text
stringlengths 181
608k
| id
stringlengths 47
47
| dump
stringclasses 3
values | url
stringlengths 13
2.97k
| file_path
stringlengths 125
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
138k
| score
float64 1.5
5
| int_score
int64 2
5
|
|---|---|---|---|---|---|---|---|---|---|
Squash and sweet potatoes are convenient, colorful vegetables that make healthy additions to any dish. Although they may not be traditional staples, they are rich in history, nutrition and taste. Consider them as an option to add wholesome variety at meal time.
Sweet potatoes and squash originated in the Americas. According to the U.S. Department of Agriculture, sweet potatoes came from the warm climates of Central and South America where they were staples of Aztec and Incan diets. They were introduced to Europe by Christopher Columbus and to Asia by subsequent explorers.
Squash originated in North America where it was domesticated by Native Americans and also eaten by European settlers. The colonists gave squash its name, derived from a Native American word for "something eaten raw".
Squash comes in varieties that are specific to the season in which they are harvested. Yellow squash and zucchini are available in the warmer months when their skin is still tender, while butternut and acorn squash are produced in colder months. Summer squashes should be slightly tender and glossy, without blemishes. Winter squashes should be firm, heavy and have a tough rind.
Sweet potatoes are harvested in the fall. Fresh sweet potatoes are smooth, uniform and firm. Avoid any sweet potato with damage to the skin since the flesh is susceptible to contamination.
Both squash and sweet potatoes are low in fat, cholesterol and sodium, making them excellent choices for a balanced diet. They are rich in micronutrients, especially vitamin A, vitamin C, vitamin B6, potassium and manganese. Sweet potatoes are a good source of dietary fiber, and squash provides an additional boost with vitamin E and calcium. Neither vegetable has a negative impact on weight or health maintenance in its natural state.
Squash preparation depends on the variety. Summer squash is immature with edible skin, making it a candidate for most methods, including boiling, steaming, sauteing and baking. It can be sliced or divided as desired to fit the dish. Winter squash is usually baked and then cut open to extract the pulpy flesh from the rind.
Sweet potatoes are traditionally baked in their skin, although they can be peeled and cubed for casseroles or boiled and mashed like white potatoes. The naturally sweet flavor can be enhanced with brown sugar and cinnamon.
|
<urn:uuid:4f9c3488-c6b1-409a-8691-8ee4043f9702>
|
CC-MAIN-2017-04
|
http://www.livestrong.com/article/442752-squash-vs-sweet-potatoes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00422-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.952407
| 469
| 3.25
| 3
|
(PORT EVERGLADES, Fla.) — A Royal Caribbean cruise ship has returned to port with more than 100 passengers sickened by a stomach illness thought to be norovirus.
Vision of the Seas returned to Port Everglades, Fla., after an 11-night Caribbean cruise. One hundred five passengers and three crew members fell ill, the cruise line said. There were 1,991 guests and 772 crew members on board.
The ship returned as scheduled and ill passengers responded well to over-the-counter medication being administered on board the ship, Royal Caribbean International said.
The Centers for Disease Control, which tracks norovirus outbreaks on its website, did not yet have a record of the incident.
In a statement to ABC News, the cruise line said, “At Royal Caribbean International, we have high health standards for all our guests and crew. During the sailing, we conduct enhanced cleaning on board the ship to help prevent the spread of the illness. Additionally, when Vision of the Seas arrived to Port Everglades, Fla., today, we conducted an extensive and thorough sanitizing onboard the ship and within the cruise terminal to help prevent any illness from affecting the subsequent sailing.”
Vision of the Seas just concluded an 11-night Caribbean sailing that included port calls to Basseterre, St. Kitts; Roseau, Dominica; Bridgetown, Barbados; St. George’s, Grenada; Kraledijk, Bonaire; and Oranjestad, Aruba.
According to the CDC website, “Norovirus is a very contagious virus. You can get norovirus from an infected person, contaminated food or water, or by touching contaminated surfaces. The virus causes your stomach or intestines or both to get inflamed (acute gastroenteritis). This leads you to have stomach pain, nausea, and diarrhea and to throw up.”
Because of the close quarters on a cruise ship, norovirus tends to spread quickly.
The ship was scheduled to depart on its next voyage late Friday afternoon. In an email to passengers scheduled to depart on Friday’s Vision of the Seas cruise, the cruise line said, “We will conduct enhanced sanitizing onboard the ship and within the terminal to help prevent any illness from affecting your cruise.”
The last recorded outbreak on a cruise line was in December 2012 on Cunard’s Queen Mary 2. The CDC reported that 194 passengers and 11 crew reportedly fell ill during the voyage. The same month, there was a norovirus outbreak on another luxury cruise ship: The Emerald Princess. In that case, five percent of all passengers — 166, plus 30 crew — fell ill on the sailing.
Copyright 2013 ABC News Radio
|
<urn:uuid:619efad3-9ccc-4102-b0e5-18531f5cc65e>
|
CC-MAIN-2017-04
|
http://www.eastidahonews.com/2013/03/royal-caribbean-cruisers-ill-with-apparent-norovirus/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00228-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.945181
| 572
| 1.53125
| 2
|
What Communicators Need to Know About … “TikTok”
TikTok is a hot new social networking app that’s taking the world by storm and now that they’ve launched their first in-app advertising units, communicators and PR professionals should definitely sit up and take note. Read on to learn more about why TikTok is growing at such a rapid pace (it’s amassed one billion downloads to date!) and how communicators can tap on the enormous pool of consumers that are congregating on TikTok.
What is TikTok?
Simply put, TikTok is a short-form video social networking app that’s famous in Asia (and growing in popularity in Western markets as well). TikTok was launched by artificial intelligence company ByteDance in China in 2016. Back then, the app was called “Douyin” and it was rebranded as “TikTok” a year later. In 2017, ByteDance bought short video-based social media service Musical.ly and merged it with TikTok.
How does TikTok work? It allows users to create videos of up to 15 seconds and add music, stickers, filters and hashtags. Users can also upload pre-shot videos of up to one minute long. On the app, lip-syncing videos, reaction videos and videos of magic tricks and stunts all tend to do well. TikTok also allows users to add specific hashtags to their favourites, so that they can quickly view content that’s been shared with that hashtag.
In China, @ChenHe is the most followed account with more than 50 million fans. Outside of China, the young German twins @lisaandlena were TikTok’s most successful account with more than 31 million fans – the two, however, have deleted their account in March 2019 citing concerns around data security and privacy (more on that below).
Today, TikTok has one billion active users. It also lays claim to being the fourth most downloaded app in all of 2018. TikTok is most popular in China but it’s also becoming very popular in other countries such as India. This particular country accounted for 27% of new TikTok installs between December 2017 and December 2018 with downloads of TikTok in India increasing nearly 25x in those 12 months. At the end of 2018, the app also became the most-downloaded free app on the Apple App Store in the US and ranked third in the world as of November 2018. All in all, TikTok is available in 150 markets, in 75 languages and the company also hit $6M in revenue (generated from in-app purchases used to tip live streamers) recently.
What Makes TikTok Different
What makes TikTok different from all the other social media apps out there? When you create an Instagram or Twitter account, your feed is empty and you’ve got to start following people and liking content in order to populate your feed and train the algorithm to show what you like. On TikTok, however, the content is pushed to you on a page called “For You” without you having to lift a finger. As John Herrman from the New York Times puts it: “Imagine a version of Facebook that was able to fill your feed before you’d friended a single person. That’s TikTok.”
TikTok is fully reliant on AI and while Instagram, for example, uses AI as a tool, TikTok is AI. More specifically, the app starts “making assumptions” the very second you open the app, even before you’ve given it anything to work with. This helps with driving instant engagement on the app and its content as well as making it easier for new users to overcome the initial inertia they would normally experience with other social networks. This machine-driven aspect is the core difference that TikTok brings to the table and, very likely, to the future of social networks as we know them.
When it comes to user experience, TikTok also stands out. It highlights group challenges, hashtags or popular songs to its users, making it easy for them to start creating and posting content. On TikTok, you don’t have to first grow your following and get more followers – instead, you’re encouraged to jump from trend to trend as well as to create and interact with content.
How TikTok Is Redefining Social Media (And Why Everybody Should Try TikTok)
We’ve already discussed some ways in which TikTok is different from the other social media platforms out there but what’s most exciting about TikTok is the fact that it generates insanely large amounts of engagement.
Vox Media reporter Rebecca Jennings says that multiple popular TikTok users she spoke to pointed to the astronomical views, comments and likes that posts can garner as one of biggest draws of TikTok. To be clear, these views, comments and likes easily eclipse those of Instagram, Snapchat or (now shut down) Vine even when these three platforms were at their most popular.
The bottom line? TikTok gives users the best of both worlds; it incorporates the viral nature of Vine and capitalises on the interactive elements of Snapchat. It’s easy-to-use, fun, addictive and users can quickly carve out a niche for themselves and get instant feedback about their content. What’s not to like?
TikTok’s Rapid Growth
TikTok is growing at a highly impressive, unprecedented pace – not just in China, but in other regions as well. Case in point? According to statistics, TikTok’s daily downloads were higher than those of Facebook, Instagram, Snapchat and YouTube in the US at several points in 2018.
Why is TikTok becoming so popular in the US? While the app has been growing organically via word-of-mouth, it also received a ton of exposure from Jimmy Fallon on The Tonight Show. Back in 2018, the comedian and host issued the #tumbleweedchallenge on The Tonight Show and asked viewers to act like a tumbleweed and upload the video to TikTok. The challenge generated 8,000+ submissions and 10.4 million viewings and was a huge coup for TikTok.
Interestingly, Facebook recently launched a competitor app, Lasso, that’s pretty much a carbon copy of TikTok. That said, TikTok is still miles ahead of Lasso in terms of both app downloads and engagement. Lasso generated approximately 70,000 downloads from US consumers from November 2018 (when it was first launched) to February 2019; in comparison, TikTok saw about 40 million downloads in the same period.
TikTok for Businesses: The App’s Potential for Communicators
For communicators trying to promote their companies or brands, TikTok holds an immense amount of potential. Communicators have different options for using TikTok, such as:
- Creating videos for consumers to watch
- Creating challenges, contests or giveaways to engage consumers
- Sponsoring videos by TikTok’s top influencers
Several companies have already started using TikTok to create and disseminate challenges that drive engagement. For instance, McDonald’s worked with TikTok to create a contest called the #BigMacTikTok Challenge in Malaysia. In the US, fashion brand Guess has also partnered with TikTok to launch a #InMyDenim challenge targeted at millennials and Gen Z consumers.
When it comes to sponsored videos, BBC worked with the 14-year-old twins Max and Harvey Mills (who have over 6 million followers on TikTok) to promote its kids’ channel CBBC. MTV also partnered with TikTok to stream the MTV European Music Awards recently.
TikTok for Brands: Ads and Examples
TikTok recently launched its first in-app ad units in January 2019 and it now shows selected users a full-page splash screen ad when said users launch their TikTok app. TikTok also recently collaborated with SportsManias – an officially licensed NFL Players Association partner – to introduce NFL-themed AR animated stickers to promote the Super Bowl.
While TikTok is still testing its in-app ads and hasn’t officially launched its ad products yet, we hear that they’re slated to roll out four different types of ads. These include:
- Infeed native videos which are similar to Snapchat or Instagram story ads. These videos must range from 9 to 15 seconds in length and they will be skippable
- Brand takeovers where a brand can take over TikTok for a day and create brand-specific images, GIFs and videos. These takeovers are measured by impressions, unique reach and clicks
- Hashtag challenges are similar to what Guess did with its #InMyDenim campaign. These challenges can be measured by video interactions, clicks, banners views and other key metrics
- Branded lenses are similar to Snapchat or Instagram filters that users can apply to their videos.
TikTok for News Organisations:
While media companies have embraced emerging platforms rather quickly in the past, when it comes to TikTok however most of them seem rather hesitant. But, there are some examples of news organisations engaging on the platform such as NBC and The Washington Post.
NBC News’ “Stay Tuned – once exclusive to Snapchat – slowly expanded to other platforms and, recently, also to TikTok. Although TikTok doesn’t offer any monetisation opportunities for publishers yet, unlike Snapchat, executive producer Angie Grande says that her team’s current focus is on TikTok as well as YouTube: “In Snapchat, we’ll be able to do a full episode on the presidential debate. On TikTok, we played around with how do you pronounce all the candidates’ names… It’s not as serious, but still touching on a big topic they’re going to listen to.”
The Washington Post also recently joined TikTok and teenagers seem to like it as the newspaper garnered almost 40k followers on the platform. As Dave Jorgenson, the creator of the Posts’s TikTok content, puts it: “We’re slowly kind of proving to them that their perception of The Washington Post – wherever they got it from, if it was negative – now they’re looking at our TikTok and they’re saying ‘This is not what I expected. And I think that’s especially important, because as cheesy as it sounds, the people on the platform are the future.”
Risks of Using TikTok
While TikTok does bring plenty of advantages to the table, using TikTok also brings about certain risks, including the issue of privacy. In February 2019, TikTok was slapped with a $5.7 million fine from the US government for illegally collecting the personal information of its underage users.
Generally speaking, cybersecurity experts also agree that TikTok has a lack of privacy settings and that it doesn’t protect its users. Young Wo-sang, the convenor of the Internet Security and Privacy Working Group at the Internet Society Hong Kong, noted that the app should do a better job at verifying a user’s age at the point of account registration.
Why B2B Marketers Should Pay Attention to TikTok
Now, some B2B marketers have chosen to turn up their noses at TikTok, saying that it’s an app for teenagers and that it’s got no place in B2B marketing. That said, it is only a matter of time before TikTok’s pool of users matures and therefore it would definitely be a mistake for B2B marketers to ignore TikTok altogether.
As Gary Vaynerchuk states, both Facebook and Snapchat first captured a younger demographic and only later gained popularity in other age groups. As he predicts, TikTok will evolve the same way as these other apps – its strategies will eventually start to “skew older” and the app will become appealing to a larger demographic. When this happens, B2B marketers can then capitalise on the opportunity to use the app to market to their defined target groups.
Is TikTok Really the Next Big Thing for Brands?
TikTok might very well be the next big things for brands but it’s not just that! Besides being a great channel that communicators should leverage, it’s also a cutting-edge tech product that has changed the way social networks work and elevate “machine-human” interaction. TikTok has established a never seen before machine-driven content experience which transformed user engagement away from something that implied an intent from users.
TikTok’s virality and engagement are unlike any other app we’ve seen and, so far, it’s only gone from strength to strength. Now that ByteDance is opening up the platform and allowing businesses to run ads on it, the app will definitely become a force to be reckoned with and an important part of many companies’ marketing mix.
If you’re a communicator in the B2C space, you’ll want to get on TikTok ASAP; for B2B communicators, make the effort to familiarise yourself with the platform, then bide your time!
|
<urn:uuid:b2a789d1-4589-4180-9fe4-6fb4a05c1788>
|
CC-MAIN-2022-33
|
https://www.ubermetrics-technologies.com/blog/what-communicators-need-to-know-about-tiktok/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00672.warc.gz
|
en
| 0.953053
| 2,753
| 1.921875
| 2
|
See all those languages up there? We translate Global Voices stories to make the world's citizen media available to everyone.
Jim Brown, on his blog Grace Filled World, reflects on the nature of Anger and Mercy, in light of the violent protest in Sydney on Sunday 16 September 2012 over the anti-Islam film Innocence of Muslims.
Another thoughtful piece about the protests and their implications: Thoughts on the Muslim protests in Sydney http://www.roamingtales.com/2012/09/19/thoughts-on-the-muslim-protests/
Pingback: Netizen Report: YouTube Edition – The Netizen Project()
This site is licensed as Creative Commons Attribution 3.0. Please read our attribution policy to learn about freely redistributing our work
Some Rights Reserved
|
<urn:uuid:3fee3bc0-d06f-407a-a98d-a86b5680c55c>
|
CC-MAIN-2016-44
|
https://globalvoices.org/2012/09/19/australia-violence-at-sydney-protest-against-anti-islam-film/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00003-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.84812
| 164
| 1.914063
| 2
|
This class will focus on pushing the innovative 3D model into the 4D world. You will learn the process of how to create 4D-ready models in Revit software for Navisworks Manage software, Navisworks Simulate software, and Synchro software. The class will also highlight the difference between the traditional 3D coordination model, which is mainly used for clash detection, and a 4D-ready model. In addition, the class will cover the interaction of the model with the 4D software, and provide examples of actual building proposals that used this 4D-ready-model process. We'll show how the process provides clear communication to the stakeholders and parties involved regarding the construction plan, and how it has diminished cost and construction time in on-going projects, making them more efficient and productive. This session will feature Revit and is AIA approved.
- Understand the difference between a coordination model and a 4D-ready model
- Understand how to create parameters within Revit for 4D
- Learn the benefits of understanding the schedule for 4D simulation
- Learn how to automatize the auto-matching process
|
<urn:uuid:0ed706e4-3816-4b47-b2a0-a5815213a74a>
|
CC-MAIN-2022-33
|
https://www.autodesk.com/autodesk-university/fr/forge-content/au_class-urn%3Aadsk.content%3Acontent%3Ae9cde4b6-db50-488b-96cc-fb88766aab80
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00266.warc.gz
|
en
| 0.876999
| 242
| 2.484375
| 2
|
Add and Subtract with length.
Lesson 2 of 6
Objective: The students will be able to measure the length of an object twice, using length units of different lengths for the two measurements; describe how the two measurements relate to the size of the unit chosen
Can someone tell me what we have learned about inches so far?
How to place an object to be measured.
We start measuring by placing an object on zero.
we can use other objects to measure.
We can compare two objects.
Todd's puppy was 10 inches tall when he went to the vet last month. Today, the puppy is 13 inches tall. How many inches taller is the puppy now?
What is the problem asking us to do?
How many inches taller is the puppy now?
What information do the problem give us to help solve the problem?
It tells us that the puppy was 10 inches tall at first, but now it is 13 inches tall.
Are there any key words?
Yes! Taller is is telling us to subtract to find the missing number.
To build on students’ prior knowledge:
I note that, the length of another object can be added or subtracted from the length of another object. After that, I model aloud what questions to ask as I solve the problem. I wanted students to learn problem-solving strategies to assist them in solving mathematical equations using inches.
Todd's puppy was 10 inches tall. He is now 13 inches tall.
Subtract 10 inches from 13 inches, to find how many inches taller the puppy is now.
13 - 10 = 3
So, Todd's puppy is 3 inches taller.
Both of these are strategies that have been introduced in prior lessons and will help to scaffold new learning. My goal is for students to begin to rely on what they know about length and addition to help them solve two-step word problems.
We will be focusing on the following Mathematical Practices in this lesson:
MP.2. Reason abstractly and quantitatively.
MP.3. Construct viable arguments and critique the reasoning of others.
MP.5. Use appropriate tools strategically.
MP.6. Attend to precision.
MP.7. Look for and make use of structure
Material: How To Document.docx
I invite students to sit with me on the carpet. I go over the objective for today. (SWBAT add and subtract length.) Stating the objective gives the students some idea of how their learning is going to be measured. Unless your objectives are measurable in some manner, there is no way that you can produce the evidence necessary to show that the objectives were in fact met.
I continue by writing a word problem on the board. I ask students to read the problem aloud with me.
Students and Teacher Talk:
Morgan threw a football 10 meters. Logan threw a football 12 meters.
How far did the girls throw the football in all?
Use n to stand for the total number of meters.
To find how far the girls threw the football in all, add 10 meters to 12 meters.
10 + 12 = n
Probing questions are good to focus students thinking on the intended purpose of this lesson.
What is the problem asking us to do?
What information to do we know so far?
Are there any clue words?
What math operation are we using? How do you know?
Can you explain how you solved?
My goal is to assist the students only if needed. I want them to be independent problem-solvers that rely on what they know in order to solve equations. I ask students to repeat the objective of this lesson, and to discuss any misconceptions they may have. (If students are having any misconceptions review circling clue words, and basic addition and subtraction facts.) I ask students to return to their seats, so they can fill out a question card about the problem we solve.
I tell the students that they will be working independently to solve equations.
Now that students are back at their seats, they will begin to work independently on solving addition and subtraction problems involving length. I explain that they will read several word problems and think of ways to solve them. In addition to explaining I want you guys to become comfortable with explaining how you solve. Therefore, each of you have a problem solving sheet to write out each step. I point out that it is not necessary for you all to have the same strategy, but you must be able to explain your method.
While students are working I circle the room to provide assistance when needed. I ask random students to explain how they determine their answers. Students explain the steps they used, clue words they circled, and whether or not they used arrays to help them solve their answers.(Click on explanation to see details of how students should be able to explain their answers) I take anecdotal notes along the way to keep track of students strengths and weaknesses.
|
<urn:uuid:110e1341-4572-4bd4-840c-c1273f1a2b23>
|
CC-MAIN-2017-04
|
http://betterlesson.com/lesson/resource/3133376/student-sample
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00028-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.949206
| 1,014
| 3.953125
| 4
|
Soon as ever the young Christians had, at Pentecost, severed themselves from the ‘untoward nation’ of Israel, they identified themselves with the apostles in “doctrine, fellowship, breaking of bread, and prayers”; they were thus bound together in a fourfold way. The breaking of bread was in obedience to the express desire of the Lord Jesus, as instituted by Him in the upper room (where He had partaken with them of the Paschal supper) and formed a strong and tender link of fellowship between them, as well as a pledge of loyalty to their rejected and crucified, but risen and ascended, Lord. In those pristine days, faith and love were strong and power was great.
Devotedness continued, in spite of persecution unto death; but the pledge was maintained all along the page of history, until we read, in Acts 20, that, on a certain first day of the week, the disciples at Troas “came together to break bread”. It was therefore their custom so to do. Their assembly had this for its definite object. But, as on this occasion the Apostle Paul happened to be, for the moment, among them, he preached to them in great fullness, seeing that he was ready to “depart on the morrow”. The preaching, even that of an apostle, was not the object of their coming together; that was the breaking of bread. The other was accidental—this habitual and indispensable—at least in days of love and faithfulness to Christ. There can be no stronger motive or object, no claim more truly obligatory, in the assembling-together of the saints, than the breaking of bread. “Do this in remembrance of Me” was, and is, until He comes, the definite, explicit and most urgent desire of the Lord. Its neglect, whether by the individual or the mass, is a deplorable proof of disloyalty and indifference to His expressed will.
The neglect of it is one sin; the distortion of it, from a feast as simple as it is profound, into a saving and superstitious rite enshrouded by mystery and supposed power and virtue, is another. Both are sadly wrong, and yet each is clearly in evidence today.
The two words—‘Remember Me’—are surely sufficient to command the willing heart, as also to disclose the folly of all ritualistic mystery. No, these words declare that the blessed Lord desires nothing less than the remembrance of Himself in death, as they ask for nothing more, nor can they give aught else than that sacred memory. How sacred that memory is, is taught us in 1 Corinthians 10. The cup which we bless is the communion or participation by all the saints in the blood of Christ! What more sacred? The bread which we break is the same in the body of Christ! What more holy, more profound, or more precious? His blood and His body!
The Jew had his altar, and the Gentile had his table—one of demons—but the Christian has the table of the Lord, and all are absolutely distinct. There can be no intercommunion. Each sets forth a totally antagonistic system—irreconcilably so. The Jewish altar is obsolete; the Gentile heathen table is demoniacal; the table of the Lord is Christian.
Hence the profundity of the service, nay, the sacrament, of the breaking of bread. Moreover the loaf is one, for the saints are one body. Unity marks the whole Christian system. Then what decorum should characterize this feast (See 1 Cor. 11). It is “the Lord’s supper” and not our own. Bad behaviour there should not be either in eating or in drinking. Idolatry may indulge in its excesses and orgies, but the Christian realizes that he is remembering his absent Lord; and, at that moment, showing His death, in view of His return. His heart is duly and divinely solemnized by these great facts. His whole soul is filled with adoration and praise. All else than the grace and infinite love of the cross is forgotten. No other subject whatever need engross his mind. Christ is more than enough; and, better still, it affords the Lord the deepest joy when He finds Himself thus actually remembered by His assembled saints.
There may be other assembly meetings, as for prayer, etc., but that for the breaking of bread—the Lord’s supper—the weekly remembrance of Himself is, as our chapter clearly shows, of chief importance in the estimation of the Lord. Yet how heartlessly abandoned by the great majority of Christians, today, for a service of some kind which has only man for its object. But in no other way can “ye show the Lord’s death till He come”.
Beloved Christian reader, may I urge on you for Christ’s sake the sacred desire of your Lord that, in responsive love to Him you do your part in thus remembering Him?
|
<urn:uuid:8006fda4-82a9-4614-aecc-1d1b4d4ed290>
|
CC-MAIN-2017-04
|
http://stempublishing.com/authors/J_Wilson_Smith/A_Christian_Sacrament.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00347-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.964993
| 1,042
| 2.109375
| 2
|
from The Century Dictionary and Cyclopedia
- In heraldry, crowned, or surrounded by a crown, wreath, or the like.
- Ornamented with circles, as a jug or bottle: most commonly applied to vessels decorated with circles drawn around them by a brush or point held stationary while the vessel is revolved on the potters' wheel.
Sorry, no etymologies found.
Sorry, no example sentences found.
|
<urn:uuid:bdbfc383-cf0b-461a-8e9d-108385f7df53>
|
CC-MAIN-2017-04
|
https://www.wordnik.com/words/cercl%C3%A9
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00252-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.903074
| 92
| 2.5625
| 3
|
Bhanurekha Ganesan (born 10 October 1954), better known by her stage name Rekha, is an Indian film actress who has mainly appeared in Hindi films. Noted for her versatility and acknowledged as one of the finest actresses in Hindi cinema, Rekha started her career in 1966 as a child actress in the Telugu film Rangula Ratnam, which won the National Film Award for Best Feature Film in Telugu for that year, though her film debut as a lead happened four years later with Sawan Bhadon (1970). Despite the success of several of her early films, she was often panned for her looks and it was not until the mid-to-late 1970s that she got recognition as an actress. Since the late 1970s, after undertaking a physical transformation, she has been featured as a sex symbol in the Indian media.
Rekha has acted in over 180 films in a career spanning over 40 years. Throughout her career, she has often played strong female characters and, apart from mainstream cinema, appeared in arthouse films, known in India as parallel cinema. She has won three Filmfare Awards, two for Best Actress and one for Best Supporting Actress, for her roles in Khubsoorat (1980), Khoon Bhari Maang (1988) and Khiladiyon Ka Khiladi (1996), respectively. Her portrayal of a classical courtesan in Umrao Jaan (1981) won her the National Film Award for Best Actress. Though her career has gone through certain periods of decline, she has reinvented herself numerous times and has been credited for her ability to sustain her status. In 2010, she was honoured with the Padma Shri by the Government of India.
|
<urn:uuid:c39f9e6c-3327-49b3-987c-2e984142a623>
|
CC-MAIN-2017-04
|
http://www.bollywood.com/celebrities/rekha/biography
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00354-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.993075
| 356
| 1.71875
| 2
|
The least squares problem is described as follows:
Given n points in the plane: (x1, y1), (x2, y2), …, (xn, yn), find a line y = ax + b that minimizes the sum of squared errors:
SSE = sum1 ≤ i ≤ n(yi – axi – b)2
Unlike the Interval Scheduling Problem where we sought to maximize the number of requests that could be accommodated simultaneously, in the Weighted Interval Scheduling Problem, each request i has an associated value or weight wi and the goal is to find the maximum-weight subset of compatible requests. It degenerates to the interval scheduling problem when wi = 1 ∀i.
I recently got interviewed for a position at Microsoft and I think I owe acknowledgement to the various interview resources I used to prepare for it. Further, it should be helpful to many others like me who will be facing technical interviews this interview season.
Here, I describe variants of Kadane’s algorithm to solve the maximum subarray and the minimum subarray problems. The maximum subarray problem is to find the contiguous subarray having the largest sum. Likewise, the minimum subarray problem is to find the contiguous subarray having the smallest sum. Variants of Kadane’s algorithm can solve these problems in O(N) time.
|
<urn:uuid:f4f2b0e4-54fa-497f-ab61-5e5efbeee7d7>
|
CC-MAIN-2017-04
|
https://kartikkukreja.wordpress.com/tag/dynamic-programming/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00173-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.890659
| 282
| 1.78125
| 2
|
Nearly eight million older people could be at risk from unsafe gas appliances in the UK as Gas Safe Register reveals that three-quarters of Britons have never discussed gas safety with older family members.
The official safety body is therefore urging friends and family to help older people avoid gas dangers in their homes during this year’s Gas Safety Week (19-25 September).
The video features Mark Jones from the Merseyside Fire and Rescue Service as he recounts a case of an 81 year old man who was exposed to alarmingly high Carbon Monoxide levels, which could have been fatal.
More than 260 over-65s are injured by gas appliances every year, accounting for the majority (57%) of deaths from gas fires at home.
Gas Safe Register investigations have found that around one in six gas appliances are unsafe, with half of the gas fireplaces investigated found to be dangerous.
Only half know the signs of unsafe gas appliances, which include a lazy yellow flame instead of a crisp blue flame, soot or staining on or around the appliance and excess condensation in the room.
Worryingly, older people are half as likely (6%) as other age groups (15%) to have a gas installation or service carried out by a gas safe registered engineer to ensure their gas appliances are safe.
As a result of the research, Gas Safe Register is providing three tips to help keep older friends and relative’s gas safe at home:
1. Sign up for an annual gas safety check - Sign up on their behalf for a free annual gas safety check reminder at www.staygassafe.co.uk.
2. Get savvy with CO poisoning symptoms – Although CO has no smell, taste or colour, symptoms of poisoning include: headaches; dizziness; nausea; breathlessness; collapse and loss of consciousness – all of which can be mistaken for something else.
3. Recognise unsafe gas appliance signs – Signs of unsafe gas appliances include: a lazy yellow flame instead of a crisp blue flame; soot or staining on or around the appliance; excess condensation in the room.
|
<urn:uuid:3687f450-ff06-44bf-9b24-70500e39eb43>
|
CC-MAIN-2017-04
|
http://www.bexhillobserver.net/news/an-elderly-person-is-injured-every-other-day-in-the-uk-from-a-gas-safety-incident-1-7584888
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00015-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.95972
| 428
| 2.515625
| 3
|
Florida has more residents age 65 and older than any other state, but on a newly released list of the best states for retirement, Florida is in the bottom tier.
Money Magazine reported that LPL Financial produced a report ranking states as retirement locations based on six factors: weather, the fiscal condition of the state, access to health care and affordable “age-friendly” housing, employment and educational opportunities.
Florida ranked 38th on the LPL list of most desirable retirement states. Virginia ranked first. The Sunshine State had poor scores for housing, employment and education, and life-quality issues that account for traffic congestion and crime.
Eleven cities in Florida are among the 100 most dangerous in the nation, according to Neighborhoodscout.com.
Among “pre-retirees,” or adults who have as many as 20 more working years before retirement, weather is not yet a major factor in preferring one state for retirement over another, LPL reported. [Money] — Mike Seemuth
|
<urn:uuid:cc42ada8-7e6e-4d36-b152-e779f341e00b>
|
CC-MAIN-2017-04
|
https://therealdeal.com/miami/2016/04/10/floridas-luster-as-a-retirement-haven-has-faded/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00145-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.959544
| 207
| 1.578125
| 2
|
Nuts and chocolatespublished: 2009-08-14
My son and I sat on the kitchen floor eating a raisin mix.
“If I eat the black ones, my stomach will become black. And if I eat the yellow ones, it’ll be yellow,” he announced.
Life can be so simple at that age. He waited for me to agree. I said, “and if we eat both, we’ll have black and yellow stomachs.” He nodded, while frowning gravely.
He then popped an almond into his mouth, didn’t like it much and gave it to me. He did the same with a Brazil nut, a pecan nut, and a hazelnut.
Suddenly I remembered a box of chocolates. I was a small girl and was taking bites out of every chocolate. I disliked them and so I gave them to my mother.
I sat there on the kitchen floor thinking, “I can’t think of a better excuse for eating a whole box of chocolates.” Having children brings back memories of intimate moments you sometimes never realized you had.
|
<urn:uuid:7fb149d3-c65c-459b-930e-0aad81fb9892>
|
CC-MAIN-2022-33
|
https://www.aliefka.com/nuts-and-chocolates/?lang=en
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00066.warc.gz
|
en
| 0.967102
| 244
| 1.679688
| 2
|
The naming in the Commons yesterday of Ryan Giggs leaves the law on privacy in chaos.
Mr Giggs is just the latest public figure to have his cover blown, after an MP revealed the Manchester United star's injunction regarding an alleged extra-marital affair. Yet as John Hemming MP remarked, given that at least 75,000 people had already seen Mr Giggs named on Twitter, the gagging order is redundant. Today this paper names the five people who stand accused of breaking the injunction on Twitter: it is absurd that they should face the risk of prosecution.
The Prime Minister has said that "it's not fair on newspapers if all the social media can report this and the newspapers can't, and so the law and the practice has got to catch up with how people consume media today". A joint committee of MPs and peers is to investigate the use of injunctions. Clearly, in practical terms the present rash of gagging orders obtained by celebrities is "unsustainable", as the PM has called it, and the law will have to catch up. But the practicalities should not obscure the important principles of press freedom that are at stake.
Anyone who feels unjustly treated by the press - but especially wealthy people with their access to expensive lawyers - already has recourse to libel law and to the Press Complaints Commission. The latter regularly blocks publication of stories that invade individuals' privacy, especially where, for example, there are children involved. Yet the growth in injunctions amounts to a de facto new system of judge-made privacy laws - not yet as restrictive as those of France, for instance, but a significant brake on the freedom of the press.
Such restrictions have no place in British democracy, with its traditions of openness and robust media. The press should be free to report what is true. The reach of the internet merely underlines the good sense of this essential principle. And it is the principle that should now underpin legislators' efforts to update the law.
Our friend Obama
President Obama's arrival in the UK is a chance to assess the strength of the "special relationship" after years when it has been under pressure. Mr Obama had been highly critical on the campaign trail of the interventionist policies of his predecessor in Iraq, and it seemed that the co-operation of the Bush-Blair years might be fading. Yet the pressure of events in Afghanistan, Libya and the rest of the Arab world has proved the relationship's utility once more.
Mr Obama and David Cameron have acknowledged as much in a joint newspaper article today. Whatever the two nations' very different histories and political systems, for their leaders, diplomats and military planners, the relationship is, as Obama describes it, "essential" - as is clear in the Libyan engagement. That is why US presidents without even the old East Coast ties or interventionist instincts always come back to it. And as President Obama and British royalty enjoy each other's company today, the continued strength of our nations' ties is plain for all to see.
A giving city
Arsenal footballer Alex Song's pledge of support for this paper's Dispossessed campaign today, the day after the Government pledged another £1 million to the fund, is just the latest in London's extraordinary show of concern for the capital's poor. This may be a wealthy city, but it is also one which remembers that all are not so fortunate. Londoners' support for the fund does our city proud - and helps better the lives of some of its poorest citizens.Reuse content
|
<urn:uuid:4e25f483-6d82-4560-8733-e3c57f95e55b>
|
CC-MAIN-2017-04
|
http://www.standard.co.uk/news/the-case-for-reform-of-privacy-laws-6404685.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00458-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.967426
| 709
| 1.765625
| 2
|
SIGGRAPH 2010 By Focus
SIGGRAPH 2010 Talks provide a broad spectrum of presentations on recent achievements in all areas of computer graphics and interactive techniques, including art, design, animation, visual effects, interactivity, research, and engineering.
Talks provide a lightweight alternative to formal publication. They often highlight the latest developments before publication, present ideas that are still in progress, or showcase how computer graphics and interactive techniques are actually implemented and used, in graphics production or other fields. Talks can take you behind the scenes and into the minds of SIGGRAPH 2010 creators.
SIGGRAPH 2010 Director for Education
|
<urn:uuid:ff9f9a5d-df6b-48d1-935d-8ee8402eee37>
|
CC-MAIN-2017-04
|
http://www.siggraph.org/s2010/for_attendees/talks
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00324-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.89926
| 127
| 1.601563
| 2
|
Think your daughter has what it takes to compete in the real world? According to Meg Milne Moulton, an Executive Director of the National Coalition of Girls' Schools (NCGS), it may take more than a generous serving of smarts, self-confidence, and stick-to-itiveness to make it in today's increasingly competitive marketplace.
As our economy goes global, math, science, and technology are bigger than ever - and these fields are precisely those in which girls have been traditionally underrepresented. “Over fifty percent of the workforce will soon be female,” says Moulton, “and the degree to which girls will be represented in science and math is the degree to which we can give them greater opportunities, and with them, a better future.”
Educating girls to tackle the challenges of a globalized world was the theme of this year's annual NCGS conference, held last month in Baltimore, Maryland. Speakers addressed such issues as Internet safety, the role of women's sports in global awareness, and the competitive international recruitment of scientific minds. Among the attendees were twelve high school delegates from around the world, who participated in a hands-on workshop centered around the science of light. After the workshop, 90 percent of the girls reported a significant boost to their awareness of and interest in the field of optics. Meg Moulton attributes this in part to “the power of young women role models and the contagious impact of their enthusiasm and interest,” emphasizing that hands-on learning is particularly effective for scientific learning in young women.
Prepping your daughter for a future of scientific inquiry may sound daunting, but it could be as easy as a simple walk in the park. Here are some tips for parents interested in cultivating their child's inner scientist, as suggested by the NCGS:
- Keep expectations high. Because of their natural sense of curiosity, children are born investigators and experimenters. Encourage your daughter to take note of her surroundings, and to consider things such as how bridges are built and what makes plants flourish.
- Find a mentor. A positive role model will inspire your daughter, and may provide future opportunities in the sciences. Introduce her to a family friend or community member who can show her around a chemical laboratory or architecture firm.
- Involve her peers. Design a birthday party with a scientific theme, or hold a star-gazing party at night. Whether she's going to a science museum or working on a construction project, your daughter will always have more fun if her friends are just as involved as she is.
While science smarts are likely to give your daughter a leg-up in the job market, the importance of scientific inquiry goes far deeper. While she explores the scientific world, your daughter is engaging her rational, creative, and problem-solving capabilities, giving her invaluable experience to navigate everything the world has to offer her.
|
<urn:uuid:a110528d-ece2-4933-b5bb-baf06dcc5aec>
|
CC-MAIN-2017-04
|
https://www.education.com/magazine/article/Girls_and_Science_The_Wave_the/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00136-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.966312
| 592
| 3.171875
| 3
|
Think about how many times you’ve complained about another function at work:
- Human resources making it harder to hire/fire/promote someone
- Simple licenses or contracts caught up in Legal for months on end
- Information Security bogging down your project with extra work
It goes on and on. The same thing happens outside of work too. The best examples are usually in the public sector. It seems like some people almost enjoy making your life harder, doesn’t it?
They’re not Evil
People automatically assume that these lines of work automatically attract sadists or something. You’ll hear people vent about so-and-so being on a “power trip.” While there are people who are like this, they’re actually few and far between. What you need to do to understand what’s happening is to try to have some empathy and put yourself in their shoes for a moment.
You’re now in the legal department of a large multinational software company. You get requests daily to review licenses and contract terms. If you let something through that later is a problem, you take the blame for it. If you let something through that isn’t a problem and actually helps get a product out faster, you don’t get any of the credit.
Risk vs Reward
Life (and business) is a constant juggle of risks versus rewards. Is the risk of x worth taking in exchange for y reward? Do I pay extra for comprehensive insurance on my used car? Do I ask out that man/woman that I see at the coffee shop every day? Do I approve this contract with the terms as is?
The problem for these people and departments we’ve written off as wet blankets that are only there to make things harder is a lack of reward. If an HR person approves a nonstandard offer get a specific engineer onboard do they see any of the credit when the product is better or ships faster? No, they only see the risk of the downside—potential problems with other current and future employees compensation.
Since there’s no upside, they’re really not managing risk, they’re minimizing risk. If there’s anything that will increase the risk, the answer is no, no matter how high the reward. The only exception is when someone else (generally an executive) is willing to sign off on the exception so now the potential blame is transferred to them.
Bad Incentives, Bad Leadership
This is all rational human behavior—You would do the same in those positions. The problem is clearly a bad system of incentives. They’re only exposed to negative incentives, so they only react to those. It’s not their fault, it’s a failure of leadership. Your company’s leadership needs to put people in the right positions and armed with the right incentives to make the decisions that are best for their team and the company as a whole.
