text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
|When did this problem happen? Were you attempting to shut down? If so, depress Cntl.+Alt.+Del>, Select to start task manager, then select Applications. Close any running applications and your computer should shut down. | Whatever application/s were running were not responding. You probably should run a malware and virus scan if you don't know what application was hung.
<urn:uuid:1e864e2c-86a3-491e-8317-e9ec51968fce>
CC-MAIN-2017-04
https://www.computing.net/answers/hardware/help-how-do-i-fix-this/92269.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00181-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967031
80
1.921875
2
The University of Hawaii is looking at potential sites and talking about a possible academic center with the library. President Obama was born in Hawaii. The University of Chicago, where the president taught, has also expressed interest in a presidential library. The Obamas' family home is located in Hyde Park near the South Side school. When asked what the president thought about the locations, a White House spokesperson said, "No comment." The Associated Press contributed to this report. All rights reserved.
<urn:uuid:7e521e24-afeb-4c8f-8d94-767c06997aa7>
CC-MAIN-2017-04
http://abc7chicago.com/archive/7790016/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00130-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980667
98
1.5625
2
By Arshin Adib-Moghaddam (for Safe Democracy) Arshin Adid-Moghaddam explains how a common ignorance and stereotyping of Islam has led to strained relations between the Muslim and Judeo-Christian world. These misinformed views place blame inaccurately on the teachings of the Qu’ran, and lack a complete understanding of the variety of factors that influence modern day Islam, perpetuating what Adid-Moghaddam refers to as a belief in nihilistic terrorism. It is increasingly difficult to ignore the fact that throughout Europe and the wider Western world, Islam is being turned into a police matter. Western governments are increasingly calling for new policies in order to manage the growing threat to social order that Islam appears to present. Arshin Adib-Moghaddam is the author of “The International Politics of the Persian Gulf: A Cultural Genealogy” (Routledge). Educated at Hamburg, American and Cambridge Universities, he teaches International Relations at Oxford University. IT IS INCREASINGLY DIFFICULT TO IGNORE THAT ISLAM IN EUROPE, and the wider Western worlds has been turned into a police matter, and that Muslims call for management policies that Islam is permanently taken into account as a threat to social order. Not a day passes without news reports about yet another raid on predominantly Muslim neighbourhoods, or fast-tracked arrests under new legislations, which have given the police and security forces in the United Kingdom, the United States, Canada, Germany, and elsewhere extraordinary legal powers. THE INVISIBLE THREAT It is an almost natural reaction of the state and its apologists to legitimate the disempowerment of civil society in general, and minorities in particular, with apocalyptic threat scenarios that are constantly reifying the menace of the other –in its current appearance the abstract (yet always bearded foreigner), or the sleeper cell, who appears to be all-powerful and almost transcendental in his omnipresence. Yet it appears to me, that explaining why some youths in my age group, with similar Arab sounding names, are willing to blow themselves up requires placing the issue of nihilistic terrorism within an analytical context, that is divorced from Islam in its multifarious, and conflicting meanings. BLAMING THE QUR´AN How helpful is the Qur’an in explaining the motivations of Richard Reid, the Muslim convert, born in Bromley to an English mother, and Jamaican father, and educated in London; or Mohammad Sidique Khan, Shehzad Tanweer, Hasib Hussain, and Germaine Lindsay: the home-grown suicide bombers, who planned, and executed the attacks on London’s Tube on 7 July 2004? It is intellectually mediocre, and normatively racist, that some analysts presume that these self-proclaimed jihadists are somehow motivated by teachings in the Qur’an, or that their actions can be explained in terms of the inherent Muslim propensity for violence. A GLOBAL CULTURE The signposts of this kind of nihilistic terrorism, which has created immense human suffering around the world, and a quick look at the biographies of its perpetrators, reveal that they are global in character. Not in the sense that the phenomenon is everywhere, but in the sense that its agents are nurtured by a global culture that engenders violence exponentially, both due to its technological structure and ideational a-morality. LOOKING BEYOND THE MYTHS Analytically, the phenomenon of nihilistic terrorism requires multidisciplinary knowledge beyond orientalist myths. Normatively, it demands empathetic understanding of the disenfranchised second and third generation of Muslim and non-Muslim immigrants, who feel rejected by the Leitkultur of both Europe as an increasingly fortified supranational entity and, more dramatically, its nation-states with their propensity for uniform national identities. THE PRESENCE OF ISLAM And finally politically, it asks for explicit acknowledgement of the Muslim presence in Europe as part of the inter-cultural claim of the European project, as an empirical manifestation of its claim for openness, democratic empowerment, and ultimately, as a psychological, and historical link to Islamic civilisation, which, since its invention from the seventh century onwards, had an uninterrupted presence in the European mind.
<urn:uuid:6a4ba131-abaa-4316-ad75-13445c1a3bde>
CC-MAIN-2017-04
http://english.safe-democracy.org/2006/06/29/the-muslim-presence-in-europe/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00230-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940706
889
1.640625
2
As the job market slowly recovers, Americans set a record for public transit use in 2012, the American Public Transportation Assn. said Monday. In its report, the association said Americans took 10.5 billion trips, the second highest ridership since 1957. That's 154 million more trips than in 2011. “Two big reasons for the increased national transit ridership are high, volatile gas prices and in certain localities, a recovering economy with more people returning to work,” said Michael Melaniphy, the association's president and chief executive. Public transportation in Los Angeles was among notable year-over-year increases. Ridership of the city's light rail system increased 18.5%, partly because of the opening of a new line last year. Large bus systems nationally notched an increase of 1%, but Long Beach saw an improvement of 4.5% from the year before, the association said. The group's report follows Friday's surprisingly upbeat jobs report that found that employers added 236,000 jobs to payrolls in February. Since February 2012, the unemployment rate has fallen 0.6 percentage points, dipping to 7.7%, a four-year low.
<urn:uuid:ce7bb7bb-6ea8-4a68-b515-25c5ab5b1750>
CC-MAIN-2017-04
http://www.latimes.com/business/la-fi-mo-recovering-economy-public-transit-use-20130311-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00135-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958056
242
1.976563
2
Am I Depressed? Is a common question that many people are asking themselves at this very moment. But, what’s the difference between “normal” sadness vs. clinical depression? How do psychiatrists and psychologists approach diagnosing Major Depressive Disorder aka MDD? Join Dr. Andrew Kim, a Harvard trained, board certified psychiatrist, in a detailed and informative explanation of the symptoms and signs of clinical depression. This video is not a simple checklist of bullet points you can find anywhere on the internet. But, an in-depth, no nonsense description of the various symptoms and signs of depression. Whether you are someone curious about depression, a loved one of someone who may be going through depression, a student, training clinician, or working in advocacy, please feel free to share this educational video as a resource. If you enjoyed this video, please subscribe and stay tuned for a more candid and even more detailed video podcast of this topic. Please submit other educational topics and questions you would like to hear me discuss in upcoming videos, video podcasts, and my “Ask Dr. Kim” series. Please submit general topic requests or questions. Please do not submit specific, personal medical questions, as I will not respond to those, as I am not your doctor. This video is for EDUCATIONAL purposes and is NOT a substitute for personal medical advice from a qualified professional clinician. IG: https://www.instagram.com/andrewkimmd/ – @AndrewKimMD Twitter: https://twitter.com/AndrewKimMD – @AndrewKimMD Facebook: https://www.facebook.com/AndrewKimMD -@AndrewKimMD Website & Blog: https://andrewkimMD.com Contact Email: firstname.lastname@example.org ** The information in this video, including but not limited to, videos, text, graphics, images and other material contained on this video channel and its affiliated websites (such as AndrewKimMD.com) are for informational and entertainment purposes only. No material on this channel is intended to be a substitute for professional medical advice, diagnosis or treatment. Always seek the advice of your physician or other qualified health care provider with any questions you may have regarding a medical condition or treatment and before undertaking a new health care regimen, and never disregard professional medical advice or delay in seeking it because of something you have read or seen on this website or its affiliated social media sites & channels. ** **Disclosures: At the time of creating this video, Dr. Andrew Kim M.D. was an independent contractor on the Janssen Speakers Bureau and works as a Principal Investigator on FDA clinical trials for pharmaceutical sponsors. **
<urn:uuid:6b6dc85a-7cba-4fbe-8186-45c6cff99fd1>
CC-MAIN-2022-33
https://psychologytalkshow.com/signs-of-depression-am-i-depressed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00273.warc.gz
en
0.920777
562
2.546875
3
Governments can affect the way markets function, sometimes to the detriment of free competition. Ensuring a level playing field is therefore essential to allow competition to work properly. In June 2015, competition experts and delegates debated the challenges arising from state interventions in the market and what competition authorities can do to address the distortions that such interventions can create. English, PDF, 1,501kb This cross-country report analyses the legislation on liability of legal persons for corruption and its enforcement in Eastern Europe and Central Asia, highlighting national practices that may be promoted as good practice. While it focuses on 25 countries participating in the Anti-Corruption Network for Eastern Europe and Central Asia (ACN), examples from OECD countries are also included. Investment Insights publishes original research and analysis on current international investment issues. Articles are published under the responsibility of the authors and do not necessarily reflect the views of the OECD or those of its member governments. English, PDF, 811kb Protectionism and local content requirements are holding back investment in clean energy and thus undermining the fight against climate change. This Investment Insights puts forward policy options for mobilising investment in clean energy and restoring order and confidence in international markets. The perceived potential of clean energy to support employment in the post-crisis recovery context has led several OECD and emerging economies to design green industrial policies aimed at protecting domestic manufacturers, notably through local-content requirements (LCRs). These typically require solar or wind developers to source a specific share of jobs, components or costs locally. Such requirements have been designed or implemented in the solar- and wind-energy sectors in at least 21 countries, including 16 OECD countries and emerging economies, mostly since 2009. Empirical evidence gathered in this report shows however that LCRs have actually hindered international investment across the solar PV and wind-energy value chains, by increasing the cost of inputs for downstream activities. This report also takes stock of other measures that can restrict international investment in solar PV and wind energy, such as trade remedies and technical barriers. This report provides policy makers with evidence-based analysis to guide their decisions in designing clean-energy support policies. Le Cadre d’action pour l’investissement mobilise l’investissement privé en faveur de la croissance économique et du développement durable, contribuant ainsi au bien-être économique et social des personnes dans le monde. Il vise également à faire avancer la mise en oeuvre des Objectifs du Développement Durable et à contribuer à mobiliser du financement pour le développement en appui de l’agenda post-2015. An updated version of the Policy Framework for Investment (PFI) was released in 2015. The update reflects new global economic fundamentals that have emerged over the last 10 years and takes into account the numerous lessons learnt through the use of the PFI, particularly in developing and emerging economies. Les Ministres des pays de l’OCDE ont entériné des lignes directrices actualisées visant à aider les autorités nationales et les groupements régionaux à créer les conditions propres à attirer l’investissement national et étranger. English, PDF, 1,593kb This compilation of blogs written about the social, economic, and policy aspects of international investment. This compilation was prepared for the OECD's 2015 Ministerial Council Meeting. Ces révisions ont été engagées en 2014 et sont tout près d’être achevées. Les textes des projets révisés de Principes et de Lignes directrices devraient être approuvés par le Comité sur la gouvernance d’entreprise en mai 2015.
<urn:uuid:b56dfa17-c22d-4ad0-b81e-efdeb158d8f5>
CC-MAIN-2017-04
http://www.oecd.org/fr/daf/latestdocuments/43/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00199-ip-10-171-10-70.ec2.internal.warc.gz
en
0.674924
820
1.710938
2
Drug & Alcohol Free Campus Policy Drug & Alcohol Free Campus Policy Rockland Community College (the College) is committed to providing a safe work and learning environment and to fostering the well-being and health of the College community. The College recognizes that the misuse and abuse of alcohol and the use of illegal drugs negatively affect an academic community. This can be exemplified by decreased productivity of members of the community, increased physical and mental health problems, strained social interactions and various forms of violence and vandalism. Problems associated with the illicit use and abuse of alcohol and the use of illegal substances have a pervasive impact on our academic community and are not limited to a singular age level or socioeconomic group. The harmful effects of alcohol and illegal drugs can impair the process essential for learning and effective participation in the richness of the academic experience. In compliance with the federal Drug-Free Schools and Communities Act (DFSCA) Amendments (Public Law 101 -226), the Drug-Free Schools and Campuses Regulations, and the Drug-Free Workplace Act of 1988; and in keeping with its mission, the College strictly prohibits the possession, use, or distribution of any controlled substance and/or alcohol on College property or at any College-sponsored function, including but not limited to off-campus activities such as during the course of College-sponsored field trips, College-sponsored social activities, or College-sponsored study abroad programs. In addition, employees are prohibited from on-the-job use of, or impairment due to the use or abuse of alcohol or controlled substances. Students are prohibited from impairment due to the use or abuse of alcohol or controlled substances, or appearing in an intoxicated or altered state on College property or at any College-sponsored function. This policy applies to all College employees, whether full or part-time, including faculty, staff, and administrators; and students, whether full or part-time. A person is identified as a student subject to this policy if they are registered for study at the College without regard to whether the course of study is for credit or credit free. Exemptions to Policy - Authorized Prescription Where permitted, an employee may possess and use a controlled substance that has been properly prescribed to him/her by a physician provided such prescription does not interfere with the employee’s ability to perform necessary job functions. - Non-College Event Beer and wine (only) may be sold or served at commercial events not sponsored by the College per guidelines as approved by the President. However, even if beer and wine is authorized to be sold or served on campus, the prohibition regarding use by individuals subject to this policy is still in effect. - Sanctions: The possession, use, or distribution of any controlled substances and alcohol on College property or at any College-sponsored function shall be considered a serious form of misconduct. The College will respond swiftly and promptly to any known violations of this policy. This response may include: - Students: Students violating this policy will be considered to be violating the Student Code of Conduct and shall be subject to disciplinary action (as described below) and referral for criminal prosecution to the fullest extent of applicable, federal, state and local law depending upon the nature and gravity of the infraction and the degree to which violation of the policy adversely affected the well-being of the community or the fulfillment of the College’s mission. Penalties for these actions will be administered by the Vice President of Student Services, in accordance with the rules and procedures administered by him or her. Penalties range from a warning, referral for an appropriate assistance program, confiscation, restitution, suspension, dismissal, up to and including expulsion. Students are responsible for their conduct at all times, and the fact that a student was under the influence of alcohol or a controlled substance will not be considered an excuse for their conduct or a mitigating factor in any disciplinary or academic action taken against them, except as permitted by the College's Policy for Drug and Alcohol Amnesty in Sexual Violence and Interpersonal Violence Cases (found in the Student Code of Conduct). Depending upon the particular circumstances, continued attendance at the College by students who violate this policy may be made expressly contingent upon satisfactory participation in a drug abuse assistance, counseling and/or rehabilitation program. NOTE: A conviction for the sale or possession of illegal drugs may affect a student's eligibility for federal student financial aid. For more information students can refer to the Federal Student Aid Webpage at: http://www.ifap.ed.gov. - Employees: Employees violating this policy shall be subject to disciplinary action (as described below) and referral for prosecution, in accordance with applicable collective bargaining agreements, and subject to criminal prosecution to the fullest extent of applicable, federal, state and local law. Disciplinary action for employees include, but are not limited to, an oral or written reprimand, suspension, up to and including termination from employment, referral for an appropriate assistance program, and referral for criminal prosecution, when appropriate. Employees should refer to the collective bargaining agreement, if any, to which they are subject for additional prohibitions, penalties/sanctions and assistance information. Students and employees are reminded that federal, state and local law provides for a variety of legal sanctions and penalties for the unlawful possession or distribution of controlled substances and alcohol. These penalties include, but are not limited to, incarceration and monetary fines. Pursuant to the Drug-Free Workplace Act, any employee who is convicted of a violation of any criminal drug statute occurring in the workplace must submit notification to the Office of Human Resources in writing, no later than five (5) days after the criminal conviction. Notice must be received on or before the 5th day after the criminal conviction. This reporting requirement is a term and condition of employment. - Controlled Substances Defined: Controlled substances include the many substances covered by the Controlled Substances Act (21 U.S.C. 811). See, Schedules I – V of Section 202 of the Controlled Substance Act (21 U.S.C. 812) and Schedules I-V of New York State Public Health Law Section 3306. All so-called “street drugs” (heroin, crack, cocaine, marijuana, speed, acid) are controlled substances. - Drug Free Awareness Education and Prevention Program: The College offers prevention education programs designed to increase awareness of the dangers of drug and alcohol abuse and available support services. - Distribution of Policy: In accordance with federal guidelines, notification to all students and employees will occur annually. The Vice President of Student Services is responsible for distributing this policy to all students annually. The Director of Human Resources is responsible for distributing this policy to all employees annually. - Biennial Review: The College will conduct a biennial review of this program to determine its effectiveness and implement changes to this policy/program as needed to ensure that the disciplinary sanctions are enforced consistently. The appendices will be updated biennially, and such updating will not require approval by the College’s Board of Trustees. A description of the applicable legal sanctions under New York State law for the unlawful possession, use or distribution of illicit drugs and alcohol is listed in Appendix A. A description of the applicable legal sanctions under Federal law for the unlawful possession, use or distribution of illicit drugs and alcohol is listed in Appendix B. A description of the health risks associated with the use of illicit drugs is listed in Appendix C-1 and a description of the health risks associated with the abuse of alcohol is listed in Appendix C-2. A description of available drug or alcohol counseling, treatment, or rehabilitation or re-entry programs is listed in Appendix D.
<urn:uuid:f26de15c-96a7-4f05-a9fc-1a4f1af07252>
CC-MAIN-2017-04
http://www.sunyrockland.edu/about/college-policies/general-administration-policies/drug-and-alcohol-free-campus
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00118-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940103
1,556
1.734375
2
(as of 4/27/2015) (visit publisher's website) - Build and simulate robots - Create worlds and share them with other users - Learn the game through helpful tutorials - Record replays of your gameplay IncrediBots is a physics-based simulation game that is playable in a web browser. The game was originally released on October 31, 2008 and is now on version 3, which is a public beta stage. The game features a sandbox game mode, which allows you to build robots, such as cars, tanks, and spaceships, by connecting shapes and joints. When finished with your robot, you can simulate and control your robot with user-set joint activation keys. The game also enables you to create custom worlds, called challenges that are playable by other IncrediBots gamers. If you need help understanding how to play the game, IncrediBots features tutorials for guidance. The game provides a fun avenue for creating and simulating physics-based robots and worlds. It is geared towards a younger audience but is played by older gamers as well. The game provides an active community with various user rankings and jobs that make the experience more enjoyable. IncrediBots is a fun physics simulator that allows you to create your own robots and worlds. ▶ Primary file extension ▶ Other file extensions used by IncrediBots 3 |Supported File Types| |.IB2||IncrediBots 2 Saved Challenge File| |.IBCH||IncrediBots Challenge File| |.IBRE||IncrediBots Replay File| |.IBRO||IncrediBots Robot File| Updated: April 27, 2015
<urn:uuid:7c88acde-baf0-4b4e-b8e2-3f9e93c42d8b>
CC-MAIN-2017-04
http://fileinfo.com/software/incredibots/incredibots
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00026-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932998
360
2.078125
2
40 CFR 266.104 - Standards to control organic emissions. (a) DRE standard - (1) General. Except as provided in paragraph (a)(3) of this section, a boiler or industrial furnace burning hazardous waste must achieve a destruction and removal efficiency (DRE) of 99.99% for all organic hazardous constituents in the waste feed. To demonstrate conformance with this requirement, 99.99% DRE must be demonstrated during a trial burn for each principal organic hazardous constituent (POHC) designated (under paragraph (a)(2) of this section) in its permit for each waste feed. DRE is determined for each POHC from the following equation: (2) Designation of POHCs. Principal organic hazardous constituents (POHCs) are those compounds for which compliance with the DRE requirements of this section shall be demonstrated in a trial burn in conformance with procedures prescribed in § 270.66 of this chapter. One or more POHCs shall be designated by the Director for each waste feed to be burned. POHCs shall be designated based on the degree of difficulty of destruction of the organic constituents in the waste and on their concentrations or mass in the waste feed considering the results of waste analyses submitted with part B of the permit application. POHCs are most likely to be selected from among those compounds listed in part 261, appendix VIII of this chapter that are also present in the normal waste feed. However, if the applicant demonstrates to the Regional Administrator's satisfaction that a compound not listed in appendix VIII or not present in the normal waste feed is a suitable indicator of compliance with the DRE requirements of this section, that compound may be designated as a POHC. Such POHCs need not be toxic or organic compounds. (3) Dioxin-listed waste. A boiler or industrial furnace burning hazardous waste containing (or derived from) EPA Hazardous Wastes Nos. F020, F021, F022, F023, F026, or F027 must achieve a destruction and removal efficiency (DRE) of 99.9999% for each POHC designated (under paragraph (a)(2) of this section) in its permit. This performance must be demonstrated on POHCs that are more difficult to burn than tetra-, penta-, and hexachlorodibenzo-p-dioxins and dibenzofurans. DRE is determined for each POHC from the equation in paragraph (a)(1) of this section. In addition, the owner or operator of the boiler or industrial furnace must notify the Director of intent to burn EPA Hazardous Waste Nos. F020, F021, F022, F023, F026, or F027. (4) Automatic waiver of DRE trial burn. Owners and operators of boilers operated under the special operating requirements provided by § 266.110 are considered to be in compliance with the DRE standard of paragraph (a)(1) of this section and are exempt from the DRE trial burn. (5) Low risk waste. Owners and operators of boilers or industrial furnaces that burn hazardous waste in compliance with the requirements of § 266.109(a) are considered to be in compliance with the DRE standard of paragraph (a)(1) of this section and are exempt from the DRE trial burn. (b) Carbon monoxide standard. (1) Except as provided in paragraph (c) of this section, the stack gas concentration of carbon monoxide (CO) from a boiler or industrial furnace burning hazardous waste cannot exceed 100 ppmv on an hourly rolling average basis (i.e., over any 60 minute period), continuously corrected to 7 percent oxygen, dry gas basis. (2) CO and oxygen shall be continuously monitored in conformance with “Performance Specifications for Continuous Emission Monitoring of Carbon Monoxide and Oxygen for Incinerators, Boilers, and Industrial Furnaces Burning Hazardous Waste” in appendix IX of this part. (3) Compliance with the 100 ppmv CO limit must be demonstrated during the trial burn (for new facilities or an interim status facility applying for a permit) or the compliance test (for interim status facilities). To demonstrate compliance, the highest hourly rolling average CO level during any valid run of the trial burn or compliance test must not exceed 100 ppmv. (c) Alternative carbon monoxide standard. (1) The stack gas concentration of carbon monoxide (CO) from a boiler or industrial furnace burning hazardous waste may exceed the 100 ppmv limit provided that stack gas concentrations of hydrocarbons (HC) do not exceed 20 ppmv, except as provided by paragraph (f) of this section for certain industrial furnaces. (2) HC limits must be established under this section on an hourly rolling average basis (i.e., over any 60 minute period), reported as propane, and continuously corrected to 7 percent oxygen, dry gas basis. (3) HC shall be continuously monitored in conformance with “Performance Specifications for Continuous Emission Monitoring of Hydrocarbons for Incinerators, Boilers, and Industrial Furnaces Burning Hazardous Waste” in appendix IX of this part. CO and oxygen shall be continuously monitored in conformance with paragraph (b)(2) of this section. (4) The alternative CO standard is established based on CO data during the trial burn (for a new facility) and the compliance test (for an interim status facility). The alternative CO standard is the average over all valid runs of the highest hourly average CO level for each run. The CO limit is implemented on an hourly rolling average basis, and continuously corrected to 7 percent oxygen, dry gas basis. (d) Special requirements for furnaces. Owners and operators of industrial furnaces (e.g., kilns, cupolas) that feed hazardous waste for a purpose other than solely as an ingredient (see § 266.103(a)(5)(ii)) at any location other than the end where products are normally discharged and where fuels are normally fired must comply with the hydrocarbon limits provided by paragraphs (c) or (f) of this section irrespective of whether stack gas CO concentrations meet the 100 ppmv limit of paragraph (b) of this section. (e) Controls for dioxins and furans. Owners and operators of boilers and industrial furnaces that are equipped with a dry particulate matter control device that operates within the temperature range of 450-750 °F, and industrial furnaces operating under an alternative hydrocarbon limit established under paragraph (f) of this section must conduct a site-specific risk assessment as follows to demonstrate that emissions of chlorinated dibenzo-p-dioxins and dibenzofurans do not result in an increased lifetime cancer risk to the hypothetical maximum exposed individual (MEI) exceeding 1 in 100,000: (1) During the trial burn (for new facilities or an interim status facility applying for a permit) or compliance test (for interim status facilities), determine emission rates of the tetra-octa congeners of chlorinated dibenzo-p-dioxins and dibenzofurans (CDDs/CDFs) using Method 0023A, Sampling Method for Polychlorinated Dibenzo-p-Dioxins and Polychlorinated Dibenzofurans Emissions from Stationary Sources, EPA Publication SW-846, as incorporated by reference in § 260.11 of this chapter. (2) Estimate the 2,3,7,8-TCDD toxicity equivalence of the tetra-octa CDDs/CDFs congeners using “Procedures for Estimating the Toxicity Equivalence of Chlorinated Dibenzo-p-Dioxin and Dibenzofuran Congeners” in appendix IX of this part. Multiply the emission rates of CDD/CDF congeners with a toxicity equivalence greater than zero (see the procedure) by the calculated toxicity equivalence factor to estimate the equivalent emission rate of 2,3,7,8-TCDD; (3) Conduct dispersion modeling using methods recommended in appendix W of part 51 of this chapter (“Guideline on Air Quality Models (Revised)” (1986) and its supplements), the “Hazardous Waste Combustion Air Quality Screening Procedure”, provided in appendix IX of this part, or in Screening Procedures for Estimating the Air Quality Impact of Stationary Sources, Revised (incorporated by reference in § 260.11) to predict the maximum annual average off-site ground level concentration of 2,3,7,8-TCDD equivalents determined under paragraph (e)(2) of this section. The maximum annual average concentration must be used when a person resides on-site; and (4) The ratio of the predicted maximum annual average ground level concentration of 2,3,7,8-TCDD equivalents to the risk-specific dose for 2,3,7,8-TCDD provided in appendix V of this part (2.2 × 10−7) shall not exceed 1.0. (f) Monitoring CO and HC in the by-pass duct of a cement kiln. Cement kilns may comply with the carbon monoxide and hydrocarbon limits provided by paragraphs (b), (c), and (d) of this section by monitoring in the by-pass duct provided that: (1) Hazardous waste is fired only into the kiln and not at any location downstream from the kiln exit relative to the direction of gas flow; and (2) The by-pass duct diverts a minimum of 10% of kiln off-gas into the duct. (g) Use of emissions test data to demonstrate compliance and establish operating limits. Compliance with the requirements of this section must be demonstrated simultaneously by emissions testing or during separate runs under identical operating conditions. Further, data to demonstrate compliance with the CO and HC limits of this section or to establish alternative CO or HC limits under this section must be obtained during the time that DRE testing, and where applicable, CDD/CDF testing under paragraph (e) of this section and comprehensive organic emissions testing under paragraph (f) is conducted. (h) Enforcement. For the purposes of permit enforcement, compliance with the operating requirements specified in the permit (under § 266.102) will be regarded as compliance with this section. However, evidence that compliance with those permit conditions is insufficient to ensure compliance with the requirements of this section may be “information” justifying modification or revocation and re-issuance of a permit under § 270.41 of this chapter. Title 40 published on 2015-07-01 The following are ALL rules, proposed rules, and notices (chronologically) published in the Federal Register relating to 40 CFR Part 266 after this date.
<urn:uuid:cb8ddbee-9e4a-4d09-bf2e-d4f3fe4aad07>
CC-MAIN-2017-04
https://www.law.cornell.edu/cfr/text/40/266.104
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00401-ip-10-171-10-70.ec2.internal.warc.gz
en
0.897719
2,253
1.875
2
Kids Children TABLET Computer PAD Educational Learning Toys For Boys Girl Educational Tablets For Kids - Name: Tablet Computer toy - Material: Plastics - Size: 19*14.5*2CM - Gender: regardless of gender - Power supply: 3 AAA batteries (Not included) - Color: Blue/Pink - Package including:1 pcs tablet toy - Features Of Educational Tablets For Kids: - 1: It can also help your children learn English, spelling, and matching words - with pictures and mathematics. - 2: Help children improve their eyesight, hearing, problem-solving ability and - comprehensive knowledge. - 3: Exquisite craftsmanship and non-toxic ABS materials make the tablet safe for - 4: Multifunctional music tablet toys play in different ways - 5: Piano keyboard: to improve the sense of rhythm, cultivate interest in music. - 6:Song Recycling: Helps improve hearing and soothe crying babies - 7:Improve dexterity and develop hand-eye coordination ability. - Discretion : - Encourage Independent Play and Learning – Awaken your little one’s curiosity and imagination with a colorful, interactive toy telephone for toddlers featuring fun prompts, games, and lessons at the touch of a button. Children’s Learning Tablet With Letters, Music and Quizzes – This toddler laptop pc toy introduces ABCs, numbers, and words with brightly colored pictures amid engaging melodies and games. Preschool Tablets Designed Especially for Toddlers 3+-Year-Old – made up of kid-friendly, non-toxic material, our children’s learning tablet enables your children to find out and play games on their own. Lightweight and Compact Baby Laptop for Learning On the Go – Pack away your baby tablet and keep your boy or girl occupied during an extended car ride, within the doctor’s lounge, or reception during playtime. Makes an excellent birthday present for teenagers and fogeys – Surprise the birthday boy or girl with a present they’ll love and use every day! Funshpiel’s toddler learning tablet is ideal for birthday parties and holidays, and can even be appreciated by the parents! 100% brand new and high-quality Product Therefore, the best Educational Tablets For Kids, and clear image, video, and screenshot. Therefore the best quality product and good working for all time. And, they are very easily used by all people. And, then they will enjoy entertainment to the fullest with decorating products such as Sofa covers, 3D Carpets, and Cutlery items. Although Browse standard and high-end models on 𝐃𝐫𝐞𝐬𝐬 𝐓𝐡𝐞 𝐇𝐨𝐦𝐞 the best Shopping Mall in the USA. So, Then Just visit our website & Order Now. Then So, Want to check more at 𝐈 𝐍𝐞𝐞𝐝 𝐌𝐞 𝐎𝐧𝐞
<urn:uuid:afbe74ca-22eb-4a7d-86fb-c7e36bd30712>
CC-MAIN-2022-33
https://ineedmeone.com/product/kids-children-tablet-computer-pad-educational-learning-toys-for-boys-girl/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00676.warc.gz
en
0.870567
675
1.992188
2
Apparently its use was first branded unacceptable by a female grammarian. If any single person is responsible for this male-centric usage, it’s Anne Fisher, an 18th-century British schoolmistress and the first woman to write an English grammar book, according to the sociohistorical linguist Ingrid Tieken-Boon van Ostade. Fisher’s popular guide, “A New Grammar” (1745), ran to more than 30 editions, making it one of the most successful grammars of its time. More important, it’s believed to be the first to say that the pronoun he should apply to both sexes. A interesting article, even though it does employ a rather suspect definition of ‘feminist’. The authors seem to think that a move back to ‘they’ is pretty much inevitable, and they seem just fine with that. One suspects William Safire will not be well-pleased with this column published while he was on vacation. (For those who want more on this history, there’s an excellent paper by Ann Bodine in Cameron’s _The Feminist Critique of Language.) Thanks, Mr Jender!
<urn:uuid:2652f415-a431-4c61-96d7-f5b6b5389097>
CC-MAIN-2017-04
https://feministphilosophers.wordpress.com/2009/08/05/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00563-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947425
250
2.640625
3
A simple and flexible timing constraint logic 2012 (English)In: Leveraging applications of formal methods, verification and validation: technologies for mastering change : 5th International Symposium, ISoLA 2012, Heraklion, Crete, Greece, October 15-18, 2012 : proceedings / Part II / [ed] Tiziana Margaria ; Bernhard Steffen, Heidelberg: Encyclopedia of Global Archaeology/Springer Verlag, 2012, Vol. 2, 80-95 p.Conference paper (Refereed) Formats for describing timing behaviors range from fixed menus of standard patterns, to fully open-ended behavioral definitions; of which some may be supported by formal semantic underpinnings, while others are better characterized as primarily informal notations. Timing descriptions that allow flexible extension within a fully formalized framework constitute a particularly interesting area in this respect. We present a small logic for expressing timing constraints in such an open-ended fashion, sprung out of our work with timing constraint semantics in the TIMMO-2-USE project . The result is a non-modal, first-order logic over reals and sets of reals, which references the constrained objects solely in terms of event occurrences. Both finite and infinite behaviors may be expressed, and a core feature of the logic is the ability to restrict any constraint to just the finite ranges when a certain system mode is active. Full syntactic and semantic definitions of our formula language are given, and as an indicator of its expressiveness, we show how to express all constraint forms currently defined by TIMMO-2-USE and AUTOSAR. A separate section deals with the support for mode-dependencies that have been proposed for both frameworks, and we demonstrate by an example how our generic mode-restriction mechanism formalizes the details of such an extension. Place, publisher, year, edition, pages Heidelberg: Encyclopedia of Global Archaeology/Springer Verlag, 2012. Vol. 2, 80-95 p. Lecture Notes in Computer Science, ISSN 0302-9743 ; 7610 Research subject Dependable Communication and Computation Systems IdentifiersURN: urn:nbn:se:ltu:diva-39955DOI: 10.1007/978-3-642-34032-1_12Local ID: ee69017c-f222-4e51-adfe-837fda4b5a6bISBN: 9783642340321OAI: oai:DiVA.org:ltu-39955DiVA: diva2:1013475 International Symposium on Leveraging Applications of Formal Methods, Verification and Validation : 15/10/2012 - 18/10/2012 Validerad; 2012; 20121113 (andbra)2016-10-032016-10-03Bibliographically approved
<urn:uuid:7fd6c874-deee-40b1-b568-092b330f7926>
CC-MAIN-2017-04
http://ltu.diva-portal.org/smash/record.jsf?pid=diva2:1013475
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00291-ip-10-171-10-70.ec2.internal.warc.gz
en
0.789246
601
1.710938
2
Posts Tagged ‘R Lalique Architecture – Rene Lalique Architecture’ Rene Lalique Sales Records: Highest Selling Lalique Auction Total In History With Just 16 R. Lalique Lots February 18th, 2013 There’s no more appropriate place for the sale of great R. Lalique items than Paris. Rene Lalique spent most of his life in Paris. He lived and died in perhaps the greatest of the European metropolises. Most of his inspired and unique works were created there, and it was there in 1900 and again in 1925 that Lalique rose above the fray; rose above the crowded field of artists and designers, and left his contemporaries behind as he captured the attention and the imagination of the world. Many of his works, both unique and commercial show a heavy Japanese artistic influence. In a way, you could predict that perhaps the greatest of all French decorative artists, growing up in the rich pastoral countryside would embrace the natural world motif as a primary artistic expression in the same way that countless generations of Japanese artists had done before him. But you could not predict the new heights to which Lalique would take this traditional expressive motif, as he applied his interpretation of the surrounding world not only to artistically unique objects, but also to the mass production of the new art glass which he brought into the homes of so many people around the world. Echoing an old 20th century American summer camp fireside story, the “foo is on the other shoot”. For today, a whole new generation of eastern artists is trying to build upon the works of the great Frenchman; works that stand squarely on the shoulders of their own native ancestral designers. So it is only fitting that the collection of Tokeo Horiuchi, the enthusiastic collector of turn of the century French decorative art; art which so clearly echoes the motifs of his homeland, would be destined for sale not in Tokyo, a center of high level natural world artistic efforts for so many long past generations, but would instead be brought to Paris, the scene, the home and the leading light of the great wave of the genre that brought Lalique’s work not just to one city or one country, but to most of the civilized world. It’s also fitting that in a sale heavily laden with so many of the names you would expect to hear when assembling an entourage of the great decorative arts achievers of the day; names like Brandt, Cartier, Baccarat, Daum, Dunand, Frere, Galle, Guimard, Jallot, Majorelle, Sevres, Mackintosh and Morris; that the high seller in such a sale would be a non-commercial object made for the very 1900 exposition which was the foundation event for the assemblage. Yes friends, in the rural Midwestern United States, an area not unfamiliar to this writer, they call it a rail or a railing. And no, when they say rail, they aren’t talking about the bird family that includes the coot, though there are quite a few old coots ** and old railbirds *** back in the Western Reserve ****. Heck, when you think Midwestern railing, you think of a split piece of timber laying horizontally between two posts somewhere outdoors that keeps your livestock in place, and not exhibition visitors both astonished and at bay. For something like that, you’d need a fancy name and material other than timber, and in Paris for a high seller they had both. Cire perdue bronze, in the form of a nude butterfly woman; a rail piece that can stand on its own with no fence posts needed :). And a railing that can stand on it’s own when compared artistically and monetarily to the best of the best in the 1900 design world. Oh yea, and it’s not a railing in Paris, it’s a balustrade…. a great French word that means “railing”. So yes, there are thousands of miles of balustrades in the rural midwest, but of course most of the inhabitants (the cows AND the people) can’t speak French so they don’t know it! There were 137 lots in the February 16th sale at Sotheby’s, of which 17 were the works of Lalique. Against an estimate of €200,000 – €300,000, the great Femme Ailee rail sold for a hammer price of €1,050,000 and a premium inclusive total of €1,240,750. At today’s exchange rate of about 1.375 dollars to the Euro (a rate used for all other approximate dollar prices in this article), the railing part made $1,706,000. This same railing had previously sold at Christie’s New York Rockefeller Center Salesrooms as Lot 111 on December 10th, 1998 where it made $134,500 including the buyers premium *****. That’s less than 1/12 of the current price! It is one of five railing parts (having three different designs), several of which are shown in an iconic photo of the Lalique display at the 1900 Exhibition Universelle in Paris. The sale price is likely the 2nd highest price ever achieved at auction for a single work by Rene Lalique, the Lady Trent Doors being the highest. We can safely say it’s the highest price at auction for a Rene Lalique Railing piece and it most definitely was the high selling item in the entire Sotheby’s sale. Another new high seller for Lalique, and a world record price at auction for a Lalique Pocket Watch, was the very cool Butterflies and Bats Pocket Watch. It was also the 2nd highest selling lot in the entire sale, outselling an amazing Bureau Aux Archidees Louis Majorelle Desk! The small 2 inch wide jewel of a watch made an all-in €696,750 against a pre-sale estimate of €150,000 – €200,000. In dollars it’s about $958,000. After the watch, things fell off really quickly (just kidding), as the third high seller for Lalique and fourth for the entire auction, the quintessential nude female pendant with comporting chain, sold for €312,750 or about $430,000, once again blowing out the estimated price of €100,000 – €120,000. Fourth in line for price honors was the 9 centimeters long and stunningly realistic enamel, gold, silver and diamond Butterfly Brooch which hit €300,750 all-in, or about $413,000 against an estimated price of only €60,000 – €80,000. Fifth in the price department was a fabulous and so R. Lalique Brooch featuring the classic Lalique drop baroque pearl under a female face spreading to detailed enamel work. The estimate was €100,000 – €120,000 but the price was €216,750 or about $298,000. In some ways the most surprising price of the sale was for lot 126, a clear and frosted Sauterelles Vase with patina that against a reasonable to strong estimate of €4000 – €6000 made an all-in €13,750 or about $19,000. All in all, of the 17 Lalique lots, 16 sold, the only exception being the lowest estimated of them all, a Font-Romeu Vase with heavy patina estimated at €2500 – €3500. The 16 sellers made €3,410,975 or $4,690,000 making this the highest selling group of R. Lalique at any single auction in history. Quality not quantity was key. Furthermore, every one of the 16 lots that sold made an all-in total that exceeded its high estimate. The average price for the sold lots was €213,186 or $293,000. An amazing group of numbers and another great day for the great Rene Lalique. Here is a link to the Lalique results in the sales catalogue. ** In the U.S., an “old coot” is a kind of a simple minded harmless older person. But you can add some words like crazy or senile to the beginning to give it a more robust and a bit less harmless meaning. *** A “rail bird” is a member of the rail bird family, which as we mentioned includes coots. But if you put the two words together, “railbird” in the U.S. is any sports enthusiast, but specifically a horse-racing fan who sits on, leans on, or hangs out near the track rail at horse races or workouts. **** At the time of the founding of the USA, the 13 colonies agreed to compromise many of the land claims found in their original land grants, specifically the ones that gave them all the land to the next ocean. In return the new government assumed the States’ debts from the Revolutionary War. When Connecticut gave up its expansive land claims, it retained a claim to over 3,300,000 acres on some land in the Northwest Territory that was set aside for future settlement including land reserved for those who lost their homes in the war. That land, which now comprises part of Northern Ohio, was (and still is) called the Western Reserve; land reserved in the west. If you go there today, and head out east of Cleveland (named after the head of the Connecticut Land Company survey crew Moses Cleaveland … a printer dropped the first “a” from his name to save space) to Chagrin Falls and the Chagrin River Valley, you’ll find an amazing idyllic architectural and geographic make-up very much like the old Connecticut countryside. And if were wondering, 3,300,000 acres would equal nearly 6% of the entire UK. ***** The sale catalogue from the 1998 Christie’s New York Sale on December 10, 1998 is available for purchase (including the sales results) in the Decorative Arts Catalogues section in the Library here at RLalique.com. This Library section alone has nearly 500 different auction catalogues of sales, all of which include some Rene Lalique works in the catalogue. These are in addition to the separate Library section which is devoted to totally Lalique Auction Catalogues. Over 100 of those are listed there for sale. Lalique Poissons Vase in Red Rene Lalique Glass Makes Another R. Lalique Record Price At Auction April 24th, 2012 Rene Lalique items continue to get strong prices throughout the world at auction, a good-looking Red Poissons Vase on April 4th in Paris being no exception. Aguttes auction house offered a nice selection of around 15 R. Lalique items at their sale of 20th Century Decorative Arts that day, with the high seller being a Console Table made by Charles Bernel from drawings by Rene Lalique for the Lalique Pavilion at the 1925 Art Deco Exposition In Paris. The rectangular marble table with carved supports made just over €50,000 all in. But it’s the next high seller, at €41,628 all-in against a pre-sale estimate of €16,000 – €18,000 that is most interesting in terms of the current market. That price was paid for Lot 67, the patinated red glass Lalique Vase covered with fish. The price for the Poissons Vase translates into about $55,000 which is almost certainly a record price for a Red Poissons at auction. The Lalique signature shown here was inscribed on the vase. Third high seller in this same sale was a great looking rare candelabra pair in the model Trois Branches Raisins, selling for €31,627 all-in. The sale of the good looking R. Lalique Poissons Vase makes yet another mark on the trail of higher and higher prices. We’ve written previously about the demand and pricing for Rene Lalique glass when Lalique buyers see red, but this price strength, fueled by worldwide bidding interest at auctions, is evident across much of the collecting field. Once again, another great result and a great day for the great Rene Lalique. Rene Lalique Doors: World Record Price For Lalique at Auction! R. Lalique Sales Knock Down Doors And Records! November 23rd, 2011 The great R. Lalique Moineaux Chambranle Crante Doors from Villa Millbrook, the Jersey home of Lady Trent sold as Lot 131 on November 22nd at Sotheby’s in Paris at their sale Arts Décoratifs du XXe siècle & Design Contemporain. Against a pre-sale estimate of €400,000 – €600,00, the final hammer price was €1,750,000 which totaled €2,024,750 including buyers premium, or approximately $2,750,000 at today’s exchange rates. This great R Lalique result is a world record price for a single Rene Lalique work at auction! The wonderful glass and nickel plated steel frame double doors were exhibited in 1929 both at the Salon de la Société des Artistes Décorateurs in Paris, and also at Breves Galleries the same year. They were then installed in the home of Lady Trent, the patron for the famous Lalique Glass Church of Jersey architectural commission which stands to this day as a monument to the great Lalique! To find out more about Rene Lalique and his architectural creations, from the following link you can access all of the Rene Lalique Architectural content here at RLalique.com including past Lalique Architectural auction results as well as news and reference articles. R Lalique Express Rolls On: Rene Lalique Train Panels Track Well In Paris With Great Lalique Results October 1st, 2011 Rene Lalique results at Christie’s Paris “L’âge d’or du rail – Souvenirs de la Compagnie Internationale des Wagons-lits” were oriented towards the high end, continuing a long string of generally very strong sales prices at auction for the works of the Great Lalique. This strong price trend has been in place for several years, and the rare Lalique items in this train related sale conducted by Christie’s followed and extended that trend. Christie’s offered up 12 late 1920’s designed Rene Lalique Architectural Panel Lots and one related lot of a pair of the model of armchairs used for train compartments with fabric by Suzanne Lalique (which made €11,250 all-in, or “all-aboard” *** one might say, which is the case for all prices mentioned in this article). The armchair Lot and Lot 147, the maquette for a compartment for a sleeping car with mahogany and decorative inset panels, both sold to the new Musee Lalique, the latter being pre-empted by the Musee at the low estimate. The wonderful Rene Lalique wood and glass panels rarely come up at auction, and are usually fiercely competed for when they appear. Sept 27th, 2011 was no exception. The intrigue amongst the various competing interested parties for rare and high quality R Lalique at auction is often worthy of Orient Express plot status. In this rare instance some of the offered items themselves can also be said to have reached that plot level as well. The Lalique train lots were 143 thru 155, and things got rolling right out of the station with Lot 143 (pictured), the 9 piece glass panel Figurines Et Raisins making the high R. Lalique sale price of €133,000. This would prove to be the high price not just of any R Lalique panel in the sale, but the high selling lot of the auction as well. This was followed by the decorated wood with glass inserts panel Bouquet De Fleurs which at roughly 32 inches by 15 inches, made €67,000. Lot 148, another slightly different 9 piece Figurines Et Raisins Panel, got what would turn out to be 2nd place in the Lalique high sales compartment at €91,000, and the third high selling lot of the entire auction. Fourth place for R Lalique went to Lot 147 (pictured), a restored maquette for a compartment featuring R. Lalique panels, which made €53,800. Also pictured is Lot 151, another Bouquet De Fleurs panel version, roughly 3 feet by 1 foot, which sold for €11,875. In total the 12 Rene Lalique panel lots made €472,225 (roughly $640,000). This was about 40% above the total high estimates of €344,700, with a 100% sales rate, as all 12 lots sold. The average price per lot was €39,352. These totals and averages exclude Lot 145, the pair of related armchairs mentioned above. Kudos to Christie’s Paris for engineering another great RLalique sales offering! *** The phrase “all aboard” originated as a train conductor “get on the train, we’re leaving” warning in the United States. The phrase has nautical origins (which makes sense because in the early 19th century, the majority of the European population in the new world likely arrived by boat :), but was first recorded as being used on trains in 1837 in America, and its use has since spread to other forms of transportation. R.Lalique Glass Church: Rene Lalique Architectural & Religious Lalique Glass: St. Matthew’s Church in Jersey August 18th, 2011 In 1860, the year before the American Civil War started, 10 year old Jesse Boot of Nottingham England began helping his mother run the family medicine shop when his father John died. By age 13 he left school to concentrate on his work in the shop. In the ensuing decades, Jesse would turn the single medicine shop into the major national chain Boots the Chemists. 60 years later in 1920, he sold control of the “Chemists to the Nation” to an American company. Jesse died on the Channel Island of Jersey 11 years later in 1931. Along the way Boot would be knighted Sir Jesse Boot (1909), create a baronet (1917), and in 1929, become Baron Trent of Nottingham, (not as cool as Sheriff, but still a great title:), aka Lord Trent. He did not live to see his son John, the 2nd Baron Trent and his own father’s namesake, re-acquire control of the chain in 1933 in the midst of the depression. Boot was also a philanthropist, especially in Nottingham and in Jersey. For one of many examples, he donated the land for what is now the University of Nottingham, which opened in 1928, where the Jesse Boot Chair in Chemistry was named in his honor. Boot’s wife, Lady Florence Trent (her maiden name was Florence Rowe) survived him. She kept her principal residence in Jersey, the place they had first met. But Lady Trent also kept a residence on the French Riviera in Cannes, where fortuitously, a famous Frenchman also kept a home; a man who like her deceased husband, had achieved phenomenal success satisfying the new consumer demand created by the industrial revolution. Yes readers, Rene Lalique kept a place in Cannes and was a neighbor of Lady Trent. In 1932, the year after her husband’s death, Lady Trent asked her neighbor to design new interior fittings in glass for the 1840’s era St. Matthew’s Church of Millbrook located just across the road from her Jersey home which she called Villa Millbrook. It was to be a major architectural undertaking in honor of Baron Trent and Lalique agreed to take the commission. Two years later, in 1934, Lalique’s fabulous undertaking was completed and installed in St. Matthew’s, complemented by additional interior modifications by the Jersey architect A.B. Grayson, an accomplished art deco designer, most notably of private homes. Lalique glass includes the communion rail, communion table, screens, the altar cross and pillars, a Lalique glass font, window and door panels, and a reredos (altar screen). The art deco Lalique design highlights include angelic figures and Jersey lilies. Today St. Matthew’s remains a functioning community place of worship. But owing to the amazing work of the great Lalique, it is better known worldwide as “The Glass Church”. So it’s also an Art Deco treasure of Jersey and a tourist attraction in addition to being a religious establishment. Last year, the 170 year old Church commenced its first major renovation in over 70 years. The total cost is estimated at £1,000,000. We were alerted to the renovation a year ago through a BBC article which detailed the renovation project and linked out to three reference sources: the “States of Jersey” website, the “Glass Church” website, and to the “Rene Lalique Worldwide Gathering Place”! How great is that? The overhaul is planned to include: Conservation to the Lalique Glass and the supporting structures of the glass. Restoration of the bell housing and bells. Replace the electrical wiring and update the lighting. New heating system. Interior redecoration and new landscaping. An organization named The Friends of the Glass Church has been set-up under the auspices of the Lieutenant Governor of Jersey, Lieutenant General Andrew Ridgway, to raise funds for the renovations. They have already raised approximately £140,000 toward the project. Updating of the roof was finished in 2010. Also the States of Jersey has approved a matching funds grant of £125,000. Phase two, which is the refurbishment of the bell tower, bells, and some asbestos removal, should be completed in early October, at which time the church will re-open. Details of how you can contribute to the project can be found at the Friends of the Glass Church website or the Church’s website, both of which are linked previously. We urge you to consider generously supporting this uniquely Rene Lalique effort. We spoke with church officials in preparation for this article and were given the following visitor information: Visitors are welcome at the Church Monday thru Friday from 9:00 AM to 5:30 PM. The Church is closed on Saturdays. Regular services are held on Sunday at 11:00 AM and visitors are welcome to attend. St. Matthew’s home, the island of Jersey has a rich history owing to its location between France and England. It has a population of around 100,000, and both French and English are spoken there. Jersey is a separate possession of the crown; it’s a dependency and not part of the United Kingdom. It even has its own currency, though several other currencies also circulate on the island. It’s a crossroads of cultures and activities. If you plan to visit, almost everything you ever wanted to know about Jersey can be found at their Jersey.com website, including travel, lodging, attraction and activity choices. And finally, if you’d like to see many examples of architectural elements created by Rene Lalique, check out the Lalique Architectural Glass page in the R. Lalique Catalog here on the website. Rene Lalique Glass Panel Doors: Lalique’s Doors at 40 Cours la Reine – A Lalique Architectural Landmark February 19th, 2010 Rene Lalique moved in 1902 to a new residence and workshop at 40 Cours la Reine in Paris. The building was a renovation totaling five floors. The first two floors were show and retail space for Lalique’s expanding business. There was also Lalique’s workshop and Lalique’s residence above. It was here, that Lalique installed what might be his first and most important architectural statement; the famous Lalique glass panel doors. The doors consisted of glass panels set in a metal frame. These doors contain a design of pinecones and branches with each panel being a different part of the picture. The relief glass design of the doors continues from the glass panels onto the exterior of the building. It’s also echoed in the railings that rim the windows of the residence! Lalique died at the age of 85 in this same house 43 years later as World War II was coming to and end. Over a century later, the doors remain a quiet yet iconic reminder of the creativity, foresight, and design talent of Rene Lalique. And as Nicholas Dawes notes in his standard reference work “Lalique Glass”, this single creative element incorporated into the exterior decor of his own shop and residence, may have been responsible for many future architectural commissions as potential clients came to the shop and experienced the wonder of the great glass panel doors. If you are in Paris though, you may have trouble finding the doors at 40 Cours la Reine. Why? Because the street has been renamed to 40 Cour d’Albert! But worry not if you cannot find or cannot go! We have found a good-humored guy from the east coast, Richard Nahem, who now lives in Paris and who loves to take photos. Richard has taken some great detailed pictures of the former Lalique residence including the famous Lalique Glass doors. So we thought it would be great to share this bit of Lalique architectural history with you as shown through those photos And don’t forget, you can find links to all resources related to Rene Lalique Architecture at RLalique.com in the Rene Lalique Architecture Section of the Lalique Biography. By the way, Richard runs a very entertaining and informative blog about life in Paris, aptly named eyepreferparis.com! Of course, if this writer were penning a location touting blog, it would likely be named EyePreferHangingOutAtWorldHeadquarters.com! And lest you be left in wonder, yes, World Headquarters is not without it’s own great glass and metal work door. Notice all the similarities? The great Lalique doors have glass and our door has glass. The great Lalique doors have metal and our door has metal. The Lalique doors open and close and our door opens and closes. Pretty similar right? It’s almost freaky the number of things the World Headquarter door has in common with the Lalique doors. Too bad it can’t hold a candle to* the work of the great Rene Lalique 🙂 Hmmmmm….. *”Can’t hold a candle to” is an expression from the days before electric lights. When a person had to do some work in the dark, it might require a helper to hold a candle to illuminate the work area. Simple job, holding the candle. Of course, if your skill level or attention level or work ethic was so low that you could not properly perform the task of holding the candle it would put you in a negative light (no pun intended on the light thing). Anyway, can’t hold a candle to whatever, became a phrase to denote low talent or low worthiness by comparison to something else. For example, there is no website in the world about Rene Lalique and his works that can hold a candle to RLalique.com! Don’t know how we thought up this great example, it just popped in our heads! Rene Lalique Fountain Statue: An R Lalique Pigeon! Is this Lalique Glass Bird For The Birds? November 4th, 2009 Rene Lalique Pigeon Statue From A Fountain! A Lalique Glass Big Bird! An apparently surviving Rene Lalique statue likely from a long ago disassembled fountain that once occupied a roundabout intersection on the Champs Elysées in Paris has appeared at auction. An R Lalique Bird so rare, it is not shown in the Catalogue Raisonne (except in a photo of the fountain) even as a drawing; though the mate to this bird, the head down pigeon does appear as a drawing in the Catalogue. See page 871 of the 2004 edition. The R Lalique Art Deco style Pigeon is quite large, measuring 35 cm in length and 22 cm high. The Pigeon fountain element has damage to the base that attached it to its original resting place, but otherwise, seems in pretty good shape from the detailed photos provided by the seller. Here is a link to a saved/cached image version of the original 170399426823 listing online. You may have to use the zoom function of your browser (or whatever program opens images for you) to get the cached image to expand in the window if it does not appear full size. After clicking on the link to the item, a new window will open with the cached image in it. On a Mac, just click on the image and see if that expands it. If not, press the apple key and click on the cached image in your browser window. On a PC, hold down the alt key while clicking on the cached image. Might be worth taking a flyer** at the current price of around $1140, and maybe some distance north of that amount as well. 🙂 As usual, check it out and satisfy yourself before bidding, not just on the piece, but on the terms (a big bird for international shipping that won’t fly itself to your house)! See our Rene Lalique Auction Buyers Guide for extensive details on bidding at auctions! We’ve listed this bird in the Rene Lalique Auctions Worldwide section here on the website. And of course, the out of print and extremely hard to find R.Lalique Catalogue Raisonne is available in the Rene Lalique Books and Library section. Leave it to the great Rene Lalique to create a pigeon covered fountain that is not also covered by the mess! * The expression “For The Birds”, also “That’s For The Birds”, and the even more emphatic “Strictly For The Birds”, is an American expression that has not caught on elsewhere. The earliest records of it are from the mid 1940’s, being used as a slang in the US Military! The expression indicates something that is meaningless or worthless, something for gullible people. ** The expression “Take a Flyer” is a mainly American and British expression that means: Take a chance! Rene Lalique Architecture: The Imperial Family of Asaka, Rene Lalique Glass, and The Tokyo Metropolitan Teien Art Museum August 16th, 2009 Rene Lalique Architectural Door Panels In the Tokyo Metropolitan Teien Art Museum: How did they get there? The short version is, they were shipped by boat:), but as usual the whole story is a bit more complicated! We’ll try and keep it brief as usual. In 1852, Meiji the Great, destined to be the 122nd Emperor of Japan was born with the name Mutsuhito. His birth was less than a year before Admiral Perry would arrive on the scene. In 1867 at the age of 14, he became Emperor of Japan. He had no children with his wife, but had 15 kids with 5 different official consorts. Only five of his children survived childhood. The one of the five we are interested in is Princess Nobuko, the eighth daughter of the Emperor. In 1910 she married the royal Prince Yasuhiko, also an eighth child, who four years earlier had established the Imperial Family of Asaka! In the early 1920’s, the Prince headed off to Paris for military studies. There he was seriously injured in a car accident in 1923. His wife came to Paris to help nurse him back to health, and they both were still in Paris in 1925 when the 1925 Exposition Internationale Des Arts Decoratifs took the world by storm. Apparently, it took the Asaka family by storm as well, and the new art deco style, decoratif art in everyday life, caught their fancy. In 1929, they began work on an Art Deco residence in Tokyo that was completed in 1933. While the Ministry of Imperial Household oversaw the design and construction, the input of several of the great French decorative arts practitioners, notably Rene Lalique, and to a larger degree Henri Rapin (to whom the Prince entrusted the interior design of 7 of the rooms), made the house a model of modernist art deco restraint and style. The architectural contributions of Rene Lalique included the glass panel doors, and the chandeliers in the dining hall and grand guest room. Fast forward through a war, the Asaka Family in 1947 lost it’s membership in the Imperial Household, the residence was taken over by the government and put to various government uses, and finally, it was turned over to the Tokyo Metropolitan Foundation For History and Culture, which opened the doors of the Asaka residence as the Tokyo Metropolitan Teien Art Museum in 1983. The Asaka residence had wonderful grounds surrounding it, hence the addition of the word “Teien”, meaning park or gardens, to the name of the museum. And that is why the great doors and chandeliers of Rene Lalique still exist in their original home today, along with other decorative R Lalique objects, all preserved in the museum. Over the years, the museum has held many exhibitions, including a great Rene Lalique exhibition in 1988 that is documented extensively in the catalogue book of the exhibition containing about 200 very high quality R Lalique photos. A copy of this rare catalogue book from the exhibition at the former Asaka residence is available in the Rene Lalique Books and Library Section. What happened to Prince Asaka, the creator of the great art deco residence? He served in the military during World War II (not without some controversy), making the rank of General. After the war he moved to the small city of Atami south of Tokyo where he became an avid golfer. He lived to the age of 93, passing away in 1981! And why are we telling you all this now? Well, it’s great R Lalique history, and more importantly, we stumbled across a peaceful video of the museum, which takes you thru a personal video tour, including looks at some of the works of Rene Lalique which are installed and housed at the former Asaka residence. A relaxing look at the works of the great Rene Lalique at the Tokyo Metropolitan Teien Art Museum. Who Bought 30 TONS of R Lalique Glass? A “Castle In The Air” and An American Success Story! January 10th, 2009 In 1906, James Oviatt left Salt Lake City and headed to Los Angeles to make his fortune. 5 years later in 1911, he partnered up with Frank Alexander to create what would become THE high end fashionable clothing store in Los Angeles: Alexander and Oviatt. Oviatt traveled extensively buying fabrics and keeping up with fashions worldwide to bring his clients the latest and greatest from around the world. 1925 saw Oviatt at the Paris Exposition, where he gave the great Rene Lalique a commission to fabricate the architectural glass for his planned Oviatt Building in Los Angeles, which was to become the first Art Deco building in the city. More than 30 tons of glass made for the new Oviatt Building were shipped thru the Panama Canal and installed all over the 12 story building. Lalique also created a perfume bottle to commemorate the opening of the building, the distinctive “Le Parfum Des Anges” which includes in it’s design the seal of the City of Los Angeles, and which is pictured below. And Oviatt also ordered custom tableware from Lalique, monogrammed with his initials for use in the penthouse. Only a few pieces of this tableware are known to have survived. Oviatt and his wife lived on the top of the building, in a 10 room penthouse with two floors of outdoor terraces that became famous not just for the parties and the celebrities that frequently visited there, but also for the magnificent R Lalique glass which can still be found there to this day. The Penthouse terraces had a pool, tennis courts, a sand beach, a putting green, and gardens. Everyone from Howard Hughes to Errol Flynn frequented the penthouse. It was in its day, and it remains 80 years later, an amazing place. The Oviatts lived in the penthouse for nearly 50 years until the mid 70’s. Recently, the penthouse has been magnificently restored, and can be rented for weddings, parties, etc. The original roof top pool is gone, but you can party there both indoors and out with no curfew on your live music. Rumor is that the penthouse is also rented from time to time by LA celebs wanting privacy and an in town get-away. Here is a link to a Video Tour of the Oviatt Penthouse (sorry, it’s from TV Bride, showing the penthouse as a place to rent for a wedding :)! Also, additional information is contained at this link to the Oviatt Building Penthouse Website. As the building is in the National Register of Historic Places, here is a link to added information at the LA Conservancy. And finally, here is a link to a very Detailed History Of The Building. It is possible to get a tour of the Penthouse under certain circumstances. The Oviatt is an LA Landmark, an Iconic Art Deco Structure, and a lasting testament to the work of Rene Lalique! If you’re in LA and decide to inquire either at the Oviatt or at the Conservancy, don’t forget to tell them you read about it here, at RLalique.com!
