with them, and it's a direct bonus for me when I find bugs and they get fixed... then my stuff that I use is more secure. That's part of it, the other thing is back when I started in 2007, Apple products were a lot easier to find flaws in than Windows, and so it was easier to exploit them because they didn't have the same anti-exploit technology that Windows had. But now, that's not really the case anymore, it's sort of an even playing field, but back then it was quite a bit easier and so, bang for your buck, I could write three to four exploits for OS X in the time it'd take me [to write] one for Windows. It was more of an investment of my time back then, but not anymore. As far as where the security was, back when you first started, how much more open and vulnerable would you describe OS X as being, as opposed to the Windows operating systems at that time? They were quite a bit. If you look at something like Vista, or Server 2003, those basically have the main anti-exploitation technologies and for the equivalent on OS X, you'd have to wait for Lion, just a few months ago. As an example, when I won the very first one in 2008, there was no DEP (Data Execution Prevention), so you could just write to memory and execute, exploit and jump right to it -- very trivial to exploit. The actual exploit I used in 2009 would not have worked. I would have not have had to do anything fancy at all to write a very, very unstable exploit, but the fact that I could just write to memory and execute it allowed me to do it, and neither of these things were possible on the Windows side. So, the good news is that things have changed. If you look at Lion, Lion is as hard to write an exploit for as it is for Windows 7, so they're very caught up. Back then, they were very easy pickings. Based on what you've seen in the Mac OS X 10.6 and 10.7 versions, what has Apple done security wise that's been a step in the right direction? They fixed a lot of bugs for one thing, but that's hard to measure, to say how much progress they've made compared to other operating systems. But some good things they have done for engineer that are measurable, are the things that I've talked about. They've added anti-exploitation technologies: ASLR, which is memory organization and DEP, which is separating code from data. That's basically the industry standard for making exploits hard. Lion has also introduced sandboxing in Safari. So now, the thing I usually break into is harder to exploit and now when you do it, typically you'll end up in a process within the browser. That's sandboxed, which makes it at least twice the work because it requires two exploits as opposed to one. What has been noted most prominently are these iOS shortcomings, do you believe Android has similar weaknesses as iOS, and are there ways in which Google's operating system is more prone to attack? I pick on iOS a lot, but Android OS is actually in worse shape than Apple is in terms of mobile security. I pick on iOS a lot, but Android OS is actually in worse shape than Apple is in terms of mobile security. They've just caught up in terms of anti-exploitation technologies. But the thing that really makes Apple different is the way that they guard against malware, and that's what my most recent research is about. On the Android side, it started with a different philosophy: you can download anything you want, and you can run it. The problem with that is that you can have malware for it and you can download malware and run it. And then you're sort of in the same boat with Windows for years -- you have to be careful with what you download. On the Apple side, they went with the approach that Apple has all the control. What that means is, you can't download any program you want and run it, you can only download from the App Store. In order to do that, Apple has to take a look at them, approve them, and sign them. The bad news is that you can't just download anything you want, but the good news is that you can feel pretty safe download and running programs and it won't do something bad. While you've seen some malware for Android, you haven't really seen any for iOS because of exactly this reason. Getting back to Apple, what sort of security weakness do you think are really out there for iOS, even with iOS 5.0 and 5.0.1 in its second beta at this point and time? There's obviously the one that I am talking about, which has to deal with the actual code and that basically breaks what I was describing before, which is the way that they protect from malware. If we jump ahead a month, or however long it's going to take for them to patch that, it's actually really solid. I mentioned it has the anti-exploitation technology that's lined up, it has some encryption, although it's not that great, but at least there are ways to set it up for remote wipe and remote lock, which are important for mobile devices because you're way more likely to lose it in the backseat of a taxi than you are to actually get attacked by someone. In your opinion, is it worth jailbreaking either an iOS or an Android device, or do you feel that the risks outweigh the benefits that you are going to get from this? It doesn't just turn off good things; it turns off a lot of the security, so you really have to want whatever it is that you need with jailbreak, in order to give up all this security. Definitely when you jailbreak an iOS device, you've really affected the security of the device. You turn off code signing, which means that you can download anything, but it also means you can download anything, meaning it can be bad code too. That's the one thing everyone knows about, but protection means a lot more, too. Jailbreak adds a bunch more code, it starts running things as root, like as an example, you might have an SSH server running as root, or other programs you install running as root, which is of course a higher level privilege, and they're very careful on a stock iOS device not to let you do that. So you've got things running, and the new programs that are running, aren't running in the sandbox anymore. Jailbreak turns off a lot of the memory protection, so the thing that I was talking about before, the flaw I found this time; you get automatically on a jailbroken device. It doesn't just turn off good things; it turns off a lot of the security, so you really have to want whatever it is that you need with jailbreak, in order to give up all this security. For most people, I can't imagine it's worth it, but if there's something you just have to have, then I guess it's worth it. For me, for research purposes, I usually have to jailbreak my devices, but right now my phone is not jailbroken. In terms of just overall security, Mac or desktop, if you had to pick any company that's doing it the right way in your opinion -- it could even be webOS -- who do you feel is doing it right? Hrmmm. That's a good question. It used to be that there were enough differences that allow you to differentiate. When I got into the game, OS X was partially behind, and you can prove that to someone who wouldn't listen to you. But now, most OS' are close enough in that level of security. It's really nit-picky to try and separate. They're all pretty good. I hate to say one over the other because the things that you see now and the differences are so small compared to what they were, that they're all pretty decent at this point. Getting to the most sticky point in this moment in time, do you feel that Apple's removal of your app store developer account was excessive. What would you have done, if you were in their shoes? So regardless of the consequences, I thought I needed to let people know about this, just so they can make informed decisions about the security of their devices. Whether it was excessive, I don't know. I certainly broke the terms of service and they had the right to remove my account, but for me, I didn't really consider or I didn't really care what they would do -- I thought it was important enough to let people know about these problems. I couldn't sit and let people know that you could be potentially downloading malware from the App Store, when up until now, everyone -- Apple, myself -- considers it as, "basically you don't get malware on iOS, right?" So regardless of the consequences, I thought I needed to let people know about this, just so they can make informed decisions about the security of their devices. So they still download everything from the App Store, great. If they want to download my apps, that would've been fine. If they're worried about their security, then they know to sort of hang out and wait till the patch comes out, and then I can start downloading. And even then, I know in the back of my head that there's going to be another bug, like the one Charlie Miller talks about, and I need to be a little careful. So as far as getting my account removed, it's a bummer and I wish they wouldn't have done it, and I think it's shortsighted on their part. From my perspective, I don't really care. For me it's more important to get the message out than whether I have a developer account. Do you believe you can get the account back? I don't know how [laughter]. Maybe, but I don't have any idea how to make that happen. Maybe some nice stationary and an apology letter? Like I said, I don't think I have anything to apologize for. Given the choice I'd do it again, because I think letting people know about the risk is more important than the $99 account I had. At this point, what are you overall feelings about Apple, their security and their overall product line? They've made a ton of progress. If you look back at the iPhone when it first came out in 2007 it was a disaster, security wise. The web browser ran as root, and that's about as bad as it gets right there. There's no sandboxing, there's no code signing, nothing. So if you compare that with the iPhone now, which I say quite openly, that it's a very secure device. As far as Apple itself, I don't get much insight into what they do and the people that are there, sort of a closed community. I know they've been hiring some pretty smart people and that's been paying off. Unfortunately, this latest incident has sort of put a damper on my outlook for them, but hopefully it will work itself out. What would you tell someone looking to follow in your shoes as a security analyst, what would you say to them? I think the best thing to do is jump in, get your hands dirty and try and learn that way. I get this question a lot and unfortunately it's hard to follow my exact footprints, because not everyone can get a job at the NSA and have them train you. Beyond that, probably, my advice I give out to a lot of people is to read some books; there are ones that I recommend. And then, most importantly, just jump in and find the programs that interest you, and tear it apart, see how it works. See if you can find a flaw. Look at exploits. Download the program that I wrote. Figure out how it works, what was the flaw, why was it there, how did it work? Computer security is a really hands-on activity, and that's why I'm sure it's not properly taught at a university. It's more of a craft, and you have to have an apprenticeship and I had that at NSA in their three year program, where I did nothing but learn and then I was ready to go. I think the best thing to do is jump in, get your hands dirty and try and learn that way.
<urn:uuid:4df07c8f-5bea-4666-ae2f-60aca56db884>
CC-MAIN-2017-04
https://www.engadget.com/2011/11/18/the-engadget-interview-dr-charlie-miller/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00172-ip-10-171-10-70.ec2.internal.warc.gz
en
0.987725
3,449
1.507813
2
The POPP 10 Years Smoke Detector detects resulting fire and smoke emission reliable. This is a non-siren version for extended battery life. Thanks to Z-Wave wireless technology you can define further actions triggered by the Smart Home control center in case of an alarm. To enhance safety, escape routes can be highlighted with automated lighting and unlocking or locking of shutters and doors. Thank to its integrated 10-years battery the smoke detector can be used for legally prescribed lifecycle without replacing the main battery. The Z-Wave modules battery can be replaced with just a few simple steps when the device informs the control center about low battery status. Low Z-Wave module battery has no influence to the smoke sensors functionality. This device is the first smoke sensor with Z-Wave which has the Q-label for extended quality.
<urn:uuid:2a4d0330-1ac7-4997-874e-09d4e974f8ad>
CC-MAIN-2022-33
https://mobilehome.gr/en/sensors/fire-smoke-heat/750/popp-10-years-smoke-detector-detail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00071.warc.gz
en
0.899374
168
1.742188
2
Jublains – Ancient Roman Town in France with Fortress, Amphitheatre, Temple and Baths Among the most surprising local sites we have visited are the Gallo-Roman archaeological remains at Jublains in the Mayenne department of the Pays de la Loire. Before the arrival of the Romans, a Gallic village belonging to the Diablintes tribe of Gaul stood on the site of present-day Jublains. Development of the Roman Town at Jublains When the Romans conquered Gaul in the first century AD they founded at this spot a new town called Noviodunum, which became the administrative town for the region previously occupied by the Diablintes. The existing wooden Gallic temple was replaced by a Roman temple built in stone and they constructed all of the other comforts necessary for normal Roman life – public baths, a theatre, market place and so on. By the second half of the first century AD a typical Roman town with a grid network of perpendicular streets had been developed. However, the fortress is the most spectacular of all the Roman remains on the Jublains site. When the fortress remains were discovered in the 18th and 19th centuries it was thought that it may have housed a Roman legion. However, it is now believed that it was actually a fortified granary depot serving the Roman armies in the surrounding regions, and that it was only transformed into a military fortress in the late third century. The Roman fortress is distinguished by monolithic granite facing stones, each weighing several tons, and equally large blocks used for doorways and lintels. The interior is divided into a maze of storage areas and living quarters. The well preserved Roman baths inside the fortress are divided into three rooms (hot, warm and cold). The fortress must be accessed via the museum designed by the curator Jacques Naveau. This airy building houses countless treasures. Here, a ball with twelve faces in bronze from the early third century. There, an engraved sword from the Iron Age. Further on, finely decorated pottery, gold coins from the first century B.C., all sorts of remains are on show. The remains of the Roman amphitheatre are a short walk away in a natural wooded setting, down a pathway located near the church. On the pathway lives a sculptor who makes amazing animals, birds and fantastic creatures in scrap metal. Excavations of the Roman theatre at Jublains have revealed in detail the sitting areas and the stage, and it was amazing, sitting on the terraces on a sunny evening, to imagine the performances taking place there almost 2000 years ago. The amphitheatre in its day had a capacity of 4 000 people and is nowadays used for open-air dance and music shows in summer. The well preserved Roman public baths are visible in excavations beneath the church in the centre of Jublains, animated by an excellent sound and light show. On the outskirts of the village are the remains of the Roman temple – we did not have time to visit this, unfortunately. Picnics are possible within the walls of the fortress or the amphitheatre. You can also eat the village, which has a creperie and a pizzeria. How to get there, where to stay near Jublains Jublains is an hour away from our B&B on the Normandy-Pays de Loire border, driving via Villaines-la-Juhel. Opening times, Entry Prices The Visitor Centre and Fortress are open all year round except Christmas and New Year Days. 13 rue de la Libération Tel. : +33 (0)2 43 04 30 16 Jublains website http://www.jublains.fr May to Sept : every day from 9.00am to 6.00pm Oct to April : every day except Monday 9.30am to 12.30pm and 1.30pm to 5.30pm The public baths in the church, amphitheatre and temple are open free all year round.
<urn:uuid:1a55da86-e47c-42d8-8fbb-42df71cb8e4c>
CC-MAIN-2017-04
https://visitnormandy.wordpress.com/2009/10/05/jublains-gallo-roman-remains-in-mayenne-pays-de-la-loire/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00303-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955829
838
3.03125
3
BRE Report (BR) 443 Conventions for U-value Calculations is a document produced by the Building Research Establishment in the UK. As its title suggests, the report details best practice that should be followed by anybody carrying out U-value calculations for building elements. Although it is not a European Standard (like others that detail actual calculation methods for thermal transmittance), or even a British Standard, BR 443 carries weight in UK construction. It is a widely used and referenced document, recognised as essential to providing accurate U-value calculations. What is in BR 443? One thing that BR 443 is not is an explanation of calculation procedures. The document does not describe how to perform a U-value calculation. What it does give is dimensional and performance data about common UK construction materials and methods. Using BR 443, people who carry out U-value calculations can represent those materials and construction methods consistently, ensuring the industry generally benefits from accurate calculations. BR 443 contains a wealth of supporting guidance about applying the data, meaning users of calculation software can make informed decisions about inputs into calculation software. There are also checklists for common building elements covering different factors that need to be taken into account when calculating a U-value for that element. At the time of writing, BR 443:2019 is the current edition, having replaced the one published in 2006. The 2019 document is approximately double in length compared to its predecessor, providing more useful information for readers and significantly expanding some sections (such as section 11 about windows and glazed elements). A small amount of previous guidance has been removed but, for the most part, the data provided for use in calculations have remained the same. The biggest difference is in the quantity of supporting information. Traditionally, BR 443 was free to download, but the 2019 edition has to be paid for. As the 2006 edition is still available online, anyone searching for the document should satisfy themselves as to which version they have accessed. What do architects and design professionals need to know about BR 443? Any designers who perform their own U-value calculations should already be familiar with BR 443 and be applying its conventions. For designers who obtain calculations from elsewhere, however, do they need to know what is in the document? Technically, no. The main thing is to be satisfied that whoever is providing calculations for your projects knows BR 443 and is working to its conventions. There are some reasons why having an understanding of its contents could be beneficial, however. Awareness of common material data, or factors that impact on the thermal performance of building elements, could help to inform design decisions or material specification choices. By factoring that awareness into projects at an earlier stage, it could make it more likely that design intent is realised later on. By contrast, late design and specification changes to compensate for different thermal properties can lead to compromises being made. Another reason is that when receiving calculations from a third party, such as a consultant or product manufacturer, it’s possible to read those calculations, understand the data that has been used, and ask any questions about the correct representation of your design. Trust that the third party is working to current conventions is important, but being satisfied that you have communicated your design correctly and that it will help to achieve the goals of the project is equally important. About Polyfoam XPS As part of the technical support we offer to the construction industry, Polyfoam XPS provides U-value calculations that follow the conventions of BR 443 as standard. If you have any questions about this blog post, or require advice about U-value calculations for your project, contact us. Alternatively, to find extruded polystyrene (XPS) insulation products for your ground floor or inverted roof designs, view our complete range of products.
<urn:uuid:7973e33e-6d45-44d1-9ac6-dfd632e18fa5>
CC-MAIN-2022-33
https://polyfoamxps.co.uk/what-do-you-need-to-know-about-the-update-to-br443-the-conventions-for-u-value-calculations/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00077.warc.gz
en
0.946937
773
2.625
3
Monday May 18, 2009 3:25 pm Astronauts Repair Hubble Telescope While we were all leading our mundane lives the past week, astronauts John Grunsfeld and Andrew Feustel spent 7 hours installing a new camera on the Hubble Telescope. This cam replaces one that was built in the 90s and is sensitive to infrared and ultraviolet light as well as the human eye’s wavelengths. As we have previously mentioned, this is NASA’s final trek that over an eleven day period includes replacing a key computer. Read More | Reuters © Gear Live Inc. – User-posted content, unless source is quoted, is licensed under a Creative Commons Public Domain License. Gear Live graphics, logos, designs, page headers, button icons, videos, articles, blogs, forums, scripts and other service names are the trademarks of Gear Live Inc.
<urn:uuid:33bb6044-a910-4bfa-bbb0-5da144f20f56>
CC-MAIN-2017-04
http://www.gearlive.com/news/article/q209-astronauts-repair-hubble-telescope/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00304-ip-10-171-10-70.ec2.internal.warc.gz
en
0.909242
174
1.679688
2
|Family portrait from May, 2008| courtesy blessed life photography |The infamous birthday drawing (those are flowers under Khary, by the way)| Now--his whole life, he's played with a veritable rainbow coalition of kids--including the children of our neighborhood and of course my husband's family, but naturally in our daily lives of secular homeschooling and Unitarian Universalist Sunday school, the majority of kids with whom he interacts are "light like Mommy." (I do make a concerted effort to ensure a more diverse experience when seeking out extracurricular activities.) However, I noticed a curious thing when he was around age 4 or 5: anytime we were with other (black + white) biracial children, he gravitated to them. We'd talk about K or M and note that they and Khary looked somewhat alike--had the same hair, skin tone, etc. Maybe it's the adoptive families with whom we play and learn whose children don't necessarily look like their parents--or like one another, for that matter--that sort of kept that genetic heredity thing from becoming evident. Or maybe it just doesn't occur to kids by this age, though I seem to recall "knowing" it by this time. Whatever the reason, it had never before sunken in for Khary that he is both "brown" and "light" at the same time. So tonight, as I was tucking them in, I answered the ever-present question of what we're doing in the morning with, "Going to the Negro Leagues Baseball Museum. You remember, it's near where we went for the Martin Luther King, Jr. Day Rally?" After jarring his memory with a reminder of what snack we ate on the sidewalk afterward, he recalled the day and then asked, "Who was Martin Luther King, Jr. again?" (Totally forgiveable, as we've been reading a goodly number of biographies lately, and he's as bad with names as his mother.) "You remember, he was the man who helped lead the Civil Rights movement so black people and white people could be equal?" I turned off the light. Then came his worrisome reply: "Oh, yeah. I'm glad he did that. And I'm glad we're white so we wouldn't be treated bad." I flip the light back on, go over to his bed, and the conversation ensues thusly: Me: Honey, you know you're part white like Mommy and part black like Daddy, right? [He nods.] So at the time of Dr. King, you'd be considered half-black, which was the same as anyone else with dark skin like Daddy's or D's [neighbor] to many people of that time. And you couldn't do the same things Dr. King couldn't do as a kid. Khary, a look of astonished fear in his eyes: Oh. I'm really glad Dr. King worked to change that. Me: Yes--me, too. We know it doesn't matter if a person is white or caucasian or black or African-American, that we're all the same on the inside. But it took Dr. King and a whole lot of other people to make sure the laws changed. K: What's caucasian? Me: It's a big word for people who have light skin like Mommy's--it's not really white, though, is it? I'm kind of pink, huh? And "black" is the same as what some people call African-American or "brown"--it's not really black, huh? There's a word from a really old language, negro [which I said with as much of a latin accent I could muster], which means "black," and so African-Americans were called "negroes" [said in that all-American way we all know and disdain today] by some people back then. In fact, we're going to the Negro Leagues Baseball Museum tomorrow. That's why it's called that. K: Wait, they didn't even get to play baseball?! Me: No, isn't that silly and sad? There was a separate baseball league for players who were black--we'll learn about it tomorrow, and some of the players were really fun--and they were all really good. It was totally unfair that they never got to play in the regular Major Leagues. Until Jackie Robinson. We'll learn about him tomorrow, too. He was the first black player to play in the regular Major Leagues. He was a very strong and brave man. K: Why was he brave? Me: Because a lot of people still thought it was wrong for black players and white players to play baseball together. How crazy is that? Those people treated him very badly; they were very mean to him, but he was brave, and strong, and he knew he was doing what was right, and he played anyway. K: What kind of mean things did they do to him? Me: Some people sent him angry letters, some people tried to spit on him at games and throw things at him, and people called him names and made fun of him while he was playing. But he stayed strong and showed what a great player he was. Like I said, we'll learn about some of the Negro Leagues players and Jackie Robinson tomorrow. K: [looks thoughtful and somewhat dejected] Me: Hon, you okay? K: Yeah. So we're all brown--all of us? Me: Yeah--all of us: Daddy, Me, you, Khalil. We're all just different shades of brown. I'm the palest [said with an eyeroll; I am really pale, about which Dawud teases me sometimes.] But you know our skin colors don't make any difference about us--we're all the same on the inside, and we all love the same, like I love you. K: What's pale? Me: It just means I don't have very much color in my skin--that I'm really light. K: Oh! [then with a chuckle:] Yeah, you don't have much color at all! I love you, Mommy. Goodnight. [Many hugs and kisses. Khary still looked worried. End scene.] I came downstairs and relayed the conversation with Dawud, who only a little jokingly agreed with me that he may be waking some tonight with some scary dreams... I know it's a struggle he's going to have for much of his life--figuring out where he fits in this country's crazy view of race--and I can only hope I can help give him the love and tools to feel comfortable in his own skin, no matter the color. |with Daddy at Thanksgiving 2011| |with Mommy on her birthday, January 2012|
<urn:uuid:c0ab6f4c-0c87-4807-86df-278bef44b536>
CC-MAIN-2017-04
http://mamarae.blogspot.com/2012/02/grasping-racial-identityat-six-years.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00249-ip-10-171-10-70.ec2.internal.warc.gz
en
0.988232
1,430
1.640625
2
Let be a Gaussian vector with zero mean and covariance matrix . What is the distribution of the random variable defined by the conditional expectation ? The density of the random vector is of the form: One possible approach is to use conditional densities (as described for example in Grimmett & Stirzaker), in order to get the density of the conditional expectation. Because of the correlation, explicit formula for the conditional density cannot be easily written. Using only the joint density, you could get to an expression of the form: A change of variable seems natural at this point, in order to get to the independence case, but difficulty arises in defining the image of the domain of integration. So this is not really helpful. But there surely is a better way of attacking the problem. Thanks for your help.
<urn:uuid:b2f96b9c-cc45-4243-992e-517c9f0078cc>
CC-MAIN-2017-04
http://mathhelpforum.com/advanced-statistics/122419-gaussian-vector-again.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz
en
0.935373
165
1.898438
2
"We cannot begin to understand how malaria spread to humans until we understand its evolutionary history. In learning about its past, we may be better able to understand the effects it has on us," said Holly Lutz from Cornell University in the US. Researchers took blood samples from hundreds of East African birds, bats, and other mammals and screened the blood for the parasites. When they found malaria, they took samples of the parasites' DNA and sequenced it to identify mutations in the genetic code. The analysis showed that malaria has its roots in bird hosts, from which it spread to bats, and then on to other mammals. The findings were published in the journal Molecular Phylogenetics and Evolution. PTI
<urn:uuid:43c13749-ccb1-45fe-866a-b0b56f9862d5>
CC-MAIN-2017-04
http://health.economictimes.indiatimes.com/news/industry/malaria-1st-spread-from-birds/51558409
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00348-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974425
143
3.796875
4
Every day we are doing lots of our essential work from home through our computer. At the time of work, we need some leisure time. In the leisure time, we need to entertain ourselves. Then we see movie, song, listening music etc. to entertain ourselves. At that time…….“Video file is corrupted or damaged”-Do you like to see this types of things???If you want to open this file in Media player or Video Lan player, you won’t be able to open this file!!! See also: How to lock folder without software? If you want to repair this file, then you will lose the original quality. So, now what you will do???You have to download this file again or buy a new cd/dvd. Offf……!!!!! Want to get rid of this problem?????So…..This is the time to know “how to solve this types of problem?”….There are solutions of every types of problems. So, this problem has, too….To solve this types of problems, you have to follow these steps given below……. The steps are…… 1) Download the software SM player from the link given below…. http://smplayer.sourceforge.net/downloads.php?tr_lang=en 3) Between the installations of this software, this software will download its own code. So when you install this software, you have to on your internet connection. 4) Now try to play a corrupt video firstly in Windows Media player and then in Video Lan player. You will get message as you like. But there is repair option in Video Lan player, but it’s not usable. 5) Now please open the software SM player. 6) Now drag the corrupt video file and play it with this software or in the old way, open the corrupt video file using file>open command. Ohh….!!!!Yes…!!!The file is running…!!! There is another feature in this program and that is ‘subtitle’. For this, click the “Find subtitles on Opernsubtitiles.org…” from the subtitle menu…
<urn:uuid:838ad591-2dfb-4857-a976-7937f4f8aabb>
CC-MAIN-2016-44
http://www.talkandtalkers.com/play-damaged-video-easily/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00425-ip-10-171-6-4.ec2.internal.warc.gz
en
0.892982
450
1.679688
2
Porsche Previews Revolutionary Production Facility for All-Electric Taycan Porsche will use a system of automated guided vehicles similar to what’s used in the aerospace industry. Porsche is quickly pushing its way into an electrified future and its flagship Taycan is leading the way. On Monday the automaker revealed specific plans on how it will build its production line for the electric sedan, more specifically, how the new facility will meet its goal of smart, green, and lean production once it kicks off in 2019. Rather than build another manufacturing location altogether, Porsche decided to modify its Zuffenhausen plant for Taycan production where it will build a factory within a factory, coupling existing infrastructure and services to produce what it calls: "flexi-line production". Using this method, Porsche's production will be easily reconfigurable to meet the needs of other electrified models that are slated to arrive in the near future. Automated Guided Vehicles (AGVs) will navigate Porsche's floor to transport vehicles during the production process, enabling Porsche to say that it will be the first automaker to use the AGVs through the entirety of its vehicle manufacturing process. Similar systems are used by the likes of Boeing to build passenger and cargo planes. Porsche also states that the investment in its company will bring 1,200 new jobs to the plant, servicing both the electrified Taycan as well as the existing lineup of two-door sports cars. The automaker elaborates its goal, which emphasizes knowledge-sharing between experienced and new staff, allows employees to become well-rounded in all things Porsche. Additionally, Porsche says that its knowledge from entering the season six of Formula E will help to better prepare its staff for electrification. The heavy investment in staff and manufacturing equipment is part of Porsche's $7.4 billion investment into electrification. Despite being an astronomically large expenditure, the German luxury sports car maker states that it is still targeting a profit margin of 15 percent across its brand. Profits will be earned by selling digital offerings in addition to its luxury vehicles. “We predict that over 50 percent of Porsche models delivered from 2025 will be electrified,” said the Deputy Chairman of Porsche's Executive Board, Lutz Meschke. "In addition to efficient processes, the revenue from digital products and services should also increasingly contribute to our economic success." Production for the 600 horsepower all-electric Taycan is said to begin in 2019 and may lead to disruption of auto sales among other EV manufacturers. The move towards electrification has been enabled by the recognition of Tesla as a threat to the luxury brand's auto sales. Porsche's North America CEO Klaus Zellmer admitted that some of its potential customers were lost because the options that were being sought out by consumers simply didn't exist in the automaker's product line, but with the introduction of the Taycan that could all change. MORE TO READ Audi Sport E-tron GT Concept to Share Platform With Porsche Taycan, Debut at 2018 LA Auto Show Audi plans to expand its electric vehicle lineup with a promising sports grand tourer. The Porsche Taycan Will Do Zero-to-60 in 3.5 Seconds That’s nipping at the heels of Porsche’s current Panamera Turbo, but how does it stack up to the electric competition? Porsche Announces Taycan EV Performance Specs The Porsche Taycan EV could take Tesla’s performance models by surprise. The Mission E Has a Real Name: Meet the Porsche Taycan Porsche’s slow drip of revelations about the Tesla-fighting electric sport sedan now includes the EV’s actual moniker.
<urn:uuid:7c29212d-6fbf-4751-b308-f271defc26a4>
CC-MAIN-2022-33
https://www.thedrive.com/news/24217/porsche-previews-production-plans-for-all-electric-taycan
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00265.warc.gz
en
0.945046
768
1.578125
2
Reports of Salmonella food poisoning from the Taste of Chicago festival have reached 529 as two people who were sickened after eating the salad served at the Pars Cove booth have sued the restaurant, and many more lawsuits are expected to follow. Chicago Health Department officials have said they believe that shirazi salad served by Pars Cove was responsible for the Salmonella <"http://www.yourlawyer.com/practice_areas/food_poisoning">food poisoning outbreak. Chicago residents Monica Roach, 49, and Willie Smith, 43, were the first people to file suit against the Pars Cove Restaurant. They each allege that the restaurant failed to properly inspect, store or package the food in a way that would prevent bacterial contamination. Roach claims that she sought medical attention after becoming ill with vomiting, diarrhea and fever. Tests confirmed that she was suffering from <"http://www.yourlawyer.com/topics/overview/salmonella">Salmonella poisoning. Smith alleges that he also became ill, but did not seek medical help. Both individuals said they ate at the Pars Cove booth during the festival. Roach is seeking $30,000 in damages, while Smith is seeking a lower, unspecified amount. By noon on Monday, the Chicago Health Department said that it had received 529 reports of suspected Salmonella poisoning related to Pars Cove. Fifty of those have been confirmed as Salmonella, with 36 identified as the bacteria Salmonella Heidelberg. The health department also said that the shirazi, a salad of fresh herbs, tomatoes and cucumbers, was their only suspect in the outbreak. Pars Cove, a popular Persian restaurant, ran a booth at the Taste of Chicago festival that served a variety of Middle Eastern dishes. Salmonella is a potentially deadly type of food poisoning, symptoms of which include fever, abdominal pain, nausea, gas and bloody diarrhea. Symptoms appear within 36 hours of exposure, and usually last four to seven days. In very severe cases, Salmonella can lead to kidney failure and other complications. Salmonella can be particularly dangerous for children, the elderly and people with weakened immune systems. Some victims of Salmonella will develop a disease called Reiter’s Syndrome, a difficult- to- treat condition that causes severe joint pain, irritation of the eyes, and painful urination. Reiter’s Syndrome can plague its victims for months or years, and can lead to chronic arthritis The number of Salmonella cases related to Pars Cove surged over the weekend from just over one hundred on Friday. The Health Department said it attributes that jump to increased awareness on the part of the public to the Pars Cove contamination. On Monday evening, the health department said that the number of reported new cases was starting to taper off. Officials for the Taste of Chicago festival have pointed out that the Pars Cove Salmonella outbreak was the first such occurrence at the festival in its 20 year history. They believe this is an isolated event, and don’t expect it to hurt the festivals attendance next year.