Adversaries at Work
If this is so obvious, why are so many relationships set up this way? The adversarial system is a legal construct that has been used in common law countries for centuries. Somehow in the US it got folded into the competitive aspect of capitalism leaving us with the “common sense” idea that it gives us the best outcomes. Labor negotiations are a great example of this- the company and the union in diametrically opposed positions will move to an equilibrium that’s the best for both sides. As we’ve seen over decades, this is often not the case and why more collaborative labor negotiation setups like in Germany have lead to better outcomes for the company and the employees.
We’re practicing this same approach in these relationships at work. The infosec engineer’s job is to represent the side of security, and the developer is representing the side of usability and therefore revenue. The idea is where they choose to compromise will be at the best risk/reward point. As we’ve seen many, many times this breaks down here too.
How do we fix this?
This is clearly a complex situation that has no easy silver bullet fix. Leaders need to constantly be evaluating all of the incentives—positive and negative, direct and indirect, to make sure they’re aligning with the company’s overall goals. How can legal share in the reward when the product ships sooner and how can the product teams share in the downside when there’s a licensing or security issue?
One of the easiest options that can work well in certain environments is to move these roles into the teams that they’re supporting. Instead of an infosec department, why doesn’t the product team have one or two infosec trained engineers on their team with them? They’re now part of the team that’s rewarded when the product succeeds, and the entire team is exposed to the risk of a security problem because it’s not “someone else’s problem.” We’re starting to see DevOps teams transform into DevSecOps teams for this exact reason.
A great example of this that I’ve gotten to witness personally at IBM/Blue Box was having the recruiter responsible (the incomparable Jill Jubinski) for hiring into the team be a part of the team. Having a recruiter know what your teams do on the day to day basis is really powerful. They will understand individual team micro cultures and be involved in planning—making them a strategic partner. They’ll know when you’ll need people before you do. Also, it gives the recruiter the ability to always be recruiting—if they know your team and find the ‘perfect’ candidate they can push to open headcount.
These are just a few examples of how leaders can break their organization out of this dysfunctional dynamic and get their teams working in a more productive manner with the same goal in mind.
If you’re not a Java developer (neither am I), you might not know about some of the newer technologies that are starting to get popular. These tools are all about getting java applications built and running faster. The focus is on lightweight application servers that boot quickly and have a simple configuration that only builds runtimes with the essential components. For example, the latest version of IBM WebSphere, called Liberty is designed in this manner with a footprint under 60MB and boot times under 2 seconds.
Another very popular example comes from Spring.io called Spring Boot. For people already using the Spring framework, Spring Boot is a great way to quickly get an app up and running. These type of tools are a change from previous java application development and deployment methodologies. Steve Perkins has a good post explaining the advantages of Spring Boot Here.
Spring Boot on Bluemix
One of the great things about Bluemix is developers have tons of options for how they want to build and deploy their applications. If you like docker, and want to deploy your spring boot app to Bluemix with a docker container, a fellow IBMer did a great post on it here.
What if you would rather deploy your Spring Boot application on Cloud Foundry? Let’s do this!
- First, make sure you have the Cloud Foundry CLI installed and the build manager of your choice (I’m using maven).
- Next, let’s get a copy of the Spring Boot repo with the sample apps.
git clone https://github.com/spring-projects/spring-boot.git
- Now, we need to pick a sample app- let’s use the web-ui sample.
- We need to build the app so we can have it ready to deploy.
- Once it’s done we have a JAR that we can deploy to Cloud Foundry. We’ll use the ‘-p’ flag to specify the JAR we just created.
cf push tbspring -p target/spring-boot-sample-web-ui-1.3.1.BUILD-SNAPSHOT.jar
In this case we didn’t supply a buildpack so Cloud Foundry used the default java buildpack. For Bluemix, this is the Liberty for Java buildpack. What if we don’t like that? What if we want to use the community java buildpack? It’s just as easy as using the ‘-b’ flag and supplying the url to the buildpack:
cf push tbspring -p target/spring-boot-sample-web-ui-1.3.1.BUILD-SNAPSHOT.jar -b https://github.com/cloudfoundry/java-buildpack.git
When it’s done, we have a running Spring Boot app on Bluemix Cloud Foundry. Pretty easy.
I constantly see a number of encryption vendors selling their wares by promising to ‘protect your VMs in the cloud’ or ‘help you meet PCI compliance in the cloud’ through encryption. What these vendors are selling is a technology called Data at Rest Encryption (DARE). It’s a style of encryption that leverages either existing OS-level encryption or deploys its own encryption agent but generally lives right above the storage drivers in the operating system. In this use case, it runs inside the VM and encrypts data as it is written and decrypts it as it is read. Some even leverage underlying hardware acceleration if it’s available.
DARE? How Does it Work
Data at Rest Encryption is an important technology that’s been around for some time. How it works is pretty straightforward. A software module, either provided by the OS or the software vendor, is loaded into the I/O stack and intercepts all traffic between the rest of the server and the underlying disk. It encrypts disk blocks as they are written and decrypts them as they are read. To the rest of the server, applications, and users this process is seamless and goes unnoticed. It’s called ‘at rest’ encryption because the only place where the data is encrypted is the data ‘resting’ on the disk.
What About Keys?
The one thing I haven’t mentioned yet is encryption keys. That software module that’s doing the encryption work needs a key to encrypt and decrypt the data. Depending on the implementation, it gets those keys in a different way. A common way is to encrypt the key using a password. This is a common way FileVault on OS X works. When my laptop boots, the UEFI boot loader asks for my password which it uses to decrypt my encryption key and pass it to FileVault which uses that key to mount my encrypted hard drive and boot my system. My key is stored in memory by FileVault, but when my laptop is powered off, the memory is cleared.
While that’s fine for one machine, it generally doesn’t scale. So many vendors offer some sort of centralized key manager that a server needs to check in with to get its key. This central server can also perform other management tasks like changing keys, pushing agent upgrades, etc. Just like my FileVault example, when the machine is powered off or rebooted it needs to check in with the key manager to get a key otherwise it can’t decrypt the data.
What’s the Problem?
Sounds great, right? Honestly, it was and still is great for physical use cases. For example, disposing of failed disks is easier because you don’t have to worry about sensitive data on it. Everyone with even the slightest bit of sensitive data (tax returns?) on your laptop should have a password and encryption turned on. If you lose your powered off laptop or it’s stolen, your data is safe (unless you have your password on a sticky note on your laptop).
Notice how I said ‘powered off.’ As long as your laptop is running, the process doing to encryption work is running and has the key in memory. How do you get to the key as an attacker? It’s really hard- you need to access the memory chips and siphon the keys out. I’m sure the NSA & CIA has equipment to do this, but not your average thief. There’s an old security maxim that if someone has physical access, you have to assume they’ll eventually be able to gain full access. In this case, it’s still a pretty rare combination.
One Click Access
Still don’t see a problem yet, right? Well here it is: virtualization and cloud technology makes it much, much easier to access both the storage and the memory of a running machine. What used to take a CIA-level capability, can now be done by almost any server admin. If you’re running a VM somewhere, whoever administers the underlying hypervisor has access to your data, encrypted or not.
How? Well Since the hypervisor stands between your VM and the hardware, it adds some great new capabilities (live migrating servers, moving storage, resizing VMs while they’re running, etc). It also includes the ability to dump the memory of a running VM to a file without the VM knowing. I can also copy the storage your VM is using without you knowing.
If you’re leveraging something like BitLocker in a VMware vSphere-backed environment to do the encryption, defeating it as an admin is stupidly easy:
- From the GUI, take a VM snapshot, and check the box to include the memory as well
- download one of the many BitLocker decrypter programs
- point it at the dumped memory as the key location and the vmdk as the encrypted data
- mount the unencrypted data to the windows machine of your choosing and you now have all the data.
It’s that easy and the owner of the VM is none the wiser.
Turtles All the Way Down
This is the part where vendors that do things differently generally jump up and go “ah ha! we’ve thought of that and we’ve overcome that problem!” This usually applies to solutions that do centralized key management. Their main defense is some sort of nested key arrangement- the key server doesn’t give out the key to the data, it gives out the key to unlock the key for the data. This approach has some advantages- it allows re-keying a machine without having to decrypt and re-encrypt all the data to change keys. The problem is, even if they decrypted the data key on each actual use every millisecond (which would kill performance), the outer key (the one decrypting the data key) is still stored in the clear in memory. Why don’t they encrypt that key? You can keep going down the line, but sooner or later the outermost key has to be stored in the clear in memory for any of this to work. So when I take a snapshot of a VM disk and its ram, there’s a key in there that can get me to the data in the memory, period.
One other defense mechanism that is trotted out is they assume the person trying to steal the data is going to power the cloned/snapshotted VM on. Their agent will contact the key server, and the key server will either not supply a key, or in the case of nested keys, tell the agent to destroy the encrypted data key. While this is generally a good feature to have, it still doesn’t fix any variation of scenario we talked about above. Not to mention if your VM is compromised while it’s running, it’s totally unnoticeable to the attacker just like any other person or app accessing the data on the server.
Many security and encryption folks will usually drop back to “yeah, well, that all may be true, but we’re required to encrypt to meet some compliance requirement and this checks the box.” From my experience, this is usually incorrect and due to a misreading or misinterpretation of the relevant policies or governing documentation. A perfect example is people encrypting VMs on Amazon Web Services to “meet PCI compliance.” A quick google search will uncover that the entire AWS platform has received PCI DSS Level 1 certification. Now that doesn’t absolve those handling payment data from any other responsibilities in regards to PCI DSS, but there’s no need to encrypt VMs there to “meet PCI compliance.” I’ve seen this throughout my career both as a customer and as a consultant, each company interprets regulations and policies differently. It’s not surprising because most of the regulations are purposely vague and focus on outcomes not techniques. There are obvious exceptions that are very prescriptive, but that’s not the norm.
Clearly DARE is a good technology for protecting physical computers with minimal impact on the user experience. We should all embrace any technology which is that straightforward. The problem is trying to apply this technology to virtual and cloud environments. So if doing DARE in the cloud doesn’t protect your data from a cloud administrator or from someone who has compromised your VM, what is it good for? Filling vendor bank accounts.
Watch enough presentations on modern IT and cloud computing and you’ll see the same theme over and over. New companies that are Digital/Platform 3/Cloud are disrupting existing industries. The most well-worn examples are Uber, Tesla, and Nest. The takeaway of the presentation is supposed to be that this huge technology advancement is enabling smaller companies to disrupt larger established players and if you want to disrupt/avoid being disrupted, you must embrace these new technologies.
How to Survive?
Along with the tales of this massive technology disruption to not only IT but businesses as a whole, a frequently cited strategy for overcoming it is ‘Bimodal IT.’ The premise which is espoused by Gartner, IDC, as well as a number of vendors basically describes an IT department divided into two groups— a group focused on existing ‘legacy’ IT while a new group needs to be created to design-build-run these new ‘cloud-native apps.’ Not only is this concept built on an incorrect understanding of the forces at work, actually trying to implement it is a recipe for disaster.
Revolution or Evolution?
As new ideas or products are invented, they start out hard to define hard to predict entities that evolve over time. The more share they gain, the more defined they become.
Simon Wardley has covered this extensively on his blog and in many talks. It’s the march towards ubiquity and utility.
From the perspective of computing, what are we really seeing happen here over the past decade? It’s compute moving from being a product that you buy (servers), into services you consume, to a utility that you pay that’s metered in hours and minutes. It’s a normal technology evolution which was neither unpredicted (John McCarthy foretold of utility computing in 1961!) nor a dramatic technology advancement to the consumer.
The Next Age of Compute
If this is a expected normal evolution of computing technology, why are so many companies struggling with it? Cloud computing has brought along another change with it that’s really causing the disruption.
Since VAXcluster was released by DEC in 1984, we’ve been living as an industry in the age of clustered systems. The learning curve in the early days was high and required the best and brightest. As clustered systems became more understood and productized, it was easy to understand and move from things like Microsoft Cluster Services to VMware DRS/HA Clustering. Developers built apps that expected and understood clustering technologies ‘just talk to the database at this IP’ and infrastructure engineers knew how to build and maintain them.
Cloud computing marks the arrival of the age of distributed systems. It requires significantly advanced skills to both build apps and infrastructure that operate in this manner.
Skills Shortages are the True Source of the Disruption
Ask any hiring manager working on distributed systems on either the development or infrastructure side and they’ll tell you how few candidates there are with the skill sets they need. How did this happen?
Years of Bad IT Leadership
Let’s go back to that chart we started with. How many CIOs in the previous decade put a dot on there called ‘IT’ and decided it had been pretty much all commoditized, so why not outsource all of it to IBM Global Services or EDS? Or even if they had enough sense to break that dot apart, it was probably only into two dots called ‘development’ and ‘infrastructure’, they probably still put these two monoliths near the top right. What did they do then? Offshoring, replacing ‘expensive’ experienced developers, architects and engineers with less experienced, cheaper ones. Now that they need developers and engineers with higher skill levels, they’re nowhere to be found.
Hiring: Must have 10 years Docker Experience
It’s amazing to see IT and HR organizations that can’t understand why they can’t find people with tons of experience in a brand new technology for their set developer/engineer rates, either internally or externally. They’ve completely forgotten that:
- They’ve been using offshoring, H-1B visas, and other cost saving measures that have suppressed their pay rates on common technologies and think that applies broadly
- They only pay lip service to personal development and skimp on training and conference attendance budgets.
- They’ve become so focused on process for process’s sake (ITIL, etc.) that anyone they had that could have picked up this new technology quickly is long gone.
And at the same time, a few of their similar sized competitors have had no trouble taking advantage of cloud computing, barely missing a beat. The organizations that are surviving and thriving have a common thread— their teams have discovered and learned these new technologies on their own, they weren’t hired in.
The organizational structure, leadership, inertia, and internal development (or lack thereof) is what’s causing disruption not ‘The Cloud.’
Why Bimodal IT Isn’t a Cure
This is why bimodal IT is so nonsensical. Assuming if you decided to split your IT shop into two groups:
- Where are you going to find the skills you need?
- Who is going to want to stay in the old organization with the implied scarlet letter of ‘you’re not as good as those people we chose’?
- 10 years from now when there is the next new age, do you create a third group? New, Less New, Old? Does the ‘old stuff’ get handed off to the group that stayed behind? Does the new group become the old group and the old group is fed to lions?
If it is so nonsensical, why is it gaining favor so much? It’s because so many companies want it to be true. Bimodal tells them ‘all the decisions you made up to now were right, and you don’t have to make drastic changes, just add a new team to address these new needs.’ It provides them with the smallest disruption to their current worldview. Simon has a great post on Bimodal here, including alternatives.
An IT Wakeup Call
The relatively slow pace of enterprise technology changes over the past decade lulled IT leadership into thinking that this was the norm. Why bother investing in your employees and advancing their skill sets when they could pick incremental new technology in their free time? IT departments were seen as a cost center that had to be controlled and the services IT provided mature and well understood.
It turns out this simple, myopic view of IT and the decisions made based on that view are what’s really causing the disruption in Enterprise IT today— not cloud computing.
|
<urn:uuid:00318b58-0fac-41da-85b4-5eba2523570a>
|
CC-MAIN-2017-04
|
http://vmtyler.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00556-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.949013
| 5,041
| 1.679688
| 2
|
Ernest Hamingway in "Cat In The Rain" tells about a couple having problems.
In Cat In The Rain, Ernest Hamingway illustrates the problems that an American couple have, and symbolizes the loneliness and protection need of the American woman by a cat which she sees huddled under a dripping table outside their Paris hotel, and attempts to rescue . Her husband, George, spends the entire story curled up in bed reading a book, paying little attention to his wife.
The American woman is struggling because this marriage can't meet her expectations. The woman wants a stable home where she is loved and respected by her husband. But her husband doesn't share the same idea an…
- Analysis of the Novel "Galapagos" by Kurt Vonnegut
- Considerations about Shakespeares "Romeo and Juliet"
- Ernest Hamingway in "Cat In The Rain" tells about a couple having problems.
E-pasta adrese, uz kuru nosūtīt darba saiti:
Saite uz darbu:
|
<urn:uuid:5bb6a4b0-5062-4942-bf0f-dc9bb0c66fdb>
|
CC-MAIN-2016-44
|
https://www.atlants.lv/eseja/ernest-hamingway-in-cat-in-the-rain-tells-about-a-/708046/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00239-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.901928
| 224
| 2.40625
| 2
|
The mission of the church in the context of women living with HIV and AIDS : a case study of St. Alois Catholic rural mission station, Gweru diocese - Zimbabwe.
This research is designed to investigate the role and mission of the Church in response to the HIV and AIDS pandemic. A case study of St Alois Catholic Rural Mission Station has been used for the investigation of the research. The research focuses on women who are living with HIV and AIDS. A good number of African women theologians and scholars, as well as some male theologians, have explored the implications of HIV and AIDS. They have highlighted the impact of inequitable gender relations on women’s vulnerability to HIV. This research is built on the evidence that has been exposed by the theologians in the area of HIV and AIDS. The research findings affirm and portray a reflection of the reality of suffering that is being encountered by women living with HIV and AIDS. Until appropriate measures are put in place to address the pandemic, the Church will always remain challenged to respond to the theological challenges presented by the HIV epidemic. The research draws the attention of St Alois Catholic Rural Mission Station to the urgent need of responding to the devastating consequences of HIV and AIDS for women and their families. The study suggests three key biblical insights that should be a motive for the Church to be engaged in the pandemic. These are: the Exodus event that reveals the justice of God for the poor people; the mission of the prophets, a mission for the poor; and the mission of Jesus. Central to these key insights is the liberation of the poor and the oppressed. The mission of the Church therefore cannot be understood outside God’s mission Missio Dei, a mission that has the poor as its central focus. In this research, the Church is encouraged to redefine its mission by recognising the plight of the poor and creating situations that aim to eradicate the oppression of women, and provide empowerment opportunities that can transform their lives. Liberation Theology and Asset-Based Community Development are used as frameworks or tools that attempt to answer the research problem: How can the Catholic Church of St Alois Rural Mission exercise its pastoral mission in addressing the challenges that are faced by women living with HIV and AIDS?
|
<urn:uuid:a11b6432-1861-426f-a399-e14d780a9c25>
|
CC-MAIN-2017-04
|
http://researchspace.ukzn.ac.za/xmlui/handle/10413/1661
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00079-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.964124
| 454
| 2.421875
| 2
|
The team at Blaisdell family Dentistry in Boise would like to discuss how to have a healthy smile. Here is a list of what NOT to do.
Chewing sugared gum all day.
Cavities, a sore jaw, or issues with your bridgework may result. If you must chew, select gum with Xylitol.
Drinking soda and energy drinks.
These sugary, acidic beverages erode enamel and bathe your mouth in sugar, which leads to cavities.
Chewing ice or hard candy.
Your enamel is quite hard. But so are ice and hard candy, and head-to-head, occasionally they win, resulting in a broken tooth.
Maybe you think brushing is enough. Following brushing with a careful flossing job cleans away particles of food and plaque between teeth.
Using a firm bristled toothbrush.
A soft bristled brush is the best suited tool for the job. Save your firm brush for cleaning the grout around your bathtub.
Delaying dental checkups.
Don’t wait until you have a problem. Call us to book a thorough exam and the best deep dental cleaning you can get anywhere. Our excellent hygienists really are the best!
At Blaisdell Family Dentistry, you will find first rate dental care and our committed team of dental professionals. We offer family and general dentistry in the Boise, Eagle or Meridian ID areas. Our menu of cosmetic services includes dental implants, clear braces from Invisalign and porcelain veneers. Schedule an appointment with us today.
Contact Blaisdell Family Dentistry:
Location (Tap to open in Google Maps):
|
<urn:uuid:664ab476-7eb0-4b30-94f8-8bce06b00efa>
|
CC-MAIN-2022-33
|
https://www.blaisdellfamilydentistry.com/blog/for-a-healthier-smile-stop-doing-this/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00468.warc.gz
|
en
| 0.929318
| 361
| 2.015625
| 2
|
The Tymbrimi are a fictional extraterrestrial species in David Brin's Uplift Universe. One of the few races to ally with the humans, the Tymbrimi are considered by many of the galactic races to be tricksters. Tymbrimi have one client species, called Tytlal, which were previously thought to be unupliftable. The Caltmour, the species which uplifted the Tymbrimi, were exterminated in a intergalactic war.
Physically, they resemble anthropomorphic foxes, with fur that terminates in a widows peak above the bridge of their nose. They have a multitude of tendrils that radiate out from their temples that serve as sense organs for some type of telepathy described in the books as 'empathy glyphs', in addition to radiating excess body heat.
The Tymbrimi have glands that can release enzymes for making physical changes to their appearance and organs. This is called a "gheer reaction" in the books.
Culturally, they share many of the same reservations that humans have about the effects of the Galactic Library on developing cultures.
|
<urn:uuid:d8a55e05-6bc4-432b-a4b1-4c18937a9317>
|
CC-MAIN-2022-33
|
https://htyp.org/mw/index.php?title=Tymbrimi&oldid=13107
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00073.warc.gz
|
en
| 0.970233
| 242
| 1.765625
| 2
|
Most teenage girls don't plan to get pregnant, but many do. Teen pregnancies carry extra health risks to both the mother and the baby. Often, teens don't get prenatal care soon enough, which can lead to problems later on. They have a higher risk for pregnancy-related high blood pressure and its complications. Risks for the baby include premature birth and a low birth weight.
If you're a pregnant teen, you can help yourself and your baby by:
- Getting regular prenatal care
- Taking your prenatal vitamins for your health and to prevent some birth defects
- Avoiding smoking, alcohol, and drugs
- Using a condom, if you are having sex, to prevent sexually transmitted diseases that could hurt your baby. If your or your partner is allergic to latex, you can use polyurethane condoms.
Prevention and Risk Factors
- Birth Control: MedlinePlus Health Topic (National Library of Medicine) Also in Spanish
- Ten Tips for Parents to Help Their Children Avoid Teen Pregnancy (National Campaign to Prevent Teen and Unplanned Pregnancy) - PDF
- Are You Pregnant and Thinking about Adoption? (Children's Bureau) - PDF
- Can a Girl Get Pregnant If She Has Sex during Her Period? (Nemours Foundation)
- Talking Back: What Teens Want Adults to Know about Teen Pregnancy (National Campaign to Prevent Teen and Unplanned Pregnancy) - PDF
- Teen Parents (American Academy of Pediatrics) Also in Spanish
Statistics and Research
- Characteristics of Pregnant Teen Substance Abuse Treatment Admissions (Substance Abuse and Mental Health Services Administration) - PDF
- Reduced Disparities in Birth Rates Among Teens (Centers for Disease Control and Prevention)
- Teen Pregnancy in the United States (Centers for Disease Control and Prevention)
- ClinicalTrials.gov: Pregnancy in Adolescence (National Institutes of Health)
Journal Articles References and abstracts from MEDLINE/PubMed (National Library of Medicine)
- Article: Adverse obstetric and neonatal outcomes of adolescent pregnancies in Africa: a...
- Article: Recurrence of teenage pregnancy: associated maternal and neonatal factor outcomes.
- Article: Barriers and facilitators regarding the implementation of policies and programmes aimed...
- Teenage Pregnancy -- see more articles
Find an Expert
- Eunice Kennedy Shriver National Institute of Child Health and Human Development Also in Spanish
- Find an Ob-Gyn (American College of Obstetricians and Gynecologists)
- March of Dimes Birth Defects Foundation Also in Spanish
- Becoming a Father (Boston Children's Hospital)
|
<urn:uuid:bbfd136e-89e6-4d86-8587-ce16c7bf782c>
|
CC-MAIN-2022-33
|
https://www.medlineplus.gov/teenagepregnancy.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00469.warc.gz
|
en
| 0.87756
| 560
| 3.15625
| 3
|
If it isn't evident already, then tomorrow's Beatification will make it even clearer, what an enormous gift from God is the life and witness of Pope John Paul II.
His Pontificate accompanied me for over half my life and I know that his influence in my life is very significant. My first memories of him go back to my student years and to the TV news reports of his first apostolic visits abroad. I remember that what fascinated us all were the impromtu conversations he held with young people who had gathered, at night, outside the place when he was spending the night. He would come to the window or porch and speak with the young people, and it was often simply a question of them wishing one another a good night's sleep.
I was a student representative at the Coventry Airport Mass on Pentecost Sunday 1982 during his visit to the UK. We were totally thrilled by his presence in the country and were simply filled with wonder the the Pope had, at last, come to England.
During my seminary years in Spain, apart from the Rector's own delight in and devotion to JPII ( he took us to Rome to see the Pope in my first year; we also participated in JPII's 1982 visit to Spain, taking part in the Mass at Toledo), the Holy Father rather dwindled into the background as no one else, involved with our studies, paid much attention to him. Looking back I can see that a similar attitude was taking hold in the UK, and it is significant that no video record of JPII's historic 1982 visit was made as a souvenir.
By the time I was ordained priest in 1988 I was still totally unversed in JPII's teaching, and it was not until I was introduced to the Theology of the Body by another priest in 1993 that I was awoken to the nature and importance of what this Pope was about.
|
<urn:uuid:c98b621e-8d95-49ee-9971-1ab9e1894fca>
|
CC-MAIN-2022-33
|
https://friendswithchrist.blogspot.com/2011/04/he-who-stands-at-forefront-of-new-era.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00267.warc.gz
|
en
| 0.992241
| 388
| 1.695313
| 2
|
You want to have a computer network cabling installed in your company’s building, and you’ve opted for copper cabling. However, to make the right choice according to your high-speed internet needs, you’re now asking yourself what the difference is between ethernet CAT6 vs. CAT6a cables. To make an informed decision, read the following article!
Cable categories are determined according to the frequencies (expressed in hertz) at which they can transmit signals. For example, a category 5 (cat5) cable cannot exceed 100 MHz, while a cat6 cable can reach 250 MHz.
For their part, the letters A to F indicate the types of links that the frequency bands can allow. Cat6 cables belong to the E class; cat6a cables are part of the Ea class. In other words, CAT6a is an enhanced cat6.
The main difference between cat6 vs. cat6a cables relates to frequencies and link lengths:
Furthermore, CAT6a cables have a stronger coating, which reduces foreign crosstalk, or the interference caused by neighbouring cables. Overall, therefore, these cables offer better performance (faster speeds) than the cat6.
To determine which Ethernet cable is right for your company, you need to take different factors into account, including:
Generally speaking, cat6 cables are sufficient for a corporate network. Cat6a cables are often used for data centres or large intercompany networks, for example.
ited has been offering turnkey structured cable system installation services for over 20 years. Thanks to this experience, our qualified team can install your computer network properly, thereby ensuring flawless performance. Contact us to learn more.
Want to learn more about our IT expertise?
|
<urn:uuid:0a0d5461-e66a-435b-9453-e262d379444a>
|
CC-MAIN-2022-33
|
https://www.it-ed.com/en/cat6-vs-cat6a-which-to-choose/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz
|
en
| 0.924852
| 361
| 2.5625
| 3
|
Commonly known as Flying fish & scientifically named as Exocoetidae has more than 40 known species, grouped in 7 to 9 genera (families). Flying fish are commonly found in world’s tropical & sub tropical oceans where they have right temperatures to thrive. Flying fish have a very unique defense mechanism for escaping predators. They have found that the best way to avoid other fish in the water is to get out of the water.
By using their amazing & unusually large pectoral fins, they can take short gliding flights through air, above the surface of the water around 50m.
Flying fish are occasionally beating the surface of the water with its tail fin (caudal fin) in long their flights. Their main diet is Omnivore & they grow up to 18 in (45 cm).
Some flying fish can reach at approximate speed of 30km/hour (20mph) in flight & the recorded for maximum airborne time was 45 seconds, filmed by a NHK TV crew near Yakushima Island ( southern tip of Japan) in May 2008.
|
<urn:uuid:26ac4caf-284a-49cc-87d0-8de5b1249dd9>
|
CC-MAIN-2017-04
|
http://www.supiri.com/nature/ocean-life/amazing-flying-fish-are-real/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00517-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.965884
| 218
| 3.578125
| 4
|
Wednesday, September 14, 2011
The Swedish case against Assange in Professors blogg
8 September 2011 (22.14). Wikileaks cable on procedures at UN Women would help explain Sweden’s feminists campaign against Assange
8 September 2011 (08.21). A forensic scenario in the Swedish case against Assange
23 August 2011. The Case Assange and the Misuse of the PTSD Diagnosis in Swedish Rape Trials
9 August 2011. A London journalist does interview on negative Swedish-media reporting of Assange case
8 August. "Man har sålt en lögn till allmänheten"
3 August 2011. More on Feminism and State-Feminism. Strawman argumentation against critic to the state-feminism factor in the Assange case
29 July 2011. Pseudo-Science in Swedish Rape Trials. With an Introduction on the Origins of State-Feminism in Sweden
29 July 2011. Bloggers vs. Old Media: Who Wins and Why. By Andrew Kreig
6 July 2011. Name issues with their names. The Assange case and Swedish statsfeminism
5 July 2011. Julian Assange's sex-crime accusers deserve to be named. By Naomi Wolf
3 July 2011. Swedish updates on the Assange case
18 April 2011. The affair Irmeli Krans in the case of Sweden against Assange
17 April 2011. Swedish authorities face yet another irregularity in their sex probe of WikiLeaks founder Julian Assange. By Andrew Kreig
15 April 2011. Sweden's Serial Negligence in Prosecuting Rape Further Highlights the Politics Behind Julian Assange's Arrest. By Naomi Wolf
15 April 2011. Rigged documentary on Julian Assange in the Swedish National Television. Part 3: "Men are animals"
15 April 2011. Rigged documentary on Julian Assange in the Swedish National Television. Part 2: “Men that hate women”
15 April 2011. Rigged documentary on Julian Assange in the Swedish National Television. PART 1: The Political Agenda and Dirty Tricks
14 April 2011. Rigged documentary on Julian Assange in the Swedish National Television. CONTENTS
10 April 2011. Om Sverigedemokraternas utrikes politik är ”osvensk” vad är då Socialdemokraternas? Kampen för Assange och Mannings frihet fortsätter.
7 April 2011. The decreasing of Sweden's credibility in the world. Why blame Julian Assange?
22 March 2011. NATO, Gaddafi and Assange
19 March 2011. Censorship of Assange-articles in the Guardian & Swedish press
12 March 2011. Opinions on Assange case and censorship in Swedish media
11 March 2011. Case Assange: Rights Activist Challenges Ethics of Swedish Courts, Media. By Andrew Kreig
10 March 2011. WikiLeaks aftermath. The Middle East Feminist Revolution, by Naomi Wolf
6 March 2011. Have Swedish Pirates Betrayed Assange?
3 March 2011. WikiLeaks, Revolution, and the Lost Cojones of American Journalism. By Naomi Wolf
28 Feb 2011. Mark Stephens: "Demand open justice for Julian Assange"
27 Feb 2011. Assange VS Pinochet
27 Feb 2011. Comments on Judge Riddle's verdict & and lawyer Jennifer Robinson’s interview
26 Feb 2011. The Pirate Party should stand for their values. They should struggle for Assange and Wikileaks
24 Feb 2011, Assange's case. Witness Statement of Professor Marcello Ferrada-Noli
22 Feb 2011, Swedish media's censorship on Assange case
20 Feb 2011, Does Sweden Inflict Trial by Media against Assange?
18 Feb 2011. Anonymous Stop U.S. Business Plot Against, Bloggers, Unions, Rights Activists. Guest column by Andrew Kreig
13 Feb 2011. Karl Rove’s Swedish Connections: The Controversy And The Facts. Guest-article by Andrew Kreig
11 Feb 2011. Matching critic on Reindfelt's involvement in the Assange case
11 Feb 2011. Partner At Firm Counseling Assange’s Accusers Helped In CIA Torture Rendition. Guest-article by Andrew Kreig
10 Feb 2011. Karl Rove, Sweden, and the Eight Major Aberrations in the Police Sex Crime Reporting Process in the Assange Case. Guest-article by Naomi Wolf
9 Feb 2011. Analysis: Assange’s lawyer’s error shouldn’t determine the case
9 Feb 2011. Strongest appeal to Swedish prosecutor - "Hamlet without princess"
9 Feb 2011. Hamlet utan prinsessan. Åklagaren Marianne Ny starkt utmanat av Asange's advokat
8 Feb 2011. Objection to Sundberg-Weitman's testimony irrelevant
6 Feb 2011. Q & A: The Assange case and Swedish extradition
4 Feb 2011. Key-witnesses severely contradict state-feminist Borgström & women-accusers in Sweden’s phony case against Assange
22 Jan 2011. Swedish PM Reindfelt lies in London on Assange extradition
13 Jan 2011. Bordström & Borgström VS. Wikileaks
11 Jan 2011. New analysis: Swedish political crusade against Assange and Wikileaks
29 Dec 2010. Assange's message to Swedish journalists
29 Dec 2010. Asssange, criminal without a crime
26 Dec 2010. Sweden’s phony prosecution against Assange is POLITICAL and IDEOLOGICAL
11 Dec 2010. Sveriges Assange-anklagelser i kriget mot Wikileaks OCH yttrandefrihet
9 Dec 2010. Is there a CIA connection in the Swedish Assange-plot?
7 Dec 2010. Analysis: Why Sweden revenge against Assange
Important updated sources
Marcello Ferrada de Noli (Italy)
Share to Twitter
Share to Facebook
Share to Pinterest
Man kan bara tycka om professorns ärlighet och civilkurage!
Post a Comment
Post Comments (Atom)
|
<urn:uuid:89fa53a4-e0b1-46ad-9c8b-711fd7dd9edb>
|
CC-MAIN-2017-04
|
http://ferrada-noli.blogspot.com/2011/09/swedish-case-against-assange-in.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00296-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.754535
| 1,240
| 2.015625
| 2
|
Yep, that's right. Objective Caml. Objective Caml is an implementation of the Caml language, that adds some object oriented concepts to make it a multi-paradigm language. I chose Objective Caml because it's currently the language of choice of the course I'm currently taking (Prolog to follow. tee hee). In addition, it's a pretty good language for an introduction to functional programming, despite it's object oriented features.
If you're looking for a good tutorial on the language, you can visit the aptly named http://www.ocaml-tutorial.org. A few highlights of what I find interesting are below. Mind you, an Ocaml expert could probably name off a 100 better things, these are just the ones that stand out in my tiny little brain.
There's no need to declare types in the Ocaml language, but it's very much a strictly typed language. C# 3.0 is getting closer to this with the var keyword and it's inferred typing, but Ocaml is far more advanced in this area. An example in Ocaml:
let myInteger = 8;;
Which would have a C# equivalent of:
var myInteger = 8;
Obviously the benefit to this is that you're code is far less verbose. On the downside, as a noob Ocaml developer, you end up making educated guesses at the return type of your complex functions. This issue is probably more of a combination of the functional style and the inferred typing however, and you can quickly get used to it. I can imagine it's a breeze for anyone with a functional background or experience with dynamically typed languages.
Recursion Over Lists
Something that probably all good functional languages need to do well is recursion. Ocaml has deep support for recursion over lists. Below is an example of a function that sums integers in a list as it loops through it.
let myList = ["a";"b";"c"];;
let rec recurseList theList = match theList with
| -> 0 (*base case, have reached the end of the list*)
| head::tail -> head + (recurseList tail);; (*head is the current item in the recursion, tail is the rest of the list*)
This is probably the flagship feature of the language. Ocaml provides a rich pattern matching syntax that allows you to use recursion in place of loops easily, or to work with the custom data types you can declare. It's probably best to describe with an example though.
In this example, the first thing I'm going to do is declare a type that describes a binary tree. The data structure has nodes which can have a left node and a right node, and nodes can be empty. The "*" syntax below is how you define a tuple, which would be the equivalent of a C# Pair, but can be any number of items.
type bst = Node of int * bst * bst | Empty
This doesn't translate well to C#, but essentially what we've done is created a data type called "bst", and it can exist in two states. Either as a Node, which is essentially another data type that is a tuple that has a first position of integer, and a second and third position of bst. The bst can also exist in the state "Empty", which you can think of as null.
Now, where pattern matching comes into play is when I want to recurse over this tree to see it's nodes.
let printNode theBst = match theBst with
| Empty -> print_string "this node is empty"
| Node(value, Empty, Empty) -> print_string "this node has no children"
| Node(value, left, Empty) -> print_string "this node has a left child only"
| Node(value, Empty, right) -> print_string "this node has a right child only"
| Node (value, left, right) -> print_string "this node has two child nodes"
| Node (_,_,_) -> print_string "this node can be anything but Empty"
As you can see, it's a really fancy case statement. The final pattern match is redundant, but I thought I'd put it there so you could see an example of how a kind of "wildcard" pattern matching exists.
High Order Functions
High order functions is another feature that is commonly available in most functional programming languages. Its the ability for a function to take another function as an argument. Here's an example in Ocaml:
let doFunction theFunction theValue =
theFunction theValue;; (*Execute the given function on the given value*)
let myFunction x = x + 1;; (*This is the function to pass to the high-order function*)
doFunction myFunction 3;;(*Output should be 4*)
This is pretty powerful stuff, as most .NET developers have already seen in C# with delegates and now anonymous functions (which you can do in Ocaml as well.)
Now, the language is cool and all, but based on my background, I struggle to find good uses of it. I think some of these features I identified point out strengths of the language and could highlight potential uses for it (parsing, lexing, basically pattern matching). The Caml website has a bunch of "successful" applications that show various uses. Some of them make sense to me, others make me think, "you probably could have done that with .NET in like an hour".
This is just the tip of the iceberg of the language, and I'm not sure how useful this is to you all, or how comprehensive this is of a description, but it's helped me sum up my thoughts. I'd love to hear your feeback. I'll follow up with a post on the development environment, project structure and unit testing.
|
<urn:uuid:bcb60573-b399-49b7-9928-7d55d06f1ebc>
|
CC-MAIN-2017-04
|
http://www.writebetterbits.com/2008/06/lingual-dexterity-objective-caml.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00109-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.936451
| 1,241
| 2.46875
| 2
|
Translating Content Management
In many cases, especially in large enterprise settings, the translation process needs to be integrated into the content management system, both to manage the different versions of the same content, and to manage the translation process as part of the overall content workflow, and the software and service organizations generally support this. In the case of Lionbridge and SDL Trados, they can actually take over the translation workflow once the content is passed to them from a CMS.
In the Ektron CMS 400, according to company CEO Bill Rogers, they extend the idea of the content ID to tie the original content to the languages into which the content needs to be translated. "When you think about content," he says, "it has a unique identifier including a content ID and language ID, and that's what makes it unique. If we add an Office document or HTML block to the system, we add the content ID and language ID. If your CMS is set up to maintain three languages, it will let you know how many languages it needs to be translated into based on these identifiers."
What's more, the Ektron CMS exports content as XLIFF, an XML translation standard, which can be read by many translation vendor systems. This content is sent independent of its formatting, so translation service providers can deal strictly with the language. Rogers says, "In the Ektron CMS, we store the skeleton file with formatting information like the information about tables and layouts. We don't give this to translators because they can mess that up." When the content comes back, it gets imported again and the formatting is applied seamlessly.
Lawlor says that SDL's system is compatible with a range of major content management vendors. He cites the Sun website Java.com as an example of how his company's product works with a CMS—in this case, Interwoven. "The Java.com partner catalog is always being updated," Lawlor says. The CMS packages any content that has changed in Interwoven, and this is submitted automatically to the SDL translation engine, at which point the SDL system takes over. This is completely seamless to the user, Lawlor explains. "Our software will automatically create a project and send it out for translation." Lawlor adds that after the translation is complete, the SDL system sends the package back into the Interwoven system. "It's all automated," he says. "The only thing that's manual is the translation by the translator."
Translation and localization are not simple tasks you can just layer on top of an existing CMS, though they do play well together if well integrated. As with any new process, it requires careful planning and decision making about what level of translation, globalization, and localization you need—and how much of an investment you are willing to make to get there. For some, machine translation will solve most issues, but for other companies, human backup or pure human translation (with the help of translation memory database) will be required. Inevitably, organizations seeking to tap the ever expanding global marketplace will need to find a way to speak their customers' language.
Common Sense Advisory, Inc.