<urn:uuid:eabcbebf-b3d5-4893-ad05-258bc1826a7b>
CC-MAIN-2017-04
https://rlalique.com/blog/?tag=r-lalique-architecture-rene-lalique-architecture
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00557-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957595
7,959
1.921875
2
Our online services are based on the highly distinguished Finnish education expertise, and are designed to develop professional competences all over the world. The online services include webinars, online training, and online programmes. Our ready-made online programmes for teachers and other education professionals are presented below. You can also see examples of tailor-made online services on our reference page. If you are interested in ordering online services for your group of professionals, please contact us. STEM Education for Early Childhood and Primary Teachers STEM Education for Early Childhood and Primary Teachers is an innovative online learning solution for early education teachers. With our practical approach, teachers will learn in small bits, and they will learn the method and the content at the same time. Star Lessons: Online Programme for Teacher Training Star lessons is a Finnish online programme for teachers. Teachers will learn the theory in small concrete parts, and it can easily be applied in teaching practices. They can immediately take the ideas into their own classrooms and create pedagogically meaningful learning opportunities for their students and promote the students’ capacity to learn. Student-Engaging Learning Practices Through this online programme, participants will learn the most modern educational practices currently being used by Finnish teacher trainers. Following the programme, teachers will be able to maximise the number of interested and motivated students, who are truly engaged in learning. This online programme gives participants fundamental knowledge on how people learn. Following the programme, participants will understand the essential elements of the human brain, memory, and learning, that are relevant in designing high-impact instruction and teaching. This online programme provides teachers with the tools necessary to implement future skills in their teaching practices, and helps them promote future skill development in their students. This online programme helps participants to understand what phenomenon-based learning is, and how to design projects based on around it.
<urn:uuid:e190664f-0e85-4eae-82cf-5f101b76ac3a>
CC-MAIN-2022-33
https://hyplusglobal.fi/services/online-services/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00268.warc.gz
en
0.93196
389
1.96875
2
Creating a Sustainable Rhode Island Through Thoughtful Tourism Development Tourism's Impact on Rhode Island: *In 2010, the total economic impact of travel & tourism (direct and indirect) was $2.37 billion. This represents 5% of RI Gross State Product. *More than 41,900 jobs - direct and indirect - were created by travel & tourism economic activity. This accounts for 9.3% of total employment in RI. *Tourism generated $930 million in federal, state, and local government taxes in 2010, with the state and local tax contribution making up 8.4% of all RI state revenue. *Source: Global Insight, 2010 Rhode Island Tourism District Initiatives: Proudly promotes Rhode Island as a preferred destination for business and leisure travel Develops productive partnerships with all segments of the tourism industry - lodging, dining, transportation, attractions, events, recreation and shopping Supports collaborative programs to effectively position Rhode Island and its distinct regions in the national tourism marketplace Engages with local communities on product development initiatives that enhance the visitor's experience and local quality of life For more information about Rhode Island's tourism regions, Rhode Island Tourism Division Providence Warwick © 2015 The Providence Warwick Convention & Visitors Bureau 10 Memorial Boulevard Providence, RI 02903
<urn:uuid:bd1c251d-ef0c-470f-9474-6b5e2141b01c>
CC-MAIN-2017-04
http://www.goprovidence.com/ritdn/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00521-ip-10-171-10-70.ec2.internal.warc.gz
en
0.814515
271
2.171875
2
|1742 by topic| |Arts and science| |Lists of leaders| |Birth and death categories| |Establishments and disestablishments categories| |Ab urbe condita||2495| |Balinese saka calendar||1663–1664| |British Regnal year||15 Geo. 2 – 16 Geo. 2| |Chinese calendar||辛酉年 (Metal Rooster)| 4438 or 4378 — to — 壬戌年 (Water Dog) 4439 or 4379 |- Vikram Samvat||1798–1799| |- Shaka Samvat||1663–1664| |- Kali Yuga||4842–4843| |Japanese calendar||Kanpō 2| |Julian calendar||Gregorian minus 11 days| |Minguo calendar||170 before ROC| |Thai solar calendar||2284–2285| 1868 or 1487 or 715 — to — 1869 or 1488 or 716 1742 (MDCCXLII) was a common year starting on Monday of the Gregorian calendar and a common year starting on Friday of the Julian calendar, the 1742nd year of the Common Era (CE) and Anno Domini (AD) designations, the 742nd year of the 2nd millennium, the 42nd year of the 18th century, and the 3rd year of the 1740s decade. As of the start of 1742, the Gregorian calendar was 11 days ahead of the Julian calendar, which remained in localized use until 1923. - January 9 – Robert Walpole is made Earl of Orford, and resigns as First Lord of the Treasury and Chancellor of the Exchequer, effectively ending his period as Prime Minister of Great Britain. On his formally relinquishing office five days later, he will have served 20 years and 314 days as Prime Minister, the longest single term ever, and also longer than the accumulated terms of any other British Prime Minister. - January 14 – Edmond Halley dies; James Bradley succeeds him as Astronomer Royal of Great Britain. - January 24 – Charles VII becomes Holy Roman Emperor. - January 28? – The House of Commons of Great Britain votes on the alleged rigging of the Chippenham by-election. It becomes a motion of no confidence, which leads to the resignation of Robert Walpole. - February 12 – John Carteret, 2nd Lord Carteret becomes Secretary of State for the Northern Department in Great Britain. - February 15— First Silesian War, part of War of the Austrian Succession: Troops of the Kingdom of Prussia, Saxony and France, under the command of Prince Dietrich of Anhalt-Dessau, capture the Moravian town of Iglau (now Jihlava). At this point, the Saxons and French declare that their obligations to Prussia have ceased. - February 16 – Spencer Compton, Earl of Wilmington, becomes Prime Minister of Great Britain. - February 22 – Henry Fielding publishes his picaresque novel Joseph Andrews anonymously in London when "the first edition... reached the bookstalls" in the city. - March 15 - March 29 – Acting in his capacity of Grand Duke of Lithuania, Poland's King Stanisław August Poniatowski issues a proclamation allowing Jews in the Lithuanian capital of Vilnius to live anywhere except for two public streets, the Pilies street and the Galves Street. - April 13 – George Frideric Handel's oratorio The Messiah is first performed, in Dublin, Ireland in aid of local charities. - May – In Peru, Juan Santos takes the name Atahualpa II, and begins an ill-fated rebellion against Spanish rule. Father Domingo Garcia sends the first report of the rebellion to his superiors on June 2. - May 17 – Frederick the Great's army defeats the Austrians in Chotusitz. - May 24 – War of the Austrian Succession: French forces defeat the Austrians in the Battle of Sahay. - June 7 – Christian Goldbach first describes Goldbach's conjecture ("Every even number is the sum of two primes") in a letter to fellow mathematician Leonhard Euler. - June 11 – Peace of Breslau: Austria cedes Silesia to Prussia. - June 20 – Izmir, formerly the ancient Greek city of Smyrna, is destroyed by fire. - July 7 – War of Jenkins' Ear: Battle of Bloody Marsh – British troops repel those of Spain (under Montiano), in the Province of Georgia. - July 14 – William Pulteney is created 1st Earl of Bath in Great Britain. - August 17 - Accompanied by 10 French Army observers, Choctaw Indians from the French Louisiana territory cross the Tombigbee River and raid Chickasaw Indian towns in Georgia. Over three days, the attackers lose 50 men, the Chickasaw defenders about 25. For permitting the attack, the French Louisiana governor, the Sieur de Bienville, is summoned back to Paris. - Irish author and poet Dean Jonathan Swift is declared by a court to be "of unsound mind and memory" and confined to home treatment for the remaining three years of his life. - August 19 - A British fleet led by Commodore William Martin enters the harbor of Naples with three warships, two frigates, and four bomb vessels, and sends a message giving the King Charles VII of Naples (the future King Charles III of Spain) 30 minutes to agree to withdraw Neapolitan troops from the Spanish Army. Don Carlos agrees and ends the threat of a Spanish foothold in Italy. - Voltaire's controversial play Fanatacism, or Mahomet the Prophet is first performed, in Paris, to a theatre audience filled with French nobility. - August 20 – The Swedish-Russian War effectively ends as 17,000 Swedish troops surrender in Finland at Helsingfors (modern-day Helsinki). - August 27 – George Anson, captain of HMS Centurion, arrives with his seriously ill crew at the island of Tinian (now U.S. territory as one of the Northern Mariana Islands and saves his mission. - September 5 – The 46 survivors of Russia's Great Northern Expedition return to Petropavlovsk after having been shipwrecked on an island in the Bering Strait ten months earlier. They had completed the building of a new ship from the wreckage of the St Pyotr on August 21. - September 16 – Construction starts on the Foundling Hospital in London. - October 5 - November 13 – The Royal Danish Academy of Sciences and Letters is founded. - December 2 – The Pennsylvania Journal first appears in the United States. - The Lopukhina Conspiracy arises at the Russian court. - The Afghan tribes unite as a monarchy. - Daniel le Pelley succeeds Nicolas le Pelley, as Seigneur of Sark. - Molde, Norway, becomes a city. - Eisenach, Germany builds its Stadtschloss (city castle). - Spain completes the construction of Fort Matanzas in the Matanzas Inlet, approximately 15 miles (24 km) south of St. Augustine, Florida. - The University of Erlangen is founded in Bavaria. - Anders Celsius publishes his proposal for a centigrade temperature scale originated in 1741. - Colin Maclaurin publishes his Treatise on Fluxions. - Charles Jervas's English translation of Don Quixote is published posthumously. Through a printer's error, the translator's name is printed as 'Charles Jarvis', leading the book to forever be known as the Jarvis translation. It is acclaimed as the most faithful English rendering of the novel made up to this time. - The Roman Catholic church decrees that Roman ceremonial practice in Latin (not in Chinese) is to be the law for Chinese missions. - January 8 – Philip Astley, English circus organizer (d. 1814) - March 9 – Michael Anckarsvärd, Swedish politician (d. 1838) - March 10 – Sampson Salter Blowers, American lawyer, jurist (d. 1842) - March 14 – Agha Mohammad Khan Qajar, Iranian king (d. 1797) - March 12 – Aletta Haniel, German business person (d. 1815) - April 28 – Henry Dundas, British statesman (d. 1811) - May 6 – Jean Senebier, Swiss pastor, botanist (d. 1809) - June 25 – Johann Schweighäuser, German classical scholar (d. 1830) - June 26 – Arthur Middleton, American politician (d. 1787) - June 28 – William Hooper, American statesman (d. 1790) - July 21 – John Cleves Symmes, American statesman (d. 1814) - July 27 – Nathanael Greene, American general (d. 1786) - August 14 – Pope Pius VII (b. Barnaba Niccolò Maria Luigi Chiaramonti), Italian Benedictine (d. 1823) - September 14 – James Wilson, American politician, Associate Justice of the Supreme Court of the United States (d. 1798) - October 3 – Anders Jahan Retzius, Swedish chemist, botanist (d. 1821) - October 6 – Johan Herman Wessel, Norwegian poet (d. 1785) - November 5 – Richard Cosway, English artist (d. 1821) - December 9 – Carl Wilhelm Scheele, Swedish chemist (d. 1785) - December 16 – Gebhard Leberecht von Blücher, Prussian general (d. 1819) - December 26 (bapt.) – George Chalmers, Scottish antiquarian (d. 1825) - date unknown – Rafaela Herrera, Nicaraguan heroine (d. 1805) - date unknown – Francis Nash, American military officer (d. 1777) - date unknown – Hendrik Frans de Cort, Flemish painter (d. 1810) - January 1 – Peregrine Bertie, 2nd Duke of Ancaster and Kesteven, English statesman (b. 1686) - January 25 – Edmond Halley, English astronomer (b. 1656) - February 22 – Charles Rivington, English publisher (b. 1688) - March 23 – Jean-Baptiste Dubos, French author (b. 1670) - April 2 – James Douglas, Scottish physician, anatomist (b. 1675) - April 15 – Samuel Shute, Governor of Massachusetts Bay and New Hampshire (b. 1662) - April 17 – Arvid Horn, Swedish statesman (b. 1664) - May 13 – Ludwig IX, Landgrave of Hesse-Darmstadt (b. 1719) - May 21 – Lars Roberg, Swedish physician (b. 1664) - May 26 – Pylyp Orlyk, Ukrainian Zaporozhian Cossack starshina, diplomat (b. 1672) - June 18 – John Aislabie, British politician (b. 1670) - June 27 – Nathan Bailey, English philologist, lexicographer - July 1 – Bohuslav Matěj Černohorský, Czech composer (b. 1684) - July 2 – Robert Petre, 8th Baron Petre, British peer, renowned horticulturist (b. 1713) - July 4 – Guido Grandi, Italian mathematician (b. 1671) - July 9 – John Oldmixon, English historian (b. 1673) - July 12 – Evaristo Abaco, Italian composer (b. 1675) - July 14 – Richard Bentley, English scholar and critic (b. 1662) - July 19 – William Somervile, English poet (b. 1675) - July 23 – Susanna Wesley, mother of John and Charles Wesley, known as mother of Methodism. (b. 1669) - July 30 – Nicholas Roosevelt (1658–1742), Dutch-American politician (b. 1658) - August 14 – Maria van Lommen, Dutch gold- and silversmith and guild member (b. 1688) - August 25 – Carlos Seixas, Portuguese composer (b. 1704) - September 18 – Vincenzo Ludovico Gotti, Italian Catholic cardinal (b. 1664) - September 22 – Frederic Louis Norden, Danish explorer (b. 1708) - September 27 – Hugh Boulter, Irish Archbishop of Armagh (b. 1672) - September 28 – Jean Baptiste Massillon, French bishop (b. 1663) - November 12 – Friedrich Hoffmann, German physician, chemist (b. 1660) - November 20 – Melchior de Polignac, French diplomat (b. 1661) - November 24 – Andrew Bradford, American publisher (b. 1686) - December 18 – William Fairfield, Massachusetts Speaker of the House of Deputies (b. 1662) - December 31 – Karl III Philip, Elector Palatine (b. 1661) - Williams, Hywel (2005). Cassell's Chronology of World History. London: Weidenfeld & Nicolson. p. 309. ISBN 0-304-35730-8. - R. B. Mowat, A New History of Great Britain: From the accession of James I to the Congress of Vienna (Oxford University Press, 1922) p464 - "A dozen Downing Street departures". BBC News. May 9, 2007. Archived from the original on August 23, 2007. Retrieved July 14, 2007. - Thomas Carlyle, History of Friedrich II of Prussia, called Frederick the Great, Vol. 15 (1865, reprinted by Charles Scribner's Sons, 1903) p319 - "Appendix E: History of the Publication", by Paul A. Scanlon in Joseph Andrews, by Henry Fielding (Broadview Press, 2001) p504 - International Military Alliances, 1648-2008, ed. by Douglas M. Gibler (Congressional Quarterly Press, 2008) pp. 88, 105. - Doane Robinson, History of South Dakota (B. F. Bowen & Company, 1904) p53 - "The Jewish living space in the Grand Duchy of Lithuania: tendencies and ways of its formation", by Jurgita Šiaučiūnaitė-Verbickienė, in Jewish Space in Central and Eastern Europe: Day-to-Day History (Cambridge Scholars Publishing, 2009) p24 - Colonial Latin America: A Documentary History, ed. by Kenneth Mills, et al. (Rowman & Littlefield, 2002) p302 - "Goldbach's Conjectures: A Historical Perspective", by Robert C. Vaughan, in Open Problems in Mathematics, ed. by John Forbes Nash, Jr. and Michael Th. Rassias. Springer, 2016) p479 - "Fires, Great", in The Insurance Cyclopeadia: Being an Historical Treasury of Events and Circumstances Connected with the Origin and Progress of Insurance, Cornelius Walford, ed. (C. and E. Layton, 1876) p50 - Edward J. Cashin, Guardians of the Valley: Chickasaws in Colonial South Carolina and Georgia (University of South Carolina Press, 2009) p57 - "Swift, Jonathan", by Donald C. Mell, in Macmillan Dictionary of Irish Literature, ed. by Robert Hogan (Macmillan, 2016) p652 - I. S. Leadam, The Political History of England: The history of England from the accession of Anne to the death of George II, 1702-1760 (Longmans, Green and Co., 1909) p372 - S. G. Tallentyre, The Life of Voltaire, Volume 1 (G. P. Putnam's Sons, 1910) p141. - "Russo-Swedish War of 1741–43", in Dictionary of Wars, by George Childs Kohn (Routledge, 2013) p420 - "Anson, George", by Keith A. Parker, in Historical Dictionary of the British Empire, ed. by James S. Olson and Robert Shadle (Greenwood Publishing, 1996) p68 - Edward Heawood, "A History of Geographical Discovery in the Seventeenth and Eighteenth Centuries" (Cambridge University Press, CUP Archive, 1912) p267 - An Account of the Foundling Hospital in London, for the Maintenance and Education of Exposed and Deserted Young Children (Foundling Hospital, 1826) p20 - Lorenzo Boturini Benaduci, Idea of a New General History of North America: An Account of Colonial Native Mexico (University of Oklahoma Press, 2015) p6 - Lois Mulkearn, ed., George Mercer Papers: Relating to the Ohio Company of Virginia (University of Pittsburgh Press, 1954) p657 - "Halley, Edmond". astro.uni-bonn.de.
<urn:uuid:933b91ec-649e-48da-8884-4ccb8515409c>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/1742
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00268.warc.gz
en
0.923279
4,131
2.546875
3
Buffalo, Yellowstone National Park Photograph by William Albert Allard Charging through a veil of white, as in a prehistoric cave painting sprung to life, a herd of buffalo plows through heavy snow. In the ermine splendor of winter, bison, elk, bighorn sheep, antelope, and deer still wander the virgin wilderness of Yellowstone National Park. Morning Glory Pool, Yellowstone National Park Photograph by Michael Melford The vivid hues of Yellowstone National Park’s steaming Morning Glory Pool stand out in stark contrast from its snow-covered surroundings. U.S. Capitol, Washington, D.C. Photograph by Jay L. Clendenin/Aurora Photos Taking advantage of a Washington, D.C., snowstorm, a sledder glides down the gently sloping grounds of the U.S. Capitol. Lake Mendota, Wisconsin Photograph by Peter Essick Anglers from across Wisconsin flock to the shores of Lake Mendota, where frozen waters mark the start of peak walleye season. Mendenhall Lake, Alaska Photograph by Alaska Stock, National Geographic A climber makes his way up an iceberg in Alaska's Mendenhall Lake, at the terminus of Mendenhall Glacier near Juneau. Joshua Tree National Park, California Photograph by Mark Pallette, My Shot Snow from a passing storm lingers in southern California’s Joshua Tree National Park. Named for the Old Testament prophet who raised his arms to God, Joshua trees grow only in the moister and cooler uplands where one or two snowstorms each year soften the spiky world. Garden of the Gods Photograph by James Egbert, My Shot Centuries-old juniper trees frame red sandstone rocks formed from millions of years of wind and rain. The 1,300-acre (526-hectare) Garden of the Gods park in Colorado Springs, Colorado, tempts rock climbers, naturalists, and photographers with its towering red giants. Millennium Park, Chicago Photograph by Katja Heinemann, Aurora Photos The McCormick Tribune Ice Rink, which sits neatly in the middle of Chicago’s Millennium Park, draws more than 100,000 visitors each season. Michigan City Lighthouse Photograph by Theresa Cramer, My Shot The frozen waters of Lake Michigan encase the Michigan City East Pierhead Lighthouse in Michigan City, Indiana. Photograph by Gordon Wiltsie The black-diamond Face of Bell run down Aspen Mountain in Colorado lures skiers daring enough to take on its steep pitches and waist-high moguls. Photograph by Christopher Drake, My Shot A cedar waxwing pauses among the ice-covered branches of a tree in southern Indiana. Marked by a pale yellow belly, the cedar waxwing lives primarily along the U.S.-Canada border and migrates to Texas, Louisiana, and Mexico each winter, feasting on cedar berries along the way. Rockefeller Center, New York Photograph by Pegaz, Alamy An annual delight for visitors as well as New York natives, the Christmas tree lighting at Rockefeller Center draws a crowd of onlookers and big name performers. In an effort to be more environmentally friendly, the tree is now wrapped in LED lights, instead of traditional incandescent bulbs, and is powered by solar panels on nearby buildings. Mary’s Peak, Oregon Photograph by Derek Stout, My Shot Snow creates an otherworldly scene on Mary's Peak in Oregon. At an elevation of more than 4,000 feet (1,200 meters), Mary’s Peak measures up as the highest peak in the state's Coast Range. Skiers and hikers brave treacherous, unplowed roads through quiet woodlands to reach the mountain’s pinnacle. Ice Fishing, Minnesota Photograph by Scott Olson/Getty Images Each year 20,000 holes are drilled in Gull Lake's Hole in the Day Bay north of Brainerd, Minnesota, where more than 9,000 anglers congregate for a charity ice fishing tournament, thought to be the largest of its kind in the world. 2016 National Geographic Travel Photographer of the Year Contest Browse photos of nature, cities, and people and share your favorite photos.
<urn:uuid:86713030-ceae-4965-8c55-89daf554c59a>
CC-MAIN-2017-04
http://travel.nationalgeographic.com/travel/winter-trips/winter-us-photos/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00151-ip-10-171-10-70.ec2.internal.warc.gz
en
0.878062
905
1.929688
2
What Is A Stitch Mark? A stitch mark occurs due to treating skin wounded and your natural skin structure gets disrupted. A surgical suture is a time-tested and most effective way to connect body tissues. With the help of a suture, the surgeon can connect the edges of the wound, the walls of a hollow organ, stop bleeding, and perform many other manipulations, sometimes vital for the patient. The surgical suture should be as gentle as possible for the tissues to be sutured, in addition, when applying it, it is very important to match the layers of organs or the edges of the wound as carefully as possible – this is necessary in order to avoid the appearance of rough scars at the suture site. This is because your natural skin cells and tissues arrangement gets disturbed due to injury and cut. As a result the healing process may not restore skin to its normal structure, hence results in getting scars. Types Of Stitch Marks Depending on the type of injury, physicists decide to use either traditional skin connection methods like stitches/sutures or the modern ones called staples. These skin relieving techniques leave stitch marks of white or brown spots or those like train tracks. Stitches can leave deep marks on any region of the skin of your body, such as face, forehead, cheek, etc., arms or hands, upper body (such as chest, abdomen, and back), lower body ( the thigh, calf, foot.) Stitch Mark Removal Creams A doctor can advise you of a stitch mark removal cream and gel that are easily available in the market to increase the healing process of these stretch marks. The ingredients you see in your stitch removal cream contain ingredients such as peptides, silicones, Arbutin glycoside and kojic acid, hyaluronate and sometimes, even steroids. Although these stitch removal creams are common and are inexpensive as compared to other treatment methods such as microneedling, injections, plastic surgery, laser treatment, dermabrasion and chemical peeling, they may not offer long term and desired results. The stitch removal creams having steroids can cause long-term side effects. These stitch removal creams might slightly fade the stitch marks at early stages, but are hardly effective in removing older stitch marks. Following are some scar removal topical creams: Mederma Advanced Scar Gel Active ingredient: Allantoin. Dosage: Once a day. Advantages: Best suitable for skin acne, surgical scars, and cuts. Disadvantages: Itchiness and skin dryness may occur Cost: Around $15 ScarAway Silicone Scar Sheets Dosage: Place 1 sheet on the stitch marks. Advantages: This cream is comfortable to apply throughout the day. Disadvantages: \You may experience irritation from the adhesive. Cost: Around $40 Can You Eliminate Stitch Marks? This condition can not be eliminated, but there are many methods to overcome their appearance a little bit in parts of the body where they are prominent and visible for aesthetic purposes. Using creams for longer periods may fade your stitch marks. Other Stitch Mark Removal methods Besides the stitch mark removal cream method, various other convenient methods are available in hospitals to completely eliminate stitch marks for aesthetic reasons. The contemporary methods are: And other best traditional and home remedies for stitch mark removal are; - Lemon juice: Containing vitamin C and citric acid, works well in removing stitch marks. It is known to be the best natural scars removal remedy ever. - Potato juice: It is a naturally bleach to reduce scar appearance - Aloe vera: Best known for its skin soothing and lightening effects. Apply it regularly for best results.
<urn:uuid:4643051f-ca7f-44f1-acf9-52b09e7935d9>
CC-MAIN-2022-33
https://healthcaresols.com/stitch-mark-removal-cream/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00078.warc.gz
en
0.919084
784
2.046875
2
A thick sequence of uppermost Eocene to lower Oligocene volcaniclastic and sedimentary rocks is exposed at the base of the Warner Range in northeastern California. This isolated exposure provides insight into the palaeogeographic setting of the northwestern Basin and Range during this time period. Significant thinning of the unit over 35km of lateral exposure and predominantly volcanic clast compositions suggest that the sequence was deposited in an alluvial plain adjacent to a volcanic arc. Palaeocurrent indicators in the conglomerates define a NNE transport direction. Detrital zircon analysis on coarse sandstones and dating of individual granite cobbles show a range of ages consistent with a local, volcanic source area primarily from the SSW with some far-travelled input from northern Nevada; the far-travelled component increases in influence as the unit thins to the north. Comparison with other sedimentary sequences of Eocene age and integration with palaeofloral and geophysical data help to define drainage divides, and suggest that this sequence accumulated in a relatively isolated, intra-arc basin. This localized accumulation differs markedly from contemporaneous drainages to the south that transported material westwards from central Nevada to the palaeoshoreline, and suggests that ongoing volcanism had a strong influence on palaeogeography in this region during the Eocene and Oligocene. Additional publication details Provenance and palaeogeographic implications of Eocene-Oligocene sedimentary rocks in the northwestern Basin and Range
<urn:uuid:5b3acd39-955f-4d87-90ca-66e73f427890>
CC-MAIN-2017-04
https://pubs.er.usgs.gov/publication/70035190
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00194-ip-10-171-10-70.ec2.internal.warc.gz
en
0.906603
308
2.28125
2
(Zen Gardner | Nicholas West) A couple of years ago, a story emerged about scientists working on “Smart Dust”: nanoparticles that could be employed as sensor networks for a range of security and environmental applications. This was followed by the more literal version of Smart Dust, which was designed to open pathways to establish a human brain-computer interface. The brain system was labeled “Neural Dust” and was intended to “monitor the brain from the inside.” Inventors speculated that a network of nanoparticles injected into the brain could measure electrical activity in neurons, then use ultrasound to form a two-way transfer of data. This theoretically would lead to the reading, generation, or alteration of information – i.e., mind control. Most disturbingly, at the time, is that their theories had entered the testing phase and showed some success, albeit on a beetle. New research released by Florida International University indicates that this area of testing has now advanced to mice. Their conclusions and statements about what they have found and where they believe all of this is headed is even less comforting than previous discoveries. I have posted the full FIU press release below, with emphasis and my comments added. Naturally, their press release highlights only the potential benefits of this technology. One can’t outright deny those possibilities, but we also must put it into perspective, knowing what we do about DARPA’s mission to apply this militarily. For key-background into that research please read “7 future methods of mind control” and the explosive details that came to Activist Post from an Arizona State University whistleblower about what led him to reveal his intense concerns, “Secret DARPA mind control project revealed: leaked document.” A Florida International University professor and his team this month published news of a scientific breakthrough that could lead to the noninvasive treatment of Parkinson’s and other neurodegenerative diseases. Researchers remotely manipulated the electric waves that naturally exist in the brains of mice, a feat that has far-reaching implications for medicine. Using a previously reported FIU-patented technology, researchers began by intravenously administering magneto-electric nanoparticles, or MENs, in mice. With a magnet placed over the head (also read about the “God Helmet” – N.W.) of each subject animal, the particles were pulled through the blood-brain barrier, where they “coupled” the externally created magnetic field with the brain’s intrinsic electric field. This enabled researchers to wirelessly connect their computers and electronics to neurons deep within the brain. The researchers then sent signals via computer to the MENs, which responded by modulating (or changing from low to high and back again) the frequency of the brain’s naturally occurring electric waves. The resulting pulses created “deep-brain stimulation” that has implications for treating Parkinson’s and other disorders. It stands in contrast to the existing method of deep-brain stimulation, which involves invasive surgery to implant an electrode in the brain and a battery-operated medical device elsewhere in the body. Worth noting, while the modulation was taking place, researchers had a view of the electrical activity within the brain. This feedback was sent from the MENs to a computer, allowing the researchers to confirm what was taking place. In a nod to the increasingly personalized nature of medicine, Khizroev believes that MENs could one day be programmed to accomplish any number of medically related procedures to treat various disorders, among them Alzheimer’s and autism. When properly targeted, the particles could, for example, be used to repair cells or destroy plaques. Khizroev also believes that MENs could potentially remain in place within the brain for extended periods to release drugs on a set schedule. “This study is a critical stepping stone to opening a pathway to understanding the brain and treating many neurodenerative disorders,” Khizroev says. “With this connection, we could see and repair, when necessary, all the electric circuitry deep in the brain.” *** End of press release The remote analysis and manipulation of the human brain clearly opens the door for remote mind control, as one man’s treatment of a legitimate disorder becomes another’s tool for simply changing perception. And even if it doesn’t reach that level, this technology also seems to be a boon for Big Pharma as they work in tandem with the medical establishment to ensure that everyone has some sort of disorder in need of revision. For a full explanation on that topic, Jon Rappoport’s article “Obamacare: watch out, here comes ‘predictive modeling‘” is a must-read. Also see transhumanist and a Director of Engineering at Google, Ray Kurzweil’s hope for Human Body 2.0 with roving nanobots to repair us from the inside out. Perhaps most telling, though, is that once again the ethical framework is completely missing. With all of the ways that we have seen humans abuse one another to achieve dominance and control, are we still willing to let these experiments continue without question? Once we reach the nanoscale with full wireless integration, do we really expect that “opting out” will be a future possibility? Source: Zen Gardner
<urn:uuid:04ba35c7-7449-47f0-9662-28836ff01bf0>
CC-MAIN-2022-33
https://earth-matters.nl/earthmatters/zelf-bewust-zijn/mind-control/nanoparticles-enable-remote-control-brains-via-magnetic-field/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00265.warc.gz
en
0.948749
1,108
2.796875
3
Music Wonders is a not-for-profit Community Interest Company (CIC) that promotes learning through music. We are a team of professional musicians who want to share with children the fantastic benefits when we create, record and perform, so we came together as a team to create music workshops and tuition that would send children’s aspirations through the roof! What we do Our three day holiday clubs are for children ages 5-15 years, and children get to dance, sing, perform and create an original pop song and music video. With lessons in singing, drums, guitar/Ukelele and music technology available for a whole class, small groups or private individuals. Inspirational full day workshops based around a particular subject or theme, ideal for a whole class or a mixed age group from KS2 (up to 30 children). “I’m so impressed! The girls had a fantastic time at the Holiday Club – highly recommend!” Parent of children who attended the holiday club.
<urn:uuid:43856c05-d2e8-4ad2-8491-f008574f0241>
CC-MAIN-2022-33
https://musicwonders.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00470.warc.gz
en
0.92727
226
1.671875
2
Transportation projects vary in type, size, complexity, and potential to affect the human and natural environment. To account for the variability of project impacts, and determine how compliance with NEPA is carried out and documented. An environmental impact statement (EIS) is prepared for projects where it is known that the action will have a significant effect on the environment. The following are examples of actions that normally require an EIS.
<urn:uuid:8ddb7b1b-8b63-4507-b009-ef78aa655f50>
CC-MAIN-2017-04
http://www.iowadot.gov/ole/OLESite/Primary.aspx?tabname=primaryeis1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00093-ip-10-171-10-70.ec2.internal.warc.gz
en
0.890154
92
2.28125
2
The car used to be a symbol of freedom. The steering wheel allowed us to choose direction and drive where-ever we wanted. The self-driving car will change this. We’ll regain the freedom to do whatever we want – drink alcohol and use smartphones – while driving, but we have to give away a little control. Not everyone can accept this easily, Stewart could help people to get used to giving more control to the car. There basically is no better moment to get your software adjusted to unpredictable child behavior. This year’s Halloween, Google decided to ask children from the neighborhood to come by in their spooky outfits and play around the self-driving cars in their parking lot. According to Google, the odd costumes gave their sensors extra practice in child recognition, for children in all shapes and sizes. This skeleton car was dug up created by auto rental company Sixt for their ad campaign. Apart from the message they promote (“Thanks to Sixt expensive car rentals became extinct”) this peculiar image of the week makes us realize how cars – more and more autonomous, self driving, uncontrollable – are bound to become the animals of the future. Image via Flickr I can hear you think. “What’s the difference, both are analogue cars?”, you are right. Both cars are analogue, driving on physical, existing roads. However, they differ greatly from each other. The image on the left is a car, as we know them. It has a lot of digital technology in it already, but not nearly as much as the other one. The image on the right shows a Google Driverless Car. I know, I want one too! Just lay back and relax while a complex system of sensors and artificial intelligence software drives you through the streets. Do you think driverless cars belong to the future? Think again! The future is here already. From the Analogue vs Digital Memory Game How do you feel when you get stuck in the traffic jam? Have you ever fantasized about escaping to another space? An innovative solution to a better way for transportation has been proposed by NASA Space Act company skyTran: an autonomous, high-speed, elevated Personal Rapid Transportation system. Drones have been used to spy and attack people in war zones. Now, Alec Momont, a young graduate student at Delft University of Technology, has come up with an innovative application for drones that could one day help save thousands of lives. He designed a prototype of an ambulance drone, an autonomously navigating mini aeroplane that can quickly deliver a defibrillator to where it is needed. We increasingly depend on car technology designed to make driving easier and safer. Therefore, can be said that these improvements are creating less-skilled drivers? “Technological crutches like GPS are making us not only worse drivers – they could also be making us stupid. Technology wasn’t supposed to work that way. Manufacturers have supported drivers with power steering, cruise control, antilock brakes and electronic stability controls. Then they gave us sophisticated on-board computers that power car entertainment systems and fine-tune our cars’ performance on the go. Today we drive sleek, aerodynamic vehicles with more computing power than early Space Shuttles.” We’ve already seen GPS lead people into some ridiculous situations. But can we blame the GPS for this, when we follow directions that are totally contrary to good sense? Read more on BBC Future Forced to leave into spacetime, humans always tried to improve the way of moving around. Since the invention of the wheel we travelled quite a distance, however transportation technology is progressing much slower than other sciences. Nowadays most of existing transports are still fossil powered or rely on limited energy sources. Nevertheless great concepts have been developed around the idea of personal freedom and control, new ways to disconnect vehicles from the ground, expand explorable areas and reduce time-traveling distances. Below a selection of nine enthralling and striking concepts. If only next nature would be this perfectly harmonic. Peculiar video of the week.
