text
stringlengths 181
608k
| id
stringlengths 47
47
| dump
stringclasses 3
values | url
stringlengths 13
2.97k
| file_path
stringlengths 125
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
138k
| score
float64 1.5
5
| int_score
int64 2
5
|
|---|---|---|---|---|---|---|---|---|---|
Find more information about:
When Ray and John Connelly's father, Leroy, founded Connelly Machine Works fifty years ago, he probably never envisioned using water to machine parts. Today, the Connellys have discovered how to reduce the time and cost of traditional machining using an abrasive waterjet.
Connelly Machine Works is a family-owned and operated shop based in Santa Ana, California. They employ 20 people at their 10,000 square foot facility and offer an array of machining, welding and grinding services to the aerospace and other commercial industries. Equipment used at Connelly includes CNC and conventional mills, lathes, saws, welding and grinding machines.
Connelly's senior management concluded earlier this year that the shop needed to streamline its traditional machining process. Previously, parts were cut to near net with a saw and machined to finished tolerance on a CNC mill. This often required multiple passes, or wire EDM. "Time was a big disadvantage to this approach," said Ray Connelly. "It tied up our milling machines and EDM was too expensive and slow."
Intent on purchasing a wire EDM, the Connellys attended a trade show in Los Angeles. However, instead of the intended wire EDM, the Connellys purchased the Bengal abrasivejet machining center manufactured by Flow International Corp., in Kent, Washington.
They were pleased to discover that the Bengal would net and near net parts to ±0.006-inch accuracy from virtually any flat material up to four inches thick. Compact in size, the fully-integrated machining center is equipped with the Windows-based FlowMaster PC controller, the Paser 3 abrasive waterjet, an X-Y motion system, a 40,000 lb per square inch (psi) pump and a 39 inch by 19.6 inch worktable.
Connelly machines stainless and carbon steel, Inconel, titanium and brass with its abrasivejet machine. "When we saw what the Bengal could do, how fast it could cut and how easy it was to operate, we were convinced it was machined for us," said John Connelly.
"We now hog parts out in one pass with the Bengal and machine them to finish tolerance in a single pass with our CNC mills," said Ray Connelly. "And, we can use the same program on both the Bengal and the CNC mill. All we do is change the offsets."
The shop also utilizes the Bengal for other applications. "The machine is very good for prototyping and short run production. The simplicity of the software makes it an excellent machine for prototyping."
This ease of operation was a major factor in Connelly's decision to purchase the Bengal. The FlowMaster controller is pre-programmed with cutting parameters for a variety of materials, dramatically simplifying abrasive waterjet machining. To produce parts from a DXF or CAD file, users select material type and thickness and click on icons to execute waterjet commands. The controller determines optimum cutting parameters for the application. No special knowledge of abrasivejet machining or CNC programming is necessary.
"My daughter just started working at the shop," said Ray Connelly. "She has no programming experience, though she is familiar with PCs. She was able to program the Bengal, including complex parts within one week."
FlowMaster includes a CAD/CAM package and drawing functions. An optional scanner makes it possible to scan a drawing into FlowMaster where users can convert it to a DXF file in minutes. All components of the Bengal are controlled through FlowMaster.
Abrasivejet machining offers several key benefits to machine and job shops. A cold-cutting process, abrasivejet machining leaves a finished edge free of a heat-affected zone (HAZ). Consequently, abrasivejet machining reduces or eliminates secondary operations. Cutting without heat also protects against metallurgical changes, leaving the material structure of the part intact. "We previously consumed a lot of tooling trying to penetrate edges hardened by HAZ," said Ray Connelly. "An edge machined with abrasive waterjet is very easy on inserts and bits."
Abrasivejet is also said to improve material utilization, cutting from the edge or middle of a plate along specified lines in any direction. Minimal kerf (0.030 to 0.060 inch) width of the abrasivejet adds to the material savings. "The Bengal consumes much less material than saw cutting," said Ray Connelly. "We nest the parts pretty tight and definitely get more parts from a piece of material."
Set up for the abrasivejet takes less than five minutes. Tooling consists of an orifice and mixing tube, both lasting in excess of 120 hours. No tooling alignment is necessary and fixturing is minimal. "Set up time is very low," said John Connelly. "Our fixturing is very simple, one or two clamps or sometimes none at all."
Easy maintenance and uptime are other advantages. "Our machine has been running ten hours a day, six days a week. We run every minute of the day we're open. Maintenance is not a problem," said Ray Connelly. Operating cost amounts to approximately $19 per hour, excluding labor.
|
<urn:uuid:8b7527f4-541d-4c9d-8389-22a7d44681b6>
|
CC-MAIN-2017-04
|
http://www.mmsonline.com/articles/close-tolerance-manufacturer-finds-the-right-cam-system
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00168-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.947574
| 1,085
| 1.734375
| 2
|
Hiking is challenging enough. Don’t let the cold weather add one more hurdle to it. Hiking during the colder months or in colder regions can be extremely rewarding. But, it requires extra preparation too. Just a couple of things checked off your checklist and you will be able to have your usual hiking adventure in a brand-new landscape.
The winters are when you don’t have to worry about scorching heat and crowded trails. People fail to leave their cozy beds on winter mornings. And most of them prefer to stay indoors away from the cold and snow. But, you can maximize this and visit all your favorite popular hiking destinations which are impossibly crowded during the rest of the year.
Tips For Hiking In Cold Weather
The following are the many tips and tricks that will definitely help you while hiking in cold weather.
1. Cover Your Feet Properly
Your feet come under extra pressure from the cold weather conditions. They are already carrying your entire body weight. So they need to be in waterproof shoes with thick socks. This way you won’t get into trouble of getting wet or frostbite as you make way through the snow.
Well-fitted synthetic or woolen socks are the best to hike in during winters. You might also want to get a not-so-tight fitting on your shoes. People assume that it will prevent them from slipping off and provide a better grip. But in reality, you will be just cutting off the circulation to your feet with that death grip.
The boots with built-in insulation will keep your feet warm all day long. You won’t be freezing to death as you climb up those elevations in your well-fitted shoes. Also, carry an extra pair of socks, just in case. More often than not, you might step into a puddle or just get the snow in. The extra socks pair will come real handy in these scenarios.
2. Invest in Good Water Bottles
Hydration is important in all kinds of exercises including hiking. The drink tube of your hydration reservoir will most probably freeze as the temperature dips. That is why sturdy insulated water bottles or canisters are the better choices for this. You can get an insulated sleeve for an ordinary bottle too.
This will keep the water from freezing for a lot longer as compared to otherwise. When the bottles do freeze, they will do it from top to bottom. That means you might actually have water in a drinkable state at the bottom. But your sipper will be frozen shut.
So keep your bottles in upside downstate since the start to fix this problem. Make sure that your bottle is leak-proof and is properly capped. Avoid keeping the bottle in the exterior pocket of your bag or clothes. If you can, nestle them around with sufficient stuff at the core of your bag to have easy access to proper hydration at all times.
3. Pay Attention to Hypothermia Signs
Hypothermia is when your body temperature falls down below the normal range. The various levels of this disorder are mild, moderate and severe. You need to evacuate and rush to the nearest medical clinic immediately in case of moderate to severe hypothermia.
The mild hypothermia can be fully treated on-site so that you can continue with your hike. The common symptoms of hypothermia are shivering, deteriorated coordination and slowed mental capacity. The shivering stops and the pulse is undetectable in case of severe hypothermia.
You need to provide sufficient hot food and water to the patient in case of severe hypothermia. This way they can resume shivering that allows the body to generate required body heat. Remove them from the hypothermia inducing region such as rain, snow, wind or whatever the case may be. Offer them dry clothes and wrap them in enough layers to keep them warm till the hospital.
4. Put On Useful Layers
The layering process has three main sections – the base, mid and shell layers. You need to take them off and put them on according to your body temperature during various levels of the hike. This is to prevent excessive sweating. It might lead to your layers getting wet thus causing hypothermia.
You need to maintain a moderate body heat level at all times during your winter hike. Avoid cotton as it takes too long to dry out. Synthetic and Woolens are your best bet with their quick drying time and insulation.
Your base layer is to wick away the sweat. The mid-layer will provide warmth and help you retain your body heat. The shell layer should keep the winds and moisture at bay. Go for a breathable material for the base layer if possible.
5. Keep Food And Drinks From Freezing
It is best to bring more than enough food and drinks supply with you. You will not be starving or dying of thirst even if you get stranded by packing that extra bit. Try to pack piping hot tea/coffee/cocoa drinks in those vacuum-insulated bottles. It will give the drinks a fighting chance against the freezing weather outside.
The foods like cheese, nuts, candy, and chocolates tend to stay at edible temperatures for a lot longer. You need to experiment a bit for finding out your favorite snacks that don’t convert to rock on your winter hikes. You can try to pack them closer to your body so that your body heat facilitates optimum temperature for them.
The drink tube can be kept unfrozen with a bit of foam DIY. Or, you can get a specialized drink tube that keeps the water unfrozen even at freezing temperatures. Try to sip often so that the water stays liquid for long. Blowback the water into the reservoir to prevent it from cluttering and consequently freezing in the tube.
Your hiking schedule need not be jeopardized by just a bit of snow. You can hike in all seasons if you just take the necessary precautions. You might soon begin to enjoy the variety in the climate and scenery provided that you take the necessary steps.
Do you hike in the winters often? What bothers you the most about winter hiking? Tell us in the comments below. Also, forward it to your friends and family to help them hike better in the winter season.
|
<urn:uuid:22ecbd89-10b6-438e-b188-785a61910bec>
|
CC-MAIN-2022-33
|
https://outdoorexpertshq.com/tips-for-hiking-in-cold-weather/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00078.warc.gz
|
en
| 0.947102
| 1,278
| 1.820313
| 2
|
When fashion mogul John Weitz decided to build a "designer" sports car in the early 1980s, he just might have had Cisitalia in mind. Piero Dusio, an ingenious salesman and former soccer star, had formed Consorzio Industriale Sportiva Italia to make sporting goods, primarily bicycles, tennis rackets and clothing. By 1946, however, it was also building cars -- later to include the Cisitalia 202 Gran Sport -- a reflection of Dusio's passion for automobile racing.
Not surprisingly, Cisitalia's first cars were single-seat 1100-cc racers based on cheap and commonly available Fiat mechanical components. About 50 were built in two years, and so dominated their class that Dusio formed a traveling "circus" with 16 cars performing and some of the best Italian drivers of the day. Two of Italy's best engineers were responsible for the design: Dante Giacosa, later chief engineer at Fiat, and Giovanni Savonuzzi, then of Fiat's experimental-aircraft division. These Cisitalias preceded the more popular Italian-designed Formula Junior race cars by more than a decade.
Encouraged by his success, and apparently ignoring the fact that his efforts hadn't been noticed much outside Italy, Dusio embarked on a more ambitious program: a two-seat sports car. Again he used Fiat components, but this and the chassis were the sole legacies of the monoposto competition machines. The chassis was of space-frame construction -- light and strong but slow and expensive to build -- with independent front suspension and a live rear axle.
Front geometry was borrowed from Fiat's minicar, the beloved "Toppolino" (mouse), with a lower A-arm on each side and a single transverse leaf spring, the latter also providing upper wheel location. Semi-elliptic leafs sprung the rear. All-round drum brakes came from Fiat's workaday 1100-series family models, but were more than adequate for the new Cisitalia's light weight and modest performance. The engine, also Fiat 1100, was fortified by means of higher compression, dual downdraft Weber carburetors and dry-sump lubrication.
The first two-seat Cisitalias were lightweight racing coupes and roadsters with aluminum bodies bearing rear fender skirts and large tailfins. Like the single-seaters, they were successful in their class, and in expert hands could sometimes beat faster, more powerful cars. Famed pilot Tazio Nuvolari was particularly successful in a Cisitalia.
But though attractive, these no-nonsense racers were literally ill-equipped to double as road cars, a business Dusio also wanted to get into. To help him do that, he wisely turned for development help to Giovanni Battista Giuseppe Farina, better known by his family nickname, "Pinin." The result was a beautiful little fastback coupe that has since become a legend.
The reason, of course, is Farina's trend-setting body design, with modern flush-fender sides and a simple front end predictive of his early Ferraris. Named Type 202 Gran Sport, this car was stylistically very advanced for the late Forties and a real work of art. New York City's renowned Museum of Modern Art made that description official in 1951 by selecting the Cisitalia 202 Gran Sport as one of the 10 best automotive designs of all time, and putting one on permanent display. As you might expect, it still looks good today: smooth, well-proportioned, simple, and unaffected. Its only questionable element is the Buick-like portholes at the top rear of some front fenders (one or two per side, depending on year).
Essentially a roadgoing version of the racing two-seater, the Cisitalia 202 Gran Sport coupe was soon joined by a companion cabriolet. But prices were prohibitive for the time -- $5000 and $7000, respectively -- especially for small-displacement cars that weren't all that fast. They were beautiful and fun to drive, but there weren't that many people in Italy or anywhere else able or willing to pay such sums, even for a work of art.
Consider that by 1949, for about half what the Cisitalia 202 Gran Sport convertible cost, you could have Jaguar's sleek and sexy XK120 roadster, a genuine 120-mph car with a twincam six. And for $2000 less than the Cisitalia 202 Gran Sport coupe you could get a Porsche 356 which, while not that much faster, at least had all-independent suspension.
While its beauty wasn't only skin deep, the Cisitalia 202 Gran Sport simply didn't have the muscle to attract many sales in the high-flying, horsepower-crazy market of the day, and the high price was hard to justify even for a car that looked that good, especially when it used a lot of mass-production parts and almost any old American car could run rings around it.
The postscript to this story is a sad one. Hastened by development costs for a planned Grand Prix racer, Cisitalia ran out of funds in 1949 and Dusio moved operations to Argentina. He built cars there, but of a very different stripe. Meantime, Cisitalia 202 Gran Sport production was slated to resume in Italy under new ownership, and did, but the cars were basically cobbled-up amalgams of special bodies and workaday chassis and drivetrains. Production was sporadic in any case, though it continued as late as 1965.
With all this, serious enthusiasts will look no further than the Italian-made cars, though they'll have to look hard to find one. In all those years, only 170 Cisitalia 202 Gran Sports were completed, including a mere 17 cabriolets.
|
<urn:uuid:31e1e7b7-bc55-40ce-85d6-9e2ef345c958>
|
CC-MAIN-2017-04
|
http://auto.howstuffworks.com/cisitalia-202-gran-sport.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00043-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.973918
| 1,230
| 2.0625
| 2
|
- Dairy Basics
- Products & Programs
- About Alta
Increase your leadership and management knowledge, improve reproductive diagnostic and decision making skills, and learn to identify unrealized profit potential through improved herd reproduction.
The polled gene in dairy cattle is dominant over the horned gene. Yet horned cattle are still much more prevalent in the global dairy population because few producers ever chose to select for polled cattle as part of their breeding program.> Read more
Do you select for A2A2 bulls within your genetic plan? Find a link here to download an extensive list of our A2A2 qualified sires.> Read more
|
<urn:uuid:92cb4f10-172e-425f-9591-aa41d9672ba3>
|
CC-MAIN-2017-04
|
http://web.altagenetics.com/us/AltaNews/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00330-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.913628
| 128
| 2.25
| 2
|
Why is that important? Because it leaves many workers lacking diversification, putting them at the mercy of a company's rise or fall.
The Washington Post reports that the service examined forms filed with the Securities and Exchange Commission by 278 large U.S. companies. It found that company stock accounted for 38 percent of the assets in the average employee defined-contribution plan.
Patrick J. Purcell, the study's author, noted that defined-contribution plans, like the 401(k), have grown so much in popularity over the last two decades that they've replaced or augmented more traditional, defined-benefit pension plans, in which the employer bears the investment risk and the employee is entitled to a set pension payment.
Larger companies often match a certain percentage of employee contributions to a 401(k) plan, usually with company stock. The employees often depend on that stock as a primary way to save for retirement. It partly has to do with loyalty, but the employees also know that larger companies have historically performed well and appeared stable, said Stephen Utkus, director for the Vanguard Center for Retirement Research in Malvern, Pa.
"The difficulty is, of course, it's not a diversified position," Utkus said. "They lose big if the stock does poorly."
There is much greater mobility in today's workplace, Utkus said, and most employees leave a company before earning a pension under a traditional plan, in which the size of the payout depends on the number of years of service.
To read the Washington Post article, click here.
Participate in this week's HR.BLR.com poll and discussion!
ew study from Congressional Research Service finds that employees who have only 401(k) retirement accounts, without the additional security of traditional pension plans, have a higher concentration of their company's stock than previously assumed.
|
<urn:uuid:26fc9dad-9a9c-483b-87fb-fe7d85d7152e>
|
CC-MAIN-2017-04
|
http://compensation.blr.com/Compensation-news/Benefits-Leave/ERISA/Danger-in-No-Pension-Lots-of-Company-Stock/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00139-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.963485
| 377
| 1.851563
| 2
|
A coalition of activist groups rallied at City Hall Tuesday to outline a list of nine proposals they say the city and state can act on to curb New York's growing homeless crisis.
Homes for Every New Yorker, which includes non-profits like the Metropolitan Council on Housing and the Coalition for the Homeless, released a report that provided Gov. Andrew Cuomo and Mayor Bill de Blasio with a set of recommendations to help the city's less fortunate in the next five years.
There are about 60,000 homeless New Yorkers, including 25,000 children, and that is nearly double the amount in December 2001, according to the city's Department of Homeless Services's NYCStat shelter.
"We need the mayor to do more, and the governor needs to step up," said Patrick Markee, the deputy executive director for advocacy at the Coalition for the Homeless.
The recommendations include setting aside 10% of city assisted housing developments for affordable housing, which would create or preserve 1,000 units a year for homeless families. Another suggestion seeks to devote more NYCHA units to people in the shelter system, which would allocate 2,500 units.
The nonprofits also recommended Cuomo and de Blasio renew the "New York/New York" agreement, which was introduced in 1990, that would create 30,000 units of permanent housing over 10 years.
The coalition said many homeless New Yorkers have jobs but because of the high costs of housing they can't afford any space for their families. Markee said recommendations like a higher minimum wage and improved city and state rental assistance programs would empower those residents.
"If they were earning a $15 an hour minimum wage, many would escape homelessness," he said.
A spokeswoman for the mayor's office noted that the administration has made fighting homelessness a priority and created new programs to curb the problem such as the Living in Communities rental assistance program for families who have been in the shelter the longest.
"It will require the collaborative efforts of the city, state and federal government, along with our community-based partners, to ensure every family has an affordable, safe and decent home," the mayor's office said in a statement.
A spokesman for the governor's office said Cuomo "has made a deep, long-term, and unprecedented commitment to housing affordability in New York" as well as raising the minimum wage. He added the governor has proposed spending $1 billion to produce or preserve over 14,000 units of affordable housing over the next 5 years.
|
<urn:uuid:074cde64-f4fd-4ce6-aad0-79dadffe68c0>
|
CC-MAIN-2016-44
|
http://www.amny.com/news/nyc-homelessness-activists-urge-governor-mayor-to-fight-homelessness-1.10217173
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00416-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.970713
| 498
| 1.953125
| 2
|
Scots don't know alcohol units1st August 2008
A survey has shown many Scottish people do not know safe drinking limits or the amount of alcohol contained in drinks.
Most respondents said alcohol "caused more harm north of the border than heroin or tobacco".
However, fewer than 50% were able to accurately gauge the safe drinking limits recommended, according to the Scottish Social Attitudes Survey.
Alcohol is a factor in the admission of 40,000 people to hospital per year in Scotland. Nearly three-quarters (70%) of assaults are connected to alcohol and it costs the country over £2 billion annually.
The Scottish Centre for Social Research spoke to 1,058 people across the country.
89% of female respondents and 80% of male respondents said heavy drinking was "very" or "fairly likely" to negatively impact health over a long period.
However, only around one third (34%) were aware that men should consume a maximum of three-to-four units of alcohol daily and 41% knew the recommended female limits.
Around 50% could correctly identify how many units were in a pint of beer or a single measure of spirits. Less than a fifth (15%) knew how may were in a bottle of wine.
Scottish Public Health Minister Shona Robison said: "The survey results appear to show many people still don't know how many units of alcohol their pint of beer or glass of wine contains - meaning they could well be drinking above recommended limits."
Share this page
There are no comments for this article, be the first to comment!
Post your comment
Only registered users can comment. Fill in your e-mail address for quick registration.
Title: Scots don't know alcohol units
Author: Jess Laurence
Article Id: 7772
Date Added: 1st Aug 2008
|
<urn:uuid:642b2687-d999-43c3-8f1a-7194556bdb46>
|
CC-MAIN-2017-04
|
http://www.healthcare-today.co.uk/news/scots-dont-know-alcohol-units/7772/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00314-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.967872
| 374
| 2.671875
| 3
|
A. Y. JACKSON b. 1882
Landscape painter, one of the leaders of the Canadian Group who worked under Post-Impressionist and Fauve influence. Born 3 October 1882 at Montreal, Canada. Studied at night school in Montreal under Edmond Dyonnet, and later at the Art Institute of Chicago while working at commercial lithography. First visit to Europe 1905; went to Paris 1907, studied at the Académie Julian under J.-P. Laurens; worked at Etaples, near Moret, with F. J. Porter, and in Assisi. Returned to Montreal 1910 and held first exhibition with Hewton, but this was a failure; settled in Toronto 1913. Served as a Private in France in the 1914–18 war and later as Official War Artist for the Canadian War Records. Member of the Royal Canadian Academy of Arts 1919–32 and original member of the Group of Seven 1920. Has travelled widely throughout Canada. Author of A Painter's Country, Toronto, 1958.
Mary Chamot, Dennis Farr and Martin Butlin, The Modern British Paintings, Drawings and Sculpture, London 1964, I
|
<urn:uuid:05baa95c-72ec-427c-9103-e2cd6f749fdd>
|
CC-MAIN-2016-44
|
http://www.tate.org.uk/art/artists/alexander-young-jackson-1346/text-artist-biography
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00426-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.961741
| 241
| 2.203125
| 2
|
Tobago's economy is tightly linked with Trinidad and is based on liquefied natural gas (LNG); petrochemicals, and steel. The principal economic forces specific to Tobago are tourism and government spending. Conventional beach and water-sports tourism is largely focussed in the south-west around the airport and the coastal strip; however, ecotourism is growing in significance, and much of it is focussed on the large area of protected forest in the centre and north of the main island and on Little Tobago, a small island off the north east tip of the main island.
Tourism is concentrated in the southwest of the island; around Crown Point, Store Bay, Pigeon Point and Buccoo Reef. This area has large expanses of sand and is dominated by low-key resort type developments. Tobago has many idyllic beaches around its coastline, especially those at Castara, Bloody Bay, and Englishman's Bay.
Tobago is linked to the world through the Crown Point International Airport and the Scarborough harbour. Domestic flights connect Tobago with Trinidad, and international flights connect with the Caribbean, USA and Europe. There is also a daily fast ferry service between Port of Spain and Scarborough. The island of Tobago is also thought to be the island that the story Robinson Crusoe was written about. This island was also the filming location for the Walt Disney movie The Swiss Family Robinson.
|
<urn:uuid:f26289e8-2d41-40b9-981c-ef08afdf77a6>
|
CC-MAIN-2022-33
|
http://tobagohoteltourism.com/economy-and-tourism
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00468.warc.gz
|
en
| 0.964915
| 291
| 2.5
| 2
|
LOVE ME MORE: Than these?
Jesus asked, “Simon son of John, do you love me more than these” (John 21:15)? What was it all about? It was about leadership. Jesus was drilling the man who was to lead His disciples. This kind of leader required much more than average love and friendship. Jesus was very deliberate that Peter showed before the others that they could depend on him. Jesus could not depend on Peter, how could the others? Yes, he had denied the Lord, but he also followed and repented. Where were the others? Then, what was hindering Peter from giving Jesus a straight answer when Jesus wanted to know twice whether he loved (agape) Him? Instead, Peter mumbled about being Jesus’ friend (phileo). The third time, Jesus accepted Peter’s offer of being a true friend and capable of leading the small group.
Why did Jesus want more love and friendship from Peter than from the others? Why drill him on love and friendship? In fact, Jesus picked on Peter when he told him that he would be the cornerstone of His Kingdom. When Peter’s ego grew a little, Jesus told him that Satan was nibbling at his ego and that he required prayer. At the last supper, Jesus spoke that someone would betray Him and Peter could not stop bragging about his courage and loyalty. Jesus also told him to secure a sword and who but Peter struck the servant. After all this, Peter did not appear to know what Jesus needed him for. Even after the Resurrection, Jesus had to fetch Peter again from fishing for fish. And when Jesus put Peter in charge, he still competed for Jesus’ affection with John (John 21:21). For Jesus’ Mission to succeed Peter had to have more love and friendship for his Lord than these.
What was it and still is all about? It was a hard lesson on what it meant to be a leader, when what the leader represented was a crime. It was Peter that faced the Sanhedrin and told the Jewish leaders that they had to obey God (Acts 5:29). Peter was also very fortunate to have the disciple whom Jesus loved at His side (John 21:7). We too live at a time when confessing Jesus in public is becoming a crime. How much more love and friendship for Christ shall we need to obey God rather that men? The way the scales are being set to balance against Christ our Lord and Savior is a strong indicator that we have forsaken our first love (Revelation 2:4).
|
<urn:uuid:fcbc09dc-cc25-468a-80fa-a93b4089f5eb>
|
CC-MAIN-2022-33
|
https://stopandthink.kolke.com/2009/04/18/love-me-more-than-these/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00676.warc.gz
|
en
| 0.98654
| 528
| 1.960938
| 2
|
Since 2004, David Weinberg has been collaborating with artist Josiah McElheny on the design of cosmologically inspired sculptures, which represent the history of the expanding universe and the formation of structure within it. In this talk, he will describe these sculptures and the astronomical concepts that underlie them, which include the nature of cosmic expansion, the transition from an opaque universe to a transparent universe, the formation and clustering of galaxies and quasars, the seeding of cosmic structure by primordial fluctuations in the early universe, and the possibility that our observable cosmos is only an "island" in a larger "multiverse." The sculptures that have emerged from this collaboration have been exhibited in galleries and museums across the U.S. and Europe.
All talks are free and refreshments will be served. Visitor parking for the seminars (Central Campus) is across the street from the Dennison Building in the U-M Church Street structure. There is a $2.00 parking charge implemented by U-M Parking Services.
For more information regarding the Saturday Morning Physics series, see the Physics Department website, or call 734.764.4437.
|
<urn:uuid:d504186b-7e0c-42a2-b6db-bdb4d7836d1c>
|
CC-MAIN-2017-04
|
http://lsa.umich.edu/content/michigan-lsa/physics/en/news-events/saturday-morning-physics/past-events/winter-2014/saturday-morning-physics-sculpting-the-universe.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00181-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.930912
| 237
| 1.835938
| 2
|
Yahoo made the web work: by finding interesting things online and breaking them into categories, it was the place most of us started our online adventures.
Now, though, it's a shadow of its former self, and when we search, we Google. So how did Yahoo mess it up?
Of course, Yahoo is still an enormous company, the web's biggest portal and home to all kinds of good services such as Flickr and Yahoo News.
But just look at the numbers. In January 2000, Yahoo shares were nearly $120 each.
Now they're under $15, while Google's are $379. Yahoo is currently worth around $19 billion, compared to nearly $120 billion for Google.
There's no doubt that in search, Google pulled the rug out from under Yahoo. Yahoo was first and foremost a directory, but other search engines offered search rather than browsing - and by the early 2000s, it seemed that search ads, not display ads, would be the next big thing in advertising income.
Recognising this, Yahoo decided to take on Google. It bought search company Inktomi, Google's closest rival, in 2002, and it bought search advertising firm Overture in 2003.
All Yahoo needed to do was to put them together and integrate them with its existing search system. And that's where the wheels came off.
Too little, too late
Integrating Inktomi took some time - it wasn't fully integrated until early 2004 - but that was nothing compared to the problems with Overture. Because Overture was wildly profitable - and because its biggest customer after Yahoo was Microsoft - Yahoo didn't want to mess with it too much, and that led to the ridiculous situation where Yahoo salespeople competed against Yahoo-owned Overture sales people for ad sales.
Project Panama, which would use Overture to make Yahoo's search advertising platform a real rival to Google, wasn't finished until 2007. As Business Week reported in December 2006, with Panama still in development Google was already eclipsing Yahoo's revenues - in the first nine months of 2006 it raked in just over seven billion dollars in ad revenue compared to Yahoo's 4 billion - and while Yahoo was concentrating largely on search ads, its rivals were making cash from other areas such as social networking.
Yahoo, though, was focused on Google - to the point where, according to former Yahoo sales boss Wenda Millard, "Yahoo lost sight of who they are and who their customers are."
Speaking to the DeSilva+Phillips media summit in 2008, she said: "Yahoo's perception is that their only competitor is Google. But 95 percent of their revenue comes from advertising, so their competitors are really in the broadcast TV networks. They think they're in the search game, when they should be in the brand advertising game." It's hard to succeed in business when you don't know what business you're actually in.
Shop till you drop
One key criticism of Yahoo is that it bought companies with the zeal of a Russian billionaire's wife let loose in Harrods - Wikipedia lists 56 acquisitions - without any clear strategy.
When Flickr's Stewart Butterfield resigned in 2008, his amusing resignation letter contained some sharp criticisms of the firm. Butterfield compared Yahoo to a sheet-tin manufacturer that expanded into rubber, computing, real estate, brewing, consumer finance, lighting, salty snacks, hotels, casinos, weapons, ships and oil exploration. "I don't know what you and the other executives have planned for this company, but I know that my ability to contribute has dwindled to near-nothing, and not entirely because of my advancing age," Butterfield wrote.
Greg Sterling is the founder of Sterling Market Intelligence and Contributing Editor at Search Engine Land. "In fairness to Yahoo, some of that stuff was going on at Google and Microsoft, although perhaps to a lesser degree," he says.
"There was a culture a couple of years ago of highly competitive bidding, and nobody really knew what services were going to be necessary or strategic. These companies were essentially trying to outmanoeuvre their competitors and grab the asset, the hot new company or the feature or tool that might turn into something meaningful for users or advertisers.