Sidebar: Ektron Helps Printronix Manage Translation Issues
Three years ago when Printronix, an industrial printing manufacturer, decided to translate its website content from English to additional languages, it hired Karen Jensen as director of ebusiness to handle the transition. "I was hired to bring forward the whole web strategy for the company," Jensen says. To that end, she helped implement a new Printronix.com web structure and helped the company to move into international markets and display its site in multiple languages. "Our growing markets are outside the U.S. in China, Russia, Eastern Block countries, and we felt that we must be able to address these audiences in the local languages."
At the beginning, Jensen says, they found they were having difficulties keeping the site up-to-date across five languages. "As a site grows older and you begin to make revisions and changes, how do you track them and how do you maintain content integrity? We ran into serious issues with that."
But content integrity wasn't Jensen's only problem. She was also having trouble with her translation vendor and was having issues with local distributors changing site information at the local level, and not providing a consistent corporate message from country to country. So last year, Jensen decided to clean house. She upgraded her CMS to the Ektron CMS 400 on the .NET platform. In addition, she fired her old translation vendor and hired COMSYS, which worked with her to build a glossary of her company's printer terms. Finally, she took away local control of the in-country websites and placed it under the management of her in-house staff in the U.S.
These days, she sends new content to COMSYS and has proofed and accepted files back within two weeks. The CMS helps her manage the content in multiple languages. She says, "When content comes back we can't tell what it says, but the way we export the file, the content blocks are all identified by a number generated in the CMS." Thus, when content comes back, the system recognizes the number and links the content blocks, regardless of language, with the correct content in the CMS, which helps maintain content integrity.
In fact, to her surprise, the importing process went so smoothly that she was able to get content live much faster than she had anticipated in her planning. "When I built the timeline," says Jensen, "I allowed for two weeks of QA testing after we imported the file because I was sure we would experience serious issues upon importing the content, but 48 hours later, we were ready to go live because the import function worked so smoothly."
The translation process has improved so dramatically that Jensen says she no longer worries about adding languages. "Now, when my president wants to add three more languages, I don't cringe and lose sleep because I know this is very easy. We can do it because I've built an infrastructure with not only the CMS 400, but also working with my translation company, and I know I can handle it."
|
<urn:uuid:82711ae2-7a64-446b-9e74-6da6ceec1a2d>
|
CC-MAIN-2017-04
|
http://www.econtentmag.com/Articles/Editorial/Feature/Multilingual-Content-Management-Found-in-Translation-16786.htm?PageNum=3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00182-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.956596
| 1,259
| 1.546875
| 2
|
Masters in Geology
Students who pursue a Masters in Geology can expect to study all aspects of earth sciences, with the option to pursue a taught course program or a more specialized research program. Some of the topics that are taught in this type of degree program include rock formations, fossils analysis, and how to apply this information to learning more about the earth's history. The first year of study generally revolves around learning more about the history of the field and specific analysis techniques, and further study delves into field work and a research or thesis project that the student undertakes with the help of an academic advisor.
As the first step towards a further career in the Geologic field, it makes sense for many students to look into obtaining an online degree. The world of online studies has blossomed in recent years, as more and more professors and professionals are finding that this teaching style translates well to newer technological capabilities. This benefits students who are looking for study opportunities that can fit well into their busy schedules. It's important to weigh the academic reputations and tuition fees of various online programs to find one that seems to be the best fit, with a rich academic tradition.
At the moment, the US Bureau of Labor Statistics has stated that the job outlook for individuals that have undergone Geology Master's Programs to be excellent, through the year 2018. There are several different areas or fields that work can be found in, including the natural gas industry and individual consulting projects for corporations. Government agencies also have an ongoing need for qualified geologists. The average starting salary, according to the BLS, is set at a median of $68,000, with room for improvement with experience, as this is a highly specialized field.
|
<urn:uuid:9b2b1e4c-b088-4f36-a987-247396cba07f>
|
CC-MAIN-2017-04
|
http://master-degree-online.com/masters-in-geology/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00083-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.964568
| 346
| 2.84375
| 3
|
In his recent address to European Lawmakers, His Holiness the Dalai Lama praised the European Parliament for awarding the Sakharov Price to Hu Jia. The speech was delivered on 4 December 2008 at Brussels as a part of His Holiness’ European Tour. The European leaders’ warm reception of the Dalai Lama had angered the Chinese Government. As a result, China cancelled the 1 December 2008 summit with the European Union. The Chinese Communist Party’s propaganda machine has also stepped up another boycott campaign against French goods.
In his speech, the Dalai Lama reaffirmed his intention to seeking genuine autonomy of Tibet within China through the “Middle-Way Approach”. He also reassured the EP of his commitment to non-violence method to achieve his goal.
However, the Dalai Lama also reminded the international community of the importance of taking a firm stand against human rights abuse in China. He said, “[The] Chinese people also want freedom of expression, free media and rule of law. If you adopt an attitude of appeasement, in the long run [it is] in no-one’s interest.” In this context, the Dalai Lama urged European countries to continue to put pressure on China to improve its human rights records:
I have no doubt that the principled and consistent engagement of the EP with China will impact the process of change that is already taking place in China. The global trend is towards more openness, freedom, democracy and respect for human rights. Sooner or later, China will have to follow the world trend. In this context, I wish to commend the EP for awarding the prestigious Sakharov Prize to the Chinese human rights defender Hu Jia. It is an important signal as we watch China rapidly moving forward. With its newfound status, China is poised to play an important leading role on the world stage. In order to fulfill this role, I believe it is vital for China to have openness, transparency, rule of law and freedom of information and thought. There is no doubt that the attitudes and policies of members of the international community towards China will impact the course of the change taking place in China as much as domestic events and developments.
The full transcript of His Holiness the Dalai Lama’s speech to the European Parliament is accessible at The Tibet Post International.
|
<urn:uuid:e8617b02-53fa-4c4a-82ab-2293dd9f449a>
|
CC-MAIN-2017-04
|
https://underthejacaranda.wordpress.com/2008/12/06/dalai-lama-praised-european-parliament-for-awarding-the-sakharov-prize-to-hu-jia/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00282-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.957045
| 471
| 2.09375
| 2
|
I was outraged and dismayed yesterday when I read an investigative story by Reuters that details how WellPoint -- the nation's largest health insurance company, with 33.7 million customers -- used a special computer program to systematically identify women with breast cancer and target their health policies for termination.
I believe every American should read this shocking story.
Instead of providing the health care for which these seriously ill women had paid, WellPoint subjected these paying customers to investigations that ended with WellPoint's administrative bureaucrats canceling their insurance policies at their time of greatest need.
Under attack by both cancer and WellPoint, these women were left ailing, disabled, and broke.
Yenny Hsu, a woman from Los Angeles, was kicked off of her insurance policy after a breast cancer diagnosis because WellPoint said she failed to disclose that she had been exposed to hepatitis B as a child. That has nothing to do with breast cancer, but it did not stop WellPoint from terminating her coverage.
Another loyal, paying WellPoint customer who faced this situation was Patricia Reilling of Louisville, Kentucky. Ms. Reilling was an interior designer and art gallery owner who never missed a payment. But that did not stop WellPoint from canceling her insurance in the middle of her fight with breast cancer. WellPoint abandoned her at her weakest moment, forcing her to pay enormous medical bills on her own.
This woman, who was once a highly successful business owner, is now subsisting on Social Security and food stamps.
Meanwhile, WellPoint made a profit of $128 million by stripping seriously ill Americans of their insurance coverage in this manner, according to the House Energy and Commerce Committee. This is likely a low estimate because WellPoint refuses to provide a total number for rescissions across the company's subsidiaries, according to the Committee.
WellPoint earned a $4.7 billion profit in 2009 -- a $4.7 billion profit in 1 year. Angela Braly, the CEO of WellPoint, received $13.1 million in total compensation in 2009. This was a 51 percent increase in her salary over the prior year.
WellPoint is not alone in doing this to people, but they are an egregious offender. According to Reuters, a House investigation found that:
"WellPoint and two of the nation's other largest insurance companies -- UnitedHealth Group Inc and Assurant Health, part of Assurant Inc -- made at least $300 million by improperly rescinding more than 19,000 policyholders over one five-year period."
According to Health Care for America Now, these large companies -- the big, for-profit American medical insurance companies -- saw their profits jump 428 percent between 2000 and 2007. During this period, they doubled premium costs. So, they made huge profits over seven years while doubling premium costs.
Time and time again, our for-profit insurance corporations have demonstrated that their hunger for profit trumps any moral obligation to their customers. This new story is just the latest example of the kind of outrageous behavior we have come to expect from certain health insurance companies.
The health insurance reform law passed by Congress and signed by President Obama will end the practice of unfair rescission and discrimination because of preexisting conditions. But we must clearly be vigilant in order to ensure that the law has teeth and is heavily enforced.
We cannot turn our backs for one minute because, left to their own devices, I truly believe these companies will look for ways to throw paying customers to the sharks for the sake of profit. A situation currently unfolding in California is further proof of this.
On May 1 -- one week from Saturday -- more than 800,000 Californians who hold insurance policies issued by WellPoint's Anthem Blue Cross subsidiary will face rate hikes of up to 39 percent.
I have received deeply personal letters from many of these WellPoint customers whose lives will be devastated by these rate increases. We have 12.7 percent unemployment in California, with over 2.3 million people unemployed.
So, people can't find jobs, and at the same time, their insurance premiums are being jacked up. This is especially terrible because many of these people already saw their premium rates rise dramatically last year, and they know they face even more rate hikes next year.
In California, two million people have lost their health insurance in the past two years. That is one million people a year who find they can't afford health insurance.
And this is happening at a time when these companies are reaping billions. So what do I conclude? They have no moral compass. There is no standard of ethical conduct.
The people being hurt by these for-profit corporations are families with children. They are students and the elderly. Cancer survivors and small business owners. They are about to be crushed.
WellPoint will say that these premium rate hikes cannot be avoided. They will tell us that other factors are to blame: hospital charges, prescription drug prices, the rising cost of medical care. They blame the government. They blame the economy. But the fact is that they are making billions of dollars in profits.
If there was any doubt about whether corporate greed has anything to do with WellPoint's plan to jack up rates on customers, I think the Reuters investigation answers the question definitively.
In order to prevent these kinds of unfair premium rate hikes on Americans, I have introduced a bill that would establish a health insurance rate authority. It would give the Secretary of Health the mandate to see that rates are reasonable.
My bill would give the Secretary of Health and Human Services the authority to block premiums or other rate increases that are unreasonable. In about 20 states, including California, companies are not required to receive approval for rate increases before they take effect.
Under this proposal, the Secretary would work with the National Association of Insurance Commissioners to implement this rate review process and identify states that have the authority and capability to review rates now. That means states where the insurance commissioner is not empowered - like California - would get protection from unfair rate hikes.
The proposal would also create a Rate Authority, a seven-member advisory board to assist the Secretary. A wide range of interests would be represented: consumers, the insurance industry, medical practitioners, and other experts.
I think this proposal strikes the right balance. President Obama took this bill and put it in his version of the health insurance reform reconciliation bill. Unfortunately, it was taken out of the bill due to parliamentary rules, but we haven't given up.
We can't give up, because nine days from now, 800,000 Californians will get up to a 39 percent increase in their premium rate as a result of corporate greed, pure and simple.
The bottom line: We have a duty to protect the American people from this kind of greed. If a CEO thinks it is OK to deprive women of their health coverage when they become seriously ill with breast cancer, we can't trust them to do the right thing, period. That's why Congress must step in and fix this rate hike loophole in the health insurance reform law.
We have to put patients before profits. We have to protect the American people from unchecked greed.
I will likely offer my bill as an amendment to the financial regulatory reform legislation. The matter has already had a hearing in the Senate Health, Education, Labor and Pensions Committee. Urgent action is necessary because 800,000 people face these rate increases a week from Saturday.
Rest assured that I will do everything I can to make sure the Health Insurance Rate Authority bill becomes the law of the land. In the meantime, I implore WellPoint and Anthem Blue Cross to consider the wellbeing of their customers, and I call on them to halt their plan to jack up premium rates on May 1.
How will Donald Trump’s first 100 days impact YOU? Subscribe, choose the community that you most identify with or want to learn more about and we’ll send you the news that matters most once a week throughout Trump’s first 100 days in office. Learn more
|
<urn:uuid:a29e7d36-4de3-4efb-995d-3cb0745f2d1b>
|
CC-MAIN-2017-04
|
http://www.huffingtonpost.com/sen-dianne-feinstein/congress-must-plug-the-ra_b_549829.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00042-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.971559
| 1,630
| 1.507813
| 2
|
You are watching: How long is soup good for in the fridge
Related: 50 Food Storage tips to Make her Groceries critical as lengthy as Possible
Time: 3 to 4 job It doesn"t matter if there"s a meat or vegetable involved: Leftover soup won"t last all that lengthy in a refrigerator. However, making soup or stew with leftovers and then freezing it for 2 come 3 month is a an excellent way to maintain them.
Related: 30 basic Soup Recipes that Last for Days
Time: 1 to 3 job No, you don"t commonly chill red wines, but refrigerating an opened bottle isn"t "chilling" it. You"re slowing under the oxidation and preserving the flavor of the wine the remains, and also Wine Enthusiast thinks that"s a fine approach.
For much more helpful kitchen tips, please sign up for our cost-free newsletters.
Time: 1 to 3 work Hey, if you"re chilling her white alcohol anyway, girlfriend may also keep that in the refrigerator as soon as you"ve opened up it.
Time: More 보다 6 months as the persons at heat Hot Sauce Shop note, if you don"t think you"re going to end up hot sauce in a couple of weeks, stick the in the fridge. It"ll slow oxidation and also preserve color and also flavor.
Related: us Tried 20 renowned Hot sauces — and These room the Best
Time: 4 months if opened Barbecue people argue that the quantity of vinegar in some sauces should help it save without refrigeration. However, the folks behind Sweet infant Ray"s don"t want you keeping their sauce at every after 4 months. The FDA agrees.
Related: best Hole-in-the-Wall BBQ Joints across America
Time: 1 year if opened Mustard hold up better than almost any condiment and also doesn"t really contain ingredients that will spoil. However, even French"s warns the mustard at some point loses its tang if it just sits around.
Time: 1 month if opened You"d think the salt bombs like these wouldn"t need refrigeration, and also there room plenty of folks who agree v you. This writer keeps his in the pantry and notices no change, yet those v attuned palates keep in mind that refrigeration preserves the flavor of a freshly opened up bottle.
Time: 1 come 3 months if opened Unless you"re actually buying pickles out of pickle barrels, you"re eating commercially make pickles without all that lot brine to them. The vinegar and also salt that provides pickling so adept at food preservation shouldn"t it is in relied upon through store-bought products.
Time: 2 month if opened Mayonnaise isn"t the sun-stricken egg-and-oil disaster the it as soon as was, yet that doesn"t typical it won"t degrade if you just leave it out on the table. The data-tracking NPD Group noted its appearance on restaurant table tops, but keep that cool if girlfriend aren"t going come go with it quickly.
Time: 6 months if opened up Yep, we"re going right into your condiment shelf. All of the above are acidic enough to critical if they"re left out on her table because that a month, but if girlfriend don"t think you"re going to go through it in the time, stick the in the fridge.
Related: 26 delicious Recipes That usage Up Those Aging Condiments in the Fridge
Time: 1 month if opened We"re talking around jars that salsa packed through preservatives. If it"s her homemade salsa or a plastic-packaged salsa from the neighborhood market, intend to cut that life expectancy in half or less as her salsa gets fuzzy and also acidic.
Time: 3 come 4 days guacamole is another item that will certainly let you know its time in the fridge is up. It gets brown on the surface ar or creates pools that brown liquid that seep beneath the surface. Epicurious has part suggestions for maintaining it fresh, but the FDA claims your best bet is to store it frozen for as much as 3 to 4 months.
Time: 4 days if opened when you"ve opened spaghetti sauce, you"ve started the clock ticking on among the most vulnerable leftovers in the fridge. Despite the jars and also slick labeling, pasta sauces have just about no preventive in them. Instead of letting it grow a mold hairdo, Barilla suggests moving leftover sauce come a freezer-safe container and freezing it for 3 months.
Time: 3 come 5 days Sometimes, you aren"t walking to end up a totality pot the linguine or have the stomach to work on it because that the remainder of the week. The FDA states you"re great if you throw it in the freezer for 1 come 2 months, but better Homes and Gardens suggests limiting freeze to 2 weeks for best results.
Related: usage Your Noodle: 20 an innovative Recipes that Highlight Pasta’s many Shapes
Time: 3 come 4 job This is the FDA"s blanket advice for cooked items there is no meat. Lock won"t last a main in the fridge, but they can last 1 to 2 months if frozen.
Time: 3 come 4 work We placed this in below just to assure you the the cold pizza indigenous Friday night is a perfect acceptable Sunday brunch in the FDA"s view. It"ll last 1 to 2 month if frozen, though.
Time: 2 month Lemon juice will certainly live forever in any type of corner of her house since of its high acidity. However, as soon as you open up a bottle of it, it deserve to spoil and also go southern within hours unless you refrigerate it. The exact same rules use to lime juice.
Time: 7 to 10 days; 8 to 12 month frozen Tropicana desires to sell you a whole lot the orange juice. The said, it likewise wants you to gain the orange juice girlfriend buy, and also therefore argues refrigerating that is carton products and further says not leaving that unrefrigerated for much more than 3 hours.
Time: 8 to 12 days no every fruit beat or juice needs refrigeration, follow to the FDA app. Some have the right to be kept in the pantry for 3 weeks before opening and also even 7 to 12 job after opening, and also 8 come 12 days if refrigerated. Consumer should examine the container labels because that "Refrigerate ~ Opening" or "Keep Refrigerated" to recognize which products need to it is in refrigerated.
Related: 14 Cheap Punches come Liven increase Summer Parties
Time: 1 to 2 months Foodies say don"t refrigerate butter because that hardens it, deadens the flavor, and because the europe don"t carry out it the way. Plus, it"s mostly fat, pasteurized milk and, in many cases, salt. The said, if you leaving out much more butter than you can reasonably use in a week, it still operation the threat of contamination. Leave the end what you"ll use, yet know that it have the right to freeze because that 6 come 9 months.
Time: 6 month sealed, 3 to 4 weeks opened Does the need to be refrigerated? No, they"ll actually travel well without refrigeration and also will freeze because that 6 to 9 months. But they"ll last longer if refrigerated, so your timetable for devouring the cheese will identify just just how long it requires refrigeration.
Time: 1 month; freeze for 3 to 4 months Pasteurization and also salt again come right into play below and carry out for a lengthy life in the fridge. This FDA guideline applies to mozzarella, cheddar, and other shredded cheeses.
Time: 1 come 2 mainly Folks who love brie and camembert understand that they"ll acquire maybe a week in the fridge prior to they start to grey and also get a distinctive whiff the ammonia. Cream cheese, meanwhile, will certainly sprout all sorts of lover mold if the isn"t offered within a week or so. If you won"t obtain to use either for a while, the FDA says they"ll freeze for 6 months.
Related: The Funkiest cheeses in the World
Time: 1 come 2 weeks uneven you"re using a tub of it, yogurt is typically kept in small servings the you shouldn"t have to keep as leftovers. When you open up a little yogurt, though, Stonyfield Farm notes friend have around 1 day to eat it even if refrigerated. That jumps to about a main if it"s a big tub. If you must keep yogurt longer, don"t open up it. Instead freeze it for 1 to 2 months.
Time: 3 come 5 weeks some NPR listener will certainly tell you the the U.S. Is one of the few countries in the civilization that refrigerate eggs. Climate again, most countries vaccinate your chickens against salmonella and don"t wash a protective cuticle that would otherwise ward off bacteria. Meanwhile, this is one of the couple of foods the will store in your refrigerator for an ext than a month.
Related: 13 an easy Ways to chef Eggs
Time: 2 to 4 job The Canadians suggest placing both in an airtight container for later use. However, the FDA notes that the finest solution for permanent storage is either to win yolks and also whites with each other to frozen them or ditching the yolks, which don"t freeze well, and freezing the whites.
Time: 3 to 4 days us aren"t talking around hard-cooked eggs, which get around a main in the fridge and also don"t freeze. Here, we typical egg dishes like casseroles or quiches. Those very same dishes will certainly last up to 3 month frozen.
Time: 3 days Unopened, egg substitute can last 10 days, or frozen for up to a year. Once opened, however, that clock ticks under quickly and also the carton can"t it is in refrozen.
Time: 3 to 5 days Leaving any kind of of the over out for an ext than 2 hours in warm weather is courting food poisoning. However, if friend handle any type of of the above well and also refrigerate best after serving, you must be fine.
Related: 16 easy Pasta Salad Recipes because that Summer
Time: 7 to 10 work While there are several methods used in various other countries and still in advancement here that can extend the life of milk, usual pasteurized milk is good for around a week. That extends come 3 month if that exact same milk is frozen.
Time: 1 day If you have actually a enjoy the meal of pre-stuffed meat that was prepared at the store, you"d ideal eat the remainder for lunch the following day. The FDA states it"s around the least-stable refrigerated leftover you have the right to have.
Time: 3 to 4 work Just about any take-home meal you buy from a supermarket deli counter falls into this category. Strategy those sandwiches through caution.
Time: 1 to 2 days If you"re utilizing raw hamburger to do a meal and have some left over, don"t stick the in the fridge unless you setup to usage it the next day. As the FDA notes, you"re far better off putting it in the freezer, where it will certainly last for 3 to 4 months.
Related: 30 Celebrity Chefs" favourite Burger Recipes
Time: 1 come 2 work The kind of animal doesn"t matter: ground meat keeps ideal when you freeze it. These get the same 3 come 4 months together raw hamburger.
Time: 7 job whole, 3 to 5 days half or sliced You could turn the into practically a mainly of ham sandwiches, or the FDA notes that you deserve to freeze any kind of of the over for 1 come 2 months and take that out together you make ham omelets, pea soup v ham, etc.
Time: 1 main open, 2 mainly unopened approximately summer, the greatly used pack of hot dogs is ubiquitous. If you"ve kept it out at room temperature because that a couple of hours throughout a barbecue, that life expectations should be much less. Save a cooler by the grill and freeze what friend don"t usage for 1 to 2 months.
Time: 3 to 5 work open, 2 weeks unopened The much more pedantic eaters will allude out that cured or acting meats will certainly last lot longer, however typically new deli meats and also packaged lunch meats have a week in ~ most, according to the FDA. However, they can be frozen because that 1 come 2 months.
Related: 30 finest Delis throughout America
Time: 7 work We applaud the room of farming for its thorough rundown ~ above bacon and for going into just about every possible bacon-storage scenario. Bacon in the package will last a week in the fridge and also up to a month in the freezer, yet leftover cooking bacon has about 4 to 5 days and also can it is in frozen for a month.
Time: 1 come 2 days raw, 7 days smoked much like the warm dog, the half-used pack of sausages makes constant appearances during the summer. Given its meager life expectations in the fridge, however, the FDA says keeping in the freezer (where it deserve to remain because that 1 come 2 months) until it is eventually used.
Time: 3 come 5 job Steak has remarkable continuing to be power if you have to put turn off a steak night for a while. If you check out it top top sale, meanwhile, choose up a bunch the it: whatever you don"t use automatically can freeze because that 6 to 12 months.
Time: 3 come 5 days there is a reason why Depression-era grandparents alway purchase a roast as soon as they could get a deal on one. The keeps for the better part that a week and also can freeze because that 4 come 12 months.
Related: 39 Mouthwatering Roast Beef Sandwiches throughout America
Time: 1 come 2 days Don"t make funny of the human being at the supermarket who save receipts and collect your bonus turkeys each year. They may only last a job or 2 in the fridge, yet they have the right to freeze because that a year totality or 9 to 12 months in parts. Simply remember to toss the giblets, which will only freeze because that 3 come 4 months.
Time: 3 come 4 days as soon as again, this is simply the FDA giving a preeminence of thumb. If you"ve cooked more of any kind of meat product than you deserve to eat, one of two people make sure the remaining part is other you deserve to eat in much less than a main or freeze the remainder for up to 2 come 3 months.
Time: 1 to 2 days just a reminder to all of you vacation chefs that leftover gravy or broth really shouldn"t make it come the following holiday. If there"s too much to finish within the next day or so, freezing it will buy you only 2 come 3 month of peak flavor and consistency.
Time: 3 to 5 job It"s possible to reheat fried chicken to its previous glory, for this reason don"t think twice about leaving the in the fridge for a few days. In fact, the FDA claims you have the right to freeze it because that 4 month if you feeling like food preparation up a batch in advance.
Related: ideal Fried Chicken in Every State
Time: 3 come 5 work Most chicken dishes will save in the fridge for this quantity of time, according to the FDA. However, anyone who"s bought a bag of pre-cooked frozen nuggets knows the they have actually no problem keeping in the fridge for 1 come 3 months.
Time: 3 to 4 job The absence of breading cuts roughy a day"s precious of fridge life turn off of chicken, follow to the FDA, yet you have the right to still frozen it for 4 months.
Time: 3 to 4 work The broth and also sauce won"t gain your leftovers into next week, but they"ll assist them freeze for as much as 6 months.
Time: 3 come 4 work Fish isn"t miscellaneous the FDA desires you come take possibilities with, for this reason stick with that 3 come 4 day window. However, if there"s too lot left over because that you to handle, even cooked fish can freeze because that 4 come 6 months.
Related: 20 Recipes and also Tips for Grilling Fish This Summer
Time: 14 days Did that smoked salmon, sturgeon, sable, and lox plate from Barney Greengrass not go over also at the agency meeting as you thought it would? Forget it: You deserve to pack that up and put it in your fridge for 2 weeks. Smoked fish was made come keep, and it"ll last approximately a year if you frozen it, states the FDA.
Time: 1 to 2 days now we"re gaining into the fish and seafood that you don"t desire to have sitting approximately for as well long. Any kind of of the above probably have to be perfect up by having lunch the next day (hey, that won"t stink up the office like microwaved fish), but you can freeze larger quantities because that 4 to 6 months.
Time: 1 to 2 work Pike, snapper, cod, porgy ... They aren"t together fatty as salmon, trout, or herring, yet they have actually their own endearing qualities. Chief among them is the capacity to keep after freezing for 6 to 8 months.
Time: 1 come 2 days; freeze because that 2 come 3 month The upside is that these are the very delicious fish filed with the an excellent fats and oils that health experts love. The downside? They"ll only maintain flavor after freezing for about 2 come 3 months, so shot not to leaving too many leftovers.
See more: Exists When Different Versions Of The Same Data Appear In Different Places
Behind every budget plan is a bucket list. Indigenous travel, food and lifestyle come product reviews and deals, we’re right here to present you how to save and also what’s worth saving for.
jajalger2018.org.com101 Bedford avenue #D806 Brooklyn, NY 11211(646) 374-8456
Note: jajalger2018.org does not accept or publish guest jajalger2018.org posts
|
<urn:uuid:3b630c4f-ba68-41ff-bd6d-2dc079a0c117>
|
CC-MAIN-2022-33
|
https://jajalger2018.org/how-long-is-soup-good-for-in-the-fridge/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00065.warc.gz
|
en
| 0.9476
| 3,841
| 1.59375
| 2
|
Community gardens are well known for providing a space for neighbors to grow low-cost, fresh fruits and vegetables. But beyond improving food access, community gardens are places to befriend your neighbors and practice teamwork, to learn and carry on our food cultures, and to enable people of all ages to explore nature in the middle of urban areas. They also provide the opportunity for people in marginalized groups to fully participate and to take on leadership roles. Ultimately, community gardens help empower all of us to organize and advocate for ourselves and for our communities.
Green Mountain Energy Sun Club
decided to honor the important role community gardens play in our lives by helping four nonprofit organizations with their sustainability projects. These projects will create opportunities that not only benefit the planet but also the people on this planet.
AWTY International School
AWTY International School encourages learning and the pursuit of excellence while maximizing the potential in all students as they grow to become responsible world citizens. A $135,000 donation from Sun Club will support the efforts of the school to raise responsible world citizens by thinking about where food comes from and how it is grown.
Two shipping containers were built at the school, each housing a farm. One is an aquaponics farm, which utilizes fish to provide a natural fertilizer for plants combined with soilless plant culture. And the second is a hydroponic farm, which utilizes 85 percent less water than traditional growing methods. These shipping containers are completely off the grid and carbon-neutral through the installation of a 14.4 kW solar array that powers the lighting, irrigation, and data collection needs of the farms.
The Betty and Jacob Friedman Holistic Garden and Sustainable Agriculture Project is a part of the Biosciences Department at Rice University and comprises 2/5 acre, nearly four times larger than previous Rice gardens combined. This teaching garden will be used to share gardening techniques with other nonprofits, community gardens and recreational gardeners.
Sun Club donated $77,050 toward the installation of a 20’x20’ greenhouse, rainwater collection system, solar power, composting system, apiary for two beehives, chicken project house and butterfly garden. These additional elements will further Rice University’s ability to demonstrate the positive impacts gardening has on the ecosystem at large.
Plant It Forward Farms
Plant It Forward Farms offers economically disadvantaged refugees an opportunity to become self-sufficient through growing, harvesting and selling produce from a sustainable urban farm within the city of Houston. It secures land, selects, trains, and mentors farmers, as well as establishes each on their own urban farm to sell under the Plant It Forward brand.
Sun Club provided $85,000 towards the readying of one new farm with multiple plots, which will make room for more farmers to join the program, and a new biodiesel refrigerated van that will be used to deliver farm shares to Houstonians.
Target Hunger’s mission is to alleviate hunger and its root causes with an overall vision that no Houstonian goes hungry. Since 1989, Target Hunger has grown to include six food pantries, an extensive senior delivery program, more than 50 community food fairs each year, mobile distributions, plus a community organic garden yielding 6,000 pounds of fresh produce annually.
Sun Club provided $93,800 for Target Hunger to build a new outdoor garden that will feed an additional 400 families annually. The grant went toward the purchase of 2,400 crates of soil and elevated racks, Super Hoop shade structures, two greenhouses and a rainwater collection system with smart sprinkler irrigation.
These are only a few of our Sun Club partners making a difference for our neighbors in Texas. Interested in advancing sustainability in our communities? Visit this link to help create a cleaner planet for us all through sustainability grants.
Find a clean electricity plan that meets your household’s needs.
Enter your ZIP code to get started.
That ZIP Is served by multiple utilities.
|
<urn:uuid:40a1fa07-9b6f-423f-ae50-b8346b4638fa>
|
CC-MAIN-2022-33
|
https://www.greenmountainenergy.com/blog/community-news/green-mountain-energy-sun-club-honors-community-gardens-in-2021
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00671.warc.gz
|
en
| 0.935133
| 811
| 2.6875
| 3
|
If you’ve seen the term ‘BCAAs’—which stands for branched chain amino acids—online or on a supplement label, you may have wondered what they are and why your body needs them. Turns out they’re pretty darn important, especially if you exercise.
Let’s Talk About Amino Acids
Time for a quick biology lesson: All proteins in our bodies, like muscle tissue and skin, are made up of molecules called amino acids. There are 20 types of amino acids, nine of which we can’t produce on our own. These are called ‘essential amino acids.’ Of these nine essential amino acids, three have slightly different molecular structures and are called ‘branched chain amino acids,’ explains Michael Roberts, Ph.D., director of the Molecular and Applied Sciences Lab at Auburn University. The three BCAAs are valine, leucine, and isoleucine.
Got it? Good. Let’s move on…
How Do We Get The ‘Essentials’?
Since our bodies can’t make essential amino acids, including BCAAs, we have to get them from food, says Roberts. Luckily, we’ve got plenty of options.
Plant sources of branched chain amino acids include many types of legumes, whole grains, and nuts, like chick peas, corn, and almonds. Animal sources include eggs, meat, and milk proteins, according to the Huntington College of Health Sciences. Yep, that’s why “BCAAs” is printed all over your tub of whey protein. Dairy and meat are particularly rich sources of BCAAs, says Roberts.
So say you drink a glass of milk. Your stomach and small intestine break down that milk’s protein into individual amino acids and send them into your blood stream.. From there, many BCAAs go to skeletal muscle cells. “Our muscles are made up of hundreds of thousands of amino acids,” Roberts says. Yeah, they’re that important.
BCAAs, Muscle, And Exercise
Maintaining muscle mass is important because our bodies use the protein stored there to support vital tissues and organs that also need protein (like our skin, heart, and liver), help maintain our metabolism, and provide the strength we need for daily activities, explains a paper published in the American Journal of Clinical Nutrition. That’s where BCAAs come in. “We’re constantly breaking down muscle for various reasons, and BCAAs play a crucial role in rebuilding it,” says Roberts.
Our muscles are made up of hundreds of thousands of amino acids.
While everyone needs BCAAs, they’re especially important for those who exercise—so runners, weight lifters, and general fitness lovers, listen up. “When you exercise, you break down extra muscle protein for energy,” says Roberts. “You can’t resynthesize protein, rebuild that muscle, and recover from a workout without amino acids.” If you train hard day after a long day but fall short on eating protein, you’ll lose muscle mass over time, Roberts says. Hence why every trainer and their mother seem obsessed with post-workout fuel: No BCAAs, no gains. That after-sweat snack might be a glass of chocolate milk or a protein shake, but you can also supplement with a BCAA supplement. “The benefit of a supplement is that it doesn’t have to be broken down in your stomach and small intestine, and hits your bloodstream (and your muscles) quickly,” says Roberts.
Leucine, one of the three branched chain amino acids, seems to have a particularly strong impact on muscle synthesis. Though all of the branched chain amino acids are needed to rebuild muscle, leucine signals cells to take up those other amino acids, says the Huntington College of Health Sciences. That’s why you’ll often see BCAA supplements that contain a larger amount of leucine than they do amino acids like valine. Whey protein is also high in leucine, Roberts says.
Though muscle synthesis is BCAAs’ most important function, they can also become a source of energy when you work out. “We can turn carbs, fat, and amino acids into cellular fuel, called ATP,” says Roberts. Though the energy we convert from branched chain amino acids only makes up about 5 percent of the total energy we convert while exercising, it makes a difference if you’re an endurance athlete or lifting weights at a high volume, he adds.
When you exercise, you break down extra muscle protein for energy.
BCAAs might even help you stay focused throughout your workouts. Researchers call it the ‘central fatigue hypothesis:’ When BCAAs are present in your blood stream in high numbers, they prevent the conversion of tryptophan into serotonin. Since serotonin is associated with sleep and rest, lower levels may help you push through a workout with more ease, explains a review published in The Journal of Nutrition. It’s important to note, though, that while scientifically sound in theory, this hypothesis hasn’t been fleshed out in research, says Roberts.
Feed Your Muscles
Branched chain amino acids are pretty magical, right? To make sure you’re fueling your muscles to maintain an active lifestyle or make gains in the gym, focus on following your workouts with a high-protein meal, says Roberts. He recommends a post-meal snack or meal that includes an intact protein source like milk, whey protein, or a BCAA supplement. To keep the levels of BCAAs in your blood as stable as possible, try to consume protein every three hours or so, he says.
|
<urn:uuid:2377fab6-1b0c-45c6-9efd-1105f9a4fa5d>
|
CC-MAIN-2022-33
|
https://whatsgood.vitaminshoppe.com/branched-chain-amino-acids/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz
|
en
| 0.943129
| 1,225
| 3.28125
| 3
|
The world of information seems to be in upheaval.
Government corruption beyond belief? UFO Exposure near? Something mysterious going on in Antarctica? Weather experiments going on worldwide? Sexual abuse, child molestation and body parts for sell to the highest bidder going on in the highest elitist communities worldwide? Bigfoot being spotted in families in the wilds of Canada? Is any of this true? Or is the newest technology just the plaything of crazies and hoaxers?
Are we truly in the end-times? All we at THEI can do is search out and present these weird times to you, our audience. What is real and what is not?
Examine what we present; then do your own research. YOU need to figure out what is going on for yourself. We have no solid answers . . . Your Editor Dennis Crenshaw
Entire Bigfoot Sasquatch Tribe Clearly Filmed For The First Time?
Yeti is NOT A Myth Anymore
Entire Bigfoot Sasquatch Tribe Clearly Filmed For The First Time. Yeti is NOT A Myth Anymore
So many sightings around the world that creatures got its own distinct names by locals, who have no doubt in their existence. Yet, there was no clear recorded evidence except numerous grainy cell phone and old camera videos. Until now. After years of searching we finally found and filmed the entire lost tribe of Bigfoot or Sasquatch as it called by native Indians tribe Cree known as Big River First Nation of Canadian province Saskatchewan. Watch and learn how Cree tribe lived in harmony and peace with Sasquatch for millennia until Pale Faced colonized Canada and started the war of three nations driving two of them on the brink of extinction.
North America is no strange to weird creatures. From Mexican Chupacabra, To United States Multiple head bulls, To Canadian Sasquatch or Bigfoot To Alaskan Snowman or Yeti. First two: Chupacabra and Multiple head bulls were proven to be real beyond reasonable doubt. However, there was always a skepticism about Bigfoot or Yeti. Some scientists argued that Bigfoot is nothing more than man in gorilla costume or mislabeled bear while others insisted that Sasquatch is an undiscovered ape species driven to the brink of extension by humans. However, for any scientist to tell that he or she is seriously researching Bigfoot or Yeti would not only mean giggle behind his or her back but would mean the end of academic or scientific carrier. As Dean of UC Berkeley University once said during firing of one of the scientists – it would be more believable if you researched unicorns than Yeti or Sasquatch. To say to anyone I am a serious Bigfoot Yeti researcher is like to say I am a Martian who research mermaids. It always carried giggle factor and social stigma. So Kryan Channel without any expectations and just for fun took an offer of Cree tribe to visit them in Canadian province of Saskatchewan and tell the world what we saw there. We thought to see nothing more than beautiful Canadian nature but what we filmed and learned there shocked us to the core.
Directed by Igor Kryan. Filmed by Marjorie Rimando. Produced by Jennifer Williams. Written by Igor Kryan. (https://creativecommons.org/licenses/…)
VIEW IN FULL SCREEN MODE FOR BEST RESULTS
Dig a Little DEEPER: Bigfoot
|
<urn:uuid:b43f4277-72ef-4ec7-8238-888b743b9413>
|
CC-MAIN-2022-33
|
https://thehollowearthinsider.com/archives/tag/yeti
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00276.warc.gz
|
en
| 0.947248
| 723
| 2.0625
| 2
|
An atom is considered the most basic unit of matter, and it is considered neutral or neutrally-charged simply because it contains the same numbers of protons and electrons. Â Protons and electrons have opposite charges, but they basically cancel out each other making the charge neutral.
There are actually three particles that make up an atom and these are; neutrons, protons, and electrons. Â The outer part of an atom is formed by multiple electrons that have negative charges. Â The inner portion, called the nucleus, is meanwhile composed of the other two particles called protons and neutrons. Neutrons are those that have a neutral charge as the name suggests. Â Protons, meanwhile, contain a positive electrical charge. Â For a typical atom, the number of protons at the nucleus always equals the number of electrons that surround them. So even if the protons and electrons contain opposite electrical charges, they wouldn’t be able to cause a reaction because their charges will even out with each other. Â Because of this configuration in terms of the proton and electron charge, the atom will contain a neutral charge.
