text
stringlengths 181
608k
| id
stringlengths 47
47
| dump
stringclasses 3
values | url
stringlengths 13
2.97k
| file_path
stringlengths 125
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
138k
| score
float64 1.5
5
| int_score
int64 2
5
|
|---|---|---|---|---|---|---|---|---|---|
As Seen on TV
TV's power to build companies and brands is virtually unmatched. And while TV was once used predominantly by America's largest and most successful corporations, it's now the workhorse of growing businesses nationwide. What has made TV so accessible to entrepreneurs? Vast new programming choices and the ability to geographically pinpoint your best prospects to reach smaller, better-qualified audiences for less.
TV advertising is a branding and positioning tool as well as a proven direct-response medium. It works best in combination with other media, such as print and online marketing. For example, you can introduce a new product or service on TV with spots that send qualified prospects to a deeper source of information, like a website.
Putting TV to work for your business isn't as complex as you might think. Here are four important things to know before you begin:
1. Buying TV time is more a science than an art. There are thousands of professionals nation-wide who make their living buying airtime. If you have a large enough budget for your TV campaign--at least $10,000 a month in a small media market--you can hire a local advertising agency with a skilled media-buying staff that will also produce your commercials. For more modest budgets, a media-buying service that works on commission is a terrific option. Small buying services generally have relationships with the local advertising sales reps and can negotiate cost-effective packages for you. Of course, you can become a cable TV advertiser for as little as $1,500 a month in many markets nationwide (not including production costs). On this budget, you should expect to place your own spots.
2. Geography costs money. If you're placing your media directly, your first consideration is the geographic area in which your spots will run. Begin by contacting your local cable TV provider, even if you plan to advertise in multiple markets, because many companies provide cable service in a wide range of areas. Most cable systems break large metro areas or states up into advertising zones, and the more zones you buy, the more it will cost. So your advertising budget will go farther if you narrow your geographic market area as much as possible and concentrate your dollars on your target areas.
3. The more you know about your prospects, the greater your chances of success. As a business owner on a budget, it's imperative to pinpoint your best prospects. You must look beyond basic demographics (age, gender and location) and understand what they like, their hobbies and their interests. This is enormously important in choosing the right programming. Share everything you know about your prospects with your cable rep and ask to see quantitative and qualitative data that shows exactly which cable networks and programs your prospects are watching. Since consumers multitask while watching TV, by going online or reading the newspaper, for example, your spots are more likely to be seen and remembered if they air during your prospects' favorite shows--when they're engaged and attentive.
4. It pays to look good. Most cable companies and many local network affiliates now provide access to low-cost TV-spot production. Depending on your market, you may pay as little as $500 to $2,000 for a basic spot. The good news is that this helps many businesses that can't afford to spend major dollars on production become TV advertisers. The bad news is that the spots can sometimes look amateurish and reflect poorly on the advertisers. So be a careful shopper. Ask to see spots the production company you're considering has created for other advertisers. If you're unhappy with what you see, don't feel boxed in. Shop around for other producers, and create spots that will make you look good and achieve your advertising goals.
Contact marketing expert Kim T. Gordon, author of Maximum Marketing, Minimum Dollars: The Top 50 Ways to Grow Your Small Business, at smallbusinessnow.com. Her new e-book, Big Marketing Ideas for Small Budgets, is available exclusively from Entrepreneur.
|
<urn:uuid:fd43cb7b-3b97-4b44-ac0d-f9d4e08348b4>
|
CC-MAIN-2017-04
|
https://www.entrepreneur.com/article/183158
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00253-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.962156
| 808
| 1.71875
| 2
|
Taxes key in war on 'lifestyle' disease: health experts
Global health leaders declared war on lifestyle diseases Thursday, decrying the impact of tobacco, alcohol and soft drinks on the world's poor, while calling for taxes to curb consumption and finance healthcare.
In half-a-dozen studies in The Lancet, a leading health journal, experts detailed the link between poverty and non-communicable diseases (NDCs) such as stroke and diabetes, and made the case for consumer taxes opposed by industry and many politicians.
NDCs, which also include heart disease and cancer, "are a major cause and consequence of poverty worldwide," said Rachel Nugent, vice-president of RTI International, a non-profit health policy institute in Seattle, and chair of The Lancet Taskforce on Non-Communicable Diseases (NDCs).
Many of the United Nation's Sustainable Development Goals, which run to 2030, will remain out of reach unless governments invest in policies that break the chains binding unhealthy habits and so-called "lifestyle" diseases, she said.
"Every year, almost 100 million people are pushed into extreme poverty because of out-of-pocket health spending," Adhanom Ghebreyesus, head of the World Health Organization, wrote in a comment, also in The Lancet.
"The costs of treating NDCs are a major contributor to this global scandal."
NDCs are responsible for 38 million deaths—nearly half before the age of 70—each year, a large share of them caused or aggravated by smoking, excessive drinking and/or unhealthy diets, according to the WHO.
One of the UN's 2030 goals is to reduce deaths from NDCs by a third.
In 2011, world leaders at the UN general assembly pledged to develop national plans for the prevention and control of NDCs, and set targets to benchmark progress. But few have followed through.
"There has been a broad failure globally and in countries to act on the commitments made in the 2011 Political Declaration," Richard Horton, editor-in-chief of The Lancet, and senior editor Jennifer Sargent, wrote in an editorial.
Harm of taxes 'overstated'
One of the most controversial remedies proposed for getting people to cut back on smoking and the consumption of alcohol or soda pop is point-of-sale taxes.
Opponents argue such levies penalise the poor most of all, and amount to a regressive tariff.
The new studies show a more nuanced reality.
Research looking at the impact of price hikes in 13 poor, emerging and wealthy countries, for example, found that—for alcohol and sugary snacks—low-income households were more likely than wealthy ones to cut back, leading to incremental health gains.
But even if they pay more as a percentage of their income, families can benefit in other ways, the researchers argued.
"The extra tax expenditures involved should not deter governments from implementing a policy that may disproportionately benefit the health and welfare of lower-income households," said Franco Sassi, a researcher at Imperial College Business School in London.
Additional tax revenue gained should be set aside for "pro-poor programmes", he added.
For former New York mayor Michael Bloomberg, who has given away more than a billion dollars to curb tobacco use over the last decade, the benefits are obvious.
"Raising taxes on tobacco is the most effective way to drive down smoking rates, particularly among young people," he told AFP. "It is also the least widespread of all the proven tobacco control policies.
"If we can help more governments raise tobacco taxes, we could make a very big difference in smoking rates, and also raise revenue that countries can invest in other vital services," he added.
Tobacco claims nearly seven million lives yearly from cancer and other lung diseases, accounting for about one-in-10 deaths worldwide, and a million in China alone, according to the WHO.
© 2018 AFP
|
<urn:uuid:44af3c4d-4fe6-4f3c-9253-e61a660702bd>
|
CC-MAIN-2022-33
|
https://medicalxpress.com/news/2018-04-taxes-key-war-lifestyle-disease.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00073.warc.gz
|
en
| 0.95558
| 811
| 2.484375
| 2
|
Get Started: Take Charge of your ADD/ADHD Workshop
Get the semester off to a good start.
Understand how ADD/ADHD can derail your best plans. Learn how to make the syllabus work for you. Bring your syllabi and an academic planner, if you have one. Please note: Designed for currently enrolled students working with the Learning Accommodations Center as well as other students with ADD/ADHD.
Facilitator(s): Deborah Regan and Cheryl Wilson
Contact: For more information, and to register please contact the Learning Accommodations Center at 978-556-3654 or email@example.com.
Please Note: This workshop is offered on multiple dates.
Date: Thursday, Sept. 17th, 2015 from 12:00 to 1:00 p.m.
Location: Haverhill Campus, Room C118
Date: Thursday, February 11th, 2016 from 12:00 to 1:00 p.m.
Location: Lawrence Campus, Room L144
|
<urn:uuid:ae13e8f8-57aa-485a-a947-7bd9cc1f1ec8>
|
CC-MAIN-2016-44
|
https://www.necc.mass.edu/blog/2013/07/26/get-started-take-charge-of-your-addadhd-workshop/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00095-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.90284
| 214
| 1.507813
| 2
|
Belarusian authorities need English lessons
In early September, the first ever signs in English appeared in the Minsk metro. In June, first bilingual street signs appeared in the centre of the capital.
These are important developments. Belarusian officials have talked about attracting foreign investors and tourists for many years. But until recently virtually all Belarus street signs were only in Cyrillic script. Moreover, the knowledge of English among Belarusians remains low.
A few years ago Aleksandr Lukashenka criticised this situation. He joked that Belarusian secretaries hang up on callers upon hearing English. In government agencies and state-owned industries, few people speak English. However, new prime minister Mikhail Myasnikovich and his deputy Syamashka both claim English proficiency. But Belarus has a long way to go to become a foreigners-friendly country.
English As a New Foreign Language
English as a foreign language is relatively new for Belarusians. Thirty years ago, speaking a foreign language meant speaking German. The German connexion is still strong today. German civil society organisations and political foundations work with Belarusians despite all political tensions. The Goethe institute maintains German libraries even in provincial centres. The only British Council office in Belarus - in Minsk - was closed in 2000.
Lack of proficiency in English in the governmental institutions is a good illustration of linguistic barriers Belarusians face on the path to international integration. The presidential website is the only governmental website with an up-to-date English version. Belarus Foreign Ministry demonstrates extremely poor English. For example, the mission statement of the ministry reads: "Our foreign policy is multi-directed seeking to build partnerships all across the globe."
If this is the language Belarusian diplomats use professionally, no wonder the results of Belarusian diplomacy are so pitiful. To be sure, Belarusian representatives abroad lack more than knowledge of English. Recently, Belarus trade adviser in Tehran was caught on the video sleeping at the summit of Non-Alignment Movement.
PR-Disgrace of the Belarusian State
The web presence of all Belarusian governmental organisations suggests that Belarus has little interest in foreigners. For example, the latest piece of news translated into English on the web site of the Belarusian government at the moment this text is being written, dates back to 9 July.
The English version of the web site of the Belarusian Ministry of Agriculture has not been updated since June 2010. It contains nothing but a few telephone numbers. Clicking on the English icon of the web site of the Belarusian National Agency for Investment leads one to a page with announcement "the site has been closed for technical reasons."
The very first page of Belarusian Ministry of Trade contains a series of news titles in Russian, each followed by the English remark "The resource is available only in the Russian version of the site." English pages of other governmental agencies and organisations look similarly, revealing negligence and poor qualification of responsible officials.
But the most illustrative is the English-language web site of the leading governmental think-tank with a long name Informational-Analytical Center Under the Administration of President of the Republic of Belarus. It should per definition have had higher intellectual potential, linguistic and PR skills than the ministries which might be too preoccupied with everyday business. However, its site displays only the center’s name and logo. Our sources say, just a couple of low-level analysts on the centre’s staff speak English, though the director speaks excellent German.
Language problems are no less dire in the business sector. In 2009, a journalist of the Belorusskaya Gazeta weekly called biggest Belarusian firms asking about investment portfolios and seeking creating a joint-venture. He spoke in English and only one enterprise, furniture producer Pinskdreu, was able to communicate.
Nobody Understands Belarusians
Belarusian government, business and all kinds of organisations and institutions lack even the basic facilities and policies to inform its foreign partners about their ideas and what they have to offer. They cannot make their case even in the most favourable condition in the West and even less - manage crises which regularly happen in Belarus' foreign relations.
Apparently, a big share of problems in relations with Western nations stems from mutual misunderstandings and PR-mismanagement. And some of them begin with language. The government has such difficulties in contacts not only with the West. Iranian ambassador also complained about lack of English command in Belarus as a major reason for failure of Iranian projects in the country.
The government is aware of language problem and two years ago started to increase amount of hours for foreign language instruction in schools. In 2013, it adds foreign language examination to the list of obligatory exams taken upon finishing the secondary school. Ideologically, the opportunistic Belarusian regime has no problem with more English, if it brings money and does not threaten its survival. Lukashenka has declared at the very beginning of his rule in 1994, "There are only two great languages in the world: Russian and English."
For now, however, the Belarusian officials speak only Russian and keep looking towards Moscow. Only after Belarusian bureaucrats and businessmen will learn how to communicate with Europe, they will be able to adopt new practises.
They have no aversion to the West and can review own beliefs if given an impulse. Even the most conservative part of Belarusian state apparatus – the army – implemented new organisational models after General Malcau learned them in Germany in 2000s. Belarusian officials and society shall have an opportunity to have a different experience of Europe and communicate their problems.
|
<urn:uuid:132b3bd6-fdc3-486b-8a76-07252fef6a7c>
|
CC-MAIN-2017-04
|
http://udf.by/english/soc/66856-belarusian-authorities-need-english-lessons.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00500-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.949544
| 1,133
| 1.851563
| 2
|
8 Mistakes Infosec Managers make while HiringHiring and adding new members to the team is always a mixed feeling. Will this person work out? Should we keep looking for a back up candidate, If What? And so many other unanswered questions plague our mind. To ensure this mixed feeling is minimal and ends in positive results we need to give emphasis to the requirements of an effective interview. Conducting good interviews requires a balance of instinct, insight, and solid preparation. Managers need to prepare themselves in advance for an interview and avoid common interview blunders such as monopolizing the conversation, asking personal questions or taking too much time.
1. Talking too much
When providing information on company background, job role and responsibilities. Managers should watch out for the tendency to go about their own job, personal feelings about the company, or any other unrelated story. At the end of the conversation, manager's will beam with self-satisfaction, and will happen to see the candidate in a rosy light -- but still will not know anything about the candidate's ability to do the job.
2. Afraid to put the candidate on "the spotlight"
Few managers tend to over-empathize with a nervous candidate and ask easy questions about the candidate's background and experience being afraid to put the candidate on the spot and ask challenging questions. It is a good practice to keep the same set of challenging questions which can be thrown at different potential candidates during interviews; this will also reveal very interesting responses which can lead to an objective comparison.
Managers need to control themselves from talking about candidates past employers, or gossiping about people within the industry, company etc. This reflects badly on both the manager and the company image.
4. Asking personal questions
Managers should curb their desire to delve too deep into personal lives of candidates during an interview. Few examples of personal questions- "Do you have children?" "Are you a house owner?" "What nationality are you?" "Are you married?" These kinds of inquiries are illegal and should be avoided completely.
5. Answering for the Candidate
Often managers ask questions and answer it themselves not giving the candidate a chance to respond or elaborate on his past experience. For example "You are familiar with SOX section 404, aren't you? In this case the response to the candidate is almost evident and the applicant has no choice but to favorably answer or second the manager's response.
6. Admit: Say "No" to not qualified
Managers need to assess candidates honestly and fairly. If everyone you talk to feels like a "maybe," that probably means you are not getting enough useful information or most "maybes" are really "no, thank yous!" Likewise, if you think the person might be good for some role at some point in the future, he or she is really a "no." Managers should admit that these candidates are probably not qualified for the current position.
7. Make your interview brief and to the point
Have an agenda for your interviews. Prepare questions in advance, read the candidate's profile and resume thoroughly acquainting yourself and making note of key points. Try and keep the interviews for 45 minutes- to an hour. This should be sufficient in getting to know and understand your candidate.
8. Falling victim to the seemingly "perfect" candidate
If a candidate arrives dressed perfectly, gives a firm handshake, has good body language and answers the first question flawlessly, managers might be tempted to check the imaginary "Hired!" box in your mind. But ensure you pay attention to all the answers and are not swayed by a first impression. The same goes for the reverse: The rather quiet and shy candidate may have the super powers fit for the job that go undetected at first glance.
|
<urn:uuid:59ef5ce9-465e-4ecc-8f54-7996374c9ee4>
|
CC-MAIN-2022-33
|
https://www.bankinfosecurity.asia/8-mistakes-infosec-managers-make-while-hiring-a-505
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00267.warc.gz
|
en
| 0.946825
| 781
| 1.648438
| 2
|
General Manuscripts Collection, 1870-2003 (mostly 1900-1960)
Princeton University. Library. Department of Rare Books and Special Collections
The General Manuscripts Collection is largely composed of materials related to United States politics and government, including personal and business correspondence, manuscripts, memorabilia, pamphlets, and reports. The collection includes the papers of many individuals, including Franklin Delano Roosevelt, Theodore Roosevelt and other United States presidents, government officials, authors and journalists, bankers and businessmen, and Princeton University alumni.
|
<urn:uuid:f05d1b24-b0a9-4117-b6a4-8c94770fe93a>
|
CC-MAIN-2022-33
|
https://findingaids.princeton.edu/?f%5Bcreator_ssim%5D%5B%5D=Princeton+University.+Library.+Department+of+Rare+Books+and+Special+Collections&f%5Bnames_ssim%5D%5B%5D=Public+Policy+Papers&range%5Bdate_range_sim%5D%5Bbegin%5D=1950&range%5Bdate_range_sim%5D%5Bend%5D=1951
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00471.warc.gz
|
en
| 0.892168
| 114
| 1.875
| 2
|
Local communities in Uganda send UNICEF some 10,000 text messages (SMS) every week. These messages reflect the voices of Ugandan youths who use UNICEF’s U-report SMS platform to share their views on a range of social issues. Some messages are responses to polls created by UNICEF while others are unsolicited reports of problems that youths witness in their communities. About 40% of text messages received by UNICEF require an SMS reply providing advice or an answer to a question while 7% of messages require immediate action. Over 220,000 young people in Uganda have enrolled in U-report, with 200 to 1,000 new users joining on daily basis. UNICEF doesn’t have months or the staff to manually analyze this high volume and velocity of incoming text messages. This is where advanced computing comes in.
IBM recently partnered with UNICEF Uganda to develop an automated system to classify incoming text messages. (If this sounds familiar to iRevolution readers it is because my team and I at QCRI are developing a similar platform called Artificial Intelligence for Disaster Response, or AIDR. While our system is first and foremost geared towards classifying tweets, it can also be used to filter large volumes of SMS). The automated platform classifies incoming text messages into one (or more) of the following categories: water, health & nutrition, orphans & vulnerable children, violence against children, education, employment, social policy, emergency, u-report, energy, family & relationships, irrelevant and poll.
IBM created machine learning classifiers that are 40% more accurate than a keyword based approach for automate classification. The predictive quality of the individual classifiers ranged from a low of 69.8% for family & relationships and a high of 98.4 for water-related issues. See full list of results in table above. Note that the IBM platform is limited to English-based text messages but the team is looking to provide multi-lingual support in the future.
UNICEF is using this system to automatically route classified tweets to the appropriate departments. For example, UNICEF recently received a surge of text messages about nodding disease and responded by sending out a series of mass SMS’s to communities living in the affected region. These text messages provided information on how to recognize symptoms and ways to get treated. The feedback loop also includes government agencies and ministries. Indeed, all Members of Parliament and Chief Administrative Officers receive SMS updates based on the automated classification platform.
U-report is now being deployed in Zambia, South Sudan, Yemen, Democratic Republic of Congo, Zimbabwe and Burundi. I plan to get in touch with the team at IBM to learn more about these deployments and explore where we at QCRI may be able to help given our related work on AIDR. In the meantime, many thanks to my colleague Claudia Perlich for pointing me to this project. To learn more about IBM’s automated system, please see this paper (PDF).
|
<urn:uuid:93d44cfe-3539-456f-a3b4-4157ccafea8e>
|
CC-MAIN-2017-04
|
https://irevolutions.org/2013/08/26/making-all-voices-count-using-sms-and-advanced-computing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00124-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.929408
| 611
| 2.765625
| 3
|
PatientPlus articles are written by UK doctors and are based on research evidence, UK and European Guidelines. They are designed for health professionals to use, so you may find the language more technical than the condition leaflets.
Synonyms: lobular capillary haemangioma
Pyogenic granulomata are common benign vascular lesions of the skin and mucosa. They are not infective, purulent or granulomatous (as the name might suggest) - rather, a reactive inflammatory mass of blood vessels and a few fibroblasts within the dermis of the skin.
- Not fully understood: rapid growth occurs in response to an unknown stimulus that triggers endothelial proliferation and angiogenesis.
- Trauma and burns can provoke the sequence but frequently there is no identifiable cause.
- Other suggested causes include viral oncogenes, hormonal influences (pregnancy, oral contraceptive pill) and cytogenetic abnormalities.
- They have also been associated with certain medications:
- Add notes to any clinical page and create a reflective diary
- Automatically track and log every page you have viewed
- Print and export a summary to use in your appraisal
- Mean age for presentation is 6-7 years. Thereafter, there is a decrease in incidence with age. They represent 0.5% of skin nodules in children.
- They are more common in women, due to frequent formation on the gingiva during pregnancy (pregnancy tumour, or epulis gravidarum) - occurring in up to 5% of pregnancies.
- Solitary, red, purple or yellow papule or nodule arising from normal skin.
- Size varies from a few millimetres in diameter to several centimetres.
- Polypoid appearance - they often develop a stalk or 'collarette' of scale at the base.
- Friable lesion - they are often seen to be bleeding, crusted or ulcerated.
Pyogenic granuloma images
- Rapid eruption and growth over a few weeks.
- Most commonly, they occur on the head, neck and extremities (particularly the fingers).
- They occasionally occur on the external genitalia.
- In pregnancy, they are most likely to occur on the maxillary intraoral mucosal surface during the second and third trimesters.
- They have also been reported on the labial mucosa in men.
- Rarely, multiple satellite lesions may develop - especially in adolescents and young adults after prior attempts to remove the original lesion.
- Basal cell carcinoma
- Campbell de Morgan spot
- Glomus tumour
- Congenital haemangioma
- Kaposi's sarcoma
- Malignant melanoma
- Metastatic carcinoma of the skin
- Spitz naevus
- Squamous cell carcinoma
Some advocate sending all lesions for histological confirmation, because the vascular nature of the lesion makes dermoscopy unreliable. However, there may be occasions on which dermoscopy may be considered sufficient (eg, typical appearance in a very young child).
Primary Care management
- Most patients seek help because of the bleeding associated with the lesion.
- Treatment options include curettage and cautery, shave excision, excision with primary closure and laser therapy.
- Cryotherapy may work but does not provide a histological specimen for diagnosis.
- One study reported the use of sclerotherapy employing sodium tetradecyl sulfate as the sclerosant. As with cryotherapy, this technique does not provide a histological specimen. Moreover, sodium tetradecyl sulfate is only licensed for the treatment of varicose veins in the UK, so the usual considerations concerning the use of unlicensed medicines apply.
When to refer
- For assistance with diagnosis and removal
- Following a recurrence
- Where a nodular melanoma is suspected
Pain and bleeding are the most usual problems associated with this lesion.
- Pyogenic granulomata are benign lesions.
- Untreated lesions will atrophy eventually but only a minority will spontaneously involute within six months.
- Recurrence rates following treatment can be common regardless of treatment modality.
- Pregnancy tumours tend to regress spontaneously following childbirth so treatment should be postponed accordingly.
Further reading & references
- Murthy SC, Nagaraj A; Pyogenic granuloma. Indian Pediatr. 2012 Oct;49(10):855.
- Pyogenic Granuloma, DermNet NZ
- Badri T, Hawilo AM, Benmously R, et al; Acitretin-induced pyogenic granuloma. Acta Dermatovenerol Alp Panonica Adriat. 2011;20(4):217-8.
- Teknetzis A, Ioannides D, Vakali G, et al; Pyogenic granulomas following topical application of tretinoin. J Eur Acad Dermatol Venereol. 2004 May;18(3):337-9.
- Colson AE, Sax PE, Keller MJ, et al; Paronychia in association with indinavir treatment. Clin Infect Dis. 2001 Jan;32(1):140-3.
- Curr N, Saunders H, Murugasu A, et al; Multiple periungual pyogenic granulomas following systemic 5-fluorouracil. Australas J Dermatol. 2006 May;47(2):130-3.
- Paul LJ, Cohen PR; Paclitaxel-associated subungual pyogenic granuloma: report in a patient with breast cancer receiving paclitaxel and review of drug-induced pyogenic granulomas adjacent to and beneath the nail. J Drugs Dermatol. 2012 Feb;11(2):262-8.
- Durgun M, Selcuk CT, Ozalp B, et al; Multiple disseminated pyogenic granuloma after second degree scald burn: a rare two case. Int J Burns Trauma. 2013 Apr 18;3(2):125-9. Print 2013.
- Kamal R, Dahiya P, Puri A; Oral pyogenic granuloma: Various concepts of etiopathogenesis. J Oral Maxillofac Pathol. 2012 Jan;16(1):79-82. doi: 10.4103/0973-029X.92978.
- Jafarzadeh H, Sanatkhani M, Mohtasham N; Oral pyogenic granuloma: a review. J Oral Sci. 2006 Dec;48(4):167-75.
- Arikan DC, Kiran G, Sayar H, et al; Vulvar pyogenic granuloma in a postmenopausal woman: case report and review of the literature. Case Rep Med. 2011;2011:201901. doi: 10.1155/2011/201901. Epub 2011 Sep 8.
- Ravi V, Jacob M, Sivakumar A, et al; Pyogenic granuloma of labial mucosa: A misnomer in an anomolous site. J Pharm Bioallied Sci. 2012 Aug;4(Suppl 2):S194-6. doi: 10.4103/0975-7406.100269.
- Wolff K et al; Disorders of Melanocytes; Dermatologic Guide, 2007
- Zaballos P, Carulla M, Ozdemir F, et al; Dermoscopy of pyogenic granuloma: a morphological study. Br J Dermatol. 2010 Dec;163(6):1229-37. doi: 10.1111/j.1365-2133.2010.10040.x.
- Lacarrubba F, Caltabiano R, Micali G; Dermoscopic and histological correlation of an atypical case of pyogenic granuloma. Pediatr Dermatol. 2013 Jul;30(4):499-501. doi: 10.1111/pde.12123. Epub 2013 Mar 14.
- Pyogenic granuloma, Primary Care Dermatology Society, 2012
- Sacchidanand S, Purohit V; Sclerotherapy for the treatment of pyogenic granuloma. Indian J Dermatol. 2013 Jan;58(1):77-8. doi: 10.4103/0019-5154.105317.
Disclaimer: This article is for information only and should not be used for the diagnosis or treatment of medical conditions. EMIS has used all reasonable care in compiling the information but make no warranty as to its accuracy. Consult a doctor or other health care professional for diagnosis and treatment of medical conditions. For details see our conditions.
Dr Chloe Borton
Dr Laurence Knott
Prof Cathy Jackson
|
<urn:uuid:b0e3eb56-a15f-46d8-9a53-6c25899047a1>
|
CC-MAIN-2016-44
|
http://patient.info/doctor/pyogenic-granuloma
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00261-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.791845
| 1,870
| 2.625
| 3
|
The Philadelphia Jazz Project: Pushing Jazz Performance In New Directions
A former WRTI host stays close to jazz with an organization designed to extend its reach. WRTI’s Meridee Duddleston speaks with the founder of the Philadelphia Jazz Project.
Have popular “performance spectacles” replaced the straightforward dance between a jazz artist and an instrument? Director of the Philadelphia Jazz Project, Homer Jackson, is considering that question and innovative approaches to the performance of music that has often depended upon an intimate feel - and feeling.
The idea for the Philadelphia Jazz Project germinated in 2012; the non-profit officially took shape in 2013. Sponsored by The Painted Bride Art Center, with funding from The Wyncote Foundation, the fledgling organization aims to kick start a resurgence of popularity of jazz and a broadening of jazz audiences.
Homer Jackson thinks globally as he works locally to initiate jazz collaborations and partnerships. Cooperating with local promoters, musicians and other jazz organizations, the Philadelphia Jazz Project creates more performance outlets for jazz musicians, both live, digitally and on television.
As part of his work with Philadelphia Jazz Project, Jackson spearheads the important conversations about jazz, its history and future, and the masterful musicians who speak through their instruments. In the 1980s, Jackson was one of a group of young radio hosts at WRTI who were fascinated by jazz, but were not musicians. A visual artist, he says jazz has always been his muse.
"It’s still a mastery focused art form, and if you want to be good, if you want to be the best, and you’re an American, you at some point are going to have to bump into jazz," explains Jackson. "These people spend their entire lives developing this craft and their relationship with their instrument – whether it’s their voice or their physical instrument. They can speak through their instrument as if it were their skin. And that’s what any artist wants to accomplish - and the jazz musician has done that and still continues to do that. "
WRTI and the Philadelphia Jazz Project are presenting a unique concert, on July 31, featuring Afro-Brazilian percussion in a Big Band Jazz format - it's Letieres Leite and Orkestra Rumpilezz at the Temple University Performing Arts Center, with opening act Another Holiday for Skins. Details and ticket information here.
|
<urn:uuid:6ddbef54-7ead-498e-b409-9fffb62f4cd2>
|
CC-MAIN-2022-33
|
https://www.wrti.org/arts-desk/2015-07-06/the-philadelphia-jazz-project-pushing-jazz-performance-in-new-directions
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00476.warc.gz
|
en
| 0.970808
| 495
| 1.734375
| 2
|
Power vs opposition: From accusations to dialogue
“Fair elections have been the favorite topic in the recent months. In the majority of cases, any video published on the internet is automatically considered as an unconditional proof of fraud. And if anyone says that it should be studied by lawyers or experts, they are immediately accused of working in the interests of the authorities,” Medvedev said during a meeting of the Big (or Open) government, a new project aimed at involving civil society in legislative work and public discussion of key laws.
Dmitry Medvedev urged Russians to give up such rhetoric, which he believes only leads to a deadlock.
“Our problem is that we have learnt to draw conclusions on subjects in which we are not specialists,” the premier noted.
Some of the experts pointed out that there is a high level of distrust towards the court system in Russia.
Medvedev acknowledged that there still a long way to go in terms of the transparency of the court system, but at the same time stressed that it has become more open, both thanks to “reforms and some natural, technological reasons”.
In this regard, one of the aims of the Big government is to break down that distrust, he says.
“We should demonstrate with our own example that the power is ready to change,” he observed.
|
<urn:uuid:6283fc71-6bff-40f5-9992-ef0fe020ef9f>
|
CC-MAIN-2017-04
|
https://www.rt.com/politics/power-opposition-accusations-dialogue-911/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00217-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.968564
| 281
| 1.609375
| 2
|
Hours to Zero BACHow long to eliminate alcohol from your system?
You will probably be surprised to learn how much time it takes for your body to eliminate alcohol from the bloodstream even though you can raise your BAC quickly by slamming drinks. BAC goes down at a slow and predictable rate. This is because your liver can only metabolize a predictable blood alcohol concentration per hour.
The normal body will metabolize between .015 percent and .020 percent BAC per hour. We use a conservative .016 percent BAC per hour in the following charts. Some heavy drinkers may eliminate alcohol at a slightly higher rate and certain physical conditions may cause some people to metabolize alcohol at a slower rate.
The following charts will give you an idea of the number of hours it takes for women and men to reach zero BAC (no alcohol remaining in the blood stream) for a variety of body weights and different numbers of drinks.
1. Find the chart for women or men.
2. Find your weight along the bottom of the chart.
3. Find the amount of drinks consumed during the entire drinking episode in the left-hand column.
4. Note where the "Number of Drinks" consumed and your weight intersect. This is the number of hours to zero BAC from the time you started drinking.
|
<urn:uuid:e586edb2-333c-4d8c-9998-ed53706e70ac>
|
CC-MAIN-2017-04
|
http://www.selfcounseling.com/help/alcohol/hourstozerobac.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00035-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.911955
| 267
| 2.234375
| 2
|
The American shale boom has flooded the United States with vast new supplies of oil and gas, and that has been an obvious and undeniable boon to the American economy. But the shale revolution’s effects are being felt the world over, as evidenced by a recent comment from the head of the Energy Information Administration (EIA) that a barrel of oil, currently hovering just under $100, would run you $150 if it weren’t for this sudden, fracking-enabled black gold rush. Reuters reports:
Oil output from the oil-rich Bakken, Permian and Eagle Ford shale formations in those two states, as well as other smaller formations around the nation, has spiked in the past decade to more than 4 million barrels per day.That new oil has helped the United States weather supply disruptions from Libya, Iraq and other one-time major oil producers in which political and military turmoil has sharply depressed production, Sieminski said ahead of the North Dakota Petroleum Council’s annual meeting.“If we did not have the growth in North Dakota, in the Eagle Ford and the Permian, oil could be $150 (per barrel),” [U.S. Energy Information Administration chief Adam Sieminski] said. “There is a long list of countries with petroleum outages that add up to about 3 million barrels per day.”
New American supplies have come onto the market just as disruptions from major producers like Libya and Iraq have threatened supplies abroad. In some ways, it’s difficult to appreciate the impact of American oil because the price per barrel has remained relatively unchanged in recent years, but that lack of movement is itself evidence of the profound stabilizing power of the shale boom.There’s also a geopolitical bonus to this economic stability: many of the world’s petro-states rely heavily on a high price of oil to balance their budgets. These break-even prices vary country to country, but many analysts believe that bellicose Moscow can’t shore up its budget without an oil price at or above $105–110 per barrel. New sources of U.S. oil are preventing price spikes that would be a boon to Russia, and in that way are constraining Moscow’s choices. So much has been made of Vladimir Putin’s energy weapon, his ability to cut off gas to Europe. But America has one of its own.Frack, baby, frack.
|
<urn:uuid:0d3a76b9-a130-46a5-9af6-4ca63d722530>
|
CC-MAIN-2016-44
|
http://www.the-american-interest.com/2014/09/24/eia-chief-without-fracking-oil-would-be-150-a-barrel/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00467-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.968948
| 499
| 2.125
| 2
|
As a Nixon library official told the Register, displaying statues of world leaders—in this case, long dead ones—does not mean the federally run facility endorses their policies.
Ah, but there may be more to this out-in-the-open, clandestine-Red China-Commie plot unfolding in the heart of Nixonland. Chen's protest also coincides with the 60th anniversary of the founding of the People's Republic of China. And that coincides with another, dare we say controversial exhibit the private foundation that built the Nixon library is involved in: "Ping Pong Diplomacy: The Rematch."
You read that right, Joe McCarthy: the Nixon Foundation is one of the sponsors of an Oct. 17-18 table tennis tournament aimed at harkening back to the original 1971 and 1972 table tennis events between the United States and Chinese national table tennis teams that became known as "Ping Pong Diplomacy."
Featuring American and Chinese champs, Olympians, collegiate athletes and ripe-for-brainwashing youths, the tourney runs from 11 a.m. to 3 p.m. each day at Orange County's version of Red Square: South Coast Plaza in Costa Mesa.
Mr. President, tear down these balls!
And get this: this red-loving Love-In is tied to "Ancient Paths, Modern Voices: A Festival Celebrating Chinese Culture."
For the love of God, is there no end to this blatant Commie indoctrination?
Apparently not, for The Manchurian Candidatesque plot thickens: another exhibit bowing to Mao, this one displaying archival photographs from the original "Ping Pong Diplomacy" competition as well as photographs documenting Nixon's trip into the heart of darkness (China), will also be featured.
Mr. Chen, we pray you know what to do.
|
<urn:uuid:c6be949e-5acf-427d-9336-6be53f85ec62>
|
CC-MAIN-2017-04
|
http://www.ocweekly.com/news/chinese-american-protesters-seeing-red-at-nixon-library-6442146
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00160-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.918604
| 378
| 1.882813
| 2
|
It is of Greek origin, and its meaning is "God's honor". Biblical: Timothy was an energetic, well-trained young Christian who was a companion of Saint Paul, who wrote to him, "Let no man look down on your youth". According to tradition, he was martyred after denouncing worshippers of the Greek moon goddess Diana. 19th-century novelist Charles dogens gave the name an lasting rear endociation in his beloved work "A Christmas Carol". The story turns on the fate of the crippled but ever-cheerful Tiny Tim, who greets every holiday season with the cry, "God bless us, every one!" The name was uncommon until the 18th century. Timoteo and Timo are Spanish forms.Timothy has 19 variant forms: Tim, Timmo, Timmy,
an honor to god
In worship of God's glory and his word
people named timothy are always understanding
My crushes's name is Timmy and he is super cute, very atractive, sweet and really nice, athletic, smart, and really really really hilarious!!!!!!!! He has the perfect name.
My paw, dad, and brother!((:
cooler than jack
Timothy is My Father in the Lord. My mentoor its true that they honour God more than anything. I love Tim please check his website www. tim omotoso.org. God bless you as you do so
|
<urn:uuid:8532a18f-46cd-4154-abfd-29c9c6dbdada>
|
CC-MAIN-2016-44
|
http://what-does-my-name-mean.org/name/timothy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00355-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.975437
| 290
| 2.203125
| 2
|
Rose water. These can be used together or separately, depending on the individual. Usually found in puddings, salads, pastries and in coffee, the essences are distilled from the petals of the flowers, a process developed by the Arabs. The flower water on sale today is usually a dilution of this product. Rosewater is one of the earliest distilled products known to man and its manufacture has been an important industry in the Middle East for over 1200 years.
|
<urn:uuid:fd29063b-e36b-41da-8d79-2b43030df709>
|
CC-MAIN-2017-04
|
http://recipes.wikia.com/wiki/Mye-ward_wa_mye-al-zahr
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00215-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.961347
| 95
| 2.09375
| 2
|
How many kittens live after birth?
on Nov 19th 2012
in Other Kittens
- Cast your vote for which answer you think is best!
The survival rate of kittens depends on a lot of things. With the tens of thousands of homeless kittens in shelters today, I'd say a lot of them survive and probably just as many do not. Whether a kitten lives depends on the health of the queen, or mother cat, how often the queen has kittens, her age, where the kittens are born, how good a mother the queen is, if she and the babies are lucky enough to be rescued and cared for by a kind soul, and on and on. This is an interesting question and I wonder why you ask.
Izadore (Izzie) answered on 11/19/12. Helpful? / 0
|
<urn:uuid:b2c216fd-cc3f-4777-acde-676f2eb74f89>
|
CC-MAIN-2017-04
|
http://www.catster.com/answers/question/how_many_kittens_live_after_birth-67154
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00128-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.959035
| 170
| 2.15625
| 2
|
Our online tools make booking, managing your schedule and paying for lessons easy and hassle-free.
Easily search and compare teachers in your area, including past student reviews and background checks.
If you're not completely satisfied, we'll help you find a new teacher or refund any unused lesson credits.
Learning to play guitar takes time and effort, but it is also lots of fun and well worth the work. Sacramento is a great place to take guitar lessons because there are many local resources available to inspire you and help you sharpen your skills. With this in mind, start your guitar lessons in Sacramento and become a successful guitarist.
You have no need to worry if your guitar develops a problem and needs repair, there are many local shops in Sacramento that can fix guitars or sell you a new one Kline Music, Tim’s Music, and Skip’s Music are among the most popular and sell high quality new and used music instruments. For repairs, they ensure they set up the instruments to the manufacturers' specifications. Don’t let a small repair stand in the way of your guitar lessons in Sacramento- local experts have you covered!
Sacramento is also home to a vibrant arts community where musicians can check out live performances or even sign up to play. A few popular venues you should check out include Ace of Spades, Old Ironsides, Harlow’s, and Crawdad’s River Cantina.
There are quite a few annual events in Sacramento, including a music festival. This event fills the streets of Sacramento and local venues host of bands for all across the genre spectrum, and is a great way to see professional guitarists in their true element. Check out their website for more information regarding this year’s dates and lineup: http://sacmusicfest.com/
It is important to note that before you begin your music lessons, you should be well prepared way before for you to have a positive progress in your guitar lessons. Some of the things you should do or know before you begin your guitar lessons in Sacramento are such as:
You have to be patient and focused. Some common problems, such as pain in your fingertips, should not be the reasons for dropping your guitar lessons. This is a common problem to everyone starting guitar lessons until they develop some form of hardness on their fingers. Be patient during the process of developing your skills. You should remember that the journey of being a musician does not end. As long as you are a musician, there are new things to learn and new skills. The sooner you realize this fact, the easier it will be for you to take the next step to reach the next level.
Don’t look at your calendar. Unsuccessful guitar players are usually concerned to answer such questions as, how much time is needed for one to be a great guitarist. They count days. Although it is common to wonder on such issues, focusing on time will delay the process of achieving your goals on playing guitar. Good guitar playing results are not determined by the number of times you practice but rather how well you practice. Still, counting days will move your attention from important matters such as how to practice guitar effectively.
All Ages and Levels are welcomed! Please scroll down and view my student reviews, videos and pictures. Music Reading, Learning Songs of the students choice, Soloing/Improvising, Acoustic & Electric Guitar styles are all covered in private lessons with me.
I have been teaching the guitar 8 years. I'm building a strong foundation of techniques.I specialize in Blues, classical &typically use MelBay books and also have the following to use the Sheet music.
In addition,I emphasize how to read a good sight reading.
Riffs, reading music, tabs, songs, chords, performance opportunities... it's all here. From country, pop, blues, classical, jazz... everything from the ground up. Acoustic styles. Electric. It's all here!
Guitar tutoring available for all levels and styles! Beginner to advanced, I can help you to discover music or take your playing to the next level. I love teaching, and I LOOOVE music, and i'm here to share what I know with you!
