text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
This complete foundational text and reference covers the core curriculum for radiography students with vivid illustrations and thoroughly updated content. In the 4th edition of this highly-respected text, content is updated and modified to convey the pathology knowledge radiographers need at the appropriate comprehension level for better understanding. The book covers all of the essential information radiography students need, including disease processes, their radiographic appearance, and their treatment. Out of Stock Sorry but this item is out of stock, please check back again soon.
<urn:uuid:1a4845a9-b7a4-46d9-bc9e-0973f6d98d65>
CC-MAIN-2017-04
https://www.zookal.com/comprehensive-radiographic-pathology-9780323036245/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00401-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908923
102
1.757813
2
NM Historical Society Conference Coming to Alamogordo The 2018 New Mexico History Conference will be held in Alamogordo, New Mexico, starting April 19 through April 21. The Conference is presented by the Historical Society of New Mexico in partnership with the Tularosa Basin Historical Society and New Mexico State University – Alamogordo. Registration forms are available online at hsnm.org or at the Tularosa Basin Historical Society Museum, 1004 N. White Sands Blvd. The Historical Society of New Mexico was founded on Dec. 26, 1859. It is the oldest historical society west of the Mississippi River. During the Civil War, it suspended activities, but soon resumed their role in preserving New Mexico’s history after the Civil War. During the territorial period of New Mexico, 1851-1912, their membership included merchants, educators, lawyers and politicians, many of which published historical accounts of the Spanish, Mexican, and American periods in documents of the Historical Society. The Society began very early to collect historic artifacts and papers of various periods and ethnic groups of the state. By 1885 this collection led to the founding of the Society’s museum rooms in the Palace of the Governors. In 1909 the territorial government created the Museum of New Mexico; later the museum collections were given to the State of New Mexico, which has continued to manage the collection and expand to cover the entire state. In 1974, to revive membership, the Historical Society established a conference on Southwest and New Mexico history. Two and half-day conferences are held each year in the spring around various state sites and include tours of local historical places as well as papers and discussion on New Mexico history and politics. Joint conferences are held with the Arizona Historical Society every other year to broaden the interest of historical society members of both states. In 1976, the Society responded to the need for a publication to print award-winning papers and society news by establishing the La Cronica de Nuevo Mexico; this publication includes book reviews and news of history around the state. Additionally, the Historical Society of New Mexico makes grants available to local historical societies in the state to help with their programs and collection management. This year, the Tularosa Basin Historical Society was a recipient of this grant which was used to re-furbish the Works Progress Administration Diorama that was loaned to the Tularosa Basin Museum from the White Sands National Monument Museum. This year’s conference events will be held on the campus of the New Mexico State University-Alamogordo, 2400 North Scenic Drive. An April 19 evening reception will start the conference off at the New Mexico Museum of Space History, 3198 state Route 2001. There will be about 60 speakers and presentations given during the three-day program, as well as several book vendors. On April 19, Michael McGarrity will be the opening guest speaker with a reception of hors d’oeuvres and complimentary wine at 5:30 p.m. to 6:30 p.m. at the Rohovec Center Theater. On April 21, there’s a HSNM awards banquet at the Tays Center between 6 p.m. A full schedule of the programs along with the detailed list of the presentations and activities is available online at hsnm.org or pick up a conference schedule and registration at the Tularosa Basin Museum of History, 1004 N. White Sands Blvd. Jean Killer is the curator for the Tularosa Basin Museum of History.
<urn:uuid:053aafa4-6073-4d2f-8a37-39e07d1389fe>
CC-MAIN-2022-33
https://www.alamogordonews.com/story/news/local/community/2018/04/11/nm-historical-society-conference-coming-alamogordo/496821002/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz
en
0.943513
725
1.882813
2
Fazlur Rahman was one of the great 20th-century Muslim modernists, whose prolific writing and sheer number of students who make up a who’s who of Islamic studies throughout North America reveal the impact that he has had on both academe and on Muslim communities throughout the world. The modernist approach is contrasted with the radical approach of Mawlana Mawdudi of Pakistan. The comparison is made richer by the fact that the two men knew each other personally. The need to contrast the Islamic views presented by Fazlur Rahman with those espoused by Al-Quaida are critical to avoid stereotyping the worldwide Muslim community. ©1984 Fazlur Rahman (P)2009 Audible, Inc. Report Inappropriate Content
<urn:uuid:46f79e83-410d-4418-b5e9-7e82b67d56bb>
CC-MAIN-2017-04
http://www.audible.com/pd/Religion-Spirituality/Islam-and-Modernity-Audiobook/B0035YWVGO
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00138-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955364
154
2.125
2
Hanson, associate professor of Judaic Studies, University of Central Florida, has written an unusual defense of biblical archaeology and its role in the Arab-Israeli conflict, concentrating on biblical sites such as Hebron, Shechem, Shiloh, and Jericho, and the most intractable site of all, Jerusalem. In doing so, he unintentionally reiterates the key arguments of biblical archaeology's critics, namely that it is designed to "prove" the antiquity of Jews in the southern Levant and thereby "legitimize" the existence of the modern State of Israel. One of his goals is to assault claims by Palestinians and Arabs that they predate Jews in the Holy Land and that Jewish history in the region is invented. This is an important task, but Hanson does so by means of potted history derived from often outdated secondary sources, repeating assertions that specialists no longer accept. Hanson elides such problems as the Israelis turning over the area of the City of David to a private group for research and presentation. He lauds the conjoined but contradictory tasks of archaeological research and building Jewish neighborhoods. He similarly praises the excavation of the Western Wall tunnels, subsequently converted into privately controlled prayer spaces. Throughout, he takes Palestinian criticism and denialism and international condemnation as validating the necessity and indeed the wisdom of Israeli actions. Hanson dismisses controversy within the Israeli archaeology community regarding methods and interpretations as "political correctness" while praising the wisdom of the Israeli Right taking matters into its own hands. Hanson takes side journeys through a thwarted Jewish conspiracy to blow up mosques on the Temple Mount; the Temple Institute's efforts to prepare for a future Third Temple, including breeding a red heifer; the history of Jews in Hebron; the plans for a casino in Jericho, and the destruction of Canaanite Shechem. He bounces the reader back and forth between fragments of Biblical and other ancient texts, the sketchiest outline of archaeological finds, and modern geopolitics. Hanson correctly notes that scholars and politicians routinely support indigenous peoples discovering their pasts through archaeology, with the singular exception of Jews. But such hypocrisy does not obviate the need for states to manage archaeology and heritage with an eye towards scholarship. Israelis seriously debate these matters endlessly in ways that Hanson caricatures. Ultimately, Hanson's polemics do biblical archaeology and Israel no favor.
<urn:uuid:929d4678-26e3-48c9-854e-0740d6286751>
CC-MAIN-2022-33
https://www.meforum.org/61837/whose-holy-land
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00066.warc.gz
en
0.934229
479
1.75
2
Small and medium-sized businesses are starting to show serious interest in Voice over Internet Protocol (VoIP) . And the technology, whether hosted or deployed on site, has some real benefits to offer. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. The simplest hosted services offer businesses a bargain on their phone bills. More complex on-premise systems or even some of those soon-to-arrive hosted systems offer small businesses all the features, integration with presence-based information and applications that are available in systems for large businesses. "It is not a question of whether small businesses will adopt VoIP; it's a question of what is the right time for them," said Lisa Pierce, a vice president with Cambridge, Mass.-based Forrester Research Inc. A December survey of 1,500 U.S.-based SMBs by International Data Corp., in Framingham, Mass., found that 11% of those businesses are either testing or running VoIP. Another 20% are seriously considering adopting the technology. Last summer Mentorware Inc., a San Jose, Calif.-based hosting and marketing consultancy, realized that it was spending too much money on calls to its Bangalore, India, office. As a result, employees were avoiding making calls between the offices to save money. .To solve the problem, Mentorware set up an IP private branch exchange (IP PBX) from Zultys Technologies, a Sunnyvale, Calif.-based IP PBX and phone provider that focuses on SMBs. Since launching the VoIP system, the company has saved money on its calls, which are now routed over the Internet, to India. The company also uses a messaging client that is part of the Zultys system. It can forward calls to cell phones and has e-mail notification for voice calls. "There is no hesitation about calling people in India; we know there is no cost," said David Noland, vice president of engineering with Mentorware. "We now meet on the phone instead of via e-mail or an online chat." Since Mentorware is a technology company, it has enough tech-savvy staff members to manage the system on its own. But managing voice can be a challenge. With VoIP, voice becomes another application running on the LAN. But unlike other data applications, voice has stringent requirements and immediate consequences if those requirements are not met. Voice is sensitive to latency and jitter, which result in dead spots in calls. When businesses deploy VoIP -- and even when they use many hosted systems -- they need to ensure that they have adequate bandwidth and quality of service on their networks, said Tom Valovic, program director for VoIP infrastructure with IDC. "Whether you are a large enterprise or a small business you always have to make sure that your LAN has the capacity," Valovic said. But many small businesses may lack the expertise necessary to manage their own on-site IP PBX or may not be able to hire people trained to deploy and manage VoIP systems, Pierce said. "It takes money and expertise to manage VoIP systems and frankly anyone who would have the expertise would likely parlay that into a better job [at a larger company]," Pierce said. Instead many small businesses may opt for hosted VoIP systems. Major carriers such as Verizon Communications Inc., SBC Communications Inc. and Qwest Communications International Inc. have all recently launched hosted VoIP systems. Other VoIP-specific companies are also starting to focus on businesses. Many of these systems provide basic phone service with fewer features as an in-house system. "It's a no-brainer to go with the hosted model," Valovic said. "It eliminates the need for capital outlay and that is attractive." For Rennen International Corp., a New York City-based manufacturer and importer of automobile wheels, the decision to go with VoIP was purely driven by cost. The company pays $300 a month for three phone lines with Verizon. In contrast, its three lines from Edison, N.J.-based Vonage Holdings Corp. cost about $150. Vonage also offers faxing, which most VoIP providers do not. Because there are fewer IP features in this offering, Rennen does not even need a data network to use the system. Rennen has a DSL connection and Vonage provides a converter that allows them to plug analog phones into their Internet connection. Calls travel over Vonage's network. Rennen keeps its three Verizon lines for incoming calls in case there is any trouble with the Internet connection. Weizrung Lee, marketing director at Rennen, said the company hopes to upgrade to T1 lines at which point it may be able to do away with its traditional lines. Hosting was an obvious choice for Rennen. The company has only one IT person and is not very tech savvy. "Hosted was a better choice for us," Lee said. "It's better to leave it to the professionals. We're not in the VoIP business."
<urn:uuid:a107c676-d34b-40f5-9b06-d60d2634ca59>
CC-MAIN-2017-04
http://www.computerweekly.com/news/1280096572/Small-businesses-get-serious-about-VoIP
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00300-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965106
1,052
1.523438
2
Trust lacking in public cloud among government ICT pros Almost a third of government ICT professionals don’t trust the public cloud to keep their data secure – a much higher proportion than the private sector. The findings were announced in a survey by supplier Intel Security into the state of cloud adoption across the world, with 32% expressing doubts, compared to a market average of 19%. It found that a quarter of government respondents said that they have had a data loss or breach with a cloud service provider, and only 9% have complete trust in the public cloud to keep their data secure. Raj Samani, chief technology officer at Intel Security EMEA, said: “We are at the tipping point of investment and adoption, expanding rapidly as trust in cloud computing and cloud providers grows. “As we enter a phase of wide-scale adoption of cloud computing to support critical applications and services, the question of trust within the cloud becomes imperative. This will become integral into realising the benefits that cloud computing can truly offer.” The survey, conducted by market research firm Vanson Bourne, interviewed 1,200 IT decision makers with influence over their organisation’s cloud security in Australia, Brazil, Canada, France, Germany, Australia, Spain, the United Kingdom and the United States. Government respondents said they have an average of 39 cloud services being used by their organization. This is lowest from all the sectors surveyed, with market average of 43. Almost two thirds of government ICT professionals (59%) said they have a distinct solution for both on-premises and cloud infrastructure, compared to a market average. Jim Reavis, chief executive officer of the Cloud Security Alliance, said: “The cloud is the future for businesses, governments and consumers.” “Security vendors and cloud providers must arm customers with education and tools, and cultivate strong relationships built on trust, in order to continue the adoption of cloud computing platforms. Only then can we completely benefit from the advantages of the cloud.” Think tank cites growing cyberthreats and a lack of incentives for policymakers to develop technical skills Former cabinet secretary Mark Sedwill has landed a non-executive role at BAE Systems New measures prohibit supply of any tech used for ‘internal repression’ Government-backed hub aims to create jobs and improve resilience
<urn:uuid:454029c9-3e8b-4efe-a11f-a0b78823e205>
CC-MAIN-2022-33
https://publictechnology.net/articles/news/trust-lacking-public-cloud-among-government-ict-pros
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00266.warc.gz
en
0.954574
486
1.585938
2
Behavioral finance, a relatively new area of financial research, has been receiving more and more attention from both individual and institutional investors. Behavioral finance combines results from psychological studies of decision-making with the more conventional decision-making models of standard finance theory. By combining psychology and finance, researchers hope to better explain certain features of securities markets and investor behavior that appear irrational. Standard finance models assume that investors are unbiased and quite well informed. Investors are assumed to behave like Mr. Spock from Star Trek, taking in information, calculating probabilities and making the logically “correct” decision, given their preferences for risk and return. Behavioral finance introduces the possibility of less-than-perfectly-rational behavior caused by common psychological traits and mental mistakes. Six common errors of perception and judgment, as identified by psychologists, are examined in this article. Each has implications for investment decision-making and investor behavior. An understanding of the psychological basis for these errors may help you avoid them and improve investment results. And in some cases, market-wide errors in perception or judgment can lead to pricing errors that individuals can exploit. Understanding the psychological basis for the success of momentum and contrarian strategies can help investors fine-tune these strategies to better exploit the opportunities that collective mental mistakes create.
<urn:uuid:8fc352ba-1447-449e-b484-7b822d862e7f>
CC-MAIN-2017-04
http://blog.aaii.com/the-psychology-behind-common-investor-mistakes-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00452-ip-10-171-10-70.ec2.internal.warc.gz
en
0.917439
257
2.625
3
Many of the recommendations of the Committee of Eminent Persons (CEP) under the chairmanship of Prof Ashok Misra, which submitted its report to the Government on November 5, are aimed to wean IIT aspirants away from the dependence on coaching institutes. The Ministry of Human Resource Development (HRD) has decided to put the recommendations of the committee in public domain for wide consultations and decided that the JEE 2016 will be conducted in the same manner as 2015, with an enhanced intake from 1.5 lakh to two lakh into the JEE (Advanced) stage. The CEP has also suggested that changes in the structure of JEE shall be effected from 2017 onwards. As per the recommendations, a National Testing Service shall be set up by early 2016, mandated to conduct an Aptitude Test, which should test the scientific aptitude and innovative thinking ability. The Aptitude test may be offered two or more times in a year and would be an online test, it said. Significantly, the committee has recommended that the testing shall test scientific thinking and cannot be gamed through coaching. As per recommendations, based on this performance, about four lakh candidates shall be short-listed for taking the JEE, which will be on the lines of the current JEE (Advanced) and designed to test the knowledge in Physics, Chemistry and Mathematics and will be conducted by the IITs. "From this, ranks will be issued to 40,000+ students who can seek admission in IITs and NITs based on a common counseling," the statement said. It has also been suggested that the IITs should set up a system for developing mock JEE examinations which will help students prepare for the JEE significantly and wean them away from the coaching industry. Another significant recommendation made by the Committee is that board marks shall not to be counted for giving rankings this year for NITs, CFTIs.
<urn:uuid:5091ab3c-937c-49e1-9c39-78a360a7660e>
CC-MAIN-2017-04
http://post.jagran.com/iit-council-forms-a-committee-to-make-changes-in-the-entrance-examination-pattern-in2017-1446899510
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00493-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962394
399
1.8125
2
- A Facebook user was banned from posting a photo of a prehistoric figurine of a naked woman. - The Venus of Willendorf, which dates back 29,500 years, is considered one of the world's earliest depictions of female fertility. - The Natural History Museum of Vienna, which houses the figurine, has attacked Facebook. - Facebook says the ban was an accident. A museum in Vienna has attacked Facebook for banning a woman from posting a photo of a 29,500-year-old figurine of a naked woman. Laura Ghianda, an activist who tried to post a photo of the Venus of Willendorf on the platform last year, said she was banned from doing so because it violated the company's nudity policies. The Venus of Willendorf, which is displayed at Vienna's Natural History Museum, dates back to the Paleolithic age and shows a woman standing in the nude with her head drooped. It's one of the world's earliest symbols of female fertility. NHM Vienna slammed Facebook's actions. "Let the Venus be naked!" the museum wrote in a German-language Facebook post. "For 29,500 years she has shown herself as a prehistoric fertility symbol without any clothes. Now Facebook has censored it and upset the community." The attack was first published in January, but took extra prominence after The Art Newspaper reported the story on Tuesday. Christian Koeberl, the museum's director-general and CEO, added in a statement to Business Insider: "There is no reason for the Natural History Museum Vienna to cover the 'Venus of Willendorf' (a 29,500-year-old figurine, a naked representation of a woman of the Paleolithic Age) and hide her nudity, neither in the museum nor on social media. "There has never been a complaint by visitors concerning the nakedness of the figurine and we have never heard of anybody who could have been offended by the look of this artefact. [...] "The perfection of the representation and harmonious style make the 29,500-year-old figure of the 'Venus of Wilendorf one of the most expressive works of art from the Paleolithic Age." Ghianda, the Facebook user who was blocked from posting the image, said she appealed against Facebook's censorship four times. She added that the "little statue has the power to disquiet Facebook control team. [sic] "The same little statue that is now exposed in the archaeological museum in Vienna and appreciated by thousands of visitors/year. "The same little statue that speaks about an ancient culture can't be a safe image here." Other art aficionados have voiced their anger at Facebook's ban. They include US animator Nina Paley, who posted a gif of a "dancing" Venus in early January. According to NHM Vienna, Paley's animation was a response to Ghianda's post detailing the Facebook censorship. —Nina Paley (@ninapaley) January 2, 2018 —Jen Souers Chevraux (@HeritageWitch) March 1, 2018 Facebook claims this was all a misunderstanding. The company said Ghianda had tried to run an ad with a photo of the Venus, which it mistakenly banned before realising it was a statue. A spokesman for the company told Business Insider in a statement: "Our advertising policies do not allow nudity or implied nudity but we have an exception for statues. Therefore, the ad with this image should have been approved. "We apologise for the error and have let the advertiser know we are approving their ad." This is not Facebook's first high-profile dispute over its censorship of art. A French court is currently deciding whether the social media platform had the right to shut down a teacher's account because he posted a photo of The Origin of the World, a 19th century oil painting depicting female genitals currently on display at the Musée d'Orsay in Paris. The court expects to announce a ruling on March 15. Two years ago Facebook also removed from its site images of "Napalm Girl," a Pulitzer Prize-winning photograph from the Vietnam War. It later reversed its decision after the Norwegian Prime Minister and a major newspaper in the country protested the ban. According to Facebook's Community Standards, the platform allows photos of paintings, sculptures, and other art forms of nude figures. However, it added: "Explicit images of sexual intercourse are prohibited. Descriptions of sexual acts that go into vivid detail may also be removed."
<urn:uuid:ae842c53-9ae9-49f5-b90c-73d2cc85673e>
CC-MAIN-2022-33
https://www.businessinsider.com/facebook-bans-venus-of-willendorf-photos-over-nudity-policy-2018-3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00467.warc.gz
en
0.960254
938
2.234375
2
Germany Info emits the following bit of self-affirming propaganda: „The German Federal Cabinet agreed April 13 to sending up to 75 German soldiers to Sudan. The troops would primarily be military observers and staff personnel for the United Nations peace mission in Sudan (UNMIS).” At the same time, the German Government has announced that it will maintain its emergency humanitarian aid for Sudan in 2005 at the same high level as in 2004 – 32.5 million euros. Additional funds could be made available if: · The acts of violence in Darfur are halted and the Darfur crisis is resolved · The North-South peace agreement is implemented · The previously not included actors be included immediately · Significant steps are taken toward democratization and protection of human rights.” In other words - NEVER, since a commitment of less than 75 massacre watchers will do nothing to stabilize the Sudan. Sudan Watch looks at it this way: „The African Union (AU) has asked for European Union aid in deploying some 3,000 peacekeepers in Sudan's troubled Darfur region. [German government official Peter] Struck said he expected German Luftwaffe C160 Transall transport jets to be flying missions in Darfur later this year. - - - Note: Later this year? Hello. What about this month? Like, today? If you've followed Darfur closely these past six months, you may have noticed nothing much new has been put on the table since April and May when the death toll for Darfur was reportedly 10,000. Thousands of UN peacekeepers were planned for Sudan anyway - to enter by the end of Sept/Dec 2004 to monitor the ceasefires agreements after the long hoped for signing of the north-south peace accords.” ¡No Pasaràn! will not be holding its' breath.
<urn:uuid:6869a205-4213-4ef3-912b-73512feb2ff7>
CC-MAIN-2017-04
https://no-pasaran.blogspot.com/2005/04/germany-deep-commitment-to-peace-pfftt.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00178-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950709
385
1.664063
2
Officials at the Hampton National Historic Site in Towson this week officially changed the name of a black history program planned for next month after controversy erupted over its original title — "Slave for a Day." The July 8 event, which park ranger and event organizer Angela Roberts-Burton said is part of the historical site's monthly black history educational series, caused a stir on the Internet for what some believe was insensitive wording. "By no means am I trying to, or are we the Park Service, trying to assimilate the atrocities that slave African-Americans endured," Roberts-Burton said Wednesday. "This is just a glimpse of the hard work, being out in the heat and sun," she said. In the initial event description on the Hampton National Historic Site website, which was online until Tuesday, Roberts-Burton used the "Slave for a Day" heading. The release also used exclamation points to note that it was the "first time ever at Hampton!" and participants could "carry buckets of water with a yoke on your shoulders!" The posting drew response online, including from the site Baltimore Fishbowl, where blogger Rachel Monroe wrote, "Clearly Hampton is approaching this from an education-is-good! perspective. Their hearts are in the right place. ... Still, the inescapable and brutal fact of slavery was that it wasn't for a day. ... Some things are too profound to playact, it seems to me." Roberts-Burton said that since Monday, she's received around 50 emails and phone calls reacting to the title. Anthony Fugett, vice president of the Baltimore County chapter of the NAACP and a former board member for the national NAACP, said he had no problem with the program, but agreed the title was an issue. "The event was well-intentioned, but the name may have been inappropriate, and I'm glad to see they changed it," said Fugett, an Owings Mill resident. "I don't see it as a menacing event at all," Fugett said. "Slavery is a part of the history of the country and the state of Maryland. The one thing we don't want is for our history to be missed, and sometimes it's good to get a perspective of a day in the life of a slave." Roberts-Burton said she used the language in the initial posting because she was excited for the fact that it's the first such event at Hampton. After reaction started coming in, the title was switched yesterday from "Slave for a Day" to "Walk a Mile, a Minute in the Footsteps of the Enslaved on the Hampton Plantation," and the description was changed to remove exclamation points. Roberts-Burton said the park superintendent and the Northeast Regional Office asked her to changed the title of the event. "We changed the name and [the National Park Service] allowed me to pick it," she said. "No one did it for me." "I'm the one who told them to alter it," said Vincent Vaise, chief of interpretation for the National Park Service, overseeing Hampton and Fort McHenry. "We didn't want people to be upset because of the title of the program," he said, "but we want people to see the purpose of the program, to tell the story and empathize with people of that era." "This is how we learn from each other," Vaise said of the reaction. "And really, that's part of the dialogue we want to have. Places like Hampton can be used as a forum for race relations and a critical look at history. "To be blunt, we could do a concert or a furniture tour — that's easy history," he said. "These are the types of things the park service wants to do to make itself relevant. But when you go there [discussing slavery], we know we have to expect some people are going to react, and we should be ready for it. Hopefully, this experience might bring out more people to see what it's really about." Roberts-Burton said the free program will allow participants to experience the same type of farm labor as enslaved people at Hampton Mansion did. "Obviously, I have the backing of the National Park Service," she said. The July 8 event will end with a memorial ceremony conducted by the African Diaspora Ancestral Commemoration Institute, and will commemorate those who were enslaved at Hampton. Roberts-Burton, who is black, said some critics who contacted her after the event was posted suggested they just hold the healing ceremony, but she said that ceremony would be moot without knowledge of what needed healing. She has also heard from supporters, including Carl Miller, a race relations tutor at Harvard University who Roberts-Burton said "knew what I was doing." On Wednesday morning, Miller set up a Facebook chat on the page of the Community Healing Network that allowed Roberts-Burton to tell her side of the story. Roberts-Burton said she studied the African diaspora — the historical movement of Africans and their descendants throughout the world — while earning her master's degree at Howard University. She said the original title was meant to draw attention to the event. The National Park Service began running the property in 1948, but the slave quarters and overseer's quarters have only been open to the public since 2006. The mansion was the home to the Ridgely family, and according to its website, "It preserves and tells the story of the occupancy of seven generations of one family, the Ridgelys, and their large and diverse labor force. ... "Hampton is the story of people — enslaved African-Americans, indentured servants, industrial and agricultural workers, and owners. It is also the story of the economic and moral changes that made this kind of life obsolete," the website states. "We have programs on a monthly basis on the African-American experience, and most of the time people who attend are a majority white," Roberts-burton said. "We're trying to get more African-Americans to come to the site, but considering the city is majority black, the majority of our visitation is white." Recently, she said, musician Joe Becton performed a concert detailing the evolution of blues music. Roberts-Burton said it was attended by 40 people, "and there wasn't one African-American sitting there." She also gives monthly tours dressed in period attire that describe the mansion and surrounding buildings strictly from the perspective of African-Americans during the slavery era. "If you look at the website itself, on the home page, it says 'black history month is every month at Hampton,'" Roberts-Burton said. "People who are complaining about this are people who don't even come here."
<urn:uuid:f00c8357-abbb-4d38-a33b-59169c67c2d4>
CC-MAIN-2017-04
http://www.baltimoresun.com/news/maryland/baltimore-county/towson/ph-tt-hampton-switch-0627-20120620-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00339-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975908
1,397
2.1875
2
10 Ways to Stop Stage Fright We’d rehearsed and rehearsed, I had worked so hard to prepare my character, and of course I knew my lines, but you know that few minutes when you’re standing at the side of the stage listening to the audience chattering in their seats? The audience that have come in to see YOU (and the rest of the cast but you get what I’m saying) move and captivate them with your performance? When you know there are reviewers, agents and people you know (family, eek) in the audience AND THEN SUDDENLY YOU GO BLANK AND CAN’T REMEMBER A THING?? Have you had that experience? Because I have! I freaked and told the director I had gone blank and didn’t know what to do. He told me to try my best and if I really needed a prompt just to say ‘line’ and I could get a prompt. I said something like “Do people seriously do that??” (if you do… Seriously, stop it!) and made my entrance on stage. I stood there palm sweating, heart racing and mind BLANK for a few seconds (but it felt like 2 hours), I took a deep breath and it all came flooding back to me (oh the relief!) but why did I get that mental block? I attended every rehearsal, I prepared my character thoroughly, learnt my lines well, arrived early on the day, ran through the script with the rest of the cast, drank energy drinks to make sure I had enough energy… Where did I go wrong? Well, the answer is down to science. Your body doesn’t know the difference between fear of being laughed at or fear of being attacked. When we think about things that could go wrong and what would happen as a result, the hypothalamus part of the brain triggers the pituitary gland to secrete the ACTH hormone, which then stimulates the adrenal glands and, adrenaline is released into the blood. Your body doesn’t know the difference between fear of being laughed at or fear of being attacked and fight or flight sets in. Your blood pressure and heart rate increase, your body instinctively wants to curl up into the foetal position to protect itself and your muscles shake, your digestive system begins to shut down to increase oxygen to the vital organs, you get a dry mouth and a funny feeling in your tummy, blood leaves the brain to send more oxygen to your limbs to allow you to fight or take flight and if there’s less oxygen in the brain, you know what that means don’t you? It messes around with our memory and speech… This is where things can really go wrong. If you forget a line, or trip over your words, fear will set in even stronger which will take the whole process up another level meaning you are more likely to forget again or be unable to get your words out. We need to make sure we don’t get into this cycle in the first place! - Prepare, prepare and then prepare some more. Prepare until you know your role backwards, sideways and standing on your head then keep preparing until you are sick of it. I’ll always remember preparing for a show at college and I told the tutor I was sick of looking at the script as it was coming up to show time. She said “Good, that means we’re getting somewhere. Go to scene 8…” If you are not thoroughly prepared, your brain monkeys are much more likely to come into play, telling you it could all go wrong and setting off the fight or flight response. - Avoid caffeine, nicotine and any other stimulating substances. - Relax. Arrive in plenty of time for your performance to give you time to do some stretching, deep breathing and visualization exercises. This will trigger the same part of the brain that releases the hormones to kick off the protective mechanisms, to now release hormones that trigger relaxation. - Don’t entertain any negative thoughts that come into your head… They are not serving you. Focus on the positives and what could go RIGHT. - Focus on your performance, not your audience. - Take enough time before the scene to focus and get into your flow. If you are fully immersed in your scene, you won’t be thinking about the audience. - Accept that nerves will never completely go away, nor should they. They energize your performance and make it come to life when you don’t let them control you. - If a mistake happens, it’s not the end of the world. Recover and move on… Do not allow yourself to dwell on it. - Hypnosis is a great way to combat stage fright! - Practice improvisation until you are confident that you’d be able to recover seamlessly from any mistakes without the audience even suspecting a thing! By Eirian Cohen, founder of Northern Star Acting and co-producer ESG Media, LTD.
<urn:uuid:03a39fd7-c31d-4101-a884-3201726a8dcb>
CC-MAIN-2016-44
http://www.dailyactor.com/acting-advice-columns/10-ways-to-stop-stage-fright/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00551-ip-10-171-6-4.ec2.internal.warc.gz
en
0.956953
1,045
1.804688
2
Ford accelerates waste and water goals The car manufacturer’s European arm has already cut landfill-waste generation by 40 per cent and reduced water use by 37 per cent since 2007. However, it announced yesterday a series of fresh targets as part of its New Green Manufacturing Plan. The company estimates it will save €2.3m (£1.9m) by reducing the amount of water it uses by 30 per cent to produce 1.2 million vehicles a year, equating to about 1.3 billion litres or 1,100 litres for each car or van manufactured. It also intends to send 70 per cent less waste to landfill across Europe, preventing 5.5 billion tonnes of waste being dumped, primarily by increasing the proportion of waste the company recycles and reuses. Plants in Southampton, Bridgend and Dagenham will adopt the new targets alongside their European counterparts in Genk, Valencia, and Saarlouis and Cologne in Germany. Ford said the plants in Saarlouis and Cologne have been leading the way in reducing waste and already send nothing to landfill. “This plan represents our pledge to minimise Ford’s impact on the environment both before and after our customers get behind the wheel,” said Stephen Odell, chairman and chief executive of Ford in Europe. “This goes hand in hand with our commitment to develop the most fuel-efficient vehicles. Sustainability makes just as much sense for Ford as a business as it does for the environment.”
<urn:uuid:f6d3a713-b08c-470d-93a2-4b3dd2b5bed3>
CC-MAIN-2022-33
https://kleanindustries.com/resources/environmental-industry-market-analysis-research/ford-accelerates-waste-and-water-goals/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00474.warc.gz
en
0.934799
314
2.3125
2
Proposed: October 22, 2010 Adopted: October 22, 2010 by voice vote with no dissent RESOLUTION TO ESTABLISH A PROGRAM LEADING TO A CERTIFICATE IN ADVANCED STUDIES IN DENTAL PUBLIC HEALTH (CDM) WHEREAS, the College of Dental Medicine recommends that the University establish a program leading to a Certificate in Advanced Studies in Dental Public Health, and WHEREAS, dental public health is one of nine recognized specialties of U.S. dentistry and the only specialty not currently taught at Columbia University College of Dental Medicine, and WHEREAS, only about 1,000 or the nation’s nearly 170,000 dentists are trained in dental public health, and there is a need for many more, and WHEREAS, students and dental residents as well as overseas candidates have expressed interest in such a program, and WHEREAS, few such programs exist in the Northeast United States and there are no other such programs in the tristate area, and WHEREAS, the proposed program does not replace any existing Columbia programs, THEREFORE, BE IT RESOLVED that the Senate establish the program leading to the Certificate in Advanced Studies in Dental Public Health. BE IT FURTHER RESOLVED that the Education Committee shall review the program in five years. Committee on Education Dental Public Health (DPH) is one of nine recognized specialties of U.S. dentistry and the only specialty not currently taught at Columbia University College of Dental Medicine. Dental public health is the science and art of preventing and controlling dental diseases and promoting dental health through organized community efforts. The long-term aim of the proposed DPH training program is to reduce the impact of oral diseases nationally and globally by transforming dentists into academic, clinical, program, and policy leaders who excel in i) dental health education of the public, ii) clinical and community dental research, iii) program design and administration, iv) public health innovation and, v) prevention, surveillance and control of oral diseases on a population basis. Enrolled residents focus on the integration of evidence-based clinical dentistry with population sciences and public health. Through academic coursework, community participation and research practice, the program’s educational objective is to develop the following competencies: plan oral health programs for populations; implement, manage and develop resources for such programs; select interventions and strategies for the prevention and control of oral diseases and promotion of oral health; incorporate ethical standards; evaluate and monitor dental care delivery systems; design and understand the use of surveillance systems; communicate and collaborate with groups and individuals on oral health issues; advocate for, implement and evaluate public health policy legislation and regulations to protect and promote the public’s oral health; critique and synthesize scientific literature; and design and conduct clinical and population-based studies to answer oral and public health questions.
<urn:uuid:7582cf83-be76-4beb-b9c9-e24afd2fb430>
CC-MAIN-2017-04
http://senate.columbia.edu/archives/resolutions_archives/resolutions/10-11/dental_public_health_res_10-22-10.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00349-ip-10-171-10-70.ec2.internal.warc.gz
en
0.912882
602
1.695313
2
The internet has grown vast in size and numbers. With this growth has also come the growth of cyber porn addiction. Cyber porn has made for the abundant availability of pornography into the hands of the addict. Usually the author of this type of material is very selfish and usually just looking for selfish gains The creators of such destructive material as pornography do not see what effects or what the porn addict goes through in an attempt to break the chains of the addiction. Cyber porn addicts in most instances do not think very highly of themselves. Some are even suffering in the destruction of their family, marriages and lifestyles due to the addiction. There are some scary facts that should be considered in our society concerning pornography addiction. Consider these facts: - Sexual solicitation has been received by one in five children from the age 10-17 while on the internet. (The Web's Dark Secret. Newsweek, 19 March, 2001) - The staggering figure of 2.5 electronic mails in a day is of a pornographic nature. (Pornography Statistics, 2003 Family Safe Media) - Exposing a child to pornography at an early age will increase the chances of that child becoming a sexual addict. - The addiction grows from soft pornography to violent and degrading type pornographic media. The addict then begins to attempt to do these acts in real life. Treating a porn or cyber porn addict can be a difficult task as the majority of clinicians concur. There have been many addicts that will say things like "now is my final time to view this stuff". Pornography addiction can be broken when the person affected realizes that there is a problem. Sometimes the person has to come to the end of themselves to realize that the answer is not another drug or another destructive behavior. Really the only Person that can help is Jesus Christ. The pornography addict must give themselves daily to treat this addiction. Find a Bible and everyday ask Jesus to give you the strength to stop this addiction.