Under normal conditions, the placement of atomic particles stays where it is, and that is referring to the protons and neutrons lying at the center, or nucleus, while the electrons are formed on the outside parts. Â This basic atomic structure is said to be maintained by an electromagnetic force. Â If there is no such force, then the particles will not be bound together. Â In the same way, all atoms that are electromagnetically bound together form a bigger substance called a molecule. Â The charge for a molecule depends on whether the atoms combined are positively or negatively charged. Â Atoms that are positively charged or negatively charged become an ion. Â But in standard conditions, the charge of an atom remains neutral because of the equal number of positive protons and negative electrons.
|
<urn:uuid:9c87dbb8-7705-4024-9e41-6bbfa3499d91>
|
CC-MAIN-2017-04
|
http://www.knowswhy.com/why-is-an-atom-neutral/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00164-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.929409
| 399
| 4.53125
| 5
|
Tuesday, March 31, 2015Canada’s access to information (ATI) system is in crisis. It is taxing on those who administer it, the process of obtaining information is unnecessarily lengthy and cumbersome for users and it results in far too little information being made public. In short, our ATI system is failing the Canadians it is intended to serve. The undersigned civil society organizations from across the country are extremely concerned with the problematic state of our current system. The Access to Information Act, which came into effect in 1983, is in desperate need of review and updating. Created before the adoption of the Internet, social media, and the numerous digital tools and technologies now prevalent in our daily communications, the Act is woefully out of date and cannot address current and future production, storage, and dissemination of information realities. Access to information held by public authorities is a critical aspect of democracy. It enables the citizenry to make educated decisions, to participate in decision-making processes and to hold government accountable for its actions. Without an effective system to ensure adequate access to information and to guarantee government transparency, our democratic system is seriously undermined. Today, the Information Commissioner of Canada, Suzanne Legault, tabled a report in Parliament entitled, “Striking the Right Balance for Transparency: Recommendations to modernize the Access to Information Act.” At over 100 pages in length, and containing 85 different recommendations, the Report is a robust assessment of the current system and provides a useful roadmap for starting a broad public consultation on how to update the Act to better serve Canadians and streamline processes for public authorities. It is long past time for the Act to be reviewed and updated. Once a world leader in ATI, our country now lags far behind. Canada is currently ranked 57th out of the 101 countries on the Centre for Law and Democracy's Right to Information Rating, a comparative assessment of right to information laws from around the world. While other countries modernize their ATI policies and practices, the Canadian system is becoming increasingly outdated and ineffective. Until we take action to address the system’s shortcomings, we will continue to fall further and further behind. Access to information is critical to any functioning democracy, and has been neglected in this country for far too long. We, the undersigned organizations, call on the Canadian government to initiate a holistic and comprehensive review of our access to information system, using the Commissioner’s recommendations as a starting point, with a view to adopting an updated ATI Law, among other things, within a reasonable time frame. Yours sincerely, British Columbia Civil Liberties Association BC Freedom of Information and Privacy Association Canadian Association of Journalists Canadian Civil Liberties Association Canadian Journalism Foundation Canadian Journalists for Free Expression (CJFE) Centre for Law and Democracy Democracy Watch OpenMedia PEN Canada Right to Know Coalition of Nova Scotia
Do you like this page?
|
<urn:uuid:8a4f9bf4-32a3-4ba5-b1a2-6ac569850df6>
|
CC-MAIN-2017-04
|
http://www.cjfe.org/canada_is_in_need_of_serious_access_to_information_reform
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00382-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.917787
| 576
| 2.234375
| 2
|
iPod Touch users can now turn their devices into a Wi-Fi mobile phone with the use of MorphCase. No headset, Bluetooth or external wiring required – just clip on MorphCase (using your audio jack input) and use any VoIP (voice over IP) app and your iPod Touch transforms into a Wi-Fi mobile phone.
MorphCase “smartcase,” equipped with a built-in speaker (at the top) and a microphone (at the bottom), simply clips on to any second-, third- or fourth-generation iPod, and is available in White Lighting, Black Fury or Chromax (Ltd. Ed).
MorphCase will retail for $49.99, but customers can pre-order for $35.00 on Indiegogo as of September 4, 2012.
MorphCase is the brain child of Adrienne Harrington, founder of Dexterity, a small North Carolina startup company. Introduced in 2010, Dexterity’s mission is focused on design and innovation of the Wi-Fi industry to simply everyday life.
According to Harrington, “The MorphCase is a VoIP adapter that converts your iPod Touch into a budget friendly mobile phone alternative for anyone looking to save money and not have a monthly cell phone bill. Today, our ‘smartphones are becoming more ‘smart’ and less ‘phone’...but we still need to make a call sometimes,” she said. “Utilizing a VoIP App is now a viable option with the abundance of free Wi-Fi everywhere.”
MorphCase may or may not be the phone of the future, but it’s definitely one step closer.
Want to learn more about today’s powerful mobile ecosystem? Don't miss the Mobility Tech Conference & Expo, collocated with ITEXPO West 2012 taking place Oct. 2-5 2012, in Austin, TX. Stay in touch with everything happening at Mobility Tech Conference & Expo. Follow us on Twitter.
Edited by Braden Becker
|
<urn:uuid:7520babb-03a6-4d44-ae34-e961e488198e>
|
CC-MAIN-2017-04
|
http://technews.tmcnet.com/gadgets/topics/gadgets/articles/2012/09/06/306486-ipod-touch-morphs-into-futuristic-phone.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00277-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.88797
| 418
| 1.515625
| 2
|
WASHINGTON — The Obama administration issued new standards on Monday that require health insurance plans to cover all government-approved contraceptives for women, without co-payments or other charges.
The standards, which also guarantee free coverage of other preventive services for women, follow recommendations from the National Academy of Sciences and grew out of the new health care law.
“These historic guidelines are based on science and existing literature and will help ensure women get the preventive health benefits they need,” said Kathleen Sebelius, the secretary of health and human services.
The requirements apply to insurance in years starting on or after Aug. 1, 2012. They take effect in January 2013 for insurance plans that operate on the basis of a calendar year.
Supporters of the new requirement said it would go a long way toward removing cost as a barrier to birth control, a longtime goal of advocates for women’s rights and experts on women’s health. But the requirement does not immediately help women who have no health insurance.
It is sure to reignite debate over the federal role in health care at a time when Republicans in Congress are trying to repeal the health care law signed last year by President Obama.
A major goal of the law is to increase the use of preventive services like mammograms, colonoscopies, blood pressure checks and childhood immunizations. The law generally bans co-payments, deductibles and other charges for preventive services recommended by expert professional organizations. The law directed federal health officials to pay attention to the health needs of women in particular when listing preventive services that must be covered.
The new standards require coverage of the full range of contraceptive methods approved by the Food and Drug Administration, as well as sterilization procedures. Among the drugs and devices that must be covered are emergency contraceptives including pills known as ella and Plan B.
Senator Richard Blumenthal, Democrat of Connecticut, said, “These guidelines will save countless dollars and lives, and send a hugely powerful message about the importance of women’s preventive health care.”
Representative Lois Capps, Democrat of California, also praised the requirements, saying they would “ensure that women have increased access to the services they need to be healthy.”
The United States Conference of Catholic Bishops and some conservative groups, including the Family Research Council, have strenuously opposed any requirement for coverage of contraceptives.
Health plans offered by certain religious employers would be exempt from the requirement to cover contraceptive services. This provision is similar to the exemption for churches found in many of the states that already require coverage of contraception, federal health officials said.
Researchers have found that people who have coverage of preventive services, under Medicare or private insurance, use them much less than recommended. Federal officials said they would try to promote their use by publicizing the fact that wider, cost-free coverage is now available.
The National Academy of Sciences said the Obama administration had told its experts not to consider “the cost-effectiveness of screenings or services” in deciding which ones to recommend. Insurers expressed concern that coverage for some of the newly required preventive services could be costly.
Under the federal rules governing preventive services, insurers can use “reasonable medical management techniques” to control costs and promote the efficient delivery of care. The administration said Monday, for example, that an insurer could charge co-payments for brand-name drugs if a lower-cost generic version was available and was just as safe and effective.
In addition to contraceptive services for women, the government will require health plans to cover screening to detect domestic violence; screening for H.I.V., the virus that causes AIDS; and counseling and equipment to promote breast-feeding, including breast pumps.
Other preventive services that must be covered, without co-payments, include screening for gestational diabetes in pregnant women; DNA testing for the human papillomavirus as part of cervical cancer screening; and annual preventive-care visits. Such visits could include prenatal care and preconception care, to make sure women are healthy when they become pregnant.
In a report commissioned by the Obama administration, the academy’s Institute of Medicine said free contraceptive coverage was justified because nearly half of all pregnancies in the United States were unintended, and about 40 percent of unintended pregnancies ended in abortion. Thus, it said, greater use of contraception will reduce the rates of unintended pregnancy, teenage pregnancy and abortion.
Certain health plans that were in place on March 23, 2010, when Mr. Obama signed the health care law, may be able to avoid the requirement to cover preventive services for a while. But as time passes and insurers and employers modify their coverage, the number of plans entitled to such “grandfather status” is shrinking.Continue reading the main story
|
<urn:uuid:ee49684f-006a-41f6-9914-4b25fca3fdab>
|
CC-MAIN-2017-04
|
http://www.nytimes.com/2011/08/02/health/policy/02health.html?_r=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00087-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.967426
| 972
| 2.09375
| 2
|
UPDATE – The winners for this giveaway are:
- Melissa Ballinger Dees
- Julie C. Perry
- Bobby Irion
- Michael Jon Piper
Sometimes the world can feel like a lonely place. There are billions of people on the planet, and many of us encounter hundreds in the course of our daily lives. Yet it’s easy to feel disconnected from most, if not all of them.
The many strangers we pass on a given day, who may avert their eyes to avoid awkwardness, can start to feel like part of the scenery—like cars parked in a lot or leaves floating in the wind.
And, of course, we may feel the same to them, when we attempt to busy ourselves right when we cross paths—anything to avoid an intimate moment of locking eyes with someone we don’t know.
We look at our feet, or our phones, or our friends. We shut down, cave in, tune them out. In that moment, they’re not people, with stories and feelings just like us. They’re strangers. Unknown. And perhaps a little scary.
The luckiest of us have deep connections with people we do know. But even those relationships can feel distant at times, and maybe more often than not.
We may feel judged, or misunderstood, or ignored. We may worry about what those people think of us, or wonder if they’ll be there when we need them.
And worst of all, we may question if they’d still be there if they really knew us, deepest secrets and all. Proximity doesn’t always equal closeness, and closeness doesn’t guarantee trust.
If it sounds like I am speaking from experience, that’s because I am. I have felt lonely, and insecure, and suspicious. I’ve feared letting my guard down, letting my feelings out, and letting people in.
As a result, I spent years living on an island in my head, maintaining a physical presence in the world but remaining as much emotional distance as possible.
The irony is that I thought I was keeping myself safe from pain, when really I was causing it.
It hurts to feel separate. We are wired to seek connection and belonging—to feel like we are part of something larger than ourselves.
They say it takes a village to raise a child, but I believe it also takes one to sustain an adult. We were not built to live in isolation, hidden behind apartment doors, phone screens, and dead eyes.
We thrive when we feel like part of a tribe, when the people we share space with become part of “us,” not “them.”
I’ve spent my whole life fantasizing about “us,” and years trying to learn what it takes to be part of that.
I wish I could say I’ve discovered some great secret to forming deep, meaningful relationships and feeling less alone in the world, but that would be a lie.
I haven’t discovered any one thing that turns strangers into friends, and friends into family. I have, however, identified countless tiny things, which, compounded over time, can make a massive difference.
And that’s how Tiny Buddha’s 365 Tiny Love Challenges was born. As you may recall, I launched the book in October of last year.
I wanted it to be a comprehensive list of small things we can do, every day, to create deep, meaningful connections with the people around us.
I wanted to offer specific, actionable ways to show kindness, compassion, trust, and support; to be authentic, accepting, forgiving, and encouraging.
They’re abstract ideas, and not always easy to put into practice, especially when you factor in that other people are flawed and scared, just like us.
Though I still don’t feel as connected as I’d like to be—a natural consequence of moving every two years for the past sixteen—I no longer live alone on the Alcatraz in my head.
I have healed relationships from my past, dug beneath the surface with people who would otherwise have remained acquaintances, and most importantly, strengthened my relationship with myself so that I finally believe I am worthy of being loved and fully seen.
And I feel proud that I’ve created a book that, I’ve been told, has helped other people do the same.
If you grabbed a copy last year, you may be at the halfway point now—meaning you’ve completed six months of challenges pertaining to kindness, compassion, authenticity, forgiveness, attention, and honesty.
I’d love to know how this experience has been for you—if you feel more connected, if you’ve strengthened your relationships, or if there have been any other pleasant, unexpected side effects of taking these action steps.
And if you don’t have a copy, I’d like to offer you a chance to win one today. I’m giving away five autographed books, and all you need to do is leave a comment answering one of the following questions:
-What is one thing you believe most people want to receive from the people they love?
-What is one thing you believe most people want to hear from the people they love?
-What do you think it means to love someone?
Your comment doesn’t need to be any specific length; in fact, it can be one word. However much you choose to write, know that you are giving all Tiny Buddha readers a gift through your time and effort.
Whatever you choose to write could inspire someone, guide them toward a life-changing epiphany, or help them form deeper, more meaningful relationships with the people around them.
Your comment is, in itself, a tiny act of love. And I will be the first to say that I am grateful for it.
You can enter the giveaway until Wednesday, July 13th, and you can learn more about Tiny Buddha’s 365 Tiny Love Challenges, or grab a copy, here.
|
<urn:uuid:b60f4616-dd70-4a5b-8eb8-c7f6463a7ff7>
|
CC-MAIN-2022-33
|
https://tinybuddha.com/blog/book-giveaway-tiny-buddhas-365-tiny-love-challenges/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00666.warc.gz
|
en
| 0.957827
| 1,273
| 1.679688
| 2
|
At Baskerville Hall on the grim moors of Devonshire, a legendary curse has apparently claimed one more victim. Sir Charles Baskerville has been found dead. There are no signs of violence, but his face is hideously distorted with terror. Years earlier, a hound-like beast with blazing eyes and dripping jaws was reported to have torn out the throat of Hugo Baskerville. Has the spectral destroyer struck again? More important, is Sir Henry Baskerville, younger heir to the estate, now in danger?
Enter Sherlock Holmes, summoned to protect Sir Henry from the fate that has threatened the Baskerville family. As Holmes and Watson begin to investigate, a blood-chilling howl from the fog-shrouded edges of the great Grimpen Mire signals that the legendary hound of the Baskervilles is poised for yet another murderous attack.
The Hound of the Baskervilles first appeared as a serial in The Strand Magazine in 1901. By the time of its publication in book form eight months later, this brilliantly plotted, richly atmospheric detective story had already achieved the status of a classic. It has often been called the best detective story ever written. It remains a thrilling tale of suspense, must reading for every lover of detective fiction.
By: Sir Arthur Conan Doyle
Reprint of the Newnes, London, 1902 edition.
|Dimensions||5 x 8|
|
<urn:uuid:ca7e5d9d-bc5d-4dc4-aa6b-27d9441973df>
|
CC-MAIN-2022-33
|
https://thebookwormofvallejo.com/products/the-hound-of-the-baskervilles
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00472.warc.gz
|
en
| 0.933445
| 298
| 1.90625
| 2
|
[torqueusers] Memory requests
somewhere_or_other at byu.edu
Wed Jun 13 08:57:18 MDT 2007
We were just looking at this the other day at my work, and I think we
decided that, at least with Moab on top of Torque, the "mem=" syntax was
for the whole thing, meaning the sum of all the memory for all
processes. When, for example, we requested "nodes=4:ppn=1,mem=1000mb",
Moab showed that 250 MB of memory was reserved on each of the four
nodes. We decided that "pmem=" might actually be more useful for our
users; since it requests the maximum amount of memory *per process*, the
scheduler reserved that amount on each node. So, for example, when we
requested "nodes=4:ppn=1,pmem=1000mb", then a full 1000MB was reserved
on each node.
I hope this is clear.
Andrus, Mr. Brian (Contractor) wrote:
> I am trying to find the documentation for it, but cannot.
> When I request a certain amount of memory via my script (eg #PBS -l
> ). Is that allocated total for the job, total for a node, or total for a
> Brian Andrus
> Perot Systems, Inc.
> Naval Research Laboratory
> Monterey, California
> Desk: 831-656-4839
> torqueusers mailing list
> torqueusers at supercluster.org
More information about the torqueusers
|
<urn:uuid:7f327e1f-3a9f-4deb-9c93-27e62c7832d3>
|
CC-MAIN-2017-04
|
http://www.clusterresources.com/pipermail/torqueusers/2007-June/005703.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00305-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.828575
| 347
| 1.53125
| 2
|
If your are new to goat keeping, and breeding goats you’ve probably never experienced goat labor, so here are 10 signs a goat is in labor for you to look for. Knowing these signs will help you ensure that you are not only prepared, but relieves some of the stress around kidding season.
How Do You Know If Your Goat Is In Labor?
If you’ve never bred a goat before, going into kidding season can be very stressful for you. But if you are prepared, and you know what you are looking for some of that stress can be alleviated. Further in this article we’ll break down each of the signs a goat is in labor, and when you see several of these at the same time you know your goat is in labor.
Should I Help My Goat Give Birth?
In most cases a goat can successfully deliver kids in several different positions without assistance. However there are occasions that is may be necessary to step in and assist your goats delivery. Two of the most dangerous positions a kid can be in when you goat is delivering is are when the head is back, or when she tries to deliver two kids at the same time. Both of these scenarios would require you to step in and assist. This is why it’s important to have a kidding kit ready to go.
Goat Gestation Calendar
Pin for later!
How Long Are Goats In Labor For?
A normal goat labor timeline is approximately 12 hours. The actual delivery should be finished in under 30 minutes.
Goat Kidding Signs: What To Look For
You may not see all of these signs a goat is in labor but look for several of them together. If you have a mentor reach out to them as well.
Signs A Goat Is In Labor #1 Swollen Vulva
One of the first signs a goat is in labor you may notice is that her vulva will become loose and may even jiggle as she walks. You also may notice that when she lays down, it will be slightly open.
Signs A Goat Is In Labor #2 Udders Get Hard
One of the signs a goat is in labor is her udder will become hard, this is often called “Bagging up” so she can feed her kids. This process of bagging up and producing milk is called “freshening.” If the doe is a first freshener, her udder will mature gradually, starting around six weeks after she was bred and continuing to fill out as birthing time approaches. If the doe has previously given birth, her udder should have receded while her previous milk cycle was on the decline. Such an older doe may start bagging up a month before she’s due to kid, or she may not bag up until mere days before giving birth. In many cases, when the goats udder looks tight and shiny, and the teats tend to point slightly to the sides, kids will appear within about a day.
Signs A Goat Is In Labor #3 Talking, Biting or Nibbling At Her Belly
One of the most noticeable signs a goat is in labor is that she becomes louder and restless. A doe that is going into labor can’t decide if she wants to lie down or stand up- When she’s up, she’ll pace, she may turn in circles, or paw the ground, and perhaps sniff at the bedding. Your goat may repeatedly stretch, yawn, and might grind her teeth. She may look back as if trying to see what’s behind her and lick or bite at her sides. If you visit her in the kidding stall, she may lick your face, hands, and arms.
Signs A Goat Is In Labor #4: Refusing To Eat
Another one of the signs a goat is in labor is refusing to eat. A goat that is going into labor may refuse to eat several hours before going into labor, or up to a day. However this is always true with every goat so it isn’t the best sign to rely on.
Signs A Goat Is In Labor #5: Seeking Solitude
Another of the signs a goat is in labor is if she begins to seek solitude. Some goats wish to be alone with their kids and will wonder off by themselves. If you have very cold or wet weather it’s important to try to encourage her into a covered place that is secluded.
Signs A Goat Is In Labor #6 Tail Ligaments are Completely Gone
Another of the signs a goat is in labor is the ligaments loosening in her tail. Just before your goat have their kids a hormone called relaxin is released causing the pelvic ligaments to relax. These ligaments run beside the doe’s tail, one on each side. If you place the palm of your hand above the doe’s tail, fingers pointed toward the rear, and press down with your thumb and forefinger while moving your hand toward the base of the tail, you will encounter what feels like a thin, stiff rope on each side of the tail. This technique is easier to master on does that are neither fat nor heavily muscled. Practice finding these ligaments so you know what they normally feel like. When your doe nears kidding time, the ligaments lose their tautness and, as a result, the tail looks a little gimpy. When you can’t feel the ligaments at all, expect kids within the day. Many goat keepers find this method to be the most reliable goat labor sign.
Signs A Goat Is In Labor #7 Babies Drop
Another one of the signs a goat is in labor is the babies dropping, as kidding time nears for your doe and the kids start moving into position, the doe’s belly sags. Within about 12 to 18 hours before she gives birth when you press your palms against her flank, you will no longer be able to feel the kids moving around. As the kids drop, the doe’s sides hollow and her hip bones stick out. As the area above the back legs sinks, the spine appears to become more prominent.
Signs A Goat Is In Labor #8 Discharge
One of the later signs a goat is in labor you will want to look for is discharge from the vulva. As their kidding time nears, you may notice a thick string of white or yellowish mucus dangling from the doe’s vaginal opening. **Note that some does will drip cloudy mucus as much as a month prior to kidding. What you’re looking for just prior to kidding is a thick discharge that looks like a long, continuous rope.**
Signs A Goat Is In Labor #9 Pushing
One of the final signs a goat is in labor to look for is contractions. During this stage of labor and while having contractions, the goat will arch their back and her tail will arch back and forth during the contractions.
Signs A Goat Is In Labor #10 Water Bursts
The last of the signs a goat is in labor we are going to talk about is water burst. When your doe starts pushing, you may see a water bag protruding from the vulva opening. This bag may burst or may come out intact. Behind it a second bag, filled with dark fluid, may appear. These bags consist of membranes containing amniotic fluid, which surround and protect the kid or kids up until the time of birth. The next thing you will most likely see are the very tips of a kid’s front toes, with a small nose resting on top.
Before you go, check these out!
|
<urn:uuid:1953497f-f0a8-4ec0-87fe-0227635f8c22>
|
CC-MAIN-2022-33
|
https://idreamofgoats.com/signs-a-goat-is-in-labor/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00270.warc.gz
|
en
| 0.962292
| 1,608
| 1.882813
| 2
|
yard = 0.9144 length (length)
Try converting from "yard" to agate (typography agate), archin (Russian archin), astronomical unit, cloth quarter, engineers chain, fathom, foot, football field, furlong (surveyors furlong), Greek cubit, ken (Japanese ken), link (surveyors link), marathon, nail (cloth nail), nautical league, nautical mile, naval shot, pace, parasang, pica (typography pica), or any combination of units which equate to "length" and represent depth, fl head, height, length, wavelength, or width.
yard = .0257732 actus (Roman actus), 1.29 archin (Russian archin), .01563844 arpentlin, 6.11E-12 astronomical unit, 1,440 bottom measure, 3,600 caliber (gun barrel caliber), 4 cloth quarter, .03 engineers chain, .5 fathom, 1.23 gradus (Roman gradus), .00141844 li (Chinese li), 4.55 link (surveyors link), .00056818 mile, 16 nail (cloth nail), 1.2 pace, .00016234 parasang, 2.96E-17 parsec, 216 pica (typography pica), .18181818 rod (surveyors rod), .00006944 spindle.
Feedback, suggestions, or additional measurement
Please read our Help Page and FAQ Page then post a message or send e-mail. Thanks!
|
<urn:uuid:f7b4d3d9-9d50-406d-b9d5-8debdd02a7b3>
|
CC-MAIN-2022-33
|
http://www.convertit.com/Go/Geniusfind/Measurement/Converter.ASP?From=yard&To=fl+head
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00476.warc.gz
|
en
| 0.724826
| 377
| 1.53125
| 2
|
My placement is with the training department where I have been involved in a new project in the Lavender Hill township formulated to prevent child maltreatment and to address the current child abuse and neglect. To meet the goals and objectives of the project, I created a child participation programme through engaging the children in Lavender Hill in activities through which they have the opportunity to voice what their perceived needs and desires for the project are and to participate in the creation of a project name and logo. The project required a great deal of research on different approaches to child participation. After which I designed sessions which were presented and modified at a number of board meetings. The sessions were successfully implemented towards the end of the programme allowing for the children in two of the townships schools to have a safe space to voice their feelings on child maltreatment and suggestions for what they feel should be done. Along with the child participation sessions, I worked along side the community trainer, attending meetings with local CBO’s, training sessions, and other community events and activities. Rapcan is a great organization with a fantastic and caring staff striving to advocate for the ones who are to often silenced by society, promoting the right for children to be able to be children.
Because RAPCAN takes a multidimensional approach to preventing child abuse, you can be sure to find a project that will interest you. I am working on two projects that have very different focuses. The first involves working with a local community called Hillview in their implementation of a new positive parenting program. The second project involves assessing the effectiveness and appropriateness of HIV prevention information in RAPCAN’s various programs. This is an excellent site for any student who has energy, creativity, and a desire help prevent violence and abuse among future generations in South Africa.
Past projects by Marquette students at RAPCAN range from creating a program on bullying for elementary-school students to working with the Child Witness Program to conducting research regarding physical punishment of students in schools. After only a little while learning about the organization and the issues surrounding children’s rights, it’s easy to find an issue to work on and a project to do. RAPCAN is a great site for a self-directed, enthusiastic student looking to improve the lives of South African children.
|
<urn:uuid:b2ea8d67-b5b6-479a-8858-8e1a3f3a18aa>
|
CC-MAIN-2016-44
|
http://www.marquette.edu/abroad/southafrica-rapcan.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00188-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.961734
| 463
| 1.882813
| 2
|
Suquamish woman photographed by Edward S. Curtis in 1913.
|Regions with significant populations|
The Suquamish are a Lushootseed-speaking Native American people, located in present-day Washington in the United States. They are a southern Coast Salish people. Today, most Suquamish people are enrolled in the federally recognized Suquamish Tribe, a signatory to the 1855 Treaty of Point Elliott. Chief Seattle, the famous leader of the Suquamish and Duwamish Tribes for which the City of Seattle is named, signed the Point Elliot Treaty on behalf of both Tribes. The Suquamish Tribe owns the Port Madison Indian Reservation.
Like many Northwest Coast indigenous peoples, the Suquamish enjoyed the rich bounty of land and sea west of the Cascade Mountains. They fished for salmon and harvested shellfish in local waters and Puget Sound. The cedar tree provided fiber used to weave waterproof clothing and beautiful utilitarian items, and provided wood for longhouses, seagoing canoes and ceremonial items. Today, the Suquamish fish and harvest within their historical territory, and a new generation of local artists — among them Ed Carriere, Betty Pasco, and Andrea Wilbur-Sigo — carry on the ways of their ancestors in creating beautiful carved or woven items that help tell the story of the Suquamish people.
The Suquamish traditionally lived on the western shores of Puget Sound, from Apple Tree Cove in the north to Gig Harbor in the south, including Bainbridge Island and Blake Island. They had villages throughout the region, the largest centered on Old Man House, the largest winter longhouse in the Salish Sea.
The first contact between Suquamish and European peoples came in 1792 when George Vancouver explored Puget Sound and met members of the Suquamish Tribe, possibly including Schweabe and Kitsap. More regular contact with non-Natives came with the establishment of British trading posts in Puget Sound and the Strait of Georgia in the early 19th century.
Once the Washington Territory was established in 1853, the U.S. government began signing treaties with area indigenous leaders to extinguish aboriginal claims and make land available for non-Native settlement. In the Point Elliott Treaty signed on January 22, 1855, the Suquamish agreed to cede land to the United States in exchange for certain payments and obligations. They reserved for themselves the land that became designated as the Port Madison Indian Reservation, near their winter village on Agate Pass. They also reserved the right to fish and harvest shellfish in their Usual and Accustomed Areas, and reserved certain cultural and natural resource rights within their historical territory. Today, the Suquamish Tribe is a co-manager with the State of Washington of the state's salmon fishery.
Two members of the Suquamish came to be recognized across the region as great leaders. One was Kitsap, who led a coalition of Puget Sound Tribes against the Cowichan Tribes of Vancouver Island around 1825. Another was Seattle (also spelled Si-ahl, Sealth, See-ahth, and Seathl, pronounced [ˈsiʔaːɬ]), son of Schweabe, who was a peacekeeper during the turbulent times of the mid-19th century.
Lawrence Webster (1899-1991) served as chairman of the Suquamish Tribe from 1979-1985. In 1979, he traveled to Washington, D.C., to represent Native Americans at an event commemorating the 15th anniversary of the government program, VISTA. In 1983, he helped establish the Suquamish Museum. Earlier in his life, he was a noted baseball catcher, playing on a Suquamish team in 1921 that was sent by a national sporting-goods company on a goodwill tour of Japan.
Leonard Forsman, an anthropologist and archeologist who has served as the Suquamish Tribe’s chairman since 2005, is a governor-appointed member of the state Board on Geographic Names and an Obama appointee to the U.S. Advisory Council on Historic Preservation.
Cindy Webster-Martinson, a former Suquamish Tribal Council member, is vice president of the North Kitsap School Board (elected in 2013 to a four-year term) and is believed to be the first Native American elected to non-Tribal public office in Kitsap County. She is a granddaughter of Lawrence Webster.
The Suquamish Tribe is governed by a seven-member council, elected by citizens of the Suquamish Tribe. Government departments include administration, child support enforcement, community development, court, early learning center, education, fisheries, human services, legal, natural resources, police. (The Tribe contracts with local fire districts for fire protection service.)
Economic contributions (in 2012): $52.2 million in wages and benefits paid to employees; $46.8 million in goods and services purchased; $18.6 million in capital project investment. Community contributions (in 2012): $694,033 awarded to 201 organizations.
Port Madison Enterprises, the Tribe’s economic development arm, is the second-largest private-sector employer in Kitsap County with 752 employees, surpassed only by Harrison Medical Center.
Port Madison Enterprises is governed by a seven-member board of directors, which includes a Tribal Council liaison. Ventures: Suquamish Clearwater Casino Resort, White Horse Golf Club, Kiana Lodge, PME Retail, Property Management. Subsidiaries: Port Madison Enterprises Construction Corporation. The PME Fund sets aside non-gaming funds for distribution as grants to organizations that “[improve] the lives of community members” and “support worthy programs in the region.”
The Tribe has reacquired land lost during the allotment era, and “the Tribe and Tribal members now own more than half of the land on the reservation for the first time in recent history,” Suquamish Tribe communications director April Leigh said. Major acquisitions include White Horse Golf Club in 2010, placed into trust in March 2014; and 200 acres known as the Place of the Bear, in the Cowling Creek watershed, in November.
As of 2014, the reservation area consists of 7,657 acres, of which 1,475 acres are owned by the Suquamish Tribe, 2,601 acres are owned by individual citizens of the Suquamish Tribe, and 3,581 acres are owned by non-Indians.
In 2011, the Suquamish Tribal Council voted unanimously to approve same-sex marriage.
- "Notable Native American Women". Retrieved 2013-04-20.
- Seattle Times
- Walker, Richard (January 30, 2015). "Suquamish Tribe's economic boom 'breathtaking'". North Kitsap Herald.
- Yardley, William (August 12, 2011). "A Washington State Indian Tribe Approves Same-Sex Marriage". The New York Times. Retrieved August 12, 2011.
|Wikimedia Commons has media related to Suquamish.|
|
<urn:uuid:7d1e5fb6-1ac2-4e6f-b6f3-884445383e6a>
|
CC-MAIN-2017-04
|
https://en.wikipedia.org/wiki/Suquamish
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00052-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.938616
| 1,480
| 4.0625
| 4
|
Two of Vermont’s most successful homegrown tech companies recently sold to out-of-state interests. But their founders, as well as outside analysts, suggest that the takeovers could actually do more for Vermont employees, host communities and the state’s economy than if they’d stayed locally owned.
Williston-based MicroStrain and Milton-based Ascension Technology Corporation completed buy-out deals this summer with companies based in North Carolina and Pennsylvania, respectively. MicroStrain CEO Steve Arms says he agreed to sell the company he founded in 1987 to LORD Corporation, in part to ensure it had the capital and expertise necessary for continued growth.
“Once a company reaches between $10 million and $20 million in revenues, it needs to bring in new investment in order to reach higher levels,” says Arms, a University of Vermont grad who built the company around his own invention: a tiny sensing device that measures stress levels in everything from knee implants to helicopters. He sold the business for an undisclosed sum.
Ascension, a manufacturer of electromagnetic tracking systems for medical applications, was sold to Roper Industries, a $2 billion conglomerate, for a price that also remains private. Jack Scully, who stayed on as managing director of the company he cofounded 26 years ago, says the sale “is giving us the resources we need to play more effectively in the medical arena.”
“It might have taken us five years to get there on our own,” says Scully, a St. Michael’s College graduate. “Now it’ll be more like two years.”
One big plus: Both companies will stay put in Vermont and no job cuts are planned. In fact, MicroStrain’s new owners may actually add to the company’s workforce of 58 full-time employees and 14 interns, Arms suggests. And LORD has an in-house program that provides financial assistance to full-time employees who continue their education in their respective fields. The company reimburses 75 percent of tuition and fees upon successful completion of up to two courses per semester.
“LORD is very enlightened in that way,” Arms says.
Ascension’s “14 highly qualified engineers” — part of a roughly 40-person workforce — helped ensure that Roper won’t be moving the business out of state, Scully says. Roper has renewed the lease on Ascension’s space in Milton’s Catamount Industrial Park, in part because those dozen-plus engineers “are not about to leave Vermont,” Scully explains.
An additional benefit of the Roper takeover, Scully says, is that “the benefit package is going to get bigger in the new year” for Ascension employees.
Arms says he was motivated to sell the privately held MicroStrain mainly by his obligation “to bring value to shareholders.” He chose LORD over other potential buyers because “it’s a major aerospace company owned by universities, including MIT, that offered a perfect fit for our products.” LORD cares at least as much about its innovation ethic as it does about its quarterly reports, Arms says.
The internship and training programs developed by MicroStrain, which LORD will be carrying on, are important, Arms says, because there’s a shortage of talented techies in Vermont.
That assessment is seconded by Rich Tarrant, the cofounder of IDX, a medical software designer that is ranked as the state’s most successful homegrown high-tech company. “Vermont doesn’t have good tech training programs,” says Tarrant. Selling IDX to GE Healthcare six years ago for $1.2 billion gave the former IDX access to world-class brain power, Tarrant notes.
Transferring ownership of a Vermont-bred business to an out-of-state corporation can have negative outcomes too, of course. “The granddaddy of them all,” in the view of economic analyst Jeff Carr, was Ben & Jerry’s. The “one percent for peace” set-aside established by the local ice cream moguls “turned into .00001 percent” following Ben & Jerry’s sale to Unilever, an Anglo-Dutch multinational, notes Carr, president and economist of Williston-based Economic & Policy Resources.
Another example Carr cites is Dwight Asset Management, a Burlington investment house purchased earlier this year by Goldman Sachs. Goldman is moving all but a few of Dwight’s operations to Manhattan and cutting loose about half of its 100-member workforce in the process.
Lawrence Miller, secretary of the Vermont Agency of Commerce and Community Development, says the formation, growth and eventual sell-off of any company — not just tech firms — can be seen as a natural evolution. It’s capitalism in action, he observes.
“Putting up barriers to companies being bought would be a mistake as well as unfeasible,” he says. A moral consideration has to be made as well. “People who have put their hearts and souls into a business deserve to be able to do what they want with it,” Miller maintains.
“These sorts of transactions do represent risks to employees, communities and the entrepreneurs themselves,” Miller acknowledges. “But if a company has a good management team, they tend to stay here.”
It’s probably naive to assume that everything will remain the same under new ownership, especially when the new owner is far bigger than the business it has bought. “Change is inevitable in these circumstances,” Carr points out. “Sometimes it’s good, sometimes not so good.”
For Ascension, takeover by a Fortune 1000 corporation has put stresses on the accounting and administration units, Scully reports. “There was a fear we’d get steamrolled by their regulations, but that hasn’t really happened,” Scully says. Only that Ascension’s accounting unit is now feeling pressure from corporate HQ to close the books at exactly the end of the month, he adds. It used to be that a few days might pass before monthly accountings were finalized.
Scully, 65, says the new Ascension owners asked him to remain in a position of power following the takeover, which did lead to the retirement of company president and cofounder Ernie Blood. In fact, Scully got a promotion, from vice president for marketing to managing director. He consequently feels no diminution of authority at Ascension and says he agrees with the direction in which the company is going.
Meanwhile, loss of control over the business he started meanwhile proved unpalatable to MicroStrain’s Steve Arms, who resigned from the firm a month after its August purchase by LORD. “It was different for me to go into the office and have it not be my company,” Arms says. “Being in charge of things is what I enjoy.”
Arms promises that he will go on to launch another venture at some point. And that would fit a pattern, Miller says.
“Original investors who sell their businesses may go on to start new enterprises,” the state economic development chief says. “And that can be really good for Vermont.”
Some employees may also decide they’d rather take a chance as entrepreneurs than remain at a company that’s become more cautious and impersonal following its sale to a megabusiness. That’s what happened with several employees at the former IDX, Tarrant recounts. “People who didn’t like to work in that new atmosphere started their own companies,” he says, adding that Winooski-based Marathon Health is the child of ex-IDXers, including himself. Tarant currently serves as chairman of the board of the company he launched in 2005.
Today, GE Healthcare remains in the South Burlington headquarters built for IDX. While the company employs fewer Vermonters than when it was IDX, Tarrant says the highly skilled employees who were let go had few problems finding work. They were “instantly employable,” he says.
Takeovers can also change a company’s culture, and that’s a big reason why another highly successful Vermont tech firm, Winooski-based BioTek, has spurned offers from would-be buyers.
“We’ve had a good team working together here for a long time,” says Adam Alpert, vice president of BioTek, a manufacturer of instruments in the life sciences field. “There’s a core culture here, a commitment to shared values, a sense that this is how we operate.”
Adam and his brother, CEO and president Briar Alpert, have not lacked for chances to make scads of money by selling the business to a big-name, out-of-state company. Their “top-of-the-list” reason for rejecting those offers, Adam Alpert says, is that “we’re passionate about the business and how we do it.
“We do think there’s opportunity for BioTek to keep growing, to become the best firm of its kind — not just for its shareholders, but for its employees and all who benefit from having a successful business in Vermont,” Adam Alpert says.
Remaining independent, he adds, allows a company to seek new business anywhere in the world. “If it’s no longer independent, a company faces limitations as well as some potential advantages. It can wind up competing with other aspects of a big corporation and can have its focus blurred.”
For now at least, BioTek is staying locally owned. “It’s worked out well for us,” Adam Alpert says. “That might or might not be the right option for another company. A lot depends on the intentions of the acquirer. It’s not like there’s any general rule.”
|
<urn:uuid:0eec7ba2-7028-4ca1-9641-e8d2ea22c14a>
|
CC-MAIN-2017-04
|
http://www.sevendaysvt.com/vermont/two-local-tech-firms-sell-to-out-of-state-corporations-and-that-could-be-good-for-vermont/Content?oid=2241955
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00079-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.971211
| 2,109
| 1.773438
| 2
|
8vo, pp. xiv, 460, with a half-title; a very good copy in contemporary French speckled calf, red morocco spine label, head of spine chipped.
Added to your basket:
Le Maitre d’anglais, ou grammaire raisonné … troisième edition …
Third (second Paris) edition, with tables and explanatory notes added by Scipion Duroure.
‘Cobbett’s first occupation in America was the teaching of English to French émigrés, mostly moderate Republicans, who had fled to America after the fall of the Girondins … His first work, written in French to aid his students, was … Le Tuteur Anglais, an English grammar written in French. This was not actually published until 1795 [in Philadelphia] … The little volume afterwards had an enormous circulation. Reprinted in France under the title Le Maitre Anglais, it passed through forty or more editions’ (G. D. H. Cole, The Life of William Cobbett, 1924).
You may also be interested in...
De dialogo liber. Ad Ioannem Moronum cardinalem.
SIGONIO, Carlo. De vita, et rebus gestis P. Scipionis Aemiliani liber. Adiectis in fine, unde historia sumpta sit, locis. Index rerum memorabilium. Bologna, Giovanni Rossi, 1569.
THEODORE WILLIAM’S COPY [BERINGTON, Simon, adapted by Jean-Baptiste DUPUY-DEMPORTES.]
Memoires de Gaudence de Luques, prisonnier de l’Inquisition … Première [– quatrième] partie.
Second edition of this much expanded and altered translation of Berington’s celebrated utopian novel, Memoirs of Sigr Gaudentio di Lucca (1737). The Memoirs enjoyed immense popularity, undergoing at least twelve eighteenth-century editions in English and contemporary translations into French, German and Dutch. With the author thought to be George Berkeley, the great Christian idealist, ‘it attained to a rank and dignity comparable to that of the Republic of Plato, the Utopia of Sir Thomas More, and the New Atlantis of Lord Bacon’ (Lee M. Ellison, ‘Gaudentio Di Lucca: a Forgotten Utopia’, PMLA, L , 494-509).
|
<urn:uuid:64492021-5a98-458b-8c32-023a49cb7bab>
|
CC-MAIN-2022-33
|
https://www.quaritch.com/books/cobbett-william/le-maitre-d-anglais-ou-grammaire-raisonn%EF%BF%BD%EF%BF%BD-troisi%EF%BF%BD%EF%BF%BDm/GB513/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00676.warc.gz
|
en
| 0.819435
| 550
| 2.03125
| 2
|
Brad Talton(Kyokai)United States
In the past, I've done a couple of design articles in the Board Game Designer Forum, and it's been suggested that I collect these into a blog of some kind, for easy reading and linking.