"I do think Yahoo and some of its competitors were being short-sighted and irrational, and weren't doing acquisitions with a coherent strategy. It was very like real estate speculation, with people bidding irrationally because there was so much competition."
|
<urn:uuid:628e9654-1208-47a3-8f11-26043df87d44>
|
CC-MAIN-2017-04
|
http://www.techradar.com/news/internet/web/where-did-it-all-go-wrong-for-yahoo-595512/1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00036-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.981502
| 912
| 1.585938
| 2
|
05-Apr-2004 -- We were on a 9-day trip to the northern area of the Kingdom. We had already visited four other confluence points. We had travelled in the morning from our great camping spot by Jabal Bird near 27N 39E, to the main north road leading to Taymā' and Tabūk.
After an hour, we reached the ancient town of Taymā' which rose to great prominence as a caravan city and religious centre. It is an old oasis in a well-watered depression surrounded by arid waste in all directions. It contains a variety of archaeological sites dating from prehistoric to the Islamic period. We stopped coming into the city to take photos of the city wall built in the 6th century BC with stones, mud and clay which was up to 10 metres high, 1-2 metres wide and over 10 km long – still in good shape after 2,500 years or so.
There is an excellent museum explaining the history of the area and when it closed at noon, the Saudi assistant then kindly led us up the backstreets to see the old well of Bi'r Haddaj which is one of the most famous wells in the Arabian Peninsula. Nearby is the impressive Amir's fort, which was originally built 300 years ago of stones and mud as a fort, mosque and palace but has been at different times expanded and restored. It was used by government departments until 30 years ago and has some great wooden doors.
We had lunch takeaways from the local Indian restaurants in the local park surrounded by a colourful display of wild flowers and in the shade of Aussie gum trees. Then we refuelled and restocked and left Taymā' continuing north across the barren landscape. When we left the main road to head for the confluence point, we were in the middle of a runway, which is quite unusual as it is the middle of nowhere. The road has painted lines all over the place and is widened to act as an emergency landing strip.
It was only 6.5 km to go in a straight line to the confluence point, but it took a while as we had to circle around big rocky hills to get there. By following the sandy tracks behind the rock jabal we got nearer, but we kept looking at the direct distance to go on the GPS of under 2 km as it was not changing much as we circled around. After a few false attempts, we finally found some faint tracks that led us up to the top of the rocky basalt plateau and slowly we got nearer the point. We had to stop driving with 650 metres to go as it was getting too rough.
It was a pleasant walk over the barren rock with a few small sandy gulleys in between. The confluence point lay in a wider sandy depression with a single gourd plant growing a few metres south where a little water had drained. However, we were a little surprised to see one bedu car track indicating that if we had gone further around the bottom of the plateau we may have been able to drive in. As usual, we marked our success by making a cross from the nearby rocks. We took our various photos including the north view from the ridge above the point with bigger jabals in the distance.
We retraced our way to the main road but made better time as we knew the best route. As we approached the main road, we saw a parked police car in the distance. The police slowly drove up to us probably wondering what we had been doing off road in such a deserted area. But a friendly wave from us satisfied their curiosity and we were on our way north to al-Qalība on the Tabūk road.
Continued at 29N 38E.
|
<urn:uuid:e67e1348-8b06-4584-9d9e-7294f8201e72>
|
CC-MAIN-2017-04
|
http://confluence.org/confluence.php?id=7770
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00312-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.983528
| 764
| 2.0625
| 2
|
Susan Sontag "Unguided Tour," quoted in The Past is a Foreign Country David Lowenthal
I was rereading an article from the April 16th New Yorker about an Amazonian tribe living in virtual isolation for thousands of years. Their language is, in certain respects, bafflingly "simple" and does not seem to adhere to current linguistic paradigms. They have no numbers beyond 2 or 3, no fixed color terms, no abstract ideas, no descriptive clauses, no perfect tense, no deep memory. That's what caught my attention:
Everett pointed to the word xibipío as a clue to how the Pirahã perceive reality solely according to what exists within the boundaries of their direct experience...“When someone walks around a bend in the river, the Pirahã say that the person has not simply gone away but xibipío—‘gone out of experience,’ ” Everett said. “They use the same phrase when a candle flame flickers. The light ‘goes in and out of experience.’ ” ...Everett...called it the “immediacy-of-experience principle.”Essentially, they live eternally in the present. If something goes out of vision, it is out of experience and no longer of concern. This strikes me as humorously appealing only because, well, I need a little of that. It's very self-help and Power of Now, no?
In my endless preparation/procrastination for another post I've been lightly trying my hand at some Nietzsche, The Use and Abuse of History, on recommendation from the frighteningly erudite Dylan Trigg of side effects. Although the reading is for my next post, this seemed particularly apt for me, right now:
The person who cannot set himself down on the crest of the moment, forgetting everything from the past, who is not capable of standing on a single point, like a goddess of victory, without dizziness or fear, will never know what happiness is.The more reading I do, the more my once-discreet ideas on collecting, on the nature of the "museum", and on the past--personal, psychical--are now collapsing inwards and piling up. How ridiculous: to be caught in a stasis formulating ideas about the Past for some time in the future...
The incredible portraits of Pirahã, at top, by Martin Schoeller seemed so 'timeless' they, ironically, reminded me of the inscrutable 2500 year old "archaic smile" of Ancient Greek art (kouros, and a figure from Ephesus)
|
<urn:uuid:58516ec7-0b60-47d8-9974-275881d50394>
|
CC-MAIN-2017-04
|
http://parenthetically.blogspot.com/2007/11/now-and-then.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00128-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.929691
| 551
| 1.726563
| 2
|
If they could bottle youth and sell it we’d all be rich.
How many times have I heard that phrase from a weary mother wrangling her kids. A woman assigning worth to a stage of life by the straw lines around her puckered lips. A man who uses salt and pepper to describe the hair on his head instead of spices he uses to cook.
We’re all a little tired, a little more than spent. Some of us haven’t slept eight hours straight in years. Quiet, stillness, and thinking thoughts to completion is for the bored, not the board room, yes?
Not so much.
See what kind of love the Father has given to us, that we should be called children of God; and so we are. (1 John 3:1a)
It turns out we’re already rich.
Maybe what we need more than the secret for staying young is to accept the gift of Sabbath when life becomes a blur.
How do we rest from adulting? We remember that we are children in God’s capable hands.
Who said you have to fly from a string? You are free, walk around and laugh at convention. Slip off your shoes and feel the grass under your feet. Bend down and hunt for four leaf clover among leaf litter. What is the worst that can possibly happen?
Why is it wrong to nap in the hammock instead of cleaning up the peanut butter and jelly smeared on the kitchen cabinets?
“I don’t do guilt,” I hear my mother-in-law say, so I wrote it down in the first chapter of my book.
Allow the laundry to remain in a heap and your car seats crumby. Look up, notice the elephant cloud floating against a blue canvas.
Does a dragonfly tickle or sting? Show and tell. Let me see your finger.
Cup wind-wings in your hand and protect what God gave you. Cherish, protect, and relish your smallness. Release your gifts instead of holding them captive and what is yours will eventually come back to you.
Corny. Remember how you once used that word to describe the log of yellow kernels on your plastic plate instead of the jokes your boss makes in the break room? Sit on the front stoop, pull husks back and watch silk scatter into the crevices with a gust of wind.
How do you recapture youth when energy is what you buy in a powder to swirl in your orange juice? Allow your standards to collapse and cultivate a Sabbath heart. You are free to fly because you will always be a child in the heart of God.
|
<urn:uuid:ff0bbbe1-b28c-4460-89ea-a585f9aaecc5>
|
CC-MAIN-2022-33
|
https://shellymillerwriter.com/tag/children/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00276.warc.gz
|
en
| 0.951634
| 555
| 1.585938
| 2
|
How much can you make with a part-time job in Germany? Can you earn enough money to sustain yourself as a student? A part-time job is a great way to earn money on the side, whether you are a student or already have a primary job.
The average salary for part-time jobs in Germany is between 9 EUR and 19 EUR per hour, depending on the position, industry, and location. The regulated minimum wage of 10.45 EUR (2022) applies to most part-time jobs, but the pay is higher if the requirements for candidates are higher.
Part-time jobs offer not only flexibility in terms of time but also income. Germany has various types of part-time employment which offer different earning potentials. Find out how much exactly you will earn while working part-time in Germany by using this tool.
Salary for part-time jobs in Germany
The average part-time salary in Germany is 22,856 EUR per year or 11.72 EUR per hour.
The typical hourly wage for part-time jobs in Germany is 12 EUR.
Part-time jobs are widespread in Germany among students and adults, especially working moms and retirees.
Almost everyone can work part-time in Germany regardless of their residence permit. Part-time jobs are common among students, both local and international.
When working part-time in Germany, you can expect a minimum wage (10.45 EUR in 2022) as the minimal salary, but the numbers can be higher. Hence, you can earn more depending on the job and industry.
Jobs in catering usually provide the lowest salary, which is equal to the minimum wage.
You also need to keep in mind the restrictions when it comes to the working hours for international students. They can take up employment only for up to 20 hours per week.
Hence, with the salary of 12 EUR per hour and while working up to 20 hours per week, you can earn:
- 12 EUR*20*4=960 EUR gross per month
Salary for partial employment in Germany
Furthermore, in Germany, you can also work in a good position in a part-time capacity. Many companies allow employees to reduce working hours for better work-life balance or when they have children.
It’s a very common when a woman returns from maternity leave and continues her job just in a part-time capacity.
Since requirements for such jobs are higher and the necessary level of education&experience, the salary is also much higher than typical part-time jobs provide.
Yet, even when taking the salary of an average university graduate in Germany, you still can make a significant living while working a part-time job.
According to the StepStone Salary Report 2021, the average salary of a university graduate is 44,836 EUR in a full-time position.
Assuming you have a job with that pay and want to reduce your hours to 20 per week. How much will you make then?
In that case, partial employment will apply to you. This is how you calculate your hourly and monthly wage.
Hourly wage (gross) = 3 × your monthly full-time wage (gross) ÷ 13 ÷ the number of hours you work per week.
Here is an example of a salary for a partial employment case in Germany:
- Gross annual salary: 44,836 EUR
- Monthly full-time gross salary: 3,736 EUR
- Hours worked per week: 40
- The average number of hours per month = (40 hours per week x 13 weeks) ÷ 3 months = 173.33 hours.
- Hourly gross wage = 3,736 EUR ÷ 173.33 hrs = 21,55 EUR/hr.
So when working a regular full-time job, your hourly wage is 21,55 EUR. So how much will you get when working the same job in a limited capacity, e.g., just 20 hours per week?
- Where the average number of working hours per month is = (20 hours per week x 13 weeks) ÷ 3 months = 86,7 hours
- Gross monthly salary = 21,55 EUR x 86,7 hours = 1,868 EUR
- Gross annual income = 1,868 EUR x 12 months = 22,420 EUR
Therefore, you will be able to earn around 1,868 EUR gross per month when working 20 hours per week job.
Currently, there are over 4,000 open partial employment positions in Germany.
Minimum wage in Germany in 2022
The salary for part-time jobs in Germany is often equal to the current minimum wage. In 2021, these numbers were:
- From January 1 to June 30, 2021, the minimum wage was: 9.50 EUR
- From July 1 to December 31, 2021, the minimum wage is: 9.60 EUR
In 2022, the minimum wage was increased to 10.45 EUR per hour. Furthermore, German lawmakers accepted a new minimum wage for the soon future – 12 EUR per hour.
Hourly wage for part-time jobs
The typical hourly wage for part-time jobs in Germany is 12 EUR. Regular jobs like waiter, courier, cashier, etc., might only pay a minimum hourly wage of 10.45 EUR in 2022.
What is Minijob?
Minijob is limited employment, not in terms of hours but salary. You may earn up to 450 EUR per month or 5,400 EUR per year.
Usually, a regulated minimum wage applies when it comes to hourly pay, which is 10.45 EUR in 2022.
Minijobs are common among students but also pensioners or school students, willing to make some money on the side. In fact, around 6 million people in Germany earn money that way. Also, a classic part-time job is the Minijob.
At that rate, you will you able to work a maximum of around 11 hours per week or roughly 47 hours per month. As a student, you don’t have to pay taxes or social security contributions with that income.
Furthermore, you can work on a minijob and earn more than 450 EUR per month, but the employment time is limited – up to 3 months or 70 working days per year. Many students take this opportunity to earn a good income during the summer holidays.
What is midijob?
More than a minijob, less than full-time – the midijob lies in between. The main difference is that you can earn more money, but you also need to contribute to health, unemployment, and pension insurances in taxes.
One can make between 450 EUR and 1,300 EUR per month in gross salary. Similar to ordinary employees, you are entitled to holidays and sick leave.
Students are only allowed to earn up to 850 EUR per month; otherwise, they will lose their affordable health insurance.
Salary for part-time student jobs in Germany
For part-time student jobs, often minimum hourly wage of 10.45 EUR applies, but rates can also be higher. In higher-skilled student positions, the pay ranges from 11-20 EUR per hour.
Overall, students in Germany earn on average between 9 EUR and 19 EUR per hour. You will get the minimum salary in catering.
The pay largely depends on the students’ skills as well as the industry they are employed in. Some jobs pay higher amounts while others pay less, depending on the regional labor market.
Students working in the IT sector get paid better than average – 15.23 EUR.
In larger German cities, you will have a higher wage than the same job in a smaller German city.
As a working international student, you are subject to the 20-hour rule. Hence, you cannot work more than 20 hours a week.
Can you finance your studies with a part-time job?
Be aware that student jobs in Germany won’t cover all your living expenses but can help you to pay bills. Usually, you want to have around 900-1,000 EUR available each month, where 450 EUR can be earned on a side job.
Therefore, it’s almost impossible for students to finance all their expenses in Germany through part-time jobs.
How many students can earn in Germany?
Students can earn up to 450 EUR per month tax-free. Above that amount, they will need to pay social insurance contributions and, in some cases, income taxes.
The monthly salary you will be able to get will depend on how many hours you plan to work. Germany has implemented some limits there as well.
Germany has different regulations for working as a student depending on your country of origin.
Students from EU countries, Iceland, Liechtenstein, Norway or Switzerland
Students can work as much as they would like; they also don’t need permission. But they must make insurance contributions when working more than 20 hours per week.
Students from non-EU countries
Students from the rest of the world can’t work more than 120 days a year, or 240 half days. They need special permission from the employment agency (Agentur für Arbeit) and the immigration office to increase these limits.
Students from non-EU countries also cannot be self-employed or freelancers.
Furthermore, working too many hours can lead to students losing their health insurance. For instance, if you are insured with TK, you can earn up to 435 EUR per month.
Above that point, you must pay contributions for long-term nursing care and social security. They will significantly add to your total annual bills.
However, EU and non-EU students can take up full-time employment without consequences during semester breaks.
Exception to working hours for students
For research assistants
The 120-day rule doesn’t apply to students who work as student assistants within the university. There are also no restrictions for other university jobs.
Yet, you must inform the immigration office if you want to work more.
You can also work more hours without any consequences if it’s an internship. However, an internship during the semester break will count as regular work.
Therefore, it will be deducted from your 120-day annual work limit. Compulsory internships that are part of your university program don’t count and won’t be deducted from 120 days.
Nonetheless, working more than 20 hours a week is generally not advised. You might lose your focus on your studies and put it at risk.
When do you have to pay taxes as a student?
You can earn up to 450 EUR per month tax-free. But if they regularly make more than 450 EUR, a tax number is required.
This way, a certain amount will be deducted from your wage every month, but you will be able to get it back at the end of the year if you submit a tax return.
Here are the most common types of students jobs in Germany:
Generally, there are five main ways you can work as a student in Germany.
1. Working student
Working students work for the company in a field related to their studies. It’s by far the best way to earn money while studying at university.
Not only will you be able to learn more about your future profession and apply the knowledge, but also earn a better wage.
Yet, you will also have a chance to get hired for a full-time position by this company after graduation.
An example would be a mechanical engineering student working in a manufacturing company in a position related to their studies.
2. Minijob or classic part-time job
Such jobs are often in the service industry or other low-skill areas. With the minijob, you may earn up to 450 EUR per month. The main advantage of minijob is that you don’t have to pay taxes or social security contributions.
Midijob gives you a higher income than minijob, but less than full-time. With the midijob, you can earn between 450 EUR and 1,300 EUR and will need to pay taxes or social security contributions.
However, you can enjoy entitled holidays, paid sick leave, and other perks.
As an EU student, you have the freedom of becoming self-employed or working as a freelancer in Germany. Hence, you can utilize your skills and bill your clients directly.
As a non-EU student, you will need to get permission from the immigration office to become self-employed in Germany. However, in many cases, this option isn’t available for international students.
An internship is another great way to earn money as a student in Germany.
Various internship types are available, including compulsory, voluntary, and internships abroad.
A compulsory internship is a part of your studies and is required for graduation. Keep in mind that employers aren’t obliged to pay a minimum wage for mandatory internships in Germany.
So you might earn nothing or very little. They also often don’t last more than 3 months.
Voluntary internships are always paid and usually last longer.
Common part-time student jobs in Germany
- Jobs at university:
- Library supervisor
- Literature researcher
- Tutorial assistant
- Off-campus jobs:
- Filing office documents
- Call center agent
- Production workers
Check out which jobs are in high-demand in Germany so that you will have a 100% chance of success.
Recommended products and services in Germany:
- Health insurance for students
- Health insurance for expats, employees, self-employed and freelancers
- Best international health insurance
- Liability insurance
- Car insurance or find one here
- Best free credit card
- Best free bank account
- Compare providers and rates for various insurances, sim cards, internet, electricity, banking accounts, credits & loans, and more.
- Loan with minimal requirements
- Compare loans
- Best price & value sim card and best deal overall including high-speed internet
- Learn German on the best online platform
This post contains affiliate links. The affiliate link means we may earn an advertising/referral fee if you make a purchase through our link, without extra cost to you. It helps to keep this blog afloat. Thanks for your support.
Vienna is the largest city in Austria, the 7th-largest city by population in the EU, and is ranked as the city with the best quality of life in the world. However, when it comes to getting a job,...
In Germany, you often will come across the Gebührenfrei Mastercard credit card, also known as Advanzia Mastercard Gold. This credit card is a perfect solution for most people in Germany, and it's...
|
<urn:uuid:5a262724-d533-452e-a32c-511a84b74f2f>
|
CC-MAIN-2022-33
|
https://russianvagabond.com/average-salary-for-part-time-jobs-in-germany/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00665.warc.gz
|
en
| 0.951614
| 3,098
| 2.125
| 2
|
Project Risk Management is a practical and concise book that outlines a tried and tested approach that has been used successfully on a number of large projects.
A project is never without risks. An unforeseen problem or requirement can delay the whole process, causing havoc for everyone involved.
Risk management is a structured form of risk control that unearths possible bottlenecks early and thus ensures that a project is both better managed and controlled.
Project Risk Management is a practical and concise book that outlines a tried and tested approach that has been used successfully on a number of large projects. The book is broken down into two parts:
Section 1 explores risk analysis and how to control risk;
Section 2 looks at putting these ideas into practice and how risk management can be implemented in different types of project and at different stages;
The book is written by experienced project risk managers and includes detailed case studies (including Euro 2000) which are used to illustrate the theory.
Daniella van Well-Stam has worked in risk analysis and risk management at Twynstra Gudde since 1995. She specializes in risk management primarily on infrastructure projects.
Fianne Lindenaar has worked as a risk analysis specialist since 1997 and at the RISMAN Project Bureau since 1999.
Suzanne van Kinderen is a project management consultant who specialises in risk management on infrastructure and industrial projects.
Bouke van den Bunt has worked in building services at the Dutch Ministry of Public Works in the field of risk analysis and risk management. He has been the Director of the RISMAN Project Bureau since 2000.
|
<urn:uuid:a82a2b19-24bb-40f2-94a7-038e5a0bf6b1>
|
CC-MAIN-2016-44
|
https://www.koganpage.com/product/project-risk-management-9780749442750
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721405.66/warc/CC-MAIN-20161020183841-00314-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.952537
| 322
| 2.34375
| 2
|
The Flying Saucers was an attraction in Disneyland that ran from 1961 to 1966. The attraction was located in Tomorrowland . In 2010 it was confirmed the attraction would be revived as Luigi's Flying Tires in Disney California Adventure opening in 2012.
Guests rode in personal flying saucers on a cushion of air, similar to an air hockey game, which played in a way similar to bumper cars, with guests ramming each other with their saucers.
The "table" was a large metal floor. As the ride began, large round plates would lower, and air would blast from underneath the table, pushing each saucer upward so that it was floating just above the table. Guests would control the saucers by shifting their weight from side to side.
The ride was expensive to operate, maintenance was intensive, and it did not fit the normal Disneyland "guest flow"—a relatively small number of riders was able to participate in any given day. The Flying Saucers did not survive the transition to New Tomorrowland. When New Tomorrowland opened in 1967, the space that this ride occupied was turned into the Tomorrowland Stage.
|
<urn:uuid:e8eb056d-ab85-4738-bf41-85a755361835>
|
CC-MAIN-2017-04
|
http://disney.wikia.com/wiki/Flying_Saucers
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00291-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.985953
| 231
| 1.765625
| 2
|
Rabies is a viral disease that specifically affects a cat’s central nervous system (CNS). The primary way the rabies virus is transmitted to cats in the United States is through a bite from a disease carrier: foxes, raccoons, skunks, and bats. Infectious virus particles are retained in a rabid animal’s salivary glands to better disseminate the virus through their saliva.
Once the virus enters the cat’s body, it replicates in the cells of the muscles and then spreads to the closest nerve fibers, including all peripheral, sensory and motor nerves, traveling from there to the CNS via fluid within the nerves. The incubation of rabies is, on average, between one and three months, but can be as little as a day and up to a year. Once the symptoms have begun, the virus progresses rapidly.
If you would like to learn more about how this disease affects dogs, please visit this page in the mydomain.com health library.
Can Humans Get Rabies, and Can You Get Rabies from a Cat Scratch?
This severe, and often fatal, viral polioencephalitis also has zoonotic characteristics, and can therefore be transmitted to humans. Rabies is usually transmitted through the saliva of an infected animal and is most commonly spread through bites. It is still possible to get rabies from a cat scratch or a scratch from any infected animal, but it is less common. Some other less common methods of transmission are open wounds or mucous membranes that come in contact with infected saliva.
Symptoms and Types of Rabies in Cats
There are two forms of rabies: paralytic and furious. In the early symptom (prodomal) stage of rabies infection, the cat will show only mild signs of CNS abnormalities. This stage will last from one to three days. Most cats will then progress to either the furious stage, the paralytic stage, or a combination of the two, while others succumb to the infection without displaying any major symptoms.
Furious rabies is characterized by extreme behavioral changes, including overt aggression and attack behavior. Paralytic rabies, also referred to as dumb rabies, is characterized by weakness and loss of coordination in the cat, followed by paralysis.
This is a fast-moving virus. If it is not treated soon after the symptoms have begun, the prognosis is poor. Therefore, if your cat has been in a fight with another animal, or has been bitten or scratched by another animal, or if you have any reason to suspect that your pet has come into contact with a rabid animal (even if your pet has been vaccinated against the virus), you must take your cat to a veterinarian for preventive care immediately.
The following are some other symptoms to watch for in your cat:
- Jaw is dropped
- Inability to swallow
- Muscular lack of coordination
- Unusual shyness or aggression
- Excessive excitability
- Constant irritability/changes in attitude and behavior
- Paralysis in the mandible and larynx
- Excessive, dripping salivation (hypersalivation), or frothy saliva
Causes of Rabies in Cats
The rabies virus is a single-stranded RNA virus of the genus Lyssavirus, which is in the family Rhabdoviridae. It is transmitted through the exchange of blood or saliva from an infected animal, and very rarely through breathing in the escaping gases from decomposing animal carcasses. Contracting the virus in this way is rare but it can occur, often in caves with a large population of bats, where the virus is widespread.
Diagnosing Rabies in Cats
If you suspect your cat has rabies, call your veterinarian immediately. If it is safe to do so, cage, or otherwise subdue your cat, and take it to a veterinarian to be quarantined. If your pet is behaving viciously, or is trying to attack, and you feel you are at risk of being bitten or scratched, you must contact animal control to catch your cat for you.
Your veterinarian will keep your cat quarantined in a locked cage for 10 days. This is the only acceptable method for confirming suspected rabies infection.
Rabies is diagnosed by testing fluids of the brain, skin, saliva and urine of an animal, not its blood serum.
Diagnosis in the U.S. is done using a post-mortem direct fluorescence antibody test performed by a state-approved laboratory for rabies diagnosis. Your veterinarian will collect fluid samples if your cat dies while in quarantine, or if it begins showing progressive signs of rabies; in which case, your veterinarian will opt to put your cat to sleep (or euthanize it).
Treatment for Rabies in Cats
If your cat has been vaccinated against rabies, provide proof of vaccination to your veterinarian. If anyone came into contact with the cat’s saliva, or were bitten by your cat (yourself included), advise them to contact a physician immediately for treatment. Unfortunately, rabies is always fatal for unvaccinated animals, usually occurring within 7 to 10 days from when the initial symptoms began.
If a diagnosis of rabies is confirmed you will need to report the case to your local health department. An unvaccinated cat that is bitten or exposed to a known rabid animal must be quarantined for up to six months, or according to local and state regulations. A vaccinated animal that has bitten or scratched a human, conversely, should be quarantined and monitored for 10 days.
Living and Management
Disinfect any area the animal might have infected (especially with saliva) using a 1:32 dilution (4 ounces to a gallon) of household bleach solution to quickly inactivate the virus. Do not allow yourself to come into contact with your cat’s saliva.
If your cat has swallowed an object, do not reach into its mouth without taking precautions. Saliva can enter into your skin through an accidental scratch, putting you at risk of contracting the virus.
Copyright @ 2020 mydomain.com.
|
<urn:uuid:cbeba08b-97c4-4ae8-8c9a-d63bb71399e6>
|
CC-MAIN-2022-33
|
https://theopenshops.com/2021/06/10/rabies-in-cats/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00068.warc.gz
|
en
| 0.943558
| 1,275
| 3.8125
| 4
|
Foster roundabout will prevent accidents
I am one of the many residents who refused to sign a petition to halt the installation of a roundabout in Foster Village
. Fortunately, the city administration agreed with us and built it last month.
A few years ago, a boy was struck in the crosswalk at that intersection by a car driven by a woman checking her make-up in the mirror. Fortunately, he wasn't killed. He sustained a broken leg, not to mention psychological trauma. I believe a roundabout would have prevented this accident. A stop sign would have been inadequate.
Yes, the roundabout is inconvenient for motorists who are in a hurry. And, yes, it is not very pretty. But,think of that little boy who was injured by a negligent driver. If the roundabout prevents future accidents, then it will be well worth the cost.
Glenda Chung Hinchey
Some speed limits need to be raised
Can anyone come up with logical answers to these questions? Why is the speed limit on the H-1/ Moanalua Freeway through the heart of Honolulu, Red Hill to Kahala, with a short exception around University Avenue, set at 50 mph while the speed limit on the Likelike and Pali Highways is set at 45 mph? H-1/Moanalua is generally three or more lanes in each direction with heavy, congested traffic nearly around the clock and frequent onramps and offramps. Likelike and Pali, on the other hand, are two lanes in each direction, traffic is generally light except during rush hours and there are hardly any access or exit locations.
H-1 has a 45 mph speed limit around University Avenue, which might be because of the idiotic design of the access ramps along with heavy traffic. Why, then, isn't the speed limit at the merge of H-1 and Moanalua, which is exceptionally dangerous, also set at 45 instead of 50?
But then, I guess it doesn't really matter. On my midmorning check run on Oct. 17, virtually everyone on all of the roads I have mentioned was driving 10 to 15 mph over the posted speed limits. While I didn't see our Honolulu Police Department boys in blue on this trip, it is my usual experience that they are right there with the crowd ignoring the posted speed limits.
Yes, I know there are accidents along all of these roads, and speeding might be a factor in some of them. I am talking here of common, everyday speeding, not the extreme racing that has occasionally killed both participants and innocent victims. Most often some other stupid move by someone involved is the main cause of the accident. Vehicles involved in such accidents must be a very small percentage of all vehicles using these roads.
James V. Pollock
Letter about Cheney didn't include all facts
The Oct. 15 letter
"Politics a lucrative business for some" tries to mislead readers in characteristic leftist style. The author cites that Vice President Dick Cheney's stock option in Halliburton has risen since he has been VP as if to try to convince readers he is creating jobs for Halliburton so he can make more money for himself.
The letter writer does not include the fact that Cheney pledged to give all proceeds from his stock to charity a long time ago. His stock can go up 1,000 percent and it wouldn't bring Cheney anything besides higher taxes.
Misleading people is a great way to make your entire argument irrelevant.
Tunnel has Ewa residents' support
I thank Garry Smith for publicizing the effort and option to build a tunnel at the Pearl Harbor entrance ("Ewa road-widening seems never ending," Letters, Oct. 6
Many Ewa residents expressed their support for a Pearl Harbor tunnel at a recent meeting where transportation solutions were discussed. It is an old idea with renewed attention because of the increased traffic congestion in West Oahu.
If we are able to build a tunnel, it will be a tremendous effort which will save drive time. If it is not built, at least we can say we tried. Other options, such as a rail system, more job creation in West Oahu and a bridge over Pearl Harbor are being pursued aggressively.
Regarding the Fort Weaver Road widening, Smith must have forgotten that it is the Lingle administration and state Department of Transportation who are responsible for widening the road. The Legislature did its part in appropriating funds. The Department of Transportation must now take responsibility to make certain the project is built without further delays. Director Haraga and Gov. Lingle, are you listening?
Sen. Will Espero
Ewa Beach-Lower Waipahu
Growing vines might discourage graffiti
Auwe! To those "artists" who want to share their work on other people's property. The most obvious is the brand-new wall that lines the Aiea/Pearl City H-1 freeway lane expansion. On Wednesday there already was a new piece of artwork next to the Kaahumanu overpass.
Hopefully there is some plan in place to prevent future displays to take place. However, as the contractors finish up and no longer work night shifts, there will be others hiding in the dark, taking their place doing their own "work."
Millions have been spent to build the lane. Could a little be spared to prevent what will be a problem for years to come? Grow some vines or bushes along the wall line. I don't think most artists will want to take up pruning as a second job so they can express their creativity.
If not, we'll have to live with their contribution eyesores over and over while doing more work to fix theirs.