<urn:uuid:4731198a-9003-4ab2-836a-af8ce1c072e6>
CC-MAIN-2016-44
http://www.infobarrel.com/Cyber_Porn_Addiction
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00560-ip-10-171-6-4.ec2.internal.warc.gz
en
0.946825
393
1.8125
2
DISCUSSION: Read the whole sentence, lines 23-27. These lines show that Dunham was unique. She had training in both dance and anthropology. All other experts only had training in social science or dance, but not both. That explains why no one had previously conducted Dunham’s studies. - Lines 19-23 explain why social scientists didn’t study dance. This question is asking about lines 23-27. - This is tempting. But lines 23-27 only talk about why groups are not qualified to study dance. This answer has the wrong emphasis: the passage wasn’t trying to prove that any group was qualified to study dance (apart from Dunham). - We’re not told why Dunham chose to study dance. Dunham may not have been aware that she was the only dancer qualified to study dance. - CORRECT. Lines 23-27 show that no dancer had studied dance because they weren’t trained in social science research. - What? The dancers mentioned in lines 23-27 did not have a field of research. That was the point of mentioning them – they were qualified to understand dance, but they weren’t researchers. Want a free Reading Comp lesson? Get a free sample of the Reading Comprehension Mastery Seminar. Learn tips for solving RC questions
<urn:uuid:20163628-8d12-4fe0-bf6c-b9f85af0437c>
CC-MAIN-2022-33
https://lsathacks.com/explanations/lsat-preptest-70/reading-comprehension/q-11/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00077.warc.gz
en
0.971357
278
2.453125
2
Guru Granth Sahib |Sri Guru Granth Sahib| Guru Granth Sahib (Punjabi (Gurmukhi): ਗੁਰੂ ਗ੍ਰੰਥ ਸਾਹਿਬ ਜੀ (Gurū Gra°th Sāhib Jī), Punjabi pronunciation: [ɡʊɾu ɡɾəntʰ sɑhɪb], / /) is the central religious scripture of Sikhism, regarded by Sikhs as the final, sovereign and eternal living Guru following the lineage of the ten human Gurus of the religion. The Adi Granth, the first rendition, was compiled by the fifth Sikh Guru, Guru Arjan (1563–1606). Guru Gobind Singh, the tenth Sikh Guru, did not add any of his own hymns; however, he added all 115 of Guru Tegh Bahadur's hymns to the Adi Granth, and affirmed the text as his successor. This second rendition became known as Guru Granth Sahib. After Guru Gobind Singh died, Baba Deep Singh and Bhai Mani Singh prepared many copies of the work for distribution. The text consists of 1430 Angs (pages) and 6,000 śabads (line compositions), which are poetically rendered and set to a rhythmic ancient north Indian classical form of music. The bulk of the scripture is classified into thirty-one rāgas, with each Granth rāga subdivided according to length and author. The hymns in the scripture are arranged primarily by the rāgas in which they are read. The Guru Granth Sahib is written in the Gurmukhī script, in various dialects, including Lahnda (Western Punjabi), Braj Bhasha, Khariboli, Sanskrit, Sindhi, and Persian – often coalesced under the generic title of Sant Bhasha. Guru Granth Sahib is predominantly compositions by six Sikh Gurus: Guru Nanak, Guru Angad, Guru Amar Das, Guru Ram Das, Guru Arjan, and Guru Teg Bahadur. It also contains the traditions and teachings of fourteen Hindu Bhakti movement sants (saints), such as Ramananda, Kabir and Namdev among others, and one Muslim Sufi saint: Sheikh Farid. The vision in the Guru Granth Sahib, states Torkel Brekke, is a society based on divine justice without oppression of any kind. While the Granth acknowledges and respects the scriptures of Hinduism and Islam, it does not imply a syncretic bridge between Hinduism and Islam. It is installed in a Sikh gurdwara (temple); many Sikhs bow or prostrate before it on entering the temple. The Granth is revered as eternal gurbānī and the spiritual authority in Sikhism. |Part of a series on| |Guru Granth Sahib| |Varan Bhai Gurdas| During the guruship of Guru Nanak, collections of his hymns were compiled and sent to distant Sikh communities for use in morning and evening prayers. His successor, Guru Angad, began collecting his predecessor's writings. This tradition was continued by the third and fifth gurus as well. When the fifth guru, Guru Arjan, was collecting the writings of his predecessor, he discovered that pretenders to the guruship were releasing what he considered as forged anthologies of the previous guru's writings and including their own writings alongside them. In order to prevent spurious scriptures from gaining legitimacy, Guru Arjan began compiling a sacred book for the Sikh community. He finished collecting the religious writings of Guru Ram Das, his immediate predecessor, and convinced Mohan, the son of Guru Amar Das, to give him the collection of the religious writings of the first three gurus. In addition, he sent disciples to go across the country to find and bring back any previously unknown writings. He also invited members of other religions and contemporary religious writers to submit writings for possible inclusion. Guru Arjan selected hymns for inclusion into the book, and Bhai Gurdas acted as his scribe. While the manuscript was being put together, Akbar, the Mughal Emperor, received a report that the manuscript contained passages vilifying Islam. Therefore, while travelling north, he stopped en route and asked to inspect it. Baba Buddha and Bhai Gurdas brought him a copy of the manuscript as it then existed. After choosing three random passages to be read, Akbar decided that this report had been false. In 1604 Guru Arjan's manuscript was completed and installed at the Harmandir Sahib with Baba Buddha as the first granthi, or reader. Since communities of Sikh disciples were scattered all over northern India, copies of the holy book needed to be made for them. The sixth, seventh, and eighth gurus did not write religious verses; however, the ninth guru, Guru Tegh Bahadur, did. The tenth guru, Guru Gobind Singh, included Guru Tegh Bahadur's writings into the Guru Granth Sahibbut did not include any of his own religious verses in the Guru Granth Sahib. In 1704 at Damdama Sahib, during a one-year respite from the heavy fighting with Aurengzeb which the Khalsa was engaged in at the time, Guru Gobind Singh and Bhai Mani Singh added the religious compositions of Guru Tegh Bahadur to Adi Granth to create a definitive version. The religious verses of Guru Gobind Singh were not included in Guru Granth Sahib, but some of his religious verses are included in the daily prayers of Sikhs. During this period, Bhai Mani Singh also collected Guru Gobind Singh's writings, as well as his court poets, and included them in a secondary religious volume, today known as the Dasam Granth Sahib . Guru Granth Sahib is Guru. Meaning and Role in Sikhism Sikhs consider the Guru Granth Sahib to be a spiritual guide not only for Sikhs but for all of humanity; it plays a central role in guiding the Sikh's way of life. Its place in Sikh devotional life is based on two fundamental principles: that the text is the Guru that answers all questions regarding religion and morality can be discovered within it. Its hymns and teachings are called Gurbani or "Word of the guru" and sometimes Guru ki bani or "Word of Guru". Thus, in Sikh theology, the revealed divine word is written by the past Gurus. Numerous holy men, aside from the Sikh Gurus, are collectively referred to as Bhagats or "devotees." Elevation of Adi Granth to Guru Granth Sahib In 1708 Guru Gobind Singh conferred the title of "Guru of the Sikhs" upon the Adi Granth. The event was recorded in a Bhatt Vahi (a bard's scroll) by an eyewitness, Narbud Singh, who was a bard at the Rajput rulers' court associated with gurus. A variety of other documents also attest to this proclamation by the tenth Guru. Thus, despite some aberrations, Sikhs since then have accepted Guru Granth Sahib, the sacred book, as their eternal Guru . The entire Guru Granth Sahib is written in the Gurmukhi script, which was standardized by Guru Angad Dev in the 16th century . According to Sikh tradition and the Mahman Prakash, an early Sikh manuscript, Guru Angad invented the script at the suggestion of Guru Nanak during the lifetime of the founder. The word Gurmukhī translates to "from the mouth of the Guru". It descended from the Laṇḍā scripts and was used from the outset for compiling Sikh scriptures. The Sikhs assign a high degree of sanctity to the Gurmukhī script. It is the official script for writing Punjabi in the Indian State of Punjab. Gurus considered divine worship through music the best means of attaining that state of bliss - vismad- which resulted in communion with the God.Guru Granth Sahib is divided by musical settings or ragas into 1,430 pages known as Angs (limbs) in Sikh tradition. It can be categorized into two sections: - Introductory section consisting of the Mul Mantar, Japji and Sohila, composed by Guru Nanak; - Compositions of Sikh gurus, followed by those of the bhagats who know only God, collected according to the chronology of ragas or musical settings. (see below). The word raga refers to the "color" and, more specifically, the emotion or mood produced by a combination or sequence of pitches. A raga is composed of a series of melodic motifs, based upon a definite scale or mode of the seven Swara psalmizations, that provide a basic structure around which the musician performs. Some ragas may be associated with times of the day and year. There are 31 ragas in the Sikh system, divided into 14 ragas and 17 raginis (minor or less definite ragas). Within the raga division, the songs are arranged in order of the Sikh gurus and Sikh bhagats with whom they are associated. The ragas are, in order: Sri, Manjh, Gauri, Asa, Gujri, Devagandhari, Bihagara, Wadahans, Sorath, Dhanasri, Jaitsri, Todi, Bairari, Tilang, Suhi, Bilaval, Gond (Gaund), Ramkali, Nut-Narayan, Mali-Gaura, Maru, Tukhari, Kedara, Bhairav (Bhairo), Basant, Sarang, Malar, Kanra, Kalyan, Prabhati and Jaijawanti. In addition there are 22 compositions of Vars (traditional ballads). Nine of these have specific tunes, and the rest can be sung to any tune. |This section does not cite any sources. (January 2017) (Learn how and when to remove this template message)| Following is a list of contributors whose hymns are present in Guru Granth Sahib: - Guru Nanak Dev - Guru Angad Dev - Guru Amar Das - Guru Ram Das - Guru Arjan Dev - Guru Tegh Bahadur - Bhagat Kabir - Bhagat Ravidas - Bhagat Namdev - Bhagat Beni - Bhagat Bhikhan - Bhagat Dhanna - Bhagat Jayadeva - Bhagat Parmanand - Bhagat Pipa - Bhagat Sadhana - Bhagat Sain - Bhagat Trilochan - Baba Sundar ji - Bhai Mardana - Fariduddin Ganjshakar - Balvand Rai - Bhatt Kalshar - Bhatt Balh - Bhatt Bhalh - Bhatt Bhika - Bhatt Gayand - Bhatt Harbans - Bhatt Jalap - Bhatt Kirat - Bhatt Mathura - Bhatt Nalh - Bhatt Salh Sanctity among Sikhs No one can change or alter any of the writings of the Sikh gurus written in the Adi Granth. This includes sentences, words, structure, grammar, and meanings. Following the example of the gurus themselves, Sikhs observe total sanctity of the text of Guru Granth Sahib. Guru Har Rai, for example, disowned one of his sons, Ram Rai, because he had attempted to alter the wording of a hymn by Guru Nanak. Guru Har Rai had sent Ram Rai to Delhi in order to explain Gurbani to the Mughal Emperor Aurangzeb. To please the Emperor he altered the wording of a hymn, which was reported to the guru. Displeased with his son, the guru disowned him and forbade his Sikhs to associate with him or his descendants. A partial English translation of Guru Granth Sahib by Ernest Trumpp was published in 1877. The work was for use by Christian missionaries, and received extremely negative feedback from Sikhs. Max Arthur Macauliffe also partially translated the text for inclusion in his six-volume The Sikh Religion, published by Oxford University Press in 1909. His translations are closer to the Sikhs' own interpretation of the book, and were received well by them. The first complete English translation of Guru Granth Sahib, by Gopal Singh, was published in 1960. A revised version published in 1978 removed the obsolete English words like "thee" and "thou". In 1962, an eight-volume translation into English and Punjabi by Manmohan Singh was published by the Shiromani Gurdwara Parbandhak Committee. In the 2000s, a translation by Sant Singh Khalsa (referred to as the "Khalsa Consensus Translation") became popular through its inclusion on major Sikhism-related websites. Guru Granth Sahib is always the focal point in any Gurudwara, being placed in the centre on a raised platform known as a Takht (throne), while the congregation of devotees sits on the floor and bow before the Guru as a sign of respect. Guru Granth Sahib is given the greatest respect and honour. Sikhs cover their heads and remove their shoes while in the presence of this sacred text. Guru Granth Sahib is normally carried on the head and as a sign of respect, never touched with unwashed hands or put on the floor. It is attended with all signs of royalty, with a canopy placed over it. A chaur sahib is waved above the book. Peacock-feather fans were waved over royal or saintly beings as a mark of great spiritual or temporal status; this was later replaced by the modern Chaur sahib. The Guru Granth Sahib is taken care of by a Granthi, who is responsible for reciting from the sacred text and leading Sikh prayers. The Granthi also acts as caretaker for the Guru Granth Sahib, keeping the holy book covered in clean cloths, known as rumala, to protect from heat, dust, pollution, etc. The Guru Granth Sahib rests on a manji sahib under a rumala until brought out again. The printing of Guru Granth Sahib is done by the official religious body of Sikhs based in Amritsar. Great care is taken while making printed copies and a strict code of conduct is observed during the task of printing. Before the late nineteenth century, only handwritten copies were prepared. The first printed copy of the Guru Granth Sahib was made in 1864. Since the early 20th century, it has been printed in a standard edition of 1430 Angs. Any copies of Guru Granth Sahib deemed unfit to be read from are cremated, with a ceremony similar to that for cremating a deceased person. Such cremating is called Agan Bheta. Guru Granth Sahib is currently printed in an authorized printing press in the basement of the Gurudwara Ramsar in Amritsar; misprints and set-up sheets, and printer's waste with any of its sacred text on, are cremated at Goindval. Punjab Digital Library, in collaboration with the Nanakshahi Trust, began digitization of the centuries-old manuscripts in 2003. - Keene, Michael (2004). Online Worksheets. Nelson Thornes. p. 38. ISBN 0-7487-7159-X. - Partridge, Christopher Hugh (2005). Introduction to World Religions. p. 223. - Kapoor, Sukhbir. Guru Granth Sahib an Advance Study. Hemkunt Press. p. 139. ISBN 9788170103219. - Pruthi, Raj (2004). Sikhism And Indian Civilization. Discovery Publishing House. p. 188. - Christopher Shackle and Arvind Mandair (2005), Teachings of the Sikh Gurus, Routledge, ISBN 978-0415266048, pages xvii-xx - Penney, Sue. Sikhism. Heinemann. p. 14. ISBN 0-435-30470-4. - Anna S. King and JL Brockington (2005), The Intimate Other: Love Divine in Indic Religions, Orient Blackswan, ISBN 978-8125028017, pages 359-361 - Harnik Deol, Religion and Nationalism in India. Routledge, 2000. ISBN 0-415-20108-X, 9780415201087. Page 22. "(...) the compositions in the Sikh holy book, Adi Granth, are a melange of various dialects, often coalesced under the generic title of Sant Bhasha." The Making of Sikh Scripture by Gurinder Singh Mann. Published by Oxford University Press US, 2001. ISBN 0-19-513024-3, ISBN 978-0-19-513024-9 Page 5. "The language of the hymns recorded in the Adi Granth has been called Sant Bhasha, a kind of lingua franca used by the medieval saint-poets of northern India. But the broad range of contributors to the text produced a complex mix of regional dialects." Surindar Singh Kohli, History of Punjabi Literature. Page 48. National Book, 1993. ISBN 81-7116-141-3, ISBN 978-81-7116-141-6. "When we go through the hymns and compositions of the Guru written in Sant Bhasha (saint-language), it appears that some Indian saint of 16th century...." Introduction: Guru Granth Sahib. "Guru Granth Sahib Ji is written in Gurmukhi script. The language, which is most often Sant Bhasha, is very close to Punjabi. It is well understood all over northern and northwest India and is popular among the wandering holy men. Persian and some local dialects have also been used. Many hymns contain words of different languages and dialects, depending upon the mother tongue of the writer or the language of the region where they were composed." Nirmal Dass, Songs of the Saints from the Adi Granth. SUNY Press, 2000. ISBN 0-7914-4683-2, ISBN 978-0-7914-4683-6. Page 13. "Any attempt at translating songs from the Adi Granth certainly involves working not with one language, but several, along with dialectical differences. The languages used by the saints range from Sanskrit; regional Prakrits; western, eastern and southern Apabhramsa; and Sahiskriti. More particularly, we find sant bhasha, Marathi, Old Hindi, central and Lehndi Panjabi, Sgettland Persian. There are also many dialects deployed, such as Purbi Marwari, Bangru, Dakhni, Malwai, and Awadhi." Harjinder Singh, Sikhism. Guru Granth Sahib (GGS). "Guru Granth Sahib Ji also contains hymns which are written in a language known as Sahiskriti, as well as Sant Bhasha; it also contains many Persian and Sanskrit words throughout." - Shapiro, Michael (2002). Songs of the Saints from the Adi Granth. Journal Of The American Oriental Society. pp. 924, 925. - Parrinder, Geoffrey (1971). World Religions: From Ancient History to the Present. United States: Hamlyn. p. 256. ISBN 978-0-87196-129-7. - Torkel Brekke (2014), Religion, War, and Ethics: A Sourcebook of Textual Traditions (Editors: Gregory M. Reichberg and Henrik Syse), Cambridge University Press, ISBN 978-0521450386, pages 673, 675, 672-686 - Christopher Shackle and Arvind Mandair (2005), Teachings of the Sikh Gurus, Routledge, ISBN 978-0415266048, pages xxxiv-xli - William Owen Cole and Piara Singh Sambhi (1995), The Sikhs: Their Religious Beliefs and Practices, Sussex Academic Press, ISBN 978-1898723134, pages 40, 157 - William Owen Cole and Piara Singh Sambhi (1995), The Sikhs: Their Religious Beliefs and Practices, Sussex Academic Press, ISBN 978-1898723134, page 44 - Torkel Brekke (2014), Religion, War, and Ethics: A Sourcebook of Textual Traditions (Editors: Gregory M. Reichberg and Henrik Syse), Cambridge University Press, ISBN 978-0521450386, page 675 - Singh, Khushwant (1991). A history of the Sikhs: Vol. 1. 1469-1839. Oxford University Press. p. 34. Retrieved 18 December 2011. - Singh, Khushwant (1991). A history of the Sikhs: Vol. 1. 1469-1839. Oxford University Press. pp. 54–56,294–295. Retrieved 18 December 2011. - Trumpp, Ernest (2004) . The Ādi Granth or the Holy Scriptures of the Sikhs. India: Munshiram Manoharlal Publishers. p. 1xxxi. ISBN 978-81-215-0244-3. - Singh, Khushwant (1991). A history of the Sikhs: Vol. 1. 1469-1839. Oxford University Press. pp. 54–55,90,148,294–296. Retrieved 18 December 2011. - William Owen Cole and Piara Singh Sambhi (1995), The Sikhs: Their Religious Beliefs and Practices, Sussex Academic Press, ISBN 978-1898723134, pages 45-46 - McLeod, W. H. (1990-10-15). Textual sources for the study of Sikhism. University of Chicago Press. ISBN 9780226560854. Retrieved 11 June 2010. - Singh, Gurbachan; Sondeep Shankar (1998). The Sikhs : Faith, Philosophy and Folks. Roli & Janssen. p. 55. ISBN 81-7436-037-9. - Hoiberg, Dale; Indu Ramchandani (2000). Students' Britannica India. Popular Prakashan. p. 207. ISBN 0-85229-760-2. - Gupta, Hari Ram (2000). History of the Sikhs Vol. 1; The Sikh Gurus, 1469-1708. Munshiram Manoharlal Publishers (P) Ltd. p. 114. ISBN 81-215-0276-4. - Mann, Gurinder Singh (2001). The making of Sikh Scripture. Oxford University Press. p. 5. ISBN 0-19-513024-3. - Brown, Kerry (1999). Sikh Art and Literature. Routledge. p. 200. ISBN 0-415-20288-4. - Giriraj, Ruhel (2003). Glory Of Indian Culture. Diamond Pocket Books (P) Ltd. p. 96. ISBN 9788171825929. - The Concise Garland Encyclopedia of World Music, Volume 2. Routledge. 2013. p. 935. ISBN 9781136096020. |last1=in Authors list (help) - Amrita, Priyamvada (2007). Encyclopaedia of Indian music. p. 252. ISBN 9788126131143. - Singh, Khushwant (1991). A History of the Sikhs, Volume 1. The Oxford University Press. p. 307. ISBN 0-19-562643-5. - Bains, K.S. "A tribute to Bal Guru". The Tribune. - Nikky-Guninder Kaur Singh (22 February 2011). Sikhism: An Introduction. I.B.Tauris. pp. 128–. ISBN 978-0-85773-549-2. - John Stratton Hawley (1993). Studying the Sikhs: Issues for North America. SUNY Press. pp. 164–. ISBN 978-0-7914-1425-5. - Lynne Long (2005). Translation and Religion. Multilingual Matters. pp. 50–51. ISBN 978-1-84769-550-5. - Fowler, Jeaneane (1997). World Religions:An Introduction for Students. Sussex Academic Press. pp. 354–357. ISBN 1-898723-48-6. - Jolly, Asit (2004-04-03). "Sikh holy book flown to Canada". BBC News. Retrieved 2010-01-05. - Eleanor Nesbitt, "Sikhism: a very short introduction", ISBN 0-19-280601-7, Oxford University Press, pp. 40-41 |Wikiquote has quotations related to: Guru Granth Sahib| |Wikisource has original text related to this article:|
<urn:uuid:2b0fb7ae-4bd1-4022-9307-277a44edf9ae>
CC-MAIN-2017-04
https://en.wikipedia.org/wiki/Guru_Granth_Sahib
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00398-ip-10-171-10-70.ec2.internal.warc.gz
en
0.8867
5,377
2.640625
3
1 Answer | Add Yours Well, I have to say that I don't think the original copyright date indicating the year of publication of this book doesn't have any direct correlation with the comments that Mildred's friends make after hearing the poem that Montag reads to them, as I think that the poem relates to all people of all times and contexts. However, if you want a specific relation to the year of 1953, consider what the USA and the world had recently emerged from in the form of World War II. It is hard to overestimate the importance of this event. Even though the USA was only involved in this war in the later years, vast numbers of soldiers were killed and died fighting in this war, and the social, economic and psychological impact of this vital historical event, much like aftershocks of an earthquake, continued to be felt for many years afterwards. Now, let us relate this scenario to the final lines of the poem, "Dover Beach," by Matthew Arnold: And we are here as on a darkling plain Swept with confused alarms of struggle and flight, Where ignorant armies clash by night. This is an excellent choice of poem by Bradbury because it exposes the real state of humanity, and also would have echoed the experience of war for so many people who either were involved first hand or were sat at home dreading the arrival of a telegram that would announce the death of a son. We’ve answered 319,186 questions. We can answer yours, too.Ask a question
<urn:uuid:6b4ab6e6-f694-47c0-9ab8-7c0532955e30>
CC-MAIN-2017-04
https://www.enotes.com/homework-help/when-montag-reads-poem-mildreds-friends-how-does-273948
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00237-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98014
313
2.515625
3
Law enforcement (21 - 30 of 66 items) Federal Law Enforcement Retirement: Information on Enhanced Retirement Benefits for Law Enforcement Personnel GAO-09-727: Published: Jul 30, 2009. Publicly Released: Jul 30, 2009. Combating Gangs: Better Coordination and Performance Measurement Would Help Clarify Roles of Federal Agencies and Strengthen Assessment of Efforts GAO-09-708: Published: Jul 24, 2009. Publicly Released: Jul 24, 2009. Intellectual Property: Leadership and Accountability Needed to Strengthen Federal Protection and Enforcement GAO-08-921T: Published: Jun 17, 2008. Publicly Released: Jun 17, 2008. Inspectors General: Opportunities to Enhance Independence and Accountability GAO-07-1089T: Published: Jul 11, 2007. Publicly Released: Jul 11, 2007. FBI Transformation: Data Inconclusive on Effects of Shift to Counterterrorism-Related Priorities on Traditional Crime Enforcement GAO-04-1036: Published: Aug 31, 2004. Publicly Released: Aug 31, 2004. Law Enforcement: Better Performance Measures Needed to Assess Results of Justice's Office of Science and Technology GAO-04-198: Published: Nov 14, 2003. Publicly Released: Dec 9, 2003. Federal Law Enforcement: Selected Issues in Human Capital Management GAO-03-1034T: Published: Jul 23, 2003. Publicly Released: Jul 23, 2003. Appointment and Qualifications of U.S. Marshals GAO-03-499R: Published: Apr 2, 2003. Publicly Released: Apr 2, 2003. GAO's Work at the FBI: Access to Data, Documents, and Personnel GAO-01-888T: Published: Jun 20, 2001. Publicly Released: Jun 20, 2001. D.C. Criminal Justice System: Better Coordination Needed Among Participating Agencies GAO-01-708T: Published: May 11, 2001. Publicly Released: May 11, 2001.
<urn:uuid:9d36dd9f-3c23-436d-ada9-949997d35b09>
CC-MAIN-2017-04
http://www.gao.gov/browse/topic/Justice_and_Law_Enforcement/Federal_agencies/Law_enforcement/?rows=10&o=&now_sort=issue_date_dt+desc&o=20
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00026-ip-10-171-10-70.ec2.internal.warc.gz
en
0.796584
441
1.507813
2
If we travel back just a couple of decades ago, we would find that parents used to have a lot fewer modern conveniences to help us in the day to day. Nowadays, however, parents have a lot more tools in their arsenal that were likely not available a few decades ago. We have swings, several variations of bouncing and vibrating chairs, automatic sterilizers, moving rock and plays, and the list goes on. I know some of us would gladly declare we may not have survived those first months without our favorite baby gadgets, but what are possible drawbacks of relying too much on technology? At a recent trade show, I had the opportunity to view one of the newest tools to help parents, called the “SNOO,” created by Dr. Harvey Karp, which costs $1200. You can see it in action here. The SNOO is a rocking bassinet that adjusts its speed and white noise level, based on your baby’s crying. As a mom who has been through countless sleepless nights, and has helped sleep-deprived parents everywhere, I was able to see the benefit for those desperate moments when you don’t have someone to help, and are in desperate need of some rest, or just a shower 🙂 But, it also got me thinking about how much parenting has changed, and whether we are moving in a direction where parenting is getting progressively more automated. Now, Dr. Karp makes a very valid point, that another noteworthy change that parents of today have compared to parents from just a few decades ago, is less help (that’s why we are here as an extension of your village!). Parents today are able to count on less and less help from family and their community, as more and more of us live far away from family members, and those who live close have their own work and parenting responsibilities. Unfortunately, we no longer have aunts and grandmas who can hold and rock the baby for a couple of hours while you eat some lunch or just sleep, and if we are lucky enough to have some family help, it is typically only a week or two after baby is born. This is where a SNOO would be a big help. Another instance where a SNOO would be a welcome helping hand is for parents of twins, or multiples, where they have double or triple the work! The SNOO would keep one baby content while you change their twin’s diaper or give them a feeding. High needs babies, who need constant soothing and holding, would ideally have 2 parents at home to care for them, but that is not always possible. The SNOO could be a great help there, too. With these scenarios in mind, a SNOO becomes a welcome addition to any household with a small baby. But, after seeing it in action in the video and having some time to weigh the pros and cons, I also have some concerns. The first is that the bassinet is flat, and as of right now, there is no option to incline the sleep surface. Given that so many newborn babies experience reflux and benefit tremendously from sleeping on an incline, the SNOO may not be very useful for these babies. In addition, since moms don’t know whether their baby will have reflux or not, this would be enough to discourage me from buying it in advance, especially with the price tag. Another very important concern is that if a newborn baby is soothed back to sleep too quickly, they may miss important feedings, and this may negatively impact their growth (and mom’s milk supply if breastfeeding). If a baby cries in the SNOO, it will attempt to soothe the baby back to sleep or calm for 3 minutes. After these 3 minutes are up, the SNOO will stop and send a message to the parent’s phone to come check on the baby. This is an important feature, but it may not be enough to resolve the feeding concerns, because a common pattern for babies is to cry, then calm or go back to sleep when soothed, then cry again 10 minutes later, fall back asleep when soothed, cry again 10 minutes later, and repeat. In my opinion, the SNOO would need to alert parents if this situation happened, because in my experience, this typically indicates hunger. Even though the baby may go back to sleep quickly, if she wakes frequently every 10 minutes or so, she more than likely needs a feeding. A final consideration is whether parents should use the SNOO as soon as a baby is born, or whether they would opt to use only if they experience severe sleep problems that are not resolved by the traditional 5 S’s for which Dr. Karp is known? For more adaptable babies who may need less soothing and could potentially have more sleep independence, is it possible the SNOO might even get in the way of that independence and cause more sleep problems down the road? All in all, it looks like the SNOO would be another good tool in a parent’s toolbox, which does not mean you have to use it non-stop. Just like many things, moderation is key as we don’t want to replace human touch with a machine. As many of us know, sometimes those early months can be tough and all of us need to take breather, take a shower, or have a snack 🙂 But I do hope the creators of SNOO evaluate the possibility of missed or delayed feedings, and the needs of babies with reflux, as those would be enough to give me pause if I was considering getting my own SNOO.
<urn:uuid:d05dded3-3cb4-4ac5-8b35-c0ef9f34e215>
CC-MAIN-2017-04
http://www.babysleepsite.com/baby-sleep-products-2/snoo-make-babies-sleep-parenting-too-automated/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00008-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970818
1,151
1.757813
2
A memory card is a type of electronic data storage device that stores digital information. A memory card, on the other hand, is required to save video files in digital cameras, mobile phones, and personal computers. Memory cards come in a variety of sizes and classifications, and they’re utilized in a variety of devices. At the same time, the memory card is divided into different pieces and given different names based on its capacity and capabilities. Data is sent by forming links with other devices, in addition to storing data on a memory card. Memory cards come in a variety of shapes and sizes. SD Cards (Secure Digital Cards) were created by memory card companies such as Panasonic, SanDisk, and Toshiba. An SD card is about the size of a postage stamp. Typically, an SD card is used to transfer data between devices such as a digital camera, phone, or tablet. Compact Flash Card (CF Card): A CF Card is a type of flash memory card. The SanDisk business produced it in 1994. It is built into laptops, digital cameras, and desktop computers at a substantially cheaper cost. The CF Card is larger than a standard SD card. It’s also extensively utilized in SLR digital cameras due to its low cost. That is why major camera manufacturers like Canon, LG, Nikon, Kodak, and Panasonic incorporate compact flash in their products. XD Card (Extreme Digital): FujiFilm and Olympus produce their own memory cards to keep their photographs. XD-Picture cards are another name for this sort of memory card. Mini SD Card: The official name of this card is Mini Secure Digital Memory Card, and it was created by Panasonic or SanDisk. Mini SD cards are smaller than standard SD cards. Because a micro SD card is significantly smaller than a conventional SD card. Etc. Before you buy a memory card, you need to learn a little bit about it. as an example; - Durability: Find out how long your memory card will last, regardless of the type of memory card you purchase. - Utility: Regardless of the sort of memory card you choose, you should aim to purchase it based on its utility. - Storage: You should try to buy a memory card by checking its storage before you buy it. - Phone speed: You will try to select a memory card based on the speed of your phone. As a result, the memory card will give you more storage space on your phone. A memory card is a vital piece of equipment that we all utilize. This card contains a lot of crucial information about us. If any data on the memory card is lost or destroyed for whatever reason, you will have a lot of troubles. You can simply restore data from a memory card that has been lost. Memory card recovery software can help you recover data from your memory card. The steps to retrieve data that has been deleted are outlined below. - To begin, obtain the necessary data recovery program. It’s a highly effective data recovery program. - Install the data recovery software when it has been downloaded. We can restore or recover deleted images, call records, music, video, and files, among other things, using this software. - Connect the memory card / pen drive to the computer or laptop where your data has been erased. - Once the Care Data Recovery software is installed, open the software. Then activate the software with the key or registration number in the file. - Select the Deep Scan Recovery / Format Recovery option when the software has been activated. - Click the Recover button after selecting the memory card or pen drive. - Then take a break. - It will immediately send you to another page after scanning or recovery, where you may select the Show Files option. - Now locate the Raw Files folder and check the box next to it, then click Save Files at the bottom. - Choose your computer’s or laptop’s hard drive. - Now wait a while for the wiped data to appear on your computer or laptop’s hard drive. Finally, if the memory card is broken for whatever reason, there is no need to be concerned. We can simply restore data that has been lost.
<urn:uuid:0047fd1f-e268-4f5f-a8b3-98ebad922077>
CC-MAIN-2022-33
https://localreputation.us/what-is-the-best-way-to-restore-data-from-a-memory-card/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00278.warc.gz
en
0.940061
864
3.3125
3
If you have been trying to find e-learning methods and best practices, you’ll have heard of B-learning are often defined because the combination of traditional learning methods with modern methods. Let’s dive into the definition and meaning of blended learning. we’ll also explore blended learning models, techniques, and the way to use them to your organization. What Is Blended Learning? B-learning may be a sort of training during which employees can learn through electronic and online means, also as in traditional face-to-face training Blended learning is additionally referred to as hybrid learning, web-enhanced instruction, and blending instruction. It are often administered during a school classroom and in professional settings. Benefits Of Blended Learning Multiple studies have shown that B-learning are often an efficient training approach for workers . Plus, it’s its benefits for the trainer too: Better preparation and feedback. As employees complete tasks independently, they start their mutual classes with an equivalent level of data . This encourages valuable discussion and actionable feedback. More flexibility. Each employee has their own learning style. If they will set their own pace, it makes it easier for them to accumulate information. they need longer to know difficult subjects, for instance . Benefits For Instructors Appropriate for giant groups. you’ll reach an outsized audience in no time. Best review. you’ll see employees who are having difficulty with the course material. you’ll assist them with extra explanations or with homework. Both sorts of students are satisfied. Tech geeks and non-tech geeks. Reduce costs. Like travel expenses, rental of location, etc. Blended Learning vs. Flipped Classroom The terms blended learning and flipped classroom are often used interchangeably. But they’re not an equivalent B-learning is that the umbrella term for all training methods that combine online and offline training activities. The flipped classroom may be a specific sort of B-learning . the trainer asks students to look at short e-learning modules reception on their own schedule to organize them for his or her in-person classroom training. This enables students to use online modules to find out fundamental concepts and lessons in order that they will attend in-person sessions with specific questions. For B-learning generally , e-learning modules are often wont to prepare or to process training. These examples will clarify it further: Example Of Blended Learning A sales representative is learning English as a second language in order that the organization can expand its sales activities round the world. During face-to-face training, you receive explanations of specific grammar rules. Next, you’ve got to finish online assignments to review concepts that were taught within the training. Blended learning models Multiple blended learning models are developed to supply different possibilities to organizations [ 3 ]. Here are some examples: In this model, students must prepare activities on their own to organize for face-to-face training . Some examples include online courses and assignments that students need to complete before or after in-person training. The flipped classroom is according to this B-learning model. In this model, students rotate through different learnings activities. Students can either attend classes with a teacher , add groups, or work on their computers. They rotate between these stations throughout the day. Rotating activities make learning more fun and interesting for the people involved. But it also requires them to participate within the learning process at an equivalent time. In this method, participants work on their computers while supervised by the trainer. It works well when there’s a computer lab within the office. it’s also an honest option if the corporate prefers to watch its employees during training. Blended Learnings And Straightforward LMS Do you want to require your organization’s training into the 21st century? If your organization already uses traditional training techniques and methods, you’ll consider switching to a blended learnings model. Yes, you’ll have the simplest of both worlds! Easy LMS gives you the technology you would like to form the transition. don’t be concerned , it’s very easy to use! Create fun and interesting courses and quizzes which will be used with all B-learning models. Still not sure? examine the benefits and drawbacks of blended learning . A standard answer that folks will offer you once you ask them how they’re is “busy.” Combination training are often an honest solution for people that are always during a hurry. they will learn a part of the training on their own schedule and therefore the rest during face-to-face training. it’s even possible to observe a category on your computer while eating dinner! that’s not something which will happen during a traditional classroom. Motivation are often a drag during this scenario. Students are often more motivated if web-based learnings is combined with face-to-face meetings with other participants or with the trainer .
<urn:uuid:5e48b539-2e12-4f0f-8b6f-ac0be518a81b>
CC-MAIN-2022-33
http://stylerbergrecords.com/index.php/2021/12/06/what-is-blended-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00676.warc.gz
en
0.960177
1,057
3.515625
4
Read Isaiah 64 Highlights In Today's Reading: In these final chapters are prayers for mercy and forgiveness from a God who is silent (chap. 64). Those pleading confess their sin and praise His deeds (64:4-7). God will spare His true servants (65:1-10). The rebirth of His nation and His promise (66:7-9,22). Northern Israel's 13-year collapse (II Kin. 15:29; 17:6) had be gun. Now, eight years after the fall, the small kingdom of Judah was being brought very low (Is. 36:1) because there is none that calleth upon Thy Name, that stirreth up himself to take hold of Thee: for Thou hast hid Thy face from us . . . because of our iniquities (64:7). The majority of the people had abandoned the Lord and had turned to the false gods of neighboring countries. These mountains of evil from within, and the resulting mountains of opposition from without, compelled Isaiah to plead: Since the beginning of the world men have not heard, nor perceived by the ear, neither hath the eye seen, O God, beside Thee, what He hath prepared for him that waiteth for Him (64:1-4). Like Isaiah, we too must cry out in prayer, confessing the sins of our nation — that the mountains (of evil opposition to the Lord) might flow down at Thy presence in answer to prayer (64:1). Only a small minority was loyal to the Lord. In Judah, the Word of God had been ignored: I have spread out My hands all the day unto a rebellious people, which walketh in a way that was not good, after their own thoughts (65:2). It may even seem that our relationship with the Lord is hindered by what appear to be insurmountable problems — as though they were mountains that seem to rob our lives of spiritual power. But we need not fear. The Lord would have us recognize how He, the Mighty God of the universe, will protect, provide, and guide all who discipline themselves to be that minority while continuing to pray as Isaiah did. Every “mountain” can be overcome without exception because greater is He that is in you, than he that is in the world (I John 4:4). Paul quoted Isaiah 64:4 to the Corinthian church: Eye hath not seen, nor ear heard, neither have entered into the heart of man, the things which God hath prepared for them that love Him (I Cor. 2:9). Thought for Today: The Lord is nigh unto all them that call upon Him, to all that call upon Him in truth (Ps. 145:18). As the Creator of new heavens and a new earth (Is. 65:17; 66:22; compare John 1:1-3; II Pet. 3:13). As the One whose glory will be declared among the nations (Is. 66:18-19; Rev. 5:12-13). 64:3 terrible = awesome, revered greatly, greatly to be feared; 64:11 are laid waste = have been destroyed; 65:14 howl for vexation of spirit = cry out in misery; 66:6 voice = sound. Pray for English International Shortwave Broadcast in memory of Rev. Leonard P. Miller • Staff: Karen Hawkins • Government Officials: Rep. Lincoln Diaz-Balart (FL) and Rep. Peter Visclosky (IN) • Country: Algeria (31.5 million) in North Africa • Major languages: Arabic and French • Opposition to the Gospel is intense • 96.7% Muslim; 3% non-Religious; .29% Christian; .01% Baha'i • Prayer Suggestion: Pray and fast as you confess your sins and intercede for our nation (Neh. 1:4-6). Optional Reading: 1 Peter 3 Memory Verse for the Week: Matthew 10:28
<urn:uuid:5b40a045-0b1a-48bc-bc37-cde1434d08a5>
CC-MAIN-2017-04
http://www.crosswalk.com/devotionals/biblepathways/bible-pathways-aug-13-2009-11606694.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00350-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936668
836
2.1875
2
8a. Ligusticum sinense var. sinense 藁本(原变种) gao ben (yuan bian zhong) Ligusticum harrysmithii M. Hiroe; L. markgrafianum Fedde ex H. Wolff; L. pilgerianum Fedde ex H. Wolff; L. silvaticum H. Wolff. Plants freely flowering and setting seed. Rootstock slightly swollen at nodes. Leaves ternate to 3-pinnate; ultimate segments irregularly serrate. Dorsal and intermediate fruit ribs prominent, filiform, lateral ribs narrowly winged. Forests, grassy slopes, streamsides, also cultivated; 500–2700 m. S part of Huang He basin. Neither Ligusticum markgrafianum, described from Hubei (A. Henry 4954, isotype, E) nor L. pilgerianum Fedde ex H. Wolff (Repert. Spec. Nov Regni Veg. 27: 322. 1930, not H. Wolff, loc. cit. 307. 1930; L. harrysmithii), described from Gansu (J. F. Rock 14590, syntype) and Shanxi (H. Smith 7112, syntype) can be separated from L. sinense var. sinense, so we here treat them in synonymy. This is an important plant of traditional Chinese medicine, in which the roots and rootstock are used in “gao ben” (see also Ligusticum jeholense: “liao gao ben”), a common herb used as an analgesic and anti-inflammatory, in the treatment of heart diseases and asthma. The seedlings are also eaten as a vegetable.
<urn:uuid:3c7cdac2-2efd-4f77-b6bb-89a3a06e836d>
CC-MAIN-2017-04
http://www.efloras.org/florataxon.aspx?flora_id=2&taxon_id=242444034
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00295-ip-10-171-10-70.ec2.internal.warc.gz
en
0.775338
388
1.914063
2
Installing the wiring for a hot tub requires a solid understanding of the National Electrical Code (NEC) requirements as well as the requirements of the local Authority Having Jurisdiction (AHJ), your local building codes department. The NEC sets minimum standards for electrical work. The AHJ may have requirements that go beyond those of the NEC, so inquire about any such requirements when you apply for the wiring permit. An example is that the NEC permits the use of direct burial cable when wiring a hot tub, but many local codes require that the wiring be in electrical conduit. - Skill level: Other People Are Reading Things you need - Wiring permit - Wooden layout stakes - Hand sledge hammer - Mason's cord - Trenching shovel - Post hole auger - Post, 4-inch by 4-inch x 72-inch - Rediform tube, 8-inch x 18-inch - Quickete post-setting cement - Drill-driver, 3/8-inch - High-speed drill bits - Hole saw attachments - Schedule 40 PVC electrical conduit, 1-inch diameter - PVC couplings, 1-inch diameter - 2 factory PVC 90s, 1-inch diameter - 2 PVC LB Condulet fittings, 1-inch - 2 PVC hub with locknuts, 1-inch - PVC cutter - PVC primer - PVC cement - Seal-Tight flexible conduit, 1-inch - 2 Seal-Tight connectors, 1-inch - 50-ampere GFCI breaker box - 50-ampere, 240-volt, 2-pole circuit breaker - Wire pulling tape - #8 AWG solid copper TWW red building wire - #8 AWG solid copper TWW black building wire - #8 AWG solid copper TWW white building wire - #8 AWG solid copper TWW green building wire - Diagonal pliers - Wire strippers - Needle nose pliers - Lineman's pliers - Wire nuts - Black plastic electrical tape Lay out the route the conduit will follow from the house to the hot tub. Drive the stakes in the ground and link them together with Mason's cord. Pick an entry point on the side of the house as close as possible to the main service panel. Remove the sod along the route in 24-inch x 24-inch squares and set aside for replacing. Dig a trench 20 inches deep. The NEC requires that conduit be buried at least 18 inches. At the tub end of the trench, sink a post hole 24 inches deep at the bottom of the trench. Place the Rediform tube in the post hole and set the post inside the form. Brace the post to keep it vertical. Fill the Rediform tube with dry Quikete cement and add water. Quickete hardens in a very short time but allow eight hours for it to harden completely. Lay out the conduit, end to end, next to the trench. Join the sections with couplings. Cut the last section of conduit so that the factory 90 is against the post and against the side of the house. Prime the couplings and conduit, and then coat them with PVC cement. Allow an hour for the cement to harden completely. Using the hole saw attachment with the drill-driver, cut a hole through the side of the house where the conduit will enter. Measure the thickness of the wall and add 2 inches to determine the length of the conduit needed to connect the two Condulets. Attach the nipple to the back of the Condulet and slip it through the wall. Measure between the bottom of the second opening on the Condulet and the bottom of the opening on the factory 90. Cut a piece of conduit to this length and cement it between the factory 90 and the LB Condulet. Mount the GFCI breaker box on the post. The GFCI breaker box fulfils the NEC requirement that the hot tub be GFCI protected. It also fulfils the NEC requirement of a safety disconnect within view of the tub. Install the hub in the bottom knockout. Measure and cut a piece of conduit long enough to join the hub to the factory 90. In the basement, route the conduit to the service panel, and install in the side of the panel with the second hub. Install one of the 1-inch Seal Tight connectors in the GFCI breaker box and the other in the hot tub's system box, which is behind a removable panel on the hot tub. Run the wire pulling tape through the conduit from the Condulet on the outside of the house to the GFCI breaker box. Remove 8 inches of insulation from the ends of the wires and insert them through the eye on the wire pulling tape. Double one of them back and wrap it around all the other wires. Tape tightly in place. Stretch the other stripped wires out along the body of the wire pulling tape and tape in place. A helper is needed here to feed the wire into the conduit as you pull it through. Pull enough wire through to reach all the way to the service panel without having to splice it. Remove ¾ inches of insulation from the ends of the wires in the GFCI breaker box. Route the red and the black hot wires to the top of the box and connect them to the two brass screws on the breaker. Route the white wire up over the breaker and down to the neutral bar. The white pigtail from the breaker should already be connected to the neutral bar. Route the green grounding wire up over the breaker and down to the grounding bar. Assemble the Seal Tight flex and install the wires in it before installing the flex between the breaker box and the tub's system box. Remove ¾ inches of insulation from the ends of the wires. Connect the red, black, white and green wires to the appropriately marked terminals. Connect the red, black and white wires to the appropriately marked terminals on the output side of the GFCI breaker. Connect the green wire to the grounding bar. Turn off the main service disconnect and install the 50-amp, 240-volt, 2-pole breaker in the house service panel. Depending on the type of panel that you are working with, either snap the breaker into place or secure it to the Buss Bars by screws. Connect the red and black hot-wires to the breaker. Connect the white neutral and green grounding wire to the panel's neutral and grounding bars. With the new breaker in the off position, turn the main breaker back on. Do not replace the panel cover or install any of the other covers until after the work has been inspected by the AHJ. Call for the inspection. Once you have the green tag from the AHJ, close everything up. - 20 of the funniest online reviews ever - 14 Biggest lies people tell in online dating sites - Hilarious things Google thinks you're trying to search for
<urn:uuid:920af419-6280-466e-a75e-0af5834ee706>
CC-MAIN-2017-04
http://www.ehow.co.uk/how_6338703_wire-hot-tub-breaker.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00571-ip-10-171-10-70.ec2.internal.warc.gz
en
0.864858
1,439
1.765625
2
The suit, which Scott said will be filed in September, will seek injunctive relief from Georgia's use of water from the Chattahoochee and Flint River basins. "This lawsuit will be targeted toward one thing -- fighting for the future of Apalachicola. This is a bold, historic legal action for our state. But this is our only way forward after 20 years of failed negotiations with Georgia. We must fight for the people of this region. The economic future of Apalachicola Bay and Northwest Florida is at stake." According to a release from the Florida Department of Environmental Protection, the metro Atlanta area primarily gets its water from the Chattahoochee River with withdrawals totaling 360 million gallons per day. FDEP said that rate is expected to nearly double to 705 gallons by 2035. Monday, NOAA declared a fisheries disaster for Apalachicola Bay oysters, which traditionally supplies 90 percent of Florida's oysters and 10 percent of the U.S. harvest. The NOAA declaration cited lack of fresh water to the Bay as the primary cause for the poor oyster harvests, which have declined nearly 60 percent this year. Alabama and Florida have each previously challenged Georgia's use of water from Lake Lanier and the river basins unsuccessfully.