So, with that in mind, I present BG Choppers
In this blog, I'm going to be talking about specific mechanics in games--why they work, how they work, and (at least in some cases) why and how they don't.
Before the first post later this week, I'd like to give a quick overview of the primary topic of this blog, mechanics. The two big questions to answer are: What are mechanics, and why do we care? Also, a quick introduction of myself, for those curious, is included at the end.
What are mechanics?
Mechanics are the individual ways that bits and pieces move within games. Whether you pay your auctions to the bank versus the auctioneer; whether you have to move as many spaces as the dice shows; who wins when combat starts? These are all mechanics that make up a game.
Mechanics are the building blocks of what I like to call Elements. An element is a larger game system with a specific goal in mind. The trading, collection, and spending mechanics in Settlers of Catan all work together to create a Resource Element. The connecting of roads and the way towns collect resources in Settlers of Catan combine to create a Spatial Element.
If mechanics are the nuts and bolts, then Elements are the individual pieces of the engine they combine to assemble. Sometimes mechanics will do double-duty and serve several elements. As in the example above, resource collection contributes to both the Resource Element and the Spatial Element.
The mechanics are at the core of the game, but they only really take shape within the context of the Elements they comprise. That is to say, the way we collect resources is pointless unless we also consider how they're going to be used. Only within the contest of the Resource Element is a specific mechanic (such as resource collection) relevant.
Why do we care?
No mechanic is fun in and of itself, just like a pot of paint can hardly be called a work of art. The skilled designer blends mechanics to create Elements that inspire a certain experience, just like the painter combines colors and techniques to form a work of art.
Each mechanic is included in a game with the idea of creating some element, and each element is implemented with the idea of creating a player-experience. A mechanic is good insofar as it supports the experience the game is trying to create. Whether a game is fun depends more heavily on the individual playing and the high-level vision of the designer than its exact implementation.
Long story short--good mechanics don't make a good game, but poorly implemented mechanics will ruin a game without exception.
A designer's command of the mechanics at his disposal will determine how effectively he is able to implement the vision he has for his game.
Introduction / Resumé
I'm Brad Talton, the owner and lead designer for Level 99 Games. Designing and analyzing game systems is my primary interest in board game design, and has been a constant study of mine for several years now.
My first published game was BattleCON: War of Indines, followed by Mystic Empyrean, and NOIR: Deductive Mystery Game. Kill the Overlord, Pixel Tactics, and Grimoire Shuffle are a couple of my games that are in post-production and will be released later this year.
Thanks for Reading!
I'll be attempting to make one big post per week, so please subscribe if you think you'll be interested in getting the first update.
Thanks for taking the time to read the intro, and Happy Gaming!
|
<urn:uuid:b495f17d-a1cb-4522-9e71-295446f08815>
|
CC-MAIN-2016-44
|
http://boardgamegeek.com/blogpost/12135/introduction/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718426.35/warc/CC-MAIN-20161020183838-00137-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.954623
| 784
| 2.53125
| 3
|
| ||Format||Pages||Price|| |
|3||$40.00|| ADD TO CART|
|Hardcopy (shipping and handling)||3||$40.00|| ADD TO CART|
Significance and Use
The purpose of this guide is to establish a minimum level of knowledge and skills for the water rescue responder. The application will improve the quality of initial emergency response, the rescue of the water victims, and the safety of the rescuers.
All persons who are identified as water rescuers and water rescue responders shall meet the requirements of this guide.
This guide does not preclude the scope of performances for water rescuers needing more advanced or more specialized water rescue training.
This guide will assist government agencies, state, local, or regional organizations; fire departments; rescue teams, and others who are responsible for establishing a minimum performance for personnel who respond to water emergencies.
1.1 This guide covers minimum requirements for the scope of performance of a water rescuer I who may be responsible for the initial on scene evaluation, performing land based water rescues, and providing initial patient care at a water rescue incident.
1.2 This guide is one in a series; water rescuer I is only a beginning level designed for a water rescue responder. Duties and responsibilities at water rescue operations vary according to the water rescuer's skills and knowledge. As the water rescuer level I progresses and becomes more proficient, the individual will move from responder to in-water rescuer to rescue boat operator.
1.3 This standard may involve hazardous materials, operations, and equipment. This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
American Red Cross StandardsStandards and Guidelines for Standard First Aid
American Heart AssociationBasic Cardiac Life Support (BCLS)
ICS Number Code 13.200 (Accident and disaster control); 47.080 (Small craft)
|Link to Active (This link will always route to the current Active version of the standard.)|
ASTM F1739-96(2012), Standard Guide for Performance of a Water Rescuer—Level I , ASTM International, West Conshohocken, PA, 2012, www.astm.orgBack to Top
|
<urn:uuid:8b889fd0-b408-49e1-b386-20406a44897b>
|
CC-MAIN-2017-04
|
https://www.astm.org/Standards/F1739.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00377-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.877711
| 536
| 1.804688
| 2
|
Dukakis, Bush, EPA to blame for Boston Harbor. Cleanup of the nation's dirtiest harbor was task no politician wanted
Boston — Boston has the filthiest harbor in the nation. Is Gov. Michael Dukakis to blame? Vice-President George Bush suggested as much when he boated through Boston early this month, a daring daylight raid on his opponent's territory and issues. ``The reason that Boston Harbor is not cleaner today is that the Dukakis administration twice sought to avoid making it cleaner,'' Mr. Bush said. A 1984 federal study found the harbor ranked first or second nationwide in most pollutants. Environmentalists and those involved in the cleanup, however, spread the blame much more widely. Even Bush has Boston sludge on his shoes, some say.
``Nobody's hands are clean, including the EPA's,'' says Michael Deland, head of the Environmental Protection Agency's Boston office.
``I don't have enough fingers to point to all the people to blame for Boston Harbor,'' says Paul A. Garrity, the former ``sludge judge'' who in November 1984 slapped a moratorium on Boston-area sewer hookups in a successful bid to prompt action on a harbor cleanup.
James Maddy, executive director of the League of Conservation Voters, points to Bush's role as head of President Reagan's Task Force on Regulatory Reform. The panel quashed regulations to make industries pretreat waste. In Boston, that would have meant years' less accumulation of heavy metals and other toxins in the harbor.
Make no mistake, Mr. Maddy adds: Governor Dukakis ``had to be hit over the head with a two-by-four'' to move on Boston Harbor, a body of water that had been collecting the city's waste for centuries.
The contentious cleanup history began 16 years ago, when Congress made secondary (more complete) sewage treatment the law of the land. In 1977, the Clean Water Act was changed to exempt cities that could show that the water receiving their treated sewage was not too badly affected. Many cities applied, including Boston, which proposed a sewage outfall pipe in deeper water.
Dukakis has offered two explanations for seeking the original waiver: scientific uncertainty and scarce funds. Diluting the waste in deeper water makes the effluent harmless, some argued. And while the federal government was ready to pay for three-quarters of the project, the state was in such financial straits it couldn't afford its share.
Federal officials and environmental groups dismiss the latter argument, but agree there is still discussion about the real need for secondary treatment. (In several sewage-disposal crises over the past century, Boston had always ``solved'' the problem by dumping the waste further offshore.)
Another reason is offered by federal and state officials: Harbor cleanup was a ``career killer.'' No one cared, no one thought it could be done, and no one wanted a sewage treatment plant next door.
It wasn't until Boston rediscovered its waterfront in the late '70s and early '80s that there was an ``explosion'' of public interest, says Steve Ells, director of government relations and environmental review at EPA's Region I office. ``Boston had forgotten its harbor.'' The idea that a cleanup was (a) possible and (b) worth doing wasn't widely accepted until the early and mid-'80s, he says.
The EPA was supposed to respond to Boston's 1979 waiver request in 12 months; four years passed. A spokesman for the Massachusetts Water Resources Authority (MWRA) says the state made ``repeated'' inquiries on the waiver application.
EPA's Deland checked with the head of the waiver office in Washington and found ``no letter, and nary a phone call'' from the state. (Edward King was governor from 1978-82.)
Why the delay? This was the scandal-wracked EPA of Anne M. Burford and Rita Lavelle, Mr. Deland and others point out. The agency had its hands full with other matters. Soon after William Ruckelshaus took over the agency in 1983, Boston's answer came back: Permission denied.
Quixotically, says Deland, Dukakis resubmitted Boston's application for a waiver, an option designed for West Coast cities nearer to water thousands of feet deep. The Boston outfall pipe would have been in water 80-100 feet deep - only five times the diameter of the proposed pipe.
Paul Levy, head of the MWRA, says the supplemental application had the EPA's tacit approval. A state legislator says Boston, in the midst of lawsuits over the harbor cleanup, was following the advice of legal counsel. (Two high-visibility lawsuits were filed in state and federal court to force a harbor cleanup in 1982 and '83.) The refiled waiver application was denied in 1985.
From then on, the harbor cleanup timetable would be set by state and federal courts. Depending on who is asked, the Dukakis administration either was remarkably cooperative or had to be threatened with legal action every step of the way. In hindsight, says Deland, the routine option of bringing a lawsuit should have been exercised much sooner.
Today, nearly everyone is all smiles. ``I'm very proud to be the governor who's cleaning it up,'' Dukakis said of the harbor. EPA officials also accent the positive; environmentalists refer to Boston's ``model'' cleanup plan.
Almost everyone is smiling, that is, except rate payers. The federal funds allotted to Massachusetts for water pollution are running out - they were spent elsewhere in the state.
So the estimated $6.1 billion cost of New England's largest public works project, a secondary treatment plant and sludge disposal plan, will be borne largely by the 2.5 million residents of 42 communities plus Boston. Homeowners have been warned to expect water/sewer bills to more than triple - to more than $1,133 by the year 2000. Unless, Dukakis has hinted, they have a friend in the White House before then.
|
<urn:uuid:9c57b8d2-cbde-4407-8b56-2ddf2e82fab3>
|
CC-MAIN-2017-04
|
http://www.csmonitor.com/1988/0915/ahar.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00548-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.970139
| 1,239
| 2.140625
| 2
|
As a person who loves red, white, and blue and stars and stripes, I’ve been known to have Flag Day parties.
Congress authorized a red-white-and-blue flag with stars and stripes as the official national symbol of the United States of America on June 14, 1777.
On May 30, 1916, President Woodrow Wilson established by a proclamation the anniversary of the Flag Resolution of 1777.
Although Flag Day was celebrated in various communities for years after Wilson's proclamation, it wasn't until August 3, 1949, that President Truman signed an Act of Congress designating June 14 of each year as National Flag Day.
In a Flag Day proclamation for 2010, President Obama said:
More than 220 years after Old Glory was first embraced by our founders, the Stars and Stripes remain the symbol of our nation's pride. On Flag Day and during National Flag Week, we recognize the American flag as a symbol of hope and inspiration to people at home and around the world – as a constellation which grows brighter with every achievement earned and sacrifice borne by one of our citizens.The president also called on Americans to observe Flag Day and National Flag Week by displaying the flag. In addition, he asked them to observe the days from Flag Day through Independence Day as a time to honor America and to celebrate our heritage in public gatherings and activities.
In the proclamation, Obama also directed federal officials to display the flag on all federal government buildings during that week.
Do you observe Flag Day? Are there Flag Day events where you live?
The longest-running Flag Day parade is held annually in Quincy, Mass., which began in 1952 and is celebrating its 59th year in 2010.
The largest Flag Day parade is held annually in Troy, N.Y., which usually draws about 50,000 spectators.
|
<urn:uuid:f31c8540-7fc3-4caa-9e24-cfe901b70517>
|
CC-MAIN-2017-04
|
http://boomersurvive-thriveguide.typepad.com/the_survive_and_thrive_bo/2010/06/what-does-flag-day-mean-to-you.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00241-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.967871
| 369
| 3
| 3
|
By Katie Lodjic, Northwest Regional Coordinator
Motivation. It comes in so many forms, especially when working in the pro-life movement. I see student groups motivated by exciting events like baby saves, a changed mind, or a successful campus display.
Last week I saw another form of motivation. I was meeting with a new high school pro-life club in the Northwest and they were extremely excited to change hearts and minds on their campus. While brainstorming how to do this they found out that a student had confided in a teacher that she was pregnant and planned to keep her baby.
Here was the perfect opportunity to provide love and support to a fellow student and introduce their club to the school! The students planned to throw the student a baby shower, and host a school-wide baby item drive just for her.
The student group and I walked down to the teacher’s classroom to get all the specific details, and to find out exactly what the girl needed. We were shocked as the teacher, holding back tears told us, that the girl’s mother had found out about the pregnancy over break, and had quickly taken her into Planned Parenthood for an abortion.
It felt like someone had punched me in the stomach. And looking around, I don’t think there was a dry eye in the room. The question in every one’s mind was, “If she had known there was a new club at her school that would support her and accept her, would she have been stronger in her resolve to keep her child? Would it have made a difference?”
Although it was a heart-breaking experience, it was incredibly motivating to this student group to find out that there are students in their school who desperately need their help, love and support. That they, as supportive peers can create a culture of life and acceptance which in turn will save the life of a preborn child and spare the mother from lifelong pain.
After this experience, the group is more determined than ever before to abolish abortion in their high school community and to make abortion absolutely unthinkable for their peers.
It goes to show how important Students for Life groups are on our high school campuses. These students are changing hearts and minds at their schools, and sometimes they are the only life-affirming support a young woman has when deciding whether to choose life for her child.
Please pray that this young woman will find healing, pray for her preborn child, and pray for this new student group, that they are successful in creating a culture of Life at their high school.
|
<urn:uuid:e59f8010-8505-420b-b972-dd79d8925317>
|
CC-MAIN-2017-04
|
http://studentsforlife.org/staying-motivated-to-abolish-abortion/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00051-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.986273
| 525
| 1.765625
| 2
|
SACRAMENTO, Calif. (AP) -- California is transforming baseball stadiums, fairgrounds and even a Disneyland Resort parking lot into mass vaccination sites as the coronavirus surge overwhelms hospitals and sets a deadly new record in the state.
California's COVID-19 death toll reached 30,000 on Monday, according to data collected by Johns Hopkins University.
It took six months for the nation's most populous state to reach 10,000 deaths but barely a month to jump from 20,000 to 30,000 deaths. California ranks third nationally for COVID-19-related deaths, behind Texas and New York, which is No. 1 with nearly 40,000.
Public health officials have estimated about 12% of those who catch the virus will require hospital care, usually several weeks after infection as they get sicker.
Gov. Gavin Newsom and public health officials are counting on widespread vaccinations to help stem the tide of new infections, starting with medical workers and the most vulnerable elderly, such as those in care homes.
Newsom acknowledged the rollout of vaccines has been too slow and he pledged 1 million shots will be administered this week, more than twice what's been done so far.
That effort will require what Newsom called an “all-hands-on-deck approach,” including having vaccinations dispensed by pharmacists and pharmacy technicians, dentists, paramedics and emergency medical technicians, and members of the California National Guard.
Orange County, south of L.A. County, announced Monday that its first mass vaccination site will be at a Disneyland Resort parking lot in Anaheim. It's one of five sites to be set up to vaccinate thousands of people daily.
The sites are “absolutely critical in stopping this deadly virus," county Supervisor Dough Chaffee said in a statement.
The state will vastly expand its effort with new mass vaccination sites at parking lots for LA's Dodger Stadium, Petco Park in San Diego and the CalExpo fairgrounds in Sacramento.
Cars lined up early Monday near the downtown stadium in San Diego, where officials aimed to inoculate 5,000 health care workers a day.
“It's kind of like a Disneyland ride” with cars moving through, said Heather Buschman, spokeswoman for UC San Diego Health, whose medical staff was administering the shots. She said people seemed eager to be vaccinated, with more than 12,500 health care workers in San Diego County initially scheduling an appointment.
By week's end, the city of Los Angeles planned to convert its huge COVID-19 testing site at Dodger Stadium into a vaccination center that can handle 12,000 inoculations daily.
Los Angeles County is an epicenter for the COVID-19 outbreak, accounting for some 40% of California's virus-related deaths and a huge number of new cases.
On Monday, nearly 8,000 people were hospitalized in Los Angeles County, which had fewer than 50 intensive care units available in an area with a population of 10 million people, said Dr. Christina Ghaly, county director of Health Services.
While the county saw a dip in new cases, the director of public health, Barbara Ferrer, said that probably is due to decreased testing after the New Year's holiday. She predicted another increase in cases from people who gathered together unsafely over the holiday.
Ferrer also said COVID-19 is still killing someone in the county every eight minutes, on average.
There is a sliver of hope, with new hospitalizations statewide down from about 3,500 a day earlier this month to about 2,500. Some forecasts say the hospitalizations will level off by the end of the month.
Yet recent frightening jumps in new positive cases show the state may simply have bought itself time to prepare for what officials still expect to be a “surge on top of a surge” in the next few weeks driven by New Year's celebrations, officials said.
Still, the state may get “a little breathing room” for hospitals that have seen their staff and oxygen supplies stretched thin, and for 1,000 newly arriving contract medical workers to be augmented by another 1,000 or so before the surge peaks, said Dr. Mark Ghaly, secretary of the California Health and Human Services Agency.
Lawmakers also continued to plead with people to keep social distancing to slow the spread of infection. In L.A. County, residents were being urged to wear a mask even when at home if they go outside regularly and live with someone elderly or otherwise at high risk.
“Dying from COVID in the hospital means dying alone,” county Board of Supervisors Chair Hilda Solis said. “Visitors are not allowed into hospitals for their own safety. Families are sharing their final goodbyes on tablets and mobile phones."
“One of the more heartbreaking conversations that our health care workers share is about these last words when children apologize to their parents and grandparents for bringing COVID into their homes, for getting them sick," Solis said. “And these apologies are just some of the last words that loved ones will ever hear."
|
<urn:uuid:b0b421a9-cd67-4235-ac45-6d6f50f5b95c>
|
CC-MAIN-2022-33
|
https://www.dtnpf.com/agriculture/web/ag/news/world-policy/article/2021/01/12/california-turns-stadiums-covid-19
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00269.warc.gz
|
en
| 0.961716
| 1,054
| 1.632813
| 2
|
fiscal - current account deficit and financial account surplus and currency - mixed monetary- current account deficit and financial account deficit and currency - depreciation is there a difference between short term and long term?
is this true for short term or long term or both?
monetary in the short term, rates decrease, financial acct down, current acct up, currency decreases, exports go up, imports go down monetary long term (Price effects) - prices go up, imports go up, exports go down, current acct goes down, financial acct goes up, currency decreases both in short and long-term
Fiscal Policy stimulus Short term- Rates up, Financial acct up (because we are attracting more capital), current acct down, currency up, exports down, imports up. Fisical Policy long term price effects- Prices up, financial acct up, current acct down, currency down, imports up, exports down.
With Regards to Fiscal Policy LT, if currency depreciates, shouldn’t that encourage exports and therefore we have a positive current account. Appreciate your feedback.
|
<urn:uuid:6754c0a1-d117-4443-95a3-41f3ba9cd18a>
|
CC-MAIN-2022-33
|
https://www.analystforum.com/t/fiscal-vs-monetary-unexpected-expansion/38489
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00274.warc.gz
|
en
| 0.89151
| 231
| 2.4375
| 2
|
This week we asked Mara Keisling, founding executive director of the National Center for Transgender Equality, about the biggest challenges facing the transgender community and "Orange is the New Black" actress Laverne Cox, who Keisling calls a "phenomenal figure in raising public understanding of transgender people."
1) So first - for those who do not know - can you explain what transgender means? How is gender identity different from sexual orientation?
MK: Being transgender is a deeply personal, deeply held understanding of your gender identity. It's someone whose gender today is different than the gender they were born as. Some transgender people have undergone some combination of social, legal, and medical transition to live their life as the gender they know they are. As for the relationship between being transgender and one's sexual orientation, simply put, sexual orientation describes the kind of person one is attracted to, whereas gender identity describes someone's understanding of themselves. Transgender people can be gay or straight or bisexual or asexual, just like anyone else.
2) What do we know about the number of transgender individuals in the United States?
MK: It's hard to tell exactly how many transgender people there are in the United States because many national population surveys like the Census or health studies are only beginning to explore how to count transgender people. My background is in public polling and the social scientist in me has sympathy for researchers who recognize how complicated it is to identify transgender people. That being said, Gary Gates at the Williams Institute at UCLA School of Law estimates that 0.3 percent of adults in the United States are transgender. That percentage is likely much higher when we include gender non-conforming people - that is, people whose gender presentation falls outside of what many view as "traditionally" male or female norms.
3) In your view, what is the biggest misperception about the transgender community?
MK: That we aren't who we say we are. Too often transgender people are accused of being something other than what they say they are. Too often, we are questioned about our "real" name or our "real" gender. The core of the mistreatment, harassment, and violence facing transgender people stems from this fundamental theme in the way the public doubts and denies us our true selves.
4) What do you think are the biggest challenges facing the transgender community?
MK: There are a lot of challenges out there, and there are a lot of people doing the work on the ground or here in Washington, D.C., who work tirelessly to address these challenges. But for me, I'd say it is the need to be accepted and respected for who we are. The lack of understanding of our humanity continues to cause us to face disrespect, discrimination, and violence and is actually killing us. And when trans people face that and other issues like racism, ableism, and xenophobia, the disrespect and violence can be so much worse.
5) How has Laverne Cox - who will be on "This Week" Sunday - contributed to the transgender awareness?
MK: Laverne has been a phenomenal figure in raising public understanding of transgender people. She has leveraged her platform to really catalyze public acceptance and she has done it with such graciousness, generosity, intelligence and her own story. She is part of this amazing moment we are having right now that is being led by a bunch of amazing trans women of color including Laverne, Andy Marra, Janet Mock, Geena Rocero, Fallon Fox, and some others. They are leading the kind of cultural shift that is making our work in Washington a lot easier and speeding up the pace of change.
6) You've praised the president's actions on behalf of transgender Americans, but what else would you like to see him do?
MK: We still have a fairly full federal policy agenda that needs to be addressed. However, right now, since I know the White House is focused on immigration, I would especially flag the need for immigration reform that anticipates LGBT and queer immigrants. Our people often come to the U.S. because of dangerously anti-transgender climates back home, and they end up being victimized again by solitary confinement, an immoral bed quota, arbitrary asylum rules, and an absolutely broken detention system that simply cannot house transgender detainees safely.
Go here to find out when "This Week" is on in your area.
|
<urn:uuid:83c1c97d-007f-4988-ab0a-dd0642532c5b>
|
CC-MAIN-2017-04
|
http://abcnews.go.com/blogs/politics/2014/08/6-questions-for-transgender-rights-advocate-mara-keisling/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00471-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.96088
| 896
| 2.90625
| 3
|
This story now
IN History & Culture ON 27 Apr, 2015
Sometimes our past become great teachers for the coming future, going by this true saying, one should always remember some important things our great leaders had said while they left us with more complexities to deal with. Here are great messages that History has for us through the preachers and some events.
This lesson is strong enough when we look back at German Nazi rule by Hitler.
Guns and ideas are both equally powerful and destructive.
One should never help an enemy even unintentionally.
Once you win, you are imprinted in the pages of History. From Hitler to Obama, we know them for their victory.
Abraham Lincoln made everyone realize that America can be destroyed only when it itself wants to be otherwise its impossible. To go by what he says, USA is still not destructible.
When you are aspiring to rule the world, it is important to live the life in the moment with the driving passion to learn everyday. May be that is why Gandhiji is still immortal because of his philosophies.
They say, History never repeats but Afghanistan assures that any country which tried invading it gets an equal powerful comeback from their side.
No civilization, leader or belief is forever. Everything falls and makes way for a revolution. Even Roman empire ruled for 100 years but they too had an end.
This is one of the biggest lesson our History conveys to us. One should certainly read about Hitler and Napoleon when they tried only to fail.
Julius Caesar was stabbed to death but to his shock one of his most closest friend Brutus turned hostile and stabbed him from back. Et Tu Brute? is the origin of infidelity in friendship, conspiracy in politics and manipulations are ideals that are surviving even today in our society.
Romeo and Juliet taught us that love is immortal.
Its not even a joke, our history warns us that the one who protects us are our saviors and probably they should remain happy. If one fails then Indira Gandhi's assassination is one of the biggest example.
To access this content, confirm your age by signing up.
|
<urn:uuid:b45e427b-d762-453d-b703-d22dcff8a239>
|
CC-MAIN-2017-04
|
https://www.wittyfeed.com/story/5494/12-most-valuable-lessons-history-has-ever-taught
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00208-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.967134
| 436
| 2.59375
| 3
|
Comments Off on Trans Alaska Pipeline
The Trans-Alaska Pipeline System (TAPS), usually called the Alyeska Pipeline in Alaska or the Alaska Pipeline elsewhere, is a major U.S. oil pipeline connecting oil fields in northern Alaska to a sea port where the oil can be shipped to the Lower 48 states for refining.
The main Trans-Alaska Pipeline runs north to south, almost 800 miles (1,300 km), from the Arctic Ocean at Prudhoe Bay, Alaska to the Gulf of Alaska at Valdez, Alaska, passing near several Alaskan towns, including Wiseman, Bettles, Livengood, Fox, Fairbanks, and Glennallen.
Construction of the pipeline presented significant challenges due to the remoteness of the terrain and the harshness of the environment it had to pass through. Between Arctic Alaska and Valdez, there were three mountain ranges, active fault lines, miles of unstable, boggy ground underlain with frost, and migration paths of caribou and moose. Geological activity has damaged the pipeline on several occasions.
Since its completion in 1977, the pipeline has transported over 15 billion barrels (2.4 km3) of oil.
Canon 5D, Canon 24-105 f/4L lens – 1/250 second, f/22, ISO 160
|
<urn:uuid:4de2927e-c789-45ac-b28a-c7796e03eb6e>
|
CC-MAIN-2017-04
|
http://leggnet.com/2007/08/trans-alaska-pipeline.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00504-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.932221
| 271
| 3.4375
| 3
|
Environmental factors interact with spatial processes to determine herbaceous species richness in woody field margins
The species richness of hedges in an agricultural landscape may be determined by the environment and by the spatial processes which occur in that landscape. Here, we divided the environmental predictors into three groups: site conditions, hedge stand and landscape structure. We determined their independent and joint effects on the richness of four guilds of herbaceous species in 92 hedge stands in a north-Mediterranean intensive agricultural landscape. The fine-(at < 250 m) and broad-(> 550 m) spatial patterns of the key environmental predictors and the pure spatial effects on species richness were measured using a computation of the principal coordinates of a matrix of geographical neighbours integrated into a variation partitioning. The total explained variation of species richness among hedgerows was highest for wetland herbs (62 %), with increasing rates for rare plants (33 %), forest herbs (43 %) and arable weeds (47 %). 43-11 % of that variation was spatially structured and mostly explained by some of the key environmental predictors, such as proportion of a given landuse, presence of woody species and dead trees. This indicates that complex relationships between herbaceous species distribution and spatial processes exist in woody field margins and much of that is related to key factors which are spatially structured, both at fine or broad-scales, with implications for management and landuse planning.
Author(s): Sitzia, T; Dainese, M; McCollin, D
Journal: Plant Ecology
|
<urn:uuid:0c8c67d9-7de9-4575-a93b-d96add1f79f8>
|
CC-MAIN-2022-33
|
https://hedgelink.org.uk/resource/environmental-factors-interact-with-spatial-processes-to-determine-herbaceous-species-richness-in-woody-field-margins/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00473.warc.gz
|
en
| 0.920805
| 326
| 2.6875
| 3
|
Michael D. Moberly, Intangible Asset Strategist & Risk Specialist
Curriculum outcomes translate as forward looking relevance to business operation, i.e.,
- introduction of successive and new generations of business (operation, communication) technology reflecting business intangible asset intensity and dependency.
- application of AI (artificial intelligence), ML (machine learning), and social media – communication platforms.
- post pandemic (Covid-19) realities, i.e., preferences, attitudes, and guidelines related to (a.) sector expectations, and obligations, i.e., product-service delivery and innovation chains, (b.) resilience and functionality of same, and (c.) prudence of and receptivity to re-shoring.
Also, this business intangible asset curriculum…
- adds essential (cross-sector)dimensions = expertise and ethical contexts, seldom addressed elsewhere and specific to business things intangible.
- demonstrates strategies to mitigate risk to mission essential IA’s, i.e., vulnerability, probability, and criticality to compromise, misappropriation, and infringement, etc.
- distinguishes (a.) conventionally issued intellectual property enforcements, from (b.) computer/IT security, from (c.) intellectual, structural, and relationship capital designated as proprietary and/or trade secrets.
- differentiates risks to proprietary business things intangible, presented by (a.) global competitive-business intelligence operations, i.e., variants of economic espionage (independent, state/corporate sponsored), and (b.) commercial data mining – acquisition products and methodologies, and (c.) insider adversaries.
- aligns business strategic planning and decision making with (a.) IA’s contributory role, value, and functionality (life) cycles, and (b.) developing and positioning business IA’s to attract investment, trade, and opportunities.
This business things intangible curriculum…
- recognizes the validity of the economic fact that 80+% of most business’s value, competitive advantage, revenue generation capacity, sustainability, goodwill + reputation, originate – are driven by intangible assets, i.e., various forms of intellectual, structural, and relationship capital.
- builds capacity to exploit business things intangible contributory roles and value as preludes to lucrative – competitive operations and transactions, wherever, whenever, and however IA’s are in play, i.e.,
- affords confidence to lead and manage IA intensive and dependent businesses, i.e., convert mission essential IA’s to sources of revenue, value, and competitive advantage, reputation, and brand while recognizing (fiduciary, ethical) obligations.
|
<urn:uuid:7a69da5e-839c-4f7f-84e5-dd63141e667b>
|
CC-MAIN-2022-33
|
https://kpstrat.com/2020/07/08/business-intangible-asset-curriculum-3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00265.warc.gz
|
en
| 0.896572
| 542
| 1.8125
| 2
|
15th September 2021
Financial Institutions are not equipped or structured to deal with the coming wave of sustainability regulation, period. This includes the many de-carbonisation and green taxonomies heading their way in the coming years. Globally, companies – from the smallest firms to the titans of industry – are about to be revalued upwards and downwards according to their climate risk valuation. This could mean decades of severe disruption like we’ve never seen before. Those organisations that fail to adapt will most likely cease to remain viable within as short a time as five years.
Many leaders of sustainability and other decision-makers are left scratching their heads. Where do they look to for advice on their climate risk exposure? How can they access open data to build decarbonisation models for their business?
In this post, I want to outline the challenge for financial institutions as they enter a more carbon-conscious regulatory era. I also want to highlight what they can do to turn the climate risk challenge into an opportunity.
Financial institutions face an avalanche of carbon-based rules, regulations, and standards in the coming years. These changes are moving faster than many anticipated as businesses, governments, stakeholders, and individuals worldwide move toward more sustainable practices.
National lawmakers worldwide are focussing more on climate risk disclosure in line with the Task Force on Climate-Related Financial Disclosures (TCFD) framework. Greenhouse gas (GHG) emissions are a particular area of focus. Also, lawmakers are looking at the capital adequacy of financial services companies to stress-test their exposure to global warming.
The catalyst for increased and accelerated carbon regulation will be the United Nations Climate Change Conference, (COP26), in November 2021. One of COP26’s stated goals is to mobilise finance to help deliver global net zero-carbon emissions. I also expect future financial regulation to put extra pressure on the financial sector by demanding rigorous climate risk reporting. This includes the Basel V accord, which I expect will be shaped fast during 2022 and 2023 with a long series of implementation milestones.
These new laws – and the speed in which they are arriving – means it will be a case of ‘adapt or die’ for many in the financial sector. Financial institutions can’t kick the carbon regulation can down the road. They must embrace climate risk management. In the same way that a business today has a “risk appetite”, it must modify this tomorrow to include a “climate risk appetite”.
The sheer volume of data required to report effectively and to remain compliant in a carbon regulated environment means we will need a huge element of machine learning and artificial intelligence (AI) built into our operating models to make sense of it all. It will then require smart humans to oversee the processes and interpret the results with added skill and judgement.
The financial sector simply does not have this talent yet; this is a physical science coming into a financial world. Financial institutions are going to have to change their thinking and make assessments based on the available data. Smaller firms are at particular risk due to a lack of resources.
There are three key building blocks needed to create a data-led financial institution that is fit for purpose in the era of sustainable finance:
Classify data needed to create a structure for ingesting, normalising and taxonomising it.
Translate out the incredibly complex raw data to simpler-to-understand risk-based output data metrics.
Use machines to analyse, then visualise information. This way, humans – with the support of AI support – can interpret what it means and make critical decisions.
I see two very different camps emerging within financial services companies in their approach to climate risk. The first have appointed people in nominal sustainability roles that will have little meaningful impact on the business and contribute almost nothing to their future success. The second have taken the risk management approach of highly quantitative science-based methods that will have a positive, meaningful impact on their future success.
Even in the second camp, the challenge is that climate modelling is often done by meteorologists or academics who do not always understand finance. Likewise, finance does not always understand climate modelling specialists. So, the immediate business challenge is how to accelerate bridging this gap.
The financial sector is not great at looking outside its own industry for inspiration. Yet other industries are much further advanced and provide useful precedents. The insurance industry already has vast experience mapping climate change, to the point where some businesses in high-risk areas of the world are now uninsurable. In the aerospace industry, NASA unveiled its climate risk plan in 2014, and Airbus aims to develop the world’s first zero-emission commercial plane by 2035.
Within the financial services sector, we are seeing growing momentum around sustainability themes. These include green bonds, funding for clean energy projects, and climate risk tooling and services. For example, BlackRock, which manages almost $10 trillion in assets, announced in 2020 that climate change was a priority in its 2021 investment plans. BlackRock expects companies to reveal their plans to reduce emissions. So, the pressure is not just regulatory – it’s coming from within the industry too – insurers, investors, and lenders. In the UK, NatWest delivered £9.5 billion in sustainable funding in the first half of 2021. Across Europe, Glennmont runs its REBS (Renewable Backed Securities) credit fund for clean energy technologies. In fact, the trend is moving so fast, the list of projects and initiatives is driving an urgency for green taxonomies to address the risk of misleading sustainability projects, so called “green-washing”.
Risk management has been a key part of financial services companies’ competitive edge for a long time. Similarly, climate risk management could become a defining element in the credibility of a financial services institution. Its reputation and financial value, which are already inextricably entwined, are at stake.
Those that move first in this nascent market have most to gain, but they will need to prepare their organisation for the era of sustainable finance. This requires significant change from mindset to skillset. It will be key to partner with the right consultants and data experts to shape their future modelling. The challenge is that the financial sector does not have a stable framework to undertake what the regulators are asking them to do.
At First Derivative, we’re passionate about sustainability and believe we have our own role to play in creating a sustainable finance sector that works for the benefit of all. We serve as a catalyst for our clients’ business agility and solve their toughest operational data, risk, controls, and technology challenges. We can help our clients adjust their business model to take a data-led approach to climate risk management, so what looks like an insurmountable challenge can become a potential competitive advantage. The time to act is now.
I will be writing much more regularly on what you can do to prepare for the era of carbon regulation, so be sure to contact us. And if your organisation is struggling to understand what climate risk means for you in the coming years, do please get in touch.
|Johnny D Mattimore
Managing Director, Global Head of Risk & Sustainable Finance
|
<urn:uuid:9e20e4fc-6cfb-4373-ad68-eabe03f907f1>
|
CC-MAIN-2022-33
|
https://firstderivative.com/insights/carbon-chameleon-why-you-need-to-adapt-for-sustainable-finance/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00676.warc.gz
|
en
| 0.950859
| 1,510
| 1.632813
| 2
|
While the British had a well-trained and organized army at the start of the American Revolution, the Second Continental Congress needed to start from scratch. They had to organize an army, place generals in charge, begin plans for conscription, and locate funds and supplies for the troops. General George Washington was the man charged with the task of then organizing and leading these new forces.
Answer and Explanation:
There were actually two battles of Quebec in North America. The first was on September 13, 1759, during the French and Indian War. The battle was a large victory for the British and enabled the British to cripple the French forces. Although the war did not end until 1763, this French defeat foreshadowed the war's end and eventual British control of the Canadian lands. The second Battle of Quebec took place during the American Revolution, on December 31, 1775. This attack was a defeat for the Continental Army and signified the end to any hope of getting Canada on the side of the patriots in the Revolution. The battle also forced the Continental Army to rethink its strategy, which meant they would no longer invade Canada for the remainder of the war.
Learn more about this topic:
fromChapter 3 / Lesson 1
The American Revolution lasted for many years and there were many battles between American colonists and the British. Witness a handful of important battles, learn where they were fought, and who was the victor in each battle.
|
<urn:uuid:fbee24ac-c8d7-4498-9770-a20e343ecddf>
|
CC-MAIN-2022-33
|
https://homework.study.com/explanation/why-was-the-location-of-the-battle-of-quebec-important.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00270.warc.gz
|
en
| 0.98102
| 302
| 3.375
| 3
|
One of the most useful personality systems when it comes to character creation, the Enneagram delves into why people behave the way the do. What are they motivated by? What are they most afraid of? What makes them stressed and causes inner conflict? It’s important to know the answers to these questions where your own characters are concerned, and the Enneagram can help you get there.
In this blog series, I’ve been going through each number and pairing it with a Marvel hero. This post is all about Type Seven, known as the Enthusiast or the Adventurer. The most obvious Type Seven in the Marvel Cinematic Universe is Peter Quill, a.k.a. Star-Lord.
“What should we do next? Something good? Something bad? Bit of both?
—Peter Quill, Guardians of the Galaxy
Motivations and Fears
Sevens are people who look at the bright side of every situation, who joyfully embrace life and all of its adventures. They are motivated by a desire for freedom and happiness, leaping at new experiences to keep themselves interested and excited.
Peter Quill models these characteristics from the first moment we meet him dancing to ’70s music at the beginning of Guardians of the Galaxy. He is fun-loving and light-hearted, just like the film itself. He doesn’t seem to take life very seriously, unaware of what it is he’s trying to steal, only knowing that it’s some kind of artifact.
A Seven’s deadly sin is gluttony, but food is not the target of their obsession. Rather, they crave stimulation. There’s a reason we don’t see Quill sitting around reflecting about life most of the time. Instead, he’s constantly moving and talking, avoiding unpleasant feelings by chasing new experiences.
A Seven’s biggest fear is pain, especially emotional pain. They may attempt to divert serious discussions by telling jokes or funny stories. They maintain optimism even in the direst of circumstances because the alternative is too awful to consider.
Obstacles and Desires
These are descriptors commonly used to describe Sevens:
Use these characteristics to create inner and outer conflict when a Seven tries to avoid a painful situation.
In Guardians of the Galaxy 2, Quill comes face-to-face with his father. Even though Gamora suspects something is not quite right, Quill refuses to believe it because he wants the positive experiences associated with family. With childlike delight, he plays catch with his father and angrily tells Gamora to back off when she attempts to reason with him.
“As a kid, I used to see all the other kids off playing catch with their dad. And I wanted that, more than anything in the world!”
—Peter Quill, Guardians of the Galaxy 2
It takes so long for Quill to see his father’s deception because he wants everything to be a positive experience. He wants a father who loves him, a father who didn’t abandon him as a child. But, when Quill finds out what Ego did to his mother, it is the serious emotions of anger and sadness that bring him out of the deception.
The best obstacles to put in front of a Seven are emotional issues they will eventually have to confront. A past they’d like to forget; people they refuse to forgive; trauma they’ve shoved down. Sevens are capable of swimming into intellectual and emotional depths, but they often have to be pushed to get there. They are also particularly vulnerable to addiction because of their tendency to avoid negative emotions; they may be tempted to abuse substances in order to escape.
Sevens also dislike being tied down, so putting opportunities for commitment in front of them can be a great source of tension. Why stick with one experience when it may make you miss out on others?
Stress and Security
When stressed, a Seven might look like an unhealthy One. They become obsessive about others’ behaviour instead of facing their own problems, becoming self-righteous and unwilling to listen to wisdom. They blame others for their own behaviour.
This tendency to focus on others humourously comes out in Avengers: Infinity War when Quill meets Thor. Quill becomes jealous of Thor and attempts to copy his mannerisms.