Military personnel should live on base
In "Key to rental crisis is all in the Ohana" (Letters, Oct. 19
), Alan Ewell writes, "The easiest and most cost-effective option, however, is never raised: revise our Ohana Housing Ordinance to allow more rental units in existing neighborhoods."
I'd like to offer another solution. Get the military out of our affordable housing. Set a deadline where the majority of the military personnel will be required to live on military-held lands, in housing built and provided by our government.
If the military personnel who are currently being subsidized to live off base were eventually required to live in on-base housing, I believe this would free up a substantial number of middle- to lower-income housing, islandwide.
Let's face it, the military is holding a lot of land on this island, and some of this land could be put to desperately needed, good use. Military personnel are currently taking a lot of affordable rentals out of the civilian housing market.
The sooner the government gets moving by building/providing additional housing, the better for the civilian of the residents of Oahu that have been displaced by these renters for decades.
Sports mag readers have their rules, too
Ronald Reagan gave the world a fitting statement when he officially welcomed Sandra Day O'Connor "to take her place in history," as the first woman ever to sit on the Supreme Court. That is the same feeling I had when I watched along with the thousands, maybe the whole state of Hawaii, as Michelle Wie rightfully was taking her place in golf history as one of the youngest female golfers to turn pro and placing a respectable fourth in her debut rounds, at the SamSung World Championships.
Boy, weren't we all so proud of her? Then to be disqualified by a rules infraction. I agree the rules are the rules, and it is forgivable that Michelle thought she had done the correct thing in the ball drop, but to have a senior writer with Sports Illustrated, Michael Bamberger, wait so long to challenge her drop to officials is unforgivable.
Bamberger, instead of creating a stir and heartache for all, could have spoken sooner, and her card could have been correctly marked before she signed it. The rules are the rules, or doesn't that sell magazines? Don't worry, I will never buy another Sports Illustrated magazine, not even the swimsuit edition, and that is the rule to me.
Laughlin M. Tanaka
|
<urn:uuid:cbcd6867-a98e-404e-8084-a0f975b91861>
|
CC-MAIN-2017-04
|
http://archives.starbulletin.com/2005/10/21/editorial/letters.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00129-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.968483
| 1,682
| 1.523438
| 2
|
Presentation #102.293 in the session Poster Session.
The Transiting Exoplanet Survey Satellite (TESS) has given us extraordinary access to measure the physical sizes of some of the nearest exoplanets to the Sun. With careful and intensive radial-velocity follow-up campaigns, precise masses and densities for these planets can be measured, allowing a detailed study of planet formation and evolution to be performed. Worlds at the extremum of the distribution can allow an unprecedented window into the nature of planets, providing benchmark systems that can be used to better understand the underlying formation and evolutionary processes at play. Here we discuss our program to confirm some of the most extreme planetary systems, those worlds that are in and around the Neptune desert region. Our overall goal is to further study these confirmed systems photometrically and spectroscopically using instruments in Chile and in space, in order to probe planetary physics in a very detailed way. Part one of our TESS follow-up program primarily makes use of the Chiron, FEROS, and HARPS instruments to confirm the transiting planet candidates, whilst simultaneously measuring their masses and densities. Below we highlight a few of our most interesting systems, including the discovery and subsequent atmospheric investigation of the first ultrahot Neptune, LTT9779b, along with some of the shortest period planets that exist around the Neptune desert. These latest discoveries promise to allow detailed studies of the physical processes that drive this part of the planetary parameter space.
|
<urn:uuid:f146441a-9065-4354-9cb2-ba9d8ac1295f>
|
CC-MAIN-2022-33
|
https://baas.aas.org/pub/2022n5i102p293/release/1?readingCollection=b328d6e0
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00476.warc.gz
|
en
| 0.914893
| 300
| 2.65625
| 3
|
Detection of a gross or very large leak in the Evaporative Emission System.
What P0455 really means
The Evaporative Emission System is designed to prevent gasoline vapors from escaping into the atmosphere, and is built around a series of valves, rubber hoses, and a charcoal canister meant to collect vapors as they build up. These vapors are then systematically sent to the engine to be burned off. The computer regularly checks for leaks within this system, either by pumping in air, or by pulling a vacuum, and measuring the time it takes to reach a certain level. When a leak is detected the computer will command the check engine light on and set a P0440, which designates a problem in the system, and another code, such as P0455, to describe the size of leak.
What causes a P0455 code?
These are not very size-able leaks, even though the language suggests otherwise. The computer will turn on the check engine light for a leak as little as .020”, and will set the P0455 for anything.040” or greater. Remember that most of this system sits underneath the car commonly next to the gas tank, so it is exposed to the elements, especially the road grime and wetness that gets kicked up by the tires. The rubber hose will dry up and crack over time creating these small leaks, sand and moisture will get into the system and either rust up or jam the valves, and the gas tank and in particular the filler neck will just plain rust for ones made out of metal. These leaks will happen and it’s not your fault.
What is the severity of a P0455 code?
Minor (unless the car is noticeably running poorly). In other words there is no immediate reason the car will break down and leave you stranded.
What repair(s) are needed to resolve a P0455 code?
The gross leak P0455 is much easier to diagnose than smaller leaks in the system, so in some cases the diagnosis will be not be as long or costly. Outside of the gas cap not being on, the most common headaches here are the valves that open and close (they get stuck), the charcoal canister (gets a size-able crack), or the filler neck (rusts through).
What will it cost to resolve a P0445 code?
- Estimated diagnostic cost: $100
- Estimated part(s) + labor cost: $25–$600 (depending on diagnosis)
Most shops will charge a diagnostic fee, usually around $100. Unlike smaller leaks, which can require more diagnosing, a gross leak is usually found quickly. Because these leaks go beyond small pin holes in rubber hoses, repairs can get costly. A missing gas cap might cost you $25. But to change a vent valve or purge valve, the price can run around $200–$300, depending on parts availability. A charcoal canister repair will run $400–$600, depending on where it is located. The cost to replace a filler neck can run from $300–$400.
Keep in mind, pricing will vary by location and your vehicle make and model. Save time and money by using Openbay to compare pricing and book an appointment with a service center in your area.
Service article written by an ASE Master Technician
|
<urn:uuid:4992baa5-52b2-40fe-914c-6195c18c8667>
|
CC-MAIN-2022-33
|
https://articles.openbay.com/p0455/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00072.warc.gz
|
en
| 0.926881
| 695
| 2.296875
| 2
|
TRADELABOR has more than 20 years of experience in the control and treatment of air, working with an experienced and qualified technical staff and with the most advanced technology in this area, which together guarantee the quality of the services provided.
Parts of Lung Affected by Pleural Mesothelioma
What Is Pleural Mesothelioma?
Pleural mesothelioma is a type of cancer caused by asbestos fibers becoming embedded in the lining of the lungs. Over time, the fibers may cause inflammation and scarring. As the scarring worsens, it may develop into mesothelioma tumors.
- Pleural malignant mesothelioma is the most common form of mesothelioma cancer.
- Each year, about 2,500 people are diagnosed with the disease.
- Symptoms of the cancer commonly include shortness of breath, chest pain, dry cough and fatigue.
- Diagnosis typically consists of multiple tests, including scans and biopsies.
- Pleural mesothelioma is often treated with chemotherapy, surgery, radiation therapy and immunotherapy.
- A patient’s prognosis will vary depending on their individual case, with an average life expectancy of six to twelve months.
What Is the Prognosis for Pleural Mesothelioma?
As with all types of malignant mesothelioma, prognosis for pleural malignant mesothelioma is poor. For patients who do not receive treatment, the median survival time is six months. However, certain types of treatment can improve life expectancy, such as surgery combined with chemotherapy.
|Pleural Mesothelioma Survival Rates|
|1 year after diagnosis||73%|
|3 years after diagnosis||23%|
|5 years after diagnosis||12%|
|10 years after diagnosis||4.7%|
The most important factors affecting the prognosis of pleural malignant mesothelioma patients are:
Most pleural mesothelioma patients are diagnosed with the epithelioid cell type, which is the most common. Epithelioid cells typically form in solid sheets or cord arrangements, meaning they adhere closely together and don’t metastasize as quickly. They are also the most responsive to treatment. Typically, pleural mesothelioma patients with the epithelioid cell type survive 19 months.
The other cell types, sarcomatoid and biphasic, are less common and indicate a worse prognosis than epithelioid. Sarcomatoid mesothelioma doesn’t respond well to treatment and metastasizes aggressively, leaving patients with an average prognosis of 8 – 10 months.
Patients with biphasic pleural mesothelioma experience an intermediate life expectancy, depending on whether epithelioid or sarcomatoid cells are more dominant.
According to recent data, within the last decade, malignant pleural mesothelioma patients have been surviving longer overall as available treatments and diagnostic methods improve. Some patients are now becoming long-term survivors. Heather Von St. James was diagnosed with pleural mesothelioma in 2005 with an initial prognosis of 15 months. Following her treatment, she is now a survivor of more than a decade.
What Are the Symptoms of Pleural Mesothelioma?
After asbestos exposure, it can take 10 to 50 years for pleural mesothelioma symptoms to present. Symptoms typically first present in the chest cavity and respiratory system.
As the disease becomes more advanced, new and worsening symptoms may arise. For instance, stage 4 pleural mesothelioma symptoms may include coughing up blood and difficulty swallowing.
Pleural malignant mesothelioma patients may be diagnosed with a co-occurring asbestos-related condition, which can impact symptom onset. These include:
- Pleural plaques – Chalky substance that forms on the pleura due to a buildup of minerals, known as calcification
- Diffuse pleural thickening (DPT) – Gray, fibrous tissue that fills in pleural spaces
- Asbestosis – Scarring of the lungs (fibrosis)
These conditions may also develop independently of pleural mesothelioma.
Continue at: https://www.mesothelioma.com/mesothelioma/types/pleural/
The text above is owned by the site above referred.
Here is only a small part of the article, for more please follow the link
|
<urn:uuid:925f307a-b1b1-48f3-9e17-2b0193a32222>
|
CC-MAIN-2022-33
|
https://manoxblog.com/2020/10/04/pleural-mesothelioma/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00675.warc.gz
|
en
| 0.910858
| 977
| 2.515625
| 3
|
One of the hottest topics in the tech world, the metaverse seems to have one part of the world wondering what it is, another participating or helping create it, and another group that’s exploring its business implications. With the recent controversial renaming of one social media tech giant, along with other players in the space ramping up metaverse divisions, including video game producers, it seems that the metaverse is here to stay.
In this five-part blog series, we’ll define the metaverse, dive into related topics including augmented reality (AR), crypto, and explore the role of AI in the metaverse experience. While the future of the metaverse is still uncertain, we’ll look at what it might look like including its business implications.
We’ll cover in this initial blog:
- What’s the metaverse?
- What will the near future look like for mixed reality?
- How can enterprises prepare for the metaverse?
- What we’ll cover in the rest of the series
What is the Metaverse?
The metaverse is physical reality merged with the digital universe. It includes shared virtual 3D worlds that are interactive, immersive, and collaborative. What does that exactly mean? While the idea of one single metaverse is still an evolving one and isn’t real yet, we can envision it as layering the digital world on top of the physical world.
For instance, imagine walking outside in the real world and still interacting with the digital world through smart phones or other devices. PokemonGo is just one example of this, though now we also have virtual worlds, browser-based experiences, and various gaming examples.
The space is highly decentralized with multiple avenues and platforms that fit under a broader bucket called “the metaverse.” The following diagram highlights the complexity of the space:
While the metaverse is still an evolving concept, developers of the technology to support it have hinted at what a more mature version of the space will look like in the next few years.
What will the near future look like for mixed reality?
The Facebook name change to Meta still has everyone talking about the metaverse. Signaling a reprioritization of resources towards the metaverse, Meta wants to create immersive, virtual versions of the things we do every day, from working in an office and socializing after hours to shopping on the weekends and traveling for vacation.
Other companies are eyeing the potential. Tim Sweeny, the CEO of Epic, creator of the widely popular video game Fortnite that’s evolved into an even bigger social media platform than the mainstay brands, said the metaverse is a multi-trillion-dollar opportunity. Sweeny believes that the internet is broken and envisions the metaverse as a seamless experience that’ll fix it.
From playing a game with friends to test driving a new car in virtual reality, we can expect our movement in the digital realm to become even more borderless. As a result, advertising, among other revenue-generating efforts, will change to become more than the media we are accustomed to today. And it’s going to be an experience one can reach from anywhere.
How can enterprises prepare for the metaverse?
The businesses that become and remain customer-focused will win in the metaverse. The most attractive aspect of the metaverse is that it decentralizes everything, empowering users with the freedom to create, explore, and engage. As a result, it’s a boon to businesses that have long relied on intermediaries. The metaverse will break down barriers and give them direct access to consumers.
For B2B, it’s a bit different. In one way, enterprises will most likely not have the full capability to capitalize on the opportunity. To compete, they’ll need to account for certain aspects of the metaverse, from NFTs and cryptocurrency to synthetic voice, hyperreal avatars, and content creation. Partnerships and acquisitions will become necessary for those who do not want to miss out on the opportunity.
One of the most significant issues with enterprises operating in a blended physical and digital reality is the added complexity it fosters with data. Managing the assets people interact with and its associated data will be crucial to understanding engagement and offering the best experience possible. Artificial intelligence can help solve this complexity, acting as the primary mechanism to make the metaverse manageable, measurable, and ethical.
What we’ll cover in the rest of the series
The metaverse will comprise many emerging and evolving technologies that are still new to the world. In this series, we’ll dive into these different technologies and more.
Immersive and Augmented Reality in the Metaverse
What does an immersive experience look like, and how will it become a staple of future entertainment? We’ll look at some examples.
Cryptocurrencies and NFTs will serve an essential role in the metaverse for transactional engagements and protecting unique IP beyond the lifespan of a brand.
Artificial intelligence will help act as the glue that enables the integration between the physical and digital worlds in various ways. Come find out some of the use cases for AI in the metaverse.
Metaverse Personas–Get Ready to Meet Your Virtual Self
We’ll define metaverse personas, their implications, the role they will play in the metaverse, and how AI can enable more of these immersive experiences.
Metaverse Roadmap: What the Future Holds (coming soon)
We’ll explore where the metaverse is headed, detail Veritone’s vision for the future of the metaverse, and introduce some of the tools that can make it all possible.
|
<urn:uuid:3951e5c3-7928-4709-a4cf-3919971675e9>
|
CC-MAIN-2022-33
|
https://www.veritone.com/blog/the-metaverse-everything-you-need-to-know/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00266.warc.gz
|
en
| 0.9268
| 1,181
| 2.46875
| 2
|
Signs are an integral part of the graphic urban landscape. Signs are multi-functional, an essential means to relaying information, instructions, identity; they are the visual medium used to map our public space. The sign design projects in this book have been collected from around the world and will provide a valuable resource for professional graphic designers, town planners, architects and facility managers.
Number Of Pages: 480
Published: 1st July 2014
Publisher: Artpower International
Country of Publication: HK
Dimensions (cm): 28.5 x 21.5 x 5.8
Weight (kg): 3.31
|
<urn:uuid:17011272-6a04-49b8-8f24-a65e89e06623>
|
CC-MAIN-2017-04
|
http://www.booktopia.com.au/way-of-the-sign-artpower/prod9789881261656.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00065-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.858786
| 125
| 1.632813
| 2
|
Tai Chi Ch’uan and Qigong for strength, peace and balance.
Contact firstname.lastname@example.org with questions.
Tai Chi Ch’uan and Qigong
Tai Chi Ch’uan is a mind-body exercise, also known as meditation in motion. It is a gentle way of moving to connect with nature, your inner and external self all while gaining strength and flexibility.
These practices are ancient – some dating back to 4,000 years ago. Millions of people in the world practice to gain strength, peace and improve their balance.
However, modern non-advocate clinical research continues to prove the regular practice of Tai Chi and Qigong can provide more benefits. Some notable studies have shown the improvement of symptoms of PTSD and Parkinsons Disease. Many have experienced better pain management, physical and emotional support for recovery from major and minor surgeries.
The list goes on…
Whatever your needs, interests or skill levels are, it is my (Amy Alderman’s) overall goal to help you gain practices to integrate into your daily life – not just in class – to help make a difference to you, and thus the world around you.
Tuesdays and Thursdays, 5 p.m.
Join via Zoom and in person at Body & Soul, 2728 Asbury Road in Dubuque, Iowa
Tuesdays: Free classes for veterans and their loved ones
**Free seated tai chi classes for veterans and their loved ones are also available on Tuesday mornings at 8 a.m. at the Veterans Freedom Center in Dubuque, Iowa.
Please contact Amy at email@example.com if you have questions.
|
<urn:uuid:ca6e1a67-90e4-4639-b870-9646d917b94a>
|
CC-MAIN-2022-33
|
https://aitaichi.org/classes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00066.warc.gz
|
en
| 0.932268
| 353
| 1.5
| 2
|
In this final set of posts, we will look at some other aspects of F# under the theme of “completeness”.
Programming languages coming from the academic world tend to focus on elegance and purity over real-world usefulness, while more mainstream business languages such as C# and Java are valued precisely because they are pragmatic; they can work in a wide array of situations and have extensive tools and libraries to meet almost every need. In other words, to be useful in the enterprise, a language needs to be complete, not just well-designed.
F# is unusual in that it successfully bridges both worlds. Although all the examples so far have focused on F# as an elegant functional language, it does support an object-oriented paradigm as well, and can integrate easily with other .NET languages and tools. As a result, F# is not a isolated island, but benefits from being part of the whole .NET ecosystem.
The other aspects that make F# “complete” are being an official .NET language (with all the support and documentation that that entails) and being designed to work in Visual Studio (which provides a nice editor with IntelliSense support, a debugger, and so on). These benefits should be obvious and won’t be discussed here.
So, in this last section, we’ll focus on two particular areas:
|
<urn:uuid:d9a16f0f-ac21-4e89-87c0-d058738ef84a>
|
CC-MAIN-2017-04
|
http://fsharpforfunandprofit.com/posts/completeness-intro/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00254-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.951089
| 282
| 2.125
| 2
|
Most of the time we're willing to shovel down the popcorn and watch Yoda lift X-Wings out of the swamp using nothing but the Force and a smattering of questionably parsed English, or let Jean-Luc Picard get the Enterprise out of a scrape by the convenient discovery of yet another type of particle beam. But every once in a while we just have to vent about some of the truly egregious "fiction" in science fiction. [via neatoroma]
1. Sounds in Space
The tag line from Alien got it right: "In Space, no one can hear you scream". The reason no one can hear you scream is that sound needs air to travel in, and there's none in space.
Most of space is a hard vacuum, with a molecule or two of hydrogen floating around in every cubic meter - not nearly enough to transmit sound. Every sound in the movies, from photon torpedoes and laser beams to exploding starships and hyperspace booms, would never happen in real life.
For that matter, you'd never see laser beams in space either, since in a vacuum there's no medium to reveal them. So a real-life laser dog fight in space would be really boring to watch.
2. Faster-Than-Light Travel
Warp drives and hyperspace are very useful in science fiction, but there's one catch. According to Einstein, the speed of light isn't just a good idea, it's the law. Nothing can go faster than the speed of light in a vacuum (that's about 186,000 miles per second).
Even inching toward the speed of light is difficult - immense energy is required to get to even a fraction of the speed of light, and the closer you get to the speed of light, the more energy is required. The amount of energy you'd need to achieve the speed of light is infinite (i.e., more than you've got, even with those supercool long-lasting batteries). So just tossing in a few more dilithium crystals into the warp drives isn't going to make it happen.
There are loopholes in our understanding of the physics that make faster-than-light travel theoretically possible. For example, it's theoretically possible to create a "bubble" of space that breaks itself off from other space and moves faster than light relative to that space (all the while everything inside both "spaces" moves no faster than the speed of light). This is known as an Alcubierre Warp Bubble. The catch (there had to be one) is that these bubbles require the existence of exotic matter that has negative energy, and wouldn't you know, there isn't really any lying around, and it's not clear that any actually exists.
3. Laser Bolts You Can Dodge
Aside from the issue of Imperial Stormtroopers being bad shots, let's review a fundamental fact of light (which is what lasers are): It travels at 186,000 miles per second. So the idea of ducking before the laser hits you is just plain silly.
Not to mention (of course) the idea of a laser bolt being visible as a streak that has a beginning, a middle, and an end. If you were zapped by a laser from a laser gun, it would look like a single stream of light, with one end attached to the barrel of said gun, and the end attached to whatever portion of your head had not melted yet (assuming you're having a laser battle somewhere where there is enough air around to illuminate the entire beam).
Most "laser" beams in science fiction movies travel slower than bullets do today. Let's see Obi Wan whip his light saber around fast enough to stop the spray of a Mac-10 (and let's not even begin to talk about all the things wrong with a sword made of light).
4. Human-Looking Aliens
This is endemic on the various Star Trek series, where creatures from entirely different sectors of the universe look just like humans except for the occasional bulging ridge on their foreheads. Yes, this is the result of having only humans at casting calls, but in a large sense, all these "humanoid" variations ain't gonna happen.
Look, humans evolved on earth and shared a basic body format (four limbs, one head, side-to-side symmetry) with just about every other vertebrate on the planet. It's a form that works fine for this planet, but not even every vertebrate sticks with it (see: snakes, whales, seals, etc).
Given that any planet with life on it will have that life evolve in it's own way, the chances of the universe being stocked with chesty alien princesses who crave human starship captains is slim at best.
Related to this is the following.
5. Half-Breed Aliens
Humans don't even interbreed with other species here on earth. Our DNA is simply too different from other species to allow such a mating to produce offspring.
Given this, what are the chances of successful mating with an alien species that may not even have DNA as its genetic encoding medium?
Also going back to the idea that aliens probably won't look like Humans, how would you do it anyway? It's not exactly the "Insert Tab A Into Slot B" proposition it would be here at home.
6. Brain-Sucking Aliens
Ditto aliens that control your body by using your brains, or gestate in your chest, or whatnot. Let's posit that any creature that controls the brain of any other creature (not that any exist here on Earth) does so only after a few million years of what's called "speciation" – i.e., one species eventually enters a symbiotic relationship with another species. This relationship would have to be pretty specific, as symbiotic relationships are here on Earth.
Which is to say just because you're in a symbiotic relationship with one species doesn't mean it transfers over to another species, especially an alien species, who's body chemistry, DNA, brain wiring, etc., isn't even remotely close to your own. So don't worry about the "Puppet Master" scenario too much, or that you'll be nothing more than a glorified egg sac for some nasty breed of space monster.
7. Shape-Shifting Aliens
Shape-changing aliens are all very well, but there's a tiny problem in having a roughly human sized lump of alien protoplasm turning itself into, say, a rat, to scurry around in the ventilation shaft: Where does rest of the alien go? You can't just make 99% of your mass disappear into thin air (or reappear, as the case may be); it has to go somewhere.
Unless that "rat" is running around with a highly compressed mass of a human-sized object (which presents its own problems), shape-shifting in to different sized objects is not very likely (one of the smart things about Terminator 2 was that the T-1000 only shape shifted into things of roughly the same mass, like human beings or a floor).
8. Time Travel
Got an itch to spend time in the Arthurian England? Or perhaps Gettysburg during the Civil War?
The same relativistic principles that keep us from going faster than light also keep us rom traveling backward in time and messing with the past. It's possible to slow down time - the closer you get to the speed of light, the slower time moves for you relative to your original frame of reference - but to get the clock spinning in the other direction would require you to go faster than light, and you can't do that.
Again, there are theoretical loopholes that could allow it - worm holes, actually, which are "tunnels" in the fabric of space-time that could possibly allow travel back in time. but once again, keeping these wormholes open would require exotic matter with negative energy. Got any? Neither do we.
9. The Planetary Gravity Scam
Everywhere you go in science fiction, people are walking around like they weigh just what they do on Earth. Chances of that happening in the real universe? Slim. Consider our own solar system. On Mars, a 180-pound man would weigh just 70 pounds; on Jupiter, 424 pounds (not that you can walk on Jupiter, as it has no solid surface). That man on the moon? Just 30 pounds. The man's mass is the same, it's just that different planets have different gravitational pulls.
The idea that all the planets that humans might visit would exactly match Earth's own gravitational profile is a little much. As is, alternately, the idea that all alien creatures would be as comfortable in our gravitational field as we are.
10 The Planetary Sameness Principle
Tatooine looks just like the Yuma Desert in Arizona. Actually, it is the Yuma Desert of Arizona! Photo via Wookieepedia
The desert planet of Tatooine. The ice planet of Hoth. The jungle planet of Dagobah. What do these planets all have in common? One planetary-wide ecosystem. Which isn't too likely.
Our own planet has varying zones and ecological areas: desert, tundra, jungle, and so on; other planets in the system also show marked zones of varying atmospheric and weather patterns. Mars has ice caps as well as (relatively) temperate zones; Jupiter has distinct weather systems based in different areas on its globe. The planets that show a sameness are the ones we couldn't live on. Venus is all desert, but that's because a runaway greenhouse effect makes it hot enough to melt lead. Pluto is all ice, but it's so far away from the Sun that its atmosphere freezes for most of its orbit.
There may well be purely desert or jungle planets, but most planets we'd want to live on would probably be able to accommodate both.Found this Post interesting? Receive new posts via RSS (What is RSS?) or subscribe via email at the top of this page...
|
<urn:uuid:615eb06c-68d2-4b41-aa11-a7a717b9087b>
|
CC-MAIN-2017-04
|
http://www.curiousread.com/2009/02/10-things-science-fiction-got-wrong.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00512-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.957806
| 2,058
| 2.28125
| 2
|
Tobacco company stops unauthorised use of trademark on Facebook
The popularisation of the internet and, in particular, the use of social networks, have created new ways of infringing IP rights, as well as consumer rights and advertising regulations - for example, through the use of popular trademarks as usernames on social network profiles.
Tobacco company CA Cigarrera Bigott Sucs, a subsidiary of British American Tobacco, owns the well-known trademark BELMONT in Venezuela. In January 2012 it discovered that its trademark was being used as an identifier for a profile on the social network Facebook. Bigott considered that, due to the use of its trademark on the social network, internet users would mistakenly believe that the profile at issue was authorised by Bigott as a means of communicating with consumers. This was demonstrated by the fact that internet users had posted messages requesting meetings with the company or information about the brand.
Besides the negative impact on the brand, the unauthorised use of the BELMONT mark on the social network could have exposed Bigott to the possibility of being subjected to investigations by regulatory and health agencies - the latter were likely to believe that the profile was operated by the company without complying with the appropriate regulations on cigarette advertising to minors, among others.
Bigott filed a complaint under the Facebook Intellectual Property Policy, alleging infringement of its IP rights and effectively claiming ownership of the BELMONT trademark in Venezuela.
The complaint was processed quickly. Within 72 hours, Facebook had checked the information provided and removed the profile at issue, thereby recognising Bigott's exclusive rights in its trademark.
Companies that are engaged in fields where advertising is regulated by specific legislations, such as tobacco and alcohol, should be particularly vigilant towards the use of their trademarks as usernames on social network profiles. They are advised to make use of the policies for the protection of IP rights, such as the Facebook Intellectual Property Policy, to avoid being sanctioned by regulatory bodies for failure to comply with the relevant regulations.
Ricardo Enrique Antequera H and Andrés Brandt Von der Osten, Estudio Antequera Parilli & Rodríguez, Caracas
The authors' firm acted for CA Cigarrera Bigott Sucs in this case
Copyright © Law Business ResearchCompany Number: 03281866 VAT: GB 160 7529 10
|
<urn:uuid:e7c3a818-c751-4c26-bd46-010c1fddc304>
|
CC-MAIN-2022-33
|
https://www.worldtrademarkreview.com/article/tobacco-company-stops-unauthorised-use-of-trademark-facebook
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00269.warc.gz
|
en
| 0.948322
| 482
| 1.851563
| 2
|
Report warns of users caught in the middle of new cybercrime turf war
HONG KONG, CHINA - Media OutReach - 16 July 2020 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global leader in cloud security, today released new research warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. The report urges users to take action to stop their devices from enabling this criminal activity.
There has been a recent spike in attacks targeting and leveraging routers, particularly around Q4 2019. This research indicates increased abuse of these devices will continue as attackers are able to easily monetize these infections in secondary attacks.
"With a large majority of the population currently reliant on home networks for their work and studies, what's happening to your router has never been more important," said Jon Clay, director of global threat communications for Trend Micro. "Cybercriminals know that a vast majority of home routers are insecure with default credentials and have ramped up attacks on a massive scale. For the home user, that's hijacking their bandwidth and slowing down their network. For the businesses being targeted by secondary attacks, these botnets can totally take down a website, as we've seen in past high-profile attacks."
Trend Micro's research revealed an increase from October 2019 onwards in brute force log-in attempts against routers, in which attackers use automated software to try common password combinations. The number of attempts increased nearly tenfold, from around 23 million in September to nearly 249 million attempts in December 2019. As recently as March 2020, Trend Micro recorded almost 194 million brute force logins.
Another indicator that the scale of this threat has increased is devices attempting to open telnet sessions with other IoT devices. Because telnet is unencrypted, it's favored by attackers -- or their botnets -- as a way to probe for user credentials. At its peak, in mid-March 2020, nearly 16,000 devices attempted to open telnet sessions with other IoT devices in a single week.
This trend is concerning for several reasons. Cybercriminals are competing with each other to compromise as many routers as possible so they can be conscripted into botnets. These are then sold on underground sites either to launch Distributed Denial of Service (DDoS) attacks, or as a way to anonymize other attacks such as click fraud, data theft and account takeover.
Competition is so fierce that criminals are known to uninstall any malware they find on targeted routers, booting off their rivals so they can claim complete control over the device.
For the home user, a compromised router is likely to suffer performance issues. If attacks are subsequently launched from that device, their IP address may also be blacklisted -- possibly implicating them in criminal activity and potentially cutting them off from key parts of the internet, and even corporate networks.
As explained in the report, there's a thriving black market in botnet malware and botnets-for-hire. Although any IoT device could be compromised and leveraged in a botnet, routers are of particular interest because they are easily accessible and directly connected to the internet.
Trend Micro makes the following recommendations for home users:
- Make sure you use a strong password. Change it from time to time.
- Make sure the router is running the latest firmware.
- Check logs to find behavior that doesn't make sense for the network.
- Only allow logins to the router from the local network.