<urn:uuid:b35d303d-db67-453b-9d6d-5bc86eb70769>
CC-MAIN-2017-04
http://www.newsinferno.com/taste-of-chicago-salmonella-food-poisoning-lawsuits-starting-to-be-filed-due-to-salad-served-by-pars-cove/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00153-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970017
632
1.796875
2
Stand out Curry Chicken Seasoning Powder profile,applied in all forms of food solutions including Biscuit, Snack and ect. Flavoring sample totally free Characteristic: Powder Seasonings Packaging: 2kg or 5kg PE Container Curry powder is a compound condiment made from a mixture of spices. The main materials are red pepper, ginger, clove, cinnamon, fennel, nutmeg, coriander seed, mustard, sage, black pepper and so on. the production method originated in India. Curry originated in India. The word "curry" comes from Tamil and means "a lot of spices are cooked together". Indian folklore curry was created by Buddha Sakyamuni, because curry spicy and fragrant can help hide mutton coquettish, this is used to help Indians who do not eat pork and beef. In Tamil, "Kali" means "sauce". Early India was ruled by the Mongols' Mughal empire, during which eating habits from Persia (now Iran) influenced Indian cooking to this day. Curry is made up of a lot of spices, such as cloves, cinnamon, fennel, nutmeg, coriander, mustard, fenugreek, black pepper, chili, and turmeric powder for coloring. And so on. Each of these spices has a unique aroma and taste, some spicy and some fragrant, mixed together, whether with meat, seafood or vegetables, to bloom out of a variety of levels and tastes that seem to conflict and coordinate with each other. Is the most fascinating thing about curry. Curry powder is a kind of curry powder containing A mixture of 5 or more spices. It's golden. The word curry Curry may be derived from the Hindi kari, meaning "spice". Curry originated in India, and locals mix different curries with their own spices. Curry powder is usually used to cover other flavorings, but it can also be used in small amounts to improve the original flavoring of food, such as corn bread, stuffed eggs, soup and sour cream dipping. High quality curry powder, spicy strong, heated with oil after the color does not change black taste is good. Curry Chicken Seasoning Powder,Flavouring Wholesale Myanmar,Food Ingredient Additives Flavouring Curry powder seasoning made in China is less, mainly turmeric, white pepper, chili powder, fennel powder, cinnamon powder, fennel oil and so on. Japanese curry with applesauce or ketchup, sweet taste is more suitable for people who do not like spicy. Our chicken curry powder seasonings with excellent edible vegetable oil, apples, honey with more than 10 kinds of selected spices and stew, specially made into healthy, delicious, convenient and delicious curry pieces. Ingredients: edible oil products (refined vegetable oil (palm oil, hydrogenated rapeseed oil, vitamin E), phospholipids), wheat flour, sugar, edible salt, maltodextrin, curry powder, spices, monosodium glutamate, food additives (5 ≤-. Inosinic acid disodium, phospholipid, citric acid, glycerol monostearate), coconut powder, skim milk powder, tomato powder, honey, water, edible glucose, chili powder, compound seasoning (hydrolyzed soybean protein, monosodium glutamate, edible salt, Sugar, L-alanine, maltodextrin, disodium 5-inosine, yeast extract, glycine), concentrated apple pulp, edible essence; The actual information of the outer packaging of the product shall prevail. Phone: +86-15018706725 (Wechat & Whatsapp) Add: East Dongfeng Road, North of Baiyun Ave, 510440, Guangzhou
<urn:uuid:e6fbc3f2-d406-4844-b69a-01cba1359f5d>
CC-MAIN-2022-33
https://flavoursogood.com/product/curry-chicken-seasoning-powder.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00466.warc.gz
en
0.908669
799
1.890625
2
Invasive plants damage ecosystems and cause economic problems. The Massachusetts Invasive Plant Advisory Group classifies invasive plants as non-native species that spread and cause harm. Many states ban specific plant species in an effort to curb the issue. Planning your landscape to exclude invasive plants and focusing on using native selections also contributes to controlling the situation. Landscapers and homeowners have installed ornamental invasive shrubs in an attempt to add beauty to the landscape. Unfortunately, these plants spread and become hard to control, sometimes pushing out native species. Remove invasive shrub species, such as Japanese barberry (Berberis thunbergii), burning bush (Euonymus alatus) and autumn olive (Elaeagnus umbellate). Dig up the shrub, making sure to get all of the roots. For large species, you may have to use equipment or consult a local business for aid. Amend the soil where the shrub grew with compost to replace nutrients. In place on the invasive shrubs, plant native varieties. They look just as attractive and have the benefit of low maintenance needs. Some varieties to use include winterberry (Ilex verticillata), chokeberry (Aronia arbutifolia), Virginia sweetspire (Itea virginica) and highbush blueberry (Vaccinium corymbosum). These native shrubs add interest through colorful fall foliage, berries and flowers. Vines make up a significant number of plants introduced into a landscape that become invasive. The kudzu vine exemplifies what happens when invasive species spread. Brought into the United States to control erosion, kudzu now covers over 2 million acres of land in the southeast. Fortunately, many locations throughout the country have native species that work just as effectively as groundcovers. Remove any invasive vines. This requires a considerable amount of work since you want to get all of the roots and stems to prevent new plants from forming. Once removed, a heavy layer of newspaper or cardboard over the area can prevent re-growth. Avoid using chemical treatments if possible. Follow any local laws regarding invasive plants and the use of herbicides. Plant native groundovers in place of the invasive species. Choose from plants like woolly dutchman's pipe (Aristolochia tomentosa), Virginia creeper (Parthenocissus quinquefolia), wild ginger (Asarum canadense) and crossvine (Bignonia capreolata). When groundcovers have the appropriate spacing, they fill an area quickly. Use mulch to keep the area looking fresh and clean until the plants fill the space. Native wildflowers make an ideal alternative to invasive species. Many flowers spread easily from their seeds. They can choke out native plant species and provide habitat to damaging insects and animals. For example, purple loosestrife (Lythrum salicaria) spreads rapidly in wetland areas and damages the ecosystem. Treat small areas of invasive flowers as weeds. Pull them, root included, when young for the best results and to prevent them from reseeding. Spread a thick--4 inches or more--layer of mulch to prevent seeds from growing. Large infestations may require advice from a local authority. Plant flowers native to your area as an alternative to invasive choices. They attract beneficial insects and provide food for local wildlife. Choices may include bee balm (Monard didyma), Joe Pye weed (Eupatorium dubium), blue giant hyssop (Agastache foeniculum) and purple coneflower (Echinacea purpurea).
<urn:uuid:19c0bff7-ba95-435f-9910-f10d43287f11>
CC-MAIN-2017-04
http://www.gardenguides.com/107765-landscape-alternatives-invasive-plants.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00565-ip-10-171-10-70.ec2.internal.warc.gz
en
0.899234
743
3.421875
3
1 The word of יהוה that came unto N55Hoshea, the son of Beeri, in the days of Uzziyahu, Yotam, Achaz, and Hezekiah (Chizqiyahu), kings of Judah (Yehudah), and in the days of Jeroboam (Yarovam) the son of Yoash, king of Yisrael. 2 The beginning of the word of יהוה by Hoshea. And יהוה said to Hoshea: “Go, take unto you a wife of whoredoms and children of whoredoms: for the land hath committed great whoredom, departing from יהוה. 3 So he went and took Gomer the daughter of Diblaim; who conceived, and bare him a son. 4 And יהוה said unto him, “Call his name Yizreel; for yet a little while, and I will avenge the blood of Yizreel upon the house of Yehu, and will cause to cease the kingdom of the house of Yisrael. 5 And it shall come to pass at that day, that I will break the bow of Yisrael in the valley of Yizreel. 6 And she conceived again, and bare a daughter. And God (Elohim) said unto him, “Call her name Lo-Ruhamah, for I will no more have mercy upon the house of Yisrael, but I will utterly take them away. 7 But I will have mercy upon the house of Judah (Yehudah), and will save them by יהוה their God (Elohim), and will not save them by bow, nor by sword, nor by battle, by horses, nor by horsemen.” 8 Now when she had weaned Lo-Ruhamah, she conceived, and bare a son. 9 Then said God (Elohim): “Call his name Lo-Ammi, for you are not My people, and I will not become your God (Elohim). 10 Yet the number of the children of Yisrael shall be as the sand of the sea, which cannot be measured nor numbered; and it shall come to pass, that in the place where it was said unto them, ‘You are not My people,’ there it shall be said unto them, ‘You are the sons of the living God (El chai).’ 11 Then shall the children of Judah (Yehudah) and the children of Yisrael be gathered together, and appoint themselves one head, and they shall come up out of the land; for great shall be the day of Yizreel! 1 Say you unto your brethren, ‘My people (Ammi)’; and to your sisters, ‘Mercy is shown (Ruhamah)’. 2 Contend with your mother, contend; for she is not my wife, neither am I her husband; let her therefore put away her whoredoms out of her sight, and her adulteries from between her breasts; 3 Lest I strip her naked, and set her as in the day that she was born, and make her as a wilderness, and set her like a dry land, and slay her with thirst. 4 And I will not have mercy upon her children; for they be the children of whoredoms. 5 For their mother hath played the harlot; she that conceived them hath done shamefully; for she said, ‘I will go after my lovers, that give me my bread and my water, my wool and my flax, mine oil and my drink. 6 Therefore, behold, I will hedge up your way with thorns, and make a wall, that she shall not find her paths. 7 And she shall follow after her lovers, but she shall not overtake them; and she shall seek them, but shall not find them. Then shall she say, ‘I will go and return to my first husband; for then was it better with me than now.’ 8 For she did not know that I gave her corn, and wine, and oil, and multiplied her silver and gold, which they prepared for the Baal. 9 Therefore will I return, and take away my corn in the time thereof, and my wine in the season thereof, and will recover my wool and my flax given to cover her nakedness. 10 And now will I discover her lewdness in the sight of her lovers, and none shall deliver her out of Mine hand. 11 I will also cause all her mirth to cease, her feast days, her New Moons, and her Shabbats, and all her solemn feasts. 12 And I will destroy her vines and her fig trees, whereof she hath said, ‘These are my rewards that my lovers have given me.’ And I will make them a forest, and the beasts of the field shall eat them. 13 And I will visit upon her the days of the 33cBaals (Baalim), wherein she burned incense to them, and she decked herself with her earrings and her jewels, and she went after her lovers, and forgat me,” saith יהוה. 14 Therefore, behold, I will allure her, and bring her into the wilderness, and speak comfortably unto her. 15 And I will give her her vineyards from thence, and the valley of Achor for a door of hope; and she shall sing there, as in the days of her youth, and as in the day when she came up out of the land of Egypt (Mitsrayim). 16 “And it shall be at that day,” saith יהוה, “that you shalt call Me ‘My Husband (Ishi)’; and shalt call Me no more ‘33dMy Lord (Baali)’, 17 For I will take away the names of the Baals (Baalim) out of her mouth, and they shall no more be remembered by their name. 18 And in that day will I make a covenant for them with the beasts of the field, and with the fowls of sky, and with the creeping things of the ground; and I will break the bow and the sword and the battle out of the earth, and will make them to lie down safely. 19 And I will betroth you unto Me forever; yea, I will betroth you unto Me in righteousness, and in judgment, and in lovingkindness, and in mercies. 20 I will even betroth you unto Me in faithfulness; and you shalt know יהוה. 21 And it shall come to pass in that day, I will hear,” saith יהוה, I will hear the heavens, and they shall hear the earth; 22 And the earth shall hear the corn, and the wine, and the oil; and they shall hear Yizreel. 23 And I will sow her unto Me in the earth; and I will have mercy upon her that had not obtained mercy; and I will say to them who were not My people, ‘You are My people!’ And they shall say, ‘You are my God (Elohim)!’” 1 Then said יהוה unto me, “Go yet, love a woman beloved of her friend, yet an adulteress, according to the love of יהוה toward the children of Yisrael, who look to other gods (elohim), and love flagons of wine.” 2 So I bought her to me for fifteen pieces of silver, and for a homer of barley, and a half homer of barley. 3 And I said unto her, “You shalt abide for me many days; you shalt not play the harlot, and you shalt not be for another man; so will I also be for you.” 4 For the children of Yisrael shall abide many days without a king, and without a prince, and without a sacrifice, and without an image, and without an ephod, and without teraphim. 5 Afterward shall the children of Yisrael return, and seek יהוה their God (Elohim), and Dawid their king; and shall fear יהוה and His goodness in the latter days. 1 Hear the word of יהוה, you children of Yisrael, for יהוה hath a controversy with the inhabitants of the land, because there is no truth, nor mercy, nor knowledge of God (Elohim) in the land. 2 By swearing, and lying, and killing, and stealing, and committing adultery, they break out, and blood toucheth blood. 3 Therefore shall the land mourn, and every one that dwelleth therein shall languish, with the beasts of the field, and with the fowls of sky; yea, the fishes of the sea also shall be taken away. 4 Yet let no man strive, nor reprove another, for your people are as they that strive with the kohen. 5 Therefore shalt you fall in the day, and the prophet also shall fall with you in the night, and I will destroy your mother. 6 My people are destroyed for lack of knowledge; because you have rejected knowledge, I will also reject you, that you shalt be no priest (kohen) to Me; seeing you have forgotten the Torah of your God (Elohim), I will also forget your children. 7 As they were increased, so they sinned against Me; therefore will I change their glory into shame. 8 They eat up the sin of My people, and they set their heart on their iniquity. 9 And there shall be, like people, like priest (kohen); and I will punish them for their ways, and reward them their doings. 10 For they shall eat, and not have enough; they shall commit whoredom, and shall not increase; because they have left off to take heed to יהוה. 11 Whoredom and wine and new wine take away the heart. 12 My people ask counsel at their stocks, and their staff declareth unto them; for the spirit of whoredoms hath caused them to err, and they have gone a whoring from under their God (Elohim). 13 They sacrifice upon the tops of the mountains, and burn incense upon the hills, under oaks and poplars and elms, because the shadow thereof is good; therefore your daughters shall commit whoredom, and your spouses shall commit adultery. 14 I will not punish your daughters when they commit whoredom, nor your spouses when they commit adultery; for themselves are separated with whores, and they sacrifice with harlots; therefore the people that doth not understand shall fall. 15 Though you, Yisrael, play the harlot, yet let not Judah (Yehudah) offend; and come not you unto Gilgal, neither go you up to House of Vanity (Beit Awen), nor swear, ‘יהוה liveth’. 16 For Yisrael slideth back as a backsliding heifer; now יהוה will feed them as a lamb in a large place. 17 Efrayim is joined to idols; let him alone. 18 Their drink is sour; they have committed whoredom continually; her rulers dearly love shame. 19 The wind hath bound her up in her wings, and they shall be ashamed because of their sacrifices. 1 “Hear you this, O priests (kohanim); and hearken, you house of Yisrael; and give you ear, O house of the king; for judgment is toward you, because you have been a snare on Mizpah, and a net spread upon Tabor. 2 And the revolters are profound to make slaughter, though I have been a rebuker of them all. 3 I know Efrayim, and Yisrael is not hid from Me; for now, O Efrayim, you committest whoredom, and Yisrael is defiled. 4 They will not frame their doings to turn unto their God (Elohim); for the spirit of whoredoms is in the midst of them, and they have not known יהוה. 5 And the pride of Yisrael doth testify to his face; therefore shall Yisrael and Efrayim fall in their iniquity; Judah (Yehudah) also shall fall with them. 6 They shall go with their flocks and with their herds to seek יהוה; but they shall not find Him; He hath withdrawn Himself from them. 7 They have dealt treacherously against יהוה, for they have begotten strange children. Now shall New Moon devour them with their portions. 8 Blow you the shofar in Gibeah, and the trumpet in Ramah; cry aloud at Beit Awen, ‘Behind you, O Benjamin (Binyamin)!’ 9 Efrayim shall be desolate in the day of rebuke; among the tribes of Yisrael have I made known that which shall surely be. 10 The princes of Judah (Yehudah) were like them that remove the bound; therefore I will pour out My wrath upon them like water. 11 Efrayim is oppressed and broken in judgment, because he willingly walked after the commandment. 12 Therefore will I be unto Efrayim as a moth, and to the house of Judah (Yehudah) as rottenness. 13 When Efrayim saw his sickness, and Judah (Yehudah) saw his wound, then went Efrayim to the Assyrian (Ashshur), and sent to King Yarev; yet could he not heal you, nor cure you of your wound. 14 For I will be unto Efrayim as a lion, and as a young lion to the house of Judah (Yehudah). I, even I, will tear and go away; I will take away, and none shall rescue him. 15 I will go and return to My place, till they acknowledge their offence, and seek My face; in their affliction they will seek Me early.” 1 ‘Come, and let us return unto יהוה; for He hath torn, and He will heal us; He hath smitten, and He will bind us up. 2 After two days will He revive us; on the third day He will raise us up, and we shall live in His sight. 3 Then shall we know, if we follow on to know יהוה. His going forth is prepared as the morning; and He shall come unto us as the rain, as the latter and former rain unto the earth.’ 4 “O Efrayim, what shall I do unto you? O Judah (Yehudah), what shall I do unto you? For your goodness is as a morning cloud, and as the early dew it goeth away. 5 Therefore have I hewed them by the prophets; I have slain them by the words of My mouth; and your judgments are as the light that goeth forth. 6 For I desired mercy, and not sacrifice; and the knowledge of God (Elohim) more than burnt offerings. 7 But they like men have transgressed the covenant; there have they dealt treacherously against Me. 8 Gilad is a city of them that work iniquity, and is polluted with blood. 9 And as troops of robbers wait for a man, so the company of priests (kohanim) murder in the way by consent; for they commit lewdness. 10 I have seen a horrible thing in the house of Yisrael; there is the whoredom of Efrayim, Yisrael is defiled. 11 Also, O Judah (Yehudah), he hath set a harvest for you, when I returned the captivity of My people.” 1 “When I would have healed Yisrael, then the iniquity of Efrayim was uncovered, and the wickedness of Samaria (Shomeron); for they commit falsehood; and the thief cometh in, and the troop of robbers spoileth outside. 2 And they consider not in their hearts that I remember all their wickedness; now their own doings have beset them about; they are before My face. 3 They make the king glad with their wickedness, and the princes with their lies. 4 They are all adulterers, as an oven heated by the baker, who ceaseth from raising after he hath kneaded the dough, until it be leavened. 5 In the day of our king the princes have made him sick with bottles of wine; he stretched out his hand with scorners. 6 For they have made ready their heart like an oven, while they lie in wait; their baker sleepeth all the night; in the morning it burneth as a flaming fire. 7 They are all hot as an oven, and have devoured their judges; all their kings are fallen; there is none among them that calleth unto Me. 8 Efrayim, he hath mixed himself among the people; Efrayim is a cake not turned. 9 Strangers have devoured his strength, and he knoweth it not; yea, gray hairs are here and there upon him, yet he knoweth not. 10 And the pride of Yisrael testifieth to his face; and they do not return to יהוה their God (Elohim), nor seek him for all this. 11 Efrayim also is like a silly dove without heart; they call to Egypt (Mitsrayim), they go to Assyria (Ashshur). 12 When they shall go, I will spread my net upon them; I will bring them down as the fowls of the sky; I will chastise them, as their congregation hath heard. 13 Woe unto them! For they have fled from Me; destruction unto them! Because they have transgressed against Me; though I have redeemed them, yet they have spoken lies against Me. 14 And they have not cried unto Me with their heart, when they howled upon their beds; they assemble themselves for corn and wine, and they rebel against Me. 15 Though I have bound and strengthened their arms, yet do they imagine mischief against Me. 16 They return, but not upward; they are like a deceitful bow; their princes shall fall by the sword for the rage of their tongue; this shall be their derision in the land of Egypt (Mitsrayim).” 1 “Set the shofar to your mouth. He shall come as an eagle against the house of יהוה, because they have transgressed My covenant, and trespassed against My Torah. 2 Yisrael shall cry unto Me, ‘My God (Elohim), we know You!’ 3 Yisrael hath cast off the thing that is good; the enemy shall pursue him. 4 They have set up kings, but not by Me; they have made princes, and I knew it not; of their silver and their gold have they made them idols, that they may be cut off. 5 Your calf, O Samaria (Shomeron), hath cast you off; Mine anger is kindled against them; how long will it be ere they attain to innocency? 6 For from Yisrael was it also; the workman made it; therefore it is not God (Elohim); but the calf of Samaria (Shomeron) shall be broken in pieces. 7 For they have sown the wind, and they shall reap the whirlwind; it hath no stalk; the bud shall yield no meal; if so be it yield, the strangers shall swallow it up. 8 Yisrael is swallowed up; now shall they be among the nations as a vessel wherein is no pleasure. 9 For they are gone up to Assyria (Ashshur), a wild ass alone by himself; Efrayim hath hired lovers. 10 Yea, though they have hired among the nations, now will I gather them, and they shall sorrow a little for the burden of the king of princes. 11 Because Efrayim hath made many altars to sin, altars shall be unto him to sin. 12 I have written to him the great things of My Torah, but they were counted as a strange thing. 13 They sacrifice flesh for the sacrifices of Mine offerings, and eat it; but יהוה accepteth them not; now will He remember their iniquity, and visit their sins; they shall return to Egypt (Mitsrayim). 14 For Yisrael hath forgotten his Maker, and buildeth temples; and Judah (Yehudah) hath multiplied fenced cities; but I will send a fire upon his cities, and it shall devour the palaces thereof.” 1 Rejoice not, O Yisrael, for joy, as other people, for you have gone a whoring from your God (Elohim). You have loved a reward upon every cornfloor. 2 The floor and the winepress shall not feed them, and the new wine shall fail in her. 3 They shall not dwell in יהוה’s land; but Efrayim shall return to Egypt (Mitsrayim), and they shall eat unclean things in Assyria (Ashshur). 4 They shall not offer wine offerings to יהוה, neither shall they be pleasing unto him: their sacrifices shall be unto them as the bread of mourners; all that eat thereof shall be polluted. For their bread for their soul shall not come into the house of יהוה. 5 What will you do in the solemn day, and in the day of the feast of יהוה? 6 For, behold, they are gone because of destruction. Egypt (Mitsrayim) shall gather them up, Memphis shall bury them; the pleasant places for their silver, nettles shall possess them; thorns shall be in their tabernacles. 7 The days of visitation are come, the days of recompence are come; Yisrael shall know it; the prophet is a fool, the spiritual man is mad, for the multitude of your iniquity, and the great hatred. 8 The watchman of Efrayim was with my God (Elohim); but the prophet is a snare of a fowler in all his ways, and hatred in the house of his God (Elohim). 9 They have deeply corrupted themselves, as in the days of Gibeah; therefore He will remember their iniquity, He will visit their sins. 10 “I found Yisrael like grapes in the wilderness; I saw your fathers as the firstripe in the fig tree at her first time; but they went to Baal-Peor, and separated themselves unto that shame; and their abominations were according as they loved. 11 As for Efrayim, their glory shall fly away like a bird, from the birth, and from the womb, and from the conception. 12 Though they bring up their children, yet will I bereave them, that there shall not be a man left; yea, woe also to them when I depart from them! 13 Efrayim, as I saw Tyrus, is planted in a pleasant place; but Efrayim shall bring forth his children to the murderer.” 14 Give them, O יהוה; what wilt You give? Give them a miscarrying womb and dry breasts. 15 “All their wickedness is in Gilgal; for there I hated them; for the wickedness of their doings I will drive them out of Mine house, I will love them no more. All their princes are revolters. 16 Efrayim is smitten, their root is dried up, they shall bear no fruit; yea, though they bring forth, yet will I slay even the beloved fruit of their womb.” 17 My God (Elohim) will cast them away, because they did not hearken unto him; and they shall be wanderers among the nations. 1 Yisrael is an empty vine, he bringeth forth fruit unto himself; according to the multitude of his fruit he hath increased the altars; according to the goodness of his land they have made goodly images. 2 Their heart is divided; now shall they be found faulty. He shall break down their altars, he shall spoil their images. 3 For now they shall say, “We have no king, because we feared not יהוה; what then should a king do to us?” 4 They have spoken words, swearing falsely in making a covenant; thus judgment springeth up as hemlock in the furrows of the field. 5 The inhabitants of Samaria (Shomeron) shall fear because of the calves of Beit Aven; for the people thereof shall mourn over it, and the priests (kohanim) thereof that rejoiced on it, for the glory thereof, because it is departed from it. 6 It shall be also carried unto Assyria (Ashshur) for a present to king Yarev; Efrayim shall receive shame, and Yisrael shall be ashamed of his own counsel. 7 As for Samaria (Shomeron), her king is cut off as the foam upon the water. 8 The high places also of Aven, the sin of Yisrael, shall be destroyed; the thorn and the thistle shall come up on their altars; and they shall say to the mountains, “Cover us!” And to the hills, “Fall on us!” 9 “O Yisrael, you have sinned from the days of Gibeah. There they stood; the battle in Gibeah against the children of iniquity did not overtake them. 10 It is in My desire that I should chastise them; and the people shall be gathered against them, when they shall bind themselves in their two furrows. 11 And Efrayim is as a heifer that is taught, and loveth to tread out the corn; but I passed over upon her fair neck: I will make Efrayim to ride; Judah (Yehudah) shall plow, and Jacob (Yaaqov) shall break his clods.” 12 Sow to yourselves in righteousness, reap in mercy; break up your fallow ground, for it is time to seek יהוה, till He come and rain righteousness upon you. 13 You have plowed wickedness, you have reaped iniquity; you have eaten the fruit of lies; because you didst trust in your way, in the multitude of your mighty men. 14 Therefore shall a tumult arise among your people, and all your fortresses shall be spoiled, as Shalman spoiled Beit-Arvel in the day of battle; the mother was dashed in pieces upon her children. 15 So shall Bethel (Beit-El) do unto you because of your great wickedness. In a morning shall the king of Yisrael utterly be cut off! 1 “When Yisrael was a child (young nation), I loved him, and called My son out of Egypt (Mitsrayim). 2 As they called them, so they went from them; they sacrificed unto Baals (Baalim), and burned incense to graven images. 3 I taught Efrayim also to go, taking them by their arms; but they knew not that I healed them. 4 I drew them with cords of a man, with bands of love: and I was to them as they that take off the yoke on their jaws, and I laid meat unto them. 5 He shall not return into the land of Egypt (Mitsrayim), but the Assyrian (Ashshur) shall be his king, because they refused to return. 6 And the sword shall abide on his cities, and shall consume his branches, and devour them, because of their own counsels. 7 And My people are bent to backsliding from Me; though they called them to the Most High, none at all would exalt Him. 8 How shall I give you up, Efrayim? How shall I deliver you, Yisrael? How shall I make you as Admah? How shall I set you as Zeboim? Mine heart is turned within Me, My compassions are kindled together. 9 I will not execute the fierceness of Mine anger, I will not return to destroy Efrayim; for I am God (Elohim), and not man; the Holy One in the midst of you; and I will not enter into the city. 10 They shall walk after יהוה; he shall roar like a lion; when he shall roar, then the children shall tremble from the west. 11 They shall tremble as a bird out of Egypt (Mitsrayim), and as a dove out of the land of Assyria (Ashshur). And I will place them in their houses,” saith יהוה. 12 Efrayim compasseth Me about with lies, and the house of Yisrael with deceit; but Judah (Yehudah) yet ruleth with God (Elohim), and is faithful with the holy ones. Efrayim feedeth on wind, and followeth after the east wind; he daily increaseth lies and desolation; and they do make a covenant with the Assyrians, and oil is carried into Egypt (Mitsrayim). 2 יהוה hath also a controversy with Judah (Yehudah), and will punish Jacob (Yaaqov) according to his ways; according to his doings will He recompense him. 3 He took his brother by the heel in the womb, and by his strength he had power with God (Elohim). 4 Yea, he had power over the angel, and prevailed; he wept, and made supplication unto him; he found him in Bethel (Beit-El), and there he spake with us; 5 Even יהוה God of hosts (YHWH Elohei Tsevaot); יהוה is His memorial. 6 Therefore turn you to your God (Elohim); keep mercy and judgment, and wait on your God (Elohim) continually. 7 He is a merchant, the balances of deceit are in his hand; he loveth to oppress. 8 And Efrayim said, “Yet I am become rich, I have found me out substance; in all my labors they shall find none iniquity in me that were sin.” 9 “And I that am יהוה your God (Elohim) from the land of Egypt (Mitsrayim) will yet make you to dwell in tabernacles, as in the days of the solemn feast. 10 I have also spoken by the prophets, and I have multiplied visions, and used similitudes, by the ministry of the prophets.” 11 Is there iniquity in Gilad? Surely they are vanity; they sacrifice bullocks in Gilgal; yea, their altars are as heaps in the furrows of the fields. 12 And Jacob (Yaaqov) fled into the country of Syria (Aram), and Yisrael served for a wife, and for a wife he kept sheep. 13 And by a prophet יהוה brought Yisrael out of Egypt (Mitsrayim), and by a prophet was he preserved. 14 Efrayim provoked Him to anger most bitterly; therefore shall He leave his blood upon him, and his reproach shall his Lord (Adonai) return unto him. 1 When Efrayim spake trembling, he exalted himself in Yisrael; but when he offended in the Baal, he died. 2 And now they sin more and more, and have made them molten images of their silver, and idols according to their own understanding, all of it the work of the craftsmen; they say of them, “Let the men that sacrifice kiss the calves.” 3 Therefore they shall be as the morning cloud, and as the early dew that passeth away, as the chaff that is driven with the whirlwind out of the floor, and as the smoke out of the chimney. 4 “Yet I am יהוה your God (Elohim) from the land of Egypt (Mitsrayim), and you shalt know no God (Elohim) but Me; for there is no Savior (Moshia) besides Me. 5 I did know you in the wilderness, in the land of great drought. 6 According to their pasture, so were they filled; they were filled, and their heart was exalted; therefore have they forgotten Me. 7 Therefore I will be unto them as a lion; as a leopard by the way will I observe them; 8 I will meet them as a bear that is bereaved of her whelps, and will rend the caul of their heart, and there will I devour them like a lion; the wild beast shall tear them. 9 O Yisrael, you have destroyed yourself; but in Me is your help. 10 I will be your king; where is any other that may save you in all your cities? And your judges of whom you saidst, ‘Give me a king and princes?’ 11 I gave you a king in Mine anger, and took him away in My wrath. 12 The iniquity of Efrayim is bound up; his sin is stored up. 13 The sorrows of a travailing woman shall come upon him; he is an unwise son; for he should not stay long in the place of the breaking forth of children. 14 I will ransom them from the power of the grave (sheol); I will redeem them from death. O Death, I will be your plagues! O Grave (sheol), I will be your destruction! Compassion shall be hidden from Mine eyes. 15 Though he be fruitful among his brethren, an east wind shall come, the wind of יהוה shall come up from the wilderness, and his spring shall become dry, and his fountain shall be dried up; he shall spoil the treasure of all pleasant vessels. 16 Samaria (Shomeron) shall become desolate; for she hath rebelled against her God (Elohim); they shall fall by the sword; their infants shall be dashed in pieces, and their women with child shall be ripped up. 1 O Yisrael, return unto יהוה your God (Elohim); for you have fallen by 2 Take with you words, and turn to יהוה; say unto Him, “Take away all iniquity, and receive us graciously; so will we render the calves of our lips. 3 Asshur (Assyria) shall not save us; we will not ride upon horses; neither will we say anymore to the work of our hands, ‘Our gods (elohim)’; for in You the fatherless findeth mercy.’” 4 I will heal their backsliding, I will love them freely; for Mine anger is turned away from him. 5 I will be as the dew unto Yisrael; he shall grow as the lily, and cast forth his roots as Lebanon. 6 His branches shall spread, and his beauty shall be as the olive tree, and his smell as Lebanon. 7 They that dwell under his shadow shall return; they shall revive as the corn, and grow as the vine; the scent thereof shall be as the wine of Lebanon. 8 Efrayim shall say, ‘What have I to do any more with idols?’ I have heard him, and observed him; I am like a green fir tree. From Me is your fruit found.” 9 Who is wise, and he shall understand these things? Prudent, and he shall know them? For the ways of יהוה are right, and the just shall walk in them; but the transgressors shall fall therein.
<urn:uuid:4f88c77a-f7c2-42c1-82b9-e76295d443b0>
CC-MAIN-2022-33
https://yhwhsacredscriptures.org/hosea-hosea/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00675.warc.gz
en
0.970118
7,862
1.5
2
There has been a lot of discussion in news media about religious opposition to gay rights. To test these claims, I set out to compare religiosity (as defined by how frequently a given respondent attends religious services) with support for gay rights (in this case, defined as support for gay marriage or civil unions). I also sought to compare the effects of religious denomination on support for gay marriage. In comparing all these variables, I found that religiosity does have a strong impact on support for gay marriage. However, I found that religious denomination (with the exception of moderate Protestants and unaffiliated persons) had a statistically insignificant impact on support for gay marriage. Fernandes, Nick, "What Influences Opposition to Gay Marriage?" (2014). Student Scholar Symposium Abstracts and Posters. 15.
<urn:uuid:a8703ec8-b84a-4041-b088-e15bb63c41ca>
CC-MAIN-2022-33
https://digitalcommons.chapman.edu/cusrd_abstracts/15/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00466.warc.gz
en
0.931362
213
1.804688
2
Britons will spend £2.7bn this summer on more than 50m summer outfits that will be worn only once, a poll reveals. By far the biggest extravagance is new clothing for holidays, where consumers splash out more than £700m on 11m items bought for the trip which will never be worn again, according to research carried out by Censuswide for the charity Barnardo’s. Wedding guests spend an average of £79.76 on a new outfit – nearly 10m of which are expected to only be worn only once. The children’s charity warns this is another example of the huge environmental and financial impact of fast or throwaway fashion, amid growing concerns that the industry is wasting valuable resources and contributing to the climate crisis. It is urging shoppers to consider second-hand clothing rather than only buying new outfits. Javed Khan, Barnardo’s chief executive, said: “Choosing to buy ‘pre-loved’ clothes for a special occasion means you don’t have to worry about bumping into someone wearing the same outfit. “It is also kinder to the environment and your wallet, getting more wear out of clothes which might otherwise only be worn once and end up in landfill.” Despite troubles on the UK high street, the fashion sector has continued to grow and the globalised supply chain has triggered a proliferation of cheap clothing, with a quick turnover that encourages consumers to keep buying. The cut-price online retailer Missguided came under fire recently for launching a £1 bikini. A quarter of those questioned for the poll said they would be embarrassed to wear an outfit to a special occasion such as a wedding more than once, rising to 37% of young people aged 16-24 but just 12% of those over 55. More than half (51%) of those surveyed said buying new clothes for a festival or holiday added to the excitement of the build-up. Following its year-long investigation into fast or throwaway fashion, the cross-party environmental audit committee recently called for a penny tax on every garment sold to fund recycling initiatives, plus a ban on incinerating unwanted clothes – demands rejected by the government.