However, the most frustrating moment when Quill is unwilling to listen to wisdom or act reasonably is during the battle with Thanos when the villain admits he killed Gamora. The best way to defeat Thanos would have been to remain calm while letting Tony Stark and Peter Parker pull off the Infinity Gauntlet, but Quill is, understandably, filled with rage and can’t stop himself from pistol-whipping Thanos instead. Mantis is thrown off, Thanos awakens from the trance, and whole plan falls apart.
Sevens who are secure may behave like healthy Fives. They become open-minded and creative while discovering new ways of doing things. We see glimpses of this in Quill as his plans are often brilliant, surprising, and innovative. When he deals with his emotions and thinks before he acts, he is a perceptive person and has an easier time maintaining relationships.
The Enneagram includes descriptions of what a type looks like at healthy, average, and unhealthy levels. There are nine levels of development (not to be confused with the nine different types of personalities)—one to three being the most healthy, four to six being average, and seven to nine being unhealthy. This progression is useful for writing fiction because it can help you plan character arcs.
Quill’s healthiness levels fluctuate throughout his movies. He is often at an unhealthy level, often giving in to his impulses. He is also adventurous and unfocused, chasing the next exciting thing and ignoring serious problems or emotional issues. Yet, we see glimmers of the accomplished man he could become; he is creative and thoughtful when he wants to be, and can curb his unending optimism into gratefulness for what he has.
Sevens can be brought from unhealthy to healthy levels as they gain life experience and the courage to experience difficult emotions. They are uniquely equipped to inspire others and experience true joy in life. They will likely need to learn through experience how to curb their wild tendencies and channel their eagerness into something good.
If you decide your character is an Enthusiast, I hope my thoughts on Enneagram Sevens and Star-Lord help you in your character development. Use this tool to consider not just what they do, but why they do it. For further research, try reading The Path Between Us by Suzanne Stabile.
|
<urn:uuid:525a3069-f3b6-4063-bd3a-bde51609a569>
|
CC-MAIN-2022-33
|
https://www.mythosink.com/marveling-at-enneagram-seven-to-write-better-characters/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00068.warc.gz
|
en
| 0.9625
| 1,411
| 2.375
| 2
|
Generally speaking, to be considered a legal resident of a state, you have to be domiciled in that state. Domicile and residence are not synonymous. Lotz v. Atamaniuk, 304 S.E.2d 20, 23 (W.Va. 1983). One can have several residences, but only one domicile. In order to establish domicile, you must not merely live in a place, but it must be the place you intend to permanently remain. “A person is not considered to have lost his residence when he leaves his home and goes into another state, territory or county, for temporary purposes merely, with the intention of returning.” Lotz, 304 S.E.2d at 23. It would be the place where you vote, pay taxes, and intend to permanently live. I can certainly imagine a university placing a temporal requirement as well, for example, being domiciled in West Virginia for a year before being considered “in-state” for tuition purposes.
In other words, merely getting a West Virginia driver’s license would not be enough. She would need to move to West Virginia and establish a household there, pay taxes there, vote there, etc., with no intention to return to Pennsylvania for anything other than temporary visits.
|
<urn:uuid:1ddabac1-7d54-4be3-ae5d-e1b22cad981c>
|
CC-MAIN-2017-04
|
http://www.letsgopens.com/scripts/phpBB3/viewtopic.php?f=5&t=59649&p=2208381
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00067-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.965907
| 269
| 1.960938
| 2
|
The Savor the South Cookbooks, 10 Volume Omnibus E-book: Includes Buttermilk, Pecans, Peaches, Tomatoes, Biscuits, Bourbon, Okra, PIckles and Preserves, ... Holidays (Savor the South Cookbooks) by The University of North Carolina Press
English | 1 Apr. 2014 | ASIN: B00P1A9MZI | 1300 Pages | AZW3 (Kindle)/HTML/EPUB/PDF (conv) | 15.01 MB
Each little cookbook in our Savor the South collection is a big celebration of a beloved food or tradition of the American South. From buttermilk to bourbon, pecans to peaches, one by one Savor the South cookbooks will stock a kitchen shelf with the flavors and culinary wisdom of this popular American regional cuisine.
Written by well-known cooks and food lovers, the books brim with personality, the informative and often surprising culinary and natural history of southern foodways, and a treasure of some fifty recipes each-from delicious southern classics to sparkling international renditions that open up worlds of taste for cooks everywhere. You'll want to collect them all.
This Omnibus E-Book brings together for the first time the first 10 books published in the series. You'll find:
Buttermilk by Debbie Moose
Pecans by Kathleen Purvis
Peaches by Kelly Alexander
Tomatoes by Miriam Rubin
Biscuits by Belinda Ellis
Bourbon by Kathleen Purvis
Okra by Virginia Willis
Pickles and Preserves by Andrea Weigl
Sweet Potatoes by April McGreger
Southern Holidays by Debbie Moose
Included are almost 500 recipes for these uniquely Southern ingredients.
|
<urn:uuid:851f4859-2736-4ad5-a24a-69c809ea37e6>
|
CC-MAIN-2016-44
|
http://www.tonitop.org/ebook/290782-the-savor-the-south-cookbooks-10-volume-omnibus-e-book.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00283-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.863435
| 360
| 1.53125
| 2
|
Mexico’s San Fernando Massacre: The Families Have the Right to Know Why
Information commissioners must determine whether migrant killings violated human rights
Judge says right to information is a “human right” that supersedes “disproportional” application of exemption pertaining to legal investigations
In a case that with important ramifications both for access to information and for human rights investigations in Mexico, a federal judge declared last week that the country’s information commissioners can and should determine whether an infamous 2010 massacre of 72 migrants in Tamaulipas state by alleged agents of the Zetas drug cartel might constitute a grave violation of human rights under established international legal norms. If so, plaintiffs argue, the Attorney General of Mexico (PGR) must release an unclassified version of its investigative file on the massacre in accordance with Mexico’s access law, which prohibits the withholding of records relating to grave violations of human rights or humanitarian law.
The commissioners from Mexico’s Federal Institute for Access to Information (IFAI) have until now resisted efforts by civil society groups, led by Article 19 in Mexico, to force the oversight body to make such a determination. In September 2013, IFAI ruled that it “did not have the faculty, capacity, expertise, knowledge, or the personnel to investigate and determine the existences of grave human rights violations or crimes against humanity” with respect to the San Fernando killings (see Article 19 press release). Absent an official determination that the massacre constituted a violation of human rights, IFAI claimed it could not invoke the clause in Article 14 of Mexico’s transparency law that mandates disclosure of otherwise protected documents when they relate to such violations. The commissioners thus rejected the appeal from Article 19, and refused to order PGR to release its investigative files on the San Fernando case (see previous posts on IFAI September 2013 ruling).
Article 19 appealed that decision, and the recent ruling found that IFAI is in fact capable of interpreting the law to determine if the massacre could constitute a grave violation of human rights based on the criteria set by Mexico’s Supreme Court and the Inter-American Human Rights Court (see Article 19 press release). The judge also found that IFAI’s September 2013 decision—that the human rights nature of the case must be determined by another authority before IFAI can rule on the opening of related documents–was itself a violation of citizens’ right to information.
In a remarkable passage from the court’s ruling, the judge found that the PGR’s decision to withhold information pertaining to its “preliminary investigation” of the massacre – a determination that was approved by IFAI – is “disproportional” and “violates the human right of access to information.”
The ruling orders IFAI to take another look at the San Fernando case, to determine if the killings might reasonably constitute grave human rights violations under guidelines clearly defined by the court, and if so, to order the Attorney General to release the public version of its investigative file.
A strategic right to truth campaign
If upheld, the court’s ruling would be an enormous victory for human rights defenders and transparency advocates in Mexico and could have a transformative impact on the efficacy of using the Mexican access law to investigate violations of international human rights norms.
Through Migration Declassified, the National Security Archive continues to support the campaign launched last year by Article 19 and the rest of our partner organizations to promote the right to the truth with respect to the San Fernando case. The case is part of a coordinated campaign, involving transparency activists and migrant rights defenders in the U.S. and Mexico, all working to push back the veil of secrecy surrounding violence against migrants.
Nearly four years later, the federal and state agencies responsible for investigating the case appear unwilling, or incapable, of fully investigating the massacre. Surviving family members of massacre victims were incensed when Mexico’s National Human Rights Commission (CNDH), in its formal report on the case, declined to say whether the acts constituted grave violations of human rights. Family members of the victims, along with the Fundación para la Justicia (FJEDD) have now taken legal action against the CNDH and are challenging the unassailability of the commission’s rulings (see previous post on legal challenge against CNDH). The complaint argues that CNDH, the agency charged with the protection and defense of human rights in Mexico, did not fully investigate the case, did not solicit the views of victims and family members or respect their right to justice, and ultimately failed to determine whether the state was involved in the killings either through omission or direct action.
In consultation with these organizations, Migration Declassified has been engaged in a strategic effort to gain access to official government files with important information on abuses against migrants, and information on the San Fernando massacre is central to this effort. Using access to information laws in both countries, the strategy seeks to push U.S. and Mexican government agencies to disclose classified information essential to the defense of migrant rights on both sides of the border. The scale and the circumstances surrounding the San Fernando massacre, which was followed, the next year, by the discovery of hundreds more bodies in mass graves, makes the case emblematic of the horrors and abuses faced by migrants traveling through Mexico.
The strategy has resulted in the declassification of U.S. diplomatic cables and intelligence reports in support of both of these legal challenges. First published in August 2013, these records reflect U.S. concern that, despite prior knowledge, Mexican authorities did little to prevent cartel-related violence against migrants and deliberately downplayed the state’s responsibility for the massacres in San Fernando (see previous post on U.S. files). One U.S. Embassy Mexico cable sent to Washington just a few months before the massacre observed a state of “near total impunity” for Mexican cartels in the face of compromised security forces. Four years later, a culture of impunity remains.
The declassified U.S. files also provide details on the arrest of San Fernando police officials and suspected Zeta members in the wake of the massacre, including U.S. Drug Enforcement Agency (DEA) files on the arrest of Zeta leaders in April 2011. The DEA documents indicate that U.S. agencies are willing to release information that could be considered sensitive to law enforcement and investigative proceedings, paving the way for Mexico’s Attorney General’s office to release its investigative files on the case.
On the Mexican side, the strategy has produced a set of internal records from Mexico’s National Migration Institute (INM) relating to migrant protection programs implemented in the wake of the San Fernando massacre, including the creation of Migrant Protection Groups in July 2011 for deployment to dangerous migration routes (see INM documents released in FOI case 0411100064213). In one of our more recent cases, IFAI ordered INM to locate records in response to our requests for documents relating to the May 2011 firing of INM officials under allegations of involvement in abuses against migrants (see IFAI Resolution 5361/13, request # 0411100075613).
IFAI now holds the key to unlocking the case files behind a criminal investigation that has failed to produce a single conviction for the most shocking mass murder that Mexico has seen in a generation. Soon after the April 2011 discovery of bodies of the victims in mass graves in San Fernando, the Inter-American Human Rights Commission (IACHR) urged the “State of Mexico to maximize its efforts to ensure that such crimes do not happen again, to determine the victims’ identities, and to investigate, prosecute, and punish the perpetrators and masterminds, whether this is a case involving organized crime or State agents in collusion with organized crime” (see IACHR press release, April 2011). After nearly four years Mexico has failed every one of these tests. It will now be up to IFAI to determine whether the families of the San Fernando victims have the right to know why.
|
<urn:uuid:86beb120-cecf-454f-88ed-a5587180b65b>
|
CC-MAIN-2017-04
|
https://nsarchive.wordpress.com/2014/03/28/mexicos-san-fernando-massacre-the-families-have-the-right-to-know-why/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00523-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.928202
| 1,658
| 2.328125
| 2
|
With Fourth of July tomorrow, I’m guessing there will be alot of backyard grilling going on. Answer true or false to the following grill safety questions. Good luck.
1. A grill should be cleaned and checked for general maintenance every two years.
2. The lid should always be open when lighting a gas grill.
3. Gasoline can be used to help start regular charcoal briquets.
4. When lighting a gas grill, you should always start the burner on high.
5. One way to put out flare ups on a charcoal grill is to spread out the coals.
6. It’s okay to add lighter fluid to hot coals if the fire gets low.
7. Always keep vents closed while cooking on a charcoal grill.
8. Trimming fat from meat can help prevent flare ups.
9. A gas grill propane tank can never be too full.
10. More home fires result from gas grills than charcoal grills.
A1. FALSE – Clean and perform general maintenance on the grill at least twice a year. Watch for rust, paint the LP cylinder to make it more rustproof, and check the regulator, hoses, burner parts, air shutter, and venturi/valve section carefully. Always turn off gas at the source (tank or supply line) prior to inspecting parts. Check owner’s manual for any additional maintenance requirements.
A2. TRUE – Always keep the lid open to prevent a flash-off from gas buildup.
A3. FALSE – Never use gasoline, kerosene, or other highly volatile fluids as a starter. They can explode. When using charcoal briquettes or wood chunks, form a pyramid and douse with lighter fluid. Wait until fluid has soaked in before lighting.
A4. TRUE – The proper sequence for starting a grill is: (1) Open the grill lid, (2) turn on the gas supply, (3) turn the ignition burner to high, (4) light the ignition, (5) turn on the second burner if needed. By following this sequence, excess gas will not accumulate inside the grill before it is ignited, preventing an explosion that could damage your grill and even cause personal injury.
A5. TRUE – To put out flare-ups, either raise the grid that the food is on or spread the coals out evenly. If you must douse the flames with a light spritz of water, first remove the food from the grill.
A6. FALSE – Never add lighter fluid to coals that are already hot or warm.
A7. FALSE – Keep vents open while cooking. Charcoal briquettes and wood chunks need oxygen to burn.
A8. TRUE – Trim any excess fat from meat and poultry to help prevent grill flare-ups. Grease fires are extremely hazardous.
A9. FALSE – Do not force too much propane into an LP cylinder. By law, a 20-pound cylinder should be filled only to 80% of capacity. This leaves some room for the liquid to expand. DO NOT ask the propane supplier to overfill the cylinder.
A10. TRUE – Although gas grills are used roughly 1.5 times as often as charcoal grills, they are involved in five times as many fires. Fire hazards are greater when a flammable or combustible gas or liquid is involved.
|
<urn:uuid:4f9a3798-bf21-428a-9824-2ac7abf3ab3b>
|
CC-MAIN-2017-04
|
http://kool.cbslocal.com/2012/07/03/your-grill-safety-quiz/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00029-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.883864
| 702
| 2.203125
| 2
|
The common causes for large and tight abdomen could be intestinal obstruction, constipation, hypokalemia,
hirschprung?s disease, toxic megacolon etc. Had he been having regular stools every day? Is he crying? Is your
child active and taking the feed?
IT is difficult to say what it is with physical examination and investigations. I would suggest that you visit
your GP and discuss the above mentioned possibilities.
|
<urn:uuid:3cda1806-6583-4414-8fd3-60d267ba1883>
|
CC-MAIN-2017-04
|
http://www.askdoctorforfree.com/newborn--tight-stomach-14116
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00530-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.959114
| 91
| 1.929688
| 2
|
Safety gear, for obvious reasons, should always be worn when you’re in the construction site. When performing one’s duties in the construction industry, proper and complete safety equipment is a must-have to ensure protection and safety.
Following are four (4) of the most important components of your safety gear:
1. Hard Hats
A hard hat protects a person from risks that my lead to head injuries. Hard hats work as a shield for the scalp, face, neck and shoulders. It protects from spills, drips or splashes of chemicals or liquid mixtures used in the construction site. Its rigid shell protects the head from hard blows and falling objects. It has a suspension object underneath it that serves as a shock absorber. Additionally, the right hard hat acts as an insulator against electrical shock. There are also some hard hats designed to be fitted with goggles, face shields and hoods.
According to a survey by the Bureau of Labour Statistics, most people suffering from head injuries in the construction site were those who did not wear head protection. It’s essential for employers to provide the necessary equipment to ensure the safety of the employees.
2. Safety Glasses
Safety glasses protect the eyes from splatters, dust, shrapnel and small debris. Depending on the nature of your work, safety glasses vary in style, usage and physical design. It’s important to make sure that your glasses are comfortable to wear and fit just right so it won’t obscure your work.
A survey shows there are 800,000 work-related eye injuries each year, and up to 20% of these injuries result to temporary or permanent damage. By wearing safety glasses, the risk of eye injury is reduced to up to 90%.
In tasks involving chemicals, harmful substances or risks of hand injuries, protective PPE should be worn. However, there are certain activities wherein the usage of gloves may cause injuries. Exceptions apply to tasks wherein there are high chances of gloves getting caught in machinery or in a tool. For circumstances like this, instructions should be discussed with a professional safety consultant before proceeding with the task. You may refer to OSHA Safety Training Maunal 29 CFR part 1910.138 for further details on glove usage.
4. Safety Boots
Many people in the construction sector argue whether safety boots should be worn. Some think boots can be uneasy to walk in. Steel toe boots are often considered to be uncomfortable since these don’t allow good air circulation. However, safety should always come before comfort. Most construction sites require wearing steel toe boots before granting entry or permission to work. Steel toe boots prevent injuries and protect your feet. They shield your foot from injury when you accidentally step on sharp materials and resist shock when heavy objects fall on your feet. Safety boots also protects your ankles when you walk on uneven surfaces.
These are just four of the most important items to wear when you’re in the construction site. Prevention is better than cure. Always uphold safety and protection as your social and legal obligation.
|
<urn:uuid:069a629d-a16f-414d-9c0c-ae6c1b12ada6>
|
CC-MAIN-2017-04
|
https://dangerousgoodsmanagement.wordpress.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00282-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.930622
| 622
| 2.484375
| 2
|
Thanks for writing to health care magic.
Monitor for signs of dehydration
particulary if there are loose watery stools
1. Decreased skin turgor
2. Increasing thirst.
3. Sunken eyes.
6. Decreasing passage of urine.
If there is blood or mucus in the stool antibiotics prescribed by your doctor may be required. If there is no blood or mucus in the stool and there is no fever
and pain while passing stools then antibiotics have no role.
ORS or any other fluid containing salt and sugar prevents dehydration. You can give coconut water etc
should be controlled by antiemetic prescribed by your doctor.
Probiotics and zinc prescribed by your doctor will help.
Continue to ask further queries as required.
Hope this helps.
|
<urn:uuid:31519ab1-e1fc-446e-93f4-9a39c809ea45>
|
CC-MAIN-2017-04
|
http://www.healthcaremagic.com/questions/Child-has-diarrhea-during-night-along-with-vomiting-No-medication-till-now-What-to-do/409416
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00391-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.863958
| 167
| 1.765625
| 2
|
- Arts Conservatory
- Support VA
The Village Academy Performing Arts Program educates students in a variety of disciplines in dance and theater, while incorporating world-class guest instructors, field trips to local college and professional productions, and in-depth academic and cultural studies.
The program also promotes important life skills such as creativity, self-confidence, discipline, and leadership. Students who select the Visual/Performing Arts Graduation Track have increased individual studio time and work toward a completed portfolio of creative samples as a part of their endorsement requirements.
In addition to the disciplines below, Visual and Performing Arts are cross-curricular programs at Village Academy. Students study the arts as an outlet for their creativity, while also learning about the relationship between these disciplines to world history and current events. This approach promotes a deeper appreciation of the arts, and an understanding of the impact the arts continue to have on the global community.
The Village Academy Dance Program is designed to facilitate student awareness of the body, mind, and spirit through the study of space, rhythm, and motion. At the lower school level, in addition to movement in performing arts classes, dance enrichment activities are offered during after school programming. Beginning in middle school, as students study the historical and cultural heritage of dance, opportunities are available to study advanced dance techniques such as ballet, tap, jazz, hip-hop, and modern. Upper school students are able to audition for the Performance Dance Ensemble, which offers an in-depth academic study of dance and performance experience to prepare for higher education. There are several opportunities for dance performance throughout the school year for the dance classes and the Performance Dance Ensemble.
In the Village Academy Theatre Program, students are given opportunities to perform in school-wide performances and also in regional, state, national, and international competitions. In the classroom, students study core subjects such as drama, comedy, musical theater, improvisation, stage management, technology, and lighting. Upper School students are able to participate in the audition-only Performance Acting Ensemble, which includes in-depth character studies and the preparation of a monologue portfolio and theater resume for collegiate-level studies.
The goal of the Village Academy Music Program is to instill an understanding of, and respect for, cultural perspectives as they relate to music. Beginning in pre-kindergarten, students are exposed to a variety of music styles and experiences as an integral part of the curriculum.
Vocal music opportunities begin with performing arts classes at the lower school level, followed by Middle School and Upper School Choirs, and the Upper School Vocal Ensemble (by audition only). There are also vocal opportunities at multiple levels in School musical theatre productions. Instrumental instruction starts in 3rd grade with recorders, and continues with opportunities to join the 4th/5th grade, Middle School, and Upper School bands. The 4th grade, 5th grade, and Middle School programs are designed to instruct students toward mastery of their instrument, enrich their lives through music, and improve academic achievement. The Upper School program consists of performance and composition through experiences in Concert Band, Classical, Jazz, and Contemporary Ensembles.
Advanced music students are given opportunities to perform at local and national levels and are provided extended studio time in preparation for the rigors of a university-level music education.
For more information on live dance, theatrical, and musical performances, visit the Performance Opportunities page.
Village Academy admits students of any race, color, creed, religion, sexual orientation, or national origin to all privileges, rights, programs, and activities. The School does not discriminate on the basis of race, color, creed, religion, sexual orientation, or national origin in administration of educational policies, scholarships, or student activity programs. This statement also applies to the School’s personnel and employment policies.
|
<urn:uuid:59ca3339-5219-4fd7-95dc-be873519c54e>
|
CC-MAIN-2017-04
|
http://www.villageacademy.org/?page_id=23
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00127-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.947685
| 780
| 1.945313
| 2
|
“The stock market is filled with individuals who know the price of everything, but the value of nothing.” — Philip Fisher
Philip Fisher: Background & bio
Philip Fisher was not a value investor, in fact he was a growth investor; however, he had such a profound impact on value investing that he must be mentioned on this page. Additionally, Fisher was a long term investor who invested based on fundamentals, and it can be argued that he mixed value and growth like Warren Buffett and Charlie Munger.
Although, Morningstar declared Philip Fisher as ‘one of the great investors of all time’ it probably does not do him justice. Fisher received a much more prestigious endorsement from the Oracle of Omaha. Warren Buffet claims he is ‘85% Graham and 15% Fisher’. I would argue that Buffett is more 85% Fisher and 15% Graham at this point.
Fisher also had a large influence over another great investor, his son Ken Fisher. Ken Fisher’s stock picks in Forbes, returned 9.9% annually over 14 years, versus 4.7% for the S&P 500 (data through 2010).
Considered by many who know are familiar with his legacy as the father of growth investment, Fisher was more than just a growth-stock investor. His diverse career includes management of venture capital and private equity and adviser to chief executives. He authored three books — noted below — which are regarded as investment must-reads, and also taught at Stanford Business School.
Despite dropping out of Stanford Business School, Fisher was one of the three instructors to teach the investing courses at Stanford Business School. Among his student was Jack McDonald, the current professor, who has for the 40 years has instructed his class to read Fisher’s books in order to pass the course.
Owing to his rather reserved personality, he would not have come under the spotlight if it were not for his first book ‘Common Stocks and Uncommon Profits’ which came out in 1958. The book was written by Fisher during the post-World War II bull market period that had brought great prosperity. It was the first ever investment book to make it in the New York Times’ best-seller list.
Fisher, who passed away in 2004, was probably the last one of the few investors who witnessed the 1929 market crash while staying solvent. He began his 75-year career in 1928 as a security analyst at the Anglo-London Bank in San Francisco. Later he temporarily switched to a stock exchange company, prior to establishing his very own firm Fisher & Company in 1931.
The firm, which was under the management of Fisher till 1999, realized substantial gains for the clients who Fisher carefully selected. He was very selective regarding his clients not because he felt only a few were worthy of being his clients, but rather because he had high concerns with being in check of his company’s assets to maintain control and quality.
Philip Fisher: Investment philosophy
One of the most illustrious examples of his proficiency in money management is evident with his purchase of Motorola in 1977, which Fisher and held until his death. When he purchased the stock, Motorola was just a radio manufacturing company and was not recognized for any strong R&D and management of the company. Fisher, being the long-term growth-driven investor, purchased the stock and saw it grow 20-fold in 20 decades.
His first book, a New York Times’ best seller, elaborates on 15 points (listed below) which perfectly captures the essence of his investment philosophy. This philosophy is commonly known as ‘scuttlebutt’.
In his book, Fisher recommends investors ask questions regarding the long-term sales growth potential, competitive edge, high management capability and vision, effective research and development undertaken by the company, strong profit margins, and internal company relations; the answers from these questions can help an investor find the right growth stock to keep for the long-run.
According to Fisher, investigation was the key to successful investing. He coined the term ‘scuttlebutt’ which is probably the most essential aspect of his investment philosophy. ‘Scuttlebutt’ was the process of going beyond the financial statements or company disclosures and investigating the internal and external stakeholders of the company to get in-depth information and wider perspective on the business to realize growth potential.
Fisher always questioned the customers, former employees, suppliers, competitors and the management team of the company he was interested in to get a clearer picture of the potential stock holding before investing. Countless value investors utilize this approach today.
This intense research methodology allowed Fisher to maintain a concentrated portfolio of 30 growth-stocks. He believed over-diversifying a portfolio was over-rated.
Warren Buffett adopted this very approach of holding a concentrated selective portfolio from Fisher along with the strategy of not following the crowd. Fisher believed in capitalism and refrained from letting the doomsayers impact his investment decisions.
He was of the view that if the company satisfied the 15 points which determined the long-term growth potential of the company, holding the stock of that particular company on long-term basis would eventually lead to gains, regardless of any short-term losses. He has famously stated that the time to sell a stock is almost never if the right kind of company is purchased after extensive research and analysis.
When comparing Graham and Fisher, it could be observed that Fisher was willing to pay more for a stock he felt it had high growth-potential regardless of the fact that it might not be an undervalued company according to value-investing standards. However, similar to most renowned value investors who survived the dot-com bubble burst, Fisher warned against the purchase of promotional companies and falling for the usually manipulated tone of the financial statements.
When talking about the influence of Graham and Fisher on Warren Buffet, one can conclude by saying that Buffett acquired the quantitative techniques of finding cheap stocks from Graham and qualitative ways of finding good businesses from Fisher. To Fisher, finding stocks with statistically proven ‘bargain prices’ was not enough if qualitative aspects were not kept in perspective. These bargain prices would prove to be expensive and not much of a bargain in the long-run.
He also firmly believed that carefully selected growth stocks eventually outperform bargain stocks by substantial amounts. The reason being that growth stocks have steadily growing intrinsic value, which tend to appreciate 100% each decade while it is rare or rather unusual for bargain stocks to be as much as 50% undervalued.
Philip Fisher’s 15 points for successful investing
- Does the company have products or services with sufficient market potential to make possible a sizable increase in sales for at least several years? A company must have products which cater to a larger target audience and should be a part of the expanding markets.
- Does the management have a determination to continue to develop products or processes that will still further increase total sales potentials when the growth potentials of currently attractive product lines have largely been exploited? The company management should possess the potential of maintaining sales growth after the maturity period of the product has reached through means of innovation.
- How effective are the company’s research-and-development efforts in relation to its size? To survive in the competitive industry, the company must have effective and efficient research and development which is reflected in its performance.
- Does the company have an above-average sales organization? Some products of certain companies possess characteristics which make them stand out and therefore, have the potential of being bought by the public without the need for merchandizing.
- Does the company have a worthwhile profit margin? In addition to growth, the company should also have a good profit margin to increase the value of stockholder’s investment.
- What is the company doing to maintain or improve profit margins? With the economic environment being unstable, there is high pressure on companies to maintain or improve their profit margin. What is important is the potential of the companies to lower their costs to achieve growing profit margin in the long-run.
- Does the company have outstanding labor and personnel relations? Labor and company productivity is impacted by the labor or personnel relations within the company. Good relations lead to higher productivity and resultantly, better company output and performance.
- Does the company have outstanding executive relations? Internal company relations affect the company performance thus, it is essential for any company to foster positive internal relations to avoid any illegal or undesirable management actions.
- Does the company have depth to its management? The company should have authoritative and talented pool of management to properly delegate and guide lower-level management and control the business as a whole.
- How good are the company’s cost analysis and accounting controls? Cost control as a result of effective and efficient cost analysis by the company is important to take notice before investing.
- Are there other aspects of the business, somewhat peculiar to the industry involved, which will give the investor important clues as to how outstanding the company may be in relation to its competition? The company should possess certain competitive advantage which would help it stand out among its competitors in the industry.
- Does the company have a short-range or long-range outlook in regard to profits?Companies should have a long-range outlook on profits and adopt strategies which maintain or increase profits in the long-run.
- In the foreseeable future will the growth of the company require sufficient equity financing so that the larger number of shares then outstanding will largely cancel the existing stockholders’ benefit from this anticipated growth? The company should have enough liquidity and possess substantial cash holding along with high borrowing capacity to fund growth.
- Does management talk freely to investors about its affairs when things are going well but “clam up” when troubles and disappointments occur? Candid discussion of the company management both in good times and bad times is necessary as the investors have the right to know what exactly is going on.
- Does the company have a management of unquestionable integrity? The company management should depict trustworthiness, reliability and credibility so that the investors can trust and have confidence in the management team.
Philip Fisher’s five donts for investors
- Don’t buy into promotional companies. There are many companies that are much better at promoting to investors and telling stories then what they do. Watch out for them. Watch out for companies that over promise and under deliver.
- Don’t ignore a good stock just because it is traded over-the-counter. Warren Buffett once said if he had a million dollars or less he could earn 50% a year and the reason is buying some of these more undiscovered over the counter stocks.
- Don’t buy a stock just because you like the tone of its annual report. This is similar to promotional companies and don’t be suckered in by a great presentation which is all an annual report is. Read things criticially and ask questions in your head and see if they answer them or hide the answer to them. If you don’t understand something move on!
- Don’t assume that the high price at which a stock may be selling in relation to its earnings is necessarily an indication that further growth in those earnings has largely been already discounted in the price? Google and Apple were “expensive” P/E stocks greater then 25 in 2004 and they went up 1200% and 600% respectively since.
- Don’t quibble over eighths and quarters. If an eighth or a quarter matters so much then your analysis on a stock was wrong. If you buy a stock at $11.50 or $12, if you think it will be worth many times that in the future does the 50 cents in the long run matter?
Philip Fisher: Books
Common Stocks and Uncommon Profits (1958)
One of the most important and famous investing books even 43 years later. The book reveals 15 secrets to high growth-potential investing and compiles the general investment philosophy of Philip Fisher. According to him, qualified and visionary company management, strong profit margin, competitive edge, sales growth and company investment in research and development were some factors worth analyzing with respect to long-term prospects if high-potential growth stocks were to be found.
Paths to Wealth Through Common Stocks (1960)
Fisher’s second book in which he elaborates on various innovative concepts of acquiring and increasing wealth through common stock holdings. This timeless classic is aims at providing the individuals who self-manage their investments as all as those who seek expert advice on investment. The book also extensively discusses factors mentioned in his previous book such as the quality of management and technology as a competitive edge.
Conservative investors sleep well (1975)
Written by Fisher during the downfall of the 1973 – 1974 bear market. The book provides the reader with facts to persuade them into buying stocks at that time instead of going with the crowd. He highlighted the components which determine good companies worth investing in during the period of bear market crash which would eventually reap high-gains through growth in the long-run.
Philip Fisher: Quotes
“If the job has been correctly done when a common stock is purchased, the time to sell it is almost never.”
“Although managers rely heavily on return of assets in considering new investments, investors must recognize that historic assets stated at historical costs distort comparisons of firms’ performance. Favorable profit to sales ratios, notwithstanding differences in turnover ratios, may be a better indicator of the safety of an investment, particularly in an inflationary environment.”
“A company might be an extremely efficient manufacturer or an inventor might have a product with breathtaking possibilities, but this was never enough for a healthy business. Unless that business contained people capable of convincing others as to the worth of their product, such a business would never really control its own destiny.”
Philip Fisher: Articles
- What we can learn from Phil Fisher
- Philip A. Fisher by Ken Fisher
- Philip Fisher: Growth Stock Investigator
Philip Fisher: News
- Philip Fisher’s Investment Series: When to Sell a Stock
- Philip Fisher’s Investment Series: The Ten Don’ts for Investors
- Philip Fisher’s Investment Series
- Rewarding Stupidity
- How Can Value Investors Apply Philip Fisher’s Investment
- Philip Fisher: Growth Stock Investigator – Forbes.com
- Philip Fisher: Growth Stock Investigator
- The Oracle of Omaha – washingtonpost.com
- Buying One-Decision Stocks
- Fool .No-nonsense Advice .Phil Fisher, Investor .
- Phil Fisher
- Philip A. Fisher, 96, Is Dead; Wrote Key Investment Book
- Farewell, Philip Fisher
- World of Investing : The rewards of a long view
- Great Investor: Phil Fisher
- Fool.com: Evaluating Small-Cap Management [Foolish 8] February 20, …
- Fisher Investments starts up in London (Limited View)
- Looking for the Best Returns? Go With Growth Stocks Over the Long Term
- Fool.com: If You Could Buy Only One Stock…[Fool on the Hill] May…
- Special Feature, April 29, 1999: Berkshire and Buffett
- Honest Hard Working, Strict In Their Beliefs’
- Philip Fisher
- AVOID URGE TO SELL – INVEST FOR LONG TERM. (Limited View)
|
<urn:uuid:a670b39d-77e2-4c87-9577-9f4e965f7e24>
|
CC-MAIN-2016-44
|
http://www.valuewalk.com/philip-fisher-resource-page/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00560-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.965863
| 3,176
| 1.914063
| 2
|
If I was thinking of buying stocks and shares in a company - or more importantly buying products from them - I would try to find out how good they are at dealing with customer complaints. Many companies groan at the thought of complaining customers. More enlightened companies welcome, even encourage, complaints. Why? Because a complaining customer is providing a company with an invaluable service. At a stroke they are giving valuable feedback, quality control information and are more often than not, giving you a chance to put a problem right.
Of course, the best customer is one that is completely satisfied. The next best customer is dissatisfied and complains. The worst customer is one that is dissatisfied and doesn't complain. This last example represents a lost customer. They will not give any feedback and not allow you to put the problem right. They will simply walk away and look for a better supplier of their product.
So, how do you deal with customer complaints? It does not hurt to thank them for taking the trouble to contact you. Before you decide to investigate further, just think on this: the vast majority of customer complaints are genuine. Very few are made in order to get something for nothing. So, treat the customer with due respect from the start. We all know that many genuine complaints turn out to be errors at the customer end, especially with mechanical or electrical devices. The product may be fine but the customer doesn't know how to operate it. Before you file this away under customer error classification, ask if the customer if they found the instructions hard to follow or found the product hard to operate. Not only may you find the feedback valuable, you will also be giving some respect to the customer. If the complaint is not a customer error then, as I said, it is probably genuine. Why not assume that the customer is right and swap it or offer a refund or, at least, offer to repair it. When you or your staff get to see the product you will then know what the problem is (or isn't) and be able to adapt the product - or your approach to customers - as a result.
Thoroughly investigate their complaint. Try to do this quickly. If the investigation is dragging, keep them informed. DON'T expect them to chase you! If your investigation has upheld the customer's grievance then apologise as soon as possible. Not only that, tell the customer what you are doing to prevent the problem from being repeated. Assure them that this will not happen again and assure them that you care about the service and the products you provide.
Put it Right - Permanently
For many companies, even if they do everything right up to this point, the issue is closed as soon as the refund or replacement is processed. The promised action to prevent recurrence is not followed through. As sure as eggs is eggs, one day, the same problem will be repeated. Next time, however, you may not be so lucky: you may end up with a non-complaining customer - the worse type - and lost future sales.
The thing about the customer who complains, is that you have a chance to build a relationship with them that is beyond the normal buy and sell transaction. You can demonstrate the exceptional nature of the problem and show the customer how seriously you take such issues. The complaining customer may well buy more goods from you in future as they know you will “look after them" should a problem arise. Put simply, they will trust you.
Arkay Hygiene sells Insectocutor Fly Killers. Now this happened just ONCE: a few years ago a customer had a machine with a faulty lampholder (it holds the uv bulb in place, dummy!). No investigation was necessary: the customer said she had a faulty lampholder and that was that. No arguments. We offered to swap the product for a new one. The problem, as the customer explained, was that the fly killer unit had already been unpacked and fixed into position. We decided to despatch an engineer with a new lamp holder and he quickly got the unit back in action. This customer has since purchased many other goods from us over many years. The bond of trust between us and this customer was born from this complaint.
Vernon Stent is the marketing consultant to Arkay Hygiene which sells a range of spare parts for fly killers such as the lampholder for circline lamps .
|
<urn:uuid:93791b49-39d9-420d-a65e-db4fe205a49e>
|
CC-MAIN-2017-04
|
http://www.articleslash.net/Business/Customer-Service/2985__Thank-Goodness-for-Customer-Complaints.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00025-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.973615
| 892
| 1.554688
| 2
|
In celebration of International Women’s Day on March 8, 2021 and Womens History Month during the month of March, the Forum for Cultural Engagement, the United States Embassy and the American Center in Moscow will launch Frame Work, a six-part screening series featuring short films by Russian and American women filmmakers with a post-screening discussion facilitated by a moderator with the two filmmakers. Translation will be provided.
The screenings present unique pairings of films by Russian and American women filmmakers showcasing diverse narrative, experimental, documentary, and animation films. The moderators facilitating the discussion with the filmmakers include film scholars, film writers and critics and literary writers.
Frame Work is an initiative of the Forum for Cultural Engagement, curated by Cynthia Madansky.
Monday, March 29, 2021 at 6:00 PM Moscow time
(18+) Drake, Rope, and Acorn by Alina Titorenko, 2019, 7 min.: The docu-director create film is about a young woman who got lost in the forest, stayed, and lived there. He interviews her new neighbors such as Spirit of the forest, Mermen and Mermaids, and Angry Brownie. Techniques: painting, hand print.
(18+) How to Fix the World by Jacqueline Goss, 2004, 28 min.: Adapted from psychologist A.R. Luria’s research in Uzbekistan in the 1930s, How to Fix the World brings to life Lurias conversations with Central Asian farmers learning how to read and write under the unfamiliar principles of Socialism. Colorful digital animations play against a backdrop of images shot in Andijian (where Soviet-era President Karimovs suppression of Islam lead to violence in May 2005.) At once conflicting, humorous, and revelatory, these conversations between Luria and his “subjects” illustrate an attempt by one culture to transform another in the name of education and modernization. The subtleties of this transformation, as well as the roots of current cultural conflicts, are found in words exchanged and documented seventy-five years ago.
Moderator for post-screening discussion: Masha Shpolberg, Assistant Professor of Film Studies at the University of North Carolina-Wilmington.
The event is hosted in English on the AMC Facebook page on March 29 at 6:00pm Moscow time: https://www.facebook.com/acmoscow/ You can register below and leave your valid email address to receive a reminder 30 minutes before the online event starts. To join other AMC Online programs, please check the American Center’s website and TimePad calendars.
|
<urn:uuid:8e6dce8b-9b87-41c5-ac14-166dc5b28a6b>
|
CC-MAIN-2022-33
|
https://amc.timepad.ru/event/1572733/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00073.warc.gz
|
en
| 0.926944
| 529
| 1.664063
| 2
|
The beauty of America is in its diversity and now an Elementary School is celebrating that with a heartwarming video.
Clarksville Elementary School music teacher Emmy Bodner recorded her students in different groupings throughout the year singing “We Are The World” to create the music video.
The video is so uplifting and heartwarming and we love how it celebrates the diversity that is America!
The kids are so beautiful and are alike in their own way. The talent in some of them is so evident.
This video has changed our world in a small way today and we hope it has changed yours too.
|
<urn:uuid:9b3ae3a5-3c6e-43c7-bf65-7e9ce6ccfc66>
|
CC-MAIN-2022-33
|
https://jiznodna.ru/elementary-students-present-adorable-rendition-of-we-are-the-world/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00274.warc.gz
|
en
| 0.961357
| 125
| 1.8125
| 2
|
Since the New Year began, the political conversation has been all-talk-all-the-time about prescription drug prices. The idea that the government should negotiate prescription drug prices is a key piece of the reform agenda for the new Congress. Legislation has already been introduced.