Compare hundreds of teachers based on the criteria that matter to you, including background checks, age and experience.
When you've found the perfect match, schedule your lessons online using the teacher's real-time availability.
Your teacher will welcome you with a personalized curriculum to meet your specific goals and you'll be able to manage your entire schedule through our free online account.
Zero travel time is great for a busy schedule.
Typically priced lower than local lessons.
Online students stick with lessons as long as local students.
Take your voice to the next level. Download free video tutorials to start singing like the star you are!
Getting Started with Music Lessons guides you through selecting a teacher & preparing for your first lesson.
Kickstart your guitar playing. Download free video tutorials to learn about chord progressions, strumming, and more!
|
<urn:uuid:3ef602f3-094b-4d34-b906-995a9de0e7bb>
|
CC-MAIN-2017-04
|
https://takelessons.com/sacramento/guitar-lessons
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00576-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.953282
| 1,038
| 1.757813
| 2
|
Skills & Values: Alternative Dispute Resolution
Select a format
To purchase a printed version of this title, please visit www.caplaw.com.
Skills & Values: Alternative Dispute Resolution is designed to give students both theory and practical application for the skills and values which come into play during the various forms of alternative dispute resolution, including negotiation, mediation, collaborative law and arbitration. It may be successfully used as a as a stand-alone course book or as a practical supplement to a standard text. Each chapter focuses on a different aspect of the dispute resolution process. The idea is to read the material and then test and develop knowledge through exercises and simulations.
Skills & Values: Alternative Dispute Resolution actively encourages self-reflecting after each exercise Many attorneys go from case to case without ever reflecting on what they learned from the interactions. By doing this consciously in the beginning, students can train themselves to internalize the process, making them more intentional lawyers.
The Skills & Values series includes robust online content that is delivered through Web Courses. The content for the Teacher's Manual is also posted to the supporting Web Course. The online components of these books add an exciting dimension because they are designed to teach the current media-saturated generation of students in ways that are more effective for them.
Table of Contents
Chapter 1 INTRODUCTION TO ALTERNATIVE DISPUTE RESOLUTION
Part One NEGOTIATION
Chapter 2 INTRODUCTION TO NEGOTIATION
Chapter 3 THINKING ABOUT NEGOTIATING
Chapter 4 UNDERSTANDING THE NEGOTIATION PROCESS
Chapter 5 ETHICAL BOUNDARIES AND DILEMMAS
Chapter 6 ADDITIONAL NEGOTIATION TECHNIQUES
Chapter 7 NONVERBAL COMMUNICATION - THE WORDLESS MESSAGE
Chapter 8 INFLUENCE OF NEGOTIATOR STYLES
Chapter 9 AN INTRODUCTION TO BRAIN SCIENCE
Part Two MEDIATION
Chapter 10 INTRODUCTION TO MEDIATION
Chapter 11 EXAMPLES OF TOPICS FOR MEDIATION
Part Three COLLABORATIVE LAW
Chapter 12 INTRODUCTION TO COLLABORATIVE LAW
Part Four ARBITRATION
Chapter 13 INTRODUCTION TO ARBITRATION
Chapter 14 VARIOUS KINDS OF ARBITRATION
Chapter 15 PUTTING IT ALL TOGETHER
|
<urn:uuid:9db9ddab-60c7-4d8b-b819-c13901419d4f>
|
CC-MAIN-2017-04
|
https://store.lexisnexis.com/categories/product/skills-values-alternative-dispute-resolution-skuusSku19650518
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00245-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.854881
| 509
| 3.140625
| 3
|
The rising number of COVID-19 infections and deaths in Barbados is not the only battle facing Government. It must now confront a downgrade by the Organisation for Economic Cooperation and Development (OECD).
While COVID-19 infections rose to 60 and a second death was reported yesterday, the OECD released its latest peer review report which charged that Barbados’ compliance with the OECD’s standard on transparency and exchange of information on request, had fallen from “largely compliant” to “partially compliant”.
According to the OECD rating, “partially compliant” is one step up from “non-compliant”.
The announcement came from the OECD’s Global Forum on Transparency and Exchange of Information for Tax Purposes, which published eight peer review reports. It contended that the island’s legal and regulatory framework was overall in line “with the standard, including concerning the availability of beneficial ownership information”.
But the Paris-based grouping contended that the “practical implementation of the relevant rules remains, however, a challenge”.
When a country is “largely compliant”, the OECD assesses that the standard is “implemented to a large extent but improvements are needed”.
A country is regarded as “partially compliant” when the standard is only partly implemented, but at least one material deficiency has, or is likely to have, a significant effect on the exchange of information on request.
Non-compliance reflects fundamental deficiencies in the implementation of the standard.
In 2019, Prime Minister Mia Mottley significantly lowered the local corporate tax rate to align it with the international business sector at a maximum of 5.5 per cent. The move was intended to prevent black listing of the international business sector.
The move, however, has resulted in Government losing more than $40 million in corporate tax revenue in 2019.
|
<urn:uuid:fc834057-fde0-490e-8ae6-3f1cd2890d7e>
|
CC-MAIN-2022-33
|
https://barbadostoday.bb/2020/04/08/oecd-knocks-barbados-rating/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00678.warc.gz
|
en
| 0.940128
| 397
| 2.015625
| 2
|
Constructing suitable ordinary pairing-friendly curves: A case of elliptic curves and genus two hyperelliptic curves
Kachisa, Ezekiel Justin (2011) Constructing suitable ordinary pairing-friendly curves: A case of elliptic curves and genus two hyperelliptic curves. PhD thesis, Dublin City University.
Full text available as:
One of the challenges in the designing of pairing-based cryptographic protocols is to construct suitable pairing-friendly curves: Curves which would provide ecient implementation without compromising the security of the protocols. These curves have small embedding degree and large prime order subgroup. Random curves are likely to have large embedding degree and hence are not practical for implementation of pairing-based protocols.
In this thesis we review some mathematical background on elliptic and hyperelliptic curves in relation to the construction of pairing-friendly hyper-elliptic curves. We also present the notion of pairing-friendly curves. Furthermore, we construct new pairing-friendly elliptic curves and Jacobians of genus two hyperelliptic curves which would facilitate an efficient implementation in pairing-based protocols. We aim for curves that have smaller values than ever before reported for dierent embedding degrees. We also discuss optimisation of computing pairing in Tate pairing and its variants. Here we show how to eciently multiply a point in a subgroup dened on a twist curve by a large cofactor. Our approach uses the theory of addition chains. We also show a new method for implementation of the computation of the hard part of the nal exponentiation in the calculation of the Tate pairing and its variant
Archive Staff Only: edit this record
|
<urn:uuid:22958020-980e-4486-9fc9-82d982f05b57>
|
CC-MAIN-2017-04
|
http://doras.dcu.ie/16598/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00267-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.89834
| 335
| 1.664063
| 2
|
Overview of case study
Aroma Australia Pty Ltd is a successful company which performed very well in instant coffee industry. To prepare for a move into Japanese market, Ken Ishiguro who is the marketing manager of Aroma did amount of marketing researches on the instant coffee in Japan. Originally he came to the conclusion that it would be difficult for Aroma to enter Japanese market, due to the culture difference between Japanese and western consumers.
However, as there was not enough consumer behaviour data, research conducted on 1000 households in Tokyo by Market Intelligence Corporation (MIC) on this factor was used to further analyse the market. The report gave a variety of information in several consumer behaviour factors towards the leading instant coffee brand. Moreover, it provided a predicted data on the whole Japanese coffee market with a model called NBD-Dirichlet for purchase incidence and brand choice. The drawback to this model is that it didn’t consider the reason behind decision made by individual consumer on particular occasion. Ken compared five product categories to help him to face some challenges. With these data, which make him understand Japanese consumer buy brands of instant coffee.
Analysis and Evaluation of Questions
1. Consider why it is important for a marketing manager such as Ken Ishiguro to focus on consumer behaviour as well as consumer attitude, beliefs and intentions.
Ajzen (1991) proposed theory of planned behaviour (TPB). TPB hypothesis the higher attitudes toward the behaviour, subjective norms and perceived behavioural control are related to the stronger behavioural intention. Furthermore, behavioural intention can make significant contributions to predict behaviour (Ajzen 1991).
For Aroma Australia Pty Ltd, which wants to enter new market, it focuses on these factors can predict decision-making to apply different strategise and find out the target market. However, these factors are a part of the reasons to predict and explain consumers to purchase products. To Ken, the most efficient way to save money is directly to understand consumers’ purchasing-behaviour. By researching past purchase behaviour what would be a source of information for affecting particular intention and identifying attitudes (d’Astous et al. 2005; Norman & Conner 2006). Therefore, Ken can minimise the risk and create “purple cow” to Japanese market.
2. Looking at the instant coffee data in Tables 1 and 2, describe ant patterns that you observe.
From the table1, it can clearly be seen that the leading brand of instant coffee market is Nesgold which accounted for 39 percentages, followed by Nescafé, Maxim, Minor brands, Maxwell House, Other Nestlé and Other general Foods. Especially, the proportion of Nestlé Company was over 60% which dominates Japanese instant coffee. Generally speaking, there is a positive correlation between market share of the brands and other four aspects of the research included penetration percentage, average purchase frequency per buyer, share of category requirements and percentage of loyal buyers. While the market share decreased, the other four columns reduced as well.
Taking a closer look at the table 2, it is revealing the percentage of buyers of one brand who also bought competing brands. It’s obvious that there were a positive correlation between market share and duplication purchase. Brands with lager market share are generally also bought more frequently than smaller brands. Moreover, the phenomenon that buyers of smaller brands tend to be less loyal is called double jeopardy (Ehrenberg, Goodhaedt & Barwise 1990).
From the observing the tables, however, it is one particularly interesting fact highlighted is that there were only two brands which didn't follow completely in accordance with the pattern in both tables are Maxim and Other General Foods. The former is a local Japanese brand which had a...
|
<urn:uuid:cd7dd9ee-e856-448b-bae8-a9a5cc963c94>
|
CC-MAIN-2017-04
|
http://www.studymode.com/essays/Aroma-Australia-Pty-Ltd-Goes-To-432307.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00401-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.962795
| 753
| 1.9375
| 2
|
Charles Dickens' Nicholas Nickleby performed by his great-great-grandson Gerald Dickens. A tale that brings to life the adventures of Nicholas Nickleby as he meets the wicked Wackfors Squeers, the theatrical Crumbles, and the cheerful Cheerybyle Brothers (to name a few). Complete and unabridged.
We've sent an email with your order details. Order ID #:
To access this title, visit your library in the app or on the desktop website.
Long as Dickens was paid by the word!
- S. Tolbert
Wonderful narration of a wonderful novel!
|
<urn:uuid:b382f4a0-7555-4874-9b6d-ce8151d0515e>
|
CC-MAIN-2016-44
|
https://mobile.audible.com/pd/Classics/Nicholas-Nickleby-Dickens-on-Dickens-Audiobook/B0096C234O
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00117-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.923523
| 128
| 1.625
| 2
|
Class Size: Millions
Annual cost to go to Stanford (tuition, room & board, books):
Once upon a time (like when I was 18), a year at Stanford was expensive but still affordable.
So, someone from a middle class, Minnesota family (mine) could swing it with a little financial aid and some loans.
At $60k a year, no way.
In the future, though, thanks to a combination of accelerating technology and shifting academic attitudes, it’s quite possible that anyone can “go” to Stanford — for free!
Or more accurately, audit courses taught there online.
No, the online experience won’t let you partake in late night study sessions, run in the foothills by The Dish, or join in Big Game festivities.
However, if Stanford’s initiative catches on, it’s conceivable that its faculty might go from teaching hundreds or thousands to teaching millions, all over the world.
P.S.: Full disclosure: even some of the students who go to Stanford don’t “go to Stanford” — or at least, physically attend all the courses they’re enrolled in.
Thanks to something called “lecture notes” that was just becoming popular when I was there, you could subscribe to a service that provided a “Cliff’s Notes” version of every lecture, later that day, for a wide selection of entry-level courses.
|
<urn:uuid:8a62511b-d15e-4c6c-ada1-221d194b38df>
|
CC-MAIN-2022-33
|
https://rosskaplan.com/2011/10/going-to-stanford-now-it-comes-to-you/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00077.warc.gz
|
en
| 0.955034
| 327
| 1.648438
| 2
|
There is huge variation in fuel efficiency between transatlantic airlines, with British Airways and Lufthansa emitting 51% more carbon dioxide than the cleanest flyers, according to a report by the organisation that revealed the VW test-rigging scandal.
Pollution from a non-stop transatlantic round trip averages around one tonne of CO2 per passenger, the International Council on Clean Transportation (ICCT) research found – the same as would be clocked up in a year by commuting 22 miles to work daily in a Toyota Prius.
Separately, a leaked European parliament study seen by the Guardian has forecast that the aviation and shipping industries will make up 39% of global CO2 emissions by 2050, based on present trends.
The ICCT report said a typical passenger on Norwegian Air Shuttle travelled 40km per litre of fuel, while flyers on British Airways and Lufthansa travelled only 27km.
Dan Rutherford, an author of the report, said: “Eighty per cent of the difference can be explained by two factors: seating configurations – how much premium, business and first-class seating you have – and the fuel burn of an aircraft, or how efficient it is. Norwegian Air Shuttle has invested more in newer, more fuel-efficient planes, while BA is using older, predominantly 747 aircraft.”
First-class and business passengers accounted for a disproportionate amount of the pollution. Premium passengers were responsible for 14% of available seat kilometres flown on transatlantic routes, but they accounted for around one-third of total carbon emissions, the paper found.
Other poor performers in the study included United Airlines, Virgin Atlantic and American Airlines, who scored barely above BA and Lufthansa. At the other end of the table, Air Berlin, KLM and Aer Lingus averaged 36km per litre of fuel.
Rutherford said the results, which will be filed with the International Civil Aviation Organisation (Icao), showed a deterioration from last year’s rankings, which revealed a 25% difference between best and worst performers.
“There is a large and underestimated potential for in-sector CO2 emission reductions,” the report states. “This highlights the role for additional policies to limit aviation emissions, notably the CO2 standard being developed by the Icao and a global market-based measure to price aviation carbon.”
International airlines and shipping companies are not currently obliged to cut their CO2 output. An attempt to include aviation in the EU’s emissions trading system was defeated two years ago. Icao says it will try for carbon neutral growth after 2020, but expects no new policies before an assembly in November 2016.
The projections in the leaked European parliament study suggest that aviation and shipping will continue to increase their share of global emissions. It predicts that by 2050 aviation will account for 22% of the total, and shipping 17%.
“Clearly this would derail the efforts in Paris to stay within two degrees’ warming,” said Sotiris Raptis, a shipping policy officer at Transport & Environment. “Any deal in Paris must lead to an emissions reduction target for aviation and shipping, like all other sectors of the global economy.”
Airline emissions are currently responsible for an estimated 5% of global warming, and the shipping industry around half that, and both figures are growing fast. Globally, aircraft emitted about 700m metric tonnes of CO2 in 2013, and without policy intervention that figure is expected to triple by 2050.
The issue will be discussed at the Paris climate summit, after an attempt to remove it from the draft text was blocked.
|
<urn:uuid:25a62da6-5a27-4b73-a84c-2b7aa5492210>
|
CC-MAIN-2017-04
|
https://www.theguardian.com/business/2015/nov/16/large-variation-found-in-airlines-co2-emissions
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00051-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.944579
| 744
| 2.515625
| 3
|
So, I co-wrote this book on virtual security and am a former VMware Cloud Solutions Architect. And I'll preface this advice by saying that, if you want to talk more in depth, feel free to ping me. First initial, last name at gmail will work. (The email I have attached to slashdot I glance at occasionally, but it gets almost purely spam and so I'd likely miss anything.)
From my perspective, the first question is which hypervisor to use:
- VMware is mature, you can get a free license for the base hypervisor (which is quite feature rich; this is no trial product) for up to 32GB per physical box, is widely used. If VMware remains as relevant in the future as it is now, it's actually a very solid skillset to have.
- If you have physical hosts over 32GB, VMware ceases to be free
- Some features require more advanced VMware stuff, including vCenter server, which isn't free - for example, VMware's live vm migration feature (vMotion)
- VMware is almost entirely closed on the internals; hypervisor is closed source (other than a not-useful-for-your-purposes "open source" bundle that contains their modified GPL code only); they have a bunch of APIs for internal functions (ie, tracking changed blocks on the virtual iscsi devices, for example), but those are generally restricted to partners; so if your students want to actually hack the virtualization layer, they can't. Then again, letting them do so wouldn't really be safe.
- On the other hand, VMware layers do have nice APIs that are reasonably accessible for doing non-internals stuff; things like powering VMs on and off, changing their allocated RAM and cpus, etc
- VMware has a nice set of tools, including CLI tools, which work well even with the free versions, that can allow you to move virtual machines in and out of specific hypervisors (not while the VMs are powered on), and into and out of VMware's desktop products (Workstation for Windows and Linux, Fusion for Mac). (google ovftool for the cross-platform CLI tool, for example; it can import/export to/from ESX, vCenter Server, Workstation, Fusion, and vCloud instances)
- VMware has a nice set of tools for snapshots and backups, even on the base hypervisor; for example, I have a personal ESX box at a provider and I use this tool to back up the VMs back and forth, which can be done from outside the OS without powering the VM down, and it's free.
- I found using some things I'd think of as mandatory for a lab environment (ie, thin provisioning) were just built-in on the VMware side and required a fair bit of extra work and added extra wrinkles
The virtual networking on VMware is dramatically more mature from my experience; my experience with Xen & KVM is now dated (it's been 2 years since I was in the thick of writing that book, which was the last time I was really in the thick of exploring the open-source hypervisor networking bits). I found that depending on the version of the hypervisor OS, which hypervisor, which kernel, which guest, etc, you could fall into all sorts of traps. I had some examples in the book where I showed, for example, generating and applying ebtables configurations to the host OS (the Xen Linux hypervisor OS) to block forged frames from coming across the bridge from one of the guest Linuxes, for example.
Compare that to the VMware side, you could in theory wire up everything to dumb hubs, even, and enforce network separation at the hypervisor layer with VLAN tags applied to the portgroups where you attach VMs. (Warning: not suggesting you blindly do that; but VLAN enforcement on the VMware side is fairly rigid if configured in a good way.)
My own book is a fun read for some of these concerns, although Haletky's book is probably the canonical work on the subject. (Although it is -slightly- dated from being a bit old, it is still a wealth of great information, and it was a huge help to me as a primer when I first joined VMware.)
Depending on how far you want to deep dive, my second choice might be Xen+Eucalyptus; if you could front-end your hypervisors with Eucalyptus and build an internal cloud, you'd also get your students one foot on the road to playing devops with AWS. (There are plenty of VMware clouds out there, but I don't know of any offhand that have the equivalent of the AWS micro tier, which would let students even occasionally deploy their boxes to the net.)
One final consideration is that VMware actually gracefully does nested virtualization; you can run ESX inside ESX, and you can run Xen inside of ESX, and they generally function well. The Xen FAQ implies Xen supports it, but I'm unsure if Xen can nest VMware or KVM for variety; I can say from experience that I had VMware, with Xen inside it, with a guest OS inside that, all on my laptop just fine.
Good luck! This is super-fun. I will say: don't overlook the value of the actual virtualization layer experience! It is currently far harder to find solid virtualization & cloud engineers than it is to find a Linux admin. The rise of virtual appliances and infrastructure as an extension of code makes me feel like the devops & virtualization skillsets will remain in strong demand, and operating systems may be simply seen as containers for applications.
|
<urn:uuid:99df6d8f-9b3b-426b-ac9e-6f1ac325f0fa>
|
CC-MAIN-2016-44
|
https://slashdot.org/~MattW
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00293-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.957305
| 1,172
| 2
| 2
|
Russian President Vladimir Putin signed an order Wednesday allowing residents of the southern Ukrainian regions of Kherson and Zaporizhzhia to apply for Russian citizenship—another sign of Russia’s plans for long-term control in the region.
Putin issued the decree Wednesday that approves fast-tracked citizenship applications for people in the Kherson and Zaporizhzhia regions largely held by Russian forces since it launched its invasion of Ukraine in February.
The decree comes two weeks after the deputy head of Kherson’s Russian-installed administration said he plans to appeal directly to Putin to become a “proper region of the Russian Federation” via annexation, an idea Kremlin spokesman Dmitry Peskov expressed warmth to.
The citizenship decree is a “glaring” sign Putin “intends to de facto annex” regions of southern Ukraine Russian forces control, Politico reporter Christopher Miller tweeted.
Russia has controlled most of the Kherson and Zaporizhzhia regions since early March, part of its largest territory gained outside of the Donetsk and Luhansk separatist states in Ukraine’s Donbas region. Many have predicted Russia would soon seek to annex Ukrainian territory it controls as soon as this month in a similar process to its forcible annexation of Crimea in 2014, but the Kremlin has yet to do so. Instead, Russia has turned to the “passportization” tool it has used for decades to exert control in foreign countries. Donbas residents have been able to apply for Russian passports under the same fast-tracked program since 2019. Ukrainian President Volodymyr Zelensky said last year this program was indicative of Russia’s plans to annex the region.
About 530,000. That’s how many Ukrainians living in the Donbas region received Russian passports between 2019 and mid-2021, according to Harvard University research published in January.
|
<urn:uuid:65b6f06b-6a77-4927-8d34-f5358bc17c95>
|
CC-MAIN-2022-33
|
https://www.forbes.com/sites/dereksaul/2022/05/25/putin-signs-decree-fast-tracking-russian-citizenship-applications-from-southern-ukraine/?sh=76706b774f5b
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00474.warc.gz
|
en
| 0.940982
| 403
| 1.710938
| 2
|
A study by the University of Madrid professor Pedro Gonzalez has revealed that the percentage of young people aged 15-24 who call themselves Catholic dropped from 77 to 49 percent during the last decade and that almost half of them say religion classes were practically useless.
According to the study, the drop is the result of the Church’s positions on issues such as homosexual “marriage,” abortion or euthanasia, which are positions considered “unpopular” by young people.
Likewise, 79% think the Church is too rich and 82% think the Church’s teachings on sexual matters are outdated. However, half of all young people say the Church helps the poor and needy through institutions such as Caritas.
Regarding religion classes, almost half of all young people said they were completely useless. Thirty six percent thought they were somewhat or very helpful, while 10% said they did not take the classes.However, 43% of young people aged 15-24 expressed their desire to be married by the Church, while 22% would choose civil marriage, and only 16% would choose cohabitation.
|
<urn:uuid:1bbd5f2f-3dd2-40d7-b1db-da67fea5d405>
|
CC-MAIN-2017-04
|
http://www.catholicnewsagency.com/news/percentage_of_young_people_who_say_they_are_catholic_drops_drastically_in_spain/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00400-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.987035
| 224
| 1.867188
| 2
|
If you’re thinking of buying a semi-detached or attached home, it’s important to understand the difference. A semi-detached, or "semi," is a house, usually two or three stories high, that shares one exterior, or "party," wall with another house. An attached house is a row house of two, three, or more stories, where each of its sidewalls is shared or common with another house (except if it is the house at either end of the row). Attached houses are often called townhouses.
Semis and townhouses should not be confused with linked houses or links, which appear to be detached, but are linked together by foundations or a common basement parking facility.
Semis and townhouses have some advantages. For one thing, they are less expensive to build than detached homes, because they share a foundation and a wall or walls. As a result, when you buy a semi or townhouse, you may get more home for your buck. Typically, a semi or townhouse the same size as a detached house in the same neighborhood will cost somewhat less.
The common wall or walls also make semis and townhouses somewhat less expensive to heat and cool. And you may be able to get reduced rates on home improvement projects such as roof repairs or attic insulation by getting the work done at the same time and by the same contractor as your neighbor(s).
Privacy may be a problem with both semi and attached homes. Noise from neighbors is the number one concern. New semi-detached houses and townhouses should be insulated to reduce sound transmission between party walls, and have rooms arranged so that the rooms or features that are adjacent on opposite sides of common walls are compatible. Stairwells set against common walls provide the greatest privacy. The worst layout would put a bedroom in one house adjacent to a recreation room in the attached home.
A private backyard adds considerably to the value and enjoyment of a semi or townhouse. Good fencing, landscaping and carefully positioned patio doors can make even a small garden a pleasant extension of your home. If you’re house-hunting in summer, sit outside and see if you like the garden and whether it has a private feel. If it is in the middle of winter, try to envision the garden in summer.
While you’re in the backyard, check to make sure fencing is in good repair and that there are no outstanding disputes over overhanging trees, floodlights or other features. If the row house or semi next door has a pool, you’re likely in for a lot of noise in the summer.
In the front of the house, privacy is usually less of a concern. A good design maximizes the distance between the front doors of attached homes. It’s nice not to bump into your neighbors all the time, or to have to listen to them say good night to guests at two a.m. because your living room or bedroom windows are right next to their front door.
Lack of windows and natural light is also a drawback with some semis and townhouses, because there are windows on only two (or perhaps three, in the case of a semi) sides. Skylights, sun tubes, well-placed mirrors and light colored paints that reflect and make the most of what natural light is available can all mitigate this problem. But try to view a semi or townhouse during the day, so you can see how much natural light it gets.
Though sharing jobs can save money, upkeep of semis and townhouses can be problematic if you and your attached neighbors don’t have similar standards or tastes. If you hate your neighbor’s sagging porch or the color of his or her trim, you’ll just have to live with it. And when it comes time for you to sell, the condition and appeal of the attached home(s) may drag down the price you get.
However, semis and attached homes in many new developments are sold with covenants that restrict what owners can do to the facades of their houses and in public areas of the development. There can be even more restrictions when townhouses are sold as condominiums -- this means no one can ruin the look of the street by painting the front door and shutters purple and green. On the other hand, it means you may not be able to do just what you want, either. And you will pay fees for the upkeep of common areas.
REALTORS® say that the location of a home is a more important factor in its investment value than whether it is detached or a semi or townhouse. A townhouse or semi in a great location will appreciate more than a detached home in a run-down neighborhood.
Moreover, townhouse developments are preferred to detached houses by an increasing segment of the aging baby-boomer population who like the reasonable prices and low upkeep. The fact that subdivision developers now tend to build a townhouse component into every project is a sign of the growing popularity of this style of housing.
|
<urn:uuid:8f6dd739-1fdd-4e34-8485-d5e2eaec999a>
|
CC-MAIN-2016-44
|
https://www.lendingtree.com/mortgage/buying-a-townhouse-or-attached-article
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00148-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.962715
| 1,037
| 1.578125
| 2
|
A Twisted Sense of Duty and Love
by Barbara Ehrenreich and Rosa Ehrenreich Brooks
The Progressive magazine, November 2001
The other day, a l friend told us that what shook her up the
most after September 11 was the knowledge that many of the terrorists
had lived peaceably among Americans for several years before their
attacks, sending their children to our public schools, shopping
at the supermarket, ordering pizza, waving a friendly good morning
to their neighbors. "What chills me," she said, "is
the thought that they hate us so much that not even all those
daily interactions with Americans could humanize us for them."
That's become the prevailing explanation of the terrorist attacks
on September 11: We are up against an almost incomprehensible
form of "hate" or "evil."
But although "hate" and "evil" are powerfully
evocative words, they don't really tell us much. Indeed, we often
haul them out precisely as a way to avoid grappling with more
nuanced and troubling explanations for the horrific. On September
11, nineteen men knowingly went to their deaths in order to kill
Americans, stymieing experts in terrorist profiling. These men
were not desperate or bereft of hope: They had families, foreign
language skills, opportunities. They were not unsophisticated,
ignorant, or backward, "brainwashed" by simplistic promises
of sloe-eyed virgins in the paradise to come; they were highly
educated, cosmopolitan, people who lived easily among foreigners,
both in the U.S. and in Germany. Was cruelty all they knew? No:
Those who met them say they seemed like ordinary people, studying,
laughing, picking their children up at school.
Did they hate us in some particularly relentless, unreasoning
way? Perhaps, but what we need to acknowledge is that the September
11 terrorists may also have been motivated by their own understanding
of duty, honor, and sacrifice-the very same values that have motivated
our own soldiers in wars we consider just and necessary. Perhaps
they were motivated even by their own terrible, fiery, brand of
love, just as conventional warriors have, throughout history,
been sustained by love of country and comrades-to the point of
both dying and killing for them.
We shrink from the idea that the terrorists could have been
motivated by the same impulses that drive soldiers in respectable
wars. But imagine growing up, even in a middle-class household,
surrounded by suffering, hopelessness, poverty, and pain, in the
ruins of Kabul, in the Gaza Strip, in Algeria's ransacked towns,
or the bleak streets of Baghdad; imagine being brought up to believe
that the suffering you see around you is caused by the hypocrisy,
greed, obtuseness, and injustice of the arrogant and licentious
For millions of people in the Third World (and, increasingly,
in Europe, as well), it may seem that nothing can stop America
from taking far more than its fair share of the world's wealth,
or from trampling those with less power. America, after all, uses
the lion's share of the world's nonrenewable energy resources;
we produce disproportionate quantities of dangerous and non-biodegradable
waste; we send air strikes against any nation that angers us without
being willing to risk the loss of our own troops; we selectively
decry human rights abuses in countries we dislike but show little
willingness to criticize allies such as Israel, much less turn
the mirror upon ourselves; our dominance in the U.N. and other
international forums imposes what many see as unfair trade balances
and unduly harsh sanctions on nations such as Iraq-sanctions that
have a devastating effect on civilians. Striking out to teach
America a lesson might then, for some in the Middle East and elsewhere,
come to seem like a necessary action, arising out of duty, compassion,
and, ultimately, love.
If this seems paradoxical, we should remember that, although
laws and moral precepts prohibiting attacks on civilians are as
old as humanity itself, history and legend have repeatedly glamorized
and praised the slaughter of innocents. While few legal, religious,
or philosophical traditions are willing to absolve slaughter that
is motivated solely by sadism, many are willing to tolerate "necessary"
slaughter, however brutal-and definitions of "necessary"
are usually disturbingly vague.
In Book I of Samuel, for example, God orders Saul to punish
the Amalekites for their past actions against Israel: " 'Go
and smite [them], and utterly destroy all that they have; do not
spare them, but kill both man and woman, infant and suckling,
ox and sheep, camel and ass.' " (Indeed, when Saul slaughters
all the people but spares the king and most of the livestock,
God is so angered at Saul's failure to follow through on the letter
of his command that he rejects him as king of Israel.) The Romans
put whole populations to the sword when "necessary"
to take revenge for "treachery" against Rome. The Crusaders
raped and pillaged as they fought their most Christian of wars,
leaving Jerusalem, at one point, knee-deep in blood. Shakespeare's
Henry the Fifth warns his enemies that if they do not surrender,
he will license his men to sack the city:
. . . in a moment look to see
The blind and bloody soldier with foul hand
Defile the locks of your shrill shrieking daughters,
Your fathers taken by the silver beards
And their most reverend heads dashed to the walls,
Your naked infants spitted upon pikes....
During the Civil War, Sherman justified the burning of crops
and the bombardment of Southern cities by saying, "We are
not only fighting hostile armies but a hostile people" who
must be made "to feel the hard hand of war." And the
fire-bombing of Dresden and other German cities by Allied forces
killed several hundred thousand civilians. In Hiroshima, nearly
100,000 people-most of them civilians-died in a single hour after
the dropping of the atomic bomb. Three days later, in Nagasaki,
at least another 40,000 died when the United States dropped the
second atomic bomb (only 250 of the dead were in the Japanese
Most of the men who fought these battles were not sadists.
They did what they saw as their duty, and they did it as much
out of love of city or religion or nation as out of hatred of
the enemy. Many of them willingly gave their lives in the process.
To say that the September terrorists may have been motivated
by the kinds of feelings we respect in conventional warriors is
not to equate terrorism and war. In war, the potential victims
have been formally warned that they are at risk. A state of war
is known to exist, the warring parties have identified themselves,
and although the date and nature of any particular attack is not
known in advance by the victims, all are at least on notice of
the existence of the threat.
The September terrorists didn't bother with any of these niceties.
What is uniquely chilling about the attacks is precisely the absence
of authorship: The attacks had no stated purpose, no one has accepted
responsibility, and it is impossible to know what might prevent
further acts of violence. Even for terrorists, this degree of
indifference to public opinion is rare: Most of the time, even
terrorists at least declare themselves, make specific threats,
and issue concrete demands that, if met, would at least theoretically
end the terror. Mohammed Atta and his confederates evidently didn't
care what lessons we drew from their actions.
Still, the possibility that they acted not out of hatred but
out of a twisted sense of duty and love should make us pause before
trying to decide how the United States should respond. If the
attacks were motivated by a lofty sense of duty, then Bush's retaliatory
strikes that are killing civilians in Afghanistan or elsewhere
may merely harden the resolve of other terrorist "patriots"
to come. We may unwittingly foster a new generation of would-be
martyrs who grimly slaughter innocents in the belief that doing
so is an act of sacrifice and love.
Dismissing terrorism as a product of hate and evil is a luxury
we cannot afford. After all, if war is what we are getting into,
the first rule of war is never to underestimate the enemy.
Rosa Ehrenreich Brooks is an associate professor of law at
the University of Virginia School of Law, a former Senior Adviser
at the State Department's Human Rights Bureau, and a consultant
for the Open Society Institute. Barbara Ehrenreich is a columnist
for The Progressive and the author of "Nickel and Dimed:
On (Not) Getting By in America" (Metropolitan Books, 2001).
11th, 2001 - New York City
|
<urn:uuid:9a250eff-9058-4c9e-b300-f98522ec106c>
|
CC-MAIN-2017-04
|
http://www.thirdworldtraveler.com/Sept_11_2001/Twisted_Duty.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00468-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.955047
| 1,924
| 2.03125
| 2
|
The study of human T lymphocyte biology often involves examination of responses to activating ligands. T cells recognize and respond to processed peptide antigens presented by MHC (human ortholog HLA) molecules through the T cell receptor (TCR) in a highly sensitive and specific manner. While the primary function of T cells is to mediate protective immune responses to foreign antigens presented by self-MHC, T cells respond robustly to antigenic differences in allogeneic tissues. T cell responses to alloantigens can be described as either direct or indirect alloreactivity. In alloreactivity, the T cell responds through highly specific recognition of both the presented peptide and the MHC molecule. The robust oligoclonal response of T cells to allogeneic stimulation reflects the large number of potentially stimulatory alloantigens present in allogeneic tissues. While the breadth of alloreactive T cell responses is an important factor in initiating and mediating the pathology associated with biologically-relevant alloreactive responses such as graft versus host disease and allograft rejection, it can preclude analysis of T cell responses to allogeneic ligands. To this end, this protocol describes a method for generating alloreactive T cells from naive human peripheral blood leukocytes (PBL) that respond to known peptide-MHC (pMHC) alloantigens. The protocol applies pMHC multimer labeling, magnetic bead enrichment and flow cytometry to single cell in vitro culture methods for the generation of alloantigen-specific T cell clones. This enables studies of the biochemistry and function of T cells responding to allogeneic stimulation.
26 Related JoVE Articles!
Retroviral Transduction of T-cell Receptors in Mouse T-cells
Institutions: New York University School of Medicine, New York University School of Medicine.
T-cell receptors (TCRs) play a central role in the immune system. TCRs on T-cell surfaces can specifically recognize peptide antigens presented by antigen presenting cells (APCs)1
. This recognition leads to the activation of T-cells and a series of functional outcomes (e.g. cytokine production, killing of the target cells). Understanding the functional role of TCRs is critical to harness the power of the immune system to treat a variety of immunology related diseases (e.g. cancer or autoimmunity).
It is convenient to study TCRs in mouse models, which can be accomplished in several ways. Making TCR transgenic mouse models is costly and time-consuming and currently there are only a limited number of them available2-4
. Alternatively, mice with antigen-specific T-cells can be generated by bone marrow chimera. This method also takes several weeks and requires expertise5
. Retroviral transduction of TCRs into in vitro
activated mouse T-cells is a quick and relatively easy method to obtain T-cells of desired peptide-MHC specificity. Antigen-specific T-cells can be generated in one week and used in any downstream applications. Studying transduced T-cells also has direct application to human immunotherapy, as adoptive transfer of human T-cells transduced with antigen-specific TCRs is an emerging strategy for cancer treatment6
Here we present a protocol to retrovirally transduce TCRs into in vitro
activated mouse T-cells. Both human and mouse TCR genes can be used. Retroviruses carrying specific TCR genes are generated and used to infect mouse T-cells activated with anti-CD3 and anti-CD28 antibodies. After in vitro
expansion, transduced T-cells are analyzed by flow cytometry.
Immunology, Issue 44, T-cell, T-cell receptor, Retrovirus, Mouse, Transduction, Spleen
Visualizing Antigen Specific CD4+ T Cells using MHC Class II Tetramers
Institutions: Benaroya Research Institute, Benaroya Research Institute, Benaroya Research Institute.
Major histocompatibility complex (MHC) class II tetramers allow the direct visualization of antigen specific CD4+ T cells by flow cytometry. This method relies on the highly specific interaction between peptide loaded MHC and the corresponding T-cell receptor. While the affinity of a single MHC/peptide molecule is low, cross-linking MHC/peptide complexes with streptavidin increases the avidity of the interaction, enabling their use as staining reagents. Because of the relatively low frequencies of CD4+ T cells (~1 in 300,000 for a single specificity) this assay utilizes an in vitro amplification step to increase its threshold of detection. Mononuclear cells are purified from peripheral blood by Ficoll underlay. CD4+ cells are then separated by negative selection using biotinylated antibody cocktail and anti-biotin labeled magnetic beads. Using adherent cells from the CD4- cell fraction as antigen presenting cells, CD4+ T cells are expanded in media by adding an antigenic peptide and IL-2. The expanded cells are stained with the corresponding class II tetramer by incubating at 37 C for one hour and subsequently stained using surface antibodies such as anti-CD4, anti-CD3, and anti-CD25. After labeling, the cells can be directly analyzed by flow cytometry. The tetramer positive cells typically form a distinct population among the expanded CD4+ cells. Tetramer positive cells are usually CD25+ and often CD4 high. Because the level of background tetramer staining can vary, positive staining results should always be compared to the staining of the same cells with an irrelevant tetramer. Multiple variations of this basic assay are possible. Tetramer positive cells may be sorted for further phenotypic analysis, inclusion in ELISPOT or proliferation assays, or other secondary assays. Several groups have also demonstrated co-staining using tetramers and either anti-cytokine or anti-FoxP3 antibodies.
Immunology, Issue 25, CD4+ T cell, MHC class II, tetramers, peripheral blood mononuclear cells, in vitro expansion, flow cytometry
A Noninvasive Hair Sampling Technique to Obtain High Quality DNA from Elusive Small Mammals
Institutions: University of British Columbia, Okanagan Campus.
Noninvasive genetic sampling approaches are becoming increasingly important to study wildlife populations. A number of studies have reported using noninvasive sampling techniques to investigate population genetics and demography of wild populations1
. This approach has proven to be especially useful when dealing with rare or elusive species2
. While a number of these methods have been developed to sample hair, feces and other biological material from carnivores and medium-sized mammals, they have largely remained untested in elusive small mammals. In this video, we present a novel, inexpensive and noninvasive hair snare targeted at an elusive small mammal, the American pika (Ochotona princeps
). We describe the general set-up of the hair snare, which consists of strips of packing tape arranged in a web-like fashion and placed along travelling routes in the pikas’ habitat. We illustrate the efficiency of the snare at collecting a large quantity of hair that can then be collected and brought back to the lab. We then demonstrate the use of the DNA IQ system (Promega) to isolate DNA and showcase the utility of this method to amplify commonly used molecular markers including nuclear microsatellites, amplified fragment length polymorphisms (AFLPs), mitochondrial sequences (800bp) as well as a molecular sexing marker. Overall, we demonstrate the utility of this novel noninvasive hair snare as a sampling technique for wildlife population biologists. We anticipate that this approach will be applicable to a variety of small mammals, opening up areas of investigation within natural populations, while minimizing impact to study organisms.
Genetics, Issue 49, Conservation genetics, noninvasive genetic sampling, Hair snares, Microsatellites, AFLPs, American pika, Ochotona princeps
Multiplex PCR Assay for Typing of Staphylococcal Cassette Chromosome Mec Types I to V in Methicillin-resistant Staphylococcus aureus
Institutions: Alberta Health Services / Calgary Laboratory Services / University of Calgary, University of Calgary, University of Calgary, University of Calgary, University of Calgary.