<urn:uuid:c1917e86-efea-4a4c-9eba-285ce523cef2>
CC-MAIN-2022-33
https://www.theguardian.com/fashion/2019/jul/11/fast-fashion-britons-to-buy-50m-throwaway-outfits-this-summer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00670.warc.gz
en
0.959208
454
1.75
2
Early users of unified comms systems have found that improved customer satisfaction scores higher than cost savings when it comes to assessing the benefits. That’s the surprising conclusion from a survey carried out by Vanson Bourne looking at the way that unified comms has been adopted in the UK. Those manager who had installed a UC system found that customer satisfaction had improved by about 21 percent. That compares with the cost savings of 10 percent and productivity increases of just over 10 percent that the managers reported. The survey, which was sponsored by Dimension Data, also found that there were green benefits too, with travel reduced by nearly 12 percent and a 14.5 percent reduction in carbon footprint. Vuk Trifcovic , senior analyst, Datamonitor said that the improvement in customer satisfaction was an easy way for an IT manager to introduce a unified comms system, "If he can show an immediate improvement in customer satisfaction then it’s very easy to sell the investment in the technology within his company." He said that companies had really begun to seize the opportunities thrown up by unified comms particularly in features such offering contacts via Instant messaging or through a website as well as through phone calls. Trifvoic said that carbon reduction was a really important element of the benefits of unified comms. "The figures in the survey are on the low side; I’d expect to see unified comms being able to reduce travel costs by between 20 and 40 percent," he said. In a statement, Mike Robinson, line of business director for converged communications at Dimension Data, said: "Our study reveals that the promise of unified communications, which is still a relatively new technology, has become a reality in the enterprise. Even the bottom line is feeling a positive impact: one business reported a 15 per cent increase in revenues as a result of unifying their communications. It’s no wonder that the majority of IT managers we talked to see it as crucial to growth."
<urn:uuid:657f0acb-b864-4b6e-92df-926fd88fd846>
CC-MAIN-2017-04
http://www.techworld.com/news/networking/unified-comms-boost-for-customer-satisfaction-102276/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00571-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980668
402
1.648438
2
Learn Everything You Need To Know To Configure MPLS on an Enterprise or Service Provider Network - FOR ONLY $27! What Do I Get? Lifetime access to 15 high quality videos. Answers to tough networking design/implementation questions quickly, without the fluff. Learn the correct way to deploy common networking technologies quickly the first time CCIE Certified Instructor Sam Fitzgerald takes you step by step through the configuring and deploying MPLS on a enterprise or service provider network. - Label Distribution Protocol - Enable MPLS Incrementally in a Network - MPLS Traffic Engineering Tunnel - Defining VPNs - PE to PE Routing Sessions - PE to CE Routing Sessions - Climb the latter of success with Networking Step by Step! - Networking Step By Step - Your Path To Career Success What are the requirements? - General understanding of networking concepts - Willing to learn and have fun! What am I going to get from this course? - Over 16 lectures and 1.5 hours of content! - Learn how to deploy MPLS on an enterprise or service provider network - Learn tips and tricks for making your network converge faster! What is the target audience? - Anybody wanting to learn best practices in deploying MPLS I recommends Buy premimum account for High speed+parallel downloads!
<urn:uuid:bc677362-d431-4340-98e8-6c06d9735c46>
CC-MAIN-2016-44
http://gfxhome.co/510865-cisco-network-ccnp-mpls.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz
en
0.692184
284
1.570313
2
Harris County Public Library offers a variety of downloadable digital materials. With a valid library card, including an iKnow Digital Access card, which provides instant access for Harris County residents, you can download eBooks, audiobooks, movies, magazines, and music. |EBSCO eBook Collection||✔| |Safari Books Online||✔| Check out and download eBooks, eAudio Books, magazines, video and music. Hundreds of popular titles! Audiobooks you can listen to on your computer or Apple or Android device. Stream movies, music, and audiobooks or check out comics and eBooks from your computer or your phone or tablet. The magazines you know and love, available digitally. |Search for and read thousands of books online, some can be downloaded (formerly NetLibrary).| The premier electronic reference library for programmers and IT professionals. There is a limit of five simultaneous users for this resource. |Electronic books for children.| |Get help with eBooks, eAudio, and more.|
<urn:uuid:f2c513e5-a897-46f4-aff3-40e59989e9c6>
CC-MAIN-2017-04
http://www.hcpl.net/ehcpl
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00309-ip-10-171-10-70.ec2.internal.warc.gz
en
0.768356
222
1.5
2
It then should be your aim to produce a report in an adequate granularity. For example, a manufacturer might focus on variances in its inventory purchase price or material yield, while a service-based company might look more at its labor efficiency variance. Subtract the total standard quantity of materials that are supposed to be used from the actual level of use and multiply the remainder by the standard price per unit. Selling price variance. They are: Time delay. Related Courses. Variance analysis also involves the investigation of these differences, so that the outcome is a statement of the difference from expectations, and an interpretation of why the variance occurred. Under this approach, the results of multiple periods are listed side-by-side, so that trends can be easily discerned. Hence source of information is important. For example, if you find a positive sales variance, you do research to find out if it was caused by higher than expected sales prices, greater sales volume, or a more profitable mix of products being purchased by your customers. The actual selling price, minus the standard selling price, multiplied by the number of units sold. You may see this as an advantage because you provide more information but it can lead to confusion. For actual expenses that come in below budget, you want to research and understand whether the cause is a one-time or infrequent event, whether your budget was based on poor assumptions, or whether your company found a way to cut costs on an ongoing basis, among other possible explanations. Positive Budget Variances A budget variance is positive, or favorable, when actual revenue results are higher than budget expectations, or expenses are lower than budget.
<urn:uuid:a590b77b-7f92-4c8f-9e9c-9f66b1e09059>
CC-MAIN-2022-33
https://citajuzilaqi.dellrichards.com/variance-examples-business-report400777396mz.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00477.warc.gz
en
0.926971
341
2.796875
3
Researchers have been testing new cut flower varieties in the field each year for nearly 20 years on behalf of the Association of Specialty Cut Flower Growers (ASCFG), and they’ve been testing the post-harvest performance of those same varieties for the last eight years. Cut flowers might be standout performers in the field or the greenhouse, but if they fade quickly at the retailer or consumer levels, growers need to know. “With new cut flowers, there’s so little we know,” says John Dole, a professor in North Carolina State’s Department of Horticultural Science. “So we try to figure out whether or not the typical consumer or the typical floral preservatives help.” More than 30 cut flower varieties were included in this year’s ASCFG seed trial, and they were each given market appreciation ratings on a 1-to-5 scale at the wholesale, retail and consumer levels. Most of the 30-plus scored at least a 3.5 at the consumer level, but the average rating at the wholesale level was generally less. Such was the case with ‘Cardinal’ basil, which generated a 3.0 wholesale rating and a 3.8 consumer rating. ‘Cardinal’s stem grows more than 15 inches and lasts about 8.5 days post harvest. “‘Cardinal’ has a nice post-harvest life on it, it was productive in the field and it has a nice dark stem,” Dole says. “What’s nice about some basils is they add fragrance in the bouquet. Rarely are people going to buy a whole basil. But the growers like some of these herbs to use in bouquets to add fragrance. The vase life for ‘Cardinal’ was pretty good, but it needs post-harvest solutions.” Sakata’s improved Champion campanulas also rated well in the trials. New from Sakata are improved Blue, Lavender, Pink and White varieties. Although the trials did not reveal huge improvements in the improved Champions, the color on the four is outstanding. Lavender Improved, for example, has a nice soft color. Both Lavender and White were popular in the trials. Another plant with cut flower potential not in the cut flower trials is Pineapple lily (eucomis), which has traditionally been used as a garden plant first. “Eucomis has a very big inflorescence, and a lot of breeders are working on them now,” he says. “Eucomis, in general, is a fantastically long-lived cut flower. It’s just really, really nice. That’s going to be a really nice crop for growers.” Another aspect of cut flowers Dole has been studying is how water quality affects vase life. “We know lower pH is better with most species,” he says. “But what is surprising is some flowers do better when there’s more salt in the water than we first thought. Salt may not be as damaging to flowers as we originally thought post-harvest.” Vicki Stamback, the president of ASCFG, is also president of Bear Creek Farms, one of 18 growers to participate in ASCFG’s cut flower seed trials. Located in Oklahoma (USDA Zone 6b), Bear Creek Farms produces an assortment of cut flowers, from dahlias, freesias and snapdragons to dianthus, tuberoses and zinnias. But of the new cut flower material Bear Creek trialed, three items particular stood out: lisianthus, Asclepias tuberosa ‘Oro’ and campanula. Among Stamback’s best-selling lisianthus this year were PanAmerican Seed’s ABC 1-3, Sakata’s Excalibur, Mariachi and Rosita and Takii’s red and white Arenas. “Lisianthus is just so classic looking, and it’s long,” Stamback says. “Lisianthus are just very vigorous now. We typically get two, even three cuttings off a lisianthus. It would be great if we could ever get some true reds and bluer blues rather than purples. But we’ll get there.” ‘Oro’ is a hit at Bear Creek, as well, but probably because orange is particularly popular in Stamback’s area. “People loved it,” she says. “It was outstanding.” Two campanulas from Kieft-Pro-Seeds were also outstanding performers in Zone 6b: Deep Blue and Pink. “Kieft’s campanulas always do well for us,” Stamback says. “We had more campanula in the greenhouse this year than any other year, and we sold every single stem.” Other good performers in Zone 6b were ‘Volcano Mix’ dianthus from Genesis, the American marigolds from Gloeckner and ‘Queen Red Lime’ zinnia from Benary. “Because of the heat we have, zinnias do really well for us,” Stamback says. “We’ve found ‘Queen Red Lime’ does really well under shade. We can grow them outside in the field, but they have a tendency to wash out a bit. If we grow them under shade, the colors are much more vibrant.” For more information on the varieties in this year’s trials, visit the ASCFG trials website. What else is new and exciting in cut flower varieties for 2011? Let’s take a look at a few rookies on the market: Dianthus ‘Fandango Crimson Picotee.’ From Goldsmith Seeds, this dianthus adds volume and texture to bouquets. It grows about 16 to 18 inches and is fusarium tolerant. Dianthus ‘Sweet Red with White Eye.’ This PanAmerican Seed addition gives growers strong and straight stems, along with shiny leaves. No vernalization is required to produce unique, sweetly fragrant flowers. Flower heads are loaded with vibrant, red-with-white-eye blooms that last. Dutch Iris ‘Rendezvous.’ This new Fred C. Gloeckner variety has large purple flowers, adding another color to the color range for greenhouse production. ‘Rendezvous’ is ideal for outdoor cut flower production.’ Kale Lucir. This new American Takii series features shiny-leafed cut flower kale. Lucir has round leaves with a distinctive shine, and they’re bred specifically for cut flower use. Red and white are the two available varieties. Lily ‘Trebbiano.’ This LA lily from Zabo Plant produces strong stems with three or more blooms. ‘Trebbiano’ has a cool green color that’s especially popular in Western Europe. Lisianthus ‘Vulcan Purple Picotee II.’ New from GeoSeed, this lisianthus has large cup-shaped flowers on strong sturdy stems. It also has a uniform and stable purple rim. Its extra thick, firm petals are more durable in shipping and give a long vase life.
<urn:uuid:70649ce7-4ab4-48c4-b505-89a00fe1e0a0>
CC-MAIN-2017-04
http://www.greenhousegrower.com/home/classic-cut-flowers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00366-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944949
1,580
1.625
2
Solution Summary: Portable Storage Utility Cart Portable storage utility carts typically have shelves with leveled-surfaces or open-bins that roll on wheels carrying tools and material. A portable storage, or utility, cart is an engineering control that can reduce musculoskeletal disorders (MSD) from manual material handling. These carts typically have shelves with leveled-surfaces or open-bins that roll on wheels to help carry tools and material. Transporting tools between locations on a worksite can be a strenuous task. When portable work benches are not available, tools often are put on the floor, creating a safety hazard for other workers. Portable storage carts, such as those from Rubbermaid®, make transporting tools easier and allow for easy storage. Rubbermaid® carts come in a variety of designs to handle specific tasks. Some are designed for easy transport and others are equipped with more storage options. Most of the industrial grade products from Rubbermaid® have wheels for increase portability. The wheel sizes range from large to small, allowing for use in multiple work locations. The carts have weight capacities that range from 250-500 pounds. When there is not a portable work bench or cart available, the floor oftentimes becomes the new work surface. Most portable storage carts designed for construction have a level surface on top that doubles as a work surface. Heavy lifting and carrying and stooped postures can cause low back disorders, such as muscle strain or a disc herniation (“slipped disc”), which is bulging of disc material possibly pressing on the spinal cord or nerves that go into the leg. Portable storage carts may help to reduce worker heavy lifting and carrying and stooped postures by providing workers with surface that can easily transport materials and, often times, double as a level work space at waist height. How Risks are Reduced: On nearly every construction site, tools need to be carried between different work locations. Tools are often heavy or difficult to carry, which increases stress on the worker’s body. After tools are moved to the site where they will be used, they are often placed on the floor, which creates a trip hazard. Work with the tools frequently takes place on the floor, causing awkward stooping of the back. Manufacturers claim that portable storage cart design, along with specialized handles and casters, reduces muscle strain when transporting heavy loads. The top surface of many specialized carts, which double as work surfaces, are constructed of durable material that prevents cracking and shattering. Effects on Productivity: The use of portable storage carts has little or no impact on productivity. The design of many of portable storage carts makes them versatile in different environments, but due to the wheels on most of the models, a smooth surface is required for safe transportation. Some of the models with larger wheels may be able to navigate rougher surfaces. However, other carts, especially when loaded down with 250-500 lbs, will be unable to roll over uneven or soft surfaces, such a gravel or dirt. Dan Anton, PT, PhD, ATC and Cassie Malecha, DPT – Eastern Washington University
<urn:uuid:a7d8c794-aa12-464e-8b22-dfdb6068312e>
CC-MAIN-2022-33
https://www.cpwrconstructionsolutions.org/reinforced_concrete/solution/687/portable-storage-utility-cart.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00073.warc.gz
en
0.937512
669
2.828125
3
Windows 10 Adoption Slows The operating system's market share is now at 8 percent, far behind Windows 7. Microsoft's Windows 10 is still gaining ground, but upgrades have slowed, according to new stats. Windows 10 now has 7.9 percent market share in the worldwide desktop computer market, NetMarketShare revealed on Sunday. While that still represents millions of computers, it's only up 1.3 percentage points over the last month. For comparison, Windows 10 market share grew 1.4 percent in September, according to NetMarketShare. As of Nov. 1, about 56 percent of the world's PCs run Windows 7, followed by Windows XP at 11.7 percent and Windows 8.1 at 10.7 percent. Microsoft launched Windows 10 in July as an operating system for all device types, from desktops and laptops to phones and tablets. For the first time, Redmond offered its new OS as a free upgrade to those on Windows 7 and 8.1. And while millions of adopted Windows 10, others are apparently hesitant to leave the comfort of Windows 7. Can Microsoft and its partners get people to pick up Windows 10-based devices this holiday season? Stay tuned.
<urn:uuid:4dc372ce-6c8d-4df7-9219-619976169a6c>
CC-MAIN-2017-04
http://www.pcmag.com/article2/0,2817,2494276,00.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00281-ip-10-171-10-70.ec2.internal.warc.gz
en
0.939226
244
1.507813
2
Erstellt am: 11. 1. 2016 - 10:51 Uhr Today's Webtip: How to write a (rap)song My son is a classically trained musician. He has recently decided to start experimenting with writing music for some of his video making projects and came to me for some help. I was classically untrained punk singer. I never really got around to dealing with things like music theory or song structures. I just spent time in a practice room with some friends and we made noise. Needless to say, my personal experience wasn't going to be of much use. So I did what i always do. And found some fairly decent results. Very simple introductions to the basics of song structure and beat production. We started with a video. And followed that up with a blog post from an independent rap producer that was surprisingly useful. Cole Mize also has other posts also focusing on things like how to approach the creative process of songwriting, how to memorise lyrics and a whole lot of other 101 level information that might be useful for anyone who doesn't have easy access to friends with experience.
<urn:uuid:c8d96fcb-7501-4447-a9a7-30ed628784c0>
CC-MAIN-2017-04
http://fm4.orf.at/stories/1766129/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00472-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970193
233
2.28125
2
Britain faces a “Covid decade” of upheaval due to social and economic inequalities created and made worse by the pandemic, a landmark review has concluded. Major changes to the way society is run in the wake of the pandemic are needed to mitigate the impact of the “long shadow” cast by the virus, the British Academy report found. Published today (23 March) on the anniversary of the UK’s first lockdown, the report brings together more than 200 academic social science and humanities experts and hundreds of research projects. It was commissioned last year by the Government Office of Science. The British Academy warned that failure to understand the scale of the challenge ahead and deliver changes would result in a rapid slide towards poorer societal health, more extreme patterns of inequality and fragmenting national unity. “With the advent of vaccines and the imminent ending of lockdowns, we might think that the impact of Covid-19 is coming to an end. This would be wrong. We are in a Covid decade: the social, economic and cultural effects of the pandemic will cast a long shadow into the future – perhaps longer than a decade,” it said. The British Academy cautions against over optimism as the UK thinks about recovery from Covid, however, warning that it is “no ordinary crisis” that can be fixed by a return to normal, but one that thrived amid pre-existing social deprivations and inequalities and which has exposed deep-seated flaws in public policy. “In sum, the pandemic has exacerbated existing inequalities and differences and created new ones, as well as exposing critical societal needs and strengths. These can emerge differently across places, and along different time courses, for individuals, communities, regions, nations and the UK as a whole,' it said.
<urn:uuid:29c7a852-d7c5-475e-bbe3-16d9a2fc67c6>
CC-MAIN-2022-33
https://www.fruitnet.com/fresh-produce-journal/uk-faces-covid-decade-says-report/184750.article
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00266.warc.gz
en
0.961823
373
2.3125
2
A measure coming up for a vote this fall would require San Jose employers to offer more hours to part-time workers before bringing on new hires. The City Council on Tuesday, in its final meeting before the summer recess, will vote on whether to run the full text of the “Opportunity to Work” initiative on the November ballot and whether to allow rebuttals, which would up the cost. Silicon Valley labor leaders asked the council to adopt the proposal as an ordinance, which would save the $928,000 it costs to bring it to voters. But it looks like it’s headed to the General Election ballot. The proposal, backed by the South Bay Labor Council, exempts businesses with fewer than 35 employees. Proponents say it would up wages for 64,000 part-time workers in San Jose. Those employees are predominantly women and minorities, according to a study published earlier year. Critics, including the San Jose Silicon Valley Chamber of Commerce, fear the measure would hurt businesses by limiting their ability to hire a workforce that meets their needs. Councilman Johnny Khamis urged voters to kill the measure and said the city should pay the extra cash to include a rebuttal on the ballot. The proposal, he said, should more aptly be called the “Opportunity to Destroy Jobs” initiative. “The initiative will eliminate job opportunities for non-privileged students who, like me, work part-time to put themselves through college so that they can make a better life for themselves and their families,” he wrote in a scathing memo. Proponents argue that the initiative remedies an abusive employment practice, which businesses take advantage of to avoid paying benefits. The result is a crisis of under-employment that forces part-time workers to take on multiple jobs with no benefits. More from the San Jose City Council agenda for June 28, 2016: - The city has identified a possible site for a "tiny home" community to house the homeless, a property on Evans Lane near Curtner Avenue in south San Jose. - Churches and other religious organizations will be able to offer temporary shelter to the homeless if the city suspends permitting requirements. - The city plans to spend $5 million over the next three years to house homeless veterans. According to the latest homeless census, Santa Clara County is home to the fifth largest population of homeless military veterans in the nation. WHAT: City Council meets WHEN: 1:30pm Tuesday WHRE: City Hall, 200 E. Santa Clara St., San Jose INFO: City Clerk, 408.535.1260 This article has been updated.
<urn:uuid:4902afa6-e92d-4347-b21d-aca9ea22957d>
CC-MAIN-2022-33
https://www.sanjoseinside.com/news/ballot-measure-would-boost-hours-for-part-time-workers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00272.warc.gz
en
0.953814
543
1.59375
2
Publication Date: July 11, 2002 Series: John Dewey Lecture Series In this engaging and accessible volume, Jane Roland Martin develops a brilliantly innovative approach to education that illuminates one of the most pressing issues of our day—the passing down of “cultural liabilities,” such as violence in the home, school, and world at large and hatred of other races, religions, genders, ethnicities, or sexual orientations. By encouraging readers to look at education from the standpoint of culture, new questions emerge: How is a culture’s wealth to be defined? Who is qualified to contribute to it? How can we preserve a culture’s assets for the next generation? Jane Roland Martin is Professor of Philosophy Emerita at the University of Massachusetts, Boston. “Jane Roland Martin addresses one of the most important questions facing any culture, made critical today by the surge in the ubiquitous educating that surrounds us….Her answers are a wake-up call for everyone, not just educators.” — John Goodlad, President, Institute for Educational Inquiry "Jane Martin gives us the single most important key to improving education: excitement about how to do it. She shows us ways to pass on the new cultural abundance, divorce difference from inequality, replace the private property model of learning with the gift model, and trade isolated students for knowledge-sharing citizens. In the midst of despair about schools, she creates ideas and hope." — Gloria Steinem “How can cultures preserve and transmit their cultural assets but not their cultural liabilities? Martin's "cultural wealth" approach to this question succeeds where Plato, Rousseau, Dewey, and contemporary critics and reformers of education could not. Martin's analysis is thought-provoking and fun to read.” — Sandra Harding, Graduate School of Education and Information Studies, UCLA
<urn:uuid:f96f498c-c13e-4d4b-9994-7a9798d601ca>
CC-MAIN-2022-33
https://www.tcpress.com/cultural-miseducation-9780807742396
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00068.warc.gz
en
0.911084
391
3.171875
3
Today is National Census Day. By today, every home in America should have received a census form. Citizens may respond by mail, by phone, or online. The census is required by the US Constitution in order to apportion the House of Representatives according to the population of the states. Census data are also used to allocate some $1.5 trillion in federal funding to states and localities. Population registers go back at least to the Han dynasty in China (206 BC–AD 220). Europeans used parish records of baptisms, marriages, and burials. Today, such registries are digitized. One thing COVID-19 is teaching is us that every person matters. One infected person can infect others who infect others. As hospital systems debate ways to care for more patients than they have the capacity to serve, we are rediscovering the intrinsic value of every human being. This value is known in Christian theology as the “sanctity of every life.” Why your life matters unconditionally to your Father This doctrine is grounded in the fact that every human being is uniquely created by God in his image (Genesis 1:27). We are all descendants of the same original parents. As Peter was shocked to discover (Acts 10:9–16), “God shows no partiality” (v. 34). Paul agreed: “There is neither Jew nor Greek, there is neither slave nor free, there is no male and female, for you are all one in Christ Jesus” (Galatians 3:28). As a result, our lives are sacred from conception to natural death. Such sanctity is not derived from us—we are all sinners who fall short of God’s glory (Romans 3:23). Rather, it is derived from our status as the creation of a God who loves us unconditionally (cf. John 17:23). This love is especially proven in the events we will remember next week. Henri Nouwen noted: “On the cross, Jesus has shown us how far God’s love goes. It’s a love that embraces even those who crucified him. When Jesus is hanging nailed to the cross, totally broken and stripped of everything, he still prays for his executioners: ‘Father, forgive them; they do not know what they are doing.’ Jesus’ love for his enemies knows no bounds. He prays even for those who are putting him to death.” Now our Savior calls us to love others as he loves us. However, as Nouwen notes, “To forgive our enemies doesn’t lie within our power. That is a divine gift.” His love “empowers you to take the way that Jesus has taken before you: a narrow way, a painful way, but the way that gives you true joy and peace and enables you to make the non-violent love of God visible in this world.” In your Father’s universal census, you are as valuable as Mother Teresa or Pope Francis. If you were the only person who had ever sinned, his Son would have died just for you. Charles Spurgeon was out hiking one day and came across a windmill with the words “God Is Love” turning in the breeze. He asked the farmer, “Do you mean that God’s love is as shifting as the wind?” The farmer smiled and explained, “Not at all. I mean that no matter how the wind blows, God is still love.” What winds are blowing your windmill today?
<urn:uuid:3faf62bb-fcbe-4cd9-bc4f-e616360d946f>
CC-MAIN-2022-33
https://www.denisonforum.org/current-events/politics/today-is-national-census-day-why-your-life-matters-unconditionally-to-your-father/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00479.warc.gz
en
0.967925
754
2.125
2
The Monster Map is intended to serve as reminder of some of the more unique and abstract folklore traditions that we have in the USA. I have a strong interest in cultural anthropology and the art of storytelling, and in this age of homogenized consumer culture I think it’s more important than ever to embrace the elements that make our town/state/nation special. My hope is that people can find something to celebrate in them – be it pride of place, a reminder of how special their hometown is, or maybe just an excuse to start a conversation at the bookstore or frameshop. Monster’s in America: A Cryptozoological Map of the USA started with a healthy amount of research in to the world of cryptozoology. Loren Coleman’s body of work was hugely important to me, and a visit to his museum (the International Cryptozoology Museum in Portland, ME) last summer really kicked the research up a level. Once the initial set of data was gathered, I set out to edit it all down to the point where I could allow sufficient room for the illustrations to live. I should add that by no means am I claiming that this is a definitive list of cryptids in the USA – rather a compilation of what I consider to be 32 important ones. We were founded as a free nation by people who refused to do and think what others told them to. Stay free and weird people… it’s our birthright, and quite possibly, our obligation. More info: hogislandpress.com Monsters in America: A Cryptozoological Map of the United States 15KviewsShare on Facebook
<urn:uuid:8816231d-4d6e-47d0-9614-18b8247c139c>
CC-MAIN-2017-04
http://www.boredpanda.com/monsters-in-america-cryptozoological-illustrated-map-usa/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00137-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953912
337
1.726563
2
My friend was telling me about a habit in the Spanish culture (I'm not sure if it's done elsewhere as well) of leaving the avocado seed inside when making guacamole. The claim is that if you leave the seed inside the guacamole, something in the seed prevents the guacamole from browning. I'm a little skeptical - I thought that the browning was due to oxidization. If that's the case, then I don't see how a seed could help in preventing oxidization. Am I missing something? Is this true, or just a myth?
<urn:uuid:66918821-7c8f-41e5-b796-df4255877215>
CC-MAIN-2022-33
https://cooking.stackexchange.com/questions/24601/does-an-avocado-seed-help-guacamole-stay-green?noredirect=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00073.warc.gz
en
0.952787
122
1.90625
2
Inside the black box of organizational life: The gendered language of performance assessment Organizations implement formalized procedures to eliminate the biasing effects of gender and other characteristics on evaluations. Prior work shows managers play a key role, but researchers have been unable to observe the thought processes guiding managers’ evaluations. This article takes a first step in examining managers’ sensemaking as they interpret and evaluate employee behaviors. Our data include managers’ written performance reviews and numeric ratings of employees at a Fortune 500 technology company. Our theoretical model—the Viewing and Valuing Social Cognitive Processing Model—explains how and when gender beliefs frame managers’ evaluations, affecting what behaviors managers notice (i.e., view) and rate highly (i.e., value). After conducting a detailed coding of the language in reviews, we assess whether there are gender differences in (1) the language used to describe performance (i.e., viewing differences) and (2) the correlations between that language and numeric ratings (i.e., valuing differences). Our analysis of 88 language attributes reveals where gender frames managers’ evaluations and where the process instead operates gender-neutrally. For example, men and women are equally likely to be described as having technical ability, while women are viewed as too aggressive and men as too soft. Furthermore, some behaviors, such as “taking charge,” are more valued for men than for women: “taking charge” is associated with the highest performance ratings for men but not for women. Overall, our analysis identifies novel ways that gender biases emerge in a process intended to be meritocratic.
<urn:uuid:1560666d-f718-42b0-9f70-65c83888d079>
CC-MAIN-2022-33
https://sociology.stanford.edu/publications/inside-black-box-organizational-life-gendered-language-performance-assessment
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00676.warc.gz
en
0.928778
330
2
2
Remember that the work of the composition is to generate a point. Narrative essays are told from a defined point of view, frequently the writer’s, consequently there is experience in addition to special and frequently sensory particulars offered to find the reader a part of the components and sequence of the story. Writing a narrative composition is exceptionally like a storytelling. Narrative documents are generally a story type. A story composition is among the complete many customized sorts of essay you may write. To set it in brief, narrative essays have some essential distinctions from nearly all academic texts. As you create a story composition, you’ll must attempt to take it easy a little over when you compose an academic post. A writer might not have to do any investigation in any way so as to compose a convincing story essay. He ctiation machine is needed to compose the documents from a given perspective. He’ll need to determine what expertise they experienced or found out about this they might desire to devote the tale. It typically leads to mentalhealth issues including depression and panic. It is similarly vital to notice that as the writer starts to compose the story essay, they should recall the reality that the readers haven’t any advice whatsoever about the topic of your narrative. On the opposite hand, authors who aren’t capable to discuss their feelings properly alter the focus of the readers. Because it is possible to observe, there’s an whole abundant number of topics for creating a narrative composition that may fluctuate significantly. When you’ve chosen a theme, make an outline of the principal info you desire to include. Whatever composition subject you select you need to be considering the matter and familiar by it. Choosing the narrative composition issue is an ambitious undertaking to several students. It’s always outstanding to pick the perfect story essay subject for the work. You’re composing a narration, you happen to be attempting to find the readers a part of your storyline. All your dissertation has to do is give a treatment for a problem. If you start your story in the first person single, say, utilize that during. Narrative writing makes it really simple that you’ve got the skill to link various occasions and stories. Writing an excellent jointly with understandable story because of the fact that many students will vie is never square. Essays can be found in several forms. Narrative composition is among the most fascinating sorts of documents. Narrative article, greater than every other sort of a personalized essay, has to be graphic. Should you require narrative documents from us, you must consistently do not hesitate to get in touch with us for we supply the very finest and first-class quality narrative papers. It’s recommendable to create narrative documents from scratch to be able to foster originality and creativity. A standard ; proper narrative papers writing company should always have these characteristics so that you can supply the most effective narrative documents to pupils.
<urn:uuid:73025fc6-3122-4653-831f-4b2d6baedfbd>
CC-MAIN-2022-33
https://www.golfsherwood.com/suggestions-to-creating-a-professional-online/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00678.warc.gz
en
0.946015
596
2.59375
3
MADISON, Wis. - In this We the People Fact Finder report, WISC-TV looks at a question one viewer had after seeing a recent ad about Republican candidate for governor Scott Walker and pension funds. Pat Gilbert of Madison asked: "Did Scott Walker borrow $400 million to correct a problem with pension funds?" The city of Milwaukee and Milwaukee County had two very different pension dilemmas, but an ad from Democrat Tom Barrett, who is Milwaukee's mayor, leads viewers to think the dilemmas are the same, WISC-TV reported. "Under Tom Barrett, the city of Milwaukee met the crisis head on, and Barrett used smart budget cuts to help solve the problem," says the ad. A WISC-TV analysis found this needs clarification. The city of Milwaukee's pension issues last year amounted to a $49 million shortfall in the pension fund following the 2008 drops in the stock market. Milwaukee County's gap was 20 times that. Barrett did make cuts rather than borrow money to balance the city budget, but he also raised the tax levy about 4 percent to cover the shortfall, WISC-TV reported. "In Milwaukee County, Scott Walker borrowed $400 million, and passed the pension debt onto the next generation," says the ad. A WISC-TV analysis found this also needs clarification. It's true that Walker, who is the Milwaukee County executive, was supportive of a move by Milwaukee County to issue $400 million in pension obligation bonds to help cover a nearly $1 billion long-term shortfall in the pension fund. What does that mean? Essentially the county borrows money at a low interest rate, invests it at a higher interest rate and hopes to profit. That of course is all dependent on the market. In this case, $400 million was borrowed at about a 6 percent interest rate, then put into the pension fund, where the assumed rate of return is 8 percent. That 2 percent difference goes to increase the pension fund as well. Walker called it a cost-savings move, saying in the long run it could make the county $237 million over 35 years. But it's risky considering market fluctuations, WISC-TV reported. Last year, the pension fund made 22 percent, according to the county budget director, and this year it's likely to be only 1 or 2 percent. To further compare, the city of Milwaukee's pension fund is now more than 100 percent funded. Milwaukee County's, while making strides, is only about 93 percent funded. If you have a political claim you'd like checked out, send it to firstname.lastname@example.org. - Walker says new numbers show state's economy up - Assembly speaker says his job is harder than governor's - Vos: Gas taxes 'probably not' going up in Wisconsin - Rep. Moore to attend inauguration despite concerns - Assembly speaker says he'd rather up aid than cut tuition - Wisconsin Assembly speaker Vos says fall budget action possible
<urn:uuid:bb21066d-6a09-4f82-9009-0cc602fef084>
CC-MAIN-2017-04
http://www.channel3000.com/news/politics/reality-check/reality-check-ad-takes-aim-at-walker-on-pension-funds/155181880
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00141-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953706
616
1.5625
2
America’s respected Centres for Disease Control and Prevention has predicted there could be up to 1.4million cases of deadly Ebola by the end of January. The CDC, which successfully treated two US doctors infected with the disease, released the worrying report based on assumptions that cases have been dramatically under reported. The Centre’s scientists believe there may be as many as 21,000 reported and unreported cases in just Liberia and Sierra Leone alone by the end of this month. The World Health Organisation has already warned the number of people infected with the Ebola could reach 20,000 by the beginning of November if steps to contain the outbreak are not accelerated. Already the outbreak has killed around 2,800 people in five West African countries this year while an estimated 5,800 people have been infected with the virus, which has no known cure. "It is still possible to reverse the epidemic, and we believe this can be done if a sufficient number of all patients are effectively isolated, either in Ebola Treatment Units or in other settings, such as community-based or home care," said Tom Frieden, director of the Centres for Disease Control and Prevention. "Once a sufficient number of Ebola patients are isolated, cases will decline very rapidly – almost as rapidly as they rose. "A surge now can break the back of the epidemic." The epidemic has overwhelmed the health care systems in numerous African countries, which rank among the world's poorest.