<urn:uuid:c5128ae6-61dd-41cf-be6e-dcd0ec1a1893>
CC-MAIN-2017-04
https://www.nextnature.net/tag/on-the-road/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00331-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953715
848
2.375
2
Replace “antelopes” with “humans” and I think most of us would nod in agreement. But this is the first time researchers have found “intentionally misleading behavior in animals for the explicit purposes of mating.” Ars Technica has a great overview of the study: The four-year study looked at the behavior of topi antelopes (Damaliscus lunatus) in the Masai Mara National Reserve in Kenya. This area is dominated by a huge number of predators, including lions, cheetahs, leopards, and hyenas, all of which prey regularly on antelopes. When topi detect a predator nearby, they often make snort-like alarm calls. From February to March, male topi hold small territories through which receptive females pass to assess each male’s mating potential. The authors noticed that, while a female in estrus was on a male’s territory, the male would sometimes emit alarm calls, even in the complete absence of a predator. These false alarms are acoustically indistinguishable from true alarm snorts. The authors set out to determine whether these false alarm snorts are simply predator detection errors, or if they function to deter the female from leaving the territory in order to secure more mating opportunities with her. The results overwhelmingly supported the authors’ “sexual deception hypothesis.” False alarms almost never occurred without a receptive female on the territory, the onset of the false snorts was highly correlated with a female’s attempts to leave the territory, and, after emitting a false snort, males managed an average of 2.8 extra booty calls. You may be wondering why females continue to fall for the lies of males. If this behavior evolved, you think females would also evolve to detect lies, right? It boils down to probability and consequences: Lies happen a lot less frequently than truthful signals, and believing a lie has less severe consequences (mating with a less desirable male) than ignoring a true signal (getting eaten). This questions comes up a lot when you’re discussing dishonest signaling, which actually happens more than you would think in nature. One of the more popular example is bluffing in fiddler crabs. Sometimes when a fiddler crab loses its enlarged claw, it will grow back a weaker, cheaper claw. While these claws aren’t as good in fighting, they’re just as good at intimidating other crabs. It’s not worthwhile for crabs to check and see if another crab is bluffing, because the consequences of the signal being true are so large (getting the crap kicked out of your crabby self). Still, it’s very interesting that they’ve now documented this type of bluffing specifically in regards to sex. I have a feeling we’ll see more examples of this in the future, now that researchers will be keeping their eyes open! (Via Carnal Nation)
<urn:uuid:ae83ff15-8a60-4548-91d5-b9b928d3d9f1>
CC-MAIN-2016-44
http://freethoughtblogs.com/blaghag/2010/05/male-antelopes-lie-to-increase-their-chances-of-having-sex/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720026.81/warc/CC-MAIN-20161020183840-00457-ip-10-171-6-4.ec2.internal.warc.gz
en
0.937739
610
2.53125
3
Well, here I am once again to remind and caution you about the three most important things in computers and computing. Here they are (in descending order): 1) Backing up 2) Backing up 3) Backing up No seriously, while I have always been passionate in exhorting all my clients to establish and maintain a rigorous, reliable, and robust backup scheme, it is now even more critically important than ever. Although there have long been a broad and diverse array of threats and hazards to you, your computer, and your personal/business data "out there", among the ever-growing list of things against which to defend is now a chilling (relatively) new menace to your precious files, documents, photos, and other irreplaceable data - the CryptoLocker worm (and its analogues), or as it/they are also known in the industry, Ransomware. I have personally seen people who have been attacked and stricken by this insidious intruder, and the only ones who have come out totally (or at least mostly) unscathed were those who had relatively full and current backups of their critical data located on media off of (and physically disconnected from) their computers and from their home/office networks. What does it do, and how does it operate? Using a number of very clever, highly intelligent, and well-written algorithms it sends you zipped files (usually, but not necessarily always, PDF files) which appear to come from a trusted source such as your actual bank, phone company, internet service provider, and so on. These PDF files purport to be either a current bill, statement or other type of important customer information for your review. Once you've unzipped and opened the PDF file to look at it, your system has already become infected with the CryptoLocker worm (or one of its similar, new peers), which quickly - and amazingly efficiently - performs a thorough scan of all local and network shared drives, partitions, folders and even connected external media (such as your external backup hard disk), seeking out specific types of data and media files, and using strong (RSA public-key) cryptography protocols (with the private key held on their server) to encrypt (read: lock) your files, such that they can no longer be accessed by ANYONE (including you) without the private key. This cannot be decrypted - except maybe, and only maybe - by the Mossad, the CIA, or the NSA were they to apply their full computational decryption facilities to it, but, aside from the fact that they are never going to do this for you even if they could, and also due to the extreme strength and difficulty of brute force-breaking that would be required to "break" or decrypt your files, it is pretty much universally accepted and agreed that there is no feasible way to unlock them. They are lost to you forever - unless you have fairly thorough and recent backups of them, or (and hence the name, Ransomware) you are willing to pay a ransom (within a specified time limit) of anywhere from hundreds to thousands of dollars or euros to hopefully get the key from these hackers and regain access to your files. In other words, even though I have also often ardently and earnestly warned that ALL hard drives will fail - it is a question of when rather than if - with most typical scenarios of data loss or accidental/catastrophic deletion, you have a number of alternatives for attempting to recover your lost data (which may vary in cost anywhere from free to thousands of dollars, depending upon the physical/mechanical state of your Hard Drive / Storage Medium). However, in this Ransomware scenario, these nefarious operators can pretty much demand whatever price they want to return your data (access) to you, and not only do you have absolutely no other alternatives than those they offer - you don't even know for certain that you will, in fact, ultimately regain your access to the data in question - even after having submitted payment to them (I've seen more instances where they did indeed return the key, but others where, for whatever reasons, they decided to simply take the money and run, leaving you still without any access whatsoever to your data. How can you protect yourself and your data against these artfully treacherous attackers? Well, of course you can and should keep your system protected with a multi-layered protocol of security - including a (software or hardware) firewall, a good, robust antivirus program and at least one or two separate additional anti-malware/anti-spyware programs to help locate, identify, and remove the various and sundry little malevolent invaders which, in any case, are inevitably going intrude upon and occupy your computers, many of which - due to their lack of specific heuristic or definition/code signatures, may not be detected by your main antivirus program. But usually, by the time you've discovered that CryptoLocker or one its numerous analogues has invaded your computer, it is unfortunately probably too late for your data. You can easily find and remove the malware that encrypted your files, but as I elucidated above, you cannot remove the encryption from (nor regain access to) your files once they've been encrypted no matter what you do. So, the only real and true protection you can have against this very sophisticated and Machiavellian threat is to have a full, current and safely stored backup of ALL your important files - including but not necessarily limited to - documents, mail, contacts, spreadsheets, photos, PDFs, text and pretty much any other type of file formats that most of your commonly used productivity applications create and use. To sum up, I need to say, hear me now - and act to implement the necessary and appropriate protocols & procedures (security software and data backup), or take the considerable risk of being very sorry later on (perhaps even tomorrow or the next day?) Bleeping Computer on CryptoLocker MalwareBytes Security Blog / CryptoLocker Wikipedia on CryptoLocker The links above provide most, if not all, the information that is currently available regarding this phenomenon. Additionally, please feel free to contact me for consultation or advice on how best to proceed going about setting up the very best protection for your precious data and digital life that you can possibly provide. Beau - Israel's PC Doctor 054-772-6239 (Israel Cell) +972-54-772-6239 (Cell from Out of Israel) +1-407-745-0882 (US Landline Rings at my Lab) YouTube Video Testimonials
<urn:uuid:d895c94f-0192-4ec6-932d-688aec584b4d>
CC-MAIN-2022-33
http://israelpcdoctor.weebly.com/blog-keeping-your-computer-safe-speedy--stable/category/security
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00277.warc.gz
en
0.951536
1,379
1.820313
2
I know most of my blogs are kind of long but when I came across this information I felt a need to do a quick entry about it as the information is really hard to find. A customer recently asked me about one of our iSCSI performance counters. It was the Average Request Processing Time for the iSCSI Request Processing Time object. He wanted to know what this counter does. The first problem I ran into was finding the counter on any of my computers. It turns out that the iSCSI Request Processing Time object is only exposed in Performance Monitor when there is an active iSCSI connection. All my sessions were inactive at the time, so I didn’t see it. The reason for this is that when we establish a session with an iSCSI target we query to find out how many commands the device can hold. This is used in the calculation below. Without an active session, we couldn’t do the calculation and therefore wouldn’t be able to display the object. Average Request Processing Time: When we send the device a request, we start a timer. Then when the request completes we stop the timer. The time it took to complete is the Request Time. We add the Request Time to the Cumulative Time, and divide by the number of requests that were added into the Cumulative Time. That gives us the average. When the Cumulative Time holds the Request Times equal to 5 times the number of requests that the device can hold, then we reset the Cumulative Time…starting over again. The maximum for this counter is the largest calculated value. Assume that the device can handle 2 requests (using a low number to keep things simple). We would process 10 requests (5×2)… Request1: Completes in 30ms Request2: Completes in 25ms Request3: Completes in 10ms Request4: Completes in 15ms Request5: Completes in 100ms Request6: Completes in 14ms Request7: Completes in 25ms Request8: Completes in 20ms Request9: Completes in 26ms Request10: Completes in 36ms So if we average that out… 301ms/10 = 30.1ms So the counter would read 30.1ms for that time. This counter would be handy if you were troubleshooting a disk performance issue and wanted to get information on how quickly iSCSI requests were being handled. This would be similar to using logical and physical disk counters. However this data would come from much lower in the storage stack. Senior Support Escalation Engineer Microsoft Enterprise Platforms Support Want to know more about Microsoft storage? Check out my blogs…
<urn:uuid:709ad687-7b7b-43b6-a52d-86224d19df1d>
CC-MAIN-2016-44
https://blogs.technet.microsoft.com/askperf/2010/12/03/performance-counter-for-iscsi/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00239-ip-10-171-6-4.ec2.internal.warc.gz
en
0.930892
573
1.75
2
Renée Adorée was a French actress who had appeared in Hollywood silent movies during the 1920s. Born Jeanne de la Fonte in Lille, Nord, France, she was the daughter of circus artists and who, by age five, was performing in the circus with her parents. In her teen years she began acting in minor stage productions and toured Europe with her troupe. She was performing in Russia when World War I broke out and fled to London. From London she went on to New York City where she continued to work in the theatre until the opportunity came to work in the motion picture business. In 1920, given the exotic name Renée Adorée by the studio, she appeared in her first motion picture. While in New York City on New Year's Eve 1921 she met Tom Moore. Fifteen years her senior, Tom Moore and his brothers were very successful Hollywood actors. Six weeks after their meeting, Adorée married Tom Moore on February 12, 1921 in his home in Beverly Hills, California. The marriage did not last, and in 1925 Ms. Adorée married a second time to Sherman Gill.
<urn:uuid:8ec4ed6b-9739-4d1a-b383-fb209a0f86d8>
CC-MAIN-2017-04
http://www.walkoffame.com/ren%C3%A9e-ador%C3%A9e
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00283-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98849
230
1.835938
2
Today marks the day of the Lord’s passion and death. The day commemorates the death of Jesus Christ. On this day there is no Eucharist (also called breaking of bread, Lord’s Supper or Holy Communion), but what there is is action Liturgica after noon to commemorate the passion and death of Jesus Christ. Christ appears as the Servant of God, which was announced by the prophets, who is sacrificed for the salvation of the world, the lamb that is sacrificed for our sins and for our acquittal. Friday holy day of sacrifice that God gave his only begotten son to surrender, to cleanse our sins, the sins of the world, that we may pass to save us, not a day of mourning, sadness, but joy of contemplation of the sacrifice redeemer of which came our salvation, the human salvation. Christ overcame, was not defeated, defeated by death, before whom he beat humiliated, defeated those who wanted to renounce his father, won, who consumed his offering, frees us and reconciles us to our salvation. On this day we read the Passion according to St. John. In various parts of the world is called the prayer of the Via crossings, which is the way of the cross, which follows the fourteen stations, recalling the steps of Jesus way to his death. It also occurs in this day and fasting but also not eating red meat, because abstinence is the red meat be of eating the flesh of Christ. Filed under: earthquake, eastern week, extreme gravity, italy, religion | Tagged: 14 stationaries, Christ, crucificion, death of lord, filipinas, friday holy day, holy communion, Jesus, Lord, lord'passion and death, pasion of christ, Passion Day of Lord, procession, sacrifice, servant of god, via crucis | Leave a comment »
<urn:uuid:70805705-6f93-4ca6-9369-567c260f0f8f>
CC-MAIN-2017-04
https://dreamofarlequin.wordpress.com/tag/pasion-of-christ/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00012-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967023
394
2.703125
3
The message apparently duplicated exactly the tone of voice, accent, and wording of terms of endearment that the student's deceased lover had used. 15 J. Mirabai was forced to marry a rich prince, but she rebelled against the wishes of her family, and devoted her life to singing the praises of Sri Krishna. Purify The Body Temple: A Guided Meditation Experience a new release on cd. Malgré les multiples influences orientales, la figure du Christ reste le modèle spirituel du New Age sans grande concurrence . The first symbols of this �movement� to penetrate Western culture were the remarkable festival at Woodstock in New York State in 1969 and the musical Hair, which set forth the main themes of New Age in the emblematic song �Aquarius�. ( 20 ) But these were merely the tip of an iceberg whose dimensions have become clearer only relatively recently. For example, we have heard the same rhetoric from the NESARA people for almost 20 years. The most recent channellings of Kryon can also be found in " Sedona Journal of Emergence. " This magazine publishes a Kryon channelling each month. The most important constitutional issues of this generation concern the meaning of the rule of law and the ability of the people to enforce true law by restraining runaway activist judges. Through this sacrifice, the cosmic Christ became a savior in that he no longer stood outside the evolution of the earth, but entered into that evolution by becoming incarnate into the earth. There he would function as a guide of man's spiritual evolution. In other words, he says, "we are all of the one Universal Being; or, as some say. .. we are God." 28 Perhaps in the final analysis it's immaterial who or what these trendy channeled spirits are. New Age has a marked preference for Eastern or pre-Christian religions, which are reckoned to be uncontaminated by Judaeo-Christian distorsions. Lino has also worked as a features reporter for WCCO-TV and pop culture commentator for KMSP-TV. The spiritual healing can help mental and emotional problems and physical conditions such as a frozen shoulder. There is no need for Revelation or Salvation which would come to people from outside themselves, but simply a need to experience the salvation hidden within themselves (self-salvation), by mastering psycho- physical techniques which lead to definitive enlightenment. Leafing through the books and looking at the titles, I was struck by the heavy emphasis on the notion that the vast majority of them were offering people something other than reality. As Russell Chandler, a writer for the Los Angeles Times, wrote in Understanding the New Age, “If Ferguson wrote the New Age ‘Bible,‘ Shirley MacLaine is its high priestess.” Shirley MacLaine’s book, Out on a Limb, chronicles her reluctant conversion to New Age belief. The stress laid on bodiliness, the search for ways of expanding consciousness and the cultivation of the myths of the collective unconscious were all encouragements to search for �the God within� oneself. Invites questions channeled material and consultations. Sex can be virtuous without being repressive or too clean. However, it is quite accurate to place New Age in the broader context of esoteric religiousness, whose appeal continues to grow. ( 13 ) There is a problem built into the current text. Ask and It Is Given: Learning to Manifest Your Desires Ask and It Is Given, by Esther and Jerry Hicks, which presents the teachings of the nonphysical entity Abraham, will help you learn how to manifest your desires... In fact, I probably wouldn’t be writing this if it weren’t for the channeling and ascension crowd, because they’ve supported my work through the years. People today have come to maturity in a world that is void both of faith and of intense experience, a sterile world of spiritual plastic and cardboard. I believe that each one of us is capable of doing it. D. it will be a star in the constellation Cepheus. YouTube promoted his channel, The Chopra Well, in late 2011. Gresham Machen observed: "Our enemy who prides itself in being very modern, is as old as the hills; and from the very beginning, the Christian Church has been menaced by...all-embracing paganism." Try to flow from one activity to the next. I am thrilled, and thankful that I have found Fabjob guides to initiate my journey to true success. The NAM teaches that we will all learn our proper divine relationship with one another and achieve harmony and mutual love and acceptance through the realization and acceptance of this divine proper knowledge. New Age: We can mystically become aware of the divinity of all things, and we can experience union with the divine Life Force. "Guides" from other dimensions assist in this. Its body of evidence lies either largely or importantly outside the boundaries of the old paradigm of empirical materialism. The New Age University is a Graduated Path for Spiritual Self-Study and The Institute for Evolutionary Creationism was established for exploring Evolutionary-Creationism Theories. Therefore, do not take any channeling on faith. Religious humanitarianism shunned radical politics and ignored the issue of women's rights, despite the movement's suffering and ignorance among children, the urban poor, prisoners, and slaves. The New Age movement does not believe in a personal God who keeps records.
<urn:uuid:bc682e2b-0aad-4de0-977f-c79ee791fc4b>
CC-MAIN-2017-04
http://favoritsmolensk.ru/library/category/channeling/page/5/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00363-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951868
1,131
1.5625
2
SEATTLE — For the first time, the federal government has issued a set of guidelines for managing children’s food allergies at school as part of a growing public health concern that affects up to 6 percent of children in the United States. The voluntary guidelines from the Centers for Disease Control and Prevention include recommendations on what to do when a child has an allergic reaction and how schools can create awareness of children with allergies among faculty and staff. It’s estimated that nearly 90 percent of schools have one or more students with a food allergy. Children with food allergies can face challenges that could affect their ability to learn and their social and emotional development, according to the CDC. Advocates contend the new guidelines could make schools safer for millions of children, but could also mean more classrooms will ban food rewards, snacks and party treats made with common allergens including nuts, milk and eggs, USA Today reported. The new guidelines suggest schools should: - Avoid using foods identified as allergens in class projects, parties, snacks, science experiments and cooking exercises in allergic children’s classrooms. - Train staff to use injecting devices for the medication epinephrine (such as Epi-Pens) when students have severe allergic reactions – known as anaphylaxis. - Make sure children who can use their own injectors can get to them quickly. - Make sure children with food allergies are not excluded from field trips, extracurricular activities, physical education or recess. - Consider designating food-free zones or allergen-safe zones. - Use non-food incentives for prizes, gifts and awards. Food allergies among children are getting more common, increasing nearly 20 percent from 1997 to 2007. Earlier this year, Washington state passed a law making it easier to treat children suffering from a potentially life-threatening reaction to allergies. School nurses can now administer epinephrine to any student, even if they’ve never been diagnosed with an allergy. Read more about the new CDC guidelines here.
<urn:uuid:f33a5838-5643-44a6-9654-43d5befb4fd6>
CC-MAIN-2017-04
http://q13fox.com/2013/11/05/cdc-issues-food-allergy-guidelines-for-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00383-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947353
414
3.34375
3
Since the commercialization of the Internet, there has been an evolution with how cyber criminals are conducting malicious activities on Web sites. They are finding more and more ways to steal information, commit fraud, game website logic, and impact business operations. Central to the explosion of cybercrime in recent years is the continued evolution of rich Internet applications and exposure of critical business operations to the web. As more business operations, both internal and external facing, move to web enabled platforms in 2012, the more opportunities criminals have to find loopholes, mine for valuable data, and exploit legitimate website functionality. A New Attack Vector in 2012 Cyber criminals are becoming more creative and automating their way of exploiting vulnerabilities and business logic flaws at the Navigation Layer - which includes all behavior on a website and may be referred to as a clickstream. In 2012, the industry will begin to recognize a new classification of attacks executed through the Navigation Layer. This insight will begin to give organizations leverage as they start to look at web-born threats in a new way. The Navigation Layer Simply put, the Navigation Layer is how users of web services access and interact with various resources and functionality of websites. Purchasing a digital camera on an e-commerce site, balancing your checkbook using online banking, and interacting with project plans on a company intranet are all examples of activities that take place in the Navigation Layer. The reason this is such an attractive target for criminals is that the functionality that enables their criminal activities, in large part, has to be made available to legitimate users. As long as there are websites, criminals will be looking for ways to take advantage of the data and functionality made available through those sites. Although certainly not an exhaustive list, a significant portion of online criminal activity can be seen in the categories of Business Logic Abuse, Data Scraping, and Architecture Probing. Traditional Security Struggles to Protect the Navigation Layer The cybersecurity challenge facing businesses and organizations is that it is notoriously difficult to detect and defend against Business Logic Abuse, Data Scraping, Architecture Probing, and other types of attacks executed through the Navigation Layer. Traditional approaches that leverage deep-authentication of users, transaction risk modeling, link analysis, event correlation, etc. are still critical to have in place, but are rendered largely ineffective when confronted with 'low-and-slow' processes scraping site data or with attacks carried out by networks of hundreds of PCs infected with criminal-controlled malware. Moreover, criminals are continually changing their attack strategies and developing new methods of exploiting website functionality. Keeping detection systems up-to-date with the latest attack vectors is incredibly challenging. Defending Against Attacks in 2012 All of this may seem overwhelming and rightfully so. However, there are a few aspects of this type of criminal activity that begin to level the playing field. First, these attacks all take place through the Navigation Layer and website owners control this layer. Although the functionality exploited by criminals typically is required for the use of legitimate users, businesses and organizations can have visibility into every aspect of the traffic going through the Navigation Layer. The ability to monitor this wealth of traffic is invaluable for detecting attacks coming through the website and for performing forensic investigations of past events to better inform detection and mitigation decisions in the future. The other area where businesses and organizations have an advantage is that criminals, in order to execute their attacks, have to behave differently than normal users of a website. Normal users do not try to log in using tens, hundreds, or thousands of different passwords. Nor do they crawl entire product catalogs on e-commerce sites or submit nonsensical chunks of data to web applications in the hopes that it will break. By leveraging full visibility into the Navigation Layer, it is possible to perform behavioral analytics on every click on the website and rapidly identify the outliers - those web sessions that are not behaving like everyone else using the website. As web applications and web-enabled devices continue to rapidly evolve, the attacks on the Navigation Layer will continue to keep pace - using the latest functionality for something other than what it was intended for. But, by maintaining full visibility into the Navigation Layer and on every click occurring on the website, these evolving threats can be detected and mitigated in near real-time, thus preventing the often dramatic impacts of attacks that have gone unnoticed until the damage has already been realized. About the author: Jesse McKenna is a Fraud Analyst at Silver Tail Systems The Tech Herald welcomes 2012 related threat predictions from vendors, as long as they do not reference the end of the world and remain product neutral. All submissions are subject to editing and are due by December 20, 2011. Submissions can be delivered to [email protected] with the email subject of 2012 Predictions.
<urn:uuid:a756096a-5339-4780-bd6b-c6177abbae84>
CC-MAIN-2017-04
http://www.thetechherald.com/articles/2012-Predictions-The-Navigation-Layer-of-the-Website
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941372
959
2.1875
2
Bosch to build electric drives for Dragon Racing Bosch Motorsport and the Formula E team Dragon Penske Autosport have agreed to a long-term technology and development partnership. As part of the partnership, Bosch is developing a vehicle management system with hardware and software components that is specially adapted to the requirements of the Formula E car. BMW is branching out at the IAA The new BMW boss Oliver Zipse briefly outlined his new drive strategy at the IAA. He avoided making a commitment to battery-electric cars such as VW did and stressed various options. With the ‘i Hydrogen Next’, BMW is also presenting a fuel cell car. Ford reportedly looking to enter Formula E The US American car manufacturer has intensified discussion around entering the ABB FIA Formula E Championship, possibly beginning involvement already this year. They may have to enter as a satellite team, but is moving to secure involvement as the manufacturer slots are becoming scarce. SunRiser, Dragon Racing & Venturi, Reed leaves for batteries, Saft. Powered by the sun: Bochum University of Applied Sciences and ThyssenKrupp unveiled their SunRiser. The solar-powered car will take part in the World Solar Challenge in Australia in October. It only weighs 360 kg, despite its 60-kg battery and comfort features, such as distance control, heated seats or central locking. The solar panels produce up to 870 W. idw-online.de, emobilserver.de (articles in German) Powered by Venturi: Rumor has it that Dragon Racing will partner with Venturi as their new powertrain supplier. The Dragon team is believed to have concluded a deal last month and is set to test its new package shortly. An official announcement is expected in the coming weeks. Reed leaves drop battery price? A Chinese-German research team has fabricated a 3D porous silicon-based anode material from natural reed leaves using calcination and magnesiothermic reduction. The material exhibits high specific capacity, very good rate capability, and cycling stability. Saft head to Mars: Battery maker Saft has signed a contract worth over one million euros from Airbus Defence and Space Ltd (UK) to develop, qualify and test a specific lithium-ion battery system to power the ExoMars Rover vehicle. The programme will launch in 2018. – Feedback – Most clicked link on Thursday was Italian electric motorcycle company Energica kicking off production of its electric superbike Ego. BMW i9, Opel, Bentley, BMW, Dragon Racing, Honda. BMW i9 in the making? According to German magazin auto motor und sport, BMW plans to introduce another plug-in hybrid sportscar on top of its current i8. It will be propelled by an in-line 6-cylinder engine in combination with a powerful electric motor. The i9 is scheduled for 2016, the year of BMW’s 100th anniversary and is to continue the tradition of the M1. indianautosblog.com, auto-motor-und-sport.de (in German) The Ampera is dead: Via twitter, Opel CEO Karl-Thomas Neumann confirmed the rumours of Opel/Vauxhall not introducing a next-generation Ampera and thus killing the European twin of the Chevrolet Volt. At the same time, Neumann promised a new EV to arrive before 2018. The fastest SUV ever will go on sale in 2016 and come from Bentley, says the carmakers’s sales and marketing director, Kevin Rose. Presumably, it will also be the fastest plug-in SUV, featuring a V8-hybrid drive. Moreover, Rose expects it to account for at least 30% of all of Bentley’s SUV sales. blog.caranddriver.com via indianautosblog.com BMW 7 Series ActiveHybrid arrives in India: It is the first hybrid by any German carmaker available in the country and that only in the cities of Chennai, Delhi and Mumbai. Pricing starts at 13,5 million Rupee (224,700 dollars). Dragon Racing complete: The Penske-owned Formula E racing team has signed former F1 pilot Jerome d’Ambrosio as their second driver. This only leaves three driver places open for the first season with China Racing and Adretti Autosport yet to reveal their complete line-up. Honda Hybrid made in Indonesia: The Honda Vezel Hybrid and its petrol siblings for the Indonesian market will be sold under the name HR-V when debuting at the Indonesia International Motor Show in September. Honda announced that the compact crossover will be produced locally starting early next year.
<urn:uuid:4bcd24be-7198-4a78-8594-3382b1d91c4d>
CC-MAIN-2022-33
https://www.electrive.com/tag/dragon-racing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00074.warc.gz
en
0.912869
1,066
1.515625
2
European lipodystrophy registry: background and structure D’Apice, Maria Rosaria Hennekam, Raoul C. M. Santos Silva, Ermelinda Savage, David B. Orphanet Journal of Rare Diseases MetadataShow full item record von Schnurbein, J., Adams, C., Akinci, B., Ceccarini, G., D’Apice, M. R., Gambineri, A., Hennekam, R. C. M., et al. (2020). European lipodystrophy registry: background and structure. Orphanet Journal of Rare Diseases, 15 (1) https://doi.org/10.1186/s13023-020-1295-y Abstract: Background: Lipodystrophy syndromes comprise a group of extremely rare and heterogeneous diseases characterized by a selective loss of adipose tissue in the absence of nutritional deprivation or catabolic state. Because of the rarity of each lipodystrophy subform, research in this area is difficult and international co-operation mandatory. Therefore, in 2016, the European Consortium of Lipodystrophies (ECLip) decided to create a registry for patients with lipodystrophy. Results: The registry was build using the information technology Open Source Registry System for Rare Diseases in the EU (OSSE), an open-source software and toolbox. Lipodystrophy specific data forms were developed based on current knowledge of typical signs and symptoms of lipodystrophy. The platform complies with the new General Data Protection Regulation (EU) 2016/679 by ensuring patient pseudonymization, informational separation of powers, secure data storage and security of communication, user authentication, person specific access to data, and recording of access granted to any data. Inclusion criteria are all patients with any form of lipodystrophy (with the exception of HIV-associated lipodystrophy). So far 246 patients from nine centres (Amsterdam, Bologna, Izmir, Leipzig, Münster, Moscow, Pisa, Santiago de Compostela, Ulm) have been recruited. With the help from the six centres on the brink of recruitment (Cambridge, Lille, Nicosia, Paris, Porto, Rome) this number is expected to double within the next one or 2 years. Conclusions: A European registry for all patients with lipodystrophy will provide a platform for improved research in the area of lipodystrophy. All physicians from Europe and neighbouring countries caring for patients with lipodystrophy are invited to participate in the ECLip Registry. Study registration: ClinicalTrials.gov (NCT03553420). Registered 14 March 2018, retrospectively registered. Research, Rare endocrinological diseases, Lipodystrophy, Registry, Rare diseases, Adipose tissue Russian Science Foundation (17-75-30035) French Ministry of Solidarity and Health, Assistance-Publique Hopitaux de Paris, Sorbonne Universite, Inserm and CardioMetabolism and Nutrition University Hospital Institute, France (ANR-10-IAHU) French Ministry of Solidarity and Health, Assitance-Publique Hopiteaux de Paris, Sorbonne Université, Inserm and CardioMetabolism and Nutrition University Hospital Institute France (ANR-10-IAHU) Wellcome Trust (WT 107064) MRC Metabolic Disease Unit (MRC-MC-UU_12012/2) Instituto de Salud Carlos III and the European Regional Development Fund (PI18/01890) Conselleria de Industria, Xunta de Galicia (ED341b 2017/19) Fundación Mutua Madrilena (Call 2015) External DOI: https://doi.org/10.1186/s13023-020-1295-y This record's URL: https://www.repository.cam.ac.uk/handle/1810/316188 Attribution 4.0 International (CC BY 4.0) Licence URL: https://creativecommons.org/licenses/by/4.0/
<urn:uuid:77d02d7e-cdb4-4eee-bc6f-bdabb2c4e3f9>
CC-MAIN-2022-33
https://www.repository.cam.ac.uk/handle/1810/316188
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00068.warc.gz
en
0.706447
1,131
1.796875
2
In 2010, Israel’s defense spending accounted for 6.7% of GDP. However, in contrast to the RF budget, that section included both defense expenditures per se along with costs of pensions to, and social rehabilitation programs for, the military and their family members, the border infrastructure maintenance costs, and costs of purchasing weaponry from the US at the expense of the latter’s military aid. So, it may well happen that in reality Israel’s military spending does not exceed Russia’s. Source: http://www.inss.org.il The US started cutting down its national defense spending back in the Cold War era from 14.2% of GDP in 1953 to 9.2% of GDP in 1962, 6.7% – in 1972, 5.7% – in 1982. The defense spending shrank sizably since the collapse of the USSR: from 5.2% of GDP in 1990 to 3.0% of GDP in 2001 (except for 1992 – 4.8% of GDP due to the War in the Gulf). The figures have been on the rise ever since 2002: from 3.3% of GDP up to 4.0% of GDP in 2005 and further to 4.7% of GDP in 2009 and 5.1% of GDP in 2011, due to financing of military operations in Iraq and Afghanistan. It is planned to scale back on military expenditures post-2011 and bring them down to 3.4% of GDP by 2016. Source: www.whitehouse.gov On the basis of data provided by the Accounting Chamber of RF in its conclusions on draft budget acts. Section The Monetary and Budget Spheres Expenditures on the section “Education” have been in decline since 2009. In 2010, they shrank by 0.4 p.p. of GDP and in 2011 – by 0.1p.p. of GDP on a year-on-year basis. The proportion of spending on education in the enlarged government budget accounted for 11.1%, or up 0.3 p.p. vs. the 2010 level. Since 2008, the volume of financing by the item “Education” has been in decline: in 2010 – by 0.4 p.p. of GDP and in 2011 – by 0.1 p.p. of GDP on a year-on-year basis. The proportion of spending on educationin the aggregate volume of the enlarged government expenditures stood at 11.1%, or up 0.3 p.p. vs. the 2010 figures. The volume of financing by the item “Housing and utilities sector” likewise has been in decline since 2008 by 0.2 p.p. per annum. In 2011, the enlarged government expenditures were cut practically across all the items, except for expenditures on settlements development (up 0.1 p.p. of GDP thanks to the respective increase in regional budgets’ expenditures) relative to GDP on a year-on-year basis. The cuts are associated with a gradual completion of such measures as provision of housing to veterans of WWII and individual categories of residents. Meanwhile, reserves for further cuts in the sector are unlikely to be huge, despite the fact that Russia on average spends on the housing and utilities sector twice as much as OECD member states. More specifically, at end-year 2011, as many as 99.4m of housing in the country fell under the category of slum and dangerous structures (up 1.5 times over the decade). As it is, as a rule, regions with poor socio-economic performance indicators or those classified as the “Northern” ones (where climatic conditions predetermine high housing deterioration rates) it is inappropriate to cut down the state financing, as availability of adequate housing is a critical component of residents’ living standards. At the same time, given the magnitude of the challenge, development at the federal level of new approaches to assessment of the need in, and provision of, social housing, perhaps, appears justifiable1. In 2011, the item “Culture, the motion picture industry and mass media” saw cuts amount to 0.1 p.p. of GDP compared with 2010; however the share of expenditures on culture in the enlarged government budget remained at the level of 2%. As to the item “Environment protection”, the respective expenditures have remained unchanged since 2009 and accounted for 0.06 - 0.07% of GDP. In its absolute terms (Rb 38bn, or up 10.3bn vis--vis 2010) the 2011 spending on environmental programs is comparable to the enlarged government revenues generated by payments for adverse impact on environment (Rb 22.1bn in 2011). It should be noted that the volume of budget outlays for environmental measures rose 3.5 times between 2009 and 2011 in nominal terms, but shrank more than twice in the shares of GDP equivalent (from 0.16% of GDP in 2000 to 0.07% of GDP in 2011). Individual moves in this area (eg. implementation of a countrywide energy-saving program in the frame of the energy strategy) does bring about some positive effects, but still appear incapable of reversing the destructive trends in the environmental area. The 2011 appropriations on the section “Social policy” appear impressive – 12.0% of GDP (Rb 6,512.3bn), including those on pensions provision (8.0% of GDP, or Rb. 4,379.6bn), albeit down 1.3 p.p. on a year-on-year basis. The share of the expenditure item in the aggregate volume of the enlarged government expenditure was likewise down 2.5 p.p. compared with Expenditures are incurred both by the federal budget and RF Subjects’ budgets; however the procedure of provision of social housing is established at the latter level. The federal budget does not finance provision of housing; rather, social payments, eg. to young academics, in compliance with Resolution of the RF Government of 17.12.2010 No. 1050. RUSSIAN ECONOMY IN trends and outlooks the prior year. In the RF Subjects’ consolidated budget, the 2011 social spending was cut down in absolute terms by 28.5% (1.5 p.p. of GDP) relative to 2010, because of cuts in expenditures on the social provision of the population totaling 0.4 p.p. of GDP. During last three years, the 2011 enlarged government budget expenditures on servicing the public debt remained at a level of 0.6% of GDP; the RF Subjects’ consolidated budget expenditures on this section were down 0.1 p.p. of GDP on a year-on-year basis. An analysis of recent changes in the structure of the enlarged government budget expenditures allows identification of two negative tendencies: 1. Boosting expenditures on financing public goods (social policy, defense and law enforcement and public order) against cuts in expenditures on ensuring economic growth. So, despite the political leadership’s declarations about the budget’s modernization nature, actual expenditures encourage public and individual consumption, rather than economic development. At this point, emphasis should be made on government support of backbone national infrastructure objects (meaning investment projects and programs in the innovation development area, such as education, research, technoparks, business incubators, special economic zones, technology transfer centers) and upgrade of the production infrastructure (transport, communications, the FEC infrastructure), which would bolster economic stability, fuel innovation, breakthroughs in the technological sphere and environmental safety. That said, the government should scale back on its participation in business and semi-business investment. 2. A notable surge in the number of public and municipal servants1 and public employees, which, first, evidences an excessive presence of the state in the economy and the social sphere. The volume and the number of public functions and services in tandem with antiquated procedures of their delivery exhibit current defects in their organization and, therefore, preserve the problem of huge public costs in the said areas. Second, it must be admitted that in contrast to temporary effects from boosting the financing of individual directions, which serves just as a temporary remedy, it is a funding of institutional transformations that gives a fillip to entrepreneurial activity and attraction of capital into an economy, and its structural diversification on the basis of innovation-driven technological development2. Thirdly, a high proportion of public employees evidences that by hiring an insufficiently qualified workforce to carry out public functions, a state exercise the “social sponsorship” function. As a result, the state budget is engaged in an implicit “subsidizing” of the populace (ie. the government pays salaries for an inefficient exercise of public functions). 2.2.4. Analysis of main Parameters o f the Federal Budget of RF in 2011 and for the Period of 2012–2014. The budget Act for the upcoming three years does not suggest maintaining the 2011 federal budget revenue increase rates (see Table 13): the federal budget revenues should contract by 0.8 p.p. in 2012 and further by 1.3 p.p. in 2013 and 1.5 p.p. in 2014 vs. their 2011 level, with projections of oil-and-gas revenues suggesting their even greater decline – from 10.2% of GDP in 2011 to 7.2% of GDP in 2014. The 2010 data suggest that in Russia the number of public employees per capita (108 per 1,000 residents) is greater than across OECD and emerging economies (eg. the average figure across 22 OECD nations is 75, Brazil – 45, South Korea – 29 per 1,000 residents). According to development priorities established by the Long-Term Development Concept approved by Resolution of the RF Government of 17 November 2008 No. 1662-r. Section The Monetary and Budget Spheres Table Main Characteristics of the Federal Budget in 2008–2014, as% GDP Actual The budget Act 2008 2009 2010 2011 2012 2013 Revenues 22.5 18.9 18.4 20.9 20.1 19.6 19. Including oil-and-gas 10.6 7.7 8.5 10.2 7.7 7.1 7.Expenditures 18.3 24.9 22.4 20.1 21.6 21.2 20.Including provisionally approbated – – – – – 0.5 1.Deficit (–) /Surplus (+) +4.1 –6.0 –4.0 +0.8 –1.5 –1.6 –0.Non-oil-and-gas deficit –6.4 –13.7 –12.5 –9.4 –9.2 –8.7 –7.For reference: GDP 41277 38809 45166 54369 58683 64803 Source: the RF Ministry of Finance. The 2012 federal budget expenditures should surge by 1.5 p.p. of GDP vs. 2011 and subsequently slide back to the 2011 level again. So, the federal budget for the upcoming three years should be executed with a deficit oscillating within the range of 0.7 – 1.5% of GDP. That said, the value of the basic oil price which ensures a balanced federal budget has been increased for the medium term: while in 2011 the value matching the budget balance was an oil price of USD 115/b1, already in 2012-13, according to MinFin’s estimates, the balance would be secured by a price not lower than USD 120-125/b. So, the budget will become yet more prone to price fluctuations on the global market for carbohydrates. It should be noted that while crafting main parameters of the 2012-14 federal budget, its authors employed optimistic forecasts of macroeconomic indicators: thus, the forecast with regard to the volume of GDP for 2012 was increased by more than Rb 5bn vs. the figure used while shaping up the 2011-13 federal budget. Meanwhile, projections of the value of oil-and-gas revenues in the 2012-14 federal budget were based upon a more conservative scenario. On the one hand, that would allow rejecting the need to sequester expenditures during a fiscal year, should budget revenues decline; on the other hand, extra revenues, particularly due to exercising caution while planning them, allow revision of the expenditure part towards increases in individual items, which does not add accuracy to the medium-term budget planning. Should the 2012 oil-and-gas revenues prove greater than planned, the Budget Act for 2012-14 comprises a clause which holds that extra revenues should be spent on replacement of public borrowings and/or revenues from sales of equity or other form of participation in capital owned by Russian Federation. In the medium term, main sources of the federal budget revenues should remain collection of indirect taxes, the mineral tax, and customs duties (see Table 14). The data in Table 14 evidence that the proportion of revenues from main taxes and duties in the aggregate volume of revenues to the federal budget in the shares of GDP equivalent is going to be in decline in the period of 2012-14, because of falling revenues from the mineral tax and export customs duties, which is going to be caused by a downfall in international oil prices and slowdown of growth rate in taxable volumes of oil and oil products. The budget’s reliance on the foreign economic situation can be lowered by stabilizing nonoil-and-gas revenue growth rates. This necessitates maintaining economic growth in the first place, including, in particular, at the expense of reallocation of federal budget revenues from In 2005–2007, the federal budget surplus was secured under average annual nominal oil prices as follows: in 2005 – USD 50/b ( surplus equivalent to 7.5% of GDP); in 2006 – USD 61/b (7.4% of GDP),; in 2007 – USD 69/b (5.5% of GDP). RUSSIAN ECONOMY IN trends and outlooks defense and domestic security in favor of economy restructuring programs, providing there are efforts in place to bolster the efficacy of their implementation. Table Actual and Envisaged Revenues from Main Taxes to the Federal Budget of Russian Federation in 2008–2014 (% of GDP) Actual The Budget Act 2008 2009 2010 2011 2012 2013 Corporate profit tax 1.8 0.5 0.6 0.6 0.6 0.6 0.VAT – total: 5.2 5.3 5.5 6.0 6.3 6.4 6. On domestic produce 2.4 3.0 2.9 3.2 3.2 3.2 3. On imports 2.7 2.3 2.6 2.8 3.1 3.2 3.Excise taxes, total: 0.4 0.3 0.6 0.5 0.7 0.9 1. On domestic produce 0.3 0.2 0.5 0.4 0.6 0.8 0. On imports 0.1 0.1 0.1 0.1 0.1 0.1 0.Mineral tax 3.9 2.5 3.0 3.8 3.6 3.4 3.Customs duties, total: 8.4 6.5 6.8 8.2 7.4 6.8 6. Import 1.5 1.2 1.2 1.4 1.4 1.4 1. Export 6.9 5.3 5.6 6.8 6.0 5.4 5.Proportion of aforementioned taxes and duties 93.3 86.5 89.6 91.4 89.4 92.3 93.in the federal budget revenues, % Source: the RF Ministry of Finance. Modernization and restructuring of Russia’s economy in the medium- and longer-run are closely associated with abrogation of export duties whose presence means subsidizing domestic consumers of minerals and energy sources at the expense of the rent from the use of stateowned natural resources. Preserving, throughout the new Russia’s history, lowered domestic prices of carbohydrates, and export duties on oil products at a level below the one of export duties on crudes has failed to ensure a qualitative modernization of its economy, nor it boosted its competitiveness. Recent moves to encourage the volume of domestic oil refining and increase exportation of oil products by setting respective export duties at a level lower than the ones on crudes did not help bolster intensity of oil processing which made up just 71.2%, or matched the level. That is to say, the index in question has posted practically no growth over the past decade (for reference, in developed economies, the oil refining intensity rate is 90-95%).
<urn:uuid:2d7be701-762f-4b4f-acea-2d0f1c3485d8>
CC-MAIN-2016-44
http://www.dissers.ru/books/1/1694-13.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00425-ip-10-171-6-4.ec2.internal.warc.gz
en
0.92717
3,430
1.828125
2
As we speak, Iceland’s first post-collapse trial is taking place. To no-one’s surprise, the accused are individuals from the most radical part of the uprising that toppled Iceland’s government during the winter of 2008 and 2009. The people – anarchists and radical leftists – are now facing somewhere between 1 and 16 years in prison, will they be found guilty of attacking the parliament. On December 8th 2008, a group of 30 people planned to enter the Parliament gallery but was met with a tough response from the Parliament’s guards. According to Iceland’s constitution, everybody can enter the Parliament gallery to follow parliamentary sessions. Therefore it was not only their natural right, as the opponents of current powers, to enter there – but also their legal, constitutional right as members of this society. Only 2 out of the 30 people managed to get there; one of them shouted at the MP’s to get out of the building. In reaction, the people were held hostage by police and Parliament guards, few of them arrested and brought to the police station. A year later, accusations were filed against 9 of them. Between One and Sixteen Year in Prison The Reykjavík Nine (Rvk9) are accused of violating the government authorities, disrupting public order, committing and threatening violence against official workers, leading an organized attack, housebreaking, disrupting a legal meeting and last but not least, threatening the Parliament’s free will. The last mentioned law article – which takes on attacking the Parliament and demands somewhere between 1 and 16 years prison sentence – has been used only once before in the history of the Icelandic state. That was in 1949 when the police and right wing extremists beat up people who rioted by the parliament, protesting Iceland’s entrance into NATO. Of course, it were the NATO opponents who got sentenced, including an official deprivation of their human rights. Since the court case was originally filed in January this year, many hearings have taken place. One of the Rvk9’s lawyers has systematically shown the witch-hunting nature of the case, as well as the police’s and judge’s favoritism. Of course that should be obvious to everyone with a critical mind. But if anyone still had doubts about it, the lawyer and other opponents of the Rvk9 case have very well exposed the false neutrality of the state institutions. A big group of policemen have been present in the courthouse at every hearing, by the demand of the judge and chief judge. Looking back to the history of court cases in Iceland, this police presence is unique and shows the judge’s assumption about the threat caused by the defendants and their supporters. Thus he has already taken a stand. Early on, the police stayed behind the curtains but parallel to the public increased interest in the case, the judge and chief judge have handed the authority of the trials to the police. The police has therefore guarded the doors to the courtroom and only allowed entrance to as many people as there are chairs in the room. Later on, the police has formed a wall in front of the courthouse itself and only allowed a handful of people inside. Couple of the defendants have undergone violence and had problems with entering. In one instance, two of them were not allowed into their own trials and despite repeated demands, the judge has not secured that this will not happen again. The police presence has only thrown oil on the fire of rage against the trials, which has resulted in rioting and several arrests. The Silence of Media and Authorities Corporate media has of course played its part in the case – actually since the original event and arrests happened in December 2008 – which is to sentence the Rvk9 beforehand and create a negative public opinion. The case’s opponents have on the other hand managed to show the absurdity of the trials and the witch-hunting nature of it, by pointing at the zero gravity of the accusations and by putting the events in context with the 2008-2009 revolt and that time’s social conditions. The judicial system’s one-sided aim has been properly exposed. The criticism has been pointed towards the roots of the case – the hierarchy of the so-called democratic society – and its opponents have increased. That was seen in the signatures of more then 700 people who announced that they had also “attacked” the parliament that same winter and demanded that the case would be dismissed. The media editors’ reaction to this progress has only been shown in one way, with bitter silence. Now they only talk about the case to bring forward lies, purposely to criminalize the defendants and their supporters. But the media is not the only one who keeps silent. The first agent of this case, parliament itself, has shut its mouth – at least on the official side. Thus the parliament’s speaker refused to accept the 700 signatures and said that the case and the signatures had nothing to do with her job. Still, she saw nothing wrong with contacting a well known philosopher who had voiced his opinion about the court case in a radio show, ticking him off and accusing him of misstatements. Asked about her interference, she did not want to answer and the same has applied to the reaction of any spokesperson of the parliament and or the prosecution, when asked critical questions. Increased Support and Solidarity The media’s and authorities’ attempts to silence the resistance and create as negative impression as possible of the defendants, has not gone down very well with the public. In May, many well known and mainstream musicians played on a big outdoor concert in support of the Rvk9. The concert took place on the square in front of parliament, the same as where the 1949 NATO riots and the 2008-2009 protests took place. In July, a similar event took place in Reykjavík’s Living Art Museum, where many artists showed their objection to the prosecution and Iceland’s state. The support, which comes from many different directions of society, has not dwindled despite the Rvk9’s and their supporters’ radical criticism and analysis of the system. It has rather increased and gotten beyond Iceland’s borders, which could e.g. been seen in a big solidarity protest by Iceland’s consulate in Barcelona, July this year. In the end of August, four of the defendants demanded that the judge would resign because of the favoritism and subjectivity mentioned here above. The judge pronounced his own qualification and few days later, the supreme court confirmed his decisions, despite the heavyweight reasoning of the defendant’s lawyer. During last hearing, September 8th, the same defendants demanded that the state prosecutor would resign because of her close connections with the “victim”, but she serves a job for the parliament, within the Central Bank. The verdict on that will be announced soon and by that time, the principal proceedings will start if the demands will not be met. The Rvk9 and their supporters need all forms of international solidarity, be it articles and translations, spreading the word, demonstrations or any other ways to show an opposition to Iceland’s state repression. A list of Iceland’s embassies abroad can be found on the web of Iceland’s Ministry for Foreign Affairs. More detailed information about the case and further news can be found here. Against all state repression! Free the Reykjavík Nine! Down with the Icelandic State!
<urn:uuid:4e45c922-fca7-40d7-96ba-774ffcf210b4>
CC-MAIN-2017-04
https://bristolabc.wordpress.com/2010/09/09/support-the-reykjavik-nine-fight-state-repression-in-iceland/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00299-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977331
1,535
1.679688
2
Latvians consider themselves to be uncomplicated and dependable and they expect their business partners to be the same. Latvia’s gradual transition to a market economy triggered the selling of numerous state companies to local businesses or to foreign companies. So, many Latvians have had the occasion to work with foreign people brought in to help train them. This process has involved numerous cultural clashes, due to differences in attitudes and values. Latvians are well educated and dislike the idea of a stranger telling them what to do in their own country. So, when a foreign manager understands the general business environment they are going into, the reception they receive is more favourable. Latvians are willing to work long hours, even overtime, in order to provide a good standard of living for their families. Latvians are reserved and very probably will not talk about their family matters with you. - January 1 (New Year’s Day); - April 14 (Good Friday); - April 16 and 17 (Easter Sunday and Monday); - May 1 (Labour Day); - May 4 (Independence Proclamation Day); - June 23 and 24 (Midsummer Holiday); - November 18 (Independence Day); - December 25-26 (Christmas); - December 31 (New Year’s Eve). In Latvia, employees are entitled to four calendar weeks, 20 business days, of paid holiday a year. Most Latvians tend to take their vacation in the summer months of June, July and August and also around Christmas time. The working week is typically 40 hours with 8 hour days. Part time work is not yet well established. The official business hours usually start at 8 to 8:30am and last until 4:30 or5pm. However, people in business often work late, even at weekends. Because office hours may vary, it is better to enquire about your partners’ hours of business and make appointments in advance. Friday is a short day in many businesses and many people leave work at around 4 pm or even earlier. Banks generally open at 8am and close early, whereas shops generally open later and stay open until 6pm on weekdays. Lunch breaks are normally short, except during a working lunch which can involve lengthy discussions. In Latvia, there are a number of laws and constitutional rights that affect employment and business operations. ‘Latvijas Vēstnesis’ is the official publisher of the Republic of Latvia and the best source of information concerning the legislative environment: https://www.lv.lv/?menu=en When doing business in Latvia, it is possible to specify the jurisdiction of any written agreement, to determine which laws will apply to the agreement. Therefore, an employment agreement may be subject to the laws and regulations of a foreign country rather than the laws of Latvia. Normally, any agreement should be written up and original copies prepared for each signatory, so that each party receives an original signed copy for their records. Working hours must be specified by regulations, shift schedules, or by an employment agreement. Employees in a regular job may not work more than eight hours a day, and employees exposed to special risk and adolescents must not work more than seven hours a day. On the day preceding a holiday, the working day must be shortened by one hour. In Latvia, the minimum wage is equivalent to a minimum monthly salary of €255. Appropriate supplements are required to be paid for overtime or work carried out in special circumstances, such as night work or during holiday periods. Employees are also entitled to rest periods of at least 30 minutes, if their work day is longer than 6 hours, to be taken within the first 4 hours of their day. According to Latvian legislation is illegal to employ persons under the age of 18, with certain exceptions. Children between the ages of 15 to 18 can be employed with the written consent and supervision of their parents. In exceptional cases, children as young as 13 can be employed. However, there are additional legal protections for children who are employed and work should be outside school hours, light, safe, moral, and not harmful to the development of the child in any way. The main areas where people under the legal age are employed are cultural, artistic, sporting and advertising activities. Provided the consents are in place, employers would also need a permit from the State Labour Inspection. There are no maximum legal ages for employment in Latvia, and expected retirement age varies depending on the type of employment and personal preference. The protection of parental rights is quite strong in Latvia and women are entitled various forms of prenatal, maternity and parental leave. Parental leave is granted according to the length of time a person has been employed but should not exceed 18 months in total. Leave can be requested for a child under the age of eight. During this period of time, the employee cannot be fired unless the company is shut down, bankrupted or in some other special legal situation. In Latvia, confidentiality is expected, even when it is not expressly stated in a written contract or agreement. All employees are under an obligation of respect, which means that they should not reveal information about the company, business and their activity to any person or entity outside of the company. Special circumstances relating to confidentially may form a clause in a written agreement. Foreign nationals may only be employed if they hold a valid work permit. Employers must request such permits through the State Employment Agency and approval is automatic if the employer had already registered the vacancy. A work permit may not be required, if the duration does not exceed 14 days and either: - the employee is an author, artist, performer, administrative, technician or specialist brought in to resolve a problem or to increase the quality of a process; or - the agreement is carried out by an education institution, research and scientific body, independent researcher, or expert. If you or any of your associates are suddenly taken ill or have an accident during a visit to Latvia, free or reduced-cost treatment is available; in most cases on production of a valid European Health Insurance Card (EHIC). Only state-funded hospital treatment is covered and you will receive treatment on the same terms as ‘insured’ local residents. Treatment in private clinics is definitely not covered, except when otherwise informed and sometimes you might have to pay for part of the treatment that you receive from the state-hospital. Therefore, it is advisable to get private medical insurance to supplement any healthcare expenses, prior to travelling to Latvia. Pharmacies in Latvia can be used for all the prescriptions and over-the¬-counter drugs. However, some medications are only obtainable on prescription from a doctor. Regular business hours for pharmacies are 8am to 8pm on weekdays. Designated duty pharmacies can be accessed during the night, at weekends and during holiday periods. Most of all the specialized hospitals are situated in the capital and largest cities. The Ministry of Health operates the larger state hospitals and local municipalities are responsible for the other two types of public hospitals. The national emergency telephone number for ambulance service is 104. For more information: World Health Organisation: http://www.who.int/countries/lva/en/
<urn:uuid:160b36b8-ee03-46c4-96eb-89a86f905697>
CC-MAIN-2016-44
http://businessculture.org/eastern-europe/latvia/work-life-balance/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00343-ip-10-171-6-4.ec2.internal.warc.gz
en
0.963096
1,487
1.851563
2
Welcome To The Heraldic Shoppe Hello and thanks for visiting our online shoppe. For 18 years, we have taken pride in providing, thus preserving, the ancient tradition of Family Coats of Arms & Family Name Histories at very competitive prices. With careful and meticulous attention to detail, our professional team of family history researchers who started in 1971, continue to build our database with authentic quality research, making us the leading suppliers of heraldry not only in Australia, but all over the world. Please feel free to have a quick search for your name. If your name has a very unusual spelling, or does come up on an initial search, or you have any other questions, please don’t hesitate to contact us and hopefully we can help you out. Call Danny or Lela on 0402 988 048 Surname Name Search Order now for Christmas for the perfect Family Gift. What are the Coats of arms? Basically originated in the middle ages for the purpose of identification of an individual or family. Throughout the ages, wars, conquests and economic conditions have caused countries boundaries, names, and languages to be changed, sometimes dramatically, for centuries. A Coat of Arms remains the same and represents the identity of the bearer. The colours (tinctures) and heraldic symbols (charges & ordinaries) on the Coat of Arms have real meaning and is the visual representative of the family name it represents. These colours and symbols used in a Coat of Arms were chosen and designated to show a person’s allegiance & status. From the crusades, Coats of Arms were the identifying symbol of a person, a family, group, clan(Scottish) or sept (Irish) and helped distinguish friend from foe and to act as a rallying symbol. (like the Scottish Clan badge). A Coat of Arms was unique to an individual in a country (no two families share the same Coat of Arms in any same country) and was easily recognised by all as so few were able to read. The “Visitation of the Heralds” every 35 years or so ensured this, as they checked that no two were the same and no arms were bearing honours or “girdles” that were not awarded to them. Many different or “sub-branch” coat of arms may also have evolved as families splintered, changed location or passed them to rightful heirs of those particular arms. That is why we often see marks of “cadency” ie: the crescent, which represents a second son. Here at The Heraldic Shoppe, our team of professional researches, since 1971, have carefully searched out and we use the earliest (senior branch) Coat of Arms associated with that family, as we do the earliest written record of the family name found.