Staphylococcal Cassette Chromosome mec
typing is a very important molecular tool for understanding the epidemiology and clonal strain relatedness of methicillin-resistant Staphylococcus aureus
(MRSA), particularly with the emerging outbreaks of community-associated MRSA (CA-MRSA) occurring on a worldwide basis. Traditional PCR typing schemes classify SCCmec
by targeting and identifying the individual mec
gene complex types, but require the use of many primer sets and multiple individual PCR experiments. We designed and published a simple multiplex PCR assay for quick-screening of major SCCmec
types and subtypes I to V, and later updated it as new sequence information became available. This simple assay targets individual SCCmec
types in a single reaction, is easy to interpret and has been extensively used worldwide. However, due to the sophisticated nature of the assay and the large number of primers present in the reaction, there is the potential for difficulties while adapting this assay to individual laboratories. To facilitate the process of establishing a MRSA SCCmec
assay, here we demonstrate how to set up our multiplex PCR assay, and discuss some of the vital steps and procedural nuances that make it successful.
Infection, Issue 79, Microbiology, Genetics, Medicine, Cellular Biology, Molecular Biology, Biomedical Engineering, Bacteria, Bacterial Infections and Mycoses, Life Sciences (General), Methicillin-resistant Staphylococcus aureus (MRSA), Staphylococcal cassette chromosome mec (SCCmec), SCCmec typing, Multiplex PCR, PCR, sequencing
Modeling Astrocytoma Pathogenesis In Vitro and In Vivo Using Cortical Astrocytes or Neural Stem Cells from Conditional, Genetically Engineered Mice
Institutions: University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, Emory University School of Medicine, University of North Carolina School of Medicine.
Current astrocytoma models are limited in their ability to define the roles of oncogenic mutations in specific brain cell types during disease pathogenesis and their utility for preclinical drug development. In order to design a better model system for these applications, phenotypically wild-type cortical astrocytes and neural stem cells (NSC) from conditional, genetically engineered mice (GEM) that harbor various combinations of floxed oncogenic alleles were harvested and grown in culture. Genetic recombination was induced in vitro
using adenoviral Cre-mediated recombination, resulting in expression of mutated oncogenes and deletion of tumor suppressor genes. The phenotypic consequences of these mutations were defined by measuring proliferation, transformation, and drug response in vitro
. Orthotopic allograft models, whereby transformed cells are stereotactically injected into the brains of immune-competent, syngeneic littermates, were developed to define the role of oncogenic mutations and cell type on tumorigenesis in vivo
. Unlike most established human glioblastoma cell line xenografts, injection of transformed GEM-derived cortical astrocytes into the brains of immune-competent littermates produced astrocytomas, including the most aggressive subtype, glioblastoma, that recapitulated the histopathological hallmarks of human astrocytomas, including diffuse invasion of normal brain parenchyma. Bioluminescence imaging of orthotopic allografts from transformed astrocytes engineered to express luciferase was utilized to monitor in vivo
tumor growth over time. Thus, astrocytoma models using astrocytes and NSC harvested from GEM with conditional oncogenic alleles provide an integrated system to study the genetics and cell biology of astrocytoma pathogenesis in vitro
and in vivo
and may be useful in preclinical drug development for these devastating diseases.
Neuroscience, Issue 90, astrocytoma, cortical astrocytes, genetically engineered mice, glioblastoma, neural stem cells, orthotopic allograft
2D and 3D Chromosome Painting in Malaria Mosquitoes
Institutions: Virginia Tech.
Fluorescent in situ
hybridization (FISH) of whole arm chromosome probes is a robust technique for mapping genomic regions of interest, detecting chromosomal rearrangements, and studying three-dimensional (3D) organization of chromosomes in the cell nucleus. The advent of laser capture microdissection (LCM) and whole genome amplification (WGA) allows obtaining large quantities of DNA from single cells. The increased sensitivity of WGA kits prompted us to develop chromosome paints and to use them for exploring chromosome organization and evolution in non-model organisms. Here, we present a simple method for isolating and amplifying the euchromatic segments of single polytene chromosome arms from ovarian nurse cells of the African malaria mosquito Anopheles gambiae
. This procedure provides an efficient platform for obtaining chromosome paints, while reducing the overall risk of introducing foreign DNA to the sample. The use of WGA allows for several rounds of re-amplification, resulting in high quantities of DNA that can be utilized for multiple experiments, including 2D and 3D FISH. We demonstrated that the developed chromosome paints can be successfully used to establish the correspondence between euchromatic portions of polytene and mitotic chromosome arms in An. gambiae
. Overall, the union of LCM and single-chromosome WGA provides an efficient tool for creating significant amounts of target DNA for future cytogenetic and genomic studies.
Immunology, Issue 83, Microdissection, whole genome amplification, malaria mosquito, polytene chromosome, mitotic chromosomes, fluorescence in situ hybridization, chromosome painting
Setting-up an In Vitro Model of Rat Blood-brain Barrier (BBB): A Focus on BBB Impermeability and Receptor-mediated Transport
Institutions: VECT-HORUS SAS, CNRS, NICN UMR 7259.
The blood brain barrier (BBB) specifically regulates molecular and cellular flux between the blood and the nervous tissue. Our aim was to develop and characterize a highly reproducible rat syngeneic in vitro
model of the BBB using co-cultures of primary rat brain endothelial cells (RBEC) and astrocytes to study receptors involved in transcytosis across the endothelial cell monolayer. Astrocytes were isolated by mechanical dissection following trypsin digestion and were frozen for later co-culture. RBEC were isolated from 5-week-old rat cortices. The brains were cleaned of meninges and white matter, and mechanically dissociated following enzymatic digestion. Thereafter, the tissue homogenate was centrifuged in bovine serum albumin to separate vessel fragments from nervous tissue. The vessel fragments underwent a second enzymatic digestion to free endothelial cells from their extracellular matrix. The remaining contaminating cells such as pericytes were further eliminated by plating the microvessel fragments in puromycin-containing medium. They were then passaged onto filters for co-culture with astrocytes grown on the bottom of the wells. RBEC expressed high levels of tight junction (TJ) proteins such as occludin, claudin-5 and ZO-1 with a typical localization at the cell borders. The transendothelial electrical resistance (TEER) of brain endothelial monolayers, indicating the tightness of TJs reached 300 ohm·cm2
on average. The endothelial permeability coefficients (Pe) for lucifer yellow (LY) was highly reproducible with an average of 0.26 ± 0.11 x 10-3
cm/min. Brain endothelial cells organized in monolayers expressed the efflux transporter P-glycoprotein (P-gp), showed a polarized transport of rhodamine 123, a ligand for P-gp, and showed specific transport of transferrin-Cy3 and DiILDL across the endothelial cell monolayer. In conclusion, we provide a protocol for setting up an in vitro
BBB model that is highly reproducible due to the quality assurance methods, and that is suitable for research on BBB transporters and receptors.
Medicine, Issue 88, rat brain endothelial cells (RBEC), mouse, spinal cord, tight junction (TJ), receptor-mediated transport (RMT), low density lipoprotein (LDL), LDLR, transferrin, TfR, P-glycoprotein (P-gp), transendothelial electrical resistance (TEER),
High-throughput, Automated Extraction of DNA and RNA from Clinical Samples using TruTip Technology on Common Liquid Handling Robots
Institutions: Akonni Biosystems, Inc., Akonni Biosystems, Inc., Akonni Biosystems, Inc., Akonni Biosystems, Inc..
TruTip is a simple nucleic acid extraction technology whereby a porous, monolithic binding matrix is inserted into a pipette tip. The geometry of the monolith can be adapted for specific pipette tips ranging in volume from 1.0 to 5.0 ml. The large porosity of the monolith enables viscous or complex samples to readily pass through it with minimal fluidic backpressure. Bi-directional flow maximizes residence time between the monolith and sample, and enables large sample volumes to be processed within a single TruTip. The fundamental steps, irrespective of sample volume or TruTip geometry, include cell lysis, nucleic acid binding to the inner pores of the TruTip monolith, washing away unbound sample components and lysis buffers, and eluting purified and concentrated nucleic acids into an appropriate buffer. The attributes and adaptability of TruTip are demonstrated in three automated clinical sample processing protocols using an Eppendorf epMotion 5070, Hamilton STAR and STARplus liquid handling robots, including RNA isolation from nasopharyngeal aspirate, genomic DNA isolation from whole blood, and fetal DNA extraction and enrichment from large volumes of maternal plasma (respectively).
Genetics, Issue 76, Bioengineering, Biomedical Engineering, Molecular Biology, Automation, Laboratory, Clinical Laboratory Techniques, Molecular Diagnostic Techniques, Analytic Sample Preparation Methods, Clinical Laboratory Techniques, Molecular Diagnostic Techniques, Genetic Techniques, Molecular Diagnostic Techniques, Automation, Laboratory, Chemistry, Clinical, DNA/RNA extraction, automation, nucleic acid isolation, sample preparation, nasopharyngeal aspirate, blood, plasma, high-throughput, sequencing
Laboratory Drop Towers for the Experimental Simulation of Dust-aggregate Collisions in the Early Solar System
Institutions: Technische Universität Braunschweig.
For the purpose of investigating the evolution of dust aggregates in the early Solar System, we developed two vacuum drop towers in which fragile dust aggregates with sizes up to ~10 cm and porosities up to 70% can be collided. One of the drop towers is primarily used for very low impact speeds down to below 0.01 m/sec and makes use of a double release mechanism. Collisions are recorded in stereo-view by two high-speed cameras, which fall along the glass vacuum tube in the center-of-mass frame of the two dust aggregates. The other free-fall tower makes use of an electromagnetic accelerator that is capable of gently accelerating dust aggregates to up to 5 m/sec. In combination with the release of another dust aggregate to free fall, collision speeds up to ~10 m/sec can be achieved. Here, two fixed high-speed cameras record the collision events. In both drop towers, the dust aggregates are in free fall during the collision so that they are weightless and match the conditions in the early Solar System.
Physics, Issue 88, astrophysics, planet formation, collisions, granular matter, high-speed imaging, microgravity drop tower
An Experimental and Bioinformatics Protocol for RNA-seq Analyses of Photoperiodic Diapause in the Asian Tiger Mosquito, Aedes albopictus
Institutions: Georgetown University, The Ohio State University.
Photoperiodic diapause is an important adaptation that allows individuals to escape harsh seasonal environments via a series of physiological changes, most notably developmental arrest and reduced metabolism. Global gene expression profiling via RNA-Seq can provide important insights into the transcriptional mechanisms of photoperiodic diapause. The Asian tiger mosquito, Aedes albopictus
, is an outstanding organism for studying the transcriptional bases of diapause due to its ease of rearing, easily induced diapause, and the genomic resources available. This manuscript presents a general experimental workflow for identifying diapause-induced transcriptional differences in A. albopictus.
Rearing techniques, conditions necessary to induce diapause and non-diapause development, methods to estimate percent diapause in a population, and RNA extraction and integrity assessment for mosquitoes are documented. A workflow to process RNA-Seq data from Illumina sequencers culminates in a list of differentially expressed genes. The representative results demonstrate that this protocol can be used to effectively identify genes differentially regulated at the transcriptional level in A. albopictus
due to photoperiodic differences. With modest adjustments, this workflow can be readily adapted to study the transcriptional bases of diapause or other important life history traits in other mosquitoes.
Genetics, Issue 93, Aedes albopictus Asian tiger mosquito, photoperiodic diapause, RNA-Seq de novo transcriptome assembly, mosquito husbandry
Isolation of Mouse Lung Dendritic Cells
Institutions: Louisiana State University .
Lung dendritic cells (DC) play a fundamental role in sensing invading pathogens 1,2
as well as in the control of tolerogenic responses 3
in the respiratory tract. At least three main subsets of lung dendritic cells have been described in mice: conventional DC (cDC) 4
, plasmacytoid DC (pDC) 5
and the IFN-producing killer DC (IKDC) 6,7
. The cDC subset is the most prominent DC subset in the lung 8
The common marker known to identify DC subsets is CD11c, a type I transmembrane integrin (β2) that is also expressed on monocytes, macrophages, neutrophils and some B cells 9
. In some tissues, using CD11c as a marker to identify mouse DC is valid, as in spleen, where most CD11c+
cells represent the cDC subset which expresses high levels of the major histocompatibility complex class II (MHC-II). However, the lung is a more heterogeneous tissue where beside DC subsets, there is a high percentage of a distinct cell population that expresses high levels of CD11c bout low levels of MHC-II. Based on its characterization and mostly on its expression of F4/80, an splenic macrophage marker, the CD11chi
lung cell population has been identified as pulmonary macrophages 10 and more recently, as a potential DC precursor 11
In contrast to mouse pDC, the study of the specific role of cDC in the pulmonary immune response has been limited due to the lack of a specific marker that could help in the isolation of these cells. Therefore, in this work, we describe a procedure to isolate highly purified mouse lung cDC. The isolation of pulmonary DC subsets represents a very useful tool to gain insights into the function of these cells in response to respiratory pathogens as well as environmental factors that can trigger the host immune response in the lung.
Immunology, Issue 57, Lung, dendritic cells, classical, conventional, isolation, mouse, innate immunity, pulmonary
Genetic Manipulation in Δku80 Strains for Functional Genomic Analysis of Toxoplasma gondii
Institutions: The Geisel School of Medicine at Dartmouth.
Targeted genetic manipulation using homologous recombination is the method of choice for functional genomic analysis to obtain a detailed view of gene function and phenotype(s). The development of mutant strains with targeted gene deletions, targeted mutations, complemented gene function, and/or tagged genes provides powerful strategies to address gene function, particularly if these genetic manipulations can be efficiently targeted to the gene locus of interest using integration mediated by double cross over homologous recombination.
Due to very high rates of nonhomologous recombination, functional genomic analysis of Toxoplasma gondii
has been previously limited by the absence of efficient methods for targeting gene deletions and gene replacements to specific genetic loci. Recently, we abolished the major pathway of nonhomologous recombination in type I and type II strains of T. gondii
by deleting the gene encoding the KU80 protein1,2
. The Δku80
strains behave normally during tachyzoite (acute) and bradyzoite (chronic) stages in vitro
and in vivo
and exhibit essentially a 100% frequency of homologous recombination. The Δku80
strains make functional genomic studies feasible on the single gene as well as on the genome scale1-4
Here, we report methods for using type I and type II Δku80Δhxgprt
strains to advance gene targeting approaches in T. gondii
. We outline efficient methods for generating gene deletions, gene replacements, and tagged genes by targeted insertion or deletion of the hypoxanthine-xanthine-guanine phosphoribosyltransferase (HXGPRT
) selectable marker. The described gene targeting protocol can be used in a variety of ways in Δku80
strains to advance functional analysis of the parasite genome and to develop single strains that carry multiple targeted genetic manipulations. The application of this genetic method and subsequent phenotypic assays will reveal fundamental and unique aspects of the biology of T. gondii
and related significant human pathogens that cause malaria (Plasmodium
sp.) and cryptosporidiosis (Cryptosporidium
Infectious Diseases, Issue 77, Genetics, Microbiology, Infection, Medicine, Immunology, Molecular Biology, Cellular Biology, Biomedical Engineering, Bioengineering, Genomics, Parasitology, Pathology, Apicomplexa, Coccidia, Toxoplasma, Genetic Techniques, Gene Targeting, Eukaryota, Toxoplasma gondii, genetic manipulation, gene targeting, gene deletion, gene replacement, gene tagging, homologous recombination, DNA, sequencing
A High Throughput MHC II Binding Assay for Quantitative Analysis of Peptide Epitopes
Institutions: Dartmouth College, University of Rhode Island, Dartmouth College.
Biochemical assays with recombinant human MHC II molecules can provide rapid, quantitative insights into immunogenic epitope identification, deletion, or design1,2
. Here, a peptide-MHC II binding assay is scaled to 384-well format. The scaled down protocol reduces reagent costs by 75% and is higher throughput than previously described 96-well protocols1,3-5
. Specifically, the experimental design permits robust and reproducible analysis of up to 15 peptides against one MHC II allele per 384-well ELISA plate. Using a single liquid handling robot, this method allows one researcher to analyze approximately ninety test peptides in triplicate over a range of eight concentrations and four MHC II allele types in less than 48 hr. Others working in the fields of protein deimmunization or vaccine design and development may find the protocol to be useful in facilitating their own work. In particular, the step-by-step instructions and the visual format of JoVE should allow other users to quickly and easily establish this methodology in their own labs.
Biochemistry, Issue 85, Immunoassay, Protein Immunogenicity, MHC II, T cell epitope, High Throughput Screen, Deimmunization, Vaccine Design
The Use of Fluorescent Target Arrays for Assessment of T Cell Responses In vivo
Institutions: Australian National University.
The ability to monitor T cell responses in vivo
is important for the development of our understanding of the immune response and the design of immunotherapies. Here we describe the use of fluorescent target array (FTA) technology, which utilizes vital dyes such as carboxyfluorescein succinimidyl ester (CFSE), violet laser excitable dyes (CellTrace Violet: CTV) and red laser excitable dyes (Cell Proliferation Dye eFluor 670: CPD) to combinatorially label mouse lymphocytes into >250 discernable fluorescent cell clusters. Cell clusters within these FTAs can be pulsed with major histocompatibility (MHC) class-I and MHC class-II binding peptides and thereby act as target cells for CD8+
T cells, respectively. These FTA cells remain viable and fully functional, and can therefore be administered into mice to allow assessment of CD8+
T cell-mediated killing of FTA target cells and CD4+
T cell-meditated help of FTA B cell target cells in real time in vivo
by flow cytometry. Since >250 target cells can be assessed at once, the technique allows the monitoring of T cell responses against several antigen epitopes at several concentrations and in multiple replicates. As such, the technique can measure T cell responses at both a quantitative (e.g.
the cumulative magnitude of the response) and a qualitative (e.g
. functional avidity and epitope-cross reactivity of the response) level. Herein, we describe how these FTAs are constructed and give an example of how they can be applied to assess T cell responses induced by a recombinant pox virus vaccine.
Immunology, Issue 88, Investigative Techniques, T cell response, Flow Cytometry, Multiparameter, CTL assay in vivo, carboxyfluorescein succinimidyl ester (CFSE), CellTrace Violet (CTV), Cell Proliferation Dye eFluor 670 (CPD)
Experimental Protocol for Manipulating Plant-induced Soil Heterogeneity
Institutions: Case Western Reserve University.
Coexistence theory has often treated environmental heterogeneity as being independent of the community composition; however biotic feedbacks such as plant-soil feedbacks (PSF) have large effects on plant performance, and create environmental heterogeneity that depends on the community composition. Understanding the importance of PSF for plant community assembly necessitates understanding of the role of heterogeneity in PSF, in addition to mean PSF effects. Here, we describe a protocol for manipulating plant-induced soil heterogeneity. Two example experiments are presented: (1) a field experiment with a 6-patch grid of soils to measure plant population responses and (2) a greenhouse experiment with 2-patch soils to measure individual plant responses. Soils can be collected from the zone of root influence (soils from the rhizosphere and directly adjacent to the rhizosphere) of plants in the field from conspecific and heterospecific plant species. Replicate collections are used to avoid pseudoreplicating soil samples. These soils are then placed into separate patches for heterogeneous treatments or mixed for a homogenized treatment. Care should be taken to ensure that heterogeneous and homogenized treatments experience the same degree of soil disturbance. Plants can then be placed in these soil treatments to determine the effect of plant-induced soil heterogeneity on plant performance. We demonstrate that plant-induced heterogeneity results in different outcomes than predicted by traditional coexistence models, perhaps because of the dynamic nature of these feedbacks. Theory that incorporates environmental heterogeneity influenced by the assembling community and additional empirical work is needed to determine when heterogeneity intrinsic to the assembling community will result in different assembly outcomes compared with heterogeneity extrinsic to the community composition.
Environmental Sciences, Issue 85, Coexistence, community assembly, environmental drivers, plant-soil feedback, soil heterogeneity, soil microbial communities, soil patch
Mapping Bacterial Functional Networks and Pathways in Escherichia Coli using Synthetic Genetic Arrays
Institutions: University of Toronto, University of Toronto, University of Regina.
Phenotypes are determined by a complex series of physical (e.g.
protein-protein) and functional (e.g.
gene-gene or genetic) interactions (GI)1
. While physical interactions can indicate which bacterial proteins are associated as complexes, they do not necessarily reveal pathway-level functional relationships1. GI screens, in which the growth of double mutants bearing two deleted or inactivated genes is measured and compared to the corresponding single mutants, can illuminate epistatic dependencies between loci and hence provide a means to query and discover novel functional relationships2
. Large-scale GI maps have been reported for eukaryotic organisms like yeast3-7
, but GI information remains sparse for prokaryotes8
, which hinders the functional annotation of bacterial genomes. To this end, we and others have developed high-throughput quantitative bacterial GI screening methods9, 10
Here, we present the key steps required to perform quantitative E. coli
Synthetic Genetic Array (eSGA) screening procedure on a genome-scale9
, using natural bacterial conjugation and homologous recombination to systemically generate and measure the fitness of large numbers of double mutants in a colony array format.
Briefly, a robot is used to transfer, through conjugation, chloramphenicol (Cm) - marked mutant alleles from engineered Hfr (High frequency of recombination) 'donor strains' into an ordered array of kanamycin (Kan) - marked F- recipient strains. Typically, we use loss-of-function single mutants bearing non-essential gene deletions (e.g.
the 'Keio' collection11
) and essential gene hypomorphic mutations (i.e.
alleles conferring reduced protein expression, stability, or activity9, 12, 13
) to query the functional associations of non-essential and essential genes, respectively. After conjugation and ensuing genetic exchange mediated by homologous recombination, the resulting double mutants are selected on solid medium containing both antibiotics. After outgrowth, the plates are digitally imaged and colony sizes are quantitatively scored using an in-house automated image processing system14
. GIs are revealed when the growth rate of a double mutant is either significantly better or worse than expected9
. Aggravating (or negative) GIs often result between loss-of-function mutations in pairs of genes from compensatory pathways that impinge on the same essential process2
. Here, the loss of a single gene is buffered, such that either single mutant is viable. However, the loss of both pathways is deleterious and results in synthetic lethality or sickness (i.e.
slow growth). Conversely, alleviating (or positive) interactions can occur between genes in the same pathway or protein complex2
as the deletion of either gene alone is often sufficient to perturb the normal function of the pathway or complex such that additional perturbations do not reduce activity, and hence growth, further. Overall, systematically identifying and analyzing GI networks can provide unbiased, global maps of the functional relationships between large numbers of genes, from which pathway-level information missed by other approaches can be inferred9
Genetics, Issue 69, Molecular Biology, Medicine, Biochemistry, Microbiology, Aggravating, alleviating, conjugation, double mutant, Escherichia coli, genetic interaction, Gram-negative bacteria, homologous recombination, network, synthetic lethality or sickness, suppression
Simultaneous Multicolor Imaging of Biological Structures with Fluorescence Photoactivation Localization Microscopy
Institutions: University of Maine.
Localization-based super resolution microscopy can be applied to obtain a spatial map (image) of the distribution of individual fluorescently labeled single molecules within a sample with a spatial resolution of tens of nanometers. Using either photoactivatable (PAFP) or photoswitchable (PSFP) fluorescent proteins fused to proteins of interest, or organic dyes conjugated to antibodies or other molecules of interest, fluorescence photoactivation localization microscopy (FPALM) can simultaneously image multiple species of molecules within single cells. By using the following approach, populations of large numbers (thousands to hundreds of thousands) of individual molecules are imaged in single cells and localized with a precision of ~10-30 nm. Data obtained can be applied to understanding the nanoscale spatial distributions of multiple protein types within a cell. One primary advantage of this technique is the dramatic increase in spatial resolution: while diffraction limits resolution to ~200-250 nm in conventional light microscopy, FPALM can image length scales more than an order of magnitude smaller. As many biological hypotheses concern the spatial relationships among different biomolecules, the improved resolution of FPALM can provide insight into questions of cellular organization which have previously been inaccessible to conventional fluorescence microscopy. In addition to detailing the methods for sample preparation and data acquisition, we here describe the optical setup for FPALM. One additional consideration for researchers wishing to do super-resolution microscopy is cost: in-house setups are significantly cheaper than most commercially available imaging machines. Limitations of this technique include the need for optimizing the labeling of molecules of interest within cell samples, and the need for post-processing software to visualize results. We here describe the use of PAFP and PSFP expression to image two protein species in fixed cells. Extension of the technique to living cells is also described.
Basic Protocol, Issue 82, Microscopy, Super-resolution imaging, Multicolor, single molecule, FPALM, Localization microscopy, fluorescent proteins
Using Coculture to Detect Chemically Mediated Interspecies Interactions
Institutions: University of North Carolina at Chapel Hill .
In nature, bacteria rarely exist in isolation; they are instead surrounded by a diverse array of other microorganisms that alter the local environment by secreting metabolites. These metabolites have the potential to modulate the physiology and differentiation of their microbial neighbors and are likely important factors in the establishment and maintenance of complex microbial communities. We have developed a fluorescence-based coculture screen to identify such chemically mediated microbial interactions. The screen involves combining a fluorescent transcriptional reporter strain with environmental microbes on solid media and allowing the colonies to grow in coculture. The fluorescent transcriptional reporter is designed so that the chosen bacterial strain fluoresces when it is expressing a particular phenotype of interest (i.e.
biofilm formation, sporulation, virulence factor production, etc
.) Screening is performed under growth conditions where this phenotype is not
expressed (and therefore the reporter strain is typically nonfluorescent). When an environmental microbe secretes a metabolite that activates this phenotype, it diffuses through the agar and activates the fluorescent reporter construct. This allows the inducing-metabolite-producing microbe to be detected: they are the nonfluorescent colonies most proximal to the fluorescent colonies. Thus, this screen allows the identification of environmental microbes that produce diffusible metabolites that activate a particular physiological response in a reporter strain. This publication discusses how to: a) select appropriate coculture screening conditions, b) prepare the reporter and environmental microbes for screening, c) perform the coculture screen, d) isolate putative inducing organisms, and e) confirm their activity in a secondary screen. We developed this method to screen for soil organisms that activate biofilm matrix-production in Bacillus subtilis
; however, we also discuss considerations for applying this approach to other genetically tractable bacteria.
Microbiology, Issue 80, High-Throughput Screening Assays, Genes, Reporter, Microbial Interactions, Soil Microbiology, Coculture, microbial interactions, screen, fluorescent transcriptional reporters, Bacillus subtilis
Non-radioactive in situ Hybridization Protocol Applicable for Norway Spruce and a Range of Plant Species
Institutions: Uppsala University, Swedish University of Agricultural Sciences.
The high-throughput expression analysis technologies available today give scientists an overflow of expression profiles but their resolution in terms of tissue specific expression is limited because of problems in dissecting individual tissues. Expression data needs to be confirmed and complemented with expression patterns using e.g. in situ
hybridization, a technique used to localize cell specific mRNA expression. The in situ
hybridization method is laborious, time-consuming and often requires extensive optimization depending on species and tissue. In situ
experiments are relatively more difficult to perform in woody species such as the conifer Norway spruce (Picea abies
). Here we present a modified DIG in situ
hybridization protocol, which is fast and applicable on a wide range of plant species including P. abies
. With just a few adjustments, including altered RNase treatment and proteinase K concentration, we could use the protocol to study tissue specific expression of homologous genes in male reproductive organs of one gymnosperm and two angiosperm species; P. abies, Arabidopsis thaliana
and Brassica napus
. The protocol worked equally well for the species and genes studied. AtAP3
were observed in second and third whorl floral organs in A. thaliana
and B. napus
and DAL13 in microsporophylls of male cones from P. abies
. For P. abies
the proteinase K concentration, used to permeablize the tissues, had to be increased to 3 g/ml instead of 1 g/ml, possibly due to more compact tissues and higher levels of phenolics and polysaccharides. For all species the RNase treatment was removed due to reduced signal strength without a corresponding increase in specificity. By comparing tissue specific expression patterns of homologous genes from both flowering plants and a coniferous tree we demonstrate that the DIG in situ
protocol presented here, with only minute adjustments, can be applied to a wide range of plant species. Hence, the protocol avoids both extensive species specific optimization and the laborious use of radioactively labeled probes in favor of DIG labeled probes. We have chosen to illustrate the technically demanding steps of the protocol in our film.
Anna Karlgren and Jenny Carlsson contributed equally to this study.
Corresponding authors: Anna Karlgren at Anna.Karlgren@ebc.uu.se and Jens F. Sundström at Jens.Sundstrom@vbsg.slu.se
Plant Biology, Issue 26, RNA, expression analysis, Norway spruce, Arabidopsis, rapeseed, conifers
Aseptic Laboratory Techniques: Plating Methods
Institutions: University of California, Los Angeles .
Microorganisms are present on all inanimate surfaces creating ubiquitous sources of possible contamination in the laboratory. Experimental success relies on the ability of a scientist to sterilize work surfaces and equipment as well as prevent contact of sterile instruments and solutions with non-sterile surfaces. Here we present the steps for several plating methods routinely used in the laboratory to isolate, propagate, or enumerate microorganisms such as bacteria and phage. All five methods incorporate aseptic technique, or procedures that maintain the sterility of experimental materials. Procedures described include (1) streak-plating bacterial cultures to isolate single colonies, (2) pour-plating and (3) spread-plating to enumerate viable bacterial colonies, (4) soft agar overlays to isolate phage and enumerate plaques, and (5) replica-plating to transfer cells from one plate to another in an identical spatial pattern. These procedures can be performed at the laboratory bench, provided they involve non-pathogenic strains of microorganisms (Biosafety Level 1, BSL-1). If working with BSL-2 organisms, then these manipulations must take place in a biosafety cabinet. Consult the most current edition of the Biosafety in Microbiological and Biomedical Laboratories
(BMBL) as well as Material Safety Data Sheets
(MSDS) for Infectious Substances to determine the biohazard classification as well as the safety precautions and containment facilities required for the microorganism in question. Bacterial strains and phage stocks can be obtained from research investigators, companies, and collections maintained by particular organizations such as the American Type Culture Collection
(ATCC). It is recommended that non-pathogenic strains be used when learning the various plating methods. By following the procedures described in this protocol, students should be able to:
● Perform plating procedures without contaminating media.
● Isolate single bacterial colonies by the streak-plating method.
● Use pour-plating and spread-plating methods to determine the concentration of bacteria.
● Perform soft agar overlays when working with phage.
● Transfer bacterial cells from one plate to another using the replica-plating procedure.
● Given an experimental task, select the appropriate plating method.
Basic Protocols, Issue 63, Streak plates, pour plates, soft agar overlays, spread plates, replica plates, bacteria, colonies, phage, plaques, dilutions
Combining Magnetic Sorting of Mother Cells and Fluctuation Tests to Analyze Genome Instability During Mitotic Cell Aging in Saccharomyces cerevisiae
Institutions: Rensselaer Polytechnic Institute.
has been an excellent model system for examining mechanisms and consequences of genome instability. Information gained from this yeast model is relevant to many organisms, including humans, since DNA repair and DNA damage response factors are well conserved across diverse species. However, S. cerevisiae
has not yet been used to fully address whether the rate of accumulating mutations changes with increasing replicative (mitotic) age due to technical constraints. For instance, measurements of yeast replicative lifespan through micromanipulation involve very small populations of cells, which prohibit detection of rare mutations. Genetic methods to enrich for mother cells in populations by inducing death of daughter cells have been developed, but population sizes are still limited by the frequency with which random mutations that compromise the selection systems occur. The current protocol takes advantage of magnetic sorting of surface-labeled yeast mother cells to obtain large enough populations of aging mother cells to quantify rare mutations through phenotypic selections. Mutation rates, measured through fluctuation tests, and mutation frequencies are first established for young cells and used to predict the frequency of mutations in mother cells of various replicative ages. Mutation frequencies are then determined for sorted mother cells, and the age of the mother cells is determined using flow cytometry by staining with a fluorescent reagent that detects bud scars formed on their cell surfaces during cell division. Comparison of predicted mutation frequencies based on the number of cell divisions to the frequencies experimentally observed for mother cells of a given replicative age can then identify whether there are age-related changes in the rate of accumulating mutations. Variations of this basic protocol provide the means to investigate the influence of alterations in specific gene functions or specific environmental conditions on mutation accumulation to address mechanisms underlying genome instability during replicative aging.
Microbiology, Issue 92, Aging, mutations, genome instability, Saccharomyces cerevisiae, fluctuation test, magnetic sorting, mother cell, replicative aging
Supported Planar Bilayers for the Formation of Study of Immunological Synapses and Kinapse
Institutions: New York University - NYU.
Supported planar bilayers are powerful tools that can be used to model the molecular interactions in an immunological synapse. To mimic the interactions between lymphocytes and antigen presenting cells, we use Ni2+-chelating lipids to anchor recombinant cell adhesion and MHC proteins to the upper leaflet of a bilayer with poly-histidine tags. Planar bilayers are generated by preparing lipid, treating the glass surfaces where the bilayer will form, and then forming the bilayer in a specialized chamber containing a flow-cell where the lymphocytes will be added. Then, bilayers are charged with Ni and his-tagged recombinant proteins are added. Finally, lymphocytes are injected into the flow cell and TIRF microscopy can be used to image synapse formation and the mechanisms that control T cell locomotion, sites of receptor sorting, and sites of receptor degradation.
Immunology, Issue 19, Annual Review, Immunological Synapse, Planar Lipid Bilayers, ICAM-1,
Using SCOPE to Identify Potential Regulatory Motifs in Coregulated Genes
Institutions: Dartmouth College.
SCOPE is an ensemble motif finder that uses three component algorithms in parallel to identify potential regulatory motifs by over-representation and motif position preference1
. Each component algorithm is optimized to find a different kind of motif. By taking the best of these three approaches, SCOPE performs better than any single algorithm, even in the presence of noisy data1
. In this article, we utilize a web version of SCOPE2
to examine genes that are involved in telomere maintenance. SCOPE has been incorporated into at least two other motif finding programs3,4
and has been used in other studies5-8
The three algorithms that comprise SCOPE are BEAM9
, which finds non-degenerate motifs (ACCGGT), PRISM10
, which finds degenerate motifs (ASCGWT), and SPACER11
, which finds longer bipartite motifs (ACCnnnnnnnnGGT). These three algorithms have been optimized to find their corresponding type of motif. Together, they allow SCOPE to perform extremely well.
Once a gene set has been analyzed and candidate motifs identified, SCOPE can look for other genes that contain the motif which, when added to the original set, will improve the motif score. This can occur through over-representation or motif position preference. Working with partial gene sets that have biologically verified transcription factor binding sites, SCOPE was able to identify most of the rest of the genes also regulated by the given transcription factor.
Output from SCOPE shows candidate motifs, their significance, and other information both as a table and as a graphical motif map. FAQs and video tutorials are available at the SCOPE web site which also includes a "Sample Search" button that allows the user to perform a trial run.
Scope has a very friendly user interface that enables novice users to access the algorithm's full power without having to become an expert in the bioinformatics of motif finding. As input, SCOPE can take a list of genes, or FASTA sequences. These can be entered in browser text fields, or read from a file. The output from SCOPE contains a list of all identified motifs with their scores, number of occurrences, fraction of genes containing the motif, and the algorithm used to identify the motif. For each motif, result details include a consensus representation of the motif, a sequence logo, a position weight matrix, and a list of instances for every motif occurrence (with exact positions and "strand" indicated). Results are returned in a browser window and also optionally by email. Previous papers describe the SCOPE algorithms in detail1,2,9-11
Genetics, Issue 51, gene regulation, computational biology, algorithm, promoter sequence motif
Building a Better Mosquito: Identifying the Genes Enabling Malaria and Dengue Fever Resistance in A. gambiae and A. aegypti Mosquitoes
Institutions: Johns Hopkins University.
In this interview, George Dimopoulos focuses on the physiological mechanisms used by mosquitoes to combat Plasmodium falciparum and dengue virus infections. Explanation is given for how key refractory genes, those genes conferring resistance to vector pathogens, are identified in the mosquito and how this knowledge can be used to generate transgenic mosquitoes that are unable to carry the malaria parasite or dengue virus.
Cellular Biology, Issue 5, Translational Research, mosquito, malaria, virus, dengue, genetics, injection, RNAi, transgenesis, transgenic
Electroporation of Mycobacteria
Institutions: Barts and the London School of Medicine and Dentistry, Barts and the London School of Medicine and Dentistry.
High efficiency transformation is a major limitation in the study of mycobacteria. The genus Mycobacterium can be difficult to transform; this is mainly caused by the thick and waxy cell wall, but is compounded by the fact that most molecular techniques have been developed for distantly-related species such as Escherichia coli and Bacillus subtilis. In spite of these obstacles, mycobacterial plasmids have been identified and DNA transformation of many mycobacterial species have now been described. The most successful method for introducing DNA into mycobacteria is electroporation. Many parameters contribute to successful transformation; these include the species/strain, the nature of the transforming DNA, the selectable marker used, the growth medium, and the conditions for the electroporation pulse. Optimized methods for the transformation of both slow- and fast-grower are detailed here. Transformation efficiencies for different mycobacterial species and with various selectable markers are reported.
Microbiology, Issue 15, Springer Protocols, Mycobacteria, Electroporation, Bacterial Transformation, Transformation Efficiency, Bacteria, Tuberculosis, M. Smegmatis, Springer Protocols
Layers of Symbiosis - Visualizing the Termite Hindgut Microbial Community
Institutions: California Institute of Technology - Caltech.
Jared Leadbetter takes us for a nature walk through the diversity of life resident in the termite hindgut - a microenvironment containing 250 different species found nowhere else on Earth. Jared reveals that the symbiosis exhibited by this system is multi-layered and involves not only a relationship between the termite and its gut inhabitants, but also involves a complex web of symbiosis among the gut microbes themselves.
Microbiology, issue 4, microbial community, symbiosis, hindgut
|
<urn:uuid:264c8e82-8e2b-497f-a953-b6e466d920d5>
|
CC-MAIN-2016-44
|
http://www.jove.com/visualize/abstract/23824831/genomic-porosity-between-invasive-chondrostoma-nasus-endangered
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719468.5/warc/CC-MAIN-20161020183839-00528-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.890953
| 11,460
| 2.640625
| 3
|
Recently China announced the opening of what they call the “world’s longest sea bridge.” It is a 22-mile structure, and it connects Jiaxing City to the city of Ningbo. It is slightly shorter than the Lake Pontchartrain Causeway Bridge at New Orleans, which is considered the world’s longest, although it is a lake bridge. The cost of the bridge was 1.7 billion dollars.
But I know a longer bridge. It was the bridge Jesus built between us and the Father when He died on the cross. It was also more costly; it cost Jesus His life.
View more sermon illustrations for inspiration for your next message.
|
<urn:uuid:80d06aaa-586f-4d44-982f-925acf4faf03>
|
CC-MAIN-2022-33
|
https://www.preaching.com/sermon-illustrations/to-illustrate-atonement/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00277.warc.gz
|
en
| 0.974637
| 141
| 1.742188
| 2
|
When a person dies his body will be buried under the earth within a wooden box. And the directors who judge this work about the work should be done from start to its end. So without the help of the funeral director, it is harder to safely bury the dead man, because those people who are relations and neighbours for the dead person will not be active for a month of this dead. In that case, they do not know what are the processes to be completed as per government rules? Here come, the directors who are experienced in their profession. By this we can see, what are all the rules and regulations are kept for the relations by Funeral Directors Harold Wood ?
Every funeral director’s work is to give some advice when their clients are in critical situations. In that case, they should make them focus on the dead person’s family members’ situations after years. While working they should be given some personal advice to their clients. Most people think that it is unnecessary to hire funeral directors, those people who are thinking that it is unnecessary; they would understand their worth after years ago. Some of the directors will go home if a person dies in their home. Two directors go to their house and the caring with which they bring out the person from their home and relations is a critical one. So, every worker would take enough time before during and after the time of needs which makes you walk through the process.
Every passion has its license to show the best workers among the others. This is why most people would prefer only the licensed workers whatever work they wish to do because those licensed workers will have a guarantee in their work. Likewise, check out while funeral director whether he is licensed or not. In New York, those directors who are licensed in their funeral profession have a dual opportunity, which means they have dual options as a funeral director and also a licensed embalmer. This does not mean that the person is expertise in both works. But if they are, they can work legally without acting illegally for their country’s government. So, these rules may change according to the country.
Are there any graduations to become a funeral director?
Yes of course without any graduation as a funeral student you cannot apply for certification. Some countries have a separate mortuary school which helps the student who wishes to about funeral and their types of work they do. When he/she passed out their national board exams then they are allowed for a year of apprenticeship. Only here they get newly experienced while getting into their profession as a worker. At this time as a trainer, you should come forward to learn about your work in any case you should not get stuck into preparation and arrangement rooms. Only by knowing about your work completely will make as an all-rounder. So, these are methods to become a mortuary funeral director. Picking up their knowledge depends upon their involvement.
|
<urn:uuid:7ee85d57-14e8-45ce-a4e2-8d3fbd4604ee>
|
CC-MAIN-2022-33
|
https://malcolmschannel.com/what-are-all-the-instructions-that-should-be-given-when-a-person-comes-to-learn-about-funeral-activities/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00473.warc.gz
|
en
| 0.982568
| 585
| 2.109375
| 2
|
یادگیری و محو شدن ارتباط بین حکومت و بازده
|کد مقاله||سال انتشار||مقاله انگلیسی||ترجمه فارسی||تعداد کلمات|
|11161||2013||26 صفحه PDF||سفارش دهید||محاسبه نشده|
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Journal of Financial Economics, Volume 108, Issue 2, May 2013, Pages 323–348
The correlation between governance indices and abnormal returns documented for 1990–1999 subsequently disappeared. The correlation and its disappearance are both due to market participants' gradually learning to appreciate the difference between good-governance and poor-governance firms. Consistent with learning, the correlation's disappearance was associated with increases in market participants' attention to governance; market participants and security analysts were, until the beginning of the 2000s but not subsequently, more positively surprised by the earning announcements of good-governance firms; and, although governance indices no longer generated abnormal returns during the 2000s, their negative association with firm value and operating performance persisted.