To read the complete report, please visit: https://www.trendmicro.com/vinfo/hk/security/news/internet-of-things/caught-in-the-crossfire-defending-devices-from-battling-botnets
About Trend Micro
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With more than 6,000 employees in over 50 countries and the world's most advanced global threat intelligence, Trend Micro secures your connected world. For more information, visit www.trendmicro.com.hk.
|
<urn:uuid:4727505f-75b6-425f-89e5-e9cfd5a04811>
|
CC-MAIN-2022-33
|
https://www.taiwannews.com.tw/en/news/3967945
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00074.warc.gz
|
en
| 0.946895
| 903
| 2.046875
| 2
|
Photograph by Nicholas and Co. taken in ca. 1880, showing the sculptural frieze known as Arjuna's Penance at Mahabalipuram (Mamallapuram) in Tamil Nadu. Mamallapuram derives its name from the title 'Mahamalla' or Great Wrestler of the Pallava king Narasimhavarman I (ruled 630-about 668 AD). Covering two huge boulders 27 ms long and 9 ms high, this remarkable carving in low relief is alternatively called The Descent of the Ganga. Scholarly analysis allows for both interpretations of the subject-matter of the sculpture which is considered above all to be an eulogy through mythology of Narasimhavarman I, its probable patron. Arjuna, one of the Pandava brothers in the Hindu epic Mahabharata underwent penances while praying to receive a magic weapon from the god Shiva. The sage Bhagiratha also underwent penances while praying to Shiva to catch the river Ganga in his matted locks as she descended to earth, all the animals and myriad beings watching the miracle. Originally water flowed along a central cleft with naga figures.
|
<urn:uuid:7d5efadd-8ac4-4bf7-91f5-2cce78e175e7>
|
CC-MAIN-2017-04
|
http://www.bl.uk/onlinegallery/onlineex/apac/photocoll/a/019pho0000472s1u00022000.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00221-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.924366
| 249
| 2.875
| 3
|
One year ago today the Obama Administration released its national space policy, a document that, while having much of the same policy foundations as previous documents, differed in both details and tone. The new policy placed a greater emphasis on space sustainability, responsible use of space, and international cooperation, while also supporting commercial space efforts, improved space system procurement, and other initiatives. So, one year later, how is the government doing to implement that policy?
In this week’s issue of The Space Review, I report on one assessment of the policy from a panel discussion earlier this month in Washington. Peter Marquez, who coordinated the development of the policy last year as the director of space policy for the National Security Council (and is now working in the private sector), said in general government is doing a “good job” carrying out the policy. He cited in particular efforts by government agencies, working with industry and other governments, to battle the “existential threat” to GPS posed by LightSquared. However, the government is lagging in other areas, such as support for space situational awareness and progress on export control reform, he said.
Another panelist, Andrew Palowitch, the director of the Space Protection Program, suggested that, for now, the impact of the new policy has been relatively limited. “Everything that happened in this last year, and everything that’s going to happen in the next year, is completely independent of that national space policy,” he said, citing the long lead times of space initiatives. He did, though, call the new space policy “fantastic” that will start having more of an impact in 18 to 24 months. Marquez disagreed with this assessment to some degree, arguing that what the US has been doing “on the international front” has been strong affected by the new policy.
The policy, argued Ben Baseley-Walker of the Secure World Foundation, has helped improve the US’s reputation internationally: “What the national space policy has done is to start to rebuild trust, start to rebuild consistency, and start to rebuild the reliability of the US as an internationally-engaged partner.” However, panelists agreed that while the new policy is consistent in its general themes with the European Union’s proposed code of conduct for outer space activities, it does not mean the US will, or should, sign on to that code.
|
<urn:uuid:ea08b0cc-5194-4765-a46e-af2e88b6edf3>
|
CC-MAIN-2016-44
|
http://www.spacepolitics.com/2011/06/28/the-national-space-policy-turns-one/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00107-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.958398
| 497
| 2.0625
| 2
|
This editorial will appear in Wednesday’s print edition.
The state’s new report trumpeting Washington’s aerospace advantages reads as if it were written by people convinced the competition for Boeing’s second 787 assembly line is either in the bag or out of hand.
Here’s hoping for the former. Washington workers and businesses can ill afford to lose this opportunity.
Gov. Chris Gregoire presented the report to Jim Albaugh, the new head of Boeing’s Commercial Airplanes Group, last week. The company is due to make a decision by the end of the year about where to place the second 787 line. The prevailing wisdom is that Washington’s prospects for landing it are grim and growing grimmer every day.
Machinists in Washington’s closest competitor, South Carolina, just voted to decertify their union. That, and a package of incentives South Carolina is dangling in front of Boeing, led one state lawmaker there to recently boast that the 787 line is all but assured.
Given the odds, Gregoire’s report had to turn heads. It had to promise Boeing something more. Instead, it essentially says that Boeing should be happy with what it’s got.
The report – dubbed the “business case” for keeping 787 production here – asserts that Washington can build the highest quality planes at a competitive cost and lowest production risk. It contends this state has a better business climate, smarter students, better quality of life, lower taxes and more skilled workforce than its contenders. The underlying message is Boeing would be crazy to look anywhere else.
But Boeing isn’t crazy. It has actual business concerns about doubling down in this state – concerns that the state’s report barely touches.
The company believes unemployment and workers’ compensation costs are too high. Gregoire’s report argues that this state’s unemployment rates have fallen considerably in recent years and intimates that Boeing should beware a bait and switch in other states where low unemployment rates have sent funds into insolvency and set businesses up for huge rate increases.
The argument comes awfully close to calling Boeing a whiner, but it does have a point about why those other states’ unemployment insurance programs can look so attractive. The state at least gets credit for trying to sell Boeing on its unemployment system.
The report makes no such effort to answer Boeing’s concerns about workers compensation costs – or its more pressing need to stem labor unrest that leads to regular walkouts and work stoppages.
Pressed by reporters on Tuesday, Gregoire was noncommittal. She made no specific promises on legislation to reform workers compensation and said it’s best for politicians to stay out of labor negotiations.
Of the state’s pitch to Boeing, she said, “There’s nothing more we can do.”
Spoken like someone who believes Washington’s got the deal sewn up – or someone who is seeking political cover when the company inevitably announces it’s taking its business elsewhere.
Whether the attitude is cocky or resigned, neither is apt to make a difference in this high-stakes decision.
|
<urn:uuid:f814b5d9-89a2-43ad-88b0-17d8feedb5d5>
|
CC-MAIN-2017-04
|
http://blog.thenewstribune.com/opinion/2009/09/29/state%E2%80%99s-pitch-to-boeing-offers-nothing-new/2008/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00486-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.947616
| 663
| 1.539063
| 2
|
Open a Web browser, and then type the printer IP address in the address field.
- View the printer IP address on the printer home screen. The IP address appears as four sets of numbers separated by periods, such as 188.8.131.52.
- If you are using a proxy server, then temporarily disable it to load the Web page correctly.
Click Apps > Forms and Favorites > Configure.
Click Add, and then customize the settings.
- To make sure that the location settings of the bookmark are correct, type the IP address of the host computer where the bookmark is located.
- Make sure that the printer has access rights to the folder where the bookmark is located.
Apply the changes.
|
<urn:uuid:4aed6cdb-4310-49d7-b039-3b86eb32e5d0>
|
CC-MAIN-2022-33
|
https://publications.lexmark.com/publications/lexmark_hardware/CX825_CX860_XC8155_XC8160_XC8163/UG/html/en/setting-up-forms-and-favorites-topic.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00676.warc.gz
|
en
| 0.891479
| 155
| 2.0625
| 2
|
It is my pleasure to welcome you and your children to my first-grade class at KnappElementary School! As a teacher in the Michigan City Area Schools corporation, I believe that it is important to provide children with a safe, productive, and enriching environment where we can all grow together as members of a learning community. Each day, I encourage my students to keep their hopes and dreams alive through hard work and perseverance, and striving to make any dream a reality is a major theme of my classroom. To help students to learn effective strategies to reach their goals, for instance, I have displayed a “Dream Board” of renowned Americans from past and present who have attained success while struggling to overcome life’s many challenges. The “Dream Board” showcases people who serve as role models, particularly through their efforts to realize their objectives honestly and faithfully, for students to emulate. During the school year, I use various stories, discussions, and lessons to introduce the students to the individuals on my “Dream Board.” The “Dream Board” not only helps children to study the culturally and economically citizens of our country, but it also helps me to teach students essential life skills by calling their attention to those historical figures who have achieved their lives’ ambitions in the face of overwhelming adversity. Ultimately, I would like students to understand that with such determination, success is possible!
|
<urn:uuid:3879edad-879c-4b4a-a2ad-97fea15cdbf5>
|
CC-MAIN-2017-04
|
http://www.mcas.k12.in.us/Domain/967
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00513-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.970515
| 285
| 1.929688
| 2
|
The Sustaining and Increasing Access to Care in Rural Communities Learning Collaborative, hosted by Capital Link and the National Association of Community Health Centers (NACHC), was concluded in Spring 2022 and explored community needs, growth planning, and financing options for health centers serving rural communities. Through a series of four 90-minute interactive webinars, this Learning Collaborative addresses challenges and opportunities FQHCs face in communities experiencing hospital distress and closure; examine the impact of telehealth on care delivery; and address financial capacity, sustainability, and financing options for FQHCs seeking to expand their impact in rural America. We plan to offer this Collaborative again in early 2023.
Session 1: Lay of the Land for Rural FQHCs
March 9, 2022; 1-2:30 pm EST
This session will review basic data on health centers in rural America, including the shifting market, the rural/urban split, patient characteristics (via UDS mapper), and definitions of rural vs. highly rural/frontier. The session will highlight current and emerging federal initiatives and funding opportunities at HRSA, USDA, FCC, and SBA; notable findings of Capital Link’s recent report on Financial and Operational Trends of FQHCs serving rural America; and the landscape of available resources, including those housed on the Rural Health Hub (a FORHP-funded clearinghouse managed by University of North Dakota). We will also facilitate a group discussion on the challenges participants are facing in their rural communities.
Session 2: FQHC Roles and Opportunities in Connection with Rural Hospital Financial Challenges
April 6, 2022; 1-2:30 pm EST
This session will provide a context for considering how FQHCs can play a critical role in evolving health systems in rural communities. We will focus on best practices, strategies, and lessons learned and discuss a recent Capital Link case study of a rurally-located health center’s experience related to responding to a hospital closure.
Session 3: Enhancing Rural Health Access through Telehealth
May 4, 2022, 1-2:30 pm EST
This session will review challenges and opportunities related to telehealth in rural areas. It will provide fresh status update on broadband (USDA or FCC) access, as well as CMS and state reimbursement and flexibilities. We will consider NACHC’s State Affairs Telehealth State Guide as a resource and review other available telehealth resources. During the session, we will also provide examples of innovative ways health centers are utilizing telehealth and virtual engagement with patients and conduct a group discussion on participants’ experiences with telehealth thus far.
Session 4: Growth Planning & Capital Resources for Health Centers Serving Rural Communities
June 8, 2022, 1-2:30 pm EST
This session will pull together aspects of the three prior sessions to provide perspectives on planning and financing health center growth in rural communities. Aggregated financial and operational data of LC participants will be presented and discussed. We will offer key capital funding information relevant for rural FQHCs, including USDA Community Facilities Program, NMTC and the HRSA Loan Guarantee Program—highlighting examples of health centers that have obtaining these types of capital funding.
Presenters of the four webinars will include content experts from both the National Association of Community Health Centers (NACHC) and Capital Link as well as other industry professionals.
|
<urn:uuid:330ec017-101b-4dad-92e5-2334f5360356>
|
CC-MAIN-2022-33
|
https://caplink.org/learning-collaboratives/rural-lc
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz
|
en
| 0.898071
| 738
| 1.554688
| 2
|
To insure that the after-school workforce has the capacity and capability needed to deliver high-quality services to all children and youth who want and need them.
Although after-school is one of the fastest growing educational sectors in many cities, most citywide systems do not have comprehensive strategies in place to recruit, train and support a qualified and diverse workforce. Publicly funded programs spend the greatest proportion of their funding on staff salaries, but they receive limited public funding for staff development.
After-school systems must have effective strategies to insure that programs can hire a sufficient supply of qualified staff at all levels – volunteers, front line staff, site coordinators, and organization leadership. This is important because research demonstrates that positive staff-child relationships are a primary factor in achieving the best possible outcomes for children and adolescents. The after-school workforce employs staff of all ages with varying levels of work experience and education, from different racial and socioeconomic backgrounds. These primarily part-time workers need sufficient training on the skills required to work effectively with children and youth.
As there are already several projects underway that focus on workforce development, CBASS will begin by reviewing efforts from the field in the following areas:
Partners will then quantify the costs associated with these efforts, and formulate strategies to encourage public investment in similar efforts.
|
<urn:uuid:9912d4f0-6cc4-4ca7-bf0f-13481082ed2c>
|
CC-MAIN-2017-04
|
http://www.afterschoolsystems.org/section/strategies/initiative5
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00456-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.962251
| 262
| 2.765625
| 3
|
The Federation Council of the Russian legislature is forming a working group expected to propose comprehensive regulations for cryptocurrencies. Officials from several ministries and government agencies, as well as members of the country’s expanding crypto industry, will join the body.
Federation Council to Prepare New Regulations for Cryptocurrencies in Russia
The Federation Council, the upper house of Russian parliament, is establishing a working group of experts to take on the task of developing ditional regulations for Russia’s growing crypto space. Cryptocurrencies are now only partially regulated through the law “On Digital Financial Assets,” and officials have recognized the need to opt more rules to cover various aspects such as circulation and taxation.
Besides lawmakers, the group will comprise representatives of the Ministry of Finance, Ministry of Economic Development, Russia’s financial watchdog, Rosfinmonitoring, the Ministry of Digital Development, the Federal Tax Service, Bank of Russia, and law enforcement agencies. Quoted by Forklog, the Deputy Chairman of the Federation Council Nikolai Zhuravlev announced at the Finopolis 2021 forum that members of the cryptocurrency industry will also be invited.
During his participation at the event devoted to innovative financial technologies, Zhuravlev remarked that the use of cryptocurrency as a means of payment is prohibited in Russia. But then he also commented that whether other operations with digital coins should be banned is a difficult and debatable question.
According to an earlier statement by the First Deputy Chairman of the Federation Council’s Committee on Budget and Financial Markets Elena Perminova, the house is currently analyzing the presence of cryptocurrencies in the Russian financial market. Perminova said last month that the chamber intends to “seriously dress this issue.”
In late November, the lower house of Russia’s Federal Assembly, the State Duma, revealed it’s also forming a working group of lawmakers who will try to answer outstanding questions pertaining to the regulation of decentralized digital currencies in the Russian Federation.
The group will hold its first meetings in the near future, the he of the parliamentary Financial Market Committee Anatoly Aksakov announced at the time. Its members will attempt to clarify crypto-related matters such as the legalization of mining and the introduction of taxation for crypto holdings and profits.
Tags in this story
Chairman, Crypto, Cryptocurrencies, Cryptocurrency, deputies, deputy chairman, Federal Assembly, Federation Council, Group, House, lawmakers, lower house, members, Nikolai Zhuravlev, parliament, Regulations, Representatives, Russia, russian, Russian Federation, State Duma, upper house, working group
Do you expect Russia to comprehensively regulate cryptocurrencies and related business activities? Share your thoughts on the subject in the comments section below.
Image Credits: Shutterstock, Pixabay, Wiki Commons
Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting vice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.
META ARTICLE: Russia’s Federation Council to Set Up Working Group on Crypto Regulations – Regulation Bitcoin News PUBLISHED: 2021-12-12 07:30:51 SOURCE: https://news.bitcoin.com/russias-federation-council-to-set-up-working-group-on-crypto-regulations/
|
<urn:uuid:853bd167-2a1b-4012-8a88-8e2d08505de4>
|
CC-MAIN-2022-33
|
https://crypternet.com/russias-federation-council-to-set-up-working-group-on-crypto-regulations-regulation-bitcoin-news/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00674.warc.gz
|
en
| 0.925879
| 751
| 1.796875
| 2
|
UN DDR Partners
The IAWG on DDR is collaborating closely with its partners in order to amplify the positive impact of DDR processes and ensure compliance with international standards, particularly the IDDRS.
The African Union (AU) gained observer status in the IAWG-DDR in 2018, and has significantly contributed to the revision of the IDDRS. The AU in close collaboration with the United Nations Department of Peace Operations (UNDPO) and the World Bank is currently rolling out the DDR implementation plan from 2020-2022 under the AU DDR Capacity Programme. The objective of this partnership is to strengthen the strategic and operational capacities of Member States, Regional Economic Communities (RECs) and Peace Support Operations (PSOs) in designing and implementing DDR processes. DDR processes are significant for the attainment of peace, security and stability in Africa. In light of this, the AU is working to consolidate the capacity of the African Peace and Security Architecture (APSA) to provide support for DDR efforts in Africa.
The IAWG on DDR also closely collaborates with the Integrated DDR Training Group (IDDRTG), an international network of 18 training and research organizations. The IDDRTG serves as a forum where DDR training practitioners and researchers come together to share knowledge and best practices in the field of DDR. The group encourages its members to coordinate and, where appropriate, jointly deliver training courses in order to meet the needs of DDR practitioners, planners and policy makers. The IDDRTG often collaborates on the design and implementation of DDR training with the UN Inter-Agency Working Group on DDR.
Concepts, Policy and Strategy of the IDDRS
Structures and Processes
Operations, Programmes and Support
|
<urn:uuid:810e9677-199a-4469-9ba3-4d1dde3501f0>
|
CC-MAIN-2022-33
|
https://www.unddr.org/partners-members/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00273.warc.gz
|
en
| 0.909158
| 379
| 1.632813
| 2
|
Previous Challenge Entry (Level 3 - Advanced)
Topic: Illustrate the meaning of “All that Glitters is Not Gold” (without using the actual phrase or literal example). (01/24/08)
TITLE: Carla's Big Chance
LEAVE COMMENT ON ARTICLE
SEND A PRIVATE COMMENT
ADD TO MY FAVORITES
“Hey kiddo, nothing much. Just wanted to see how my baby sister was doin’.”
“Oh… fine I guess. Just wish Dad would ease up on me.”
Travis chuckled. “Still skipping classes, aye?”
“You know I hate school, Travis. Why do I need an education to be in movies? It’s”… Carla’s voice trailed off.
“I know, Sis. You just wanna hit the big time now.”
“Yeah, as if that’s going to happen.”
“I gotta go iron my uniform… you know.”
It was Carla’s turn to chuckle. “OK, have fun at boot camp. Don’t let them catch you with your cell phone.”
Carla rested back on her pillows and sighed. She missed Travis, missed his loud music and after school visits to the game parlor when they were supposed to be doing homework.
Her cell phone buzzed. “Hello,” she answered dreamily.
“Hey Carla, you up to some fun?”
It was Toni, a girl she’d met a few weeks ago at the game parlor. Toni wanted to be a model and Carla liked her right off.
“What kind of fun?” Carla answered half-heartedly.
“Yeah, he’s the camera nerd at the parlor. Goes to that snooty school off Main Street.”
“Yep, that’s him.” Toni sounded excited. “He’s making a video for school. His Dad is on the school board, has heaps of money and some neat video equipment. He likes Kevin’s script and wants to enter him in a junior film maker’s competition in Hollywood… Kevin needs some girls to do some acting for him.”
Carla sprang from her bed. “When?”
“We’re meeting them at the parlor in half an hour.
“I’m on my way.” Carla ended the call quickly.
This could be the break I’m looking for. If Kevin wins the competition, Toni and I could be on our way to Hollywood, too.
She entered the noisy parlor and saw Toni talking to Kevin. They were with another guy who was leaning against a soda machine.
Carla smiled at the handsome young man. He reached out to shake her hand. She was mesmerized by his presence. “Hi.”
Kevin broke the spell. “Dad’s waiting for us at home. We’re doing the video there.”
Kevin’s house was a few blocks from the game parlor and on the way Kevin explained his script. “It’s a film I’m doing for my photography and visual effects class. Dad’s helping me with his equipment.” He laughed. “He doesn’t trust me with his precious stuff.”
They arrived at a huge two-story house surrounded by an immaculate garden. The group climbed the stairs and Kevin unlocked the door.
Carla was elated as she stepped into the impressive entry. She looked beyond an archway where two video cameras and a still life camera were set up on tripods facing a sofa… a sofa covered with cushions and satin sheets. Toni grinned at her and winked.
The boys stepped in front of the girls and headed to one of the cameras and began to adjust some dials.
What’s going on, Toni? Where’s Kevin’s father?” Carla began to panic.
“Who needs his father? We have the equipment. We have the opportunity of a lifetime here, Carla.”
“Where’s his father, Toni?” She persisted.
Steve returned to Carla’s side and skimmed his index finger down her cheek and flicked her hair. “Hey Carla, don’t fret. Isn’t this what you wanted? Glamour! Fame! It’s worth a hundred bucks.”
Carla’s heart raced and her breathing quickened. With one sudden movement, she turned and ducked through the still open front door. She raced up the path and onto the street. She turned to see the three of them standing outside. They were laughing at her. Carla gasped and began to run.
When Carla was sure she hadn’t been followed, she slowed her pace. Tears and sweat streamed down her face. She drew in deep breaths and swallowed repeatedly, trying to regain control before returning home.
“I’m home,” Carla called from the front room. “I’ve got an assignment due. I’ll be in my room.”
“OK,” her mother called back from the kitchen. “We’ll be eating at seven. I’m running late.”
Carla entered her bedroom and closed the door. She took her cell phone from her pocket and hit Travis’ speed-dial. Taking a deep breath she struggled to fight back more tears.
“Hey Sis, you just caught me. What’s up?”
The opinions expressed by authors may not necessarily reflect the opinion of FaithWriters.com.
Accept Jesus as Your Lord and Savior Right Now - CLICK HERE
JOIN US at FaithWriters for Free. Grow as a Writer and Spread the Gospel.
|
<urn:uuid:d7bccc66-ad13-47a0-b032-5f9a48629937>
|
CC-MAIN-2017-04
|
http://www.faithwriters.com/wc-article-level3-previous.php?id=20935
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00421-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.969854
| 1,309
| 2.40625
| 2
|
Use the data sheet to calculate Delta H, Delta S and Delta G at 25 degrees Celsius for each of the following reactions. In each case show that Delta G- Delta H-T Delta S. 1. Ni(s) + Cl2(g) --> NiCl2(s) 2. CaCO3(s, calcite) --> CaO(s) + CO2(g) 3. 2CH2OH(l) + 3O2(g) --> 2CO2(g) + 4H2O(l) Please see the attached docu
Detailed answers & explanations would be great. If hand written please do not write in cursive for I have trouble reading it. 1. Using Lewis (electron-dot) structures, explain why the ClF3 molecule is polar and the BF3 molecule is not polar. 2. For the following questions refer to the following diatomic species. (A) Li2
We can draw an analogy between the attraction of an electron to a nucleus and seeing a lightbulb-in essence, the more nuclear charge the electron "sees," the greater the attraction. 1. Within this analogy, discuss how the shielding by core electrons is analogous to putting a frosted-glass lampshade between the lightbulb and you
1. What scientific principle or law is used in the process of balancing chemical equations? 2. In balancing equations, why should you not change subscripts in chemical formulas? 3. Define the terms limiting reactant and excess reactant. 4. Why are the amounts of products formed in a reaction determined only by the amount of
Question: Sort these species into isoelectronic groups. It doesn't matter which group goes in which box, so long as the correct species are grouped. He, Li+, O^2-, Rb+, Se^2-, F-, Be^2+, Y^3, Mg^2+ HINT: Use a periodic table to determine the atomic number of the atom. For example, xenon's atomic number is 54. A neut
See the attached file. Consider the Na atom. Although the ground state of Na atom has one and only one corresponding electron configuration, other electron configurations are certainly possible for Na atom; they correspond to higher-lying excited electronic states. The table below gives some of the possible electron configura
I have attached two physical chemistry problems. The first deals with converting wavelengths to frequencies and the second deals with electrons being ejected. I am a little confuse on how to approach these problems. If you would include all work and a complete explanation it would be greatly appreciated. I will try to apply
Hello, I need assistance with the following question, would appreciate it if someone can help me. I have defined both terms, so i just require assistance with the calculation. Thank you Question: 1. The TLV for carbon monoxide is 35ppm. Define the terms TLV and ppm and calculate them for the following example:
Please help answer the following three questions. What are bonding theories? Why are they important? What may they be used for?
calculate the first optical transition for 1,3,5,7 octatetraene using particle in a 1-D approximation?
1) What hybrid orbital would be expected for the central atom in each of the following: ? Draw the molecular structure of these compounds and label Ï? and Ï?bonds. A: SrCl2 B: NO2 C: COF2 D: GeCl4 E: PBr3 2) Draw the possible isomers of SO3 ). 4) Prepare 25 gm of 2.5% w/w NaCl solution 5) Prepare 50 ml of 13% alcoho
Carbon monoxide concentration in a car's exhaust is approximately 8% by volume when the car is idling (per the textbook). What is 8% in ppmv (by volume)? Answer A 800 B. 8,000 C. 80,000 D. 800,000
Every measurement has a measurement uncertainty. Discuss how precise and accurate measurement can be achieved in spite of the inherent measurement uncertainty. You could use the option given below. Take a ruler and measure the height of the textbook three times. Record the three measurements, and discuss the uncertainty in
1) Define a genetic mutation and state the types of genetic mutations. Discuss the effects of genetic mutations. 2) A thirteen-year-old girl, who is underdeveloped and thin, has a blood disorder. She frequently experiences chest and abdominal pain, fever, and coughing, and has trouble breathing. Her teachers often spend
The best means of personal protection from radiation for emergency responders is the implementation of three basic principles: time, distance and shielding. Please show your work when answering the following questions: a. Using the inverse square law of radiation, what Geiger counter reading would you get for a radioactive m
How do you find correct significant figures when performing calculations? (note: the explanation will assume you know what significant figures are and can find how many significant figs are in each number) Perform these calculations, using correct sig figs (2.795m*3.10m)/6.48m 3.708 + 3.2 1.4567473*0.1.
1. Calculate the pH at the equivalence point in a titration between 10.00 mL of acetic acid(0.100 mol/L) and sodium hydroxide (0.100 mol/L). 2. A reaction was carried out in an acidic medium. The equation for the reaction was given as Fe 3+(aq) + HSCN(aq) <----> FeSCN 2+(aq) + H+(aq). Write the equilibrium constant expressio
Please help with the 6 questions below. 1. The structural formula for ethanol, the alcohol in alcoholic beverages. Give the total number of: H H | | H -C - C - O - H | | H H (a) valence electrons, (b) single bonds, and (c) bonding pairs of electrons. How many extra pairs of electrons are le
Hello - I need some help! I need to track the nuclear decay of Thorium-232 by writing progressive nuclear decay equations until the last decay product is NOT radioactive. I also need to determine whether or not ANY of the isotopes in this decay sequence are usable in brachytherapy, and which would be best.
I have a list of terms that needs to be defined in a Physical Chemistry course. With each definition I need an example for each term, as a description to it or so term Chapter collision theory transition state theory rate constant Arrhenius equation integrated rate law rate law activation energy pseudo f
_____1) Which atom below has 4 valence electrons? a) Carbon b) Beryllium c) Hydrogen d) Nitrogen e) None _____2) What is the correct Lewis dot structure for oxygen? a) b) c) d) e) no right choice _____3) Which chemical has the most number of valence electrons in its Lewis structure (electron-dot structure)?
What is the chemical make-up of natural cleaners? How do these products compare to traditional cleaners? Are the active ingredients the same or different? How do the products differ from traditional cleaning products? Are these products safer or more environmentally friendly than traditional products?
1. Define a genetic mutation and state the types of genetic mutations. Discuss the effects of genetic mutations. 2. A thirteen-year-old girl, who is underdeveloped and thin, has a blood disorder. She frequently experiences chest and abdominal pain, fever, and coughing, and has trouble breathing. Her teachers often spend ad
An atom of tin (Sn) has a diameter of about 2.8 x 10 -8 cm. a. What is the radius of a tin atom. ? _________________Angstroms (A) and ________________m b. how many Sn atoms would have to be placed side by side to span a distance of 6.0 um? _________________________number os Sn atoms c
Please see the attached file for the fully formatted problems. In the real world, you do not have a program to balance equations for you. For questions 12-16 below, please fill in the first table below to indicate the initial numbers of reactant and product atoms. Balance the equation on your own and then fill in the second
1. Energy is ____ when an n = 4 to n = 2 transition occurs when an electron adds to the H+ ion and ends up in the n = 3 shell. a) destroyed, created b) emitted, created c) absorbed, emitted d) emitted, absorbed e) emitted, emitted 2. Calculate delta(E) if 1 = 1.40 kJ and w = -658 J. a) -657 kJ b) 0.742 kJ c) 1.4
Write the ionic and net ionic equations for the following reactions. a) AgNO3 (aq) + Na2SO4, (aq)-----> B). BaCl2 (aq) + ZnSO3 (aq)-------> C). (NH4)2CO3 (aq) + CaCl2 (aq)------>
Geometric Structure and Localized Bonding Models (also as attachment) 1. For each of the following chemical species: (i) write acceptable Lewis structures (including major resonance contributors and indicating formal charges); (ii) designate oxidation states for all atoms; and (iii) draw the stereochemical structures predi
How do you tell if a compound is ionic, polar covalent, or non-polar? Find out for these compounds (Big numbers are used to represent the number of atoms because they are all 1 molecule.) a) Na2SO4 b)KOH c)(NH4)2SO d) C6H14 e)C2H5OH f)H20
Standard Deviation : Variability of Data. A data set is presented, and the standard deviation must be calculated.
The standard deviation of a data set is a measure of the 'spread' of a distribution of data or other numerical values; it is a measure of variability within a particular data set. To calculate standard deviation of a sample, generally the variance of the sample is first calculated. The variance is the average squared deviation o
|
<urn:uuid:6e1e9b7a-a74f-4fa3-bfec-cdfd10216e93>
|
CC-MAIN-2017-04
|
https://brainmass.com/chemistry/general-chemistry/pg3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00017-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.892246
| 2,145
| 4.4375
| 4
|
When Hugh and DeeDee released their only child to heaven, they struggled with what to call themselves in the aftermath. There is no specific word in the English language to describe a parent who has lost a child. A wife without her husband is a widow. A husband without his wife is a widower. A child bereft of parents is an orphan. A parent whose child has died before they have is an undefined hollow of hurt.