<urn:uuid:58d04073-932a-430a-abe4-660d15d04bc3>
CC-MAIN-2022-33
http://coatsofarms.com.au/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.958282
593
2.09375
2
How To Tie Fox's Arkansas Scud A Guide's Fly Although Fox Statler is called "Mr. Sowbug". He really uses a scud almost all the time. The reason he says is a matter of "preference". Not his own preference but the preference of the trout in the White River System in Arkansas and Missouri and any other river, stream, spring creek or lake where it is present. To explain this he tells one of his many stories. Several years ago, in the early '70's, I moved to the Mountain Home which is in the Ozark Mountains of Arkansas. I was a math teacher and then as still now, Arkansas teachers weren't paid very much. I made $9,100 that year. I had four children, a wife that worked, a college degree, and we qualified for food stamps. I was too proud to take the food stamps so I supplemented our groceries by hunting and flyfishing. I spent every day I wasn't teaching with a gun or a fly rod in my hand. In those days, I practiced "catch and feed the kids", not C&R. This was true of most everyone on the river back then, most of whom were bait guides. In fact, when I started to guide the rivers, John Gulley was the only real full time flyfishing guide I knew of. Some said they were, but I never saw any of them with a fly rod in their hand. John and most everyone else that came to the rivers were woolly bugger fisherman and I hated woolly buggers. To me, woolly buggers were, and still are, a poor imitation of a lot of things and a good imitation of nothing. I had already developed the Arkansas Dead-Drift and sowbugs were about all the flies I carried except for a couple scuds. You see, the sowbugs were so thick back then, that if you stood still for two minutes you couldn't find the toes of your boots. And that's not an exaggeration. One day, I decided to dig up one square yard of gravel near Bull Shoals Dam and collect every aquatic insect in it. Being a math teacher, numbers were and still are pure logic in the raw to me. I found that there were about 7,000 sowbugs, 500 scuds, 100 planarian, 3 mayflies, and 1 caddis per square yard of gravel. Well to me this represented the ratio of bites that I could expect using any of these bugs. While the ratio of bites of sowbugs to planaria, to mayflies, to caddis was true. The ratio of sowbugs to scuds wasn't. You see there were 14 sowbugs to every scud, but in the fish's stomach the ratio was 5 sowbugs to 1 scud, or 4 to 1, and sometimes 3 to 1. I wanted to find the reason why this was happening. I thought I new the answer but I wanted proof from a reliable source before I started spouting off. I searched for the answer to my paradox for almost a year. Near the end of the school year, the junior high science teachers organized a field trip to Blanchard Springs Caverns. I drove a bus so I had to go. Before each group of students went down into the caverns, they had to attend a short 30 minute movie and lecture. As my group was leaving, I noticed two large sketchings on the wall, one of a sowbug and the other of a scud. They caught my attention because both drawings were about a foot long with infinite detail. As I was admiring someone's else artistic abilities, which I lacked, the young Speleologist that gave the lecture ask me if I knew what I was looking at. I told her I sure did and probably played with them more than anyone she had ever met. She proceeded to tell me a whole lot about them anyway. A lot I already knew but some I didn't. Then I told her about my ratio problem. She smiled at me and said that was simple. She said that the first thing you do when exploring a cave is to figure the bio-mass, then you would kind of have an idea of what to expect. Then she threw me the bomb. She said that scuds have five times more protein than sowbugs, and the fish's instincts tell them to eat the best food available at all times. To me that meant that a trout would pass up 9 sowbugs to eat one scud. The answer was what I had expected, and, from the day I had dug up that one square yard of gravel, I had been fishing scuds with great success. But thanks to 5 foot blonde genius, I knew for sure why I was succeeding. She don't know how close I came to giving her a big old hug and kiss that day. But...I decided to not show her how jubilant I felt... because I wanted to see the caverns and not the insides of a jail. How To Tie Fox's Arkansas Scud A scud can come in several colors, even within the same river, because of the life-cycle stage it is in and what it eats. A scud may molt from one to several times a year depending upon the water temperature and how fast it is growing. A young-of-the-year scud may molt several times in the summer while an adult may molt only once. Just before a scud molts, it turns very dark in color and moves to fine gravel to bury itself. This may be a dark chocolate, dark olive, or dark gray (almost black). During the molt, it looses its outside skeleton or shell and grows another. The coloring of its new shell is pale yellow to a pale yellow-green. About the time it leaves its hiding spot, it may be a copper, light olive, or pale gray. As the new shell ages and hardens, its coloring will darken to almost the colors of the river bottom. It is suggested by Fox to use a shade darker than a molting scud or a molting scud color. Rarely does he use the dark phase. Why, because Fox thinks the fish prefer the more easily digestible lighter phase over the darker phase. So even though these are very good colors to start with, he suggests that you "tune" your scud pattern to the water you are fishing. Your choice of hook can make a lot of difference in the amount of success you experience when fishing a scud. A straight-eyed, fine wire, quality dry fly hook has proven to be the best. Circle hooks and rounded shank hooks imitate resting scuds, while straight shank hooks imitate swimming scuds. A straight-eyed, straight shank hook offers the largest hook gape for that size of hook and will have the best hook set. A fine wire hook will penetrate the flesh and bone of a fish's mouth with less effort than a heavy nymph wire hook. This is especially helpful when using tippets of 6x and smaller. The size of lead used in this scud pattern is related to the size of hook to be used. On a #12 hook use .025" lead wire, #14 hook use .020", #16 hook use .015", and on a #18 hook use .010". For scuds smaller than #18, try the Worm Scud Pattern, another article on this site. Always wrap enough lead wire to fill half of the hook-shank, usually this is about 8 to 10 wraps depending upon your choice of hook. The thread of your pattern (#8/0) can help you catch more fish by highlighting the scud the right way in the right conditions. For an early morning (dawn) and late evening (dusk) scuds use fluorescent orange or fluorescent red thread. For high-noon (bright days) scuds use light blue thread. For day scuds use the thread that best matches the coloring of the segment edges of the scud's body in the water you are fishing. This could be pink, yellow, or cinnamon on molting scuds, camel, insect green, or iron gray for adult scuds. Take your thread and capture the lead at the bend of the hook to the middle of the shank. Build up the thread at the front of the lead to make a smoother transition from the hook shank diameter to the lead diameter. End this step with the thread on the lead. Swiss straw is too wide as it is sold. Cut a piece about 4 to 8 inches long and then split it with a sharp knife or razor blade into 1/4 inch to 3/16 inch strips. The wider strips work well for #12 and #14 scuds and the smaller for #16 and #18 scuds. Place the swiss straw over the lead and wrap it down. End with the thread at the hook-eye. The reason for tying the straw in before the dubbing is to make the pattern more durable. Most bugs come undone at the rear end, this is true of scuds also. By tying the straw in now, the straw will have to wear-in-two and not come untied. The dubbing of a scud is so important. Your dubbing needs to be the correct leg length when it sticks to the waxed thread, the right color, and it doesn't hurt for the mixture to have some light reflecting abilities. Adding some Zelon to any mixture is helpful, but using a mixture of antron and zelon has proven to be the best over the years. Make sure you chop your mixture to about 1/8 inch long before blending it. Then when you "touch dub" (dabbing the dubbing to the waxed thread) it will put a uniform layer of dubbing on your thread. Dub the scud from the hook-eye to the hook-bend placing an even layer of dubbing on the entire pattern. This step is hard to show with a photograph, but the scud below has been flattened vertically with a pair of flat-nosed pliers. Now is the time to flatten the scud before the back is tied down. If you flatten the scud after the back is on, it will often split the back ruining the pattern. Don't flatten the scud with a lot of force. Excessive force will cause the lead wire to be cut by the hook-shank and the scud will fall apart. The flattening of the lead gives the pattern a little curve to the body by making the fly fatter at the hook-bend than at the hook-eye. Giving the back a smooth appearance involves more than just winding the thread over it. First the straw should be opened as wide as possible and then pulled toward the hook-eye as it is wrapped down. With a little practice, this step becomes quite easy. Whip finish with just three wraps. Trim the straw just in front of the hook-eye leaving a short tail. The glue used for coating the back of the fly is a mixture of one part glue (head cement or "Sally Henson's Hard-As-Nails") and two parts thinner. Why do you want to use a diluted mixture of glue? Because you don't want the glue to build up on the straw but penetrate the straw and dubbing to the lead wire. This will make the straw and the entire scud very durable. To save time when making scuds, you can hook them on a piece of Styrofoam or foam tape and glue several at once. The Finished Scud Fox's Arkansas Scud is a two minute fly. Actually he ties it in about 1 minute and 40 seconds while he babbles away about some monster brown that was caught in the past. He calls it a "guide's fly" because it is easy to tie but extremely effective. This pattern has been fished in most trout rivers of the United States and several international rivers in Argentina and New Zealand with much success. As mentioned earlier, the variations to this pattern are countless. Below in the upper left hand corner is a copper molting scud, then a dark gray in the upper right, a Brookville or tan scud in the center, lower left is a dark olive, and lower right is a medium red brown. Remember to "tune" your fly to the match the scuds in the water your are fishing. With a little experience it won't take long to make an educated guess about the color of scuds in a particular river just by looking at a picture of the river bottom. This year, 2008, this pattern is being commercially tied by Targus in several color combinations and sizes. We are thankful for Targus's interest in Fox's Arkansas Scud, a tested standard of nymph anglers.
<urn:uuid:8427f008-92f5-4e99-bc83-4efb7b50bc75>
CC-MAIN-2017-04
http://www.theflyfishingforum.com/forums/share-patterns/3996-how-tie-foxs-arkansas-scud.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00312-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966748
2,657
1.5625
2
June 14, 2011 The following is a translation of the Henshu Techo column from The Yomiuri Shimbun's June 14 issue. * * * Poet Masao Nakagiri (1919-83), who once worked as a political reporter at The Yomiuri Shimbun, wrote in his poem "Yaseta Kokoro" (Emaciated heart): "So long as there are people dying in conflict or of hunger, I'll never walk the path of literary art" Unlike my literary forbear, I have never made a firm pledge not to write about the beauty of nature, or kachofugetsu (literally--flowers, birds, winds and the moon) until the aftermath of the earthquake and tsunami was finally resolved. Even so, I have hardly found a chance to admire the beauty of seasonal flowers in this column. Cherry blossoms bloomed and fell without my knowing. I also missed seeing the clusters of Japanese wisteria. Blooming in white at first, And turning to a pale green" This is a haiku by Suiha Watanabe (1882-1946). Light green gives a particularly fresh impression as the color of the flowers changes. But I seem to have missed seeing this fresh green as well this year. In Fukushima Prefecture, where the rainy season is approaching, there is concern about rain leaking into houses within the 20-kilometer no-entry zone around the troubled nuclear power plant. Roofs, which lost tiles in the huge tremor, were left unrepaired. If columns supporting the houses rot, residents may be unable to live in the houses even when they are allowed to return home. There must be many people who do not have any relatives in disaster-hit areas but are still listening to weather reports for the Tohoku region with worry. There are times when we cannot give much attention to flowers around us. How discouraging this early summer season may be for flowers that are blooming vigorously and beautifully. When people cry, flowers also cry. (Jun. 20, 2011)
<urn:uuid:f7e5880e-806b-4d32-8500-b52af30bdc16>
CC-MAIN-2017-04
http://vn-miraclelife.blogspot.com/2011/06/1406-musings.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00466-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96422
435
1.734375
2
By Mark Bowser In her wonderful volumes on American history, Mara Pratt shared a story about George Washington that we should all take to heart. One day during the American Revolution, General George Washington rode upon a number of soldiers who were working to raise a beam up to the top of a military structure. The men somehow didn’t recognize Washington. All the men were working except one. That one man continued to bark out orders. He yelled at the other men, “Now you have it! Already! Pull!” Washington guided his horse a little closer to the order barking soldier. He quietly asked the soldier why he wasn’t helping the others. The young man looked up at Washington and angrily said, “Sir, don’t you know that I am the corporal? Washington said, “I did not realize it. Beg pardon, Mr. Corporal.” Washington then got off his horse, walked over to the soldiers and began helping them move the heavy beam. The General continued until the beam was put in place on top of the structure. Then, with sweat pouring down his face, he turned to the corporal and said, “If ever you need assistance like this again, call upon Washington, your commander- in-chief, and I will come.” What is it that makes a great leader? Simply, a servant’s heart. Thanks for reading today!
<urn:uuid:a00833bd-eb59-4cd5-b1ff-2ea270fc912a>
CC-MAIN-2022-33
https://markbowserblog.com/tag/leadership-training/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00073.warc.gz
en
0.969345
298
2.640625
3
By looking briefly into the stories of successful and unsuccessful products, one may conclude that new technologies require two basic prerequisites: social acceptance of the product and the possibility to be integrated into the technological texture (Rammert 1993). Ethical questions usually arise either when new technologies affect the normative framework of a society or if technologies that are being used suddenly become problematic. The social aspect of technology has been largely overlooked by technology designers of the past, but it plays a key role with respect to ethics. The objective of ethics quality management is to ensure that ethical conflicts are considered as soon as they arise. A prerequisite for the achievement of this objective is the categorization of ethical conflicts based on the impact of technology on society. Ethics Quality Management (EQM) EQM as a method aimed at companies and manufacturers to take social responsibility in the development and application of products and systems. It is based on an integral view of a company in a procedural approach, including the societal viewpoint, which sees a company as being embedded in a society to whose members it sells its products. Structures and Institutions, In order to assign the responsibilities along the product development process, several institutions are necessary. These institutions should foster ethical action of individuals and coordinate conflict-solving processes. The main idea is that conflict solving should only involve parties affected by this conflict, and that it should be done in a structured way. At an individual level, Ethical Product Management requires ethically educated staff members. The level of ethical education should correspond to the level of action of an employee. Engineers do not need to be ethical experts, but they need a minimum of ethical understanding in order to be able to identify conflicts. All members of a company should be committed to the common ethical standard of the company and/or to the standard of their professional organization. The main task of individuals is to identify and communicate existing or arising conflicts. They may also solve ethical conflicts, if those are of the business-as-usual type problems that can be solved by individuals. Ethics Task Forces are the next institutional level, which consist of a group of engineers working in the same area. This task force reflects a kind of miniature society. Task forces have to define and adapt the global values of the company into the concrete situation. In doing so, they define a kind of groups ethics for working groups. Furthermore, they have to solve all conflicts that may not be solved by individuals. Members of the task force need enhanced ethical education. In the case of a conflict, the person reporting the dilemma joins the ethics task force. Conflict solving is either done by the task force itself using discourse methods and recording the conflict-solving process by means of the documentation database or by including further experts into the decision-making process. If the conflict vitally affects society and/or the company, the task force applies for help from the public relations group and the Ethics Officer. Those conflicts should be treated isolated from the person reporting the conflict to prevent damage for the reporting person. The Ethics Public Relations Group acts as an interface between society and company; its task is to include the stakeholder perspective into the engineering process. Firstly, this group defines the values, worldviews to which the employees of a company are committed. Secondly, it has to monitor the groups ethics defined by the task forces with respect to their compatibility to the general company standard. Moreover, it manages conflicts that cannot be solved by the task forces and may even decide to attract the conflict solving in cases where engineering ethics problems need participation of stakeholders. In this case, the duty of the public relations group is to invite discussions with the public. It is of great importance that the ethics public relations group is independent from the human resources department in order to prevent negative consequences for the employees reporting ethical conflicts. On a second level, the ethics public relations group informs the public about conflict solving within the company and is open for questions from customers and for those of public interest. In this way, transparency to society with respect to ethical decision-making within the company is created which enhances the acceptance of the company and its product. EPM Monitoring and Documentation finally has to establish and manage a database where all ethical conflicts and the found solutions are recorded. The database should be structured in such a way as to facilitate research into and profiting from similar conflict situations. Ethical conflicts should be classified and archived with the solution found for each conflict. This can be understood as a learning process for the company where employees and task forces can learn from the knowledge and experience acquired by others in ethical conflicts. Furthermore, the database is a control tool for the management of ethical conflicts within the company and may be used for transparency to society. Classification of Ethical Conflicts and levels of solvability, According to Armin Grunwald (2000b), ethical conflicts in engineering may be differentiated into business-as-usual conflicts and Engineering- ethics conflicts; they require different conflict solving strategies. Business-as-usual conflicts refer to types of situations where the normative framework is not affected and the choices of values are clear. In this case, there is no need for reflection about new ethical categories or strategies, but conflicts may be solved by classical prioritization of values and through a straightforward approach of ethical rules to the situation. Business-as-usual means that ethical decision-making based on rules and prioritization strategies for rivaling values is possible. Such conflicts can usually be solved by relying on codes of conducts or engineering ethics codes and the principles stipulated in these codes. Engineering ethics conflicts are conflicts that cannot be solved simply by the application of prioritization rules, but which need reflection of ethical values and strategies themselves. More generally, they imply a reflection of ethical theories. This is generally the case with all conflicts where the normative framework of society is affected, or third parties are involved into the conflict. In this case, there is a need for the participation of societal groups in the conflict solving process and the conflict is no longer solvable within a company alone. Building a solution for such conflicts implies both knowledge about technical tasks and knowledge about ethics. In these cases, the construction of an appropriate solution is a task of interdisciplinary reflection and decision-making. It may be necessary to develop the normative framework of society further and /or develop technology further in order to obtain sound solutions. This may imply that engineers take part in a political decision-making process.
<urn:uuid:eea7ef02-f671-4d56-add9-41b983666551>
CC-MAIN-2022-33
https://an-essay.com/ethical-reasoning-frameworks
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00066.warc.gz
en
0.949428
1,297
3.0625
3
Open Source Intelligence course for new and experienced investigators. The OSCI course teaches you a wide range of skills that can help separate you from the rest of the industry. OSCI covers the following areas: - OSINT – Open Source Intelligence - IMINT – Image Intelligence techniques - GEOINT – Geospatial Intelligence techniques - HUMINT – Human Intelligence techniques - Social Engineering - Profiling People - Advanced search techniques And much more. The course is designed for anyone who wants to get started in the industry and even experienced people already in the industry. This is the same course we teach to the government and private sectors. The course is 100% online. Once you enrol in the course you will be presented with some online modules, once you have completed the first two modules there will be a live session. This session is designed so you can speak directly with an instructor, ask any questions about the material you have just completed, before we progress to teach you some more advanced techniques, live. These live one-on-one sessions ensure you get the coaching and support you need, and you have the ability to have the trainer focus the content and live examples based on your career needs. Our course is focused on giving you the skills and techniques used to obtain information so you can transfer/use those skills in the real world. Our belief is, it should not matter what country the subject or case is in, the same skills are required. The only difference is the databases you use. That is why we focus on teaching you the skills and techniques required to gather more intelligence. There are two common questions we get asked from students before the sign up: “Will I learn anything new in this course?” And the answer is yes. We have a lot of students who currently work in the industry who do the course. These students come from all different parts of the industry. From government agencies, skip trace agencies, private investigators, and inspectors. “Will I be able to understand any of the content if I have never done work like this before?”And the answer to that is yes. We have structured the course, so everyone starts off with the basics. This is essential, as we have found even experienced investigators have missed some of the core basics required to get more advanced training. And, since we included multiple live sessions throughout the course, this means you get the one-on-one support you need to progress through the course. If you would like more information, the best thing to do is speak with a trainer to see if we can help. Learn more (link to http://courses.osintzone.com/oscimk.html)
<urn:uuid:c2e442d3-a58e-4fe4-bd71-8be763277697>
CC-MAIN-2022-33
https://mykludo.com/training-programs/onist-online-training/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00675.warc.gz
en
0.947352
559
1.664063
2
The Digimo Concept Is An Ultra-modular Transforming Camera This crazy concept takes a modular digital camera to a whole new level Designed by Steve Sangik Lee, the Digimo is a concept for a camera with that lets you control multiple modular lenses from a single base unit. Like so many design concepts, it might not ever make it into production, but there’s some interesting ideas there. You can think of the Digimo as a natural evolution of the Bug System of modular, programmable gadgets, except this is specifically designed only for photography. His vision is of a series of small, square modules — some with lenses, some for control. You can slave a number of lens units to the screen module, and then shoot wirelessly with them from anywhere. In the example below, you can see the concept of attaching one camera to your helmet, one to the rear of your bike, and then shooting from either one at will. He also suggests attaching two lenses to one another for 3D photography, or leaving a lens out and walking away for better animal photography. While we doubt we’ll ever see this on store shelves, the Digimo concept is far more realistic than many other camera concepts we’ve seen, to the point where I don’t think there are any hard technological barriers to it being constructed, except what it might end up costing. You can see more of the concept at Yanko Design.
<urn:uuid:b41a1ddf-6c5d-4ac6-9d4a-b5531c636d58>
CC-MAIN-2022-33
https://www.popphoto.com/gear/2011/10/digimo-concept-ultra-modular-digital-camera/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00275.warc.gz
en
0.926148
299
1.617188
2
December 15, 2009 What does “Special Ops’ mean? Why would a special operations command, JSOC, be answerable to our Vice President, a mentally unstable draft dodging hack from the oil industry? Why would the CIA outsource its most secret projects to Blackwater, a GOP mercenary group with the worst reputation of any firm the US has ever done business with? Years of kidnapping and torturing people based on mistaken identity, intelligence that is ALWAYS WRONG, chasing dead men, invading wrong countries and picking out allies that are gangsters, con men and drug dealers isn’t an accident, its policy. Now we are told Blackwater, the CIA, MI-6, the Mossad and RAW work together, not only against Iran but in friendly nations also. The stories we are told are that some of what is done is contracting for commercial clients and foreign governments and not anything involving fighting terrorism or protecting anyone, in fact, much the opposite. When is a mercenary a gangster? Are these missions or are they capers or hits? Blackwater has become the punching bag for the press of late. With accusations of close ties to the CIA and charges of murder and gangsterism floating around after years of more than empty accusations of massive incompetence, their name is abused most. Are they the only ones? When “private contractors” are involved in terrorism against US allies, the real scandal few are talking about in the US, and Blackwater’s name is brought up, is it really them or someone else? There are dozens of companies involved, not just “Blackwater.” We now know that Blackwater alone has an endless web of secret fronts making it impossible to trace what is done and for whom. Other companies are doing the same, all unaccountable to the United States or her allies. Many of these companies exist as offshore entities and are, thus, free to work for the highest bidder, be it Iran, Libya, Georgia, the Sudan or even Israel or India. The charges against private contractors and “special ops” and intelligence organizations are these: • Planning and executing terrorist acts inside Pakistan killing hundreds of civilians and targeting military and intelligence facilities • Organizing revolutionary groups inside Baluchistan which are now fighting along side the Taliban along with organizing attacks inside Iran. • Transporting narcotics and arranging international banking for warlords involved in opium • Using rendition and torture to create falsified intelligence used to justify unnecessary military operations • Manipulating and creating terrorist threats to influence American elections • Private contractors are said to provide security and training for Iran and other countries unfriendly to the United States • Creating a trade in phony terrorist suspects, innocent people who are bought and sold into years of torture, imprisonment and even murdered for profit. • Facilitating terrorist acts in Western Europe and elsewhere through withholding vital intelligence or worse, much worse, in order to maintain an international climate of fear. • Facilitating a world market in selling American secrets around the world which involved well known “think tanks” working for the US government, members of Congress and key Whitehouse and State Department officials. • Maintaining high level contacts with terrorist leaders for reasons we can only guess. [efoods]The last charge and the most serious charge is also the most substantiated. Sibel Edmonds, the FBI translator who was held under gag order by the Bush administration for 6 years has testified to the fact that the CIA under Bush was regularly communicating with Osama bin Laden until immediately before 9/11. Her sworn testimony is available and a recap of her charges is available thru the American Conservative. Evidence, to some degree, exists to support all of these charges but, although some investigations are going forward, any attempt to begin a comprehensive investigation of this massive national security threat is being blocked at every level. What are the rationales for this pattern of abuse of power? How could this be accomplished? Let’s look at a few of the factors involved: • Israel is the key to many issues, but not in the sense of Israeli security. For instance, Israel is the largest arms supplier to India and many other countries, often reselling extremely sensitive US missile technology. Israeli is also involved financially in oil and gas projects in many of the destabilized areas. • Global security experts have long suspected that the “War on Terror” was little more than an excuse to keep the arms business going after the fall of Communism. Revelations that most threats, from Iraq to “worldwide terror networks” have been overblown are now commonly accepted. • Wide mistrust of America’s democratic system of government and legal protections by powerful groups, some of whom profited massively from rigged gasoline prices, financial deregulation and “no bid” war contracts, led to a marriage of special interest and politics in America that undermined Constitutional liberties and controls on corruption to create a much less free but seemingly “more efficient” corporate state. • The world economy entered a period when the US could be realigned from its position of “economic powerhouse” to “milk cow.” America could be “looted”, financial institutions made insolvent, real estate markets collapsed while America’s military forces could be used to secure global markets for multinational corporations under the guise of “spreading Christian values” or “ending tyranny.” • The “information revolution” would make this, not only possible but expedient thru centralized control of media, TV and Radio and the ability to use the internet to systematically flood millions of households with continual irrational scares about poisoned vaccines, socialist conspiracies, gun seizures and mysterious plots. Where media manipulation failed, hacking electronic voting machines would leave a semblence of democratic freedoms while eliminating all real public participation in government. • One fact regarding 9/11 has always been known, one fact only: Osama bin Laden, now known to have been working for the CIA on 9/11, was not involved. Since the debunking of the 9/11 Commission Report, much done by those who wrote it themselves, we are left with no proven facts involving this tragedy. Some glimpses into these patterns of misconduct and conspiracy came up during the Edmonds interview with former CIA analyst Philip Giraldi, published in the American Conservative: “GIRALDI: You also have information on al-Qaeda, specifically al-Qaeda in Central Asia and Bosnia. You were privy to conversations that suggested the CIA was supporting al-Qaeda in central Asia and the Balkans, training people to get money, get weapons, and this contact continued until 9/11… EDMONDS: I don’t know if it was CIA. There were certain forces in the U.S. government who worked with the Turkish paramilitary groups, including Abdullah Çatli’s group, Fethullah Gülen. GIRALDI: Well, that could be either Joint Special Operations Command or CIA. EDMONDS: Maybe in a lot of cases when they said State Department, they meant CIA? GIRALDI: When they said State Department, they probably meant CIA. EDMONDS: Okay. So these conversations, between 1997 and 2001, had to do with a Central Asia operation that involved bin Laden. Not once did anybody use the word “al-Qaeda.” It was always “mujahideen,” always “bin Laden” and, in fact, not “bin Laden” but “bin Ladens” plural. There were several bin Ladens who were going on private jets to Azerbaijan and Tajikistan. The Turkish ambassador in Azerbaijan worked with them. There were bin Ladens, with the help of Pakistanis or Saudis, under our management. Marc Grossman was leading it, 100 percent, bringing people from East Turkestan into Kyrgyzstan, from Kyrgyzstan to Azerbaijan, from Azerbaijan some of them were being channeled to Chechnya, some of them were being channeled to Bosnia. From Turkey, they were putting all these bin Ladens on NATO planes. People and weapons went one way, drugs came back. GIRALDI: Was the U.S. government aware of this circular deal? EDMONDS: 100 percent. A lot of the drugs were going to Belgium with NATO planes. After that, they went to the UK, and a lot came to the U.S. via military planes to distribution centers in Chicago and Paterson, New Jersey. Turkish diplomats who would never be searched were coming with suitcases of heroin. GIRALDI: And, of course, none of this has been investigated.” The last sentence is the most telling. “None of this has been investigated.” When discussing the Joint Special Operations Command, they are referring to General McChrystal and Vice President Cheney. Drugs on NATO planes? Flying terrorist leaders around the world? Is this what we mean by “special operations.” How does flying terrorists around and delivering narcotics protect us? How many whistleblowers have been silenced? These are the charges made against Blackwater, as printed in The Nation: A former Blackwater employee and an ex-US Marine who has worked as a security operative for the company have made a series of explosive allegations in sworn statements filed on August 3 in federal court in Virginia. The two men claim that the company’s owner, Erik Prince, may have murdered or facilitated the murder of individuals who were cooperating with federal authorities investigating the company. The former employee also alleges that Prince “views himself as a Christian crusader tasked with eliminating Muslims and the Islamic faith from the globe,” and that Prince’s companies “encouraged and rewarded the destruction of Iraqi life.” Since these charges were made public, we have learned that this same company had been involved, on a massive scale, in US operations around the world. We learned this week, from Brigadier General Asif Haroon Raja in Opinion Maker that Blackwater is accused of terrorist attacks against Pakistan: “Having fully committed the army in fighting a futile US war on terror, RAW sponsored terrorists duly aided by Blackwater elements are playing havoc into major cities of Pakistan through almost daily bomb blasts and suicide attacks.” Can America afford to continue with our current special operations command, be it CIA or JSOC or whatever the flavor of the day, if even a single of the seemingly endless charges made are true? Is blocking investigations meant to protect America or to facilitate our own “evil doers?”
<urn:uuid:c585623c-f5a4-4d4a-a1a6-5cd3079e5fbc>
CC-MAIN-2016-44
http://www.infowars.com/when-did-special-ops-become-kidnapping-drug-dealing-torture-and-political-dirty-tricks/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00200-ip-10-171-6-4.ec2.internal.warc.gz
en
0.962764
2,204
1.617188
2
We are back with another addition to the debugging fundamentals series here in 2009! Regardless of your debugging experience we hope you enjoy this one. Don’t worry too much if you can’t answer them all but give them your best shot. While debugging an application, a developer observes a crash and is puzzled. The developer saves a memory dump of the process using the command “.dump /ma dbgex4.dmp” and sends it to you for debug assistance. eax=53454750 ebx=00000000 ecx=00000100 edx=000001b0 esi=001bfe20 edi=00ac36bc eip=47414d45 esp=001bfe00 ebp=4f564552 iopl=0 nv up ei pl zr na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246 47414d45 ?? ??? The attached zip, dbgex4.zip, includes three files. The program itself, the program’s symbols file and the saved memory dump file. (NOTE: You do not need to execute the program for the exercise however you may want to in order to solve the bonus’. You will need to rename the file dbgex4.ex_ to dbgex4.exe in order to run it). Using the accompanying files, answer the following questions: Part One – Debugging 1. What caused the access violation? 2. Examine the registers at the time of the crash. Is there anything interesting about the contents? 3. How did the registers get into this state? 4. Find the offending data structure which caused this state to occur. What are its contents? 5. Are there security concerns with this access violation? Why? 6. Why is this class of crashes not seen in the wild much anymore? Part Two – Reverse Engineering Examine the functions main(), snap(), crack(), pop(), and boom(). 1. Describe with a sentence or two what each one is doing. (There is no need to comment on every assembly instruction or re-write the code in C here unless you really feel you need to.) 1. If this access violation occurred while the program was running without a debugger present, would there be anything different about the crashing register state or the data structure which caused it? If so what is it and why? (HINT: If you would like to observe the crashing state like this, you can register windbg.exe to be the Just-In-Time debugger using the –I switch like so “windbg.exe -I”. When you run the dbgex4.exe program, it will crash and windbg.exe will launch automatically and attach to it.) 2. The functions from “Part Two – Reverse Engineering” perform operations on a set of data. During this manipulation some data is lost. Find this data and decode its “secret” message. |Share this post :|
<urn:uuid:a3dbd187-e5a4-4b89-b14a-a5b3fc3a451a>
CC-MAIN-2016-44
https://blogs.msdn.microsoft.com/ntdebugging/2009/02/27/debug-fundamentals-exercise-4-the-gameover-exercise/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00219-ip-10-171-6-4.ec2.internal.warc.gz
en
0.888536
650
2.375
2
Finding EMT jobs is actually really simple; you just need to put in some time to explore all of the opportunities around you. Once you have qualified and certified as an EMT, it’s not as challenging to get a job. In most countries, EMTs are in demand and it is easy to get a job, so as long as you are certified, you have nothing to worry about! Of course, there are some important things to note before considering a job as an EMT; - You need to have a high school diploma or an equivalent to work as an EMT. - You also need to have at least up to 2 years of licensed training. - You must earn a passing result in your EMT exam and get a license issued from your state. Getting a job as an EMT isn’t difficult because EMTs are literally life savers who respond first to emergencies and provide medical assistance. So, as many as there are, we always need more of you! Here are some situations where EMTs are needed: - Hospital emergency rooms are mostly crowded and occupied therefore; patients end up staying longer in the ambulance while EMTs and physicians provide further medical assistance. Sometimes, after arriving at the hospital and seeing that it is crowded, EMTs will transport patients to another hospital (possibly nearby) that has more space. - EMTs are always needed at emergency situations to save a life. Be it a fire accident, a car crash or an asthma attack. EMTs are the first ones to respond to the 9-1-1 call and immediately rush to the scene. How to find a job as an EMT? Well, if you live in a large city then you are quite lucky because it is very easy to be employed as an Emergency Medical Technician. All you need to do is, check around for opportunities and apply for the one most suitable for you. Similarly, wherever you may be in the world, if you’re applying for a job as an EMT, you’re literally applying to be a hero and you shall always be successful! The job opportunities for Emergency Medical Technicians are increasing over the years as more medical assistance is required. So, worry not, and go ahead! Study hard, get that degree and earn you certificate & license! The world needs more heroes like you! These are just some ways of finding a job as an Emergency Medical Technician; - If you are a certified EMT, the chance of getting a job is highest. Therefore, you must pass the EMT exam and gain a certificate in order to get a job as an EMT. You must keep this in mind before applying. - More EMTs are needed since hospitals sometimes get quite crowded and EMTs assist physicians to provide treatment in the ambulance or transport the patient/s to another hospital that has more space. Isn’t this great news? More job opportunities! - Transporting patients to the hospital in an ambulance is one of the biggest and most important jobs of an EMT. - EMTs can do a variety of jobs once employed. Other than helping to transport patients to a hospital, they can help around in National parks, summer camps; recreation centers such as kids play areas and several more venues. - EMTs can become instructors for junior students. They can train and guide them according to their experiences. - There are various options also available online for EMT jobs. You could just browse through and apply for any that suits you. You may find one right in the same area where you live or just in the city next to yours. Larger cities usually have more people and thus many more opportunities. When applying for a job as an Emergency Medical Technician, there a few guidelines that may help you: Firstly, you must be certain that being an EMT is the kind of job that you have been looking for and the kind of job that you have always wanted. Being an EMT requires a lot of dedication. You need to; be ready to be the first to respond to various kinds of emergency 9-1-1 calls such as crimes, murders, car/motorbike accidents, heart attacks, asthma attacks and others. Once you arrive at the scene, your duty is to stabilize the patient’s situation until you can transport them to a hospital. You may need to; provide CPR, control bleeding if it was a major accident or even bandage injuries. You might also need to make further assessments into the patient’s situation, try to figure out what happened and how it happened or check the patient’s history etc. To get a job as an EMT, you must complete an associate’s degree and pass the National EMT certification exam. You also require a license and certification. It is essential to have good communication skills because you need to be in contact with other EMTs and physicians while transporting patients to the hospital. You also need to have perfect knowledge about what exactly an Emergency Medical Technician needs to do; what your duties and responsibilities are, what your employer requires from you and most importantly you need to commit yourself to your job in the sense that you may be called at any hour of the day to save a patient’s life or transport a patient to the hospital. You need to have perfect knowledge of how medical equipment works and what kind of medication is supposed to be prescribed at what time. Wishing you all the best in looking for a job! We hope the guidelines above are helpful for you.
<urn:uuid:2aa42687-1f11-4da8-ae38-549d1684b3e4>
CC-MAIN-2022-33
https://emttraininghelp.com/finding-a-job-as-an-emt-after-you-qualify/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00268.warc.gz
en
0.967681
1,150
2.046875
2
What is an expository essay? This type of essay defines or explains some points in a clear, logical, and concise manner. For instance, you can explain how to complete some action or process, describe some particular situation. Such analysis should be based on a balanced and impartial review. For this purpose, you need to rely exclusively on facts without adding personal opinions and emotions. So, writing an expository essay can be even difficult, sometimes comparing with other types of essays. To make a long story short, for this essay, you need a lot of accurate and reliable information and you need to analyze it thoroughly. Types of expository essays Depending on its purpose, there are several types of expository essays: - A definition essay is designated to explain the meaning of a term, theory, or concept. This can be some concrete or abstract thing. For this type of essay, you may describe the meanings of any particular thing and indicate the associations that usually come to your mind when you mention such a thing. - Classification essay deals with a subject that you expand and divide into separate groups, usually from general to specific. Each category requires examples. - The cause and effect essay shows connections between some things, people, or places. Particularly, you identify what impact one thing has on the other. You also explore the causes of why certain things happen. - Compare and contrast essay deals with the common and different features of some people, things, or places. During your comparison, you focus on similar sides of things. For making your comparison, you emphasize the differences between these things. - The process essay clarifies how any certain thing or process works. To make this essay, you should explain something step-by-step or provide your instructions for a reader. - Problem and solution essay indicate some problematic issues and suggestions for their resolving. For this type of essay, it is extremely important to find the tested solutions only. If they are absent, indicate the most likely workable solutions and state briefly about all existing uncertainties in this regard. Expository and argumentative essays These two types of essays are very much similar. However, they have certain peculiarities: |Write this essay from the third person perspective||Write this essay from the first-person perspective| |Describe any topic impartially||Support any opinion against or for something| |Your thesis statement is related to a topic||Your thesis statement is related to arguments| Taking into account the overall complexity of writing, its proper organization has crucial importance to accomplish it successfully. Making your list of questions can significantly facilitate your work and help to form your roadmap. For your convenience, here are the approximate stages of your writing: Self-preparation Try to imagine that you are going to explain something to your friend in detail. This will help you to accelerate such a writing process and make your essay easy to read. Choosing your topic If you have been assigned a topic, try to become interested in it, find some practical implications for the results of your analysis. At least, you may be interested in the overall writing process. However, if you can choose your topic, then pay special attention to your target audience, additionally to your preferences. Think about any topic that can make your readers interested and bring some value to them. Doing your research For this type of assignment, it is especially important to find only reliable and accurate information about your topic. Make sure you find such reliable sources: official websites of public authorities, books of well-known specialists, articles in reputable journals, etc. Evaluate all information you find critically. Additionally, it will be useful to look for samples of similar essays to facilitate your writing. Outline your future essay To expand your topic properly, and consider all details, make an outline for your essay on a separate paper. Here are some suggestions about things that such an outline should include: - the basic structure of your essay: the introduction, the main body of your essay, and its conclusion; - the main points you want to include along with all supplementary statements; - your arguments, their structure, and places for inclusion in your text; - supporting evidence (schemes, images, statistics, etc.); - the conclusion of your essay with your findings or suggestions. Draw special attention to your thesis statement. You should simply inform your future readers about the point you are going to speak about, without arguing in this regard. During your writing, keep in focus your thesis statement and prepare your text in line with it. For your first draft, simply create your content without interruptions or its revision. At this point, any excessive restrictions and reflections can prevent you from making really good statements. If they are not perfect from your perspective, you can always edit such afterward. Pay special attention to transition words between your paragraphs. Your text should be flowing. Edit your essay If you can afford this, it is always useful to look at your ready-made essay after a couple of days. You will be able to see it from the new perspectives and make adjustments, if necessary. To make your essay more enhanced, you may also check your grammar, spelling, readability by using various online services. You can also form your approximate impression of how future readers will perceive your essay by simply reading it aloud. Finally, you can also give your essay to somebody else to review and amend your essay based on their suggestions. How to structure your expository essay? When you have selected sources and elaborated ideas for your essay, it is time to divide your content into the following parts: It should be informative and concise. Start your essay with a catchy statement to interest your future readers. Try to show some benefits they may receive after reading your essay. Indicate in this part of your essay a thesis statement that you are going to expand further. To make this statement exactly as you need, here are some tips for you: - introduce facts that may be important for your readers; - explain the main idea to your readers; - clarify your goal for writing this essay. At the end of your introduction, place a transition sentence to the subsequent paragraph. It should include approximately 4-5 paragraphs. Devote each one to the relevant key statement. Note that such statements should align with the main thesis statement and expand it further. Add to each key idea enough supporting arguments and examples. Also, explain why all the provided information is valuable for this essay. Such examples may be, for instance: This part of your essay should serve as an overview of your content. You reaffirm in this part the importance of your topic and research, briefly state the main arguments, and present possible solutions for the described issue or process. Make your conclusion very informative and concise, keeping in mind that your future readers will refer again exactly to it in the future. Main writing tips To make your writing more effective, keep in mind the following quick tips: - don’t make your essay argumentative, and you should simply describe any process or thing; - think critically during your research and writing; - rely on the facts only; - during your writing, presume that your readers don’t know anything about your topic; - make sure you indicate all statements in a logical manner; - do your best to remain objective, avoid including your personal thoughts and emotions; - check your possible errors by using various online services. Topics for your practice To gain more writing experience, you can choose one of the following topics to practice: - Approaches for the effective learning of foreign languages - Memorizing new words easily - How to achieve more during the same period of time? - Tips for riding a motorcycle safely - Maintaining your healthy lifestyle - Approaches for crime prevention - How to decrease the adverse influence of social media and modern technologies on interpersonal relations? - Ways for becoming more pragmatic - Dealing with stress in the modern world - How to manage your time and resources effectively? - Ways for decreasing the number of divorces - How to become a vegan without extra stress? - Describing love briefly and plainly. - What makes people successful? - How to see the best investment strategies? - Ways for exploring and realizing your leadership qualities - How to promote your accounts in social networks? - Necessary things to know about developing new skills Things to consider when you choose your writing service There are many services ready to help you with your essay writing. To make a good choice, pay special attention to these things: - readiness to hear your requirements and feedback; - high-quality writing works; - doing all assignments in time; - guarantees of confidentiality; - no plagiarism; - support 24/7; - optimal prices; - guarantees of receiving your money back. The expository essay differs from other types of essays, especially from an argumentative essay, as it is related to the simple description of things or processes. To make your essay expository, don’t include any personal opinions and considerations. Divide all your content into separate paragraphs. Your expository essay should include its introduction, the main body, and its conclusion. Make sure that all your text is related directly to your thesis statement and expands it properly. It is important to write your essay in a logical and clear manner. So, even a non-skilled reader could grasp your explanations easily. Both your introduction and conclusion should be informative and catchy. In these parts of your essay, future readers will remember most of all. We will be glad to offer you all these services and options. Just feel free to contact us, and we will be glad to help with your assignment.
<urn:uuid:1028f34a-1610-4305-8d22-a654cb4051d9>
CC-MAIN-2022-33
https://mypaperswriting.com/blog/expository-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00267.warc.gz
en
0.930595
2,087
3.828125
4
This course is designed for people who are currently using Outlook at a basic level, or are new to Outlook. We start from the beginning and look at these topics: sending and receiving messages, message options, creating folders, screen customization etc - Course Outline If you’re struggling with your in-box, this is the course for you. You’ll start with a thorough discussion of Outlook’s e-mail utilities, not only covering the things you don’t know but teaching you the tips and tricks that let you do what you know faster than before. We also focus on in-box organization routines. Then you’ll learn how to use the Calendar, Tasks, and Notes utilities to keep your day-to-day activities organized. Finally we’ll teach you how to use the Contact utility to keep track of everything you know about the people you work with, both inside the company and out.Detailed List of Topics Reading Pane, New Button, Title Bar The Navigation Pane, Shortcuts The Folder List Personal, Public, Favorites Folders Creating a New Folder Moving/Rename/Delete a Folder Deleted Items, Drafts Out Of Office Assistant E-mail - Sending E-mail – Receiving Forwarding/Replying to Others Introduction to the Calendar Entering an Appointment Rescheduling/Deleting an Entry Introduction to Contacts Entering and Editing Contacts Create a Contact from an E-mail Message Create Another Contact for the Same Company Flagging for Follow Up Choosing Contacts when Sending a Message Creating and Entering a New Task Marking Tasks as Completed Assign a Task Creating New Notes Locating items in Mail, Calendar, Contacts, etc Instant Search (2007) - Prerequisites & Certificates Participants should already be familiar with basic Windows use. Certificate of completion - Cancellation Policy A full 5 business days notice is required to change or cancel any course date. Once payment has been received, a credit will be held in your account if we have received sufficient notice of your cancellation or date change (we do not provide refunds). If insufficient notice is received, the entire fee or Tickets for that course date will be charged. There is no charge for substitutions. If you cannot attend your course and cannot provide the 3 business days notice, you can send someone else in your place with no penalty. If you cannot provide 5 business days notice of cancellation, you may take the course at a later date at no further charge with the following conditions. 1. You must take the course within 6 months of the original course date (no exceptions). After that time, the full course fee will be charged again. 2. Registration is on a stand-by basis only. If the course date you select becomes fully booked you will be asked to choose another date, which must be within 6 months of the original course date. 3. If you need to change or cancel your free re-take course, we must receive a full 5 business days notice of the change. If insufficient notice is received, this offer no longer applies and the full course fee will be charged again, should you choose to book another date. 4. This course is not transferable to another person. It must be taken by the same person who was scheduled for the original course. 5. This offer applies to the same course only (same software program, same course level and the same software version as was originally booked). - Map & Reviews Excel Training Toronto [ View Provider's Profile ] ReviewsHere are some reviews of the training vendor. This course has not yet been rated by one of our members. If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities. This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team. This page has been viewed 1950 times.