<urn:uuid:373e064c-4ce7-4d6c-b2ca-82057a836d61>
CC-MAIN-2017-04
http://www.mirror.co.uk/news/world-news/ebola-outbreak-could-reach-14-4311311
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00473-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96547
297
3.15625
3
“They are our neighbours. They work relentlessly from dawn ‘til dusk. They are organic BC Grain Farmers and they are the inspiration for everything we do.” Organic Stone Ground BC Grown Red Fife Heritage Wheat - Red Fife Wheat is the genetic grandparent of most Canadian wheat grown today and a vital part of modern wheat breeding in Canada and much of the world - Its name is derived from David Fife, a farmer in the Peterborough area, who in 1842 began growing some kernels he received from Scotland. The wheat flourished like nothing before it had in Canada. - Over time, Red Fife wheat was hybridized with other varieties for reasons of better disease resistance, improved yields and shorter growing season. One factor not considered was the effects of hybridization on the TASTE! - Red Fife is characterized by an exceptional nutty and robust flavour. - At True Grain, we slowly stone mill Organic Red Fife Grain at low temperatures to preserve the flavour - Our signature wheat breads, such as our Red Fife Sourdough and Cracked Grain are made exclusively with Red Fife. Our Red Fife Ginger Cookies are also our most popular. Look for the Red Fife symbol on our menu and shelf signage - Our Red Fife is available in whole-ground, sifted, whole kernel, cream of Red Fife porridge and Red Fife bran - More information Red Fife Factsheet - Read the Ode To David Fife Organic Stone Ground BC Grown Spelt - Spelt is a cereal grain that is believed to have evolved as a hybrid of emmer and a wild goat grass. - Spelt is growing in popularity among discerning North American consumers who value its nutty flavour and high nutritional value. - Spelt has been recognized for its high protein content (about 10-25% higher than that of conventional hard red wheat), broad spectrum of easily absorbed nutrients, its exceptional hypoallergenic properties, and its suitability as an organically grown crop. - At True Grain Bread we make our Whole Spelt with certified organic whole spelt grain grown in Armstrong, BC. The grain is milled freshly at True Grain Mill and naturally leavened, with the addition of water, salt and a hint of flax. True Grain Bread’s whole spelt is a golden brown, dense flavourful loaf. - Our light spelt and spelt baguettes are made with sifted spelt flour. The removal of the dense bran in the milling process creates a lighter fluffier loaf with a unique spelt flavour. - Our Spelt is available in whole-ground sifted kernel porridge or bran email us for details firstname.lastname@example.org - more information Spelt Factsheet Organic Stone Ground BC Grown Khorasan - Khorasan is the third oldest of the ancient grains (after einkorn and emmer) - Khorasan is thought to be the ancestor of todays durum wheat family. Durum wheat is particularly favourable for making pasta. - The most popular brand of khorasan is Kamut® (pronounced “Ka’moot”) is an ancient relative of modern durum wheat. Kamut®’s name is comes from the ancient Egyptian word for “wheat” - Khorasan wheat may be a good alternative for those suffering from wheat sensitivities. Khorasan is a wheat, but since it is in a simpler form the gluten structure is different than todays modern wheat varieties. - At True Grain Bread, the Khorasan Pumpkinseed loaf is quickly becoming one of the most popular loaves due to its unique characteristics and “wheat free” following. - Our Khorasan is available in whole-ground sifted or kernel – email us for details email@example.com Organic Stone Ground BC Grown Emmer - Emmer is a delicate long grain with an exceptional full-bodied taste. - Emmer Emmer is an ancient hulled grain whose ancestory dates back over 8,000 years and is believed to be a cross between Einkorn and a wild grass. - It was the first cereal grain cultivated by humans and is largely credited with allowing humans to evolve from hunter gatherers to agricultural societies. - Our experience is that manny people who suffer from non-celiac gluten sensitivity find they can digest Emmer products because of its simple genetic make-up (28 chromosomes vs 42 in modern wheat) - Our Emmer is available in whole-ground sifted kernel porridge or bran – email us for details firstname.lastname@example.org Organic Stone Ground BC Grown Rye - Rye is a grass grown extensively as a grain and as a forage crop. It is a member of the wheat tribe and is closely related to barley and wheat. - Rye grain is used for flour, rye bread, fermented for alcoholic beverages. It can also be eaten whole, either as boiled rye berries, or by being rolled, similar to rolled oats. - Rye flour has a lower gluten content than wheat flour, and contains a higher proportion of soluble fiber. - Rye bread is a widely eaten food in Northern and Eastern Europe. A whole rye bread is typically very dense. It is often lightened by mixing with wheat or less commonly by sifting off the heavy outer component of the kernel, the bran, and using the flour. - Our rye is available in whole-ground sifted kernel or bran – email us for details email@example.com - More information Rye Factsheet Organic Stone Ground Island Wheat - We are the ONLY commercial source of (certified) organic Vancouver Island Grown Wheat - Vancouver Island Farmers used to grow much of their own grain in the early 1900’s. In the last 50 years the grain farmer as well as the whole infrastructure that supported the local grain growing industry has all but disappeared. - We have partnered with passionate organic grain farmers on Vancouver Island to grow and mill this great tasting wheat that helps us secure our planet as well as our food security. - Our Organic Island wheat is available in whole sifted or bran while quantities are available. We may also have access to non-organic Island Grown wheat. email firstname.lastname@example.org for more information
<urn:uuid:805d3cdc-1a59-4ab9-8a40-83a388c54d4c>
CC-MAIN-2022-33
https://www.truegrain.ca/pages/farming
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00472.warc.gz
en
0.93179
1,338
1.796875
2
adjustment of transmission network的用法和样例: - The application of discrete particle swarm optimization (DPSO) to the problem of transmission network expansion planning is studied. - The methods of transmission network flexible planning considering the uncertainties are summarized and concluded, and kinds of the optimization algorithm are reviewed. - Some adjustment of the lens may be necessary. - When a fault occurs, it is very hard to accurately locate the fault position using the data provided from limited PMUs, unless we install PMUs at all substations of transmission network.
<urn:uuid:ee6c7a32-8ba1-4bb3-9f5d-e6910462d406>
CC-MAIN-2017-04
http://dict.cn/adjustment%20of%20transmission%20network%0D
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00029-ip-10-171-10-70.ec2.internal.warc.gz
en
0.655906
122
2.09375
2
Mullite brick (also called mullite refractory bricks) is a kind of fine refractory material, with stable expansion, good thermal stability, high RUL capacity, low creep under high temperature, anti-chemical erosion ability, and have a hard texture. Currently there are two commonly used ways to manufacture mullite bricks, which are electric melting and sintering. Mullite is the raw material of high-grade refractory material. Zhengzhou Rongsheng Kiln Refractory Material Co., Ltd,located in the center of china, with advanced technology and rich mineral reserves, produces various types of quality mullite products to meet your requirements. If you have any intention to buy mullite bricks, please leave your message below and get the lowest price! Mullite Bricks Compositions The Mullite bricks are a kind of high alumina refractory brick (see article), with the mullite(3Al2O3•2SiO2) as the main crystalline phase. Commonly, the content of alumina oxides is between 65%~75%. Apart from mullite, the brick also contains a little of those materials with less alumina oxides, such as glass phase, cristobalite, and those with more alumina oxides like corundum. Mullite Bricks Manufacturer Natural mullite are very rare, normally the industrial mullite are made through sintering or electrofusion. Electric fused mullite brick acquires tabular corundum and high-purity fused corundum as main raw materials. We use advanced superfine powder adding technology, through mixing, drying and molding, then firing the product in high temperature shuttle kiln to finish the process. Rongsheng mullite products of overall size, physical and chemical indicators, life expectancy, have met the various requirements of our customers from Singapore, Malaysia, Indonesia, Korea, etc. Parameter of Mullite Bricks of Rongsheng Kiln Refractory Company |Apparent Porosity(%)||18% max| |Cold Crushing Strength||90 Mpa min.| |Thermal Shock Resistance||≥25 times (1000℃ water cooling)| |Refractoriness Under Load:0.2MPa℃≥||1550| |Thermal Shock Conductivity(700℃)≤||1.5 W/m·k| |Abrasion Resistance (℃)||8| Mullite Bricks Classifications and Properties - Electric cast mullite bricks Electric cast mullite brick(or fused cast mullite brick/fusion-cast mullite brick) uses high alumina bauxite, industrial alumina oxides, and refractory clay as raw material, charcoal or coke fines as reducing agents, and formed by reduction electrofusion method on arc furnace to finish manufacture process. Mullite bricks appears to be white, it has extremely low carbon content, and low porosity, low impurity content, high flexural strength, high softening temperature, high hardness and low creep at high temperature. The crystallization of fused mullite is larger than that of sintered mullite, and the thermal shock resistance is better than that of sintered products Their high temperature performance mainly depends on the content of alumina and the uniformity of the phase distribution of mullite and glass. - Sintered mullite bricks Sintered mullite bricks are also made from high alumina bauxite. A small amount of clay or raw bauxite are added to serve as bonders. The manufacturing process of sintered mullite bricks includes molding, and sintering under high temperature above 1750 ℃. Properties of mullite bricks are: high content of mullite, thick bulk density, good thermal shock stability, low creep under high temperature, and good chemical erosion bearability. - Comparison between the two kinds Commonly, the quality of electric cast mullite bricks are better than sintered mullite bricks. This is because: Firstly, the sintered products have a higher apparent porosity, which provided access for invasion into the brick’s inside. Secondly, sintered products have smaller crystal phase, and more crystal boundaries. So that crystal are easily being eroded, and the boundaries are more likely to move. So, the anti-erosion ability, anti-creep ability and other high temperature ability of electric cast mullite bricks are all better than that of sintered mullite bricks. Compare with the sintered one, electric cast mullite bricks are relatively have higher purity. The crystal of electric cast mullite is also larger and has more obvious cleavage. The creep variables of the electric cast products are much smaller than those of sintered, and the corrosion resistance is 3-4 times better than that of the sintered ones. But the fused mullite brick is easy to break while the sintered mullite bricks are stronger, and hard to be broken. Fused mullite is difficult to sinter relative to sintered mullite bricks, usually at 1650 degrees. Mullite Bricks Applications Mullite bricks is a kind of widely applied quality refractory product, they could be used in environment that works under high temperature, such as ceramic, metallurgy, casting, electronics and other industries: Roof of Hot Blast Furnace Body and Bottom of Blast Furnace Glass Furnace Regenerator, Ceramic Sintering Kiln, Corner Lining of Petroleum Cracking System Petroleum Cracking Furnace Metallurgical Hot Blast Stove Ceramic Roller Kiln Electric Porcelain Drawer Kiln Glass Pot Kiln、 Secondary Reformer of Synthetic Ammonia Carbon Reaction Furnace、 Lining Of Various Electric Furnaces With High temperature resistance, high strength, low thermal conductivity, energy saving effect, etc., the mullite bricks are widely used as lining bricks of glass kilns, linings of hot air stove of large-scale blast furnace, etc. Encyclopedia of Mullite Mullite is a series of minerals consisting of aluminosilicate. Mullite is a kind of high quality refractory material. Mullite is a mineral produced by aluminum silicate at high temperature. Mullite can be formed by artificial heating of aluminosilicate. There are mainly high-purity fused silica mullite, ordinary fused mullite, all natural bauxite concentrate, sintered mullite and light burned mullite. Mullite ores are used to produce high temperature refractory materials. Mullite is the only stable two element compound in the AI203-SI02 system at atmospheric pressure. The chemical formula is 3AI203-2SI02. Natural mullite is very few and usually synthesized by sintering or by a capacitor process. Industrial mullite are formed when heating up materials like clay, high alumina materials (such as kyanite, andalusite, silimanite), or ceramics. It is the main component of clay brick, high alumina brick and porcelain. Chemical formula: 3Al2O3 • 2SiO2; Density: 3.16g/cm3; Mo hardness: 6-7; refractoriness: stable at 1800 degrees, decomposition at 1810℃ into corundum and liquid phase. With 20-year’s devotion to refractory materials, our products have been sold all around the world! Welcome to buy mullite bricks in Rongsheng kiln refractory company and enjoy our quality service! Please leave your message below, and let us make contact with you!Looking for High Alumina Refractory?Leave Your Requirement Now! We Will Reply You In 12 Hours!:
<urn:uuid:3e02027f-2a19-4fd0-b3af-a1c6eee2c4df>
CC-MAIN-2022-33
https://highaluminarefractory.com/mullite-brick-manufacturer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00677.warc.gz
en
0.889041
1,744
2.640625
3
Gardens play a crucial role in encouraging the production of wildlife, as plants, flowers, and even your weeds provide bees and various other pollinators with the nectar they need to live well and thrive. Growing a bee-friendly garden is easier than you think, and it doesn’t mean you have to spend exorbitant amounts on exotic flowers either. The UK is believed to have lost 13 species of bee, and 35 more are considered endangered if we don’t do more to preserve them. By growing a more bee-friendly garden, you can contribute to the massive restocking that is urgently needed – and even better – many of the best-adapted plants are actually the least-maintenance ones. Larger “flowers within flowers”, such as double peonies, tend to present a much tougher challenge for bees to access pollen, and many of these are hybrid plants. They are bred more for aesthetic purposes and do not tend to sow and produce enough pollen. Bees are attracted to their bright colors, but they won’t get their fair share of nectar. READ MORE: Mom’s ingenious way to eradicate weeds with old compost Instead, to truly grow a bee-friendly garden, you should opt for the most simplistic foliage — but that doesn’t mean a bland garden. Here are five beautiful, low-maintenance plants you can grow to encourage wildlife in your garden. Lavender is a paradise for bees; it is believed that they can see purple better than any other color. These hardy, drought-tolerant shrubs are rich in nectar, come in a variety of shades, and can grow year-round. As we quickly approach summer, these flowering shrubs would be perfect to plant in your garden. The conical flowers are known to attract all kinds of pollinating insects, including bees. They grow quickly and tend to bloom in late summer, displaying a mass of showy flowers to really brighten up your late summer garden. The mint family Bees love all herbs, but herbs in the mint family are a particularly great option when planning your bee-friendly garden. In addition to lavender, the mint family includes classics like mint, basil, sage, oregano, rosemary, and thyme, and are known to be pollinator-pleasing. Depending on your choice, these will generally bloom from early spring to late winter, providing continuous pollen and nectar. By planting a few of these around your garden, you will not only feed the bees, but you can also reap the benefits with good food seasonings or tea additions. As bee colonies tend to dwindle more during the mid to late summer period, the bees are under even more pressure to stock up on food for the winter months. Sedum can save the day, as it tends to flower from September, and luckily they are also very easy to grow and look lovely in a group. Its flowers are very easily accessible to bees, and they are also incredibly attractive to butterflies – so if you want more of them in your garden, sedum is a great option.
<urn:uuid:0336a0e7-49cd-4bea-9bbd-be4f48f6aa3b>
CC-MAIN-2022-33
https://renewallgardenproject.net/bee-garden-ideas-5-best-plants-to-grow-to-encourage-low-maintenance-wildlife/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00670.warc.gz
en
0.953027
669
3.0625
3
Mulholland, CW and Strain, JJ (1993) Total radical-trapping antioxidant potential (TRAP) of plasma effects of supplementaiton of young healthy volunteers with large doses of alpha-tocopherol and ascorbic-acid. International Journal of Vitamin and Nutrition Research, 63 (1). pp. 27-30. [Journal article] Full text not available from this repository. A randomized, placebo-controlled double-blind supplementation trial was conducted on 32 adults to assess the effect of dl-alpha-tocopherol (1 g/day for 28 days) or ascorbic acid (AA) (1 g/day for 28 days) separately or in combination on the total radical-trapping antioxidant potential (TRAP) of plasma. Subjects were divided into 4 groups of 8 and received the following: Group 1, placebo, Group 2, ascorbic acid; Group 3, alpha-tocopherol; Group 4, alpha-tocopherol and AA. Antioxidant potential was assessed using the TRAP technique (a specific measure of the capacity of the secondary antioxidants, vitamins E, C, reduced thiol compounds and urate in plasma to resist controlled in vitro peroxidation). TRAP values were estimated at baseline and after treatment (day 29). Group means of the antioxidant vitamins at baseline were within normal values for both ascorbic acid (62-82 mumol/l) and alpha-tocopherol (24-29 mumol/l). Despite marked increases post-supplementation in plasma alpha-tocopherol levels in Groups 3 (94%) and 4 (91%) and in AA levels in Groups 2 (82%) and 4 (32%), there were no significant differences (analysis of variance) between the 4 treatment groups for TRAP values on day 29. Paired-t-testing revealed significant (P < 0.01) increases in postsupplementation TRAP values in Groups 2 and 3. |Item Type:||Journal article| |Faculties and Schools:||Faculty of Life and Health Sciences| Faculty of Life and Health Sciences > School of Biomedical Sciences |Research Institutes and Groups:||Biomedical Sciences Research Institute > Northern Ireland Centre for Food and Health (NICHE)| Biomedical Sciences Research Institute |Deposited By:||Mrs Alison Deehan| |Deposited On:||14 Jan 2010 15:13| |Last Modified:||22 Aug 2012 10:10| Repository Staff Only: item control page
<urn:uuid:46221505-6e60-4c61-9fd2-2d9413ac015f>
CC-MAIN-2017-04
http://uir.ulster.ac.uk/5296/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00010-ip-10-171-10-70.ec2.internal.warc.gz
en
0.8486
529
1.679688
2
The Arctic Economic Council (AEC) is an independent organization created to facilitate Arctic business-to-business activities and responsible economic development. Through the sharing of best practices, standards and innovative Arctic solutions. The AEC is open for membership applications from corporations, businesses, partnerships and indigenous groups that have an economic interest in the Arctic. The AEC’s member representation includes a diverse collection of business industries that operate in the Arctic – from mining and shipping companies to telecommunication and indigenous economic development corporations, and from SMEs to big multinationals. This mix of interests ensures that our work is carried out in an inclusive and sustainable manner for the betterment of the Arctic states and communities that we represent. Representing the width of businesses across the Arctic and also globally, the AEC also provides a network for its members. As a member of the AEC, companies and organizations have an opportunity to nominate members to the AEC Working Groups and thus shape the work on responsible business development in the Arctic. The AEC has currently 6 Working Groups: - Maritime Transportation - Responsible Resource Development - Investment and Infrastructure - Blue Economy Read more about the Working Groups here For all types of corporations, businesses, partnerships and indigenous groups coming both from the Arctic and from sub-Arctic regions, there is an opportunity to join the AEC as a non-voting partner. Permafrost Partner is designed for micro business that are not subsidiaries, with their business headquarters located within an Arctic state and which have 15 employees or less.
<urn:uuid:5b42c0c2-1193-457d-add3-d12502a748ff>
CC-MAIN-2022-33
https://arcticeconomiccouncil.com/news/how-to-join-aec/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00478.warc.gz
en
0.949065
337
1.617188
2
Content: From recent few months, this pandemic situation just washed out business revenue of huge companies. Not only developing business companies are affected but also industrialized businesses are affected badly. Think about the business that is just in process of being executed by early businessmen- or the business ideas that are in the pipeline of ambitious entrepreneurs. A huge obstacle is now in the way of their ideas so people start thinking about what ideas they can adapt – for their business plans according to the current situation. If one believes the phenomenon of evolution, huge creations are started from just a scratch. Great establishments have been born from the ashes of a smashed economy. What you need is, audacity to take a challenge – and come out with an enduring but flexible business plan. If your idea of business is in the pipeline and you are ready for execution, here are some tips that help you to reach that point. Find your slot to run: Take a moment to step back and observe the people around you-try to find out the problems they face during this shutter down. Now think about the solutions to their needs- if you can do something- if you have an idea to initialize a business that meets their needs. Took this idea into consideration and started working on it. If you are already in the niche of healthcare and collaborative tech, logistics or E-com, you need to reconstruct your business policies in an innovative way. Companies like Airbnb are the aspirants of the business industry during this lockdown. These types of companies are the link between manufacturers and consumers. Marketing is the basic connection between companies and customers. Due to this lockdown, social life is completely or partially standstill- your manual marketing ideas are not worked anymore. So try to use E-commerce mode of business and marketing. Connect with people via social media- the websites and Applications that are highly rated- maximum used by a public. Try to approach the platforms, maximum used by a certain age group (Age group your product belongs to) i.e. youth, middle-aged etc. Invest extra efforts rather than normalcy: In normal conditions, you have to put some effort into your running business – because somehow things are on the trot smoothly. So if you take the things under consideration, some problems find their ways to a solution. But in Downturn, almost the whole way of business is different. You have to put some extraordinary effort into your work. · Show your creative side to the world and attract your consumer base in an entirely aspirant way. · Change your angle of thought a bit, try to solve unusual problems in an unusual way. Acquire the opportunity: Being ambitious is a wonderful trait you can say – but you must be unobjectionable for small opportunities. Try to grab even small chances. Always remember whosoever grabs the scratch in tough time might be the great establishment of time- because business is also evolving with time and your concerns. Cover Photo Credit: infographicdesignteam.com Hi! This is kainat Ramzan. I am a medical student. I am very fond of reading since my childhood. I believe if you are a reader, sooner or later you came out as a writer. I love the process when you read a character and eventually start living it, channelizing your own emotions, thoughts and aligning your habits with it. This is what I am good at please find my content I believe it will add vales in your life.
<urn:uuid:3f0589b2-957d-42c4-b1a1-25f6748c358e>
CC-MAIN-2022-33
https://www.insighttrending.com/2020/06/4-tips-to-start-up-a-business-plan-in-an-economic-downturn.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00274.warc.gz
en
0.964743
712
1.617188
2
The phishing attacks applied a method known as spear phishing to tricks users into disclosing login credentials by impersonating legitimate websites. Google-branded sites accounted for 65% of the attacks experienced during the study, while Microsoft-branded impersonation attacks accounted for just 13%. The form-based phishing attacks applied various methods such as using legitimate sites as intermediaries, using online forms for phishing, and getting access to accounts. Remote workers faced a barrage of over 100,000 phishing attacks within four months, mostly involving Google-branded websites, according to a report by Barracuda Networks. The phishing attacks applied a method known as spear phishing to tricks users into disclosing login credentials by impersonating legitimate websites. Google-branded sites accounted for about 65,000 of the attacks making up for 65% of the attacks experienced during the study, while Microsoft-branded impersonation attacks accounted for just 13% of the attacks registered between January 1, 2020, and April 30, 2020. The form-based phishing attacks applied various methods such as using legitimate sites as intermediaries, using online forms for phishing, and getting access to accounts without the use of passwords. Google file-sharing and storage websites accounted for 65% of phishing attacks targeting remote workers within the first four months of the year. These phishing attacks involved the use of Google’s domains, such as storage.googleapis.com (25%), docs.google.com (23%), storage. cloud.google.com (13%), and drive.google.com (4%). Microsoft brands were used in 13% of the attacks, including onedrive.live.com (6%), sway.office.com (4%), and forms.office.com (3%). Read more: GOOGLE'S ADVANCED PROTECTION CYBERSECURITY NOW AVAILABLE TO NEST USERS Organizations should also educate their employees on online security to help them navigate the complex attack landscape that keeps changing. This training would come in handy, especially for remote workers who are more prone to phishing attacks . Other brands used to target remote workers included sendgrid.net, which contributed to 10% of the phishing attacks. Mailchimp.com and formcrafts.com accounted for 4% and 2%, respectively. Barracuda Networks senior product marketing manager for email, Olseia Klevchuk, said cybercriminals prefer to use Google’s services because they are more accessible and are free to use, thus allowing them to create multiple accounts. She added that the methods that criminals use, such as sending a phishing email with a link to a legitimate site, make it harder to detect these forms of phishing attacks. Steve Peake, the UK systems engineer for Barracuda Networks, says brand-impersonation spear phishing attacks formed a popular and successful method of harvesting a user’s login credentials. With more people than ever working from home, cybercriminals found an opportunity to flood people’s inboxes with phishing emails. With the advancement of the attacks in recent times, now hackers can even create an online phishing form or page using the guise of legitimate services to trick unsuspecting users. Criminals impersonate legitimate sites by creating emails that appear to have been generated automatically by file-sharing sites such as Google Drive or OneDrive. Many attackers know that if they want to attack someone specific, it’s more likely to succeed if their initial attacks lands in a target’s email box late at night or early in the morning when they’re not as focused, and when the attacker can most convincingly pretend to be someone else. The criminals then redirect the remote workers to a phishing site through a file stored on the file-sharing site. These phishing sites then request the users to provide login details to access the content. To create data forms resembling login pages, criminals are using online forms services provided by companies such as forms.office.com, and send these forms to unsuspecting users. These services trick many users because they reside on the official companies’ domain and hence appear trustworthy. Most users do not realize that companies do not use these domains for login or password recovery. For example, Google does not ask users to log in through docs.google.com but instead uses account.google.com for authentication. For an ordinary user, the difference is too subtle to raise any suspicions. Hackers have also applied non-password methods to access user accounts. Users are requested to accept app permission for rogue apps after logging in through legitimate sites. By granting these permissions, the users give the hackers their accounts’ access token, thus allowing them to log in at will. These attacks cannot be prevented by enabling two-factor authentication because the apps are given long-term access to the account. They also remain unnoticed for a long time because users forget which apps they have granted permissions to access their accounts. Users should be vigilant in detecting suspicious activities on their accounts. Most accounts provide an account history that allows users to view the time and location their accounts were accessed from. Read more: SECURITYSCORECARD REVAMPS ITS CYBERSECURITY RISK MANAGEMENT PRODUCT AMIDST GLOBAL SHIFT TO REMOTE WORK
<urn:uuid:18edef79-0df5-45aa-a2b8-9473a1c2a605>
CC-MAIN-2022-33
https://informationsecurity.report/trending-news/65-percent-of-phishing-threats-facing-remote-workers-impersonate-google-branded-websites
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00075.warc.gz
en
0.934661
1,099
2.109375
2
Natural Remedies for Acne Acne is a skin condition that millions of individuals deal with, sometimes on a daily basis. Although acne is not a life threatening condition, it can cause great stress. Acne, especially when constantly touched or picked at, can also lead to scaring or even an infection. For that reason, those suffering from acne often look for different ways to seek relief. When it comes to seeking relief from acne, there are a large number of over-the-counter products that claim to provide relief. In addition to simply just appearing on store shelves, a large number of over-the-counter acne medications are also appearing on our television screens and with famous celebrities standing behind the products. Of course, if you are suffering from acne you can give these over-the-counter products a try, but it is also important to know that you do have a number of different options. These options involve the use of natural remedies and home remedies, which are a safer way to treat acne, as they do not rely on the use of potentially dangerous chemicals. There are a number of natural remedies for acne that rely on the use of food. One of those remedies is that of lettuce. Saturating lettuce in water for about an hours worth of time will result in a special mixture. This mixture should then be applied to the skin, acting as a rinse. This approach is a nice and easy way to get rid of unwanted acne. Fresh lime juice and milk are another natural remedy for getting rid of acne that comes highly rated and recommend. With this natural remedy for acne, boil a half of glass of milk. Once that milk has cooled, add in about the same amount of lime juice. You can then use a cloth to apply the mixture onto your acne infected area. As an important reminder, wait until the boiled milk has cooled to an ideal level to promote comfort and prevent burns. For a small area of acne, ripe tomatoes can be used. For this home remedy, cut a ripe tomato in half and place the inside, wet portion of the tomato on the pimple or pimples. Leave it on for about an hours worth of time and then wash off. A similar approach to this natural remedy and one that still comes highly rated and recommended involves the use of tomato paste. As previously stated, those suffering from severe acne put themselves at risk for developing an infection or scaring. Those who are known to touch or pick at their pimples are first advised to stop. That is the best way to keep your skin healthy. With that being said, Aloe Vera can also provide relief. When applied to the affected area, Aloe Vera can help to promote healthy healing on the skin. As outlined above, there are a number of different natural remedies and home remedies for those suffering from acne, like you. As for why these natural remedies are advised, there are a number of different reasons. If you have ever tried over-the-counter skincare products before, you likely already know that they can be costly. Imagine that cost added up overtime. It is also important to note that many over-the-counter acne treatment products have poor reviews. In fact, did you know that some products actually cause users more problems with rashes and acne than before? That is why many are now starting to rely on natural remedies instead, as they are affordable, easy to implement, and safe.
<urn:uuid:d4cce0a4-bbed-4d0c-9a64-9b3a88740ec9>
CC-MAIN-2022-33
https://www.healthygreennews.com/natural-remedies-for-acne/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00067.warc.gz
en
0.965643
696
1.789063
2
An awful lot of people at large in the world began their lives in a dish. Just over 30 years ago, a British baby named Louise Brown became the first viable child conceived by in vitro fertilization. Now the 3.5 million people who have followed her match the population of Lithuania. But bringing those millions into existence was not easy. On average, only a quarter of all IVF attempts with fresh eggs yield a live birth; frozen eggs perform even worse, topping out at just 17%. According to an announcement made yesterday by a team of researchers in the United Kingdom, however, all that may change. There is now a quick and reliable way to check the viability of eggs before fertilization and implantation begin and two months from now, a previously childless 41-year-old woman will give birth to the baby who proves it. (Read TIME's 1978 article, "The First Test-Tube Baby.") The biggest reason IVF treatments so often fail is that even in the best of circumstances, not all eggs are created equal. Up to half the eggs younger women produce carry chromosomal abnormalities that make a full-term pregnancy impossible; that number climbs to three-quarters as women age. The problem is, you can't check the health of the chromosomes without damaging the egg and making it useless for conception. What's needed is a way to make a copy of those chromosomes and subject them to analysis, leaving the egg unharmed. The good news is, such a copy already exists. (See the top 10 medical breakthroughs of 2008.) Healthy human beings carry 46 chromosomes, 23 contributed by the egg and 23 by the sperm. Eggs begin their development process with the full complement of 46, but shed half of them, tucking them into a small genetic bundle known as a polar body, which mirrors the chromosomes of the egg. Investigators at the U.K.'s CARE Fertility clinic, under the direction of Dr. Simon Fischel, harvested nine eggs from a woman who had undergone 13 failed cycles of IVF implantation and, in addition, suffered two miscarriages and an ectopic pregnancy. Using a laser scalpel, they extracted the polar bodies from the eggs and analyzed them. Two of the nine proved defect-free, and both were implanted. One took hold. (Read "Calculating the Odds of a Baby Through IVF.") "This woman is now in her third trimester and had never before been this far," Fischel told the news conference at which he announced the breakthrough. So this is a good thing, right? In a lot of ways, yes. Not all women must go through 13 IVF trials before they succeed, but most women undergo multiple attempts, each of which can cost $5,000. Fischel's procedure runs an extra $2,750 or so but paying a premium price once is easily cheaper than paying the lower price over and over. What's more, while couples who choose the in vitro route dearly want a child, they don't always want more than one. But the high failure rate of the procedure requires that multiple embryos be implanted at once. The result: either no children or a small litter of two, three, four or more. What spooks many people is the question, Once you start checking eggs for viability, what else can you screen for? Whole cells can already be harvested from embryos, and free-floating embryonic cells can be extracted from the womb throughout a pregnancy. Both procedures would, in theory, allow embryos to be discarded or pregnancies to be terminated for a matter as trivial as height or eye color. But both also allow parents and doctors to decide against bringing to term a baby that would enter the world with a grave and degenerative disease. The ethical conundrum lies in drawing the line. Plenty of parents abort babies found to be carrying the genetic signature of Down syndrome. Other parents of well-loved Down children would dispute that decision. Fischel's procedure does not give as complete a look at a potential child, since it relies on only half the chromosomes that make up that profile. But it comes close enough that the work as a whole is being overseen by the U.K.'s Human Fertilization and Embryo Authority, a government watchdog group. The agency is generally supportive of the procedure and indeed has been looking for a way to reduce the incidence of multiple births among IVF families. Nonetheless, the fact that there is a moral cop on the beat gives some comfort to the procedure's critics. For the unnamed 41-year-old, little of this matters. In two months, she'll be changing diapers.