<urn:uuid:d1bee54d-a350-49fc-a29f-7c38da635c72>
CC-MAIN-2016-44
http://blog.al.com/gulf-coast/2013/08/florida_to_file_suit_over_geor.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720026.81/warc/CC-MAIN-20161020183840-00457-ip-10-171-6-4.ec2.internal.warc.gz
en
0.947779
261
2.1875
2
Adelaide agtech startup MEQ Probe has received $500,000 in funding from industry to run a commercial trial of its technology, which looks to measure the eating quality of meat. The funding has come from Availer, the agtech betaworks from which the startup was spun out, Meat & Livestock Australia, meat processor Teys Australia, and the Midfield Group. With MEQ Probe’s technology using nanoscale biophotonics to measure the marbling and tenderness of meat, a trial will run at two sites in southern Australia and feature 2,400 sheep and cattle across different breeds, production systems, and seasons. Jordy Kitschke, CEO of MEQ Probe, said the technology has the potential to make sure that a cut of meat lives up to a consumer’s expectations every time. “It’s great to have the backing of not only an industry body, but major players in the beef and sheep game. Having support from industry stakeholders who share our vision and want to move the industry forward is priceless for us, and we’re looking forward to continuing to work with our partners Teys Australia and Midfield Meat International on this project,” he said. “Our focus is on making sure our technology creates as much value as possible for the red meat industry, whilst making the probe simple to use and easy to adopt.” The current grading system for Meat Standards Australia (MSA) is based on almost 800,000 consumer taste tests by over 110,000 consumers across 11 countries, with MSA explaining it takes into account “all factors that affect eating quality from the paddock to plate”. Cattle meeting MSA requirements are graded at MSA-licensed abattoirs, with each carcase graded by an MSA-accredited grader, who assigns an eating quality grade for each individual cut. John Langbridge, manager of industry and corporate affairs at Teys Australia, said the company is proud to be involved in a project that “has the potential to create value throughout the whole meat industry”. “This is an exciting project for Teys. At the consumer end of the supply chain, we want to be able to better predict and optimise the consumer experience. At the producer end, we want to be able to provide producers with objective, transparent data so they can continue to produce the best beef possible,” he said. MEQ Probe is the latest startup out of Availer to announce an industry trial. Agtech-focused blockchain startup T-Provenance earlier this year received $500,000 in funding through Data61 and the CRCNA, the Cooperative Research Centre for developing Northern Australia, to run a pilot aimed at supporting mango producers. The startup will work with mango producers Growcom and Manbullo Limited to look at the applications of its technology to ensure food safety, quality, traceability, and authenticity throughout the supply chain. T-Provenance has developed Internet of Things-enabled sensors and chips to monitor things like temperature as the produce moves through the supply chain. Image: Jordy Kitschke. Source: Supplied.
<urn:uuid:6ad2c3cf-108a-4ffb-982f-e9147981f3b8>
CC-MAIN-2022-33
https://www.startupdaily.net/topic/adelaide-agtech-startup-meq-probe-raises-500000-to-grade-eating-quality-of-meat/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00472.warc.gz
en
0.947683
663
1.53125
2
Bigger Ohio Dove or Predator? Have had doves as pets before, and... in morning doves in the yard as 'wild animals'. Saw this bird today, clearly, just for a split-second after flying into a pine tree about 15 yards up and away then past me over the house. A small dog has always been a concern of mine in the country with coyotes, owls, etc. And I was wondering what type of bird this might be. It flew like a predator bird, not quite like a dove would, with more power, and distiction. But, it looked like a dove just 2-3x the size, and dirtier brown but still with a lighter maybe dirty beige color head. The tail was lighter in color also. The head and beak seemed dove-like, the beak was slightly curved but not overly, and like I said, it just seemed like a overly, overly big, possessed, dove, and it didn't quite seem like a hawk either. The body/feathers seemed sleek, like a doves. What could this bird be?
<urn:uuid:1aa78843-967e-4dd8-a525-cbbce02b4464>
CC-MAIN-2017-04
http://www.a-home-for-wild-birds.com/bigger-ohio-dove-or-predator.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00089-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977834
231
1.945313
2
By Jessica Stokes-Parish MACN Early last week, an opinion piece published in The Guardian came across my Twitter feed. It was titled “Diary of an intensive care nurse: are we concerned about coronavirus? The honest answer is not yet”. You can read it here. Now, to be honest, I was pretty miffed. I’m an intensive care nurse, amongst other things (researcher, educator, simulation enthusiast), and I felt misrepresented on a number of fronts. So much so, that I retweeted the journalist’s tweet with the following: As a nurse, I feel entirely misrepresented in this article. I am not concerned about my leave. I am concerned about:— Jessica StokesParish (@j_stokesparish) March 11, 2020 1) How will the vulnerable in our community survive this outbreak 2) How will our hospitals manage the surge of patients In short, I AM CONCERNED about #COVID19 https://t.co/THvWuTJ5qb Like many health care professionals, I have been following the COVID-19 situation quite closely. At first, with only a few thousand cases in China, I thought ‘no big deal’. But as the weeks turned to months, as the spread crossed borders and oceans, I began to appreciate that we might be heading for a pandemic. I began to appreciate that this new virus was approaching with voracity and speed, and we might just not be equipped to deal with it. Whilst we know that the majority of cases are mild, our vulnerable communities are significantly more at risk. Vulnerable, as a term, is broad – it speaks to those with autoimmune diseases, heart problems, lung problems, those 60+ years of age (which, by the way, is a significant portion of our nursing workforce – 14% according to the 2019 NMBA report) and chronic illnesses. According to the Australian Institute of Health and Welfare (AIHW), a staggering one in two Australians live with chronic illness. According to the data coming out of the World Health Organization (WHO), those with diabetes and heart disease have a higher crude fatality rate (CFR) than those that who do not (Diabetes 9.2% CFR vs 1.4% CFR) (WHO, 2020). Drilling down on this, 6% of Australian adults have diabetes – that’s 1.2 million people with a much higher risk of death or serious morbidity due to COVID-19 (AIHW, 2019). And what about the percentage of those over 60 years of age in our community? 15% of Australians were aged 65 or over in 2018, so we can expect that is a conservative estimate of our current population (AIHW, 2019). And for those 80 years of age and above, WHO reports a CFR of 21.9%. This data reinforces to me the severity of risk to the immunocompromised and older people of our community. And what about hospitals managing the surge? As we know, many hospitals in Australia began putting protocols and plans in place as early as January this year. Many nurses are involved in this practical phase of preparation – infection prevention service nurses have developed policy, supported education and assisted with epidemiological data. Management nurses are setting up contingency rotas for potential deployments, setting up stocktake plans to ensure staff have access to adequate personal protective equipment (PPE). On the floor, many nurses are brushing up on their donning and doffing, doing simulated drills and keeping up-to-date with the changes in operations. All of these steps are necessary to prepare for managing a surge of patients. But will it be enough? Our international counterparts are showing us that it’s not sufficient. China impressed with their ability to build fever hospitals within a number of days, Italy is forced to select best candidates. What will we do? Over the coming months we will see our profession tested. We will be sleep deprived, exhausted, stretched and upskilled beyond belief. We might lose a few of our own – there will be tears and anger, frustration and anxiety. In these moments, we must remember to give ourselves moments to debrief, reach out with a word of kindness and support our colleagues through it all. Be proud to be part of a profession that is versatile, skilled, intelligent and creative. You are part of a profession that is essential for our community, turning up even when defeated. This is your moment to be proud of nursing. About the author: Jessica Stokes-Parish MACN is a registered nurse, leading surgical outcomes improvement strategy in Newcastle, NSW. She is a practicing intensive care nurse, simulation enthusiast, researcher and educator.
<urn:uuid:d15ba3c3-0654-4b84-bc8d-3f80cc762b27>
CC-MAIN-2022-33
https://www.acn.edu.au/nurseclick/this-isnt-just-like-the-flu-why-im-concerned-about-covid-19
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00475.warc.gz
en
0.95408
987
1.5
2
Militant Attack and Support Zones in Afghanistan April-October 6, 2015 - credits ISW October 13, 2015: Strategy Page The sudden increase of Taliban activity in northern Afghanistan, especially the temporary seizure of Kunduz (a city of 145,000), is a new aspect of an old problem; Taliban efforts to make the north safer for smuggling heroin out of the country. Charging into Kunduz on September 28 th was unusual, because it was an expensive operation in that it gets a lot of Taliban fighters killed or captured and is soon undone once the security forces send enough reinforcements to the city. And that’s what happened. It got worse when several similar attacks failed to get into the city they were after. Such spectacular attacks are mainly for terrorizing the local population, especially politicians and business owners, into being more cooperative. The basic problem for the Taliban and the drug gangs they work for is that they don’t want to run the country but do need free access to keep the drug business going. This is especially true of the north, where the locals have always been more anti-drugs and hostile to the Talban. The northerners must be terrorized into subservience. With the foreign troops gone the drug gangs and the Taliban can operate with a lot more freedom (from interference and heavy losses from air strikes). You can see how the drug gangs are controlling all of this because the locations where the Taliban are most active are the ones most crucial to drug gang profits (which the Taliban share). Thus the smuggling routes to Central Asia, Pakistan and Iran are more frequently the scene of Taliban violence. The official Taliban line is that this is all for the purpose of putting the Taliban back in charge of the country. The reality is that most Taliban are content to make a good living off the heroin trade. That this cripples the economy and hurts the majority of Afghans does not bother members of the drug gangs or the Taliban. This is curse of Afghanistan, where the country has long suffered from a lack of cooperation and efforts to curb the ancient chaos. This is particularly the case in the north, where local warlords (often politicians) is strong and while these guys tend to be anti-drug and anti-Taliban they are definitely not anti-making-money. The impact on Afghanistan can be seen by the fact that unemployment has risen (over a third of Afghans are unemployed) and the number fleeing the country is increasing. About 10,000 Afghans a day are applying for passports, the first step is leaving to legally (or illegally) reaching another country and a new home. Iran reports that about 2,000 Afghans a day illegally enter Iran, often on their way to a more distant country (usually in the West). All this is fine with the Taliban and drug gangs because most of the people leaving are very hostile to the Taliban and drug gangs. Normally the Taliban, or local drug gangs only have a lot of control in a few of the 373 districts (each province is composed of districts) in Afghanistan. The Taliban are active in 10-15 percent of districts, mainly in the south (Helmand and Kandahar, where most of the heroin is produced) and the east (where many Pakistan/ISI supported Islamic terrorist groups operate) and increasingly in the north. The north is always a problem because the drug gangs have to deal with the security forces, local warlords and a strong tradition of local defense militias (except in the cities). Eastern Afghanistan is also the main transit route for drug exports and those drugs (heroin, opium and a few others) generates the cash that keeps the Taliban a major problem. There is also significant Taliban activity in the north, where another major drug smuggling route goes through Central Asia. But the main route is in the east, which goes to the Pakistani port of Karachi and thence the world. Populous or heavily trafficked districts usually have enough police, soldiers or pro-government militias nearby to keep the Taliban out of the towns that serve as district capitals. But in remote, thinly populated districts it is different and a Taliban force can sneak in and take over for a while, grabbing some media attention along the way. The Taliban have other problems and have formed special units to search for and destroy ISIL (Islamic State in Iraq and the Levant) groups operating in eastern Afghanistan. Taliban problems with former Taliban (including most of the non-Afghans, mainly from Central Asia and Chechnya) who have left to form local branches of ISIL have gotten worse over the last year. ISIL groups are using tactics aimed at making the Taliban look bad. For example the ISIL men do not terrorize local villagers and pay for any supplies or services they need. The ISIL men point out that the Taliban have become corrupted by working with drug gangs and are no better than bandits. This resonates with the Pushtun tribesmen but there is fear that ISIL will soon turn to enforcing strict lifestyle rules, something the Taliban have backed away from (because of sustained popular resistance). That has not happened yet and currently ISIL concentrates on staying alive in the face of Taliban and government attacks. The Taliban tries to keep this war with ISIL a secret but the news gets out (often via cell phone) and spreads. ISIL has openly declared war on the Taliban and gains some traction with accusations that the Taliban were created and still work for Pakistan. This is largely true, but the Taliban also work for local drug gangs. ISIL is aware of that but knows that the Pakistani connection is more of an issue to most Afghans. Yet the growing presence of ISIL in Afghanistan is also bad news to many Afghans because ISIL is basically Islamic terrorists who have become even more violent and uncompromising. The defections to ISIL began in late 2014 when a few Taliban leaders (especially field commanders who have armed followers and know how to fight) defected to ISIL and were soon at war with a Taliban they saw as sell-outs and reactionary Islamic radical pretenders. Some of these new ISIL groups appear to have modified their stance on the drug trade as even ISIL fanatics have operating expenses and in a few cases ISIL has replaced the Taliban as drug gang hired guns. ISIL leadership in Syria opposes this and has created a cash pipeline to provide money for operating expenses and make it unnecessary to have any friendly dealings with criminal gangs of any sort. The drug gangs aren’t taking sides in the Taliban/ISIL feud because for a drug lord it is all just business. Now ISIL is using more direct attacks on nearby Taliban factions in what appears to be a sustained effort to replace the Taliban. If the local ISIL can maintain other sources of income they could eventually become a threat to the drug gangs. The drug lords don’t believe it will ever come to that because ISIL in Syria is under growing attack and most governments (and many rival Islamic terror groups) are constantly attacking these ISIL cash pipelines and will eventually cut off the money supply. At that point the Afghan ISIL groups will be vulnerable to destruction or corruption. One thing warlords, the Taliban, drug gangs and ISIL can agree on is the need to halt the American UAV operations and air operations in general. Not only do these persistent UAVs and aircraft constantly search for, and often find, people they are looking for but often quickly fire very accurate and effective missiles. This has become a major problem for leaders of all these criminal or Islamic terror groups. Even if you manage to avoid the missiles you do so by severely restricting your movement, communications and other activities. Because the UAV operations are run solely by the Americans bribes don’t work. Worse, Afghan officials who are not on the payroll often provide the Americans with tips about where potential targets are. In response more cash and threats are used against vulnerable officials to obtain some public protests against the UAV operations. This does not impress locals, most of whom back the UAV operations, but the protests connect with some foreign media and politicians. Another problem the drug gangs currently have is a global heroin price war caused by too much heroin coming out of Afghanistan, Burma and other new sources. Heroin is a lucrative business and more people want market share. This means Afghan drug gangs have to produce and move more opium and heroin in return for less money. That is bad for business on many levels, especially on the retail end (where a lot more users overdose and that discourages potential new users). Afghanistan is still the major (over 80 percent of the market) producer but tribal rebels in northern Burma are expanding production and currently account for about ten percent of the global heroin supply. Other significant (and growing) producers are in in Pakistan, Colombia, Guatemala, and Mexico. While a few large gangs and warlords control the heroin business, there are other illegal enterprises available to local hustlers. One of the most popular of these is illegal mining. There are over 2,000 illegal mines operating throughout Afghanistan and these have grown so numerous that legal mining has declined. The major problem legal mining encounters is poor security and infrastructure which is sustained by lots of corruption. Small, private mines increased production, as did illegal mines. Since 2010 there have been efforts to get large-scale legal mining operations going. While there are believed to be over a trillion dollars of minerals underground, you need an honest and efficient government before foreign firms will invest tens of billions to set up the large mines and build roads and railroads to get the goodies out, and equipment in. These mines generate tremendous revenue for the government and lots of good jobs. That won't happen as long as the drug gangs dominate the south. This is actually old news, as there have been several surveys of the country since World War II and the mineral deposits were, at least among geologists, common knowledge. Some have tried to get large scale operations going and all, so far, have failed. But because of American encouragement in 2010 the Afghan government called for foreign firms to make offers. There was some interest but the mining companies soon encountered the same fate of past efforts (corruption and lack of infrastructure). Meanwhile the small scale mines continue with the expensive assistance of the criminal underground. Afghanistan accused Pakistan of helping plan and carry out the recent Taliban raid on Kunduz. The Pakistanis deny any involvement, but they always do and have a long and proven record of interfering in Afghan internal affairs. Afghanistan also believes that a lot of the recent Taliban violence in Afghanistan was made possible by the thousands of non-Pakistani Islamic terrorists fleeing North Waziristan and moving to Afghanistan. There, many of these foreign Islamic terrorists have joined the Afghan Taliban and provided an infusion of very dedicated and dangerous fighters. Afghan intelligence believes that the Afghan Taliban leadership is still operating from a sanctuary in southwest Pakistan, something Pakistan continues to deny despite lots of evidence showing senior Taliban are in the area (Baluchistan). Pakistan says it is trying to get the peace talks with the Afghan Taliban restarted but many Afghans believe it was the Pakistanis who caused the talks to collapse before they could get started. That’s because the main reason for the collapse of the peace talks back in July was the unexpected revelation that Afghan Taliban leader Mullah Omar had died in a Pakistani hospital in 2013. This revelation caused a split, still not healed, within the Afghan Taliban leadership. To most Afghans it is obvious Pakistan was behind all this. Currently the Afghan government is not willing to reconsider peace talks with the Afghan Taliban until Pakistan cuts its support of, and control over, Islamic terror groups (like the Taliban and Haqqani Network) operating in Afghanistan. October 12, 2015: South of Kabul some 2,000 Taliban, coming from several different directions, tried to rush in and seize control of Ghazni city, which is about the same size as Kunduz. This attack failed with none of the Taliban groups getting any closer than five kilometers from the city. Meanwhile troops and police are still fighting Taliban in some Kunduz neighborhoods. The Taliban went online and declared war on Tolo and 1TV, two of the major TV networks in Afghanistan because the two networks reported incidences of Taliban raping women when they briefly occupied Kunduz. October 11, 2015: In Kabul a Taliban suicide bomber tried to attack a British military convoy but failed. The bomber was killed and three civilians wounded. October 10, 2015: In the south (Kandahar) the security forces detected the Taliban assembling several hundred men in a rural area of Shurabak, near the Pakistan border. Air strikes were called in, followed by a ground operation. The operations found over a hundred Taliban dead and more than fifty wounded by the attack. October 7, 2015: In Kabul police arrested two Haqqani Network suicide bombers and prevented them from detonating the explosives in the car they were driving. Because of the complexity of the bomb it was decided to evacuate nearby buildings and detonated the car bomb where it was stopped. October 6, 2015: The commander of U.S. forces in Afghanistan ordered all troops under his command to be formally reminded of the ROE (Rules of Engagement). This is a reaction to an October 3rd incident in Kunduz where Afghan forces called in American air support against Taliban who were firing on them from a building in a hospital compound. An American AC-130 gunship responded. Despite the precision of the AC-130 fire the Taliban were operating in the midst of civilians (a favorite tactic to prevent air strikes) and 22 civilians died as well. This became a major news story and the result will be more strict application of the ROE and a lot less U.S. air support for Afghan troops and police. This makes the security forces less effective and the Taliban more so. This sort of thing is no accident. The Taliban and drug gangs have invested a lot in the local media, to make each civilian death, at the hands of foreign troops, a major story. The majority of civilian combat deaths are at the hands of the Taliban or drug gangs, and the local media plays those down (or else). It's a sweet deal for the bad guys, and a powerful battlefield tool. The civilians appreciate the attention, but the ROE doesn't reduce overall civilian deaths, because the longer the Taliban have control of civilians in a combat situations, the more they kill. The Taliban regularly use civilians as human shields, and kill those who refuse, or are suspected of disloyalty. In most parts of Afghanistan, civilians are eager to get the Taliban killed or driven away, as quickly as possible and by any means necessary. The number of civilian deaths, at the hands of NATO/Afghan forces, are spectacularly low by historical standards. The U.S. armed forces have reduced civilian casualties during combat by over 90 percent since the 1970s. This is the result of wider use of precision weapons, better communications and new tactics. The troops know this, some of the civilians know this, but the media doesn't care and the Taliban know that dead Afghan soldiers and police are not news but dead civilians are, especially if it is one of rare incidents where the Taliban was not responsible. In Kabul police arrested a Haqqani Network suicide bomber and disabled the explosives he was carrying. The man was attempting to attack a police station. The man later admitted that he had been trained across the border in Pakistan (Peshawar). October 5, 2015: Some 400 kilometers northwest of Kabul over 500 Taliban attempted to charge into the city of Maimana (the capital of Faryab province and about half the size of Kunduz). The attack was repulsed with at least 20 percent of the attackers killed or wounded. In the east (Khost) police arrested a Haqqani Network commander they had long been seeking. October 4, 2015: Security forces completed killing or driving out most of the Taliban in Kunduz. Between today and the original attack on September 28th over 300 Taliban were killed. In Kabul police detected and killed two suicide bombers before they could reach their target. September 30, 2015: Afghan security forces began moving into Kunduz to clear out Taliban raiders. September 28, 2015: Up north hundreds of Taliban gunmen used surprise and the darkness of night to seize control of Kunduz City. Taliban have been trying to do this since late April. Until now the Islamic terrorists had suffered thousands of casualties and were still stuck in the city outskirts. But this time they managed to move in several large groups of gunmen undetected by Afghan intelligence and pull off a surprise attack. This is part of a decade’s long effort to establish base areas outside the south. These efforts have not gone so well but the Taliban keep trying because control of border areas, and routes to them, in the north (to Central Asia) and east (to Pakistan, the port of Karachi and then the world) are essential for the drug gangs. Most drug sales are outside of Afghanistan and these smuggling routes are essential and must be safe enough to get most of the drugs out without being seized and destroyed. Bribes do most of the work with force being applied as needed. This explains the constant battles in northern and eastern Afghanistan. The fighting in the south is easier to understand because that is where the opium and heroin are produces. The problem in the north is that the Pushtun tribes up there are minorities, and are more concerned about angering non-Pushtun neighbors than in cooperating with Pushtun-run drug gangs from the south. As a result in the north more people are providing information on Taliban movements, and more Taliban are getting caught or killed up there. This time the Taliban presence for months had eliminated untrustworthy civilians and make this attack possible. Kunduz Province has always been the key to the northern smuggling route and Kunduz City (the provincial capital) is the key to controlling the province. Trying to seize control of Kunduz City is risky but a bold move nonetheless. Unfortunately the Taliban offensive came at the same time that a newly elected president came to power and proceeded to keep his campaign promises to dismiss corrupt and ineffective officials. That included a lot of senior people in the defense ministry and northerners blame the sloppy army performance in Kunduz on this housecleaning in the senior ranks of the army. Fortunately the non-Pushtun tribes that dominate the north have militias that were willing to defend Kunduz, as they had back in the late 1990s. Unfortunately pro-government militias are easier to bribe. Taking Kunduz is a big deal for the Taliban and a defeat up there hurts Taliban morale and income. This will make some of the true-believer Taliban consider switching to ISIL as it is clear to most Taliban that the Kunduz operation is mostly about the drugs, not establishing a religious dictatorship in Afghanistan. Hatred of the drug gangs and the Taliban is most intense in the north, where the non-Pushtun tribes (who are 60 percent of the Afghan population) are very hostile to any Pushtun “invasion”. The battle for Kunduz City is a test of whether drug gang money and hired guns (the Taliban) can overwhelm local hostility. Drug gang bribes have already bought temporary loyalty of many northerners, but can guns and money control the entire province? So far it’s a standoff with Taliban gunmen blocking most roads around the city while the government and local tribes send more reinforcements. ISIL is also active in Kunduz Province and apparently employed by at least one drug gang. So far several hundred thousand civilians have fled the area, fearing that the fighting will escalate before it is over. The danger to the civilians has encouraged the local tribal and warlord militias to go after the Taliban, who are seen as foreign invaders and deserving of no mercy. September 24, 2015: Pakistan says that Afghan Taliban are leaving Pakistan after receiving a warning. Afghanistan does not believe this.
<urn:uuid:8c56f34b-7396-4171-829e-c6d8001af407>
CC-MAIN-2022-33
http://rpdefense.over-blog.com/2015/10/afghanistan-the-kunduz-conundrum.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00474.warc.gz
en
0.964448
4,023
1.6875
2
By Mike Lynch To get closer to the moon I’m not asking you to crawl up on the highest building you can get to. Actually you can keep your feet firmly planted on the ground and let the old moon do all the work. This weekend is the closest full moon we’ve had in more than a year, and the closest one will have until 2014. Our lunar neighbor is just over 221,800 miles away and that’ll make for a super bright and big full moon. It’ll be 7 percent larger than an average full moon and about 14 percent brighter. The reason for this ultimate full moon is that the moon is in the right place at right time. Because the moon’s orbit around Earth is an ovalish ellipse, it orbits Earth every 27.3 days, and its distance from Earth varies by more than 30,000 miles. It can be as far away as 252,000 miles at what’s called apogee, and as close as 222,000 miles at a point called perigee. Saturday night the moon is almost at perigee. Look for it this coming week when it’s just coming up in the east around sunset, because the full moon always seems much larger when it’s rising than it does when it’s higher in the sky. This weekend that optical illusion will be even more extreme. You can prove that this is an optical illusion by a number of methods. Just take any pencil with an eraser and hold the eraser end of the pencil at arm’s length against the moon when it’s first on the rise. Make a mental note as to how much of the moon is covered up by the eraser. Then go out two to three hours later when the moon seems smaller and hold the pencil eraser at arm’s length once again and you’ll see without a doubt that the pencil eraser covers exactly the same amount of the moon’s disk. It all has to do with the your frame of reference. When the moon is low in the sky you’re framing it against trees, buildings, the ground or water surface, which makes it look bigger. This actually has an effect on other celestial objects like constellations that also appear larger near the horizon. Now if you can bend like a pretzel this effect goes away. This is no joke. If you can face away from the moon, bend over and look at the moon between your legs when it’s close to the horizon the “big moon” goes away. There is no doubt the moon has an effect on people. You’ve all heard about madness blamed on a full moon. I have to believe that that’s 80 percent to 90 percent myth, however there may be a few seeds of truth to it. For sure the full moon has a big effect on global tides as oceans are pulled on opposite sides of Earth by the sun and the full moon. That effect is amplified whenever the full moon is near perigee because the moon has a slightly more gravitational pull. Since most of our bodies are made of water maybe there’s a tiny tidal effect on us that effects some people more than others. While the full moon is closer than usual, take the opportunity for a closer look at it. I wouldn’t recommend using a powerful telescope unless you’re in the mood for a major headache. A smaller telescope or binoculars are just fine. The dark areas on the moon are the relatively flat lunar plains although they’re littered by craters, big and small. They originated because of massive volcanic flows that welled up from the active lunar core. Before the days of telescopes these “flatlands” were thought be bodies of water and that’s why they bear names like the Sea of Tranquility or the Ocean of Storms. The whiter areas are the lunar highlands and mountains. Mike Lynch is an astronomer and professional broadcast meteorologist for WCCO Radio in Minneapolis and is author of the book, “Washington Starwatch,” available at bookstores. Check his website, www.lynchandthestars.com. The Everett Astronomical Society: www.everettastro.org. Get ready for solar eclipse On May 20 there’s going to be a solar eclipse. To get a good view of it you can order a special, safe pair of solar classes that allow your to watch the eclipse without damaging your vision. You can also use them to watch the transit of Venus across the sun on June 5, something we’ll never see in our lifetimes again. Order by May 11 to get the glasses in time for these events. They’re only $2 a pair and available online at tropicalsails.com/Eclipse_Glasses.php.
<urn:uuid:e9bfd033-8458-44dd-a8f7-3af8a1754439>
CC-MAIN-2017-04
http://www.heraldnet.com/life/look-for-a-bigger-brighter-moon-tonight/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00499-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947954
1,022
2.5625
3
Back in the early ’90s, making a movie for $5000 was the stuff of legend. Nowadays, that number seems much more doable. My first movie The Great Intervention was shot and edited for just that. Here are a few ideas for your project, to help you keep your budget from breaking the bank. 1. Be realistic in the scriptwriting process. I won’t get in to how to come up with your story idea (I did that here) but when you write the actual script – KEEP YOUR SCENES AND LOCATIONS SIMPLE. Many people fall in to this trap: “The camera dollies back from the pitcher’s mound and pans up to reveal our heroes, sitting at Dodger Stadium, enjoying a few beers and watching the ball game.” Boom! You just blew your entire budget. WRITE SCENES WITH A MAXIMUM OF THREE OR FOUR PEOPLE. In a house or location you have access to FOR FREE. Do not pay for your locations. You simply can’t afford it. The above scene should be rewritten to “Medium shot of our heroes drinking a couple of beers in the park.” No dollies. No extras. Daylight. 2. Rent – don’t buy – your camera. Technology is changing rapidly. In fact, The Singularity is coming. But until that time, don’t spend your budget money on a fancy camera in the hopes of selling it afterwards. By the time you’re done, the camera will be worth half as much. Instead, rent a camera package from your local rental house (I think the new SLR digital still cameras are the bomb.) Or, find a cameraperson with equipment on Craigslist. Hell, maybe you should just shoot your first film on an iPhone like this one. 3. Pay your (small) crew. At your level, interns are unreliable. Friends can be enlisted of course, but you should have your cameraperson on the payroll. AND the sound guy – these positions are crucial. At least $100 a day, more if they bring their own equipment. Try to avoid getting into fancy lighting packages. It’s incredible what these new cameras can do with so little light – take advantage of it! 4. Have the actors supply most wardrobe and props. Actors have a TON of clothes. They LOVE to “get into” their character! Have them bring a bunch of wardrobe and select from that. 5. Speaking of actors, make sure you sign onto the SAG Ultra Low Budget Agreement, from the Screen Actors Guild. This allows you to use professional actors for $100 a day – a bargain that will make sure your film is actually good. 6. Get production insurance. This is tied in to item 5 and will be a small chunk of your budget. (You can’t hire SAG actors without the proper insurance coverage.) BUT this will perhaps give you access to locations you might need, as you can show them you are professional and they will not be liable if anything were to go wrong. 7. Avoid the financial trap of writing popular music into your film. The Rolling Stones are not going to allow you to use “Gimme Shelter,” period. Find local bands to do your music and/or a music student to do your score. Since I am a musician, I used my own music for my movie. If you have those skills, great – use them. If not, there are plenty of hungry musicians who will lend you their song, and many composers who will work for free or cheap to compose your movie. Look around at your local schools and music clubs. 8. Edit the film yourself. Ok, some of you are saying “but I’ve always heard it’s better if someone else cuts your movie!” Nonsense. First of all, you don’t have the budget to hire a professional editor. Second, editing software is cheaper and easier to use than ever. This is your first film! LEARN. Be sure to get feedback from others – and perhaps you may be able to find someone to give it a so-called “final tweak” inexpensively, but try and follow the script and assemble most of the film yourself. 9. Keep the hours short, the shooting days few, and the food delicious. By keeping locations and cast size realistic, you can do this. Plan for no more than 10 days. Try and make your days 8 hours – 10 maximum. Be professional and keep things running on time. And reward everyone with nice hot meals and delicious snacks. It’s amazing what M&Ms can do for morale. Well, there you have it. With good planning and discipline, you too can make a great movie, without going to the poorhouse. Want even more fun? Check out greatintervention.info – the meme related to the film! Steve Moramarco is a writer/actor/director/musician and now a filmmaker. He lives in Lincoln Heights, CA. Connect with Steve: On Twitter @moremarkable Photo from The Great Intervention LA screening Actor/Filmmaker/Musician Stephen Moramarco shares his tips on How To Make A Movie for $5000. Also, check out Steve’s prior Film Courage posts:
<urn:uuid:250521f0-fae7-4219-b2c7-5b45208499b9>
CC-MAIN-2022-33
https://filmcourage.com/2011/07/07/how-to-make-a-movie-on-5000-dollars/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00678.warc.gz
en
0.946583
1,126
1.515625
2
Writing program helps refugees reach American dream The Arizona Republic Jul. 25, 2006 Door by door, student by student, Americorps member Jennifer Smith rounds up teens living in a largely Liberian refugee apartment complex. Writing class is about to begin. "They give us the words and then we have to look at the words and make a sentence out of it," explains Samuel Williams, student. The "Write Away" program, Smith's creation, teaches creativity and self expression, familliarizing students with English. For the students here, it's a very foreign language. "Completely regardless of what their English proficiency is they all try. They're eager to learn and they have a great voice and a great story to tell," says Jennifer Smith, Americorps member and the program's "Growing up in America as a person from another country, I've got to learn how to do everything that's hard so I can make it in America," says Williams. By scribbling sentences, students break down barriers. For volunteers, no reward is better than being able to show others they can believe in themselves. Refugees happy, hungry to excel
<urn:uuid:18565435-540f-405b-9885-02cb5913b800>
CC-MAIN-2022-33
http://azbilingualed.org/News_2006/writing_program_helps_refugees_reach_American_dream.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00073.warc.gz
en
0.954858
262
1.960938
2
NetUSB hack puts Millions of home users at risk A vulnerability has been discovered in a software component called NetUSB, which comes pre-equipped on many modern home routers, such as Netgear, TP-Link and TrendNet. The vulnerability is only partially fixed since this February whilst being really simple to exploit. NetUSB is a technology developed by the Taiwanese company KCodes, allowing users to access their printers, flash drives and other USB devices connected to their router over the network, also called “USB over IP” functionality. Many home devices at risk The flaw was initially found on a TP-Link router, and it soon turned out many more brands are at risk because many devices use the NetUSB technology. Because NetUSB is often used as a licensed technology, it makes it harder to discover because each vendor uses different terminology when referring to the NetUSB feature. SEC Consult checked whether devices contain the NetUSB kernel driver and discovered that many devices, including recently released products, are at risk. “Because of insufficient input validation, an overly long computer name can be used to overflow the “computer name” kernel stack buffer”, according to SEC Consult. The resulting memory corruption can be exploited by an attacker to easily take over the router by installing malware, spy on its users or simply wipe it clean or make it crash. At the time of this article, it was not yet clear whether the flaw is exploitable remotely or only within the network. Some vendors already scheduled patches for their firmware (see full list) but others have yet to address the issue. KCodes was not available for comments and has not released an official statement (yet). How to protect yourself? If possible, completely disable the NetUSB service via the web interface of your router (unfortunately not supported by Netgear routers) and also block port 20005 on the router’s firewall. Check with your router’s manufacturer whether they are planning to schedule a patch for their device. Chinese hacker group APT use Microsoft's Technet web portal to obfuscate their CnC servers
<urn:uuid:1c36d764-fe00-4fbe-9d5d-70925d2fcb77>
CC-MAIN-2017-04
http://blog.emsisoft.com/2015/05/19/netusb-hack-puts-millions-of-home-users-at-risk/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00495-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951193
429
2.0625
2
The European Union is ready to provide Ukraine with expert and practical assistance in assessing the damage caused, in the process of post-war reconstruction and environmental restoration. This was discussed at an informal meeting of environmental protection ministers of the EU member states in Prague, reports Ministry of Environment. "Currently, my colleagues have a clear awareness that the military terror of the russian federation against our state is not just a picture on TV or posts on social networks. The world will feel the consequences long after the end of hostilities," said the head of the Ministry of Environment, Ruslan Strilets. He added that it is important for EU representatives to have a clear, understandable and detailed map of the impact of the war in Ukraine on the environment. "We already have a plan to restore our country and our environment. I received assurances of Ukraine's comprehensive support on this path," said Strelets. The minister assured that despite the war, Ukraine will not deviate from the European path. Ukraine has fulfilled the requirements for the implementation of the Association Agreement with the EU by 61% and plans to increase this indicator to 75% by 2025, even in war conditions. The reform of the sphere of environmental protection is also continuing in accordance with the Green Deal. In addition, Ukraine recently joined the LIFE environmental program, and the Ministry of the Environment is already preparing projects that were agreed with the European Commissioner for the Environment, Oceans and Fisheries Virginius Sinkavičius. Earlier EcoPolitic wrote, that Ukraine joined the environmental protection European LIFE programs, within which he will be able to receive financing for the environment. As EcoPolitic previously reported, the Cabinet of Ministers approved a plan of measures to fight against alien species and biothreats for 2022-2025.
<urn:uuid:c1a36212-6322-4f8d-9fc6-788d66980492>
CC-MAIN-2022-33
https://ecopolitic.com.ua/en/news/ies-pidtrimaie-ukrainu-u-povoiennomu-vidnovlenni-kraini-ta-prirodi-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00475.warc.gz
en
0.955518
361
1.9375
2
The top U.S. environmental official expressed uncertainty about whether the Obama administration and Volkswagen AG will meet an April 21 court deadline to come up with a plan to address excess emissions from 580,000 diesel vehicles sold in the country. EPA Administrator Gina McCarthy told reporters that the two sides were in “really robust” ongoing talks but said she did not know if they would agree to a deal by April 21. She declined to say if the administration would accept a partial fix of the polluting vehicles or if it would insist that Volkswagen offer to buy them all back. VW, Europe’s biggest automaker, faces its biggest crisis in recent memory after it acknowledged in September that it had rigged exhaust emission tests for up to 11 million vehicles worldwide. Last month, U.S. District Judge Charles Breyer gave VW and U.S. regulators until April 21 to offer a “concrete proposal” for addressing the polluting cars. Both sides must “resolve” what is to happen to the cars by that date, Breyer said. If no deal is reached by then, Breyer said he would consider holding a trial this summer. Volkswagen spokeswoman Jeannine Ginivan said the automaker was continuing to work with the EPA and California, declining to offer an opinion on whether they will reach a deal by April 21. The remedy could involve fixing the roughly 580,000 U.S. vehicles, or buybacks and other options, Breyer said. The U.S. Justice Department in February sued VW for up to $46 billion for violating federal environmental laws. The company and its Audi and Porsche brands remain barred from selling any new 2016 diesel models in the United States.