<urn:uuid:c38ef8fc-87fe-4284-8d89-e931442347fc>
CC-MAIN-2016-44
http://www.lastminutetraining.ca/course/3282/Outlook-2007-2010-Introduction
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00395-ip-10-171-6-4.ec2.internal.warc.gz
en
0.909196
873
1.554688
2
In Russian culture, there are a large number of folk signs and predictions. Every one of us knows the signs associated with money. To trust omens or not is a personal matter for each of us. Even those who do not particularly believe in omens still try again not to cross the road after a black cat. The omen does not work until you know about it. You need to know some of the signs that can help to improve relationships with banknotes. Money loves an account – everyone should know how much cash they have, but don’t count money overnight. You should not touch the money in the piggy bank, otherwise, it will stop accumulating. Look in your wallet, there should be no dented bills. Arrange the bills according to their denominations. Treat money with respect, keep money only in your wallet. Fold them so that they lie in the same picture in one direction, lay them evenly. Do not put dollars and rubles together, put them in different pockets. Take money from the wallet with your left hand only, and give it only with your right hand. Monetary signs associated with the moon Do not waste time if you saw a young growing moon in the sky; show the moon your wallet and your income will grow as the moon grows. You can squeeze a coin in your hand and look at the moon to make a wish. These rituals will provide you with cash income throughout the lunar month. If you saw a young month on the right side, your financial well-being will grow throughout the month, and if on the left side, there will be only expenses. It is necessary to borrow money when the moon is young in the sky and give it only when the moon is waning. Repay your debt only in small bills. Monetary signs and men. So that things go well in your endeavours, let a stranger into the room first. And clink glasses with a stranger’s man should be the last thing – so that money is always found. For a successful trade, you need to sell the first thing only to a man. Monetary signs and time of day, day of the week. Don’t lend money on Sunday – they won’t return it. On Monday, too, do not lend and do not make payments – the money will not be returned. Don’t borrow on Tuesday – you’ll owe it all your life. Do not borrow or give money in the evening – they will cease to be found. But it is necessary to repay debts in the morning, then the money will be found. Monetary signs or how to attract money: everyday signs. To always remember money: Do not put a hat on the table. Do not leave keys on the table. Do not put gloves on the table. Sitting on the table – you will be poor. Leaving an empty bottle on the table means a lack of money. Place the broom with a broom towards the top. So that money does not run away from the house like water, have only serviceable plumbing in the house so that there are no leaks. Scatter trifles in the corners of the houses with the words: “Let it come to my house!” Place a heel in the corners of each room. You can’t take revenge in the house with different brooms. Plant a money tree (fat woman) at home, take care of it. This tree will improve your material well-being. You can put a few bills under the tablecloth to keep the money flowing. Don’t clean your home after sunset. Don’t sweep in the evening – sweep all your money, don’t wash the floor in the evening – wash your well-being. Wipe off the table only with a napkin or sponge, not by hand. Don’t take the trash out of your house in the evening. Don’t throw anything out of the window – wealth can be thrown away. If you find the money. You can not lift a trifle, especially at an intersection – you will lose health. You cannot raise money on an empty stomach in the morning. In Japan, they believe that fate can take something more valuable than the find itself for a find. Therefore, the money found must be spent on good deeds. Money signs or how to attract money: Other money signs. Hair cannot be cut by yourself, not even ends or bangs. If the left palm is combed, this is for money and the right one for waste.
<urn:uuid:0f918118-5e4a-4f30-89db-17df85a6fcdd>
CC-MAIN-2022-33
https://dhakarkotha.com/monetary-signs-or-how-to-consciously-attract-money/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00069.warc.gz
en
0.932165
948
1.882813
2
Read Adam Turner’s article, “Netflix slugs Aussies With Price Rise and GST Tax Hike”, published in Sydney Morning Herald 28 June 2017. The article asks you to answer three questions using economic models, if needed. Explain and illustrate, using a demand-and-supply model, why Australians will be required to “pay upto 20% more” for online streaming. You can analyse the price elasticity of demand determinants to determine if the demand for streaming in Australia will be price elastic. Use an appropriate economic model as a basis for your conclusion. This article discusses the new 10% GST on Netflix services, which has resulted in a rise of the cost of Netflix plans. Netflix has increased the cost of its plans to help with new content. Netflix has seen an increase in prices due to both the GST tax hike and Netflix’s own price rise. The price of the basic plan goes up from $1 to $9.99 per monthly, while Ultra HD plans for four users go up $3 to $17.99 The demand-supply relationship can help us understand the price rise. The tax adds costs to the firm so that the supply declines. This is seen as an upward shift in supply curve S1 to S2. We begin with equilibrium at E1 when demand equals stock- at this point, D1 intersects the S1. A tax is levied to create a new equilibrium at E2, where S2 intersects with D1. This results in a price increase fromP1 towards P2, and a decrease in quantity from Q1 through Q2. This tax is not the only reason Netflix has increased its price. “The introductions of new content, and features by Netflix makes it justifiable to raise the price of Australia’s digital taxes.” The movement of the supply curve can show this higher price. Netflix moves from E1 – B. the article doesn’t explain how B and E2 connect. Both of these events cause prices to rise, but it’s not possible to say how much is tax-related and how much Netflix contributed. There are many variables that influence price elasticity and demand. The number of alternatives to the good increases elasticity. Elasticity can be affected by the quality of the product – luxury goods are elastic, while necessities goods are inelastic. Here, time is a factor. Consumers have the ability to adjust to changes over time, which makes elasticity more flexible. These factors indicate that Netflix has inelastic demand. This is due to Netflix’s own price increases, plus the tax increase. The timing of its price rise does not indicate that it is worried about falling consumer demand. It is reasonable confident in negotiating the price hike with consumers. Netflix can also avoid transparently revealing what portion of the tax has been pushed towards the consumer – the timing of price increases is chosen to increase tax burden. If we assume that demand is elastic, it is likely that Netflix will raise prices to increase its revenue. This is because, in economic theory, when demand is low, a rise in prices causes revenues to increase. Change in TR/change of price = dTR/dP = D(PQ)/dP =Q + P(dQ/dP). = Q +Q*(PdQ/dP*Q). Q( 1- lEl), where E is the absolute demand elasticity value E. E = 1 (inelastic demand) means that a price rise will also cause an increase in Netflix revenues. Each party is responsible for the tax’s incidence. This sharing is affected by the supply and demand elasticity. The economic agent with lower price elasticity will have a greater share of the tax burden. If the price elasticity of demand is greater than the price elasticity, then the seller will have to bear more than the buyer. If the price elasticity of supply is greater than the price elasticity of demand, then the burden of tax will fall on the consumer. In the diagram, the tax = P3 + P1 Consumer burden/incidence =P2-P1. Netflix Incidence/Burden = P3 – P2 Netflix’s elastic demand can lead to consumers bearing a higher tax burden than Netflix. Also, we can show that Netflix has a more elastic demand. Below is a blue demand line which is elastic-flatter than DD. The price rise is much lower as illustrated by the blue vertical lines. This blue line represents the consumer incidence. It’s much lower than the red (with elastic demand like Netflix). Netflix has an inelastic market, so we will only be focusing on the red line. Consumer welfare suffers from price increases. As a red shaded region, the loss of consumer surplus can be seen. The seller/producer gains if the price is higher. However, quantity can also be a benefit. Both are represented in shaded areas of different colours. The total difference in surplus and deficit is shown in green. When a tax becomes a tax, society suffers from a loss of efficiency. Shifts of demand and supply Deadweightloss and taxation. Principles of Economics. Mankiw N.G. In markets, welfare. Relationship between price elasticity and total revenue. Sexton R.L., n.d. Welfare and Marker Efficiency. In Exploring Economics.
<urn:uuid:bd470af3-c4e3-4521-a86f-e74502b4c091>
CC-MAIN-2022-33
https://essayprince.com/econ1008-principles-of-economics/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00276.warc.gz
en
0.920732
1,203
2.484375
2
In the United States, July 26 is recognized annually as National Disability Independence Day, commemorating the signing of the Americans with Disabilities Act (ADA) into law in 1990. The landmark legislation has served as a de facto bill of rights for Americans with disabilities by assuring their access to economic and civic opportunities. Its passage represented an unprecedented bipartisan effort to acknowledge the centuries of discrimination suffered by the disability community, and a fundamental change to how they live their lives. The story of the ADA remains a significant chapter in U.S. history and the ongoing struggle for disability rights. On the 32nd anniversary of this important civil rights law’s passage, let’s take a closer look at its origins and how it has changed the lives of so many for the better. The Start of The American Disability Movement The American disability movement began in earnest in the 1960s with grassroots efforts to resist the centuries-old notion that its members were defective and lacking and needed to be segregated from civic life. Inspired by the manifestos of the broader civil rights struggles of the time, the movement rejected these cruel and paternalistic attitudes and advocated instead for full access to opportunities in employment, education, and public life. Gradually, efforts to enact legislative and policy changes to better support the needs of people with disabilities were rewarded. A significant shift in public policy occurred with the passage of Section 504 of the Rehabilitation Act of 1973, which prohibited recipients of federal funds from discriminating against people with disabilities. In addition, Section 508 of the Act, later updated in 1998, included standards advising that federal information distributed electronically also be accessible to those with disabilities. This important section was updated again in 2017 to clarify and expand its coverage regarding digital accessibility, among other improvements. The Americans With Disabilities Act The ADA, first introduced in 1988, was designed to build on the progress of the Rehabilitation Act. The goal was to expand the rights of the disability community in a single law by ensuring their freedom from employment discrimination and access to all levels of government, public establishments, transportation, and communication. Congress passed the bill in 1990 with strong majorities in both legislative bodies: 327-28 in the U.S. House of Representatives and a 91-6 vote in the U.S. Senate. And, in a moving ceremony on the South Lawn of the White House, on July 26, President George H.W. Bush signed it into law to resounding applause from more than 3,000 people in attendance—many with disabilities, disability rights activists, and advocates. “Three weeks ago, we celebrated our nation’s Independence Day, and today we’re here to rejoice in and celebrate another Independence Day, one that is long overdue,” he declared. “And with today’s signing of the landmark Americans with Disabilities Act, every man, woman, and child with a disability can now pass through once-closed doors into a bright, new era of equality, independence, and freedom.” Justin Dart, vice chair of independent federal agency the National Council on Disability (NCD), who attended the ceremony, wrote at the time: “It is the world’s first declaration of equality for people with disabilities.” Challenges to the new law followed, with U.S. Supreme Court cases severely limiting the definition of “disability.” In Sutton v. United Airlines, the court ruled in favor of United Airlines, which refused to recognize twin sisters Karen Sutton and Kimberly Hinton’s visual myopia as a disability. Despite the fact that their conditions were fully correctable, the airline denied them employment. In Chevron USA, Inc. v. Echazabal, oil refinery worker Mario Echazabal’s claim that Chevron wouldn’t recognize his liver condition as a disability was denied, thus upholding his termination from work with the company. Later, Congress bolstered protections when it passed the ADA Amendments Act of 2008 (ADAAA). This expanded the definition of “disability”—effectively nullifying the controversial decisions by the highest court—and enabling many more individuals to qualify for protection under the ADA. Additional regulations issued by the U.S. Access Board in 2017 further expanded the Section 508 Standards to include access to current-generation electronic and digital assets. Impact on the Disability Community The ADA has had a tremendous impact on the disability community. Peter Berg, project coordinator of technical assistance at the Great Lakes ADA Center, tells InclusionHub it “has brought about large-scale integration of people with disabilities across society. This, in itself, has been transformative for many.” Here are just a few improvements he references: - The addition of structural enhancements, such as elevators, ramps, U-shaped door handles, and lever-operated and door-push mechanisms have made the difference in being able to commute, work, attend school, stores, entertainment, and civic venues of all kinds. - Access to information throughout public life has expanded due to the widespread use of sign-language interpreters. - The ability for students of all ages to attend or remain in school has increased with access to large-print books, ZoomText, and orated exams. - Access to entertainment and educational performances has improved, thanks to earphones and audio description devices. Still, while the ADA’s prohibitions on employment discrimination have codified protections for millions, an overall increase in the employment of disabled people has yet to be achieved. According to the NCD’s “2020 Progress Report on National Disability Policy: Increasing Disability Employment,” nearly two-thirds of the 22 million working-age Americans with disabilities have been left out of the labor market. And those that are actively looking for work experience an unemployment rate twice that of workers without disabilities. Most agree, however, that the underlying causes of underemployment in the disability community are varied, complex, and extend well beyond the limits of the ADA. For instance, stereotypes that people with disabilities don’t belong in the workplace or are incapable of contributing still linger. “‘It's like, ‘Oh, someone who is blind, well, they're not going to be able to do anything, there's no way,’” says Crystal Preston-Watson, a Senior Disability Analyst at Salesforce who wears an eye patch. “There's the perception that if you're blind, you can't be a developer. I know quite a few blind developers who are better than I could ever be.” People with disabilities routinely brush up against the belief widespread in the professional world that “they’re not working alongside non-disabled peers in large organizations,” says Jessica Roth, a work manager in Salesforce’s Office of Accessibility. So while the ADA has been transformational, many barriers and forms of discrimination endure. Where Do We Go From Here? The ADA remains a touchstone in the struggle for equal status for disabled Americans. It is the law of the land, but like many other legislative actions, one could argue it remains aspirational in its full implementation. There is still much work to be done, and areas of particular focus recommended by the NCD, especially related to underemployment, include: - Increasing relevant skills for disabled youth transitioning to the workforce. - Improving work disincentives present in Social Security and Medicaid benefits that make it difficult for people with disabilities to afford healthcare or get the care they need to live. - Improving employer incentives in both the public and private sectors. “Going forward, [I'd] like to see the disabled community represented in leadership—both in government and in the private sector—and at all levels,” says Berg from the Great Lakes ADA Center. “People with disabilities make up the largest minority group in the country. Their perspective needs to be included in the broader conversation.” We have a long way to go in realizing a professional world that fully embraces accessibility, inclusion, and belonging. Still, there is reason for optimism. More recent changes to the work environment, such as increased remote employment, flexible scheduling, and reliance on computing have proven that the work-from-home model works. For disabled people who are housebound or without work transport, this has been a watershed moment. There’s been a proliferation in more inclusive hiring practices such as asking for a job candidate’s accommodations, organizations communicating their commitment to accessibility and inclusion in job descriptions, and ensuring people with disabilities are reflected in leadership and marketing collateral. Significant strides are also being made in the sphere of digital inclusion and accessibility to ensure compliance with ADA regulations and avert potentially costly lawsuits from disabled users. In addition to the business case for accessibility and inclusion, more and more organizations are realizing the moral imperative they have to improve digital experiences for people with mental health disabilities, speech difficulties, learning disabilities, physical disabilities, language disorders, blindness or low vision, and for those who are d/Deaf or hard of hearing. Such improvements make online access and functionality increasingly available to the disability community. Among these: - International standards organization the World Wide Web Consortium (W3C) originally introduced its Web Content Accessibility Guidelines (WCAG) in 1999 to improve the online experience for a range of disabilities including hearing, sight, movement, and cognitive ability—and has been updating these and striving for greater diversity and inclusion in technology and website design ever since. - Google announced in 2020 that user experience will impact website search rankings—adding yet even more incentive for companies and organizations to ensure their sites include more accessible features, content, and designs. - More and more groups within the public and private sectors are sharing online resources to help improve the digital accessibility and skills development of disabled individuals. The ADA National Network—comprising 10 regional centers funded by the federal National Institute on Disability—is just one. To learn more about efforts to expand accessibility and digital inclusion, check out online resource directory and community InclusionHub, and happy National Disability Independence Day!
<urn:uuid:fcbb8ea8-e704-4660-b742-bd06b2982a57>
CC-MAIN-2022-33
https://www.inclusionhub.com/articles/national-disability-independence-day
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00471.warc.gz
en
0.952339
2,084
3.734375
4
In an effort to enhance Indo-US economic relationship, a top American official is set to pay a six-day visit to India to highlight his country's support for broader regional economic cooperation and also to discuss environmental and conservation issues. Under Secretary of State for Economic Growth, Energy and the Environment Robert Hormats will travel to India from January 26 to 31, an official announcement said on Thursday. He will officially kick off his visit from Agra on January 28 by delivering remarks on ‘The New Emerging Global Economic Order: Role of Developed Nations’ at the Confederation of Indian Industry's Partnership Summit 2013. Hormats' visit to India will highlight US efforts to expand and enhance the US-India economic relationship, In New Delhi, Hormats will meet Foreign Secretary Ranjan Mathai and other senior Indian officials. He is also scheduled to take part in a round-table discussion with Indian and international environmental non-government organisations and non-profit groups on wildlife trafficking issues on January 29. Hormats will also deliver remarks in support of India's efforts to expand economic ties with South and Southeast Asia at an event at the Federation of Indian Chambers of Commerce and Industry and co-hosted by the US-India Business Council on January 30. On January 31, Hormats will deliver a speech on sustainable water, energy and food security policy at the Delhi Sustainable Development Summit.
<urn:uuid:a9fb4824-11ab-4bd2-9f04-11652cfe548e>
CC-MAIN-2017-04
http://www.rediff.com/business/report/us-official-visits-india-to-boost-economic-ties/20130125.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00221-ip-10-171-10-70.ec2.internal.warc.gz
en
0.942904
286
1.554688
2
Background Recent studies suggest a large proportion of musculoskeletal injuries are simple stable injuries (SSIs). The aim of this study was to evaluate whether direct discharge (DD) from the emergency department (ED) of SSIs is non-inferior to ‘traditional care’ regarding treatment satisfaction and functional outcome, and to compare other patient-reported outcomes (PROMs), patient-reported experiences (PREMs), resource utilization, and adverse outcomes before and after DD. Methods This trial compared outcomes for 11 SSIs 6 months before and after the implementation of DD protocols. Pre-DD, patients were treated according to local protocols. Post-DD, patients were discharged directly using removable orthoses, discharge leaflets, smartphone application, and telephone helpline. Participants received a 3-month postinjury PROM/PREM survey to assess treatment satisfaction (Visual Analog Scale, VAS), pain (VAS), functional outcome (four validated questionnaires), and health-related quality of life (HR-QoL; EuroQol-5D). Resource utilization included general practitioner (GP) visit (yes/no), physiotherapist visit (yes/no), return to work/school/sports (days), work/school absenteeism to visit hospital (yes/no), number of hospital visits, and follow-up X-rays. Other outcomes included missed injuries (additionally to SSI) and adverse outcomes (delayed union, non-union). Between-group differences were assessed using propensity score-adjusted regression analyses. Non-inferiority was assessed for satisfaction and functional outcome using predefined margins. Results 348 (pre-DD) and 371 (post-DD) patients participated; 144 (41.4%) and 153 (41.2%) patients completed the survey. Satisfaction and functional outcome post-DD were non-inferior to traditional care. Mean satisfaction was 8.13 pre-DD and 7.95 post-DD (mean difference: −0.16, p=0.408). Pain, HR-QoL, GP/physiotherapist visits, and return to work/school/sports were comparable before and after DD. Work absenteeism was higher pre-DD (OR 0.110, p<0.001), as well as school absenteeism (OR 0.084, p<0.001). Post-DD, the mean number of hospital visits and X-rays reduced: −1.68 (p<0.001) and −0.26 (p<0.001). Missed injuries occurred once pre-DD versus twice post-DD. There were no adverse outcomes. Discussion The results of this study confirm several SSIs can be discharged directly from the ED without compromising patient outcome/experience. Future injury-specific trials are needed to conclusively assess non-inferiority of DD. Level of evidence II. - patient outcome assessment - patient satisfaction This is an open access article distributed in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited, appropriate credit is given, any changes made indicated, and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/. Statistics from Altmetric.com If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways. In the Netherlands, 656 000 of 2 million annual emergency department (ED) visits concern injuries, 40% of which are fractures.1 Traditionally, patients with fractures are reviewed in a fracture clinic approximately 1 week after their initial assessment in the ED. Consequently, fracture clinics are often characterized by referrals of large numbers of unselected patients with minor injuries that do not (necessarily) require intervention.2 This frequently leads to recurrent unnecessary reviews and a high workload, which inevitably have consequences for patient experience, staff morale, training, and quality of care. Therefore, recently, a Virtual Fracture Clinic (VFC) model was introduced in several hospitals in the UK to optimize and streamline outpatient trauma care.2–6 The VFC model consists of two main components.2 4 The first component is direct discharge (DD) from the ED of patients with simple stable injuries (SSIs). DD is based on the idea that most patients with SSI require reassurance and information, but not routine review, as it is highly likely their injuries have excellent outcome with early mobilization.4 The second component is a ‘virtual’ review of all other ED patients with musculoskeletal injuries (ie, not discharged directly).2–6 During this consultant-led VFC review, patients are triaged to an appropriate patient-centered pathway, aiming to reduce unnecessary and untimely follow-up appointments. Typically, DD of SSIs is implemented prior to the implementation of a VFC review.7 DD has been studied for several SSIs within the United Kingdom (UK), including, among others, Mason type 1 radial head fractures,8 9 fifth metacarpal neck fractures,8 10 11 base of fifth metatarsal fractures,8 12 13 buckle-type fractures of the distal radius, and pediatric clavicle fractures.14–18 These studies indicate that DD reduces follow-up appointments, imaging, no-shows, and costs without compromising outcome and experience. To our knowledge, however, no studies have been performed outside the UK, whereas it is important to externally validate and evaluate effects in other settings, such as a different country. The aim of this study was to evaluate whether DD of SSIs in a large urban district teaching hospital in the Netherlands was non-inferior to traditional care in terms of satisfaction with treatment and functional outcome, as well as to compare other patient-reported outcomes (PROMs), patient-reported experiences (PREMs), adverse outcomes, and resource utilization before and after the implementation of DD. This was a prospective, non-inferiority before-and-after study performed in the OLVG West Hospital, a level 2 trauma center in Amsterdam, the Netherlands, between November 15, 2019 and November 15, 2020, comparing DD versus ‘traditional’ fracture care. DD protocols were implemented at the midpoint of this study (May 20, 2019), dividing patients into a pre-DD cohort and a DD cohort.19 Direct discharge of simple stable injuries Prior to the start of this study (October 2018), consensus was reached by our team of (orthopedic) trauma surgeons regarding the eligibility of injuries for DD and their corresponding treatment (table 1). For most injuries this was based on previous studies.2–6 8–17 20–22 Isolated ‘greenstick-type’ distal radius fracture, avulsion fracture of the ankle, and bicycle spoke injury were deemed eligible for DD based on expert opinion. Before implementation of DD (pre-DD cohort), all patients with SSIs were treated in the ED according to local protocols. This often involved casting or splinting in the ED and at least one follow-up appointment in the fracture clinic after approximately 1 week. After implementation of DD (DD cohort), all patients with SSIs were treated in the ED using removable immobilization such as a bandage or brace (table 1). In the ED, physicians provided extensive verbal instructions and information relating to the injury and the expected recovery. This information was also summarized in a discharge leaflet. A smartphone application was available for iOS and Android containing digital versions of the discharge leaflets, videos of physical exercises to improve recovery, and videos explaining how to reapply immobilization after removal. A telephone helpline was available during mornings of weekdays in the event of questions and concerns or if the patient requested a review. Eligibility for DD was reassessed the next morning by a (orthopedic) trauma surgeon and radiologist during a routine daily review of cases and X-rays of all ED patients. This daily assessment was already part of our treatment process prior to the implementation of DD and acts as safety netting to identify missed injuries or patients treated incorrectly. In case patients were discharged directly incorrectly (ie, the injury was not an SSI), further face-to-face follow-up was scheduled by telephone. In case a patient with an SSI was not discharged directly, the patient was treated according to previous standards. Recruitment and consent During the study period all consecutive patients who presented to our ED with an isolated SSI were asked to participate. Patients were included only after obtaining written informed consent. Exclusion criteria were inability to understand/complete a Dutch survey, initial treatment in the ED of a different hospital, multiple injuries, reason for follow-up other than the SSI (eg, social care reasons), eye/motor/verbal score <15 at presentation, high-energy trauma, treatment continued in different hospital (eg, closer to home), and alcohol/drug intoxication. The primary outcomes of interest were satisfaction with treatment and functional outcome. For these outcomes, non-inferiority of DD versus traditional care was assessed using predefined non-inferiority margins (minimal clinically important difference, MCID; table 2).23–26 All outcomes were categorized into ‘PROMs and PREMs’, ‘Resource utilization’, and ‘Safety and use of DD protocols’ (figure 1). PROMs and PREMs All PROMs and PREMs were assessed using a 3-month postinjury survey, administered either online through Castor Electronic Data Capture27 or by postal mail. In case of non-response, two reminders were sent, followed by one telephone reminder. Satisfaction with treatment was assessed using Visual Analog Scale (VAS), ranging from 0 (very dissatisfied) to 100 (very satisfied), and using a 5-point Likert scale. Pain was assessed on a VAS from 0 (no pain) to 100 (extremely painful). The VAS satisfaction and VAS pain scores were converted from a scale of 0 to 100, to a scale of 0 to 10. The 5-point Likert satisfaction scale was dichotomized into ‘dissatisfied’ (‘very dissatisfied’, ‘dissatisfied’) and ‘not-dissatisfied’. Functional outcome was assessed using four different validated questionnaires: Shortened Version of the Disabilities of the Arm, Shoulder and Hand (QuickDASH),28 Lower Extremity Functional Scale,29 Short Form of the Patient-Reported Outcomes Measurement Information System (PROMIS) Upper Extremity, and Short Form of the PROMIS Mobility.30 The specific type of functional outcome questionnaire per patient was based on the region of injury and age (table 2). These separate functional status scores were also converted to one 0 to 100 scale to allow analysis of this outcome for the whole study population. Health-related quality of life (HR-QoL) was assessed using the EuroQol-5D (EQ-5D) questionnaire and the EQ-VAS.31 Proxy versions of the questionnaires were used for children aged 4 to 7, and children aged 8 to 17 received either a self-complete version or a proxy version based on their preference. More detailed information about the administered questionnaires, outcome ranges, and non-inferiority margins can be found in table 2. Treatment preference was assessed by providing a text explaining the principles of traditional care versus DD and asking which treatment the patient would prefer. The 3-month postinjury survey was also used to assess the number of times patients visited their general practitioner (GP) and physiotherapist for the treatment of their injury (during the previous 3 months), and if applicable the number of days after which they returned to work (return-to-work), school (return-to-school), and sports (return-to-sports), as well as work and school absenteeism (ie, the number of missed workdays or schooldays to attend follow-up appointments). All these outcomes were dichotomized into ‘yes’ and ‘no’. Participants’ electronic patient records (EPRs) were accessed by THG during the second and third week of January 2021, that is, the follow-up for these data differed per patient, ranging from 14 months for patients included in November 2019 to 26 months for patients included in November 2018. Data were extracted on patients’ healthcare utilization, including total number of hospital visits (categorized into ‘with physician’ or ‘with plaster technician for cast/brace issues’) and imaging (number of X-rays, CT scans, MRI scans). Safety and use of DD protocols The EPR evaluation was also used to assess if adverse outcomes of treatment of the SSI had occurred, including delayed union and non-union, and if this was the case: treatment outcome and whether secondary surgery was performed (yes/no). Furthermore, it was assessed whether any missed injuries were identified during follow-up (ie, in addition to the SSI). During the first 6 months after which DD protocols were implemented (ie, May 20, 2019–November 15, 2019), a researcher (either THG or SA) was present during the daily review of all ED X-rays to assess protocol compliance, which was defined as the proportion of patients with an SSI who were actually discharged directly. Incorrect use of DD protocols was assessed as well, defined as the number of patients who were discharged directly by the ED but recalled based on the daily X-ray review. Additionally, the total number of telephone helpline contacts was recorded during this period using a simple paper registration sheet. Using EPRs and the aforementioned survey, various baseline characteristics were assessed, including age (years), gender, type of SSI (see table 1), and employment status (work/school/none). Statistical analysis was performed using SPSS V.27.0 and STATA V.16.32 33 Analyses were performed for two groups separately. That is, healthcare utilization, missed injuries, and adverse outcomes were assessed for all patients who provided informed consent to access their EPR; survey outcome measures were analyzed only for patients who completed the survey. Baseline characteristics were reported using descriptive statistics for both groups separately, using mean with SD or median with IQR as appropriate. Differences between pre-DD cohort and DD cohort were assessed using regression models, adjusted for patients’ propensity scores to deal with the non-randomized nature of this study. A propensity score indicates the probability of a patient being assigned to an intervention group, given a set of baseline characteristics.34 In our study, the propensity score was estimated using cohort (pre-DD cohort/DD cohort), age, gender, and injury type, using the pscore package in STATA. For continuous data, linear regression was performed using patients’ cohort and propensity score as independent variables and outcome as dependent variable, resulting in a mean-adjusted between-group difference, corresponding 95% CI, and p value. In case of non-normally distributed continuous data, bias corrected and accelerated bootstrapping was performed using 5000 replications to estimate uncertainty. For dichotomous or categorical data, binary logistic regression was performed in a similar manner. For DD to be considered non-inferior to ‘traditional’ care in terms of satisfaction and functional outcome, the predefined non-inferiority margins (table 2) should not be included in the corresponding 95% CIs. For all other comparisons, a p value of <0.05 was considered statistically significant. Patient and public involvement Patients were not involved in the design, intervention, research question, or outcome measures of the current study. Before implementation of DD, 676 patients presented to our ED with an SSI and were treated according to local protocols (pre-DD cohort). After implementation of DD, 784 patients were discharged directly from our ED with an SSI (DD cohort). Of these patients, 348 and 371 agreed to participate in the pre-DD cohort and DD cohort, respectively (figure 2). The 3-month postinjury survey was completed by 144 and 153 patients in the pre-DD cohort and DD cohort, respectively (response rates 41.4% and 41.2%). Table 3 provides the patients’ baseline characteristics. PROMs and PREMs The predefined non-inferiority margins (see table 2) for satisfaction and functional outcome were not included in the 95% CIs surrounding the point estimates of these outcomes and hence non-inferiority was met. To illustrate, the predefined non-inferiority margin for satisfaction (−0.70) was not included in the 95% CI, which ranges from −0.53 to 0.21. The mean satisfaction with treatment on a VAS was 8.13 in the pre-DD cohort and 7.95 in the DD cohort (figure 3). Pre-DD, 5 patients (3.5%) were dissatisfied with treatment on the 5-point Likert scale versus 11 patients post-DD (7.2%; OR 2.05, p=0.197). There were no statistically significant differences in VAS pain scores (mean score 1.4 vs. 1.5, mean difference 0.078, p=0.727) or EQ-5D index and VAS scores. In the DD cohort, 81.7% of patients indicated to prefer DD over ‘traditional’ care versus 39.6% pre-DD. The mean differences in the functional outcome scores as well as all other PROMs/PREMs can be found in table 4. Return-to-sports, return-to-work and return-to-school were comparable before and after DD, as well as the proportion of patients who visited their GP or physiotherapist for treatment of their injury (table 5). Of the patients going to school, 57.6% missed one or more schooldays to attend a follow-up appointment in the pre-DD cohort versus 11.4% in the DD cohort (OR 0.084, 95% CI 0.023 to 0.253, p<0.001). Of the patients going to work, 44.8% missed one or more workdays to attend a follow-up appointment in the pre-DD cohort versus 8.2% in the DD cohort (OR 0.110, 95% CI 0.041 to 0.295, p<0.001). The mean number of hospital visits was 1.80 in the pre-DD cohort versus 0.14 in the DD cohort (mean difference −1.68, p<0.001). This included a mean reduction of 0.13 in plaster technician visits, for example, due to issues with a cast/brace/sling (p<0.001). The mean number of X-rays during follow-up was 0.30 in the pre-DD cohort versus 0.05 in the DD cohort (mean difference −0.26, p<0.001). A CT scan was performed once in the DD cohort to assess if there were any missed injuries in a patient with a fifth metatarsal fracture. No MRI scans were performed. There were 9 no-shows in the pre-DD cohort (2.6%) versus 0 in the DD cohort. Safety and use of DD protocols Delayed unions/non-unions and secondary surgeries of SSIs did not occur based on the EPR evaluation of all 719 participants. However, a ‘missed injury’ (in addition to the SSI) was diagnosed during follow-up in three cases: one in the pre-DD cohort and two in the DD cohort. In the pre-DD cohort, a patient with an avulsion-type fracture of the medial malleolus and navicular bone had further imaging 8 weeks after the ED visit (during regular follow-up). This revealed a proximal fracture of the fibula (ie, Weber C-type ankle fracture), which was treated surgically. In the DD cohort, one patient contacted the telephone helpline 1 week after a Weber A fracture due to persisting high levels of pain and was scheduled for review the next morning. Despite our daily X-ray review, radiographic imaging revealed a Weber B-type ankle fracture supination-external rotation stage 4. This was treated surgically. The other patient in the DD cohort was treated with an ankle brace after a Weber A fracture and contacted the telephone helpline twice, complaining of pain after starting weight-bearing. Further imaging revealed an additional fifth metatarsal base fracture that was treated conservatively by switching immobilization from an ankle brace to a walker boot. During the 6 months after implementation of DD, there were 813 patients in our ED with an SSI, 784 of whom were discharged directly (protocol compliance 94.6%). During the same period, the telephone helpline was contacted 84 times. Furthermore, an additional 15 patients were initially discharged directly by the ED, but were recalled based on the daily screening of all X-rays by a (orthopedic) trauma surgeon and radiologist. This included 12 children treated as per adult DD protocols, 1 patient with a dislocated zone 2 fifth metatarsal fracture that exceeded our limit of 4 mm, and 2 patients with a zone 3 fifth metatarsal fracture. This first study on DD from the ED of patients with SSIs performed outside the UK shows that, in terms of satisfaction with treatment and functional outcome, DD is non-inferior to ‘traditional’ care with routine follow-up. Other patient outcomes including pain and HR-QoL, return-to-sports, return-to-work, and return-to-school all were comparable before and after DD. Furthermore, there were no adverse outcomes before and after implementation of DD. Hence, our findings support the idea that the SSIs included in this study can be discharged directly from the ED safely, that is, without compromising patient outcome and experience. In previous studies on DD assessing satisfaction, it was often unclear whether this was related to the injury treatment or the DD/VFC process.35 In our study, patients were asked specifically to rate satisfaction with our treatment of their injury. We were of the opinion that this is a key parameter: that is, patients should retain comparable satisfaction levels with our services, in addition to a comparable functional outcome and regardless of the reduction of healthcare utilization. The methods used to assess satisfaction in previous studies ranged from using either Likert scales,5 11 14 22 simple yes/no questions,8 to 1 to 10 VAS.10 15 All have advantages and disadvantages. For instance, the chances of acquiescence bias and ceiling effects are smaller using VAS,36 37 and children might prefer Likert scales.38 In the current study parents/caregivers were allowed to (help their child to) complete the survey. For these reasons, we used VAS as well as Likert scales to assess (dis)satisfaction. Both before and after DD, satisfaction with treatment was high, as is shown by the high mean satisfaction rate (VAS) as well as the low rate of dissatisfied patients (Likert). Moreover, a large proportion of patients who were discharged directly indicated they prefer DD over traditional care (81.7%), which is more or less comparable with Mackenzie et al8 studying DD of three SSIs (75%). Although the aim of this study was to assess non-inferiority, it is noteworthy that the mean PROMIS Mobility T-score was 10 points higher in the DD cohort (indicating better outcome), whereas the MCID for this questionnaire is 2 to 3 points.26 It must be noted that the sample size for this questionnaire was small. Future studies are therefore needed to reassess this. As this was a remarkable finding we also performed a post-hoc analysis assessing treatment satisfaction of this particular subgroup and found that all patients rated their treatment ≥8.0 (VAS) and none indicated to be dissatisfied (Likert). The three other functional outcome scores were non-inferior after DD, and the mean summary scores of each individual questionnaire indicate that majority of patients with these SSIs have good functional outcome 3 months after injury. Furthermore, our study indicates that adverse outcome rates are low, as was also shown in previous studies.8 9 12 13 20 However, it also emphasizes the importance of safety netting to include an available telephone helpline for questions and concerns, as well as the reassessment of X-rays of all DD patients by a (orthopedic) trauma surgeon before definitive treatment. One DD patient had surgery after a misdiagnosis (Weber B-type ankle fracture) 1 week after injury. In the Netherlands this is within the normal window for this procedure to be performed. The reduced work/school absenteeism to attend a follow-up appointment indicates DD is also likely to be beneficial from a societal perspective. Furthermore, in our hospital, DD has drastically reduced healthcare utilization, and it is worth emphasizing that this study found no shift toward primary care (ie, GP or physiotherapist). In the Netherlands, approximately 256 000 fractures are diagnosed annually in EDs,1 85 000 of which are estimated to be SSIs (33%).4 Our mean reduction of 1.68 hospital visits per patient after DD is in line with previous comparative studies on DD of, for example, fifth metacarpal neck fractures (−1.78),10 fifth metatarsal fractures (−1.46),12 and the study by Mackenzie et al (−1.26).8 Based on our results, if DD would become standard of care for these SSIs in the Netherlands, the national reduction of hospital visits is estimated at 142 800 visits per year. Therefore, DD provides an excellent opportunity to reduce fracture clinic workload and healthcare costs. Unfortunately, in many previous studies on DD, the classification of an SSI was limited to ‘minor’, ‘stable’, or ‘self-limiting’, or even unclassified.35 This complicates comparison with our results, as well as implementation and external validation of DD in other settings. Roughly speaking, however, studies on DD can be divided into two groups: (1) studies at the institutional level and (2) patient-level follow-up studies. The majority of the studies at an institutional level are non-comparative process evaluations of implementing (parts of) the VFC model.2–6 These studies typically include relatively large numbers of patients and provide information on the distribution of patients across the VFC model. Data regarding patients’ outcomes and experiences typically are limited, and therefore conclusions regarding the safety, effectiveness, and efficacy of DD for each individual injury cannot be drawn. An important strength of this study is that a wide range of outcomes were evaluated in a before-and-after design, including hospital visits, imaging, satisfaction, functional outcome using validated questionnaires, and adverse outcomes. Consequently, our study provides both institutional-level information (eg, number of patients, protocol compliance, and telephone helpline use), as well as patient-level data of DD regarding patients’ healthcare utilization, PROMs, and PREMs. Apart from the study by Mackenzie et al8 on DD of radial head, fifth metacarpal and fifth metatarsal fractures, patient-level follow-up studies typically include only some of these outcomes. Furthermore, many of these studies did not directly compare DD with traditional care,9 11 13 20–22 and often patient outcome was not measured using validated questionnaires. Furthermore, although randomization at an individual patient level for treatment redesigns like DD might not always be feasible, to our knowledge no previous studies on DD have attempted to reduce the chances of ‘selection bias’ due to the non-randomized nature of their studies using methods such as the propensity score adjustment, which was used in the current study. To our knowledge, this is also the first study on DD to specifically assess non-inferiority of DD versus traditional care using predefined margins. This study has several limitations. First, we studied the concept of DD, including multiple SSIs, and consequently subgroups of the included injuries were too small to analyze outcomes per injury. Second, numbers of patients far exceeding our numbers would have been needed to adequately assess differences in adverse outcomes like non-union. Third, as this was a before-and-after study, we did not include a priori non-inferiority sample size calculations of a predefined primary outcome. Fourth, PROMs and PREMs were assessed only once: at 3 months. Fifth, although part of DD, the patients discharged directly were not contacted routinely after a few weeks or months to assess their outcome and experience. This is a limitation especially for patients who did not complete the survey. We have evaluated all participants’ EPRs and found no adverse outcomes. This assumes patients experiencing any problems during their recovery would have returned to our hospital. However, we cannot be certain patients did not visit a different hospital for any issues. Furthermore, however, in keeping with what might be expected, the survey response rate in this study was fairly low, despite sending multiple reminders. Last, we asked patients after how many days they returned to work, school, or sports. Although based on our results we expect no between-group differences, we did not assess if patients had not yet returned to work/school or sports, at all. Future studies on this topic should also assess the cost-effectiveness of DD versus traditional care. Although some relatively large injury-specific cohorts have been studied before, it is likely necessary to perform adequately powered studies for some of the other SSIs included in the current study before non-inferiority of DD can be assessed conclusively. Our smartphone application is now increasingly used by other hospitals in the Netherlands, and this might offer an opportunity to gather data in a collective and standardized way, allowing us to perform studies in much larger cohorts. Furthermore, these data can then be used to perform stratified analyses of outcomes per injury, allowing more fine-tuning of the DD protocols, for example, if these results would indicate certain patient characteristics (eg, higher age, cognitive impairment, language barrier) predict worse outcome. In the current study, 18% of DD patients indicated they would prefer traditional care. Future studies should further explore these patients’ motives. Last, future studies should evaluate if DD is suitable for other injuries, including pediatric injuries. In conclusion, the results of this study on DD of SSIs confirm DD is an effective and safe alternative to traditional care with routine follow-up which does not compromise patient outcome and experience. This first study on this topic performed outside the UK indicates that DD is likely to produce satisfactory results in other countries as well. A large number of SSIs are diagnosed each year and consequently DD offers an opportunity to reduce healthcare costs and fracture clinic workload. The results of our study should be confirmed and strengthened by future larger injury-specific cohort studies. A collective (national) data registry could be established to accelerate this process, which should also encourage uniform data collection across multiple hospitals using validated and standardized outcome measures to improve comparability and strengthen findings. The study was conducted in accordance with the Declaration of Helsinki and was approved by the local ethical committee of OLVG Hospital (ref no 18.071) and by its board of directors. Contributors THG was responsible for the conduct of this study, methodology, draft of the article, collection of data, and analysis of all data. SA supported the implementation of direct discharge and contributed to the writing of the article as well as collecting parts of the data. JJG supported the implementation of direct discharge as well as collecting parts of the data. JMvD contributed to the writing of the article and analysis of all data. RH, RNvV and JCG all contributed to the methodology of this study, implementation of direct discharge as well as writing of the article. JCG was the guarantor. Funding This project was supported by an unrestricted grant from the health insurance company Zilveren Kruis Achmea (Leiden, The Netherlands). The funding source was not involved in the study design, data collection, analysis and interpretation, nor in the writing of the report or the decision to submit the article for publication. Competing interests None declared. Provenance and peer review Not commissioned; externally peer reviewed.
<urn:uuid:f6ea0c2d-eaa6-41f7-9618-97a1e5a142a6>
CC-MAIN-2022-33
https://tsaco.bmj.com/content/6/1/e000709
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00475.warc.gz
en
0.955824
6,868
1.523438
2
|The Algebra of Earth Science| In this activity, students will graph carbon dioxide levels against temperature change over time and examine the data to look for trends. Another plotting exercise is provided in which they examine the relationship between the retreat of glaciers and sea level change. Non-linear trends (exponential or quadratic) are discussed and students investigate them by plotting population against time. Since many of the measured parameters in Earth science change with time, students will try to find if these changes are linear or not, and whether they can be used to predict future trends. Intended for grade levels: Type of resource: Adobe Acrobat reader Cost / Copyright: Activities are Copyright Rice University, however they may be freely copied for educational use so long as headers are not changed. Teachers are encouraged to register using the registration facility so that they receive notices of new activities. DLESE Catalog ID: DLESE-000-000-007-774 Resource contact / Creator / Publisher:
<urn:uuid:e0420e15-64b4-4a38-b3f1-43784368a72b>
CC-MAIN-2017-04
http://www.dlese.org/library/catalog_DLESE-000-000-007-774.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00139-ip-10-171-10-70.ec2.internal.warc.gz
en
0.906089
205
3.21875
3
Research of Liposynovitis Prepatellaris has been linked to Pain, Knee Pain, Arthropathy, Knee Injuries, Lipoma. The study of Liposynovitis Prepatellaris has been mentioned in research publications which can be found using our bioinformatics tool below. Researched pathways related to Liposynovitis Prepatellaris include Ossification, Innervation. These pathways complement our catalog of research reagents for the study of Liposynovitis Prepatellaris including antibodies and ELISA kits against ACAT1, SLC25A5, F2R, FANCA, FXN. Liposynovitis Prepatellaris Bioinformatics Tool Laverne is a handy bioinformatics tool to help facilitate scientific exploration of related genes, diseases and pathways based on co-citations. Explore more on Liposynovitis Prepatellaris below! For more information on how to use Laverne, please read the How to Guide. We have 444 products for the study of Liposynovitis Prepatellaris that can be applied to Western Blot, Flow Cytometry, Immunocytochemistry/Immunofluorescence, Immunohistochemistry from our catalog of antibodies and ELISA kits.
<urn:uuid:a5bc67f6-24c5-4e8b-8f53-004eebae2442>
CC-MAIN-2016-44
https://www.novusbio.com/diseases/liposynovitis-prepatellaris.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00127-ip-10-171-6-4.ec2.internal.warc.gz
en
0.869668
266
2.078125
2
Local briefs, 10/26 Emergency workshop set There will be an Emergency Preparedness workshop at 7 p.m. Wednesday in the Charwat Room at Adriance Memorial Library, 93 Market St., Poughkeepsie. The American Red Cross Emergency Preparedness presentation will provide a comprehensive overview on how to prepare for natural and man-made disasters and how to respond to and recover from them. The session will discuss common disasters, ways to prepare as an individual, family and community member, and what to do when disaster strikes. Register at poklib.org or 845-485-3445, Ext. 3702. Discovering heritage film to be shown The documentary, "Finding Samuel Lowe: From Harlem to China," will be screened at 5 p.m. Wednesday in the Rosenwald Screening Room of the Vogelstein Center for Drama and Film at Vassar College in Poughkeepsie. Filmmaker Paula Williams Madison, a former journalist, NBC Universal executive and Vassar alumna, will take questions following the screening. The documentary looks at the quest by Madison and her two siblings from Harlem to discover their heritage by seeking out clues about their long-lost Chinese grandfather. Throughout her childhood, Madison recalled her mother, Nell Vera Lowe Williams, saying she had been separated from her Chinese father, Samuel Lowe, at age 3 in 1920. When her mother died in 2006, never having known her father's family, Madison vowed to find her Chinese grandfather's descendants. "Finding Samuel Lowe" draws from intimate interviews with Madison, her brothers, Elrick and Howard Williams, and other family members. The 90-minute documentary uses original footage, family photos and archival footage, and documents to chronicle the journey of a celebratory meeting with 20 family members meeting 300 Chinese descendants of Samuel Lowe. For information, call 845-437-5370 or visit www.vassar.edu
<urn:uuid:dfbaa849-bbc4-442b-960e-908ef5502539>
CC-MAIN-2022-33
https://www.poughkeepsiejournal.com/story/news/local/2014/10/25/local-briefs/17938879/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00476.warc.gz
en
0.926903
401
1.507813
2
This is a themed itinerary which offers a view of the Roman architecture of the Imperial age. There is a visit to the main Roman archaeological sites situated in Llíria town centre. First of all the Roman Mausoleums, monuments which formed part of the ancient necropolis. Then there is a walk round the oracular Sanctuary of Mura just as the citizens during the first century did: oracular temple, basilica thermarum and double thermal baths, some for men and others for women, comprising a cold-water hall or frigidarium, a warm-water hall or tepidarium and a hot-water hall or caldarium. The route ends with a visit to the Ca Porcar mosaic. It is a mimetic replica of the Roman mosaic of the Twelve Labors of Hercules, which was recovered in Llíria in 1917 and nowadays is exhibited in the National Archaelogical Museum (MAN) in Madrid.
<urn:uuid:1157a232-2b8d-49c1-b65e-098cac123c67>
CC-MAIN-2022-33
http://www.turismelliria.es/en/roman-edeta/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00275.warc.gz
en
0.934049
195
1.648438
2
The most common cause of heel or rear foot pain is plantar fasciitis or as it is sometimes referred, 'heel spurs'. This condition occurs mainly in runners and is often associated with a biomechanical abnormality, such as excessive pronation or supination of the foot. Pain is worse in the morning and improves during the day. There is a point of tenderness on the inside border of the heel bone that often extends along the inside border of the foot. Treatment involves avoidance of aggravating activity, ice, stretching, inserts for the shoes and wearing footwear with adequate support. Fat Pad Syndrome Another common cause of heel pain is the fat pad syndrome or contusion. This is also known as a 'bruised heel'. This may develop acutely from a fall onto the heels or chronically from excessive heel strike with poor heel cushioning. Treatment involves rest, the use of a heel cup, good footwear and taping. Calcaneal Stress Fractures Calcaneal stress fractures result from overuse. They require X-ray and treatment as the fracture heals. For more information about how physiotherapy can help, or to book an appointment please call 0161 883 0077.
<urn:uuid:391389e4-7a78-4261-ad0b-b316c697177c>
CC-MAIN-2022-33
https://www.manchesterphysio.co.uk/what-we-treat/musculoskeletal/foot/heel-pain.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00475.warc.gz
en
0.921474
256
2.703125
3
The world’s listed companies must each reduce their carbon intensity by eight to 10 per cent every year until 2050 if the 1.5C target set out in the Paris Agreement is to be met, according to the latest Net Zero Tracker report from investment research firm MSCI. The latest edition of the report, which was released late last week, also found that only 39 per cent of listed companies reduced emission intensity by the recommended amount between 2019 and 2020. As such, listed companies are on track to put nearly 10.8 gigatons of direct Scope 1 greenhouse gas emissions into the atmosphere this year, according to MSCI. Emissions from the corporates analyzed in the report are set to climb 0.7 per cent compared to last year, but the report will still fuel hopes that corporate emissions may have peaked given overall emissions from listed firms are down 5.6 per cent from the pre-pandemic high . The latest Net Zero Tracker report follows a similar warning from MSCI in June this year, when it found that the world’s listed companies have just 57 months based on current emissions trends before they deplete the emissions budget required to limit warming to 1.5C. The report also warned that the while a growing number of listed firms are setting net zero targets, just 45 per cent of the 2,900 companies in the MSCI ACWI Index have committed to a decarbonisation target. Overall, less than half of listed companies align with a 2C temperature goal, putting them at the high end of the Paris Agreement goal. Meanwhile, just 11 per cent have targets in place that align with a 1.5C temperature rise, although this marks a slight increase from the 10 per cent of companies aligning with 1.5C scenarios in the October edition of the Net Zero Tracker. MSCI’s report incorporates an Implied Temperature Rise, which calculates the temperature trajectory that companies’ decarbonisation plans equate to. It found that the energy sector has climate strategies that currently align with the highest temperature rise of 6.8C. Similarly, the auto industry is aligned with 4.4C of warming, the materials industry with 4.1C, and utilities with 3.4C. Globally, MSCI said that no region yet aligns with the Paris Agreement target, highlighting “the vast action required by the world’s listed companies, policymakers and investors” to deliver on global climate goals. In October last year, MSCI calculated that the world’s publicly listed companies were on a trajectory to cause global temperatures to rise by 3C. However, the latest Net Zero Tracker reveals some progress has been made, with the projected increased falling by a tenth of a degree to 2.9C thanks to more listed companies publishing emissions targets. In addition, MSCI estimated that listed companies will burn through their share of the global carbon budget three months later than previously projected based on their current greenhouse gas output. The budget for limiting warming to 1.5C will be depleted by February 2027, instead of November 2026, as MSCI data had previously indicated, the report said. “Listed companies are emitting greenhouse gases into the atmosphere at a rate that would make the planet 2.9C warmer by 2100 and 1.5C alignment will only be viable if these companies cut their total carbon intensity by 10 per cent each year until 2050,” said Sylvain Vanston, executive director for climate change investment research at MSCI. “A planet that is 2.9C warmer by 2100 is not just a more volatile world, it is a dislocated world. ‘Disorderly transition’ scenarios are a euphemism for chaos. Every step by companies to cut their absolute emissions and every effort by policymakers to drive momentum is critical because every tenth of a degree matters.”