In an influential paper, Gompers, Ishii, and Metrick (2003) (hereinafter GIM) identified a governance-based trading strategy that would have produced abnormal profits during the period 1990–1999. This strategy was based on a G-Index that GIM constructed on the basis of 24 governance provisions that weaken shareholder rights. Bebchuk, Cohen, and Ferrell (2009) (hereinafter BCF) subsequently showed that these results were driven by 6 out of the 24 provisions and constructed an E-Index based on these 6 provisions. The intriguing correlation between governance and returns has attracted a great deal of attention ever since it was first reported, and the G-Index and E-Index have been extensively used. In this paper, we contribute to understanding GIM's and BCF's results concerning the association between governance and abnormal returns. We show that the G-Index and E-Index were no longer associated with abnormal returns during the period of 2000–2008 (or any subperiods within it), and we then investigate what explains both the existence of the governance–returns correlation during the 1990s and its subsequent disappearance. We identify several systematic differences between the 1990s and subsequent years and relate them to the disappearance of the governance–returns correlation. We provide evidence that is consistent with the hypothesis that both the existence and disappearance of the correlation were due to market participants' learning to appreciate the difference between well-governed and poorly governed firms. GIM and BCF found that governance provisions—or the characteristics of firms' governance and culture that they reflect—are associated with lower industry-adjusted Q. Subsequent work found additional links between the G and E indices and firm performance. For example, Masulis, Wang, and Xie (2007) find that worse G-Index and E-Index scores are correlated with worse acquisition decisions (as measured by the stock market returns accompanying acquisition announcements), and Dittmar and Mahrt-Smith (2007) find that worse scores are correlated with a less valuable use of cash holdings. That the G-Index and E-Index are associated with lower firm value and worse firm performance, however, does not imply that these indices should be associated with abnormal stock returns, as GIM and BCF found for the period 1990–1999. To the extent that market prices already reflect fully the differences between well-governed and poorly governed firms, trading on the basis of the governance indices should not be expected to yield abnormal profits. We conduct in this paper a series of tests for one possible explanation of the abnormal returns during the 1990s. According to this “learning” explanation, which was noted by GIM, investors in 1990 did not fully appreciate the differences between firms with good and poor governance scores. The legal developments that shaped the significance of the G-Index and E-Index provisions took place largely during the 1980s, which was also when many of these provisions were adopted. In 1990, investors might not yet have had sufficient experience to be able to forecast the expected difference in performance between well-governed and poorly governed firms. Under the “learning” hypothesis, the association between governance indices and returns during the 1990s was expected to continue only up to the point at which a sufficient number of market participants would learn to fully appreciate the differences between well-governed and poorly governed firms. Noting the empirical evidence that lengthy intervals are sometimes necessary even for information that is relatively tangible to be incorporated in prices,1 GIM suggested that it was not possible at the time of their article to forecast when such a process of price adjustment would be completed. We begin by showing that, consistent with the learning hypothesis, the association between the governance indices did not persist. Using the exact methods employed by GIM (and subsequently BCF) for 1990–1999, we find that this association did not exist during the subsequent period of 2000–2008. Core, Guay, and Rusticus (2006) note that the GIM strategy did not produce abnormal returns during the four-year period 2000–2003, but were naturally cautious about drawing inferences from the relatively short period they examined, and did not focus on the change or seek to explain it. Our robust findings for a period of similar length to the one studied by GIM enable concluding that the documented governance–returns association did not persist after the 1990s. Note that, to the extent that the disappearance of abnormal returns was due to learning, such learning did not necessarily have to involve learning about the significance of the provisions in the governance indices. While some market participants might have learned to appreciate that certain governance provisions are associated with worse expected performance, other market participants might have directly identified the differences in future performance between the firms that score well and poorly on the governance indices. For our purposes, the learning hypothesis involves market participants, in the aggregate, coming to appreciate the difference between firms that score well and poorly on the governance indices regardless of whether all or some of these participants made use of all the components of the indices themselves. To investigate further the learning hypothesis, we study how the existence of abnormal returns to governance strategies was associated with changes in the attention paid to governance by market participants. We identify proxies for the attention to governance by the media, institutional investors, and academic researchers, as well as construct an aggregate attention index. We find that the decrease in the returns to the governance strategies was associated with an increase in levels of attention to governance. Furthermore, analyzing potential structural breaking points in the pattern of returns, we find that their location corresponds to the period in which attention to governance rose sharply. The number of media articles about governance, and the number of resolutions about corporate governance submitted by institutional investors (many of which focused on key provisions of the governance indices), jumped sharply in the beginning of the 2000s to historically high levels and remained there. Academic research, proxied by the fraction of National Bureau of Economic Research (NBER) discussion papers related to corporate governance, also rose sharply around this point in time, with the GIM paper being issued as an NBER discussion paper in 2001. Given our findings about the relationship between attention to governance and returns to the governance strategies, we proceed to test the hypothesis that, by the end of 2001, markets had sufficiently absorbed the governance differences reflected in the G-Index and the E-Index. We examine whether, by the end of 2001, market participants learned to appreciate the differences between well-governed firms and poorly governed firms in terms of their expected future profitability. In particular, we examine the extent to which markets were differentially surprised by earning announcements as proxied by (i) the abnormal reactions accompanying earning announcements, and (ii) analyst forecast errors. Consistent with the learning hypothesis, we find a marked difference between the 1990–2001 and 2002–2008 periods. During the 1990–2001 period, but not during the 2002–2008 period, the earning announcements of good-governance firms were more likely than the earning announcements of poor-governance firms both (i) to be accompanied with more positive abnormal stock returns, and (ii) to produce a meaningful positive surprise relative to the median analyst forecast. Our analysis here extends the studies of Core, Guay, and Rusticus (2006) and Giroud and Mueller (2011), which examine (with mixed results) whether the correlation between governance and returns was due to markets' forecasting errors about the difference between good-governance and poor-governance firms, but which did not consider whether such forecasting errors changed over time during the 1990–2008 period. Under the learning hypothesis, while the governance indices can be expected at some point to cease to be correlated with abnormal trading profits, as their relevance for firm value and performance become incorporated into market prices, the correlation of these indices with firm value and performance can be expected to persist. We find that, indeed, the relationship that the governance indices have with Tobin's Q and various measures of operating performance remained strong during the 2000s (and, if anything, becomes more significant in the 2002–2008 period).2 Thus, while governance indices may no longer be able to provide a basis for a profitable trading strategy, they should remain valuable tools for researchers, investors, and policymakers interested in governance and its relationship with firm performance. We also explore an alternative explanation that has been suggested in the literature to the correlation between governance and returns identified for the 1990s. Under this explanation, governance is correlated with some common risk factor that is not captured by the standard four-factor model used by GIM to calculate abnormal returns (Core et al., 2006 and Cremers et al., 2009). Under this explanation, governance can be expected to continue to play a role in explaining the cross-section of returns as long as the common risk factor correlated with governance continues to have such a role. To investigate this possibility, we examine the consequences of augmenting the Fama-French-Carhart four-factor model with additional common factors suggested in the literature—the liquidity factor of Pastor and Stambaugh (2003), the downside risk factor of Ang, Chen, and Xing (2006), and the takeover factor of Cremers, Nair, and John, (2009). We find that adding these factors cannot fully explain both the existence of the governance–returns correlation and its subsequent disappearance. Finally, we conduct three types of robustness checks for our results concerning how the periods 1990–2001 and 2002–2008 differ in terms of the association of abnormal returns with the governance indices, as well as in the ability of investors and analysts to forecast the differences in expected future earnings between good-governance and poor-governance firms. In particular, we examine whether our results are robust to excluding new economy firms (Murphy, 2003), to excluding firms in the most competitive industries (Giroud and Mueller, 2011), and to adjusting returns to take into account industry effects (Johnson et al., 2009 and Lewellen and Metrick, 2010). Our findings concerning the differences between 1990–2001 and 2002–2008 are all robust to these issues.3 In addition to the literature on governance indices and governance provisions, our paper is related to the large body of asset pricing and behavioral finance literature on the persistence and disappearance of abnormal returns associated with trading strategies based on public information. Trading strategies based on known information that produce risk-adjusted abnormal returns over significant periods of time have sometimes been labeled as “anomalies” (see, e.g., Schwert, 2003). Researchers have paid close attention to the extent to which such “anomalies” have persisted after they were documented by academic research, with some suggesting that it is reasonable to expect anomalies not to persist for long after they are reported (Cochrane, 1999). While classical efficient capital market theory (Fama, 1970) questions whether public information can ever be used to produce abnormal returns, adaptive efficient capital market theory (Daniel and Titman, 1999) suggests that the ability of any trading strategy based on public information to generate risk-adjusted abnormal profits will dissipate over time. Estimating the future effects of (publicly known) governance provisions (or governance characteristics correlated with them) is far from a straightforward matter, and requires not only knowing the public information about the provisions but also plugging it into an appropriate structural model of the firms and their environment. Our evidence is consistent with such a process being one that takes time to develop, refine, and accurately execute. As Brav and Heaton (2002) show, such a pattern is consistent with two models (that are difficult to distinguish empirically): (i) a “rational structure uncertainty” model in which all agents were uncertain in 1990 what structural model to use to make rational predictions from available public information, but learned to do so over time; and (ii) a “behavioral” model in which some rational investors (but not others) were able to draw accurate inferences from governance provisions already in 1990, but “limits on arbitrage” (Shleifer and Vishny, 1997) prevented their information from being fully reflected in prices, and in which, over time, such rational investors grew sufficiently in number and confidence for their information to be factored into market prices. The remainder of the paper is organized as follows. Section 2 examines the relationship between the governance indices and returns during the 1990–2008 period. Section 3, the main part of our analysis, investigates the causes of both the existence of a governance–returns association during the 1990s and its subsequent disappearance. Section 4 concludes.
نتیجه گیری انگلیسی
This paper has sought to help resolve the questions arising from the well-known and intriguing finding of an association between abnormal returns during the 1990s and the G-Index and E-Index governance indices. After showing that the association ceased to exist during the 2000s, we provided evidence that can help explain both the existence of the association during the 1990s and its subsequent disappearance. In particular, our analysis provides evidence consistent with the hypothesis that both the existence and disappearance of the governance–returns correlation were due to market participants' learning during the 1990s to appreciate the difference between firms scoring well and poorly on the governance indices. Consistent with the learning hypothesis, we find that (i) the disappearance of the governance–return correlation was associated with an increase in the attention to governance by a wide range of market participants; (ii) the structural break in the returns to governance strategies corresponded to the timing of the sharp rise in the attention to governance; (iii) until the beginning of the 2000s, but not subsequently, stock market reactions to earnings announcements reflected the market being more positively surprised by the earnings announcements of good-governance firms than by those of poor-governance firms; (iv) analysts were also more positively surprised by the earnings announcements of good-governance firms than by those of poor-governance firms until the beginning of the 2000s but not afterwards; (v) while the G and E indices could no longer generate abnormal returns in the 2000s, their negative association with Tobin's Q and operating performance persisted; and (vi) the existence and subsequent disappearance of the governance–return correlation cannot be explained by any of the factors that have been suggested in the literature for augmenting the Fama-French-Carhart four-factor model. Our results are robust to excluding new economy firms, excluding firms in non-competitive industries, and adjusting for industry returns. By explaining both the presence during the 1990s and the subsequent disappearance of a correlation between returns and the governance indices, our findings resolve a puzzle posed by the existing literature. However, by showing that the governance indices remain associated with firm value and operating performance notwithstanding the disappearance of their correlation with returns, our work indicates that these indices continue to offer a potentially effective tool for researchers and market participants. We hope that our findings will be useful to subsequent work on corporate governance and on learning in capital markets.
|
<urn:uuid:87254871-d0b0-4626-958a-202ad15630b5>
|
CC-MAIN-2016-44
|
http://isiarticles.com/article/11161
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721595.48/warc/CC-MAIN-20161020183841-00477-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.957495
| 3,395
| 1.570313
| 2
|
legend of little geisha, girls, karin taylor, legend of little geisha, paintings, drawings, tree, gifts, hair, art, kimono, fashion, story, sweet, children, kids
(Mocha timber frame/off white matt/medium size)
hand drawn on paper
Legend of Little Geisha
art and story by K Taylor (4/09)
In the village of Ishekawa by the Sea of Japan lived a poor couple who wove and carved for a living. The couple had no real possessions but were content with the beauty of the mountains and the sea surrounding them, and happy to be together.
The only thing they wished for and did not yet have, was a child to call their own.
One day, an ancient crone visited their home and as always, the couple offered their hospitality, gave her rice cakes and sake to warm her belly. The old crone, in return for their kindness, bestowed upon the couple the ability to have a girl child.
The child grew from a seed into a strong and beautiful young woman, glowing with pride and joy, she was the delight of Ishekawa by the Sea of Japan, and many young suitors came to visit and pay her homage.
But as is the way with old crones, you can never quite trust them to do you a favour without some twist in the tale. Unfortunately, the seed from which the child grew, began to sprout roots, and she was bound to the earth.
In time the beautiful young girl became a majestic tree and all the birds from near and far came to perch and nest in her branches, she gave them shelter from the wind and rain, and everyone who knew the legend realised the tree was actually the Little Geisha.
here’s the drawing (above) prior to being digitally coloured
|
<urn:uuid:2f052572-dcdb-4ff2-8b10-6602f09f5da3>
|
CC-MAIN-2017-04
|
http://www.redbubble.com/people/karin/works/2914996-legend-of-little-geisha?c=3295-asia-geisha
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00210-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.978736
| 385
| 1.671875
| 2
|
BANK OF BARODA RTGS HO Branch in DALMAU - Address, IFSC, MICR Code
DALMAU DIST RAI BARELIContact
V & P DALMAU DISTT.RAEBARELI-229207City
What is IFSC Code of BANK OF BARODA situated at DALMAU DIST RAI BARELI- RTGS-HO?
IFSC Code of BANK OF BARODA situated at DALMAU DIST RAI BARELI - RTGS-HO is
What is the meaning of IFSC Code, MICR Codes in Banking industry?
IFSC or Indian Financial System Code is the code allocated to all banks branches. Bank branches use this code to participate in RTGS and NEFT transactions.
What is the significance of IFSC Code and how we can use it?
IFSC Code is a 11 digit code and we can use this code to communicate between different branches of different banks. Upon receiving the request for fund transfer it is easy for a bank to identify the payee branch. First four characters are code of bank, last six digits are branch code and fifth character is left 0, for any future use.
|
<urn:uuid:fd861fa5-b848-4272-92ed-f1815a7417a3>
|
CC-MAIN-2017-04
|
http://www.tikshare.com/bankifsc/17/state/UTTAR-PRADESH/district/RAE-BARELI/city/DALMAU/branch/9483/DALMAU-DIST-RAI-BARELI/BANK-OF-BARODA
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00475-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.832665
| 256
| 1.59375
| 2
|
The open-door admissions policies of community colleges and the national college completion “agenda” are contributing to an influx of unprepared students who have little chance of earning a degree, and who are likely to rack up crippling debt along the way.
That’s the central argument of a newly released book, Community Colleges and the Access Effect: Why Open Admissions Suppresses Achievement (Palgrave Macmillan). To help fix this problem, the book’s co-authors, Juliet Lilledahl Scherer, a professor of English at St. Louis Community College, and Mirra Leigh Anson, director of TRIO Upward Bound at the University of Iowa, propose raising the minimum requirements for college entry.
Both Scherer and Anson have taught at the community college level. And their book describes students they have seen fail, with heartbreaking consequences.
For example, one of the authors currently mentors a former community college student who was shot in the head when he was 16. Despite lingering cognitive and physical problems, the impoverished student made the “hope-filled, but ill-advised” decision to enroll in college.
The student got a transcript of Fs and dropped courses to show for his community college experience. He also carries debt, which made him ineligible for a work force training program. It will be difficult to pay down with his part-time job, which pays $7.35 an hour.
Scherer and Anson responded to questions about their book via email.
Q. Your book argues that open-door admissions at community colleges can be a "cruel hoax" that perpetuates inequity. How so?
A. Due to a dramatic shift in the preparation and ability levels of entering community college students, open access to the financial aid-eligible curriculum now extends false promise to many. Most community colleges addressed the arrival of students with lower and lower basic skill and/or ability levels over the past 50 years by designing and offering courses to meet their skill levels. Lengthy developmental education sequences resulted, with credit-bearing coursework now being offered at some community colleges that is equal to standard kindergarten fare. Unsurprisingly, research shows that adults entering with basic skill levels far below what are required to succeed in college-level courses infrequently persist and complete traditional two- or four-year college degrees. Open-access policy is also responsible for a great deal of secondary-student inertia, which compounds low college readiness and completion rates. Even so, as we search for ways to improve U.S. postsecondary outcomes, open access is almost never questioned as a policy that brings anything but opportunity and positivity to students’ lives.
In this modern era of college-going, however, open-door policy continues to accomplish positive outcomes for some while it simultaneously exacts devastating injuries on others. To make matters worse, the students most often hurt when they enroll in programs beyond their completion abilities belong to America’s most socioeconomically disadvantaged groups. Students’ lives are at stake, and they -- along with the rest of America -- are looking to community colleges for leadership and answers. It is past time to engage in a more honest national conversation about the irrefutable link between sufficient academic preparation and postsecondary completion and then commit to policies and practices that achieve both for more Americans.
Q. How has the national college completion agenda contributed to these problems?
A. The national college completion agenda movement threatens postsecondary student success in several ways. Some of the more important ways include being so fixated on improving completion rates that academic standards are threatened and alternative postsecondary pathways that would better serve some students and their unique abilities, interests and goals are not as seriously considered as they should be. Second, many completion agenda advocates are ascribing far too much weight to length of developmental education sequences as the reason so many community college students do not complete credentials while failing to sufficiently acknowledge the monumental impact of academic preparation, aptitude and student motivation on completion.
In short, because we are not asking all of the right questions, we are arriving at some incorrect conclusions, which has led to some devastating policy selection.
"Reasonable entrance standards, coupled with a more compassionate approach to advising and enrolling community college students, will accomplish more genuine postsecondary student success and equity gains than any other combined set of policies and, importantly, it will do so without enervating academic standards."
Third, some completion agenda-related foundations and their intermediaries have bought up many of the limited seats at state and federal policy making tables and are forcefully communicating their policy ideals through multimillion-dollar megaphones, even as they are not accountable to taxpayers for their actions. Meanwhile, the valuable voices of America’s professional educators are systematically drowned out.
The result? Many important decisions are not being made in the interest of students whose futures depend on a strong U.S. public education system that honors the value of lifelong learning over “getting through as soon as possible.”
Q. Haven't completion advocates also elevated the issue of student success, pushing community colleges to care more about what happens to students?
A. Without a doubt, completion advocates are responsible for increasing community college attention on student success, which has brought about positive institutional change. Make no mistake, though, community colleges could never be accused of being casual about student success. In fact, nowhere else in higher education have more student success conversations occurred, nor more effort expended to help postsecondary students achieve.
One of the community college’s greatest strengths -- its focus on excellent teaching -- has been revealed over the past few years to also be a vulnerability. Community colleges have never had the resources to conduct longitudinal, cross-institutional, rigorous research about their own students and institutions. As a result, community colleges are presently forced to defer to the research findings and recommendations made about them by university researchers and pretty much any outsider with a question and funding. One of the best outcomes that could result from the modern postsecondary student success movement would be investment by the community college sector in its own researchers. Researcher-practitioners of an institution will naturally ask different -- and arguably better -- questions. And the answers to those questions will provide a necessary counterbalance to agenda-driven research and ultimately move all stakeholders closer to adopting practices and policies that will genuinely improve postsecondary student success.
Q. You suggest that community colleges set a new admissions standard. How could that help preserve academic quality and a "culture of learning"?
A. Just a few weeks ago, one of our students reported being intrigued by content in Community Colleges and the Access Effect after hearing it described in class during a discussion on the strong link between student motivation/engagement and academic achievement. In an end-of-semester reflection paper, the student admitted, “I am that student who is not up to par for college.… I was the kid who never really tried in school, especially junior and senior year of high school, because I knew I was going to (the local community college) after high school.”
In our book, we also relay the shocking anecdote of a junior, tenure-track math faculty member who disclosed that her department chair had explicitly instructed her and her colleagues to lower standards to achieve the student success rates needed at the institution to maintain or increase the current budget under the new performance funding formula.
Open access and performance-based funding are on a collision course, and degradation of academic standards is the predictable consequence. Lowering academic standards, though, to achieve continuously improved completion rates and/or other student success outcomes prone to manipulation will only buy community colleges time and eventually be their and their students’ death knell in an increasingly competitive, outcomes-driven world. Therefore, demanding more of students before granting them access to financial aid-eligible college degree pathways represents a logical and benevolent element of any successful postsecondary completion solution.
Because of their geographic accessibility and affordability, community colleges have routinely -- and rightly -- been identified as the U.S. higher education institution most capable of and responsible for our country’s economic and employment rebound. We are asking educators and policy makers to dispassionately inventory the negative impact on postsecondary student success of maintaining laissez-faire open-door policy in the new century and also thoughtfully consider the myriad benefits that will result from requiring students to demonstrate a reasonable ability to benefit from the programs in which so many current enrollees are not remotely prepared to complete.
Reasonable entrance standards, coupled with a more compassionate approach to advising and enrolling community college students, will accomplish more genuine postsecondary student success and equity gains than any other combined set of policies and, importantly, it will do so without enervating academic standards.
Q. The book includes devastating stories about students who weren't prepared for college. What should we learn from their struggles?
A. Our postsecondary students’ stories serve to confirm the reality that citizens with the greatest challenges in life frequently arrive on the community college’s doorstep, and their unfortunate circumstances are often intensified when they are steered onto pathways that are an ill match for their preparation, ability and/or circumstances. America can no longer abide the approach of encouraging grossly unprepared students onto inadvisable postsecondary pathways, confusing unfettered access with legitimate opportunity.
Our most fragile citizens -- the ones to whom enrollment is granted with the most noble intent of helping them improve their lives -- are not infrequently left worse for their encounter with a community college. Improving postsecondary student outcomes in America will require community colleges to not only develop and offer a fuller complement of postsecondary education opportunities, but to also more assertively advise students about the unique array of postsecondary programs in which they could reasonably be expected to succeed. Any lesser approach in the current environment of college-going will perpetuate inequity and enhance socioeconomic stratification -- the opposite intent of the community college.
Q. What are some of the alternative educational paths that students could pursue outside of college?
A. Because socioeconomic mobility and other important quality-of-life outcomes are strongly linked with an individual’s level of postsecondary education, we must first redouble our efforts to prepare every capable U.S. secondary student for college success. However, meaningful postsecondary education options do exist and can even be expanded when we commit to more conscientiously addressing postsecondary students’ unique and varied needs. Some current degree-seeking students would thrive more -- completion-wise and financially -- in apprenticeships and job-training programs than they would in traditional two- or four-year degree programs.
Some are in desperate need of short-term training programs to financially stabilize them so that one day they might return and succeed in a more traditional degree program. Instead of repeatedly enrolling in and failing developmental education coursework aimed at eventually qualifying students for college-level coursework, many persons with intellectual disabilities, for example, are truly in need of affordable postsecondary programs to assist them in developing a career plan and independent living skills, including learning to manage their money and their personal safety and health, for example.
Every community college will ideally continue serving as the most important postsecondary education hub in its community, but more postsecondary programs need to be developed and offered to sufficiently meet community members’ diverse needs. More partnerships and bi-directional referrals need to be accomplished with existing community organizations. And, notably, reliable public funding must be dedicated to support the high-quality postsecondary education programs expected to be offered by the community college, a societal treasure that has the strong potential to be looked upon by historians as America’s most important postsecondary institution of the 21st century.
Read more by
Today’s News from Inside Higher Ed
Inside Higher Ed’s Quick Takes
What Others Are Reading
|
<urn:uuid:c88f9cb7-593f-4bb5-a92f-305bb1f31226>
|
CC-MAIN-2017-04
|
https://www.insidehighered.com/news/2014/06/17/new-book-says-community-colleges-should-tighten-their-admissions-policies
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00236-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.958867
| 2,409
| 2.40625
| 2
|
Table of Contents
Turning Down the Heat with Vapor Chamber Cooling
With every new generation of smartphones, comes more power and more capability to run even the most demanding games and applications. However, using all that power and pushing your phone to the limit can also cause overheating which significantly affects the performance. For that reason, high-end gaming phones must have a built-in cooling system.
And, no technology does a better job of cooling than the Vapor Chamber Cooling System. Used by the top CPU manufacturers for all sorts of computers and gadgets, this technology works to allow heat to transfer evenly across the entire body of a device and prevent overheating.
What is Vapor Chamber Cooling?
Vapor Chambers are cooling systems whose purpose is to dissipate heat on high-performance devices such as PCs, laptops, and smartphones. Considering that modern mobile phones feature a rather limited and cramped space, engineers had to come up with an ingenious solution to fit the cooling system inside.
Smartphone Vapor Chambers are designed as flat vacuum-sealed metal canisters filled with a small amount of liquid. As the phone heats up, the liquid turns into gas, cools, and condenses. At that time, the liquid travels back to the heat source through a secondary channel. This way, the heat dissipates fast and effectively over a small amount of space.
At vivo, we always strive to be at the forefront of modern tech developments, so the latest vivo T1 Series phones feature Vapor Chamber Cooling for the ultimate performance even under the heaviest load.
How does Vapor Chamber Cooling Work in Vivo T1 Series?
The Vapor Chamber Cooling System in our vivo T1 Series phones allows constant peak performance by providing the cooling area three times the phone’s surface. The surface of the Vapor Chamber itself is 2,097 mm2, while the total heat dissipation area of the cooling system is 32,923 mm2. This allows the CPU cores to work under temperatures reduced by up to 12C.
Vapor Chamber works as a part of the 8-layer cooling system, also featuring magnesium alloy mainboard top cover, thermal gel, heat dissipation copper foil, ultra-thick graphite film and plates, six temperature sensors, and intelligent temperature control. All these technologies work together, ensuring the optimal operating temperature to avoid reduced performance and prolong the battery life.
Benefits of Vapor Chamber Cooling
Vapor Chamber Cooling System brings numerous benefits to your smartphones. Below are some of its major advantages over other cooling solutions:
- Occupies less space and transfers heat through a much smaller area than other often-used cooling systems, such as heat pipes.
- Can be made in any shape and placed in direct contact with the CPU and other heat sources, no matter how restrictive the overall hardware design is.
- Due to their ability to dissipate heat up to 2000 watts in only a four-square-centimeter area, Vapor Chambers are great for situations that require reducing a particular hot spot.
vivo T1 5G and vivo T1x
Our new T1 Series of smartphones brings a lot to be excited about, especially for hard-core gamers or those who enjoy binge-watching various streaming platform content. While they offer impeccable imaging, state-of-the-art screen technology, superb connectivity, and prolonged battery life, the main strength of the new vivo T1 5G and vivo T1x is their lightning-fast performance.
It’s not by accident that the “T” in the name of the series stands for Turbo. Thanks to the next-generation Snapdragon processors, our T1 series is able to provide a smooth and lag-free experience in gaming and streaming, even with the most demanding games and apps. Plus, we implemented the Vapor Chamber Cooling System to ensure that the performance never drops below maximum and allow you long gaming sessions without pausing or worrying about overheating.
Keep Your Phone Cool and Enjoy Peak vivo Performance
At vivo, our goal is to always bring cutting-edge technology to our customers, so they can get the most out of their phones and enjoy the ultimate user experience. By adding the Vapor Chamber Cooling System to the new vivo T1 5G and vivo T1x, our engineers have once again proven to be among the industry leaders when it comes to innovation. Putting your phone down to cool off is now a thing of the past, so you can relax and fight your intense gaming combat or watch a whole season of TV in one go.
To keep up with everything new we have prepared for you, join the vivo movement and follow our website and social media accounts across all platforms. Also, don’t forget to subscribe to our newsletter for useful tips and exclusive discounts and deals from vivo.
|
<urn:uuid:8f62f630-09df-4ca3-b263-b24e63fb593f>
|
CC-MAIN-2022-33
|
https://www.vivoglobal.ph/vapor-chamber-cooling-in-vivo-t1-series/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00072.warc.gz
|
en
| 0.911879
| 982
| 2.3125
| 2
|
Ponnur To Repalle Distance
Distance between Ponnur and Repalle is 31 KM
(kilometers) and 494.01 meters. Ponnur is 19.6 miles away from Repalle.
Ponnur and Repalle Location
Ponnur is located in the India state of Andhra_Pradesh at the longitude of 80.6 and latitude of 16.1. Repalle is located in the India state of Andhra_Pradesh at the longitude of 80.9 and latitude of 16.
Ponnur direction from Repalle
Ponnur is located nearly west
side to Repalle. Ponnur To Repalle road map direction from google will be integrated.
Time difference between Ponnur and Repalle
Time difference between Ponnur and Repalle is 0.0193333333333 decimal hours (0 : 1 : 9.6
). Ponnur universal time is 5.37066666667 UTC and Repalle universal time is 5.39 UTC. Ponnur is behind Repalle 0 hours and 1 Minutes and 9.6 seconds.
Travel distance from Ponnur
Traveling distance are available for the following cities
Ponnur To Repalle Travel Time
Travel time from Ponnur To Repalle will take 0 hours and 47.24 minutes if the vehicle keep an average speed of sixty kilometer per hour. Travel time by walk may take around 3.9 hours if you continuously walk at the speed of 6KM.
Ponnur to Repalle direction
The follwing Ponnur to Repalle direction map comming from google. Google distance may vary from our crow fly distance.
Ponnur Repalle information Note:
All information in this page about Ponnur and Repalle are approximate details. It is crow flies distance so the above travel information may be differ from motor road distance.
Dear Travellers / Visitors you are kindly welcome write more about Ponnur and Repalle.
- Previous traveling experience from Ponnur to Repalle.
- Various travel routes from Repalle.
- Tourist spots between Ponnur and Repalle road.
- Hotels details, travel guide and booking information about Ponnur and Repalle.
- You are welcome to provide accurate information about Ponnur and Repalle if the above information is not accurate.
- Travel photos and other information related to Ponnur and Repalle.
|
<urn:uuid:a6ba1da0-6a2b-4005-9224-584661a5b9d9>
|
CC-MAIN-2016-44
|
http://distance4.com/distance/Ponnur/Repalle
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00106-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.845467
| 512
| 1.632813
| 2
|
Dangerous Chess Girl - OMG She can Control Animals Going Wild! (Name the animal!)
Are you preparing for the goodwill chess simul with Chess Queen Alexandra Kosteniuk for Day of Sport for Peace on April 6? Find more details at www.chessqueen.com.
This photo is brought to you from our fantastic albums, including those of some of the world's best chess players, available online at www.chesspics.com.
Also see her personal chess blog
Don't miss Chess Queen™
This is a course for club players based on a textbook by a distinguished Russian chess trainer Victor Golenishchev. The source material is supplemented with examples of play by lead chess players from the latest major contests and is organized in chess lessons. The course is designed for 1 year and contains 75 lessons, including theoretical material and practical exercises. The theoretical part includes more than 400 examples of play. The practical part includes more than 200 exercises of varying difficulty.
- The course allows you to:
- Study the theoretical material and test your knowledge
- See changes in your rating
- Keep track of your progress
- Play against computer starting with a set position
- Print exercises
System requirements: IBM-compatible PC, 256 Mb RAM, hard disk 100Mb, Windows XP/Vista/7/8.
|
<urn:uuid:57942be4-4266-4d12-ac26-3c937f19e1f6>
|
CC-MAIN-2016-44
|
http://www.chessblog.com/2014/04/dangerous-chess-girl-omg-she-can.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00044-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.901657
| 275
| 1.789063
| 2
|
A University of South Australia study examining how dads bonded with their premature babies in a neonatal clinic has confirmed the benefit of skin-to-skin contact in the early weeks of life.
Researchers documented the experiences of a group of fathers holding their premature babies against their bare chest in the pouch-like position, known as ‘kangaroo care’, or KC, which mimics the marsupial model where a joey finds warmth and security within the pouch, close to the mother’s heart.
The caregiving model is replicated in neonatal wards across the world, typically with mothers holding their newborns against their bare skin for as long as possible each day to nurture neurodevelopment and bonds.
Researchers say that while the benefits of mother-infant ‘kangaroo care’ are globally recognised, there is little data on whether fathers and their infants achieve the same outcomes using the method.
Registered nurse and UniSA Masters’ candidate Sophia Dong says that while mothers are still considered the dominant KC providers, changes to traditional family structures in recent decades have meant fathers have long been overlooked.
“We know that kangaroo care provides a variety of benefits for pre-term, low birth weight infants, including lower mortality rates, reduced infections, higher rates of breast feeding, calmer babies and enhanced bonding,” Ms Dong says.
“It also reduces parents’ mental stress caused by premature babies in neonatal intensive care units (NICU) being separated from their parents.”
According to the study, Exploratory study of fathers providing Kangaroo Care in a Neonatal Intensive Care Unit, fathers who took part in the study reported a “silent language of love and connection” with their infant when they adopted the ‘kangaroo care’ model.
For example, first-time father Joel Mackenzie reported feeling an instant connection with his 540-gram daughter Lucy when he held her against his chest two weeks after she was admitted to the NICU at the Women’s and Children’s Hospital in Adelaide.
“Holding her for the first time was one of the best experiences of my life. I felt she knew that her daddy was protecting her and nothing bad was going to happen from then on,” Mr Mackenzie says.
“It’s a chance that most fathers don’t get, and I thought it was important for her development. I was able to hold her for a couple of hours each day and I think that helped her get to know me and vice versa. It was good therapy for me, too, because I felt that I was contributing rather than just being a bystander.
“Lucy settled onto my chest immediately and would hold my hand and pull my chest hair. It was reassuring that she was strong and that she knew my smell. It made me feel more loved than I have by any other person on this planet.”
During KC, the skin-to-skin touch activates nerve receptors in mammals that spark certain hormones, reducing pain and stress for the baby and caregiver, researchers say.
“A child has an innate need to connect with one primary attachment figure which is generally the mother. However, fathers are playing a much larger role as caregivers, including as single parents and same-sex parents,’ Ms Dong says.
Paid paternal leave policies are also encouraging fathers to care for their babies and develop a father-infant attachment as early as birth.
“The fathers described the NICU environment as “overwhelming” initially, causing them to feel anxious and powerless, but the close contact with their baby through KC fostered strong bonds with their infants. This in turn relaxed them, built their confidence and made them very happy.”
Read the full study here
|
<urn:uuid:bb7b3f1e-99f0-4b59-850b-aad64e47b02f>
|
CC-MAIN-2022-33
|
https://anmj.org.au/how-dads-can-use-kangaroo-care-to-bond-with-their-babies/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00274.warc.gz
|
en
| 0.977601
| 791
| 2.53125
| 3
|
Best explanation I've heard for the ADHD epidemic:
Our kids are now amazingly stimulated by a huge variety of media from birth. They live in a world that is EXTREMELY stimulating and with constant diversions such as computers, television, music, handhelds, etc.. etc..
Then you take them and put them in a completely non-stimulating environment where a person stands in front of the class, trying to teach them "boring" stuff (in comparison to the media they're accustomed to consuming).
Then when they don't/can't pay attention, we label them with ADD/ADHD and give them drugs to help them focus.
In this world of sin and sorrow there is always something to be thankful for; as for me, I rejoice that I am not a Republican.
- H. L. Mencken
|
<urn:uuid:a4f9a735-ed2a-404e-bd02-c343eb520bf7>
|
CC-MAIN-2017-04
|
http://www.chiefsplanet.com/BB/showpost.php?p=9184907&postcount=84
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00474-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.96044
| 172
| 1.648438
| 2
|
Published online in Current Biology “Aedes aegypti Mosquitoes Detect Acidic Volatiles Found in Human Odor Using the IR8a Pathway” is exciting new research out of the DeGennaro lab at FIU.
Mosquitoes use olfaction as a primary means of detecting their hosts. Previously, the functional ablation of a family of Aedes aegypti olfactory receptors, the odorant receptors (ORs), was not sufficient to reduce host seeking in the presence of carbon dioxide (CO2). This suggests the olfactory receptors that remain, such as the ionotropic receptors (IRs), could play a significant role in host detection. To test this, we disrupted the Ir8a co-receptor in Ae. aegypti using CRISPR/Cas9. We found that Ir8a mutant female mosquitoes are not attracted to lactic acid, a behaviorally active component of human sweat, and they lack odor-evoked responses to acidic volatiles. The loss of Ir8a reduces mosquito attraction to humans and their odor. We show that the CO2-detection pathway is necessary but not sufficient for IR8a to detect human odor. Our study reveals that the IR8a pathway is crucial for an anthropophilic vector mosquito to effectively seek hosts.
|
<urn:uuid:2c6ba3b1-c6da-4f35-b4b2-e257acbfbfbf>
|
CC-MAIN-2022-33
|
https://cdcsercoevbd-flgateway.org/new-coe-research-published-in-current-biology/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00473.warc.gz
|
en
| 0.911464
| 275
| 3.1875
| 3
|
I’m reading document on Resolution Independence on Mac and will visit MS side of the technology called “High DPI-awareness” and compare it.
To things make short, on Mac old code looks to be used without modification and what you mostly need is to prepare a higher resolution images for UI. ( On the other hand, things on Window is not this hassle-free.) Creating raster images for different resolution is kind of cumbersome. According to the original description of RI (Resolution Independence) was that it doesn’t assume any specific resolution and their backend scales up images nicely. Well, automatic scaling using interpolation surely introduce artifacts. So, it was recommended to provide icons and artwork in different sizes, though.
However, what if they support SVG as well as raster image formats like JPG, PNG, TIFF etc?
Although it is somewhat different, Apple took a similar approach a while ago before Mac OS X.
if you have been a long time developer on Mac, you will remember PICT type. One thing I didn’t understand at that time about PICT was that there is no direct way of editing its pixel buffer. So, for this part I liked Windows (3.0) more, because BMP is purely raster format.
According to Inside Macintosh ( II or III ), PICT contains a series of command on how to draw images. And when it is to be rasterized, the result of issuing those command is copied to a buffer and that it be displayed on a monitor. So, although it could be drawn on any size. I remember that it was not that flexible. Probably at that time there was not so much of necessity required in the market to draw images on many different devices with different resolution.
What I mean is, whether PICT could support different DPI or not, it had foundation for being RI technology. Because PICT are used to be skin for many UI widgets, I believe SVG can be used like that.
So, can we guess that Apple engineers are considering to adopt SVG for their format of choice for UI?
At least the iOS team caught up the Mac OS X team in terms of the OS version now with iOS 6. So, probably they can have more people to utilize and now can bring some enhancement to the both platform at the same time. Then, probably AV Foundation / QuickTime X and this thing can be one of that!
|
<urn:uuid:16b4b3d3-b102-4b84-82f8-5cb4df958305>
|
CC-MAIN-2016-44
|
https://jongampark.wordpress.com/2012/08/03/resolution-independence-with-svg/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00190-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.959077
| 500
| 1.992188
| 2
|
Think of lipomas as wrinkles on dogs -- unfortunate side effects of the aging process. The good news is that, in the majority of cases, they are harmless, they are slow to grow, and they have no effect on mobility. Removal requires a surgical procedures, but unless the lipoma is causing a problem, removal is not recommended as a standalone procedure.
A Little About Lipomas
Lipomas are composed of benign fatty tissue. They form soft, squishy, moveable lumps within the skin layer and are not associated with any skin irritation, pain or hair loss. Their mechanism of action is not fully understood, but they seem most prevalent in older dogs, especially in overweight females. In addition, certain breeds -- such as cocker spaniels, dachshunds, poodles and some terriers -- are more likely to develop these. Lipomas are easily diagnosed with a procedure called a fine needle aspirate. This process involves inserting a needle into the lump, procuring cells and taking a microscopic look at them.
Most lipomas will be centered around the belly or chest and will not impact movement or health. They are merely cosmetic issues. However, on occasion, lipomas may develop in the armpit or groin area, causing restriction. In these cases and in more serious ones, surgical removal may be recommended. Infiltrative lipomas are those that invade the surrounding bones and muscles, causing decrease in function. They're often found on limbs. Elsewhere, they can also restrict breathing, digestion and defecation. It should be noted that, while these are more difficult to control, they are also noncancerous.