<urn:uuid:07606f35-2e7d-4ae0-ad34-fecd70cfad38>
CC-MAIN-2017-04
http://content.time.com/time/health/article/0,8599,1874101,00.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00317-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96292
948
2.84375
3
NC, or numerical control, builds upon the idea of improving accuracy and precision. CNC stands for computer numerical control; it’s a computer that controls the machines on a factory floor. NC lathes are the industrial equipment used in small to large manufacturing shops around the world for automating their quality processes. The Concept of NC Lathe A CNC lathe is a CNC machine that reads a computer program and performs machining operations. The NC lathe can process many different materials and can be used for numerous types of operations. It can also be programmed to perform multiple tasks at once, making it perfect for a variety of industries. The Concept of NC lathe has evolved from its original design, which was developed in a Japanese university, to a highly advanced machine that is now used by factories throughout the world. CNC machines have a logical approach to programming. Since the CNC control starts from zero at one point, the coordinate system must begin there. If the graph were a time line, the horizontal base line would start at January, while the vertical base line would start at a zero productivity level. This location is called the origin point. Various other names for the origin of a CNC machine are "work zero point," "part zero point," and "program origin." The concept of CNC machines has evolved greatly over the years, but the most basic components still remain the same. They are designed to perform multiple tasks at once and are typically purchased or designed for a particular task. The Concept of CNC lathes has grown in popularity with the advent of open source software, making them more affordable and diverse than ever. There are three primary components of any automated motion control machine: a drive/motion system, a command function, and a feedback system. The first aspect of NC lathes is the way that the machine can be programmed. The concept of CNC is similar to that of CNC lathes, but it also has some key differences. The main difference between the two is that the CNC has a computerized interface and multiple spindles. It also supports submicron order machining, which is very common in the electronics industry. Furthermore, the automated peripheral functions of a CNC machine contribute to the streamlined production process. While the concept of CNC is very old, it has continued to evolve. This modern technology can be used to create intricate parts. The CNC lathe is versatile and can produce screw threads, plane surfaces, and three-dimensional products. Its capabilities have allowed it to become an essential tool in manufacturing. It is also available in different sizes, and it can work on large and small parts. A CNC lathe is usually equipped with one or two centers, with a clamp or collet used to secure the material in place. A CNC lathe's main unit is equipped with multiple mounted tool bits. The rotation of this unit enables seamless transition from one process to another. In addition, it can be used for several processes at one time. However, a single-spindle automatic lathe is suitable for continuous machining of a single process. These machines are equipped with an autoloader and are also ideal for high-volume production of same-shaped products. The History of NC is impressive. It is one of the most important concepts in manufacturing. It has been used for centuries in many industries. Its development can be traced back as far as 1300 BC in ancient Egypt. Despite its history, the Concept of NC is an important part of modern manufacturing. It can be used for various applications, from small scale to large-scale production. This modern technology has made it possible for businesses to produce many components efficiently and quickly. The concept of NC lathe is not a new one. In fact, it is as old as the first milling machines. It has been around since ancient times and is used to manufacture items like hammers and wooden bowls. The first milling machines were used for grinding. These machines were very useful in making wrought-iron objects. It is believed that the use of motorized milling machine dates back to 1300 BC in ancient Egypt. The most significant inventors of CNC lathes include Eli Whitney, Simeon North, Captain John H. Hall, Thomas Blanchard, and Thomas Nicol. The concept of NC lathe goes back to the 19th century, when MIT and Parsons Corporation collaborated on the first computer system. The IBM 602A multiplier used a specialized computer to calculate the airfoil coordinates of helicopters. Punch cards were used to feed data points into the swiss jig borer. In the past, CNC machine programming had to be done by hand. CNC lathes are computer-programmable lathes. While the traditional NC lathe requires physical setup of the tool for each cutting job, CNC lathes are equipped to perform multiple cutting cycles without human intervention. This feature is most useful when performing mass production of standard parts for market commodities or in a production facility capable of high throughput. The use of programmable top-down programming allows a shop to concentrate on other tasks while this machine is running unattended.
<urn:uuid:aada7805-6084-40e3-ad3e-b9d4e60ab2fd>
CC-MAIN-2022-33
https://cncble.com/concept-of-nc-lathe/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00067.warc.gz
en
0.956938
1,067
3.75
4
Mar. 3 2009 Washington, D.C. — Our public health organizations strongly support the bipartisan legislation introduced today to provide the U.S. Food and Drug Administration (FDA) with effective authority to regulate tobacco products. There are few steps Congress can take that will make a bigger difference for America's health than to finally regulate tobacco products, the number one cause of preventable death and disease in the United States. Enactment of this legislation this year will be a truly historic accomplishment that will end the special protection the tobacco industry has enjoyed for too long and protect our children and the nation's health instead. We applaud House Energy and Commerce Committee Chairman Henry Waxman (D-CA) and Representative Todd Platts (R-PA) for their leadership in introducing this very strong bill. Each year in the United States, tobacco-related diseases kill more than 400,000 people and cost the nation $96 billion in health care bills. So reducing tobacco use is critical to preventing disease, improving health and reducing health care costs in our country. The legislation introduced today will help achieve these goals by reducing the many devastating and costly diseases caused by tobacco use, which include cancer, heart disease, chronic obstructive pulmonary disease and others that harm virtually every organ in the human body. Unbelievably, despite the harm they cause, tobacco products are exempt from basic health regulations that apply to other products, such as food, drugs, cosmetics and even dog food. The tobacco companies take advantage of this lack of regulation to market their deadly and addictive products to children, deceive consumers about the harm their products cause, make changes to their products without disclosing them (such as secretly increasing nicotine levels in cigarette smoke, as studies have shown), and resist any meaningful change to make their products less harmful. Until Congress grants the FDA authority over tobacco products, the tobacco companies will continue their harmful practices that addict children and make it difficult for smokers to quit. This legislation would grant the FDA the authority and resources to effectively regulate the manufacturing, marketing and sale of tobacco products. Among other things, it would: This legislation has strong, bipartisan support across the nation and in Congress. FDA regulation of tobacco products has been endorsed by more than 900 public health, faith, medical and other organizations. A poll last year found that it is supported by 70 percent of American voters. It has also been endorsed by scientific authorities including the Institute of Medicine and the President's Cancer Panel. The House of Representatives in July approved the legislation by an overwhelmingly vote of 326 to 102, and it had 60 Senate sponsors in the last Congress. This legislation presents Congress with a truly historic opportunity to protect our children from tobacco addiction and save lives. Its enactment would represent the strongest action ever taken by the federal government to address tobacco use. We urge both the Senate and the House to quickly enact this long-overdue legislation into law and to reject all efforts to weaken it. If you have any questions or to schedule an interview, please contact Joel Spivak (Campaign for Tobacco-Free Kids) at 202-296-5469; Steve Weiss (American Cancer Society Cancer Action Network) at 202-661-5711; Suzanne Ffolkes (American Heart Association) at 202-785-7929; or Heather Grzelka (American Lung Association) at 202-715-3450.
<urn:uuid:7b790a79-b70b-4874-989b-768ec5a67e82>
CC-MAIN-2017-04
http://www.tobaccofreekids.org/press_releases/post/id_1138
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00046-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948701
679
2.296875
2
Brazil opens largest natural gas pipeline in South America RIO DE JANEIRO, Feb. 3 (Xinhua) -- Brazilian President Luiz Inacio Lula da Silva on Wednesday inaugurated the largest gas pipeline in South America. The 1.38-billion-U.S. dollar Cabiunas-Reduc III pipeline was built and will be operated by state-owned oil and gas giant Petrobras. According to the company, the 179-km pipeline can transport 40 million cubic meters of natural gas a day, the highest capacity among the gas pipelines in the country and higher than that of the Bolivia-Brazil gas pipeline, which can deliver 30 million cubic meters per day. In order to avoid damage to vegetation, Petrobras built a 3.5-km tunnel under the Santana Mountain. Petrobras said the new pipeline boosts both the country's supply flexibility and transportation capacity to meet the needs of the southeastern region, which has the biggest demand for natural gas in Brazil. With the pipeline, Brazil's natural gas transportation network reaches 9,217 km in length, up from 5,398 km at the beginning of the Lula administration in 2003.
<urn:uuid:f9600597-30e8-4e5a-9305-4f4a5855b221>
CC-MAIN-2017-04
http://www.globalexchange.org/news/brazil-opens-largest-natural-gas-pipeline-south-america
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00080-ip-10-171-10-70.ec2.internal.warc.gz
en
0.913207
243
2.484375
2
Date: Mon Jun 02 1997 - 05:02:24 EDT quite useful on some points, e.g. the distinction between perfective and imperfective. good. just don't try to tell me that aorist form per se marks one or the other. two quick critiques: the generalization about non-indicative-finites as being unreal seems to me to break down in given settings, e.g. modern greek infinitive derives from old iva = hina clauses with subjunctive and, sure enough, one can find instances of these old clauses that amount to no more than an infinitive in hellenistic period writing. second point: often the thought map of a verb (its rather lexical property) and not a formal inflectional marking is what really suggests what's called bearded bill of asheville <firstname.lastname@example.org> unca not having approved either whom or thereof. This archive was generated by hypermail 2.1.4 : Sat Apr 20 2002 - 15:38:17 EDT
<urn:uuid:46f7081f-210c-4f39-bf69-69870e03d99d>
CC-MAIN-2017-04
http://www.ibiblio.org/bgreek/test-archives/html4/1997-06/19133.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00337-ip-10-171-10-70.ec2.internal.warc.gz
en
0.897223
233
2.640625
3
Leading maths K–6 with Anita Want to set up your primary school for ongoing success in maths? You need a dedicated team to lead maths and implement the changes you need for your context! Anita’s approach to leading maths in primary schools includes all the strategies and tools you need to: - develop school-wide protocols for maths, including consistent lesson structure - improve your teachers’ maths content knowledge - organise your resources so they can be used with ease in the classroom - implement powerful strategies to differentiate and address gaps in student understanding. When working with maths teams, Anita uses Anita Chin’s Primary Mathematics Framework (2020) to provide the structure needed to drive improvement and measure success. Anita’s Primary Mathematics Framework Anita Chin’s Primary Mathematics Framework (2020) is the culmination of more than 25 years’ experience in leading and teaching mathematics in Australian schools. The Framework combines a strong evidence base with Anita’s extensive knowledge of what works best in primary maths classrooms. Anita works with schools to develop a whole-school approach which aligns with their strategic direction for mathematics. All professional learning is underpinned by her Framework which provides leaders and teachers with a structure to support whole school improvement in maths. Establishing a Maths Crew Maths needs a team: a crew of classroom teachers and leaders who are passionate about maths and love sharing tips and success stories with their colleagues. This maths leadership team is what we call your Maths Crew – the ‘go to’ people for maths at your school. Your Maths Crew supports your classroom teachers to develop their content knowledge and teaching practice, and also ensures all teachers have the resources they need. Anita’s tools for leading primary maths Anita has developed a suite of tools to support leaders to implement a consistent whole-school approach to maths K–6. image coming soon Anita’s 360º School Reflection Tool Designed to be used at key milestones on your learning journey with Anita, the Reflection Tool allows you to analyse your situation and plan the next steps to meet your school’s strategic goals for maths. Anita’s Accountability Tools Anita’s Accountability Tools are used by your maths team and classroom teachers to assist them to plan and record their implementation and progress towards their strategic goals in maths. Anita’s Ultimate Toolkit for Leaders Using her trademark practicality to bring the research alive, Anita’s Ultimate Toolkit folder is jam-packed with the tools and strategies you need to drive sustainable improvement in maths. Leadership course for maths leaders & school executives Your school maths leadership team can benefit from Anita’s in person professional learning in a number of ways. You can choose when and how your leaders engage with Anita.
<urn:uuid:6b6d3820-3d34-4c94-8b1c-9af6f78f59c1>
CC-MAIN-2022-33
https://anitachinmaths.com.au/pl/leading-maths/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00470.warc.gz
en
0.934456
588
2.359375
2
"Inside This Place, Not of It: Narratives from Women's Prisons" Waldman, Ayelet and Robin Levi San Francisco: McSweeney's Books, 2011. "Manhandled, arrested, cuffed, searched and locked away" is how AlterNet describes the story of Barbara Schneider Reilly, who spent 30 hours in jail after being arrested at an Occupy Wall Street-related protest. During the long, cold night in the Tombs, at some point we asked a female officer if we could have some blankets. "We have no blankets." Some mattresses since we were twelve or so people? "We have no more mattresses." Some change in exchange for dollar bills so we could call parents and loved ones? (The one public telephone in the cell would only take coins.) "It's against regulations." Some soap? "Maybe we'll come up with some soap." ... Distressing is hardly the word for a culture of willful neglect and the exercise of what power those officers held over us for those thirty hours. The arrests at Occupy Wall Street protests have brought greater attention to jail and prison conditions. However, protesters experience only a fraction of the inhumane realities facing over 100,000 women incarcerated across the country. "Inside This Place" delves further into injustices inside women's prisons through firsthand accounts from the women themselves. Recognizing that not all people in women's prisons identify as women, it also includes the story of Charlie Morningstar, incarcerated in a women's prison because, although he identifies as a man, his body is deemed biologically female. These stories illustrate the myriad ways that prisons attempt to erase their personhood: One woman entered prison while pregnant; because her due date fell on a holiday weekend, medical staff forced her into a Caesarean section. She was handcuffed throughout the surgery; she held her newborn for the first time while in cuffs. Another woman was given a hysterectomy without her knowledge or consent. Others discuss the lack of medical care, ranging from the lack of a diabetic diet to staff withholding necessary medications. Women's humanity is assaulted in other ways as well: In 2010, Colorado prison staff instituted a demeaning search procedure known as the "labia lift": "We had to spread our labia and staff would make us cough while they were looking." (p. 158) Prisons act as sites of gender control as well. Because Charlie Morningstar is biologically classified as a woman, he is housed in a women's prison. There, staff members continually attempt to strip away his dignity: "They would talk about putting a dress on me in an attempt to humiliate me," he recalled. (p. 196) From another prison, "Sherri" reported that guards searched prisoners who appeared masculine more roughly: "They'd go up under your breasts a couple more times than necessary. They'd take the back of their hand and swipe your crotch." (p. 43) These are painful stories, but the women tell them. The act of talking, of breaking the silence around the violence they've endured, is an act of declaring one's experiences valid. "Inside This Place" is not just a recitation of prison horrors. It also contains tales of resilience, resistance and hope. The reader catches glimpses of the community and support created inside women's prisons. These stories, the ones that recognize women's agency, are often missing from existing accounts of women's prisons. "Maria," for instance, recounted being sexually abused by her landlord when she was ten. When she told her mother, her family did nothing to stop the abuse; instead, they debated whether the abuse had actually happened. Their disbelief and inaction taught Maria that she was powerless against such violence: "Afterward, it wasn't talked about any more. I didn't want to bring it up because I knew how it made me feel. And we couldn't talk about it because the guy who was abusing me owned the house that we lived in and we would have been homeless without him," Maria recalled years later. "Even back then, a part of me understood that it was better to just be quiet." (pp. 59-60) Maria went to prison three days after her 18th birthday. Two years later, a prison guard began repeatedly raping her. Other staff also sexually harassed and molested her. Having learned at an early age that she would not be believed, Maria kept quiet. Seven years later, other women in the prison told her about a lawyer named Amanda Taylor: "She was known as the lawyer who would protect you ... This lawyer was also fighting for us to get better educational programs and to change prison rules because there was so much sexual harassment inside. I hadn't heard the words 'sexual harassment' until I met Amanda." For the first time, Maria realized that sexual abuse should not be a normal occurrence for girls. She also realized that she did not have to suffer in isolation: "I had never realized that people would care. With Amanda's help, I started becoming really, really strong. I finally started to love myself, regardless of everything and I started to fight." Maria joined a lawsuit of women who wanted to end the systemic sexual abuse in prison. She also told her story to the media, becoming a spokeswoman for the suit. Maria risked harassment and retaliation from prison staff for her outspokenness. Nonetheless, Maria took that risk, noting later, "I felt very proud to be in this group of women who had gone through similar things and were standing up against these people who had abused their power. It made me feel strong and powerful. It also helped me to deal with my demons. It helped me to not continue to blame myself. I had worked very hard to become the person that I was." (p. 67) Others also describe both the organizing and community building in prison. Noting the growing number of youth sentenced to prison and the lack of support for them, "Victoria," sentenced to life without parole as a youth, started the Juvenile Offenders Committee. "I try to keep a connection with all of them because it helps me also to remember, Victoria, you're not the only one serving such a harsh sentence. Go to one of them and give them a hug, just talk to them and they'll understand. They'll know they're not alone." (p. 185) In 2008, noting the absence of a place where people could talk about gender-identity issues, Charlie Morningstar started the Two Spirits Wellness Group. The group allows people to reaffirm their identity and talk about their experiences. When a lawsuit forced the California Department of Corrections and Rehabilitation to give hormones to anyone with gender-identity disorder regardless of whether they had a prescription prior to arrest, the group shared information about their right to hormones. Among its many appendices, Inside This Place includes a resource list directing outraged readers to groups organizing around these issues. As Occupy Wall Street and other protests raise awareness and outrage about the inequalities in the world, we need to remember that many of these same injustices are perpetuated and often exaggerated, behind prison walls. And then we need to act. As Maria summed up at the end of her story, "I know that what saved me was finding out that someone cared and I know that will save those women I left behind." (p. 71) While Inside This Place is published by McSweeney's, Voice of Witness [www.voiceofwitness.org] is a nonprofit imprint of McSweeney's that publishes oral history collections documenting the stories of men and women who have survived human rights crises. Inside This Place, was created in partnership with Justice Now, a California prisoner rights organization and the first teaching law clinic in the country solely focused on the needs of women prisoners [www.jnow.org]. Both organizations are also great additional resources for people interested in creating change in their own communities. All Voice of Witness books can be purchased on the McSweeney's store site [store.mcsweeneys.net] if readers prefer to buy through an independent bookseller.
<urn:uuid:7c09fdca-5ce1-41f6-8c4c-a87c307428f8>
CC-MAIN-2017-04
http://www.truth-out.org/opinion/item/6407-oral-history-collection-gives-voice-to-incarcerated-women
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00059-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98183
1,660
2.046875
2
April 7, 2021 409 PM ALPINE – In his ceramic creations, Sul Ross fine arts student Anthony Carrasco is telling a story of the Chihuahuan Desert floor. His senior capstone project, Textures of Time, draws inspiration from his hometown of Presidio and translates it into ceramic forms, including through his textural “dirt tiles,” on view now at Sul Ross’ Francois Art Gallery. Living in the desert for 23 years, Carrasco said he spent a lot of time walking around Presidio. He observed the landscape, the neighborhoods, the local pottery and, he said, it wasn’t long before his gaze shifted to the ground. “I’ve always liked looking at the floor – it’s something I never admitted,” he said. Underfoot, he observed that the ground is always changing and always uneven. “I see the ground and see how many years that process took to make those textures,” he said. Before long, he was pulling out his camera to capture the way the land was shifting. “I create these things called dirt tiles, they’re large slab tiles,” he explained. “I look at the textures on the floor and try to recreate it with my emotions and painting skills.” He prints the image and sketches it, using two-dimensional art skills he picked up when he was drawing and painting at home and through his years at Presidio schools. “I’ve painted since I was a little kid. Pottery was something I wanted to experiment with, but I never had the resources to do that,” he said. But in college, the new medium excited him. From his drawings, Carrasco uses clay to recreate the forms he observed outdoors. He channels his emotional connection to the area into the artistic process, “banging the clay with my hands, using the floor, throwing it, trying to recreate as much texture as I can.” While millions of years have shifted, eroded and formed the land here, Carrasco is also interested in the newer changes he’s seen in Presidio. “Through revisiting areas I used to walk around, I see a lot of things that weren’t there,” he said, mentioning the return of the train rails and the growing number of new businesses that have opened since he moved to Alpine for school. “I also see that there’s a lot more activities going on outside – bike riding, walking, baseball, softball – that’s a lot of stuff I never got to see when I was there.” The city’s new pavement walking paths mean Carrasco is seeing “so many people walking through the ground,” another shift worth observing in his art. The young artist said he never realized how much of a connection his hometown, the changes and simply looking down to observe had to his art, and with “everything I do,” he said, but in Textures of Time it all comes together. The exhibition is open through April 9 at the Francois Art Gallery from 8 a.m. to 5 p.m. in Studio Gallery Room 102, and his work can be purchased at the gallery.
<urn:uuid:7280825e-b6cc-49c6-9233-aa5668196304>
CC-MAIN-2022-33
https://bigbendsentinel.com/2021/04/07/textures-of-time-exhibits-anthony-carrascos-view-of-the-desert-underfoot/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00473.warc.gz
en
0.984204
692
2.046875
2
Fish Oil for Natural Pain Relief Omega 3 supplementation with the oil of fatty cold water fish provides tremendous health benefits. Some of the documented health benefits of fish oil include relief of inflammatory joint pain and chronic spinal pain, improvements of autoimmune diseases, reduced risk of cardiovascular disease, improvements and reduced risk of depression, and relief of pain in fibromyalgia syndrome.Glutathione – The Amazing Benefits of Raising Your Glutathione Level People all over the world are discovering the amazing benefits of raising your glutathione levels. Learn more about the amazing benefits of raising glutathione levels safely and effectively.Supplements: On Pots and Plots In these days, everyone practices love for gardening, as a form for healthy and happy living. Healthy living requires good food, exercise and vitamin supplements. Or we can try some herb tea, or plant sap to clean our bodies.HGH Releaser or Supplements – Can They Reverse Age Effects? HGH releasers or supplements are supposed to be the best anti aging remedy and they can do wonders for your body. They can stimulate growth hormone production in your body and make you look and feel much younger.Weighing The Scales: Omega-6’s Vs Omega-3’s The human body can sometimes seem like a battlefield, as can be witnessed by the immune system’s response to hostile foreign invaders. But, sometimes, the human body can appear to be more like a finely tuned instrument. Such is the case of the delicate ratio of omega-6 and omega-3 fatty acids.Food Supplements: Do We Really Need Them? There is a near endless debate going on about the benefits of food supplements and whether we really need them or not. Even today there is no clear cut answer as to whether they are a necessity to our dietary needs or simply a beneficial add on to make our nutrition improve and thus have a positive impact on our health. A few decades ago the general view was that we should all be able to get the vital nutrients in our daily diets through simply choosing healthy foods and eating balanced diet. Nowadays it seems that it is not as simple as all that.Supplements to Help Muscle Recovery After Your Workout Session Are you interested in muscle recovery supplements simply because you’re an athlete that requires fast recovery time after your workout routines or games? What about dealing with an injury quicker? Or are you somebody like me who has been exercising on a regular basis for many years and have realized that while the workouts still feel fantastic, you merely don’t develop the ‘pop’ to them at times and you’re actually noticing the discomfort more often.How to Find Supplements for Joint Pain What is in my Joint Supplement? Joint supplements are very popular today and are taken by a wide spread of ages and types of people. These supplements make a range of claims to giving you supple joints to help you maintain muscles and joints.How to Choose a Private Label Vitamin Manufacturer? There are a lot of companies out there that make vitamins. What a lot of people don’t know is that these companies that manufacturer their own line of vitamins are often interested in selling these health supplements to be branded and sold by another company. Essentially, you just have to pick who your favorite liquid vitamin manufacturer is and then give them a call to see if they do private labels.Improving Nutrition Through Food Supplements Health and well being are becoming increasingly important for people in today’s world. People are constantly being reminded of the ever growing need for good nutrition and exercise as key components in achieving this goal. For many people, maintaining a balanced diet and eating healthily are not as easy as they sound; some forms of food supplements are often needed in order to create a fully balanced and comprehensive diet.Boosting Testosterone Is Easy With Tongkat Ali and 7 Minutes Weights Training It is human to want to look great and to have lots of energy, muscle mass and sexual vitality and it is equally human to want all the benefits of a higher testosterone without doing what we traditional have always thought as too much hard work to get there. We like being lazy, but we know that living the sedate life takes its toll on our reducing muscle mass and increased belly fat. Over the years we accept a greatly reduced sexual energy and we learn to tolerate a less than vigorous life.Going Too Far? Probing the Truth Behind Prostate Cancer and Omega-3 Oils Puns aside, prostate cancer is no laughing matter. Godless male biologists sometimes suggest that the prostate is the ultimate proof that as far as the human body is concerned, there is no such thing as intelligent design. If only the powers that be hadn’t piped all the important bits through it, the disease-prone gland might have lasted a bit longer.Resveratrol: It’s All in a Grape Have you ever wondered about the contents of the alcohol that you’re drinking? Well, if you’re a big fan of red wine, then you’ve probably encountered Resveratrol. Now, the question is whether it’s a bad thing or a good thing. Ladies and gentlemen, that’s what we’re here today to discuss.
<urn:uuid:7b349717-98cc-4e16-abb9-aa9965531b6a>
CC-MAIN-2022-33
https://vegansupplements.tube/vegan-shrimp-taste-test/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00467.warc.gz
en
0.952743
1,082
1.640625
2
Kaohsiung's efforts to make itself a springboard for Taiwan to do more business with South-east Asia have paid off. Taiwan's President Tsai Ing-wen announced last week that the southern port city will be the operations base for her government's New Southbound Policy, aimed at boosting the island's trade and investment links with South-east Asian countries. Kaohsiung, Taiwan's second-biggest city, has been positioning itself to serve as a base for the new policy. As part of the effort, Kaohsiung mayor Chen Chu hosted more than 100 delegates from 49 cities in 25 countries during the Global Harbour Cities Forum in September. To make Kaohsiung more South-east Asia-friendly, Ms Chen said the city government was providing subsidies for schools to hold classes in Thai and Vietnamese languages and culture to cater to its growing population of immigrants from the region. While the New Southbound Policy office did not elaborate on why Kaohsiung was chosen, analysts and politicians noted some benefits. First, the southern port city's proximity will give Taiwanese businesses easier and quicker access to South-east Asian markets compared to Taipei in the north, 90 minutes by train from Kaohsiung. Second, having Kaohsiung as a base will potentially open more direct air and sea links to the region. There are currently only four airlines that have direct flights between Kaohsiung and Singapore, Bangkok, Manila and cities in Vietnam and Malaysia. Some observers also pointed to a political factor. Professor Chen Been-lon, a research fellow at Academia Sinica's Institute of Economics, said Kaohsiung is a stronghold for Ms Tsai's Democratic Progressive Party. This will mean easier coordination between the central and local governments. "Everyone is on the same page, minimising politicking and conflicts," said Prof Chen. But some have said that a base is not always necessary when modern trade goes beyond the flow of goods and services to include human talent, knowledge and skills. Dr Alex Lee, vice-chairman of the opposition Kuomintang party's central administration committee, said choosing Kaohsiung may be a short-sighted move, given that Taipei is still the financial and economic centre. "Most of the official communication and planning still take place in Taipei. How useful can an operations base be when it is still far away from where the important decisions are being made?" he said.
<urn:uuid:abd013c2-f957-4928-bdfa-b7b062a4870b>
CC-MAIN-2017-04
http://www.straitstimes.com/asia/kaohsiung-well-positioned-for-new-trade-push
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00333-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955871
505
1.59375
2
Refrigeration plants in the chemical industry The pharmaceutical industry, as already mentioned, the user refrigeration in freeze-drying processes. Approach, which seems to be popular in the industry, which is also to cool the liquid, and distribute this cold fluids (antifreeze, ethylene glycol or alcohol, for example) the place where refrigeration is needed. Low alcohol can cool jacket vessel, or glycol can be sent by air-cooling coils are located in the room where the powder filling occurs that must be maintained at low humidity. Chemical, petrochemical and oil-refining industry, often require large refrigeration plants. Some important operations frequently require cooling: - the splitting of a single gas other way liquefaction more than one gas - the condensation of gases, such as the capture of removal of gas from liquid storage tank - solidification of one substance in the mixture to separate it from the other - contents stored liquid at low temperatures to control the pressure in the vessel, containing the - removing the heat of reaction - humidity control for hygroscopic substances Two main concepts in the provision of refrigeration are direct and indirect. In direct cooling of the product itself refrigerant and compressed, liquefied and strangled in the form of a liquid at low temperatures. The petrochemical industry is often used propane, ethane, ethylene, for example, as refrigerants. Often these chemical plants, large and traditionally use high-capacity centrifugal compressors, as shown in Fig. 1.6. Object, as shown in the liquefied petroleum gas fractionation plant, where 8 in two stages centrifuges compress propane in the refrigeration cycle. An alternative approach, to provide indirect cooling using a skid-mounted package that uses ammonia or suitable refrigerant freon. Or ammonia refrigerant freon from the package serves as a heat exchanger performing cooling, or in some cases, the pump delivers a low-average temperature of the refrigerant in heat exchanger. The frame is mounted package in Fig. 1.7 provides the low-temperature refrigeration due to the combination of two schemes, one with the use of R-22 and other carbon dioxide. List only a few industries and temperature range of their cooling requirements: pre-cooling the air before separation10, -100C (-148F); condensation of hydrocarbons vapors11 occurring at -55C (-67F); and in the manufacture of such substances as ammonia/urea, aniline dyes, butadiene, butyl rubber, chlorine, pesticides/herbicides, synthetic rubber, vinyl chloride, and xylenes, as well as in the recovery of solvents.
<urn:uuid:45784c45-69ae-4030-9ab9-229c072af5ef>
CC-MAIN-2017-04
http://ref-wiki.com/content/view/31514/28/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00299-ip-10-171-10-70.ec2.internal.warc.gz
en
0.90844
566
2.828125
3
Jack Johnson, Rebel Sojourner: Boxing in the Shadow of the Global Color Line by Theresa Rundstedtler is a new publication by University of California Press now available to order online. In his day, Jack Johnson—born in Texas, the son of former slaves—was the most famous black man on the planet. As the first African American World Heavyweight Champion (1908–1915), he publicly challenged white supremacy at home and abroad, enjoying the same audacious lifestyle of conspicuous consumption, masculine bravado, and interracial love wherever he traveled. Jack Johnson, Rebel Sojourner provides the first in-depth exploration of Johnson’s battles against the color line in places as far-flung as Sydney, London, Cape Town, Paris, Havana, and Mexico City. In relating this dramatic story, Theresa Runstedtler constructs a global history of race, gender, and empire in the early twentieth century. “Theresa Runstedtler traces Jack Johnson’s fabulous, furious, iconic life across five continents and through four paradigms (race, masculinity, imperialism, and popular culture), setting a formidably high bar in the emerging genre of transnational biography. Jack Johnson: Rebel Sojourner is a groundbreaking achievement.”—David Levering Lewis, author of When Harlem Was in Vogue “This is a brilliantly researched and original study of the transnational career of the black American boxer Jack Johnson. In lucid and engaging prose, Theresa Runstedtler traces Johnson’s travels across multiple continents, showing how Johnson’s life serves as a cultural compass for the intersecting worlds of American, British, and French empire and ideas of race at the turn of the last century. This marvelous contribution to the burgeoning literature on the popular culture of imperialism and transnationalism will find a wide and appreciative audience among scholars of empire, American history, and African American studies.”¬—Kevin Gaines, author of American Africans in Ghana: Black Expatriates in the Civil Rights Era. For more information on this exciting new publication click here. (Information via University of California Press)
<urn:uuid:6382ee04-cb2a-4f4e-9644-82a6c779aed9>
CC-MAIN-2016-44
https://blackatlanticresource.wordpress.com/2012/01/24/new-publication-jack-johnson-rebel-sojourner/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00055-ip-10-171-6-4.ec2.internal.warc.gz
en
0.860278
445
2.359375
2
Brussels: Leaders from 11 European countries agreed on a plan to tackle challenges arising from refugee flows along the western Balkans route. In a 17-point plan of action, they agreed to nominate contact points within 24 hours to allow daily exchanges and coordination to achieve gradual, controlled and orderly movement of refugees along the route, Xinhua news agency reported. Countries along the route pledged to work with the United Nations High Commissioner for Refugees (UNHCR), and increase efforts to manage borders. European Commission President Jean-Claude Juncker said refugees need to be treated in a humane manner along the route to avoid a humanitarian tragedy in Europe. “I am therefore pleased that today we were able to jointly agree on a 17-point plan of pragmatic and operational measures to ensure people are not left to fend for themselves in the rain and cold,” he said.