At first glance, this seems like a no-brainer. What could possibly be wrong with government negotiating prices? After all, aren’t negotiations part of free markets and healthy competition?
Unfortunately, no — not when one party is the federal government.
Unlike a private company, the government doesn’t negotiate prices; it dictates them. When was the last time your physician ever negotiated his or her payment rates with Medicare or Medicaid? It doesn’t happen. Government sets a price and that’s it.
But, many will argue, the government negotiates drug prices at the Department of Veterans Affairs — and look what a great deal the VA gets. But if we look carefully, the VA doesn’t get such a good deal after all — especially when it comes to giving veterans access to the most cutting-edge medicine.
Columbia University Prof. Frank Lichtenberg, in a paper published by the Manhattan Institute, found that only 38% of the drugs approved by the Food and Drug Administration in the 1990s and 19% of the drugs approved since 2000 are on the VA national formulary.
The only way that negotiation works is for buyers to be able to walk away from the table if they don’t get their price. That’s what the VA does, and the result is significantly reduced access to new drugs.
The other problem with letting the federal government negotiate drug prices is that it will open the door to price controls throughout the health sector. This will be particularly harmful to the drug industry, which thus far has largely escaped the heavy hand of government in regulating prices.
Price controls inevitably lead to scarcity of supply, reductions in quality, dampening of innovation — and usually all of the above. A good case could be made that the prevalence of price regulation over physicians’ fees and hospital charges, with the accompanying mountains of paperwork to justify their charges, is eroding the quality of American medicine. And it certainly is restricting access to physicians for Medicaid beneficiaries and for many seniors on Medicare.
After experiencing choice in the new Medicare Part D program, seniors will be loath to tolerate such restrictions. The Kaiser Family Foundation conducted a survey that showed 85% of Americans support allowing the government to negotiate prescription drug prices for the Medicare program. But a Dutko Research survey shows that support drops to 30% when people learn that it would mean they could choose only from a list of government-approved drugs.
Moreover, experts at both the Congressional Budget Office and the Office of the Actuary at HHS have said that government involvement in price negotiation will not lead to lower costs for taxpayers. But it would very likely lead to significant restrictions in access to drugs for seniors.
The government would have a hard time beating the incredible results that the private plans negotiating drug prices for Medicare already have produced.
Competition among the plans and choices for seniors have produced significant savings for seniors — with average monthly premium prices for the basic Medicare drug benefit down more than 40% from the $37 a month that was originally projected. This year, the average premium is $22 a month, with premiums actually falling from last year?s $24 average.
On top of all that, Part D is saving money for taxpayers, too. Its cost in the first year alone was an estimated $13 billion below projections.
When was the last time a government program ever came in under budget?
Part D is a unique benefit. It’s a government program that has been successfully integrated with the private sector. And it’s working better than anyone ever anticipated. The program should be allowed to continue flourishing without government interference in price negotiations.
Grace-Marie Turner is president of the Galen Institute, a non-profit research organization focusing on free-market solutions to health reform. She can be reached at P.O. Box 19080, Alexandria, VA, or at email@example.com.
|
<urn:uuid:70275a7d-28c0-4f7c-8a43-fc0b257713b2>
|
CC-MAIN-2016-44
|
http://galen.org/2007/whats-wrong-with-negotiations/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00281-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.955297
| 858
| 1.96875
| 2
|
“will uphold white supremacy, white patriarchal paternalism, and white fragility”
Listen to this article
The argument here by BLM is that the group supporting the First Amendment would lead to violence and racism. This same tired argument has been used to shut down free speech at many schools.
Campus Reform reports:
University ‘First Amendment Support Team’ suspended after complaints from BLM chapter
The State University of New York New Paltz suspended a group on campus that aimed to keep protests peaceful and free of violence after pressure from the university’s Black Lives Matter chapter.
According to The New Paltz Oracle, the First Amendment Support Team (FAST) was designed to ensure that protests are not violating any laws, was protested by the school’s local BLM chapter.
The chapter claimed in a petition that FAST “will serve to perpetuate the violence of anti-Black racism on the campus of SUNY New Paltz.”
Their concern sprung from a portion of the FAST’s website section on “Problematically Disruptive Protests.” Protests would be classified as such if there was a “threat of physical harm to persons,” or “Protestors entering any private office without permission,” or even the, “Significant disruption of the normal operations of the University.” If any of these conditions existed, then the school had a list of actions that could be taken.
These actions range from informing building occupants about the protest, advising people to “close/lock office doors,” and to “contact The Vice President for Student Affairs Office.” The BLM group complained that one of the possible options in the list, in case of imminent danger was calling the police.
“We write to express our firm belief that this is not—and cannot be—an anti-racist initiative. We have deep concerns that the formation, selection process, purpose, and implementation of FAST will uphold white supremacy, white patriarchal paternalism, and white fragility on the SUNY New Paltz campus,” the petition read.
Donations tax deductible
to the full extent allowed by law.
|
<urn:uuid:c7704dec-713d-4dd2-90eb-97204e08e441>
|
CC-MAIN-2022-33
|
https://staging.legalinsurrection.com/2020/11/first-amendment-support-team-at-suny-new-paltz-suspended-after-complaints-from-blm/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00472.warc.gz
|
en
| 0.940989
| 463
| 1.90625
| 2
|
Prediction of mortality in overt and subclinical hyperthyroidism
Dr Kristien Boelaert, University of Birmingham.
Our study proposal aimed to define those patients with overt hyperthyroidism at particular risk of increased mortality, especially form cardiovascular disease. Using the largest thyroid research clinical database in the UK we set out to investigate mortality in a cohort of subjects with overt hyperthyroidism and in a euthyroid cohort with benign goitre or thyroid nodules. Specifically we investigated the influence of severity, duration and treatment (medical, radioiodine) of hyperthyroidism and of subsequent hypothyroidism on mortality. Furthermore we aimed to clarify the influence of potential vascular risk factors such as previous cardiovascular history, cardiovascular medications, structural heart disease, hypertension, family and smoking history, hyperlipidaemia and presence of AF/dysrhythmias on mortality in order to identify high risk groups.
Identification of cohort
We identified the following cohorts:
- Hyperthyroid cohort: 2397 thyrotoxic patients (1919 females and 478 males, mean age 47.14 years).
- Control cohort: 1552 patients (1351 females and 201 males, mean age 60 years)
All these patients attended our joint thyroid clinic between 02.06.1975 and 19.05.2003. We chose 01.06.2003 as the cut off date to allow adequate follow-up time in clinic.
The demographic details of patients in both of these cohorts were sent to the Office of National Statistics (ONS) for determination of their vital status.
Results from ONS - update since Interim Report
All the records for both the hyperthyroid and the control cohort have now been returned from ONS including those requiring operator searches. All the data regarding severity, duration and treatment of hyperthyroidism, subsequent hypothyroidism, and cardiovascular risk factors have been collated for both cohorts. To date 199 patients in the thyrotoxic cohort have died and their death certificates and ICD-10 codes have been returned to us. In the control group 178 patients have died and similarly the causes of death and the ICD-10 codes have been returned to us.
Data analysis to date
We have decided to first analyse the data from the thyrotoxic cohort.
- Effects of treatment of thyrotoxicosis on mortalilty
Preliminary analysis of the data so far indicates that the mortality rate is higher in patients treated with antithyroid drugs only when compared with those receiving radioactive iodine (p< 0.001). A small minority of patients underwent surgery for hyperthyroidism (1.84%) and only one of these patients has died.
- Effects of development of hypothyroidism post 131I treatment on mortality
Of the 1343 patients treated with radioactive iodine, 649 (48.3%) patients have become hypothyroid whereas 694 (51.7%) patients remain hyperthyroid or euthyroid. Death rates are significantly higher (p=0.01) in those who have not developed hypothyroidism compared with patients who are hypothyroid and on thyroxine replacement following treatment with 131I.
Further data analysis to be undertaken
Data sheets compiling all the data obtained for this study are currently being analysed by Dr Maissoneuve with whom we have previously collaborated to generate high impact factor papers. In particular we are calculating the standardised mortality ratio in patients with hyperthyroidism to compare this with control populations of the West Midlands and England and Wales. In addition we are evaluating the influence of severity, duration and treatment of thyrotoxicosis, subsequent hypothyroidism and cardiovascular factors on mortality. It is anticipated that the results of these analysis will result in several high impact factor papers.
Since the statistical analysis is still ongoing, we would like to request that the duration of the project is extended for a further 6 months. This will allow us to spend the funds remaining for this project (£2,000 + £2,500 to be obtained on submission of this report) which will be used for outstanding ONS fees and statistician fees.
|
<urn:uuid:1104b8d0-7b3c-4813-b85b-afff64d7685f>
|
CC-MAIN-2017-04
|
http://www.btf-thyroid.org/index.php?option=com_content&view=article&id=171&Itemid=239
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00379-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.924543
| 840
| 1.890625
| 2
|
Young man helping others after overcoming adversity
Stefan Thegeby is quite a remarkable young man...
Stefan Thegeby is quite a remarkable young man. Diagnosed just a year ago with Ewing’s sarcoma, a rare disease in which cancer cells are found in the bone and/or in soft tissue, he was treated at St. Luc’s hospital in Brussels. Volunteers would come by with games and DVD’s but these items were only available in French and Dutch. The library also only contained French and Dutch-language books.
As there were many other non-Belgian children in the unit, Stefan decided to take on the task of collecting books, games and DVDs in other languages once he was done with his treatments. The project fit perfectly with his wish to become an Eagle Scout and so he started working on posters and asked people at his school, St. John’s International School in Waterloo, to help with the promotion of his project.
St. John’s is the sponsor of Boy Scout Troop 149. Currently the group counts 15 boys who meet Tuesday nights for 90 minutes. The Troop is bilingual with English and French-speaking members. There are many activities, especially in the outdoors: camping, canoeing, biking, hiking and indoor climbing. They learn skills associated with these activities: setting a course through terrain, first aid, making campfires safely, ourdoor cooking, building a bivouac, learning to rely on each other and basic survival skills. In April, over 2,000 scouts and families attended a campout on Omaha Beach in Normandy, an event which happens every three years.
Most events take place during the school year, but they do attend a one-week residence camp during the summer in England, Germany or Switzerland. Summer camp offers the opportunity to learn many things. Boys earn merit badges in all kinds of activities: woodcarving, basketry, archery, rifle shooting, sailing, canoeing, horsemanship, swimming, climbing, backpacking. There are over 120 merit badges to choose from.
As for the project, Stefan says anything that is donated, will be used but secretly wishes he will collect enough to also provide books, toys and DVDs to other hospitals in Belgium. He says items in any language is welcome and appreciated.
Stefan will come back to school in a few days after a 1-year absence and is excited about the prospect of being with his friends again. His teachers and friends are grateful to get him back. He has, however, not forgotten about the friends he made while at the hospital and hopes this project will help them make their hospital stay a little more comfortable.
To donate books (in very good condition as the children in the unit are very susceptible to infections and pages cannot be disinfected), games and DVDs for children aged 1-18, please contact firstname.lastname@example.org or come to St. John’s and place your donation in one of the containers that have been placed around campus for this project.
|
<urn:uuid:53ffa288-f5f4-43bd-b7f1-48dcaf5e3ab4>
|
CC-MAIN-2017-04
|
http://www.expatica.com/be/news/Young-man-helping-others-after-overcoming-adversity_152404.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00079-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.978482
| 625
| 2.09375
| 2
|
The African National Congress as the ruling party, have looked into the major cause of racism and racist tendencies in the country and have come up with the conclusion that it would be best to make racism a punishable offence under the law.
The ANC said that the existing laws in the legislation are not enough to stop people from making racist remarks that may end up causing more problems and as such, they proposed stricter sanctions and punishment for racism. This idea was brought up majorly due to the recent controversial comments made on the media about black people and the comments black people made in retaliation.
KwaZulu-Natal real estate agent Penny Sparrow raised the ire of social media commentators when she referred to black people as monkeys in the post below:
ANC Spokesperson Moloto Mothapo said the party is considering imprisonment as the major punishment for the racist transgressor.
“It will promote reconciliation because as a nation we’ll be able to shun and isolate racists,” said Mothapo
Quiet in support of the ANC’s decision to criminalize racism is the The Economic Freedom Fighters who also called for a debate on criminalizing racism. They stated clearly that Crimen Injuria, which is the act of seriously impairing the dignity of another is a common law offence in South Africa which needs to be nipped while the Government still has some power to do so.
In light of the development above, Penny Sparrow could be charged with this crime since the Democratic Alliance (DA) opened a case against her over her monkey comments.
Meanwhile, the South African Human Rights Commission (SAHRC) has launched an investigation into racist comments made on social media and is calling for formal complaints. The commission says it is deeply concerned by recent posts made.
SAHRC spokesperson Dieketseng Diale said it’s concerning that comments of this kind still appear 22 years into democracy.
“In the Bill of Rights, the right of human dignity needs to be respected. People need to know that it is a violation to say something like this about another person.”
|
<urn:uuid:c83a7d77-eb1b-48f8-9788-e30d14344b40>
|
CC-MAIN-2017-04
|
http://buzzsouthafrica.com/anc-explores-strict-sanctions-as-a-way-of-preventing-racist-tendencies/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00012-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.967353
| 428
| 2.09375
| 2
|
Large-scale forest loss and degradation deprive Tanzanian communities of a potential sustainable income source. This project aims to transform forest governance in Tanzania through a rigorous assessment of limiting factors for community-based forest management (CBFM) and providing practical solutions for up-scaling CBFM. Key activities include surveys to assess current benefits/short-comings, provision of assistance for pilot communities to increase CBFM (gender) equity and benefits, strengthening stakeholder capacity/awareness, and developing a best practice model that can be rolled out to non-CBFM communities. Evidence-based assessment of limiting factors for CBFM. Piloted and trialled approaches for increasing equity, gender balance and sustainable benefits to provide a model for rolling out CBFM to non-CBFM communities.
|
<urn:uuid:be2c0610-dda5-43ef-9822-56d2d2ee30ce>
|
CC-MAIN-2022-33
|
https://www.darwininitiative.org.uk/project/DAR25019/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00670.warc.gz
|
en
| 0.901009
| 154
| 1.90625
| 2
|
Researchers in Oxford have started the first clinical trial of Britain's two swine flu vaccines. The BBC's medical correspondent, Fergus Walsh, summarises all the latest pandemic news on the BBC website today. To read his summary click here.
- Information about swine flu and ME/CFS can be found here. We shall be updating the section on swine flu vaccination once we have more information about possible side-effects and the vaccine becomes available for general use.
- The MEA has an information leaflet on ordinary flu vaccine. An updated version will be available from today. MEA literature can be obtained using the downloadable order form
|
<urn:uuid:29abcdd3-44cb-41f4-8162-547b268363f8>
|
CC-MAIN-2022-33
|
https://meassociation.org.uk/2009/09/first-clinical-trials-of-britains-two-swine-flu-vaccines-now-under-way/?option=com_content&task=view&id=188&Itemid=&phpMyAdmin=-6B5zgZ28B5Hq-DqTFgEALpOaH5
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00667.warc.gz
|
en
| 0.900098
| 131
| 1.679688
| 2
|
A hay caravan made its way Saturday from Monkton, Md., in Baltimore County to Washington County carrying 450 bales to donate to the Humane Society of Washington County to help care for horses the Humane Society seized last year.
Several people from around Maryland donated hay to help care for about 70 horses the Humane Society took from a Sharpsburg farm in late 2006.
The society has assumed responsibility for the care of all of the horses it found at Windrinker Farm, said Katherine Cooker, manager of development and community relations. Some of the horses were thin, injured and infested by parasites, The Herald-Mail reported in December.
About 30 people participated in the caravan, and 10 Humane Society volunteers helped unload the hay, Cooker said.
|
<urn:uuid:fb62764e-6704-4f2c-8092-a7c45dd632a9>
|
CC-MAIN-2017-04
|
http://articles.herald-mail.com/2007-02-18/news/25062325_1_humane-society-hay-horses
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00276-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.951802
| 153
| 1.601563
| 2
|
WASHINGTON (AP) - More Americans requested unemployment benefits last week, but the level remains near historic lows in a positive sign for the job market.
THE NUMBERS: Applications for jobless aid jumped 20,000 to a seasonally adjusted 287,000, the Labor Department said Thursday. The less volatile 4-week average climbed 4,500 to 277,000.
Over the past 12 months, the number of people receiving benefits has fallen 7.1 percent to 2.2 million.
THE TAKEAWAY: The influx of part-time, seasonal jobs during the winter holidays can make the jobless claims figures volatile, but the employment gains of the past year look likely to continue. Applications for benefits are a proxy for layoffs, so the low level indicates that employers are keeping their workers and potentially planning to hire.
KEY DRIVERS: Businesses still view the U.S. economy as growing, despite the manufacturing sector struggling amid a broader global slowdown. Employers have hired about 210,000 workers a month this year. And unemployment last month held at a seven-year low 5 percent.
Despite last week's increase, jobless claims have stayed below the key level of 300,000 for nearly 10 months. Any figure lower than that threshold often corresponds with monthly job gains in excess of 200,000.
BIG PICTURE: The economy enters 2016 with the job market looking solid. The slow recovery from the Great Recession that ended more than six years ago has found some traction. Americans have increased their purchases of autos, homes, restaurant meals and goods online. Still, low oil prices and weak international demand stemming from Europe, China and several emerging economies such as Brazil are sources of concern.
|
<urn:uuid:72d2be23-c3d4-4a90-8b7a-fd21cf109abe>
|
CC-MAIN-2022-33
|
https://www.fox35orlando.com/news/u-s-applications-for-unemployment-benefits-jumped-last-week
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00665.warc.gz
|
en
| 0.947614
| 348
| 1.601563
| 2
|
Using scanning capacitance microscopy with a Park Systems atomic force microscope a team at NASA successfully characterized both the spatial variations in capacitance as well as the topography of vacuum-channel nanoelectronic transistors.
BY MARK ANDREWS, Park Systems, Santa Clara, CA
Imagine the not-too-distant future when a NASA spacecraft edges silently into orbit around Mars. Its 473-million-mile journey included a trip around the sun to sling shot itself into in geosynchronous orbit. Its mission: gather new site-specific details and deploy a rover as preludes to the first human mission to the red planet. But before anyone can take ‘one giant leap’, the Mars Path Marker needs to supply fresh data to anxious scientists back on earth.
The probe cost $1.8 billion. Its planning, construction and flight time to Mars took eight years and thousands of work hours from all across the aerospace supply chain.
Red lights are now flashing all across screens back on earth at NASA’s Jet Propulsion Laboratory in Pasadena, California. The probe remains inactive while its earth-side controllers grow frantic. Path Marker should have automatically powered-up for its first mapping transit, but instead hangs quietly above the ruddy Martian landscape.
Unbeknownst to controllers on earth, Path Marker wasn’t responding because of a short-circuit ‘latch-up’ in its silicon processors. Communications won’t resume for now—maybe not ever.
Earth could not see it happen, but when Path Marker flew around Sol, its passage coincided with an unusually large solar flare on the backside of oursun. More energy than what usually strikes Mars in six months was released in a series of coronal explosions, sending cascades of lethal, heavy ions plowing through Path Marker’s delicate solid- state transistors as if its shielding wasn’t even there.
Despite the best of plans, precautions and preparations, this spacecraft is stuck in perpetual ‘neutral.’ Mission specialistsare trying all availablemission-saving workarounds, but only time will tell.
NASA researcher Dr. Jin-Woo Han hopes to prevent a critical failure in an important mission like this fictional account of the Mars Path Marker. In reality NASA has experienced all types of solid-state electronic failures during its decades of manned and robotic explorations. In his work, Dr. Han documented nine different types of failures in 17 named missions as well as many more that did not cause a mission failure, but impeded or slowed a program.
Although the Mars Path Marker mission is fictional, the need for a better semiconductor technology for deep space exploration is very real. That need is why Dr. Han and colleagues have placed hope in a new approach to solid state transistors that utilizessome of the same principles that gave vacuum tubes their role in humanity’s first electronic products more than 100 years ago.
Han is a scientist at NASA’s Ames Research Center for Nanotechnology in Moffett Field, California. The center is led by Dr. Meyya Meyyappan; Dr. Han leads the vacuum device research team within the 20-person organization. One of his most recent research efforts is tied to his theories and practical applications that leverage the advantages of vacuum for creating better electron flow, but without the drawbacks in existing solid-state technology that NASA frequently faces. The new transistors, called vacuum-channel nanoelectronic devices, are not prone to disruption by cosmic radiation, solar flares, radical temperature changes or similar dangers that can be encountered once a spacecraft (or humans) leave earth’s magnetic fields and dense atmosphere.
The challenges of space exploration are daunting. While loss of life tops many potentially egregious outcomes, damage to spacecraft instruments occurs much more commonly than the general public may realize. This damage remains a source of concentrated research and engineering efforts to mitigate and remedy problems that can lead to lack-luster performance or full system failures. The efforts to ensure safe and productive operation in satellites, probes and spacecraft is second only to the agency’s zeal for keeping human space flight safe.
How can early 20th century vacuum tube technology solve NASA’s very 21st century problems? First of all, the vacuum nanotechnology that NASA is developing is gener- ations beyond conventional vacuum tube engineering as it stood in the early 20th century. But vacuum-channel nanostructures and conventional vacuum tubes share essential functional similarities that make Dr. Han’s devices ideal candidates to replace today’s most robust silicon-based transistors.
Transistors enjoy their role in electronic technology because of their unique abilities to amplify and switch electronic signals as well as electrical power. Power or current applied to one set of terminals controls the current as it flows to another terminal pair (emitters/ collectors). And while a practical solid-state transistor was proposed in 1926 by Canadian researchers, materials science only matured enough for production in 1947; the landmark year in which researchers at the AT&T Bell Labs (New Jersey, USA), and independently a year later in France proposed designs that would become the forefa- thers of today’s microelectronic wonders.
Practical vacuum tube components came into play before 1910, and have several important advantages compared to solid-state transistors including their superior electron mobility. Like their solid-state cousins, tube transistors function by moving electrons unidirectionally from the emitter (a cathode) to be collected by the anode across a vacuum. Tubes fell out of favor for most low and medium power applications due to the advantages of solid-state construction including much smaller size and weight, ruggedness that exceeded old-style tubes, their aggre- gation ability that enabled today’s integrated circuits (ICs), and zero warm-up time – silicon transistors requireno cathode warming function. Solid-state devices also provide substantially greater electrical current efficiency.
It’s easy to see why solid-state electronics won a place in aerospace engineering. But once we actually got into space, we learned quickly that even robust silicon transistors were no match for deep space radiation. To make the best transistors that we had “good enough” for space, NASA mastered the process of creating backup systems and a host of other measures to keep missions on track. It also partnered with other agencies like DARPA (Defense Advanced Research Projects Agency) and the US Department of Defense to develop alternate technologies such as gallium arsenide (GaAs), gallium nitride (GaN), and the latest work from Dr. Han’s nanotech vacuum team. GaAs and GaN are much more robust than silicon, but decades of research have proven them less suitable for construction complex ICs than silicon.
Although conventional solid-state transistors enjoy clear advantages in terrestrial applications, in-space damage typically comes in three forms: instantaneous, cumulative and catastrophic. While the first two effects can frequently be worked around due to NASA’s extensive reliance on back-up systems, catastrophic effects can be “mission enders.”
Dealing with likely and possible performance disruptions costs NASA dearly in terms of extra weight, design time to createmultiple backup systems that can also complicate missions while consuming valuable payload space. Imagine if using a laptop computer on earth required double or even triple the amount of vital components—that laptop would easily be a third larger and more expensive. For NASA, ignoring risks will impede success or in worst-case situations lead to a disaster that costs millions and could even endanger lives if components weretied to a human spaceflight mission.
A common way to deal with these unknowns is to overbuild—create more circuit pathways or entire redundant subsystems because some components will almost certainly be “sacrificed” during encounters with space radiation. NASA frequently must opt for “acceptable” performance instead of what might ideally be possible simply because they cannot count of systems that have optimal performance will remain that way throughout an entire mission.
The advantage a controlled vacuum has in transistors is tied to the fact that solid-state devices can experience long-term failures resulting from additive and cumulative effects from multiple bombardments of ionizing radiation that destroys device features at nanometer scale. This most commonly occurs when the total ionizing dose causes gradual parametric shifts, resulting in on-state current reductions and an increase in off-stage current leakage. A vacuum-based device does not typically suffer from these same effects in part because the absence of material (gases or solids) in the space between emitters and collectors not only speeds the flow of electrons but in essence is protective because there is very little present in this tiny void that might be damaged by ionizing radiation.
Dr. Han’s team studied several different compounds and structures that could be utilized to construct the vacuum channel nano devices that would eventually prove likely successors to conventional transistors. These materials included bulk MOS, silicon-on-insulator (SOI), gate-all- around (GAA) MOSFET and what proved to be the most promising material and design combination, a GAA nanowire in a vacuum gate dielectric (FIGURE 1).
To be effective and meet NASA’s requirements, new transistor technology had to be manufacturable at industrial scale using existing processes and techniques common to conventional silicon fabs or similar infrastructure. The ideal design would bring the “best of both worlds” together for a solution that is electrically sound, practical and compact as well as lightweight and reliable in the face of exposure to radiation and radical temperature fluctuations.
“But we did not ever approach this as a replacement for all silicon electronics or silicon transistors at large,” said Dr. Han. “While the devices could easily be used on earth—that is where we tested them in gamma radiation chambers after all—but the cost efficiencies of regular silicon MOSFET could not very likely improved by our vacuum-channel nanoelectronic designs.”
To measure device performance Dr. Han and his team employed a Scanning Capacitance Microscope (SCM) with an Atomic Force Microscope (AFM) from Park Systems. They investigated the nanoscale properties of vacuum- channel devices, seeking to ascertain their viability as a transistor while also observing if fabrication method- ology for gate insulators can be controlled.
“SCM with AFM is a powerful combination for investigating transistor devices—together, the two methods provide the user with a non-destructive process of characterizing both charge distribution and surface topography with high spatial resolution and sensitivity,” said Byong Kim, Analytical Systems Director, Park Systems.
Kim explained that atomic force microscopy with SCM is ideal for investigating transistor designs at the nano scale. Together, the two methods provide researchers with non-destructive processes for characterizing both charge distribution and surface topography with high spatial resolution and sensitivity. In SCM, a metal probe tip and a highly sensitive capacitance sensor augment standard AFM hardware. During testing, voltage is applied between the probe tip and the sample surface. This creates a pair of capacitors in series (when examining metal-oxide-semiconductor devices) from the insulating oxide layer on the device surface and the active depletion layer at the interfacial region located between the oxide layer and doped silicon. Total capacitance is then deter- mined by the thicknesses of the oxide layer as well as the depletion layer, which is influenced by the level of silicon substrate dopingas well as the amount of DC voltage being applied between the tip and device’s surface.
Dr. Han reported that by utilizing scanning capacitance microscopy with a Park Systems atomic force micro- scope the team successfully characterized both the spatial variations in capacitance as well as the topog- raphy of his vacuum-channel nanoelectronic transistors. By examining the line profiles of the topography and capacitance data acquired down an identical path along the device’s source-drain interface, further insight was gained into the relationship between key physical struc- tures and recorded changes in capacitance.
The nanoelectronic device’s topography (at the source- drain interface) was imaged and revealed a vacuum- channel spanning 250 nm in length with peaks and valleys separated by a distance of approximately 5 nm (FIGURES 3-5). The electrical functionality of the device was assessed through the acquisition of a capacitance map. This map revealed a relatively negatively charged (-1.4 to -1.8μV) source-drain terminal and adjacent quantum dot followed by a relatively positively charged vacuum- channel (2μV) and another dot-terminal structure (-1.4 to -1.8μV) on the other end of the source-drain interface. This alternating series of capacitance changes at key structural points suggest that the device is fully capable of functioning as an effective transistor.
NASA is now working towards next steps to investigate the potential of producing vacuum-channel nanoelectronic devices in higher volumes for further study. The team utilized standard semiconductor manufacturing techniques, so while fabrication is within existing process and materials technologies, settling on the ideal material for the transistors is also still being investigated.
“While the work initially focused on silicon as an under- lying technology, we next want to explore silicon carbide and graphene as alternatives—technologies that are more robust. Also, the charge emission efficiency of silicon may not be sufficient and we saw some degradation due to oxidization,” he remarked. “While we have demonstrated that a silicon vacuum-channel nanoelectronic device is possible. We now need to look at better emitter efficiency and reliability, balanced against ease of manufacturing – everything is a tradeoff in some regards.”
The Ames Research Center is open to partnering through industrial and university collaboration, like the work it has done in conjunction with Park Systems. NASA is already working with additional industrial partners and welcomes further collaboration.
|
<urn:uuid:1efe8f67-c23f-4d21-a93c-e93dfca9effe>
|
CC-MAIN-2022-33
|
https://sst.semiconductor-digest.com/2017/07/nasas-new-vacuum-channel-nanoelectronics-rely-on-park-systems-afm/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00069.warc.gz
|
en
| 0.936923
| 2,895
| 2.953125
| 3
|
Statement Of The Problem
The growth of industrialized factory farming has been substantial in the past decade. The number of dairy cows on factory farms increased by 100% and the average-sized dairy factory farm increased by 50% between 1997 and 2012. The number of livestock on factory farms rose by 20% between 2002 and 2012. The number of pigs on factory farms increased by more than 33%, and the average farm size grew by more than 70% from 1997 to 2012. The trends are all showing that this practice is growing – and quickly. This demands that attention be paid to the impact it has on the surrounding areas and world as a whole, and many studies have been completed to explore them. Among these, many facts point to the idea that factory farming has negative impacts on the state of human health, socioeconomic status/livelihood of small farmers, and the environment altogether.
Human health effects are multifarious and are described through the following statistics. Animal foods and by-products are the primary source of saturated fat in the diet of most Americans. This type of fat has been connected to both obesity and heart disease (Centers for Disease Control and Prevention). Various studies have indicated that the unnatural feeds used to encourage accelerated growth in animals on factory farms increase the saturated fat content of meat beyond it’s already high levels. Dairy cows are often given growth hormones in order to increase their milk production. After their milk production slows, these cows are killed to produce and sell beef. The six growth hormones most commonly used within the United States dairy industry have proved to greatly increase the risk of breast, colon, and prostate cancer in those who eat beef. Even conscious consumers are at risk because labelling for use of these hormones is neither required nor regulated. Since the 1950s, antibiotics have been used on factory farms to increase the rate of growth in animals. Today, an estimated 70 percent of the antibiotics used in the U.S. are given to farm animals for non-therapeutic purposes. Using antibiotics in this way can lead to drug-resistant bacteria; as a result, certain bacterial infections have already become or are on their way to becoming untreatable in humans. Antibiotic resistant infections kill 90,000 Americans every year. Lack of sufficient sanitation and waste management on factory farms can lead to food supply contamination by bacteria like E.coli and salmonella. Annually, 76 million Americans suffer from foodborne illness, and thousands die. Zoonotic diseases are exchangeable from animals to humans, with the potential to turn into pandemics. The outbreak and spread of the H1N1 virus was said by various experts to be caused by the overcrowding of factory farm pigs and the retention of their waste in massive manure lagoons.
Many have examined factory farming’s effects on small farmers too; Nathaneal Johnson’s The Making of the Modern Pig states that the past few years have eliminated over half a million hog farmers; “As large farms replaced small ones, the population of Thornton became too small to warrant its own high school. Now his high school serves as a middle school for both Thornton and three other towns “ (Johnson 2006). There are now four main companies producing the majority of pigs (Swenson 2000). Again, there are only four companies producing the majority of cow products; Eric Schlosser of “Fast Food Nation” states, “In the late 1970s, the top four beef companies controlled about 20 percent of the market; now they control more than 80 percent” (Gardner 2001).
Environmentally speaking, a diet akin to the typical American diets (consisting of all animal products and regular meat consumption) is not sustainable due to the number of resources it demands. “90% of US cropland loses soil at a rate 13 times above the sustainable rate of 1 ton/ha/y… US pastures are losing soil at an average of 6 tons/ha/y. About 60% of United States pasture land is being overgrazed and is subject to accelerated erosion”(Pimentel 1998). Comparing resources necessary to sustain protein requirements in a meat-based diet versus a plant-based diet, it’s seen that the production of 1 kg of animal protein demands 100 times the amount of water than 1 kg of grain protein (Pimentel 1996). This large usage of resources demands more and more land each day, resulting in deforestation equivalent to up to seven football fields per minute (Smithsonian Institution 2002).
Pesticides are yet another factor involved in this style of farming- in fact, meat production accounts for a third of pesticide use (Steinfeld, Henning et al. 2006) and pesticide use has continually been linked to the decline of fragile butterfly populations (Anderson 2013). Founder of Monarch Watch and insect ecologist from the University of Kansas, Orley Taylor, notes that genetically modified corn production in the Midwest United States is responsible for Monarch butterfly decline in that the herbicides used on the crops kill milkweed, the main source of butterflies’ food (Conniff 2013).Yet another consequence of such massive pesticide use is the decline of the honey bee, an essential species in our food system that we depend on for many of our produce (Pesticide Action Network North America 2012). Livestock as a whole are the leading cause of biodiversity decline today (Food and Agriculture Organization of the United Nations 2006).
The plant-based diet is much more planet-conscious and requires fewer resources to sustain. “The amount of feed grains used to produce the animal products (milk and eggs) consumed in the lactoovovegetarian diet was about half (450 kg) the amount of feed grains fed to the livestock (816 kg) to produce the animal products consumed in the meat-based diet ” (Pimentel 2003). “The research also found that at least 4 billion people could be fed with the crops we currently devote to fattening livestock, fuelling the argument that the over-reliance on meat in the west and among the growing middle classes in the developing world is an increasing problem when it comes to feeding the world” (Harvey 2014) “ according to the Sierra Club, producing one pound of grain-fed beef requires about 16 pounds of wheat and – as staggering as it sounds – 2,500 gallons of water. Furthermore, millions of acres of forest have been cleared worldwide to make room for the large areas of land needed for cattle grazing. In the United States, more than 260 million acres of forest have been cleared to grow crops to feed animals raised for meat. An acre of trees disappears every eight seconds. Tropical rainforests are also being cut to create grazing land for cattle. Fifty-five square feet of rainforest may be destroyed to produce just one quarter-pound burger. Since trees absorb carbon dioxide, the leading greenhouse gas, this significant loss of forest contributes to global warming as well.Soil erosion is also mostly due to the meat industry which, according to the Worldwatch Institute, is directly responsible for 85 percent of all soil erosion in the U.S. because so much grain is needed to feed the animals. Livestock is fed more than 80 percent of the corn and 95 percent of the oats grown by American farmers. The world’ s cattle alone consume a quantity of food equal to the caloric needs of 8.7 billion people – more than the entire human population on Earth. The Senate Agricultural Committee revealed that animal waste is the biggest pollution contributor in 60 percent of the streams and rivers in the U.S. Environmental Protection Agency’s impaired category. As a whole, it was stated that animals being raised for food purposes produce 68,000 pounds of waste per second. Major waste pollutants that make their way into our waterways include nutrients like nitrogen and phosphorus that can cause massive fish kills; harmful bacteria and viruses; and toxic heavy metals, which are present in some commercial livestock feed.”
Factory farming is an increasingly present method of raising animals for food, with factory farms raising 99.9 percent of chickens used for meat, 97 percent of egg-laying hens, 99 percent of turkeys, 95 percent of pigs, and 78 percent of cattle sold in the United States. 49% of Americans eat meat, with 80% consuming it at least four times per week, equating to around 200 pounds per person per year (Pirello) .
Purpose of the Study
This study is designed with the intent to test the effectiveness of documentaries like Cowspiracy, Earthlings, and Forks Over Knives Cowspiracy, Earthlings, and Forks Over Knives will be the keynote examples used to represent documentaries which present an argument for living a plant-based lifestyle.
General Design of the Study
This study will involve several research methods, including meta-analysis of related previous data, survey research, and evaluation research.
Meta-analysis will involve searching through documentation regarding Forks Over Knives, Earthlings, and Cowspiracy. Other studies that will be consulted includes
Research Questions and Hypotheses
After completing this research, the following question will be addressed: To what extent do documentaries like Forks Over Knives, Earthlings, and Cowspiracy have an impact on perception of vegetarianism and/or veganism for those aged 13-18 in the United States?
It is my belief that through watching one or more of these films, viewers’ perspectives on plant-based diets will change in a positive way. The viewer will either be more apt to consider transitioning to one themselves or at least be more open-minded toward the concept as a whole.
Limitations and Delimitations of the Study
The limitations of this study include time confinements, sample size limits, and the influence of many complex variables on each viewer’s disposition toward the topic. This research will only span over a few months and therefore cannot account for as many samplings as I’d prefer but should provide some new insight into this area as the impact of these films has not been studied in an academic manner previously. The sample size is limited to those within the age confinements of 13-18, but sampling will more than likely only span across Sarasota County. This cannot truly represent all of the adolescents within the United States, but will aim to achieve as random a sampling as possible to avoid bias.
Definition of Terms
In this paper, plant-based will be used as an umbrella term for those diets which abstain from some or all animal by-products (such as veganism and vegetarianism). Veganism is the elimination of all animal by-products from consumption and vegetarianism is the elimination of all meat (including fish) from the diet with the inclusion of dairy and eggs. A pescatarian is one who abstains from all meat except for fish.
Factory farming is used to describe intensive industrialized animal agriculture, or animal husbandry in which very dense quantities of animals are raised for sale. It is a large operation that raises massive numbers of animals for food; they hold large numbers of animals, typically cows, pigs, turkeys, or chickens, often indoors at high densities. The goal and focus of the operation is to produce large quantities of meat, eggs, or milk at the lowest possible cost.
Cowspiracy is a documentary produced by filmmakers Kip Andersen and Keegan Kuhn, who later also created What the Health, a film about preventing chronic disease; Cowspiracy was released in June 2014 and discusses the effects of raising cattle on the environment.
Earthlings is a film released in 2005 and created by filmmaker Shawn Monson. It focuses on animal suffering and unethical practices rather than environmental effects or impacts on human health.
The last film that will be analyzed is Forks Over Knives. It focuses on research from Dr. T. Colin Campbell and Dr. Caldwell Esselstyn. Dr. T. Colin Campbell is the author of The China Study, a book covering a 20-year long study on human health between Cornell University, Oxford University, and the Chinese Academy of Preventative Medicine. Dr. Caldwell Esselstyn, author of Prevent and Reverse Heart Disease and Yale University graduate, is referenced a great deal for his research. Forks Over Knives as a whole presents an argument that indicates plant-based foods have the potential to prevent and reverse disease when most or all animal products are eliminated from the diet.
|
<urn:uuid:ae354c5d-35d3-4fcf-b6ec-180cafc86a4d>
|
CC-MAIN-2022-33
|
https://studysolver.com/essay-examples/environmental-studies-essay/statement-of-the-problem-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00466.warc.gz
|
en
| 0.947529
| 2,540
| 3.140625
| 3
|
The Paradox of Competence
We examine a model in which the public is unsure about the competence of a politician, and whether they are concerned about the long-term consequences of their decisions (statesman) or about the public’s opinion concerning their competence and preferences (populist). The main finding suggests that the public benefits by disregarding the competence of candidates and by re-electing candidates based on their beliefs about whether a politician is a statesman. This paradox of competence might explain why politicians are so concerned about being perceived as statesmen. We also provide a rationale as to why governing by polls can be detrimental for society. Moreover, our model illustrates in general that delaying irreversible project decisions is a bad signal.
If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
|Date of creation:||Apr 2004|
|Date of revision:|
|Contact details of provider:|| Postal: Centre for Economic Policy Research, 77 Bastwick Street, London EC1V 3PZ.|
Phone: 44 - 20 - 7183 8801
Fax: 44 - 20 - 7183 8820
|Order Information:|| Email: |
When requesting a correction, please mention this item's handle: RePEc:cpr:ceprdp:4362. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()
If references are entirely missing, you can add them using this form.
|
<urn:uuid:3571c84b-91ce-4880-91dc-5e26652432b1>
|
CC-MAIN-2017-04
|
https://ideas.repec.org/p/cpr/ceprdp/4362.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00214-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.908833
| 400
| 1.867188
| 2
|
Alvar Hugo Henrik Aalto
Aalto, Alvar Hugo Henrik
Born Feb. 3, 1898, in Kuortane. Finnish architect.