Surgical excision of lipomas is the only treatment option. But for cosmetic lipomas, the reality is that if there is one, there will be more. Surgery requires anesthesia, and some risks associated with that -- especially in the target patient -- an older, possibly overweight dog. Therefore, veterinarians will often recommend observation; sometimes they suggest removal should a dog need to go under the knife for another necessary procedure.
When Surgery Is Recommended
When surgery is recommended, as in the case of infiltrative lipomas, or those causing distress to your pup, your veterinarian may want to conduct additional imaging to help determine the extent of the fatty tissue deposits. In addition, the vet will likely recommend preoperative lab work to ensure Fido is healthy enough for a surgical procedure. Surgery will seek to remove the lipoma completely to prevent regrowth. However, if this is not possible, radiation therapy is another means.
- Jupiterimages/Photos.com/Getty Images
|
<urn:uuid:57e78b14-9271-49ad-8863-f139b54710eb>
|
CC-MAIN-2017-04
|
http://dogcare.dailypuppy.com/can-stop-rid-lipomas-dogs-7600.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00277-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.950213
| 533
| 2.078125
| 2
|
Boxing Science would like to wish everyone a happy pancake day and present a pancake day for boxers.
All those boxers training hard and working towards making weight, you might be finding pancake tempting and frustrating. Well, not to worry, we have some healthy options to help fuel your training performance and help boost recovery.
Power up with Peanut Butter – Pre-Training
Pancake Mixture 2 eggs, 1 mashed banana one teaspoon of baking powder.
Toppings 1 tablespoon of peanut butter.
Nutritional Info 339 Kcals. 26 g of Carbohydrates. 17 g of Protein. 18 g of Fat.
Pancakes for Total Recovery – Post-Training
Pancake Mixture 1 egg, 2 egg whites, 20 g of oats and one teaspoon of stevia.
Toppings Blueberries and Raspberries – a handful of each. 200 g of 0% Total Greek Yoghurt.
Nutritional Info 381 Kcals. 42 g of Carbohydrates. 38 g of Protein. 7 g of Fat.
|
<urn:uuid:3099e1be-fa44-4e72-9150-691e6b374dc0>
|
CC-MAIN-2017-04
|
http://www.boxingnewsonline.net/pancake-day-for-boxers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00428-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.896558
| 221
| 1.59375
| 2
|
Lab Report for AGRO/BIOTC460
LAB REPORT 5
NAME: M. Azrul Akmal Saharudin
SUBMISSION DATE: May 3rd , 2011
Transgene Detection by Phenotypic Screening and Molecular Diagnosis Test.
The introduction of Bar gene into maize and using phenotypic screening and molecular diagnosis test to detect the expression of the gene are one of commonly use method for transgene detection. We were using maize plant that was transformed with Bar gene using gene gun. For phenotypic screening, BASTA(Liberty) herbicide was applied to the plant to detect whether the plant show the phenotype of BASTA resistant or not. For molecular diagnosis test, we have used polymerase chain reaction(PCR) and gel electrophoresis to detect whether the gene present in the plant genome or not. Transgenic plants were selected and regenerated using herbicide resistance and GUS as a marker. Based on phenotypic and molecular analyses of groups putative transgenic plants confirmed the co-integration bar genes with a frequency of 54% of the transgenic plants. Another 46% carried a false positive result by showing resistant in phenotypic screening but confirmed not expressing the Bar gene by molecular diagnosis test. This result proved that transformation using gene gun produce an approximately ’50-50 chance’ for positive result because the intracellular target is random.
Plant transformation is the introduction of a foreign gene of DNA into the host plant tissue and this foreign gene presents a specific trait1. When we talk about transformation, actually we are talking about genetic alteration of a cell resulting from the direct uptake, incorporation and expression of exogenous genetic materials from its surrounding and taken up through cell membranes. Principally, foreign gene is known as the transgene1. Plants are transformed when we want to create transgenic plant which contains gene that confers desirable traits. This is possible due to the outcome of functional...
|
<urn:uuid:45e84ca9-1e7c-4099-9cac-db8e52b76397>
|
CC-MAIN-2017-04
|
http://www.brainia.com/essays/Lab-Report-Biotc460/234527.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00120-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.91522
| 406
| 1.890625
| 2
|
Complications after Gastric Band Surgery
Gastric band surgery comes with many of the same risks and complications as any other major surgery. However, there are some added risks when you are obese or overweight. Some of these complications will be short-term while others can be long-term.
Short-term Risks after Gastric Band Surgery May Include:
- Blood clots in either the legs (deep vein thrombosis) or the lungs (pulmonary embolism)
- Adverse reaction to the anesthesia
- Internal bleeding
- Stomach damage or gastritis (irritated stomach tissue)
The risk of death during or shortly after your gastric band surgery is low. However, there is a chance with any surgery. The risk of death in gastric band procedures is 1 in every 2,000. Your chances may be increased if:
- You are over 45
- You have high blood pressure (hypertension)
- You have a BMI above 50
- You have a known risk for a pulmonary embolism
Your bariatric surgeon will take into account your risks before surgery. If you have any concerns about potential risks before your gastric band surgery, make sure you ask your surgeon.
Long-term Risks and Complications May Include:
- Band prolapse. This occurs when a part of the stomach wall slips through the band, causing a larger portion of the stomach pouch to sit above the band. This can prevent weight loss and cause an obstruction which could lead to vomiting, heartburn or coughing spells. Your band can prolapse if you eat too much or too quickly. Your bariatric surgeon can reverse this with another laparoscopic procedure.
- Erosion. This occurs when the band moves from the outside of the stomach to the inside. It may occur without your knowledge. Erosion of your gastric band requires surgical removal of the band.
- Port or tubing problems. Your port can move or become disconnected from the tube that leads to your gastric band. The tube can also become perforated or develop a kink that prevents your band from functioning properly. This, too, would require a minor surgery to reverse.
- Food intolerance. This is a rare complication, but it can occur years after your gastric band surgery. Your body will be unable to tolerate certain foods such as red meats or certain greens. This can lead to nausea and vomiting.
Obesity puts you at an increased risk for several disorders and could lead to premature death. The complications associated with gastric band surgery are usually rare and are often treatable without additional surgical intervention. When considering the possibility of surgical risk, it is worth discussing with your surgeon the likelihood of a problem after surgery versus the risk to your health of not treating your obesity.
|
<urn:uuid:bd457425-906a-4eb6-9058-c5e34e1bd916>
|
CC-MAIN-2022-33
|
https://drmichaelchoi.com/weight-loss-guide/your-bariatric-surgery/complications-after-gastric-band-surgery/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00075.warc.gz
|
en
| 0.953446
| 577
| 1.851563
| 2
|
Go back to the main page.|
Jason Duncan (email@example.com)
William Blackburn, Early Traphill Settler
William Blackburn was an early settler in the Traphill area of northeastern Wilkes County. His wife’s name was Sarah and they were listed in the 1850 Wilkes Co census living with their daughter in house #813: Wm. (86, born VA), Sally (85), and Sarah (38). Their children were:
1. John Blackburn 1788 -
2. Polly Blackburn 1790 -
3. Nancy Blackburn 1791 –
4. Mary Blackburn 1792 - 3/ 1/1881
5. William Burton Blackburn 3/26/1796 - 6/17/1870
6. Lambeth T. Blackburn 1804 - 1840
7. *Eli Austin Blackburn, Sr. 1806 - 4/11/1900
8. Phoebe Blackburn 10/14/1807 – 11/26/1892
9. Sarah Blackburn 1812 -
While information on his family and descendants can usually be found, there is little proof documenting when William came to the area. Was he born in the Wilkes area or did he emigrate from Virginia? A widely held belief is that William was born about 1764, the son of Augustine Blackburn (born c1745), who was the son of Ambrose Blackburn (born c1720). In order to understand the earlier Blackburn generation, here is some background information.
1768 Taxables for Rowan Co, NC, Upper Dan (now Surry or Stokes Co): Ambrose Blackburn, Sr. taxed for himself, son Ambrose, Jr, son Augustine, and his four slaves: Franck, Jude, Esther, and Kalchu.
Surry Co DB A, p3: On 7/13/1771, Ambrous Blackburn sold 150 acres to his son Newman Blackburn for £60. The land was located on Town Fork Creek, adjacent to Justes and James Hampton.
Surry Co DB A, p13: On 12/31/1771, Ambrose Blackburn, Sr. gave a deed of gift to "his son Augustine Blackburn" including half of his land on the south side of Town Fork, one feather bed and furniture, and one saddle. It was witnessed by William Hill and John Halbert.
Surry Co DB A, p12: On 12/31/1771, Ambrose Blackburn, Sr. gave a deed of gift to Ambrouse Blackburn, Jr. including half of his land on the south side of Town Fork, negro boy Cain, negro girl Amy, and one sorrel mare. The witnesses were William Hill and John Halbert.
This suggests that Ambrose Blackburn, living in the greater Surry Co area, had sons Ambrose Jr, Augustine, and Newman. Surry Co was formed from Rowan Co in 1771. Later, Wilkes Co was formed from Surry Co in 1777. Also, Stokes Co was formed in 1789 from Surry Co. Our William Blackburn would be about the right age to be a son of one of these three sons of Ambrose Sr.
Many researchers name Augustine as William’s father. Augustine is said to be listed in the 1772 Surry Co tax list and in a Surry Co deed (DB A, p13-15). On 10/13/1783, he received a grant (#484) for 600 acres near both forks of Great Neatmans Creek (Surry Co DB B, p308-9). He is found on the 1787, 1788, and 1789 Wilkes Co tax lists. On 12/21/1789, Benjamin Watson sold 600 acres to Augustine Blackburn (Surry Co DB D). They were both living in Wilkes Co at the time. On 4/6/1790 Augustine sold 100 acres on Oldfield Creek in Stokes Co and soon moved to the Pendleton District near the Saluda River in South Carolina. He is mentioned in Pendleton records in 1791 and 1792. On 6/12/1793, he lost his land in Stokes Co, NC, according to a deed describing it as 235½ acres sold on 5/7/1792 adjoining Ambrose Blackburn and Younger Blackburn (i.e. his nephew, son of Newman). He later moved on to Jackson Co, GA, where his estate was appraised on 11/9/1796. On 1/1/1798, an account of the sale of the estate of Augustain Blackburn, late deceased, was given in Jackson Co. Augustine is said to have left a will dated 1794 in GA where he lists a son William who was a minor. However, according to census records, our William would have at least been in his 20s at that time, not a minor. Also, our William was in Wilkes at that time, and probably would not have been mentioned in a GA will. Therefore, it appears that the William listed in Augustine's will must be someone else. Of course, it is possible that Augustine actually had two sons named William: one born c1764 who stayed in NC, and another born in the 1780s who went to GA. It is also possible that the Augustine found in SC and GA records is someone else. I have not seen any of those records first hand.
If Augustine was not the father of our William, what about Ambrose Jr? On 9/10/1778, he received a grant of 200 acres near Mill Creek (Surry Co, NC, DB A, p244-5). On 10/31/1778, he sold 100 acres to Mack Ship for £60, land located near Townfork Creek, crossing Oldfield Creek (Surry Co DB A, p259-60). Deeds dated 7/21/1785 and 10/16/1785 show Ambrose selling 100 and 450 acres (Surry Co DB C, p287, DB D, p103-4). It appears that he was in SC by 1787 and was a Justice of the Peace in Greenville Co. Ambrose was a witness to a deed for 200 acres sold by Reuben Stringer and his wife Elizabeth on 7/16/1787 in Greenville Co, SC. He moved to Maury Co, TN, about 1803 where he died. The family homestead is in Lewis Co, TN. Upon the death of Ambrose Jr, his son John Blackburn inherited it. In the 1840s the house served as the Lewis Co Courthouse. The farm has since been turned into a museum. Our William would have been in his 20s when Ambrose Jr moved to SC. This information does not seem to support or counter the notion that Ambrose could be his father. However, I have not seen any sources which list Ambrose Jr having a son named William.
What about Newman Blackburn, possibly the oldest son of Ambrose Sr? He is listed in the 1768 Rowan Co Taxables with three taxables including himself, slave Juniker, and wench Sall. He left a Surry Co will on 12/18/1771 naming five children including one named William. Another son, named Younger, was the executor of the will which was received in the February 1772 court. This places a William Blackburn of the right age in the right general area to be our Traphill settler. However, there are still some unanswered questions.
The problem is that there were too many William Blackburns in the Wilkes/Surry/Stokes area in the late 1700s and early 1800s. Here are all the Blackburns found in the following records up until 1800.
1787 Wilkes Census
#336 William Blackborn, Ferguson's Dist, 2M(21-60), 2 females
#2905 Auston Blackbour, Gordon's Dist, 1M(21-60), 1M(not 21-60), 6F, 2 blacks (12-50)
1790 Wilkes Census
Jas Blackburn, 13th Company: 2M(over 16), 1M(under 16), 2F
Wm Blackburn, 6th Company (Traphill area): 1M(over 16), 1M(under 16), 3F
1790 Surry Census
Susanna Blackburn: 2M(under 16), 3F
Jeremiah Blackman: 1M(over 16), 1M(under 16), 5F
John Blackman: 1M(over 16), 1M(under 16), 5F
Solomon Blackmon: 1M(over 16)
1790 Stokes Census
Younger Blackbern: 1M(over 16), 3M(under 16), 5F, 1 slave
Elizabeth Blackbern: 2M(over 16), 2F, 2 slaves
John Blackbern: 1M(over 16), 4M(under 16), 4F, 3 slaves
William Blackbern: 1M(over 16), 5 slaves
1800 Wilkes Census
William Blackburn (appears to be Traphill area): 3M(under 10), 1M(over 45), 1F(under 10), 3F(10-16), 2F(26-45), 1 F(over 45)
1800 Stokes Census:
Blackborn, William (age 26-45)
Before any conclusions are drawn from the census information alone, the Wilkes Co tax lists should be considered. There is a William Blackburn listed in Wilkes Co tax lists in Hammon’s District in 1792, 1793, 1795, 1796, 1797, and 1799. This district includes the Traphill area. However, another man by the same name is also listed in tax lists for Ferguson’s District from 1786 to 1793. This district was changed to “Wm. Blackburn’s District” in 1795. Ferguson’s District was located in the western part of the county in what is now Watauga Co. The William Blackburn of Ferguson made an application for pension (S14967) dated 10/15/1831 in Caldwell City, KY. He stated that he was 75 years old and born on 2/12/1757 in Fairfax City, VA, where he enlisted. After the war, he “lived a good many years in Wilkes Co, NC, then several years in TN, and then to Caldwell, KY, to live with children since 1828”. He died on 3/13/1841. The pension record states that he was married to “Sara Baird”, living with Harrison Blackburn in 1840. Several members of the Baird family were listed in Ferguson’s District, located in the western part of the county. However, he is not our William Blackburn, since our William lived out his life in Traphill.
The tax lists indicate that there were two William Blackburns in Wilkes Co between 1792 and 1795. Wilkes Co land records can be found for the William of Ferguson District from 1788 to 1794. However, the first land record for William of Traphill appears to be in a deed dated 8/3/1807 where “Wm. Blackburn” bought 70 acres on the south side of Elk Spur Ridge from Thomas Billings for £50. It was witnessed by Thomas Walsh and Jeremiah Cardwell. (Wilkes DB F2, p42 and p56). There is also a deed from 1821 and two from 1840 that appear to involve William of Traphill (Wilkes DB P, p364; Wilkes DB R, p121; Wilkes DB P, p163).
Before we continue, here are later listings for William Blackburns in Wilkes and Stokes Co censuses.
1810 Wilkes William Blackburn: 2M(under 10), 2M(10-15), 1M(16-25), 1M(26-45), 1F(under 10), 2F(16-25), 1F(26-45), 1F(over 45) --his neighbors indicate he was in the Traphill area
1820 Wilkes William Blackburn: 1M(under 10), 1M(16-25), 1F(16-25)
William Blackburn: 1M(10-15), 1M(16-18), 1M(19-25), 1M(over 45), 1F(under 10), 1F(10-15), 1F(16-26), 1F(over 45)
1830 Wilkes William Blackburn: 1 M(20-29), 1 M(60-69), 1 F(15-19), 1 F(60-69)
William Blackburn, Jr: 1M(under 5), 1M(10-14), 1M(30-39), 1F(under 5), 1F(5-9), 1F(30-39)
1840 Wilkes William Blackburn: 1M(under 5), 1M(5-9), 2M(10-14), 1M(15-19), 1M(40-49), 1F(under 5), 1F(10-14), 2F(15-19), 1F(40-49)
William Blackburn: 1M(under 5), 1M(5-9), 2M(10-14), 2M(15-19), 1M(20-30), 2F(5‑9), 1F(20-29), 1F(40-49)
William Blackburn Sr: 1M(70-79), 1F(20-29), 1F(70-79)
1810 Stokes William Blackburn: (over 45)
1820 Stokes Wm. Blackbourn: (over 45)
1830 Stokes William Blackburn: (60-70 living with old man in his 90s)
William Blackburn Jr
1840 Stokes William Blackburn: (50-60, must be Jr.)
1850 Stokes William Blackburn: (age 10, born NC)
So, what have we learned? At first glance it appears that our William was the son of Newman who died in Surry Co in 1772. At the time, this area included what later became Wilkes and Stokes Co. Early Stokes Co censuses include Younger Blackburn, a known son of Newman. These same Stokes Co censuses include a William Blackburn who was very possibly the brother of Younger. But our William can be found in Wilkes Co at the time! It appears that William, son of Newman, remained in Stokes Co, and therefore is not the man we are looking for.
When is our William first documented in Wilkes Co? The tax lists include two Williams between 1792 and 1795. While one was living in the western part of the state, it seems likely that the other would be our William of Traphill. However, in each of the censuses of 1787, 1790, and 1800, there is only one William Blackburn listed. In 1787, it was the William in Ferguson District. In 1790 and 1800, it appears to be the William in Traphill. Perhaps one William was overlooked in 1787 and 1790. By 1800, the William of Ferguson District had probably moved on to TN.
Also worth noting, there was another family of Blackburns living in the Ashe Co area in the late 1700s. In Wilkes Co Heritage Volume 2, on page 121, there is an article on a Benjamin Blackburn "born before 1755" who fought in the Revolutionary War. He married Elizabeth Adkerson. While they are not listed as having a son named William, could they still be related somehow?
Of course it is always possible that our William came from VA and was actually the first in his family to settle in Wilkes Co. There is no definitive proof that he is related to any other Blackburns in the area. However, the names of his children may be a clue. His first son was named John. Could that have been William’s father’s name? One son named Eli Austin could have been named after his grandfather Augustine whose name was often spelled Austin or Auston in early records. Son William Burton may have been named after his mother’s maiden name which may have been Burton. Son Lambeth T. (Tye?) is not a very common name and may yield additional clues as to the parentage of our William Blackburn of Traphill.
Much more research is necessary before the origin of William Blackburn of Traphill can be determined. Other records which could be helpful are Surry Co tax lists, the Surry Co 1784/87 census, or possibly some early church records. Since he lived in the vicinity of Old Roaring River Baptist Church, perhaps there is some mention of him in their early records. Hopefully this report will generate new ideas and theories which will lead to the discovery of the parentage of William Blackburn.
|
<urn:uuid:91b3407e-c334-4a71-af02-c71ce406a2d3>
|
CC-MAIN-2017-04
|
http://www.webjmd.com/bio/blawill.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00384-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.956894
| 3,506
| 2.5625
| 3
|
"Imagine" is a song written and performed by English rock musician John Lennon. It is the opening track on his album Imagine, released in 1971. "Imagine" was released as a single in the United States where it reached number three on the Billboard Hot 100. When asked about the song in one of his last interviews, Lennon declared "Imagine" to be as good as anything he had written with the Beatles. The song is one of three Lennon solo songs, along with "Instant Karma!" and "Give Peace a Chance", in the Rock and Roll Hall of Fame's 500 Songs that Shaped Rock and Roll. Rolling Stone Magazine ranked "Imagine" the 3rd greatest song of all time.
The song's refrain may have been partly inspired by Yoko Ono's poetry in reaction to her childhood in Japan during World War II. According to The Guardian, primordial versions of the song's refrain can be found in her 1965 book Grapefruit, where she penned lines such as, "imagine a raindrop" and "imagine the clouds dripping."
Ono indicated that the lyrical content of "Imagine" was "just what John believed — that we are all one country, one world, one people. He wanted to get that idea out." In addition, the content of "Imagine" was inspiration for the concept of Nutopia: The Country of Peace, created in 1973. Lennon included a symbolically mute "anthem" to this country on his album Mind Games. Also, inspiration for Yoko's Imagine Peace Tower in Iceland came from words in the second verse: Imagine all the people living life in peace.
In the book Lennon in America, by Geoffrey Giuliano, Lennon commented that Imagine was an "anti-religious, anti-nationalistic, anti-conventional, anti-capitalistic [song], but because it's sugar-coated, it's accepted."
"Imagine" was released as a single in the United Kingdom in 1975 (in conjunction with the album Shaved Fish) where it peaked at number six on the UK Singles Chart. Following Lennon's death in 1980, the single re-entered the UK chart and was number one for four weeks in January 1981. "Imagine" was re-released as a single in the UK in 1988 (peaking at number 45) and again in 1999 (reaching number three). "Imagine" was the sole John Lennon track included in a promotional-only various artists compilation album issued by Capitol records entitled "The Greatest Music Ever Sold" (Capitol SPRO-8511/8512). Distributed to record stores during the 1976 Holiday season, it was part of Capitol's "Greatest Music Ever Sold" campaign promoting 15 "Best Of" albums released by the record label. The song was also included on a six-disc boxed set commemorating Capitol Record's sixtieth anniversary that was issued in 2002.
|
<urn:uuid:f2111372-a619-4825-a3ea-3ccf18ec103a>
|
CC-MAIN-2017-04
|
http://letitallbemusic.blogspot.com/2012/12/john-lennon-imagine.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00338-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.979739
| 588
| 2.796875
| 3
|
The Neuroscience Mission of Boston University is an outgrowth of the collective academic and research accomplishments of its many talented faculty who are empowered by the dedication and intellectual ability of their students. Together they face the challenge of unraveling the mysteries of brain function and harnessing them to understand how we interpret the world around us, how we evolved and continue to evolve, and how through our discoveries we can repair or prevent the loss of brain processes that are critical to the quality of our existence.
The broad range of neuroscience research activities across both the Charles River and Medical campuses is augmented by scientific retreats, innovative workshops, and collaborative research grants that stimulate new scientific partnerships across the diverse laboratories of the University. A variety of neuroscience Centers across the University interface with the neuroscience community to provide a network of opportunities for both faculty and students.
The neuroscience faculty support two major University-wide training programs: Undergraduate and Graduate. The goal of these programs is to allow students to move freely between departments, schools, and disciplines. At Boston University, we embrace the intersectionality of identities within our neuroscience community just as we recognize and welcome the multidisciplinary nature of neuroscience. We work everyday to foster a diverse, inclusive community where students, faculty, and staff are continually learning from each other, and advancing our scientific understanding of the brain.
|
<urn:uuid:5babdb3e-f2e6-4689-8402-89be797b2057>
|
CC-MAIN-2022-33
|
https://www.bu.edu/neuro/about/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00067.warc.gz
|
en
| 0.936871
| 265
| 1.773438
| 2
|
Uraniferous Lake Sediment Analyses Bolster Potential at Carpenter Lake Property, Athabasca Basin, Saskatchewan
Vancouver, Canada, May 21st, 2014, Noka Resources Inc. (TSX-V: NX, FSE: 2NK) (“Noka”) is pleased to announce that the lake sediment sample analyses have been received. The lake sediment samples were collected in April 2014 during a radon in lake water and sediment survey at Carpenter Lake, Athabasca Basin, Saskatchewan as part of ALPHA EXPLORATION INC. ("Alpha") (TSX-V: AEX) Option Agreement to earn a 60% interest in the Carpenter Lake Property from Noka. A total of 60 lake sediment samples were recovered by RadonEx Exploration Management of St. Lazare, Quebec within six grids (A to F) along the Cable Bay Shear Zone (CBSZ) and within the 20,637 hectare Property.
Highlights of the Lake Sediment Results:
- Eight lake sediment samples are strongly anomalous with uranium (3.9 to 37 ppm). In comparison, 3.8 ppm uranium was the highest concentration in lake sediments proximal to one of the largest high grade uranium boulder fields in the Athabasca Basin at Patterson Lake South (PLS);
- The eight uraniferous lake sediment results were accompanied by arsenic (1.6 to 76 ppm), cobalt (3.3 to 33 ppm), copper (12 to 68 ppm), lead (1.4 to 3.8 ppm), molybdenum (0.5 to 4.6 ppm), and nickel (14 to 50 ppm). This geochemical signature is consistent with a graphitic/pyritic pelite basement bedrock source that is anomalous with uranium, and may represent material eroded from the CBSZ;
- Grid C: westernmost lake returned background values of uranium in lake sediments, which suggests the strongly anomalous radon values are sourced from directly below in the bedrock where a VTEM conductor is present. Iron oxide coatings on pebbles were observed with the anomalous radon values, which was an environmental condition associated with mineralization at Key Lake and PLS;
The lake sediment samples were recovered concurrent with radon in sediment samples that were targeted above electromagnetic ("EM") conductors confirmed in a detailed airborne VTEM and magnetic survey completed in February 2014 by Aeroquest International Limited. Where substantial overburden thickness exists, lake sediment samples represent glacially transported material, and the bedrock source of anomalous uranium is thought to be situated up-ice. Conversely, radon in lake and sediment anomalies may represent a bedrock source directly below where the concentration of uranium in the lake sediments is at background levels. The lake sediment results have assisted in determining whether radon anomalies may be sourced from the overburden or bedrock directly beneath, which will be a valuable tool in developing future exploration programs on the Property.
Summer exploration at Carpenter Lake will include a detailed high-resolution airborne gamma radiation spectrometric survey (radiometrics). The detailed radiometric survey will be followed by ground prospecting, geochemical and radon sampling.
All of the lake sediment samples recovered were submitted to SRC Geoanalytical Laboratories (an SCC ISO/IEC 17025: 2005 Accredited Facility) of Saskatoon for analysis, which included a 63 element ICP-OES, and uranium by ICP-MS.
The technical information in this news release has been prepared in accordance with the Canadian regulatory requirements set out in National Instrument 43-101, and reviewed on behalf of Alpha Exploration Inc. by Garrett Ainsworth, P.Geo., Vice President Exploration, a qualified person.
About Noka Resources Inc.:
Noka Resources Inc. is a junior exploration company with a focus on uranium in the prolific Athabasca Basin, Northern Saskatchewan. Noka’s exploration strategy is focused in relatively underexplored areas of the Athabasca Basin Region, targeting favourable geology and structure amenable to near surface, unconformity-style uranium mineralization.
With a total prospective land position of 493,236 hectares, Noka holds one of the largest geologically prospective land packages in the region through a 100% interest in the Clearwater (which includes the Carpenter Lake) and Athabasca North group of properties, an option to earn 100% interest in the Lodge Pole Point Project, as well as a 25% interest in the Western Athabasca Syndicate group of properties.
For further information, please contact Nav Dhaliwal, President, at [email protected] or visit www.nokaresources.com.
ON BEHALF OF THE BOARD OF DIRECTORS
President and CEO
Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.
This press release contains "forward-looking information" that is based on Alpha’s current expectations, estimates, forecasts and projections. This forward-looking information includes, among other things, statements with respect to Alpha’s exploration and development plans. The words "will", "anticipated", "plans" or other similar words and phrases are intended to identify forward-looking information.
Forward-looking information is subject to known and unknown risks, uncertainties and other factors that may cause Alpha’s actual results, level of activity, performance or achievements to be materially different from those expressed or implied by such forward-looking information. Such factors include, but are not limited to: uncertainties related exploration and development; the ability to raise sufficient capital to fund exploration and development; changes in economic conditions or financial markets; increases in input costs; litigation, legislative, environmental and other judicial, regulatory, political and competitive developments; technological or operational difficulties or inability to obtain permits encountered in connection with exploration activities; and labour relations matters. This list is not exhaustive of the factors that may affect our forward-looking information. These and other factors should be considered carefully and readers should not place undue reliance on such forward-looking information. Alpha disclaims any intention or obligation to update or revise forward-looking information, whether as a result of new information, future events or otherwise
|
<urn:uuid:9153d8e2-55ad-4d5f-93bd-2c40325e6d13>
|
CC-MAIN-2022-33
|
https://www.pactongold.com/news-and-media/news/uraniferous-lake-sediment-analyses-bolster-potential-at-carpenter-lake-property-athabasca-basin-saskatchewan
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00068.warc.gz
|
en
| 0.913094
| 1,313
| 1.773438
| 2
|
The connection with Joseph of Arimathea and with vessels associated with the Last Supper and crucifixion of Jesus. Joseph used the Grail to catch Christ’s blood while interring him and how he founded a line of guardians to keep it safe.
10 knowledge check
Cup that held the blood of Jesus Christ
20 knowledge check
Is currently in Hispania.
30 knowledge check
Casts heal, restoration and resurrection 1/day CL 21
|
<urn:uuid:af580dee-8b12-4652-ab00-52321467aa89>
|
CC-MAIN-2017-04
|
https://theophagie.obsidianportal.com/wiki_pages/holy-grail
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00529-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.886705
| 95
| 1.726563
| 2
|
Born in 1932 - France
Born in 1932 to a family of Eastern European immigrants, Marc Held is considered one of the leading designers of the 1970s.
Born in Paris, Held grew up in the Parisian suburb of Bagnolet, in a world steeped with communist ideology. During the occupation of World War II, he found refuge with his mother in Corrèze, where he discovered nature and rural architecture. He returned to Paris in the 1950s during the height of the theatre scene, which was seeing a rebirth of the “Théâtre National Populaire” under the leadership of Jean Vilar, and the jazz scene made popular in the clubs of Saint-Germain. At the age of 20 Marc Held discovered photography.
Following a prevailing principle of the time created by writer and poet Philippe Soupault, the ’coeur dans les yeux’ (heart in the eyes), Held sought to show people through a filter of their own humanity and capture mankind in a positive light.
Pushed by this desire to bear witness to and reveal the society around him, he spent ten years, with first a Zeiss Ikon camera, and later a Leica M3, photographing this small world that surrounded him, from the Paris of the underprivileged, still devastated from the years following the war, to political protests, to children at study and play, adults on the beach, the Corrèze of his childhood, his first escapades far from the city or the suburbs under construction. It was also the beginning of Held’s interest in design, which he discovered in the shop windows of furniture makers Knoll and Mobilier International, an environment that fascinated him and led him to become a designer. Throughout his development as a photographer, a designer and later as an architect, the humanist and cultural values instilled in him as a child, have always been present.
In 1960 he decided to pursue design and architecture and created his studio of industrial design in Paris, where he works today serving an international cliental. His many creations have received high praise in the media. He is notably the creator of a plastic bed, which in 1968 made the cover of the catalogue of Prisunic, a popular chain of shops in France. Held is also the designer of the famous ‘Culbuto’ armchair, created with design house Knoll in 1970, which perfectly embodies the aesthetic of the time. Held’s work has been exhibited extensively, including at the Triennale de Milan, Erodomus, and his works feature in several museum collections.
Starting in 1974, strengthened by his experiences and without abandoning his product design practice, he started his career as an architect. Basing his practice on a rigorous methodology of complete involvement in every step of the design, he refused to produce more than he believed to be able to carry out personally. He thus created remarkable works, at first on a smaller scale, but that the international press published widely.
In 1983, at the request of the French President, François Mitterrand, he designed the interiors of the presidential apartments and created for the Élysées Palace, in collaboration cabinetmakers from around France, exceptional furniture: a bureau, sideboards, chairs and a dining table. In 1990 he was nominated for the Ordre des Arts et des Lettres (Order of Arts and Letters).
His photographs have been praised by numerous figures from politician Jack Lang to director Agnès Varda, who introduced his first photographic series. Rich in almost 300 images, this body of work reveals the root and the sense of an undertaking carried by the aspiration of a changing society and the desire of a creator who is at once classical and modern.
2014 "Marc Held Photographies et Design. Un plongeon dans les années 50", VOZ'Galerie, Boulogne-Billancourt (voir le diaporama)
2013 Cité du Design de Saint-Etienne
2013 "De la Photographie au Design", Galerie Alexis Pentcheff, Marseille
2013 "De la Photographie au Design", Galerie Marion Held-Javal, Paris
2013 Palais des Congrès, Paris
2011 Exposition au musée de Thessalonique, Grèce
2011 Présentation du « Primoculbuto », un modèle de siège conçu au début des années 60 et jamais édité
2010 Chic Art Fair, Paris
2010 « Mobi-Boom, l’explosion du design en France (1945-1975) » du 23 septembre 2010 au 2 janvier 2011, Musée des Arts Décoratifs, Paris
1972 Exposition chez Bloomingdale's, New York
Follow Marc Held ! Receive by email the new artworks of the artist.
Guaranteed deliveryby specialized carriers
Secure payment by credit card or bank transfer
Free returnswithin 14 days
The best prices Negotiated with our partner galleries
"Artsper gathers the best of art galleries in the world. I can therefore select art pieces from the comfort of my home with total peace of mind."
"Artsper's advisors helped me pick an artwork and were exceptionally reactive when I followed up on my order.
"Artsper has the broadest and largest range of accessible contemporary artworks. My painting from Jonone bought on Artsper is a daily delight."
|
<urn:uuid:2898d2f5-f107-492c-9ff4-c9067a7c9d20>
|
CC-MAIN-2017-04
|
http://www.artsper.com/en/contemporary-artists/france/5883/marc-held
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00474-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.922621
| 1,141
| 1.882813
| 2
|
At age 14, James Harrison had major surgery and required 3.4 gallons of donated blood. As soon as he turned 18, he began donating blood himself, and it was discovered that his blood contained an antibody that, when given to Rh- mothers of Rh+ babies, prevents Rhesus disease. [more inside]
Are the Rules That Determine Who Can Donate Blood Discriminatory? Canadian AIDS researchers Dr. Mark Wainberg and Dr. Norbert Gilmore say that while the ban on blood donation from men who have sex with other men may have been ethically and scientifically justified in the 1980's, it no longer makes sense. (CMAJ.) Even though the US FDA reaffirmed their long-standing ban in 2007, they plan to revisit the policy in June. [more inside]
Is blood plasma salinity the same as seawater? No, but that proves evolution. "The answer is most definitely NOT that oceans were 1/3 as salty back then. It most definitely IS that the earliest vertebrates did evolve in salt water and then moved into fresh water....They have devised an extremely clever trick in kidney structure to allow salt transport pumps which really take salt back INTO the body from the urine but still manage to use them to produce urine much more concentrated that their body fluids and so excrete salt FROM the body."
Loyola University has received approval to investigate PolyHeme®'s use as a blood substitute for critically injured and bleeding trauma patients at accident scenes. Blood has a very short shelf life, requires refrigeration, and matching types takes too much time too carry blood in ambulances. The blood substitute has a long shelf life and is compatible with all blood types. It's designed to furnish oxygen which will "prevent organ damage in the brain, heart, lungs, liver and kidneys," until a transfusion can be done at the hospital. - pretty damn cool. I hope it works. [cross-posted on my site]
|
<urn:uuid:b0d25575-dc96-4f3b-89d4-f51775b430cc>
|
CC-MAIN-2017-04
|
http://www.metafilter.com/tags/blood+plasma
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00336-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.962852
| 401
| 2.578125
| 3
|
Students will be able to explain that every object exerts gravitational force on every other object in the Universe. They will also distinguish between mass and weight. Students will model, illustrate, and explain the magnitude of the force of gravity depends on the mass and distance of the objects.
Gravity, force, free fall
gravity and forces
Notes on free fall and projectile motion
1.Why is there a gravitational attraction between all objects?
2. What would happen to the gravitational attraction between two objects if the mass of the one of the objects doubled?
3. What two variables affect gravitational force between objects?
4. Standing at the same location, which organism would have the GREATEST gravitational attraction to the earth: your pet dog, your pet ant, your pet opossum, or your pet elephant? Explain your answer.
5. Explain the difference between mass, weight, and gravity. Include examples of each and their units.
6. On a space walk out in space, astronauts need the space shuttle’s mechanical arm and small rocket thrusters to move a massive new satellite into position. They are not strong enough to move it with their own muscle because the satellite has too much: inertia, length, volume or weight. Explain your answer.
7. Joe is the best baseball player in the world. He can throw a baseball faster than anyone. If the mass of the baseball was increased by 50%, but he applied the same force as he did to a lighter baseball, would Joe be happy about the results? Why or why not?
8. Four wrestlers step on a scale for a tournament. Wrestler A weighs in at 170 pounds; wrestler B weighs in at 168 pounds; wrestler C weighs in at 171 pounds; and wrestler D weighs in at 169 pounds. Which of these wrestlers experiences the greatest force due to gravity and why?
Question- asking Higher Order Thinking (HOT) questions; use the following as your guide:
1. A question that you are still confused about (be specific, include which part of the video, etc)
2. A question that connects the videos together (i.e. asking about the relationship between the content)
3. A question you think you know the answer to, but you want to challenge your classmates with
Use your Unit Plan to help with question starters
Source: inspired by Crystal Kirch
|
<urn:uuid:3167d993-a02b-4409-900a-5e736e9be020>
|
CC-MAIN-2017-04
|
https://www.sophia.org/tutorials/gravity-force-free-fall
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00123-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.949641
| 484
| 4.4375
| 4
|
Laws, Regulations & Annotations
Business Taxes Law Guide – Revision 2017
Sales and Use Tax Annotations
(a) IN GENERAL—DEFINITION
495.0120 Church Organ Installation. Musical instruments used exclusively for religious purposes are not exempt from the sales tax. The sale and installation of a new organ in a church, providing the organ is considered to be a fixture, makes the contractor, as the retailer, liable for the tax. The enlargement of an organ, which goes beyond merely repairing the organ, is regarded as a taxable sale measured by the gross receipts from that operation. 12/11/64.
|
<urn:uuid:c510b434-c16f-4acf-b4da-06bdaf9cd36a>
|
CC-MAIN-2017-04
|
http://www.boe.ca.gov/lawguides/business/current/btlg/vol2/suta/495-0120.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00533-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.925876
| 125
| 1.648438
| 2
|
- "It is ancient, a relic that survived the destruction of Malachor. It was always here, far before the Mandalorian Wars. It draws death and hate to it, channels it. Atrocities feed its power, and with its power, it creates hunger. Many Jedi have been consumed by it."
- ―Darth Sion
The Trayus Academy was an ancient Sith academy located on the planet Malachor V. The Jedi Knight Revan discovered the abandoned structure during the Mandalorian Wars. The buried relics of Sith civilization that he uncovered there paved the way for his fall to the dark side and inspired his attempt to conquer the Galactic Republic during the Jedi Civil War. After Darth Revan's forces were defeated in that conflict, the Academy continued to serve as the headquarters of the Sith Triumvirate and the training ground for the Sith assassins until Malachor V was destroyed in 3951 BBY.
- "It has been here for thousands of years. It is a place where Sith teachings run strong… It is the threshold of the borders of an ancient empire. Kreia says that it was a place of reflection for the ancient Sith… a gateway to their lands. It drew Lord Revan… and it calls to her as well. She said that the teachings here will lead one to the Sith… the true Sith… and all their shadowed worlds. This place led Revan to the graveyards of Korriban… and beyond."
- ―Darth Sion
The Trayus Academy was a training center built millennia before the Mandalorian Wars by the ancient Sith; and it would become the source of Malachor V's dark side energies. Eventually the Academy as well as the planet was abandoned by the Sith and was left unvisited for centuries.
During the Mandalorian Wars in the year 3961 BBY, a young Jedi Knight named Revan rediscovered Malachor while scouting for bases along the Outer Rim when he heard stories of a world the Mandalorians were forbidden to step foot on according to their culture. Wishing to discover why Malachor V was a taboo world to the Mandalorians, Revan secretly investigated the planet, unaware he was about to discover far more than what he was looking for.
Revan quickly unearthed the remains of entire cities buried beneath the surface. Amidst the ruins, he came across the Trayus Academy and within he found countless records of Sith knowledge and history. Revan rediscovered the location of the planet Korriban, and uncovered evidence that the ancient Sith continued to exist beyond the boundaries of known space and continued to pose a threat to the galaxy.
Coming to the conclusion that the Galactic Republic, as it stood, was ill-equipped to defend the galaxy from the return of the ancient Sith, Revan believed that a new government needed to rise in its place, a military force that was capable of repelling such a powerful threat and led by one who understood them. Unbeknownst to even his closest confidants such as Malak, Revan constructed a stronghold and used Malachor's dark side energies to bind the most trusted of his followers to his will. The Sith assassin order was founded as a result.