<urn:uuid:5c95315f-2d8c-4e83-90e3-a344feb1ee53>
CC-MAIN-2017-04
http://archive.siasat.com/news/europe-tackle-refugees-along-western-balkans-route-857722
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00464-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953992
177
1.898438
2
Oaklands Hill Wind Farm produces enough clean, green energy power to power approximately 35,000 average Australian households annually. With 32 wind-turbines, and a capacity of 63MW, the Oaklands Hill Wind Farm will provide renewable energy to the National energy market for at least 25 years. Development and Maintenance AGL commenced construction on site in mid 2010 with practical completion achieved in February 2012. Suzlon Energy Australia Pty Ltd (SEA) was awarded the Engineer Procure & Construct (EPC) contract for the AGL Oaklands Hill Wind Farm project. There are 32 SUZLON S88 turbines at the AGL Oaklands Hill Wind Farm with a capacity of 2.1MW each. The total output from the wind farm is capped at 63MW. The $200m AGL Oaklands Hill Wind Farm is made up of 32 wind turbines located on 2,323 hectares of freehold agricultural land 3km south of Glenthompson, in the shire of Southern Grampians in Western Victoria. As indicated in the map linked below, the wind farm is located on eight properties that are predominately used for sheep and cattle grazing. The location was chosen for its high potential wind harvesting capacity. Map: Oaklands Hill Wind Farm Stakeholder consultation has always been very important to the development, construction and operation of the wind farm. AGL undertook a wide range of comprehensive studies to determine the impact on ecology, landscape, cultural heritage, visual amenity and other environmental factors such as noise. The AGL Oaklands Hill Wind Farm project underwent a robust development process resulting in a planning permit issued in late 2008. AGL continues to work closely with landowners, the community and local and state authorities to mitigate and minimise impact of the wind farm. The AGL Oaklands Hill Wind Farm generates enough clean, green energy during periods of peak demand to power approximately 35,000 average Australian households per year, with a greenhouse gas emission savings of approximately 175,000 tonnes per annum. The Wind Farm had a payback period of 'embodied energy' of approximately five months, meaning that the total amount of carbon emissions created during construction of the farm would have been offset by operation within five months. Key Statistics: Oaklands Hill Wind Farm
<urn:uuid:ebab3811-3b2d-48e1-9580-a293b799b525>
CC-MAIN-2017-04
https://www.agl.com.au/oaklandshill
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00133-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948862
465
2.265625
2
2 Albany High students wounded Updated 5:08 pm, Thursday, January 24, 2013 Two Albany High School students were shot and wounded in El Cerrito after being "asked about their shoes," authorities said Thursday. The victims and a third Albany High student were on a trail called the Ohlone Greenway underneath the BART tracks between Lincoln and Stockton avenues at 2 p.m. Wednesday when they were accosted by two men, according to a statement that Albany Unified School District officials sent to parents. The men asked the youths about their shoes, then one opened fire and hit two of the students, authorities said. The third student escaped uninjured. The two students hit by gunfire are expected to survive. No arrests have been made. District officials did not elaborate on the nature of the men's query about the students' shoes. The shooting happened after Albany High had let out for the day. It led to lockdowns at two schools in El Cerrito, Fairmount Elementary and El Cerrito High. "Our thoughts are with the families as (the students) recover from this tragic incident," the school district's statement said. "Please remind your student to take all possible precautions when walking to and from school."
<urn:uuid:a8739fac-5a27-4a04-ac71-74635d0196c4>
CC-MAIN-2017-04
http://www.sfgate.com/crime/article/Students-asked-about-their-shoes-shot-4221473.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00148-ip-10-171-10-70.ec2.internal.warc.gz
en
0.983982
254
1.523438
2
NordVPN, a provider of virtual private network services that allow Internet users to bypass censorship or regional content blocking, has established an Emergency VPN program, freely available to those who need online privacy and security in case of emergency, under extreme duress or threat of physical danger. However, it is also doing so partly in support of Open Media, an internet-advocacy group, which has attacked Netflix for its stance on VPNs. Open Media has published an open letter to Netflix CEO Reed Hastings, saying: “VPNs are one of the best and most accessible tools that Internet users have to protect our privacy. Whether it’s from malicious criminal activities, government surveillance and censorship, or simply connecting to a weakly-secured hotel Wi-Fi system, our personal and private digital information is constantly being put at risk and made vulnerable online.” There are also countries,NordVPN said in a statement, where a lot of Internet content is blocked by “governments trying to control what their citizens can and cannot access”. In all these cases, it says, VPNs are crucial for Internet freedom, privacy, and in cases with repressive governments, VPNs could perhaps save lives by providing anonymity to journalists and activists (for example, potentially protecting them from incidents like the recent killings of bloggers in Bangladesh or sentencing of a blogger in Saudi Arabia). Responding to Hastings’ statement that VPN users are “a very small but quite vocal minority,” Open Media said: “We are not small, and we¹re not insignificant, but you did get one thing right: we are vocal. And we think it¹s important that our voices be heard. So far nearly 45,000 people have joined our campaign asking you to not block pro-privacy VPN technology.” NordVPN directly is participating in the call to sign the petition. It can be accessed here: https://nordvpn.com/blog/netflix-vs-privacy. NordVPN and Open Media also agree that Netflix is an advanced streaming service and “we love their services.There should be a better way, however, to solve licensing issues than blocking VPNs and privacy that they provide.” NordVPN points out that it’s system still functions effectively with a Netflix account.
<urn:uuid:d9e692ed-8b1e-4374-ac0c-20fe2e07d869>
CC-MAIN-2017-04
http://www.gadget.co.za/netflix-faces-vpn-backlash/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00427-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951184
484
1.992188
2
So you might be thinking WHY! It’s all about TEAM work? Would you agree that these games have been so exciting? And so much to celebrate, especially if you like me, as a “Brit”, have been watching Team G.B. achieve our “Best Olympics ever” finishing ahead of China and coming 2nd in the medals table. As we have now reached the end of the Olympic games in Rio 2016 “The Greatest Show In The World” like me, you maybe already eagerly anticipating the Paralympics that start on the 7th September. Looking at the results: 27 gold, 23 silver and 17 bronze from the Cycling with the most medals to Badminton & Judo with a bronze each you can see the vast array of individual medals and team medals we’ve won. From the surprise gold for ‘Magic” Max Whitlock to the “at last” moment for veteran Nick Skelton in the show jumping and even for the “youngest star” at just 16 years old, Amy Tinkler, who won a bronze, you can see how much the medals mean to them. We also saw how disappointment can far outweighed the delight of winning a medal, as Lutalo Muhammad won a sliver: “I’m so distraught,” said a tearful Muhammad after his defeat. “I was so close to becoming Olympic champion and making my dream” “I don’t want to cry but I am so sorry to the people that stayed up to watch. I let them down at the last second. This is so hard” These scenes got me thinking about how much harder it is to be a lone sportsman or woman – all the pressure just on one and even those individuals who were celebrating their wins with big smiles still looked vulnerable and isolated, alone on the podium. Compared to the scene of the ladies hockey team as Hollie Webb scored the winning penalty as you can see here, the teammates all ran together to share in the glory. It was the words of the women’s hockey captain Kate Richardson-Walsh that really summed up the games for me: We wanted to be the difference, create history and inspire the future And this is exactly what they did – as a team. So you might be thinking what am I trying to say – that the individual medal winners were not as important? Should we only play team sports? Well, no, that isn’t what I’m saying at all, you see those individual medals were not really won alone, they just looked alone. Think about it behind every success is a TEAM, whether or not it is obvious. For example Nick Skelton couldn’t have won his gold medal without his beautiful horse Big Star and all of the Olympians had managers and coaches that we saw celebrating from the side lines and there are of course the unsung heroes that are not front stage and centre, the family, the friends and those that keep the “star” going in. You see without these unsung heroes the star wouldn’t be stars. And WHY! Well it’s because we are not designed to do it alone, as Marion Bevington (co-creator of The Live Love Laugh Lounge) wrote in a recent blog Collaborate or Compete. Here she shares how the concept of being separate and alone breeds fear and “set us up to become cut-throat, competitive and self-centred.” All of this makes me think about the Ego, and how it can lead to such ugly traits (we’ll discuss that in detail in a future blog) it can be the part of you that feels attacked and afraid and this is when all those “trust” issues come to the forefront, ideas like “I can’t trust anyone” or “No-one can do this as good as me”, “I can only rely on myself…” It’s a downward spiral my friend… And I’m sure you know how it feels to be on the receiving end too, you know the one where you are supportive and co-operative and you contribute to or do something great and then someone else takes all the glory… So that’s what I mean by UGLY! Going back to Nick he said you have to trust to be part of a TEAM, that is to be part of a winning TEAM. That’s because T.E.A.M is all about sharing the load, sharing the glory and sharing the joy; because I believe Together Everyone Achieves More! So I’d like you take a minute, to nominate those who are in your TEAM and who you would like to award a medal to, put this in the chat box below. In the meantime remember to Live Love Laugh everyday, and continue to be you in your unique way – because your TEAM needs YOU! Love Cheryl x If this resonates with you, you might like to get your hands on a copy of the book Find Your WHY! to become frickin’ awesome (the book is FREE all you need to pay for is a small fee towards shipping & handling) Please go ahead and complete the boxes below
<urn:uuid:720c87af-a427-42a3-8cda-e69858b12de0>
CC-MAIN-2022-33
https://www.cheryl-chapman.com/why-team-work/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00074.warc.gz
en
0.965467
1,126
1.523438
2
Other insurance expenses include premiums paid for travel insurance, GAP insurance, pet insurance, and golf insurance. These type of insurance products are designed to cover losses or expenses which may not be covered by other insurance. Other Insurance in Detail Let's look at some common types of other insurance. Travel insurance covers any expenses or losses incurred while travelling abroad. These include expenses on medical emergencies and costs of cutting short/cancelling/delaying the trips. Traven insurance also covers losses that may result from a lawsuit abroad for damaging someone's property or injuring someone. Travel insurance is also useful if your bag is lost or stolen abroad. Flexicover, a specialist provider of travel insurance, offers different products such as single trip, annual plan for multiple trips, long stay, winter sports, and gap year. The single trip policy covers single trips of up to 100 days by individuals of up to 85 years of age. The policy covers up to 120 sporting activities for free. Certain policies also cover scheduled airline failure. Premiums are lesser if combined policies are taken for families, couples or single parent families. In 2011, nearly 26.2 million consumers had bought travel insurance. Average premium for travel insurance during the same year was £24 for an annual cover and £35 for a single trip cover. GAP Insurance, or guaranteed asset protection for car pays for risks, which are not covered by car insurance. GAP insurance is applicable only in case the vehicle is written off completely either due to an accident or theft. Someone has taken a Vauxhall Agila worth £7,691 on finance for five years. Suppose, at the end of the second year, the vehicle is stolen or damaged completely due to an accident resulting in its book value becoming zero. In such an event, the car insurance policy will cover the loss only up to the car's present market value, or let's say £3,000 at the end of three years. However, the car owner may have an obligation to pay back £4,000 to the finance company. So not only the owner has lost the car but also has a shortfall of £1,000 to pay the finance company. This is where GAP insurance comes into the picture and covers the loss of £1,000. As per a GAP insurance comparison site gapinsurance.co.uk, a three-year cover can cost in the range of £101 to £248.40 for vehicle values of up to £22,995. The maximum claim limit is £15,000. The demand for GAP insurance is increasing with nearly 70% of cars in the UK being bought on finance. Visit gapinsurance.co.uk to know more about GAP insurance. Pet insurance covers the cost of treatment of pets. In 2012, more than 2.7 million people in the UK had insurance for their cats and dogs. Pet insurance expenses have been increasing with some pet owners paying annual premiums as high as £3,420. Argos Pet Insurance has different policies such as multi-pet insurance, cat insurance, and dog insurance. Cat insurance premiums start from £4.15 for the silver plan to £5.81 for the platinum plan. Dog insurance premiums are minimum £6.09 each month for the silver plan and £9.77 for the platinum plan. Our household budget calculator can be of help to calculate the role of other insurance in your household budget. Popular Tax Terms Guides and Calculators People who read 'Insurance and your Household Budget' also viewed the following tax terms, payroll tools and calculators: Salary Calculators & Tools - 2016/17 PAYE Tax Calculator (UK) - 2017 Tax Calculator (US) - 2017 Tax Calculator (CN) - 2017 Tax Calculator (CA) - 2017 Tax Calculator (AU) - 2017 Tax Calculator (IN) - 2017 Tax Calculator (JM) - Employer NIC Calculator - Mortgage Calculator - Personal Loan Calculator - Global Tax Calculators - Dividends Calculator 2017/18 - Corporation Tax Calculator 2017/18 - VAT Calculator - Small Business Rate Relief Calculator - Payslip Calculator and Analysis - Employer NIC's Calculator - Employer NIC Salary Examples - Labor Cost Per Employee Calculator - Revenue Per Employee Calculator - Simplified TimeSheet Calculator - Timesheet Calculator - True Cost Of An Employee Calculator - Bradford Factor Calculator - Cost Per Hire Calculator - Turnover Rate Calculator - Performance Management Calculator - Time To Fill Open Vacancies Calculator - Turnover Cost Calculator - First Year Employment Turnover Rate Calculator
<urn:uuid:06b41b67-c65e-46e3-ad05-17460200eb94>
CC-MAIN-2017-04
http://www.icalculator.info/terminology/other-insurance.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00322-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941381
955
1.546875
2
Following up on this week's speaker, this slate piece discusses (a bit more generally and sometimes a little creepily) some of challenges with what seems to me like data-sharing problems - between different cities trying to solve the same problem - between metastasized bureaucracies trying to solve the same problem Koonin and Cohen agreed that one of the best ways to help cities like New York develop resilience is to work with other places facing the same problems. For instance, if you’re worried about earthquakes, Koonin said, look to the seismic codes of Japan, which requires gradual upgrades to its buildings. Cohen pointed to some efforts of the Dutch as models for how New York City could address sea-level rise. The NYC mayor’s office is involved the C40 group of dozens of cities—originally 40, but now more than 50—that are engaged in discussion about climate change. Perhaps the biggest hurdle, aside from budget, is bureaucracy. Koonin believes that when it comes to inefficiencies, “We do a lot of this to ourselves, the way we divide up governmental authorities.” Too many departments are involved in the same areas—like energy policy.
<urn:uuid:2efaea8e-bd98-46d1-888b-7a9b825e83ba>
CC-MAIN-2017-04
http://www.cryocity.org/blog-pcc-class/open-source-climate-change-adaptation
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00403-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959301
246
1.828125
2
Soft tissue lesions Soft tissue lesions strike fear in many pathologists as they are uncommon and may be difficult to diagnose. Malignant soft tissue lesions, i.e. cancerous soft tissue lesions, are usually sarcomas. Sarcomas are malignancies derived from mesenchymal tissue. WHO classification of soft tissue lesions/tumours - Adipocytic tumours. - Fibroblastic/myofibroblastic tumours. - "Fibrohistiocytic" tumours. - Smooth muscle tumours. - Skeletal muscle tumours. - Vascular tumours. - Perivascular (pericytic) tumours. - Chondro-osseous tumours. - Tumours of uncertain differentiation. Biologic potential grouping - Intermediate (locally aggressive). - Intermediate (rarely metastasizing). - All sarcomas are rare buggers. - As the classification has been changing over the past years (with more subtypes being recognized/identified) numbers are variable from study-to-study. - Once upon a time almost everything was called malignant fibrous histiocytoma; thus, it is listed as a common entity in some publications. - Molecular testing plays an important role in soft tissue pathology. - It is generally seen as an adjunct test that: - Often is used to confirm the histomorphologic impression/quality control. - Frequently has some prognostic significance. - May directly affect treatment. - Many tumours in soft tissue pathology are diagnosed inconjunction with the finding of chromosomal translocations. |Storiform, AKA patternless pattern||whorled, cartwheel-like arrangement||pleomorphic undifferentiated sarcoma, solitary fibrous tumour, dermatofibrosarcoma protuberans, dermatofibroma| |Herring bone||like herring bone (technique) for climbing a hill in cross country skiing; books on a shelf, where they have partially fallen over -- on the one shelf to the left and the one below to the right||fibrosarcoma, synovial sarcoma, MPNST| |Fascicular||the long axis of the (spindle) cells are perpendicular to one another in adjacent bundles of cells||leiomyoma, leiomyosarcoma| |Biphasic||nests of cells and stroma||synovial sarcoma, DSRCT, alveolar RMS| - Memory device: herring bone DDx MSF = MPNST, Synovial sarcoma, Fibrosarcoma. - Several systems exist. - The US-CAP advocates the use of the French system over the NCI system. - The French system is a better predictor metastases and mortality. - Formally known as the grading system from the French Federation of Cancer Centres Sarcoma Group (FNCLCC). - Differentiation (score 1-3). - De facto, this is mostly the histologic type. - Mitotic rate (score 1-3). - Necrosis (score 0-2) Obtaining a score: - Add all the points from the three components. - Grade 1 = 2-3. - Grade 2 = 4-5. - Grade 3 = 6-8. - Standardized for histologic types. - Most tumours = 3/3. - Well-differentiated liposarcoma = 1. - Myxoid liposarcoma = 2. - Conventional liposarcoma = 2. - Fibrosarcoma = 2. - Myxofibrosarcoma =2. A group of tumours is not graded: - Alveolar soft part sarcoma. - Clear cell sarcoma. - Extraskeletal myxoid chondrosarcoma. - 0-9 mitoses/10 HPF. - 10-19 mitoses/10 HPF. - >=20 mitoses/10 HPF. - 1 HPF = 0.1734 mm^2. - Most resident microscopes have a field of view = 0.2376 mm^2. - Thus, ~7.3 HPFs on a resident microscope corresponds to 10 US-CAP HPFs. - Most resident microscopes have a field of view = 0.2376 mm^2. - None = score 0. - <=50% of tumour = score 1. - >50% of tumour = score 2. System used by some at MSH - Grade 1 = 1 point. - Grade 2 = 2 points. - Grade 3 = 3-4 points. Points for each of the following: - Mitotic activity >= 6 / 10 HPF @ 40X - definition suffers from HPFitis. - Pleomorphism present. - Cellularity (cells/matrix) > 50%. - Necrosis >15% - microscopic (without targeting necrosis grossly) or grossly. Lymph node metastases in sarcomas - Lymph node (LN) spread is uncommon in sarcomas; lymph node metastases are seen in <3% of cases. Sarcomas more likely to be found in the lymph nodes - mnemonic RACE For MS: - Clear cell sarcoma. - Epitheliod sarcoma. - Malignant fibrous histiocytoma (pleomorphic undifferentiated sarcoma). - Synovial cell sarcoma. DDx by history/site Young person - extremity sarcoma - Usually non-specific. - Most sarcomas have a pushing border. - If there is an infiltrative border think: (1) fibromatosis, (2) carcinoma. This category includes: Smooth muscle tumours IHC markers: desmin, SMA, H-caldemsin (most specific). - Fasicular cellular spindle cell lesion with: - Nuclear atypia. - High mitotic rate. Fibrohistiocytic refers (only) to the histomorphologic appearance and therefore may be written in quotation marks; these tumours are not derived from histiocytes (or tissue macrophages), as the name implies. Pleomorphic undifferentiated sarcoma - Abbreviated PUS. - AKA Undifferentiated pleomorphic sarcoma, abbreviated UPS. - Previously known as malignant fibrous histiocytoma, abbreviated MFH. This is a very large and important group of soft tissue lesions. It is covered in a separate article. The grouping includes: - Inflammatory myofibroblastic tumour. - Nodular fasciitis. - Desmoid-type fibromatosis (Desmoid tumour). - Proliferative fasciitis. - Solitary fibrous tumour (Hemangiopericytoma). - Desmoplastic fibroblastoma. - Low-grade fibromyxoid sarcoma. This grouping includes only two: Vascular lesions are "too red"; they have too many RBCs. Skeletal muscle tumours - Abbreviated RMS. Comes it two main flavours: - Alveolar rhabdomyosarcoma. - Embryonal rhabdomyosarcoma. The histology may be that of a small round cell tumour. Tumours of uncertain differentiation Angiomatoid fibrous histiocytoma - AKA deep aggressive angiomyxoma. Extrarenal malignant rhabdoid tumour - A small round blue cell tumour that may be seen in bone. It is discussed in the context of bone tumours. - Sarcomas with an epithelioid morphology are covered in epithelioid sarcomas. Alveolar soft part sarcoma Desmoplastic small round cell tumour Clear cell sarcoma - Common alternate terms: extramedullary leukemia, myeloid sarcoma, chloroma. - Other terms: myeloblastoma, chloromyeloma, chloromyelosarcoma, granulocytic leukosarcoma, or myelosarcoma. - Spindle cell lesion. - Small round cell tumours. - Humphrey, Peter A; Dehner, Louis P; Pfeifer, John D (2008). The Washington Manual of Surgical Pathology (1st ed.). Lippincott Williams & Wilkins. pp. 601-3. ISBN 978-0781765275. - Humphrey, Peter A; Dehner, Louis P; Pfeifer, John D (2008). The Washington Manual of Surgical Pathology (1st ed.). Lippincott Williams & Wilkins. pp. 598-604. ISBN 978-0781765275. - Skubitz KM, D'Adamo DR (November 2007). "Sarcoma". Mayo Clin. Proc. 82 (11): 1409–32. PMID 17976362. http://www.mayoclinicproceedings.com/content/82/11/1409.long. - Fletcher CD, Fletcher JA, Dal Cin P, Ladanyi M, Woodruff JM (July 2001). "Diagnostic gold standard for soft tissue tumours: morphology or molecular genetics?". Histopathology 39 (1): 100–3. PMID 11454050. - Mangano WE, Cagle PT, Churg A, Vollmer RT, Roggli VL (August 1998). "The diagnosis of desmoplastic malignant mesothelioma and its distinction from fibrous pleurisy: a histologic and immunohistochemical analysis of 31 cases including p53 immunostaining". Am. J. Clin. Pathol. 110 (2): 191–9. PMID 9704618. - Meister P, Höhne N, Konrad E, Eder M (July 1979). "Fibrous histiocytoma: an analysis of the storiform pattern". Virchows Arch A Pathol Anat Histol 383 (1): 31–41. PMID 224569. - Guillou L, Coindre JM, Bonichon F, et al. (January 1997). "Comparative study of the National Cancer Institute and French Federation of Cancer Centers Sarcoma Group grading systems in a population of 410 adult patients with soft tissue sarcoma". J. Clin. Oncol. 15 (1): 350–62. PMID 8996162. - URL: http://www.cap.org/apps/docs/committees/cancer/cancer_protocols/2011/SoftTissue_11protocol.pdf. Accessed on: 12 April 2011. - Costa J, Wesley RA, Glatstein E, Rosenberg SA (February 1984). "The grading of soft tissue sarcomas. Results of a clinicohistopathologic correlation in a series of 163 cases". Cancer 53 (3): 530–41. PMID 6692258. - Fong, Y.; Coit, DG.; Woodruff, JM.; Brennan, MF. (Jan 1993). "Lymph node metastasis from soft tissue sarcoma in adults. Analysis of data from a prospective database of 1772 sarcoma patients.". Ann Surg 217 (1): 72-7. PMC 1242736. PMID 8424704. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1242736/. - URL: http://www.cap.org/apps/docs/committees/cancer/cancer_protocols/2011/SoftTissue_11protocol.pdf. Accessed on: 28 March 2012. - URL: http://www.aippg.net/forum/f21/surgery-mnemonics-79897/. Accessed on: 23 March 2012. - Luzar, B.; Calonje, E. (Jan 2010). "Cutaneous fibrohistiocytic tumours - an update.". Histopathology 56 (1): 148-65. doi:10.1111/j.1365-2559.2009.03447.x. PMID 20055912. - URL: http://sarcomahelp.org/learning_center/mfh.html. Accessed on: 8 April 2011. - Humphrey, Peter A; Dehner, Louis P; Pfeifer, John D (2008). The Washington Manual of Surgical Pathology (1st ed.). Lippincott Williams & Wilkins. pp. 602. ISBN 978-0781765275. - Humphrey, Peter A; Dehner, Louis P; Pfeifer, John D (2008). The Washington Manual of Surgical Pathology (1st ed.). Lippincott Williams & Wilkins. pp. 627. ISBN 978-0781765275. - Bakst, RL.; Tallman, MS.; Douer, D.; Yahalom, J. (Oct 2011). "How I treat extramedullary acute myeloid leukemia.". Blood 118 (14): 3785-93. doi:10.1182/blood-2011-04-347229. PMID 21795742. - Eom, KS.; Kim, TY. (Mar 2011). "Intraparenchymal myeloid sarcoma and subsequent spinal myeloid sarcoma for acute myeloblastic leukemia.". J Korean Neurosurg Soc 49 (3): 171-4. doi:10.3340/jkns.2011.49.3.171. PMC 3085814. PMID 21556238. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3085814/.
<urn:uuid:c06b2fd7-f7af-4ba0-8454-d9d8d3acded9>
CC-MAIN-2022-33
https://librepathology.org/wiki/UPS
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00667.warc.gz
en
0.650073
3,445
2.5
2
Marijuana legalization, either for medicinal or recreational use, is attracting lots of allies lately that formerly would not have been thought to side with pot. Law enforcement agents and government officials are starting to come around about the damaging effects of a Prohibition-style “War on Drugs”. The general public is seeing that many of the arguments put forth by legalization opponents are just not holding water any longer. Areas that have legalized marijuana in one form or another are reporting none of the crime spike or underage use issues that naysayers had predicted. In fact, traffic fatalities and prescription drug overdoses are down in those areas. And, as predicted, tax revenues are up. Now doctors are starting to speak out about the advisability, and even legality, of classifying cannabis as a Schedule I drug. The scheduling system allows the President of the United States the authority to place a substance on a list that declares it as meeting the following criteria: * The drug or other substance has a high potential for abuse. * The drug or other substance has no currently accepted medical treatment use in the U.S. * There is a lack of accepted safety for use of the drug or substance under medical supervision. Some substances currently on the Schedule I list include: * Heroin (diacetylmorphine) * LSD (Lysergic acid diethylamide) * Marijuana (cannabis, THC) * Mescaline (Peyote) * MDMA (3,4-methylenedioxymethamphetamine or “ecstasy”) * GHB (gamma-hydroxybutyric acid) * Ecstasy (MDMA or 3,4-Methylenedioxymethamphetamine) * Methaqualone (Quaalude) * Khat (Cathinone) * Bath Salts (3,4-methylenedioxypyrovalerone or MDPV) Note that marijuana is on this list still, even though doctors in some states do prescribe it, which would seem to defy point two of the definition, above. MDMA is also on the list, even though it was regularly prescribed by psychiatrists for years before its abuse became fashionable. This is exactly what those doctors now point out. “[I]t is my considered opinion that including marijuana in Schedule I of the Controlled Substances Act is counter to all the scientific evidence in a society that uses and values empirical evidence,” Dr. Carl Hart, Associate Professor of Psychology at Columbia University said. “After two decades of intense scientific inquiry in this area, it has become apparent the current scheduling of cannabis has no footing in the realities of science and neurobiology.” Hart and other doctors are due to testify Monday in a Federal case listed as United States v. Pickard, et. al. This is a significant development in the legalization battle at the Federal level. The drug scheduling arrangement is completely Federal and is defended tirelessly by the Drug Czar’s office. Bertha Madras, former White House Drug Czar deputy director under George W. Bush, will also testify in defense of the current classification of marijuana as a Schedule I drug. Madras is fine with using THC, the active ingredient in marijuana, in medicinal applications. But she compares using unprocessed marijuana to achieve that use to other plant-based medicines that are not smoked or ingested. “Although more than 30% of current therapeutic drugs are plant-derived, no one currently eats or smokes foxglove plants to treat a heart condition, chews cinchona bark to alleviate malaria symptoms, or eats opium poppies to relieve post-surgical pain,” Madras writes. The problem with Madras’ comparison is that it willingly turns a blind eye to the fact that many people do, indeed, achieve relief of symptoms by smoking or ingesting marijuana. Foxglove is toxic; some have dies from eating it. Marijuana is not toxic at all. In fact, there has never been, in all of recorded history, a death from marijuana overdose. The opinion that cannabis is not harmful and should not be classified as Schedule I is not new. Richard Nixon is the president who first placed marijuana on the list, against the recommendation of his own National Commission on Marihuana and Drug Abuse “little proven danger of physical or psychological harm from the experimental or intermittent use of the natural preparations of cannabis.” In addition, Nixon’s Commission actually recommended that possession of marijuana for personal use not be criminalized at all, and that distribution of small amounts for no profit not be an offense. That was in 1970. It has taken 44 years for this argument to make its way into a Federal courtroom again.
<urn:uuid:6aaf1831-2029-4607-917f-01a1a828b73c>
CC-MAIN-2022-33
https://www.webpronews.com/marijuana-legalization-doctors-argue-war-on-pot-has-no-footing-in-reality/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00076.warc.gz
en
0.951766
989
1.898438
2
Geotag on the Internet is usually done in two ways: One way is with the computer IP-address, the other with the HTML5. Proxistore has been able to develop his own geotagging system which is unique in Europe. But how exactly does all of this work? The Internet Protocol address (IP address) is a unique ID that allows us to identify each computer on the Internet. Most of the time, those numbers are attributed by country and therefore allows us to distinguish the country in which the computer is located. However, the IP-address remains less accurate when it has to identify a computer within a district or a neighborhood. Getoagging with HTML5 is possible by collecting data on our browsers (such as Firefox, Safari, …). Those data can whether be IP address, GPS data, SSID, specific data the user gave, etc. As for Proxistore, the company has set up a geotag cascading tool which is unique and patented in Europe and based on the HTML5 and the requalified IP-address. So it is now possible to detect automatically the surfer geographic location with his browser, but only if he uses a HTML5 technology. In this case, consent is first necessary (agreement via a confirmation window on the screen) so that privacy rules are respected. The geotag cascading of Proxistore allows us to make up for the inaccuracy of the IP-address and offers a unique geolocating system extremely accurate respecting user’s privacy. How does the patented geotagging system of Proxistore work? (lien) What are the laws regarding privacy and geolocation? Proxistore is subject to the law of December 8, 1992 related to the protection of the privacy with regards to personal data. Personal information and data that may be collected by Proxistore regarding users are the following: - their internet domain ; - their computer IP address ; - all the information regarding the visited Proxistore website pages and the last actions that have been made. The publisher of one or more websites commit themselves to obtain users’ permission when visiting these websites so that they can agree to be geolocated T: +32 2 423 55 60 A: Avenue Pasteur 6/H 1300 Wavre – Belgium
<urn:uuid:caeac474-8b8e-4ae0-b1ad-922400a1d6ae>
CC-MAIN-2022-33
https://proxistore.com/en/how-does-geotagging-work/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00271.warc.gz
en
0.915082
499
2.5
2
Three different gates. One leads to the scandal of the 70’s. One leads down the rabbit hole. And one leads over the rainbow. Which gate will you choose? “Conspiracy Theories” may sound implausible to the average citizen, until you have the bullet points to back them up! “The Gate Map” is one of the earliest artworks created for Deep State Mapping Project by Dylan Louis Monroe in 2017. It was the first to incorporate lines and bullet points to explain complex scandals, and expose the corruption of the government and ruling elite. Printed on high quality cardstock. Reverse side includes artwork abstract. Size: 8.5 x 11″ Version: v.6.24.22, updated landscape format edition.
<urn:uuid:980481bb-c4c8-402a-9a61-a5ffe6bf8600>
CC-MAIN-2022-33
https://deepstatemappingproject.com/product/gate-map-pizzagate-8-5-x-11-cardstock/?add-to-cart=9914
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00470.warc.gz
en
0.91519
159
1.507813
2
- Photo by Cheryl Gerber - Owner Greg Levy (left) and his son Aaron Levy are flanked by school supplies at Educator, a teaching supply store that opened in 1976. Right on the edge of Fat City, there's an unlikely establishment specializing in supplies for teachers. The exterior of the Educator (3017 Edenborn Ave., Metairie, 454-5147; 1760 Stumpf Blvd., Terrytown, 367-8910) features a big yellow school bus to welcome teachers, parents and children. Inside the former carpet factory, owner Gary Levy helps his sons Greg and Aaron run the store. "Thirty-seven years ago my wife Jan and I started this store because there was a need for school supplies and teacher supplies," says Levy, who despite being retired loves coming into the store every day, He and his wife opened Educator in 1976, and since then have added a second location on Edenborn Avenue. The store's atmosphere resembles a classroom. Specialty rugs, tables and chairs, puzzles, chalkboards and posters line the front area and help children feel comfortable in the store. "The kids come in and see things from their own classroom," Levy says, "and they identify with that." Parents can find nap mats, crayons, pencils, markers, art supplies, books bags and notebooks for kids to bring to school. There are math, science, grammar, creative writing and English workbooks, grade books and classroom charts, motivational posters and bulletin board borders. These goods, as well as the laminating machine, help teachers customize their classrooms and cater to their students. "A successful teacher is going to select products that work for her," Levy says. The wide variety of items draws teachers year after year, some of whom reunite with their peers when they shop in August. "We have one customer who flies from her home in South America every year," Levy says. "She comes to the store and stocks up on supplies, and then flies back to South America to teach." Sometimes people outside the teaching profession frequent Educator. "We get business from hotels so they can decorate their break rooms," Levy says. Hollywood film industry professionals come in for set items. "They buy tables, or mats or chairs," Levy says. "Anything they buy and use, they then donate to schools around the area." Though new technologies have shifted the landscape of education, Levy says his business has kept abreast of the changes while staying true to the fundamentals. "Our offerings have blossomed over the years, but we still believe in the basic building blocks of education," Levy says. "Making sure a child can read at their particular level, write and speak correctly by the time they leave the classroom is important to us."