Miscarriage. Sudden infant death. Suicide. Illness. Accident. Death steals a child from this world and then robs the surviving parents of an expressed identity.
Yet God Himself knows such devastating grief as His only Son, Jesus, called to Him while dying on the cross, “Father, into your hands I commit my spirit” (Luke 23:46). God was Father before Jesus’ earthly birth and remained Father when Jesus released His final breath. God continued as Father when the still body of His Son was laid in a tomb. God lives on today as Father of a risen Son who brings every parent the hope that a child can live again.
What do you call a heavenly Father who sacrifices His Son for the universe? For you and for me? Father. Still, Father. When there are no words in the glossary of grief to describe the pain of loss, God is our Father and calls us His children (1 John 3:1).
|
<urn:uuid:c855603e-3efd-47cf-a29e-21d70cf4c14e>
|
CC-MAIN-2022-33
|
https://ourdailybread.ca/category/grief/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00675.warc.gz
|
en
| 0.965823
| 290
| 1.84375
| 2
|
The revitalized President’s Park involves much more than merely looking up at 20 ft. tall Presidential Busts; this park envisions a truly, cultural and historical experience on a grand scale. As of this writing there is international interest in the further development of this plan, while media outlets have been reporting on the synergy involved in generating interest and ultimate implementation of the Park.
We hope that you are as excited as we are about this challenging project!
We are making progress! We are looking at a large piece of property for our new park. Located near King’s Dominion, this would be a great location for both visitors to Washington DC and the historic area from Richmond through Williamsburg and Hampton Roads. This location perfectly suits our plans to honor our American Presidents and the history of our country’s capital city.
A White House Replica
A White House Replica, built to specifications in the architectural style of the White House scale, will be the centerpiece of the park with huge busts of all the Presidents placed on the perimeter of the park; this White House replica will actually serve as a Hotel, and will offer tours through available rooms.
Builder Howard Hankins, the current owner of the Presidential busts, was asked by the owners of the previous park to remove the statues that remained at the Park site before the land was sold. Learn the fascinating story of how statues that were supposed to be destroyed, began the journey instead.
When the story broke about presidential busts that had gone previously unnoticed, it became a national news story. A field in tiny Croaker, Virginia was suddenly overrun by local, regional and national media. While the busts themselves are not the main attraction of Presidential Historical Park, they certainly proved to be one of many catalysts.
We Want Your Input!
The Presidential Historical Park will will exist for our visitors. We are completely committed to bringing you what you want to see. We honor that commitment by offering our website visitors the opportunity to tell us what THEY would like to see featured in the park. We believe that this is the best way to provide an entertaining and inspirational visit for our guests.
More than just a White House replica, The Presidential Historical Park will have many unique features. Combining history, tourism, special events and a great place for kids to have fun will be make Presidential Historical Park a compelling destination for vacation travelers, school groups and everybody else.
Give us your feedback about what you would like the park to be, then click the Donate button at the top or the bottom of the page to become a part of Presidential Historical Park.
|
<urn:uuid:98f520bf-750a-41ba-baf2-927a67579560>
|
CC-MAIN-2017-04
|
http://renewthepresidents.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00400-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.951727
| 531
| 1.914063
| 2
|
Business Fraud Scams cost Canadian corporations and non-profits millions of dollars each year. What is Business Fraud?An unsolicited phone call or email that appears to be from a trusted source can lead an employee to inadvertently share confidential information with a criminal. Business fraud can also originate within your organization – an employee may steal equipment or products, or partner in a complex corporate espionage scheme. If a scam executed against your organization garners media/social media attention, your organization's reputation and financial future may be at risk.Learn All You CanThe Competition Bureau of Canada maintains an ongoing education and outreach campaign to help organizations fight fraud. The FACT – Fraud Awareness for Commercial Targets initiative is a consumer resource for information on topics such as:Types of business scams What to do if you suspect fraud and how to file a complaintDeveloping an organizational plan to fight fraudEngaging employees in identifying and preventing fraud.Minimize your chances of becoming a victim of fraud by accessing the Competition Bureau of Canada publication, The Little Black Book of Scams in a variety of online and print formats. There is much you can do to manage the risk that fraud poses to your organization. Talk to your insurance representative about risk management best practices for fighting fraud in your industry. Source: Competition Bureau of Canada Getting Started - Managing Your RiskA primer on the concept of risk management plus the basic steps of the risk management process.Commercial Insurance for Small Business - Q&AQuestion to ask your insurance representative. Related ServicesCargo TheftEach year, cargo theft costs the Canadian economy $5 billion. All too often, cargo theft goes unreported. IBC leads a national cargo theft reporting program with the Canadian Trucking Alliance (CTA). Employee TheftWhile it may be difficult to consider employees or volunteers as a potential threat to your organization, theft from within the organization does happen. Specialized crime coverage is available to mitigate the risk of internal theft and fraud. Useful LinksBusiness Insurance CoverageInsurance protects you from losses that may pose a significant threat to your business operations. A major loss to one organization may be a trivial loss to another. When selecting coverage, deductibles and policy limits, there are many factors to consider.Business InterruptionYour ability to generate sales could be threatened at any moment. With business interruption coverage, a business owner can collect the income he or she would have expected to generate were it not for the unexpected event.Commercial PropertyProtecting your commercial property is critical to your businesses financial stability.
|
<urn:uuid:10bfab48-bd6b-41a1-8a2f-35451650340e>
|
CC-MAIN-2022-33
|
http://www.ibc.ca/ab/business/business-crime/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00068.warc.gz
|
en
| 0.925998
| 498
| 1.953125
| 2
|
The state’s first direct airfreight link to China will be carried by Qantas Freight services, as part of a landmark partnership with VAN Dairy.
A Boeing 767-300 will transport freight on a weekly basis with the first flight expected to take-off in the first half of 2017.
Premier Will Hodgman announced the partnership at Hobart Airport on Friday.
He said 50,000 litres of VAN Milk could travel from North-West Tasmanian farms to China within days, using the largest commercial aircraft to regularly operate out of Hobart.
“To get fresh milk into China on the flying kangaroo is a wonderful example of where our state currently is,” Mr Hodgman said.
“I think it’s a sign of the times and it’s a demonstration of the benefits of working closely with key partners and exploring new market opportunities.”
Mr Hodgman said the service could be used by other key produce markets.
He said the partnership was a “crucial stepping stone” towards establishing the first direct passenger link from Tasmania to China.
VAN Dairy’s parent company Moon Lake Investments managing director Sean Shwe said export talks with other Tasmanian producers had already begun.
He said Chinese consumers were savvy following a milk safety scandal in 2008.
“There is a huge demand for fresh milk in China and the key to satisfying that demand is having a reliable freight partner with an established freighter network, infrastructure and support in China and expertise in handling fresh produce,” Mr Shwe said.
|
<urn:uuid:b956a257-0b84-45bc-9a9e-cc6ece8caaad>
|
CC-MAIN-2017-04
|
http://www.theadvocate.com.au/story/4316971/direct-flight-booked-for-dairy-export/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00239-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.959358
| 329
| 1.742188
| 2
|
The cryptocurrency adoption rate is hard to research because of the private nature of cryptocurrencies. Still, there are some things that can be established about what may be slowing down cryptocurrency adoption. As a lot of blockchain platforms have stated, cryptocurrency awareness and education are not yet high enough to lead more people into the industry. Some people don’t even know what cryptocurrencies are, some lack the information about what it may be used for and some see no benefits of it at all. But people well-educated in cryptocurrency do have their own doubts about it, as cryptocurrencies have shown a lack of stability. Cryptocurrency investments and its use as a payment tool is associated with risks. There are also some government events that slow down cryptocurrency adoption, with governmental restrictions on the use of cryptocurrency for businesses and financial institutes.
|
<urn:uuid:d21886e7-fab2-435a-9e96-798ea556786e>
|
CC-MAIN-2022-33
|
https://tr.cointelegraph.com/tags/adoption/amp
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00666.warc.gz
|
en
| 0.970098
| 165
| 2.59375
| 3
|
Browsing eRepublik,I had an idea on how to help issues between parties.
It may sound ridiculous to a sane person,such as any person who reads this article.But to me,it sounds like a good idea.
The idea is very rough,so if you have any suggestions for it,please say in the description.
Each party would have ambassadors to other parties,e.g UKPP having a ambassador for New Era.
It may sound like something a leader of the party could do,but giving ambassador positions in your party would have it's advantages.
1. Better party relations
Being a ambassador for your party could help you be friends with another party,there are many ways you can do this,by befriending members of the party,by releasing interviews with people in other political parties in newspaper articles.I'm sure there's more,but I just don't know them at this specific moment.
Positive interaction between parties,even if they are bitter rivals,may help the conflict between them.It may not always work.But it would help inter-party relations as I call it,no one really seems to call it inter-party relations apart from myself really.
2. Encouragement to get involved
People may want to be involved in politics,but may not want a congress seat or CP,PP etc. But this position offers a chance for people who may not be well experienced with our political module,and may give them the confidence needed to try and get involved in politics.This empowers the member,something which all parties (I hope) want to achieve.
3. Less political bickering
Almost everyone hates it,so if we can make politics friendlier and not as mean,I think this would also help people into politics,especially if they are new.If there's parties arguing all over the place,I know I wouldn't want to get involved.Hopefully the political bickering can stop,or at least be reduced.
4. Getting to know neutral parties
I think this would also help bridge the gap between neutral parties.Let's say for an example,the UKRP are neutral to The Worker's Rights Party (Not saying they are or aren't,it's an example) Ambassadors from each party could help them to get to know each others parties.
Thanks for reading,this turned into a quick idea I had in my head to about 15-20 minutes of writing.As said at the start,if you have any suggestions for this idea,please say so in the comments below.
What is this?You are reading an article written by a citizen of eRepublik, an immersive multiplayer strategy game based on real life countries. Create your own character and help your country achieve its glory while establishing yourself as a war hero, renowned publisher or finance guru.
|
<urn:uuid:6826fc4a-a069-4ce7-a8bf-c6bfba50ba11>
|
CC-MAIN-2016-44
|
https://www.erepublik.com/en/article/party-ambassadors-ridiculous-or-not--2199992/1/20
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00034-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.963683
| 584
| 1.539063
| 2
|
Peer-to-peer (P2P) technology is a distributed computing software architecture that enables individual computers to connect to and communicate directly with other computers. Through this connection, computer users (known as "peers") can share communications, processing power, and data files. Sharing content files (file sharing) containing audio, video, data, software, text and photographs, or anything else in digital format is very common, and real time data, such as Voice over IP traffic, is also passed using P2P technology.
Peer-to-peer (P2P) is
|“||a network architecture in which transmissions flow between terminals without passing through a central hub.||”|
Peer-to-peer networks are mainly based on two possible architectures:
- a pure distributed p2p network with no mediation by a central entity, such as Bluetooth connections between mobile devices
- a distributed p2p network relying on a centralised (hub-based) infrastructure to "bootstrap" interactions and/or provide some services (e.g. Instant Messaging (IM) where the list of participants is stored in a central directory), although interactions are peer-to-peer.
With respect to file-sharing specifically, P2P technology allows "decentralized" sharing. That is, rather than storing files in a central location to which individual computers must connect to retrieve the files, P2P technology enables individual computers to share directly among themselves files stored on the individual computers. P2P file sharing consists of four essential elements:
- (1) a distributed software application running on users’ computers, which allows users to
- (2) pool their files into a distributed pool (i.e., the files do not reside all in one location),
- (3) search the pool files with keywords, and
- (4) download the discovered files from peer to peer.
P2P file-sharing programs themselves do not perform the sharing or copying of files; rather, they employ a protocol that facilitates communication between the two peers who wish to share or copy a particular file.
By eliminating the need for a central storage point for files, P2P file-sharing technology allows for faster file transfers and conservation of "bandwidth," i.e., the capacity to transmit information to and from a computer. In addition, because P2P technology decreases the need for businesses and consumers to store files on their hard drives, it can lower costs by conserving on storage requirements and saving on maintenance and energy costs related to data retrieval, sharing, and processing.
The ability of a peer-to-peer software vendor to track or regulate the use of its software depends on whether the peer-to-peer network is based on a centralized model, such as that used by Napster, or a decentralized model, such as the Gnutella network used by KaZaA. In the centralized model, which is based on a central server or broker that directs traffic between individual registered users, it is possible for the administrators of the central server to track some of the individuals’ activities by monitoring their interactions with the central server or database. In the decentralized model, in which individuals find and interact directly with each other, the ability of the peer-to-peer software vendor to track individuals who use its software is greatly diminished. Any user of a decentralized peer-to-peer network, including the vendor of the software, can search the network to determine the files that are being shared on the network. However, according to one major software vendor, vendors of file-sharing software have no special ability to track or regulate the actions of the users of the software.
The earliest peer-to-peer network in widespread use was the Usenet news server system, in which peers communicated with one another to propagate Usenet news articles over the entire Usenet network. Particularly in the earlier days of Usenet, UUCP was used to extend even beyond the Internet. However, the news server system also acted in a client-server form when individual users accessed a local news server to read and post articles.
The growth of peer-to-peer services was facilitated by significant advances in network technology and better access to the Internet in the late 1990s. More users began using the Internet for email and access to information and content. Increased speeds and reduced costs for broadband access permitted the distribution of large media files by email or file-sharing networks. Services such as Napster, Kazaa, Grokster, and Gnutella allowed users to locate and distribute sound recordings and video materials — generally without permission of the copyright owners.
Current commercial uses of P2P technology include the licensed distribution of games, movies, music, and software. Major videogame publishers distribute their games through P2P and have achieved a total of more than 200 million downloads. In addition, some independent movie studios, music recording labels, and artists have licensed copyrighted material and promote and sell their products over P2P networks. As a result, P2P has become the largest distributor of authorized content on the Internet, with an average of more than 50 million transactions per month.
Other commercial applications include video streaming, video on demand, instant messaging ("IM"), and use of computers to provide telecommunications service through voice-over-Internet protocol ("VoIP"). Further, P2P technology is used to back up storage of documents and other digital content, and for intra-business collaborative project management. But by far the most common use of P2P technology — and the use generating the most attention — is consumers downloading P2P file-sharing software programs in order to access files stored on other consumers' computers, including music, movies, television programs, videogames, software, and pornography. Using these programs, consumers also can make their own personal files available for sharing with other users.
There are also academic and other non-commercial "collaborative" applications of P2P technology. The LionShare project at Pennsylvania State University, for example, is a closed P2P network designed to facilitate academic research. The network is secure, and all users must be authenticated and authorized in order to access it. LionShare merges secure and expanded electronic file-exchange capabilities with information gathering tools into a single, open-source application, enabling staff and students to search for information both within the network and among standard information repositories that exist outside the network. Faculty and students also can publish their work on the network.
P2P technology also is being used in certain data processing functions in the applied mathematics and medical research contexts. Other uses include the non-commercial distribution of software, writing, art, photography, or other data by publishers who do not wish to charge for the content — for example, the free distribution of electronic books to enhance literacy, and the dissemination of free academic curricula such as music lessons from a college of music.
Applications of P2P technology by government include NASA's use of BitTorrent as a download mechanism for its World Wind program, which allows users to access NASA satellite imagery to "virtually" visit any place in the world. NASA's Jet Propulsion Laboratory and the University of Maryland have also begun using P2P technology, and Boeing is using the technology in developing combat support software systems for the U.S. Army.
Future uses of P2P technology
Participants stated that P2P file-sharing technology can substantially reduce costs and enhance efficiencies. In the business environment, for example, using P2P technology to eliminate the need to house data, such as accounting data and inventory data, in centralized servers can save on storage space and costs. Such use also can yield savings on maintenance and energy costs related to data retrieval, sharing, and processing. P2P also facilitates faster downloading and exchange of files, which benefits users.
These aspects of P2P technology hold promise for novel future applications. For example, P2P provides the potential to utilize the "untapped resources" of computers in people's homes and offices, including unused storage, central processing unit capacity, and bandwidth when the computers are not in use. Although participants generally stated that P2P technology will lead to novel applications, little information was provided describing what these applications are likely to be and what economic effects they are likely to have.
The benefits of P2P technology appear to increase as the number of users increases. Economists call such a phenomenon "network effects" — that is, certain products become more useful as more and more people use them. The viability of future applications likely will depend in part on how P2P technology's benefits balance out compared to its potentially significant side effects, such as copyright infringement and other risks, including viruses and spyware.
|“||The advantage of peer-to-peer networks over information networks of other types shows up in their substantial and growing popularity. Because they need no central computer server to mediate the exchange of information or files among users, the high-bandwidth communications capacity for a server may be dispensed with, and the need for costly server storage space is eliminated. Since copies of a file (particularly a popular one) are available on many users’ computers, file requests and retrievals may be faster than on other types of networks, and since file exchanges do not travel through a server, communications can take place between any computers that remain connected to the network without risk that a glitch in the server will disable the network in its entirety. Given these benefits in security, cost, and efficiency, peer-to-peer networks are employed to store and distribute electronic files by universities, government agencies, corporations, and libraries, among others.||”|
|“||Peer-to-peer networks have disadvantages as well. Searches on peer-to-peer networks may not reach and uncover all available files because search requests may not be transmitted to every computer on the network. There may be redundant copies of popular files. The creator of the software has no incentive to minimize storage or bandwidth consumption, the costs of which are borne by every user of the network. Most relevant here, it is more difficult to control the content of files available for retrieval and the behavior of users.||”|
P2P file-sharing networks have valid uses, but they also enable users to easily search for, obtain, possess, and/or distribute a variety of illegal content. An individual who uses P2P may possess a combination of illegal material and illegally obtained data, such as —
- Child pornography.
- Copyrighted material (music, movies, videogames, photographs, software).
- Intellectual property/trade secrets.
- Financial information (credit card numbers, bank account information).
- Personal identifying information (social security number, date of birth, driver's license).
P2P file-sharing programs allow computers to download files and make them available to other users on the network. P2P users can designate the disk drives and folders from which files can be shared. In turn, other users can download and view any files stored in these designated areas.
People who use P2P file-sharing software can inadvertently share files. They might accidentally choose to share drives or folders that contain sensitive information, or they could save a private file to a shared drive or folder by mistake, making that private file available to others. In addition, viruses and other malware can change the drives or folders designated for sharing, putting private files at risk. As a result, instead of just sharing music, a user's personal tax returns, private medical records or work documents could end up in general circulation on P2P networks. Once a user on a P2P network downloads someone else’s files, the files can’t be retrieved or deleted. What's more, files can be shared among computers long after they have been deleted from the original source computer. And if there are security flaws or vulnerabilities in the P2P file-sharing software or on an organization’s network, the P2P program could open the door to attacks on other computers on the network.
- A&M Records v. Napster
- Capitol Records v. Thomas
- In re Aimster Copyright Litigation
- MGM v. Grokster
- U.S. v. Lewis
- The Evolution of Untethered Communications, at 186.
- Reputation-based Systems: A Security Analysis, at 8.
- There are no P2P “networks” but only "communities" of users who have downloaded and use peer-to-peer software individually.
- Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545 U.S. 913, 920 (2005)(full-text) (footnote omitted).
- U.N. Encryption Report, at 5 n.3.
- Id. at 920 n.1.
|
<urn:uuid:fafa1491-9a0d-4c3d-83c8-4394b653bea8>
|
CC-MAIN-2022-33
|
https://itlaw.fandom.com/wiki/Peer-to-peer
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00674.warc.gz
|
en
| 0.920727
| 2,717
| 4.09375
| 4
|
Fibrosis and defective muscle regeneration can hamper the functional recovery of the soft palate muscles after cleft palate repair. This causes persistent problems in speech, swallowing, and sucking. In vitro culture systems that allow the study of satellite cells (myogenic stem cells) from head muscles are crucial to develop new therapies based on tissue engineering to promote muscle regeneration after surgery. These systems will offer new perspectives for the treatment of cleft palate patients. A protocol for the isolation, culture and differentiation of satellite cells from head muscles is presented. The isolation is based on enzymatic digestion and trituration to release the satellite cells. In addition, this protocol comprises an innovative method using extracellular matrix gel coatings of millimeter size, which requires only low numbers of satellite cells for differentiation assays.
21 Related JoVE Articles!
Quantification of Orofacial Phenotypes in Xenopus
Institutions: Virginia Commonwealth University.
has become an important tool for dissecting the mechanisms governing craniofacial development and defects. A method to quantify orofacial development will allow for more rigorous analysis of orofacial phenotypes upon abrogation with substances that can genetically or molecularly manipulate gene expression or protein function. Using two dimensional images of the embryonic heads, traditional size dimensions-such as orofacial width, height and area- are measured. In addition, a roundness measure of the embryonic mouth opening is used to describe the shape of the mouth. Geometric morphometrics of these two dimensional images is also performed to provide a more sophisticated view of changes in the shape of the orofacial region. Landmarks are assigned to specific points in the orofacial region and coordinates are created. A principle component analysis is used to reduce landmark coordinates to principle components that then discriminate the treatment groups. These results are displayed as a scatter plot in which individuals with similar orofacial shapes cluster together. It is also useful to perform a discriminant function analysis, which statistically compares the positions of the landmarks between two treatment groups. This analysis is displayed on a transformation grid where changes in landmark position are viewed as vectors. A grid is superimposed on these vectors so that a warping pattern is displayed to show where significant landmark positions have changed. Shape changes in the discriminant function analysis are based on a statistical measure, and therefore can be evaluated by a p-value. This analysis is simple and accessible, requiring only a stereoscope and freeware software, and thus will be a valuable research and teaching resource.
Developmental Biology, Issue 93, Orofacial quantification, geometric morphometrics, Xenopus, orofacial development, orofacial defects, shape changes, facial dimensions
Visualization of Craniofacial Development in the sox10: kaede Transgenic Zebrafish Line Using Time-lapse Confocal Microscopy
Institutions: Massachusetts General Hospital.
Vertebrate palatogenesis is a highly choreographed and complex developmental process, which involves migration of cranial neural crest (CNC) cells, convergence and extension of facial prominences, and maturation of the craniofacial skeleton. To study the contribution of the cranial neural crest to specific regions of the zebrafish palate a sox10: kaede transgenic zebrafish line was generated. Sox10 provides lineage restriction of the kaede reporter protein to the neural crest, thereby making the cell labeling a more precise process than traditional dye or reporter mRNA injection. Kaede is a photo-convertible protein that turns from green to red after photo activation and makes it possible to follow cells precisely. The sox10: kaede transgenic line was used to perform lineage analysis to delineate CNC cell populations that give rise to maxillary versus mandibular elements and illustrate homology of facial prominences to amniotes. This protocol describes the steps to generate a live time-lapse video of a sox10: kaede zebrafish embryo. Development of the ethmoid plate will serve as a practical example. This protocol can be applied to making a time-lapse confocal recording of any kaede or similar photoconvertible reporter protein in transgenic zebrafish. Furthermore, it can be used to capture not only normal, but also abnormal development of craniofacial structures in the zebrafish mutants.
Developmental Biology, Issue 79, Craniofacial Abnormalities, Jaw Abnormalities, Cleft Palate, Craniofacial Abnormalities, Maxillofacial Abnormalities, Reconstructive Surgical Procedures, Developmental Biology, Embryology, Congenital, Hereditary, and Neonatal Diseases and Abnormalities, Craniofacial development, cranial neural crest, confocal microscopy, fate mapping, cell lineage analysis, sox10, kaede, photoconversion, zebrafish, palate
Construction of Vapor Chambers Used to Expose Mice to Alcohol During the Equivalent of all Three Trimesters of Human Development
Institutions: University of New Mexico Health Sciences Center.
Exposure to alcohol during development can result in a constellation of morphological and behavioral abnormalities that are collectively known as Fetal Alcohol Spectrum Disorders (FASDs). At the most severe end of the spectrum is Fetal Alcohol Syndrome (FAS), characterized by growth retardation, craniofacial dysmorphology, and neurobehavioral deficits. Studies with animal models, including rodents, have elucidated many molecular and cellular mechanisms involved in the pathophysiology of FASDs. Ethanol administration to pregnant rodents has been used to model human exposure during the first and second trimesters of pregnancy. Third trimester ethanol consumption in humans has been modeled using neonatal rodents. However, few rodent studies have characterized the effect of ethanol exposure during the equivalent to all three trimesters of human pregnancy, a pattern of exposure that is common in pregnant women. Here, we show how to build vapor chambers from readily obtainable materials that can each accommodate up to six standard mouse cages. We describe a vapor chamber paradigm that can be used to model exposure to ethanol, with minimal handling, during all three trimesters. Our studies demonstrate that pregnant dams developed significant metabolic tolerance to ethanol. However, neonatal mice did not develop metabolic tolerance and the number of fetuses, fetus weight, placenta weight, number of pups/litter, number of dead pups/litter, and pup weight were not significantly affected by ethanol exposure. An important advantage of this paradigm is its applicability to studies with genetically-modified mice. Additionally, this paradigm minimizes handling of animals, a major confound in fetal alcohol research.
Medicine, Issue 89, fetal, ethanol, exposure, paradigm, vapor, development, alcoholism, teratogenic, animal, mouse, model
Inhibitory Synapse Formation in a Co-culture Model Incorporating GABAergic Medium Spiny Neurons and HEK293 Cells Stably Expressing GABAA Receptors
Institutions: University College London.
Inhibitory neurons act in the central nervous system to regulate the dynamics and spatio-temporal co-ordination of neuronal networks. GABA (γ-aminobutyric acid) is the predominant inhibitory neurotransmitter in the brain. It is released from the presynaptic terminals of inhibitory neurons within highly specialized intercellular junctions known as synapses, where it binds to GABAA
Rs) present at the plasma membrane of the synapse-receiving, postsynaptic neurons. Activation of these GABA-gated ion channels leads to influx of chloride resulting in postsynaptic potential changes that decrease the probability that these neurons will generate action potentials.
During development, diverse types of inhibitory neurons with distinct morphological, electrophysiological and neurochemical characteristics have the ability to recognize their target neurons and form synapses which incorporate specific GABAA
Rs subtypes. This principle of selective innervation of neuronal targets raises the question as to how the appropriate synaptic partners identify each other.
To elucidate the underlying molecular mechanisms, a novel in vitro
co-culture model system was established, in which medium spiny GABAergic neurons, a highly homogenous population of neurons isolated from the embryonic striatum, were cultured with stably transfected HEK293 cell lines that express different GABAA
R subtypes. Synapses form rapidly, efficiently and selectively in this system, and are easily accessible for quantification. Our results indicate that various GABAA
R subtypes differ in their ability to promote synapse formation, suggesting that this reduced in vitro
model system can be used to reproduce, at least in part, the in vivo
conditions required for the recognition of the appropriate synaptic partners and formation of specific synapses. Here the protocols for culturing the medium spiny neurons and generating HEK293 cells lines expressing GABAA
Rs are first described, followed by detailed instructions on how to combine these two cell types in co-culture and analyze the formation of synaptic contacts.
Neuroscience, Issue 93, Developmental neuroscience, synaptogenesis, synaptic inhibition, co-culture, stable cell lines, GABAergic, medium spiny neurons, HEK 293 cell line
Optimized Ex-ovo Culturing of Chick Embryos to Advanced Stages of Development
Institutions: Mount Saint Vincent University.
Research in anatomy, embryology, and developmental biology has largely relied on the use of model organisms. In order to study development in live embryos model organisms, such as the chicken, are often used. The chicken is an excellent model organism due to its low cost and minimal maintenance, however they present observational challenges because they are enclosed in an opaque eggshell. In order to properly view the embryo as it develops, the shell must be windowed or removed. Both windowing and ex ovo
techniques have been developed to assist researchers in the study of embryonic development. However, each of the methods has limitations and challenges. Here, we present a simple, optimized ex ovo
culture technique for chicken embryos that enables the observation of embryonic development from stage HH 19 into late stages of development (HH 40), when many organs have developed. This technique is easy to adopt in both undergraduate classes and more advanced research laboratories where embryo manipulations are conducted.
Developmental Biology, Issue 95, Shell-less culture, microscopy, chicken embryos, manipulations, bead implantation, culturing, methodology
Fluorescence-quenching of a Liposomal-encapsulated Near-infrared Fluorophore as a Tool for In Vivo Optical Imaging
Institutions: Jena University Hospital, Friedrich-Schiller-University Jena, Jena University Hospital.
Optical imaging offers a wide range of diagnostic modalities and has attracted a lot of interest as a tool for biomedical imaging. Despite the enormous number of imaging techniques currently available and the progress in instrumentation, there is still a need for highly sensitive probes that are suitable for in vivo
imaging. One typical problem of available preclinical fluorescent probes is their rapid clearance in vivo
, which reduces their imaging sensitivity. To circumvent rapid clearance, increase number of dye molecules at the target site, and thereby reduce background autofluorescence, encapsulation of the near-infrared fluorescent dye, DY-676-COOH in liposomes and verification of its potential for in vivo
imaging of inflammation was done. DY-676 is known for its ability to self-quench at high concentrations. We first determined the concentration suitable for self-quenching, and then encapsulated this quenching concentration into the aqueous interior of PEGylated liposomes. To substantiate the quenching and activation potential of the liposomes we use a harsh freezing method which leads to damage of liposomal membranes without affecting the encapsulated dye. The liposomes characterized by a high level of fluorescence quenching were termed Lip-Q. We show by experiments with different cell lines that uptake of Lip-Q is predominantly by phagocytosis which in turn enabled the characterization of its potential as a tool for in vivo
imaging of inflammation in mice models. Furthermore, we use a zymosan-induced edema model in mice to substantiate the potential of Lip-Q in optical imaging of inflammation in vivo
. Considering possible uptake due to inflammation-induced enhanced permeability and retention (EPR) effect, an always-on liposome formulation with low, non-quenched concentration of DY-676-COOH (termed Lip-dQ) and the free DY-676-COOH were compared with Lip-Q in animal trials.
Bioengineering, Issue 95, Drug-delivery, Liposomes, Fluorochromes, Fluorescence-quenching, Optical imaging, Inflammation
Adapting Human Videofluoroscopic Swallow Study Methods to Detect and Characterize Dysphagia in Murine Disease Models
Institutions: University of Missouri, University of Missouri, University of Missouri.