Returning to the war, Revan led the Republic to victory over the Mandalorians. One year after rediscovering the Trayus Academy, Revan forced a final confrontation with the Mandalorians above Malachor V. In utter secrecy, he had prepared a superweapon, known as the "Mass Shadow Generator," which was to be the centerpiece of a trap with which he hoped to bring about a conclusive end to the Mandalorian Wars. Overseeing the device's use was a trusted Jedi General, Meetra Surik (the future Jedi Exile).
Revan lured the Mandalorians to Malachor, and as the fighting grew intense, on his order, Surik, one of his most trusted generals activated the generators. In the resulting cataclysm, a significant portion of both the Mandalorian and Republic fleets were drawn from orbit into a vast gravity vortex that was powerful enough to crush the countless ships into the planet's crust and fracture the world to its core. Remarkably, the Trayus Academy survived the catastrophic event intact.
Following his victory and affected by the knowledge gained at Trayus Academy, Revan traveled with Malak to the Unknown Regions. There on Dromund Kaas he encountered the Sith Emperor and was subdued to the Emperor's will, and he was inducted into the Sith, adding the Darth title to his name, becoming Darth Revan. The Emperor then ordered him to search for the Star Forge for the Emperor, planning on using the Star Forge to speed up the building of the Imperial armada. During the search, Darth Revan decided to rebel against the Sith Emperor and declared himself Dark Lord of the Sith and founded his own Sith Empire. During the Jedi Civil War, circa 3959–3956 BBY, he used the Trayus Academy as one of several secret Sith bases dedicated to the conversion of captured Jedi. Throughout the war, Jedi were captured by his Sith assassins, and other specially trained forces, and brought to the Academy. The corruptive nature of the location weakened their wills so that Revan and his loyal servants could easily lure them to the dark side. In such places, he converted hosts of Jedi into loyal Dark Jedi and Sith assassins for his empire.
A year after the Sith were defeated by the Galactic Republic during the Jedi Civil War, a redeemed Revan departed for the Unknown Regions in a solitary quest to defeat the "True Sith." Meanwhile, Revan's former Jedi Master, a Jedi named Kreia, feared that her teachings had led Revan to the dark side and went in search of her pupil—a search that would eventually lead her to Malachor V. Kreia walked upon the surface of the planet and was overcome. She fell to the dark side and became Darth Traya. She studied the planet's secrets and rose to command the Trayus Academy and the Sith Assassins which still lingered there. The Academy was reestablished by Traya to train, convert, and create a new generation of Sith who were used to destroy the Jedi Order.
Darth Traya soon discovered two Sith Lords in which she saw the potential of the death of the Force. Darth Nihilus and Darth Sion joined her cause and together they formed a Sith Triumvirate. Under the leadership of the three Sith Lords, the Trayus Academy reached its zenith. Based within their hidden Academy on Malachor V, the Sith Lords commanded legions of Assassins who hunted the remaining Jedi to the very brink of extinction. Darth Traya had managed to unite the fragmented Sith forces through their mutual hatred and led them to victory once more, but her success would not save her. In a sudden act of betrayal, her two apprentices joined forces, stripped her of power, and exiled her.
In 3951 BBY, Kreia located Meetra Surik who was the only Jedi who had fought with Revan against the Mandalorians at Malachor V and yet remained uncorrupted. Wishing to rid the galaxy of her fallen apprentices and ultimately the death of the Force, Kreia orchestrated events to set up a final confrontation between herself and Surik at the Trayus Academy. After slaying Darth Nihilus, Surik arrived at the Academy to combat the Sith lurking there. She invaded the academy and eliminated every Sith minion that crossed her path. Moments after defeating Darth Sion and killing Kreia in a series of lightsaber duels, Malachor V was torn apart when the Mass Shadow Generator was reactivated on Surik's orders.
The entrance of the Trayus Academy from the Malachor Depths opened onto an antechamber that connected to the eastern and western halls of the complex. The Trayus Crescent, located to the west, was a hall with many alcoves that were frequented by Sith commandos. To the east, the Trayus Proving Grounds was a warren of small and cramped rooms in which many Dark Jedi and Sith commandos could be found. The northern point of both wings led to the Academy's central area, the last bit of open space before the innermost sanctum of the Trayus Academy was known as the Trayus Core.
Behind the scenes
In the video game Star Wars: Knights of the Old Republic II: The Sith Lords, if the player takes the dark side path, under this non-canonical timeline both Malachor V and the Academy would remain intact.
- Star Wars: Knights of the Old Republic II: The Sith Lords (First appearance)
- Star Wars: The Old Republic (Mentioned only)
- Star Wars Miniatures
- Star Wars: Galaxy of Heroes
- Chronicles of the Old Republic
- Knights of the Old Republic II: The Sith Lords: Prima Official Game Guide
- Jedi vs. Sith: The Essential Guide to the Force
- Knights of the Old Republic Campaign Guide
- Jedi Academy Training Manual
|
<urn:uuid:e681a4ae-8c32-449e-b379-2f5ec7035f6c>
|
CC-MAIN-2022-33
|
https://starwars.fandom.com/wiki/Trayus_Academy
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00276.warc.gz
|
en
| 0.973585
| 1,859
| 2.15625
| 2
|
204 страниц. 2013 год. It's a series of four books introduced in simple and concise, yet interesting language. Through the books, the readers will become acquainted with Chinese culture and history as well as traditional Chinese thinking, morality, and ethics. This series is suitable for young readers and students who would like to know more about Chinese history and culture.
|
<urn:uuid:9ca625b4-e67e-49af-bb13-16d19ad47dfa>
|
CC-MAIN-2017-04
|
http://logoburg.com/page104667.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00298-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.966716
| 81
| 2.46875
| 2
|
A BSc Honours degree of class 2:2 or above in forensic science, forensic chemistry, forensic biology, or a related course, including chemistry.
Months of entry
This MSc focuses on cutting-edge research, the latest analytical techniques, and transferable and professional skills that will prepare you to practise as a professional analytical or forensic scientist. The course has a reputation for producing excellent scientists – our graduates are offered employment in prestigious companies in the UK and Europe, in fields ranging from analytical toxicology to forensic DNA analysis.foundation project management qualification, an internationally recognised qualification in project management (additional costs apply – see our website for details).
You will have the opportunity to undertake laboratory training as part of a work placement with Synergy Health Laboratory Services. You could conduct your research project in collaboration with Synergy Health and work towards developing UKAS-accredited methods of analysis – the ultimate standard in analytical science and a great boost to your CV.
Our tuition offers detailed training in DNA analysis and interpretation techniques. You will gain knowledge of the basis and application of a number of novel analytical and extraction techniques such as chiral chromatography, supercritical fluid chromatography, solid phase micro-extraction and derivatisation techniques. You will study novel mapping techniques such as 3D scanning and LIDAR, plus our simulated facilities will allow you to learn how to effectively process major and specialist crime scenes.
To improve your employment prospects, you will learn about the law in relation to the forensic scientist – this includes their relationship with the police, lawyers and courts, and the role of the expert witness. There are guest lectures from eminent analytical scientists and forensic practitioners, and you will be encouraged to observe courtroom proceedings and visit analytical laboratories.
The student experience on this course has been designed to consolidate and extendthe core knowledge base, and practical skills through research-style investigations and project work. It also incorporates the opportunity to obtain a PRINCE2
Fees and funding
Qualification and course duration
Course contact details
- Enquiries & Admissions
- 03455 76 77 78
- 01443 654 050
|
<urn:uuid:e1d2d863-8ca2-4c8d-97df-d456b74b7278>
|
CC-MAIN-2017-04
|
https://www.prospects.ac.uk/universities/university-of-south-wales-3763/courses/analytical-and-forensic-science-47508
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00031-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.917811
| 432
| 1.5625
| 2
|
ASTM International, a standards development organization, will now help develop product category reviews (PCRs) and verify environmental product declarations (EPDs), according to the organization. Under the Environmental Product Declaration Program, technical advisory committees will oversee the development process for PCRs, which detail the rules and guidelines for developing EPDs. In addition, the program will evaluate EPDs to verify their adherence to ISO 14040 standards, as well as to ensure that the life cycle assessment data accurately describes a product’s environmental aspects. The program will address products in the 90 industry sectors in which ASTM currently operates.
ASTM developed the program in accordance with ISO 14025, Environmental Labels and Declarations—Type III Environmental Declarations—Principles and Procedures. “The ASTM International program will provide scientifically based, quantifiable information about product parameters such as resource consumption and ozone depletion,” says Timothy Brooke, vice president of certification, training, and proficiency testing at ASTM. Currently representatives of the roofing industry are working with ASTM to develop PCRs.
Separately, ASTM Committee E60 on Sustainability has a proposed a standard practice to give guidance on what information a PCR should contain, regardless of the product. Work Item 23356: “New practice for the development of product category rules for use in the development of environmental declarations for building products and systems,” is currently in the working stage and is not yet a standard. Brooke reports that a publication date has not yet been set for that work item.
|
<urn:uuid:792fa53d-dd1c-48ba-a6ec-aa46d9a83629>
|
CC-MAIN-2017-04
|
http://www.ecobuildingpulse.com/products/astm-international-takes-on-environmental-declarations-1_o
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00405-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.935893
| 315
| 2.078125
| 2
|
Many people regret opting for credit cards because of the debts they incur over a period of time. They end up losing money hand over fist because of the various charges levied on their accounts. Finally, unable to bear the brunt, a vast majority end up closing their credit cards. However, closing cards is not the right answer. The right answer lies in choosing the right credit card and using it wisely so you can remain in the good books of the lender for long. If you are wondering if this is going to be really difficult, then, you are in for a surprise. Saving money on your credit cards is not rocket science. There are a few simple tips that you need to keep in mind so you can save a lot more than expected.
First of all, if you hold credit cards whose interest rate is over 12%, then, you are surely paying more than most of the others around you. There are innumerable banks that offer credit cards at rates lesser than 10%; it is these types of cards that you should opt for. Do you groundwork well before you decide on the bank and the type of card from the bank you intend to apply for. This will help you save up to $1000 a year.
When you incur debts that are way above what you can currently repay, consider taking out a part of the money in your savings account to clear off the debts on the credit cards. Remember, the credit card lenders will charge you between 9% and 15% on the debts on your credit cards; however, the bank will pay you only 1% interest on the amount that you have saved up. Hence, take a part of the money and clear off your debts. It is important to remember not to empty your savings account since you never know when you might need it again. This will enable you to save up to $500 a year.
Finally, when you apply for cards, go in for the ones that have great promotional offers. You will be able to save a lot of money during that introductory period. Also, find out details of the duration of the promotional offers and the rate of interest after that. This will help you save at least $50 in the first year.
|
<urn:uuid:083549d1-1ec3-428c-9bcd-2d9828622921>
|
CC-MAIN-2017-04
|
http://www.credit-land.com/faqs/what-are-a-few-tips-that-can-help-you-save-thousands-of-dollars-on-your-credit-card-585.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00080-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.97204
| 441
| 1.539063
| 2
|
Construction on the Great Wall of China dates back to the Qin dynasty, however, it's primarily the work of the Ming dynasty. The wall -- originally built to keep Mongols from invading China -- was expanded over time, and eventually became the longest wall in the world. The wall isn't continuous, instead it's comprised of different sections. Deciding which sections to visit during your trip depends on your physical condition, the crowds and the weather conditions.
The Great Wall of China runs from the sea to the desert. Beginning in Shanhaiguan, the wall snakes west, along the southern border of Mongolia, until it reaches Jaiyguan Pass. Many of the sections tourists frequent, Badaling, Mutianyu and Jainkou, are located near Beijing. Shanhaiguan is also home to six different sections of the wall, that gives guests a look at how powerful the ancient Chinese army was.
Where to Go
For great views of the nature surrounding the wall, and slightly sparser crowds, visit the Mutianyu section of the wall. The scenery is filled with changing leaves in the autumn, and lush green views in the spring. Located approximately 19 miles from Beijing, in Xizhazi Village, the Jainkou section of the great wall is known for its steep mountains, and is home to the Nine-Eye Tower, a command post during ancient times. For an experience beyond the typical tourist trip, venture out to some of the remote areas north of Beijing. The northern area features crumbling sections of the wall, and offers you glimpse at the wall in its original state.
When to Go
Unless you are accustomed to harsh weather, avoid the seeing the Great Wall during the winter months. Since a lot of the wall runs through mountains, the weather is cold, it's likely to snow and there tends to be harsh winds. The best time to visit is during the spring or fall. The weather isn't too hot or too cold, and the crowds aren't as dense as they are during the summer months.
If you didn't schedule a tour prior to your arrived, but intend to take one, visit the front desk of your hotel to book a spot. Tours of the Great Wall vary in length, as well as destination. Some are one day tours, while some tours last for eight days, and visit multiple sections of the wall. Some overnight trips allow you to see the ruins of the original wall, north of Beijing, with a tour guide.
Different sections of the Great Wall require different levels of physical strength. If you aren't used to hiking, or have low to moderate daily activity levels, then visit the more touristy sections of the wall. The Badaling, Mutianyu and the Jin Shan Ling sections are often crowded, but are well paved, and offer cable cars to assist travelers with the climb. The Simatai section of the wall is steeper and narrower, however, they also have a cable car installed. The Jiankou section offers thin crowds, but expect a strenuous five-hour hike after you reach the wall.
- the great wall image by QiangBa DanZhen from Fotolia.com
|
<urn:uuid:f6d44923-325d-41c6-a905-930338c28abe>
|
CC-MAIN-2017-04
|
http://traveltips.usatoday.com/traveling-great-wall-china-13600.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00176-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.961645
| 648
| 2.28125
| 2
|
Thailand is a country rich in natural resources, which have played a significant role in supporting local livelihoods and driving economic growth. Forests, watersheds, marine environments, and mineral resources have all been instrumental in supporting the Thai manufacturing, export, and tourism industries. However, rapid economic development over the past several decades has often occurred through the unsustainable exploitation of these natural resources. Economic priorities have often taken precedence over conservation in many cases.1
Thailand faces increasing environmental degradation in many regions, including the loss of biodiversity and declining wildlife populations, deforestation, desertification, water scarcity, climate change, and air and water pollution.2
To achieve sustainable development outcomes, it is essential to understand the trade-offs between economic growth and environmental values. There are a number of tools that have been used in Thailand to value the provision of ecosystem services and enable informed decisions to be made about the implications of the environmental impacts. For example, cost-benefit analyses3 and ecosystem valuation tools,4 have been used to inform the design of payment for ecosystem service schemes that incentivize environmental protection.
In Thailand, it has been estimated that applying green growth policies5 that understand these trade-offs, may be worth US$2.06 billion to the national economy in terms of the potential to enhance the net present value of ecosystem services supplied by forests, wetlands, mangroves and coral reefs. This represents a 7.8% increase in economic growth when compared to a ‘business as usual’ scenario. The largest benefit to be realized from these policies is associated with water quality improvement and flow regulation services. For example, modeling the outcomes of protecting the ecosystems that provide these services suggest an 8.4% improvement from these policy changes alone.6
In 2016, Thailand was ranked 20th in terms of national CO2 emissions, which accounted for around 327 metric tons, or 0.9% of global emissions. This corresponds to a slightly lower per capita emission rate (4.7 metric tons) than the global average (4.8 metric tons).7 Thailand’s moderately carbon intensive economy contributes signficantly to a high country ranking (9th out of 140 countries) in the Global Happy Planet Index. This suggests that Thai people have had some success at building a sustainable economy that delivers a relatively high level of well-being (6.3 out of 10), moderate life expectancy (74.1 years) moderate inequality (15%), without requiring a large ecological footprint (2.7 global hectares/person). 8
Thailand’s environmental values also attracts tourists, who provide a substantial contribution to the national economy. However, the rapid growth of this industry has also resulted in adverse environmental impacts. Natural resource depletion and environmental degradation associated with tourism poses many problems and improved management is required.
Thailand’s landscape comprises a wide range of habitats that support diverse flora and fauna populations. For example, at least 15,000 plant species have been identified in the country.9 Thailand is home to 15 distinct mountain ranges and 25 major watersheds connected to the Mekong River, Gulf of Thailand, and Andaman Sea. These support a broad distribution of plant species, as well as three dominant types of tropical forest (monsoon forests, rain-forests and mangrove forests).
Globally, Thailand has a moderately high level of biodiversity. However, this biodiversity has long been threatened by the exploitation of its natural resources without considering the sustainability of their use.10 Many taxonomic species have been listed on the IUCN Red List of Threatened Species as endangered, with some listed as critical and at risk of extinction if action is not taken to save them. For example, in 2016 Thailand had 58 threatened mammal species, 54 threatened bird species, 106 threatented fish species and 152 threatened plant species on this list, which is comparatively high compared to other countries in the region.11
Selected Natural Resources in Thailand. Map created by ODT, view more natural resource datasets on Map Explorer.
In 2015, the FAO reported that the percentage of land areas covered by forest was approximately 32.1% of total land area in Thailand.12 Improving this figure has been a part of the national agenda for some time. For example, the National Forest Policy (1985) outlined an aim to maintain forest cover at 40% in the 6th National Economic and Social Development Plan (NESDP) (1987–1991). This has been the target since that time and was more recently reiterated in the 11th NESDP (2012-2016). For the past several decades, several deforestation drivers have prevented Thailand from reaching the achievement of this outcome including: illegal land clearing and encroachment on forests, resort development projects, mining, and the construction of roads and hydropower dams.13
A major form of forest degradation occurred between 1975 and 1993, when the area of mangrove forests in Thailand was almost halved. The primary reason for this was large-scale encroachment of aquaculture ponds for intensive shrimp production into forested areas.14 Mangrove forests in Thailand are a crucial component of coastal ecosystems. About one-third of coastal areas in Thailand are bordered by mangrove forests. They provide food sources, nursery grounds, and habitat for various animals, as well as natural resources for Thai people, such as fisher folk, shrimp farmers, and charcoal producers who benefit from these productive ecosystems. 15 Between 2000 and 2012, the rate of mangrove deforestation decreased significantly. However, Thailand is still one of the largest aquaculture producers in the world and the small areas of remnant mangroves in the country have needed to be heavily protected to mitigate further negative impacts.16
In 2014, 18.8% of the total terrestrial area of Thailand was classified as a protected area, which is higher than the world average of 14.8%.17 Awareness of the need to conserve natural resources to address environmental problems for continuing Thailand’s economic development has improved steadily. One key policy achievement was the imposition of a total logging ban in natural forests in January 1989. This was followed by the development of new forest conservation policies to enhance the protection of remaining forestry resources.18
Thailand possesses abundant water resources, however the volume of renewable internal freshwater resources per capita has reduced from about 7,700 m3 per capita in 1962 to about 3,300 m3 in 2014, closely related to growth in population, as seen in the graph below.19 This represents increased water scarcity contributing to prolonged dry seasons in Thailand.
One major factor in this change has been the development of irrigation schemes, which has been essential to the development of Thailand’s domestic and export agricultural industry to provide livelihood opportunities for Thai citizens. However, rainfall storage in Thailand averages only 30% of total rainfall volume, with shortages often occurring at the time when agricultural demand is highest. This has become a critical issue that has worsened over time. 20
This in turn has been a major factor in the decline in quality and quantity of water resources in aquifers and watersheds. For example, wetlands located in peri-urban areas in Thailand have become increasingly degraded through drivers such as their conversion to rice paddies, urban and industrial development, and pollution from industrial run off and pesticides.21
While Thailand has not recorded a significant change in overall rainfall with a changing weather conditions, there has been diverging trends for precipitation in different parts of the country. For example, Central and Eastern Thailand have become significantly drier and the North East and Gulf regions, including Bangkok have become wetter. Climate change has resulted in more extreme weather events, including long, hot dry spells and flash floods and tropical storms, which have become more frequent and intense.22
In Thailand, conservation policies and regulations were reviewed with a focus on environmental sustainability as part of the 7th National Economic and Social Development Plan (1992–1996). This plan placed the protection of the environment as a major priority of the Thai government. It was aligned with the development of the Enhancement and Conservation and National Environmental Quality Act (1992).23 The aim of this legislation was to reform natural resources management and environmental conservation practices in Thailand, based on effective, transparent and accountable monitoring. The Act was used to enhance public participation through decentralized management processes led by local authorities, adhering to ‘polluter pays’ principles.24
Moving to the current situation, the 12th National Economic and Social Development Plan (2017–2021),25 has now evolved toward stated goals of “stability, prosperity, and sustainability” for the economy, society, and natural resources through a “sufficiency economy” philosophy. Environmentally-friendly “green growth” for sustainable development is one of the key approaches intended to align with the 2030 Agenda of the UN Sustainable Development Goals.
As part of this agenda, the Thai National Assembly has also developed a 20-year National Strategy (2017–2036),26 which is being used by relevant line ministries such as Ministry of Natural Resources and Environment to developed policy frameworks that enable more sustainble environmental outcomes. An example of this is the National Environment Quality Management Plan (2017–2021).27 This policy highlights four main components related to natural resources management in Thailand, including environmental quality management, protection and rehabilitation of natural resources, increased efficiency of natural resource use, and international cooperation on climate change.
Thailand also complies with other global policy frameworks,28 including the Global Strategic Plan for Biodiversity 2011–2020 and the Aichi Biodiversity Targets. Thailand intends to use these frameworks to meet international obligations to agreements such as the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), and the Ramsar Convention on Wetlands.
Under the leadership of Prime Minister General Prayut Chan-o-cha, Thailand’s 4.0 policy is aimed at realising a livable society that possesses an economic system capable of adjusting to climate change and achieving a low carbon society. At the same time, Thailand intends to use this policy to push toward the goal of being a high-income country category.29 The challenge of progressing from a upper middle classification will involve the doubling of Thailand’s current GDP per capita from US$6,357 per annum to US$12,236 per annum30 by using forms of socio-economic development that do not degrade environmental resources. Prompt actions of tree conservation are required for the future generations.31
- 1. ICEM 2003. “Thailand National Report on Protected Areas and Development”. Accessed December 2017.
- 2. World Health Organization 2015. “Climate and Health Country Profile – 2015: Thailand”. Accessed December 2017.
- 3. ReliefWeb 2017. “Understanding the costs and benefits of climate change adaptation in Thailand” Accessed December 2017.
- 4. USAID Mekong Adaptation and Resilience to Climate Change for the Lower Mekong Basin 2015. “Ecosystem value estimation”. Accessed May 2017.
- 5. Suppatheerathada, J. 2013. “Low Carbon Green Growth Initiatives: Thailand”. Accessed December 2017.
- 6. USAID Mekong Adaptation and Resilience to Climate Change 2015. “Valuing Ecosystem Services in the Lower Mekong Basin: Country Report for Thailand”. Accessed May 2017.
- 7. Global Carbon Atlas 2017. “Fossil Fuel Emissions”. Accessed December 2017.
- 8. New Economic Foundation 2016. “Happy Planet Index”. Accessed May 2017.
- 9. UN Convention on Biological Diversity. “Thailand: Country Profile”. Accessed May 2017.
- 10. Office of Natural Resources and Environmental Policy and Planning, Minisity of Natural Resources and the Environment. “Master Plan for Integrated Biodiversity Management B.E. 2558 – 2564 (2015-2021)”. Accessed December 2017.
- 11. World Bank 2017. “World Development Indicators: Deforestation and Biodiversity”. Accessed December 2017.
- 12. Ibid.
- 13. USAID LEAF 2015. “Drivers of Forest Change in the Greater Mekong Subregion Thailand Country Report”. Accessed December 2017.
- 14. Havanond, S. 1997. “Meeting Report: Mangrove Forest Conservation in Thailand”. Biol. Bull. NTNU. 32(2) pp 97-102. Accessed May 2017.
- 15. IUCN 2006. “Ecological and socio-economic values of Mangrove ecosystems in tsunami affected areas: Rapid ecological-economic-livelihood assessment of Ban Naca and Ban Bangman in Ranong Province, Thailand” Accessed December 2017.
- 16. Richards D. & Friess, D. 2015. “Rates and drivers of mangrove deforestation in Southeast Asia, 2000–2012” Accessed December 2017.
- 17. Ibid.
- 18. International Center for Environmental Management 2003. “Thailand National Report on Protected Areas and Development”. Accessed May 2017.
- 19. FAO 2016. “AQUASTAT – Thailand” Accessed February 2018.
- 20. ICEM 2003. “Thailand: National Report on Protected Areas and Development”. Accessed December 2017.
- 21. Birdlife 2003. “Thailand Wetlands” in Saving Asia’s Threatened Birds: A Guide for Government and Civil Society. Access December 2017.
- 22. Naruchaikusol, S. 2016. “Climate Change and its impact on Thailand: A short overview of actual and potential impacts of the changing climate in South East Asia”. Accessed December 2017.
- 23. Bhumibol Adulyadej, Rex 1992. “Enhancement and Conservation of National Environmental Quality Act (1992)”. Accessed December 2017.
- 24. Thailand Board of Investment 2014. “Thailand Board of Investment Guide on Environmental Regulations” Accessed May 2017.
- 25. Thai Government Public Relations Department 2017. “Thailand 4.0 Policy to Become a Mechanism for National Reform”. Accessed May 2017.
- 26. Vimolsiri, P. 2017. “Thailand 20 Year Strategic Plan and Reforms” Accessed December 2017.
- 27. Karatna, P. 2017. “Thailand Environmental Quality Management Plan 2017 – 2021”. Accessed December 2017.
- 28. UN Convention on Biological Diversity. “Thailand – Country Profile”. Accessed May 2017.
- 29. Royal Thai Embassy, Washington D.C. “Thailand 4.0” Accessed May 2017.
- 30. World Bank 2018. “World Bank Country and Lending Groups”. Accessed May 2017.
- 31. Tree Conservation. 2020. Accessed February 2021.
|
<urn:uuid:adf107d5-03b9-43cf-b493-d138e1b1ee2a>
|
CC-MAIN-2022-33
|
https://thailand.opendevelopmentmekong.net/topics/environment-and-natural-resources/?queried_post_type=topic
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00476.warc.gz
|
en
| 0.917577
| 3,076
| 3.65625
| 4
|
Iraq War: How the US military adapted to changing threats
20 March 2013 Last updated at 02:48 GMT
As US forces sped across the desert during the invasion of Iraq 10 years ago this month, many troops were carried in vehicles that lacked armour.
Just a few years later, driving without added protection became unthinkable amid the bloodshed that roadside bombs and improvised explosive devices wrought on US troops and Iraqi civilians.
Throughout the war in Iraq the American military faced an enemy whose ability to adapt tactics and weapons proved increasingly deadly.
The Americans reacted each time by enhancing and upgrading their equipment. But the military forces were often criticised for the slow pace at which they adopted these measures.
Produced by the BBC's David Botti
Additional photos/video: Getty Images, ThinkStock, and the US Army
Sources: Congressional Research Service, Marine Corps Systems Command, US Government Accountability Office, US Marine Infantry Combat Uniforms and Equipment by Kenneth Ewald, Joint Forces Quarterly, US Department of Defense, and period news reports
|
<urn:uuid:5ad74db6-d1eb-458f-bb16-92f5a6d47701>
|
CC-MAIN-2017-04
|
http://www.bbc.com/news/world-us-canada-21849494
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00475-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.954804
| 205
| 2.234375
| 2
|
Emails are a great way to communicate. Your career will at one point rely on hundreds of emails. Here's some tips to make the most of your inbox and theirs.
Emailing or reading emails can be a ball ache but if you make it part of your daily routine, you will soon forget why it was annoying in the first place. For example; make a conscious effort before you start your day to check emails. This can take up to 10 minutes, which lets face it, is only a fraction out of your day.
When sending an email, whether its to a professional or to a colleague its always good to make sure the subject title is punchy and makes clear to the recipient what is in the email. This way people won't automatically put your emails in the trash.
This might seem obvious, but if you want someone to reply quickly or within the same day, find out what time their office is open or what time their lunch break is. These are key times in the day when you know at some point they will check their emails.
The last thing people want when receiving emails, is for the email to be unclear. Make sure you get straight to the point and leave out all the jargon. This will make your life easier as well as the receivers.
Nowadays many people experience a lot of spam and it puts people off reading their emails. If you organise your mailbox into categories, this will help you to save time and you can choose to only look at the ones that are relevant.
Place emails you need for a reference or at a later date in a folder. Adding a folder called 'Action Needed' is a good way to easily prioritise items you need to act upon. Always keep a clear and ideally empty inbox.
There are millions of clever apps that will help keep your emails in order but with an experience that will make you love your emails even. Try out Mailbox, Triage or Boxer. Away from emails, it's still vital to keep a check list of the people to contact, chase and places to apply. Use apps such as Evernote, Any.do and Wunderlist to keep on top of everything.
We live in difficult times
Tony Cullingham explains that in these competitive times if you want to land a job in creative advertising, you and your portfolio need to shine through.
Where to find ideas
Ricky Richards talks about coming up with ideas in this age of distraction and gives you the clues to finding those unique ideas.
The career path that has no path
Creative Director, Jeremy Garner, explores the exciting opportunity surrounding careers in the ever changing creative industries.
The rate of people being diagnosed with alzheimer’s is growing rapidly, with now 1 in 3 seniors dying of this incurable disease. Students from Miami Ad School has an idea to raise awareness.
8 ways to smash your last year at university
Csilla Kulcsar, ex graduate of Middlesex University writes about 8 tips for smashing your last year at university.
Book Review: The Typography Idea Book by Steven Heller & Gail Anderson
We review Stephen Heller & Gail Anderson's collaborative effort, The Typography Idea Book. A must for anyone interested in typography, art direction, and graphic design.
|
<urn:uuid:f781e38d-b1c0-4aee-9976-c3b2c76af89f>
|
CC-MAIN-2016-44
|
https://www.futurerising.com/story/advice/make-the-most-of-emailing
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00148-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.944483
| 670
| 1.882813
| 2
|
DIS file extension - Oracle Discoverer workbook
What is dis file? How to open dis files?
File type specification:
The dis file extension is related to Oracle Business Intelligence Discoverer, an ad-hoc query, reporting, analysis, and Web-publishing tool from Oracle.
The dis file contains workbook created in the Oracle Discoverer program.
The default software associated to dis file type:
Company or developer:
Oracle Database is very popular object-relational database management system. Oracle Database is distributed Oracle Database is available for Windows, Linux and Unix.
List of software applications associated to the .dis file extension
Recommended software programs are sorted by OS platform (Windows, Mac OS X etc.) and possible program actions
that can be done with the file: like open dis file, edit dis file, convert dis file, view dis file, play dis file etc. (if exist software for corresponding action in File-Extensions.org's database).
Click on the tab below to simply browse between the application actions, to quickly get a list of recommended software, which is able to perform the specified software action, such as opening, editing or converting of the dis files.
- Open dis file
- Save dis file
- Edit dis file
- Create dis file
- Print dis file
|
<urn:uuid:9e856e4b-4b97-4f51-a262-7a1a2a724f36>
|
CC-MAIN-2017-04
|
https://www.file-extensions.org/dis-file-extension
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00360-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.818748
| 273
| 1.539063
| 2
|
Supermicro Debuts 4W And 8W Atom-Based Servers
Weighing just ten pounds and with a depth of 9.8", these "mini-sized" 5015A SuperServers feature a high-efficiency, quiet power supply, two internal hard drives, and a full-height, half-length expansion card option. These are designed for use in embedded applications, though the expansion here makes 'em useful in a variety of situations. And even for an Atom-based system, these things devour a remarkably small amount of energy.
Ideally, these would be used where power comes at a premium and where silence is valued. Something like a print server, storage server, email server, etc. The X7SLA-L platform, which consumes just 4 watts of power and includes Intel's Atom 230 processor, supports up to four SATA ports with RAID /1/5/10, seven USB 2.0 headers, 2GB of DDR2 RAM, Intel's GMA950 graphics and a Gigabit Ethernet socket. The higher-end X7SLA-H integrates the dual-core Atom 330 processor, which consumes 8 watts of power and expands upon the features of the X7SLA-L with dual Gigabit Ethernet ports, an additional onboard Type A USB 2.0 connector and an extra internal serial port. No price is mentioned for either, but both should be available to order now via the right channels.
|
<urn:uuid:4407940d-b4e2-43f8-8bcd-16d8b88aae4e>
|
CC-MAIN-2016-44
|
http://hothardware.com/(X(1)S(a1ntkl2rvopqlxesi5plty45)A(o5B4bsgPzQEkAAAANTg2OTFjY2UtZWQxZS00OTM2LWI2NGQtOTVlZDMzOGFmZmY3Ed4D6nJRJChlB47PSARYSO6iKWo1))/news/supermicro-debuts-4w-and-8w-atombased-servers
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.893348
| 296
| 1.554688
| 2
|
What would you do if you sent a letter to an elder person with an epithet
"To the gracious feet of ---"
The next day you recieve a letter in response which goes this way-
My Dear XXXX,
Neither you nor I know what special significance it gives to the feet to call them 'gracious.' Therefore the epithet is
worse than useless, and had better be dropped. And then it is apt to
give one a nervous shock when you address your letter only to the
feet, completely ignoring their owner. But you should understand, that
so long as my feet are attached to my body, you should never
dissociate them from their context.
Next, you should bear in mind that human feet have not the advantage
of prehensibility, and it is sheer madness to offer anything to them,
confounding their natural function.
Lastly, your use of the plural inflection to the word 'feet,' instead
of the dual, may denote special reverence on your part (because there
are animals with four feet which have your particular veneration) but
I consider it my duty to disabuse your mind of all errors concerning
my own zoological identity.
Many of you'd say "What the ----" (four characters can be filled by the word which first hits your mind :) ). These phrases are from a book "The broken ties" and the author is none other than Rabindra nath tagore, I'm really surprised by the sense of humour of this great man. His writings are marvellous every page would teach you something about life. Every page will occupy some part of your mind and many of them even touch your heart. I'm sure some of the modern authors have tons to learn from this man, even though they are capable of writing better unless they stop serving "the gracious feet of publishers" and start writing something which is out of their heart and not from their mind (ohh I'm sorry its neither from authors heart nor it is from his mind its from publishers pocket) we may not be able to see another Geetanjali. Modern day books are more like telugu movies people want action, drama, comedy, suspense, thriller, biryani, dosa, idli, vada everything in one book and thats exactly what the authors give to you ... irresistable, bestsellers. Most of us have read many books, yet when we want to go for a new book what catches our eyes first are the words like "bestseller" and "More than million copies sold". Some times its bingo!! you hit the book which suits you and sometimes you are unlucky and end up reading something that you just want to be overbut it never does, finally you end up reading some last chapters of book only to boast before your friends that you have yet another book in your basket( me no exception :) ). Next time you are not able to complete a book or finding it really hard to find time to finish it, I think you'd better reconsider reading the book, because if you really love a book you will not even realize that its over and when you are done with it you feel so happy and you just want to read it over and over again and again, may not be always true with every good book its just that the book suits your mindset. Many would suggest you a thousand good books if you are a beginner, but I feel you should do some research of yourself first know what kind of person you are and with internet you have the perfect resource to reach your kind of book. Books are most beautiful creatures they teach you a million things silently they never yell at you yet they make a never ending impression in your mind which sometimes changes the way you think and some can even change your perception of world. So happy reading and happy christmas :).
About Author / Additional Info:
|
<urn:uuid:090d46df-b242-438e-9871-3430c4952f87>
|
CC-MAIN-2022-33
|
https://www.saching.com/Articles/What-Do-You-Like-to-Read-11350.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00065.warc.gz
|
en
| 0.963117
| 803
| 1.859375
| 2
|
FIND A SOLUTION AT Academic Writers Bay
Being a reflective practitioner enables NPs to identify weaknesses and target professional development in order to address these weaknesses. In turn, this increases the NPs’ ability to provide the best care to patients and their families. Reflection also affords the NP time to consider communication and their efforts toward creating a culture of mutual support with colleagues, a characteristic that is essential to successful NP practice (Somerville & Keeling, 2004).Each week you will complete a Journal Entry and Time Log that prompts you to reflect on your Practicum Experiences and how they relate to your Professional Goals and Self-Assessment of Clinical Skills. This week you will begin documenting your Practicum Experiences in your Practicum Journal.
Patient:18 year old female. She presents with UTI symptoms.
Diagnosis: Acute cystitis and Treatment with Macrobid.I will upload my paper to correlate improvement with
An 18-year-old patient presented at the healthcare facility with recurrent UTI. The female patient had a two-year history of the said infection. She has had 10 negative cultures and 2 positive ones. The patient has had some relief on several occasions following antibiotic courses. Sometimes the drugs have not had the desired effect.
She presented for a continuous episode that had lasted a fortnight with incidences of urine frequency every half hour to one hour, continuous urge to urinate, voiding at least four times before sleeping and at night time she reports waking up thrice. She experiences bladder fullness, suprapubic pain, and significant dysuria. The patient did not report any episodes of incontinence. She described the infection as a flare and as had similar symptoms but of lesser intensity, daily, within the last two years.
Additionally, the patient said she has had a sexual partner for the last two years though she admits that sexual activity is an uncomfortable occurrence for her. The patient is also a heavy smoker (half a pack a day). The patient did not report any remarkable medical history or chronic condition. The physical examination revealed an anterior vaginal wall and an SP region that was tender. The urinalysis under the high power field showed 5-10 white blood cells and 1-3 red blood cells.
The patient was diagnosed with cystitis. Of paramount importance was smoking cessation and the patient was advised on the importance of smoking cessation (Kullmann, 2017). I gave the patient reading material on the health risks of smoking, where to get help and some of the immediate actions that can be taken in seeking cessation. I also educated the patient on painful bladder syndrome and its treatment. In this situation, the patient’s level of knowledge and awareness play an important role in recovery. I advised the patient to take additional measures such as stress reduction, regular exercise, modification of diet, and avoiding irritants including douches, diaphragm use and condom use by her partner (Kavuma, 2017). Also, I advised the patient to seek alternative contraceptive methods.
Additionally, I asked the patient to book an appointment with the physiotherapist for pelvic floor exercises (Kavuma, 2017). A pelvic examination and local cystoscopy showed that the bladder was normal. The patient was put on an extended course of antibiotics specifically, nitrofurantoin (Macrobid) and pyridium (phenazoyridine) for 2-3 weeks as a way of ruling out an infectious etiology because of the recurrent UTI (Daniel, Schulten, & Herndon, 2018).
Use the following coupon code :100DISC10
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER
|
<urn:uuid:0caadffb-4f38-4c3a-a822-9f56cdb48d37>
|
CC-MAIN-2022-33
|
https://fastwriters.academicwritersbay.com/2020/04/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz
|
en
| 0.943508
| 844
| 2.0625
| 2
|
When reality-show producer Mark Burnett called FUBU founder Daymond John in 2008 to ask him if he wanted to be an investor on his upcoming show "Shark Tank," John had previously only worked within the fashion business but saw the opportunity as the perfect way to promote his existing brands and diversify his portfolio.
John had invested in around 10 clothing brands before joining the show, but he was hardly a seasoned angel investor. As he reveals in his new book "The Power of Broke," the growing pains of the first season cost him "about $750,000 of my own money that I've yet to get back."
In retrospect, the experience taught him the following lessons that have allowed him to become a savvier investor and corporate adviser, whose small businesses now make millions of dollars in annual profit.
Don't get caught up in the moment
Because "Shark Tank" was new in 2009, the producers weren't able to book the generally high caliber of entrepreneurs that appear on the show now. This was the season where a urologist got $25,000 to build a business around his hollow golf club that lets you pee into it.
So that meant that not only were the offerings slim, but about half of the deals made in front of the cameras didn't close because the businesses didn't pass due diligence — about 80% of the deals closed last season, according to John.
But even if he was seeing something he normally wouldn't want to invest in, he found himself getting caught up in the excitement of a bidding war with his fellow investors. And even if he found himself in a dud deal, he would spend too much time thinking he could transform a hopeless business, since he had already made it that far.
Throwing money at a problem doesn't solve it
John named his book "The Power of Broke" because, as he looked back on his career, he found that the common thread in all of his failures since becoming successful was the belief that an injection of capital could save a dying business or enhance a deal.
The scrappy attitude he had while building FUBU out of his mother's house in the 1990s helped him become the CEO of a hundred-million-dollar business because he made decisions as though every cent mattered — and it did.
Not only did he try keeping his handful of "Shark Tank" season-one businesses alive for longer than he should have, but he unnecessarily spent $200,000 on legal fees vetting and closing deals with them.
When he looked more closely at it, he realized that while he trusted his law firm, they weren't fit for that type of business. He began working with a venture-capital firm the next season, and cut his legal fees down to $30,000.
Rely on your team
To help with his season-one investments, John hired consultants for licensing, marketing, and social media.
"All these different experts, when I was hiring them on an as-needed basis that first year, their fees were killing me," he writes.
It was unsustainable. It's why he built a new company, Shark Branding, with a full-time staff that handled licensing, business development, legal issues, contracts, marketing, and internal management.
"I was able to pursue similar deals away from the show, growing my business in ways I hadn't even anticipated and helping to spread those overhead costs across a number of different properties," he writes.
It turned out that a reality show, of all things, forced John to become a better investor, manager, and entrepreneur.