<urn:uuid:ee0798f0-81fe-4d7e-bf43-b999e436436e>
CC-MAIN-2017-04
http://www.carprousa.com/vw-agreement-may-miss-april-21-deadline
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00183-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969133
353
1.78125
2
Just because the Christmas light show in your neighborhood is over, doesn’t mean you can’t gaze on some awesome LED splendor in your very own home. In fact, if you know your way around a soldering iron and understand how to program in C, then you can make this sweet looking 8x8x8 Animated Cube for yourself for fun. Thanks to an Instructables contributor by the name of chr, we have directions and a parts list to construct this LED Cube that almost gives the illusion of a dancing 3D hologram. Now granted, you are going to be doing a lot of soldering considering the LED’s alone total 512. But for only $67 dollars in estimated materials, you can amaze your family and friends with your mad electronic building skills. Check out the video to see this fanciful LED Cube in action.
<urn:uuid:90a26540-a439-4dcc-9b7f-06022e42e14b>
CC-MAIN-2017-04
http://www.geek.com/geek-cetera/8x8x8-led-cube-is-candy-for-the-eyes-1304256/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00177-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930702
177
1.8125
2
I have reached to chapter 8 in the book with a few small questions I have. 1) the $_POST array- does it delete itself after the script on the page is executed? (I have been thinking that if i have 2 different forms in my site both share some fields in common and in one point I filled in one of the forms and after a of bit of browsing fill in the second form. will the second form processing script will use the first form input?) 2) I noticed as the book progresses the explanations are becoming less detailed (which is understandable on certain parts of the script that uses familiar code) and some of the code is left unexplained (or not explained enough). this includes the code header (‘content-type: image/jpeg) (what does it do? can I use the same concept for other file types?) and the imagecreatetruecolor() functions (the last two where explained about what they do but not how to use them or their arguments ) in chapter 7. also the join() function that is (used in chapter 8 page 224) is not explained. this function I actually searched and found in the php documentation and in this place: http://www.w3schools.com/php/func_string_join.asp and it seems you mixed between the two arguments of the function. 3) I saw many times in the book that when you make an insert query you place the query into a $result variable. I wanted to know if I have to that or I can just make the query $query = ‘INSERT INTO images (image_caption, image_username, image_data) VALUES (“yadi”, “yadi”, “yada”)’; // insted of $result = .. $result = mysql_query($query, $db) or die(mysql_error($db); // just simply . mysql_query($query, $db) or die(mysql_error($db); 4) I don't know if you will cover this later in the book (I am right now in chapter 8) but how do I deal with empty fields in the data base or a query that returns nothing?
<urn:uuid:d36f2b34-45cc-47bc-80e6-774ff5d843a3>
CC-MAIN-2017-04
http://p2p.wrox.com/book-beginning-php-6-apache-mysql-6-web-development-isbn-9780470391143/86611-few-questions.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00299-ip-10-171-10-70.ec2.internal.warc.gz
en
0.913354
478
2.796875
3
Cho SD, Herzig DO, Douthit MA, Deveney KE. Treatment Strategies and Outcomes for Rectal Villous Adenoma From a Single-Center Experience. Arch Surg. 2008;143(9):866-872. doi:10.1001/archsurg.143.9.866 Theodore X. O'Connell, MD, Los Angeles, California: This paper emphasizes the necessity of complete resection of villous adenomas of the rectum. Villous adenomas are considered premalignant and should be removed to prevent the development of invasive carcinoma. However, the second reason to remove them is that in spite of random biopsies of the lesions that are reportedly benign, the lesion may still harbor cancer. Random preoperative biopsies have a high degree of sampling errors, and complete excision is the only accurate diagnostic and adequate therapeutic approach to villous adenomas of the rectum. Villous adenomas are usually sessile and are not easily removed by endoscopic snare polypectomy. Therefore, the complete resection of a villous adenoma often requires a complete operative colonic resection and/or excision. Villous adenomas are most often found in the right colon and the rectum. Obviously, in the right colon and cecum a formal colectomy is done. However, in the rectum, except for high rectal lesions, an effort should be made to remove these transanally to prevent the morbidity of the abdominal operation and loss of sphincter control and to maintain proper bowel movements. While this paper emphasizes all these points quite well, I have several questions for the authors. Extent of resection. In the paper it is stressed, rightly so, that villous adenoma is a benign though premalignant lesion and that simple excision is adequate therapy even when they harbor a superficial cancer; therefore, preservation of the sphincter is of paramount importance; however, in your original manuscript, 7 of the 36 patients, approximately 20%, had abdominal perineal resection. In the revised manuscript it states that 25% of the patients had transabdominal proctectomy. How many of these were LAR [low anterior resection] vs APR [abdominoperineal resection]? If the patients had APR what is the explanation for this? Were some of these cases in which the villous adenoma's distal edge was at or just above the dentate line but its proximal extent was high, eg, 10 cm or above, so that the entire lesion could not be removed completely by transabdominal approach or by a low anterior resection? In this circumstance, I have combined the procedures doing TAE for the lower portion and LAR for the upper portion with reanastomosis to the mucosally resected distal rectum. Have you ever used this approach? Transabdominal vs TAE. It was proven quite well that transabdominal resection has a significantly higher complication rate than TAE, but isn't this an apples and oranges comparison? Isn't the characteristics of the tumor, ie, distance from the anal verge, size, etc, that [which] drives the selection rather than surgeon's choice? Selection of patients. What are your criteria for distance from the anal verge for attempting a TAE? Do you have a definite cut-off point? Also would you attempt TAE at a higher level in older patients, especially females, who have more laxity permitting the rectum to be pulled down and more easily accessed through the transanal approach? Also do you avoid TAEs in midrectal lesions in the anterior positions in the female for fear of perforating into the peritoneal cavity? Recurrences. A 12.5% benign recurrence after TAE is reported; however, the average follow-up is only 25 months. Do you think that this is a long enough follow-up to conclude that you have seen all the benign recurrences which may be slow to recur? What is the time to recurrence? Is it relatively early or late? Occurring before or after 25 months? This will give some idea whether 25 months is an adequate time to judge the complete status of recurrence. Margin status. I am concerned that in 9 of 40 excisions there was no information regarding resection margins. I feel that getting a negative margin is very important in these lesions, but in 25% of the patients, this information was not available. Why was this percentage so high? Also 2 of the patients had positive margins on pathology, but there is no mention of re-excision to obtain a negative margin. Why was reexcision not attempted in these patients? Carcinoma in villous adenoma. Two of the patients treated transanally had T2 carcinoma in the villous adenoma but no additional therapy was recommended. Current data suggest that recurrence rate[s] with T2 lesions treated with simple excision alone are high and that additional therapy is warranted. This was reportedly done because of age and/or comorbidity. What would be your recommendation for further treatment in T2 lesions if the patient did not have any contraindications? Endoscopic ultrasound. Ten of the lesions were called invasive carcinoma on EUS but only 5 patients actually had invasive carcinoma on final pathology. The positive predictive value was 50% and the specificity only 16%. These kinds of results I call the [[ldquo]]flip the coin tests[[rdquo]]; [[ldquo]]heads, cancer; tails, benign,[[rdquo]] since the results are no better then flipping a coin, but the tests are a lot more expensive. Also, I teach my residents not to order a test unless it directly benefits the patient or changes what you are going to do. However, in all these patients, in spite of the EUS results, excision/resection was still performed. With this data, are you still recommending preoperative EUS in rectal villous adenomas? Also have you looked into a simpler, less costly test and its correlation to postoperative pathology, that is, a rectal examination and the surgeon's finger? Villous adenomas that are benign are characteristically soft and velvety and may even be missed on digital rectal examination. The presence of hard areas in the villous adenomas, in my experience, correlates with the presence of cancer. Is this your experience? Statistics. In looking at the median prior attempts at excision in patients with no dysplasia/low-grade dysplasia vs high-grade dysplasia/cancer, the absolute numbers are 1 and 0 but the P value is .04. How can you get this probability from such small numbers? In general, the number of data points in the various comparisons is quite small leading to the possibility of [[beta]] or type II errors in the reported probabilities. For example, in comparing patients with benign recurrence vs no recurrence (with only 4 patients recurring), it is stated that the average size of tumor that occurred was 5 cm and the average size with no recurrence was 2.8 cm with a probability of 0.10. This is almost a doubling in size between the 2 groups, but the lack of statistical significance may be a type II error. Even here a probability of 0.10 means only a 10% chance of random error and a 90% chance that the differences are real. Although it cannot be proved that these are statistically different, at the same time, it cannot be stated that they are statistically the same. Dr Deveney: First, the comment regarding the extent of resection. Actually, that comment regarding APR was an error in the first draft. In my entire career, I believe that I have never done an APR for a benign lesion. But they were proctectomies, one of which was an actual LAR for an upper rectal lesion and the rest of them were proctectomies with coloanal pouches, some of those done by mucosectomy because the lesion extended very low in the rectum. Those were performed in lesions where the characteristics of the lesion precluded any other treatment because they were very geographically large lesions occupying the entire circumference or a very large percentage of the rectal mucosa, which actually answers question 2 as well. The selection of the procedure was indeed driven by the characteristics of the tumor as well as the suitability of the patient to undergo that procedure because of their comorbidities. In the patients in whom a proctectomy needed to be done, a TAE just was not deemed feasible. Regarding the location of the lesion, that most definitely plays a role in what treatment should be performed. And again men vs women, anterior vs posterior lesions make a difference. A posterior lesion will be able to be removed more safely if it extends up higher from the anal verge and up to 10 or in some cases even 12 cm, whereas anteriorly the risk of entry into the peritoneal cavity as well as the difficulty in mobilizing the tissues and obtaining a secure closure will limit it to somewhat lower lesions. Being able to predict exactly how low the cul de sac extends and where the peritoneal cavity is, particularly in women in whom it extends lower, difficult and so maybe something that leads us to caution in attempting to resect lesions that are anterior. Our follow-up is definitely not long enough. The recurrences that we had, which were all benign lesions, were early and some of the cases have had long enough follow-up to be able to be reasonably certain that recurrence will be unlikely. However, one of the patients who had been referred to us with a recurrence of a benign lesion had his initial resection done 25 years before. So I think that the length of time for recurrence may be extremely variable and that is a limitation of our paper. We need longer follow-up. As far as our follow-up plan, I have the patients come back every 3 to 4 months for the first year and every 6 months thereafter until they have reached 5 years. This patient group did include a number of elderly people who were lost to follow-up after a few years. With regard to the margin status not being available on some of the patients, it was really a matter of this being a retrospective study. The pathologists sometimes did not mention it in their final report. Regarding the treatment of the T2 tumors, indeed these patients were very elderly and they had a lot of comorbidities. More aggressive treatment would not have been reasonable. If they were young and fit patients with a T2 lesion, I would favor transabdominal resection with a low anastomosis, and if they were not physically fit, then chemotherapy and radiation or observation. The comment regarding EUS is a point I think very well taken. This test did not have any more effectiveness than a flip of the coin. We always do a digital rectal examination, and I agree totally with Dr O[[rsquo]]Connell that the finding of any area in the tumor that is hard makes it likely that that might be a cancer. Any of our patients who had a villous adenoma who were found preoperatively to have a hard area or a biopsy of cancer were not included in this series because this series included only patients in whom a benign villous adenoma was the preoperative diagnosis. But that is a key aspect of the evaluation, and I would say more reliable than an EUS. There are some patients, however, whose lesions were above the digital examination or extended high enough that you could not feel the entire lesion, and as the experience with EUS increased in our hospital, I think that it is worthwhile to evaluate those patients who have a higher lesion with an EUS to have as much information as possible ahead of time. Regarding the comments about the statistics, the Mann-Whitney U Test was used for comparisons per the advice of our statisticians, and I think in general our numbers are too small in some cases to reach statistical significance when you break it down into the small subgroups. We would need a larger number of patients to show true differences, but we did not have them. Copyright 2008 American Medical Association. All Rights Reserved. Applicable FARS/DFARS Restrictions Apply to Government Use.2008 To analyze a 13-year, single-surgeon experience with villous adenoma of the rectum with respect to procedure, complications, recurrence, and cancer incidence. Retrospective review of patient and tumor characteristics, procedure, recurrence, and complications. Patients who underwent excision of rectal villous adenoma. Main Outcome Measures Complication, recurrence, and malignancy rates. Thirty-six patients underwent 30 transanal and 10 transabdominal excisions. Mean age was 66 years (range, 41-86 years) and mean follow-up was 25 months (range, 0.5-132 months). Mean tumor size was 3.0 cm (range, 0.5-11 cm) and the mean distance of the tumor from the anal verge was 4.9 cm (range, 0-10 cm). Preoperatively, 18 (45%) lesions harbored low-grade dysplasia while 17 (43%) had high-grade dysplasia. Postoperative pathology was discordant in 50% of patients, including 5 of 40 lesions (13%) that were recategorized as invasive cancer. Tumor size did not correlate with malignancy. The complication rate was significantly lower in transanal compared with transabdominal excisions (3.6% vs 50%, P = .005). There were 4 (12.5%) benign recurrences, all after transanal excisions. Complete excision is warranted for rectal villous adenomas, as biopsies were accurate only 50% of the time, and 1 in 8 patients had unsuspected cancer found after excision. Transanal excision with negative margins is associated with low recurrence and complication rates and is the preferred approach, even with large lesions. Villous adenoma is a premalignant polyp of the gastrointestinal tract. Up to two-thirds of these lesions occur in the rectum. They have an equal distribution between sexes and a peak incidence in the sixth and seventh decades of life.1 They can be difficult to palpate on rectal examination and difficult to detect by colonoscopy owing to their flat, soft nature and indistinct borders. These lesions have been reported to harbor malignancy in 4% to 40% of cases.2,3 Biopsy is inaccurate in this setting, missing invasive cancer about 40% of the time.4,5 Appropriate treatment consists of complete excision, either endoscopically or by removal of the entire rectum, and pathologic analysis of the entire specimen.3,6- 9 Surgical options for resection of villous adenoma of the rectum include local treatments, such as transanal excision (TAE), transanal endoscopic microsurgery, and mucosal resections, or radical resections, such as proctectomy. The most commonly performed procedures are TAEs and proctectomies. Whenever possible, local excision and sphincter preservation is the procedure of choice for accessible lesions with favorable characteristics. Despite complete excision, recurrence is seen in up to 40% of cases.1- 3 Ongoing challenges in managing these lesions continue to be identifying risk factors for failure of local therapy and identifying diagnostic techniques that may aid in deciding appropriate surgical therapy. The broad range of reported recurrence rates for treatment of villous adenoma of the rectum indicates a need for additional data. Therefore, we analyzed the 13-year experience of a single surgeon in the management of these tumors with respect to the oncologic outcome of different surgical techniques, complication rates, and concordance of preoperative and postoperative diagnoses. We hypothesized that TAE of rectal villous adenoma would provide good oncologic outcome with acceptable complication and recurrence rates. The operative log of a single surgeon (K.E.D.) was reviewed for patients who underwent a surgical procedure for villous adenoma of the rectum between January 1995 and June 2007. Institutional review board approval was obtained before medical record review. All procedures were performed at Oregon Health & Science University, Portland, a tertiary care university hospital. Variables collected included patient and tumor characteristics, history of rectal polyps and treatment, preoperative and postoperative pathology, use of endoscopic ultrasonography (EUS), type of procedure, complications, recurrence status, and time and results of follow-up. Patients who had a preoperative diagnosis of malignancy using biopsy were excluded. All patients were preferentially considered for TAE unless the extent of the tumor precluded this procedure (eg, nearly or totally circumferential or carpeting of the entire rectum). Continuous data were compared using the t test, while categorical data were compared via χ2 analysis, the Fisher exact test, or the Mann-Whitney U test as appropriate. Significance was set at P < .05. Statistical analyses were performed using SPSS, version 15.0 (SPSS Inc, Chicago, Illinois). Forty procedures were performed in 36 patients during this period. Mean age was 66 years, and the male to female ratio was 1:2.6. An attempt at excision, either endoscopically or surgically, was made in 20 (55.6%) patients before they were referred to us. Two patients died during the study period: one received a subsequent diagnosis of cholangiocarcinoma; the other, breast cancer and Parkinson disease. A mean follow-up of 25 months was possible in 32 of 36 patients (88.9%). Patient characteristics are presented in Table 1. Preoperative pathology reports were available in all 40 cases and were divided into 3 categories: no or low-grade dysplasia; high-grade dysplasia; or no comment on dysplasia made. No tumor was found to harbor invasive adenocarcinoma preoperatively. We examined the proportion of tumors that were either upgraded or downgraded by definitive excision. Postoperatively, there were 5 cases (13%) of invasive carcinoma diagnosed. All 5 cases were preoperatively assessed as high-grade dysplasia. In total, 50% of patients had an incorrect preoperative diagnosis based on biopsy, with 13% of cases upstaged to invasive cancer. Table 2 presents the distribution of preoperative pathologic diagnoses and the concordance between preoperative and postoperative pathology. We also analyzed the association of tumor size (defined as the greatest dimension in centimeters), distance from the anal verge (defined as the distance, in centimeters, to the lower or distal edge of the tumor), and patient age and sex with the presence of malignancy or high-grade dysplasia. The mean distance from the anal verge was 4.9 cm (range, 0-10 cm) and mean size was 3.0 cm (range, 0.5-11 cm). Tumors that were classified as having either no or low-grade dysplasia were compared with tumors classified as having high-grade dysplasia or invasive adenocarcinoma. There were no significant differences between the distance from the anal verge, greatest dimension of tumor, age, or sex (Table 3). However, patients who underwent prior attempts at excision, either colonoscopically or by previous TAE, were more likely to present with a lesion categorized as having no or low-grade dysplasia, while those with high-grade dysplasia or invasive adenocarcinoma were more likely to present with their index lesions. Thirty of 40 tumors were excised via the transanal route (75%) and 10 were removed transabdominally by proctectomy (25%). The mean size of lesions removed by transabdominal methods was 5.6 cm compared with 2.2 cm for lesions removed via TAE (P < .001). Mean distance from the anal verge did not differ (3.9 cm for transabdominal vs 5.1 cm for transanal, P = .37). Six complications were noted (16%). The complication rate for TAE was significantly lower than for transabdominal procedures (3.6% vs 50%, P = .005). Mean length of stay was 12 days for the transabdominal group and 1.7 days for the transanal group (P = .005). We defined recurrence as a villous adenoma diagnosed by any means on postoperative follow-up after the index procedure and as occurring after initial referral to the operating surgeon (Table 4). Four patients fit this definition, and no patient recurred more than once during the study period. All recurrences were benign, occurred after TAE, and were all in patients who had had prior attempts at excision before referral. No patient who presented with their first lesion had a recurrence. Tumor size, distance from the anal verge, and positive margins were not associated with recurrence. No patient who had an invasive cancer had a recurrence during a mean follow-up of 17.4 months (range, 5-33 months). Three of the 5 recurrent cancers were pT1, 2 of which were in the TAE group (no further resection was recommended). The other 2 recurrent cancers were pT2 and were removed transanally; no additional treatment was recommended owing to the patients' age and comorbid conditions. Endoscopic ultrasonography was used in 10 patients (25%) to assess 11 lesions. This was an emerging technology at Oregon Health & Science University during the study period. All EUSs at our institution were performed by 1 of 2 endoscopists. Ten of 11 tumors assessed by EUS were characterized as at least stage T1. Five of these lesions ultimately harbored invasive cancer based on postoperative surgical pathology. One of 11 lesions was characterized correctly as a benign villous adenoma by EUS. Overstaging by EUS was seen in 2 uT1 lesions resected transabdominally, which later proved to be pT0. These lesions were 4.5 and 11 cm in their greatest dimension. Overstaging by EUS was seen in 3 uT1 lesions resected transanally, which were later identified to be stage pT0. These lesions had a mean size of 1.1 cm. Endoscopic ultrasonography correctly staged 54% and overstaged 45.5% of lesions. No tumors were understaged. Endoscopic ultrasonography had a sensitivity of 100%, a specificity of 16.7%, a positive predictive value of 50%, and a negative predictive value of 100% for the presence of malignancy. Preoperative biopsy had a sensitivity of 80%, a specificity of 94.3%, a positive predictive value of 66.7%, and a negative predictive value of 97.1% for the presence of malignancy. This article provides new perspective on the management of villous adenoma of the rectum. Our patient population was similar in age to populations in published articles,1 but ours had a slightly higher female to male ratio of 2.6:1. In contrast to prior reports, more than 60% of this patient group had been referred after a previous attempt at excision. The 13% rate of invasive cancer is consistent with previous articles, which describe rates between 1% and 40%.1- 4,10,11 In our analysis, we grouped high-grade dysplasia and carcinoma in situ together in concordance with the Vienna criteria12 (Vienna grade 4). All cases of invasive cancer arose from lesions classified as high-grade dysplasia, which is consistent with the natural history of villous tumors. Interestingly, patients with high-grade dysplasia or invasive adenocarcinoma were more likely to have undergone their initial excision at our institution, rather than being referred for a re-excision, perhaps because of earlier referral of more advanced appearing lesions. There were no other significant predictors of malignancy, such as tumor size or ultrasonographic findings. That 50% of biopsy results were incorrect, nearly 1 in 5 lesions were upgraded postoperatively, and 1 in 8 lesions harbored invasive adenocarcinoma supports complete excision as the only means of definitive diagnosis. The inaccuracy of preoperative diagnosis did not appear to affect outcomes in our series, possibly because the treatment was determined with the supposition that the preoperative diagnosis is often inaccurate. This finding may be proven to be incorrect with longer follow-up, though most recurrences are expected in the first 2 years. In addition, while many cases were upstaged, 18% of our cases were downstaged. Our findings about the inaccuracy of the preoperative diagnosis are consistent with the experiences of other authors who have reported low accuracy of preoperative biopsy.5,13 While size of the tumor was not predictive of invasive cancer, it did influence the procedure performed. In our series, transanal methods were attempted unless the tumor was large, circumferential, or associated with multiple adenomas on preoperative assessment, either endoscopically or by clinical examination. A limitation of this retrospective review is the lack of a standard process for determining which operation was offered. The overall complication rate in our series was 16%. In a series of 50 patients, Featherstone et al14 reported no morbidity or mortality for TAE during a 24-month follow-up period. This compares with 1 complication in 28 (3.6%) TAEs in our patient group. Winburn3 reported a 24% (12% major and 12% minor) complication rate and no mortality in a series of 16 patients, 14 of whom underwent TAEs and 2 of whom underwent low anterior resections. They note that all patients had follow-up to at least 2 years, though details about the distribution of complications among the different operations is lacking. In a series of 207 patients, Pigot et al2 report a 10% complication rate, 4% early and 6% late, with 1 death (0.5%). In articles published within the last 10 years,2,3,14 no direct comparison is made between TAE and transabdominal procedures. Our 50% rate of overall complications for transabdominal resections is comparable with rates reported in the literature15 and represents a 13.9-fold higher complication rate for transabdominal procedures (50% vs 3.6%, P = .005), corresponding to a number needed to treat of 2.2. Thus, just over 2 TAEs have to be performed to avoid 1 complication from a transabdominal procedure. Counterbalancing this, the number needed to treat for benign recurrence is 7 (14% in the TAE group vs 0% in the transabdominal group). Therefore, 7 transabdominal procedures need to be performed to avoid 1 recurrence by TAE. However, we and others have demonstrated a complication rate of 50% to 56% with transabdominal procedures for rectal lesions. Our data show that 4 complications would occur in attempting to prevent 1 recurrence. Therefore, despite a higher recurrence with TAE, routine use of transabdominal excision would result in an unacceptably high complication rate and far outweighs the cost of benign, easily managed recurrences. This supports our methodological strategy of preferentially performing TAE (unless tumor characteristics did not allow a TAE). Similarly, although all 5 invasive cancers were in the high-grade dysplasia group, transabdominal excision of all 17 tumors with a preoperative diagnosis of high-grade dysplasia would lead to 8 to 9 potential complications. Of 4 cases in the TAE group, 2 cancers were curatively resected and 2 patients would not have tolerated a more aggressive operation. Thus, the prognosis would not have changed at the expense of a dramatic increase in potential morbidity and mortality. A trend toward increased benign recurrence was noted for patients who underwent prior attempts at excision before being referred to us (P = .08). One possible explanation is that this group may have had incomplete initial excisions. The failure rate of endoscopic therapy before initial referral was 41.7%(15 of 36 patients), which suggests a high rate of recurrence with limited resection. Statistical analysis failed to show any association between benign recurrence and tumor size, distance from the anal verge, presence of malignancy, positive resection margins, or transanal procedure (Table 4). Other authors have found that size, the presence of severe dysplasia or malignancy, positive surgical margins, and treatment by local excision are predictors of benign recurrence.2,4 However, Adams and Wong10 described a series of 62 patients with rectal villous adenoma (57 of whom were treated by TAE), in which depth of excision and presence of malignant focus did not predict recurrence. Other possible reasons for the increased benign recurrence rate in patients with previous excisions could be that prior excision methods were inadequate or the entire mucosal area had a propensity to develop villous adenomas (field effect) and the recurrence represents adenoma developing in an adjacent site. This may be a potential area of study with regard to identifying possible differences in cytokine expression, genetic alterations, or changes in immunohistochemical markers. Early work in this field is promising. Hao and coworkers16 examined 15 genes shown to have altered expression in colon cancer. Using a single rectosigmoid biopsy, they were able to show differences in gene profiles in 169 biopsies of 24 patients with adenomatous polyps anywhere in the colon. This field effect persisted both in patients with and without a personal or family history of colon cancer. Given the high rate of occult malignancy reported in villous tumors of the rectum in our series (13%), the use of EUS holds promise as an adjunct to clinical examination and preoperative biopsy. This technique was emerging at our institution during the study period. Our data showed that EUS had high sensitivity and negative predictive value but poor specificity and positive predictive value. In our series, EUS tended to erroneously upstage tumors but did not appear to influence the choice of procedure performed. The rate of TAE was similar whether or not EUS was performed (79% vs 70%, respectively), despite 10 of 11 EUS results that were reportedly positive for malignancy. Worrell and colleagues11 performed a systematic review of the literature assessing the use of EUS for detecting foci of malignancy within rectal adenomas. They identified only 5 articles that met their inclusion criteria of adequate preoperative and postoperative reporting. These authors found, in a pooled analysis, that EUS diagnosed 81% of focal cancers missed by biopsy and that the false-negative rate would be decreased from 24% to 5% with combined use of biopsy and EUS. Thus, 5 adenomas negative on biopsy would need to be assessed by EUS to prevent 1 missed cancer, while 1 case of overstaging would occur per 11 correct diagnoses by EUS (9%). Adams and Wong10 reported a sensitivity of 50%, a specificity of 94%, a positive predictive value of 66.7%, and a negative predictive value of 88.7% for the detection of malignant foci within rectal villous lesions using EUS in 62 patients. They also note that a technically imperfect examination produced a 57.1% rate of correct diagnoses, while a technically perfect examination resulted in a 93.8% accuracy rate. These authors acknowledge a limitation in diagnostic capability in large tumors and those in close proximity to the anal sphincters owing to image artifacts. These data indicate that, with greater accessibility to equipment and more experienced endoscopists, EUS may earn a more important role in the management of these lesions at our institution. Transanal endoscopic microsurgery has been increasingly used since first being described by Buess et al17 in 1985. None of our patients were treated with transanal endoscopic microsurgery. The current experience with transanal endoscopic microsurgery15,18- 21 for villous adenoma of the rectum is limited. One report that retrospectively compared transanal endoscopic microsurgery with TAE or transabdominal methods15 noted complication rates of 4% to 33% and recurrence rates of 0% to 9%, which are comparable with the results reported for TAEs.1- 3,14 There is no subset analysis of villous tumors. Transanal endoscopic microsurgery appears to be a promising alternative to treat these and other lesions and is supported by a growing body of evidence. Our study was susceptible to the limitations of a retrospective review. Changes in medical record keeping, incompatibility of the general medical record with the EUS database, and inconsistent records due to nonprospective data collection contributed to these limitations. The relatively infrequent occurrence of the disease, as evidenced by our small numbers as well as those reported in the literature, makes it unlikely that a large, prospective trial could be reasonably conducted. A lack of standardized pathology reporting may also have contributed to inaccuracy and bias. Our mean follow-up period was 25 months, which is relatively short. This is partly because follow-up is still ongoing for the patients who were treated most recently, as the study period ended 6 months before the preparation of this report. This follow-up interval is consistent with other series (range, 21-75 months), with 4 of 7 recent articles noting follow-up between 21 and 27 months.2,3,10,14,15,20,22 Management of villous adenoma of the rectum remains a diagnostic and treatment challenge. No specific factor, including tumor size and EUS findings, predicted malignancy. Because 50% of lesions were incorrectly diagnosed using preoperative biopsy, 18% were upstaged postoperatively and 13% were upstaged to carcinoma, complete excision is required for accurate diagnosis. When feasible, this should be done with TAE to avoid the higher complication rate of transabdominal excision. Correspondence: Karen E. Deveney, MD, Oregon Health & Science University, 3181 SW Sam Jackson Park Rd, L223, Portland, OR 97239 (email@example.com). Accepted for Publication: April 6, 2008. Author Contributions: The authors had full access to all of the data in the study and take responsibility for the integrity of the data and the accuracy of the data analysis. Study concept and design: Cho, Herzig, Douthit, and Deveney. Acquisition of data: Cho, Herzig, Douthit, and Deveney. Analysis and interpretation of data: Cho, Herzig, Douthit, and Deveney. Drafting of the manuscript: Cho, Herzig, Douthit, and Deveney. Critical revision of the manuscript for important intellectual content: Cho, Herzig, Douthit, and Deveney. Statistical analysis: Cho. Administrative, technical, and material support: Herzig. Study supervision: Herzig and Deveney. Financial Disclosure: None reported. Previous Presentation: This paper was presented at the 79th Meeting of the Pacific Coast Surgical Association; February 17, 2008; San Diego, California; and is published after peer review and revision. The discussions that follow this article are based on the originally submitted manuscript and not the revised manuscript.
<urn:uuid:91e78ec7-e855-4456-9fa5-a18745434abd>
CC-MAIN-2016-44
http://jamanetwork.com/journals/jamasurgery/fullarticle/600906
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00405-ip-10-171-6-4.ec2.internal.warc.gz
en
0.962467
7,478
1.53125
2
a shrill, trilled sound, as of some insects or birds Origin of chirrechoic to make such a sound A harsh trilling sound, such as the one a cricket makes. intransitive verbchirred, chirr·ing, chirrs To make a harsh trilling sound. Origin of chirrImitative. (third-person singular simple present chirrs, present participle chirring, simple past and past participle chirred)
<urn:uuid:c476ea21-4d99-4f54-8ed4-4b748dc1c634>
CC-MAIN-2017-04
http://www.yourdictionary.com/chirr
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00223-ip-10-171-10-70.ec2.internal.warc.gz
en
0.784703
109
3.203125
3
Most detail experts recommend that you have your car detailed approximately every 4-6 months. That said, you can never have your car look too nice. Having your car detailed is a routine that should be as normal as changing the oil, though not as often. The consensus on how often this should be done varies; some recommend a thorough detail once a year, while others recommend detailing it as an ongoing process of caring for your car. Experts recommend detailing your vehicle every 4 to 6 months and no less than once or twice a year. How often you get details of a car's interior depends on how much wear and tear your car's interior goes through. If you vacuum and clean surfaces regularly, you may only need to do a complete interior detail once every four to six months. Vacuuming and dusting your car's interior and trunk can improve the air quality in your car and the performance of your air conditioning system. Details protect exterior paint and interior finishes, eliminate stains and odors that you may not be able to remove yourself, and help preserve the resale value of your car. Interior details include vacuuming and cleaning all interior surfaces of the car, often using an air compressor to loosen dust and dirt trapped in corners and tight spots. When you take your vehicle for full detail, you can expect any presence of mold to be removed from the interior of your car. While some people make a significant effort to keep their car interior clean, others feel overwhelmed by their daily activities and simply don't have time. At the same time, the more effort you put into keeping the interior and exterior of your vehicle clean, including washing, waxing and general cleaning, the less often you'll have to invest in every detail. Depending on the interior of the car, the leather or upholstery should be cleaned and treated and the interior parts of the car that are vinyl, plastic or leather should be cleaned and treated with a sealant to maintain their shine. Detailing the interior of a vehicle can be a very complicated job, requiring attention to detail and numerous tools, techniques and cleaning products unique to each material. Keeping a small trash can or even a bag that you empty at regular intervals goes a long way to making your car interior look fantastic. Car interior detail packs are comprehensive services that address hidden dirt bags in your car. Also, take note of any interior or exterior issues that you want to discuss with the retailer, such as scratches, rocks, paint swirls, carpet stains, leather tears, etc. You should consider detailing the interior if none of the following services have been performed on your car recently. The interior of your car should be thoroughly cleaned once a month, but you should also do everything in your power to remove dust from the surface and remove garbage from the vehicle on a regular basis. However, since professional details cover every inch of your car, the interior roof lining will get all the attention it deserves.
<urn:uuid:b0253dd1-1209-4a66-ab5c-8cff9f73ab95>
CC-MAIN-2022-33
https://www.asdesignltd.com/how-often-should-you-detail-interior-of-car
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00268.warc.gz
en
0.963751
593
1.5
2
I'm making this little text rpg game and i want to display this ascii as a death screen. I have made a c++ file that has that (i found the code online and i didn't want to put it in the main code just cause it'd be too long to place that whenever you die, it reads a .txt file with the ascii) and i need a way to execute it from the main cpp file when i run it. Is there a way? I have searched the web, but nothing i could clearly understand came out. here's the code for the ascii if it helps: std::string getFileContents (std::ifstream&); /*Gets filecontents*/ int main(int argc, char *argv) std::ifstream Reader ("ded.txt"); //Open file std::string Art = getFileContents (Reader); //Get file std::cout << Art << std::endl; //Print it to the screen Reader.close (); //Close file std::string getFileContents (std::ifstream& File) std::string Lines = ""; //All lines if (File) //Check if everything is good while (File.good ()) std::string TempLine; //Temp line std::getline (File , TempLine); //Get temp line TempLine += "\n"; //Add newline character Lines += TempLine; //Add newline else //Return error return "ERROR File does not exist."; There is no need to make a new program to print this on the screen... And that's for a simple reason, it will actually print it on a different window and that's not what you want, right? Another misunderstanding you have is that you don't execute .cpp files contain source code that you have to compile in order to execute them. And again this is not how stuff works in C++. So, to the solution. On your programs code make a new function, let's say PrintDeathScreen. You have two options. Read the ASCII from the file as you would do (but I don't really recomend that) or hard-code it into a variable and then just print it on the screen. This will save you from the trouble to open and read the file.
<urn:uuid:c7840db3-0333-441f-8ee6-e37e1846bfa0>
CC-MAIN-2017-04
https://codedump.io/share/lzKIoATk3XdS/1/how-to-i-execute-a-cpp-file-within-a-cpp-file
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00230-ip-10-171-10-70.ec2.internal.warc.gz
en
0.87617
496
2.859375
3
Entry 13: We learned in Mission 1 that the Moon does not have an atmosphere. This means that there is no wind on the Moon. We know that there are no animals on the Moon. So how could pollen be transferred between plants and plant parts on the Moon? Write your ideas in your Agronaut Log. There are still other ways to grow a new plant! A bulb is a tiny packaged-plant that has everything necessary to grow a new plant. Bulbs have carbohydrates to feed the plant and places for the roots to start growing. Everything is wrapped up very neatly in a tunic. The tunic protects the bulb from drying out. Inside the bulb are scale leaves. They are baby leaves that hold stored food for the bulb. Other ways to grow new plants are with tubers and cuttings. A tuber is a fat stem that grows underground and is used for food storage for plants. A cutting is a piece of a plant's stem, root, or leaf that is planted and grows roots. Entry 14: Can you find examples of plants that are grown from bulbs, tubers and cuttings? Write your examples in your Agronaut Log and talk to your teacher and classmates about your examples. Click Here to Go Back
<urn:uuid:3c6b71fc-3dfa-4839-817d-4bc9349e2bee>
CC-MAIN-2017-04
https://projects.ncsu.edu/project/agronauts/print_mission2_6.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00507-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962869
256
4.0625
4
When it comes to treating atopic dermatitis in non-white racial ethnic groups, there are variations in prevalence, genetic factors and clinical presentation. Dr. AlexisWhen it comes to treating atopic dermatitis in non-white racial ethnic groups, there are variations in prevalence, genetic factors and clinical presentation. In addition, delays in treatment and undertreatment can contribute to a higher risk of pigmentary sequelae, including hyperpigmentation and hypopigmentation. “Fortunately, recently approved therapies show promise in improving outcomes of atopic dermatitis in this patient population,” says Andrew Alexis, M.D., chair of the Department of Dermatology at Mount Sinai St. Luke’s and Mount Sinai West in New York City. Multiple studies from the United States and the United Kingdom demonstrate that the prevalence of atopic dermatitis is greater in blacks than in whites. For example, a study published in the Journal of the American Academy of Dermatology in 1995 found that London-born Caribbean children of African ancestry had a 16.3% prevalence rate of atopic dermatitis compared to a rate of 8.7% in London-born white children. Furthermore, in America, African American children were found to be 1.7 times more likely than their white counterpoints to have a diagnosis of atopic dermatitis, even after adjustment for potential confounding variables, according to a 2011 article in the Journal of Investigative Dermatology. Another U.S. study, reported in the Archives of Dermatology in 2012, found that blacks, Asians and Pacific Islanders were more likely than whites were to visit physicians for atopic dermatitis. “In fact, looking at the number of atopic dermatitis visits, blacks had two-fold higher visits per capita than whites, whereas Asians and Pacific Islanders had six-fold higher visits per capita,” Dr. Alexis tells Dermatology Times. “However, this is not due to greater healthcare utilization, as these non-white groups had lower overall utilization for medical and other skin conditions. This speaks to not only the higher prevalence, but the greater burden of atopic dermatitis among various non-white racial ethnic groups.” Excluding erythema, non-whites were six times more likely to have severe atopic dermatitis than were their white counterparts, according to a study published in the British Journal of Dermatology in 2002. Moreover, studies have shown differences in the lipid content of the epidermis of different populations. For instance, a key lipid, ceramide, is lower in African Americans than in other groups, according to a study from the Journal of Cosmetic Science in 2010, while ceramide/cholesterol ratios were found to be lower in Africans compared to whites in a study in the British Journal of Dermatology in 2010. Next: Genetic factors Other studies indicate differences in the genetic risk factors for atopic dermatitis. “Whereas atopic dermatitis patients of European ancestry frequently have filaggrin null gene mutations, the prevalence of this specific gene mutation in African Americans and other groups of African ancestry with dark skin is lower,” says Dr. Alexis, who spoke on atopic dermatitis at the Skin of Color Seminar Series (SOCSS) in New York City in May. “This finding suggests that there may be other genetic factors that are more predisposing in individuals of African ancestry.” The trend in the typical cytokine profile seen in atopic dermatitis among East Asian patients vs. Caucasians is also different. “East Asians have a higher tendency to have a predominant Th17 and Th22 cytokine profile and a more psoriasiform presentation of atopic dermatitis,” says Dr. Alexis, referencing a 2015 article in the Journal of Allergy and Clinical Immunology. The erythema associated with atopic dermatitis can be masked by background pigment, “so instead of increased redness, it may look like darkness or hyperchromia or hyperpigmentation instead of classic erythema,” Dr. Alexis says. “Thus, using clues like papulation, lichenification, scaling and excoriation is more reliable in assessing the severity of atopic dermatitis in darker skin.” Next: Eruptions and hyperpigmentation Eruptions and hyperpigmentation Two unique presentations that are seen more commonly in darker skin types are micropapular and follicular eruptions, particularly in individuals of African ancestry. A lichenoid presentation that resembles lichen planus is rarer but has also been described in African Americans. On the other hand, postinflammatory hyperpigmentation is a significant and common sequelae of atopic dermatitis in darker skin. “In fact, the hyperpigmentation can be almost as burdensome as the rash itself, whereby large areas of the body, including the arms, the legs and the torso, can be covered with hyperpigmented patches that are quite disfiguring,” Dr. Alexis says. Pigmentary changes may also occur as a result of treatment with topical steroids, leading to hypopigmentation, “which is more pronounced visually in darker skin,” Dr. Alexis says. For treatment overall of darker skin, “it is particularly important not to undertreat, but to aggressively target the underlying inflammation and to protect the skin barrier,” says Dr. Alexis, who advocates the liberal use of moisturizers, emollients and barrier repair products in conjunction with immunomodulatory therapies. “With the advent of new therapies that target specific pathways within the pathogenesis of atopic dermatitis, it is likely we will be able to manage these patients more effectively,” Dr. Alexis says. New treatment options Two recent notable additions to treatment options for atopic dermatitis are topical crisaborole (Eucrisa, Pfizer), a phosphodiesterase type 4 inhibitor (PDE4), which blocks strategic parts of the pathway leading to the inflammation and barrier dysfunction in atopic dermatitis, and the injectable biologic agent dupilumab (Dupixent, Regeneron), which blocks two critical cytokines (IL-4 and IL-13) implicated in the skin disease. “Both of these therapies have shown significant efficacy and safety,” says Dr. Alexis, director of the Skin of Color Center at Mount Sinai St. Luke’s and Mount Sinai West. Studies enrolled a sizable proportion of non-white racial ethnic populations, with the Phase III crisaborole trials comprising approximately 40% non-white patients and the Phase III dupilumab studies involving about 32% non-white patients. When comparing the safety and efficacy of dupilumab in white patients vs. black patients vs. Asian patients for the Phase III studies, “we found no racial ethnic differences in efficacy or safety for moderate to severe atopic dermatitis,” says Dr. Alexis, who was one of the investigators of the comparison study. Next: Contact dermatitis Contact dermatitis is another type of eczema that differs in racial ethnic. For instance, a study published in 2016 in the journal Dermatitis found differences between black and white patients related to the frequency of allergens detected in patch testing. “Blacks were significantly more likely to have a skin reaction to the chemical paraphenylendiamine [PPD], which is found in black hair dye; bacitracin; and specific rubber accelerators,” says co-author Dr. Alexis. “This is based on data from the North American Contact Dermatitis Group.” These differences are more likely due to differences in environmental exposures to these agents, rather than to genetic differences, says Dr. Alexis. Because of varying exposures among different populations, there are unique presentations of contact dermatitis, including reactions to henna dye that is mixed with PPD, and cultural practices. “For example, there is a type of contact dermatitis observed in devout Hindus, who smear an ash-based substance across their forehead called vibhuti,” Dr. Alexis says. Dr. Alexis believes that the addition of new therapies specifically targeting key inflammatory pathways in the development of atopic dermatitis should “revolutionize” treatment of the skin disorder in all patients, including patients of color. Disclosures: Dr. Alexis is a consultant to Regeneron and serves on the advisory boards of Anacor, Galderma and La Roche-Posay.