This study adapted human videofluoroscopic swallowing study (VFSS) methods for use with murine disease models for the purpose of facilitating translational dysphagia research. Successful outcomes are dependent upon three critical components: test chambers that permit self-feeding while standing unrestrained in a confined space, recipes that mask the aversive taste/odor of commercially-available oral contrast agents, and a step-by-step test protocol that permits quantification of swallow physiology. Elimination of one or more of these components will have a detrimental impact on the study results. Moreover, the energy level capability of the fluoroscopy system will determine which swallow parameters can be investigated. Most research centers have high energy fluoroscopes designed for use with people and larger animals, which results in exceptionally poor image quality when testing mice and other small rodents. Despite this limitation, we have identified seven VFSS parameters that are consistently quantifiable in mice when using a high energy fluoroscope in combination with the new murine VFSS protocol. We recently obtained a low energy fluoroscopy system with exceptionally high imaging resolution and magnification capabilities that was designed for use with mice and other small rodents. Preliminary work using this new system, in combination with the new murine VFSS protocol, has identified 13 swallow parameters that are consistently quantifiable in mice, which is nearly double the number obtained using conventional (i.e.,
high energy) fluoroscopes. Identification of additional swallow parameters is expected as we optimize the capabilities of this new system. Results thus far demonstrate the utility of using a low energy fluoroscopy system to detect and quantify subtle changes in swallow physiology that may otherwise be overlooked when using high energy fluoroscopes to investigate murine disease models.
Medicine, Issue 97, mouse, murine, rodent, swallowing, deglutition, dysphagia, videofluoroscopy, radiation, iohexol, barium, palatability, taste, translational, disease models
Forward Genetics Screens Using Macrophages to Identify Toxoplasma gondii Genes Important for Resistance to IFN-γ-Dependent Cell Autonomous Immunity
Institutions: New York Medical College.
the causative agent of toxoplasmosis, is an obligate intracellular protozoan pathogen. The parasite invades and replicates within virtually any warm blooded vertebrate cell type. During parasite invasion of a host cell, the parasite creates a parasitophorous vacuole (PV) that originates from the host cell membrane independent of phagocytosis within which the parasite replicates. While IFN-dependent-innate and cell mediated immunity is important for eventual control of infection, innate immune cells, including neutrophils, monocytes and dendritic cells, can also serve as vehicles for systemic dissemination of the parasite early in infection. An approach is described that utilizes the host innate immune response, in this case macrophages, in a forward genetic screen to identify parasite mutants with a fitness defect in infected macrophages following activation but normal invasion and replication in naïve macrophages. Thus, the screen isolates parasite mutants that have a specific defect in their ability to resist the effects of macrophage activation. The paper describes two broad phenotypes of mutant parasites following activation of infected macrophages: parasite stasis versus parasite degradation, often in amorphous vacuoles. The parasite mutants are then analyzed to identify the responsible parasite genes specifically important for resistance to induced mediators of cell autonomous immunity. The paper presents a general approach for the forward genetics screen that, in theory, can be modified to target parasite genes important for resistance to specific antimicrobial mediators. It also describes an approach to evaluate the specific macrophage antimicrobial mediators to which the parasite mutant is susceptible. Activation of infected macrophages can also promote parasite differentiation from the tachyzoite to bradyzoite stage that maintains chronic infection. Therefore, methodology is presented to evaluate the importance of the identified parasite gene to establishment of chronic infection.
Immunology, Issue 97, Toxoplasma, macrophages, innate immunity, intracellular pathogen, immune evasion, infectious disease, forward genetics, parasite
HeLa Based Cell Free Expression Systems for Expression of Plasmodium Rhoptry Proteins
Institutions: Cleveland State University.
Malaria causes significant global morbidity and mortality. No routine vaccine is currently available. One of the major reasons for lack of a vaccine is the challenge of identifying suitable vaccine candidates. Malarial proteins expressed using prokaryotic and eukaryotic cell based expression systems are poorly glycosylated, generally insoluble and undergo improper folding leading to reduced immunogenicity. The wheat germ, rabbit reticulocyte lysate and Escherichia coli
lysate cell free expression systems are currently used for expression of malarial proteins. However, the length of expression time and improper glycosylation of proteins still remains a challenge. We demonstrate expression of Plasmodium
proteins in vitro
using HeLa based cell free expression systems, termed “in vitro
human cell free expression systems”. The 2 HeLa based cell free expression systems transcribe mRNA in 75 min and 3 µl of transcribed mRNA is sufficient to translate proteins in 90 min. The 1-step expression system is a transcription and translation coupled expression system; the transcription and co-translation occurs in 3 hr. The process can also be extended for 6 hr by providing additional energy. In the 2-step expression system, mRNA is first transcribed and then added to the translation mix for protein expression. We describe how to express malaria proteins; a hydrophobic PF3D7_0114100 Maurer’s Cleft – 2 transmembrane (PfMC-2TM) protein, a hydrophilic PF3D7_0925900 protein and an armadillo repeats containing protein PF3D7_1361800, using the HeLa based cell free expression system. The proteins are expressed in micro volumes employing 2-step and 1-step expression strategies. An affinity purification method to purify 25 µl of proteins expressed using the in vitro
human cell free expression system is also described. Protein yield is determined by Bradford’s assay and the expressed and purified proteins can be confirmed by western blotting analysis. Expressed recombinant proteins can be used for immunizations, immunoassays and protein sequencing.
Biochemistry, Issue 100, Cell free in vitro transcription-translation, HeLa cell free expression, rhoptry proteins, mammalian cell free expression system, Plasmodium falciparum, Pro Bond affinity purification
Modeling Astrocytoma Pathogenesis In Vitro and In Vivo Using Cortical Astrocytes or Neural Stem Cells from Conditional, Genetically Engineered Mice
Institutions: University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, Emory University School of Medicine, University of North Carolina School of Medicine.
Current astrocytoma models are limited in their ability to define the roles of oncogenic mutations in specific brain cell types during disease pathogenesis and their utility for preclinical drug development. In order to design a better model system for these applications, phenotypically wild-type cortical astrocytes and neural stem cells (NSC) from conditional, genetically engineered mice (GEM) that harbor various combinations of floxed oncogenic alleles were harvested and grown in culture. Genetic recombination was induced in vitro
using adenoviral Cre-mediated recombination, resulting in expression of mutated oncogenes and deletion of tumor suppressor genes. The phenotypic consequences of these mutations were defined by measuring proliferation, transformation, and drug response in vitro
. Orthotopic allograft models, whereby transformed cells are stereotactically injected into the brains of immune-competent, syngeneic littermates, were developed to define the role of oncogenic mutations and cell type on tumorigenesis in vivo
. Unlike most established human glioblastoma cell line xenografts, injection of transformed GEM-derived cortical astrocytes into the brains of immune-competent littermates produced astrocytomas, including the most aggressive subtype, glioblastoma, that recapitulated the histopathological hallmarks of human astrocytomas, including diffuse invasion of normal brain parenchyma. Bioluminescence imaging of orthotopic allografts from transformed astrocytes engineered to express luciferase was utilized to monitor in vivo
tumor growth over time. Thus, astrocytoma models using astrocytes and NSC harvested from GEM with conditional oncogenic alleles provide an integrated system to study the genetics and cell biology of astrocytoma pathogenesis in vitro
and in vivo
and may be useful in preclinical drug development for these devastating diseases.
Neuroscience, Issue 90, astrocytoma, cortical astrocytes, genetically engineered mice, glioblastoma, neural stem cells, orthotopic allograft
Stimulating the Lip Motor Cortex with Transcranial Magnetic Stimulation
Institutions: University of Oxford.
Transcranial magnetic stimulation (TMS) has proven to be a useful tool in investigating the role of the articulatory motor cortex in speech perception. Researchers have used single-pulse and repetitive TMS to stimulate the lip representation in the motor cortex. The excitability of the lip motor representation can be investigated by applying single TMS pulses over this cortical area and recording TMS-induced motor evoked potentials (MEPs) via electrodes attached to the lip muscles (electromyography; EMG). Larger MEPs reflect increased cortical excitability. Studies have shown that excitability increases during listening to speech as well as during viewing speech-related movements. TMS can be used also to disrupt the lip motor representation. A 15-min train of low-frequency sub-threshold repetitive stimulation has been shown to suppress motor excitability for a further 15-20 min. This TMS-induced disruption of the motor lip representation impairs subsequent performance in demanding speech perception tasks and modulates auditory-cortex responses to speech sounds. These findings are consistent with the suggestion that the motor cortex contributes to speech perception. This article describes how to localize the lip representation in the motor cortex and how to define the appropriate stimulation intensity for carrying out both single-pulse and repetitive TMS experiments.
Behavior, Issue 88, electromyography, motor cortex, motor evoked potential, motor excitability, speech, repetitive TMS, rTMS, virtual lesion, transcranial magnetic stimulation
Analysis of Nephron Composition and Function in the Adult Zebrafish Kidney
Institutions: University of Notre Dame.
The zebrafish model has emerged as a relevant system to study kidney development, regeneration and disease. Both the embryonic and adult zebrafish kidneys are composed of functional units known as nephrons, which are highly conserved with other vertebrates, including mammals. Research in zebrafish has recently demonstrated that two distinctive phenomena transpire after adult nephrons incur damage: first, there is robust regeneration within existing nephrons that replaces the destroyed tubule epithelial cells; second, entirely new nephrons are produced from renal progenitors in a process known as neonephrogenesis. In contrast, humans and other mammals seem to have only a limited ability for nephron epithelial regeneration. To date, the mechanisms responsible for these kidney regeneration phenomena remain poorly understood. Since adult zebrafish kidneys undergo both nephron epithelial regeneration and neonephrogenesis, they provide an outstanding experimental paradigm to study these events. Further, there is a wide range of genetic and pharmacological tools available in the zebrafish model that can be used to delineate the cellular and molecular mechanisms that regulate renal regeneration. One essential aspect of such research is the evaluation of nephron structure and function. This protocol describes a set of labeling techniques that can be used to gauge renal composition and test nephron functionality in the adult zebrafish kidney. Thus, these methods are widely applicable to the future phenotypic characterization of adult zebrafish kidney injury paradigms, which include but are not limited to, nephrotoxicant exposure regimes or genetic methods of targeted cell death such as the nitroreductase mediated cell ablation technique. Further, these methods could be used to study genetic perturbations in adult kidney formation and could also be applied to assess renal status during chronic disease modeling.
Cellular Biology, Issue 90,
zebrafish; kidney; nephron; nephrology; renal; regeneration; proximal tubule; distal tubule; segment; mesonephros; physiology; acute kidney injury (AKI)
Modeling Neural Immune Signaling of Episodic and Chronic Migraine Using Spreading Depression In Vitro
Institutions: The University of Chicago Medical Center, The University of Chicago Medical Center.
Migraine and its transformation to chronic migraine are healthcare burdens in need of improved treatment options. We seek to define how neural immune signaling modulates the susceptibility to migraine, modeled in vitro
using spreading depression (SD), as a means to develop novel therapeutic targets for episodic and chronic migraine. SD is the likely cause of migraine aura and migraine pain. It is a paroxysmal loss of neuronal function triggered by initially increased neuronal activity, which slowly propagates within susceptible brain regions. Normal brain function is exquisitely sensitive to, and relies on, coincident low-level immune signaling. Thus, neural immune signaling likely affects electrical activity of SD, and therefore migraine. Pain perception studies of SD in whole animals are fraught with difficulties, but whole animals are well suited to examine systems biology aspects of migraine since SD activates trigeminal nociceptive pathways. However, whole animal studies alone cannot be used to decipher the cellular and neural circuit mechanisms of SD. Instead, in vitro
preparations where environmental conditions can be controlled are necessary. Here, it is important to recognize limitations of acute slices and distinct advantages of hippocampal slice cultures. Acute brain slices cannot reveal subtle changes in immune signaling since preparing the slices alone triggers: pro-inflammatory changes that last days, epileptiform behavior due to high levels of oxygen tension needed to vitalize the slices, and irreversible cell injury at anoxic slice centers.
In contrast, we examine immune signaling in mature hippocampal slice cultures since the cultures closely parallel their in vivo
counterpart with mature trisynaptic function; show quiescent astrocytes, microglia, and cytokine levels; and SD is easily induced in an unanesthetized preparation. Furthermore, the slices are long-lived and SD can be induced on consecutive days without injury, making this preparation the sole means to-date capable of modeling the neuroimmune consequences of chronic SD, and thus perhaps chronic migraine. We use electrophysiological techniques and non-invasive imaging to measure
neuronal cell and circuit functions coincident with SD. Neural immune gene expression variables are measured with qPCR screening, qPCR arrays, and, importantly, use of cDNA preamplification for detection of ultra-low level targets such as interferon-gamma using whole, regional, or specific cell enhanced (via laser dissection microscopy) sampling. Cytokine cascade signaling is further assessed with multiplexed phosphoprotein related targets with gene expression and phosphoprotein changes confirmed via cell-specific immunostaining. Pharmacological and siRNA strategies are used to mimic
SD immune signaling.
Neuroscience, Issue 52, innate immunity, hormesis, microglia, T-cells, hippocampus, slice culture, gene expression, laser dissection microscopy, real-time qPCR, interferon-gamma
Biochemical Reconstitution of Steroid Receptor•Hsp90 Protein Complexes and Reactivation of Ligand Binding
Institutions: Seattle University, Seattle University, University of Washington.
Hsp90 is an essential and highly abundant molecular chaperone protein that has been found to regulate more than 150 eukaryotic signaling proteins, including transcription factors (e.g. nuclear receptors, p53) and protein kinases (e.g. Src, Raf, Akt kinase) involved in cell cycling, tumorigenesis, apoptosis, and multiple eukaryotic signaling pathways 1,2
. Of these many 'client' proteins for hsp90, the assembly of steroid receptor•hsp90 complexes is the best defined (Figure 1
). We present here an adaptable glucocorticoid receptor (GR) immunoprecipitation assay and in vitro
GR•hsp90 reconstitution method that may be readily used to probe eukaryotic hsp90 functional activity, hsp90-mediated steroid receptor ligand binding, and molecular chaperone cofactor requirements. For example, this assay can be used to test hsp90 cofactor requirements and the effects of adding exogenous compounds to the reconstitution process.
The GR has been a particularly useful system for studying hsp90 because the receptor must be bound to hsp90 to have an open ligand binding cleft that is accessible to steroid 3
. Endogenous, unliganded GR is present in the cytoplasm of mammalian cells noncovalently bound to hsp90. As found in the endogenous GR•hsp90 heterocomplex, the GR ligand binding cleft is open and capable of binding steroid. If hsp90 dissociates from the GR or if its function is inhibited, the receptor is unable to bind steroid and requires reconstitution of the GR•hsp90 heterocomplex before steroid binding activity is restored 4
. GR can be immunoprecipitated from cell cytosol using a monoclonal antibody, and proteins such as hsp90 complexed to the GR can be assayed by western blot. Steroid binding activity of the immunoprecipitated GR can be determined by incubating the immunopellet with [3
Previous experiments have shown hsp90-mediated opening of the GR ligand binding cleft requires hsp70, a second molecular chaperone also essential for eukaryotic cell viability. Biochemical activity of hsp90 and hsp70 are catalyzed by co-chaperone proteins Hop, hsp40, and p23 5
. A multiprotein chaperone machinery containing hsp90, hsp70, Hop, and hsp40 are endogenously present in eukaryotic cell cytoplasm, and reticulocyte lysate provides a chaperone-rich protein source 6
In the method presented, GR is immunoadsorbed from cell cytosol and stripped of the endogenous hsp90/hsp70 chaperone machinery using mild salt conditions. The salt-stripped GR is then incubated with reticulocyte lysate, ATP, and K+
, which results in the reconstitution of the GR•hsp90 heterocomplex and reactivation of steroid binding activity 7
. This method can be utilized to test the effects of various chaperone cofactors, novel proteins, and experimental hsp90 or GR inhibitors in order to determine their functional significance on hsp90-mediated steroid binding 8-11
Biochemistry, Issue 55, glucocorticoid receptor, hsp90, molecular chaperone protein, in vitro reconstitution, steroid binding, biochemistry, immunoadsorption, immunoprecipitation, Experion, western blot
Assessing Teratogenic Changes in a Zebrafish Model of Fetal Alcohol Exposure
Institutions: Children's Memorial Research Center, Northwestern University.
Fetal alcohol syndrome (FAS) is a severe manifestation of embryonic exposure to ethanol. It presents with characteristic defects to the face and organs, including mental retardation due to disordered and damaged brain development. Fetal alcohol spectrum disorder (FASD) is a term used to cover a continuum of birth defects that occur due to maternal alcohol consumption, and occurs in approximately 4% of children born in the United States. With 50% of child-bearing age women reporting consumption of alcohol, and half of all pregnancies being unplanned, unintentional exposure is a continuing issue2
. In order to best understand the damage produced by ethanol, plus produce a model with which to test potential interventions, we developed a model of developmental ethanol exposure using the zebrafish embryo. Zebrafish are ideal for this kind of teratogen study3-8
. Each pair lays hundreds of eggs, which can then be collected without harming the adult fish. The zebrafish embryo is transparent and can be readily imaged with any number of stains. Analysis of these embryos after exposure to ethanol at different doses and times of duration and application shows that the gross developmental defects produced by ethanol are consistent with the human birth defect. Described here are the basic techniques used to study and manipulate the zebrafish FAS model.
Medicine, Issue 61, Zebrafish, fetal alcohol exposure, Danio rerio, development, mRNA expression, morpholino, ethanol exposure
Postproduction Processing of Electrospun Fibres for Tissue Engineering
Institutions: University of Sheffield , University of Sheffield , University of Sheffield .
Electrospinning is a commonly used and versatile method to produce scaffolds (often biodegradable) for 3D tissue engineering.1, 2, 3
Many tissues in vivo
undergo biaxial distension to varying extents such as skin, bladder, pelvic floor and even the hard palate as children grow. In producing scaffolds for these purposes there is a need to develop scaffolds of appropriate biomechanical properties (whether achieved without or with cells) and which are sterile for clinical use. The focus of this paper is not how to establish basic electrospinning parameters (as there is extensive literature on electrospinning) but on how to modify spun scaffolds post production to make them fit for tissue engineering purposes - here thickness, mechanical properties and sterilisation (required for clinical use) are considered and we also describe how cells can be cultured on scaffolds and subjected to biaxial strain to condition them for specific applications.
Electrospinning tends to produce thin sheets; as the electrospinning collector becomes coated with insulating fibres it becomes a poor conductor such that fibres no longer deposit on it. Hence we describe approaches to produce thicker structures by heat or vapour annealing increasing the strength of scaffolds but not necessarily the elasticity. Sequential spinning of scaffolds of different polymers to achieve complex scaffolds is also described. Sterilisation methodologies can adversely affect strength and elasticity of scaffolds. We compare three methods for their effects on the biomechanical properties on electrospun scaffolds of poly lactic-co-glycolic acid (PLGA).
Imaging of cells on scaffolds and assessment of production of extracellular matrix (ECM) proteins by cells on scaffolds is described. Culturing cells on scaffolds in vitro
can improve scaffold strength and elasticity but the tissue engineering literature shows that cells often fail to produce appropriate ECM when cultured under static conditions. There are few commercial systems available that allow one to culture cells on scaffolds under dynamic conditioning regimes - one example is the Bose Electroforce 3100 which can be used to exert a conditioning programme on cells in scaffolds held using mechanical grips within a media filled chamber.4
An approach to a budget cell culture bioreactor for controlled distortion in 2 dimensions is described. We show that cells can be induced to produce elastin under these conditions. Finally assessment of the biomechanical properties of processed scaffolds cultured with or without cells is described.
Bioengineering, Issue 66, Materials Science, Biomedical Engineering, Tissue Engineering, Medicine, Chemistry, Electrospinning, bilayer, biaxial distension, heat and vapour annealing, mechanical testing, fibres
Separation of Mouse Embryonic Facial Ectoderm and Mesenchyme
Institutions: University of Colorado Denver Anschutz Medical Campus, University of Colorado Denver Anschutz Medical Campus.
Orofacial clefts are the most frequent craniofacial defects, which affect 1.5 in 1,000 newborns worldwide1,2
. Orofacial clefting is caused by abnormal facial development3
. In human and mouse, initial growth and patterning of the face relies on several small buds of tissue, the facial prominences4,5
. The face is derived from six main prominences: paired frontal nasal processes (FNP), maxillary prominences (MxP) and mandibular prominences (MdP). These prominences consist of swellings of mesenchyme that are encased in an overlying epithelium. Studies in multiple species have shown that signaling crosstalk between facial ectoderm and mesenchyme is critical for shaping the face6
. Yet, mechanistic details concerning the genes involved in these signaling relays are lacking. One way to gain a comprehensive understanding of gene expression, transcription factor binding, and chromatin marks associated with the developing facial ectoderm and mesenchyme is to isolate and characterize the separated tissue compartments.
Here we present a method for separating facial ectoderm and mesenchyme at embryonic day (E) 10.5, a critical developmental stage in mouse facial formation that precedes fusion of the prominences. Our method is adapted from the approach we have previously used for dissecting facial prominences7
. In this earlier study we had employed inbred C57BL/6 mice as this strain has become a standard for genetics, genomics and facial morphology8
. Here, though, due to the more limited quantities of tissue available, we have utilized the outbred CD-1 strain that is cheaper to purchase, more robust for husbandry, and tending to produce more embryos (12-18) per litter than any inbred mouse strain8
. Following embryo isolation, neutral protease Dispase II was used to treat the whole embryo. Then, the facial prominences were dissected out, and the facial ectoderm was separated from the mesenchyme. This method keeps both the facial ectoderm and mesenchyme intact. The samples obtained using this methodology can be used for techniques including protein detection, chromatin immunoprecipitation (ChIP) assay, microarray studies, and RNA-seq.
Developmental Biology, Issue 74, Biomedical Engineering, Bioengineering, Cellular Biology, Molecular Biology, Anatomy, Physiology, Surgery, Tissue Engineering, Embryo, Mammalian, Ectoderm, biology (general), Facial prominences, facial ectoderm, mesenchyme, Dispase II, orofacial clefts, facial development, mouse, animal model
Cell Population Analyses During Skin Carcinogenesis
Institutions: Indiana University.
Cancer development is a multiple-step process involving many cell types including cancer precursor cells, immune cells, fibroblasts and endothelial cells. Each type of cells undergoes signaling and functional changes during carcinogenesis. The current challenge for many cancer researchers is to dissect these changes in each cell type during the multiple-step process in vivo
. In the last few years, the authors have developed a set of procedures to isolate different cell populations during skin cancer development using K14creER/R26-SmoM2YFP
mice. The procedure is divided into 6 parts: 1) generating appropriate mice for the study (K14creER+
mice in this protocol); 2) inducing SmoM2YFP
expression in mouse skin; 3) preparing mouse skin biopsies; 4) isolating epidermis from skin; 5) preparing single cells from epidermis; 6) labeling single cell populations for flow cytometry analysis. Generation of sufficient number of mice with the right genotype is the limiting step in this protocol, which may take up to two months. The rest of steps take a few hours to a few days. Within this protocol, we also include a section for troubleshooting. Although we focus on skin cancer, this protocol may be modified to apply for other animal models of human diseases.
Cancer Biology, Issue 78, Medicine, Cellular Biology, Molecular Biology, Biomedical Engineering, Genetics, Anatomy, Physiology, Oncology, Cocarcinogenesis, animal models, Skin cancer, basal cell carcinoma, hedgehog, smoothened, keratinocyte, cancer, carcinogenesis, cells, cell culture, animal model
A Microplate Assay to Assess Chemical Effects on RBL-2H3 Mast Cell Degranulation: Effects of Triclosan without Use of an Organic Solvent
Institutions: University of Maine, Orono, University of Maine, Orono.
Mast cells play important roles in allergic disease and immune defense against parasites. Once activated (e.g.
by an allergen), they degranulate, a process that results in the exocytosis of allergic mediators. Modulation of mast cell degranulation by drugs and toxicants may have positive or adverse effects on human health. Mast cell function has been dissected in detail with the use of rat basophilic leukemia mast cells (RBL-2H3), a widely accepted model of human mucosal mast cells3-5
. Mast cell granule component and the allergic mediator β-hexosaminidase, which is released linearly in tandem with histamine from mast cells6
, can easily and reliably be measured through reaction with a fluorogenic substrate, yielding measurable fluorescence intensity in a microplate assay that is amenable to high-throughput studies1
. Originally published by Naal et al.1
, we have adapted this degranulation assay for the screening of drugs and toxicants and demonstrate its use here.
Triclosan is a broad-spectrum antibacterial agent that is present in many consumer products and has been found to be a therapeutic aid in human allergic skin disease7-11
, although the mechanism for this effect is unknown. Here we demonstrate an assay for the effect of triclosan on mast cell degranulation. We recently showed that triclosan strongly affects mast cell function2
. In an effort to avoid use of an organic solvent, triclosan is dissolved directly into aqueous buffer with heat and stirring, and resultant concentration is confirmed using UV-Vis spectrophotometry (using ε280
= 4,200 L/M/cm)12
. This protocol has the potential to be used with a variety of chemicals to determine their effects on mast cell degranulation, and more broadly, their allergic potential.
Immunology, Issue 81, mast cell, basophil, degranulation, RBL-2H3, triclosan, irgasan, antibacterial, β-hexosaminidase, allergy, Asthma, toxicants, ionophore, antigen, fluorescence, microplate, UV-Vis
Analyzing Craniofacial Morphogenesis in Zebrafish Using 4D Confocal Microscopy
Institutions: The University of Texas at Austin.
Time-lapse imaging is a technique that allows for the direct observation of the process of morphogenesis, or the generation of shape. Due to their optical clarity and amenability to genetic manipulation, the zebrafish embryo has become a popular model organism with which to perform time-lapse analysis of morphogenesis in living embryos. Confocal imaging of a live zebrafish embryo requires that a tissue of interest is persistently labeled with a fluorescent marker, such as a transgene or injected dye. The process demands that the embryo is anesthetized and held in place in such a way that healthy development proceeds normally. Parameters for imaging must be set to account for three-dimensional growth and to balance the demands of resolving individual cells while getting quick snapshots of development. Our results demonstrate the ability to perform long-term in vivo
imaging of fluorescence-labeled zebrafish embryos and to detect varied tissue behaviors in the cranial neural crest that cause craniofacial abnormalities. Developmental delays caused by anesthesia and mounting are minimal, and embryos are unharmed by the process. Time-lapse imaged embryos can be returned to liquid medium and subsequently imaged or fixed at later points in development. With an increasing abundance of transgenic zebrafish lines and well-characterized fate mapping and transplantation techniques, imaging any desired tissue is possible. As such, time-lapse in vivo
imaging combines powerfully with zebrafish genetic methods, including analyses of mutant and microinjected embryos.
Developmental Biology, Issue 83, zebrafish, neural crest, time-lapse, transgenic, morphogenesis, craniofacial, head, development, confocal, Microscopy, In vivo, movie
A Protocol for Comprehensive Assessment of Bulbar Dysfunction in Amyotrophic Lateral Sclerosis (ALS)
Institutions: University of Toronto, Sunnybrook Health Science Centre, University of Nebraska-Lincoln, University of Nebraska Medical Center, University of Toronto.
Improved methods for assessing bulbar impairment are necessary for expediting diagnosis of bulbar dysfunction in ALS, for predicting disease progression across speech subsystems, and for addressing the critical need for sensitive outcome measures for ongoing experimental treatment trials. To address this need, we are obtaining longitudinal profiles of bulbar impairment in 100 individuals based on a comprehensive instrumentation-based assessment that yield objective measures. Using instrumental approaches to quantify speech-related behaviors is very important in a field that has primarily relied on subjective, auditory-perceptual forms of speech assessment1
. Our assessment protocol measures performance across all of the speech subsystems, which include respiratory, phonatory (laryngeal), resonatory (velopharyngeal), and articulatory. The articulatory subsystem is divided into the facial components (jaw and lip), and the tongue. Prior research has suggested that each speech subsystem responds differently to neurological diseases such as ALS. The current protocol is designed to test the performance of each speech subsystem as independently from other subsystems as possible. The speech subsystems are evaluated in the context of more global changes to speech performance. These speech system level variables include speaking rate and intelligibility of speech.
The protocol requires specialized instrumentation, and commercial and custom software. The respiratory, phonatory, and resonatory subsystems are evaluated using pressure-flow (aerodynamic) and acoustic methods. The articulatory subsystem is assessed using 3D motion tracking techniques. The objective measures that are used to quantify bulbar impairment have been well established in the speech literature and show sensitivity to changes in bulbar function with disease progression. The result of the assessment is a comprehensive, across-subsystem performance profile for each participant. The profile, when compared to the same measures obtained from healthy controls, is used for diagnostic purposes. Currently, we are testing the sensitivity and specificity of these measures for diagnosis of ALS and for predicting the rate of disease progression. In the long term, the more refined endophenotype of bulbar ALS derived from this work is expected to strengthen future efforts to identify the genetic loci of ALS and improve diagnostic and treatment specificity of the disease as a whole. The objective assessment that is demonstrated in this video may be used to assess a broad range of speech motor impairments, including those related to stroke, traumatic brain injury, multiple sclerosis, and Parkinson disease.
Medicine, Issue 48, speech, assessment, subsystems, bulbar function, amyotrophic lateral sclerosis
|
<urn:uuid:1fe2f1c6-5f7f-4432-a235-3f703e44fd01>
|
CC-MAIN-2016-44
|
http://www.jove.com/visualize/abstract/25793997/definition-critical-periods-for-hedgehog-pathway-antagonist-induced
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00324-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.900402
| 10,204
| 2.484375
| 2
|
Small Expenses Have Returned With the Economic Reactivation, What Are They And How Can We Reduce Them To Improve Personal Finances?.
To reduce ant expenses and improve personal finances, experts recommend applying practical strategies that will be of great help to mitigate these types of purchases and avoid money leaks. Photo: Freepik
LatiAmerican Post | Alexey Zhúkov
Listen to this article
Leer en español: No se arruine con la postpandemia, cuide sus gastos hormiga
The Covid 19 pandemic forced many to reduce small expenses that previously went unnoticed. What are these small expenses and how can we reduce them to improve personal finances?
Basically, small expenses are all those purchases that due to their relatively low cost are not taken into account, they are even purchases that people make unconsciously, those expenses that little by little empty the bank account and end up negatively impacting personal finances.