I lost a bunch of money because I found myself making decisions in ways I'd never made them before. I was spread thin, with all these new demands on my time, so a lot of times I would just throw money at a problem and hope that would take care of it. But of course, that's not how it works, right?
|
<urn:uuid:e80fb771-581e-4220-bc6e-d252df3502e4>
|
CC-MAIN-2017-04
|
http://www.businessinsider.com/daymond-john-lost-money-on-the-first-season-of-shark-tank-2016-1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00236-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.99244
| 808
| 1.53125
| 2
|
By Timothy B. Wheeler
As they return to their chambers this month, state legislators across the Chesapeake watershed face some of the same Bay-centric environmental issues they’ve seen before.
In Maryland, they’ll debate what more, if anything, should be done to conserve the state’s forestland from development and whether air pollution from chicken houses deserves a closer look.
In Virginia, lawmakers will revisit what should be done with vast quantities of potentially toxic coal ash now stored in unlined pits at power plants. And in Pennsylvania, a proposal to regulate lawn fertilizer use to keep it from fouling local streams and the Bay is likely to rear its head again.
Legislators in all three jurisdictions will also tackle the annual challenge of scraping together the funds needed to meet their Chesapeake restoration obligations — made even tougher this year, as support from Washington, DC, for the federal-state cleanup could face potentially significant cuts.
Adding to the mix, politics will play a bigger role than usual in how these and other issues play out. State legislative elections loom in Maryland and Pennsylvania, and their governors — Republican and Democrat, respectively — are seeking second terms.
In Virginia, the newly elected Gov. Ralph Northam, a Democrat, takes office with a legislature more evenly balanced between the parties than it’s been in ages, which could change how debates play out.
Conserving Maryland forests
Forest Conservation: Lawmakers in Annapolis are being pressed by environmental groups to take another look at tightening the state’s 27-year-old forest conservation law.
Since the 1960s, Maryland has lost more than 450,000 acres of forest, and before 2008 it was losing up to 8,600 acres each year, according to a November report by the state Department of Legislative Services.
As originally passed in 1991, the Forest Conservation Act regulates the removal of large numbers of trees for development and requires either that new ones be planted elsewhere or that the developer pay into a local government fund for later plantings.
In March, using highly detailed land cover data from 2013, the nonprofit Chesapeake Conservancy estimated that Maryland had nearly 2.5 million acres of forestland, covering almost 40% of the state’s land.
But based on data reported by Maryland counties, activists said, the state experienced a net loss of 14,500 acres through the Forest Conservation Act from 2009 through 2016. And they contend that the 1991 law has been particularly ineffective at saving the largest and most ecologically valuable woodlands.
A study published last year found that while tree cover has increased in residential subdivisions in suburban Baltimore County since the forest conservation law passed, the most heavily forested tracts in the county continued to be carved up.
“When there’s intact forest ecology, that’s basically the most important kind of forest, and that’s the forest the act is doing the least to benefit,” said Elaine Lutz, a staff attorney with the Chesapeake Bay Foundation.
Opposition last session
Last year, advocates pushed a bill that would have required one-for-one replacement of every acre of woodlands mowed down for development. But it ran into fierce opposition from local officials and real estate interests, and failed to get out of committee. This year, green groups are crafting a more targeted bill that would tighten protections just on those woodland tracts deemed most ecologically important.
Lutz said the current law is “wishy-washy” on defining what types of forestland are most important to preserve and what kind of protection they should get. She and other activists want to see greater emphasis in the law on keeping those tracts untouched, rather than letting them be cut down in favor of trees being planted elsewhere.
“An existing mature forest is a lot more ecologically valuable than saplings in the ground,” she pointed out. Forests in the Bay’s watershed soak up nutrients in the air and in runoff from rainfall, and the Bay states have agreed that it’s critical to the restoration effort to maintain and expand forestlands.
Local government officials remain wary of tightening the law, but say they’d like to have more flexibility in where trees must be replanted and how they can spend funds paid by developers in lieu of replanting removed trees. But real estate interests argue the law is working and does not need a major overhaul.
“The Forest Conservation Act was never meant to be a no-net-loss policy,” said Lori Graf, chief executive officer of the Maryland Building Industry Association. The law is just one of several laws and programs aimed at halting the loss of the state’s forestland, she said, and recent data indicate the goal of maintaining the state’s overall forest acreage is being met.
While minor tweaks might be warranted to provide more flexibility for replanting, Graf concluded, “We feel like there are better ways to save the Bay.”
More renewable energy
Last year, the legislature’s Democratic majority overrode Republican Gov. Larry Hogan’s veto of the Clean Energy Jobs Act, which increased Maryland’s renewable energy goal to 25 percent by 2020. This year, advocates hope to ratchet up the goal even more, with competing bills that would require 50% renewables by 2030, or even 100% by 2035. “It’s ambitious, but we think, especially given the federal climate right now, that the states really have to step up,” said Karla Raettig, executive director of the Maryland League of Conservation Voters.
Environmentalists also want to stop treating “dirty” generators of energy, such as those that burn municipal waste, as “clean” energy under the state’s law.
Rural air quality
Another returnee is the Community Healthy Air Act, a bill that would study whether rural Marylanders’ health is threatened by air emissions from the large-scale poultry growing operations concentrated on the Eastern Shore.
Chicken waste emits ammonia, which is currently unregulated, and it adds nitrogen pollution in the Bay when rainfall washes it from the air. The bill would require the Maryland Department of the Environment to collect and report data on chicken house emissions. The poultry industry successfully opposed the bill last year, arguing it should be left to the U.S. Environmental Protection Agency, which has been studying it without action for more than a dozen years.
|
<urn:uuid:370e2be7-1475-4887-b419-121a554a552f>
|
CC-MAIN-2022-33
|
http://marylandreporter.com/2018/01/05/saving-md-forests-again-on-state-house-environmental-agenda/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00070.warc.gz
|
en
| 0.952011
| 1,333
| 2.984375
| 3
|
Here's the latest news and updates from NZF Australia
of Zakat funds distributed in Australia since 2013.
cases received in Australia since 2013
Homelessness & Housing
Refugees, New Migrants, Travellers, Overseas Students
Single Parents, Widows, Orphans, Reverts
To support and empower those disadvantaged and often stigmatised members of our community as well as raising awareness and being advocates of these causes.
To empower the next generations from all walks of life to become leaders of our community; to have a better understanding of the pillar of Zakat; to be aware of the challenges that the less advantaged in our community faces and be proactive about it.
To educate the community about Zakat; to provide relevant educational and growth programs to assist with the broader wellbeing & development of our community; research into relevant aspects that affect the community to help identify areas for improvement.
|
<urn:uuid:f3d322f4-43d8-4e4d-b163-ec25f5388f95>
|
CC-MAIN-2022-33
|
https://www.nzf.org.au/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00470.warc.gz
|
en
| 0.942113
| 198
| 1.75
| 2
|
An interesting article popped up on Harvard Business Review Blog saying “Tech Startups Need Non-Techies to Succeed” which touches upon very important elements startup founders need to think about.
In today’s age where software development is all the rage, and having a tech co-founder is seen as a must, many forget that a great company is not built on the product alone, but rather on a combination of product, marketing, sales, and overall good business planning.
Consider the software industry, where we have successful brands like Windows and Oracle. While these two firms have world-class intellectual properties, I think their true innovation is in the pricing model around their businesses. – Ndubuisi Ekekwe
Yup, the author’s right. At every event or meetup I attend, there is always a handful of startup founders that are building great new social-mobile apps. How are you going to monetize? What is your pricing and distribution strategy? I ask… only to hear “oh, we’ll think about that later, after we raise some VC money”. OK, good luck in going down that path!
Who needs business co-founders?
According to the Startup Genome report, “business-heavy founding teams are 6.2x more likely to successfully scale with sales driven startups than with product centric startups”. This makes sense, and the report also points out that “balanced teams with one technical founder and one business founder raise 30% more money“.
The fact is, a well balanced founding team is key for success.
While a lot of attention in the software startup is paid to the technology stack, prototypes, and the like, movements such as the “lean startup”, and “customer development” are getting a lot of traction because they bring to technology founders the common business sense they sometimes lack.
Steve Blank‘s customer development process, which talks about the business model canvas, for example, is a typical exercise someone with an MBA would know instinctively. For a programmer, not so much.
Who’s in the team?
There are many views about who should be in the founding team. Dharmesh Shah, co-founder of the successful VC-backed HubSpot argues that first comes the Developer, followed by a Designer, an Inbound Marketer, and a Sales person. Naval, from VentureHacks, has a post about the power of two, a developer and a sales guy.
Enterpreneur turned investor, Manu Kumar, once gave a talk at an event I attended where he laid out his view of the perfect team. He said the founding team should have the following skills: developer, designer, and business. It could all be part of one person’s skillset but this is hard to accomplish, usually there are two or three people representing these skills.
A similar question on Quora has elicited many responses, some similar to what I outlined above, some a bit different.
Some food for thought.
|
<urn:uuid:ad57f56e-0219-42a9-9555-45ff70128730>
|
CC-MAIN-2017-04
|
https://startupwebguide.com/2011/12/08/whats-the-role-of-a-non-tech-founder/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00009-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.969141
| 637
| 1.578125
| 2
|
June 8, 2012Doug Hadden
Part 4: Sustainable Planning
Value of medium-term budget planning
Doug Hadden, VP Products
This is Part 4 of 6 parts detailing the content in my Financial Management Institute of Canada lunch presentation What can we learn about Sustainability from Developing Nation Governments?
“Alphabet soup” of Government of Canada planning
We often accuse the American government of having an incomprehensible list of acronyms. An “alphabet soup”. We’re falling behind in the acronym arms race in the Government of Canada. Consider the following set of planning and regulatory concepts:
- Strategic and Operating Review (SOR)
- Administrative Services Review (ASR)
- Federal Accountability Act (FAA)
- Financial Administration Act (FAA)
- Management Accountability Framework (MAF)
- Management Resources and Results Structure (MRRS)
- Program Activity Architecture (PAA)
The state-of-the-art of budget planning in the Federal Government includes strategic tools like MAF, MRRS and PAA that attempt to connect objectives with programs and performance. There is standard bottom-up budgeting to maintain existing programs. And, there are different review methods to cut expenditures: reviews looking for efficiencies, reviews to reconsider strategic priorities, reviews to cut costs. It’s difficult to “connect the dots” among these frameworks, structures, architectures and reviews. Even more difficult to connect government objectives with policy, budgets and outcomes across these frameworks, structures, architectures and reviews.
Sustainable planning in developing countries
“Medium term” planning is considered the best practice in developing countries. This is typically a rolling 3 year budget plan. This might sound a bit like the return to the 5 year plans used for central planning, primarily in Communist countries. Medium term planning uses rolling plans rather than separate 5 year discrete plans that operate in series.
The outcomes from government programs often take more than a fiscal year to accrue. Single year budget planning is too short a horizon to affect change. Results can be evaluated and programs adjusted to meet objectives. Medium term planning also takes into account multiple year commitments such as capital expenditures and subsequent recurrent costs. This introduces financial sustainability calculations into budget plans. Developing nations may receive grants for capital expenditures but may not have the operating budget to sustain those capital assets. Long-term financial implications become better understood to policy-makers.
Medium Term Expenditure Frameworks (MTEF) aligns economic realities with revenue and expenditures.
Peaks and valleys of government spending
The Government of Canada has fiscal space. We have a good credit rating and reputation for good fiscal management. The government debt to GDP ratio is manageable. Yet, it wasn’t that long ago that the Wall Street Journal referred to the Canadian dollar as the “peso of the north”.
Political realities often encourage short-term thinking. The focus on inputs: the amount spent in a particular riding or Province rather than long-term performance thinking. This short-term thinking can also result in creating financially unsustainable programs.
Short-term thinking often means not considering the real lifetime costs of major government initiatives. The current debate in Canada over the F-35 acquisition by the Royal Canadian Air Force has resulted in the fall of a government for “contempt of Parliament”. The press continues to torment the government about alleged underestimated budget miscalculation or deliberately misleading the House of Commons.
The emergence of a crisis such as the recent financial market melt-down can also introduce short-term cuts that cannot be sustained. For example, cuts to some programs may result in not meeting legal minimum levels of citizen services. So, spending increases in subsequent years. Cuts to other programs may result in high initial costs to dispose of property or for civil service severance.
Long-term financial sustainability is better achieved when fiscal sustainability is built into the process.
“Medium term” alphabet soup
There is no lack of acronyms for medium planning. Medium Term Expenditure Frameworks (MTEF) can consist of MTMF, MTFF, MTBF, MTSS and MTPF. Governments apply some of these methods. The methods used typically depend on the government context, for example, countries with lower capacity will typically not use MTPFs. The methods are adapted for the country context – these are frameworks.
Frameworks link the economic realities (MTMF) to revenue and expenditure realities (MTFF) to budget planning (MTBF) to achieve objectives in multiple programs and sectors (MTSS) in the most effective ways (MTPF).
The advantages of this approach in a developed country like Canada include:
- Improved long-term planning
- Aligning government objectives and sector strategies across departments and agencies
- Exposing the impact of economic impact to revenue and results during the fiscal year and during planning
- Performance feedback loops that also show impact of economic changes on results
- Integration of economic factors in planning and performance factors directly into the Chart of Accounts
The big advantage of the MTEF approach is to integrate strategy and review into day-to-day management and periodic planning. The alignment of performance to economics will enable the Government of Canada to model the effects of any major economic change to performance results. To service delivery. The decision of where to cut expenditures with the least negative impact and optimizing positive impact becomes less of a mystery. And, less of a complex management exercise. That is easier to communicate to citizens.
Latest posts by Doug Hadden (see all)
- Smart government assets vision case - October 27, 2016
- What is the ‘Smart’ in Smart Government? - October 25, 2016
- The (IT) Project was a Success, but the Patient Died [Part 2] - September 21, 2016
- The (IT) Project was a Success, but the Patient Died [Part 1] - September 20, 2016
|
<urn:uuid:46a5c67b-4c37-49d1-b933-dd524500dc6e>
|
CC-MAIN-2016-44
|
http://freebalance.com/public-financial-management/what-canada-can-learn-from-developing-countries-on-public-financial-management-sustainability-part-4/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00045-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.92371
| 1,223
| 2.671875
| 3
|
The Political Economy of Food for Your Non-foodie Friend in Under 120 pages
Eric Holt-Giménez, former executive director of Food First, adds the themes of agriculture, food policy, and food justice to Polity Press’ Global Futures Series with Can We Feed The World Without Destroying It? Following previous publications in this series, this is a brief (118 pages) yet comprehensive introduction to the political economy of food written by one of the foremost authorities on food justice. Readers start at the food system’s twisted capitalist roots and finish with hope in the transformative power of food-based social movements, food sovereignty, and agroecology.
Holt-Giménez critically interrogates the question posed by the title, rhetorically answering simultaneously yes, no, and neither yes nor no. No, we cannot feed the world under the current system; but also yes, we can feed the world through systemic, fundamental changes to capitalism itself. This, he argues, “requires a critical understanding of capitalism” which, once attained, can be leveraged to “unleash the tremendous social power within the world’s food systems not just to change the way we produce and consume our food, but also to transform society itself” (p. 9). This essay starts the reader on a whirlwind history of the capitalist food system, introduces failed historical fixes and impending climate catastrophes, and ends with a firm call to action.
Chapter One, “The Politics, Power, and Potential of Food,” introduces the food system not as a bucolic scene in which farmers grow sustenance for the population, but as a market sector operating within capitalism, in which farmers produce a commodity to be sold on the market. Understood through the lenses of political economy and critical theory, the food system becomes simply a capitalist market sector—but with dire consequences for those without access to the market: starvation and death. The final paragraph of the introductory chapter is a call to action, the summary of a university course syllabus, and an introduction to a popculture TED talk: “The perpetual calls to end hunger, on the one hand, and to maintain our faith in technological progress, on the other, is a globalized form of cognitive dissonance that avoids addressing the contradiction of hunger in a world caught in the grips of overproduction and overconsumption” (p. 7).
Holt-Giménez leads the reader deeper into understanding hunger, overproduction, and overconsumption in Chapter Two, “Hunger in a World of Plenty.” The chapter critiques the Food and Agriculture Organization of the United Nations (FAO)’s “slippery statistics” on global hunger, the global food price crisis, the green revolution, biofortification, food waste as a commodity, and food as a political commodity. He introduces the concepts of overproduction as endemic to capitalist food production and poverty as the cause of hunger.
This theme is explained using Friedmann and McMichael’s food regime theory framework, augmented with Donella Meadows’ systems thinking concepts in Chapter Three, “Food, Environment, and Systems Change.” Holt-Giménez includes a lightning explanation of colonialism, Marxist theories of use value and exchange value, Neo-Marxist theories of metabolic rift, Ikerd’s “technology treadmill,” biodiversity, agriculture’s contribution to climate change (including carbon sequestration), and a scathing critique of the “climate-smart trifecta” (p. 75). Here, Giménez introduces the concept of agroecology in response to the assumptions of the new agriculture. He closes the chapter by listing the upcoming tipping points, which are wide-ranging and intimidating. By now, the reader who is not actively outraged, exhausted, engaged, and worried is not reading carefully enough.
Stay in the loop with Food First!
Get our independent analysis, research, and other publications you care about to your inbox for free!Sign up today!
The concluding chapter’s title asks the reader, “Who Can Feed the World Without Destroying It?” If the FAO is undercounting hungry people, corporations already monopolize production and distribution, and the food system is financialized and land speculative, the answer must be something structurally unique from all these forces. This is what Holt-Giménez leaves the reader with: a list of green techno-fixes and agroecology. The science, practice, and social movement that is agroecology is “anathema to capitalist agriculture” (p. 99), and represents the “no, but yes,” to the titular question. The book ends by tying the restructuring of the food system to a concomitant global economic restructuring.
The middle-class, out-of-season eating, overconsumers reading this essay are the ones who can feed the world without destroying it—but only by “changing everything” (p. 118). Can We Feed The World Without Destroying It? is written for just this audience, albeit those already having a working knowledge of Meadows and Marx or else with access to the Internet and interest to look up terms such as “metabolic rift” and “negative feedback loops.” The abbreviated length of the essay and the short chapters make this a versatile read for various audiences. A graduate course could begin by reading the entire essay, or the essay could supplement a section on agroecology (Chapter Four) or food regime theory (Chapter Two), using the readings referenced to round out concepts mentioned in passing in the text. The text could also be useful for current food scholars or political ecologists as a theory refresher. In general, the content is an abbreviated version of Holt-Giménez’s earlier book, A Foodie’s Guide to Capitalism (Holt-Giménez, 2017). The message in both books is similar: we are in for, and must create, a structural shift in how food is produced, distributed, and conceptualized . . . or we won’t be around to eat.
|
<urn:uuid:2a64ff14-5bf6-4edd-bd86-2edef87ab634>
|
CC-MAIN-2022-33
|
https://archive.foodfirst.org/publication/the-political-economy-of-food-for-your-non-foodie-friend-in-under-120-pages/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00270.warc.gz
|
en
| 0.903161
| 1,292
| 2
| 2
|
Applicants who are all preparing for Tamil Nadu SSLC/ 10th must go through these question papers for practice. Applicants can get an exact idea about the exam pattern. Candidates can download the Previous year’s Question Paper for Tamil Nadu 10th Exam from the given direct link below.
|Name of the Board||Tamil Nadu Directorate of Government Examination|
|Category||Board Model Papers|
Tamil Nadu 12th Model Question Papers:
|Tamil Nadu 12th Model Question Papers For All Subjects||Click Here|
|
<urn:uuid:58a61853-2e09-4019-bfcb-63ca5d98320c>
|
CC-MAIN-2022-33
|
https://yoyosarkari.com/tamil-nadu-10th-previous-question-papers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00469.warc.gz
|
en
| 0.779833
| 144
| 1.59375
| 2
|
Bryant Elementary was the first elementary school built after Washington became a state. The original Bryant school was built in 1891 and named after William Cullen Bryant (1794-1878), a journalist and poet who is remembered for his poem "Thanatopsis". We have been in our current site since 1962, and began our process of becoming a Montessori school in 1998 with the support of a Federal Magnet Grant. Situated in the heart of "Upper Tacoma" (also known as "the Hilltop"), our school community mirrors the neighborhood around us, with a rich diversity of cultures and ethnic backgrounds.
In the 2001-2002 school year, Bryant had the highest poverty rate in the Tacoma School District at 89.2%. Last year our poverty rate was just above 50%. While some of this change is due to the changes in the neighborhood that Bryant serves, we have also been able to attract people from other parts of the city to our school, giving us the opportunity to create a diverse community of children within our walls. The families that are drawn to us value our diversity and share our belief that modeling an environment where different people live together in harmony is a vital life lesson for us all.
|
<urn:uuid:5e09dce7-3c31-4de8-83d4-a5194cd5456e>
|
CC-MAIN-2017-04
|
https://www.tacomaschools.org/bryant/Pages/History.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00080-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.979537
| 244
| 2.46875
| 2
|
Tuesday, September 15, 2020 at 7 p.m. John Buehrens, Past President (1993-2001) of the Unitarian Universalist Association of Congregations. Conflagration: How the Transcendentalists Sparked the American Struggle for Racial, Gender, and Social Justice.
A dramatic retelling of the story of the Transcendentalists, revealing them not as isolated authors but as a community of social activists who shaped progressive American values. Conflagration illuminates the connections between key members of the Transcendentalist circle–including James Freeman Clarke, Elizabeth Peabody, Caroline Healey Dall, Elizabeth Stanton, Thomas Wentworth Higginson, Theodore Parker, and Margaret Fuller–who created a community dedicated to radical social activism. These authors and activists laid the groundwork for democratic and progressive religion in America.
In the tumultuous decades before and immediately after the Civil War, the Transcendentalists changed nineteenth-century America, leading what Theodore Parker called “a Second American Revolution.” They instigated lasting change in American society, not only through their literary achievements but also through their activism: transcendentalists fought for the abolition of slavery, democratically governed churches, equal rights for women, and against the dehumanizing effects of brutal economic competition and growing social inequality.
Click here to register.
|
<urn:uuid:1d00e164-fe38-4a19-a21d-5cf61209e5c8>
|
CC-MAIN-2022-33
|
https://nsuc.org/john-buehrens/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00277.warc.gz
|
en
| 0.919822
| 272
| 2.921875
| 3
|
Natalie Mathis and Quincy Robinson, two 3D modelers and inventors based in Cincinnati, Ohio, have created a new 3D printer test kit "Graphica" featuring 12 Unreleased Test Chips focusing on Mechanical Components and Artistic Flair. The Graphica is designed for being printed on a FDM 3D Printer for measuring the abilities of your 3D Printer.
Each chip comes with printable (2D) instructions that details the tolerances found on the actually 3D File. Once the chips are printed, you can then gauge the success of the print by comparing it to the true sizes of the documented 3D file.
You might know Mathis and Robinson from their first Kickstarter with 3D Printer Test Chips launched in May this year and they raised $6,717, exceeding their $1500 goal by 450%.
The new Graphica are divided into 2 groups. Representational & Mechanical. Customers will receive 12 'Digital' Test Chips and a variety of printable displays that have been sized to fit snugly in most standard picture frame sizes.
The 'Representational' chips include:
- 'Face' - Demos controlled smooth surfaces.
- 'Insect' - Demos thin vertical surfaces & narrow undercuts.
- 'Octo' - Demos flexibility.
- 'Skull' - A taxing demo of narrow undercuts and detail retention.
- 'Ghost' - Demos thin wall buildup and the ability to undercut thin structures. Designed to look cool with semi-translucent filament.
- 'Tower' - Designed to be a Bridging Torture Test and the first step in successfully printing the 'Print & Play' test chips.
The Mechanical Chips are the first test chips of their type.
Each chip represents a movable feature that only has to be printed (with no supports) to work. We call this quality: "Print & Play". ...The idea is that once you have demoed a variety of 'Print & Play' techniques, you will be more capable of building and laying out your prints for even more 'Bang for the Buck'!
The Mechanical Chips include:
- 'Spin' - Demos lengthy bridging and ability to print free-spinning structures on that bridge.
- 'Scope' - Demos your printer's ability to print telescoping mechanism.
- 'Chain' - Demos a chain sheet, disguised to look like a fish of sorts.
- 'Gears' - Demos a 'Print & Play' gear train.
- 'Shift' - Demos multiple swinging and shifting plates that dramatically increase the footprint of the test chip.
- 'Mouth' - Demos a moving mouth with concealed control tab!
The Kit comes with a display that is sized to hold all chips and fit into a 5x7 inch frame. The price of the kit starts from $25. Find more info here on Kickstarter.
Posted in 3D Printer Accessories
Maybe you also like:
- On Indiegogo: First Dual Pinch Wheel Extruder for 3D Printers
- 3D Print Finisher on Indiegogo
- Hyrel 3D introduces new extruder for printing with Clay, Plasticine & Play-Doh
- BeagleBone Black offers credit card-sized Linux PC for $45
- Transform 3D print into a high quality finished part with 3D Refiner
- Open source V-Slot linear framing system fully funded on Kickstarter
- Therminator 5: a durable alternative to existing RepRap 3D printer hot ends
- RepRapPro releases Mendel multi-material and multi-colour enhancement kit
- Time to save up your plastic junk for recyling: mini shredder and FilaMaker
- Powerlolu board: Powerful open source stepper-motor driver
- All-in-one open-source electronics board RUMBA for 3D printer
- Kickstarter ViKi LCD - control panel interface for your 3D printer
strainstress wrote at 9/2/2013 8:50:20 PM:
This kit is a waste of money. Doesn't take into account the different slicer programs that are used. Every slicer slices a little differently and can affect the way your print comes out and doesn't necessarily test the printer but the software.
|
<urn:uuid:1049ac41-833b-4ca5-a0f0-92b68968061f>
|
CC-MAIN-2017-04
|
http://www.3ders.org/articles/20130902-new-3d-printer-test-kit-to-measure-your-3d-printer-abilities.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00221-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.866773
| 894
| 2
| 2
|
Pressure is building on the new Liberal government to go well beyond revamping the Conservative anti-terrorism bill to rethinking a whole raft of Stephen Harper security measures and policies.
The Liberals have promised to rewrite what they call “problematic elements” of Bill C-51, the omnibus security legislation ushered in by the Conservatives following two jihadi-inspired attacks on soldiers.
For instance, Justin Trudeau’s fledgling government plans to ensure all Canadian Security Intelligence Service warrants respect the Charter of Rights and Freedoms. This would roll back new provisions allowing CSIS to disrupt terror plots through tactics that breach the charter as long as a judge approves.
It has also committed to creating a special committee of parliamentarians to keep an eye on national security operations.
Organizations including Amnesty International Canada and the Ottawa-based International Civil Liberties Monitoring Group recently issued a report urging the Liberals to go further by implementing neglected 2006 recommendations on comprehensive security review from the inquiry into the overseas torture of Maher Arar.
The groups also call for apologies and compensation to three other Arab-Canadians who were brutalized in Syrian prisons, as well as the repeal of measures that eroded the rights of people accused of being security threats.
Bill C-51 requires a complete overhaul, but the need is wider, said Alex Neve, secretary general of Amnesty Canada. “It is time for a refit of Canada’s national security laws that puts human rights at the centre, no longer a secondary casual consideration after the fact.”
Neve said there are numerous United Nations-level human rights recommendations long overdue for attention, including ending deportations to torture, revising ministerial directions that allow for the use of torture-tainted information and reforming the secretive security-certificate system for whisking suspected terrorists and spies from Canada.
C-51 amounted to a “hasty misdiagnosis of the problems that afflict anti-terror law and policy,” said University of Ottawa law professor Craig Forcese, co-author of False Security, a detailed critique of Harper’s approach.
The Conservative government failed to tackle the vexing issue of how to transform secret intelligence into evidence that can be used in criminal court proceedings, a dilemma that has fostered the “very troubling” practice of parallel — and quite separate — investigations of the same targets by spies and police, Forcese said.
If rumours of draft Liberal security legislation are true, Forcese hopes the government will refer it to a “well-staffed, well-resourced and seriously minded parliamentary committee” after first reading, opening the door to a more expansive study of security law.
OpenMedia, a group that fights to keep the Internet surveillance-free, has invited Trudeau to sit down and discuss ways to better protect the privacy of Canadians.
“We are happy to have an open discussion but we continue to believe that C-51 is reckless, dangerous, and ineffective legislation that ought to be fully repealed,” OpenMedia executive director Steve Anderson recently wrote in a letter to Trudeau.
“Engagement early in the legislative process is a key pillar of a more participatory democracy and I believe that is what Canadians are looking for with your government.”
Only the news you need, from all the sources you trust.
|
<urn:uuid:bbb76105-96f2-476a-8d72-07db6386ea5e>
|
CC-MAIN-2016-44
|
http://ipolitics.ca/2015/11/02/trudeau-faces-demands-to-end-an-array-of-harper-era-security-policies/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721387.11/warc/CC-MAIN-20161020183841-00448-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.937275
| 679
| 1.515625
| 2
|
City, State: Medford, OR
Club: McLoughlin Middle School Sparrow Club Service Hours:
Date Adopted: 12/09/2015
Kallen is a sweet and affectionate 2-year-old little boy who likes airplanes, trains, and loves to dance. In many ways, Kallen is just like other little boys his age. However, Kallen lives with epilepsy, which drastically affects many aspects of his life.
Kallen’s medical struggles first began at birth. Born six weeks early, Kallen was diagnosed with reactive airway disease and spent the first month of his life in the NICU. He was unable to breathe, eat, or maintain his own body temperature. Tests also revealed a heart murmur.
At one year old, Kallen’s medical condition took a severe turn for the worse. On May 20, 2014, Kallen had his first tonic-clonic (also known as “grand mal”) seizure. This seizure was so severe that it caused him to stop breathing. CPR was performed and Kallen was rushed to the hospital via ambulance. After much follow-up and many tests, a CT scan confirmed epilepsy, consisting of five different types of seizures taking place in all areas of Kallen’s brain.
Since this first occurrence, Kallen has continued having seizures, sometimes having multiple seizures per day, ranging in severity. Kallen’s seizures can cause him to fall down, have convulsions, stare blankly for long periods of time, and have even caused him to lose consciousness and, as mentioned above, stop breathing.
Kallen would greatly benefit from a seizure service dog, as well as a monitoring system that will alert his parents when he is having a seizure at night when he sleeps. Kallen’s family also hopes to raise awareness of the reality of SUDEP (Sudden Unexpected Death in Epilepsy), which happens to 50,000 people a year in the United States living with epilepsy.
Kallen will be adopted as a Sparrow to McLoughlin Middle School in Medford. Students at McLoughlin will work hard to make a difference in Kallen’s life through sponsored community service and fundraising projects.
Curt & Carol Bennett Curt & Carol Bennett
|
<urn:uuid:fca4e9f6-b3ab-4e37-a1b8-6cc8cab82aa0>
|
CC-MAIN-2022-33
|
https://www.sparrowclubs.org/sparrow-kids/kallen_mathis
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00466.warc.gz
|
en
| 0.977553
| 502
| 1.546875
| 2
|
Characterization of zinc oxide nanoparticles and their applications in food safety
Metadata[+] Show full item record
In this study, ZnO NPs suspension was studied for their antibacterial activities against Escherichia coli O157:H7. Beef cuts inoculated with E. coli O157:H7 were wrapped with 5% (wt %) yam starch films incorporated with ZnO NPs suspension of 0, 6 and 12 mM and refrigerated at 4oC. An average of 0.5‐log reduction of the bacteria growth of the cocktail mixture of three E. coli O157:H7 strains was observed with yam starch films containing 6 or 12 mM ZnO NPs in three replications after 8 days. Various concentrations of ZnO NPs powder from 0.05 to 1% w/w were added to corn starch. The presence and characterization of ZnO NPs in corn starch was investigated by scanning electron microscopy (SEM), and transmission electron microscopy (TEM), and energydispersive X‐ray spectroscopy (EDS). Quantification of ZnO NPs was determined by inductively coupled plasma optical emission spectrometry (ICP‐OES). To the best of our knowledge, this is the first systematic methodologies presented for detection, characterization, and quantification of ENPs in a food sample by a combination of methods. It could potentially be applied to other common NPs such as TiO2 NPs and MgO NPs in other food products.
|
<urn:uuid:32c635a0-ca3d-4aa1-8114-0c014ab1f937>
|
CC-MAIN-2017-04
|
https://mospace.umsystem.edu/xmlui/handle/10355/15279
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00550-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.947555
| 319
| 2.03125
| 2
|
If you have ever been in a position where a burglar breaks into your house, you know how terrifying the whole experience can be. It is an experience that you never want to go through again. However, if it happens again, what will you do?
- First things first, come up with a quick plan. If you have another way out that you can use without the intruder knowing, this is your perfect chance to escape and go get help. However, you need to be extremely quiet so that the intruder doesn’t know that you are awake and try to harm you further.
- If it’s possible, try to listen carefully how many people are there. Also find out what their intentions are. Don’t talk to your spouse or your children. Be as silence as it can get. Once you are sure about the number, don’t try to leave your bedroom with a flashlight or baseball bat. This may cause more harm as the intruder may react violently.
- If there is no way out, get to a safe place such as a closet with a strong door. Inform the authorities of the intruder in your home from your safe hiding place. If you don’t have a safe closet, gather all the family members together in a room with strong locks and barricade the door with extra furniture and any other heavy objects. Call the police and give them your address and the situation you are in. Be as specific as possible as locksmith Wimbledon by ITCC Locksmiths in London.
When you sense an intruder in your house, the first thing you need to do is to ensure the safety of your family. Do not try to engage the intruder before finding out the situation on the ground.
|
<urn:uuid:394e7340-eb49-4408-8726-45a451cdde64>
|
CC-MAIN-2022-33
|
https://www.losalbertos.co.uk/in-the-event-of-a-house-break-in/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00476.warc.gz
|
en
| 0.96011
| 357
| 1.585938
| 2
|
CARBON MONOXIDE KILLS
Best Chimney Clean can supply and fit a CO alarm and strongly reccomend you have one, it could save your life.
Carbon monoxide (CO) poisoning can be fatal or cause permanent damage to your health. We fit CO alarms in Exeter and throughout our work area.
CO is produced when carbon fuels don’t burn completely. It has no smell or taste and, in large quantities, it can kill very quickly.
How is carbon monoxide produced?
Carbon monoxide is hard to detect because it has no smell, taste or colour. This also means that it is easy to inhale without realising. Carbon monoxide is produced when fuels such as gas, oil, coal and wood do not burn fully.
When a fire burns in an enclosed room, the oxygen in the room is gradually used up and replaced with carbon dioxide. Following a build-up of carbon dioxide in the air, the fuel is prevented from burning fully and it starts to release carbon monoxide.
Causes of carbon monoxide poisoning
Gas, oil, coal and wood are all fuel sources that are used in many household appliances, including: boilers, gas fires, central heating systems, water heaters, cookers, open fires.
If the fuel in these appliances does not burn fully, carbon monoxide (CO) gas is produced.
The build up of carbon monoxide can also be as a result of any of the following:
- Indoor use of a barbecue grill or outdoor heater
- Using cooking appliances for heating purposes
- Enclosed or unventilated spaces – burning fuel in an enclosed or unventilated space, where there are no air vents, windows or doors left open or ajar.
- Faulty or damaged appliances – heating or cooking
- Heating appliance not maintained or serviced
- Badly ventilated rooms – sealed windows, no air bricks
- Blocked chimneys or flues – birds nests, fallen bricks, growing vegetation, bad DIY
- Poor or improper installation or use of appliances – such as cooking and heating devices
- Running engines such as cars or lawnmowers in garages
- Old appliances that have not been serviced or looked after properly
- Paint fumes – Fumes from cleaning fluids and paint removers that contain methylene chloride (dichloromethane) can also cause CO poisoning
Danger signs that CO may be leaking include: Yellow or orange flames where there should normally be blue ones. Sooty stains on the walls around fires and water heaters. You could also be poisoned by CO if you share a wall or chimney with a house that has a CO leak, even if your own house does not have one.
|
<urn:uuid:0a337396-7209-47b0-ac39-6e19a366f505>
|
CC-MAIN-2022-33
|
https://bestchimneyclean.co.uk/carbon-monoxide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00475.warc.gz
|
en
| 0.929713
| 573
| 3.28125
| 3
|
There is not a single thing in our lives that does not change. Nothing is constant. Everything changes with the passage of time, whether it is human beings or technology.
Have you noticed how the entire world revamped mainly during the past ten years? Businesses have become more modern over time as the acquisition of the latest technology increases return on investment (ROI) and boosts productivity. Artificial intelligence, machine learning, deep learning, data science, big data, and data analytics are the trending keywords in the present scenario. Enterprises propel out of the starting gate and acquire data-driven models to streamline their business processes and make better decisions on the basis of data analytical insights. Large enterprises had no other option but to acquire changes in a short time span as the pandemic disrupted several industries across the globe. That resulted in increasing investments in data science and data analytics. Data has come to the pivotal point for almost every organization. As businesses of this modern age mainly depend on data analytics to deter innumerable challenges, we have noticed massive and unpredictable trends emerging in the industries.
In this piece of content, we will lay our eyes on some key trends of data science technologies and big data analytics trends in 2022. Moreover, we will discuss how these ever-evolving technologies are becoming crucial for every enterprise, irrespective of their size and industry.
So without any further adieu, let’s jump right into it.
Increased Utilization of Natural Language Processing
Natural language processing, which is the abbreviation of and majorly known as NLP, lies under the umbrella of the term artificial intelligence. Natural language processing (NLP) is presently considered a crucial part of business processing. NLP is utilized to study data to find new trends and patterns. Scientists and analysts predict that organizations will use natural language processing to immediately retrieve information from data repositories in 2022. Not only this, NLP will have access to quality information, which will result in quality insights.
Moreover, natural language processing offers access to sentiment analysis. This will help businesses to have a crystal clear picture of what their customers feel and think about them, the products and services they offer, as well as the business’s competitors. It becomes easier for businesses to provide their customers required services and products as well as boost customer satisfaction when businesses know what their target audience and customers expect from them.
Quantum Computing For Swift Analysis
Quantum computing has been one of the most trending topics in data science, especially for the past couple of years. Tech-giant with which you spend almost a major part of the day, Google, is already working on quantum computing, where decisions are not made by the binary digits 0 and 1. The decisions are made with the help of quantum bits of a processor known as Sycamore. This processor is capable enough to solve problems in only 200 seconds.
Perhaps, quantum computing is still in its early stages and requires a lot of fine-tuning before a range of enterprises in various industries acquire it. Nonetheless, it has started to make its presence felt and will become an integral part of business processes anytime soon. The purpose of the utilization of quantum computing is to integrate data by comparing data sets for faster analysis. It also helps to develop an understanding between two or more models.
Hybrid Cloud Services and Cloud Automation
Revolutionary cloud computing and machine learning algorithms play an essential role in the automation of cloud services for private and public clouds. AIOps stands for artificial intelligence for information technology (IT) operations, and it is playing an essential role in bringing a change in the perspective of enterprises towards cloud services and big data. This is done by offering more data security, centralized database, scalability, governance system, and data ownership at an extremely low cost.
Increased utilization of hybrid cloud services is one of the great big data predictions for 2022. Hybrid cloud is an amalgamation of private and public cloud platforms. It is a feasible solution as it combines where the security and cost are equitable to provide more agility. Hybrid cloud helps in enhancing the performance of enterprises and optimizes resources.
Big Data on the Cloud
The amount of data generated is skyrocketing with the passage of time. Humans produce approximately 2.5 quintillion bytes of data every 24 hours. The issue lies with analyzing, formatting, structuring, cleaning, tagging, and collecting this ginormous amount of data in one place. Where to store that data? Where to process it? How to collect data? How should we share insights with others? Here’s when artificial intelligence and data science models come to get your back. However, data storage is still a matter of concern.
Without any probability, businesses are increasingly heading towards data processing, storage, and distribution. According to researchers and analysts, almost 45% of enterprises have moved their big data to cloud platforms. The utilization of public and private cloud services for data analytics and big data is one of the major data management trends not only in 2022 but also in the approaching years.
At the heart of it all, data science continues to emerge by leaps and bounds in the approaching years. You will notice more and more innovations as developments in the upcoming years all because of revolutionary artificial intelligence and machine learning algorithms. As a result, the demand for AI engineers, data analysts, and data scientists is increasing at a neck-breaking pace.
Henceforth, businesses should stay up-to-date to stay relevant in this competitive market by acquiring data-driven models in their enterprise. They should prepare themselves to tackle unpredictable trends and make the appropriate decisions to meet high customer demands. So here’s a piece of wise advice for youth: if your interest lies in technology, propel yourself out of the starting gate and become a data scientist in 2022. Surely, organizations will be dying to hire you if you become one.