<urn:uuid:273811bc-6b57-491c-aaea-059650a7e0b8>
CC-MAIN-2022-33
https://www.dermatologytimes.com/view/treating-eczemas-skin-color
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00265.warc.gz
en
0.927723
1,782
2.890625
3
Reading comprehension questions answers for competitive exam Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] Traditional Indian Values must be viewed both from the angle of the individual and from that of the geographically delimited agglomeration of peoples or groups enjoying a common system of leadership which we call the 'State'. The Indian 'State's' special feature is the peaceful, or perhaps mostly peaceful, co-existence of social groups of various historical provenances which manually adhere in a geographical, economic and political sense, without ever assimilating to each other in social terms, in ways of thinking, or even in language. Modern Indian law will determine certain rules, especially in relation to the regime of the family, upon the basis of hwo the loin-cloth is tied, or how the turban is worn, for this may identify the litigants as members of a regional group, and therefore as participants in it traditional law, though their ancestors left the region three or four centuries earlier. The use of the word 'State' above must not mislead us. There was no such thing as a conflict between the individual and the State, at least before foreign governments became established, just as there was no concept of state 'sovereignty' or of any church-and-state dichotomy. Modem Indian 'secularism' has an admittedly peculiar feature: It requires the state to make a fair distribution of attention amongst all religions. These blessed aspects of India's famed tolerance (Indian kings to rarely persecuted religious groups that the exceptions prove the rule) at once struck Portuguese and other European visitors to the West Coast of India in the sixteenth century, and the impression made upon them in this and other ways gave rise, at one remove, to the basic constitution of Thomas More's Utopia. There is little about modern India that strikes one at once as Utopian but the insistence upon the inculcation of norms, and the absense of bigotry and institutionalized exploitation of human or natural resources, are two very different features which link the realities of India and her tradition with the essence of all Utopians. Which of the following is a special feature of the Indian state? peaceful co-existence of people under a common system of leadership peaceful co-existence of social groups of different historical provenances attached to each other in a geographical, economical and political sense Social integration of all groups Cultural assimilation of all social groups Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] Antagonistic relationship between the state and the individual throughout the period of history. Absence of conflict between the state and the individuals upto a point in time. The concept of state sovereignty Dependence of religion Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] No discrimination on religious considerations Total indifference to religion No space for social identity Disregard for social law Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] Indian tradition of religious tolerance Persecution of religious groups by Indian rulers Social inequality in India European perception of Indian State Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] A replica of Utopian State Adherance to traditional values Absense of Bigotry
<urn:uuid:f8445893-b6f2-4acf-982c-b9df1c2728ec>
CC-MAIN-2022-33
https://www.gatecseit.in/rc-mock-test-188/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00072.warc.gz
en
0.925081
696
3.546875
4
Come learn about the minerals and rocks in your yard. We’ll discuss fossils, petrified wood, crystals, fluorescent minerals and more. Two field trips will be taken to collect fossil clams, quartz and amethyst crystals. We will also pan for gold and learn where to hunt for it. This camp requires the purchase of a camp t-shirt (sold 2 for $14) to be worn on all trips. Questions? Contact Us!
<urn:uuid:006edee8-7f7b-4cb2-bae5-d6c16facf7bd>
CC-MAIN-2017-04
http://cedarspringscamp.net/camps/explorer-camps/rockhounding-101-camp/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00348-ip-10-171-10-70.ec2.internal.warc.gz
en
0.921381
92
1.78125
2
Dead whale washes up at Port Mahon A dead whale washed up near the pier at Port Mahon over the weekend, but the Marine Education Research and Rehabilitation Institute doesn’t yet know how it’s going to remove it. Suzanne Thurman, the MERR Institute's executive director, said the whale - likely a 17-ton juvenile humpback 25 to 30 feet long, is stuck behind poles and rocks at the pier, making it difficult to budge. “Because of the rocky sort of riprap, it wouldn’t be possible to tow the whale over the rocks,” Thurman said. “They’re quite large rocks and the whale would just break into a million pieces which would then become lodged in the rocks and would not be pleasant for those who fish at the pier.” Thurman said if a dead whale washed up by the coast, they’d tow it out of the water, determine its cause of death and then bury it on the beach, but burial at the port would be difficult because it’s a marsh, and the water isn’t even deep enough for a vessel to access the carcass. “So by water right now, there’s not a solution that we know of,” Thurman said. MERR can’t thoroughly examine the whale because it’s mostly submerged in water, but Thurman said by standing on the pier and looking down at it, it looks like it could have a broken jaw. And MERR wants to remove the whale before Thursday, when temperatures could hit 80 degrees. Thurman said by then, the stench of the carcass could be overpowering to anyone within several miles of the port. According to the National Oceanic and Atmospheric Administration, all humpback whales were listed as endangered species in 1970. NOAA then announced in September 2016 that many endangered population segments of humpback whales have recovered enough, that they’re no longer considered endangered species. Four populations remain endangered and one is considered threatened. This is the fourth whale to wash up in Delaware in the last year.
<urn:uuid:9a657a12-3e03-4365-828b-8863544491dc>
CC-MAIN-2022-33
https://www.delawarepublic.org/science-health-tech/2017-04-25/dead-whale-washes-up-at-port-mahon
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00071.warc.gz
en
0.958189
448
2.390625
2
Safety in the car. What is the best thing? Car accidents are one of the main causes of injuries and death in children. To prevent this from happening there are international safety measures that we should know. A survey carried out in the U.S. in 1995 regarding the use of safety measures informed that only 68% of children between 1 and 2 years old were secured and out of these only 20% were secured properly. Control posts were put up on the roads and they could see that in more than 90% of the cars the safety devices were incorrect. It could also be observed that the children were only secured with car safety belts before it is recommended; that is to say, before they weigh 30 kilos. It is important to take into account some characteristics of the children, for example, that the head is disproportionately big compared with the body and, thus, it is not properly supported. The bones of the cranium and the vertebrae are softer than in adults. Also, the abdominal organs are not protected by the rips. The habitual position of children and the difficulty in remaining seated like an adult make the car safety belts insufficient. 1- Children under 1 year old must always travel on the back seat looking backwards. 2 -Children over 1 year old must also travel on the back seat but looking forwards. 3- In the market there are several accessories for proper fastening. 4- Children over 8 years old can use the car safety belts if they fit them. - The best place for children in a car is the back seat. - Rough, sudden maneuvers like braking or swerving can also cause serious injuries.
<urn:uuid:818f4630-d909-42fc-b23b-7f87a3da0945>
CC-MAIN-2017-04
http://www.zonapediatrica.com/safety-in-the-car.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00230-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974952
338
3.125
3
Surrey Infantry Museum Artefacts The HMS Defence Gavel Symbolic of the close association which existed between the Royal Navy and the Queen's Royal Regiment, there is, a handsome gavel which was presented to the Officers' Mess 1st Bn The Queen's Royal Regiment in 1911 by Captain of HMS Defence of the First Cruiser Squadron, Royal Navy. Its silver mounted inscription reads:- Presented by the Wardroom Made from wood of HMS Defence 1861-1904 Fourth of her name a self explanatory covering letter, shown here, gives further information. Will you allow me, on behalf of myself and the Officers of this ship, to ask you to accept the enclosed mallet as a present to the Officers’ Mess of your Regiment. The inscription on the mallet explains itself but I might perhaps add that this present Defence is the 5th of her name; the mallet was turned and carved by the Carpenter of this ship. It is somewhat of a coincidence that while he was carving the arms of the House of Braganza that family was being turned out of Portugal. You are probably aware of the number and names of the Officers and men of the “Queen’s” Regiment who were killed or wounded on board the Defence on the 1st of June 1794. If however you are not, they are as follows:- Believe Me, Yours: Very Truly, HMS Defence was a Minotaur Class armoured cruiser of 14,600 tons. Built at Pembroke Dockyard, she was launched in April, 1907 and completed in February, 1909. She was coal fired and her main armament of four 9.2 in guns was supplemented by secondary armament and five submerged torpedo tubes. Her original crew complement was 755. Operationally she carried out normal cruiser duties in various parts of the world and in November 1912, she acted as escort to the Royal Yacht Medina. In September 1914, she was sent to the South Atlantic to reinforce Admiral Cradock's Squadron. Becoming flagship of the 1st Cruiser Squadron in 1915 she met her end in the following year when at the battle of Jutland on 31st May 1916, she blew up while under heavy fire from the German battleship "Friedrich Der Grosse". All of her increased war time complement of 893 men were lost - a tragic end to a gallant ship and her crew.
<urn:uuid:f475512b-449d-4ce4-bd24-8b12f2f98486>
CC-MAIN-2022-33
https://www.queensroyalsurreys.org.uk/new_museum/Maritime_and_Medals_Room/Case1/HMS_Defence_Gavel.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00668.warc.gz
en
0.979106
508
2.5
2
[CSD Math MS] Summer PD Opportunity in your own backyard... ALLISON.DUNCAN at canyonsdistrict.org Tue Jun 26 08:57:18 MDT 2012 …Well, Canyons backyard… This summer the Center for Science and Mathematics Education at the University of Utah is hosting a two-day workshop for any interested teachers. Friday July 6th and Saturday July 7th teachers will have the opportunity to work with Martin Flashman, a professor of mathematics at Humboldt State University. Friday he will address "A Different Approach to Understanding Functions" great topic for Secondary I teachers (Common Core 9th grade teachers) and Saturday he will be talking about "Amazing Results for AP Calculus". Both sessions will be held at the NEW Professional Development Center at the Canyons School District Support Services Building (9361 South 300 East). Food will be provided both days. To register go to http://usoe.truenorthlogic.com Search for course #34981 (section 37917) for Friday or course #34982 (section #37918) for Saturday. Or Email cangelos at math.utah.edu. -------------- next part -------------- An HTML attachment was scrubbed... More information about the CSDMath-MS
<urn:uuid:c57f763e-1cba-47a4-b78d-f26d86165f29>
CC-MAIN-2022-33
https://lists.uen.org/pipermail/csdmath-ms/2012-June/000055.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00474.warc.gz
en
0.868983
326
1.90625
2
being pulled by a horse or horses Charles and Camilla travelled in their own horse-drawn carriage ahead of the Queen. McKell is even friends with a few of the horse-drawn travelers on Facebook. In New York, the traffic from horse-drawn carriages clogged the streets at all hours. Nearly a century ago, in 1920, a horse-drawn cart blew up at the heart of Wall Street. Farm wages have doubled since the introduction of horse-drawn machinery. On all sides of them were trucks and autos, with here and there a horse-drawn vehicle. Getting into the motor to precede us as pilot, he asked the party to dispose itself as best it could in the horse-drawn vehicles. At its head a cluster of vehicles, horse-drawn as well as motor-driven, waited. In fact it had been but five years before that Mr. Macy had acquired the first horse-drawn rig for this purpose. If the family has enough money, they may hire a horse-drawn carriage.
<urn:uuid:a40d088f-eccd-4abe-a9c6-17c590e70252>
CC-MAIN-2017-04
http://www.dictionary.com/browse/horse-drawn
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00245-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970862
217
2.03125
2
L’Quoit (Lokout) was born around 1834 and grew up on the ancestral lands of the Yakama people. He was a descendant of prominent families from both the Yakama and Sinkiuse Tribes. His father, Owhi, was a respected War Chief of the Yakama people. L’quot’s youth was typical of native people on the Plateau. He took part in the seasonal round, a semi-nomadic lifestyle in pursuit of resources depending on the season with winters spent in communal villages. This included long trips by horseback to the bison hunting grounds of the Great Plains and frequent trips over the Cascade Mountains to the Salish Sea. L’Quoit’s birth in 1834 places him in Washington at a pivotal and rapidly changing time when white Americans and Canadians began encroaching on their traditional lands in large numbers. The first permanent presence was established in 1810 by white fur traders from the North-West Company near Spokane in 1810. The following year, the competing Astor Company established the Okanogan Post near Brewster, Washington. This initiated a race between the fur trading companies to control territory and led to the construction of four additional trading posts: Walla Walla, Vancouver, Colville, and Nisqually. The last to be constructed, Fort Nisqually, was established in 1833, the year before L’Quoit was born. One of L’Quoit’s first big adventures came in 1853 when he, along with a group of fellow Indians, travelled to Fort Nisqually to conduct business with the Hudson Bay Company. While there, a white traveler from Connecticut who was staying at the fort, Theodore Winthrop, asked Chief Owhi if he could purchase some horses and the services of a guide. Winthrop was hoping to make the trip from Fort Nisqually in present day Dupont, Washington to The Dalles, Oregon on the south bank of the Columbia River. Chief Owhi provided Winthrop with three horses and assigned his son, L’Quoit, to be Winthrop’s guide. The young man agreed to the task and he and Winthrop set out endeavoring to arrive at The Dalles in seven days. The travellers did not get along well, mostly because Winthrop was mean and condescending toward his guide as he seemed to be toward all Indians. Winthrop’s lack of respect for his guide culminated when he woke L’Quoit from sleep by kicking him. When they reached the east side of the Cascades, L’Quoit received a report that smallpox was prevalent at The Dalles and he was tired of Winthrop’s antics so he abandoned him to make the remainder of the trip on his own. The trickle of white newcomers into the Yakama’s territory, reminiscent of Winthrop, increased to a steady flow. Gold was discovered near Colville, Washington in the fall of 1854 and the next spring prospectors and miners began flocking from the Willamette Valley and Puget Sound Region across the Cascade Mountains to northeastern Washington. All the regularly travelled routes from the west to the goldfields required travel across the Yakama’s lands. This may not have been a problem, except that white newcomers had a propensity to mistreat native people, much like Winthrop mistreated L’Quoit. Territorial Governor Isaac Stevens, sensing the rising tension between miners and the tribes (and because he was eager to grow Washington’s population by opening native lands to white newcomers), sent envoys to the Yakama to negotiate for their lands. In June of 1855, with an air of intimidation and the threat of war on the horizon, tribal leaders reluctantly agreed to sing the Yakama Treaty. The Yakama people ceded ninety percent of their lands in exchange for financial compensation, guaranteed autonomous reservations where trespassing by whites was prohibited, and unending rights to off-reservation resources. Despite the agreement, the terms were ignored by the American side. Governor Stevens and regional newspapers encouraged Americans to head for the Washington Territory in pursuit of lands and resources that belonged to native people. This prompted thousands of white newcomers to cross Yakama lands in violation of the recent treaty that was supposed to end unapproved traffic. The tensions reached a climax in the late summer of 1855 when a group of miners who were trespassing on the Yakama Reservation, in violation of the Yakama Treaty, raped and killed a Yakama woman. The woman, a daughter of Chief Teias, was also a relative of Chief Kamiakin, the representative for the Yakama people at the 1855 treaty negotiations. Yakama warriors tracked the suspect and his travelling party and killed them in retribution. This event, along with the subsequent killing of Indian Agent Andrew Bolon, initiated the Yakama War. The first battle of the war occurred at Toppenish Creek in November 1855, two months after the death of Agent Bolan. The tribes, led by Chief Kamiakin and with L’Quoit in their ranks, mounted an impressive attack that resulted in multiple casualties for the US Army and an embarrassing defeat for Major Granville O. Haller. L’Quoit also fought in the Battle of Union Gap, the Battle of Walla Walla, and a roving attack on Governor Stevens after the Second Walla Walla Council in 1856. In the attack on Governor Stevens, L’Quoit was severely injured and left with a lifelong scar on his forehead. Despite his injury in 1856, L’Quoit’s was also involved in the second phase of the Yakama War in 1858, the portion that took place on the Palouse and along the Spokane River. He was amongst the warriors who defeated Colonel Steptoe at Steptoe Butte where he played a critical role as one of the snipers tasked with targeting US Army leadership in the opposing regiment. It is unclear if he was involved in the Battle of Spokane Plains but he was present on the bank of Hangman Creek when his father, Chief Owhi, his brother, Qualchan, and many fellow tribal members were lured into a US Army camp to discuss peace but were ultimately hanged by General George Wright, an act that amounted to a war crime. L’Quoit, along with his sister-in-law Mary, escaped from Wright and his men. L’Quoit’s life was long and it was full of battle and hardship. Near the end of his life he had an opportunity to tell some of his story when he was interviewed by regional historian A.J. Splawn. That interview helped to inform Splawn’s book Ka-mi-akin, the Last Hero of the Yakimas. Additionally, and most notably, L’Quoit met with renowned photographer Edward S. Curtis in 1910. Curtis interviewed and photographed L’Quoit, likely at his home on the Spokane Indian Reservation. L’Quoit’s photo was published in Volume VII of Curtis’ The North American Indian and in the caption Curtis acknowledges that L’Quoit’s recollections are found throughout the text of Volume VII. L’Quoit spent the last fifteen years of his life living on the reservation until he passed away in 1913.
<urn:uuid:2062b6ef-0967-47d5-877e-87c6c2663575>
CC-MAIN-2022-33
http://thelocalhistory.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00275.warc.gz
en
0.976406
1,524
3.453125
3
Draft Martini and Draft Kompella were the starting points toward standardizing the Layer2 VPN architectures using pseudowire emulation, both drafts addressed setting up pseudowire emulation over MPLS-based networks in order to offer Layer 2 VPN services, but each draft proposed a different approach. Members of the networking community divided themselves into two camps based on the different design philosophies that were embedded in the two drafts. This resulted in many drafts and debates until things converged time by time. I’ll try to simply describe both drafts, and how things eventually went out. Draft Martini: Named after its author Luca Martini (worked for Level 3 at this time), simply uses LDP for signaling to establish point-to-point Layer 2 VPN over MPLS backbone, with no suggestion for auto-discovery. Draft Kompella: Named after its author Kireeti Kompella (worked for Juniper at this time), simply uses BGP for both signaling and auto-discovery to establish multipoint (To be more specific it is fully meshed point-to-point pseudowires) Layer 2 VPN over MPLS backbone. Both drafts uses the same encapsulation; Provider’s Layer 2 header + Tunnel Label + VC Label + Control Word + Payload (L2 Frame), the encapsulation details for each Layer 2 protocol was described in several RFCs. As a quick comparison, Draft Martini suffers scalability issues due to configuration overhead in the absence of auto-discovery when dealing with fully meshed topologies between the edge routers, which is not the case with Draft Kompella leveraging auto-discovery and complex signaling, however Draft Martini leverages simplicity and straightforwardness. While Juniper claimed that Draft Kompella scales better than Draft Martini (which is technically justifiable), most vendors such as Cisco have standardized based on Draft Martini (simply using LDP for signaling), and efforts and new solutions have been worked on to overcome the auto-discovery issue with Draft Martini. The terms draft-martini and draft-kompella are used as labels for the two different L2VPN services methodologies (in a couple of words definition; LDP Vs BGP for signaling). The actual drafts do not exist in IETF anymore. NOTE According to the IETF; Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.” Draft Martini evolved until being RFC 4906 (Categorized as Historic), however it has since been superseded by the Pseudowire Emulation Edge to Edge (PWE3) Working Group specifications described in RFC 4447 and related documents. On the other hand draft-kompella is obsolete and was not standardized. Cisco has come up with a separate IETF draft that builds upon Draft Martini and incorporates pieces of Draft Kompella. Eric Rosen (worked for Cisco at this time), the author of what is known as “The Autodiscovery Draft Extension to LDP,” proposed establishing Layer 2 MPLS tunnels using LDP, as it’s described in Draft Martini, but like Juniper he suggests using BGP for auto-discovery. Eric Rosen was later one of the authors of one of the RFCs I found very comprehensive; RFC 4664 – Framework for Layer 2 Virtual Private Networks (L2VPN), it describes the framework for L2VPNs (VPWS, VPLS and IPLS). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. Requirements for L2VPNs can be found in RFC 4665 – Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks. Marc Lasserre (worked for Riverstone Networks at this time) and Vach Kompella (worked for Timetra Networks at this time – who happens to be the brother of Juniper’s engineer Kireeti Kompella) are the two main authors of Lasserre-V.Kompella Draft. This draft has gained official support from vendors such as Cisco for their VPLS implementation, it evolved until it was standardized as RFC 4762. Kireeti Kompella and Yakov Rekhter published “Virtual Private LAN Service (VPLS) Using BGP for Auto-discovery and Signaling” RFC 4761 in January 2007. Marc Lasserre and Vach Kompella published “Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling” RFC 4762 in January 2007. NOTE RFC 4762 stated the following regarding auto-discovery; “The capability to manually configure the addresses of the remote PEs is REQUIRED. However, the use of manual configuration is not necessary if an auto-discovery procedure is used. A number of auto-discovery procedures are compatible with this document ([RADIUS-DISC], [BGP-DISC]).” I know that it is very daunting to follow up all of this, I hope that I was able to illustrate this area a little bit, as much as I could follow up my self
<urn:uuid:32dcf54a-bc7a-4ad6-b1ce-889a7271b3c3>
CC-MAIN-2017-04
http://www.networkers-online.com/blog/2009/01/draft-martini-draft-kompella-and-l2vpn-services/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00180-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932855
1,122
1.765625
2
I love making my first cup of coffee in the morning. Anyone who knows me, knows the sheer importance of this ritual to me. A lot of my love for the perfect cup coffee is in the brewing process– first the smell of grinding the beans, followed by the scent created when the hot water hits the coffee. This film by Prufrock Coffee demonstrates how to brew syphon filtered coffee, an age old process invented in the 1830's. This is such an interesting brew method and though I haven't come across it here on the West Coast, I would like to test it out.
<urn:uuid:682b80d0-b217-4a63-8459-476ff89a5324>
CC-MAIN-2016-44
http://www.freemanbrand.com/journal/prufrock-syphon-filtered-coffee.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00498-ip-10-171-6-4.ec2.internal.warc.gz
en
0.968356
120
1.5
2
The D2C Foundation provides a long-term home and life-long family for children who were abandoned or orphaned. Our children will never be put up for adoption, but instead have been adopted into the D2C Family and are being brought up in a nurturing environment within their own community. In addition to care, shelter, nutritious food and clothing, the children are provided with the best available education to help support their future. Sustainable Community Development The D2C Foundation helps support and nurture the surrounding community of our Family Home by providing an after-school program for the children of Cayes Jacmel, Haiti. The tutoring program enhances the education of these children and teaches them new ways to approach learning that will help lead them to a productive future. Many believe that a strong tourism industry will be the road to development for Haiti, therefore in 2016, D2C will be including English lessons in our tutoring program to better allow the students to compete in the job market that tourism will create. Children's Yoga Initiative The D2C Foundation draws on the many scholarly studies that have shown the effectiveness of yoga and meditation in helping children. Many of the children in Haiti have experienced loss, trauma and poverty in their short lifetimes. Through yoga and meditation, D2C believes that we can offer the children tools for handling stress and the burdens of their lives, as well as help to heal those of the past. D2C offers yoga and meditation sessions to our children in the Family Home, the children attending our after school programs, and in 2016 will hold our first yoga based summer camp where children will also engage in art, dance and music lessons. yoga and meditation. Devoted to Children Foundation ~ Haiti 1 Waterloo Circle Park City, UT Devoted to Children Foundation is a registered 501(c)3 organization
<urn:uuid:c29e5927-d693-4cf6-ab68-51aef1044ad7>
CC-MAIN-2017-04
http://devoted2children.org/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00044-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953766
374
1.78125
2
Mangroves of the Western Indian Ocean Book Launch by Wanjiru Jacqueline and Nina Wambiji It was an honour for Kenya Marine and Fisheries Research Institute (KMFRI) to host the first book launch entitled ‘Mangroves of the Western Indian Ocean: Status and Management’ on 22nd September 2016. The event was spearheaded by Dr. Jared Bosire (WWF and also the Head Editor) and Dr. James .G. Kairo (KMFRI). The launch was graced by different stakeholders amongst them World Wide Fund for Nature (WWF), State Department of Fisheries and the Blue Economy (SDF & BE), Kenya Forest Research Institute (KEFRI), National Environment Management Authority (NEMA), Kenya Wildlife Service (KWS), Base Titanium, Coastal & Marine Resource Development (COMRED Africa), Community Action for Nature Conservation (CANCO), Coastal Oceans Research and Development Indian Ocean (CORDIO-EA) and KMFRI. In attendance was the president WIOMSA and KCDP Project Manager Dr. Jacqueline Uku who was impressed by the Mangrove team and urged the other researchers to come up with write ups on coral reefs, sea-grass among others. She highlighted how WIOMSA as fraternity disbursed knowledge to many stakeholders, how different grants especially book grants were to be sourced by stakeholders so that they would package their work and disseminate it. She said ‘Books survive us, books live beyond us’. She was happy to note that KCDP had supported the development of the Kenyan Mangrove Management plan and this book ties in with that effort. She further reminded participants that WIOMSA celebrates partnerships. WWF Regional Director, Dr. Awer was also present and was impressed by what KCDP has achieved not only through sensitizing the communities at the Coast but also the resources it has created at KMFRI like the ‘Ocean Centre Building’ which has the state of the art facilities. Dr. Awer mentioned that the book should have a positive impact to the world as it was the kind of legacy mankind should leave and that researchers should use it widely as a reference. He encouraged all participants that Kenya had unparalleled capacity and we need to use it to solve our problems. All the knowledge acquired through school and experience at work needs to be translated to solutions. Dr. Edward Kimani, the Assistant Director Fisheries at KMFRI talked about RV Mtafiti as a platform that all stakeholders would use to answer some of the unknown in the Western Indian Ocean especially the Kenyan Economic Exclusive Zone. He also noted that aquaculture was the fastest growing sector and resources need to be channelled towards the two. The key speaker during the event; Dr. Bosire (Conservation Director- WWF Kenya Office), insisted that development was very vital to our Country and everyone has a role in ensuring sustainability in the various upcoming projects. He urged members to participate with the Country Government by transferring skills especially in issues such as spatial planning. The book on Mangroves of the Western Indian Ocean was the first and that one of its main goals was to support capacity building among the communities. He requested the researchers to get copies. KMFRI Director, Prof. James Njiru said that the book was remarkable in that Mangroves on the Ecosystem was very critical especially to the Blue Economy. He urged the researchers to work as a team and produce books which can be used as reference and equally impress the policy makers. The Directors words echoed a quote by Joyce Carol Oates, ‘The first sentence can’t be written until the final sentence is written’. Lastly, all the invited guests witnessed the signing of a Memorandum of Understanding (MOU) between KMFRI and WWF championed by Mr. Patrick Gwada to strengthen their working relations in areas of mutual interest and for the development of both Organisations. All the Organisations that had attended the launch were each awarded with an autographed book by Dr. Bosire.
<urn:uuid:afd45139-76be-4e4b-ac1b-347b5a979441>
CC-MAIN-2022-33
https://www.wiomsa.org/news/mangroves-of-the-western-indian-ocean-book-launch/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00267.warc.gz
en
0.972157
823
2
2
Sometimes it helps to employ unconventional perspectives when thinking about the size of things. So here's a pretty awesome map from Bank of America Merrill Lynch comparing major US companies to entire emerging market stock indices. The big message here is that some US companies are worth roughly the same as entire emerging markets' stock markets. Conversely , this also shows how small other countries' markets are relative to the US'. For example: Google and Amazon together are worth about $838 billion, while China's market is worth $836 billion. Meanwhile Netflix is worth $49 billion — roughly the equivalent of Poland's market. Check out the map below.
<urn:uuid:f8e3b897-8756-422e-9576-90e6234e45b1>
CC-MAIN-2017-04
http://www.businessinsider.com/map-us-companies-worth-more-other-stock-markets-2015-11
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00330-ip-10-171-10-70.ec2.internal.warc.gz
en
0.928603
130
1.703125
2
Diagnosis in Traditional Acupuncture is based on patterns of signs and symptoms. These are obtained at your initial session where a full health history is taken. The acupuncturist asks about everything from sleep patterns to bowel movements and the more detail the better. The symptoms we are interested might not issue when taken in isolation (e.g. needing to get up in the night to pass urine or catching colds easily) but taken together with other signs such as a pale tongue or a very tense feeling on the pulse they form patterns of imbalance which lead the acupuncturist to a diagnosis. So, it doesn’t matter if the issues causing concern, pain, discomfort or any other sort of distress can’t be identified as an ‘illness’ or ‘disease’ the imbalance can still be identified. Treatment is aimed at the individual and not the disease. On the other hand, even if you have been given a very specific diagnosis from your GP or specialist consultant, the acupuncturist will still want to assess that in the context of the whole of your state of health and general well being. There is a saying in Chinese medicine which states ‘Same disease, different treatments, Different diseases, one treatment’. That said, research into the effectiveness of Acupuncture is often categorised by ‘disease’. The research section of the British Acupuncture Council (BAcC) is a useful resource for finding out the latest research available on the effectiveness of acupuncture against specific conditions. How well your symptoms respond to treatment depends on factors such as how accurate the diagnosis is, how appropriate the choice of points, how well the points are stimulated by the needling and your your own bodies innate ability to heal itself given the right stimuli.
<urn:uuid:7146c32b-3dd0-4931-afac-bb17615f500b>
CC-MAIN-2022-33
https://kayhay.co.uk/unexplained-ill-health/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00071.warc.gz
en
0.938129
371
2.5625
3
Scores of dairy farm workers and activists are marching to the Ben & Jerry's factory in the Vermont town of Waterbury to protest what they say are slow negotiations to reach a deal on the so-called "Milk with Dignity" program. The march began Saturday morning at the Montpelier Statehouse, headed to the company's main factory. Proponents say the program would ensure fair pay and living conditions on farms that provide milk to Ben & Jerry's for its popular ice cream. Farmworkers and marcher Victor Diaz says it's time for the company to act. Ben & Jerry's spokesman Sean Greenwood says the company is committed to reaching a deal with workers. Ben & Jerry's gets most of its milk from 80 Vermont farms.
<urn:uuid:19dcfa4d-8d3a-41dc-89d4-a6f2ecdb5146>
CC-MAIN-2022-33
https://www.10news.com/news/u-s-world/scores-of-farm-workers-activists-marching-on-ben-jerrys-06172017
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00676.warc.gz
en
0.962671
153
1.578125
2
Less than a month before recreational marijuana hits store shelves, the Washington State Liquor Control Board is now focusing on how to keep it out of the hands of children. The board plans to issue about 20 retail marijuana licenses on July 7 and stores can officially open 24-hours later (July 8) if they have product. The first growers license was issued March 5 and it takes about three to four months to grow marijuana plants. Board Chair Sharon Foster said Tuesday all marijuana packaging will have to get approval before it can be sold to the public. She said some products spotted in Colorado stores could be attractive to children. “I don’t know that they reach the affect of Joe Camel, but some of them are close to what they name things. We’re just not going to let toys or cartoons be used on our labels,” Foster said. The board plans to approve emergency labeling requirements for edibles Wednesday before they can be sold in retail stores. Governor Inslee said a statewide campaign is aimed at keeping marijuana out of the hands of children. He’s calling for strict labeling guidelines that will include warnings about the effects. “We need to make sure in our statewide efforts that parents, marijuana producers and retailers, health professionals, educators, and others work to keep pot out of the hands of our citizens under the age of 21,” Inslee said. Not only does Inslee want to prevent children from getting their hands on marijuana, but he wants to make sure there is clear labeling to indicate the strength and serving size for all consumers. “The marijuana of today is not the marijuana of the ’60s,” Foster said. She added that an emergency room doctor reported that most marijuana-related cases involve Baby Boomers. Chief John Batiste said Tuesday the Washington State Patrol is ready to enforce DUI laws as it relates to marijuana, but added that troopers have been dealing with pot for a long time. “We’ve been a strong enforcer of folks driving under the influence and we look at this no different. We just ask that with access, people are responsible and they not expose themselves and others to the dangers that can happen on our roadways.” Batiste added there has been no major uptick in DUIs involving marijuana.
<urn:uuid:9b2b6632-a09b-41a7-94e2-fc1ad1b04e26>
CC-MAIN-2017-04
http://mynorthwest.com/20464/washington-state-focuses-on-labeling-days-before-first-marijuana-stores-open/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00163-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95978
477
1.515625
2
LJWorld.com weblogs Lawrence Weather Watch Two jetstreams phased as one If you paid much attention to the forecast over the last few days, you've likely noticed the big drop in temperatures expected later this week. That may be about the only thing that is fairly certain. It looks very likely that we will have much colder air not only move in, but settle in for the second half of the week and the weekend. In the map above, you can see how both the northern branch (the Polar Front Jetstream) and the southern branch (the Subtropical Jetstream) phase together right over Kansas later this week and into this weekend. So what does that mean? Well, very often with the phased jet, the movement of storm systems is very quick across the middle of the country. That means that any disturbances capable of producing some snow in the colder air would likely not last too long and would not be able to be projected as much in advance as usual. Because the subtle changes in the jetstream (called shortwaves) are an important driving force in the overall weather pattern, tracking these is a core aspect to weather forecasting. These fast-moving shortwaves are more difficult to discern in this pattern and we end up with much less "heads-up" for weeks like this. So here's the bottom line: With a cold weather pattern shaping up for the latter part of the week, it is likely that one of the shortwaves will provide enough lift to the area to produce some precipitation. Whether that occurs Sunday or into early next week is the bigger question that we'll have to hold off a bit longer to see how the pattern develops. This phased pattern is still in its early stages.
<urn:uuid:6771a361-ba8a-432d-966b-89753415aa8c>
CC-MAIN-2017-04
http://www2.ljworld.com/weblogs/lawrence_weather_watch/2009/dec/1/two-jetstreams-phased-one/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00221-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97234
352
2.40625
2
In this article, I would like to show you how to transform your Raspberry Media Center in a Network Attached Server (NAS) and share your media files (movies, tv-series, ebooks, music, documents, etc.) across your home network. I use this feature to browse media files, hosted on my media center, from my PC (Windows or Mac), Tablet or Phone. This is very useful to organize photos, movies, TV series, and read e-books. Before you read this article I assume: What is a NAS? According to Wikipedia, a Network Attached Server (NAS) is: a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration. NAS systems are networked appliances which contain one or more storage drives, often arranged into logical, redundant storage containers or RAID. Network-attached storage removes the responsibility of file serving from other servers on the network. They typically provide access to files using network file sharing protocols such as NFS, SMB/CIFS, or AFP. From the mid-1990s, NAS devices began gaining popularity as a convenient method of sharing files among multiple computers. Potential benefits of dedicated network-attached storage, compared to general-purpose servers also serving files, include faster data access, easier administration, and simple configuration. The NAS we are going to build, obviously, has some limitations: - It contains only one Hard Disk; - No Redundancy/RAID support exists; - Only Samba protocol will be supported. With these limitations, if your Hard Disk will be damaged you lost all your data. The reason we need to set these limitations is that NAS hardware usually has higher performance and cost more than a Raspberry card. Moreover, attach more than one Hard Disk requires more Power than the one provided by commonly used Raspberry Power Supplies. The only function we want to preserve is the sharing of data across the home network and make them accessible to heterogeneous devices (i.e. PC, Tablet, and Phones). Use Samba to share your files across your Home Network In a Home Network, files can be shared using different protocols (i.e. NFS, Samba, SSH, and so on). Our media center already supports SSH for media files sharing, but it is not suitable to browse them using native programs like Explorer for Windows or Finder for Mac. For this reason, I decided to use Samba for this purpose. Samba is available in the OSMC App Store so the installation is very easy as I’ll show you in the next section. How to Install Samba on OSMC Go on My OSMC and access to the OSMC App Store. Select the Samba (SMB) Server service to install it on OSMC. A window will be opened with information about Samba. Select the Install button. Select Apply and wait until the installation will complete. Once the message “Operations successfully completed” appear you’ve done and your Samba server is up and running. How to Configure Samba on OSMC Our goal now is to share our /media/KODI folder with all our devices in our domestic network because here is where we have all our media files (movies, TV Series, music, photos, ebooks, and so on). To do that you have to add the following lines to the /etc/samba/smb.conf file: [kodi] browsable = yes read only = no valid users = osmc path = /media/KODI comment = KODI Media To modify the file you can access the media center using ssh protocol as described in the section Access to your Raspberry via SSH with Putty and Filezilla of this article. Restart the samba service to make the changes effective using the following command. sudo service samba restart How to view your files from Windows You can now access your media files from other devices of your domestic network. If you have a Windows machine open Explorer and type the network address using hostname \\osmc.local\kodi or IP \\<your ip>\kodi. As you can notice, in the samba configuration file, you added a new section called kodi and this is the name you have to use to access the shared folder. When the system asks for credentials, insert the one for the osmc user. How to view your files from Mac To access the shared folder on Mac open Finder and click on Go->Connect to Server: Insert the address \\osmc.local or \\<your IP number> and click on Connect: Then click on Continue and select the KODI shared name: You’ll see your KODI Media Files on Mac: How to view your files from Android devices To browse files hosted on my KODI Media Center from my Android devices, I use the File Manager app. To access to remote files you can go to Menu -> Network Storage -> Network Resource and click on your OSMC system. From there you can browse your files as shown in the following photo.