<urn:uuid:823a7360-fb0f-4e20-b05d-2f8144228067>
CC-MAIN-2017-04
http://m.bestofneworleans.com/gambit/teachers-paradise/Content?oid=2060519
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00426-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97525
570
1.53125
2
Progress made on restoration and archaeology projects Hallowed Ground Magazine, Summer 2015 Issue The last slice of pizza has been consumed on Tennessee’s Franklin Battlefield! On April 22, 2015, demolition began on the former Domino’s Pizza location along Columbia Avenue that was purchased by Franklin’s Charge with the assistance of the Civil War Trust last year: the latest — and perhaps most anticipated — chapter in a long story of transformation. The process was a fitting bookend to the first major demolition event in this area of the battlefield, the removal of a Pizza Hut franchise in 2005. Now, where once little evidence of bloody struggle remained, a true battlefield park is taking shape. To mark the momentous occasion, preservationists gathered to hear reflections on their community’s circuitous path to becoming the poster child for battlefield reclamation. In addition to hearing from speakers representing community groups and those pledging their support toward rebuilding a representation of the Carter Cotton Gin on its original location — which was uncovered in May during ongoing archaeological investigations — guests enjoyed complimentary Domino’s pizza and a toast from commemorative cups. The Trust and Franklin’s Charge began working to purchase the “strip center” property — a key parcel that offered the potential to generate the critical mass of land for creation of a meaningful park in the breakthrough area — in 2013. The first phase of demolitions on the land occurred last autumn in conjunction with the battle’s 150th anniversary commemoration.
<urn:uuid:09e75510-f087-4117-83e0-d8fbd97f139d>
CC-MAIN-2017-04
http://www.civilwar.org/hallowed-ground-magazine/summer-2015/franklin-cheers.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00292-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940513
304
1.96875
2
We have been through a number of ‘systems’ to try to manage our homeschool. One one hand I need for them to get things done on the other I like to let them loose to discover on their own. Finding the balance is always a challenge. Early in the semester thing tend to be a little more laid back and just reading, absorbing material, doing experiments. As we get closer to the portfolio times the requirements change to demonstrating the knowledge that they have learned and that is when the to-do lists become more specific. The first system is more a time management system called Pomodoro. We have modified it slightly for our homeschool. It should be 25 minutes on and 5 minutes off but we do 30 minutes of works and 10 minutes of break. That gives us four before lunch and then we do another four after an hour long lunch. I like it because if we start late or a break goes long we still do the same amount of time each day. It is also the way that I do my housework and other tasks. So I follow the same schedule. Last year we tried using a systems from my wife’s work called ‘Agile’. It involved a ridiculous number of sticky notes. Basically they had a number of task that should be able to be completed in one pomodoro written out on these sticky notes. They would pick one off the wall and move it to their desk. When it was complete they moved it to my desk where in theory I would record that it was done. I quickly became buried in sticky notes. It ended up morphing back in to a to-do list with large items that they could work on however they wanted. I do allow them a lot of flexibility. There are term goals which are effectively the portfolio items. There are a number of things that they must do to get to that portfolio item. They can’t write a essay on a book that they haven’t read for example. The weekly item are to lead up to those portfolio items and in the beginning are quite general. How they work during the day and week are up to them. I have seen them spend all day Monday getting their math out of the way. Their to-do lists are on their own whiteboards. I just have to make sure things are done to my satisfaction before they cross them off. It is not a perfect system but then what is. It works for us and that is what is important. The time just before the portfolios are due is always stressful but I think it would be no matter what system we used. Linking Up At
<urn:uuid:e5316625-e67b-414b-8c27-6add665af100>
CC-MAIN-2022-33
https://www.talesofahousehusband.com/2014/08/27/a-day-in-our-homeschool-life/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.977223
540
1.984375
2
Five Halloween products for one low price! These products include writing activities, research, and grammar for the middle school language arts classroom. Product 1: Halloween Around the World Docdecahedron This is resource is a fun, hands-on Halloween research activity! Students will research the origin of Halloween and how Halloween is celebrated in different countries using a graphic organizer and then display their information and pictures by creating a dodecahedron. Students will research how the following countries celebrate Halloween: United States, Hong Kong, China, Austria, France, Ireland, England, Mexico, Japan, Philippines, and Scotland. Student Assignment Sheet/Graphic Organizer (2 Pages) Assembly instructions with pictures Dodecahedron template (6 pages) These 3D research projects are great to display in the classroom! Product 2: The Life of a Monster Writing Activity This activity addresses the following writing standard: Write narratives to develop real or imagined experiences or events using effective technique, well-chosen details and well-structured event sequences. This activity is a fun and engaging Halloween writing assignment! It is intended to be printed as a packet for students to write an imaginative narrative through the eyes of a monster. Students have the opportunity to create a monster and write about what it is like to live a day in the monster's shoes. Graphic organizers, writing paper, peer editing checklist and questions, and grading rubric are included! If I were a monster prewriting If I were a monster self portrait A Day in the Life of a Monster Prewriting Organizers (2 pages) Writing Pages (2) Peer Editing Pages (2) Monster Story Grading Rubric Product 3: Halloween Parts of Speech Drawing Activity This download is a fun, engaging, and creative way to practice identifying and correctly using the parts of speech. My middle school students love any hands on activities that involve coloring. This assignment resembles a directed draw. They also have an opportunity to practice following directions and writing descriptions! Students are given a set of directions. Each set of directions include the parts of speech. Students label the parts of speech and follow the directions that lead them to completing a Halloween or Fall drawing. Parts of Speech Reference Sheet Parts of Speech Drawing #1 A Haunted House Teacher Answer Key for A Haunted House Parts of Speech Drawing #2 A Fall Scene Teacher Answer Key for A Fall Scene Preposition Drawing #3 A Spooktacular Drawing Teacher Answer Key for a Spooktacular Drawing Student Parts of Speech Drawing Assignment Sheet Product 4: Halloween Writing Prompt Task Cards This resource includes 25 fun writing task cards for Halloween (grades 5-8). These cards can be used as an early finisher activity, journal prompts, bell ringer assignment, or station work! One prompt could be assigned to each student, and the students could add illustrations to their writing. Stories and illustrations could be bound together to make a class book to keep in your classroom for years to come! Product 5: Sell this Haunted House This download is a FUN and ENGAGING Halloween writing activity for your students! In this activity, students draw and create an online listing for a haunted house that they have designed. They have to draw the house and other rooms, write a detailed description that includes a list of Halloween words, point out features of the house, and list real estate agent contact information. In the next part of the activity, students create a newspaper advertisement persuading potential buyers to visit their open house. Lastly, they will answer questions from potential buyers all while putting a positive spin on this haunted house! Teacher's Notes- Including Extension Ideas Student Assignment Sheet with detailed instructions Online Listing Template (2 pages) Potential Buyer Questions Sheet
<urn:uuid:fbd69e51-51e2-449d-97e3-0fd697080e8d>
CC-MAIN-2016-44
https://www.teacherspayteachers.com/Product/Language-Arts-Halloween-Bundle-2830255
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00105-ip-10-171-6-4.ec2.internal.warc.gz
en
0.881494
783
3.46875
3
Like a lot of Charlotteans, Piper Novick, 14, is a dog-lover. But her love for furry four-legged friends exceeds the commitment most young people have: She’s chosen to be home-schooled so she can devote time to training her dogs for agility competitions. Agility contests happen at big meets all over the country, on most weekends: Trainers guide their dogs through an obstacle course of seesaws, A-frames, tunnels, tires, jumps and weaves. At meets, called trials, teams – one dog, one trainer – can take a shot at two courses. The aim is to run each course quickly and accurately, and if a dog and its handler do so, they can gain a qualification. Amassing qualifications leads to different levels of achievement. This past December, Piper and one of her Shetland sheepdogs, Happy, qualified for the American Kennel Club Eukanuba Junior Invitational in Orlando, Fla. She was one of 100 juniors, defined as 11 to 18 years old, to compete. Happy placed fifth and fourth in the events, but won first place overall for his jump height. Winning, Piper said, was a pleasant surprise. “I was not expecting anything from him; he was already semi-retired and hadn’t competed in a while,” she said. “I went to go have fun and get experience.” Piper wasn’t always interested in training dogs. She first learned about agility competitions about five years ago when her aunt passed away and left her agility-training equipment. She decided to see what she could do with Happy, whom she had as a pet, and not for competition purposes. (Piper has three other dogs: Shetland sheepdogs Scout, 6, and Dash, 1 1/2; and Kai, a 9-month-old Border Collie.) In October 2010, she and Happy went to their first trial and took first place. “It was an immediate addiction,” Piper said. The sport, she said, is really about teamwork and less about competing against other dogs. “It’s not just about the dog. You have to be in sync with the dog – you can’t screw up either.” Her dad, Mike Novick, keeps agility equipment for Piper and her dogs in his backyard and agreed. “It’s a competition, but really a competition with yourself.” Piper and her mother, Elle Novick, travel often on weekends, usually within a two-hour distance, to trials from nearby (Cabarrus County Arena) to farther out (Yadkinville, Fletcher or Savannah, Ga.). Piper said she simply loves working with dogs and the agility experience. “It’s exciting, and the people are awesome.” At 14, Piper is the youngest agility trainer in the area she knows of. She converses often with other young trainers across the country via Facebook, and she loves spending time with the “older” training crowd, she said. “I’d rather be with a bunch of dog ladies than anything.” Deb Knowles, who runs Dog Haven Obedience and Agility Training in Charlotte, said Piper is the only teen she’s worked with who has stuck with agility training, and that she’s been impressed with her maturity. “Piper is an old soul,” Knowles said. “She’s never sounded like a child since I’ve known her.” Piper has been taking Happy (and now Dash) to work with Knowles for the past three years, and recently began interning with Knowles to learn the ins and outs of running an agility-training business. “She’s learned a lot on how to build and execute a course just by helping,” Knowles said. Aside from winning national agility titles, Piper dreams of someday owning her own agility-training business or becoming a veterinarian. As a home-schooled high school freshman, she has the flexibility to juggle school hours with training. She said she’d like to see more young people excited about agility. “It’s a great thing for you and your dog – it’s just a lot of fun, and I think it’s great for kids to be involved in.” The most challenging part of competition, she said, is to not beat herself up about mistakes. “I know the second when I’ve screwed up – it’s not ever the dog’s fault, really. The hardest part is to not bring yourself down about it.” Knowles said she thinks Piper has a strong future with agility, in large part because of how seriously she takes her goals of winning national titles. “She’s had a goal and dream and stuck to it and pushed on. I can easily see her at the national level this year with her new dog.”
<urn:uuid:c6ea290c-7533-4063-a14d-e4aa9b057ea9>
CC-MAIN-2016-44
http://www.charlotteobserver.com/news/local/education/article9097535.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00199-ip-10-171-6-4.ec2.internal.warc.gz
en
0.975678
1,061
1.554688
2
I recently watched Brad Frost’s interesting talk Death To Bullshit (slides). He takes strong positions about information overload and advertising, and with down to earth charm, explores the evidence he’s found. Since I’ve written before about detecting bullshit, calling bullshit on gurus and BS social media experts I had commentary to offer. You’ll get even more pleasure from this post by watching his talk first, but it’s not required, and since we’re talking about information overload I doubt you’ll do it now. I’ll remind you later too. I had 5 points in response. 1. Our brains are primarily information filters Frost offered various statistics about the ridiculous amount of information we produce, like this one: And these facts are always stunning. What Frost overlooks is the existence of these photos doesn’t obligate me to look at any of them. On the day you were born there were already thousands of books in existence you will never hear the name of, much less read. Same for magazine articles, films or plays. Or whatever it is we’re supposed to be intimidated by. My point is my brain, sitting here at my desk, consumes only information I put in front of it, or that happens to land within range of my senses. How much more there is in the universe is irrelevant. And our brains primarily filter information out: - Our field of vision is about 140 degrees, meaning we’re blind to 220 degrees. We’re mostly blind. - We don’t see infa-red light, or ultraviolet, or most light actually. - Dogs, cats and most animals hear and smell a much wider range of information than we do. We are information filtering machines. We automatically filter out far more than we could possibly consume, even when we consume more than we should. Even when we feel stressed and overwhelmed, our brains are filtering out far more than we take in. 2. Overload depends on what you consider information Frost offers this scary chart. It’s accurate if you define information, as we commonly do, by only counting man made information. But consider taking a walk in the park. For most of us a walk in the park is relaxing. There’s is plenty of information in nature, but we don’t experience overload. Why? In part because we’re just visiting, but also because we’re ignorant of all the information there. If you were a botanist, arborist, or entomologist you’d find loads of data in every patch of grass, every tall tree, and every ant hill. Even a child with a magnifying glass can spend hours in a small patch of forest, examining the fascinating amounts of information in every strip of bark, spider web or pine cone. There are amazing amounts of information everywhere depending on what you know, what you choose to look at, and how you choose to look at it. Overload then is a matter of your attitude towards the information. Does it scare you? Does it excite you? Does it fill you with stress, or with desire? Your information attitude matters more than the amount of information around you. One popular theory about our universe is that there is a fixed amount of matter in it. All that changes over time is the state and position of particular atoms. For example, every molecule in you came from a star and has existed for millions of years. If you considered atoms as information, you could make a chart like this one below. The net information in the universe might be fixed: This seems strange of course. And boring. It doesn’t make humans seem important, which is why we rarely think about information this way. But if you do, even for a moment, you realize our assumptions about what information is, and therefore, what overload means. Neil Postman wrote “Information is a form of garbage” and I agree in a sense. It’s cheap. It’s everywhere. Information without knowledge or wisdom has little value, despite how often we’re sold on buying things because of the volumes of information they contain. We always have a surplus of information around us and we should be aggressive about ignoring it from sources we don’t trust. We are compulsive information hoarders. We still pretend information is scarce. It isn’t. It never was. Even if you limit it to human produced information, for the last few centuries if you could read and had a nearby library, you had several lifetimes of information available to you. 3. There was information overload before our grandparents were born As an author I’m constantly reminded of intimidating statistics on the competition. Tens of thousands of books are published in the U.S. every year, and as Frost pointed out, there are several hundred million books in the world. But what’s overlooked is that on the day you were born, or your grandparents were born, there were already more books in print than you or they could possibly read, even if you or they dedicated your entire lives to reading books. The same is true for places on earth to visit, languages to learn, meals to try, dances to dance, and on it goes. In this sense we are born “information overloaded.” An obvious question then is: why the hell would we care, today, about information from ordinary dead people we’ll never meet? We shouldn’t. And the same goes for the millions of people we don’t know in the present who create these massive piles of information. The presumption of all information should be it’s unworthy noise. Frost references Sturgeon’s law, that 90% of everything is crap, and this should warrant a general lack of interest in the majority of information produced by anyone, anywhere. Our true disorder is information insecurity: we are insecure about what we have and compulsively consume to fill a hole that doesn’t exist. 4. People’s capacity for bullshit is constant The later half of Frost’s talk is critiques of bad design and advertising as examples of bullshit. He closes by offering two claims: - People’s capacity for bullshit is diminishing - It’s harder and harder to be an asshole These are tough claims to support. They’d require their own presentations. I don’t agree with either claim, but my position isn’t any easier to argue for. People’s capacity for bullshit is as high as it always has been, on average, across our species. Freedom of information in democracies has certainly improved access to and interest in “the truth”, but technology is great for bullshit. Twitter, Facebook and the web are filled with it, as media transmits lies just as effectively as truths. Tech progress is indifferent to bullshit. And of course one person’s bullshit might just be some other person’s wisdom. Much of the bullshit we consume comes in soft, sugary chunks we’re all too happy to consume. We like to hear what we like to hear. We prefer comfort to discomfort, and well crafted bullshit goes down far easier than tough truths or complex realities. There’s great profit to be made from being the kinds of assholes that produce and sell bullshit and as long as that’s true, there will be plenty of people working in BS production. 5. The final truth is we control the off switch It’s is righteous to criticize producers of garbage sold as wisdom. It’s good to share advice that helps with the challenges of finding signal in the noise. But these problems are largely self-inflicted. We flip the on switch for every device we feel overloaded by. And we can flip them off too. A fascinating exercise for complaints about overload: ask, can I turn this off? Unsubscribe from that email list. Watch one less television show, subscribe to one less podcast. Prioritize time offline with people you like and love over other things. Often our first response to this suggestion is an impulsive, self-righteous defense for why we really really really need each and every thing we don’t have time to consume, even in multiple lifetimes. This should reveal our insane and self-inflicted habits of destruction. The first step is to acknowledge who really has the problem. It’s us, not them. [h/t to Ario for pointing me to Frost’s talk] Watch Frosts’s talk (or view slides)
<urn:uuid:8c67cf6c-5dae-4321-8aa5-a0ba878ce2cc>
CC-MAIN-2017-04
http://scottberkun.com/2013/thoughts-on-death-to-bullshit-information-overload/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00076-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950487
1,805
1.726563
2
Have you ever thought what it would be like to say or do what you truly, truly want at any given time? What if you were able to just say NO easily and freely to someone or something that doesn’t feel right for you? What if you didn’t have to explain yourself or come up with a bunch of excuses every time you don’t want to do something? Even better… what if you stopped doing everything that doesn’t feel honoring to you without feeling the need to apologize or explain yourself? This doesn’t mean you become careless or cold hearted. This means you set yourself free! Inner freedom is the ability to live your life the way you want to. If you’re not happy with your life right now, perhaps you’re living according to someone else’s standards or values. If you’re following what other people told you was the “right thing” but it doesn’t feel right for you, then you’re not living in alignment with your truth. You’re living someone else’s truth. Not living your truth is a living death! It’s like taking a sleeping pill for life. You could be feeling really stuck right now thinking it will take a lot of work for you to get out of that deep dark hole… but honestly, you can choose to start creating the life you want to live today! Yes, right in this moment, you can choose to do that. If I was able to get out of that dark hole ten years ago and come out the other side feeling hopeful… Believe me, you can too! It is a process.. AND it starts by creating your own set of values and boundaries. When you know what’s right for you and you live by it, you raise your standards and your sense of value. You manifest people that honor and respect you because that’s the way you hold yourself. You finally start to live your REAL LIFE because you are free! You can’t do it wrong when you know what’s right… for YOU! And that is all that matters… I want to invite you to set yourself free! This is an invitation to start living your real life: - You will learn tools to access more inner freedom - You will create a list of your own values - You will discover who’s rules you’ve been living by - You will learn to say NO when something doesn’t serve you - You will learn to tap into your own truthIf you are reading this right now, perhaps there is a part of you that resonates with what I’m saying here. That’s your higher self! Your higher self is always calling you to step forward, to grow, to expand.. Setting boundaries have become one of my favorite things to do! It has changed my life and my relationships. I love to help people claim their FREEDOM by setting healthy boundaries. Curious about my work? Let’s talk! If you’re dead serious about improving your life, reach out to me AND I will gift you a 30 min coaching session. You can also pass this offer on to a friend or a loved one. “Things don’t change unless you change..”
<urn:uuid:450b45d6-f339-445e-8492-95931d0177e8>
CC-MAIN-2022-33
https://www.adrianasorgi.com/enough-is-enough-its-time-to-claim-your-power/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00668.warc.gz
en
0.937465
709
1.59375
2
First Rebuild: Official Number: 133935 Propulsion: Screw Dimensions: 142 x 27 -- 389 tons Rebuilt: Sorel, Quebec, Canada in 1942 130x27x14 Owned by Dominion Government; to United Towing & Salvage Co., Montreal c1941. Built by Kingston Shipbuilding Co. and launched 15/05/12. Engine 12½-21-34x21 by Collingwood Shipbuilding Co. Buoy tender. The Maritime History of the Great Lakes site is managed by Walter Lewis Since 2005 this site has been the prototype for the digital collection management tools built for the Our Digital World (formerly the OurOntario project of Knowledge Ontario.) As a prototype it is subject to occasional, unexplained interruptions in service ... because we keep trying new things. My favourites lets you save items you like, tag them and group them into collections for your own personal use. Viewing "My favourites" will open in a new tab. Login here or start a My favourites account.
<urn:uuid:6060f7ab-11ff-42eb-9a5a-93cb8684d704>
CC-MAIN-2017-04
http://images.maritimehistoryofthegreatlakes.ca/103209/data
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00323-ip-10-171-10-70.ec2.internal.warc.gz
en
0.85566
211
1.609375
2
The fiance of the Northern California man who was sucked into a blowhole to his apparent death said Friday there should have been signs warning people of the dangers of the geyser-like creation along a rugged stretch of the Maui coastline. Tika Hick told The Associated Press in a phone interview Friday from San Anselmo, Calif., that 44-year-old David Potts vanished into the ocean during a vacation to enjoy some time in the Maui sun before she undergoes a double mastectomy next week following a recent breast cancer diagnosis. Eyewitness accounts from tourists who were there said Potts was dancing around inches from the hole’s opening and playing in the sprays of water shooting high into the sky when he disappeared. Hick disputed that description and took local officials to task for not posting warning signs at the site. She was not at the blowhole at the time, but said her brother and sister-in-law were there. “He slipped because it was slippery,” said a sobbing Hick. The incident has served as another tragic reminder of the dangers lurking along undeveloped stretches of Hawaii’s shoreline. Online travel sites warn of the rocky cliffs near the blowhole and its unpredictable eruptions. The blowhole was created by pounding surf that undercut and wore away a lava shelf. Every wave pushes water and air through the hole, creating an eruption similar to a geyser. Then as the water retreats, it creates a strong vacuum-like effect. Maui County officials said the blowhole appears to be on private land, according to property records, but were still in the process of verifying that. The county said people were continuing to visit the area, despite being told of what happened to Potts. Previous injuries and deaths at other tourist spots on private land have raised questions of responsibility and liability when visitors are technically trespassing to get there. Landowners are not required to post warning signs. The only signage at the Nakalele blowhole is a quarter-mile away – a handmade sign that cautions visitors, “Blowhole, park and walk at your own risk.” “We urge all visitors to the location to please use caution an as obvious danger exists at or near the blowhole,” the county said in a statement, also noting that it and the Maui Visitors Bureau do not promote the area as a tourist spot. There are still questions about who owns the land at the site of the blowhole – and who could be the target of a possible lawsuit over the episode. The county said records indicate the property is owned by Maui Land & Pineapple Company. Kalani Ho, the company’s land and property manager, said the blowhole is on public property because it is on the shoreline. “The blowhole is below the high-water mark,” she said. “State land is below the high-water mark and obviously that’s in the water.” The state is researching the ownership of the blowhole, said Deborah Ward, spokeswoman for the state Department of Land and Natural Resources. The Hawaii Tourism Authority asked Maui Land & Pineapple for permission to post warning signs near the blowhole, which the company granted, Ho said. She said publications that promote the blowhole as a destination present constant challenges for the company. “We don’t have the resources to fence our entire property line and by state law we have to provide public access to the shoreline.” Maui Police Lt. Chad Viela, who is overseeing the investigation, said this is the first time he’s heard of someone falling into the hole, which has an opening that’s about 3-feet wide. It’s a popular tourist destination, he said, among visitors wanting to explore the undeveloped, sparsely populated terrain of western Maui’s northern tip. “The ocean conditions are much more treacherous out that side of west Maui,” he said. “Visitors just don’t know the dangers.” The last time someone died at a blowhole in Hawaii was 2002 when an 18-year-old from Sylmar, Calif., fell into the hole and drowned. In the latest case, Hick said she visited the site on Maui before leaving Hawaii and paid tribute to the man she was supposed to marry. “We put flowers in the water to say goodbye and asked Hawaii to care of him,” she said, “and to take care of me and our son.” Was this article valuable? Here are more articles you may enjoy.
<urn:uuid:2384c006-9b73-4d9e-bf66-d2fd49d7dabf>
CC-MAIN-2022-33
https://www.claimsjournal.com/news/west/2011/07/18/188345.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00672.warc.gz
en
0.970729
975
1.539063
2
June 7th 2022 100 DaysWhen Russia started its invasion on February 24, it was impossible to imagine this tragic war going on for 100 days with still no end in sight. '100 days' may sound vague, but each day represents thousands of tragedies: lives lost, homes destroyed, and families forever changed. If we were to attempt to identify some positives from this ongoing nightmare, it might be this: Firstly, the Ukrainian people showed the world their true colors. They defeated Russia on the first day of the invasion when they didn't surrender. Secondly, it was the Christian community in Ukraine that stepped in to play an oversized role in providing care and comfort for hundreds of thousands of refugees. What does the Bible say about refugees?The Bible doesn't contain the word "refugee," but God has made it clear about how we should treat foreigners, especially those in need. Deuteronomy 10:18 "He defends the cause of the fatherless and the widow, and loves the foreigner residing among you, giving them food and clothing." In the Bible, foreigners are frequently mentioned alongside marginalized groups such as orphans and widows, implying that these foreigners aren't simply on vacation in another country. Instead, they are strangers who have left their homes, trying to make ends meet in a new land they don't necessarily want to be in. This accurately describes refugees from the war in Eastern Ukraine. While 7 million people had exited Ukraine, within the past couple of months, about 2 million have returned. Most will hunker down in the western part of the country until this tragic war ends. Deut 10:18 tells us that God loves the foreigner and supplies them with food and clothing. There are enormous costs associated with supporting refugees long-term, a burden most Ukrainian churches will find difficult to maintain. However, with YOUR SUPPORT, we will resource our extensive network of partner churches, so they can continue to provide essential aid while demonstrating God's love to these refugees. We shouldn't forget that Jesus himself was a child refugee (Matt 2:13). What an honor for all of us in HART's community in Canada and the USA to have the opportunity to love these refugees and provide for their needs as God would wish us to. We thought we were in hell.My husband and I have two young children. Our home was in the city of Mariupol. We miraculously survived 14 days of relentless airstrikes, shelling from Grad rocket launchers, and other kinds of weapons, hiding in a basement without electricity, water, heating, bathroom, and everything else we are so used to in our ordinary life. We had only small amounts of water from collecting snow and rainwater. But every exit from the basement to look for water was a great risk to life. Unfortunately, there were some dead men already lying near the wells. But my husband continued to go outside to search because when the rain and snow ended, the children still needed something to drink. And hungry was always with us, too, for we had nothing to eat. There was a little grocery shop to buy food for a while until a bomb hit it, and unfortunately, everyone who was there died. After these dreadful, frightening days in the basement, we decided to escape because the bombs were coming closer and closer every night. We finally made a break for it. We left the basement and went to my mother's home. We tried to persuade her to go with us, but she wanted to stay, and is still there, in Mariupol, and until now, I still haven't heard from her at all. We took my younger brother and sister with us and, after a terrifying journey, eventually arrived in the city of Lviv. We were sheltered by my husband's loving family, for which I am infinitely grateful! I am also grateful for your help with clothing and food, because our family came here almost without anything, so we need to start all over again with our new and big family. Now we live in hope and pray for our parents who decided to stay in Mariupol, and we also pray for peace in the whole world, especially in our beloved country! Margarita Kasperuk, Mariupol PRAYER POINTSHere are specific prayer points that can help guide our prayers for the situation in Ukraine: - Pray for and ask to see God's glory amid this great struggle. God often uses dire situations to draw people to himself. Pray that He would be glorified through the people of Ukraine who are following him. - Pray for God's peace to be a source of strength for the thousands of Ukrainian workers/volunteers who will have opportunities to share with others about God's love. - Pray for God's protection over Christian volunteers. Ask God for their physical and spiritual protection — ask Him to help people seek the truth during the conflict. - Ask God for comfort. Many families lost fathers and sons during Russia's first invasion in 2014, and now to have to go through this tragic new war is overwhelming for most families. - Ask God to intervene. Pray for wisdom for world leaders. Pray that God would move in their hearts and guide their steps and plans. - Pray for President Zelensky and the leaders of Ukraine to know God's truth and peace and be transformed by his Holy Spirit so that they would seek to lead their country in the way of peace. - Ask that this conflict would open doors of opportunities for the gospel. Pray that He would make his name known across Ukraine, Russia, and all the European countries that refugees are fleeing to due to this conflict. Click to close Click to close
<urn:uuid:80f35b6f-2adc-4459-8527-ed5b9e3153ae>
CC-MAIN-2022-33
https://blog.hart.ca/?1&post=18
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00074.warc.gz
en
0.977719
1,171
2.21875
2
Wednesday, April 25, 2007 A Fijian soldier remembered Yesterday was Anzac Day and I watched one of the marches to remember fallen soldiers. In Melbourne there is an eternal flame at the Shrine of Remembrance and this is a symbol not to forget them. I was thinking of my older brother Laisiasa Masidugu who died in the battlefield in the Solomon in 1944. I only discovered by using the internet that my brother Laisaisa is listed in the Rabaul War Cemetery in Papua New Guinea. Rabaul War Cemetery Roll of Honour The Roll is in alphabetical order MASI, Pata (Private), PN3526. A.C.M.F. 3 New Guinea Bn. 1. B. Australian Infantry. 28th June 1946. W. MASIDUGU, Private, LAISIASA, 1336. 1st Bn. Fiji Infantry 13. A. Regt. Fiji Military Forces. 29th March 1944. Age 22. V. I was about seven when the District Officer and a Fijian came to our house to tell my father that Laisiasa had died. The story was that there was a valley and three young soldiers kept on fighting while the others in his platoon of the First Battalian were told to retreat. Later on someone came to our house to give us his belt and water bottle. There were bullet holes in the belt. A few years ago I saw an honour scroll in my cousin’s house in Naseakula and it was a tribute to Laisiasa and I have it now. Some Fijian soldiers have been particularly noticed such as Sefanaia Sukunaivalu from Yacata who was awarded the Victoria Cross. But of course there are many others who were courageous and died during a war. The Sukunaivalu Barracks of the Fiji Army in Labasa are named after Sefanaia.
<urn:uuid:e63be4dd-ea40-4ee9-9c34-3aef96fcadc2>
CC-MAIN-2017-04
http://babasiga.blogspot.com/2007/04/fijian-soldier-remembered.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00440-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981003
401
1.804688
2
Structure collapses in Toronto, at least seven injured TORONTO (Reuters) - A building that was being demolished has collapsed in Toronto, injuring as many as seven people, the fire department in Canada's largest city said on Monday. Four people have been rescued from beneath the structure, with three transported to hospital. Another three or four people were injured and treated at the scene, Toronto Fire Services Captain Michael Westwood told the Canadian Broadcasting Corp. Westwood said the building appeared to be in the process of demolition, and parts of the building and attached scaffolding had collapsed onto the sidewalk and road in central Toronto. He said rescuers believed they had found all the people injured in the collapse but were continuing to search the area. Toronto Police said on Twitter a canine unit had been sent to assist with the search and rescue. Continued...