<urn:uuid:72d5f32a-53f6-417a-a9f4-b9dc85c5dacb>
CC-MAIN-2022-33
https://totaluga.com/net-zero-tracker-listed-companies-must-reduce-carbon-intensity-10-per-cent-a-year-meet-paris-agreement-goals/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00475.warc.gz
en
0.950079
803
2.078125
2
Bacon is a day-to-day item for the grocery list and can be found in many houses, whether you are having it for breakfast, as a sandwich snack, or as part of a meal. One of the foods that need to be eaten immediately after purchase is bacon. The bacon will last around 2 weeks in the fridge, which is pretty decent. Bacon can be frozen. You’ll want to use small pieces and freeze them in a zip lock bag. Once it is frozen, place it in a freezer-safe container or wrap in aluminum foil and place it in a freezer. It will last around one week in the refrigerator once it is opened. Unopened bacon that is frozen will last around 8 months, while opened bacon that is frozen will last around 6 months. It can be worth it since it lasts a lot more than the time it lasts in the refrigerator. If you want to know how to freeze bacon, how to store it, and how to thaw it, then you should stick around. How Can I Freeze Uncooked Bacon? It is possible to freeze bacon without a problem so that it is preserved for a long period. If you bulk buy your bacon, you can keep all the extra in the freezer until you are ready to eat it. It would be better if you didn’t have to worry about it during the weekly shop. You might think that you can just throw the bacon in the freezer and forget about it. That will freeze and preserve the bacon in a way. It is important to freeze it in a more appropriate way for the best results. How do you freeze bacon that is not cooked? It is time to get right into it! There are two main ways in which you can freeze your bacon, and it depends on whether it’s opened or not. It is a lot easier to freeze if the bacon is still in its original packaging. Place the pack of bacon in the freezer after you take it. It doesn’t need a freezer hand, so you could place it in one before. If you put bacon in the freezer, we recommend you label it so you know when you put it there. It takes a bit more of a process to freeze bacon that has been opened, so let’s focus on that. Step by step - It’s a good idea to think about whether you want to freeze all of the bacon, or just a few. - The pack is already open so you can pick and choose how much you want to freeze! You have to take the slices of bacon that you want to freeze. - Roll each slice individually into a small coil, like turning it into a shell of a snail. It’s a great way to save space in the freezer, and it also helps freeze the bacon slices. - Take a small tray and place it on a baking sheet. Place the bacon on the tray and make sure they don’t touch each other during the freezing process. - The tray has to be retrieved from the freezer after a few hours. The bacon should be completely encased in ice. - You can now put them in a freezer-safe bag or container when you take them out of the tray. - If you want, you can use several bags or containers to store bacon, as this will allow you to store a certain amount at a time. - You should label and date the containers and bags that are in the freezer. It is important to know how long something has been in the freezer, as it will not last forever. - The bacon slices should be put in the freezer with the bags and containers. They can stay there for up to a year. - It’s recommended that you eat the bacon within 6 months to get the best taste. It is possible to freeze bacon once it has been opened. You need to make sure that you consume it after you thaw it. It is fine to freeze bacon, but it is not a good idea to freeze it more than once. How Can I Defrost Uncooked Bacon? When your bacon is frozen in the freezer, you have more time to eat it. When you are ready to cook and eat bacon, you will need to thaw it first. The trickiest part of freezing food is when it is re-warmed. Food can go bad in the process of being re-warmed, so it is important to do it properly. Especially foods with bacon in them. You could end up with food poisoning if you don’t thaw your raw meat right. We are going to show you how to thaw bacon, step by step, by guiding you through the process. Depending on how much of a hurry you are in, there are different ways in which you can thaw bacon. One of the easiest ways to thaw bacon is to leave it in the refrigerator overnight. This is the best option to thaw bacon that is still in its original packaging. It can be kept in the refrigerator for another day or two after it is re-thawed. It is easy to cook bacon as normal for consumption. Wouldn’t it be better to thaw the bacon a little quicker, instead of waiting? Defrosting in cold water and using the microwave are two other main methods. You should cook the bacon immediately after using either of the methods. Using a Microwave: - Use a paper towel to absorb the excess water and bacon fat as the bacon thaws. - The bacon slices should be spread out as much as possible to make sure they get properly defrosted. - If you freeze them up in coils, you should be able to spread them out on the plate a lot better. - We recommend you put another paper towel on top of the bacon to make sure you don’t end up with any fat in the microwave. - The bacon should be placed in the microwave and the meat button placed. The right timer will be set when this is done. - Set the timer for five minutes and check if it’s working. - The timer needs to be set to another 5 minutes if it isn’t fully defrosted. Once the bacon is cooked, it can be kept in the refrigerator for another 5 days. Using Cold Water: - You can go ahead with the next step if the frozen bacon is still in its original closed packaging. - If you don’t, you will have to put the frozen bacon pieces into a plastic bag. A bag similar to the one pictured can also work. - Take the sink or a bowl with cold water and put the watertight bag inside. - The water must be cold and not warm, as it might cause the bacon to be contaminated with dangerous bacteria. - After 30 minutes, the bacon should be ready to eat. If that isn’t the case, change the water and leave it for a while until it thaws. - Once cooked, the bacon can be kept in the refrigerator for up to another 5 days. Storing Uncooked Bacon The risk of food poisoning from uncooked bacon is very high because it is highly susceptible to bacteria that could lead to food poisoning if it is not stored appropriately. To be on the safe side, we are going to go over the basics of how to store bacon in different places. The first thing that you need to know is that bacon should never be left in a room at room temperature. If it is out at room temperature for too long, it is at risk of breeding harmful bacteria and giving you food poisoning. There are only two ways in which you can store bacon, the fridge, and the freezer. The bacon will last for a certain amount of time depending on the way it is stored. In the Fridge: - Unopened bacon: up to 2 weeks - Opened bacon: up to 1 week In the Freezer: - Unopened bacon: up to 8 months - Opened bacon: up to 6 months It is not recommended to leave the bacon in the freezer for more than a year, as the bacon will not taste good. Can I freeze uncooked bacon? It has been established that bacon can be frozen and preserved for a longer time. But a more important question is whether or not you should. Like most things in life, there are pros and cons to each decision. It is up to you, whether or not to freeze your bacon. - The bacon is going to last a long time. - You will have up to 12 months to eat the bacon, there is no pressure to consume it within two weeks. - You can freeze bacon in its original packaging, which is very fast and easy. - You can freeze bacon that has not been opened, as many or as few slices as you want. - As long as the bacon is left in the freezer for less than the recommended amount of time, it will taste just as good. - The bacon will not be as nice if it is left in the freezer for a long time. - If you don’t properly thaw the bacon, you run the risk of it breeding harmful bacteria that could give you food poisoning. - If the bacon is opened, you need to go through a pre-freeze process to ensure that it is properly frozen, which might take more effort than you are willing to put in. We need to sum up everything that we have covered. Is it possible to freeze uncooked bacon? Yes, you can. You can freeze it if it has already been opened, or if it is still in its original packaging. The only difference is that the bacon needs a bit more preparation. Uncooked bacon can be kept in the refrigerator for up to 2 weeks, but it can be kept in the freezer for up to 12 months so that it can be consumed later.
<urn:uuid:90d991df-a045-4c8e-9b97-9f11f3de3468>
CC-MAIN-2022-33
https://www.jikonitaste.com/can-bacon-be-frozen/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00470.warc.gz
en
0.954359
2,077
1.710938
2
What good is a Constitution that does not prevent the unscrupulous from looting the till? For a man whose children remain hungry, sick and uneducated, it is a meaningless piece of paper. The moral obligation to the downtrodden makes it incumbent for those in power in Pakistan to have the courage to use the authority vested in them to prevent corruption, otherwise they are as much culpable as those involved. Reams of evidence implicating the coalition partners of the government in southern Sindh province blatant corruption, extortion and target killings, etc have been submitted to the superior judiciary but the corridors of justice remain oblivious to the desecration of the Constitution. They become deaf, dumb and blind except when it suits them. To quote from an anti-corruption workshop conducted by World Economic Forum (WEF)’s “Partnership Against Corruption Initiative (PACI), “lack of enforcement of the legal and regulating framework for addressing corruption is often cited as a major impediment to promoting real change, especially in the business environment. Moreover, lack of coordination and conflicting mandates between the different actors – business, government, civil society – reduces the effectiveness of anti-corruption and transparency measures.” Pakistan inherently has a “split personality” with respect to dealing with corruption. For the benefit of the public rhetoric is rendered with great emphasis by every leader that corruption is a zero-sum game, not to be tolerated — all except former President Asif Ali Zardari. At least the PPP co-Chairman is not a hypocrite, there is no known record of his ever speaking against corruption. National Accountability Bureau (NAB)’s predecessor “Ehtesab Bureau” was only a political tool. Saifur Rahman heading it was neither qualified nor objective nor honest, he damaged the concept of accountability by going quite berserk selectively targeting opponents of Pakistan Muslim League (N faction) of Prime Minister Nawaz Sharif. The opposite resulted, the most corrupt on this earth escaped scot free yelling “political victimization”. Starting with plenty of commitment and purpose in 1999 under the honest and upright Mohammad Amjad, NAB lost credibility because the schoolchum cronies he inducted made tons of money lining their own pockets, mostly under the “plea bargain” concept. Incidentally some of these unscrupulous “patriots” had earlier fleeced ex-soldiers of their hard-earned pension money under dubious “cooperative schemes”. By restraining NAB from going after politicians and bureaucrats who institutionalized corruption, for his own survival General Pervez Musharraf undercut his own finest initiative. Anybody count the stud farms and racehorses former bureaucrat Tariq Aziz owns in Pakistan and abroad? It is on NAB’s statute books to investigate those living beyond their known means of income, the challenge is to target NAB’s top officials living the very life they prosecuted people for – ‘living beyond one’s means’. Are Amjad’s successors, with honorable exceptions, exempt from these laws being applied to them? NAB must conduct their accountability on a fast-track basis. Despite being tainted by these few corrupt elements, its reputation as an institution of excellence persists because most NAB officials serve with honesty and dedication. Some obnoxious characters cannot ever be held accountable even if NAB tried. These “untouchables” are those feudal inheriting land holdings now been joined by the “new feudal” through money made legally and/or illegally, they have and/or can purchase influence outright. On the other hand the good PR of those professionally competent allows them to camouflage their own shenanigans and facilitate that of their near and dear ones. The general public tends to ignore and/or overlook this individual’s corruption giving weight-age to his (or her) known reputation. Clever exploitation of this weakness a corrupt political leader can emasculate the individual’s capacity (and that of the institution that the person heads) from doing anything, Zardari blatantly finessed this to perfection. We call petty thieves criminals, we tend to gloss over many who should otherwise be called crooks. When a person heading a critical national institution sells his soul to the devil, the devil will make merry under this “protection”. A very professional COAS, (General Ashfaq Pervez) Kayani changed both the image and substance of the whole Army from the depths it had sunk to by 2007. While giving him the benefit of doubt for the unsubstantiated (at least till now) rumors going the rounds, Kayani should have stopped his brothers from doing business across the board with the Army, his siblings are his Achilees Heel. While they are at liberty to do business as any citizen, the responsibility associated with the governance of any entity requires that any commercial transactions having “conflict of interest” (COI) and “related party transactions” (RPT) be declared, and only allowed after an “arm’s length” scrutiny. In a country where very few things happen on merit in the face of connections one can challenge the state to make public how many times COI and RPT have been declared. You cannot be “goody two boots” maintaining a “stoic” silence and feigning ignorance (and even helplessness) while your kith and kin loot the institution that you are morally and physically responsible for. The client-patron relationship is very strong in Pakistan, nepotism is endemic in the body politic. You will find some of those close to Zardari (and even to Musharraf) also in the present regime also. Not only do their connections ensure they escape accountability. Some selected for the Boards of public sector corporations have a recorded history of corporate mismanagement and excesses. If we are to be serious about accountability, we must also target also those who became accessories and willing collaborators in manipulating lucrative contracts and actively facilitating this loot. The “acid test” for anyone with conscience occupying a seat of influence is to expose the corrupt whoever he (or she) may be. Like inflation, corruption has force-multiplied to become an inescapable part of our daily lives. Nepotism cuts into the political will to root out corruption at the highest reaches of government and society, accountability therefore is fundamentally flawed. If the person has used his office for material gain, he is a crook, pure and simple. We must carry out accountability without regard to the individual’s position and/or connections. Except for the extreme necessities of national security, everything and everyone should be open for detailed public scrutiny. All members of the public must consider themselves equal participants in the war against corruption by exposing those corrupt whoever the person may be. The electronic and print media can aid this effort by unleashing a constant barrage exposing facts about corruption. Both the media and the masses have a definite role to play in changing society’s attitudes. Increasing the sources of information is vital to combating corruption, by involving the general public we can force-multiply the availability of concrete evidence. The pursuit of accountability is a zero-sum game pursued without fear or favor, unfortunately political nuances, client-patron relationships and self-interest that goes with it compromises its implementation. The corrupt use ‘democracy’ to camouflage their crimes, the motivated of this world applaud the “Gorbachevs” because they serve their evil designs. Where is the inherent loyalty to the institution, and at what cost to the institution and to the country? Are our soldiers continuing to give the supreme sacrifice in FATA and Swat for such people to make palatial houses and buy farms all over the country and abroad? The writer is a Pakistan-based defense and political analyst. He can be reached at email@example.com Like ViewsWeek on Facebook and follow on Twitter @ViewsWeek
<urn:uuid:6c62d6e9-838f-4d2b-8fc3-595c5134bc1f>
CC-MAIN-2022-33
https://viewsweek.com/confronting-pakistans-corruption-monster/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00276.warc.gz
en
0.95331
1,656
2.15625
2
How well an appliance is repaired will depend on how much you react to it. It is crucial to choose the right professional to repair it. Winter temperatures can drop to levels that are beyond the body's capabilities. It is a good idea to find the best furnace repair expert when such situations occur. It is important to use multiple sources to find a professional furnace repair company that can repair or maintain heating devices. It is a good idea to start asking your friends, neighbors, and colleagues. They will be able to offer options that may need to be thoroughly analyzed before you make a decision on who to hire. The internet can be a great option if referrals don't offer the desired satisfaction. The internet has many professional websites. Many service providers have their own websites to reach customers. These profiles can tell a lot about the services they provide in heating appliance maintenance. Many websites also have reviews from past customers. You can read through these reviews to assess the reputation and ability of the companies in terms of service delivery. There are many technicians on the market, some of whom might not meet the standards. It is important to be cautious when hiring a professional. A furnace repair can be done at any time, not just when the weather changes. These appliances are often used in harsh weather conditions. There are many organizations that specialize in the repair and maintenance of heat appliances. These companies are passionate about providing quality services for their customers to improve their home comfort.
<urn:uuid:9aa84fab-1f21-42f0-86da-ea3102de87da>
CC-MAIN-2022-33
https://thedatashift.org/tag/new-furnace-installation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00476.warc.gz
en
0.964523
292
1.726563
2
Have you played Memorize before? If so, then our game Match It will be easy for you. When you decide to try the Match It game you will see a set of eight boxes on your screen. Four of them are marked with a flag that symbolizes the language you are speaking and the other four boxes are marked with a flag that stands for the language you would like to learn. In contrast to Memorize you already see four words and their corresponding translations. Now you have to find the right pairs as fast as you can. Once you found all pairs you can proceed to the next level.
<urn:uuid:c73c9946-bd3d-4e4e-b194-661235153669>
CC-MAIN-2017-04
http://sw.bab.la/michezo/match-it/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00388-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964164
121
1.96875
2
By guest blogger and free flight expert Chris Shank Kids were on the school playground as I rode by on my bike recently. Seeing them run and jump and hearing their screams of excitement made me happy. I remember vividly the days of my youth when running, chasing, playing tether ball, and other physical play activities were paramount in my life. Is it so in our parrots’ lives? It certainly seems to be, as I’ve watched two generations of parent-raised cockatoos grow up at Cockatoo Downs. As the fledglings did before her, Star Bare-eyed Cockatoo (17 weeks old) zooms around the aviary, catches a boing on the fly and twirls with great glee. Her parents sometimes shed their serious demeanor and join her in brief flights of joy. The Functions of Play Behavior Why is it that humans and non-human animals, especially young ones, partake in physical play activities? I don’t have specific answers to that question. Even with extensive research on play, it is not yet completely understood by scientists. However, the majority of findings conclude that play behavior apparently promotes the ability to handle unexpected circumstances, helps recover from stressful situations, and aids in the development and training of physical and motor skills. There are different types of play such as social play and object play, and I will be focusing on physical play. Physical play is a combination of activities that gives young animals, including humans, the chance to develop gross motor skills, learn and practice physical abilities, promote and develop strength and coordination, all while happily expending large amounts of energy. Flighted Fledgling and the Adult Parrot Parrots were not built to sit still. In the wild, they spend most of the day flying from place to place in search of food, nesting opportunities, and partaking in social interactions. Supplying toys to young companion parrots to engage and play with can help expend energy to take the place of wild activities. However, creating an environment for the young parrot to play and fly affords the youngster the ultimate in energy expansion while promoting coordination, skill, exploration, and confidence. Physical exercise for our adult companion parrots is very important for their health and welfare. Giving a fledgling parrot the opportunity for vigorous physical play sets the stage for the continuation of energetic exercise into the youngster’s adulthood. Feeling comfortable and safe are key ingredients in promoting play activities in animals. The type of play activity that takes place is influenced by what the animal can physically do. Regrettably, most hand-raised parrots are clipped as fledglings. A clipped youngster may experience a loss of balance and fear of falling which certainly hinders the parrot’s motivation to physically play, which can limit the parrot’s development. Play behavior apparently promotes the ability to handle unexpected situations and allows versatility of emotional responses to help recover from averse situations. Because clipping fledglings limits their play opportunities, as adults they may have less proficiency in dealing with situations such as changing or stressful environments or handling successfully social interactions. I am always dismayed when I learn that some breeders clip the wings of their fledglings before the birds take their first flight or soon thereafter. To be transparent, I, too, practiced that when I started breeding cockatoos. That was what was preached back in the day. I finally did see the light and I let my fledglings fly. With that came displays of the exuberance that is inherently contained in a young cockatoo. The babies would develop their physical skills by energetically flying back and forth in the house as they learned to navigate and land on ropes strung across the ceiling. Play vocalizations such as loud screams echoed throughout the house as the fledglings’ confidence and skills grew each day. Ropes were invaluable in advancing their motor skills. Losing their balance on a wobbly rope didn’t dissuade them because all they had to do was open their wings and fly off. Falling wasn’t a concern as it is for clipped parrots. I often wonder if flying birds even have a human concept of falling. To me, falling means loss of control and eventual pain as I hit the dirt. With a flighted bird, there is no loss of control when “falling” as she just opens her wings to fly. It’s obvious to spot adult parrots who were clipped when young and did not have access to robust play exercise using their wings. Generally, as there are exceptions, they turn into perch potatoes with little to no motivation to move around or explore. They show dependency on their human caretakers to move them from place to place. They may be more sensitive in stressful situations and they can be more fearful of changes in their environment. And the list goes on. I believe allowing parrot fledglings to keep their fully functioning wings is a welfare issue. Young parrots play if they are healthy, well-fed, and safe; but not if they are under stressful conditions or in a stressful mental state which a clipped fledgling may very well experience. Watching a newly fledged parrot try to fly for the first time with clipped wings is truly a heartbreaking vision. A vastly important part of avian physical play has now been shut off for the youngster. An open door that would entitle the young companion parrot to a healthy mental and physical development has been rudely slammed in her face. Even though scientists have yet to completely understand play behavior, we shouldn’t let our parrots be deprived of physical play; if for nothing else, it seems to be just plain fun for parrots to do. Just ask Star! Star is expanding her social circle and skills. Avian trainer and good friend, Kathryne Thorpe, came to visit Star recently. She spent time in the aviary feeding Star’s parents yummies. Star came down to the perch after giving Kathryne the once-over and preceded to eat from the treat bowl with Kathryne continuing to feed a parent. Comfortably accepting a new person in her aviary was a big step forward for Star. Morning Coffee with Ellie Ellie, my adopted Bare-eyed Cockatoo, is making great strides with the new behaviors she is learning. The newest is learning to fly to my hand. In the video, you will see the steps I took over several days to get to our goal behavior of flying to my hand. The important thing to remember is to make small steps towards any goal behavior. (The video has been shortened because of length.) Play Behavior in the Nonhuman Animal and the Welfare Issue, Ana Flora Sarti Oliveira et al; published online, June 10, 2009, Japan Ethological Society and Springer, 2009. Social Play Behavior, Marc Bekoff, The Humane Society Institute for Science and Policy, Animal Studies Repository, 1984. So You Think You Know Why Animals Play, Linda Sharpe, Scientific American, May 17, 2011. Chris Shank’s love of parrots and knowledge of animal training began several decades ago. Her professional experiences include a degree from the Exotic Animal Training and Management Program at Moorpark College in California, an internship at Busch Gardens’ parrot show, work as a dolphin trainer at Marriott’s Great America in Santa Clara and later in Hassloch, Germany. Her love for cockatoos came after a relocation to the Philippines. Once back in the United States, she established her aviary Cockatoo Downs, where she has regularly offered training and education to parrot owners for many years now. She is an internationally-recognized expert in free flight.
<urn:uuid:63dda68c-a844-45c8-b4c0-00d1f09ea2aa>
CC-MAIN-2022-33
https://blogpamelaclarkonline.com/2019/10/05/parrots-flight-and-play-behavior/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00265.warc.gz
en
0.961305
1,606
3.046875
3
No one knows for certain the number of organized opposition groups in Syria and opposition militia forces fighting in the Syrian civil war. These irregular guerrilla forces fighting primarily against the Syrian army range from secular groups to Salafi Islamist militants. The Islamist factions are reportedly split between groups that have a Syrian national agenda and those that have a global agenda, but they cooperate with one another. Serious tensions exist within the overall opposition; al-Qaeda-linked groups are simultaneously fighting the Syrian army and the moderate Syrian opposition forces. The al-Qaeda-linked groups remain the best financed, best armed, best organized, and most seasoned fighters. The civil war in Syria is much like the civil war in Afghanistan after the Soviet withdrawal in 1989. After the U.S. turned its back on the Afghans, Pakistan and Saudi Arabia filled the vacuum by backing the Taliban militants who turned Afghanistan into a base for al-Qaeda. If Washington continues to shun the Syrian opposition, then the eventual fall of the Bashar al-Assad regime is likely to result in a Talibanized Syria. While the moderate opposition continues to fight against Assad, it has failed to gain strategic ground against Syrian armed forces and militias. Meanwhile, al-Qaeda-linked groups such as Jabhat al-Nusra and al-Qaeda in Iraq and Syria have made progress in this same fight. The Assad regime has also been unabashedly supported by Iran, a state sponsor of terrorism, and the Lebanese terrorist group Hezbollah. It’s clear the Syrian civil war is not black and white. As Heritage expert Jim Phillips has repeatedly emphasized, this is a Hobbesian conflict where ultimately it’s everyone against everyone. There’s little disagreement that Assad must go, but without a managed resolution, Syria could go from a really bad sub-state conflict to an all-out regional war. In the absence of strong U.S. leadership and support over the past two-and-a-half years of the Syrian civil war, there has been a volatile global convergence of al-Qaeda-linked fighters amongst the Syrian opposition. Syrian rebel factions now run the risk of being overrun by al-Qaeda priorities instead of their own democratic and secular aims. As long as al-Qaeda continues to draw and unify fighters from Chechnya, Pakistan, Egypt, Tunisia, Libya, Iraq, and Western countries, the conflict will continue to create greater personal connections among extremist groups from different regions and develop hardened fighters that can take their battle experiences elsewhere in the world to inflict terror. Al-Qaeda has repeatedly recognized the usefulness of instability in Syria and its great potential for an al-Qaeda stronghold in the heart of the Middle East. This scenario would cut at the heart of U.S. national security interests and should be avoided at all costs.
<urn:uuid:daf18b18-dfa8-4bd3-8585-dffad25273e1>
CC-MAIN-2017-04
http://dailysignal.com/2013/09/10/who-are-the-rebels-in-syria/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00538-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94532
566
1.921875
2
There’s a reason why so many people use Harry Potter metaphors to describe our current political climate. In characters like the Malfoys, we see vicious bigotry lurking under a veneer of wealth and status. In the Ministry of Magic, we see authoritarian paranoia pave the way for violent extremism. It’s not hard to see how that reflects reality. By the age of 15, Harry and his friends have joined an underground resistance cell. Looking back, it’s hard to believe that story was written by the same person as the Fantastic Beasts movies. If anything, The Crimes of Grindelwald is more sympathetic toward people who join the Nazi-analogue villains. At one point Dumbledore advises against deplatforming the dark wizard Grindelwald, and the film’s heroes display little of the moral backbone we saw in Harry and his friends. Pitched as an allegory for the rise of fascism, the Fantastic Beasts franchise will span 19 years over five movies, covering the rise and fall of Grindelwald. In some ways it’s a similar set-up to the later Harry Potter books: Grindelwald is extravagantly evil, but his wizard-supremacist views overlap with mainstream opinion. The American government enforces segregation between wizards and muggles (including a ban on intermarriage), while the British Ministry of Magic is conservative and misguided, putting Dumbledore under surveillance. In theory that’s a solid foundation for a pre-WWII allegory, but J.K. Rowling’s views have shifted since the Harry Potter era. Instead of showcasing resistance against evil, The Crimes of Grindelwald focuses on a politically apathetic protagonist (Newt Scamander) and characters who decide to join Grindelwald. Where are the heroes in Fantastic Beasts? Shielded by pureblood privilege and blinkered by academic obsession, Newt is an ideal example of a “good person” who can ignore the political turmoil around him. The Crimes of Grindelwald covers his change of heart, as circumstances force him to take sides. However, the film is so muddled that this arc barely registers, overshadowed by a messy subplot about Credence Barebone’s family history. Meanwhile, Newt’s friend Queenie Goldstein joins Grindelwald out of a delusional belief that Grindelwald will let her marry her muggle boyfriend Jacob. Queenie’s choice is foreshadowed by an earlier scene where she puts Jacob under a mind-control spell, hinting that she never viewed him as an equal anyway. Unfortunately, this idea falters due to clumsy execution. Even if Queenie does hold wizard-supremacist views, she’s otherwise characterized as a kind and empathetic person whose closest family member is an auror. Would she really abandon her sister to join Grindelwald’s band of cold-blooded killers? The film may tell us that Grindelwald is charismatic and persuasive, but we barely see this on-screen. Certainly not enough to warrant Queenie’s overnight change of heart. When Credence joins Grindelwald, it makes more sense. Angry and alienated, he’s a longterm victim of Grindelwald’s manipulations. But between Credence and Queenie, Rowling spends a lot of time exploring the sympathetic reasons to join Grindelwald. It’s an odd choice of perspective because unlike the Potter books, The Crimes of Grindelwald doesn’t zoom out on the social impact of anti-muggle sentiment. Queenie and Jacob’s star-crossed relationship is our main example of how these ideas harm real people, and their story concludes with Queenie joining a muggle-killing terrorist group. We don’t know how others are suffering or fighting back under similar circumstances. More insidiously, the film lacks a clear moral stance against Grindelwald. That’s an odd thing to say about a supervillain, but while we know Grindelwald is evil (he does all those crimes, after all), no character explicitly takes a stand against his philosophy. Newt only takes sides after Grindelwald kills his friend, Tina is just following orders, and Dumbledore is understandably conflicted. At this point in the franchise, Grindelwald doesn’t have a true nemesis. Dumbledore basically acts as a free speech advocate for his cause, telling the Ministry that if they break up Grindelwald’s rally, they’ll play straight into his hands. On-screen, that’s exactly how this plays out. When the aurors try to arrest Grindelwald, he uses this moment of political theater as a recruitment tactic. This is a less-experienced Dumbledore than we saw in Harry Potter; a man whose motives are still clouded by a broken heart. It makes sense for him to be less proactive here than he is against Voldemort. But as a political allegory written during the Trump era, this story sends a depressing message. Instead of showcasing active resistance against fascism, Fantastic Beasts takes a both-sides approach that feels regressive and uninspiring compared to Harry Potter. If you want to see precisely where it went wrong, look no further than Star Wars. The Star Wars sequel trilogy is a model for what Fantastic Beasts tries and fails to do. The heroes are a tiny group of resistance fighters among a larger population who either don’t care or don’t have the power to rebel. The villains are sadistic and authoritarian, yet Kylo Ren still has deep psychological motives. Finn is a sympathetic figure who, like Newt, wants to avoid the war but ultimately decides to do the right thing. And this all takes place in a family-friendly adventure movie with plenty of humor, maintaining a sense of wonder in a dystopian setting. The Force Awakens delivered a more coherent political and moral message than anything we saw in either Fantastic Beasts movie. Fantastic Beasts accidentally argues that Grindelwald is right The final nail in the coffin of Fantastic Beasts’ politics is when Grindelwald namedrops the Holocaust. Conjuring up a vision of the future, he tells his followers that if the muggles continue without magical interference, they’ll start World War II. It’s a twisted version of the “Would you kill baby Hitler?” argument. Obviously, we don’t know if Grindelwald could prevent WWII, but it creates a scenario where, if the good guys win, they’re potentially fighting for the Holocaust to happen. As well as being wildly offensive, this ties into Rowling’s unpleasant view of muggles. While Rowling paints a sympathetic picture of muggle-born wizards, the only muggles we know personally are the Dursleys (who are small-minded bullies), Voldemort’s father (the victim of a love potion), Credence’s abusive adoptive mother, and Jacob Kowalski. We never meet a heroic or impressive muggle. Jacob is nice enough, but he’s also an ineffectual buffoon. Combine him with Grindelwald’s assertions about WWII, and the Fantastic Beasts movies suggest that muggles aren’t equal to wizards. They effectively imply that Grindelwald was right all along.
<urn:uuid:d6121eb0-f910-4af9-8803-87cad07dfc12>
CC-MAIN-2022-33
https://www.dailydot.com/parsec/crimes-grindelwald-fascist-allegory/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00076.warc.gz
en
0.925852
1,514
1.84375
2
New Build Lawns There are a ton of things that go into building a new home. One of the most overlooked is the lawn of your new home. Many times there are issues immediately when you move in. The sod that is installed is dying, separating at the seams, and just looks horrible after a week or two. There are many reasons that this happens and we will look at each one to help you decide what the proper steps are to make your lawn look its best. How should the Sod Install be done? Sod is the fastest way to get a great looking lawn. But if the soil under it is not prepared correctly then the sod will not root and your lawn will look dead or weak after a few weeks. This is because when the house is being built the topsoil (growing soil) is removed to get a solid foundation for the house. But when the house is completed the ground around the house is compacted, mostly fill dirt, and not suitable for growing a great looking lawn. Prior to installing the sod there should be compost/topsoil brought in and leveled. Once that is completed then the sod should be installed the day it was delivered and watered daily until the roots have established themselves. What should the soil look like before the sod is installed? The image to the right is a great example of fill dirt vs topsoil. In Chesterfield / Richmond the soil is naturally mostly clay and acidic. If the new construction has scraped away the top layer to build then the soil is now considered "fill dirt" which is not suitable for a lawn (see images below of what happens). Once the soil is delivered is should be spread out about 2-3 inches thick prior to the sod being installed. What happens if the soil is not prepared properly? The image to the left shows what happens if the sod does not have soil to grow into. The sod will be easily pulled up even weeks after the install. There may be standing water under it if the fill dirt does not have good drainage. The lawn will also look stressed because the roots were not able to grow. When sod is cut the roots are literally cut off to make the transplant. Immediately it needs to start regrowing those roots and if there is no soil it will not be able to. The cracks in the seams show that the sod has also dried out and the grass is shrinking. This happens a lot during the summer when new sod is installed because the builders do not adjust the irrigation to water enough to establish the lawn. What can be done if sod was installed wrong? There are several steps that can be taken depending on the condition of the lawn. If the lawn has established roots but has the gaps because of insufficient watering initially you can have compost overdressing completed which will fill in the gaps and provide natural nutrition to the soil helping the lawn to establish healthy root systems. Some times the sod that was install will need to be completely removed in order to bring in soil to build a base then either reinstall the sod (immediate results) or start a new lawn by seed (less expensive but will take time). What does a bad sod install look like the next year? The image to the left shows a lawn that was installed by the builders. The preparation of the lawn was not completed correctly so the lawn did not get established and weeds invaded the area. This lawn because there were large gaps in the sod install as well was recommended to be completely removed and new soil brought in, then re-install the sod to prevent erosion of the lawn in the back that was sloped away from the house into a waterway. Why did the grass seed the builders put down not grow? When builders are done with construction the new owners are left with a back yard that needs a lot of work. By law after construction companies are required to spread something to prevent erosion. However, the dirt they put the seed on will not grow anything because it is fill dirt that does not have any organic material in it. Weeds will grow because they grow anywhere, but grass requires healthy soil, moisture, and sunlight to grow properly. For this lawn they will need to bring in a lot of soil prior to doing anything else for a lawn. What should I do after I purchased a new build house? As general advice we recommend doing the following in order to establish a lawn in the best possible way. If irrigation was installed in the front and not in the back this should be done if you want to have just as nice of a back yard as the front. Any drainage from gutters should be addressed, as well as the drain from the ac unit. Then you should decide if you want to have sod installed or grow the grass from seed. We recommend sod install as you will have immediate results and it will keep any of the soil from shifting from rainfall. The order of which should look like this. Add any drainage solutions to the house/lawn area Bring in topsoil/compost mix (have a soil test done to see what needs to be addressed with the new soil) Install new irrigation areas as needed Install sod or seed area How can Chesterfield Lawn Services help you? Chesterfield Lawn Services is able to do many of the things listed above, or get you in touch with licensed and insured companies that will be able to help you. We can advise you on what needs to be done and specific things to look for when completing the project of getting a new lawn established in a new build.
<urn:uuid:f98077be-daec-4224-8d0e-c88aaab06626>
CC-MAIN-2022-33
https://www.chesterfieldlawnservices.com/copy-of-aeration
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00676.warc.gz
en
0.971709
1,135
1.757813
2
QoS Modelling for Software Service Improvement using Adaptive Learning Chinnam Subbarao1, I. Ramesh Babu2 1Chinnam Subbarao, Research Scholar, CSE, Acharya Nagarjuna University, Guntur. 2Dr. I. Ramesh Babu, Research Supervisor, CSE, Acharya Nagarjuna University, Guntur Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 4920-4925 | Volume-8 Issue-12, October 2019. | Retrieval Number: L35531081219/2019©BEIESP | DOI: 10.35940/ijitee.L3553.1081219 Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting © The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/) Abstract: In this paper, we discussed about quality of service (QoS) related to software implementation for outsourced applications. Quality of service is key challenge to produce distributed software services and mainly focused on relative service provide based on possessions usage of distributed environment. In this work, we presented effective QOS Machine Learning approach to calculate and predict quality of service with respect to outside environment conditions. We also presented depth analysis on relative and successive correlations with enhanced performance of resource classification. Improve and maintain quality of service for dynamic resource utilization and perform application level semantic data relation. The objective of research work is to provide a hybrid learner’s resolution that increases the precision while keeping prototype complication passable. Our proposed experimental results give more accurate and efficiency with respect to traditional approaches. Keywords: Adaptive Learning, Quality of service (QoS), Control Primitive, Hybrid Multi-Leaners, Cloud-based Software, Linear Regression and Machine Learning. Scope of the Article: Machine Learning.
<urn:uuid:e16af2db-1696-4f1f-a42e-95d3677107c7>
CC-MAIN-2022-33
https://www.ijitee.org/portfolio-item/l35531081219/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00072.warc.gz
en
0.868747
449
1.554688
2
HVAC is important in the design of medium to large industrial and office buildings such as skyscrapers, onboard vessels, and in marine environments such as aquariums, where safe and healthy building conditions are regulated with respect to temperature and humidity, using fresh air from outdoors. Ventilating or ventilation (the V in HVAC) is the process of "exchanging" or replacing air in any space to provide high indoor air quality which involves temperature control, oxygen replenishment, and removal of moisture, odors, smoke, heat, dust, airborne bacteria, and carbon dioxide. Ventilation removes unpleasant smells and excessive moisture, introduces outside air, keeps interior building air circulating, and prevents stagnation of the interior air. Targetmaster is a subline of the Transformers toyline that include Nebulan sidekicks who can transform into the Transformers' weapons. The first Targetmasters assortment, released in 1987, included six new characters, and five existing ones from the 1986 line, whose toys were slightly remolded with larger peg holes to hold their new weapons, as well as an additional peg hole for each remold to mount its weapon in vehicle mode. In 2003, one of the two Japanese-exclusive Targetmasters from 1987 was added to the Autobot ranks. Unfortunately, the Targetmaster weapon he shares with Decepticon Cyclonus, also share names. To further add to the confusion, the printed names of Stepper and Artfire's weapon/partners in Japan are swapped. Cyclonus's partner Nightstick is called Nebulon (the name Fracas is erroneously given on Scourge's box) and paired with Stepper. Scourge's partner Fracas is called Nightstick and paired with Artfire. The smaller Targetmaster partners were easily lost making them highly collectable and demand high prices on the secondary market. Looking for a great way to cut down on energy usage and also ensure more consistent access to hot water? Upgrading to a tankless water heater will save on energy and expenses compared to a traditional water heater ... Tankless water heaters use top-mounted water connections, avoiding the need for additional and costly plumbing. The kitchen is equipped with walnut cabinets providing a beautiful cooking space with stainless steel appliances ... head, and a 95 gallon two person jetted tub with an on board inline heater, and walk-in closet. But with stove and wood supplies reportedly exhausted, they’re purchasing electric heaters. About 600,000 electric heaters were sold in this year’s first half, up 35% from 2021’s pace, according to research firm GFK. The problem is, the German power grid might collapse if everyone turns on their electric heaters at the same time. Billy and MaryNixon now rent the space, having joined a long line of Chowan County residents that operated the legendary store ... The old butcher counter and scales still sits in the back of the store, while a decades-old bench rests in the center of the space, having sat perhaps hundreds of locals over the years. JOHN E. WEARE Keep AllianceBeautiful ... Some of the 65 trees planted since the family moved in on Oct ...Drip irrigation serves the plants where Angie has done her best to utilize space ... Angie starts plants in her greenhouse in January or February with heat mats and a heater if it’s “really cold.” She hopes to have a bigger greenhouse in the future ... ... . Charlotte is no New York when it comes to cost of living ... 1. FOOD ... 4 ... The restaurant’s bill for the natural gas that fuels its ovens and hot water heater has soared 85 percent since 2019 ... The restaurant’s bill for the natural gas that fuels its ovens and water heater has soared 85% since 2019 ... When his water heater gave out in 2021, he replaced it. NestorCortes navigated his final six innings without a run crossing the plate, but his slumping Yankees teammates never recovered from one big swing in the All-Star lefty’s initial frame ... “I have to tip my cap ... He goes up-and-in off the plate there with that heater, and Arozarena, to his credit, sold out to it and was able to keep it fair.” ... .... Or if you have access to a bulk propane tank (like what’s connected to your grill), Texport’s propane tree can fuel three gas-powered devices simultaneously — think lantern light, camp stove and tent heater — all from one supply, without having to swap connectors between them.Shelter. LEHI, Utah, Aug ... The act revives a 30% tax credit for qualifying consumers who install residential solar panels before the end of 2034, and includes other rebates and tax credits for installing energy-saving home equipment—heat pumps, electric HVAC, and electric water heaters—which will lower energy bills for millions of Americans ... About Lumio ... .... When families need to replace air conditioners, water heaters, or furnaces, they can save up to 30% with tax credits for efficient heating and cooling equipment that will save them hundreds of dollars on utility bills.Households can save up to 30% with tax credits for home... While the first Safety Notice was issued with regard to Helmets, Pressure Cookers and Cooking gas cylinders, the second Safety Notice was issued with regard to household goods including electric immersion water heaters, sewing machines, microwave ovens, domestic gas stoves with LPG etc. Start a Conversation. .
<urn:uuid:3e74f10a-de69-4802-ba99-9fc00350925a>
CC-MAIN-2022-33
https://wn.com/Space_heaters?from=spaceheaters.com
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00479.warc.gz
en
0.953544
1,159
1.921875
2
- slide 1 of 2 Most software developers market their product by providing fully functional but trial versions of the program. This helps potential customers understand how the product actually works and if it’s the features or options that suits their needs. Some software authors will provide a free version of the program with limitations such as, for personal use only or with limited options and features. Whether you are using a free or trial version of this type of software, use this buyer’s guide to security software as starting point before making a decision to subscribe or purchase any license - even if it's just for one year. - slide 2 of 2 One-Stop Software Guide Don’t want to compare many titles of security software? There’s no need to compare too many Internet security suite programs whether you want to use them at home or at the office. The all-in-one protection offered by most popular security vendors is considered the best choice, whether because of its price and good reputation in protecting from malware or protecting network security. A few choices are not enough to customers who are worried about prices or popularity but how the product will meet their requirements. Some security software is designed with basic features where others have advanced options. Comprehensive protection is the feature advanced users would like to use so check out the round-up found here! Coupons and discounted security software are what most people want simply because it will save them money. Some vendors offer rebates in the mail where others include bundling the software as free option when purchasing peripherals or a new computer. There’s no need to wait for the holiday season because there’s plenty of online stores providing discounts or great deals on all types of protection programs. Limiting the choices of an antivirus program may mean you only want to choose products that run on a Windows 7 operating system. The idea of choosing software that works on Windows 7 is great because it means the vendor is fast in developing protection software for business or end-users utilizing Windows 7 only. There are many choices on the list provided here so get a cup of coffee before reading. If you think Mac operating systems (OS) don’t need protection from malware or hackers, you're wrong. There are malicious programs that run on Mac OS and there are vulnerabilities in this operating system and its applications you should help prevent. It’s also responsible to use security software for a Mac if you are always connected to the Internet. Is your computer performing slow or sluggish after your resident antivirus program removed malware? The malicious software could still be residing in the background. Most traditional antivirus programs fail to remove advanced malware which means you need an advanced malware removal program. Learn all about Malwarebytes here. A dedicated program to check network security is also important, not only in a business environment but at home, as well. Wi-Fi auditing software will help detect vulnerabilities that hackers take advantage of. Remember that not all antivirus or security software provides Wi-Fi monitoring, but any of these programs in this buyer's guide will prevent attackers from gaining access to your network. Login credentials are quite important and need to be secured from hackers and this is why we have to keep passwords safe from being stolen. Using password manager software doesn't only save your password but keeps it stored in a highly encrypted database. Also, using KeePass allows you to access your passwords when using other computers. If you are looking for cloud-based antivirus protection for all the computers in your small business, give this program a try. It’s not only light on resources but provides fast protection against zero-day malware for mail servers, multiple PCs and Mac computers and file servers. It can also prevent attacks from zero-day vulnerabilities or exploits. Enterprise users should consider using OfficeScan that is designed to protect 100 or more computers, including virtual desktops. Check out the detailed review found here and to determine if you should immediately try out this softwares for evaluation or obtain a user license from the vendor. It’s important to note that OfficeScan does not only lower infection rates but also lowers management costs by 40 percent. When it comes to protecting home and networked computers, you will find Agnitum's Outpost Firewall Pro as recommended advanced firewall protection, simply because it does the job in preventing hackers in taking over your system. The program has passed several leak tests with flying colors. The price is right, especially if you obtain the family license. This popular firewall software vendor doesn't just offer security software for home users but also small and medium-size businesses. We really like the Web control feature in their protection tools because most malware is distributed in compromised websites. The computers in your network are protected 24/7 because the protection can’t be terminated by an unauthorized user. Backing up data is a method of securing data in the computer when an unexpected hardware failure occurs. You can always use the rsync command in Linux or UNIX but what happens to your backup copy if you’re not storing your backup to a remote server? Online backup should help you get back the system in no time. Securing a computer does not stop by simply using security software. You also need to make sure the operating system and applications are up-to-date. Patch management software should help check the network security from vulnerabilities. You’re going to save time in updating several computers when using this kind of security program. Antivirus and advanced firewall programs will prevent trojans, keyloggers and other types of malware from infecting your computer. However, not all antivirus programs will detect all types of keyloggers that can record and transfer your login credentials to remote computers. It’s time to use an anti-keylogging program to secure what you type in the browser, email client, online games and other applications in Windows.
<urn:uuid:edd8ecd1-1c2b-4ab2-9359-2a7d3d071a5c>
CC-MAIN-2017-04
http://www.brighthub.com/computing/enterprise-security/articles/124460.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00238-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927719
1,209
1.734375
2
Welcome to the UNECE Virtual Standards Helpdesk HLG-MOS Standards and Models The GSBPM describes and defines the set of business processes needed to produce official statistics. It provides a standard framework and harmonised terminology to help statistical organisations to modernise their statistical production processes, as well as to share methods and components. The GSIM is a reference framework of information objects, which enables generic descriptions of the definition, management and use of data and metadata throughout the statistical production process. It provides a set of standardized, consistently described information objects, which are the inputs and outputs in the design and production of statistics. As a reference framework, GSIM helps to explain significant relationships among the entities involved in statistical production, and can be used to guide the development and use of consistent implementation standards or specifications. CSPA builds on existing standards such as the GSBPM and the GSIM to create an agreed set of common principles and standards designed to promote greater interoperability within and between statistical organizations. It provides the “industry architecture” for official statistics. The GAMSO extends the GSBPM by covering all activities of a statistical organisation. Version 1.0 was approved for release by the HLG-MOS on 1 March 2015. The GSDEMs provide a standard vocabulary with common definitions and models to facilitate the sharing of information and best practices in the field of statistical data editing. Version 1.0 was approved for release by the HLG-MOS on 26 November 2015. Other Relevant Standards DDI is an initiative to create an international standard for describing data from the social, behavioral, and economic sciences. The DDI metadata specification now supports the entire research data life cycle. DDI metadata accompanies and enables data conceptualization, collection, processing, distribution, discovery, analysis, repurposing, and archiving. SDMX is an initiative to foster standards for the exchange of statistical information.
<urn:uuid:981bf4b6-34f0-4f57-a421-70bafec293c9>
CC-MAIN-2017-04
http://www1.unece.org/stat/platform/display/VSH/Virtual+Standards+Helpdesk
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00529-ip-10-171-10-70.ec2.internal.warc.gz
en
0.903925
395
2.3125
2
Since Hunter Education became mandatory for 12–15 year old and first-time hunters in 1988, there has been a 25% reduction in the rate of hunting-related shooting incidents. While hunting is safe in comparison to other common sports, each injury can cause extreme physical and emotional pain for the victim, the shooter, and their families. Hunter Education courses are designed to teach hunting safety, principles of conservation, and sportsmanship. A dedicated cadre of nearly 1,000 trained volunteer instructors works with 170 Conservation Police Officers to train over 14,000 students each year. From “Hunting & Trapping in Virginia, July 2013 – June 2014”, Page 10, published by the Virginia Department of Game and Inland Fisheries: Mandatory Hunter Education Hunter Education courses provide instruction in hunter safety, principles of conservation, and sportsmanship. The courses are composed of two sections: · Section 1 - Self-study. Each student is required to study course material prior to the classroom portion. · Section 2 - Classroom portion. Students will focus on safety and ethics. A written test will be given at the end of the class. Test questions will cover material from the classroom portion and from the self-study material. Courses are offered free of charge throughout the Commonwealth. Hunter Education Requirement You must complete an approved hunter education course and carry your certificate while hunting if either of the following apply: · You are 12–15 years of age. (You must complete hunter education but you do not have to carry your certificate if accompanied and properly supervised by a licensed · You are at least 16 years of age and you are hunting with your first hunting license. Virginia accepts and recognizes all states' and countries' hunting licenses and official hunter education credentials for the purpose of complying with mandatory hunter education requirements. These may be in the form of an identification card or certificate. Q: Is there a minimum age for taking a hunter education course? A: There is no minimum age for taking a hunter education course. The only requirement is that a person taking the course must be able to comprehend and retain the information learned. Since the course is required for all 12-15 year-old hunting license buyers, it is designed for those 12 years of age. Some instructors may require that younger children be supervised by an adult companion. It is recommended that all children under 12 be accompanied by an adult. Click on the logo to go to the VDGIF Hunter Education page Click on the box below to go to the VDGIF Class Locator page For more information you can also call the Hunter Education Coordinator at the nearest DGIF Regional office. Click on the phone below to find the nearest office As of July 1, 2013, Virginia has implemented a new, shorter hunter education course. Instead of 10 hours or more, the new course is 6–8 hours and includes interactive classroom activities and hands-on exercises by students to demonstrate safe firearm handling skills. Students are required to complete several hours of self-study prior to the class. Some material on the final test will be covered in the self-study material, but not during actual class time. To be sure of passing the test and receiving a certification card, the student must complete one of the self-study options! Click on the IHEA-USA logo below to go to the free on-line course Click on the box below to see the “Self-Study + Class”paid on-line course options On October 1, 2013, Virginia implemented a new "full-online" adult hunter education course. You must be a Virginia resident and 18 years of age or older to take this The adult full-online course has the same general content as the traditional classroom course and the "Self Study + Class" offer (above), but requires state specific information to be covered along with quizzes or tests in which the student must achieve a score of 90% or better to pass. Click on the link below to see the companies authorized to provide the adult full-online hunter education course for Virginia. These state-approved courses are commercially provided and are not administered by the Virginia Department of Game and Inland Fisheries. Please call the Virginia Department of Game and Inland Fisheries at 1-866-721-6911 Monday-Friday during business hours (except holidays) for replacement hunter education cards. There is a $10 fee for replacement cards. You will be requested to provide the following information: your full name, date of birth, approximate date (year or month/year) of class, and current mailing address. If your attendance can be verified, a duplicate card will be issued. Volunteer instructors are the backbone of the Virginia Hunter Education Program. They train about 14,000 students per year to be safe, ethical, knowledgeable hunters. Hunter Education volunteers are committed to training the next generation to be safe, knowledgeable and ethical participants in an enduring Virginia tradition. Many have had enjoyable hunting experiences and now say that they want to "give something back." If this describes you, please get in touch with the Department of Game and Inland Fisheries. It can be a very rewarding experience. There is a need for instructors, class organizers, and help with transporting materials. Since working with children and firearms is part of the program, all applicants must submit to a criminal background check. You must be 18 years of age and of good character to volunteer for this program. All Hunter Education instructors are required to complete an 18 hour training program to become certified. Anyone who wishes to become involved can contact the Regional Hunter Education Coordinator at the nearest regional VDGIF office (see the link above), or the State Coordinator, Sgt. David Dodson, at
<urn:uuid:e2b94195-251d-474f-a23a-26fb1bba9ca1>
CC-MAIN-2017-04
http://vahea.org/page12.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00530-ip-10-171-10-70.ec2.internal.warc.gz
en
0.921292
1,225
2.84375
3
A tornado is a violent, dangerous, rotating column of air which is in contact with both the surface of the earth and a cumulonimbus cloud or, in rare cases, the base of a cumulus cloud. Tornadoes come in many sizes but are typically in the form of a visible condensation funnel, whose narrow end touches the earth and is often encircled by a cloud of debris and dust. Most tornadoes have wind speeds between 40 mph (64 km/h) and 110 mph (177 km/h), are approximately 250 feet (75 m) across, and travel a few miles (several kilometers) before dissipating. Some attain wind speeds of more than 300 mph (480 km/h), stretch more than a mile (1.6 km) across, and stay on the ground for dozens of miles (more than 100 km). Although tornadoes have been observed on every continent except Antarctica, the vast majority of tornados in the world occur in the United States, and specifically, in the Tornado Alley region of the country. They also commonly occur in southern Canada, south-central and eastern Asia, the Philippines, east-central South America, Southern Africa, northwestern and southeast Europe, western and southeastern Australia, and New Zealand.