<urn:uuid:8a890d7b-26ac-4902-a936-46a1292b6191>
CC-MAIN-2022-33
https://www.code4projects.net/to-transform-your-raspberry-media-center-nas/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00078.warc.gz
en
0.896478
1,094
2.109375
2
EdTech has become a business target from quite some time now. Edtech startups are being established everywhere around the world. They are set up with a purpose to bring real innovation into the developing and vitally significant education market. But, it is a fact that a large number of them are bound for failure. There are various reasons due to which they meet failure, they can be because, they’re just following the trend without having a true passion for education, they lack the business model, they lack support of their investors, they don’t engage with students and teachers much to be able to understand their basic needs and provide support accordingly. An EdTech startup can be successful if it is a sustainable company focused on improving student outcomes, empowering teachers and strives to increase the reach and efficiency of educational institutions. EdTech startups should feel positive about their success, because they are the ones who can change the face of education. Here are the success factors, which can lay down the path to success for EdTech startups: Be sustainable: Develop products and services that can survive the test of time. Your company should be there to support educators and students throughout technological changes or economic showdowns. Build expectations but be patient about them. If you’re able to sustain yourself, then you can surely find success. Serve students, teachers and institutions: Helping students should be a challenge for EdTech startups. Include direct ties to student data in your product. Teachers can show you how to build a better product and they have a large influence on the technology decisions of their institutions. Empower institutions to serve their entire community effectively, so that they adopt your product. Form Connections: Connect deeply with your customers as much as possible through one-to-one connections. Get direct feedbacks from people about the positives and negatives about your work. Have as many personal discussions as you can about how to better serve educators, how to improve your product and be attractive to institutions. Increase market knowledge: Start exploring, get to know about your potential customers and users, how you can reach them and how they want to buy and use your products. Develop strategies: To license your product as a school set, conduct the required pilots and provide evidence as to the effective working of your product. Address market needs: Educational institutions need products that meet real needs. Your product should solve specific pain-points to improve efficiency for educators. Institutions which really want to use your products will find ways to purchase, license, download and use it. Sufficient funding: Arrange for enough capital to take your startup beyond the product development phase into the business development phase. Be sure that you've secured funding for strong sales and marketing channels, which can be web-based as well, so that inputs are transformed into product revisions and be prepared to withstand the long decision making and buying cycles. Build support mechanisms: You should build scalable support for a growing number of users and devices. You should have the technology in hand to manage a lot of students with different devices and also support teachers who need professional development. Be passionate: Have leaders who are focused on company direction and can build teams that are passionate about the needs of teachers and students. Develop potential for growth: Set up major long-term goals. Partner with companies who can take your product into schools or localize your products and support them in other countries. Develop skills and form contacts to develop business partnerships that will allow growth. Encourage the development of policies for technology in schools: Majority of schools don’t have set policies which can guide them to properly utilize technology. Due to this, the use of technology is restrictive. Encourage the development of a centralized policy that governs the use of technology in schools that leads to innovation. Educate the educators: Take out the time and effort to actively show educators how your products can be utilized. Collaborate with teachers and make them realize the true potential of technology. Be innovative: There is a constant need for innovation in the industry and so it is in education. Be advanced enough to create new mindsets and ideas to solve problems. Co-exist with the traditional methods of education: Don’t try to replace the traditional education methods at large, because some of these can be replaced, but others would just need to be integrated with technology. Your technology solutions for education should co-exist with the traditional methods of teaching and learning and should focus on enhancing their quality and delivery. Now is the right time to build technology for education. New startups are bringing tremendous value to students, teachers and institutions. We should hope for such startups to succeed, so they can make a huge impact on education. If you know of any other ways to help the EdTech startups succeed, then do share with us. The Comment Box awaits you.
<urn:uuid:d229f44c-e7a5-4415-b766-f924b8567e73>
CC-MAIN-2022-33
https://edtechreview.in/news/811-path-to-success-for-edtech-startups
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00670.warc.gz
en
0.963158
982
2.09375
2
Boost My Business Brain! About the course Higher motivation, better productivity and peak professional performance are possible. By combining cutting-edge insights and proprietary research from neuroscience, bio-sciences and psychology, Dr. Brynn helps you better understand how both our own human brain as well as many workday conventions might in fact be setting us up to fail. This program busts brain myths, provides practical, usable, applied tips, tricks and tools for how to better operate your own human brain at work. Learn how to organize your day, time and mindset and override the built-in impulses that can work against us in order to feel more motivated, more productive and perform as your peak self professionally. Who should attend Managers, entrepreneurs, and business people who want to level up their productivity and performance at work. - Learn how science informs how we should structure our day, time and energy for maximum motivation and productivity - Learn how your brain really wants to work, as well as the brain-based myths and misconceptions that could be holding you back professionally - Discover new tips, tricks, and tools for overcoming procrastination and getting more done, in less time, with higher levels of vocational satisfaction and work-life balance - Develop a better sense of the role that mindset, self-messaging, subconscious narratives and mindfulness play in helping you perform at your peak in your work and career
<urn:uuid:72180711-3ccf-41c0-9bee-09c19107385b>
CC-MAIN-2022-33
https://execed.economist.com/degroote-school-business/boost-my-business-brain-2022-03-04
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00471.warc.gz
en
0.943947
288
1.65625
2
An ulcer is a pathological defect in skin or other epithelium, caused by inflammation secondary to infection, loss of blood supply, failure of venous return or cancer. Various skin lesions can cause ulcers, including infection, arterial disease, varicose veins, and skin cancer. Aphthous ulcers in the mouth are painful epithelial lesions of unknown origin. Peptic ulcers include gastric and duodenal ulcers, although the two have different causes; they may cause characteristic pain, acute hemorrhage, or lead to performation and peritonitis. Severe scarring or edema around the pylorus may cause stenosis with vomiting and stomach distension. Antacids, rest, stopping smoking, and licorice derivatives may help peptic ulcer but surgery may also be needed.
<urn:uuid:0da163ce-c729-4bf3-a5dd-fc186132494e>
CC-MAIN-2017-04
http://www.daviddarling.info/encyclopedia/U/ulcer.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00531-ip-10-171-10-70.ec2.internal.warc.gz
en
0.912977
168
3.328125
3
This is one ideals a website must have to lead the race in the merciless rivalry in the Internet based business. With such a variety of rivalry and competition going on, every strategy for promoting must be utilized and used. It doesn't make a difference in the event that you have an executioner item or a fabulously composed site, if individuals don't have the foggiest idea about that you exist, it doesn't make a difference, and you are not going to become wildly successful. More awful of all, you business could simply get murdered. While there are such a variety of techniques and plans utilized by such a variety of e-trade destinations today, there are still some of those that can help you with an additional support in the ubiquity evaluations. One of these is the supposed Viral Marketing. While the term Viral effectively delineates an infection, a word all that much feared by every PC proprietor, it is not what it appears. You don't really utilize a PC infection to spread your business; actually it might conceivably execute you. Everybody has had enough of every one of those pop up advertisements and spywares. Viral Marketing Overview Viral Marketing additionally referred to generally as Viral Advertising is a showcasing strategy used to assemble people in general attention to one's item or organization. They utilize numerous types of media to contact the general population without really advancing the item by riding on in different types of addictive implies that could get a man snared and be obliged or entertained to really pass it on, with the item or organization notice alongside it. Basically, organizations ride on the thought that if individuals like the substance of a media they will pass it on to their loved ones. They support the certain media, for example, a cool glimmer amusement, entertaining feature, interesting story and such, which one may go on to another with the organization brand or logo or the items portrayal or some other substance to help advance the organization or its item. Viral showcasing has turn into a prevalent method for advertising and advertising in light of the fact that they are moderately minimal effort. To abstain from being labeled as spam mail, viral advertising depends on the energy of one individual to pas on the item. On the off chance that a man sees the name of the individual they know as the sender, they won't square it and open it also. Numerous organizations offer motivating forces, for example, rebates and discounts when they help in spreading their viral advertising. They depend on the quantity of beneficiaries a viral showcasing gets from one individual in deciding the sum or number of impetus they can be ascribed with. Utilizing Viral Marketing further bolstering your good fortune The fundamental and chief favorable position of viral showcasing is that you get a great deal of attention and open mindfulness about your site and your organization. You get the chance to create a stream of traffic that are potential clients. With a little resourcefulness and creative energy, in addition to a few motivators or prizes, you can contact an extraordinary number of individuals and report your presence. Practically every site and organizations are getting on to the effectivity of Viral Marketing and Advertising. Not utilizing it could slaughter your business. Alongside different plans and systems in advancing your site, similar to Search Engine Optimization and such, popular advertising could undoubtedly push you ahead in the rating recreations. Viral Marketing could be a subtle approach to get individuals to think about you and your organization. You get them to pass your ad along. They are likewise minimal effort that not putting resources into it could be out and out a business suicide. All it takes is an awesome thought, a great addicting amusement, a clever story numerous thoughts are still out there. Make a tattle or a buzz, numerous films are advanced by utilizing outrages and tattles to make them moiré prominent. Keep in mind the motion picture "The Blair Witch Project"? Numerous huge organizations have attempted viral advertising and have had numerous examples of overcoming adversity with it. An excellent case is Microsoft's Hotmail. They were the first known huge organization to use the plan and it has worked miracles for them. Presently its your swing to utilize viral advertising to work ponders for you. Act now and procure the advantages Viral Marketing will accommodate you and your business figures
<urn:uuid:218a2939-228b-4311-b6b2-03104c07e309>
CC-MAIN-2016-44
http://net-anecdotes.blogspot.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00425-ip-10-171-6-4.ec2.internal.warc.gz
en
0.961397
878
1.773438
2
Using and Writing Java Servlets Point your web browser to http://localhost.localdomain/examples/servlets/, and execute any one of the examples to confirm that your installation and environment is a success. Another way is to use http://localhost:8080/. If you do experience problems, you will need to revisit the setup documentation. Unfortunately, the documentation is not very user-friendly for any of the servlet enablers I use. You also can read the various FAQs and forums available on the Apache web site and servlet enablers. Listing 1 is an example of creating a servlet. This example will generate a web page that will display a simple message. Note that a servlet extends the HttpServlet class. This is located in the Tomcat installation directory, in this instance /var/tomcat/lib/servlet.jar. When you want to generate HTML output, it is necessary to obtain the output channel with response.getWriter(). It also is necessary to set the CLASSPATH to include the full names of the .jar files, e.g., Next, compile with javac FirstServlet.java. Ensure that you are using the same JDK that Tomcat has been set up to use (as described previously). To make things simpler for the this exercise, place the generated .class files into /var/tomcat/webapps/examples/servlets (the actual configuration of Apache and Tomcat are beyond the scope of this article). To execute the servlet, open the web page at http://localhost.localdomain/examples/servlet/FirstServlet or http://localhost:8080/servlet/FirstServlet. And viola, the output seen below has been created dynamically: Hello Fellow Servlets Listing 2 not only demonstrates how to display useful information, but also shows the security concerns involved. Servlets must be written so that no input from a remote browser can give a cracker access to certain resources. Even something simple, like causing an error in the servlet, may cause the JVM to perform differently. The example generates the HTML code for a table, which a selective query populates by the output provided from a system API to retrieve certain configuration variable settings (see Listing 3). This, for instance, can be used as a template to a database query using JDBC (Java Database Connectivity). Listing 4 demonstrates how a servlet can not only generate dynamic web pages, but also process incoming data via an HTML form. To process input from a form, it is necessary for the servlet to override two functions: doGet and doPost. The doGet function always needs to be defined and forms the default behavior of the servlet and the processing of HTML form data sent via the GET method. The doPost function is used only when HTML form data is sent using the POST method, which is a more robust way than the GET method. In this example, doGet reports an error because it will be invoked only if the HTML form data was not sent with the POST method. In the doPost function, the request.getParameter calls are used to retrieve the corresponding parameter's value. Those of you who have used other CGI scripts may notice that this is a very simple and straightforward way to retrieve these values, which usually can end up being an onerous task. Listing 5 shows the HTML input form, which a servlet could also have generated. Figure 1 shows a snapshot of this form. The output reorganizes the entered data and displays it as an HTML page: Hello, your name is Polly, Molly Polly Again, this data could have been passed to a file or database. - Papa's Got a Brand New NAS - Applied Expert Systems, Inc.'s CleverView for TCP/IP on Linux - Panther MPC, Inc.'s Panther Alpha - Simplenote, Simply Awesome! - The Tiny Internet Project, Part III - GENIVI Alliance's GENIVI Vehicle Simulator - NethServer: Linux without All That Linux Stuff - Rogue Wave Software's TotalView for HPC and CodeDynamics - Jetico's BestCrypt Container Encryption for Linux - Sometimes My Office Goes with Me
<urn:uuid:f95e6982-581c-4a79-bb28-126acbb56346>
CC-MAIN-2017-04
http://www.linuxjournal.com/article/4819?page=0,1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00162-ip-10-171-10-70.ec2.internal.warc.gz
en
0.822707
889
3.171875
3
If you had forecast that Idaho’s science standards debate would make national news, score one for yourself. The Weather Channel — the cable TV home of local forecasts on the 8s — has posted an in-depth look at Idaho’s science standards controversy. A key takeaway: James Crugnale of weather.com reports that Idaho is the only state where the Legislature has removed references to climate change from science standards. Legislators in six states tried to roll back similar science standards. Texas and West Virginia did roll back their standards, but this was done by the states’ education boards, not by legislators. Last year, Idaho’s science standards committee modeled its proposal after the Next Generation Science Standards, which Crugnale calls “a framework designed to help school districts across the country.” Thirty-one states and the District of Columbia have adopted language similar to the NGSS framework. The 2017 Legislature edited the committee’s proposed wording, deleting five sections referring to climate change. The temporary and edited standards will remain in place until next year, when lawmakers revisit the issue. The State Department of Education wrapped up a series of public hearings on science standards last week, and the department will accept written comments through Wednesday. Public comments are running overwhelmingly in support of addressing climate change in the standards — but the SDE received similar comments in 2016, before lawmakers deleted references to climate change.
<urn:uuid:25bcdacf-758c-40e6-a798-190055e7f340>
CC-MAIN-2022-33
https://www.idahoednews.org/kevins-blog/weather-channel-focuses-idahos-science-standards-debate/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00468.warc.gz
en
0.950871
291
2.53125
3
Nature Conservancy president Tercek and science writer Adams explore the possibilities of the environmental movement joining with the business community to tap nature’s capital, to the betterment of both. Can activities that produce good environmental outcomes also produce good commercial results? Can the businessperson’s fundamental concerns square with the time-honored environmentalist’s belief in the natural world’s inherent value? The authors claim that there is plenty of common ground, and they provide a number of examples to make the point: Where would Coca-Cola be without a clean and plentiful supply of fresh water? This constitutes an opportunity to save habitats that “act as giant sponges,” from the high grasslands of Ecuador to the flood plains of the Mississippi River. The fishing industry can avoid the tragedy of the commons through easements, markets for trapped fish, communal fisheries and catch shares. McDonald’s has changed its purchasing policies to avoid alignment with the plunderers of the rain forest. Protecting coral reefs and planting drought-tolerant trees increases productivity while avoiding environmental degradation. Green urbanism is looking at the city system as a whole, providing green space and creating a framework for ecologically sensitive development. The authors call for long-term vision, particularly when it comes to our youth, who need encouragement and incentives to get outside and burnish their innate biophilia and sense of place. Occasionally, the authors’ optimism that business will see the long-term light may not convince skeptics appalled by the rush to frack and more deep-sea drilling, but there is no denying the opportunities available in the big picture. A hopeful message that a sensible marriage of business and environmental interests is in the cards, which until now has mostly been trumped by shortsightedness.
<urn:uuid:13e0f66c-c88d-4ba7-85f8-26194114def4>
CC-MAIN-2017-04
https://www.kirkusreviews.com/book-reviews/mark-r-tercek/natures-fortune/print/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00338-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916254
366
2.109375
2
¶ 1 Leave a comment on paragraph 1 0 The 1964 Annual Conference held at the Deauville Hotel, Miami Beach, FL, October 8–11. President Elect Clark E. Vincent was program chair. The theme of the conference was “The 1960s – Decade of the Teenager.” More than 400 people attended. The hotel conference rate was $11.50 for a double room daily. An employment service was offered in cooperation with the U.S. Employment Service.
<urn:uuid:3720f1fc-ab80-46fd-a233-6d10e00aad15>
CC-MAIN-2022-33
https://history.ncfr.org/1960-1969/1964-a-journal-name-change/annual-conference-in-1964/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00067.warc.gz
en
0.97782
99
1.554688
2
NextSpace Shows a New Way to Work In 2009, in the depth of the recession, Rebecca Brian and Jamie Capozzi both found themselves working at home, trying to keep their marketing and branding agencies afloat. They felt isolated and distracted, and as they looked around, they saw that they weren’t the only ones. “It was the year of the contractor,” says Capozzi, who calls working in 2009 the hardest experience of his life. “The workplace was changing.” So they decided to open a workspace that they and other design professionals they knew could share, and as they researched the idea—looking at similar spaces throughout the Bay Area—they decided they had a business. In the end, they persuaded Jeremy Neuner, the former economic development manager for the city of Santa Cruz, to let them open a San Francisco branch of NextSpace, a “co-working” space that Neuner had co-founded in downtown Santa Cruz in June 2008. “We realized we had a lot talent here in Santa Cruz, but it was either exported over the hill every day (to Silicon Valley) or not visible,” Neuner says. “I knew a lot of small 1- and 2-person companies, and I thought we could push that talent together in one spot and see what would happen.” NextSpace is not an incubator, its founders say—it’s a landing spot for people who are working as contractors or starting or researching their own businesses and need office space, a mailbox, business advice, or simply companionship, especially if they have trouble getting motivated enough to get out of their pajamas during the day. “Somebody might be working in their living room, with all the distractions of home, and never turn that switch to go somewhere and get in work mode,” Capozzi says. Adds Brian, “If you’re willing to spend any money at all on your business, you’re really passionate and want to make it work.” NextSpace makes money through various levels of memberships—which range from virtual access to its newsletter to a day pass to monthly use of the shared space in the middle of the room to more private office space—and events, like the magazine hack-a-thon that San Francisco State journalism students are planning in San Francisco this weekend. So far, the NextSpace community has about 260 members, with 80 percent of its businesses focusing on technology. But there are other types of companies too. There’s corporate treasure hunter Bill Neville, who looks for double invoices, missing credits and other errors in the books of big companies who may spend millions of dollars per year on procurement; ACR (acapellarecords.com), which helps a capella groups distribute their music; and a sex coach named Katherine Forsyth. Members help each other. The best example of this so far is Rally Up, a mobile social network founded by nine people who met at NextSpace in Santa Cruz while they were working on other businesses. In August, AOL acquired Rally Up and the team for an undisclosed amount of money. The San Francisco location is at 28 2nd Street, in the startup-heavy South of Market district. Neuner wants to open more NextSpace locations in the Bay Area, and, if those go well, expand across the U.S. Brian and Capozzi are helping him figure out what it is about NextSpace that can be exported. Orange, for instance, is NextSpace’s signature color, both for the furniture and the wall that members can write on when they’re brainstorming. Both NextSpace offices are in light, bright, central downtown locations, and neither is above the third floor of their buildings. “We want people to be able to see the street and feel that energy,” Brian says. Last month, NextSpace announced a relationship with WavePoint Ventures, in which NextSpace will run a mentoring program for small businesses whose founders want to learn to raise venture capital. Financial details haven’t been disclosed, but the idea is that WavePoint will have a chance to find new, interesting, out-of-the-way investments. “We think there’s a lot of distributed innovation going on—bright teams can start companies almost anywhere by plugging into the cloud and outsourcing—[and] while there’s a lot of support for business infrastructure in Silicon Valley, it’s less available in smaller markets like Santa Cruz,” says Peter Gardner, managing director of WavePoint. “This is a natural way to find new businesses, through local partners who are part of the fabric. We’re enthusiastic—we’re seeing some interesting young companies.” Trending on Xconomy By posting a comment, you agree to our terms and conditions.
<urn:uuid:92406abd-de45-4607-a50c-6e56533310e0>
CC-MAIN-2017-04
http://www.xconomy.com/san-francisco/2010/10/27/nextspace-shows-a-new-way-to-work/?single_page=true
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00163-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963573
1,025
1.5
2
By Richard Eckersley, first published at On Line Opinion on 4 September 2015 Yet a new study suggests that many people think that we are taking risks of this magnitude with our future as a civilisation or a species. The study found most Australians (53%) believe there is a 50% or greater chance our way of life will end within the next 100 years, and a quarter (24%) that humans will be wiped out. These are surprisingly high estimates; no person or organization would accept or choose this level of risk, given the stakes. When asked about different responses to these threats, 75% of the Australians surveyed agreed 'we need to transform our worldview and way of life if we are to create a better future for the world' (an 'activist' response); 44% agreed that 'the world's future looks grim so we have to focus on looking after ourselves and those we love' (nihilism); and 33% agreed that 'we are facing a final conflict between good and evil in the world' (fundamentalism). findings strip the ground from under the largely 'business as usual' strategies that dominate political thinking. Concerns about the world's future barely register in our politics; our political leaders proclaim constantly that Australia is a great nation with a great future. This tension may contribute more than politicians and political pundits suspect to the current mood of political disillusion and cynicism. Melanie Randle, of the Faculty of Business at the University of Wollongong, and I co-authored the study, recently published online in the journal Futures. The study involved a survey of over 2,000 people in Australia, US, UK and Canada. Findings were similar across countries, age, sex and other demographic groups, although some interesting differences emerged. More Americans rated high the risk of humans being wiped out (30%), and that humanity faces a final conflict between good and evil (47%) - reflecting the strength in the US of Christian fundamentalism and its belief in the 'end time' and a coming Apocalypse. Such beliefs can influence national politics; some commentators thought they shaped President There is mounting scientific evidence and concern that humanity faces a defining moment in history, a time when it must address growing adversities, or suffer grave consequences. Reputable journals are canvassing the possibilities; the new study will be published in a special issue of Futures on 'Confronting catastrophic threats to humanity'. Most focus today is on climate change and its many, potentially catastrophic, impacts; other threats include depletion and degradation of natural resources and ecosystems; continuing world population growth; disease pandemics; global economic collapse; nuclear and biological war and terrorism; and runaway technological change. Not surprisingly, surveys reveal widespread public pessimism about the future of the world, at least in Western countries, including a common perception of declining quality of life, or that future generations will be worse off. However, there appears to have been little research into people's perceptions of how dire humanity's predicament is, including the risk of the collapse of civilisation or human extinction. These perceptions have a significant bearing on how societies, and humanity as a whole, deal with potentially catastrophic responses in our study do not necessarily represent considered assessments of the specific risks. Rather, they are likely to be an expression of a more general uncertainty and fear, a loss of faith in a future constructed around notions of material progress, economic growth and scientific and technological fixes to the challenges we face. This loss is important, yet hardly registers in current debate and discussion. We have yet to understand its full implications. At best, the high perception of risk and the strong endorsement of transformational change could drive a much greater effort to confront global threats. At worst, with a loss of hope, fear of a catastrophic future erodes people's faith in society, affecting their roles and responsibilities, and their relationship to social institutions, especially government. It can deny us a social ideal to believe in - something to convince us to subordinate our own individual interests to a higher social purpose. There is a deeply mythic dimension to this situation. Humans have always been susceptible to apocalyptic visions, especially in times of rapid change; and we need utopian ideals to inspire us. Our visions of the future are woven into the stories we create to make sense and meaning of our lives, to link us to a broader social or collective narrative. Historians and futurists have emphasised the importance of confidence and optimism to the health of civilisations and, conversely, the dangers of cynicism and disillusion. Despite increasing political action on specific issues like climate change, globally the scale of our response falls far short of matching the magnitude of the threats, as the study findings imply. Closing this gap requires a deeper understanding of how people perceive the risks and how they might respond. Offering false hope is not the solution; to address the challenges we must first acknowledged them. On the evidence, the far future is drawing closer - and it worries us.
<urn:uuid:5c4e86a1-9a2c-4baa-89e5-a428d9669afb>
CC-MAIN-2017-04
http://www.climatecodered.org/2015/09/why-we-need-politics-of-far-future.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00240-ip-10-171-10-70.ec2.internal.warc.gz
en
0.922863
1,104
2.265625
2
By Jonathan Kimak This is probably the most stylish gadget charger I’ve ever seen. For those of you who remember high school biology you will know that photosynthesis is the process by which a plant converts sunlight into sugar(energy) that will be used by the plant for other essential functions. This gadget charger concept does the same. The Solar Cell Tree Charger, designed by Vivien Muller, powers itself via 54 photovoltaic cells that, like other solar cells, get charged by the sun. The energy is stored in a battery and can connect to all your gadgets and charge them up. All the wires are hidden in the bottom tray to keep clutter to a minimum. All of the branches are adjustable so that you can customize your tree for either artistic reasons or to maximize the amount of cells that are exposed to the sunlight. While it is still just a concept it is one that I’d like to see make it to the market.
<urn:uuid:b58a2d1c-bb44-4548-96a1-0ff1bfda3bb2>
CC-MAIN-2017-04
http://www.ohgizmo.com/2008/09/01/photosynthesizing-gadget-charger/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00304-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951595
196
2.328125
2
First Edition. Early romance novel written under the pen name of Kathryn Culver by Davis Dresser, who wrote the Mike Shayne mysteries under the pseudonym Brett Halliday. "For thirty days Janet moved as an equal among the wealth, fame, and beauty of the social world in the exotic setting of America's winter playground. Two thousand dollars for clothes! One hundred dollars a day for expenses! Janet knew the old saying: 'Them as has, gets.' And for thirty days Janet was going to be one of those 'as has'". Very scarce. Very Good, spine modestly faded, some shelf wear, in Near Fine or Fine dustjacket that was preserved separate from the book.
<urn:uuid:debb6bd0-1238-4fd9-8650-974ca20e53a4>
CC-MAIN-2022-33
https://www.yesterdaysgallery.com/pages/books/25084/kathryn-culver-pseudonym-davis-dresser-brett-halliday/too-smart-for-love
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00678.warc.gz
en
0.951457
148
1.5625
2
Looking for things to do with your parents in assisted living? Finding activities to do together can be challenging if their mobility has been on the decline, but crafting is something almost everyone can do, which is why we’ve put together this list of crafty ideas you can implement with your loved ones in assisted living. As a bonus, kids love to do crafts, too, making this a great opportunity for your kids to bond with their grandparents. Scrapbooks are one of the best crafts you can make with loved ones in assisted living. Just about everyone who has been lucky enough to live to a ripe old age has collected a significant number of photos, and scrapbooks are a great way to go through those photos and compile them into a colorful book that can be treasured forever. Visual cues (like photos) are also great at stimulating memories for those suffering from dementia or Alzheimer’s, making it a particularly great exercise to do with aging parents. Ask them about the stories behind the photos and you’ll end up learning how much you never knew about your own parents. Painting is another great way to get your loved ones to strengthen those fine motor skills while expressing themselves in a way that’s fun and colorful. You can go the traditional route of painting paper or canvas, or you can paint anything from rocks to clay pots. Painted rocks make great garden markers and painted clay pots can hold anything from plants to valuable items. Either way, it’s something they can keep that will always remind them of the time they spent crafting with you. Get some seashells, some googly eyes, and some glue and you and your loved ones are ready to make a whole school of fish. You can arrange them within a frame to make a decorative arrangement, or keep them separate from each other so each of you can take one or two fish home with you as a memento of the experience. Bath salts are remarkably easy to make. You just mix some Epsom salts together with baking soda and a few drops of the essential oil of your choice. You can add coloring if you want, just as long as you make sure whatever coloring you use is safe for bath and body products. Put it all in a mason jar, and then you can keep the crafting going by decorating the mason jar. This way, everyone will have something to take home with them that will ensure they enjoy their next bath to the fullest. Have a lot of loose buttons lying around? You can assemble them together into a button doll using just some wire, a few beads, some wire cutters, and a pair of pliers. For extra points, you can even paint a face onto your doll if you’re confident you have the dexterity and talent to accomplish that much detail. At Stillwater Senior Living, we offer a variety of social and recreational activities residents can do with their families and with each other. Our goal is to keep them as active as possible – both mentally and physically – and crafts are just one way we accomplish that. Reach out now if you’re curious about the other ways we keep our residents happy and healthy. Here at Stillwater Senior Living, we treat our residents like family. Our apartments include studio, one bedroom, and two bedroom suites, and we are pet friendly. They are designed with security features, maximum accessibility, and include walk-out patois with a full range of amenities for the entire family. CONTACT US today for more information and a tour of our beautiful state-of-the-art community.
<urn:uuid:57726c94-7454-4208-8a4a-fd40109657b6>
CC-MAIN-2022-33
https://stillwaterseniorliving.com/tag/craft-ideas-for-assisted-living/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00476.warc.gz
en
0.963629
753
1.789063
2
Apartments & Villas |The delights of Spain| The average construction price of a Spanish property ranges from € 700 to € 900 per m2. It is entirely possible to spend more or less than this although these figures are an accurate reflection of the cost/quality balance that most are seeking. Usually the quality of the primary components (structural, services and general installation) does not greatly influence the building cost. However, secondary components (building finishes, special details and decorative elements) do cause substantial price variation. Typically, owners tend to spend an additional 25% to 50% of the amount spent on internal spaces on the immediate environs of the house. For a new build project on a rural site, it is only necessary to add the cost of site conditioning and the introduction of service installation (drinking water and electricity). Below is an example of costs based on a 150m2 house and using an average € 800/m2 construction rate. Home construction (150m2 x € 800) = € 120,000 The surroundings (35% of the house cost) 35% x € 120,000 = € 42,000 Total cost = €162,000 Total project costs for building restoration are in keeping with new build costs. Restoration costs are typically lower than new build costs by approximately the cost of acquiring the initial property. The example below is based on € 500/m2. Initial purchase of a 150m2 house with courtyard = € 62,000 Restoration costs of home (150m2 x € 500) = € 75,000 External spaces @ 35% of amount spent on home = € 25,000 Total Cost = € 162,000 Where does the money go? Typically the client instructs an architect and/or project manager to control works and an accountant to make payments. Contracts are usually held by principal contractors who, in turn, subcontract and add attendance and profit to both subcontracted works and special materials. Based on a nominal € 100 spend on actual works (things you can touch or use), a standard cost breakdown would be as follows; 1. Contractor's Labour € 30 2. Contractor's Materials € 10 3. Contractor's Specialist Materials € 20 4. Sub-Contractor's Labour and Materials € 40 Sub Total € 100 Contractor's attendance & profit on items 3 & 4 @ 17.5% €10.50 Architect, Project Manager, Quantity surveyor, Accountant @ 9% € 9.95 Grand Total € 120.45 It is possible to reduce this 20% overhead to somewhere in the region of 10% to 15% by careful selection of the primary contractor and reducing the amount of subcontracted works. Estimating project timescales and phasing The average design and construction project, from the moment the architects and technicians start work until the moving in day, is approximately one year which can be broken down into the phases below. This time frame can be extended by the client by creating pauses between phases and even staging the construction works though this usually leads to additional cost. 3 months - Design and cost estimation. On occasions this period may take longer if the client chooses to have specialist details, which needs more time on the design phase or preliminary feasibility studies. 2 months - Planning Permission, Building Regulations and Contracts. The tendering process will select appropriate contractors who can construct the building at the agreed cost and time, whilst maintaining the specified quality. 7 months - Construction. This period is dependent upon the complexity of the site and the building as well as the size. Penalty clause contracts are available with appropriate additional costs. Architectural styles in Southern Spain The province of Granada has a large stock of Moorish buildings dating back to the Arabic period. The Neo-Moorish style wealthier house normally has a central courtyard with water features or a pool to allow natural cooling in the summer, a landscaped garden filled with fruit trees, natural herbs and flowers. The south of Spain is rich in local handmade ceramics such as tiles and pottery which enhance the Mediterranean and Moorish style and provide a sense of pleasure and tranquillity when mixed with water features. Village architecture is of a more modest nature, typical of additive architecture with rooms added over time as need required and resulting in a charming though somewhat anarchic collection of spaces typified by beamed ceilings, thick earth or stone walls, small windows and white lime washed or vividly coloured walls. When starting from scratch or reworking an existing building, the choice must be made of maintaining these architectural traditions or evolving them into a style and content more appropriate to 21st Century living. Both can be valid approaches. More information may be found at Kyero - Spanish property you'll love © Copyright 2004 by SearchIberia.com & Kyero Top of Page Apartments & Villas
<urn:uuid:4d10ccc2-9970-4405-bf13-0be99bf1f8db>
CC-MAIN-2017-04
http://www.searchiberia.com/articles/publish/article_21.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00408-ip-10-171-10-70.ec2.internal.warc.gz
en
0.926651
1,008
1.648438
2
A 14-year-old girl is living out her summer dreams after choosing hospice over surgery and telling her mother that she is ready to die. Jerika Bolen, who has Spinal Muscular Atrophy Type 2— which is often fatal for patients in adolescence— is in constant chronic pain, the Post-Crescent reported. “When I decided, I felt extremely happy and sad at the same time,” Bolen, of Appleton, Wisc., told Post-Crescent. “There were a lot of tears, but then I realized I’m going to be in a better place, and I’m not going to be in this terrible pain. I’ve been working on it and thinking about it for way longer than anyone else has.” Bolen uses a power wheelchair and has control over her brain, eyes, nose and mouth but has trouble swallowing. She has slight control over her hands and arms but relies on constant care for everything else and uses a ventilator to breathe for 12 hours per day. She’s had more than 30 surgeries since being diagnosed at just eight months old, with her muscles further deteriorating after each procedure. The medication she takes to keep the pain at a level 8 out of 10 has also damaged her body, the Post-Crescent reported. At the end of August, Jerika has instructed her mother, Jen Bolen, to pull the plug on the ventilator. Neither know how long it will be before she dies, but Jen hopes that it’s not too many days. She told the Post-Crescent that she has had to explain the difference between assisted suicide and her daughter’s decision to many people. Bolen’s doctor, Kari Stampfli, director of the pediatric palliative care program for UW Health in Madison, told the news site that for patients with spinal muscular atrophy the standard of care is often comfort measures from the beginning and that there’s always the option to stop if it isn’t offering an improved quality of life. “If she’s at peace with it, I have to find a way to make peace with it,” Jen told the Post-Crescent. “I know she’s only 14, but she’s old enough to decide. It’s her body and it’s her pain.” For now, Jen is focused on spending the summer fulfilling her daughter’s wishes, which include trips to the movies, fireworks with her grandparents, sleepovers with friends and a community-wide prom. Appleton’s Grand Meridian will host the event July 22, and Bolen has chosen a green-blue dress for the dance, according to the report. “I’m super happy,” she told the Post-Crescent. “And I don’t have to think about anything bad at the moment.” Bolen told the Post-Crescent that she was ready to choose hospice after a surgery last year made her pain worse. “After that surgery – it didn’t work and my pain got worse – I kind of sat down and thought, ‘Am I doing this for me or for my family?’ I kind of realized I was doing it for my family,” she told the news site. Bolen has asked that after she dies people check in on her mother like “a baby,” to make sure she is eating, sleeping and getting out of the house. She told the Post-Crescent she knows her decision will leave her loved ones reeling but that she also knows it’s the right one. “I try to be as happy as possible,” Bolen told the Post-Crescent. “I know I can’t always be happy every day. I still wonder why God picked me to have this disease and I know I can never know the reason. Maybe because I’m strong, I guess.”
<urn:uuid:2d38b257-227b-43ee-9092-518b533d3495>
CC-MAIN-2022-33
https://childnervoussystem.blogspot.com/2016/07/when-i-decided-i-felt-extremely-happy.html?showComment=1470074596412
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00668.warc.gz
en
0.968799
893
1.851563
2
Vehicle Code in Montana Montana Motor Vehicle Code If you are looking for specific information about Montana Department of Justice procedures, driver's licensing rules, vehicle regulations, or traffic laws, the Montana motor vehicle statutes can be a good place to turn. If you've recently received a traffic ticket, you can look up the exact language of the law you violated to determine if you have any grounds to fight the citation. On this page you'll find information about accessing the motor vehicle codes, links to common chapters, and links to other related topics. While the motor vehicle code can serve as a great starting point, you may want to contact the Montana DOJ for specific information, or a lawyer if you need legal advice. Access the Montana Vehicle Code Upon first appearance, the Montana Vehicle Code resembles a colossal monument to legal-speak, but after paging through it you will quickly realize that it's a gold mine of information. Every driving rule and regulation is explained in categorical detail under Title 61. Important MT Vehicle Code Chapters There are several chapters devoted of the vehicle code dedicated to driving, vehicle, and traffic statutes. Below is a sample of some of the chapters and topics that are covered. The highway safety chapter includes information about topics such as: - Driver rehabilitation and driver improvement programs. - Vehicle equipment safety and regulations. - County drinking and driving prevention programs. The driver's license chapter includes information about topics such as: - Residency requirements. - Providing information to the Selective Service. - Motorcycle endorsements and testing requirements. - Driver's licensing processes and procedures. The vehicle equipment chapter covers information including: - Maintenance of brakes. - Muffler noise regulations. - Headlamp requirements. - Required safety equipment. - Exemptions for certain vehicles. The titles, registrations, and taxation chapter includes information on: - Lost title and registration certificates. - Vehicle identification numbers (VIN). - Boat registration. The traffic regulations chapter gets into Montana traffic laws, such as: - No-passing zone violations. - Driving under the influence (DUI) of drugs/alcohol. - Use of radars. - Reckless driving. - Special speed zones. - Hand signals. Check Your MT Driver's License Status Whenever you need or want to check the status of your Montana driver's license, you can order a driving record report. This record will spell out if your driver's license is currently valid. If your driver's license was revoked or suspended, the report will indicate that according to what's on record with the Montana Department of Justice (DOJ). This report will also show points against your driver's license and, in some cases, information on any accidents you have had. It's important to remember that too many traffic tickets for minor violations and certain major traffic violations can result in the Montana Department of Justice taking action against your driver's license. You may face: - A driver's license suspension, revocation, or cancellation. - Reinstatement fees and requirements. - Driving restrictions. - Defensive driving program requirements. You may also face higher car insurance rates after receiving a ticket. If your rates have increased, you can contact your insurance provider to ask about discount opportunities or you can shop around for a new car insurance policy. For more information on some related topics, please visit our pages on:
<urn:uuid:d15fa63e-6c25-413d-9c67-b1bd06c543df>
CC-MAIN-2017-04
http://www.dmv.org/mt-montana/automotive-law/vehicle-code.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00202-ip-10-171-10-70.ec2.internal.warc.gz
en
0.894579
709
2.015625
2
By Rod Myers, Naturalist Wetlands are shrinking internationally, nationally and locally due to mans disturbances. This fact hit home for me in an unusual way. Two swamp sparrows showed up beneath my bird feeder at the end of March. They also took advantage of my native habitat yard restoration and hung out in the pond area and other small assorted created wetland areas connected with the pond. The swamp sparrow, Melospiza Georgiana, is a Northeastern and Midwestern bird that you can find as far north as mid-Canada, but you wont find it as far south as southern Illinois during breeding season. Ive seen swamp sparrows in the yard during spring and fall migration, but these two stayed for a week. Actually, ones still here, and hes claimed the area in my yard restoration, and he sings to announce his territory. In fact, he lets me know if he thinks Im out on the patio too much; thats when hell start giving his warning call. Ive had a couple other birders come to the yard to see him, and theyre amazed hes set up territory. The restoration is small, said Scott Caring. Im not sure of the exact size requirement, but its usually much bigger than this. Scott nearly stepped on the bird, not knowing it was hunkered down in clumps of sedge that bordered his trek to see a hole a fox had made in the yard trying to dig up a rodent two nights before. As I write sitting on the patio, the swamp sparrow flies into the pussy willow momentarily, then down into the dead grass sedge clumps. Hes tolerating me; so far, no warning call. Oh, now hes in the cord grass; hes heading for the spillage under the bird feeder. A grackle on the feeder is causing a seed rain and stabbing wildly with its beak at the house sparrows that land too close to him. For the most part, birds are changing their behavior when dealing with habitat destruction and having to forcibly share their altered habitats with more and more people, said Caring. A swamp sparrow setting up territory in a wetland this small is unheard of. Another example is the state endangered clay-colored sparrows that nested in fir trees in the Bank One parking lot at State and Mulford back in the 90s. These are Rockford examples of birds being squeezed by greedy developers whove destroyed more wetlands regionally than the last glacier created regionally. Plant it and they will come! This is a truism that rarely fails. Im amazed by the diversity of wildlife attracted to my yard. This spring, another swamp thing has been slowing upa red-winged blackbird, but hes semi-regular; he hasnt set up shop yet. During the second week of April on a warm, clear dusk, a woodcock dropped from the heavens to drink from the pond. It was the first time Ive ever seen one in the yard. There was a chance that April 10 could have been the swamp sparrows last day in my yard. Thats the day Don Miller of Severson Dells Environmental Education Center and Kevin Kaltenbach, a driver for Federal Express, cleaned 90 percent of my yard restoration. First, Kevin weed-whipped the old growth; after that, he and Don raked the cuttings. Then Don mowed what was left; then they both raked again, leaving a huge pile of prairie savanna and wetland brown hay. This is great for sun-loving native plants that lay dormant during the cold season and now are ready to send up fresh greenery. Removing the thatch lets the soil heat up and helps desiccate cold-loving aliens that tolerate thatch shade. Prairie and savanna plants love the sun and warm soil, while thatch shade as well as other types of shade suppress them. Don and Kevins actions were good for the plants, but it destroyed cover, removed leftover seeds and insects in larva and egg stages, all used or eaten by wildlife. I must admit the old growth looked mighty good before it was cut. The sun was really bleaching the plants; it was like a years growth of long, beautiful hair turned blond by 50 spring suns. This was an exceptional year; with the lack of average snow, the native plants escaped the usual compaction. I admit I was depressed after the prairie cut. That huge pile of golden thatch looked too much like a pile of my golden hair left on the barbers floor in springs gone by. It could have been my attractive blond restoration that convinced the swamp sparrow to stay. On April 10, though, I seriously thought the buzz meant bye-bye, swamp birdie. I thought for sure the next morning hed be gone. The boys only left the immediate growth around the wetland area, just as Id asked. Well, they are a wetland bird, said a friend on the phone the next morning as I watched for a glimpse of swamp thing. But its so small, I said. But size didnt matter to the swamp sparrow because he showed himself at 8:13, and hes been here every day since. He has a lot of interspecies competition in that small wetland area the swamp sparrow calls his own. A pair of mallards dabble in and around the pond seven days a week. Mud-robbing robins are probing about, gathering the foundation of the nests. There is a large sedge clump we transplanted last year in a shallow pond that wasnt stuck in deep enough. It looked like a huge mudball with grass growing out the top. The robins have stolen most of the mud from the ball, so now it looks like an eaten apple with just the core showing, and in this case, having a grassy moptop where the apple stem would be. The swamp sparrow and the ducks seems pleased with all the mud in the yard wetland. Swamp sparrows have flatter beaks than most sparrows and like to probe in mud. Studies have shown they eat more arthropods than seeds. Studies have also shown that swamp sparrows will set up postage stamp-sized territories if they are in excellent habitat, and only if they are crowded by other swamp sparrows. I think my yard restoration has helped answer two questions this spring. Yes, habitat destruction is forcing wildlife to breed in unusual places. And yes, blond restorations have more fun. Rod Myers is a local resident with an interest in the environment and disability issues. He has an associates degree in science and a bachelors in fine arts. Rod is a member of the Audubon Society, the Wild Ones Natural Landscapers and Rockford Amateur Astronomers, Inc.