<urn:uuid:041f64be-1ee4-43c0-9209-52720e3ca58f>
CC-MAIN-2017-04
http://ca.reuters.com/article/domesticNews/idCAKCN0XF2IG
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00541-ip-10-171-10-70.ec2.internal.warc.gz
en
0.985858
172
1.507813
2
Cryptocurrencies are more popular than ever, but do you know how to get started? Investing in cryptocurrency is not as difficult as it might seem! All you need is an investment account, some knowledge about the market, and a little bit of courage. You can start with something small, like buying C$10 worth of Ethereum, and there are many reasons why investing in Ethereum is a good idea, which we will cover in this guide. Investing in cryptocurrency will help you diversify your portfolio, be more financially independent, and become more engaged in the global economy. Here are the top three reasons why investing in Ethereum may be the best thing that’s happened to your money, as well as what else you need to know about cryptocurrency. What Is Cryptocurrency? Cryptocurrency, simply put, is a type of digital currency that relies on cryptography to generate units and verify transactions. The math behind it is complex, but the concept isn’t hard to understand; in fact, many people find it much easier to comprehend than traditional currency. Cryptocurrency uses blockchain technology, which is a decentralized public ledger where transactions are recorded chronologically and anonymously without the need for a third party to process them. In other words, cryptocurrency is a secure way of holding and transferring money that doesn’t require a bank or other financial institution to be involved in the process. The Basics Of Investing in Cryptocurrencies Cryptocurrencies are not physical coins like dollar bills; they are digital assets and exist on an online ledger called a blockchain. When you buy cryptocurrencies, you then need to store them in your digital wallet, which acts as a bank account for cryptocurrency investors. There are many different types of cryptocurrencies, with Ethereum’s Ether, also known as ETH, as one of the most popular choices. When you invest in Ethereum, you’ll typically be buying it from someone who already owns it and is selling it to you at a set price, and this process is known as ‘buying the coin.’ Ethereum’s worth has been steadily increasing in value since its introduction to the global market back in 2014, which means if you invested now, you could see a substantial return on your investment if the value continues to rise at the same rate as it has been doing over the past few months. While there’s no telling how much Ethereum will be worth this time next year, but that doesn’t mean that investing now isn’t a good idea. There are many reasons why investing now may be better than waiting until tomorrow. Risks Of Investing In Cryptocurrency Cryptocurrencies, like all investment ventures, are risky. However, as cryptocurrency is not a physical commodity, it can frequently fluctuate in value. But this is part of why cryptocurrency is such a popular investment option, as the risk is often what makes the reward so high. If you know what you’re doing, it can be a great investment opportunity. However, if you don’t understand how the market works or don’t know how to properly diversify your portfolio, investing in cryptocurrencies may backfire on you. The best thing to do before investing in cryptocurrency is research. Find out everything you can about the market and different investments options before putting your money anywhere. It’s also essential to diversify your portfolio by buying other types of assets like stocks and bonds. However, don’t let the risks scare you away from this high-growth market. Investing in cryptocurrency can help you take control of your financial future while generating higher returns than conventional assets. Buying Cryptocurrency: Centralized Vs. Decentralized Exchange There are two types of exchanges: centralized and decentralized. A centralized exchange is a company that holds your funds and trades for you, while a decentralized exchange only facilitates the trade without holding the funds. Decentralized exchanges can be better than centralized exchanges in some ways: they’re less prone to hacks, they don’t require identity verification, and you can make an anonymous purchase. However, there are also drawbacks to decentralized exchanges as transactions take longer because the processing needs to happen on both ends of the transaction, among other things. What Is Ethereum? Ethereum was created in 2013 by Vitalik Buterin and has since become one of the most popular cryptocurrencies on the market. It is a decentralized platform for applications running on blockchain technology, and this means it’s not controlled by a single person or group, which ensures security and trust in the system. As a result, Ethereum has become an attractive investment for many people looking to diversify their portfolios. How Is Ethereum 2.0 Different? As previously mentioned, Ethereum is a blockchain-based platform that helps to build decentralized applications and was initially developed in 2013 by Vitalik Buterin. However, there are many more features planned for the future, and one of the most anticipated features coming down the pipeline is Ethereum 2.0. Ethereum 2.0 will allow for more scalability through sharding, which splits up networks into smaller pieces, and allows only parts of the network to be updated at any given time, rather than all nodes at once. This means that developers can work on specific tasks without worrying about affecting the rest of the system. It will also provide increased security with a zero-knowledge proof protocol, also known as ZKP. A ZKP is a cryptographic protocol that allows someone to prove something without giving away other information, like their name or location. More interestingly, it can be used to make transactions entirely private by obscuring sending and receiving addresses as well as the real balances on smart contracts through encryption techniques like homomorphic encryption, ring signatures, and zero-knowledge proofs that hide sender identities. These new tools will help keep user data safe while still allowing companies to store sensitive data like credit card numbers securely on their servers. Why Invest In ETH? Ethereum is a form of cryptocurrency, which is a digital currency that uses encryption to generate new units and is often referred to as Ether, or ETH. Ethereum is one of the most popular cryptocurrencies on the market today, and many people are interested in the investment potential of cryptocurrencies but may not know where to start. There are many reasons to invest in ETH, as Ethereum is a platform for smart contracts, an open-source cryptocurrency that has its blockchain, a decentralized application that runs on its system without any third-party interference, and a Turing complete coding language, which means more applications can be built with Ethereum’s base layer. However, if you want to learn more about how you can invest, head over to Wealthsimple for their expert advice on how to buy ETH in Canada. Although, the top three reasons for investing in ETH are diversifying your portfolio, increasing your financial stability, and becoming more engaged with the global economy, which we will discuss further in later points. Don’t Forget to Diversify Your Portfolio When you take up investing, a diverse portfolio is one of the most vital aspects of your financial goals as it is the collection of different investments that you own, which reflects your risk tolerance as well as what you want to achieve. Diversifying your portfolio can be challenging, and while investing in cryptocurrencies is not without risk, it is the ideal way to create a diverse portfolio. Investing in Ethereum is a relatively stable investment because it has a value that’s rapidly increasing and doesn’t fluctuate as much as many other cryptocurrencies. Having a diverse portfolio is important because it can help you manage risk more effectively. For instance, if you have all of your eggs in one basket, it could be devastating if that basket fails, which is why investing in multiple ventures is vital. You might not think about these things when investing, but investing in cryptocurrency can help you avoid significant financial losses. Plus, having a diverse portfolio is an easy way to make some extra money on the side. Are You Ready to Increase Your Financial Stability? Investing in cryptocurrency is a great way to increase your financial stability, and you can start by investing as much or as little as you want. Making money off of cryptocurrency investments may be easier than you think. With the market for Ethereum continuing to grow, now is a great time to invest in it. Why? Because Ethereum has been predicted to outperform other cryptocurrencies and investing now gives you the chance to cash in on this prediction before it’s too late. As long as the demand for Ethereum continues to grow, so will its price value. That means that investing in cryptocurrency could help you save money, which could, in turn, allow you to retire early. Crypto Investment Will Engage You With The Global Economy Technology connects us to people anywhere in the world, and this is the same when investing in cryptocurrency, which means you are never too far from the global economy. For example, when you invest in cryptocurrency with your local currency, if your country’s currency drops in value, your cryptocurrency will increase in value. This provides a level of protection against the fluctuations of the global economy, keeping your money safe and making it grow without having to worry about how much your countries currency is worth. Cryptocurrency investment is one of the best decisions you can make in today’s growing digital economy. While it does come with plenty of risk, proceeding the right way can protect you against potential loss. One way to do so is to minimize your risk by investing in top cryptocurrencies such as Bitcoin and Ethereum. Both have a proven track record of success. Even if prices drop, recovery is inevitable if you just hold. The statistics speak for themselves. Personally, we feel Ethereum is one of the most exciting and best long-term investments in the crypto space. Ethereum is the backbone of the majority of the DEFI markets already, and it’s only going to grow as the technology improves. Don’t miss out on this fantastic opportunity to secure your future wealth. As the world shifts away from fiat currencies of old in favor of digital flavors of new, crypto is going to be a pivotal part of the new economy.
<urn:uuid:ba632d4e-b9a5-4465-b5ca-60ba8c55ad41>
CC-MAIN-2022-33
https://awsmining.com/investing-in-cryptocurrency/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00468.warc.gz
en
0.956678
2,097
1.945313
2
Today we celebrate the great life and witness of St. Mark the Evangelist. According to Eusebius, who wrote a history of the Church in the early 4th century, Mark knew St. Peter, evidence of which comes from Holy Scripture, and spent time with him traveling and in Rome when he wrote down Peter’s sermons and teachings as he composed his Gospel. After Peter’s martyrdom, Mark fled to Alexandria where he founded a parish and was the first Bishop of Alexandria. He is depicted in icons and church art as a winged lion, and you can see that on our icon of All Saints to the left of Jesus’ feet as one of the four Gospel authors. It seems strange, then, that the Gospel given for us today in order to celebrate St. Mark, does not even come from his own Gospel, but from John’s! Nor is there any mention of Mark in the Epistle! So why is the lectionary set up this way, and what are the appointed readings trying to tell us? I hope to show that the readings represent Mark himself: first because as a Bishop he was an ambassador of Christ and a source of unity for the church and second as an author of a Gospel, he is a source of correct doctrine so that we may follow the life of Christ and not be carried away by false doctrines. Let us turn to the epistle first. This passage comes in the middle of Ephesians 4, and jumps right in the middle of St. Paul’s longer discourse on the unity of the Church. The community in Ephesus is having a hard time getting along, and so Paul urges them to act in accordance to the reality in which they live. After he urges them to live in unity, he reminds them of the truth that the Body of Christ is a unity. [Eph 4:4-6 KJV] “[There is] one body, and one Spirit, even as ye are called in one hope of your calling; One Lord, one faith, one baptism, One God and Father of all, who [is] above all, and through all, and in you all.” The Church is not an individualistic reality but a reality in which all the individuals are bound together in one body by one baptism, believing in one faith, and consecrated for one God. But within this unity, there is a multiplicity of vocations. Here, Paul investigates the nature of a Body, by looking at Christ’s action. “Now that he ascended, what is it but that he also descended first into the lower parts of the earth? He that descended is the same also that ascended up far above all heavens, that he might fill all things.” Because Christ descended to earth as a man, and then ascended, he transformed human nature. Our translation makes it seem as if his ascension fills the whole universe as pouring water into a pan fills the whole pan, but that is not what the Greek is getting across here. The word for fills here, πληρόω, is the term usually translated as fulfill. Christ’s incarnation and ascension fulfills the mission of God to redeem His people–His grace now perfects human nature! One way in which Christ continues to perfect humanity is by giving gifts. As St. Paul says: “Wherefore he saith, When he ascended up on high, he led captivity captive, and gave gifts unto men.” The enemy has been defeated and Christ gave gifts to men so that they may participate in His unity, in His Body, or as St. Paul says: “For the perfecting of the saints, for the work of the ministry, for the edifying of the body of Christ” So, for those ends, he gave gifts to the Body: apostles, prophets, evangelists, pastors, and teachers. This list developed into the threefold order of Bishops, Priests, and deacons. It still amazes me that the gifts are people! Men that God has chosen to help edify the Church, continue the ministry of reconciliation, and urge people towards holiness. St. Mark, as I said before, was a bishop, one of these special gifts from God. And as a bishop, he was a gift from God to continue the unity of the Body of Christ. A feast day like this helps us remember the importance of St. Mark and also of all our bishops who are our source of unity. IT just so happens that St. Mark’s feast day falls right before Ascension because these weeks are all about Christ instituting the Apostles as His church. In the three weeks prior to the feast of the Ascension, the lectionary gives us three separate times when Christ tells His disciples that He will be leaving so that the Holy Spirit might come and fill the Apostles. Christ gives the Apostles the Holy Spirit so that they might continue his work in the Church, and St. Mark is our great reminder today of this fact. But ST. Paul does not stop there–the purpose of the Church is for all to enter this same fulness and worship God. He continues: “[Eph 4:13 KJV] Till we all come in the unity of the faith, and of the knowledge of the Son of God, unto a perfect man, unto the measure of the stature of the fulness of Christ:” Later in the epistle he concludes: “But speaking the truth in love, [we] may grow up into him in all things, which is the head, [even] Christ: From whom the whole body fitly joined together and compacted by that which every joint supplieth, according to the effectual working in the measure of every part, maketh increase of the body unto the edifying of itself in love.” Notice that the fullness is Christ’s fullness. It is a unity within Our Lord which is ever present and yet ever growing in time. So we are prompted by St. Paul to live in love which unites the whole body. This is our principle of moral action–that we act in love towards God and man not for our own sake but for the sake of the Body. Our union in that Body spurs us to increase and pass along this charity so that our lives look like the head of the Body, Christ Himself. As Jesus says in the Gospel: “As the Father hath loved me, so have I loved you: continue ye in my love. If ye keep my commandments, ye shall abide in my love; even as I have kept my Father’s commandments, and abide in his love.” Our union encourages us to follow the commandments. And yet there is also the chance of walking away from this fulness, to be deceived and lost. St. Paul knows this danger, and one of the reasons of Christ’s gifts is to keep us from these dangers: “[Eph 4:14 KJV] That we [henceforth] be no more children, tossed to and fro, and carried about with every wind of doctrine, by the sleight of men, [and] cunning craftiness, whereby they lie in wait to deceive.” Deception in doctrine leads us away from the Body of Christ, and so we must take great care to never lose sight of Christ and his teachings. St. Mark provides us with one of the great ways to avoid these errors, his Gospel. Our icon shows the role of the Gospels in revealing Christ to us. The four Gospel writers in the icon are situated on four corners of the image of Christ. It is as if they hold the vision of Christ there in the middle, and this is true since the Gospels reveal to us the nature and person of Our Lord. On this feast day, let us give thanks for God’s great gift to us in St. Mark who gives us a vision Christ. If you have never read Mark’s whole Gospel in one sitting, I encourage you to do so. It will vividly present to you the exciting and dramatic life of Christ so that you may come to know Him more. We have not read any of his Gospel today, but I hope you see now how our readings today present the necessity of St. Mark–both as a bishop and therefore Christ’s appointed source of unity for the Body and as the author of Christ’s life that will keep us from erroneous doctrine and inspire us to continue to live in the Body of Christ in all charity.
<urn:uuid:d399449e-2ee0-4c3e-be8d-e0ffcd050df8>
CC-MAIN-2022-33
https://www.allsaintscville.org/fr-seans-sermon-for-st-mark-the-evangelist/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00476.warc.gz
en
0.970197
1,771
2.140625
2
Many many years ago in aborigine times there was a boy named Coral. One day he was walking across the desert and he found a magical snake. He said, “Help me out of this sand.” So Coral helped the snake out of the sand and it slithered out of the sand faster than a cheetah. Many days later there were many dead bodies of all types of things even people all over the ground. There were snake bites all over the bodies. Coral spied on a village at night and saw the snake he had freed killing everyone so then Coral decided to kill it by setting the snake on fire. But first he needed to catch the snake so he came up with and idea to trick it. So he then set up a trap around a local village but it took many days to complete. First he dug a hole around the village. Next he put hay, leaves and grass on top of the hole. Then at night while everyone was asleep the snake fell into the hole. Snake used his magic to get out and it killed everyone in the village. So Coral had another plan. He would go on a journey to see the wise man. It is said that if you give him 3 items you will get the 3 wishes. But there were some obstacles to get the wishes from the wise man. Coral went to the wise man and asked for his 3 wishes but the wise man said “You must give me a tail of a crocodile, the heart of the yowie yahoo and the head of the vicious Hannah, and then you will get your 3 wishes.” Coral set out to get the heart of the yowie yahoo first. He knew the yowie yahoo lived in the blood dripping caves so he hopped into the hole that lead to the cave. He then saw something: the skeletons of dead people that had tried to kill the yowie yahoo. Standing behind him was the yowie yahoo. It had tall ears that were grey, light green glowing eyes, webbed hands and feet with claws sharper than knifes and a cold dry body that had some blood on it. Coral pulled out one of the yowie yahoos claws and ripped out his heart with its own claw and since it was so sharp he decided to use it as a dagger. Next he was of to get the tail of a crocodile. He found a swamp where he saw a crocodile sleeping. But before the crocodile could say anything coral had sliced his tail off. After that he had to get the head off the vicious Hannah. So he set out to find the Hannah’s hut in a cave in Mount Annoying. He found the cave and went inside. “Hello?” said Hannah then she put her glasses on and then said “Is anybody here to visit?” Then Hannah took of her glasses thinking she was safe and not knowing that Coral was there to attack her. “WHAM!!!” Coral had cut her head off with the claw of the yowie yahoo. Coral returned to the wise man and gave him the 3 items he needed, next the wise man said “You have done well!” and he put the 3 items into a caldron and brewed it into 3 wishes. Then the wise old man asked “What is your first wish?” Then coral said “My first wish is to have an enchanted golden sword.”, “Ok then, what is your next wish?” then Coral said “to be able to fly.” “ Ok what is your final wish?” Then coral said, “To turn stuff into rock.” Then the wise old man said thank you for coming then Coral went off to kill the snake. There were only 8 villages left in Australia. Then he went to the biggest one and stayed there until night when the snake came out. When the snake came out Coral grabbed onto the snakes’ tail and the snake started to fly. This got coral off his tail but then Coral flew up and killed him. They started orbiting the earth and then Coral’s golden sword shined so bright it brought brightness to the world so the days were proper. He knew he was doomed so he made him and the dead snake turn to stone so that’s how we got the moon and sun in the sky.
<urn:uuid:336c22b5-4b6a-4cfd-bcf1-545ced29be81>
CC-MAIN-2017-04
http://myths.e2bn.org/mythsandlegends/userstory19779-the-boy-and-the-snake.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00153-ip-10-171-10-70.ec2.internal.warc.gz
en
0.985874
925
2.25
2
Freshly produced dried Veggie Pasta. Suitable for babies as young as 6 mths old. Let your babies explore more vegetables at young age. No more boring porridge meal like olden days. Let them think eating is fun & interesting by introducing our colourful Veggie Pasta. The most important things is our vegetable not including cooling vegetable such as tomato, cauliflower, cabbage, etc. It is very important for young babies because their tummy very easily bloated due to wind. Eventho those cooling vegetables are good in vitamins & nutrients too but I will prevent it for young age babies. Self-made Homemade Veggie Pasta All natural from Vegetables (vegetables means vegetables) NO cooling vege such as tomato, cauliflower, cabbage, etc NO artificial colouring NO artificial flavouring Contain up to 50% of concentrated vegetables fibers in the pasta.
<urn:uuid:45f8670b-6574-47e3-9208-20ecb293b92f>
CC-MAIN-2022-33
https://kravve.co/product/natural-veggie-pasta-tube-415384501
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00066.warc.gz
en
0.931046
200
2.015625
2
San Diego Paternity Lawyers Petition to Establish Paternity in San Diego Filing a parentage action is necessary to establish the “legal” father of a child under the California Family Code, which is specifically called the “Uniform Parentage Act” in California (see Family Code Sec. 7600). Paternity cases are started by the filing of a Petition to Establish a Parental Relationship and a form called the Declaration under the Uniform Child Custody Jurisdiction and Enforcement Act (UCCJEA) with the appropriate courthouse location within San Diego County. It is a common myth that only fathers can file a petition to establish paternity. Mothers often file parentage actions for various reasons, including wanting to establish the legal father of a child for inheritance purposes, filing a request for child support (this can also be done through the Family Support Division also) and most importantly, to establish child custody and visitation orders. San Diego Paternity Legal Resources - How to Establish a Parental Relationship in Court - What is a Paternity Action? - Establishing a Parental Relationship Under A Parentage Action - Where to File a Paternity Action in San Diego - Is Paternity Established if the Father is Listed on the Birth Certificate? - Paternity Case Process in San Diego Family Courts - Child Support in San Diego Paternity Cases - Paying for Childcare and Unreimbursed Medical Expenses - Are the Costs of Pregnancy and Childbirth Shared in a Paternity Case? - Setting Aside a Paternity Judgment - How a San Diego Paternity Lawyer Can Help How Do I Establish A Parental Relationship Between A Mother or Father And A Child? Simply having your name on a child’s birth certificate does not mean you are the legal parent in the eyes of the court. There are several ways to establish your rights as a parent in the eyes of the court. If a child is born to parents who are unmarried, or if there is a question as to who is the father of the child born to an unmarried woman, the only way for a parent to establish and enforce their legal right as a parent is to file a paternity action in family court. This is true even if a parent executed a voluntary declaration of paternity at the hospital. What is a Paternity Action? Paternity suits can arise when there is uncertainty or a disagreement regarding the identity of a child’s father. Often, parents will use a paternity action to establish a man’s legal obligation to provide for his child. A paternity case can be initiated by either the mother or father by filing a Petition to Establish Parental Relationship. The Family Court has jurisdiction (the ability) to hear and enter orders and judgments on all issues related to the parent-child relationship. A child support case can also be filed by the Department of Child Support Services (DCSS) at Family Support Division (FSD), another division that hears issues regarding finances and custody of children. In some cases, a man will use a paternity action to establish fatherhood for the purpose of obtaining custody and visitation rights. Until a child custody and/or visitation order is entered by the court stemming from a paternity action, there is usually no legally recognized mechanism for unmarried persons to enforce custodial rights. A paternity action may also involve a party’s request to change the legal name of the minor child and/or obtain reimbursement for pregnancy costs. By filing a paternity action, each parent has a right to conduct a non-invasive paternity test via oral swab. If the paternity test results in a genetic match, either parent can seek to obtain a judgment of paternity. Upon the entry of a paternity judgment both parents have legal right to request child custody, visitation and support orders from the court. Establishing a Parental Relationship Under A Parentage Action There are several others ways to establish a parental relationship, including: - Voluntary Declaration of Paternity: A form signed by the father at the hospital establishes paternity upon execution. This can be rescinded within 60 days of execution. - Parentage By Estoppel: A court can order a parent, even if not the biological parent, to serve as the legal parent and enter a paternity judgment. - Artificial Insemination: If a woman is artificially inseminated with a man’s sperm, with his written consent, the donor can be established as the legal father. - Same Sex Parents: Under the case of Alyssa B., same sex parents can be established as the legal parents through a paternity action. - Putative Marital Assumption: Parents who attempted to marry, but the marriage was void for some reason, will be the presumed parents in a child born of that relationship for purposes of establishing paternity. Why Don’t Parents Who Are Married Have To File A Paternity Action? There is a marital presumption in California that if a child is born to a married couple, or within 300 days of death of either parent or the annulment or divorce of the marriage, the husband is presumed to be the biological father having legal rights concerning the child. Where to File a Paternity Action in San Diego In order for California to have jurisdiction (the ability) to enter a paternity judgment, the child must be either conceived, born, or artificially inseminated within the state of California. If none of these prerequisites exist, the state in which conception, birth or artificial insemination occurred is the correct jurisdiction to file a parentage action. Further, even if a child is conceived or born in another county other than San Diego, a San Diego court may still have the ability to hear and enter orders concerning parentage and the child depending on certain factors concerning the length of time a child has lived in San Diego. Is Paternity Established if the Father is Listed on the Birth Certificate? Not really. The terms “establishing parentage” and “establishing paternity” mean that a court, or other appropriate governing body, judicially establishes that a man is a child’s father by making a judgment. It occasionally happens that a man signs a “POP” declaration (paternity declaration) at the hospital and/or is listed as the father on the child’s birth certificate even though they are not the child’s biological father. The courts in San Diego Family Law Divisions are the only entities that can “adjudicate” a child’s real, biological father. Paternity Case Process in San Diego Family Courts Paternity cases are filed routinely in the San Diego Family Law Division by either parent that wishes to establish the legal father, child custody and visitation orders, or child support. When a case is filed along with the appropriate filing fee, a judge is assigned to the case and the papers (which include a summons) are served on the opposing party, usually by a professional process server. Once the papers are served personally upon the respondent, they have thirty days from that date to file a response. If no response is filed, the person filing the case (the petitioner) may file a Request for Default to move forward in the case without the respondent. If you were served with a petition, it is imperative that you file a response. Usually, a party will file a Request for Order for various issues, including asking the court to establish custody orders and child support orders. Child Support in San Diego Paternity Cases Child support is a payment by one parent to the other parent for the maintenance and support of the child. Child support is set by a “guideline” computer program formula, which looks most strongly on the incomes of the parties, the amount of time each parent spends with the child, the tax filing status, and whether either party has any appropriate “deductions” from their income such as other children or spousal support ordered payments and medical insurance. This guideline calculation is used by the courts in 999 out of 1000 cases (the court has the authority to “deviate” from the guideline amount in very special circumstances.) Child support is intended to pay for the child’s housing, food and clothing and other necessary expenses. The person paying child support to the other party does not have a right to question what the payments are being used for. For more information, seek experienced legal counsel from our team of child support lawyers in San Diego. Paying for Childcare and Unreimbursed Medical Expenses in Paternity Cases Childcare expenses necessary for a parent to work or attend job training is shared equally between the parents under California law, regardless of which parent’s custody the child is in when they spend time with a childcare provider. Expenses for a babysitter so one parent can have time alone is not shared between the parties. Additionally, unreimbursed healthcare expenses such as co-pays, prescription medications for a child, counseling, and orthodontics are all shared equally between the parties under the law. The court has to order (absent extreme circumstances) that both parties share these expenses equally. Are the costs of pregnancy and childbirth shared between parents in a paternity case? A mother may petition the court to have the father share in the expenses related to pregnancy and childbirth, and the court will often order reimbursement for those expenses if they exist. It is not the mother’s sole financial obligation to bring a child into this world. This request is made right on the Petition to Establish a Parental Relationship. It is important for the party requesting reimbursement of these expenses to make a motion for reimbursement of these expenses, or include these expenses in the list of items to be addressed at trial, and include evidence of the payment of these expenses. If done properly, the court will never hesitate to order the other party to pay one-half of these necessary costs. Setting Aside a Paternity Judgment in San Diego As family law experts we have been approached by potential clients over the years wanting to know whether a “paternity” judgment can be “set aside”, meaning that the court will simply “undo” a paternity judgment previously entered. The answer is that paternity judgments can be set aside under limited situations. What laws govern the set aside of paternity judgments? The California Family Code, Division 12, Part 4, Article 1.5 is the applicable law that provides the grounds and procedure to “set aside” or vacate a paternity judgment. These code provisions can be extremely complex to navigate, and there are various prohibiting rules for bringing such a motion that a family law litigant seeking to set aside a judgment should understand completely before trying to file a motion to set aside. Most notably, Family Code 7646 states that if genetic testing indicates that a previously established father is not the biological father, a motion to set aside must be brought within one of the following time periods: - Within a two-year period commencing with the date on which the previously established father knew or should have known of a judgment that established him as the father of the child or commencing with the date the previously established father knew or should have known of the existence of an action to adjudicate the issue of paternity, whichever is first, except as provided in paragraph (2) or (3) of this subdivision. - Within a two-year period commencing with the date of the child’s birth if paternity was established by a voluntary declaration of paternity. Nothing in this paragraph shall bar any rights under subdivision (c) of Section 7575. What are the grounds to set aside a paternity judgment? The “grounds” to set aside a paternity judgment are really only that the father was not ever properly served with notice and an opportunity to be heard or that genetic DNA testing results in establishing that the man is not the biological father of the child. However, every paternity litigant should notice the timelines set forth above. Even if a man was not properly served with notice of the paternity case, if the court believes that the man actually still knew about the case or should have known about the case, the statute of limitations begins to run on the date the man knew or should have known about the case. What is a “putative” father? Despite the fact that a man may not be the biological father of a child, and even though genetic DNA testing may conclusively determine that the man is not the biological parent, the court nevertheless has the power to adjudicate the man as the legal father of a child under certain circumstances. Pursuant to Family Code 7648, if the court finds that the conclusions of the experts (i.e. DNA experts) indicate that the previously adjudicated father is not in fact the biological parent, and even though a motion is brought properly under the Family Code and within the requisite time frame to bring such a motion to set aside, the court can deny the motion to set aside or vacate the judgment establishing paternity if it is in the best interests of the child. The court is required to analyze the age of the child, the length of time since the judgment establishing parentage was entered, the relationship between the child and father, information from the biological father that he does not oppose the continued relationship, the benefit or detriment to the child for continuing the relationship, and other factors. Can a Petition to Establish a Parental Relationship be used to establish a mother-child relationship? Yes. Pursuant to Family Code Section 7650, a petition may be brought by either parent, or any “interested person” to establish a parental relationship. I Just Learned Of A Paternity Judgment Naming Me The Father, Can I Have It Set Aside? The short answer is maybe. There are very specific rules allowing for paternity judgments to be set aside, or voided. There are very strict timing requirements to filing a motion to set aside a paternity judgment. By setting aside a paternity judgment, a parent’s child support obligation can also be set aside. Consult with an attorney as soon as you learn of a paternity judgment or your wages begin being garnished for a support order. Contact our offices to discuss this matter immediately upon learning of such judgment. How Do I Change Or Amend A Child’s Name On A Birth Certificate? A name change of a child must be requested and ordered through the family court. If the parents agree to the name change, a stipulation (agreement) can be filed with the family court. If the name change is contested or not agreed upon, a motion must be filed in family court and the court will conduct a best interests analysis. Factors the court will consider include the age of the child, the number of years the child has used the current name, each parent’s level of involvement with the child and any other factors that would be in the best interests of the child. Upon the family court ordering a child’s name change, a certified copy of the order must be served upon the California Department of Health & Human Services together with the proper application as provided here. How a San Diego Paternity Lawyer Can Help Our San Diego paternity attorneys specialize in representing mothers and potential fathers in all types of paternity actions. Whether you are seeking a paternity action to obtain child support or to avoid paying support for a child you believe may not be your biological child, or to establish custody and visitation rights, our experienced child custody attorneys in San Diego look forward to working with you. In addition to obtaining orders for child custody and child support, typical issues involved in a paternity action include obtaining a paternity test, obtaining a judgment for paternity or setting aside a default judgment of paternity through either the Family Court or Department of Child Support Services (DCSS). Our experienced paternity attorneys in San Diego look forward to providing high quality, aggressive representation to obtain your goals and desires while protecting your legal rights and interests. Contact a San Diego Paternity Attorney at Wilkinson & Finkbeiner For further information regarding filing a paternity petition, setting aside a paternity judgment, or to discuss the consequences or ramifications of a paternity suit, we invite you to schedule a confidential consultation with an experienced San Diego paternity attorney by calling us at 619-284-4113, e-mailing us, visiting us, or filling out our intake form on our Contact Us page.
<urn:uuid:7db02759-cb9e-410b-89aa-f15b58e1a1ae>
CC-MAIN-2022-33
https://www.wf-lawyers.com/paternity-suits/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00266.warc.gz
en
0.941441
3,375
1.585938
2
It is difficult to imagine now days that automobiles were not even invented till the 1870s in America. This is because the United States of America was the first country where motor vehicles were made and sold. In fact it was Henry Ford and his father that first built a motor vehicle in 1903 in Detroit, Michigan. Since then there has been a revolutionized automotive industry in the States of America. Motor vehicles are not only found on the roads and streets of the States of America but they are also found on the streets of other countries. Motor vehicles are used everywhere from South America to Asia and from Europe to Africa. Not only are they used everywhere across the continents but they are also used in places like Australia and North America. In fact there are motor clubs in every state of America and each state has its own distinctive motor club. These motor clubs do not only offer basic maintenance and repair for vehicles but they also hold recreational events and outings for all ages and types of vehicle owners. The first car out of the United States was made in 1902 by Ransom Olds of Oldsmobile and was called the ‘Poey’dal,akota. This one was a two-seater vehicle with Olds as the only creator. The first car to be made in the United States was made by Ransom Olds, the founder of the Oldsmobile Company. He went on to make other vehicles like thefireshipver, his first steam powered vehicle. They were built in Lansing Michigan. The first four wheel drive vehicle to be built in the United States was made by the Riving Company of Tacoma Washington and was called the Model A tenders. The first car during the first six months of 2012 was the Ford F-150 and was introduced by the Ford Motor Company at the 2008 North American International Auto Show. It was the first new large vehicle since thebach 57and was meant to replace the Lincoln substantially. Oldsmobile and Pontiac have been manufactured by General Motors. Buick and Cadillac manufacture their own versions of these cars. Popular cars include the Ford Model T, Chrysler PT Cruiser, Chevrolet Silverado, Dodge Charger, Chevrolet Corvette, Ford Mustang, Honda Civic, Honda Insight, Subaru WRX/STI, Toyota Avalon, Chevrolet Camaro, Ford Mustang, and Toyota Prius. The Toyota Prius was the first mass produced hybrid vehicle in the world. Honda’s Insight was first introduced in 1999. The first production was made to replace the Prelude. It was the first hybridized sedan according to GM. The hybrid Insight finished as the winner in the America’s most popular car awards. The Japanese version of the Insight was dubbed as the DaewooMATTE. DaewooMATTE means the best of the best in Japanese cars. These cars are of the highest quality, highest quality, and are the best of the best. These vehicles are known for their quality, life span, performance, comfort, and the top safety features in their class. The leading automaker in Japan debuted the DaewooMATTE in the United States in May 2009. In April 2010, General Motors announced that they will be producing 225,000 BuickEnclave(TM) units annually. Another of the top rated cars in the United States is the Ford F-150, the highest rated truck since it was first launched in 1981. The F-Series is also known as the Ford F-150 and is one of the most popular truck models in the United States since 1981. The truck produces more than 40 percent of the total U.S. auto market. The Jeep Grand Cherokee is also a top selling car in the United States. The cars produced by Volkswagen are especially known for their distinctive styling. The designs and patterns for most models are exclusively crafted and designed by the experts in Volkswagen’s worldwide design headquarters. The designs for each model are exclusive to Volkswagen and its designers are paid double the amount of salary that designers for Ford Motor Company get. Since 2006, over five million Volkswagen automobiles have been produced and sold in the United States. And that sure is a lot considering that Volkswagen has only been in the automobile industry since 1964. They have already made a name for themselves and that name is uniqueness. You can never ever see another car model quite like the Volkswagen. Even their favorite Norway brand of the same name already disappeared. This is apparently in response to the fact that when Norwegians first heard Volkswagen, they thought that it was only one of those things that you see in children’s cards or toys. They also thought that it was not a real auto. However, after having a look at the car, they were sure that they have seen the like of the Italian stallion that is the Bus.
<urn:uuid:efaac3d3-3011-4ad4-bf69-bc39873856d3>
CC-MAIN-2022-33
https://jobsfore.com/the-us-automotive-industry-today/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00478.warc.gz
en
0.982671
971
2.84375
3