Without a doubt, technological evolution is not going anywhere anytime soon, and it is here to stay.
|
<urn:uuid:e0445567-65bc-44fd-8945-96c5db26faa7>
|
CC-MAIN-2022-33
|
https://www.techhound.org/latest-news/key-data-science-technologies-trends-for-2022/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00675.warc.gz
|
en
| 0.944477
| 1,206
| 2.140625
| 2
|
WL#2476: Fuzzy operations for fulltext
Affects: Server-7.1 — Status: Assigned — Priority: Very High
Support fuzzy full-text searches. Maybe support soundex full-text searches too. This is not in the Full-Text Search TODO. I added it because FUZZY FORM OF is an SQL/MM operation, which both DB2 and Oracle support. Syntax ------ As stated already for other worklog entries: We will preserve MySQL's MATCH ... AGAINST syntax for the time being, changing it is not part of this task. To request fuzziness, one adds FUZZY FORM OF <word> in the AGAINST expression. For example: SELECT * FROM articles WHERE MATCH (title) AGAINST ('FUZZY FORM OF "rain"'); Perhaps this should match "rail" or "raid" (one letter differing at end). The SQL/MM syntax, which we won't support, would be: CONTAINS (handle, 'FUZZY FORM OF "rain"') The DB2 syntax, which we won't support, would be: CONTAINS (handle, 'FUZZY FORM OF [n] "rain"') where n is a number that indicates how close a match must be, with 100 meaning "must be exactly the same". The Oracle syntax, which we won't support, would be: fuzzy(term, score, numresults, weight) The Oracle manual's example is: ...CONTAINS(TEXT, 'fuzzy(government, 70, 6, weight)', 1) > 0; The Fuzzy operation is applicable only for words, not phrases. For all worklog fulltext tasks which propose some wordy syntax, there will probably be an alternative proposal that requires a single special character. For example: AGAINST ('?rain') Since ? was the fuzzy operator in an early Oracle version, there might be some people who recognize it. Indeed this would be more compatible with current syntax, but I think somebody has already observed that we'll run out of special characters someday. The criterion ------------- SQL/MM doesn't state what makes FUZZY FORM OF true or false. The SQL/MM document merely says "The equivalence is language dependent and implementation dependent." So let's follow DB2. The DB2 documentation says: "A [fuzzy search] is a search for terms that have a similar spelling to the search term. This is particularly useful when searching in documents that were created by an Optical Character Recognition (OCR) program. Such documents often include misspelled words. For example, the word economy could be recognized by an OCR program as econony. Note that the first three characters must match ..." So, when comparing word in query to word in document: (1) Word length must be the same (2) First three letters must be the same (3) 90% of following letters must be the same. To arrive at "90%", I picked a number out of the air. Remember that DB2 allows you to specify the minimum score as part of the query. Oracle has more capability, and apparently has a different search algorithm that involves storing fuzzy forms in the index, but I think imitating DB2 is enough. Soundex ------- If it's convenient, do Soundex at the same time as fuzzy. If it's not convenient, move Soundex to a separate task. The syntax for Soundex is: SOUNDS LIKE <word> However, Oracle allows '!word'. MySQL supports SOUNDEX(expr) and expr SOUNDS LIKE expr as described in the String Functions section of the manual, http://dev.mysql.com/doc/mysql/en/string-functions.html. Doubtless one could use the same algorithm for full-text. References ---------- "[DB2] Net Search Extender Administration and User's Guide" http://safariexamples.informit.com/0131007726/PDFDOC/desf9e80.pdf "Oracle Text Reference: Indexing" http://www.stanford.edu/dept/itss/docs/oracle/9i/text.920/a96518/cdatadic.htm#CCREF0200 "Fuzzy Lookup ... for SQL Server 2005" (not a full-text function description) http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnsql90/html/FzDTSSQL05.asp WL#2423 Stemming for fulltext WL#2428 Dictionary for fulltext WL#526 Implement DIFFERENCE() function (easy)
Copyright (c) 2000, 2017, Oracle Corporation and/or its affiliates. All rights reserved.
|
<urn:uuid:8df5f75d-085e-42b0-a8e5-986590bd8ef2>
|
CC-MAIN-2017-04
|
http://dev.mysql.com/worklog/task/?id=2476
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00322-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.874249
| 1,002
| 1.765625
| 2
|
When this Athlone principal decided to grow his school’s own vegetable garden for their soup kitchen, he was met with a dilemma — how were they going to pay the huge water bill?
But Ned Doman High School palie Gwynne Philander and his innovative gardener Lawrence Matji, 56, came up with a solution — they would use rain to water their garden, and it wouldn’t cost them a cent.
So for the past three months, they’ve been collecting water in two huge 10 000 litre drums.
The new garden only has lettuce and mustard seed plantjies for now, but they hope to expand soon.
Their next mission is to use the rain water as a low-cost sewerage system.
Philander says his 500 pupils use over 15 000 litres of water a week just for flushing the toilet, and this would be a good way for the school to save even more money.
The water is decanted into wheelie bins and crates, and placed all over the school to water the plants, flowers and food garden.
Lawrence hopes to educate the general public about water saving.
“You can tell someone something but it is more beneficial showing them what you are doing and why,” he explains.
“When the rain season began, I started storing the water in the huge drums which were full and overflowing.
“Next I had to use large crates and line them out with plastic to catch the water.
“I am very conscious about saving water. I think people will think differently about water when they have to carry it to their homes as opposed to having to open a tap.
“The water that is being stored we use for the vegetable garden which takes away the cost also for the school.”
Principal Philander is keen on finding more uses for the free water.
“We have 500 pupils and imagine, 3 000 litres per day is being used when a toilet is being flushed,” he says.
“Rain water is free and if we can get to use that for our toilets imagine how much we can save.”
Lawrence previously featured in the Daily Voice when he made a two-metre wooden cross and went on a walking tour on the Cape Flats to spread the gospel.
|
<urn:uuid:a9e9f5ed-4072-456f-b836-815d60f3bc66>
|
CC-MAIN-2017-04
|
http://www.dailyvoice.co.za/principal-collects-rain-water-for-veggie-garden/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00457-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.978296
| 482
| 2.171875
| 2
|
Microsoft today said it would deliver seven security updates next week - tying the record for January - to patch eight vulnerabilities in Windows and its developer tools.
But the company declined to confirm that the update will include a patch pulled at the last minute a month ago.
One of the seven updates was tagged "critical," the highest threat ranking in Microsoft's four-step system, while the others were marked "important," the second-highest rating, even though some of them could conceivably be exploited by attackers to plant malware on users' PCs.
Altogether, three of the updates were labeled as "remote code execution," meaning they could be used to hijack an unpatched system, Microsoft said in its monthly advance notification.
A twist to this month's Patch Tuesday is Microsoft's classification of one of the updates as "security feature bypass," a label it's never before applied.
"[Security feature bypass]-class issues in themselves can't be leveraged by an attacker," said Angela Gunn, a spokeswoman for the Microsoft Security Response Center, in a post to that group's blog today. "Rather, a would-be attacker would use them to facilitate use of another exploit."
Andrew Storms, director of security operations at nCircle Security, took a shot at deciphering the new category.
"Someone probably discovered a method to either turn off or bypass one of Windows security features that could let an attacker get in easier," said Storms, who said the possibilities of the vulnerable element could range from UAC - for "user account control," the prompt users must click through to install software, to DEP and ASLR, two important anti-exploit technologies baked into Windows.
In an email, Paul Harvey, a security and forensic analyst with Lumension, flatly said that the security bypass feature (dubbed "SBF" by Microsoft) patch would "update ... Microsoft's SEHOP technology to enhance the defense-in-depth capability that it can afford to legacy applications."
SEHOP, or Structured Exception Handler Overwrite Protection, is a label for an anti-exploit technology that designed to block a now-common hacking technique first described in 2003, according to a Microsoft Security Research & Defense blog post from 2009.
Microsoft added SEHOP defenses to Windows with Vista Service Pack 1 (SP1); it's also inside Windows 7, Server 2008 and Server 2008 R2, although it's disabled by default on Vista and Windows 7, Microsoft says, "for compatibility reasons."
It's possible that Microsoft will enable SEHOP by default in those client editions of Windows with next Tuesday's patch.
Microsoft said it would publish more information about the SBF-related update next week.
The new category doesn't necessarily mean that Microsoft expects a slew of vulnerabilities that fit under the SBF label, said Storms, who had a simpler explanation.
SAP patch possible
"I think they just had an oddball and they didn't know what to do with it," said Storms. "Rather than try to shove it into an existing category, like remote code execution or elevation of privilege, they thought, 'Why muck with history? Let's just make a new one.'"
Microsoft declined to say whether next week's update tally will include a fix for a long-standing issue in SSL (secure socket layer) 3.0 and TLS (transport layer security) 1.0 within Windows that was publicized last September by a pair of researchers who built BEAST, or "Browser Exploit Against SSL/TLS," a hacking tool and the first-ever practical exploit of the years-old flaw.
Although a patch for the bug exploited by BEAST was scheduled to ship in December 2011, Microsoft scratched the release at the last moment because German enterprise developer SAP reported compatibility problems.
"Microsoft continues to work with SAP and will release the update through our normal bulletin process," said Dave Forstrom, director of Microsoft's Trustworthy Computing group, today when asked if a BEAST patch was on the docket for next Tuesday.
"It's gonna be in there," said Storms of Microsoft's fix. "It's my understanding that the SAP patch is already out."
The seven updates next week will get 2012 off to a quick start for Microsoft, which has traditionally pushed a small number of updates to users in the year's first month. Microsoft released just two bulletins in January 2011, for example, two in 2010, one in 2009 and two in 2008.
Microsoft will release the seven updates on 10 January.
|
<urn:uuid:7a81d136-66e0-482d-abf3-84dfe80e483c>
|
CC-MAIN-2017-04
|
http://www.techworld.com/news/operating-systems/microsoft-announce-security-feature-bypass-for-patch-tuesday-3328191/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00146-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.960165
| 931
| 1.507813
| 2
|
Arlington, VA (PRWEB) April 28, 2015
The devastating earthquake in Nepal over the weekend has already touched the hearts of millions of Americans who want to support disaster relief through donations. BBB Wise Giving Alliance (Give.org) advises donors to avoid being taken advantage of by questionable solicitations or wasting their money on poorly managed relief efforts.
“The news out of Nepal is horrific and the photos are heart-breaking,” said H. Art Taylor, president and CEO of the BBB Wise Giving Alliance. “People want to help as soon as possible, and that is wonderful, but donors need to follow some key rules about supporting disaster relief so that their gifts get to those who need them most.”
Across the world, relief and development organizations and governments have begun responding to the earthquake in Nepal. American charities have also begun accepting donations to assist in the region. Before you choose a charity to give to, take a look at our tips for giving to this type of cause (below) and remember to check out the charity on Give.org.
Click here (go.bbb.org/nepal) for a list of nationally soliciting charities that have been accredited by BBB WGA (i.e., meet all 20 BBB Charity Standards) and indicate that they are collecting contributions to assist Nepal relief efforts.
BBB Wise Giving Alliance offers donors these tips for disaster relief giving:
Be cautious when giving online. Be cautious about spam messages and emails that claim to link to a relief organization. If you want to give to a charity involved in relief efforts, go directly to the charity’s website. In response to Katrina and Haiti earthquake, the FBI and others raised concerns about websites and new organizations that were created overnight, allegedly to help victims.
Rely on expert opinion when it comes to evaluating a charity. Be cautious when relying on third-party recommendations such as bloggers or other websites, as they may not have fully researched the relief organizations they list. The public can go to http://www.give.org to research relief organizations and other charities to verify that they are accredited by the BBB which means they meet the 20 Standards for Charity Accountability.
Be wary of claims that 100 percent of donations will assist relief victims. Despite what an organization might claim, charities have fund raising and administrative costs. Even a credit card donation will involve, at a minimum, a processing fee. If a charity claims 100 percent of collected funds will be assisting earthquake victims, the truth is that the organization is still probably incurring fund raising and administrative expenses. It may use some of its other funds to pay these costs, but the expenses will still be incurred.
Find out if the charity has an on-the-ground presence in the impacted areas. Unless the charity already has staff in the affected areas, it may be difficult to bring in new aid workers to provide assistance quickly. See if the charity’s website clearly describes what the charity can do to address immediate needs.
Find out if the charity is providing direct aid or raising money for other groups. Some charities may be raising money to pass along to relief organizations. If so, you may want to consider “avoiding the middleman” and giving directly to those that have a presence in the region. Or, at a minimum, check out the ultimate recipients of these donations to see whether they are equipped to provide aid effectively.
Gifts of clothing, food or other in-kind donations. In-kind drives for food and clothing, while well intentioned, may not necessarily be the quickest way to help those in need – unless the organization has the staff and infrastructure to distribute such aid properly. Ask the charity about its transportation and distribution plans. Be wary of those who are not experienced in disaster relief assistance.
ABOUT BBB WISE GIVING ALLIANCE: BBB Wise Giving Alliance (BBB WGA) is a standards-based charity evaluator that seeks to verify the trustworthiness of nationally-soliciting charities by completing rigorous evaluations based on 20 holistic standards that address charity governance, effectiveness reporting, finances, fund raising, appeal accuracy, and other issues. Learn more about the 20 BBB Charity Standards and about local charity review at local Better Business Bureaus at Give.org.
MEDIA CONTACTS: For more information, journalists should contact Katherine Hutt at 703-247-9345 or khutt(at)council(dot)bbb(dot)org or Bennett Weiner at 703-247-9323 or bweiner(at)council(dot)bbb(dot)org.
|
<urn:uuid:58e598aa-abf5-4429-9be5-bd369df1963b>
|
CC-MAIN-2016-44
|
http://www.prweb.com/releases/2015/04/prweb12683579.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00044-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.930119
| 956
| 1.835938
| 2
|
This unique project was to develop a large scale industrial plant, capable of manufacturing ‘green plastics’ (i.e. polyethylene from biomass feedstock). P+i was engaged as financial advisor and development manager to Oswal Projects, which developed the $700M Burrup Fertiliser plant in Western Australia, the largest ammonia plant of its kind.
P+i assembled an international team of technical, chemical and engineering experts to assist in the completion of project concept and feasibility studies.
In addition to addressing unique technical issues, P+i worked with farmers to develop a year-round feedstock strategy which overcame crop seasonality. Project financial viability was tested throughout, using the bankable financial model developed by P+i.
|
<urn:uuid:ce994d36-60dc-4550-b65d-3aa8fc29a161>
|
CC-MAIN-2017-04
|
http://www.pandigroup.com.au/NQPE-project.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00528-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.953189
| 151
| 1.539063
| 2
|
From 1971 to 1985, battles raged over Westway, a multibillion-dollar highway, development, and park project slated for placement in New York City. It would have projected far into the Hudson River, including massive new landfill extending several miles along Manhattan’s Lower West Side. The most expensive highway project ever proposed, Westway also provoked one of the highest stakes legal battles of its day. In Fighting Westway, William W. Buzbee reveals how environmentalists, citizens, their lawyers, and a growing opposition coalition, despite enormous resource disparities, were able to defeat this project supported by presidents, senators, governors, and mayors, much of the business community, and most unions. Although Westway’s defeat has been derided as lacking justification, Westway’s critics raised substantial and ultimately decisive objections. They questioned claimed project benefits and advocated trading federal Westway dollars for mass transit improvements. They also exposed illegally disregarded environmental risks, especially to increasingly scarce East Coast young striped bass often found in extraordinarily high numbers right where Westway was to be built.
Drawing on archival records and interviews, Buzbee goes beyond the veneer of government actions and court rulings to illuminate the stakes, political pressures, and strategic moves and countermoves that shaped the Westway war, a fight involving all levels and branches of government, scientific conflict, strategic citizen action, and hearings, trials, and appeals in federal court. This Westway history illuminates how high-stakes regulatory battles are fought, the strategies and power of America’s environmental laws, ways urban priorities are contested, the clout of savvy citizen activists and effective lawyers, and how separation of powers and federalism frameworks structure legal and political conflict. Whether readers seek an exciting tale of environmental, political, and legal conflict, to learn what really happened during these battles that transformed New York City, or to understand how modern legal frameworks shape high stakes regulatory wars, Fighting Westway will provide a good read.
Friday, May 9, 2014
Buzbee's "Fighting Westway"
William W. Buzbee, a professor at Emory Law who will be joining Georgetown Law’s faculty this fall, has published Fighting Westway: Environmental Law, Citizen Activism, and the Regulatory War That Transformed New York City with Cornell University Press. Saith the press:
|
<urn:uuid:624b5c67-a75f-44d9-8b8c-255b49796daf>
|
CC-MAIN-2022-33
|
https://legalhistoryblog.blogspot.com/2014/05/buzbees-fighting-westway_9.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00466.warc.gz
|
en
| 0.952297
| 479
| 2.09375
| 2
|
In a new round of negotiations in Geneva, it was still not possible to push through a ban on autonomous weapon systems among UN states.
After a new round of negotiations on a ban on autonomous weapon systems among member states of the UN, still no agreement could be reached. NGOs are already working on a plan B to speed up the enforcement of the ban.
Discussion about banning autonomous weapon systems since 2014
Last week there was a new round of negotiations by the Group of Governmental Experts (GGE) on lethal autonomous weapon systems (LAWS). The government representatives were only able to agree on continuing the discussion, but not on a general ban on LAWS. To achieve this goal, non-governmental organizations (NGOs) are now considering taking their call for such a ban to another international forum.
The discussion on this topic has been going on for 2014. In November government representatives met for the first time as a supposed “expert group“. exchange about it. Most recently, the UN conference last December negotiated a ban on LAWS, as Heise reported.
Both the USA and Russia do not want to join in a ban on autonomous weapon systems. They refer to voluntary norms and international humanitarian law and see them as generally less prone to errors.
Germany is also committed to a ban on autonomous weapon systems
The aim of the German federal government is to outlaw fully autonomous weapon systems. They are therefore not allowed to be developed, procured or even used. As the Federal Foreign Office reports, the federal government has to deal with considerable resistance from some UN member states. A proposal tabled jointly with other EU countries aims to mediate between camps within the UN through a “dual approach in the UN Weapons Convention”.
Countries like Argentina have already submitted a draft for a binding new protocol outlawing autonomous weapon systems. Other countries, such as Austria or Switzerland, rely more on binding standards. And then there are the USA, South Korea and Japan, who invoke existing standards of international humanitarian law.
But Germany’s will is apparently not strong enough
Marius Pletsch from the German Peace Society DFG-VK finds clear criticism of the German attitude: “In the attempt to attack Russia and other highly militarized states To keep on board, the other delegations are partly responsible for the years of deadlock in the negotiations to come to a legally binding result.
Although the outlawing of autonomous weapon systems is part of the coalition agreement of the incumbent government, according to Pletsch it does not live up to its own claim. He lacks the ambitious commitment of the German delegation for a binding ban on LAWS.
The search for alternatives
NGOs have now decided to continue the fight on another level. The “Stop Killer Robots” initiative is intended to give progressive states the opportunity to negotiate the ban on autonomous weapon systems in another forum. After the failure of the negotiations in Geneva, this alternative approach should bring about the hoped-for agreement next year.
As we have already reported elsewhere, the arms business is bloody, but it is often profitable. Trading in war has historically emerged as an opportunity to reignite the economy. Given the current outlook for the global economy, this could be one of the reasons why such a debate, where a quick agreement would be desirable, is being delayed for so long. But those who debate it are rarely the ones who end up bearing the consequences on the battlefield.
|
<urn:uuid:e09ea9f1-6d5d-4c2c-af1e-b511885cd282>
|
CC-MAIN-2022-33
|
https://www.update.co.ke/weapon-systems-still-not-banned-agreement-is-still-missing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00679.warc.gz
|
en
| 0.956626
| 712
| 2.015625
| 2
|
TSQL System Stored Procedures
InterSystems IRIS provides TSQL system stored procedures to help you administer and track database objects in your system. TSQL system stored procedures can be executed in any namespace and schema. The scope of all stored procedures is the current namespace.
Stored procedures are executed using the TSQL EXECUTE or EXEC command. For a stored procedure with a name such as sp_xxx, this execute command can be explicit or implicit. Thus the following TSQL statements are functionally identical:
EXECUTE sp_addtype 'shortstr','varchar(6)','not null' EXEC sp_addtype 'shortstr','varchar(6)','not null' sp_addtype 'shortstr','varchar(6)','not null'
InterSystems TSQL supports the following system stored procedures:
This system stored procedure adds a user-defined data type.
sp_addtype typename, phystype [(length) | (precision [, scale])] [, "identity" | nulltype]
typename is a user-defined data type name. phystype is the physical datatype on which to base the user-defined datatype. You can optionally specify either IDENTITY or nulltype. The optional IDENTITY keyword specifies that the user-defined data type has the IDENTITY property, which by definition is NOT NULL. The optional nulltype specifies whether a column with this data type should have a NOT NULL constraint: options are NULL (allow nulls) and NOT NULL or NONULL (do not allow nulls).
A typename can only be used for table columns. A typename is defined within the current namespace; mapping of a typename across namespaces is not supported.
The SQL compiler looks up type mapping in the DDL Datatype Mapping definitions in the system configuration before looking up in the typename table. Therefore, if you define a typename using sp_addtype named My_Type, but you also have a My_Type defined in the User DDL Datatype Mappings, the mapping of My_Type comes from the User DDL Datatype Mapping definition.
This lookup of typename is done at runtime, so typename does not need to be defined at DDL compile time.
A data type defined using sp_addtype with a specified nulltype behaves as follows:
If the DDL field specifies NULL, a value for the field is not required, even if sp_addtype specified NOT NULL.
If the DDL field specifies NOT NULL, a value for the field is required, even if sp_addtype specified NULL.
If the DDL field does not specify NULL or NOT NULL, a value for the field is required if sp_addtype specified NOT NULL.
If the DDL field does not specify NULL or NOT NULL, a value for the field is not required if sp_addtype either specified NULL or did not specify a nulltype.
The following example creates the data type shortstr, which requires a value (NOT NULL) and this value must be six or less characters:
EXEC sp_addtype 'shortstr','varchar(6)','not null'
This system stored procedure deletes a user-defined data type.
typename is a user-defined data type name defined within the current namespace.
sp_procxmode (Sybase only)
This system stored procedure displays or changes the execution mode associated with stored procedures.
sp_procxmode [procname [, tranmode]]
procname is the name of a stored procedure. tranmode is the transaction execution mode: Values are "chained", "unchained" (the default), and "anymode".
When called with no arguments, sp_procxmode returns a result set of all procedures defined for the namespace, their user name and transaction mode (1=unchained). When called with just the procname argument, sp_procxmode returns the user name and transaction mode of the specified procedure.
The following tranmode values are supported:
Chained: implicitly begins a transaction before any data-retrieval or modification statement: delete, insert, open, fetch, select, or update. You must still explicitly end the transaction with commit transaction or rollback transaction. A procedure defined to run in chained mode will set autocommit_off at the beginning of the procedure, and restore the prior setting at the end of the procedure.
Unchained: (the default) requires the user to explicit begin a transaction before any data-retrieval or modification statement. You must explicitly end the transaction with commit transaction or rollback transaction. A procedure defined to run in unchained mode will set autocommit_on at the beginning of the procedure, and restore the prior setting at the end of the procedure.
Anymode: If the mode is not defined, or if it is defined as anymode, no change is made to the autocommit setting.
InterSystems IRIS does not support a SET [UN]CHAINED option to change process settings. The setting used is the current setting of the process's auto-commit mode.
InterSystems IRIS does not report an error if a procedure defined as chained is called by a process in autocommit_on mode, nor does it report an error if a procedure defined as unchained is called by a process in autocommit_off mode.
The tranmode metadata is not part of the actual method definition. This means that changing the tranmode does not require a recompile. It also means that when exporting/importing classes containing TSQL (Sybase) stored procedures, the tranmode setting for the procedure is not exported with the class definition. Upon import, if a procedure needs to be defined in Chained mode, you must call EXEC sp_procxmode 'procname', 'chained' for the procedure.
|
<urn:uuid:fec8d561-4ccf-4a2f-a9a7-c9014f82482b>
|
CC-MAIN-2022-33
|
https://irisdocs.intersystems.com/irislatest/csp/docbook/DocBook.UI.Page.cls?KEY=GTSQ_systemprocs
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00269.warc.gz
|
en
| 0.740322
| 1,298
| 2.484375
| 2
|
Carrots are used both for table vegetables and for flavoring soups and stews. They are of the easiest culture. The seed is sown in rich, mellow soil, preferably with a few radish seeds to mark the rows and kept cleanly cultivated until they get a good start. If sown as soon as the ground can be worked, roots can be secured by the latter part of May or early June. For the small early sorts 14 inches between the rows is sufficient, but for the late, large-growing kinds 18 inches is preferable. It is desirable, however, to use the small growing kinds exclusively, because they are much more easy to dig than the long ones. The plants are thinned when about 4 inches tall to 4 or 6 inches apart. Storing is the same as for turnips. Carrots are often forced in hotbeds and cold frames for the early market. They are as easily managed as radishes for this purpose. Among the best known varieties are Short Scarlet, Danvers, and Oxhart.
> > Carrots
|
<urn:uuid:61a285ce-5f46-49e3-8942-23a0995424fa>
|
CC-MAIN-2016-44
|
http://horticulture.yodelout.com/carrots/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00386-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.968934
| 217
| 2.921875
| 3
|
From the Capitol building and the Lincoln Memorial to the White House and the Washington Monument, Washington D.C. is home to iconic American landmarks. However, the souvenirs sold there so visitors can take a small piece of the nation's capital home with them are anything but American.
It's difficult to find a D.C. keepsake that's not foreign-made. The busiest gift shops in the city are at the museums of the Smithsonian Institution, where everything from presidential busts to Elvis bobbleheads are made in China.
Today, Sen. Bernie Sanders, I-Vt., called the Smithsonian's top officials into his office to demand they sell "Made in the USA" products. Previously the Smithsonian suggested that it was just too expensive, but any tourist can find domestically-produced gifts at a thriving shop called Appalachian Spring a few blocks away.
Proprietor David Brooks has been in business for 43 years. He sells only American-made products and his goods help employ some 400 crafts people.
Brooks says that if the Smithsonian museums sold work by American craftsmen, they could create work for thousands of people. People like Loren Lukens, a pottery maker in Seattle.
"That would be a gold mine to have my work at the Smithsonian. Even if it's just in the gift shop." Lukens said.
The Smithsonian hosts 30 million visitors every year and last year its gift shops made almost $44 million.
After the meeting with Sanders, Smithsonian officials said they would sell more American-made souvenirs and promised to devote one gift shop to American-made products.
Sanders said, "It's a start." However, for some in Congress, it's not good enough.
Nick Rahall, D-W.Va., the top Democrat on the committee that oversees the Smithsonian, said he plans to introduce a bill that would require the Smithsonian to sell only American-made goods.
|
<urn:uuid:414caf86-a595-4371-a62d-bcb5c310f4f8>
|
CC-MAIN-2017-04
|
https://abcnews.go.com/Business/made-america-smithsonian-promises-sell-american-made-souvenirs/story?id=13087867
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00215-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.960437
| 392
| 2.0625
| 2
|
Oddmuse is a program to run a wiki. A wiki can be used for communication in a team or for documentation, when things have to be quick and easy: Content Management for everybody.
A wiki enables other people to quickly join efforts. In the office, you can introduce new employees, distribute phone lists, store memos, plan trips, document projects, prepare meetings, or describe internal processes.
For many free software projects wikis have taken an important role somewhere between manual, FAQ, IRC, and mailing lists.
Oddmuse is very easy to install: Simple installation, compact code, and easy extensibility were the most important design factors.
- Easy to install: Just copy one file into the correct directory and off you go.
- No dependencies on version management tools or database installation.
- Web server needs Perl installed; if you are allowed to run scripts, that should be a given.
- Easy to use for users, easy to hack for programmers.
- Capable of multilingual sites.
- Unicode (UTF-8) per default.
- Valid HTML; CSS friendly.
- Caching on several levels.
- Easy to download.
Or, from the point of view of a user:
Pages to browse
|
<urn:uuid:1f77fa69-f10b-4946-b470-708b6e626e08>
|
CC-MAIN-2017-04
|
https://oddmuse.org/wiki/About
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00026-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.8129
| 261
| 1.945313
| 2
|
It’s sad but perhaps fitting that few Canadians know of Women’s Institute.
Even fewer remember Adelaide Hoodless who got it started.
Sad because not too long ago Women’s Institute was selected as one of the top ten social innovations in the world.
You know Women’s Institute, if at all, from the Helen Mirren movie Calendar Girls about a group of Women’s Institute members from North Yorkshire who posed without clothes for a fund raising calendar. That group is one of 60,000 in 70 countries comprising 9 million active members in the world today.
Women’s Institute was founded in 1897 in Stoney Creek Ontario in response to children dying because of poor hygienic practices in food production. Aside from their practical and effective response to that challenge, they are credited with ushering in the first wave of feminism. That’s right before Emily Murphy, Nellie McClung, Muriel Duckworth, Rosemary Brown, Thérèse Casgrain, Doris Anderson, Shari Graydon and the women behind Idle No More there was Adelaide Hoodless and a movement of mostly rural Canadian women.
Fitting because the great woman, great man theory of history doesn’t grow well in Canadian soil. Perhaps that’s why we don’t remember Adelaide Hoodless . (I spoke about the Women’s Institute recently and several people came up afterwards to tell me they regularly drive past Adelaide Hoodless School in Stoney Creek but had no idea who she was.)
There are many anonymous benefactors from the past, like Adelaide Hoodless. They are similar to many of the contemporary change-makers I encounter in my travels. Their genius is their ability to transcend organization, time, place and personality. And achieve program excellence, policy reform and culture shift for their social innovation, rather than heroine status for themselves.
Still there is so much we could learn from Adelaide and her contemporaries. I’m betting we can do that without becoming worshippers.
Educate a boy, and you educate an individual. Educate a girl, and you educate a community.
Sometimes it feels like I’m all that they’ve got
It’s so hard to know I’m not what they want.
This week’s song is ‘I am not your Hero’ by sisters Tegan and Sara.
|
<urn:uuid:2ec163b3-61ee-4db2-9fae-212c0fde7feb>
|
CC-MAIN-2016-44
|
http://aletmanski.com/impact/happy-without-heroes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00425-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.948902
| 498
| 2.046875
| 2
|
Think “New York City in the 1970s.” Just like New York during those dark days, Google faces a myriad of problems: many of its own making. And the Silicon Valley star might consider looking to Gotham for inspiration as it tries to turn things around.
Have you ever seen those gritty photos of the New York City subway from the 1970s? You know the ones: with weary riders spaced out in cars spray painted with graffiti inside and out? Whatever happened to that? If you ride the New York City subway today, there’s hardly any graffiti to speak of – and it’s not like no one is interested in street art these days. That’s more popular than ever. No…New York’s Metropolitan Transit Authority (MTA) snuffed out its graffiti problem. But how?
I thought about that graffiti this week as I wrote about Google’s trouble with another security incident: the embarrassing eruption of adware on its Chrome Web store. The company was forced to remove seven Chrome browser extensions claiming to be Chrome versions of the hot new game Bad Piggies – the latest installment in the Finnish firm Rovio’s enormously popular Angry Birds. Writing for Barracuda on October 3rd, researcher Jason Ding noted more than a half dozen Chrome extensions that claimed, falsely, to be versions of Bad Piggies. Many, when installed, requested permissions to harvest a dizzying amount of information on the user’s Web browsing activity. A few also installed adware plug-ins.
Like the graffiti on New York City’s subways, bogus Chrome extensions and malicious mobile applications have become a chronic and embarrassing problem that Google is having trouble stamping out. Bad Piggies wasn’t the first time bogus apps have cropped up on the Chrome Web store. And the whole Chrome Web store headache is similar to the tactics used by malware authors behind threats like DroidDream, the Trojan horse application that was bundled with playable versions of any number of popular Android applications and posted to Google’s Android Marketplace.
Like the MTA in the 1970s, Google is struggling to stay on top of the scourge of bad apps. Writing in response to questions from this reporter about the bogus Bad Piggies extensions, for example, a Google spokeswoman said that the company removed the “extensions noted in the Barracuda Labs report” from the Chrome Web Store. However, a quick check revealed at least two other extensions – both posing as Bad Piggies Chrome plug-ins, both clearly bogus and both sporting hundreds of user reviews complaining about scammy apps and adware. Tagged.
For the MTA in the 1970s, graffiti was a complex problem with no easy solution. Cars were tagged en route and – often – when they were out of service and sitting idle in holding facilities. The result: by the late 70s, graffiti covered the exterior and interior of almost every subway line, reinforcing public perceptions of the subway as dirty and crime ridden. At a practical level, the tagging had become so rampant that it was obscuring much of the signage on the subway lines, making it difficult for riders to navigate the system.
First: the MTA made getting rid of graffiti a priority. It reorganized to create clear lines of responsibility for dealing with graffiti. The agency invested millions to clean graffiti from its stock of more than 3,000 subway cars. Finally, the MTA pivoted from a policy of trying to apprehend and punish taggers to making it harder and less rewarding to tag trains. Trains were outfitted to make it harder to climb on and staging yards were secured to keep taggers out when the trains were idle. The “Clean Car” program in 1984 took tagged cars out of service until graffiti was removed from them, reinforcing the image that the MTA was in charge. Almost immediately, graffiti became less common. By 1989, it had been all but eradicated from the MTA.
As with the MTA, Google needs to take ownership of its application platforms, including Google Play and the Chrome Web Store. It must drain the swamp by removing applications that violate its policies. Next, Google needs to institute strict guidelines for developers and demand accountability from them. Google’s chief competitor, Apple, accomplishes this by requiring application developers to make a small, monetary deposit when they set up a developer account. The company then performs (cursory) audits of submitted applications, mostly for adherence to its AppStore policies. The fee isn’t enough to be a barrier to entry or to dissuade a sophisticated malware author, but it is enough to scare away those who want to operate anonymously and/or unethically. Google should do the same.
So far, there’s not much evidence yet that this is happening. Google plays dumb about bad apps, contending that it will remove bad Chrome extensions when they crop up. Writing about the Bad Piggies rogue application problem, the Google spokeswoman said that users (the victims) also shoulder some of the responsibility for policing the Web Store. “You should review the permission messages and user reviews carefully when you install a Chrome app or extension and decide whether you trust the author with those privileges,” the Google spokeswoman wrote.
That sounds sensible enough – but its specious advice. Chrome users have almost no way of evaluating the trustworthiness of Chrome extension publishers because Google doesn’t have any reputation ranking system, nor does it review applications and extensions before they’re published. I’m all for personal responsibility, but asking customers to police the stores in which they shop is a stretch.
In the 70s and 80s, the MTA owned up to the fact that it had to clean up graffiti because all those tags were undermining its mission. Google may, at some point, reach the same conclusion about its application marketplaces. Let’s hope its sooner, rather than later.
|
<urn:uuid:38f44590-1dcf-4e34-a693-66979467da3e>
|
CC-MAIN-2016-44
|
https://www.veracode.com/blog/2012/10/bad-piggies-graffiti-and-the-irt
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00097-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.955812
| 1,212
| 1.960938
| 2
|
Living together before, or instead of, marriage has not only become acceptable in the last 30 years, it has become the norm. According to the US Census bureau, there was a 72% increase in unmarried couples living together between the years from 1990 to 2000. Further, about 54% of women have, or will have, lived together with a boyfriend at some point in their lives. One recent survey of high school seniors found that 64% of young men and 57% of young women agreed with the statement, “It is usually a good idea for a couple to live together before getting married in order to find out whether they really get along.”
All of this is to say that young adults are experiencing more pressure than ever to experiment with alternatives to marriage. This, despite the wide body of research that says that cohabiting relationships are less stable and less satisfying than marriage, and actually increase the risk of divorce significantly if the cohabiting couple ever decides to pursue marriage.
This last point presents the best opportunity for parents and chastity educators to convince young people that remaining chaste until marriage is a better option. New research from the University of Denver has discovered some of the reasons that cohabitation offers a poor preparation for marriage.
SLIDING VS. DECIDING
In the report, Sliding v. Deciding, Dr. Scott Stanley argues that there are significant differences in the process by which cohabiting and non-cohabiting couples enter into marriage. And this process, itself, plays a significant factor in determining the stability of the future marriage.
Non-cohabiting couples tend to proceed toward marriage in a conscious way. Each stage of their evolving relationship represents a conscious choice that increases commitment on the one hand while intentionally limiting options on the other hand. For instance, the decision to move from casual dating to exclusive dating, to engagement, to marriage, represents conscious, deliberate decisions to limit how much time I spend with others and how much of myself and my time that I give to my beloved. Because I have consciously and deliberately chosen this path for myself, I am more satisfied with the result (because I don’t feel like it “just happened to me” I actually chose it) and I am more invested in its future success.
By contrast, the cohabiting couple tends to “slide” toward marriage instead of deciding upon it. Rather than proceeding through deliberate and public stages of increased commitment (exclusivity, to engagement, to marriage), cohabiting couples tend to get married because they’ve been together a while and other people just expect them to. It’s seen “as the thing that happens next” as opposed to a conscious step that requires investment and commitment.
As a result, many cohabiting couples feel suffocated by the commitment and limitations marriage places upon them. They didn’t consciously choose to limit their outside commitments. They didn’t consciously choose to give more of themselves to each other. It just “sort-of happened.” As a result, they often feel trapped by the exclusivity and work that marriage requires.
“I NEED TIME TO THINK!”
I was recently working with a woman whose daughter was cohabiting with her boyfriend. The couple had been together for about 5 years and living together for 2 of them. My client had been encouraging her daughter to live apart from her boyfriend with no success. In the last few months, the couple had been discussing the possibility of marriage, largely because their friends and family had been asking them about the possibility. Fortunately, when the daughter approached their parish priest about getting married, he told her that he wouldn’t marry them unless she and her boyfriend agreed to live apart until the wedding.
The couple was upset, but agreed to comply with the pastor’s request and the daughter moved back in with her mother. A few weeks later, the daughter went to her boyfriend’s apartment to pick up some of her things and walked in on her boyfriend and another woman in flagrante. In the argument the followed, the boyfriend argued that he had felt “trapped” into the marriage plans and he “didn’t know how he felt” about her and “needed time to think.”
The girlfriend was mystified. “What does he mean he ‘needs time to think!’ We’ve been together for five years!” What the young lady didn’t realize was that that young man said something very profound. Yes, they had been together for five years, but during that entire time, he had never been required to actually be intentional and think about the relationship. They had allowed their feelings to carry them along for the entire time. Finally, presented with the opportunity to be conscious about their relationship, the young really didn’t know what he thought about her and committing to her for the rest of his life.
This scenario, though dramatic, perfectly illustrates the benefits of chastity. Chastity requires a couple to be conscious and intentional about every step of their relationship—leading up to and even after marriage. Most people think of chastity as merely refraining from inappropriate sexual contact. But chastity really means exercising one’s capacity for loving the right person in the right time and in the right way. In other words, the beauty of chastity it that is forces one person to be conscious about his or her relationship to another. And according to the most recent studies on the matter. That makes all the difference.
Dr .Gregory Popcak is the author of over a dozen books including For Better…FOREVER! and Holy Sex! He directs the Pastoral Solutions Institute which offers telephone counseling for Catholic individuals, couples and families. Call 740-266-6461 or learn more online at www.ExceptionalMarriages.com
|
<urn:uuid:768769cb-43bd-4833-b571-f5e644f7c258>
|
CC-MAIN-2016-44
|
http://www.patheos.com/blogs/faithonthecouch/2013/05/cohabitation-nation-sliding-v-deciding-for-marriage/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719416.57/warc/CC-MAIN-20161020183839-00364-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.973801
| 1,216
| 2.046875
| 2
|
Businesses will soon come to see user-generated content as an unavoidable part of everyday business, according to Cisco Systems Chief Executive John Chambers.
Already, 25 million videos are beingevery day. But that could turn out to be peanuts, compared with what user-generated content can really do, Chambers said.
"That's our children--wait till we get hold of it," Chambers told delegates at the ITU Telecom World conference here Monday. " business models on this. In the future, it will be about producing it yourself" as enterprises start to adopt technologies such as collaboration tools.
could be put to use particularly , where health care information could be distributed to those in areas where medical facilities are not so common, Chambers said.
"Now we're beginning to provide health care to remote villages in China and India--that will change society," he said.
As a result of a trend toward content sharing from businesses and consumers alike, network traffic will obviously reach new highs, Chambers predicted.
"We haven't seen anything yet," he said. By 2015, the Cisco chief believes that 15 exabytes a month will be traveling through assorted pipes across the world. (An exabyte is a billion gigabytes.)
"That could be wrong," he added. "It could turn out to be conservative."
Jo Best of Silicon.com reported from Hong Kong.
|
<urn:uuid:dd0ac08f-2723-4f40-abce-cc0a9820be17>
|
CC-MAIN-2022-33
|
https://www.cnet.com/culture/chambers-businesses-to-adopt-youtube-model/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00476.warc.gz
|
en
| 0.959241
| 278
| 1.796875
| 2
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.