<urn:uuid:65bbd7cf-68ec-48e8-a51e-926a38e3028b>
CC-MAIN-2017-04
http://rockrivertimes.com/1993/07/01/squeezed/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00294-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96904
1,398
2.421875
2
Rating is available when the video has been rented. This feature is not available right now. Please try again later. Uploaded on Jun 28, 2011 Mary Bercaw Edwards spent three and a half years of her childhood at sea, sailing around the world with her family. Now one of the world's foremost scholars of Herman Melville, the associate professor of English in the College of Liberal Arts and Sciences spends her school years teaching and doing research on the Avery Point campus. But during the summer, she goes back in time -- to Mystic Seaport, where she works on ships like those Melville himself would have walked. Join her as she shows us "the ropes" of the whale ships from the turn of the century.
<urn:uuid:d6e34e90-2824-4d78-8ed8-379260335086>
CC-MAIN-2017-04
https://www.youtube.com/watch?v=M1xRLxrsofA&feature=player_embedded
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00339-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974565
150
1.929688
2
How many yards of yarn do I need for a hat on a loom? How much yarn do I need to make a ____? |Yarn Weight 1||Yarn Weight 6| |Hat||250-325 Yards||125-150 Yards| |Scarf||525-825 Yards||250-375 Yards| |Socks||350-500 Yards||200-250 Yards| |Shawl||550-850 Yards||350-475 Yards| How much yarn is needed for a hat? For both knit and crochet, the general rule of thumb is that a typical 100g skein of yarn will safely make you a hat. What weight of yarn is best for loom knitting? Medium (4) yarn is the most popular weight for knitting. How much yarn do I need to loom knit a scarf? The scarves shown in this instructable are made on 15 pegs and are 40-50 inches of knitting long. If you choose to use variegated yarn, you’ll have just enough for the scarf with two skeins – around 130 yards of yarn. What size loom should I use for a hat? Loom Size / Hat Size |Hat Recipient||Avg Head Circumference||Loom Size| |Toddler||21 in / 53 cm||Lrg 36 Pegs| |Tweens & Teens||22 in / 56 cm||Lrg 36 Pegs| |Women & Lean Men||22 in / 56 cm||Lrg 36 Pegs| |Lrg Women & Men||24 in / 61 cm||X-Lrg 41 Pegs| How much yarn do I need for a slouchy hat? It takes just one skein of yarn to make this hat. Is cotton yarn good for hats? If you want to knit something a little lighter for spring, but still washable, cotton or linen are both great choices. The fiber content is mostly dependent on the season for which you’re knitting. Avoid anything too hairy or novelty yarns so you don’t drown out the fair isle design. How do I figure out how much yarn I need? How much yarn do you have? - Multiply the number of yards or meters in a full skein (on the yarn’s label) by the weight of the partial skein (use a scale to measure this). - Take that number and divide it by the weight of the full skein (on the yarn’s label). What kind of yarn do you use for loom? Cotton yarn is the best yarn for warping a loom since it’s both affordable and very durable. Don’t use stretchy yarn like wool for the warp, since your weave will shrink once you take it off the loom. Experienced weavers may also experiment with other yarns to create interesting designs. What yarn do I use on a loom? Use fine/fingering sock yarn. The Sock Loom Original, a fine gauge loom knits with a gauge of approx 7 stitches per inch, 5/8” spacing between pegs. Use DK weight sock yarn. The Sock Loom 2, a regular gauge loom, knits with a gauge of approx 5 stitches per inch. How many balls of yarn does it take to make a scarf? You may need approx. 5 or 6 50g balls of wool to make your scarf. You can choose any colour wool, even a multicolour wool. What can I knit with 1 skein of yarn? One Skein Knitting Patterns - Washcloths. A washcloth is one of the most basic ways to use up a small amount of yarn. … - Hats. Who doesn’t love hats? … - Bags. Small knitted bags, pouches, phone cases are another way to use those single skeins. … - Fingerless Mitts and Cuffs. … - Cowls and Shawls. … - Toys. … - One skein books. How many balls of yarn do I need for a sweater? Estimating How Much Yarn to Buy |Yarn Weight Category||Stitches per Inch||Yards Needed for an Adult Sweater| |2 Fine||6 to 7||1,200 to 2,500| |3 Light||5 to 6||1,000 to 2,000| |4 Medium||4 to 5||800 to 1,500| |5 Bulky||3 to 4||600 to 1,200|
<urn:uuid:f0bb23b1-19c7-4baa-a282-0e1a8ae12f64>
CC-MAIN-2022-33
https://puntadasdemoda.com/needlewomen/how-much-yarn-do-i-need-to-loom-knit-a-hat.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00076.warc.gz
en
0.859313
977
1.828125
2
The Spartacus Slap Click on our logo for all the best Panther Latin products! All proceeds support our Latin Club. Sicut enim maius est illuminare quam lucere solum, ita maius est contemplata aliis tradere quam solum contemplari. (St. Thomas Aquinas, Summa Theologiae 2-2, ques. 188, art. 6) "For just as it is greater to illuminate than merely to shine, so it is greater to share with other what one has contemplated than merely to contemplate." Indagatio ipsa rerum cum maximarum tum etiam occultissimarum habet oblectationem. Si vero aliquid occurrit, quod veri simile videatur, humanissima completur animus voluptate. (Cicero, Academica II.XLI.127) "The investigation itself of very important and at the same time quite obscure matters holds pleasure. If indeed it happens that something like the truth is discovered, one's spirit is filled with a most human pleasure." (Aristotle, Nicomachean Ethics 1104b) [W]e ought to have been brought up in a particular way from our very youth, as Plato says, so as both to delight in and to be pained by the things that we ought; this is the right education. (David Ross, translator) Those last three days, reciting from memory Cicero and Vergil, you could quote Long passages of Latin poetry. It left us stunned. The only antidote To poison in your flesh was blessed words. No other good thing comforted you when Pulsating life, just like a flock of birds, Gathered its wings to fly. The deaths of men Can be as silent as the moon's eclipse, Spectrally speechless as fields after battle, Loud as the riven sky's apocalypse With thundering noise--or mindless as a rattle. Benson, your answer to encroaching dark Was lustrous language, flaring like a spark.
<urn:uuid:4420b9bd-fc1f-43c4-8012-a0cef214af8a>
CC-MAIN-2017-04
http://nclatin.org/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00383-ip-10-171-10-70.ec2.internal.warc.gz
en
0.895854
450
1.585938
2
In today’s highly competitive business environment, inexpensive digital advertising can be the difference between a small business that thrives and one that falters. Government restrictions on data usage could make advertising less nimble, less effective and more expensive. This threatens the ability of small business owners to attract new customers and build their company. Small businesses with access to data and digital tools earn twice the revenue and are three times as likely to create jobs. Reducing access to digital platforms by increasing the price point of compliance poses exceptional risk to small businesses working hard to grow and succeed.
<urn:uuid:8b540a72-4d1b-4469-a2f2-19be63cd37ba>
CC-MAIN-2022-33
https://connectedcouncil.org/issues/data-and-advertising-restrictions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00074.warc.gz
en
0.962729
115
1.773438
2
The Marmara Taksim Hotel has been allocated four floors for our health workers to stay in. One room was left empty to minimize primary transmission between the rooms to be used (droplet infection isolation method) All rooms were arranged to accommodate single occupancy. All non-essential plastic and cardboard materials in the rooms were collected in consideration of the long stay time of the virus in cardboard and plastic materials and within the scope of the knowledge that each material in the environment may be a separate source of infection. Materials such as towels and sheets to be used in the rooms are kept ready for use in packages. Carpet known as a major source of contamination has been removed from the rooms. All surfaces in the room, from the kettle handle to the couch surface, have been disinfected with antiviral disinfectant for a duration of 4 weeks. Chlorinated surface cleaners and alcohol-based disinfectants were used for daily cleaning and disinfection of bathrooms. It is planned to apply ozone for a period of 2 hours 15 minutes to dispose of microparticles suspended in the air in floor corridors. In all rooms and in all general usage areas of our hotel, a silver ion disinfection application has been made which is lasting between 3 and 6 months. The room cleaning instructions were revised and the rooms were ventilated for 1 hour before cleaning, 15 minutes after ozone application, and the steps were applied. The materials in the minibar have been replaced with disposable products. The attendant working on the floor works with overalls-gloves-mask-protective glasses, boots if necessary. Housekeeper cart and cleaning equipment were furnished only with daily consumables (Boucle material-Paper Group) and permanent disinfection was applied. Permanent disinfection has been applied to the underside of the shoes of all floor attendants and is repeated frequently due to wear time. A room close to the service area on each floor was allocated for the use of the floor attendant and all materials to be used were stored in this area. At the end of work, the housekeeper meets personal hygiene requirements such as shower, uniform change and moves to other areas of the hotel. The Textile Group (single bed linen and towel group, duvet cover, pillow cover) which will be needed in a room is kept in separate bags and taken as a package and entered into the room cleaning. Newspapers, magazines, plastic products and promotional brochures were removed in the hotel's public areas. All chair, sofa and carpet groups after steam cleaning application was made permanent antiviral disinfection. Hand sanitizers were placed in the personnel usage areas, mask-gloves were distributed and usage trainings were given. Elevators, escalators, stairs and their call buttons-straps etc. areas such as where hand contact would be intense were disinfected and renewal frequency was determined according to usage rates. All parts of the X-ray device in the entrance area of the hotel that come into contact with the guest goods have been turned off and subjected to permanent disinfection application one by one, reducing the risk of cross contamination. Hygiene mats were applied at the entrance of the hotel's staff and guests. In all general area WCs, after chlorine and alcohol based cleaning, permanent disinfection application was made, daily detail cleaning is done with steam, while Intermediate maintenance is done with alcohol based decontamination and chlorine based cleaning product. Soap disinfectant used was replaced with a higher ratio product. A separate counter is placed in front of the reception area (in front of each screen) and special areas were created to be used for works such as signature of the guests etc. and protective distance was determined between the receptionists and the receptionists. Daily/detail cleaning and disinfection applied in all guest communal areas were applied with the same shapes and products in all rear areas. Sign up and receive exclusive offers from The Marmara Collection The hotel grounds are gorgeous, with spectacular views from the pool and the terrace restaurant. Our room had an enormous balcony with breathtaking views.
<urn:uuid:4062db4a-df2a-465a-abbb-ec814ed89dcd>
CC-MAIN-2022-33
https://www.themarmarahotels.com/en/covid-19/because-we-care
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00074.warc.gz
en
0.975245
843
1.554688
2
- Why NumPy are preferred most over lists in Python? - What is difference between NumPy and pandas? - Is NumPy written in Python? - Is NumPy a package or module? - Which is faster array or list? - What is NumPy and how is it better than a list in Python? - Which is faster NumPy array or list? - Why are NumPy arrays used over lists? - Why is pandas NumPy faster than pure Python? - What is NumPy good for? - Why NumPy is used in machine learning? - When should I use NumPy? - Why SciPy is used in Python? - Why do we use pandas? - Are NumPy arrays lists? Why NumPy are preferred most over lists in Python? NumPy uses much less memory to store data The NumPy arrays takes significantly less amount of memory as compared to python lists. It also provides a mechanism of specifying the data types of the contents, which allows further optimisation of the code. If this difference seems intimidating then prepare to have more.. What is difference between NumPy and pandas? The Pandas module mainly works with the tabular data, whereas the NumPy module works with the numerical data. The Pandas provides some sets of powerful tools like DataFrame and Series that mainly used for analyzing the data, whereas in NumPy module offers a powerful object called Array. Is NumPy written in Python? NumPy is written in C, and executes very quickly as a result. By comparison, Python is a dynamic language that is interpreted by the CPython interpreter, converted to bytecode, and executed. … Python loops are slower than C loops. Is NumPy a package or module? NumPy is a module for Python. The name is an acronym for “Numeric Python” or “Numerical Python”. … Furthermore, NumPy enriches the programming language Python with powerful data structures, implementing multi-dimensional arrays and matrices. Which is faster array or list? Array is faster and that is because ArrayList uses a fixed amount of array. However when you add an element to the ArrayList and it overflows. It creates a new Array and copies every element from the old one to the new one. … However because ArrayList uses an Array is faster to search O(1) in it than normal lists O(n). What is NumPy and how is it better than a list in Python? Numpy data structures perform better in: Size – Numpy data structures take up less space. Performance – they have a need for speed and are faster than lists. Functionality – SciPy and NumPy have optimized functions such as linear algebra operations built in. Which is faster NumPy array or list? Because the Numpy array is densely packed in memory due to its homogeneous type, it also frees the memory faster. So overall a task executed in Numpy is around 5 to 100 times faster than the standard python list, which is a significant leap in terms of speed. Why are NumPy arrays used over lists? Why use NumPy? NumPy arrays are faster and more compact than Python lists. An array consumes less memory and is convenient to use. NumPy uses much less memory to store data and it provides a mechanism of specifying the data types. Why is pandas NumPy faster than pure Python? NumPy Arrays are faster than Python Lists because of the following reasons: An array is a collection of homogeneous data-types that are stored in contiguous memory locations. … The NumPy package integrates C, C++, and Fortran codes in Python. These programming languages have very little execution time compared to Python. What is NumPy good for? NumPy is very useful for performing mathematical and logical operations on Arrays. It provides an abundance of useful features for operations on n-arrays and matrices in Python. … These includes how to create NumPy arrays, use broadcasting, access values, and manipulate arrays. Why NumPy is used in machine learning? Numpy is a library for the Python programming language, adding support for large, multi-dimensional arrays and matrices, along with a large collection of high-level mathematical functions to operate on these arrays. Moreover Numpy forms the foundation of the Machine Learning stack. When should I use NumPy? An array is a thin wrapper around C arrays. You should use a Numpy array if you want to perform mathematical operations. Additionally, we can perform arithmetic functions on an array which we cannot do on a list. Why SciPy is used in Python? SciPy is an open-source Python library which is used to solve scientific and mathematical problems. It is built on the NumPy extension and allows the user to manipulate and visualize data with a wide range of high-level commands. Why do we use pandas? Pandas has been one of the most popular and favourite data science tools used in Python programming language for data wrangling and analysis. … And Pandas is seriously a game changer when it comes to cleaning, transforming, manipulating and analyzing data. In simple terms, Pandas helps to clean the mess. Are NumPy arrays lists? The NumPy array is the real workhorse of data structures for scientific and engineering applications. The NumPy array, formally called ndarray in NumPy documentation, is similar to a list but where all the elements of the list are of the same type.
<urn:uuid:484e6fe8-cea2-44a4-b35b-29cffe3e450f>
CC-MAIN-2022-33
https://alllivesmattermusicfest.com/qa/what-makes-numpy-better-than-python-list.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00471.warc.gz
en
0.881521
1,150
2.75
3
Local labor laws in Taiwan push migrant workers to run away from contracted employment arrangements and become undocumented. This article examines the common forms of struggle pursued by runaway Indonesian migrant workers with a focus on the informal organizational structures that support their daily survival. To open space for maneuver within nation-state borders, runaway migrant workers utilize their agency and negotiate state and nonstate structures such as recruitment companies, NGOs and civil society organizations, migrant communities, illegal agency services, and taxi drivers. The Making of Freedom and Common Forms of Struggle of Runaways in Taiwan Jonathan S. Parhusip is a PhD student at the Institute of Social Research and Cultural Studies, National Yang Ming Chiao Tung University. His research interests include the politics of migration, logistical chain of Indonesia-Taiwan migration industry, and fishers in distant water fishing vessels. Jonathan S. Parhusip; The Making of Freedom and Common Forms of Struggle of Runaways in Taiwan. South Atlantic Quarterly 1 July 2021; 120 (3): 663–669. doi: https://doi.org/10.1215/00382876-9155366 Download citation file:
<urn:uuid:f501ce59-8b30-439b-9a96-57e66d0604e8>
CC-MAIN-2022-33
https://read.dukeupress.edu/south-atlantic-quarterly/article-abstract/120/3/663/174130/The-Making-of-Freedom-and-Common-Forms-of-Struggle?redirectedFrom=fulltext
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00667.warc.gz
en
0.916127
231
1.953125
2
The Idaho Statesman’s latest editorial is in response to two stories StateImpact posted on Idaho’s education funding cuts. The Center on Budget Policy and Priorities released a report last week that shows education cuts in Idaho have been among the deepest in the nation over the last five years. CBPP’s report finds per-student spending in Idaho has dropped 19 percent since 2008. Just three states have cut more. But the Idaho Department of Education says CBPP’s measurement isn’t accurate. The department says per-student spending has dropped nearly 12 percent. That’s just looking at fiscal years 2008 to 2011. CBPP’s method accounts for inflation. The Department of Education’s method does not. Here’s what the Statesman writes: “By no means is Idaho alone. As the report points out, 35 states cut per-pupil spending over the past five years, and 26 reduced this spending from 2011-12 to 2012-13. What is troubling is the fact that, according to this report, Idaho’s cuts were among the deepest in the nation — and continued, to a lesser degree, even when the economy showed signs of improvement. These are the kind of decisions that keep Idaho’s per-pupil spending holding firm at No. 50 in the nation. State schools superintendent Tom Luna’s office disputes the report’s math. Spokeswoman Melissa McGrath tells StateImpact Idaho that per-pupil spending dropped nearly 12 percent from 2008 to 2011. That isn’t much of an improvement.” – Idaho Statesman
<urn:uuid:b8d00472-61b6-4032-8783-118dc589c0ca>
CC-MAIN-2017-04
https://stateimpact.npr.org/idaho/2012/09/11/any-way-you-slice-it-idaho-is-near-the-top-for-education-spending-cuts/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00289-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941195
348
1.726563
2
- Research Handbooks in Corporate Law and Governance series Edited by Jennifer G. Hill and Randall S. Thomas Chapter 20: The power of shareholders in the United States Shareholders play a crucial, but decidedly subordinate, role in corporate governance. Despite recurring references to shareholder primacy and to shareholders as owners of the corporation, their power is not the plenary power of a primate or an owner but rather limited to doing only three things—voting, selling, and suing—and each in very limited doses (Thompson 1999). The shareholder role can best be understood by thinking of shareholders as one of the four principal actors in a shared governance system. Three are the only parties named in most corporations statutes—shareholders, directors, and officers—none of whom have primacy, with each sharing in a balance of power as to the decisions of the polity, not unlike a frequent description used for our political system. The fourth recurring player is the judiciary, determining the roles for each of the other three under the applicable statute or common law. Theory helps explain what each actor can do and the roles they have been assigned, and can underlie judicial decisions. But the purity of any theory is regularly subsumed within a dynamic in which the most dominant explanatory principle is that the four groups must share power as to the entity’s governance. Befitting an approach that eschews the purity of any one theory in favor of a messy interactive structural dynamic, section I begin by observing why the frequently identified touchstones of residual ownership and principal/agent are insufficient to adequately describe the shareholder role. You are not authenticated to view the full text of this chapter or article. Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage. Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use. Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.
<urn:uuid:eb0825ea-2676-4d5b-ada2-aa4628986ef7>
CC-MAIN-2017-04
https://www.elgaronline.com/view/9781782546849.00037.xml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00492-ip-10-171-10-70.ec2.internal.warc.gz
en
0.934518
434
1.976563
2
When an athlete performs a task, some of the energy being used turns into heat. That is why they feel hot afterward. This unit focuses on thermodynamics, a study of the relationship between energy, work and heat. Students will explore and study the laws of ideal gases, as well as the concepts of temperature, temperature scales and kinetic molecular theory. To enhance understanding, students will be introduced to the workings of a Stirling engine. Each lesson will be accompanied by a lesson plan. Depending on the lesson, also included will be examples and applications (problems to be solved by students using the equations and concepts presented in the lesson). The unit is intended to be taught in 10 grade Chemistry classes, but it can be used also by middle school 7 grade teachers to expose students to concepts like temperature, pressure, volume and ideal gas laws. Although the primary focus of this unit is Chemistry, the lessons and concepts of this unit can be used in Physics, Physical Science and Math classes to introduce and familiarize students with these concepts. Student understanding will improve in relation to vocabulary, computation skills, problem solving skills and comprehension levels. Many strategies, examples and applications will be brought out and explained in the unit. The unit will last approximately three weeks. (Developed for Engineering, grade 8; recommended for Chemistry, grade 10, and Physics, grade 11)
<urn:uuid:317ab138-a47c-4d72-a246-2294bd8fc3b7>
CC-MAIN-2022-33
https://teachersinstitute.yale.edu/curriculum/guides/2016/4/16.04.07.x.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.943347
290
4.46875
4
You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been warned about for years. It’s enough to drive security teams to madness. According to Verizon’s 2016 Data Breach Investigation Report, 30 percent of phishing messages were opened by their intended target, and about 12 percent of recipients went on to click the malicious attachment or link that enabled the attack to succeed. A year earlier, only 23 percent of users opened the email, which suggests that employees are getting worse at identifying phishing emails -- or the bad guys are finding more creative ways to outsmart users. The consequences of a security breach caused by human error are bigger than ever. For starters, the No. 1 inflection point for ransomware is through phishing attacks, says Stu Sjouwerman, founder and CEO of KnowBe4. What’s more, a handful of competing cyber mafias “are casting their nets wider and wider,” with more scams to more users, to attract more hits, he says. A single ransomware cyber mafia was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million after expenses, according to McAfee Labs’ September 2016 Threats Report. Total ransomware increased by 128 percent during the first half of 2016 compared to the same period last year. There were 1.3 million new ransomware samples recorded, the highest number since McAfee began tracking it. One look at the top five social engineering scams that employees still fall for, and it’s not hard to see their appeal. Sjouwerman calls them the seven deadly social engineering vices that most employees share: Curiosity, courtesy, gullibility, greed, thoughtlessness, shyness and apathy. Human nature may be to blame for many security breaches, but there are ways to help employees shed their bad habits and avoid these scams. 1.‘Well it looked official’ Official-looking emails that appear to be work related – with subject lines such as “Invoice Attached,” “Here’s the file you needed,” or “Look at this resume” -- still have employees stumped, experts say. A survey by Wombat Technologies found that employees were more cautious when receiving “consumer” emails regarding topics like gift card notifications, or social networking accounts, than they were with seemingly work-related emails. A subject line that read, “urgent email password change request,” had a 28 percent average click rate, according to the report. “Most people are not going to look really closely to know where that email came from, and they click on it and their machine may be taken over by somebody, or infected,” says Ronald Nutter, online security expert and author of The Hackers Are Coming, How to Safely Surf the Internet. “Especially when you’re exchanging files with subcontractors or partners on a project, you really should be using a secure file transfer system so you know where the file came from and that it’s been vetted.” He also cautions recipients to be wary of any file that asks the user to enable macros, which can lead to a system takeover. In the absence of a secure file transfer system, users should hover their cursor over email addresses and links before they click to see if the sender and type of file are legitimate, he adds. 2. ‘You missed a voicemail!’ Scammers have been trying to install malicious software through emails designed to look like internal voicemail service messages since 2014. Businesses often have systems set up to forward audio files and messages to employees, which is convenient but hard for users to discern as a phishing hoax. Today, “The voicemail is a spoofed Microsoft or Cisco kind of voicemail,” Sjouwerman says. “They go to their in-box and there is a voicemail, but they missed it and then open the attachment. [Spoofers] can catch practically anyone with that,” and not just the accounting department where invoice scams are sent, he adds. 3. Free stuff Most employees can’t resist free stuff – from pizza to event tickets to software downloads – and they’ll click on just about any link to get it, phishing experts say. “Nothing is truly ever free,” Nutter says. “We’re starting to see again where you’ll get a link saying, ‘Here’s free software.’ It could be something that’s actually out there already for free, but they’re sending you through their website, which means you may be getting infected or compromised software.” Adding to the danger, “A lot of these download sites are bundling [software], and you also have to download something else that you don’t even want,” Nutter adds. “If it compromises your security setup, now you’ve just opened Pandora’s box.” He recommends first checking to see if your organization has already licensed the software, or if it’s truly free software, then go directly to the software vendor’s website to download. 4. Fake LinkedIn invitations and Inmail One of the commonly repeated scams that Proofpoint is seeing involves fraudulent employee accounts on LinkedIn that are being used for information gathering, says Devin Redmond, vice president and general manager of digital security and compliance. For instance, someone creates a fake LinkedIn account posing as a known member of a project team or even a company executive. “It looks very legitimate and that person does work for the organization. [The imposter] connects with you, you accept and they start communicating with you,” Redmond says. “As the employee, if it’s an executive account that you’re linked to, you’re happy and excited that this executive is communicating with you, and you start to, unknowingly, give information that’s sensitive or private to the organization.” Meanwhile, the information is being used as a broader campaign to gather sensitive information on the company. Redmond suggests that if a colleague asks to connect on any social network, then email their legitimate work address and ask if they’ve requested to connect with you. “It’s an easy way to keep yourself out of hot water,” he adds. 5. Social media surfing at work Employees who surf Facebook, Twitter and a host of other social media sites can potentially open the door for cyber thieves because the scams require less work for them, and it’s also a relatively new area of awareness training for employees. “Think about that ROI from the bad actors’ perspective,” Redmond says. “Instead of having to send 1,000 emails (to get one hit), I can get them to my page with one post.” Social media’s cyber risk is still a topic that employees understand the least – with an average of 31 percent of questions missed regarding security awareness on the topic, according to Wombat. However, 76 percent of organizations surveyed enable employees to use social media on their work devices. This puts organizations at significant risk considering the lack of understanding in the area. “I speculate the reasons why organizations are doing so poorly is it’s still fairly relatively new,” says CTO Trevor Hawthorn. “We’re also seeing a younger workforce. There is a belief in the industry that those employees will just click on anything. I think there is something to that.”
<urn:uuid:bd6c322b-2435-4715-b6ad-9c880c543f1b>
CC-MAIN-2022-33
https://www2.cso.com.au/article/607256/five-social-engineering-scams-employees-still-fall/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00270.warc.gz
en
0.9574
1,639
1.914063
2
Fortunato Depero, Riso cinico, 1915 Fortunato Depero (1892-1960) was born in Fondo in Trentino when this northeast corner of Italy belonged to the Austro-Hungarian Empire. He was never one of Futurism's leading members, but he was the most persistent, the man whose work embodied many of the movement's best inclinations (combining disparate art forms) and worst prejudices (glorifying Fascism). Following a traditional craftsman's training, Depero was rejected by the Vienna Academy of Fine Arts, ending up back in Fondo as a marble cutter's apprentice. And it's there that he might have settled, carving mausoleums for Austrians, had he not heard the distant call to "sing to the love of danger" (as the founding Futurist manifesto proclaimed) and create a genuinely new, militantly Italian culture. Fortunato Depero, Il ciclista attraversa la città, 1945 After his mother's death in 1914, Depero moved to Rome, where he sought out one of Futurism's leading talents, Giacomo Balla, who immediately saw Depero's potential. It was with Balla in 1915 that he wrote the manifesto Ricostruzione futurista dell’universo (Futurist Reconstruction of the Universe). In 1919, Depero founded the Casa d'Arte Futurista (House of Futurist Art) in Rovereto, which specialised in producing toys, tapestries and furniture in the futurist style. In 1925, he represented the Italian futurists at the Exposition Internationale des Arts Décoratifs et Industriels Modernes in Paris. The freedom with which he moved between media over the course of his five-decade career made him Futurism's common denominator. One of his masterpieces wouldn't be in painting but in architecture, specifically the pavilion for the 1927 Monza Biennale Internazionale delle Arti Decorative that had an immaculate white facade and larger-than-life block letters for walls: Fortunato Depero, Pavilion for the Monza Biennale Internazionale delle Arti Decorative, 1927 As his pavilion proved, the erstwhile marble cutter had the brute ingenuity that Futurism prized as its most potent weapon against "passéist" complacency. Marinetti had recognized that from the day they met in 1915, inside Depero's studio on Rome's Via Cola di Rienzo. Depero showed Marinetti stacks of paintings, as well as machines built of cardboard. There were also his "abstract" poems written in colored inks on large polychrome sheets dangling from the ceiling. Marinetti read some of these aloud, recognizing his own influence: For several years, he'd been leading a revolt against adjectives, adverbs, and conjunctions, promoting what he called "words-in-freedom", a typographic onslaught to directly transcribe modern-world experience. For instance, he set the sounds of battle in verse with declamations such as zang-tooooomb-toomb-toomb and pacpacpicpampampac. By 1916, Depero had taken the concept to a new extreme with "onomalingua," a mechanical dialect (vroiii sioiii oiii) in which he claimed to converse directly with automobiles and trains. Fortunato Depero, Grattacieli a tunnel, 1930 However, it was Depero's assemblages in cardboard - with geometric flowers stiff and artificial, such as might bloom in a robotic garden - that changed the course of his career. When he saw them, Sergei Diaghilev, founder of the Ballets Russes, declared Depero "the new Rousseau". Diaghilev commissioned him to create Futurist scenery and costumes for Stravinsky's ballet, Song of the Nightingale. Decades ahead of their time, Depero's experiments in mechanized movement were never to reach the stage. Stravinsky's ballet was delayed and reworked and ultimately staged years later with a set by Henri Matisse. Fortunato Depero, The Chair's Party (tapestry), 1927 In 1925, Depero produced a gruesome tapestry, War=Festival showing soldiers slaughtering one another against a backdrop resembling a jubilant pyrotechnic display. Though morally appalling, it was a magnificent example of artistic propaganda - visually alluring enough to win a gold medal at that year's Paris International Exhibition of Decorative Arts. His Fascist political allegiance was duly forgiven by his countrymen following his vague post-war acknowledgment of "those human and justifiable mistakes committed in good faith." Fortunato Depero, Martinetti, Patriotic Storm, 1924 Depero's compositional spareness led the way to the bold ads, posters and bottle designs he produced over the following decades for companies like Campari and San Pellegrino. In 1927, Depero published a personal portfolio, titled Depero Futurista (shown below). Bound with two large industrial bolts, the book included some of the potent graphics he had designed for Campari, interspersed with anarchic flights of typography that were essentially advertisements for himself. Fortunato Depero, Campari Soda Bottle Design, 1932 In 1928, Depero moved to New York, where he produced costumes for stage productions and designed covers for magazines including Movie Maker, The New Yorker and Vogue. He also was active in interior working on two restaurants (which were later demolished to make way for the Rockefeller Center), did work for the New York Daily News and Macy's, and built a house on West 23rd Street. In 1930, Depero returned to Italy. Fortunato Depero, Depero Futurista, 1927 In the 1930s and 40, due to futurism being linked with fascism, the movement started to wane. One of the projects Depero was involved in during this time was Dinamo magazine, which he founded and directed. After the end of the Second World War, Depero moved again to New York. One of his achievements on his second stay in the United States was the publication of So I Think, So I Paint, a translation of his autobiography initially released in 1940. Between 1947 and 1949 Depero lived in a cottage in New Milford, Connecticut, working on his long-standing plans to open a museum. His host was William Hillman, an associate of then President Harry S. Truman. Fortunato Depero, Table and Chair, 1962 In 1949, Depero returned to Rovereto, where he died in 1960. In 1959, Galleria Museo Depero opened, fulfilling one of his long-term ambitions. It is a division of the Museum of Modern and Contemporary Art of Trento and Rovereto, Italy's only museum dedicated to the Futurist movement, containing more than 3.000 objects.
<urn:uuid:5efea8e3-8b7a-454b-a929-4e771d3d6ca3>
CC-MAIN-2017-04
http://weimarart.blogspot.com/2010/10/fortunato-depero.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00428-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958247
1,497
2.53125
3
Privacy, Privacy, and Privacy .. Yes you heard it right, the most concerned, researched, and discussed topic of internet community of all the time is Privacy. As internet has grown into integral parts of our lives the loquacious couldn't stop themselves from being very expressive on internet. And finally there arose the problem of " Individual Privacy ". Now a days with more and more incidents of breach of individuals' privacy, people are very watchful in what they share on internet. But with the unparalleled excellence of Facebook in social networking and Google+ in bringing the like minded people together individual privacy has again taken a backseat as people are becoming liberal in what they share. But if you observe keenly the breach of individuals' privacy really isn't due to sharing things with others but due to " What you share " and " With whom ". So, what is the solution ? Social networking giants like Facebook, and Google+ provide features to create closed groups, but people hardly use it due to usability issues, very confusing settings, and credibility measures. Even when a person with technical background finds it difficult to play around with these setting one can't expect a layman to use those. This was the time when Nokia pitched into development of a unique social networking product " Nokia Pulse " What is Nokia Pulse ? Nokia Pulse is a unique product which gives life to your day to day conversations, It is as intuitive as you verbally interact with your loved ones. Wishing your friends good morning, asking about their whereabouts, letting them know where you are, calling them for a coffee at your favorite hangout place, letting them know how to reach the venue, etc.. all these are just a few taps on Nokia Pulse. Let me explain how... Create your closed user groups Segregate your friends, colleagues, relatives, and the people you care most, across different user groups. This is basically the first step of achieving individuals' privacy by deciding who gets to know what. You don't intend to share everything with everyone. Tell your friends about how you freaked out at weekend party, Discuss technical things with your office colleagues, share your trip photos and experience with your family and relatives. And what not, the possibilities are boundless, but at any point of time you have the supreme control of who views what. Propose your plans and let your friends comment Are you fanatical about going on trips, let your friends know about it, propose your plans with the destination info, some photos and share it with your intended group. Your friends from that group would revert back with their opinions about the plan, discuss on it, prepare a concrete plan and you are ready to drive, and of course Nokia maps will guide you to destination. Would you plan to hangout at a cafe with your friends, or call them for a cricket match. Say it with Nokia pulse, type in your message, add a picture which speaks your mind, add the destination info with Nokia maps and just share it.