Their main characteristic is their inoffensive appearance, giving the impression that this type of expense does not affect our personal finances. In reality, they have a significant impact, especially in the long term, and can represent between 5% and 20% of the expenses of a person, and even ruin their financial situation.
There are cases in which people are not able to achieve their monetary objectives because of small expenses, even with good liquidity and financial solvency, they cannot advance in part thanks to bad economic habits.
During the pandemic, some of these expenses were reduced due to quarantines, restrictions, and the introduction of teleworking. However, today they are again invading people's financial pockets due to the economic reactivation.
To reduce small expenses and improve personal finances, experts recommend applying practical strategies that will be of great help to mitigate these types of purchases.
How can you reduce small expenses to improve personal finances?
It is important to identify these small expenses that consume your money, having full knowledge of these expenses will help control them.
After identifying them, you must establish the amount of money you want to allocate for this expense, for this it is necessary to budget and prevent these expenses from affecting personal finances. In some cases, it will not be necessary to eliminate them completely, but if it is important to keep these purchases at a minimum. For example, you can make coffee instead of buying it or prepare lunch at home to avoid spending money in restaurants.
Finally, avoid new small expenses by having knowledge of these small current purchases, how they arise and in what scenarios they occur. This will provide the necessary tools to identify if other expenses of this type are being incurred, keeping your personal economy in order.
Controlling small expenses will help to significantly improve your personal finances, because having controlled expenses will increase the flow of money and achieve the proposed objectives and goals. Of course, it is not about being stingy or depriving yourself of enjoying the money and the luxuries that it brings, but about knowing how to use it wisely so as not to fall into these types of expenses and alleviate the personal finances that have been so affected by the pandemic.
|
<urn:uuid:2d1ed88d-00ca-4005-99f9-da3469751ee0>
|
CC-MAIN-2022-33
|
https://latinamericanpost.com/37758-how-to-identify-and-reduce-small-expenses
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00071.warc.gz
|
en
| 0.953275
| 633
| 2.390625
| 2
|
Nateglinide is used alone or in combination with other medications to treat type 2 diabetes (condition in which the body does not use insulin normally and therefore cannot control the amount of sugar in the blood) in people whose diabetes cannot be controlled by diet and exercise alone. Nateglinide belongs to a class of drugs called meglitinides. Nateglinide helps your body regulate the amount of glucose (sugar) in your blood. It decreases the amount of glucose by stimulating the pancreas to release insulin.
Over time, people who have diabetes and high blood sugar can develop serious or life-threatening complications, including heart disease, stroke, kidney problems, nerve damage, and eye problems. Taking medication(s), making lifestyle changes (e.g., diet, exercise, quitting smoking), and regularly checking your blood sugar may help to manage your diabetes and improve your health. This therapy may also decrease your chances of having a heart attack, stroke, or other diabetes-related complications such as kidney failure, nerve damage (numb, cold legs or feet; decreased sexual ability in men and women), eye problems, including changes or loss of vision, or gum disease. Your doctor and other healthcare providers will talk to you about the best way to manage your diabetes.
Nateglinide comes as a tablet to take by mouth. It is usually taken three times daily. Take nateglinide any time from 30 minutes before a meal to just before the meal. If you skip a meal, you need to skip the dose of nateglinide. If you add a meal, add a dose of nateglinide. Your doctor may gradually increase your dose, depending on your response to nateglinide. Monitor your blood glucose closely. Follow the directions on your prescription label carefully, and ask your doctor or pharmacist to explain any part you do not understand. Take nateglinide exactly as directed. Do not take more or less of it or take it more often than directed by the package label or prescribed by your doctor.
Nateglinide controls diabetes but does not cure it. Continue to take nateglinide even if you feel well. Do not stop taking nateglinide without talking with your doctor.
This medication is sometimes prescribed for other uses; ask your doctor or pharmacist for more information.
Before taking nateglinide, tell your doctor and pharmacist if you are allergic to nateglinide or any other drugs.tell your doctor and pharmacist what prescription and nonprescription medications you are taking, especially albuterol (Proventil, Ventolin); allergy or cold medications; aspirin and nonsteroidal anti-inflammatory drugs such as ibuprofen (Advil, Motrin) or naproxen (Aleve, Naprosyn); beta-blockers such as propranolol (Inderal); chloramphenicol (Chloromycetin); chlorpromazine (Thorazine); corticosteroids such as dexamethasone (Decadron), methylprednisolone (Medrol), or prednisone (Deltasone, Orasone); diuretics ('water pills'); epinephrine; estrogens; fluphenazine (Prolixin); isoniazid (Rifamate); medications that contain alcohol or sugar; mesoridazine (Serentil); niacin; oral contraceptives (birth control pills); perphenazine (Trilafon); phenelzine (Nardil); probenecid (Benemid); prochlorperazine (Compazine); promazine (Sparine); promethazine (Phenergan); terbutaline (Brethine, Bricanyl); thioridazine (Mellaril); thyroid medication; tranylcypromine (Parnate); trifluoperazine (Stelazine); triflupromazine (Vesprin); trimeprazine (Temaril); and vitamins or herbal products.tell your doctor if you have or have ever had liver or pituitary disease, adrenal insufficiency, diabetic ketoacidosis, neuropathy (disease of the nervous system), or if you have been told you have type 1 diabetes mellitus (condition in which the body does not produce insulin and therefore cannot control the amount of sugar in the blood) .tell your doctor if you are pregnant, plan to become pregnant, or are breast-feeding. If you become pregnant while taking nateglinide, call your doctor.if you are having surgery, including dental surgery, tell the doctor or dentist that you are taking nateglinide.tell your doctor if you have fever, infection, injury, or illness with vomiting or diarrhea. These may affect your blood sugar level.
Be sure to follow all exercise and dietary recommendations made by your doctor or dietitian. Calorie reduction, weight loss, and exercise will help to control your diabetes. It is important to eat a healthful diet. Alcohol may cause a decrease in blood sugar. Ask your doctor about the safe use of alcoholic beverages while you are taking nateglinide.
Before you start taking nateglinide, ask your doctor what to do if you forget to take a dose. Write these directions down so you can refer to them later. As a general rule, if you have just begun to eat a meal, take the missed dose as soon as you remember it. However, if you have finished eating, or if it is almost time for the next dose, skip the missed dose and continue your regular dosing schedule. Do not take a double dose to make up for a missed one.
This medication may cause changes in your blood sugar. You should know the symptoms of low and high blood sugar and what to do if you have these symptoms.
You may experience hypoglycemia (low blood sugar) while you are taking this medication. Your doctor will tell you what you should do if you develop hypoglycemia. He or she may tell you to check your blood sugar, eat or drink a food or beverage that contains sugar, such as hard candy or fruit juice, or get medical care. Follow these directions carefully if you have any of the following symptoms of hypoglycemia: shakinessdizziness or lightheadednesssweatingnervousness or irritabilitysudden changes in behavior or moodheadachenumbness or tingling around the mouthweaknesspale skinhungerclumsy or jerky movements
If hypoglycemia is not treated, severe symptoms may develop. Be sure that your family, friends, and other people who spend time with you know that if you have any of the following symptoms, they should get medical treatment for you immediately. confusionseizuresloss of consciousness
Call your doctor immediately if you have any of the following symptoms of hyperglycemia (high blood sugar): extreme thirstfrequent urinationextreme hungerweaknessblurred vision
If high blood sugar is not treated, a serious, life-threatening condition called diabetic ketoacidosis could develop. Call your doctor immediately if you have any of the these symptoms: dry mouthnausea and vomitingshortness of breathbreath that smells fruitydecreased consciousness
Nateglinide may cause side effects. Tell your doctor if any of these symptoms are severe or do not go away: headachenasal congestionrunny nosejoint achesback painconstipationcoughflu-like symptoms
Keep this medication in the container it came in, tightly closed, and out of reach of children. Store it at room temperature and away from excess heat and moisture (not in the bathroom). Throw away any medication that is outdated or no longer needed. Talk to your pharmacist about the proper disposal of your medication.
In case of overdose, call your local poison control center at 1-800-222-1222. If the victim has collapsed or is not breathing, call local emergency services at 911.
Keep all appointments with your doctor and the laboratory. Your blood sugar and glycosylated hemoglobin (HbA1c) should be checked regularly to determine your response to nateglinide. Your doctor will also tell you how to check your response to this medication by measuring your blood or urine sugar levels at home. Follow these instructions carefully.
Keep yourself and your clothes clean. Wash cuts, scrapes, and other wounds quickly, and do not let them get infected.
You should always wear a diabetic identification bracelet to be sure you get proper treatment in an emergency.
Do not let anyone else take your medication. Ask your pharmacist any questions you have about refilling your prescription.
It is important for you to keep a written list of all of the prescription and nonprescription (over-the-counter) medicines you are taking, as well as any products such as vitamins, minerals, or other dietary supplements. You should bring this list with you each time you visit a doctor or if you are admitted to a hospital. It is also important information to carry with you in case of emergencies.
AHFS® Consumer Medication Information. © Copyright, The American Society of Health-System Pharmacists, Inc., 7272 Wisconsin Avenue, Bethesda, Maryland. All Rights Reserved. Duplication for commercial use must be authorized by ASHP.
Selected Revisions: February 15, 2014.
|
<urn:uuid:b8090519-b5d9-4a3c-bcfc-878c4afaa208>
|
CC-MAIN-2016-44
|
http://www.svmh.com/Health/content.aspx?chunkiid=674366
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00045-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.906388
| 1,938
| 2.328125
| 2
|
As such, employers are also saying that they're having to raise pay in order to attract workers from the relatively shallow pool of skilled laborers.
But economists are left asking: why aren't reported wages actually rising?
But Barclays' Dean Maki says that the BLS's stats are a poor representation of what's really going on. He argues that by separating the wages of supervisory workers from nonsupervisory workers, you get a more useful picture of what's really going on in pay.
Here's a bit of what he wrote last week (emphasis added):
"A few years ago, the BLS created a new average hourly earnings series for all employees, not just production and nonsupervisory workers, and this has become the headline wage series. This “all employees” series increased just 1.9% y/y in April and has shown little acceleration in recent years. Because the BLS publishes the weight of the production and nonsupervisory workers (about 83%), we can back out the implied wage growth of the “supervisory workers” included in the “all employees” series. Figure 3 plots the growth rates of the implied supervisory worker series alongside the production and nonsupervisory worker series. The data suggest that supervisors are receiving puny wage increases relative to their employees; the supervisory series was up 1.3% y/y in April, compared to 2.3% for production and nonsupervisory workers. Furthermore, the data suggest this was the case for most of the past year and throughout 2007-11. Thus, these data would seem to suggest that concerns about rising inequality are misplaced, as workers have supposedly been experiencing faster wage growth than their bosses for most of the past seven years."
Maki notes that supervisory workers also receive alternative forms of compensation like bonuses and equity, which aren't captured in the BLS's measure.
As such, it's best to focus on the production and nonsupervisory worker data, which suggest wages are rising faster than we think.
|
<urn:uuid:724b9b55-ce95-41a7-b034-d532c21358e6>
|
CC-MAIN-2017-04
|
http://www.businessinsider.com/wages-increasing-faster-than-we-think-2014-5
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00513-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.977742
| 414
| 1.921875
| 2
|
هزینه سرمایه و کارآیی اقتصادی آب گرم کن خورشیدی حرارتی تولید شده از مواد متناوب در هندوستان
|کد مقاله||سال انتشار||مقاله انگلیسی||ترجمه فارسی||تعداد کلمات|
|50681||2002||13 صفحه PDF||سفارش دهید||محاسبه نشده|
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Renewable Energy, Volume 26, Issue 4, August 2002, Pages 623–635
Many companies in India manufacture solar water heaters but these are not becoming popular in the domestic sector because of their high cost. The Ministry of Non-Conventional Energy Sources (MNES), New Delhi is recommending flat-plate collectors with copper (Cu) risers, headers and plate. Therefore, their cost is high. Long term studies have been carried out at the Central Arid Zone Research Institute, Jodhpur, to reduce the cost by replacing copper tubes with galvanised steel (G.S.) tube and copper plate with aluminium (Al) plate. The aluminium plate is wrapped over the G.S. tube by a special wire wound technique so that good contact of plate with risers and headers has been maintained. In this paper performance and testing of solar water heaters having G.S.–Al fin, Cu–Al fin and Cu–Cu fin in flat-plate collectors have been compared. It has been found that performance of all the three heaters is almost similar. The heater can provide 100 litres of hot water at an average temperature 62.0°C at 4 pm that can be retained to 50.4°C when average tap water temperature was 23.9°C. The efficiency of the heater is 51.9%. The cost of the heater with G.S.–Al collector is only Rs. 8,000.00 while it is Rs. 10,250.00 for solar water heaters with Cu–Cu collectors. The payback period of a solar water heater with G.S.–Al collector has been worked out by considering 10% compound annual interest, 5% maintenance cost, 5%, inflation in fuel prices and maintenance cost. The payback period varies between 2.92 years to 4.53 years depending upon which fuel it replaces. The payback periods are in increasing order with respect to fuels: electricity, firewood, LPG, charcoal, and kerosene.
|
<urn:uuid:f3db15c0-22c4-4b0e-8916-ce47826e4835>
|
CC-MAIN-2017-04
|
http://isiarticles.com/article/50681
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00172-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.827852
| 660
| 1.71875
| 2
|
A home theater can mean different things to different people, but one thing is true for everyone: the layout is important for the experience.
A true home theater encompasses a wide range of elements, such as audio & video technology, furniture, lights, insulation, and more. So, the way you place each of these elements within the room helps build up the atmosphere.
Considering all these elements, nowadays you can actually hire a professional designer to build a home theater or a media room for you. Homeowners even have the option of selecting luxury home theater seating, which turns the room into a mini cinema with ultra-comfortable chairs.
Still, if you don’t have the budget for a professional job, you can turn this into a fun DIY project.
In both situations, you should know what you want from the experience, which is why we’ll walk you through some ideas that are important for the correct layout.
Choose the Room
If you want a home theater (and not a media room), here are a few features to consider:
- The room should be spacious enough to include seating and equipment (without getting crowded).
- You will need a large wall (that will stay blank) for the screen
- It’s best to choose a naturally dark room with as few windows and doors as possible
- The walls should allow you to install some sort of acoustic insulation
- A home theater room should be rectangular (just like a cinema)
Choose the Audio System
Once you know the room and its acoustic features, it’s time to select the audio system. Most homeowners want powerful bass, with good channel separation, and a nice balance between frequencies.
This is not difficult to achieve, but it usually means installing different size speakers, in different locations, which all bubbles down to a ton of wires. This problem can be solved with good cable management (which usually involves drilling the walls) or by installing a wireless home theater.
It’s important to understand that wireless does not mean there won’t be wires. But, there will be fewer connecting cables between the main system and its satellites, so you won’t have to drill as many holes in the walls.
Choose the Video System
Now, once you’ve selected the room and the audio system layout, it’s important to choose the right screen size (speaking for TV owners).
And now, the biggest screen that fits the wall is not the answer!
Specialists in home theater design recommend measuring the distance from the wall (where the screen will be) to the back cushion of your first row of chairs (or couch). This is what’s called the viewing distance. Divide it by 1.5, and you’ll find the maximum size screen (its diagonal) that would work best.
Also, you should consider that the screen needs space on the sides as well. If the room is deep and narrow, don’t install a screen that’s wider than the overall room width.
Recliners vs Couch
Most professional home theaters will show you the image of comfy recliners installed in several rows, just like at the cinema. While this is a great idea that provides an extra pinch of authenticity, it may get old in time. It also doesn’t work as well in small rooms.
On the other hand, a couch and armchairs arrangement may be more comfortable for a family-style home theater. It also opens the room to other entertainment options such as video games or plain-old, music listening.
The elements mentioned above are the most important when it comes to a pleasant entertainment experience. But, to recreate the authentic cinema theater feeling, you’ll also need adjustable lights, proper ventilation (especially for California weather), and maybe a popcorn machine.
In the end, regardless of the fact that it was a DIY project or you hired a professional if you’re happy with the result, you can consider it a successful investment.
|
<urn:uuid:886ada7b-707d-4f1a-b3c0-f7eeb50f2852>
|
CC-MAIN-2022-33
|
https://calbizjournal.com/ideas-on-how-to-plan-your-home-theater-layout/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00675.warc.gz
|
en
| 0.939266
| 829
| 1.867188
| 2
|
A Cake-Making Cake – level 2
A bakery in England wanted to earn money for a children’s hospital, so it created a big cake covered in marzipan that took 400 hours to create by hand.
The cake itself makes cakes. You can see the ingredients go into the cake, turn into small cakes, go into a small machine, and come out as finished, decorated cakes inside of boxes.
The large cake could feed 2,000 people, but it is on display for charity, as the bakery hopes that more people will get ideas to bake for charity.
Difficult words: marzipan (a soft material people use to make cake decorations), ingredients (the parts in a recipe), charity (an organisation that helps people or places).
You can watch the video news in the Level 3 section.
How to improve your English with News in Levels:
|
<urn:uuid:807f9c6b-1ddf-4f3d-a37c-025f3ea3217f>
|
CC-MAIN-2017-04
|
http://www.newsinlevels.com/products/a-cake-making-cake-level-21/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00533-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.949229
| 180
| 3.78125
| 4
|
Trojan:VBS/Crypter.A Virus Removal Guide
Trojan:VBS/Crypter.A Virus Information:
Trojan:VBS/Crypter.A is identified as a high level dangerous Trojan horse infection, which is able to affect the target PC greatly. In most cases, you may install this malicious program onto your PC after downloaded some suspicious applications, or visited some infected websites. Once Trojan:VBS/Crypter.A is inside your PC, it will try all means to ruin your system. To begin with, in order to keep safe inside your system, this tricky virus will disable your antivirus program by corrupting the files. Moreover, Trojan:VBS/Crypter.A is able to reduce the PC performance dramatically by dropping lots of vicious files onto the system. And the files will occupy a great part of system space, which can decelerate the speed of your system operating.
Besides, you won’t notice that your browser settings are modified until the browser is hijacked frequently. And you may receive a large number of annoying ads. That’s probably because Trojan:VBS/Crypter.A downloads other malicious viruses like malware, rogue and worms onto your PC through system vulnerabilities. What’s worse, this Trojan virus will exploit backdoor for the hackers to access to your PC easily and steal personal information. Hence, Trojan:VBS/Crypter.A is pretty nasty, so you must get rid of it immediately.
TROJAN:VBS/CRYPTER.A VIRUS is very destructive:
1.Trojan:VBS/Crypter.A Virus is a terrible Trojan horse virus.
2.Trojan:VBS/Crypter.A Virus is able to sneak into the PC without notification.
3.Trojan:VBS/Crypter.A Virus can reduce PC performance.
4.Trojan:VBS/Crypter.A Virus can download malware and other viruses.
5.Trojan:VBS/Crypter.A Virus can steal financial information for the hackers.
How to Remove Trojan:VBS/Crypter.A Virus Manually?
Open Registry and delete Trojan:VBS/Crypter.A VIRUS Rregistry entries:
Typy in registry in the box.
Delete those corrupt registry entries.
Delete Trojan:VBS/Crypter.A VIRUS associated components:
|
<urn:uuid:dcd733d8-6137-4465-961f-46f8227c9a8e>
|
CC-MAIN-2017-04
|
http://howtovirusremoval.com/trojanvbscrypter-a-virus-removal-guide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00430-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.782874
| 505
| 2.140625
| 2
|
Heat resistant exhaust coating helping vehicle manufacturers meet Euro 5 emissions standards
June 4, 2007 We've spoken previously about the amazing heatproofing properties of Zircotec's ceramic thermal coating. Extremely heat resistant, the coating has been put to use by several Formula One teams to move heat out of the engine bays of their race cars. Now it seems this highly effective spray-on coating could have a part to play in emissions reduction and assisting engine manufacturers in meeting the strict Euro 5 emissions standards while contributing to power increases.
The innovative coating has already proven itself as an effective way to boost engine power - it insulates exhaust manifolds and pipes so effectively that virtually no exhaust gas temperature is lost through the metal. Higher exhaust gas temperatures mean greater air velocity and less back pressure, equating to an increase in power.
More power isn't the only benefit though - the coating's heat resistant properties will also be very useful to car manufacturers struggling to maintain decent power outputs wile meeting tough new Euro 5 emissions regulations. By significantly reducing heat loss from the exhaust system, Zircotec’s ceramic coating retains high exhaust gas temperatures, reducing warm-up times for aftertreatment systems, reducing the need for close coupling and allowing more consistent control of exhaust gas temperatures.
The technology is expected to be particularly useful for keeping particulate filters (increasingly important with rising Exhaust Gas Recirculation (EGR) ratios) at their operating temperature, particularly in applications with a stop-start drive cycles such as off-highway, delivery vehicles and busses. EGR engines can produce more particulates than other NOx control technologies, so rely on efficient particulate filtration. Plasma-sprayed thermal barriers provide a durable, affordable thermal barrier that keeps the heat where the designers need it.
“Maintaining sufficient heat in the aftertreatment system is an increasing challenge, especially as catalysts and filtration stack up,” says Andy McCabe, Zircotec’s technical director. “Zircotec’s coating technology substantially reduces heat loss in exhaust streams, allowing efficient working temperatures to be maintained. Superior temperature control will also allow reductions in the precious metal content in some catalyst applications.”
The problem with particulate filtration is that regeneration (the burning of collected soot) can only occur efficiently at very high temperatures. “Typically this occurs during periods of high load,” explains McCabe. “In a vehicle with a mixed drive cycle the gaps between periods of full load can be far greater than is required, leading to reduced efficiency of the trap and of the engine due to filter choking. Our coating can assist in solving this problem.”
Zircotec’s thermal coating also makes it easier to find a suitable location to house the filter in a vehicle since, taking into consideration space, accessibility, operator safety and the impact on other vehicle components, the distance of the filter from the engine can be increased without any significant additional heat loss from the exhaust stream. Keeping the thermal energy in the exhaust stream can also significantly improve turbo response.
Zircotec’s zirconia-based ceramics have a thermal efficiency of less than 1.7 W/m K, providing an excellent thermal barrier, inhibiting the radiation of heat from the surface of the material and holding the heat inside. Unlike other ceramic paint and coating application techniques that can burn off, become brittle and lead to flaking, Zircotec’s plasma-spray coating process is proven to be highly durable, withstanding even the harshest applications. It can also resist local impacts like minor knocks during maintenance and is neater, more compact and more durable than traditional exhaust wraps, making it ideal for Original Equipment (OE) applications.
Almost eliminating the escape of exhaust heat around the powertrain also increase the durability and effectiveness of engine and transmission oils, improves engine cooling and helps to protect ancillaries such as regulators, wiring and ignition systems from the degrading affects of excessive heat. This also makes the coating ideal for selective catalytic reduction (SCR) diesel exhaust systems, for protecting surrounding components from the high temperatures reached in the catalyst converter, removing the need for separate heat shields.
|
<urn:uuid:8853d034-b737-44bf-8a8c-dff8468f2c0c>
|
CC-MAIN-2016-44
|
http://newatlas.com/heat-resistant-exhaust-coating-helping-vehicle-manufacturers-meet-euro-5-emissions-standards/7384/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00385-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.927545
| 869
| 2.328125
| 2
|
Griqualand West is proclaimed a separate Crown Colony .The discovery of diamonds in South Africa in 1866 resulted in a flood of treasure hunters, especially from England, streaming to the interior of the country. Ownership of the diamond fields was contested by the Boer republics of the Orange Free State and the Transvaal, as well as various other groups like the KhoiKhoi, Koranas under Andries Waterboer, and the Batlhaping under Chief Mankuroane.In 1870, Transvaal President Andries Pretorius declared the diamond fields as Boer property. Immigrant miners were enraged and a former British sailor called Stafford Parker organised his fellow countrymen and drove all the Transvaal officials out of the area. On 30 July 1870 he declared the Klipdrift Republic and by December of the same year about 10 000 British settlers made their home in the new republic. Parker was also chosen as President It was also called the Digger's Republic and the Republic of Griqualand West.In the 5th of August 1879 it became a separate British Crown Colony. However, this did not settle the conflict of ownership. The Batlhaping under Mankuroane and the Qriquas rebelled against British in an attempt to regain their independence. British forces crushed the rebellion. Chief Mankuroane fled to neighbouring Tswana chiefdoms but Chief Montshioa of the Barolong Boo Ratshidi urged other Tswana chiefs not to give rebellious chiefs refuge in their chiefdoms. Finally, British forces captured Chief Mankuroane and Qriqua leaders. The republic sat next to the Vaal River, but existed for an extremely short time. During the following year Boer forces attempted to regain the territory through negotiation, but were unsuccessful, and on 27 October 1871 British forces marched in and occupied the small country. It became the Griqualand West colony and eventually was incorporated into the Orange Free State.
Potgieter, D.J. (ed) 1973. Standard Encyclopaedia of Southern Africa POP-SLA. Cape Town: Nasionale Opvoedkundige Uitgewery.|https://www.buckyogi.com/footnotes/natkl.htm|https://flagspot.net/flags/za_kd.html
www.sahistory.org.za › Culture of South Africa
|
<urn:uuid:67d510ed-f210-4d0a-850e-5060f754b5c1>
|
CC-MAIN-2022-33
|
https://www.sahistory.org.za/place/griqualand-west
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00475.warc.gz
|
en
| 0.957974
| 498
| 3.609375
| 4
|
Aug 17, 2022
Note: The Oberlin Conservatory is not accepting applications for this program at this time.
The following instruments may be studied as part of the Master of Music in Historical Performance: Historical Instruments Concentration:
- Baroque Violin
- Baroque Flute
- Baroque Cello
- Viola da Gamba
For course requirements for the Master of Music in Historical Performance: Historical Instruments Concentration, please see the grid .
Historical Performance: General Requirements
Procedures for Admission
The graduate program in Historical Performance can be pursued either as a five-year program in combination with an undergraduate degree in a modern instrument, or by persons who hold a Bachelor’s degree from Oberlin or another institution. Applicants are admitted based on an audition on their major instrument and a review of their academic record. Students audition for the five-year program during their junior year, and are expected to present a level comparable to any other applicant for the Master’s program.
Once admitted, students in the two-year Master’s program must demonstrate baccalaureate competence in music history and music theory. Deficiencies must be remedied by taking appropriate undergraduate coursework, or in the case of music history, by either coursework or re-examination.
Two-year Master of Music: Exams in music history and music theory must be taken during orientation.
Completion of the two-year Master of Music degree program will typically require full-time residence for four semesters beyond the Bachelor’s degree.
All requirements for the two-year Master of Music degree must be completed within three years from the date of admission. Students are encouraged to attend the summer Baroque Performance Institute and may use the credits earned there toward the degree.
No credit with a grade lower than B- may be counted toward the requirements of the Master’s Degree.
The catalog includes sample grids for the five-year program. For information regarding the curricular requirements for instruments not included in these samples, please contact the Director of the Historical Performance Program.
|
<urn:uuid:68e20375-1fec-41df-8357-8406c94ae991>
|
CC-MAIN-2022-33
|
https://catalog.oberlin.edu/preview_program.php?catoid=46&poid=8179
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00064.warc.gz
|
en
| 0.927684
| 502
| 1.570313
| 2
|
Select your print and framing options
John Berger wrote an essay called "Why Look at Animals?" There are many perfect arguments in there. When we look at animals, they look back-but instead of seeing them for what they are, we often see ourselves reflected in their wild eyes. To me, they provide a particular vantage for thinking about human culture. We recognize them and they are familiar but also completely unknown. This is why I like to pair them with things like language and architecture. The Knabstrup is part of an ongoing series of horse breeds of the world, Tiny Horses Say What. I always try to be a few degrees shy of anthropomorphizing animals. But we do, of course, all the time. The horses in response say: "what."
Amy Jean Porter | See All Editions
Amy Jean Porter grew up in Oklahoma and Arizona and currently lives outside of New Haven, Connecticut. Porter has drawn more than one thousand species of animals for her ongoing project All Species, All the Time. Individual series within the project include North American Mammals Speak the Truth and Often Flatter You Unnecessarily, Tiny Horses Say What and Freaked Out Monkeys in the Trees. She has presented solo exhibitions in New York, Chicago, San Antonio and Paris, and her drawings have been published in Cabinet, The Awl, McSweeney's, Meatpaper and elsewhere. Her first book, Of Lamb, a collaboration with the poet Matthea Harvey, was published by McSweeney’s in 2011. Learn more about AJP through our In the Studio interview!
- Custom Frame
I want this framed by experts!
- Hand-crafted black or white wooden frame, fitted with UV plexi
- White, archival, Made-to-Measure Mat. Your artwork will either be matted or floated depending on artist’s specifications. Note: Artwork 24”x 36” & larger will be framed to edge (no mat).
- Expertly finished with hanging wires, protective backing archival sleeve for certificate of authenticity, and wall-friendly footers.
Timeline Allow 2-4 weeks + shipping
Shipping available within the US only
|
<urn:uuid:a76c533c-46d5-407a-a81f-666c75b5fbbb>
|
CC-MAIN-2017-04
|
https://20x200.com/products/amy-jean-porter-knabstrup
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00227-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.927514
| 446
| 1.84375
| 2
|
Heat Shimmer | Kapita | Matata
D: Arthur & Corinne Cantrill, Australia 1978, 12 min | D: Petna Ndaliko Katondolo, USA 2020, 22 min | D: Petna Ndaliko Katondolo, Congo / USA / Netherlands 2019, 37 min
The event will be cancelled if poor weather is forecasted. The decision will be announced on Twitter and Facebook on the day of the event until 6pm.
At this time, the GGG rule (tested-vaccinated-recovered) applies for this event. Before the event, please check this website for the daily updated regulations.
More about Covid-19 admission regulations
D: Arthur & Corinne Cantrill, Australia 1978, 12 min
The three-color separation process, preceding the invention of color motion picture films, offers a unique way of nature observation.