Working in Finland, Sweden, the USA, and other countries, Aalto has designed numerous public buildings, including the city library in Vyborg (1927–35), the sanatorium in Paimio (1929–33), and the Workers’ Palace of Culture in Helsinki (1955–58). He built industrial buildings in Toppila (1930–31), Sunila (1936–39), and Oulu (1951–57); apartment dwellings in Bremen (1958–63); and villas, churches, and pavilions. Also involved in town planning, he redesigned Rovaniemi (1946–48) and Sáynátsalo (1949–52). Aalto’s work evolved from the earlier strict geometric forms to a distinctive combination of folk traditions, principles of functionalism, and organic architecture. As a result, his architecture is marked by a freedom and flexibility of volumetric and spatial composition, skillfully integrated with the natural setting. An abundant use of wood characterizes his architecture.
|
<urn:uuid:ae0682c9-1b9d-4373-aff0-d875e2eb4d89>
|
CC-MAIN-2017-04
|
http://encyclopedia2.thefreedictionary.com/Alvar+Hugo+Henrik+Aalto
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00494-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.889169
| 255
| 2.546875
| 3
|
A course is the study of a particular topic within a wider subject area and is the foundation of a qualification. A typical course includes lectures, assessments and tutorials.
Creative and commercial innovation drive fashion evolution. Developments in the field of textiles -- the various materials and fabrics used to make clothing -- are a vital part of the fashion world.
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom and Britain, is a sovereign state located off the north-western coast of continental Europe.The two most famous (and oldest) universities are Oxford and Cambridge (often referred to as Oxbridge by many Britons) England also has several other world-class institutions, including several in London (notably Imperial College, the London School of Economics, University College London and King's College London, all are part of London University)
Request Information Course Studies in Textile in West Midlands in United Kingdom 2017
or search for similar programs here
|
<urn:uuid:0eb940b4-3be2-4b04-99bd-68eb3d6bce4d>
|
CC-MAIN-2017-04
|
https://www.academiccourses.com/Courses/Textile/United-Kingdom/England/West-Midlands/West-Midlands/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00075-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.951247
| 193
| 2.140625
| 2
|
“Later, by devising specific plans we have to move ahead. Work must be done with educated youth who are unemployed. We have to consider not only the workers but also thousands of unemployed youth as well”, he added.
Ahsan H Mansur, executive director, Policy Research Institute (PRI), a private research firm, said it would be great if only five to seven powerful programmes could be implemented, instead of more than 150 government-run social welfare programmes that are currently active. It would reduce wastage. The number of people reaping benefits from several programmes will drop too. There is no need for various ministries to be involved in social activities simultaneously.
He also said there is secured pension scheme available for the government officers and employees. But, it is inadequate in the private sectors and there arises many problems in executing them.
Syed Saad Hossain Gilani, chief technical advisor at International Labour Organisation (ILO) said, to ensure workers’ safety ILO has been saying from the beginning that workers are not goods. So, workers must be employed considering them human beings at all time. They have to be treated logically. However, the government has to take the initiative for workers’ social safety. And the government has to spend on them.
Fazlul Hoque, former president of BKMEA, association of knitwear manufacturers said, “We always drag the context of export-oriented readymade garment sector workers while reflecting on labour rights. But, there are many workers employed beyond the readymade garment sector. The government has a more vital role alongside business owners in workers’ defence. Most of the government programmes are more focused on ultra-poor and not on workers. Now, the issue of workers’ social safety has to be included in the budget.”
Razekuzzaman, the president of Samajtantrik Sramik Front, said workers produce merchandises for the society, but when they get injured somehow, it becomes his liability completely. The society then denies all of his responsibility and it becomes tragedy for that family.
While presenting the keynote paper, Khondaker Golam Moazzem, research director, Center for Policy Dialogue, informed, “The number of accidents in the local industrial sector is on the rise. We lack the framework needed for workers’ safety here.”
“Compensation in case of injury, job security during pregnancy and financial security in times of sickness and unemployment must be provided. Among south Asian countries, we are lagging behind to guarantee availability of facilities during unemployment and security in case of injury," he added.
Kohinoor Mahmood, director, Bangladesh Institute of Labour Studies (BILS) said, along with providing social safety to all the formal and informal sector workers, maternity benefits must be increased. In such cases, minimum wage must be initiated by relaxing conditions.
Syed Abdul Hamid, professor, Institute of Health Economics, Dhaka University said, several thousand workers of the country were brought under the coverage of health insurance. But, the work of the next phase never picked the pace up. Government agencies needed to come forward for that. It was not possible, only due to the lack of an institutional framework. This situation requires a change.
Sayema Haque Bidisha, research director, SANEM, a non-government research organisation, opined, “Formal benefits for readymade garment workers in our country are comparatively high, yet it is insufficient. The condition of workers of all other sectors can be easily predicted from this. To alleviate the current situation workers must be brought under social safety net programme.
Morium Nessa, manager, Women Rights and Gender Equity, ActionAid Bangladesh said, when a male in our society loses his job they find other options easily, which is not the case for women. Women workers have to keep silent even in the face of discrimination. They work day after day carrying such mental pressure. She urged to end discrimination against women everywhere including workplaces.
Abdul Quayum, associate editor, Prothom Alo addressed the welcome speech during the roundtable. Noushin Shafinaz Shah, national coordinator, EIE Project, ILO, Asaduzzaman Mohammad and Mubara Morshed, technical advisors, GIZ protection scheme were also present.
After the programme Firoz Alam, senior technical advisor, GIZ Bangladesh, gave the vote of thanks. Firoz Choudhury, assistant editor of Prothom Alo, moderated the roundtable.
|
<urn:uuid:33470179-0767-44ce-bcc3-31cf09e76c2a>
|
CC-MAIN-2022-33
|
https://en.prothomalo.com/bangladesh/strong-framework-needed-for-safety-of-workers
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00473.warc.gz
|
en
| 0.959949
| 940
| 1.796875
| 2
|
According to a press release by the Children’s Hospital of LA, they are searching for a full time baby cuddler.
This new position is part of Koala Corps’ baby cuddler-program. This program was created to help newborn babies by cuddling and holding them.
Koala Corp After their second child, Ciara Granger (Oxford Road CEO and founder) spent six months in the hospital, Ciara Granger founded it. Ciara was born with cognitive delays and was admitted to the hospital for six months.
During her fight, they realized that holding her was the best thing for her.
“Shae underwent back-to-back surgeries. One of her only sources of comfort was to be held,”Ciera Granger. “She was a fragile little newborn who needed constant affection and attention, but not all babies in the hospital have someone available to cuddle them. We felt compelled to start the Koala Corp fund after our experiences with our daughter. It was something we learned was vital for newborns, and we wanted to do our part to make it happen. It is a need in our community that most people don’t know exists. This will bring great blessings to the families of babies and their children.
“The fund recently hit a milestone, thanks to donations from patrons like iHeartMedia Los Angeles, which “Donated a large amount of advertising inventory” to the efforts”
The Koala Corps program’s full-time cuddler will supervise it for the next three year.
“For many families, the birth of a baby who needs intensive medical care is unexpected and obligations at home and work mean families are unable to visit the hospital every day to be with their newborn,” says Rosby Lamm, Manager of Volunteer Resources at Children’s Hospital Los Angeles . “We’re very thankful to Oxford Road and their support, which will allow us to expand CHLA’s long standing Cuddler Program to more families throughout the hospital.
|
<urn:uuid:366c2af4-b64f-42e3-849b-a2dc47b26e2a>
|
CC-MAIN-2022-33
|
https://camille-atebe.com/la-childrens-hospital-to-hire-full-time-baby-cuddler-los-angeles/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00278.warc.gz
|
en
| 0.972344
| 427
| 1.539063
| 2
|
s you’ll see in the chapters ahead, partisan politics has always—always—been wrapped up in race, in ethnicity, and in questions of national identity. And every change seemed to provoke savagery. Sure, many of the violent spasms are well known: slavery, segregation, Civil War, racial riots erupting across the country for a hundred years after the Civil War. And it goes on: attacks on the Chinese in the west, Mexicans in the southwest, Irish in the northeast, and African Americans everywhere. But the unremitting scale and scope of our own pogroms have, somehow, slipped to the fringes of the national narrative—exceptions, anomalies, occasional troubles. What I learned—some colleagues will cluck at the naiveté—was that the violence was more essential, that raw violence is a basic feature of the partisan story.
|
<urn:uuid:ce0a3317-7856-4e80-ad83-27bc88b8fe68>
|
CC-MAIN-2022-33
|
https://republicofwrath.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00677.warc.gz
|
en
| 0.933005
| 180
| 2.875
| 3
|
August 5, 2014
21st Century Community Learning Centers (21st CCLC) after-school program grant Request for Applications has been released by the Pennsylvania Department of Education (PDE). Approximately $21 million will be awarded through this grant each year for the next three years. The RFA is available here.
According to the RFA: “The purpose of the program is to establish or expand community learning centers that provide students who attend high-poverty and low-performing schools with academic enrichment opportunities by Expanding Learning Opportunities during non-school hours along with activities designed to complement the students’ regular academic program…”
This application requires an external, or third-party, evaluator.
Via Evaluation is an external evaluator that has evaluated dozens of 21st CCLC grants since 2001, all for multiple years, throughout New York State, and is now providing evaluation services outside New York.
Via Evaluation is a well-known and respected external evaluator, and all evaluators are members of the American Evaluation Association (AEA). Our evaluators have presented at many AEA national conferences, the National 21st Century Community Learning Centers Summer Institute, and many other conferences. It has also provided 21st CCLC clients training on using program quality improvement tools.
Via Evaluation adds value to your application by utilizing our decade long experience with the grant, and writing the draft of the evaluation section, worth 22 points in this proposal. Via Evaluation has been on many successful 21st CCLC grant writing teams, including 14 in 2013 alone. Our evaluation sections often score the maximum number of points.
Via Evaluation is an evaluation firm that works with community based organizations, schools, and others to improve quality of life in communities. Our experience includes a variety of projects relevant to after-school programs. Please contact us if you would like to talk about evaluation for your 21st CCLC grant, and proposal. We look forward to hearing from you.
|
<urn:uuid:0c6c59a5-b234-405d-8984-ab1d309eab60>
|
CC-MAIN-2022-33
|
https://www.viaevaluation.com/pennsylvania-21st-cclc-after-school-program-proposals/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00268.warc.gz
|
en
| 0.955695
| 406
| 1.5625
| 2
|
If you’re noticing times when your Wi-Fi network is unusually slow or bogged down, there is a chance that someone might be stealing your bandwidth. Potential causes could be that your network is not secured properly and open to anyone wishing to use it, or someone has hacked or guessed your password. And it’s not only your bandwidth that might be in trouble, but your personal files could be available for the world to see as well.
So how do you find out if there is someone hacking into your Wi-Fi network?
The first and simplest way is to check if there is any activity on your wireless router when you’re not using it; which usually indicates that someone else is. The way to do this is to first power off all of your devices that use the network; this means laptops, desktop computers attached to the router, and any smartphone or iPod that could be tapping the bandwidth.
Once you are sure that all of your Wi-Fi using devices are off, look at your router’s activity lights. Most routers have blinking lights on them that indicate Internet connectivity, hardwired network connections, and wireless activity. So when you are not using your wireless devices and the activity light is still blinking, it means that your bandwidth is being used, just not by you.
A second, and more complex and accurate way to check if someone is using your Wi-Fi network is by logging into your router and checking the connected devices list.
To do this start off by finding your router’s IP address and enter it in your web browser’s address bar. To find the IP address on Windows go to the command prompt (by pressing Win+R then typing “cmd”), type “ipconfig” in the window and press enter. This will give you some connection information along with the “Default Gateway” IP address, which is what you should enter into your browser. And if you’re using a Mac just open the Network preference panel and get the IP address listed next to “Router.”
Next, go back to your web browser and enter that IP address into the address bar, which is when you’ll be asked for a login username and password. If you’ve never changed your login information before, it should be a combination of “admin” and “password,” or just open when left blank.
Once you get into your router, if from a default password, make sure to change your login information before a hacker does it for you.
The next and final step is to check which devices have been using your router to connect to the web. These lists are called different things in different routers: “Attached Devices” (Netgear) or “My Network” (Verizon routers), “Device List,” or anything else that sounds like it would list the connected devices.
The list should provide IP addresses, MAC addresses, and device names (if detectable) that you can check against your devices. If you see something that doesn’t belong to you, like a laptop model or wireless device that you don’t own, it would be a good sign that your Wi-Fi network is being shared without your permission.
To make sure no one else can connect to your router, simply change the security password or, if you’re still using the default, create a new one. This should be done whether someone is using your network or not, because leaving default settings can enable others to use your bandwidth. Plus, when your Wi-Fi connection is left unprotected, your shared files might also be exposed.
It’s also good policy to ensure that your password is hard to guess and, as an added level of protection, to use a security encryption like WPA2.
|
<urn:uuid:8e643393-d03c-4168-b10e-bf745e08deaf>
|
CC-MAIN-2017-04
|
http://blog.brickhousesecurity.com/neighbors-stealing-wi-fi/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00499-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.932945
| 793
| 2.640625
| 3
|
The Facilities Manager is one of the most important Managers in the building.
These two traits can be difficult and time-consuming to teach. There are some people who have them and others who don’t. It’s not a criticism, but if someone has these traits ingrained, they will make a better FM than someone who needs to be taught. While education level is a consideration when hiring a facilities manager, there are some basic personality traits that are even more so.
The Facilities Manager is one of the most important managers in your business. In their role as FM, this is the person who literally makes sure that lights turn on, the roof is intact, and that the buildings are well maintained. Without a reliable and competent facilities manager, many properties would fall into disrepair quickly.
A building that isn’t working well will cause disruption to your employees, and in turn, your business. An FM makes sure that the internet connection stays on, that the building is warm enough to work in, and that the roof isn’t leaking. Without them, nothing else can be achieved. With this level of importance, the right candidate needs to be skilled in managing both facilities and people.
“ Forging working relationships with other FMs who work with other companies in your area can be a great way to get additional training for your apprentice ”
|
<urn:uuid:cd3fae06-63c9-4e35-8dbb-42a4e254c9d0>
|
CC-MAIN-2017-04
|
http://www.101fmthings.co.uk/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00239-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.97561
| 279
| 1.890625
| 2
|
"What is this architecture of control and how does it work?" - An Excerpt from The Least of All Possible Evils
The announcement that Forensic Architecture has been shortlisted for the 2018 Turner Prize is hugely welcomed. Despite the recent and ongoing ICA exhibition, the FA collective are not necessarily the standard definition of what an artist, or capital-A art, is. Eyal Weizman, one of the founders of the Goldsmith’s FA group, is the author of Hollowland: Israel’s Architecture of Occupation and The Least of All Possible Evils: A Short History of Humanitarian Violence. Both books probe questions of the weaponisation of architecture, and how in reflection, all expressions of power are in fact architectural. To challenge and question these structures is the task of forensic architecture.
In their work that has spanned massacres in Latin America, the migrant crisis in the Mediterranean, extrajudicial murder in German, the patterns of bombings in Gaza in 2015, the reconstruction of a renowned torture site in Syria from the first hand accounts of those who were released, as well as the groundbreaking work with those who witness the fire at Grenfell Tower, the Forensic Architecture group have explored new ways of uncovering the truth of events from, amongst others, images caught on mobile phones, reconstructions, witness accounts, GPS signals, time studies, sound recordings. Their inclusion on the Turner shortlist challenges the boundaries of what is art, but also art’s role in holding power to account in contemporary society.
In this extract from The Least of All Possible Evils, Weizman offers new ways of looking at how Israel has asserted control over Palestine beyond military aggression and policing. Dominance can be ensured through infrastructure, access, land ownership, even the flows that permeate below the soil of the territory. Understanding these relationships, often considered outside standard politics, is to construct anew the architecture of power.
What is this architecture of control and how does it work? In the early 2000s when I started my research into the formation of this territorial system, I approached the challenge as every architect might approach an analysis of a complex building: I drew a cross section through it. An architectural cross section cuts through the visible layers of a building – facades, internal walls, floors – to expose the structures, systems, and infrastructure that run through them – columns, beams, air ducts, plumbing, electricity or information systems – as well as the relation between floors and rooms.
The section revealed the depth of Israel’s colonial project, because, like a building, the ‘architectural project’ of the occupation was arranged in layers. The Oslo Accords of the mid 1990s – which promised an incremental pathway to reconciliation but ended up providing the skeleton of the existing geographical system of domination and control – divided the territory into three principle political floors: the surface, landlocked pockets which were handed over to Palestinian control; the subsoil, including water and mineral resources; and the airspace above Palestinian areas, which was left in Israeli hands, primarily those of its air force.
But territorial stratifications get even more complicated. Israel’s primary legal apparatus for land grab: an Ottoman land code from the mid-nineteenth century conceived to encourage agricultural cultivation after a great series of droughts and famines across the empire by promising farmers permanent tenure over any land they cultivated and threatening to take land away if they didn’t. A contemporary reading of the logic of this law helped the state take legal control over all uncultivated lands, which were located primarily on the barren hilltops leaving only the lower cultivated valleys in Palestinian hands. In these hilltops, also important for territorial control, Israel could now ‘legally’ implant the settlement. This meant that the two national populations became intertwined and intermingled everywhere across the terrain.
This fragmentation into settlement hilltop islands over Palestinian valley enclaves necessitated a further degree of three-dimensional complexity: a mesh of separated roadways that could connect islands to islands and enclaves to enclaves. This completely divided the movements of Jews and Palestinians in three dimensions without the two ever crossing, or crossing only minimally.
A Jewish-only road network, the ‘apartheid roads’ started connecting the hilltop settlements with bridges that span over Palestinian fields and with tunnels that burrow underneath Palestinian towns. This type of infrastructure has in recent decades been greatly extended and currently comprises a full third of the total length of roadways in the West Bank. In the last decade, as armed confrontations in the West Bank subsided, some military checkpoints were removed, allowing Palestinians freer movement between their villages and towns. But this movement was undertaken on a separate and tattered road network that, when- ever crossing the Jewish network of highways, bows and bores underneath them. While the Jewish road network leads everywhere to Israel, the Palestinian road network is truncated on all sides by walls, checkpoints, and military zones.
Every Palestinian town and village has thus been fully enveloped by Israeli space in three dimensions. If Palestinians want to drive out of their enclaves, they encounter a fence, a wall, or an Israeli checkpoint. If they want to dig a well they need Israeli permission to pierce into its subterranean volumes, and face sanctions if they don’t. If they want to fly – a question that is largely theoretical given that they are not permitted an air force nor a national airline – they need Israel’s permission to enter into the airspace over their very roofs.
In Gaza, this three-dimensional partition organizes the frontlines of the armed struggle. Enclosed on the surface and unable to face the Israeli air force that continuously hovers above, Palestinian military efforts move in two directions along the vertical axis: they have retreated into the subsoil, where there are under- ground command centers, cross-border tunnels, and rocket-launching sites; and into the airspace through which these rockets travel.
If this system of volumetric separation were to be described in terms of a building, it would most closely resemble an airport with separate inbound and outbound corridors, splintering infrastructural ductworks, multiple passport control points, and security checks that direct some passengers on hustle-free paths through luxury shops to anywhere in the world, and others toward long queues, invasive security checks, and detention rooms that are sometimes separated from the luxury shops merely by a single floor or wall. Following this metaphor, Gaza would be the largest of the detention rooms. From it, those incarcerated might be able to see the people shopping on the other side, but are invisible to them (while being hypervisible to their security forces). The more these detainees try to resist or break out, the less provisions, water, and electricity these security people allow in.
I have previously called this layered political structure ‘the politics of verticality’. Throughout the last decade, this evolving and elastic territorial architecture has hardened into a permanent mechanism of separation and control. Verticality has become a form of apartheid. The word should in fact be synonymous with it.
Other layers of separation could be revealed by extending the section line downward across different geological layers. A section through these layers exposes the political logic of Israeli apartheid in the same way that seismological cracks help geologists examine hidden layers of rock. Recently, some scientists have proposed that our geological era should be referred to as the Anthropocene, a time in which humans have become the dominant force in shaping – destructively and dangerously – the very material composition of the planet. It is not only that the natural layers of the earth – deposits, minerals, and rocks – should be regarded as proper geological strata, but that the geology of the earth might also include artificial strata such as structures and buried infrastructures, asphalt, toxins, concrete, and mechanical transportation systems, including tens of thousands of satellites that form a permanent layer of aluminium forever circling the planet. If the concept of the Anthropocene helps us think about geology politically, we might also reverse its proposition and think about politics geologically.
The political geology of Palestine starts in the deep subterranean aquifers, buried under layers of aggregate soil and rock. The partition and use of the waters of this interconnected set of underground lakes, most of it under the West Bank, reflects the extent of inequality exercised on the surface. The Oslo Accords allocated 80 per cent of this resource for the benefit of Israel. As a result, average water consumption in Israel is more than four times that of the West Bank and Gaza. In recent decades, over-extraction of groundwater from Gaza’s sole aquifer led to its permanent salinization, destroying the strip’s single water source.
Another geological stratum is archaeology. The buried remains of the land’s historical occupants should be the subject of impartial scientific study. But the settler colonial logic of the Zionist project uses archaeology to construct an alibi for the Jewish ‘return’ and the claim that its indigenous rights are more fundamental and prior to those of all others. In this book, I have outlined the way ideologically motivated archaeology across Palestine, aimed at the remains of its biblical past, has discarded other archaeological strata (especially the long succession of Muslim periods from the seventh to the twentieth century) and organized the mode of occupation on the surface right above them. One excavation, which began in 2008, powerfully embodies this logic. It took place right under Silwan, a small Palestinian neighbourhood just outside Jerusalem’s Old City walls. Promoted by settler associations and starting without proper permits, it searched for elements of ‘King David’s era’ Jerusalem by boring tunnels through a hillside beneath homes in the neighbourhood, without informing the residents or securing their consent and refusing to stop despite their explicit protests and several attempts to halt it in court.
The underground works, a haphazard collection of improvised tunnels fortified with tonnes of steel and concrete, were recently inaugurated by dignitaries including the city’s mayor, who ceremonially stated: ‘When you stand in the City of David, you see layer after layer of foreign conquest, but when you come to the bedrock, there you find the Jewish layer.’ His conflation of geology (bedrock) and archaeology (Iron Age ruins) – false for there being a millennia of earlier inhabitations in Jerusalem – was used to make a crude political point: ‘after other countries’ leaders visit here they will no longer have any doubts about who owns this city’. But the excavation has also connected between the separate strata: cracks, originating inside the mountain, started moving up through geological and archaeological layers towards the surface, appearing and disappearing as they find their lines of least resistance, cutting through streets, homes, a school, and a mosque, some of which had to be abandoned. Digging for the ruins of ancient Jewish archaeology thus produced a layer of contemporary Palestinian ruin.
Indeed, in many places beneath the pavement of Israeli towns and universities, under the fields of Zionist villages and hillside forests, there is a layer made of the rubble of Palestine destroyed in 1948. The destruction has not ceased and Palestinian rubble is still piling up. It is made of homes, bulldozed for being built without permits in places where no permits are ever given to Palestinians. It is made of the bombed out buildings and greenhouses of Gaza and the improvised structures of the Bedouin villages of the Jordan Valley and the Negev. There is rubble across Palestine and everywhere people can be seen picking through its fresh top layers, where their homes stood, searching for something to salvage.
This layer of building rubble is directly related to the high-tech strata of the airspace and the electromagnetic spectrum occupied by the airforce. Since this book was first published, this layer has undergone a profound transformation. Domination from the air, which was largely exercised by manned jets and helicopters on short designated missions, is now increasingly enforced by overlapping swarms of unmanned drones on long missions. Hovering continuously over Palestinian towns and villages, they maintain a menacing, malevolent presence. The sound of their propellers’ engines is the continuous backdrop of Palestinian daily lives. These aerial platforms have rotated the geography of colonization by 90 degrees: the ‘Orient’ is no longer beyond the horizon, but now directly underneath it. ‘Aerially enforced colonization’, based on the drones’ ability to maintain a perpetual ‘surveillance and strike’ capability, is an economically efficient alternative to the otherwise onerous and expensive tasks of colonial policing in the dense urban mazes of the Gaza strip. The availability of this form of control was central in convincing the Israeli leadership that territorial withdrawal from the strip could be possible without compromising Israel’s overall domination. Hunter algorithms, programmed to follow patterns of behaviour, are programmed to learn the art of suspicion and violence in the same way that school children across our region currently do.
Cross sections through the layers of terrain reveal the politics of verticality to have an architecture composed of layers of radically different kinds – natural and artificial, material and immaterial, low- and high-tech – one equally composed of archaeology and drones. When something is said to have an ‘architecture’ it is tempting to imagine there is a single design team in charge, but the architecture of occupation was conceived at different periods by different people. That it has a layered structure laminated together into a unified and effective apparatus is because it was conceived under the ideology and practice of settler colonialism. The layering of democracy (for Israelis and Jews in the West Bank) and military dictatorship (in the areas between settlements) also makes this form of apartheid more resilient because it enables its apologists to deny its total nature and concentrates criticism on a different part of it every time. These different parts under criticism can then be compared to similar or equivalent practices in other places. Archaeology is politicized in other countries, drones are employed elsewhere, and other countries still divide their water unequally, etc. There is nothing inherently different, only that here these layers are woven into a complete system. However, this layered arrangement is rarely grasped in its totality; each layer is presented as a haphazard, often merely functional solution to a separate problem. A patch over patch, implemented stage by stage. One layer makes sure hilltops are seized by the state for the construction of settlements; another, annexes land along the roadways that connect these settlements (for their security); another, restricts building (only in and around Palestinian villages and neighbourhoods) in the name of environmental regulations for clean air, green areas, and natural reserves, or because the military needs live fire training areas (always next to Palestinian places), or because there are archaeological sites under these Palestinian areas, or, most effectively, to restrict access to underground water. It is the perceived separation between these layers that makes the politics of vertical apartheid so effective and resilient, and moreover an attractive model for other countries that seek form of population control.
|
<urn:uuid:8848d3be-9b42-46f2-a782-4a979fb958e4>
|
CC-MAIN-2022-33
|
https://www.versobooks.com/blogs/3770-what-is-this-architecture-of-control-and-how-does-it-work-an-excerpt-from-the-least-of-all-possible-evils
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00268.warc.gz
|
en
| 0.950907
| 3,090
| 2.09375
| 2
|
Updated: 6:40 p.m.
The U.S. Supreme Court Thursday upheld nearly all of the landmark federal health law, affirming its requirement that most everyone carry insurance, but complicating the government’s plan to extend coverage to the poorest Americans.
Chief Justice John Roberts Jr. joined the court’s four liberals in upholding the mandate, the best-known and least popular part of the law. The court also upheld hundreds of other rules embedded in the law designed to help millions more Americans obtain insurance and to refashion the health care industry.
But a majority of the justices voted that the government could not compel states to expand Medicaid, the federal and state program for the poor, by threatening to withhold federal money to existing Medicaid programs.
That change creates unexpected challenges for the Obama administration’s plan to extend insurance to 30 million more Americans. More than half of those—mostly childless adults in poverty or slightly above it — were to be covered by expanding Medicaid, but now states can opt out.
The ruling creates a new arena for political battles in the 26 states —primarily Republican—that sued to overturn the law. Passing up the Medicaid expansion is a mixed bag, saving the states some money in the long term, but bringing no relief to millions of uninsured or the doctors and hospitals that care for them. Within hours of the decision, Republican officials in several states, including Missouri, Idaho, Nebraska and Mississippi, said they were likely to oppose expanding the program.
The court’s decision also may have heightened the role of health care in the upcoming presidential and congressional elections. Republicans have vowed to kill the law if they win control of the presidency and both chambers of Congress.
President Barack Obama welcomed the ruling, saying, “We will continue to implement this law. And we’ll work together to improve on it where we can. But what we won’t do—what the country can’t afford to do — is refight the political battles of two years ago, or go back to the way things were.”
However, Mitt Romney, the presumptive GOP presidential nominee, pledged to repeal the law if he is elected: “What the court did not do on its last day in session, I will do on my first day if elected president of the United States.”
House Speaker John Boehner, R-Ohio, said: “Today’s ruling underscores the urgency of repealing this harmful law in its entirety.”
Creating an unusual majority coalition, Roberts joined the four liberals on the court in upholding the mandate, which had been viewed as the most legally tenuous part of the law. Roberts concluded the penalty for not carrying insurance fell within Congress’ taxing power, even though the court’s liberal wing had justified the mandate as a reasonable regulation of interstate commerce.
Under the mandate, people who refuse to buy insurance will face a tax penalty. By the year 2016, that will amount to either $695 a year or 2.5 percent of income, whichever is greater. Roberts wrote that while the penalties were “plainly designed to expand health insurance coverage… taxes that seek to influence conduct are nothing new.”
The decision leaves intact other major parts of the law that require insurers to accept all customers regardless of their health status and provide tax credits to those who need help to buy coverage. Those provisions go into effect in 2014.
The ruling eliminates one of the main justifications states have used to delay setting up new, online insurance markets called exchanges, where small businesses and individuals can shop for coverage.
While 14 states and the District of Columbia have authorized creation of these exchanges, another 33 have taken only initial steps or none at all, and three states have declared they won’t do it at all. The law requires the federal government to run the exchanges if state officials are unwilling or unable to do so.
“I’m disappointed and shocked that Justice Roberts led the charge to uphold the constitutionality of the mandate and called it a tax,” said Bill McCollum, who filed the first state lawsuit against the act when he was Florida’s attorney general. “I certainly don’t think it’s a tax. It’s a sad day for the American people.”
Medicaid Expansion Curtailed
The court’s ruling on Medicaid took away one of the federal government’s primary inducements to get states to participate in its expanded health coverage for the very poor. The law would have allowed the government to withhold all Medicaid money to states that didn’t go along with its expansion to cover people who earned up to 133 percent of the federal poverty level, or about $31,000 for a family of four.
Today, about 60 million people are enrolled in the program, mostly children, pregnant women and the elderly, and the expansion would have added another 17 million. Roberts said that Congress had not revised an existing program, but essentially created a whole new one, and therefore was not entitled to yank longstanding funding for states that wouldn’t go along with the changes.
“The financial ‘inducement’ Congress has chosen is much more than ‘relatively mild encouragement’—it is a gun to the head,” Roberts wrote. “The threatened loss of over 10 percent of a State’s overall budget … is economic dragooning that leaves the States with no real option but to acquiesce in the Medicaid expansion.”
The law calls for the federal government to pick up all the costs of the Medicaid expansion from 2014 to 2016. After that, states would gradually start having to pay a portion, but the federal government’s share would not fall below 90 percent.
Within several hours of the decision, Republican officials in several states had said they were inclined to turn down new federal money because they could not afford to pick up their eventual share.
Missouri House Budget Committee Chairman Ryan Silvey said Missouri won’t take federal money to expand Medicaid since the state would have to add in more than $100 million a year starting in 2017.. “I don’t see any chance of that happening,” he said. “It’s just not a sustainable option.”
Nebraska Gov. Dave Heineman said in a statement that he would forego the money.
“If this unfunded Medicaid expansion is implemented, state aid to education and funding for the University of Nebraska will be cut or taxes will be increased,” he said. “If some state senators want to increase taxes or cut education funding, I will oppose them.”
Maxine Bell, Republican chairwoman of Idaho’s House Appropriations Committee, said her state will likely skip the expansion.
“I assume we can’t pursue it [the expansion] because we can barely afford what we’re doing now,” she said. “I can’t imagine where we’ll find the revenue.”
Tate Reeves, Mississippi’s lieutenant governor, said his state’s share of the expansion would add almost 400,000 new enrollees and cost the state an estimated $1.7 billion over the next 10 years. “Mississippi taxpayers simply cannot afford that cost, so our state is not inclined to drastically expand Medicaid,” said Reeves, a Republican.
But health policy experts say that state officials who decline the money will likely face the wrath of providers and advocates for the poor.
“They [states] could delay for a year or two, but the pressure from hospitals and the politics would be ‘why are we doing this?’ It economically makes no sense,” said John Holahan, director of the Urban Institute’s Health Policy Center. Holahan noted that several states waited until the 1970s to start Medicaid after Congress authorized the program in 1965.
Gail Wilensky, who ran Medicare and Medicaid under President George H.W. Bush, said the government retains other levers to pressure states to participate, including special permissions the government gives states to craft their own rules in other areas. “Does [the administration] have some coaxing power? They have a lot,” she said.
The court ruling is unlikely to be the last word on the law. In fact, Republicans quickly seized on Roberts’ declaration that the mandate was a tax to argue that the Democratic architects of the law had misrepresented it.
“The election is two or three times the importance of court decision,” said Robert Laszewski, a consultant to the insurance industry.
Signed into law March 23, 2010, after being passed without a single Republican vote, the health care legislation was promptly challenged, with 26 states filing or joining lawsuits challenging its constitutionality.
From the start, Republicans argued the law was an overreach of federal authority and that its new taxes and fees would hurt the economy. Democrats said that slowing health care spending with provisions such as a powerful advisory board to curb Medicare costs and the so-called “Cadillac tax” on high-cost insurance benefits, would boost the economy. At the same time, they said, the law would provide relief to millions who could not afford or qualify for insurance coverage.
Implementing the law is estimated to cost about $1 trillion over nine years, much of that for the insurance subsidies and expansion of Medicaid, according to the Congressional Budget Office. That is slated to be paid for through savings wrung from Medicare, along with new taxes on industry, high income earners and employer-provided insurance.
Gearing Up For Deadlines
The high court’s decision comes a year and a half before January 2014, when some of the most significant changes called for in the law take effect. Those include the launch of new state-based marketplaces where consumers will shop for coverage, the fining of employers with 50 or more workers who fail to provide affordable coverage and the Medicaid expansion.
Whether the federal government and the states will be able to meet the deadlines is far from certain. States that waited for the court decision may find they have run out of time since they must submit a blueprint for the marketplaces by Nov 16.
“We could have 20 or 25 states not ready,” said Laszewski.
In addition, many must resolve a host of technical challenges, including revamping aging computer systems, to prepare for increased Medicaid enrollment – and to link with federal agencies, such as the IRS, to help determine applicants’ eligibility for Medicaid or tax subsidies.
Today’s decision “doesn’t resolve any of the technical aspects the states are facing,” said Joseph Antos, a health policy scholar at the conservative American Enterprise Institute.
Still, the court’s ruling gives much of the health care industry more confidence to move forward.
“Clarity benefits the country. The last thing you need is uncertainty,” said David Cordani, CEO of insurer Cigna.
Sarah Barr, Mary Agnes Carey, Kristen Carriker, Matthew Fleming, Phil Galewitz, Jenny Gold, Jay Hancock, Shefali Kulkarni, David Schultz, Marilyn Werber Serafini, Stuart Taylor, Christian Torres and Andrew Villegas contributed.
|
<urn:uuid:90737caf-4c4e-41bc-ab35-091b4a54ba7f>
|
CC-MAIN-2017-04
|
http://khn.org/news/supreme-court-upholds-individual-mandate/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00232-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.956793
| 2,351
| 1.921875
| 2
|
2SF file extension - Puppy Linux file
What is 2sf file? How to open 2sf files?
File type specification:
The 2SF file extension seems to be related to Puppy Linux, a special "easy-mode" version of Linux meant to be easier accessible for broader audience. These *.2sf files seems to be system files for Puppy. Found for example as save.2sf.
The default software associated to 2sf file type:
Puppy Linux is lightweight distribution of Linux operating system. Puppy is based on Woof project that uses software and other data from Ubuntu, Debian, Slackware Linux distributions. Because Puppy is very minimalist operating system can be run directly from RAM. After the boot you can disconnect the boot medium (USB flash, CD/DVD, external HDD disk etc.).
List of recommended software applications associated to the .2sf file extension
Recommended software programs are sorted by OS platform (Windows, Mac OS X etc.) and possible program actions
that can be done with the file: like open 2sf file, edit 2sf file, convert 2sf file, view 2sf file, play 2sf file etc. (if exist software for corresponding action in File-Extensions.org's database).
- Others 2sf file
Unspecified and all other actions for computer programs working with 2sf file - Puppy Linux file
Click on the software link for more information about Puppy Linux. Puppy Linux uses 2sf file type for its internal purposes and/or also by different way than common edit or open file actions (eg. to install/execute/support an application itself, to store application or user data, configure program etc.).
|
<urn:uuid:3289402c-4226-4b62-a108-e7c55dec1ce1>
|
CC-MAIN-2017-04
|
https://www.file-extensions.org/2sf-file-extension
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00319-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.866565
| 348
| 1.929688
| 2
|
What’s a Mayan Apocalypse story without a Star Wars connection?
Deep inside the Guatemalan rainforest is the ruins of the Maya temples that George Lucas used to film the planet Yavin 4 in Star Wars.
Local guides say the temple is being inundated by visitors this week and the Guatemalan government forecasts a record 235,000 tourists. These ancient temples have become a pilgrimage site for both hard-core Star Wars fans and end of the world enthusiasts.
“Something big is going to happen,” says the president of Guatemala’s Star Wars fan club!
On a side note, Yavin 4 and the rebel base are actually returning to the Star Wars plot in the upcoming ‘Episode 7,’ IF the world doesn’t end tomorrow.
The shrines also appeared in the 1979 James Bond movie Moonraker in which 007 was lured through the jungle to the lair of his enemy Hugo Drax.
Read more about the Star Wars connection to the end of days HERE.
And let’s hope this isn’t our fate tomorrow:
Latest from WCBSFM.com >
- Sam Moore to Perform at Trump Inauguration
- Green Day Debut Anti-Trump Video for ‘Troubled Times’
- Ozzy Osbourne, KISS, Korn to Headline Chicago Open Air Festival
- 1985 ‘Ebony’ Magazine Tried To Predict What Michael Jackson Would Look Like in the Year 2000
- Springsteen Cover Band Pulls Out of Trump Inauguration Event
|
<urn:uuid:21f095fe-12ec-429a-bef7-9cdac909d71a>
|
CC-MAIN-2017-04
|
http://wcbsfm.cbslocal.com/2012/12/20/the-star-wars-connection-to-the-2012-mayan-apocalypse/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00074-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.862039
| 324
| 1.59375
| 2
|
Longitude - Page 1
This is the story of longitude. Why it was so important - literally a matter of life and death - and how the 'longitude problem' finally came to be solved.
The voyage of HMS Centurion
Our story starts aboard the British ship HMS Centurion. It was May 1741, and the Centurion was somewhere off the coast of Chile. Her situation was desperate. Having taken a terrible battering rounding Cape Horn, the Centurion had lost touch with the other five ships in the squadron. Many of the crew were seriously ill with scurvy, and a number had already died. Their only hope was to reach land, repair the ship, and put the crew ashore to recover.
But their orders were explicit. To keep out of sight of the mainland, and not to alert the Spanish, with whom Britain was at war. So they decided to head for the tiny island of Juan Fernandes, 400 miles off the coast of Chile. Now the Centurion, under Captain Anson, knew where the island was. The problem was that they didn't know where the ship was. More precisely, they knew their latitude, but had no means of working out their longitude.
Why latitude was fairly easy to calculate…
Basically at that time you worked out your latitude by observing how high the sun was at local noon (the point when the sun is highest in the sky). Typically ships used a simple device called a cross staff, basically a long piece of wood with graduations on it, with a sliding cross piece. You placed the end of the cross staff to your eye, and you slid the cross piece to and fro, until the bottom end appeared to touch the horizon, with the other end touching the sun. You then read off the position of the cross piece on the main cross staff, which would tell you the angle of the sun above the horizon. Typically this instrument would allow you to work out your latitude to within 15 or 20 miles. The cross staff was the precursor of the modern sextant, which does the same job more accurately.
This photograph shows the kind of Cross Staff that was used aboard the Mayflower. Picture credit: flickr.
|
<urn:uuid:a369c4f8-7077-457f-92b5-d6b9d0d18867>
|
CC-MAIN-2017-04
|
http://www.grand-illusions.com/articles/longitude/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00435-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.970933
| 449
| 3.78125
| 4
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.