<urn:uuid:8b69ab96-4e20-4986-a9e1-4898eadda324>
CC-MAIN-2016-44
http://vijaysringeri.blogspot.in/2012/03/nokia-pulse-your-freedom-of-expression.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00518-ip-10-171-6-4.ec2.internal.warc.gz
en
0.959042
611
1.796875
2
November 15, 2001 The headlines, large and looming, spread across the front page of every newspaper in the country. It makes first line mention in all the news stories for the night and sometimes for weeks and months to come. Allover America school violence is becoming more than just the bully on the playground. It is escalating to great proportions and this problem must be dealt with by our society. School violence starts out with the bully on the playground, or the pushing and shoving in the lunch line, but given the right set of circumstances what might have been prevented with some supervision instead turns into something deadly. There are many psychologists and clinical psychiatrists who along with independent researchers compile extensive lists and do studies on what may be the cause of school violence. The only common denominator that exists between them all is the fact that there is no one determining factor. Let us first examine the nuclear family. School violence does not start in the school. Most behaviors are learned responses to circumstances and situations that are exhibited in our everyday life. Home life conditions are influences on all children. If a child grows up in a home where one of the parents is abused, whether verbally or physically, the child will take this as the norm. Studies have proven that a child living in an abusive home will himself become an abuser. Children who see violence view it as a solution to the problem. They see the stronger of the two components as the winner in the situation, and want to emulate the behavior. A survey conducted by the Loeber’s group shows that parenting practices of severe discipline and voicing of negative attitudes towards young boys around the age of ten result in an increase of aggressive behavior in the school setting. Also the use of coercive methods to control children, such as the threat of violence for disobedience is another pathway to violent behavior (22 .Jones). The extended family of the forties and fifties does not exist in our society today. In most family settings both parents work, mostly out of necessity to meet costs and to provide for the needs of the nuclear group. The consequence of having both parents out of the house results in a lack of supervision for the children. There is a breakdown in the general governing system of the home allowing the child to make decisions that would not be those of the parent. The child in essence becomes his own boss. Sibling violence can erupt setting the groundwork for later violence in the school setting. If a child can bully his or her sibling and get away with it then what is to stop them from attacking their peers at school. Lack of discipline can also cause a child to become self-absorbed. A parent who over indulges his child is instilling in the child a feeling that he can do no wrong. He may act out with the knowledge that he will not be punished. This child will grow up with a lack of empathy for others, and be void of moral values for his fellow man (21 Day). There’s probably not one of us who hasn’t sat in front of the television set watching the Coyote get hammered, the Three Stooges and their antics, or the Ninja Turtles with their high kicks and Karate punches, only to watch them walk away unhurt, and their adversaries walking away to fight another day. Violence on television is learned from a very early age with the watching of cartoons. These funny harmless half-hour shows that make us laugh are the first viewing of violence that our children see. What these shows are telling our children is that violence is ok. It makes them numb to the horror of the actual violence happening around them. Statistically speaking 47% of the violent acts on television do not harm the victim, 86% of the violent acts have no negative repercussions, no one dies, no one goes to jail, and no ones life is ruined. And 73% of the time the “bad guy” goes unpunished (11 Menhard). Media glamorizes violence, teaching our children that it is ok to kill. Music plays an even bigger role in the influencing of today’ s youth with its violent lyrics and cult like following. MTV, rock concerts, and CD’s all mock authority, glorify guns, and portray women as victims of violence, often mentioning them as deserving of punishment (24 Day). The performers seem to emphasize the violent nature of their music through their attire, and by the messages they leave with us during an interview. All these communication only add to the cynicism of our already troubled children. The deadly connection of gangs, drugs and guns is probably the most evil of all types of school violence. Gangs are not a new phenomena. Philadelphia had children gangs in 1791 and big eastern cities had them in the mid-1800’s (19 Menhard). But these earlier gangs were not as violent as the ones forming today. Early immigrants banded together to give themselves a sense of identity and belonging as well as for security reasons. New families coming to America were only interested with survival and not so much with violence, not that it didn’t exist, because it did, but the gang concept was there to provide comfort and perhaps a gathering place, not a group of thugs with mischief on their minds. The gangs of the 1700 were more like the pizza shop crowd of today. The change took place in gangs when they began to experience harassment from different ethnic groups (83 Miller). Today there is an estimated thirty-one thousand street gangs with a membership of almost nine hundred thousand young people. (20 Menhard). Gangs are of different types. You can have “Scavenger gangs” that are not organized, have different leaders all the time, and do random crimes. There are “Territorial gangs” these are turf loyal, very organized, ritualized, wear the same clothing, and are sworn to secrecy. Their main activity is fighting over the territory. Corporate gangs are the most highly structured. Their main occupation is selling drugs for profit. They have strict codes of behavior, and harsh punishment for those who break the rules (42 Kreiner). There are many reasons why young children choose to join a gang. In the school setting students who are underachievers, poor learners, or have language difficulties see themselves as losers in the academic setting. They can be approached by a gang and be recruited into the organization. Here they become “someone”, part of an organization of kids just like themselves. They have a new “family” whom they tend to spend more and more time with. These gang leaders recruit younger members who are unhappy and struggling. The lure them with the promise of fraternity and brotherhood. They are told that the worst that can happen to them if they commit a serious crime is two years in a juvenile facility. A small price to pay for belonging. Fear is a great determining factor in joining a gang. There is tremendous peer pressure to join. Badgering and harassment takes place until the individual feels it is safer to join. The neighbor hood you live in can become gang oriented to protect its “turf’. You either join or face the consequences of being a non-member. A gang member is someone who is respected for his fighting abilities and toughness. Carrying a gun is a symbol of power. not a weapon that is dangerous and carries with it a fear of the individual. Most gang members have no fear or remorse of repercussions for their actions or of death. Their attitude is one of that ” if it happens then it happens”. One gang member states that kids join gangs to get respect and a sense of belonging, and for protection the same things you get from joining the YMCA, Little League, or the Boy Scouts (50 Jones). Almost all gang members carry a weapon. According to the American Civil Liberties Union an estimated 270,000 guns are taken to schools in the United States every day (36 Miller). School youths whether in or out of a gang know that the guns are present, and try to keep a wide berth away from these gangs. The powder keg doesn’t take much to light. Perhaps all you did was bump into someone in the hallway, even apologizing for the disruption, but if it was a gang member and he is with his buddies he or she will try to show his authority and power by shoving you back, perhaps even pulling his gun to show you how wrong you were, and extract a more “appropriate ” apology from you. Young children who have been bothered relentlessly by gang members have chosen one of two paths. One is to join and leave all the harassment behind~ the other has been to quit school. We do have a great population of pacifists, children who are attending school for the opportunity to learn. When fear and anger interrupt this learning process, the learning place becomes too volatile for them and choosing to leave school seems the best avenue of escape. Many children who leave schools do go on to get their GED and thus secure good jobs that will provide for a good future. The drug aspect plays a big role in the conflicts on school grounds. Not only do gang members sel1 drugs to who ever wants to buy them, there is also a connection with psychotropic “legal” drugs and school violence. Prescribed drugs such as Ritalin for ADHD and Bi polar disorder, Luvox for depression, and Prozac for depression are being associated with the mass shootings of the late 1990’s. Children who are taking these drugs are labeled as having a mental illness. These drugs have been noted to have serious side effects when given to children resulting in psychotic and violent behaviors (53 O’Mera). Ritalin has been said to be pharmacologically similar to cocaine in its pattern of abuse. Abuse can lead to tolerance and severe psychological dependence. More studies need to be done to test the true effectiveness of these drugs in the treatment for children. While they may make the child more compliant, they may also be setting the stage for future violence. Studies show that there are an estimated three million violent crimes occurring every year (5 Bosch). As concerned parents what can we do to keep this violence out of the schools? In recent years) due to the shockingly violent shootings at various schools in conjunction with school educators to see that their children are following all the rules. Following through with restrictions and punishments in the home setting when an infraction occurs at school is a very important step in letting the child know that disobedience will not be tolerated. The institution of “Zero Tolerance” policies must be adhered to. When you commit a crime you must know the consequences will follow. Weapons, drugs and alcohol on school grounds ” are cause for expulsion. In most states the school is within its right to expel a student for possession of any of these items. (51 Bosch). Nonviolence should be taught as part of the school curriculum. Educating today’s youth about the affects of violence, how the police are there to help you and how to manage conflict in a non-violent way. Anger management is also taught for those in need (82 Day). Early detection of possible problems would be a blessing. Teachers and parents need to watch for signs of unusual behavior and address it before it escalates into an uncontrollable violence. After school care is offered in many schools to help parents who can’t be home just when the school bus drops the children off. Keeping the youth of today involved in healthy activities leaves no time for mischief. Like all problems that exist in today’s society school violence will not go away over night. It is a concern that will require diligent work of all parties combined. Parents, teachers, police, counselors, and communities working together with the students guiding them in the right direction, giving them the tools necessary to become non violent individuals. Providing a safe environment in which they can learn and grow will lessen the fears produced by outside forces, and help them to mature into responsible adults. There will always be someone who wants to hurt you or cause trouble because of an insecurity that they are suffering, but with the proper instruction students can handle their problems in a non-violent way. Ayoob, Alyssa, (2000), School Violence, Greenhaven Press, Inc., San Diego, California Bosch, Carl, (1997), School Under Siege: Guns Gangs and Hidden Danger, Enslow Publishers, Inc. Springfield, NY. Day, Nancy, (19-96), Violence in School: Learning in Fear, Enslow Publishers Inc., Springfield, NY Jones, Jeff P., (2001), School Violence, Lucent Books, Inc., San Diego, California Kreiner, Anna, (2000), Everything You Need to Know About School Violence, The Rosen Publishing Group, Inc., NY Menhard, Francha Raffe’, (2000), School Clinic: Deadly Lessons, Enslow Publishers, Inc., Springfield, NY Miller, Maryann, (1999), Coning With Weapons and Violence at School and on Your Streets, The Rosen Publishing Group, Inc., NY Omeara, Kelly Patricia, (2000), School Violence, Greenhaven Press, Inc. San Diego, California
<urn:uuid:54703215-1d4d-488c-9ed4-39bc73c6923e>
CC-MAIN-2017-04
http://allpsych.com/journal/schoolviolence/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00277-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966575
2,713
2.9375
3
Can you build a house on agricultural land? Legally you cannot build a house on agricultural land. However, the rules may vary from state to state. For example, under the Karnataka Land Revenue Act, farmhouses can be built on agricultural land, of size not more than 10% of the landholding. Do you need planning permission to build on agricultural land? Another tactic open to single house-holds is to buy a suitable piece of agricultural land and submit an ‘agricultural prior notice consent form’ to the local planning office detailing the agricultural building you intend to build on your land. This is ‘permitted development’ on agricultural land and hence doesn’t need planning permission. How many houses can I develop on my agricultural holding? Hence you can develop one large house or two or three smaller dwellings. This applies across the whole agricultural holding, so it can apply to three different buildings and these can be on different sites on the farm. What is the process? How do I Change my agricultural building to a dwelling house? To use the prior notification system, applicants must complete a form called “Prior approval of proposed change of use of agricultural building to a dwelling house” and pay a fee of £172 to the planning department of the local authority. Can agricultural land be converted to residential UK? In pages specifically related to planning permission for farms, official advice confirms that changing the use of any farmland or buildings you acquire need formal planning approval. Can you buy agricultural land and build a house? Properties like churches, utilities, schools, hospitals, offices, feed stores, kennels, etc., are often allowed to inhabit agricultural land. But, if you’re buying agriculturally zoned land to build a house on, you have to be comfortable living next to farms that might raise livestock. What structures can be built on agricultural land UK? If your farm is 5 hectares or more, you have the right to erect, extend or alter a building. The types of permitted development include temporary uses of land, agricultural buildings below a certain size, forestry buildings, caravan sites and related buildings in some circumstances. Are you allowed to build on agricultural land? If you wish to build on your agricultural land without getting planning permission first, it can be done. However, it’s a high risk strategy that we would not endorse. Can I put a log cabin on agricultural land? Agricultural accommodation – If you build a log cabin for agricultural workers. Then it won’t be considered permitted development. Say you want to add a log cabin to farmland, you need to tell the council. What can agricultural land build without planning permission? What can be done without planning permission? The erection, extension or alteration of a building on agricultural land as long as the building: Is not on agricultural land less than 0.5 hectares in area. Does not consists of or include the erection, extension or alteration of a dwelling. Can I put a mobile home on agricultural land? Are there exceptions for building and living on agricultural land? The law states that individuals cannot build a house or install a leisure mobile home on agricultural land. However, the law provides an exception to this rule for farmers, as well as for all people who can justify a forestry or pastoral activity. How do you convert agricultural land to residential land? You have to apply to the government authority, explaining the purpose of conversion. Along with the application, you will need to attach certain documents, the latest tax declaration covering the subject property and vicinity map. What is permitted development on agricultural land? Permitted development means that if your farm is 5 hectares or more, you have the right to: erect, extend or alter a building. carry out excavations and engineering operations needed for agricultural purposes – though you may still require approval for certain details of the development. What can you do on agricultural land UK? At present, you can erect, extend, or alter a building on agricultural land if it meets the following criteria:The agricultural land must not be less than 5 hectares in area.You cannot erect, build or alter any building classed as a dwelling.The building must be solely for the purpose of agriculture.More items…• Do I need planning permission to change agricultural land to garden? Planning permission is required to change the use from agricultural to garden, and local authorities are often reluctant to give permission where there may be a risk of increased development or urbanisation of the countryside. How many acres qualify as a farm UK? (in the UK, 12 acres are required for a farm to qualify for permitted development rights, for example). When you need it Farms are covered by the same planning regulations as other types of property. Some planning rules include special conditions for agricultural buil… When you don’t need it You don’t need planning permission: for farming operations to use buildings already on your land for farming purposes to change the inside of a bui… Apply for planning permission In England and Wales, you can apply online at the Planning Portal. In Scotland you can apply online at ePlanning Scotland. In Northern Ireland, you… Permitted development means that if your farm is 5 hectares or more, you have the right to: erect, extend or alter a building carry out excavations… The way you appeal and the deadlines for appealing are different depending on which country you’re in. See the relevant planning guide for more inf… What is developing farmland? Developing farmland: regulations on land use. Planning applications for new buildings on agricultural land or change of use for existing farmland or buildings. From: Why does England have a diverse soil? England’s soils are diverse, reflecting the wide range of underlying rock types and drainage, and are variable in their characteristics. Soil types can change over short distances because of complex interactions between underlying geology, landform, past and existing land use and climate. What is RLR land? The Rural Payment Agency’s ( RPA ’s) Rural Land Register (RLR) holds accurate, up-to-date digital maps of all farmed land. It should be noted that the RLR is not the same as the HM Land Registry. See the guide on registering your land. What is WFA in farming? The WFA ensures that as a farmer or grower you can spend less time filling in forms, access up-to-date advice and guidance and reduce the number of inspections you will need. All the land you wish to enter into the WFA scheme must be registered on the RLR before submitting your application. What is ALC in agriculture? The Agricultural Land Classification ( ALC) provides a method for assessing the quality of farmland to enable informed choices to be made about its future use within the planning system. It helps underpin the principles of sustainable development. Is planning permission required for agricultural operations? Planning permission is not required for: agricultural operations. using existing buildings on agricultural land for agricultural purposes. changes to the inside of buildings, or small alterations to the outside – eg installing an alarm box. changes when permitted development rights exist. Do you need planning permission for a house? If you are proposing to change the use of land or buildings from agricultural use, you will need planning permission. It is also always required for dwellings. It is often a prerequisite of obtaining grant funding for a project. Can you delay the sale of land? Don’t delay. If the sale of all, or part, of your land is of interest you cannot afford to wait around as there is work to be done. Every local authority has an extensive list of requirements that must be fulfilled and regulations that have to be adhered to. Is it easy to promote your land? It may not be easy to promote your land but an experienced land promotion company can offer expert advice. The process is not cheap either but one of the advantages of using a land promotion company is that they can fully expense these costs for you. Find out more here. See more. Business. Who has access to rural land? Currently the only people with access to rural land are either very rich and/or are property developers. The only people who are able to develop land outside the envelope are large companies who exercise authority over the planning system. How long does it take to get planning permission to build a house? At the end of five years you apply for planning permission to build a house. You must prove that you need to live on-site in order to run your business, e.g. caring for livestock that breed all year round, and that your business generates sufficient income to support you. Why are crofts so expensive? The reason that crofts are so expensive is that they have become the plaything of middle-class urbanites who fancy relocating to live out a rural idyl dream. There are so many errors of judgement here, I don’t know where to begin, but the premise on which the article is based is disgraceful. What is lowland crofting? Lowland Crofting. In 1994 West Lothian District Council instigated a policy called ‘lowland crofting’ to encourage regeneration and repopulation of a specified rural area west of Edinburgh. The policy allows small farmers with holdings of 100 acres minimum to boost their income by creating ‘crofts’ on their land. What is the National Forest Land Scheme? The National Forest Land Scheme (NFLS) & Woodland Crofts. This scheme allows communities in Scotland to apply to buy land owned by Forestry Commission Scotland (FCS) that falls within their designated boundary, even if the land is not for sale. How long can you live in a caravan? The Ten Year & Four Year Rules. There are rules, which apply UK wide, state that if you live in a caravan for 10 years or a building for four years, unnoticed by the powers that be, the dwelling becomes ‘lawful’ and you can apply for a ‘certificate of lawfulness’. Clearly this means you need tolerant neighbours and that you will spend four … How long can you stay in a barn? Your temporary accommodation can remain in place for five years (presumably as long as you are still building your barn) during which time you need to develop your business to generate as much income as possible. At the end of five years you apply for planning permission to build a house. What is an agricultural tie? Buying property with an agricultural tie: What you need to know. Buying a house with an agricultural tie — also known as an Agricultural Occupancy Condition, or AOC — is something of a minefield. The terms of an agricultural tie can be daunting. They usually require that ‘the occupation of the property is limited to a person solely … Is it difficult to sell a property with a tie? Properties with such a tie can, of course, be difficult to sell . ‘People are naturally put off when they discover a property has an agricultural tie. It’s an instant barrier,’ Winkworth’s Chris Baker told Country Life when we investigated the issue a few years ago. Can you get the tie lifted if you have been working in agriculture for 10 years? It’s not all doom, however — it is possible to get the tie lifted, if you can prove that no one has been working in agriculture for the past 10 years. If the council agrees, it will issue a ‘certificate of lawfulness’, which means you’re no longer in breach of the condition. Why is it important to invest in agricultural land? An agricultural land plot can guarantee long-term returns, if it is in an area where the government has planned some infrastructure project in the near future. Moreover, the compensation, in the case of acquisition by the government, is higher for rural land than that for an urban land. How to invest in a farm? You can employ the following methods, to turn your land investment into a profitable venture: 1 Depending upon the location, you can rent it out for community gardening. 2 Start blogging about your newest farming adventures. 3 Set up a beehive farm and convert it into a tourist activity. 4 If the land is fertile, grow unique flowers to sell at the local market. 5 Sell plant seeds online. 6 Offer your services for pet sitting/creche. 7 Grow herbs and sell it online. 8 Offer tours or classes on farming. 9 Use the land to generate solar energy. What are the trends in agro realty? Investors in this segment, are either buying dry converted rural land, or are buying land through resale. While the value is still lower than land plots in the city area, these investors become owners of land in a rural area. This way, they become eligible for buying more actual agricultural land. What happens if you become an owner of a land pool? If you become an owner under the land pooling policy, you will get a guaranteed regular returns from the pool. See also: Commonly used land and revenue record terms in India. Does land depreciate with time? As is true of all land-related developments, your asset does not depreciate with time – something that cannot be said about property such as flats, apartments, etc. With time, the quality of the building structure deteriorates and the owner has to spend substantial amounts of money, to maintain it. Is farmland a good investment? Also, it is imperative that investors keep realistic expectations from their investment, as the returns from farmland is not as attractive as believed. Usually, agricultural land is considered a good investment for high net-worth individuals and for those with surplus income. Can you convert agricultural land into residential land? Conversion is not easy: You cannot convert a fertile piece of agricultural land into a residential one. The land should be a dry land, for conversion. Land Ceiling Act: A number of states restrict the ownership of land. Therefore, check how much can be bought in that state. If you wish to change the way in which you use land and/or carry out development work, it is likely that you will have to apply to your local authority or the National Park planning authority for permission to do. They will assess your plan to make sure it is in keeping with local development plans, existing infrastructure, permitted dimensions and materials as appropriate to the area. Agricultural Land Classification and Soil Types Land quality varies from place to place. The Agricultural Land Classification (ALC) provides a method for assessing the quality of farmland to enable informed choices to be made about its future use within the planning system. It helps underpin the principles of sustainable development. The ALCsystem classifies land into five grades, with Grade 3 subdivided into Subgrades 3a and 3b. The best and most versatile land is defined as Grade… The Town & Country Planning (General Permitted Development) Order 1995 provides general planning permission known as ‘permitted development rights’ for certain types of minor development. The types of permitted development most likely to benefit farmers include: 1. temporary uses of land 2. agricultural buildings below a certain size 3. forestry bu… Environmental Impact Assessment and Cross Compliance Environmental Impact Assessment (EIA) is a formal procedure where a local planning authority or Natural England (in relation to uncultivated, semi-natural or restructuring of rural land project) assesse the potential environmental impact of certain new developments and changes to land use before they are allowed to proceed. EIAin England and Wales is covered by the Town and Country Planning (Environmental Impact Assessment) Regulations 2011. … Registering Your Land on The Rural Land Register The Rural Payment Agency’s (RPA’s) Rural Land Register (RLR) holds accurate, up-to-date digital maps of all farmed land. It should be noted that the RLR is not the same as the HM Land Registry. See the guide on registering your land. You must register your land on the RLR for: 1. Cross compliance purposes. This is a very important issue for farmers and may affect whether you are entitled to some farmers’ payments. For detailed information, … Further Information on Planning Land Use Further information on planning land use is available in other guides on this website, and from the following organisations. Planning Aid is a free, voluntary service from the Royal Town Planning Institute (RTPI), offering independent professional advice and help on planning. You can find planning aid information on the RTPI websiteor call the Planning Aid Advice Line on Tel 0121 693 1201. One of the major roles of the Department for … - NFU Callfirst Helpline 0870 845 8458 - Planning Aid Advice Line 0121 693 1201
<urn:uuid:701c1409-9782-4af2-941d-8d4c22457e59>
CC-MAIN-2022-33
https://agrifarmingtips.com/can-you-build-a-house-on-agricultural-land-uk/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00479.warc.gz
en
0.927156
3,546
2.140625
2
Chapter 1: explanation of the title-scheme of the work. “Four years under Marse Robert.” At the first blush this title may strike one as inaccurate, lacking in dignity, and bordering on the sensational. Yet the author prefers it to any other and is ready to defend it; while admitting, though this may seem inconsistent, that explanations are in order. Not one of his men was an actual follower of Robert Lee for four full years. In fact, he was not himself in the military service of Virginia and of the Confederate States together for that length of time, and he did not assume personal command of what was then the Confederate Army of the Potomac and later, under his leadership, became the “Army of Northern Virginia,” until June 1, 1862. But more than a year before, indeed just after the secession of the State , Governor Letcher had appointed Lee to the chief command of the Virginia troops, which, under his plastic hand, in spite of vast obstacles, were turned over in a few weeks in fair soldierly condition to the Confederate Government, and became the nucleus of the historic Army of Northern Virginia; and their commander was created one of the five full generals provided for by law in the military service of the Confederate States As full general in the Confederate was not at first assigned to particular command, but remained at Richmond as “Military Adviser to the President position, as also in his assignment, somewhat later, to the conduct, under the advice of the President , of the operations of all the armies of the Confederate States , he of course had more or less supervision and control of the armies in Virginia Such continued to be Lee 's position and duties, and his relations to the troops in Virginia , until General Joseph E. Johnston , commanding the army defending Richmond , was struck down at Seven Pines , or Fair Oaks , June 1st, 1862, when President Davis to succeed him in command of that army. From this brief review it appears clearly that the men who, after June 1st, 1862, followed Lee 's banner and were under his immediate command were, even before that time and from the very outset, in a large and true sense his soldiers and under his control; so that, while strictly speaking no soldier followed Lee for four years, yet we who served in Virginia from the beginning to the end of the war are entitled, in the customary and popular sense, to speak of our term of service as “Four years under Lee But our claim is, “Four years under Marse Robert.” Why “Marse Robert?” So, in Innes Randolph 's inimitable song, “A good old Rebel,” the hero thus vaunts his brief but glorious annals: I followed old Mars' Robert For four year, near about; Got wounded in three places And starved at Pint Lookout. Again, why “Marse Robert?” The passion of soldiers for nicknaming their favorite leaders, re-christening them according to their unfettered fancy and their own sweet will, is well known. “The little corporal,” “The iron Duke forwards,” “Bobs,” “Bobs Bahadur,” “Little Mac,” “Little Phil,” “Fighting Joe,” “Stonewall ,” “Old Jack,” “Old Pete,” “Old Jube,” “Jubilee,” “Rooney ,” “Marse Robert” --all these and many more are familiar. There is something grotesque about most of them and in many, seemingly, rank disrespect. Yet the habit has never been regarded as a violation of military law, and the commanding general of an army, if a staunch fighter, and particularly if victory often perches on his banner, is very apt to win the noways doubtful compliment of this rough and ready knighthood from his devoted troops. But however this may be, “Marse Robert” is far away above the rest of these soldier nicknames in pathos and in power. In the first place, it is essentially military Though in form and style as far as possible removed from that model, this quaint title yet rings true upon the elemental basis of military life-unquestioning and unlimited obedience . It embodies the strongest possible expression of the short creed of the soldier: Their's not to reason why, Their's but to do and die. I do not believe an army ever existed which surpassed Lee 's ragged veterans in hearty acceptance and daily practice of this soldier creed, and there is no telling to what extent their peculiar nickname for their leader was responsible for this characteristic trait of his followers. Men who spoke habitually of their commanding general as “Master” could not but feel the reflex influence of this habit upon their own character as soldiers. This much may certainly be said of this graphic title of the great captain; but this is not all. “Marse Robert!” It goes without saying that the title is distinctively Southern The homely phrase was an embodiment of the earliest and strongest associations of the men applied in reverent affection, but also in defiant yet pathetic protest. It was, in some sense, an outcry of the social system of the South assailed and imperilled by the war and doomed to perish in the great convulsion. The title “Marse Robert” fitted at once the life of the soldier and the life of the slave, because both were based upon the principle of absolute obedience to absolute authority. In this connection it may not be uninteresting to note --what is perhaps not generally known — that during the last months of the war the Confederate authorities canvassed seriously the policy of arming the Southern slaves and putting them in the field as soldiers. I was told by a leading member of the Senate of Virginia that, by special invitation, General Lee came over from Petersburg and appeared before, as I remember, a joint committee of the two Houses, to which this matter had been referred, and gave his opinion in favor of the experiment upon the ground, mainly, that unhesitating and unlimited obedience — the first great lesson of the soldier — was ingrained, if not inborn, in the Southern Yet once more — to christen Lee “Master” was an act of homage peculiarly appropriate to his lofty and masterful personality There never could have been a second “Marse Robert;” as, but for the unparalleled elevation and majesty of his character and bearing, there would never have been the first. He was of all men most attractive to us, yet by no means most approachable. We loved him much, but we revered him more. We never criticised, never doubted him; never attributed to him either moral error or mental weakness; no, not even in our secret hearts or most audacious thoughts. I really believe it would have strained and blurred our strongest and clearest conceptions of the distinction between right and wrong to have entertained, even for a moment, the thought that he had ever acted from any other than the purest and loftiest motive. I never but once heard of such a suggestion, and then it so transported the hearers that military subordination was forgotten and the colonel who heard it rushed with drawn sword against the major-general who made it. The proviso with which a ragged rebel accepted the doctrine of evolution, that “the rest of us may have descended or ascended from monkeys, but it took a God to make Marse Robert,” had more than mere humor in it. I am not informed whether the figure of speech to which I am about to refer ever obtained outside the South , or whether its use among us was generally known beyond our borders. It undoubtedly originated with our negroes, being an expression of their affectionate reverence for their masters, by metaphor, transferred to the one great “Lord and master” of us all; but it is certainly also true that Southern white men, and especially Southern soldiers, were in the habit-and that without the least consciousness of irreverence — of referring to the Divine Being as “Old Marster,” in connection especially with our inability to comprehend His inscrutable providences and our duty to bow to His irreversible decrees. There is no way in which I can illustrate more vividly the almost worship with which Lee 's soldiers regarded him than by saying that I once overheard a conversation beside a camp fire between two Calvinists in Confederate rags and tatters, shreds and patches, in which one simply and sincerely inquired of his fellow, who had just spoken of “Old Marster,” whether he referred to “the one up at headquarters or the One up yonder.” We never compared him with other men, either friend or foe. He was in a superlative and absolute class by himself. Beyond a vague suggestion, after the death of Jackson , as to what might have been if he had lived, I cannot recall even an approach to a comparative estimate of Lee As to his opponents, we recked not at all of them, but only of the immense material force behind them; and as to that, we trusted our commanding general like a providence. There was at first a mild amusement in the rapid succession of the Federal commanders, but even this grew a little trite and tame. There was, however, one point of great interest in it, and that was our amazement that an army could maintain even so much as its organization under the depressing strain of these successive appointments and removals of its commanding generals. And to-day I, for one, regard the fact that it did preserve its cohesion and its fighting power under and in spite of such experiences, as furnishing impressive demonstration of the high character and intense loyalty of our historic foe, the Federal Army of the Potomac. As to the command of the Army of Northern Virginia, so far as I know or have reason to believe, but one man in the Confederate States ever dared to suggest a change, and that one was Lee himself, who — after the battle of Gettysburg , and again, I think, though I cannot verify it, when his health gave way for a time under the awful strain of the campaign of 1864-suggested that it might be well he should give way to a younger and stronger man. But the fact is, that Lee 's preeminent fitness for supreme command was so universally recognized that, in spite of the obligation of a soldier to undertake the duties of any position to which he may be assigned by competent authority, I doubt whether there was an officer in all the armies of the Confederacy who would have consented to accept appointment as Lee 's successor in command of the Army of Northern Virginia--possibly there was one--and I am yet more disposed to question whether that army would have permitted Lee to resign his place or any other to take it. Looking back over its record, from Seven Pines , I am satisfied that the unquestioned and unquestionable preeminence, predominance, and permanence of Lee , as its commander-in-chief, was one of the main elements which made the Army of Northern Virginia what it was. I have said we never criticised him. I ought, perhaps, to make one qualification of this statement. It has been suggested by others and I have myself once or twice felt that Lee was too lenient, too full of sweet charity and allowance. He did not, as Jackson did, instantly and relentlessly remove incompetent officers. The picture is before you, and yet it is not intended as a full picture, but only as such a presentation of him, from the point of view of his soldiers, as will explain and justify the quaint title which they habitually applied to their great commander. I have not attempted and shall not attempt a complete portrait. Why should I, when the most eloquent tongues and pens of two continents have labored to present, with fitting eulogy, the character and career of our great Cavalier. It is our patent of nobilty that he is to-day regarded — the world over — as the representative of the soldiery of the South Not only is it true of him, as already intimated, that he uniformly acted from the highest motive presented to his soul-but so impressive and all-compelling was the majesty of his virtue that it is doubtful whether any one ever questioned aught of this. It is perhaps not too much to say that the common consensus of Christendom-friend and foe and neutral-ranks him as one of the greatest captains of the ages and attributes to him more of the noblest virtues and powers, with less of the ordinary selfishness and littleness of humanity, than to any other great soldier. This is what is meant by our dedication — that the world has come to view him very much as his ragged followers did in the grand days when they were helping him to make history. Can you point to another representative man upon whom the light of modern day has been focussed with such intensity, of whom these supreme things may be said with so little strain; or rather, with acquiescence practically universal? For our part, we say emphatically-we know not where to look for the man. The scheme of this book is a modest one. The author makes no pretense that he is qualified to write history or to discuss learnedly, from a professional standpoint, the battles and campaigns of armies; while of course an old veteran cannot be expected always and absolutely to refrain from saying how the thing looked to him. All that is really proposed-and the writer will be more than content if he acquit himself fairly well of this limited design — is to state clearly and truthfully what he saw and experienced as a private soldier and subordinate officer in the military service of the Confederate States from 1861 to 1865. It is not proposed, however, to give a consecutive recital of all that occurred during these four years, even within the narrow range of the writer's observation and experience; but rather to select and record such incidents, arranged of course in a general orderly sequence, as are deemed to be of inherent interest, or to shed light upon the portrait of the Confederate soldier, the personality of prominent actors in the war drama upon the Southern side, the salient points of the great conflict, or the general conditions of life in and behind the Confederate Again, such are the imperfections of human observation and such the irregularities and errors of human memory, especially in the record of events long past, that many may be disposed to question the value of such a book as this, written to-day, relating to our civil war. I can only reply that not a few of the incidents recorded were reduced to writing years ago, indeed soon after they occurred; while perhaps as much has been gained in perspective as has been lost in detail, by waiting. Certainly it can be better determined to-day what is worthy of preservation and publication than it could have been immediately after the war. The slips and vagaries of memory, however, cannot be denied or excluded. It can only be said, “forewarned is forearmed.” I shall endeavor to exercise that conscientious care which the character of the work requires, but cannot hope to attain uniform and unerring accuracy in every detail. In the record of conversations, interviews, and speeches I shall sometimes adopt the form of direct quotation, even where not able to recall the precise words employed by the speakers and interlocutors — if I am satisfied this form of narrative will best convey the real spirit of the occasion. And as the writer is, in the main, to relate what he saw and heard and did, he craves in advance charitable toleration of the first personal pronoun in the singular number.
<urn:uuid:1e44d5fc-ab7f-4501-b0d4-3b19ff5a6e8a>
CC-MAIN-2016-44
http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:2001.05.0036:chapter=1&ie_sort=display
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00561-ip-10-171-6-4.ec2.internal.warc.gz
en
0.977841
3,388
2.578125
3
Scrabble word: HILLOCK In which Scrabble dictionary does HILLOCK exist? Definitions of HILLOCK in dictionaries: - noun - a small natural hill - A small hill. - A small protuberance or elevation, as from an organ, a tissue, or a structure. - adj - a small hill [n -S] : HILLOCKY There are 7 letters in HILLOCK: C H I K L L O Scrabble words that can be created with an extra letter added to HILLOCK All anagrams that could be made from letters of word HILLOCK plus a wildcard: HILLOCK? Scrabble words that can be created with letters from word HILLOCK Images for HILLOCK SCRABBLE is the registered trademark of Hasbro and J.W. Spear & Sons Limited. Our scrabble word finder and scrabble cheat word builder is not associated with the Scrabble brand - we merely provide help for players of the official Scrabble game. All intellectual property rights to the game are owned by respective owners in the U.S.A and Canada and the rest of the world. Anagrammer.com is not affiliated with Scrabble. This site is an educational tool and resource for Scrabble & Words With Friends players.
<urn:uuid:f64a333c-ddb9-4898-a665-03ecb7fc3fb4>
CC-MAIN-2017-04
http://www.anagrammer.com/scrabble/hillock
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00034-ip-10-171-10-70.ec2.internal.warc.gz
en
0.876581
286
2.1875
2
Junk-Mail Firm Straps GPS Devices To People Handing Out Pamphlets from the how-low-can-you-go? dept Down in Australia, a firm that hires teens to deliver junk-mail pamphlets to houses has decided to make their processes a bit more efficient by forcing the kids to wear a GPS device that records all their moves — making sure they visit the houses they were assigned and do so in the order prescribed by the company. Some of the kids aren’t particularly happy about being spied on this way, and apparently the company expected that. With the information pack about the GPS devices, they included a simple resignation form for those who weren’t happy about the idea. Again, it seems like this is a modern attempt to bring back Taylorism, the idea that all workplace activities can be scientifically monitored and made more efficient — as if people were machines. There’s nothing wrong with working on ways to make employees more productive, but it needs to occur with the recognition that they’re human beings and constantly spying on them and making them feel inadequate tends to hurt productivity more than it helps. It certainly doesn’t make for particularly loyal employees. Perhaps that’s fine for a business such as a junk-mail pamphleteer, but there is still a cost involved in hiring and training new people, while being able to fill in for those who quit. It’s one of those things that sounds good to management (oooh, efficiency! productivity!) but whose consequences aren’t carefully thought out. Of course, the firm responds to such charges by including the standard line that no one who is actually a good worker should be upset about being tracked, since it’s only designed to spot the bad workers.
<urn:uuid:c92c4028-268d-4be0-b21f-3f702786b19c>
CC-MAIN-2022-33
https://www.techdirt.com/2006/10/31/junk-mail-firm-straps-gps-devices-to-people-handing-out-pamphlets/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00075.warc.gz
en
0.973937
366
1.765625
2
Would you ever in your wildest dreams have imagined a year after Barack Obama's historic victory a new website created by former MSNBC GM Dan Abrams and crawling with ex-Huffington Posters would declare in a headline, "If The Election Were Held Today Obama Would Lose?" Granted, the article written by ex-HuffPoster Glynnis MacNicol took its cue from a recently released Rasmussen poll, and discounted its findings. Regardless, the headline and opening paragraphs by themselves indicate just how much the bloom has come off the Barose (h/t Matt Lewis): So yes. As the saying goes, what a difference a year makes. Twelve months after the momentous election of Barack Obama as the nation’s 44th president, a poll shows that were the election to be held today Obama might not be so successful. The Rasmussen poll finds that “45% of adults say they would be at least somewhat likely to vote for Obama if he was up for reelection right now. Forty-nine percent (49%) say they would be unlikely to vote for the president’s reelection.” Ouch. Side note: more women like him than men. Of course, it should go without saying that a poll like this is held in a vacuum, which does not include real world contributing factors like opposing candidates or running mates. Not to mention the next chance voters will get to check the President’s name off on a ballot is still three years off — needless to say, a lot can change in three years! — but still, probably not exactly the way Obama wanted to arrive at election day 2009! Wow! Color me unsurprised with Rasmussen's findings but thoroughly shocked a liberal author would echo them AND get it published at a liberal website. But, MacNicol wasn't the only liberal going after the Big O on the anniversary of his election, for as she pointed out, her former employer Arianna Huffington also penned a piece Tuesday less than enthralled by he who used to enthrall with his mere presence: How did the candidate who got into the race because he'd decided that "the core leadership had turned rotten" and that "the people were getting hosed" become the president who has decided that the American people can only have as much change as Olympia Snowe will allow? How did the candidate who told a stadium of supporters in Denver that "the greatest risk we can take is to try the same old politics with the same old players and expect a different result" become the president who has surrounded himself with the same old players trying the same old politics, expecting a different result? How could a president whose North Star as a candidate was that he "would not forget the middle class" choose as his chief economic advisor a man who recently argued against extending unemployment benefits in the middle of the worst economic times since the Great Depression? I'm referring, of course, to Larry Summers. According to a White House official I spoke with -- later confirmed by sources in the White House and on the Hill -- Summers was against the extension. And it took a lot of Congressional pushing back behind the scenes for the president to overrule him. And, according to another senior White House official, when foreclosures or job numbers come up at the regular White House morning meeting, Summers' response is that nothing can be done. Nothing can be done about skyrocketing foreclosures or lost jobs. Nothing can be done -- pretty much the opposite of "Yes we can," isn't it? Yes it is, and later she kind of explained why: But, as [former Obama campaign manager David Plouffe] puts it in [his new] book, "Obama had ignited something very powerful in young people throughout the country. If that spark could be preserved, I was convinced we'd be a much stronger country for it." And no amount of rationalizing and sugarcoating can change the fact that the spark has not been preserved. That's correct -- because the spark was all based on hype, and David's last name should have been FLUFF! Sadly, this is what happens when an unqualified presidential candidate with absolutely no experience to lead people is coronated by adoring media members that totally abdicate their journalistic responsibilities in order to help their Party take back the White House. Makes one wonder if Huffington and MacNicol are beginning to develop guilty consciences, or does this wrongly assume they possess such a thing?
<urn:uuid:2d4b71fa-4756-4dce-997c-0d9d9b9d576b>
CC-MAIN-2017-04
http://www.newsbusters.org/print/31976
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00182-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980068
922
1.773438
2
Newswise — Devising a way to see something that has yet to be seen takes big ideas, teamwork and the support of those who understand the value of a calculated risk. That confluence of forces has delivered a $1 million award from the W. M. Keck Foundation to a transdisciplinary research team at Northern Arizona University, which aims to transform current understanding about muscle contraction. Led by Regents’ Professor Kiisa Nishikawa, a biologist, the group has been working for six years to refine a winding filament hypothesis that remains one tiny step away—literally nanometers—from widespread acceptance. The convincing evidence would be direct observation of the protein titin, no wider than a strand of DNA, winding on thin filaments in muscle fibers. “If our idea is right, it could change the way we think and do things in physiology, medicine and robotics,” Nishikawa said. “This award gives us the opportunity to really get the ball rolling.” Nishikawa has built a respected reputation through her research on titin and its role in local control of muscle stiffness. Studies of toads, chameleons and salamanders by Nishikawa and her students have reinforced the idea. Still, some skepticism remains that only hard evidence can dispel. Now, teamed with faculty in physics, engineering and biochemistry, and an array of students from doctoral candidates to undergraduates, Nishikawa is poised to develop the tools that will allow visual confirmation of her “elegant” hypothesis. “We have demonstrated that the hypothesis fills existing gaps between theory and experiment, but we need to see proteins interacting at the nanometer scale,” Nishikawa said. Doing so will require modifying methods and equipment that are unable to do the job, as currently configured, while preserving the integrity of sensitive biological material. Chris Mann, assistant professor of physics and astronomy, and Brent Nelson, associate professor of mechanical engineering, bring their expertise in nanoengineering, holography and tomography to the project, while Matthew Gage, associate professor chemistry and biochemistry, will develop methods using fluorescence to visualize titin-actin interactions in real time in active muscle fibers. “We would expect to see the interactions that we’ve hypothesized,” Nishikawa said, noting that the work is expected to take two to three years. “If we didn’t have the funding from the W. M. Keck Foundation, it would take 10 to 15 years to get there,” she said. NAU President John Haeger credited the team for its persistence in obtaining the prestigious Keck award and demonstrating the practical and educational benefits of research. “An award of this magnitude from such a widely respected foundation demonstrates that NAU can be a leader in bioscience,” Haeger said. “Our outstanding faculty, and the students and staff who support them, have earned this award through their excellent work and a sincere enthusiasm for discovery. I look forward to what they achieve next.”
<urn:uuid:c2c61ef3-8662-4781-9e88-7a0ceb271471>
CC-MAIN-2017-04
http://www.newswise.com/articles/view/620643/?sc=rssn
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00039-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950878
630
2.4375
2
Animate It! is an interactive exhibition within Explore-At-Bristol and was developed in collaboration with the creators of Wallace & Gromit, Aardman Animations. Visit the exhibition and you can make Morph cartwheel before your eyes, light a set from 'A Matter of Loaf and Death' and even create your own animation to send home. Animate it! gives everyone the opportunity to release their inner animator. Entry to Animate It! is free with a ticket to Explore. For directions and opening hours please click here. www.animateit.org.uk is the virtual home of the exhibition where you can watch films made by our visitors. Once you've visited the exhibition, keep hold of your ticket and you will be able to: Animate It! has been supported by Aardman Animations, Adobe, Smith & Williamson, Sony Pictures Entertainment Inc. and the South West Regional Development Agency.
<urn:uuid:cd4995f7-271e-482a-bbbd-e052153ebdb7>
CC-MAIN-2017-04
https://www.animateit.org.uk/home/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00184-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930248
195
1.820313
2