<urn:uuid:1cd9ea9a-0037-4c26-9097-59c611ad5c9a>
CC-MAIN-2017-04
http://www.recipeapart.com/incredible-f4f5-tornados-videos/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00284-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94479
257
3.765625
4
Dear Creatives, I hope you find somewhere to celebrate Earth Day today! Even just get into your yards, parks & beaches to experience nature, plant or care for them in some way! Earth Day is so important as a reminder to take care of our planet, our Mother Earth! Today I have a list of how you can be greener & take it beyond Earth Day. Yesterday I started my project of creating a butterfly feeder, today I am finishing it up & hoping to share it with you soon! Yes, even are insects are important to our eco system, as they are vital to keeping pollination thriving in our eco systems. Pollination is the process by whichpollen is transferred in the reproduction of plants, thereby enabling fertilization and sexual reproduction. Here is a round-up of ways you can help our planet & animals on Earth Day & beyond : - More about butterflies, making a butterfly feeder, monarch butterflies & a freebie printable. - I found this article of how to make a butterfly house out of a shoebox & think I may try it & thought you might be interested too! A great project to do with the kids! - Recycle your old blankets & faded towels to animal shelters! This is a great idea from Animal Planet for helping Animal Shelters on Earth Day! - 50 Ways of crafting with tin cans to re-purpose them all in one spot! & yes plenty are for the outdoors!
<urn:uuid:3bb0c786-325f-4c8c-843a-080f1ccc59fc>
CC-MAIN-2017-04
http://www.dearcreatives.com/beyond-earth-day-green-tips-link-up/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00518-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930219
298
2.390625
2
The nutritional status of children under 5 years old allows for Venezuela to be placed in the low or acceptable range, defined by the international parameters, such as in 1999 with 4.7% of underweight, 13.6% of stunting and 3% of wasting. From 1990-1999 there was a decrease in the prevalence of the weight for height ratio until 1993 and then it stabilised. However, indicators of weight for age and height for age, from 1993-97, showed a slight increase. The prevalence of overweight follows an inverse progression: increasing until 1993-94 and then stabilising by 1994 (2.9-3%). This indicates that the rates of wasting and overweight have stabilised, yet stunting, although marginal must be monitored. The areas more affected by the stunting and wasting in the poorest and less densely populated areas are Amacuro Delta (30%), Amazon (24%), followed closely by Worries (18%), and Bolivar (17%). These data have been collected from the System Monitoring of Food and Nutrition or SISVAN (a network of nutritional monitoring of the country operating at the level of the local health centres) by means of important amounts of data that are regularly collected. They show general tendencies and identify vulnerable areas. The national food consumption survey of 1981-82 shows significant disparities between the socioeconomic groups: the poorest generally have a smaller consumption of energy and consume less foods of animal origin. At the regional level, the Andean region consumes the least amount of energy, protein and fats. For adolescents, the distribution of the Body Mass Index (BMI) shows a satisfactory anthropometric state among females, whereas men had a tendency to be deficient. The average height and the BMI are negatively associated with socioeconomic levels. For adults from 20-50 years of age BMI did not show variations between sexes. Although, greater proportions of the BMI below 18.5kg/mē were found among younger adults, whereas older adults had a higher prevalence of overweight and obesity. Altogether, 5% of adults were chronically energy deficient and approximately 30% were overweight with a 6% rate of obesity. The tendency of obesity is an increasing phenomenon with rapid urbanisation in Latin America. It must be noted that data for adolescents and adults dates back to the 1980's, a period previous to the Venezuelan crisis. The main micronutrient deficiency is that of iron. Anaemia by iron deficiency predominantly affects the poor groups and the rural areas. The recent increase of anaemia between the urban populations is partly due to structural changes in food availability and in the deterioration of observed dietetic consumption patterns during the last decade. From 1999 Venezuela reached the indicators to be declared a country virtually free of Iodine Deficiency Disorders (IDD), after specifically fulfilling a program of salt iodisation and control of iodine in the urine among the scholastic population in organizations identified with goitre endemic (Andean Region. The indicated dimension of poverty for the food and nutrition situation of Venezuela is partly due to the result of the deterioration of the socioeconomic atmosphere that followed the petroleum crisis of the 1979: Inflation levels increased considerably whereas the spending power of the population decreased. Between 1990-96 the HDI decreased from 0.8210 to 0.6912 and 0.9628 to 0.4767.
<urn:uuid:f0028af8-1eee-4df0-ae9a-362af5957ab5>
CC-MAIN-2017-04
http://www.fao.org/ag/agn/nutrition/ven_en.stm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00359-ip-10-171-10-70.ec2.internal.warc.gz
en
0.934749
671
3.125
3
Johns Hopkins Psychedelic Legend Bill Richards In conversation w/ Mike Margolies Filmed October 3, 2019 in Baltimore, MD Premiered October 24, 2019 Bill Richards is a clinical psychologist who has been involved in psychedelic research since 1963. After the decades-long research shutdown, Bill helped to reinitiate it and spark the worldwide renewal as a founding member of the Johns Hopkins psychedelic research team, which just received $17 million to expand their efforts into the largest Center for Psychedelic Research in the world. Bill's psychotherapy research has included entheogens in the treatment of alcoholism, severe neuroses, narcotic addiction, and the psychological distress associated with terminal cancer, as well as their use in the training of religious and mental-health professionals. Bill is the author of Sacred Knowledge: Psychedelics and Religious Experiences. Bill sits down in conversation with Mike Margolies, Founder of Psychedelic Seminars. Mike is a community builder who has sparked and mentored Psychedelic Society groups around the world from Baltimore to San Francisco to Portugal. Mike is also Co-Founder of CryptoPsychedelic and former Co-Director of Psymposia. We talk about the parallel arcs of Bill's career and the movement, mystical experiences, what makes a good psychedelic therapist, and the concerns related to for-profit psychedelic business. Sponsored by A New Understanding: The Science of Psilocybin, available to watch for free Mentioned in this interview: Via Quartz: "A millionaire couple is threatening to create a magic mushroom monopoly" Subscribe for Updates! By clicking the button below, you consent to subscribe your email address to our marketing campaigns.
<urn:uuid:27127f70-9d22-400c-83ec-49071e3cbcfa>
CC-MAIN-2022-33
https://www.psychsems.com/episodes/johns-hopkins-psychedelic-legend-bill-richards
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00065.warc.gz
en
0.942113
361
1.5625
2
Every year I hear about people who can’t afford Christmas presents. As much as Christmas isn’t about presents, it’s still hard for those that don’t have the extra to pay for gifts and can be quite depressing. For others though, being Thrifty doesn’t stop during the holidays and many look for ways to save money by making gifts at home. Here are some ideas for you crafty and Thrifty divas. 1. Coupon book Make coupons that you can give to your loved ones that represent some action that they can use later. For example, wives can give their husband a coupon that says, “good for your favorite meal.” The possibilities are endless for this. Just get creative. 2. Baked goods Some of us like to give everyone we know a little gift, but this can be quite costly. However, a tin of cookies can be just as welcomed as a gift from Macy’s. I love when neighbors show up at my door with fresh baked banana bread or soft ginger molasses cookies. Homemade hot chocolate mix is another great idea. For just a few dollars you can make several to give as gifts. It’s a gift that warms the heart and the belly. 3. Play dough So many of us have this popular item on our Christmas list. But you can make it at home for a fraction of the cost. Then when your son or daughter leaves it out and it dries, just make some more. 1 cup flour 1/2 cup salt 1 cup water 1 Tablespoon vegetable oil 2 teaspoons cream of tartar Food coloring by drops Place contents in a pan and stir. Cook over low heat, stirring until a ball forms. Add food coloring and mix thoroughly until desired color. Cool on foil. Store in covered container. If you are a good cook and someone who is always being asked for recipes, then this tip is for you! Surprise those people that love your food so much with a cookbook with all your favorite recipes with it. Even if you type it up and print it yourself, they will love it. Get creative by decorating it and making it personal. 5. Give the gift of yourself This is especially important to the elderly. My husband’s grandmother has everything she could ever want, but if you were to ask her something she would like for Christmas, her answer would be, “a visit from you.” It’s free, and it’s something you or the person will never forget. 6. Pictures of your kids This is the gift that every grandparent wants. Most places charge around $.06-$.10 per 4×6 print. This can be a very affordable gift and will make grandma very happy. 7. Homemade laundry soap. We showed you how to make these a while back. Check out the link here. It’s easy, cheap and people will appreciate you taking the time to make it. Plus you can get really creative with how you present it. Do you make any homemade gifts? Tell us about them. Spread The Word! Sorry, the comment form is closed at this time.
<urn:uuid:ff69144c-f6ac-4524-a72a-f04c9cfa6839>
CC-MAIN-2016-44
http://thriftydivas.com/homemade-christmas-gifts/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720026.81/warc/CC-MAIN-20161020183840-00457-ip-10-171-6-4.ec2.internal.warc.gz
en
0.960761
672
1.65625
2
This is a great essay by Barry Schwartz, psychologist and professor of social theory and social action at Swarthmore College, and author of The Paradox of Choice: Why More is Less (2003) and Practical Wisdom: The Right Way to Do the Right Thing (2010), among others. The world is a complex and subtle place of which we are an integral part. In order to be able to understand and improve it, we need to pay sustained attention to it, i.e. we need to think long and hard about it – in short: we need to concentrate. Alas, there is little doubt that attention keeps diminishing, and too many educators cater to shortening attention spans rather than cultivating sustained attention, which creates a self-fulfilling prophecy. Schwartz’ key premise is that sustained attention is a skill that can be taught and practiced, just like a muscle can be trained to lift heavier weights. He cites research which shows that perseverance – aka grit – ‘is a better predictor of academic success than IQ or SAT scores.’ The practice of honors education as transdisciplinary and transformative global education focused on cultivating global competence to do justice to a complex and interdependent world and to understand and respond to global challenges seeks to cultivate the kind of sustained attention that Schwartz has in mind. Some key excerpts (with my highlights) There is no doubt that “diminished attention” is a correct diagnosis of the intellectual temperament of our age. I see it to a greater degree each year even in the students I teach, who are among the very best that our high schools have to offer. But how to treat it? Again and again, we are told in this information-overloaded digital age, complex and subtle arguments just won’t hold the reader’s or viewer’s attention. If you can’t keep it simple and punchy, you’ll lose your audience. What’s the point of having a New York Times article about the U.S. stance toward the Syria that continues on an inside page if nobody is going to turn to the inside page? Even talking about “inside pages” is anachronistic, since more and more people get their news online, with articles that are “up-to-the-minute” but frustrating in their brevity. By catering to diminished attention, we are making a colossal and unconscionable mistake. The world is a complex and subtle place, and efforts to understand it and improve it must match its complexity and subtlety. We are treating as unalterable a characteristic that can be changed. Yes, there is no point in publishing a long article if no one will read it to the end. The question is, what does it take to get people to read things to the end? The key point for teachers and principals and parents to realize is that maintaining attention is a skill. It has to be trained, and it has to be practiced. If we cater to short attention spans by offering materials that can be managed with short attention spans, the skill will not develop. The “attention muscle” will not be exercised and strengthened. It is as if you complain to a personal trainer about your weak biceps and the trainer tells you not to lift heavy things. Just as we don’t expect people to develop their biceps by lifting two-pound weights, we can’t expect them to develop their attention by reading 140-character tweets, 200-word blog posts, or 300-word newspaper articles. In other words, the “short-attention” phenomenon is something of a self-fulfilling prophecy. First, we tell ourselves that people can’t maintain attention. Second, we do nothing to nurture their ability to maintain attention. And sure enough, we “discover” that people can’t maintain attention. […] The world is complex, and it isn’t going to get any simpler. Unless we can create a population that is capable of thinking about complexity in complex ways, it is highly unlikely that the problems of global warming; economic inequality; access to affordable, high-quality health care; or any of the other challenges the U.S. and the rest of the world face will get adequate solutions. Good solutions to any of these problems will be complex, and they will not win support from a population that demands simplicity. Teachers have a responsibility to train complex minds that are suited to a complex world. This is at least as important as teaching young people mathematics, biology, or literature. For teachers, at all levels, attention must be paid to teaching that attention must be paid. [read the entire essay]
<urn:uuid:c1dd4ab2-8071-4a28-8fc7-6cbec17dbe52>
CC-MAIN-2017-04
http://honorsadvising.blog.wku.edu/2013/09/23/attention-must-be-paid-to-a-complex-and-subtle-world-it-can-be-taught-and-learned/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00383-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948379
969
2.546875
3
OBJECTIVE This study was targeted at ascertaining the efficacy of antisense oligonucleotide-formulated microspheres to prevent type 1 diabetes and to reverse new-onset disease. recipients were pulsed with -cell antigen or ovalbumin or cocultured with allogeneic splenocytes. RESULTS The microspheres prevented type 1 diabetes and, most importantly, exhibited a capacity to reverse clinical hyperglycemia, suggesting reversal of new-onset disease. The microspheres augmented Foxp3+ Treg cells and induced hyporesponsiveness to NOD-derived pancreatic -cell antigen, without compromising global immune responses to alloantigens and nominal antigens. T-cells from successfully treated mice suppressed adoptive transfer of disease by diabetogenic splenocytes into secondary immunodeficient recipients. Finally, microspheres accumulated within the pancreas and the spleen after either intraperitoneal or subcutaneous TTK injection. Dendritic cells from spleen of the microsphere-treated mice exhibit decreased cell surface CD40, CD80, and MP470 CD86. CONCLUSIONS This novel microsphere formulation represents the first diabetes-suppressive and reversing nucleic acid vaccine that confers an immunoregulatory phenotype to endogenous dendritic cells. Type 1 diabetes is usually a disorder of glucose homeostasis caused by a chronic autoimmune inflammation of the pancreatic islets of Langerhans (1). The ultimate outcome is the loss of insulin-producing cells to figures below a threshold that is critically required to maintain physiological glucoregulation. Before this threshold, however, escalating inflammation around (peri-insulitis) and in the islets of Langerhans (insulitis) first renders the insulin-producing -cells insensitive to glucose and incapable of appropriate insulin production mainly due to the actions MP470 of cytokines like interferon- (IFN-), tumor necrosis factor- (TNF-), and interleukin (IL)-1 (2,3). On clinical confirmation, a large number of type 1 diabetic patients still exhibit evidence of residual -cell mass that, for a limited time, is usually functionally responsive to glucose and produces insulin (the so-called honeymoon period) (4). In fact, patients with a residual -cell mass manifest better glycemic control and improved prognosis for diabetic complications including retinopathy and MP470 nephropathy. These observations have compelled investigation into agents that can be used at the time of clinical diagnosis to preserve residual -cell mass primarily by intervening with the ongoing autoimmunity. The use of pharmacological systemic immunosuppressive drugs met with initial success in controlling autoimmunity, however, on withdrawal, the autoimmunity recurred, indicating that systemic brokers would need to be administered long-term using their associated undesireable effects (5,6). Recently, scientific reversal of hyperglycemia continues to be attained by anti-CD3 antibody administration, even though some queries linger regarding system of actions in the transient immunodepletion and linked cytokine-related unwanted effects (7,8). Finally, regardless of the preliminary observations in adults, administration of the peptide produced from HSP60 into new-onset diabetic kids failed to display any benefit weighed against control topics (9,10). A want therefore remains for the diabetes-suppressive immunotherapeutic agent that will not engender non-specific systemic immunosuppression. It really is generally recognized that the original influx of infiltrating immune system cells in type 1 diabetes immunopathogenesis comprises generally of antigen-presenting cells homing in to the islets in response for an as-yet-unidentified microenvironmental anomaly (11). While not solved mechanistically and temporally totally, this anomaly, within a chronic procedure, compels migratory antigen-presenting cells, & most dendritic cells prominently, to obtain -cell-resident antigens produced from apoptotic and/or necrotic -cells. The migratory dendritic cells after that go through an intrinsic maturation plan that makes them with the capacity of activating T-cells (including autoreactive, -cell-specific T-cells) because they accumulate in the draining pancreatic lymph nodes (12-14). Dendritic cells, nevertheless, have got the capability to activate and keep maintaining immunoregulatory also, suppressive cell systems. Apparently, these are regulatory when in circumstances of useful immaturity (15-17). Useful immaturity could be conferred to dendritic cells partially by downregulating costimulatory pathways using systemic and molecule-specific strategies (18). Numerous research have verified that exogenous administration of functionally immature dendritic cells can assist MP470 in allograft survival and will also prevent autoimmune disease and its own recurrence (18). We’ve proven that administration of dendritic cells from NOD mice with low-level appearance of Compact disc40, Compact disc80, and Compact disc86 (induced by ex vivo treatment with antisense oligonucleotides concentrating on the 5 ends from the particular principal transcripts) into syngeneic recipients can significantly delay and stop the starting point of disease (19,20). This process is now within a stage I scientific trial where autologous dendritic cells produced in vitro from leukapheresis products are being administered to established type 1 adult patients to determine security (M.T. and N.G., personal communication; FDA IND BB-12858). Despite the promise of this study, we have encountered cumbersome logistical requirements to generate these dendritic cell embodiments. We are concurrently pursuing an alternative method to stabilize dendritic cell immaturity directly in vivo. Many. June 15, 2017Main
<urn:uuid:07929267-1129-4476-9210-a6947b361e9c>
CC-MAIN-2022-33
https://tas-102.net/objective-this-study-was-targeted-at-ascertaining-the-efficacy-of-antisense/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00479.warc.gz
en
0.889963
1,190
1.9375
2
Jupiter, which takes its name from the father of the gods in ancient Roman mythology, is the largest planet in our Solar System. It also has the most moon’s of any solar planet – with 50 accounted for and another 17 awaiting confirmation. It has the most intense surface activity, with storms up to 600 km/h occurring in certain areas, and a persistent anticyclonic storm that is even larger than planet Earth. And when it comes to temperature, Jupiter maintains this reputation for extremity, ranging from extreme cold to extreme hot. But since the planet has no surface to speak of, being a gas giant, it’s temperature cannot be accurately measured in one place – and varies greatly between its upper atmosphere and core. Currently, scientists do not have exact numbers for the what temperatures are like within the planet, and measuring closer to the interior is difficult, given the extreme pressure of the planet’s atmosphere. However, scientists have obtained readings on what the temperature is at the upper edge of the cloud cover: approximately -145 degrees C. Because of this extremely cold temperature, the atmosphere at this level is composed primarily of ammonia crystals and possibly ammonium hydrosulfide – another crystallized solid that can only exist where conditions are cold enough. However, if one were to descend a little deeper into the atmosphere, the pressure would increases to a point where it is ten times what it is here on Earth. At this altitude, the temperature is thought to increase to a comfortable 21 °C, the equivalent to what we call “room temperature” here on Earth. Descend further and the hydrogen in the atmosphere becomes hot enough to turn into a liquid and the temperature is thought to be over 9,700 C. Meanwhile, at the core of the planet, which is believed to be composed of rock and even metallic hydrogen, the temperature may reach as high as 35,700°C – hotter than even the surface of the Sun. Interestingly enough, it may be this very temperature differential that leads to the intense storms that have been observed on Jupiter. Here on Earth, storms are generated by cool air mixing with warm air. Scientists believe the same holds true on Jupiter. One difference is that the jet streams that drive storms and winds on Earth are caused by the Sun heating the atmosphere. On Jupiter it seems that the jet streams are driven by the planets’ own heat, which are the result of its intense atmospheric pressure and gravity. During its orbit around the planet, the Galileo spacecraft observed winds in excess of 600 kph using a probe it deployed into the upper atmosphere. However, even at a distance, Jupiter’s massive storms can be seen to be humungous in nature, with some having been observed to grow to more than 2000 km in diameter in a single day. And by far, the greatest of Jupiter’s storms is known as the Great Red Spot, a persistent anticyclonic storm that has been raging for hundreds of years. At 24–40,000 km in diameter and 12–14,000 km in height, it is the largest storm in our Solar System. In fact, it is so big that Earth could fit inside it four to seven times over. Given its size, internal heat, pressure, and the prevalence of hydrogen in its composition, there are some who wonder if Jupiter could collapse under its own mass and trigger a fusion reaction, becoming a second star in our Solar System. There are a few reasons why this has not happened, much to the chagrin of science fiction fans everywhere! For starters, despite its mass, gravity and the intense heat it is believed to generate near its core, Jupiter is not nearly massive or hot enough to trigger a nuclear reaction. In terms of the former, Jupiter would have to multiply its current mass by a factor of 80 in order to become massive enough to ignite a fusion reaction. With that amount of mass, Jupiter would experience what is known as gravitational compression (i.e. it would collapse in on itself) and become hot enough to fuse hydrogen into helium. That is not going to happen any time soon since, outside of the Sun, there isn’t even that much available mass in our Solar System. Of course, others have expressed concern about the planet being “ignited” by a meteorite or a probe crashing into it – as the Galileo probe was back in 2003. Here too, the right conditions simply don’t exist (mercifully) for Jupiter to become a massive fireball. While hydrogen is combustible, Jupiter’s atmosphere could not be set aflame without sufficient oxygen for it to burn in. Since no oxygen exists in the atmosphere, there is no chance of igniting the hydrogen, accidentally or otherwise, and turning the planet into a tiny star. Scientists are striving to better understand the temperature of Jupiter in hopes that they will eventually be able to understand the planet itself. The Galileo probe helped and data from New Horizons went even further. NASA and other space agencies are planning future missions that should bring new data to light.
<urn:uuid:e62b24df-dbcf-4cd7-bbbb-0e242177c24b>
CC-MAIN-2017-04
http://www.universetoday.com/15097/temperature-of-jupiter/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00558-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959303
1,042
3.921875
4
MOV is what's inside a lot of small "surge supressors" in a sturcture having a multi-grain ceramic semiconductor. It has a rather high resistance until the voltage gets over a threshold, at which time the resistance drops (but not to zero). - Wide operating voltages ranging from 5Vrms to 1000Vrms (6Vdc to 1465Vdc). - Fast response time of less than 25nS, instantly clamping the transient over voltage. - High surge current handling capability. - High energy absorption capability. - Low clamping voltages, providing better surge protection - Low capacitance values, providing digital switching circuitry protection. - High insulation resistance, preventing electric arching to the adjacent devices or circuits. - Transistor, Diode, IC, Thyristor or Triac semiconductor protection. - Surge protection in consumer electronics. - Surge protection in industrial electronics. - Surge protection in electronic home appliances, gas and petroleum appliances. - Relay and electromagnetic valve surge absorption. The Prevention of Overvoltage Varistor with high resistance allows only very small electrical current passing through.The current is so called leakage current. When surge current happened, the resistance of varistor suddenly dropped to few ohm. With such low resistance, it allows the surge current passing through and further protects other devices that parallel with Varistor. It is so called breakdown phenomena.
<urn:uuid:c47c0b39-2f60-4c60-81e0-e7e6bde4a3b9>
CC-MAIN-2017-04
https://www.industrysearch.com.au/metal-oxide-varistors-movs/p/9500
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00160-ip-10-171-10-70.ec2.internal.warc.gz
en
0.836025
301
3.03125
3
Vehicles equipped with antilock brakes, or ABS, rely on a system consisting of brake pads and rotors working in conjunction to slow and eventually stop the vehicle. Brake components found in disrepair should be replaced immediately to ensure proper functioning brakes. During routine brake maintenance, check the brake pads, rotor and brake fluid levels. Choose to have the brakes repaired by a professional brake mechanic or save money and time by doing it yourself. Things You'll Need - Turkey baster - Shop rag - Lug wrench - Jack stands - Wrench or socket and ratchet - Bungee cord - Flat screwdriver - Phillips-head screwdriver - Brake cleaner - Wire brush - Cloth towel - Brake pads - Brake grease (anti-squeal, copper-based) - Brake fluid Pop the hood and move to the front of the vehicle. Lift the hood and remove the master cylinder cap. The cap sits commonly just to the left or right of the vehicle's engine. Siphon half to three-quarters of the brake fluid from the reservoir with a turkey baster or syringe. Place a shop rag over the master cylinder. Loosen the lug nuts on the wheels of the brakes set for repair with the lug wrench. Place the jack beneath the frame near the wheel and lift the vehicle's tires off the ground. Place jack stands under the axles and lower the vehicle onto the stands. Remove the lug nuts and take the wheel/tire off. Locate the caliper pins on the back side of the caliper. The pins are commonly located near the upper edge of the calipers inward side. Remove the pins with a wrench or socket and ratchet. Consult the vehicle repair manual for specific socket size. Lift the caliper from the brake rotor. Remove the brake pads from the sides of the caliper. Pry the clips on the back of the pads with a flat screwdriver. Suspend the caliper above the wheel hub by a bungee cord or rest it on top of the steering arm. Do not allow the caliper to hang by the brake line. Remove the rotor retaining pin on the outside of the brake rotor (if present on your vehicle). Grab the sides of the rotor and pull the disc straight from the wheel hub. Clean the area behind the rotor with brake cleaner and wire brush. Remove the new brake rotor from its packaging and clean the disc thoroughly with brake parts cleaner and a clean cloth towel. Slide the rotor onto the vehicle's wheel bolts and replace the retaining pins (if present on your vehicle). Force the brake caliper piston into the side of the caliper with a pair of channel lock pliers. The piston is the ring that extends from the inside of the caliper. The piston is responsible for forcing the brake pads against the rotor during braking and needs to be fully depressed within the side of the caliper to make room for the thicker brake pads and rotor. Apply anti-squeal brake compound (copper-based) to the back sides of the new brake pads. Slide the new brake pads onto the sides of the caliper. Return the caliper onto the rotor and screw in the caliper pins by hand before tightening them with the wrench or socket and ratchet. Replace the wheel onto the vehicle's wheel bolts and screw on the lug nuts by hand. Lift the vehicle with the jack and remove the jack stands. Lower the tires to the ground and tighten the lug nuts with the lug wrench. Repeat steps 3 through 10 for each additional brake that requires repair. Move to the inside of the vehicle. Start the vehicle's engine. Press the brake pedal to the floor and release the pedal slowly. Repeat the depressions until the brake pedal response returns to normal stiffness. Move back to the vehicle's engine compartment. Remove the shop rag from the master cylinder and insert a funnel into the reservoir. Add brake fluid to the master cylinder as necessary. Remove the funnel and replace the master cylinder cap. Close the hood. How to Change Brake Pads on an ABS Car Concerns about changing the pads on an ABS-equipped vehicle include damage to the modulator valve assembly due to debris in the system,... How to Fix Sticking Brake Calipers Brake calipers hold the brake pads and force them against the brake rotors when you push on the brake pedal. The calipers... How to Repair ABS Plastic You’ll often find ABS, a rigid form of plastic, as trim on motorcycle or car bodies and RV holding tanks, as well... How to Troubleshoot ABS Brake Problems ABS brakes work with the braking system in a vehicle to help maintain control if there should be an emergency situation such... How to Reset a C320 Brake & Service Message Every model year of the Mercedes-Benz C320 is equipped with an onboard computer that tracks various conditions within the vehicle. Two of... How to Repair ABS Brakes on a GMC Sierra 1500 The ABS brakes on the GMC Sierra 1500 are comprised of brake pads, rotors and caliper pistons. Each of the components should... Do It Yourself Home Appliance Repairs Consider three key factors in do-it-yourself appliance repair that apply to any appliance you might work on, regardless of brand or type....
<urn:uuid:e4fc470d-d283-49a3-bc4b-0ef93d52d088>
CC-MAIN-2017-04
http://www.ehow.com/how_7870631_repair-abs-brakes.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00447-ip-10-171-10-70.ec2.internal.warc.gz
en
0.899537
1,107
2.25
2
With data centre infrastructure evolving to meet the changing needs of end users – including the incorporation of IoT devices – data centre managers can no longer rely on basic cabling testing. It’s critical that they have the tools available to be able to test and troubleshoot issues quickly, to ensure Business Continuity. Lisa Schwartz, Director of Business Development and Product Marketing at AEM, talks us through some of the challenges data centre teams are encountering and how they can ensure they have a comprehensive testing strategy that meets users’ growing demands. Why must businesses always be on the lookout for ways to improve data centre (DC) performance and reliability? Because data centres must constantly evolve to meet the growing needs of the businesses they serve. If a business fails to keep this in mind it will be very problematic when the growth surpasses the capacity of the data centre. Why are data centre trends that leverage power over Ethernet (PoE) for various IoT purposes on the rise, and what’s the impact? There are many smart building IoT devices such as access controls, sensors, lighting and cameras which require reliable data and power connections and these requirements place more demand on the data centre. What challenges does the varied layout of data centre plants create in terms of cabling requirements and troubleshooting? There are three typical layouts for data centre plants – centralised, End of Row (EOR) and Top of Rack (ToR). Centralised layout is typical in a small or older data centre. The under-floor or overhead cabling pathways can become overwhelmed and removing/replacing cabling can be difficult. Re-use of cabling can be confusing without first determining if the existing cable will support a new application. End of Row (EOR) layout addresses some of the cabling overload issues by placing switches at the end of each row, reducing the amount of centralised cabling, but congestion can still occur at the network rack depending on the size of the row. Proliferation of IoT devices can compound the cabling congestion. Testing capability beyond physical layer certification is a must. Top of Rack (ToR) layout, while being the most modern, is not without challenges. Many more switches are required, which adds complexity and cost. Problems can arise if a ToR switch becomes full and a NetOps admin connects a server to a switch in an adjacent rack in the interest of saving time instead of expanding the port capacity on the rack, leading to cabling having to be manually traced to determine to which switch a server is connected. The ability to get quick switch detail including slot/port/VLAN to understand connection path should be considered a requirement. Can you outline a few common use-cases that show common types of cable and network challenges that data centre administrators face – as well as what tools/ techniques can be used to solve them? Use-case 1: A PoE device is not functioning properly Being able to perform a PoE load test at the endpoint where the device connects can confirm if power is adequate when under load. The test equipment demands the power from the PSE, if power is insufficient at the endpoint, then the same test can be performed directly into the switch port to determine if that is the culprit. The test can be useful in determining if a switch port is the issue, the cabling is the issue or even if a low-quality patch cord inadvertently connected in the channel is an issue. Being able to also measure data centre resistance and resistance unbalance, in addition to a PoE load test, can be useful in this situation. Use-case 2: A user cannot connect to a resource or to the Internet Having test equipment which can analyse the switch connection to determine if the link is connected to the correct switch, port and VLAN can be used to find issues which crop up, for example, when a server in a Top of Rack layout has been incorrectly connected to a switch on an adjacent rack. Ability to also perform Ping, Traceroute and TCP Connection testing can further assist in situations like this. Use-case 3: Ports or cables mislabelled or missing labels can lead to problems Having the ability to trace wiring through tone generation and probe, multiple remote IDs on a qualifier or running a switch detail test can aid in the determination of where a given cable has been connected. Having a labelling tool on-site to correct these situations is also another must-have. If the test equipment being used and the portable printer being used can share a common Excel file-based labelling scheme, this can further be a big time saver and avoid errors. How must modern data centres evolve to meet the requirements of leading technologies such as Intelligent Buildings? Modern data centres should be planned with growth in mind, not just expected/planned growth, but allowing for unexpected/unplanned growth and changes in technology, especially in light of the proliferation of IoT connected devices as part of a smart building initiative. How have testing needs evolved to keep pace with the assurance of deployment stability and uptime? No longer can those managing data centres rely on cable testing, be it certification or qualification of the cabling. As more demand is placed on the data centre, it is critical to have test equipment that can perform the physical cable testing as well as wired/wireless connectivity testing, Multigigabit SNR measurements, PoE load testing to determine power at the endpoint at a minimum and having the ability to expand the range of testing to include emerging technologies such as Single Pair Ethernet provides assurance that the data centre can support the applications on the horizon. How can organisations ensure they have a strategy for troubleshooting and testing? Provide those responsible for maintaining the data centre with the proper tools and test equipment and ensure they are trained in how to use it to assure the current and future applications can be supported. Having the right multifunction test solution in place will also help to find problems quickly when they arise and periodically test the infrastructure to make sure it can continue to support these applications down the road as demands on the data centre increase.Click below to share this article
<urn:uuid:a0750b5d-a836-4664-b4fb-114a87785583>
CC-MAIN-2022-33
https://www.intelligentdatacentres.com/2022/07/21/creating-a-data-centre-testing-strategy-to-address-increased-infrastructure-demands/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00676.warc.gz
en
0.920187
1,246
1.835938
2
MEULI Family Tree and MEULI Genealogy Records Register yourself as a MEULI researcher This is the surname research page for MEULI. This section is designed to contain general information about MEULI genealogy research. Please consider adding some of your own research, either as an editor or with journals below. MEULI Family History and MEULI Family Genealogy Journals by ngairedith on 2012-10-09 07:01:59. page views: 1580, comments: 0 by ngairedith on 2011-06-18 00:16:43. page views: 1204, comments: 0 by ngairedith on 2010-03-12 22:18:31. page views: 2305, comments: 0 by ngairedith on 2009-07-05 02:41:38. page views: 1306, comments: 0
<urn:uuid:0c18dceb-327f-45b1-8a19-3cde3d20f6a0>
CC-MAIN-2016-44
http://www.familytreecircles.com/surname_MEULI.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00075-ip-10-171-6-4.ec2.internal.warc.gz
en
0.782658
189
1.640625
2
The New York State Department of Environmental Conservation (DEC) has announced a special opportunity for public use of three Wildlife Management Areas (WMA) in Jefferson and St. Lawrence counties from Saturday, Aug. 14 through Sunday, Aug. 29. During the 16-day period, Upper and Lower Lakes WMA in St Lawrence County, including wetland-restricted areas, will be open to visitors. Wilson Hill WMA, also in St. Lawrence County, will be open to visitors except for areas near the New York Power Authority-sponsored construction projects, as construction activity continues. For most of the year, these wetlands are off limits to the public to provide feeding and resting areas for migratory waterfowl. The restricted wetland areas are also used by a number of New York State’s endangered, threatened, and rare species including bald eagles, black terns, and northern harriers (marsh hawks), among others. By late August, the nesting and brooding season is mostly complete and the fall migration period has not yet begun, enabling DEC to allow public access. Upper & Lower Lakes WMA is located about two miles west of the village of Canton along state Route 68 in St. Lawrence County. This WMA, the largest in the region, is an 8,770-acre upland/wetland complex between the Grasse and Oswegatchie rivers. Wilson Hill WMA is located six miles west of the village of Massena off state Rt. 37. Situated along the St. Lawrence River, the 3,434-acre area consists of several large pools of open water marsh, bordered by a combination of dense cattails, brushy wetlands, forest, and upland meadow. For additional information, bird lists, and maps, contact DECs Regional Wildlife Office at 785-2261 or visit www.dec.ny.gov/outdoor/8282.html.
<urn:uuid:e0d0169d-26d8-4cf5-8c3b-c7a69ffaf411>
CC-MAIN-2017-04
http://northcountrynow.com/featured_events/wilson-hill-and-upper-lower-lakes-areas-open-public-two-weeks-starting-saturday-0679
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00254-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937575
401
1.984375
2
Menachem Begin on Israeli Chauvinism and Aliya subjects:Foreign Policy - American Jewry, Israel-U.S. Relationship. Israeli-Palestinian Conflict - Arabs of Israel, Jewish Majority, Palestinians. Security - Army, Six-Day War. Diaspora - Diaspora Jewry, Jewish Communities (abroad), Zionist Organization. States - France, USA. Political Parties - General Zionists. Greater Land of Israel - Greater Israel, Settlements. Jewish Nationality , Nationalism , Aliyah - Return to Zion Excerpts from a speech Begin gave at the World Conference of Zionist leaders after the Six Day War. Begin questions why the conference has not properly addressed the "urgency of the revolutionary hour" after the Six Day War, when Israel's existence was threatened by the massive build-up of Arab Armies on its borders and won a great victory, taking back the land of Western Eretz Israel. He questions those who accuse Zionists of 'chauvinism' when Frenchmen and Poles are allowed to love their lands and express joy that they have reclaimed lost territory. Begin then says that although Israel has a large Jewish majority, a mass aliyah from countries like the USA is necessary to maintain that majority. Israel's future depends on such an aliyah.
<urn:uuid:e9f50f4c-33da-4216-b457-18bd844c7dd6>
CC-MAIN-2022-33
https://db.begincenter.org.il/en/article/menachem-begin-on-israeli-chauvinism-and-aliya/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00677.warc.gz
en
0.894595
275
2.21875
2
The Museum launches a new spring season with its annual Barnyard Break Foodology. Did you know 2016 is the International Year of Pulses? Demonstrations this year include: Cooking with Pulses, Butter Making 101, The Science of Maple Taffy and various animal demonstrations. Additionally, young visitors can listen to a classic children’s story and get creative with a pulse-themed craft. On March 12, don’t miss a special demonstration from the McGill University Woodsmen Team. So come for a fascinating experience at the Museum this March Break! Saturday March 12 ONLY Special demonstrations - McGill University Woodsmen Team Demonstration (11:00 and 1:30) - Small Animal Barn Classroom Want to see wood chips fly? Come join us to watch lumberjacks and jills demonstrate traditional woodsmen activities such as wood chopping and sawing. This demonstration showcases Canada’s rich history in forestry as celebrated by a whole new generation of lumberjacks. This is a great outdoor event for the whole family not to be missed! All about Milk (10:30 a.m.) Visitors are invited to discover how a modern milking machine works as well as how this technology has evolved. Using the demonstration milk house along with Millie, our fiberglass cow, a knowledgeable guide will explain where the milk that Canadians drink comes from. Does a milking machine require a great deal of suction? Visitors can see for themselves if they’re curious enough to put their fingers in a functioning teat cup. Cow Care (2:00 p.m.) Most people have a pretty good idea of how to care for a dog or a cat but do many know what it takes to care for a cow? Or for that matter, an entire herd of them? Join a guide to learn about how the cows are cared for at the Museum from the time they are calves until well into their milking lives. Discover new and interesting objects and see if you can figure out how they are used in caring for the dairy cows. Afternoon Milking (4:00 p.m.) The milking of the Museum’s dairy cows takes place twice daily. Over the course of this demonstration, visitors will be impressed by the technologies used in modern dairying as they see the herdspeople milk the entire herd. A Museum guide will be on site to explain the process and to answer questions. Small Animal Barn Rabbit Care (9:30 a.m.) Even though rabbits are usually considered to be pets, they are often raised on farms for their meat and pelts. Visitors will be able to learn interesting details about the life cycle of rabbits and how they are cared for. Additionally, there will be the opportunity to meet and pet one of the Museum’s resident rabbits. Meet the Sheep and Goats (11:30 a.m.) Ewes, does, rams, bucks, lambs and kids. Which are the sheep and which are the goats? Visitors are invited to learn more about these farm “cousins” and all the products they provide for us from milk to meat to fibres. Meet the Horses (3:00 p.m.) Caring for horses includes grooming, feeding, training and socialization. Join a Museum guide to learn about what it takes to keep our horses healthy and strong while discovering interesting facts about them. Pulse Power! – International Year of Pulses! (10:00 a.m. and 1:30 p.m.) Come to the demonstration kitchen and meet some of the food superheroes you might not have known were hiding in your pantry – pulses! Lentils, chickpeas, and dried beans and peas pack a lot protein and fibre and they’re versatile enough to include in recipes from soups and dips to desserts and sweets. Visitors may also be surprised to learn that Canada is a significant producer of pulses and that these seemingly exotic foods are grown in many places throughout the country. Recipes to download (pdf) Cooking with Maple Syrup (11:00 and 2:30) Did you know Canada produces 85% of the world’s maple syrup! Join us in the demonstration kitchen to help prepare delicious treats made with this golden syrup. Also, learn some interesting facts about maple syrup. Butter Making 101 (12:00 p.m.) High school chemistry gets a tasty twist with this interactive demonstration. Do you think you could turn a homogenous mixture into a heterogeneous one? How about inverting an emulsion? By making butter, you are actually doing both! Who knew! All this learning will likely make you hungry, so we’ll be serving samples too… Small Animal Barn Classroom The Science of Maple Taffy (10:15 a.m., 11:15 a.m., 1:15 p.m., and 3:15 p.m.) There are very few things that mark this time of year quite as sweetly as maple taffy. Visitors will be able to discover the science behind transforming maple sap into syrup and syrup into taffy, taste a sample, and take in a variety of maple sugaring equipment and historical photos that will be on display in the classroom. Children’s Story and Craft (11:45 a.m. and 2:15 p.m.) Children are invited to listen to the classic tale of “Jack and the Beanstalk” and take part in making a pulse-themed craft.
<urn:uuid:249fdf0f-0332-4754-9304-719230634fc0>
CC-MAIN-2016-44
http://cafmuseum.techno-science.ca/en/whats-on/event-march-break-march-12-to-20.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz
en
0.943538
1,151
2.65625
3
Fakes for me, not for thee: US govt to use false social media profiles to monitor immigrants US Citizenship and Immigration officers can now use fake social media accounts to surveil foreigners seeking visas and citizenship, even after years of US lawmakers blasting foreign rivals for supposedly doing the same. Officers have until recently been banned from creating fictitious profiles, but a Department of Homeland Security (DHS) privacy review dated July 2019 but posted online on Friday has reversed that ban. According to the review, officers with the department’s Fraud Detection and National Security Directorate can keep an eye on the social media profiles of suspicious visa applicants, as they decide who to allow entry to. Twitter told AP that it would evaluate the DHS proposal, while Facebook has yet to comment. Yet, the move seems to directly contradict the policies of both social media giants, which explicitly ban impersonation on their platforms. Both platforms just recently shut down more than 200,000 “fake accounts,” supposedly operated by the Chinese government to discredit the Hong Kong protest movement.Also on rt.com ‘Sowing discord’ again? Twitter wades into Hong Kong protests with hunt for ‘Chinese bots’ Moreover, Immigration and Customs Enforcement (ICE) agents were caught earlier this year using fake Facebook profiles to catch illegal immigrants enroling in the University of Farmington, a fictitious university set up by the agency to entrap people committing immigration fraud, including nearly 600 Indian students. Kudos to the DHS, it has at least given a nod towards privacy, with agents not allowed to interact with the profiles they monitor, and are forbidden from “friending” or “following” them. They are therefore restricted to combing through the information that these people choose to make public. However, no matter how careful the DHS is, the fact remains that setting up fake accounts in the first place is forbidden by Facebook and Twitter. Whether they will acquiesce to the demands of the government in this case is an open question. To date, the Silicon Valley tech giants have had a testy relationship with the current administration, with Donald Trump lambasting the platforms for their supposed anti-conservative bias. The tech titans have also been accused by both parties of overbearing data collection and monitoring of users, particularly in the wake of the Cambridge Analytica scandal last year. ‘US bots’ unleashed? That a government agency would advocate the use of fake accounts is shockingly ironic, given the noise that American lawmakers have raised over the proliferation of similar fakes from their adversaries. In a pair of hearings last year, Democrats grilled Facebook CEO Mark Zuckerberg over the alleged spread of ‘misinformation’ by Russian accounts during the 2016 election in the US. Twitter CEO Jack Dorsey also faced a similar line of questioning later last year, at a Senate hearing into foreign election interference, during which he attempted to win over lawmakers from both parties by trumpeting his platform’s anti-Russian crackdown since 2016. Since the hearings, both platforms have embarked on sporadic purges of accounts they say were faked by Russia, China, and Iran. Facebook uses the term “co-ordinated inauthentic activity” to justify its crackdows, while Twitter has also targeted “inauthentic accounts” in its clearouts. So, with America’s law enforcement agencies getting into the business of inauthentic activity, will there be any congressional hearings or mass purges of DHS-linked accounts? Unlikely. Facebook determines what constitutes “inauthentic activity” by liaising with certain groups like the Atlantic Council (AC), a NATO-backed think tank funded by the US government and a slew of arms manufacturers. Twitter has also offered money to the AC to fund “research” into flimsy claims of Russian election-meddling.Also on rt.com Facebook’s vaunted transparency tool spectacularly fails to catch fake ads by ‘US Senators & ISIS’ While politicians on both sides of the aisle pilloried Facebook for its data-harvesting practices last year, they have never shied away from using these data troves themselves. After Syed Rizwan Farook and his wife Tashfeen Malik murdered 14 people in a shooting rampage in San Bernardino in 2015, legislation authorizing social media checks for foreigners seeking US visas enjoyed bipartisan support. Four years later, the Trump administration upped the ante, with the State Department announcing in June that all applicants for US visas will have to submit their social media usernames and five years’ worth of email addresses for scrutiny. The tightening-up of rules has already seen at least one Palestinian student barred from entry, for posts containing “political points of view that oppose the US.” The view from Washington was perhaps best summed up at Dorsey’s hearing by Republican Senator Tom Cotton (Arizona). After asking Dorsey whether he believed that the US should “remain the world’s dominant global superpower,” Cotton went on to suggest that Facebook and Twitter should actively work on behalf of the US government, and not act as “even-handed or neutral arbiters.” Allowing a few fakes here and there might be the price these companies pay to keep Washington’s favor – for now. Think your friends would be interested? Share this story!
<urn:uuid:9198fa93-44d9-4a89-86de-acfec463bc1b>
CC-MAIN-2022-33
https://www.rt.com/usa/467715-immigration-officers-fake-profiles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00274.warc.gz
en
0.956741
1,113
1.78125
2
Robocall Strike Force Advances Plans to Curb Robocalls The Robocall Strike Force this week outlined several steps it is taking to limit unwanted robocalls and telemarketing calls, which are currently the number one source of consumer complaints to the Federal Communications Commission (FCC), but FCC commissioners and Consumers Union say the measures don't go far enough. As part of the plan, the strike force—a collection of more than 30 phone hardware and software manufacturers and carriers, including AT&T, Apple, Google, Verizon, and Comcast—launched a FCC-hosted website to educate consumers about robocalls and provide call-blocking tips and resources. The strike force accelerated the standards to verify and authenticate caller identification for calls carried over an Internet Protocol (IP) network. These standards, known as SHAKEN (Signature-based Handling of Asserted information using toKENs) and STIR (Secure Telephony Identity Revisited), would make spoofing—a technique whereby they deliberately falsify the telephone number and/or name relayed to caller ID systems to trick consumers into answering the calls and to skirt a number of consumer protections already in place—harder and provide consumers with a greater degree of identification and control over the types of calls they receive. The group also looked at several methods to stop unwanted calls from reaching customers by blocking them at the network level and launched a trial to block known numbers that should never originate traffic. The results of this trial will determine the viability of a Do Not Originate list of numbers to be blocked network wide. Lastly, the group offered guidance about key terminology, the legal landscape, and overcoming regulatory roadblocks. It also developed recommendations for actions the FCC can take to support industry efforts to trace and block illegal robocalls. FCC Chairman Tom Wheeler said the plan was "a good start" but falls short of what is needed. He stressed that the industry must take action soon and couldn't simply hand off the responsibility to trade groups and government regulators. Wheeler also said he would be asking individual companies for concrete deadlines and commitments and would call the group back together in six months for a progress report. Other members of the FCC reiterated that the strike force still has much more work to do. Members of Consumers Union agreed, saying the current plan seeks to phase in reforms in the next 20 months, but more action is needed to protect consumers now. "This latest plan is half a loaf, if that," said Maureen Mahoney, a policy analyst at Consumers Union, in a statement. "These efforts are aimed at getting better solutions in the future, but consumers need relief now. The phone companies should take immediate action by offering their customers the best call-blocking protection currently available." U.S. consumers receive an average of 2.4 billion robocalls a month. Such calls generate hundreds of thousands of complaints to the FCC each year. In letters sent to the major phone companies in July, Wheeler made clear that improving call-blocking technologies "should not come at the expense of offering robocall solutions now." "The phone companies should get to work developing these new call-blocking technologies and let their customers know how soon they will be adopted," Mahoney said. "But consumers have waited long enough for action. It's time for the phone companies to start delivering real solutions."
<urn:uuid:a47f796d-c16b-44cf-9ba1-b6ea42b2291c>
CC-MAIN-2022-33
https://www.destinationcrm.com/Articles/CRM-News/CRM-Featured-Articles/Robocall-Strike-Force-Advances-Plans-to-Curb-Robocalls-114428.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00674.warc.gz
en
0.948065
688
1.65625
2
“The film business is like riding a trolley car; someone is always getting on, and someone is always getting off. Some ride across town, others go only a few blocks.” Cary Grant It’s important to know that no matter how sophisticated, how computerized, how high-tech or far reaching the film business becomes, the industry is about people. People make movies and, as Cary Grant so aptly analogized, some people enter the business and ride it all the way to retirement, while others are there for a very short time; fondly know heretofore as Lifers and Short-timers. Very briefly, Lifers have chosen a career and will stick with it no matter what, or sometimes as long as it will have them. They have mortgages to pay, families to feed, kids in college, etc., while Short-timers are people that found themselves on the trolley for any number of reasons, and because they caught the ride they now have a chance to try out the business to see how it fits. If it does they may ride along for a while, some may even become Lifers, and if it doesn’t they will hop off, occasionally before the next stop. In the past you may have heard that the film business is impossible to get into but I’m here to tell you it’s not because every single day new people, many having no experience at all, begin working their very first jobs. The truth is the film business can be very transient, meaning that working in the business, as great as it sounds, is not for everyone. Just as some people are not cut out to be sales persons or deep sea divers there are people jumping in and out of the film business all the time, which is good news for any fresh body wanting in. Without the big red bow, you have to be a certain kind of person to work in the film business because it takes a level of determination and dedication that not everyone can muster. It’s about mental and physical endurance. It’s about living in an extended family and playing well with others. It’s about what’s inside of you, and can you or rather will you rise above yourself during even the darkest hours. Of course the most interesting part is; you won’t know if you’re a film business person until you are actually there, working on a production, experiencing the merry-go-round and every moment that goes with: And, if at day’s end the sum of those moments add up to something magical? You may be there for a very long time. Quick note: Nothing explains the phrase “during even the darkest hours” better than the documentary Hearts of Darkness: A Filmmakers Apocalypse, a raw behind the scenes look at the making of the classic war film Apocalypse Now. The documentary demonstrates what transpires when a major motion picture slowly melts down until there is nothing left but chaos. Apocalypse Now Director, Francis Ford Coppola, with everything on the line, tiptoes so close to the edge of failure that he’s seemingly nanometers away from a nervous breakdown. “We were in the jungle, there were too many of us, we had access to too much money, too much equipment, and little by little we went insane,” which is eerily similar to the predicament the characters in Apocalypse Now found themselves in as everyone, bit by bit, loses their mind. So instead of art imitating life, it could be argued that this was a case of life imitating art, and throughout that utterly dysfunctional mess a brilliant film about the insanity of war called Apocalypse Now was created. If you haven’t seen Hearts of Darkness: A Filmmakers Apocalypse you might want to check it out, if for nothing else it’s a vivid reminder that production meltdowns are a fact of life, albeit most on a lesser scale than this. So if the film business is about people, then creating relationships with people is a close second. As you know, without relationships the world would stand still. Nothing would get done. I could be holding the secret of life in my hand (screenplay writers take note) but if there’s no one to show it to, it would matter to me alone. And even if I had just one relationship, and that person knew only me, whatever fantastic knowledge we shared would end right there. Under a black star-filled sky two polar bears are standing on a small slab of floating ice in the middle of the ocean. Surrounded by cold dark waves for as far as the eyes can see, one polar bear says to the other, “Well, eventually I’d like to Direct.” Getting off that chunk of ice and into the business is one thing, which I talk about in my book, but at this point it’s imperative for all polar bears to understand that if they want a career in film the key to maintaining regular work is the ongoing development of relationships. Bottom line: You know who you know and that’s why you’re there. It may also help to know that most relationships in the film business come and go, work and personal, and many times it’s because they have either run their course, or because you can’t help but meet new people. Depending on what film department you are in, you may work with the same group over and over or with a different group every time. Or one day you could be working with a company of people that you just spent seventy hours a week with for the last six months, that have become your family and friends, and the very next day that production ends and everyone scatters; some taking time off from work, others moving on to new projects. You may miss them greatly, and then again you may not, but because of the inherent freelance nature of the business, relationships are always starting, ending or evolving. Some last for decades and others a minute.
<urn:uuid:43f2fc28-058b-4530-9053-d0c98aba500b>
CC-MAIN-2022-33
https://www.man-shu.com/hollywood-filmmaking-and-a-career-in-the-movies-lights-camera-action.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00274.warc.gz
en
0.96947
1,244
1.578125
2
The washing plant consists of a horizontal treatment chamber and one or more service tanks. The treatment chamber has inside a rotating parts/basket holder structure, a medium-high pressure spraying network and is connected to a valve group equipped with a filter for the return of chemical products in tanks of competence. The treatment chamber is equipped with a manual or automatic door. These machines are often used in the production lines of mechanical, automotive and aerospace companies for inter-process cleaning or for precision cleaning before assembling. Due to their own flexibility, tunnel equipment can be used for big and small productions. Mainly designed for water based spraying & immersion process, the treatment effect is based on the chemical, mechanical and thermic action. The jet configuration has been arranged in order to cover the surface of the items in treatment through a procedure which includes chemical, mechanical and thermal functions. During the rotation the parts are invested in each of their cavities with the projection and spray of hot chemical solutions at high pressure. HIDRO.IK machines series can also be configured for immersion treatments with or without ultrasound. While the plant is in operation it results clean, odorless and completely isolated by the environment.
<urn:uuid:f2894da5-b82e-4e63-a598-8264f9fcdd55>
CC-MAIN-2022-33
https://www.ceever.com/en/products/hydrokinetic-hidro/hidro-ik/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00071.warc.gz
en
0.945449
250
1.765625
2
The Cat and the Fiddle Images of Musical Humour from the Middle Ages to Modern Times Distributed for Bodleian Library, University of Oxford In The Cat and the Fiddle, Jeremy Barlow explores 700 years of musical humor, a topsy-turvy world in which monkeys fiddle and pigs play the bagpipes. It is a vision of chaos and devilry as depicted in a variety of sources—the illuminated borders of medieval manuscripts, eighteenth-century prints of urban life, and even the illustrations of children's books. Barlow reveals the shifting meanings behind such images, as they were often symptomatic of larger cultural trend such as rapid industrialization and urbanization, an emerging class system, and the moral movements of the late nineteenth century. As he compellingly argues, the development of the printing press, the popular spectacle of public concerts, and the rise of new political uses for music all played a critical role in musical history and were distinctly evident in images of musical humor. The archives of Oxford's Bodleian Library provided a rich supply of previously unpublished material for Barlow's research. With full-color images throughout, The Cat and the Fiddle will be a delight for scholars of art and political history as well as lovers of music everywhere.
<urn:uuid:9ffa521a-4d6c-4655-839b-8c6198d211fc>
CC-MAIN-2016-44
http://press.uchicago.edu/ucp/books/book/distributed/C/bo3662486.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719416.57/warc/CC-MAIN-20161020183839-00365-ip-10-171-6-4.ec2.internal.warc.gz
en
0.943822
260
2.765625
3
How to pick, store and prep fresh cucumbers and a delicious (and easy) recipe Crisp, cool and crunchy. Cucumbers offer a refreshing flavour blast wherever they are served. Thankfully, Canadian cucumbers are available almost all year round. And now, with the bounty available from home gardens, farmers’ markets and grocery stores we are putting them everywhere on our menus. With a few tips and tricks, you will get the most out of this versatile vegetable – or is it a fruit? Are Cucumbers a Fruit or Vegetable? Cucumbers are fruits, botanically speaking. That means they have seeds. In fact, cucumbers are part of the gourd family which includes its delightful second or third cousins – melons, squash and pumpkins. They get put in the vegetable category because that is how they are most often used. Fruit or vegetable, we should be eating more of them, so stock up and start crunching. Picking Fresh Cucumbers from the garden or the store Cucumbers, no matter what type, should be green and firm. Stay away from cucumbers with wrinkled skin and make sure there aren’t any signs of bruising or yellowing. Yellowing indicates overripening. Small to medium sized cucumbers are preferable to large as the larger ones tend to be bitter and bland and the seeds can be hard. The only exception to the yellow colour is if you are buying lemon cucumbers – an heirloom variety, these cucumbers are small and round with lemon coloured skin. Types of Cucumbers to Choose From There are many varieties of cucumbers worldwide but they are divided between three main types. Grown to be eaten fresh, slicing cucumber varieties have smooth skin that can be tough. Any cucumber can be pickled, however, there are different types of cucumbers grown specifically for the purpose of pickling. Pickling cucumbers, also called picklers, are grown to be uniform in size. They typically have thicker skin that is bumpy with tiny spines. These spines need to be scrubbed off before processing. Gherkins or cornichons are a specific type of pickling cucumber with typical bumpy skin but much smaller in size. Also called burpless, these cucumbers are usually only grown in greenhouses, have thin skin and are virtually seedless. Thankfully, seedless cucumbers are grown across Canada year-round. Originally, this type of fresh cucumber was grown as an option for people who find cucumber skin and seeds difficult to digest. Typically used as a slicing cucumber, the slightly sweet taste and more digestible skin of a seedless cucumber make this a favourite in kitchens across the country. However, this type can also be used for pickling and is perfect for quick pickling style of recipes. Like a quick Thai Cucumber Carrot Pickle to top a Bahn Mi. Storing Fresh Cucumbers Cucumbers should be stored in the fridge. Preferably in a humidity and air flow controlled environment like a produce crisper. Remember, we eat them like a vegetable but they should be stored like a fruit. Your cucumbers should last about a week under these conditions. Preparing Fresh Cucumbers Wash them. Always wash them, even if you are removing the skin. If you are getting ready to make a batch of pickles, fill up a sink or large bowl with cold water and dump your cucumbers in. Grab a small brush and scrub, scrub, scrub. Give it a quick rinse and repeat. Leaving the skin on or skin off is a personal preference. However, it also depends on the type of cucumber. Slicing cucumbers can have a tough skin that is difficult for some people to digest. The easiest method for removing the skin of a cucumber is to use a peeler. Because of their long, thin shape, simply drag the peeler down the length as the cucumber rests either in your palm or on a cutting board. A sharp quality paring knife also works but you may lose more cucumber flesh. Removing the seeds is also a personal preference. Even the seedless type of cucumber. By removing the seeds, you will change the overall texture of the final dish that you are making as the seeds and the flesh around them can add extra liquid. To remove the seeds, cut the cucumber in half lengthwise and hold the cucumber half in your hand. Over a bowl, turn a small spoon over and drag the tip of the bowl down the length of the cucumber. It may take a couple of times to remove them all, and if your cucumbers are large, use a big spoon. Alternately, cut the cucumber into lengthwise wedges, either quarters or sixths. Use a paring knife to carefully cut under the middle section of the cucumber to remove the seeds and surrounding flesh. Raw cucumber can be grated, cut into strips, sliced and cubed. A julienne peeler or box grater is the easiest way to grate cucumbers. If you are using grated flesh in a Homemade Tzatziki or Cucumber Raita, squeezing a bit of the liquid out will keep your sauce from getting watery. Cucumbers can be sliced in rounds or in long strips. For consistently uniform slices, a mandoline can’t be beat. From paper thin slices or strips on top of Smoked Salmon with Dill Feta Flatbread or thick slices strong enough to hold Thai Chili Lime Shrimp. If you find your cucumbers to be a little bitter, peel, remove the seeds and either slice or chop them. Put them in a colander or fine mesh strainer over a bowl, sprinkle the cucumber with salt and then toss. Let them sit for about 20 minutes, give them a rinse and squeeze to remove excess liquid. What you can do with too many cucumbers? You’ve had multiple bowls of Gazpacho. The family has had enough Creamy Dill and Cucumber Salad. But have you tried cooking cucumbers? Yes, it sounds a little crazy but you can (and should) try it. They can be sauteed, steamed, stir-fried or even roasted. How about Cucumber Infused Spirits using either vodka or gin. Slice, dice or chop cucumber and put in a glass jar with either vodka or gin. Allow them to sit for at least a couple of days and up to a week out of direct sunlight. Drain and discard the cucumber and pour your homemade Cucumber Infused Gin into clean bottles. Perfect for gift giving or adding to your cocktail repertoire. Freezing Fresh Cucumbers Yes, you can freeze cucumbers (and you should). They are a great addition to smoothies; adding the fresh without the sweet. However, cucumbers turn to mush once thawed after being frozen so use them while they are still frozen. Pureeing Fresh Cucumbers Using a blender or food processor, puree the cucumbers. Peeling is completely up to you but will depend on what type of cucumbers you have on hand. Also, you might want to remove the seeds. Freeze in small containers or fill up an ice cube tray. Use your pureed cucumbers to stir into a cocktail like a Cucumber Martini. Add a couple of cubes to a pitcher of water with a few mint leaves for a quick flavoured treat. Or, how about adding a bit to your homemade vinaigrette to replace some of the oil. Pickling and Preserving Fresh Cucumbers Cucumbers love being pickled and preserved. Quick, salt-brined, vinegar-brined or fermented, whichever type of pickles you prefer (or have time for) not one will go to waste. Layered Greek Dip Cucumbers are the key ingredient in this simple, fresh and flavourful dip. A quick lunch or a delightful snack that come together in minutes. Makes 2 servings ¼ cup hummus ¼ cup tzatziki ¼ cup diced fresh tomatoes ¼ cup diced sweet peppers 2 tbsp diced red onion ½ cup diced cucumber (remove the seeds) 4 kalamata olives, sliced 1 tbsp crumbled feta cheese For Dipping: cucumber slices, pretzels or pita chips Kitchen Equipment & Tools 1. In a shallow bowl add the hummus an spread evenly with the spatula. Add tzatziki over top of the hummus and spread evenly. 2. Layer the following over the tzatziki: tomatoes, peppers, red onion, cucumber, olives and feta cheese. 3. Serve with cucumber slices, pretzels or pita chips. Enjoy! Chef TipsUse a shallow bowl for this dip, allowing you to scoop with abandon Double or triple the recipe if you are feeding a crowd Change up the vegetables Add a few shakes of oregano on top
<urn:uuid:c0533534-c3af-4c10-ad15-dbc1cb9c30fe>
CC-MAIN-2022-33
https://chefequipment.com/blogs/resources/fresh-cucumbers-recipe-and-tips
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00674.warc.gz
en
0.924241
1,931
2.515625
3
Claire McEachern. The Poetics of English Nationhood 1590-1612. Cambridge: Cambridge UP, 1996. 239pp. ISBN 0 521 57031X Cloth. University College of St Martins, Lancaster Longstaffe, Steve. "Review of The Poetics of English Nationhood 1590-1612." Early Modern Literary Studies 4.2 (September, 1998): 24.1-6 <URL: http://purl.oclc.org/emls/04-2/rev_long.html>. - The central thesis of this book is that when Henry VIII declared that the realm of England was an empire, he founded a nation whose "foundational poetics" was developed by John Bale, and which was "written down by a handful of middling-status authors in the 1590s" (2). Paradoxically, this nation could only be "reflexively apprehended in its ideal character" analeptically or proleptically, "always about to be, or on the wane, nascent or ancient" (33). But by the time of the Union debates, England was forced to define itself against a Scottish "Other," more of an economic and military underdog, more Protestant, linked linguistically and geographically, and "the last time that an English nation could be imagined with the ideality it requires" had passed (197). To show this, the book reads three texts, dealing with church, crown and land, in which imagining aspects of the state as a person or persons "cultivates the intimate affect constitutive of corporate feeling" (12). - McEachern reads the first book of Spensers The Faerie Queene as dealing with questions of interiority and faith that are essential for the definition of a national church, and hence a nation. She considers the implications of "the search for right religion expressed as the search for the right girl" (35). The Book of Holinesss "sartorial, sexual, semiotic and sumptuary" confusions are also those of English Reformation culture (44). Redcrosse is never really part of Faerieland; ploughman and knight, he is a synecdochic Englishman, a type interpellated by the Elizabethan church in its own image as unitary and resembling no foreign model. - The chapter on Shakespeares Henry V is something of a miscellany, seeking to relate critical problems with the "personability" of king and nation to, amongst other things, debates about the eucharistic body, common access to scripture, the education of governors, the place of theatre in a polity, the tower of Babel, and Elizabeths place in the imagination of the nation. The central point is that "the ambiguity which attends a common space, be it of the theater or of the body politic, is rife in the unions which Henry V imagines" (107). The most original contribution of the chapter is its investigation of the ways Babel (the fall of which is the origin of both linguistic and national difference) can be used to read Henry Vs suspicion of a language in common. - Poly-Olbion is read as "an aggressively local poem, with respect to both time and place," engaging "again and again" with the issues raised by proposed union of England and Scotland (139). When read alongside the Union debates concerns with the relative priorities of the local and the universal, the poems commitment to mutability is seen to be a refusal of simple political polarities, eroding "the grounds that bolster ideological contest" (181). The poems combination of domestic subject matter and cosmopolitan form, its sceptical annotation by John Selden, its "bemused toleration of difference and its acknowledgement of times incursions upon insular sovereignty" place it in a complex relationship with national feeling, "for and against . . . within and without it" (187). - The books strength is its bringing together a range of unfamiliar texts through which literary texts constructions of nation can be read, and its skill in persuading the reader of the relevance of this. This strength, however, weakens aspects of the books overall case. McEacherns concern with placing this kind of literary England-imagining within a span of twenty years is mitigated by her showing many of the discourses of which they were a part covering fifty years or more. For example, the "discourse of Babel" includes texts ranging from the 1560 Geneva Bible to a sermon by Edward Chaloner published in 1623, with the implication that this discourse did not change significantly over time. In such a context, to claim that there was a specific discourse of Englishness between 1590 and 1612 requires some explanation of why this particular discourse can be so historically confined. McEachern claims that the discourse of "this England" is marked by the "association of the crown, church, and land," and that it is replaced by one based on the law, whose appeal lies "not in its fragility, but in its endurance and its sagacity" (196). Neither the England preceding nor succeeding are presented for inspection, however. - Indeed, the very range of discourses the book pulls in to its discussions of crown, church, and land mitigates against the three ever being as imaginatively united as McEachern claims, as does her dismissal of any significant differences between embodying the church, the monarch, or the land (at one point, the land is referred to as "a governing institution of Tudor-Stuart government," and "the state" is persistently reified). Whilst the component parts of a national sentiment are persuasively and illuminatingly discussed, the whole is only ever assumed to be there. This weakness could perhaps have been avoided had McEachern addressed Richard Helgersons Forms of Nationhood, a book covering similar literary historical territory (albeit providing less sustained readings of individual texts). As it is, McEacherns book confines itself to briefly criticising Helgersons views on Henry V and Poly-Olbion (arguably misreading his position on the latter) and simply ignores his readings of Hakluyts and Foxes contributions to "the Elizabethan writing of England." The omission is even odder given that Helgerson and McEachern cover many of the same discursive fields -- chorography, constitutional law, the church -- and cannot but undermine the books claim to delineate through analysing its chosen texts "the very conditions of [representing] ... some larger whole." Finally, McEachern should be congratulated for her skill in employing that underused theoretical strategy, wit, in arguing her cases. Responses to this piece intended for the Readers' Forum may be sent to the Editor at EMLS@UAlberta.ca. © 1998-, R.G. Siemens (Editor, EMLS). (SL, LH, RGS, 8 September 1998)
<urn:uuid:31fd5ee2-a14a-484a-a167-49788c6e9d1d>
CC-MAIN-2017-04
http://extra.shu.ac.uk/emls/04-2/rev_long.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00307-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946502
1,446
2.53125
3
A Documentary by Dan Habib About the Film Dan Habib's award-winning documentary film Including Samuel examines the educational and social inclusion of youth with disabilities. The film is built on the Habib family's efforts to include Samuel, now 16, in all facets of their lives, a journey that transforms each of them. Including Samuel also features four other families with varied inclusion experiences, plus interviews with teachers, parents, students, and disability rights experts. Including Samuel premiered in November 2007. To purchase copies of Including Samuel, please visit the IOD Bookstore. About Dan Habib Dan Habib (pronounced “Habeeb”) is the creator of the award-winning documentary films Including Samuel, Who Cares About Kelsey?, Restraint and Seclusion: Hear Our Stories, and many other short films on disability-related topics. Habib is a filmmaker at the University of New Hampshire’s Institute on Disability. While working at the Institute on Disability, Habib has screened his films hundreds of times at universities, national conferences, and independent theaters across the country and internationally, leading discussions about the challenges and benefits of inclusive education and related topics. Including Samuel was broadcast nationally on public television stations in the fall of 2009, and was nominated for an Emmy in 2010. Including Samuel has also been featured on NPR’s “All Things Considered” and “Good Morning America,” as well as in the Washington Post and Exceptional Parent magazine. The film has been translated into 17 languages and is used as a teaching tool worldwide. Who Cares About Kelsey? was broadcast nationally on public television in the fall of 2013. It has been featured in Education Week and in 13 film festivals, winning the “Best Feature” award at the “Lights. Camera. Help.” film festival. The film was nominated for an Emmy in 2013. Before joining UNH in April of 2008, Habib was the photography editor of the Concord Monitor (NH). In 2006 and 2008, he was named the national Photography Editor of the Year and has been a judge of the Pulitzer Prizes and the Best of Photojournalism. He is a six-time New Hampshire photographer of the year and his freelance work has appeared in Time, Newsweek, and the New York Times. In 2012, Habib received the Champion of Human and Civil Rights Award from the National Education Association, and in 2013 he received the Justice for All Grassroots Award from the American Association of People with Disabilities. In November 2013, Habib delivered a TEDx talk titled “Disabling Segregation” on the benefits of inclusion to students without disabilities In 2014, Habib was appointed by President Barack Obama to the President’s Committee for People with Intellectual Disabilities—a committee that promotes policies and initiatives that support independence and lifelong inclusion of people with intellectual disabilities. Habib and his wife, Betsy, live in Concord, New Hampshire with their sons Isaiah, 19, and Samuel, 16.
<urn:uuid:35886cb7-85f0-41c7-acf2-fa649c507dd5>
CC-MAIN-2016-44
http://www.iod.unh.edu/Projects/including-samuel/project_description.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00415-ip-10-171-6-4.ec2.internal.warc.gz
en
0.972753
620
2.140625
2
CBD Hemp Wax can be described as a form of concentrated cannabis oil. Although it's not legal in the U.S., it has numerous advantages. This type of wax has the consistency of candle wax. The consistency of hemp wax is different from candle wax. What is the difference between CBD Wax from candle wax that is regular is that? These are the kinds of questions this article will address. The bottom line is that you should utilize the information contained in this article to determine whether CBD Hemp Wax is right for you. cbd hemp wax is a kind of concentrated cannabis oil CBD hemp wax is a concentrated cannabis oil that doesn't give users a high. CBD wax is free of the THC compound which is responsible for cbd hemp wax online getting you high when you consume cannabis. This makes it a good choice for use in everyday life. Since it's made of hemp, CBD wax is a suitable option for those with sensitive or allergic reactions to THC. To extract CBD hemp wax, a process known as butane oil is used to separate THC from the flowers. To get rid of the butane, cannabis buds should be placed in the vacuum chamber. The final wax or shatter will be determined by the following temperatures and handling conditions. If the oil is moist and the wax is forming, it will have an amorphous texture. If the oil isn't moist, the wax will be crumbly or butter-like. CBD hemp wax was among the first products to be legalized as a cannabis-based oil product. It is an end product of the extraction process and is used to extract CBD. This wax has a waxy appearance and is available in various potencies. A high CBD hemp plant naturally has a lot of CBD. This means that CBD hemp wax products have only a small amount of THC. It's also a great option for making your own CBD products. It is important to select a reliable brand when buying CBD concentrates. A COA is the most reliable way to make sure that the product you purchase is of the highest quality. The COA is an independent examination of the concentrates. It determines whether they contain residues of solvents, pesticides, or heavy metals from the soil. You should not purchase any product in the event that the seller fails to provide a COA. CBD wax is more efficient than CBD oil. The greater concentration makes it immediately effective. CBD hemp wax is quick-acting and can provide relief for all types of pain and inflammation due to its high potency. CBD wax can also kill viruses and bacteria therefore be cautious when making use of it. There are numerous CBD products on the market. Make sure you do your research and make wise decisions. It is not legal in the U.S. The 2018 Farm Bill legalized cannabis-derived cannabinoids and extracts. However there's still a lot of uncertainty about CBD-based products. Delta-8 is an intoxicant chemical found in hemp, remains on the DEA controlled substances list of controlled substances. This article will address the legality of and use of cbd oil wax -based products. It is possible to find various products that will meet your requirements without violating the law. While CBD hemp wax isn't legal in the U.S., hemp-derived CBD oil is. The legality of CBD-rich hemp wax is that it contains less than 0.3% THC. There are 110 distinct types of cannabis cannabinoids. CBN and CBD have psychoactive effects, while THC does not. CBD and CBN are used extensively for CBD hemp wax online medical reasons, including pain management. Cannabis-derived best cbd oil wax products have many benefits, including the reduction of stress and inflammation. A trend that is growing is the use of hemp for medicinal reasons. The current Farm Bill doesn't include hemp however marijuana-derived CBD products are legal in Canada and other countries. This is good news for hemp farmers. Hemp is also a great alternative to alcohol. The New Mexico dispensary explosion was not an isolated incident. The explosions were caused by many underage individuals. Students are inclined to believe that they are in control after watching YouTube videos about marijuana products. In 2014, the University of Montana saw a similar explosion. A recent investigation found that students were creating marijuana wax concentrations. This type of drug is not legal in the United State however, many dispensaries are selling cannabis oil lollipops, CBD hemp wax online which students frequently purchase. Making marijuana wax has grave dangers. Although it is legal in certain states, it's extremely risky. In October of last year one of the chiefs of fire in the Bronx was killed when marijuana wax was melted down in his home. It was a temporary marijuana farm. Videos of the process could not be accurate in a scientific sense. In addition they may not be showing a safe method to make marijuana wax. The potency of marijuana wax isn't easily quantifiable. Butane fires derived from marijuana wax can achieve temperatures of 2,000° or cbd hemp wax for sale It can impact a newborn's brain development Researchers from the University of Minnesota have found that exposure to CBD which is a constituent of hemp, could affect brain development of infants. There is evidence that suggests that prenatal exposure to cannabis could cause impairments in behavioral and cognitive function. This finding comes from an insignificant study that looked at breast milk samples of mothers who regularly used cannabis. The study revealed that infants who were breastfed consume approximately 2.5 percent of the mother’s daily dose. However, the infant consumed up to eight micrograms of THC each day. Cannabinoids are chemically different, so immunoassays cannot detect CBD in infants. Certain compounds from CBD can cause false positives in infants. These include dronabinol and nonsteroidal anti-inflammatory drug (NSAIDs) as well as hemp seed oil. Due to this, doctors should wait until more research is completed before recommending CBD to children. It can be purchased online There are several types of CBD hemp wax. Full-spectrum wax contains around 80 cannabinoids including CBD. Although this wax is more costly than the other, you will still get the full entourage effect. It is also possible to infuse CBD wax with Terpenes. It's also ideal for medicinal purpose as it contains no THC. CBD wax is available on the internet. If you're interested in learning more about best cbd wax , read on. If you're looking for a premium CBD wax, make sure you choose one that is made using supercritical CO2 extraction. This method is simple and efficient, however certain brands cost more than others. While supercritical CO2 extraction is a reliable method to create CBD wax from the compound, a few brands still use butane. However, not all brands utilize CO2 extraction that is inherently harmful to humans. Standard CBD Wax is high in CBD hemp extract distillate and botanical Terpenes. It is akin to the effects of classic weed strains. It is possible to dab it onto the bottom of a bowl to enjoy the effects. If you're worried about the effects of CBD it is possible to try CBD Shatter, a kind of hemp wax that doesn't contain THC. It has a stronger flavor than candle wax and is similar to candle wax. Chakra Xtracts are also considered. Their website isn't as detailed than other brands. However, they cultivate their hemp in-house and extract cannabinoids. They then have these products ready to ship. CBD Living also provides four different kinds of CBD wax each with a distinct flavor. To create the flavors CBD Living uses Terpenes. For the most potent effect it's worth investing in CBD wax. You can purchase CBD hemp wax online. However, it is important to be aware of counterfeit products. Synthetic cannabinoids pose a huge risk. To avoid these products, look for trustworthy online retailers who offer third-party chemical analysis. They can help you determine the quality and purity of their products. The CBD hemp oil ingredient is vital and should not be used as a medicinal supplement. If you're looking to buy CBD hemp wax online there's no better site to shop.
<urn:uuid:29350e5f-b59d-4153-8041-5eb104df0608>
CC-MAIN-2022-33
http://www.bitoseapark.co.kr/pbbs/bbs/board.php?bo_table=review&wr_id=104401&page=14
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
en
0.964591
1,669
1.59375
2
Although it is far from the norm, a few colleges pay their assistant professors more on average than they do their tenured professors. Although such pay scales might harm the egos of tenured professors, they can benefit colleges. Organizations often pay high salaries to (1) attract new employees, (2) keep existing employees, (3) compensate workers for unpleasant working conditions and (4) compensate workers for taking on risks. These four criteria support colleges giving relatively higher salaries to assistant professors. Consider a college that has some extra money to spend on faculty salaries. In many fields, this college competes intensely with other schools for talented assistant professors. So the college could increase the quality of its faculty by using its extra money to boost assistant professors’ salaries. Compared to assistant professors, tenured professors rarely switch jobs. Our hypothetical college probably won’t lose a significant number of its non-superstar tenured faculty if it doesn’t allocate its extra money to raising their salaries. (And the college can always cut separate deals with it superstars.) So to maximize the quality of its faculty, the college should create a pay structure in which tenure-track assistant professors earn more than tenured professors. As the following example shows, a college can do this without ever decreasing a professor’s salary even if the professor is promoted. |Year||Tenured Professor’s Salary||Assistant Professor’s Salary| [If an assistant professor were promoted at the start of 2010 he would make $83,000 in both 2009 and 2010.] Assistant professors in many ways have harder jobs than tenured professors do. They have more pressure to publish. They usually spend more time on class preparation because they have taught their classes relatively few times. And, keeping in mind their looming tenure bids, they often feel compelled to be more deferential to their senior colleagues than they would prefer. Those who care about economic fairness consequently should support the idea of assistant professors making more than tenured professors. And those who care about markets should understand that the less pleasant the job, the higher salary you must pay to attract top talent. Job security is a large part of tenured professors’ compensation. So even if a tenured professor has a somewhat lower monetary salary than an assistant professor does, he probably, over all, receives more total compensation than his non-tenured colleagues. After all, I suspect few tenured professors who are not superstars or close to retirement would agree to exchange, say, $3,000 in extra salary in return for abandoning tenure. Markets compensate intelligent risk takers. For example, investing in the stock market yields a higher average return than investing in safe government bonds does. Up or out tenure decisions foist enormous risk on tenure-track assistant professors. Ph.D.’s in practical fields in which many non-academic jobs are available should be willing to take on tenure risk only if they are suitably compensated for it. In contrast, however, being a tenured professor is one of the safest jobs on the planet, and consequently you would expect markets to pay tenured professors a negative risk premium that reduces their salary. It’s relatively less risky for a college to increase its assistant professors’ salaries. For reasons economists don’t fully understand, employers almost never decrease their workers’ nominal salaries. So if a college gives a raise to a tenured professor, it is stuck paying this raise until the professor retires. In contrast, if an assistant professor becomes too expensive the college can simply not reappoint him. I’m actually surprised that the academic market doesn’t induce more colleges to pay greater salaries to assistant professors than to non-superstar tenured professors. Tenured professors, however, have on average vastly greater bureaucratic power than their untenured co-workers and perhaps such power discrepancies explain why at most colleges tenured professors earn more than assistant professors. Some might claim that not rewarding tenured professors for their long experience would harm their morale. But I wonder how many talented assistant professors have had their morale damaged (or indeed have even voluntarily left academe) because they are paid less than some of their less talented and less hardworking senior colleagues. Read more by Opinions on Inside Higher Ed Inside Higher Ed’s Blog U What Others Are Reading
<urn:uuid:c9226a2d-510d-4e25-8827-34ebab3bbb0c>
CC-MAIN-2017-04
https://www.insidehighered.com/views/2008/09/02/miller
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00165-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96522
895
1.828125
2
Miss G and I are huge fans of Halloween, so of course I had to come up with some fun Halloween lunch box ideas to give her a bit of a surprise during her school day. Here are the 5 Healthy Halloween Lunch Box Ideas that I came up with, and be sure to check out our 30 Healthy Halloween Snacks for Kids for more ideas! These healthy lunch box ideas would be perfect for planning a week of Halloween lunch boxes, or you can do one week leading up to Halloween, or just a special one on Halloween! (Or just do one – one is good!) A couple of these are plan-ahead lunch boxes, because I like to make more than one at a time, and a couple are great easy options for days when your child is getting a hot lunch at school, but you still want some fun healthy sides to round it out. Fruit Monster Lunch Box Idea This healthy Halloween lunch box idea is a fun way to play up the last of the summer fruit and it is versatile enough to be used all year wrong. (Monsters are timeless!) This lunch was for Miss G’s pizza day at school, so I didn’t have to worry about packing a “main,” but this would also be a good option if you were sending a thermos lunch. I used a bit of green licorice that we had on hand to make the fruit monster’s hair, but you could easily use dyed coconut or even shreds of lettuce. Miss G doesn’t like licorice so this was more decorative and I didn’t really worry about the sugar content because I knew she wouldn’t eat it! The skull candy is a special Halloween treat that Miss G picked out, and again, I don’t think she actually ate it. It is attached with a bit of frosting (you can use jam) to one of our homemade apple vanilla muffins. The lunch is rounded out with some Babybel cheese, carrots, celery, and ranch dressing for dipping, and two mini Halloween-themed snacks Smarties (Canadian version of M&Ms) and a pre-made Rice Krispie square. Jack O’Lantern Lunch Box Idea This was a fun and easy lunch to make, and it was actually one of our pre-made lunches, because I like to make 3 lunches all at once. I used a pumpkin cookie cutter and food writer marker to cut out chicken sandwiches on tortilla bread. (If I was to make it a chicken and cheese sandwich, I would wrap the cheese separately to stop it from making the bread soggy overnight. Instead, I included a cheese string on the side.) I used the food marker to also draw a Jack O’Lantern face on our orange, and used some cute Jack O’Lantern food picks to embellish our blackberries. I kept the orange in it’s peel because I find it it’s pre-peeled more than a day before, it dries out and makes the other food moist. Skull Lunch Box Idea I was so excited to hear how Miss G liked opening up this lunch at school (and half-expected to get a note home about sending scary lunches!) I made a skull sandwich using this skull cookie cutter, and adding herb and garlic cream cheese and smoked salmon inside. (I like how it kind of looks like muscle, but your preferred sandwich fillings will still be great.) I added a gummy worm coming out of the eye to put it over the edge. In the side compartment, I added some chocolate pudding and topped it with chocolate cookie crumbs and skull and crossbone sprinkles. The sides were a Caesar salad (dressing on the side), strawberries and grapes, and a box of Halloween Smarties. Bat Pasta Salad Lunch Box This bat pasta salad was such a hit! We bought some delicious squid ink bowtie pasta and after cooking I just dressed it simply with some lemon juice, olive oil, salt, pepper, and shredded chicken. Without the chicken it may have looked cooler, but I wanted to add some protein. I filled the second compartment with orange segments and blackberries skewered on skull food picks, and sprinkled Miss G’s yogurt with some skull sprinkles. These do tend to run a bit by lunch time, so you could put them on the side, but Miss G likes how it makes her yogurt look multi-coloured. I added two Halloween Oreos as a special treat. Frankenstein Lunch Box Idea I used some of the leftover bat pasta salad to play up with Frankenstein lunch box. (Okay, Frankenstein’s Monster Lunch Box.) This was another prep-ahead lunch box idea, but I wouldn’t make it more than one day in advance. I made the Frankenstein’s Monster kiwi by cutting a zigzag “hairline” about a quarter inch into our kiwi, and then used the knife to peel the skin from the zigzag line on down. I attached two candy eyes and two silver “screws” (dragee balls) with frosting. I pre-assembled a worm and dirt pudding, again leaving the pudding separate so the worm wouldn’t get soggy overnight. What do you think? Would you send any of these spooky, healthy Halloween lunch box ideas to school with your kids? Make sure to pin these lunch box ideas for later, and check out our other healthy lunch box ideas.
<urn:uuid:48945de2-2068-4a91-a013-e85bb062f370>
CC-MAIN-2017-04
http://sugarspiceandglitter.com/5-healthy-halloween-lunch-box-ideas/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00329-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953479
1,160
1.578125
2
Jul 13, 2022 Essays can be wonderful tools to give students space to express themselves and engage intellectually with the texts and topics covered in a course, or to research beyond the scope of the syllabus. Yet in many American universities, the essay has become a calcified and formulaic text produced by students who have received rules-based, assessment-based writing instruction. 1 1 John Warner. Why They Can’t Write: Killing the Five-Paragraph Essay and Other Necessities. (JHU Press, 2020). Students are conditioned by grading rubrics to produce essays that follow a particular model and way of laying out thought processes. 2 2 Susan Debra Blum. Ungrading: Why Rating Students Undermines Learning (and what to Do Instead). (West Virginia University Press, 2020). To combat stale and repetitive essays, and also to invite students to bring themselves, their interests and talents, to bear on the course material, many instructors have been turning to the “un-essay” in recent years for their final assessments. Unessays tend to be open-ended assignments in which students are encouraged to produce creative work, presented in whatever medium they like, and relate it to the course material. Much has been written about unessays, but our Yiddish Studies colleagues might be particularly interested in this discussion of unessays in a Biblical Studies context published in Ancient Jew Review. The specifics of unessay projects vary. Some instructors may offer “scaffolding” such as mini-projects or self-assessment essays in which students present and describe their own learning and growth processes throughout the semester leading up to the final unessay project which sometimes results in student portfolios rather than single projects. Others may require a proposal, literature review, or annotated bibliography in advance of the project so that they can direct students as they pursue their assignment, or may require students to discuss their projects in office hours or during a class workshop session to receive approval. Often, in addition to the assignment itself, instructors will require a written analysis that explains the creative, critical, and interpretive choices the student made in their project and what sources it drew upon. Assessments often rely upon the creativity and critical thinking displayed through this analysis. For the uninitiated instructor, it can be quite daunting to begin assigning unessays. The open-ended structure requires a great deal of trust that students will be motivated when given free rein to communicate their learning in the medium of their choice. For the uninitiated student, on the other hand, the assignments can feel overwhelming at first as well. They may struggle with knowing where to begin. We felt that a resource displaying some examples of the unessay might be useful to both instructors and students who are engaging in this kind of task. We asked instructors to share successful student work in order to showcase a range of unessays. These projects demonstrate not only how clever and creative students can be, but also the variety of ways that students can express and display their thinking and learning. Vera Szabo (YIVO Institute for Jewish Research): Szabo shared with us a range of student work from the Yiddish language classroom. Such projects allow students to feel ownership over the language and to be creative within the language, which is essential for language learning. 1) David Sasso, a student in an intermediate Yiddish course at YIVO, set to music one of Rivke Basman’s poems as well as his own Yiddish translation of Daffodils by William Wordsworth. 2) Judy Kaye, an advanced beginner student at YIVO, imagined and created her grandmother’s diary, Khane-Zeldes heft as she immigrated to the US based on stories she had heard from her grandmother and other family members. 3) Another advanced beginner student at YIVO translated into Yiddish a children’s book, Big Dreams, Small Fish by Paula Cohen. Each of these projects require students to be creative within the language and allow for considerable personalization of language use, as students chose projects that speak to their interests and passions. Justin Cammy (Smith College): For the final assignment of my colloquium on Yiddish literature and culture in translation at Smith College this semester students were offered the opportunity to pursue three different options: a traditional essay, a readers guide to several works of Yiddish literature, or a creative project. Students had previously written several essays on aspects of classic Yiddish fiction and interwar Yiddish literature, and I wanted to encourage those interested in pursuing a different mode of disseminating knowledge to experiment. Of the 20 students in the class about a third chose each option. I received several wonderful short research papers on topics ranging from Der Nister’s symbolist tale “Beheaded” to “Yiddish Radio, Past and Present” to the relationship between the Netflix series Russian Doll and Yiddish literature. An equal number of students elected to submit guides inspired by those published on the Yiddish Book Center’s Great Jewish Books Teacher Resources. I received submissions ranging from kits on Peretz’s A Night in the Old Marketplace to those that were at the heart of the final weeks of the semester, such as the film Our Children and Sutzkever’s “Teacher Mire”. Those who elected to pursue a creative project were required to submit a proposal to me in advance, alongside a proposed rubric for grading. The creative projects also included a brief “artist’s statement” to explain their creative choices. I encouraged students to draw on their careful reading of course materials as inspiration for their work. Among such creative projects were two playlists of contemporary music inspired by post-war stories by Chava Rosenfarb and the transvernacular film Romeo and Juliet in Yiddish, and a creative non-fiction piece about a real-life Yiddish family murder-mystery in Wyoming in 1937. Rachel Agosto-Ginsburg and Zoe Cloud, Pisherl and Shmuel-Aba Go to Hell (an original story inspired by Itsik Manger’s The Book of Paradise) Niki Kuipers,original poetry inspired by readings of Bashevis Singer’s demon tales and “Blood” Jay Frothingham and Zephyr Steiner, Yiddishland (a table-top role-playing game that students played on the last day of classes to great acclaim) Jessica Kirzane (University of Chicago): The following is small selection from among the many surprising, creative, and thought-provoking final projects that students produced in my Modern Jewish Civilizations courses at the University of Chicago. These are courses based around primary source materials that take students through a wide geographic and chronological range of modern Jewish life. I typically assign a more traditional argumentative essay for the midterm, and ask students to complete an open-ended unessay for their final project. The unessay is meant to reflect on the themes and ideas we have discussed and read about in class. Regardless of the format - which is left entirely to the students - the unessay is evaluated on the quality of its interpretation, use of evidence, communication, and creativity, and my assessment is heavily informed by student self-assessment responses that they complete alongside the assignment. Each unessay must include: A title for the project, a 500-word introduction that provides an overview and explanation of the project’s interpretation, and an annotated bibliography of sources, as well as a completed self-assessment. I have included here a sampling that demonstrates the range of assignments I receive and I have also excerpted from the students’ analyses to help frame the work included here. 1. Hadleigh Schwartz, “Accross Space and Time”: a website relating family history to the course readings. “So many of the pieces we explored throughout the quarter felt relatable, despite their originating from disparate cultures, time periods, and authors. I found myself reading and rereading Marge Piercy’s description of courage and ancestry in “Maggid,” flashing back to an elementary school visit to the local Holocaust museum while discussing Etgar Keret’s Shoes, and running along the lake shore to A-WA’s empowering songs. These connections between pieces created in diverse continents as early as the 1500’s, then discussed over a Zoom call in 2021, and reminding me of a great grandfather who lived in 1800’s Russia, all blur space and time. As we progressed through Jewish history in this class, I progressed through my own family’s history across space and time. This process of hopping back and forth between continents and centuries - like my Great Grandpa Benjamin’s story and the Jewish history that we have spent the quarter exploring - ...contains uncanny parallels between past, present, and future. In this interactive timeline, I hope to capture this spirit.” 2. Laura Ribiero, “Words Left Behind”: poetry inspired by Bernarda Manuel, a victim of the Spanish Inquisition (as discussed by Lisa Vollendorf), Glikl’s memoirs, and Clarice Lispector’s short story “Forgiving God.” “I structured my poem about Bernarda Manuel as a question and answer, in which instead of being questioned by the Inquisition, Manuel questions herself and the reader.... I chose to write my poem inspired by Glikl as a list of things that might be passed on as a legacy.... In my third poem, I incorporated details from Lispector’s biography as well as elements from the short story we read in class, “Forgiving God.” Although the narrator of the story is not necessarily Lispector herself, I wanted to engage with the last sentence of the story, “As long as I invent God, He doesn’t exist,” to link the narrator’s invention of God with the creative process of being a writer.” 3. Susan Vaughey, “Higher Doorsteps”: a graphic novel version of Shira Gorshman’s High Doorsteps (trans. Faith Jones) “For my final un-essay, I chose to do a mixed media, zine inspired version of “High Doorsteps” by Shira Gorshman. [The story is] about how society expects far too much from woman which often leads to them being gravely overworked. But, in return all the extra work they do is then drastically undervalued. This combination leads women themselves to undervalue not only their work and time, but also by proxy this leads them to undervalue themselves as a whole... I purposefully used very bright colors for Golda’s creations, but Golda herself was always a muted color palette to represent how constantly working so much and throwing her entire self into her work as she does is draining to Golda and real life women.” 4. Henry Davis, “Living my Life as a Radical Jewish Woman”: epistolary map This is a series of fictional letter exchanges [created for a course on “Mothers and Motherhood in Modern Jewish Cultures”] that “imagines a fifteen-year-old Puah Rakovsky (1865 – 1955), coming across an eleven-year-old Emma Goldman (1869 – 1940), on her trip to Konigsberg with her father to procure her trousseau, and leaving Emma, whose family lived there at that time – 1880 or 1881 – her address. The lifelong correspondence that follows, having been recently recovered bizarrely in the soil near Rosa Luxemburg’s (1871 - 1919) grave, who seems to have also written to Rakovsky, proceeds from this hither-to forgotten but momentous event. Interestingly, the correspondence contains passages that cropped up in later writings of the authors, suggesting they had kept the letters and used them for later philosophizing and writing.” “The premise of this illustrated, Dr. Seuss-style children’s book draws upon Yankev Glatshteyn’s poem “Sing Ladino” and I.L Peretz’s address at The First Yiddish Language Conference.... The image that inspired me to symbolize song/language in a band of color bursting out of a young boy’s mouth and streaming out of the window was this one from the aforementioned work of Peretz: “We stroll in the evening in the streets and from various windows stream out the sounds of different languages, all kinds of folk-music. We want our own windows! Our own distinct motif in the folk-symphony.” The window in this passage, within the metaphor of culture, serves a key role: It symbolizes the point of interface between the personal realm and the public, where one’s one culture is displayed for the benefit of all. Thus, opening on a young boy in the window let me start from a point of the self, one’s own personal contribution to culture. Throughout the next two pages, I trace the stream of the boy’s own song further out from the window, symbolizing an exchange with a wider Jewish (and gentile) world. As the field of view of the illustrations broadens, it begins to reveal a multiplicity that Glatshteyn gets at throughout his poem. We see this theme represented throughout the book through the diversity of mingling colors.” N.B. All work shared with students’ permission.
<urn:uuid:8136ea5d-4e63-4754-bb57-f3efc000dd93>
CC-MAIN-2022-33
https://ingeveb.org/pedagogy/final-projects
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00667.warc.gz
en
0.951502
2,857
2.9375
3
The Federal Government may be forced to make concessions to the car industry as a result of a recent pre-GST sales slump, the Industry Minister, Senator Nick Minchin, acknowledged yesterday. In the strongest admission to date of the industry's problems, Senator Minchin said the Government was "talking to the companies", adding that "we do not want the car industry to suffer". "We will act if necessary," he pledged. The latest industry study indicates a far worse picture than portrayed by Senator Minchin in his answer to the Senate. Senator Minchin emphasised the fact that sales were coming off a record high and were down only 3 percent in the nine months to September this year from the same period last year. But a study by the industry consulting firm Martec forecasts a 13 percent fall in sales this financial year, ahead of the GST's introduction, and an 18 percent drop in the last quarter of the year, ahead of the GST's introduction on July 1, 2000. Under the GST, the Government will replace a 22 percent wholesale sales tax with a 10 percent consumption tax, levied on the final price. The Government's figures indicate that retail car prices might fall by as much as 8.3 percent, although industry estimates predict a somewhat smaller response. The slowdown in sales might partly reflect the Government's hyperbole about the consumer benefit from the GST during the election campaign. The Government claimed new car prices would fall by as much as $3,000, which is well above the saving on the average car implied by the Government's figures. In a statement yesterday, Senator Minchin said the reduction on the average car would be only $2,500. The chief executive of the Motor Trades Industry Association, Mr Michael Delaney, said the industry had noted the answers from Senator Minchin in recent days, and it was "very concerned" about the impact on Australian cars. While it was true that total numbers were not "greatly down, that is not the point". The market for medium-size, six-cylinder cars was "gravely down", with stock holdings rising and dealers under "increasing stress". The report by Martec Consulting said the four Australian car makers generated 72 percent of their sales from fleet buyers and that plant closures and employee standdowns may result in the period of March to May in the years 2000, 2001 and 2002 as a result of the transitional arrangements. The Martec report says the slump in sales will cost the Government $450 million in lost sales tax revenue. But measures to avert the decline, such as a reduction in the rate of sales tax to 13 percent, could cost as much as $1.3 billion.
<urn:uuid:3d1cf175-6f68-430b-b020-7554c36a8143>
CC-MAIN-2017-04
http://www.drive.com.au/motor-news/car-industry-may-get-gst-aid-20100823-13g7t.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00077-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973384
551
1.5
2