D: Petna Ndaliko Katondolo, USA 2020, 22 min
By recoding archival footage and intertwining it with contemporary images, Kapita exposes patterns of extraction and burial to decode colonial representations – and exploitation – of central African land and people – and mines the archival films for what they make invisible: the black-skinned workers evaporated by cameras calibrated to white, the collateral death and destruction interred in infrastructure. (Petna Ndaliko Katondolo)
D: Petna Ndaliko Katondolo, Congo / USA / Netherlands 2019, 37 min
Matata is told primarily through dance. Rhythm, color and movements, being more than just the film’s subjects, lead it away from prescribed representations of Africa into a new future.
|
<urn:uuid:462e458a-57b4-42ca-a970-be6f7c4322ad>
|
CC-MAIN-2022-33
|
https://www.hkw.de/en/programm/projekte/veranstaltung/p_183006.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00266.warc.gz
|
en
| 0.825492
| 359
| 1.585938
| 2
|
In August 2013 Memphis will be recognized by the National Complete Streets Coalition, a national leader for active transportation, for adopting the country’s 500th Complete Streets policy. Complete Streets policies work to insure that all streets are safe for every type of transportation: pedestrians, bicyclists, and car or bus riders. They connect users to where they live, work, play, shop and go to school.
The Safe Routes to School National Partnership, Tennessee Network, is inviting Mayor Burke to join the nationwide movement and champion Complete Streets in Chattanooga.
Complete Streets policies benefit the health of communities by making active transportation the easy choice. Businesses grow from Complete Streets policies because more people can easily get to shopping destinations by bus, car, walking or bicycling. Complete Streets improve safety by providing dedicated facilities for pedestrians and bicyclists, helping to make it safer for our children to walk, bike and be more physically active. Active kids do better - performing better academically and developing life-long healthy, active lifestyles - making Complete Streets an important strategy for a city’s Safe Routes to School program.
Mayor Burke, will you take up this cause like Memphis Mayor A.C. Wharton, Jr. and support Complete Street polices in Chattanooga?
The Safe Routes to School National Partnership, Tennessee Network, stand ready to assist you in your efforts with expertise, knowledge and hundreds of community members eager to make Chattanooga a healthier and more active place to live, work and play.
Christy J. Smith
Tennessee Advocacy Organizer
Safe Routes to School National Partnership
|
<urn:uuid:549412fe-1a5d-4811-b0b5-02987f690470>
|
CC-MAIN-2017-04
|
http://www.chattanoogan.com/2013/8/14/256976/Chattanooga-Deserves-Complete-Streets.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00265-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.915402
| 321
| 1.828125
| 2
|
Breast Cancer Drug May Harm the Heart More Than Thought
It has been known that women treated with anti-cancer drugs known as anthracyclines and Herceptin (trastuzumab) are at higher risk for heart failure and cardiomyopathy, a weakening of the heart muscle.
But, that information on risks has come primarily from clinical trials, which typically exclude women aged 70 and older and those with co-existing chronic diseases, so it doesn't necessarily give a real-world picture, the researchers noted.
"The risk of heart failure associated with these drugs might be higher than what has been shown in clinical trials," explained study author Erin Aiello Bowles, an epidemiologist at Group Health Research Institute, in Seattle. Her report is published online Aug. 30 in the Journal of the National Cancer Institute.
Bowles and her colleagues evaluated 12,500 women diagnosed with invasive breast cancer from 1999 through 2007 in eight different health systems. The patients' average age was 60. The follow-up time ranged from more than two years to nearly seven.
The researchers used data from medical records and other sources to track type of cancer treatment and diagnoses of cardiac problems.
The risk of heart failure was 1.4 times higher in those treated only with an anthracycline at the five-year mark. That was about the same increase as those treated with other types of cancer drugs. However, those on Herceptin alone had more than four times the risk of heart problems compared to those who did not take the medication, the study stated.
And, the biggest increase in risk was seen in those on both anthracyclines and Herceptin. Those patients showed a sevenfold increased risk at the five-year mark, the researchers said.
The increased risk reported in clinical trials has been 2 percent with anthracyclines and 4 percent with anthracyclines and Herceptin.
"These drugs are important to take [if needed]," Bowles stressed. "They improve survival."
However, she said, "women and providers need to be aware of the risk and what can be done to monitor [it]."
Dr. Joanne Mortimer, director of Women's Cancers Program at the City of Hope Comprehensive Cancer Center in Duarte, Calif., said the study does give some "real-world" perspective, said
"We know that Herceptin and Adriamycin [an anthracycline] are associated with an increased risk of heart problems," Mortimer said. "We know that any exposure to Adriamycin increases your risk of heart failure in later years, especially in older women."
"Heart problems that occur on Adriamycin do not usually improve when you stop the drug, whereas changes in heart functioning with Herceptin often reverse when you stop Herceptin," she said. "The fact that the risk of these heart problems continues long after the Herceptin is stopped [as the new study found] is sobering."
Monitoring may help.
"The early effects of these drugs on the heart can sometimes be picked up on testing before they are felt by the patient as symptoms of heart failure," said study co-author Dr. Larry Allen, an assistant professor of medicine at the University of Colorado Anschutz Medical Center, in Aurora.
"Therefore, women exposed to these drugs are often asked to do a pre-therapy test of heart function followed by intermittent testing during [and sometimes after] chemotherapy," he said.
Typically, Allen said, a doctor measures the heart's left ventricular ejection fraction (LVEF), a test of how well the heart pumps with each beat. There are many ways to measure it. Often an echocardiogram, which uses sound waves to evaluate the heart, is done.
The cost for this varies greatly, from $150 to much more, and insurance coverage varies.
It's not clear, Allen said, why the drugs affect heart function.
"The mechanism by which different chemotherapies impair and damage the heart vary widely," he said, "and, in some cases, are not completely understood."
Women need to understand the benefits and risks of any treatment, said Ann Geiger, an associate professor of public health sciences at Wake Forest Baptist Medical Center, and author of an editorial that accompanied the study. "The study suggests the long-term risk for heart failure may be higher in women treated in the community than in clinical trials, particularly women who are older and/or have [other diseases besides the cancer]."
To learn more about heart monitoring tests, visit the Cleveland Clinic.
Posted: August 2012
|
<urn:uuid:3dda4912-2a71-464c-817f-c7cd2ade62e0>
|
CC-MAIN-2017-04
|
https://www.drugs.com/news/breast-cancer-may-harm-heart-more-than-thought-40116.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00034-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.964876
| 960
| 2.4375
| 2
|
In February of 2021, Governor Murphy finally signed the long awaited “New Jersey Cannabis Regulatory, Enforcement Assistance, and Marketplace Modernization Act” which legalizes recreational, adult (at least 21 years old) use of marijuana (or “cannabis”).
One of the major concerns which has existed since the very beginnings of this Act was how it was going to effect drug testing in the workplace and what job protections might need to be created in relation to employees’ marijuana use. The Act does address job protections. However, while several sections of the Act came into effect immediately, the employment-related provisions are not expected to take effect until the newly-created Cannabis Regulatory Commission establishes regulations providing specific procedures and rules for generally practices in compliance with the Act. That Commission is supposed to do so within 180 days of the passing of the Act, bringing us to approximately August 21, 2021 before marijuana job protections will come into effect.
The Marijuana Act specifically prohibits employers from refusing to hire, firing, or taking some other adverse action against someone specifically because that person uses marijuana recreationally. Indeed, an employer cannot discriminate against an individual in compensation or in any terms, conditions, or privileges of employment based upon marijuana use outside of the workplace. Thus, marijuana use appears to have the same protections as other protected classifications such as race and gender discrimination. Again, we will have to see how the Committee addresses this to see what the specific rules will be.
|
<urn:uuid:f7a57701-aaa4-4d1c-945a-0131295cc2b9>
|
CC-MAIN-2022-33
|
https://www.newjerseylawyersblog.com/tag/new-jersey-employment-attonreys/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00476.warc.gz
|
en
| 0.970525
| 295
| 1.875
| 2
|
Also in This Area
Shark's Fin Full Report
Posted on: October 17, 2011
Anker, Chin and Ozturk's recent route up the Shark's Fin on the northwest face of Meru Central (6310m), Garhwal Himalaya. The trio reached the summit on October 2 after twelve days of climbing. Their ascent resolves thirty years of more than two dozen attempts by elite alpinists to climb this direct line on the Fin. [Photo] Jimmy Chin
American climbers Conrad Anker, Jimmy Chin and Renan Ozturk climbed Meru Central (6310m) via the Shark's Fin in a twelve-day push. They summited on October 2 to become the first team to complete this highly sought-after objective. The Shark's Fin has repelled many experienced alpinists, with attempts on this line numbering in the dozens. This was Anker's third attempt to establish a route up the Fin, and the second attempt for both Chin and Ozturk. Over the years, the trio has accumulated thirty-plus days on this prow.
Several would-be ascents of the Shark's Fin resulted in new routes on Meru Central. After an initial attempt on the Fin in spring of 2001, Valeri Babanov returned that autumn to establish Shangri La (ED 5.9/5.10 A1/A2 M5 75 degrees) to the right of the Shark's Fin line in a solo first ascent of the mountain that earned him a Piolet d'Or.
A light-and-fast attempt on the Shark's Fin was attempted by Anker, Doug Chabot and Bruce Miller in 2003. This team was turned away two-thirds of the way up the prow by deep, unconsolidated snow and a lack of proper gear for the upper wall. The following year the Japanese team of Hiroyoshi Manome, Yasushi Okada, Makoto Kuroda and Yasuhiro Hanatani set a new highpoint on the Fin at 6100m, but descended after Hanatani broke both legs.
It was initially reported that Czechs Marek Holecek and Jan Kreisinger completed the second ascent of Meru Central in November 2006, but it was quickly discovered that the same Japanese team that attempted the Shark's Fin in 2004 had already achieved the second ascent of the peak by a variation of Babanov's route. A few days after the Japanese summited, the Czechs ticked the third ascent after aborting an attempt on the Shark's Fin and climbing instead to the right of the direct line, in yet another variation on Babanov's route.
Anker made his second attempt on the prow with Chin and Ozturk in 2008. The team was delayed on the climb for several days during a storm that dropped six feet of snow and, according to Chin, shut down the entire Himalaya. When the storm relented, they progressed beyond the highpoint of Anker's 2003 attempt. However, the team had severely rationed their ten-day supply of food during the storm; on their nineteenth day on the climb the team stopped about 150 meters below the summit. In a video dispatch posted after the team's return, Chin said, "Maybe this wasn't meant to be climbed ... I'm not coming back."
Renan Ozturk at the final camp before the summit push on the Shark's Fin. Ozturk and his partners have spent more than thirty days on the climb over the years. [Photo] Jimmy Chin
The trio were happy to give beta on their 2008 route to other teams aspiring to be the first to climb Meru via the Shark's fin. The following year the Slovenians Silvo Karo, Marko Lukic and Andrej Grmovsek attempted the same route in alpine style, hoping that a light-and-fast attempt over six days would circumvent some of the difficulties that the American team encountered in 2008. The unsettled weather prevented the Slovenians from acclimatizing as planned on other routes first; they decided to make the attempt nonetheless. After completing the two-day approach, a 700m snow slope and the rock ramp that leads to the headwall, the team turned around, citing a lack of proper gear, poor acclimatization and their alpine-style approach as mistakes for an attempt on the Shark's Fin.
Of Silvo Karo's team's attempt, Chin said, "We were all hoping he would get it done. But I thought, if he doesn't get it, maybe I'll go back and try it. And when he didn't get it, Conrad and I started talking a little bit about it again. It's such an iconic, legendary route. Nobody's been able to do it. We got so close in 2008; and having that knowledge of the route, knowing all the little things we would've done differently, it's hard not to go back and throw ourselves at it again."
This September Anker, Chin and Ozturk pushed through the bottom part of the route in a speedy six days. After climbing, hauling and jugging to the base of the overhanging Indian Ocean Wall, the team climbed steep aid sections with difficulties up to A4. These sections gave way to the Crystal Pitch, an overhanging and extremely exposed prow that they aided. A final section of mixed and aid climbing brought the team to the summit of Meru on October 2.
Anker and Chin were both quick to cite the good weather as a major factor in their success. Though temperatures rarely rose above minus twenty during the day, the clear skies allowed the team to cover a distance in a single day that took them six days during their last attempt. According to Chin, a unique challenge of this route is the range of equipment it requires. The team brought equipment for technical and alpine ice and rock in addition to a big-wall kit, rather than attempting the route alpine-style like the many teams before them.
"Tons of teams have tried the route alpine style. But you just can't. You have to go aid climbing. It's modern A4 up there," Chin said. "Hauling a big-wall kit through the lower alpine route complicates things right off the deck, which is part of what makes this route so logistically challenging."
Jimmy Chin jugs the upper wall of Shark's Fin. "Tons of teams have tried the route in alpine style. But you just can't. You have to go aid climbing. It's modern A4 up there," Chin said. [Photo] Jimmy Chin collection
Cumulatively, the three climbers have spent more than thirty days on the Shark's Fin. Their multiple attempts through bad weather, severely rationed supplies and a broken portaledge make this final ascent "one of the most meaningful we have ever experienced," Ozturk said. Their shared experience on the route in 2008 was an crucial factor this year; Chin said that going back with the same team was important to all of them, especially after Ozturk's ski accident in March of this year, which left him with severe cranial and spinal injuries.
"For Renan to come back and do this route was a really big deal," Chin said. "We could've brought someone else on, but it was important for us to have him." Anker agreed; he said they could have reduced their time on the climb by three days if they had climbed in a two-man team, but the experience of returning with the same trio was an important aspect of the expedition.
For Anker, this third attempt on the Shark's Fin was also a remembrance. "For me it was a tribute to Mugs [Stump]. We had talked about the Shark's Fin, and I had that unfinished business going back to a partner." Anker also praised his wife, Jennifer, and their sons for their support of the trip. "I think for the boys, the risk associated with this trip was a little bit different than it was for Jenny. It was also during the post-monsoon season, and twelve years since Alex passed away. The experience was pretty stressful for her." Alex Lowe, Anker's climbing partner and Jenny Lowe-Anker's first husband, was killed in a post-monsoon-season avalanche on Shisha Pangma in October of 1999.
The three climbers are eager to see others try their route. When asked if he had advice for climbers attempting the second ascent, Chin laughed, "They should call me." He and Anker agree that now that the route is in place, the second ascent could happen soon—but perhaps only with the right conditions. "I can't stress enough the importance that the weather played during our trip," Anker said. "We got incredibly lucky."
Read through our NewsWire archives to dig deeper into the Shark's Fin history:
Sources: Conrad Anker, Jimmy Chin, Renan Ozturk, 2002 American Alpine Journal, merudispatches.com, neverstopexploring.com, jhnewsandguide.com, climbing.com, aaj.americanalpineclub.org, himalayanclub.org, jimmychin.com, climbmeru.net.
The trio on the sunny summit of Meru on October 2. "We were incredibly lucky with the weather," Anker said. The climbers savored their success by drinking coffee at the summit before starting the two-day rappel to the base. [Photo] Jimmy Chin
Here at Alpinist, our small editorial staff works hard to create in-depth stories that are thoughtfully edited, thoroughly fact-checked and beautifully designed. Please consider supporting our efforts by subscribing.
|
<urn:uuid:9860fd11-9101-4a1b-80fe-8d1d7a309773>
|
CC-MAIN-2016-44
|
http://www.alpinist.com/doc/web11f/newswire-meru-sharks-fin-anker-chin-ozturk?amp&
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00065-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.976428
| 2,006
| 1.609375
| 2
|
CHICAGO, Feb. 2 (UPI) -- Taco Bell's "taco meat filling" is not as unusual as it may sound, food specialists say.
Alabama attorney W.D. Miles is suing the fast-food chain for false advertising, alleging it mislabels its products as "beef" or "seasoned ground beef" even though it is called "taco meat filling" within the company.
The claim relies partly on regulatory language intended for manufacturers, not restaurants, The Chicago Tribune reports. There are no firm rules on what a company or restaurant can advertise as meat.
Taco Bell, based in Irvine, Calif., says its recipe is 88 percent beef and 12 percent seasonings, spices, water and other ingredients.
The U.S. Department of Agriculture says "taco meat filling" must contain at least 40 percent fresh meat and be labeled with the name including "filling." But the rule applies to manufacturers, and the USDA does not regulate what restaurants can advertise as meat, nor does the Federal Trade Commission.
Taco Bell lists various seasonings as ingredients, along with food products like soy lecithin, autolyzed yeast extract, maltodextrin, isolated oat product, soybean oil and colorings.
Kathryn Kotula, a scientist at Investigative Food Sciences in Storrs, Conn., said, "There's nothing on the list that's unusual."
|
<urn:uuid:24745a1b-bb72-4c20-93eb-b3e8854615f0>
|
CC-MAIN-2016-44
|
http://www.upi.com/Top_News/US/2011/02/02/Taco-Bell-defends-filling-ingredients/UPI-26911296668653/?rel=91981313390667
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00065-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.952952
| 295
| 1.632813
| 2
|
Middletown can be reached from New York City by bus and is near the intersection of Interstate 84 and NY 17 (the future Interstate 86). State routes 17M and 211 run right through the city, and US 6 parallels I-84 to the south.
The Middletown-Town of Wallkill station on Metro-North Railroad's Port Jervis line is nearby, in the Town of Wallkill, and provides rail service from Port Jervis, other communities in Orange and Rockland Counties and Bergen County, New Jersey, Hoboken and New York City via a transfer at Secaucus, New Jersey.
Middletown offers a bus service, Middletown Transit, with four routes that connect at the bus station on Railroad Avenue, where passengers can connect to Coach USA and Short Line bus service. There is also a "Main Line" bus connecting to surrounding Orange County villages and another route connecting to areas such as Newburgh and Woodbury.
Middletown's Hillside Cemetery was designed by British architect and landscape designer Calvert Vaux, who worked with Frederick Law Olmsted to design New York City's Central Park.
- The Rotary Club runs an annual Horse Show at Fancher Davidge Park each fall. Middletown is also the site of the Orange County Fair each summer and the Orange County Fair Speedway.
- Highland Lakes State Park is the nearest state park.
Shopping in the area includes the Galleria at Crystal Run, a mall just east of Middletown, and a long retail strip along Route 211 on the east side of town.
|Routes through Middletown|
|END ← Port Jervis ←||N S||→ Central Valley-Harriman → Ridgewood|
|
<urn:uuid:f8d7865a-d3b9-4982-b624-5dcf6008ef1d>
|
CC-MAIN-2022-33
|
https://en.wikivoyage.org/wiki/Middletown_(New_York)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00065.warc.gz
|
en
| 0.923207
| 431
| 1.523438
| 2
|
The Drama of Redemption
“Steadfast love and faithfulness meet; righteousness and peace kiss each other.”- Psalm 85:10
Grasping the meaning of the atonement is essential for salvation (Gal. 3:10–14), but to understand Christ’s work, we must know the Lord’s attitude toward sin. Scripture describes three main ways our transgressions affect our relationship with God:
First, the Bible explains that we have incurred a debt to God on account of our sin. The Lord has the right to impose obligations on us, for He is the Creator and sovereign King of the universe. In Eden, God demanded that Adam render perfect obedience to one stipulation—the command not to eat from the forbidden tree (Gen. 2:15–17). Since Adam was our federal representative, his actions had consequences for all his naturally conceived descendants. We disobeyed when Adam disobeyed, and in Adam we owe an infinite debt against our infinite Lord (Rom. 3:23; 5:12–21; 1 Cor. 15:22). We cannot repay this debt ourselves, for the one sin in Adam demands infinite satisfaction, not to mention our many individual sins. Thanks be to God, Jesus pays our debt. The infinitely worthy Son of God united Himself to a human nature so that His atoning death on the cross could become the infinite payment our Father requires.
Second, sin puts us at enmity with God. Having offended the Lord, our relationship with Him is broken (Hos. 1:2; Rom. 3:23). God is the injured party in this relationship, not in that He is driven to depression by our sin but in that we have wronged Him. This is a serious rupture, so we need Christ the Mediator to fix this broken relationship. Our sin has provoked God to righteous anger, but in love He predestined His people for adoption through Jesus His Son, who stands between the Lord and His people to restore our fellowship with the Father (John 3:16; Eph. 1:3–6).
Finally, sin means that we have committed a crime against God. Humanly speaking, we do not punish theft merely by requiring the thief to repay what He has stolen. Rather, we also impose prison time and other legal penalties. A judge is not bound to dismiss these other penalties even if the thief gives back what he took. God, however, reestablishes His relationship with His people based on grace, ordaining Christ both to repay the debt of those who trust in Him and to endure the legal penalty of hell in our stead (Rom. 3:21–26). The Father cursed Christ on the cross for us, exacting the punishment we deserve and showing mercy to us at the same time.
Today’s passage contains the beautiful imagery of justice and peace (or mercy, as other translations put it) kissing each other. Our Father graciously restores peace between Himself and us in Christ Jesus. This peace is permanent, for it is not based on ignoring our sins and faults but on God’s sure willingness to accept the perfect payment of Jesus in our behalf. And since the Lord has accepted this payment, this peace must be eternal, for otherwise He would have let His Son die in vain.
Passages for Further Study
2 Samuel 22
Matthew 5:7; 12:15–21;
For permissions, please see our Copyright Policy.
|
<urn:uuid:a149dd28-ebbf-429c-8300-583e4621fae8>
|
CC-MAIN-2017-04
|
http://www.ligonier.org/learn/devotionals/drama-redemption/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00432-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.940499
| 709
| 2.296875
| 2
|
Barbara Ballinger is a freelance writer and the author of several books on real estate, architecture, and remodeling, including The Kitchen Bible: Designing the Perfect Culinary Space (Images Publishing, 2014). Barbara’s most recent book is The Garden Bible: Designing Your Perfect Outdoor Space, co-authored with Michael Glassman (Images, 2015).
Ingredients for a Modern Kitchen
Woo buyers with the latest kitchen trends: less cabinet ornamentation, durable materials, energy-efficient and green appliances and lighting, and stylish glass backsplashes.
October 1, 2010
The kitchen remains one of the most popular rooms in the house. If it's well laid out and equipped, it becomes a magnet for family members. “It’s the place where they begin and end their days and also interact with friends,” says designer Cheryl Kees Clendenon, founder of In Detail, Kitchens, Baths, Interiors, a design firm in Pensacola, Fla.
But it can do more. “A home that’s in move-in condition (or better) is often at the top of today’s buyers’ wish list, and having a finely finished, open kitchen is among their highest priorities,” says Jennifer D. Ames with Coldwell Banker Residential Brokerage in Chicago. “What’s in style in kitchen design changes more often than hemlines, and buyers have minimal interest in buying a home with outdating rooms, whether they cook or not. A well-done kitchen absolutely can sway a buyer’s decision.”
Conversely, a poor design, dated appliances, high-maintenance materials, and an overly personalized palette can send buyers running, particularly since savvy shoppers know the cost to redo a kitchen keeps escalating. A major upscale remodeling now hovers near $112,000, according to Remodeling magazine’s latest Cost vs. Value Report.
But many kitchens don’t have to be gutted to work and look better. A few tweaks often can make it more enticing, such as:
- An attractive manmade stone countertop in a new white-white
- A luminescent glass-tiled focal wall
- A floor tiled with 24-by-24-inch porcelain squares
- Energy-efficient LED lamps in swank fixtures
- One unique, valuable piece of equipment — for instance, a steam oven for speedier cooking and healthier eating
Your job is to help educate your buyers about the latest trends that make sense for their lifestyle and then for resale and to help sellers know which changes attract the widest group of buyers. Here are trends worth sharing:
The turbulent economy is making more rethink ways of cutting back without sacrificing quality and style. Andrew Shore, president of Sea Pointe Construction in Irvine, Calif., suggests eliminating lights inside cabinets or using semicustom instead of fully custom cabinets. Mark L. Karas, president of the National Association of Kitchen and Bath Products and general manager of Adams Kitchens in Stoneham, Mass., says another way is to purchase a refrigerator that costs $2,000 instead of $6,000.
Low-Maintenance, Green Paints and Finishes
Whether it’s indoors on kitchen walls or outdoors on decks, finishes are going green as more manufacturers offer low- or no-VOC (volatile organic compounds) lines in a full spectrum of hues and sometimes faux finishes. Many also make them more durable and washable. Because the outdoor kitchen has become more sophisticated, companies like The Sherwin-Williams Co. are manufacturing decorative stains to embellish hardworking concrete patios, says Steve Revnew, vice president of product development.
With more communities mandating recycling and composting, it’s no surprise that the home trash compactor is morphing into a home compost system that gets taken out to a bin when full to be composed. Blanco’s “Salon” model gets integrated into the countertop to take up less space.
While traditional style still reigns supreme overall, modern design is making inroads in the kitchen, says New York–based designer Florence Perchuk, who likes to mix the two. In cabinet design, simpler door styles such as Shaker appeal since they eschew ornate carvings, brackets, and rows of molding, says Jason Landau, owner of Amazing Spaces in Briarcliff Manor, N.Y. To fit the cleaner look, hardware is slimmed down, says Chris Berry, of brooksBerry & Associates in St. Louis.
Almost hands-free for ease is another trend, thanks to motion-activated faucets (www.brizo.com) that simply require a light touch. There’s also lighting that comes on when you enter the room, says Berry.
Granite, which has become ubiquitous, is not as in demand as it once was. But interest in manmade, durable quartz counters has gone up. Among the most popular designs are white-whites with a thicker, two-and-one-half-inch built-up edge rather than the one-and-one-quarter-inch edge, says James Howard with Glen Alspaugh in St. Louis. While granite isn’t disappearing entirely, splashier hues and patterns are fading, says designer Leslie Hart-Davidson of Hart-Davidson Designs in Okemus, Mich. Replacements are honed and brushed granites, says Nancy Stanley of Kitchens by Design in Indianapolis.
White or Natural Cabinets
Painted woods, particularly white-painted maple, remain popular, but the shades veer toward a softer eggshell, ecru, butter cream, and vanilla. Some designers say glazing white cabinets will fade. Equally popular are cherry and maple cabinets stained medium to dark brown, says Barbara Umbenhauer, marketing manager at Rich Maid Kabinetry in Myerstown, Pa.
As an alternative to larger refrigerators, some companies offer models, often smaller and in drawers, to chill beverages away from the main unit in order to pare congestion, Shore says. Wine coolers, more popular than ever, can be recessed into walls for an integrated look. Vinotemp’s “Portofino” uses thermoelectric technology to add another plus — greater energy efficiency.
Though they haven’t caught on with everyone, induction cooktops offer energy efficiency and the ability to heat contents but not cookware, Karas says. Thermador models come with a sensor that maintains a precise temperature and automatically shut off when done.
Zoned for Action
Besides separate cooking, prepping, cleaning, and eating stations, kid areas are flourishing, so children can grab drinks and snacks at pint-height cabinets, says Hart-Davidson. But adding certain stations doesn’t make sense, such as a desk zone that Berry says had become a “messy” center. She prefers a small smart-message center—with technology hidden behind cabinets — where home owners can watch TV or DVDs, look at digital photos, play music, retrieve recipes, and pay bills.
While sinks have never been among a kitchen’s most appealing components, a new generation is making home owners take note. Blanco’s MicroEdge is so thin that it’s flush with the countertop to make cleanup easier. If home owners want a second sink, it’s likely to be larger today for doing more cleanup and prep.
Mismatched Colors, Materials, Styles
The unmatched look of cabinets and countertops in different colors, materials, and styles continues, particularly in large kitchens where one choice can look monotonous. For high drama, Hart-Davidson suggests pairing colors from opposite sides of the color wheel such as red and green and combining styles as diverse as Scandinavian modern and Victorian.
Because of its potential to put everything within everyone’s reach, universal design is embraced more. Ovens can be set side-by-side rather than vertically, and microwave units can go under a cabinet rather than up high, Umbenhauer of RichMaid Kabinetry says.
|
<urn:uuid:025f500a-5dc5-4539-8a24-931339374168>
|
CC-MAIN-2022-33
|
https://magazine.realtor/home-and-design/architecture-coach/article/2010/10/ingredients-for-a-modern-kitchen
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00266.warc.gz
|
en
| 0.92356
| 1,739
| 1.507813
| 2
|
The 12 First Aid Tips of Christmas: Defibrillation
Date: Thursday, 17 December 2015. -
Blog, First Aid, Defibrillators
Some people would say that the best part of Christmas is giving and receiving gifts. Although it’s fantastic receiving something on your wish list, the greatest gift you can receive is a lifetime of wonderful memories and adventures. (Cheesy but true!)
Just imagine for a second that your life was cut short by an underlying heart condition that had gone undetected until it was too late. This is what happens to many people that have suffered a cardiac arrest. However, with the right know-how and quick thinking we can save someone experiencing cardiac arrest.
In the 11th addition of the 12 Days of First Aid Tips, we will teach you how defibrillation is used to treat cardiac arrest.
Cardiac arrest is an electrical disturbance in the heart that stops it from pumping effectively, the heart quivers stopping oxygenated blood from being pumped to the vital organs.
The only definitive treatment for sudden cardiac arrest is defibrillation. The sooner you get a defibrillator to a victim of SCA the better because for every minute lost they will lose 10% of their survival chances. If there isn’t a public access defibrillator nearby then you must call for an ambulance straight away.
AED’s or automatic external defibrillators are user-friendly devices with voice prompts and bold diagrams that help the first responder through the process. All you have to do is switch it on and await further instruction; this means that just about anyone can use this equipment to save a life.
Check out our online store imperative supplies' range of defibrillators to find the perfect life-saving device for you.
If you have any questions about the defibrillation process, feel free to contact our customer service team on 0845 071 0820.
|
<urn:uuid:bc651fe3-5874-450b-af13-d3cb2d5905ea>
|
CC-MAIN-2017-04
|
http://www.imperativetraining.com/latest-news/item/the-12-first-aid-tips-of-christmas-defibrillation?category_id=3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00521-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.933761
| 395
| 2.453125
| 2
|
The Feeble Diddle
The Feeble Diddle - Rev 162
Thomas Downs (tnelsond)
I've basically had this program lying around for a long while and every so often had opened it up again to tweak it. I am a beginner programmer and am not all that good with game logic. So thence, this program is filled with bugs and inconsistencies.
Comments are greatly apreciated.
- In this update a basic plot has been implemented.
- Various new types of blocks were added.
- The physics have been slightly changed.
- If you run out of health a game-over does not ensue, but the level restarts.
- To speed up the game, areas of the levels have been separated into something I call loading blocks, so that the stuff in side the blocks does not load or become processed unless the loading block has been reached.
A level selection screen has also been added.
- There's some other stuff to, but I don't have time to list it all.
Feel free to tell me what you think of my "feeble" attempt at making this game and what I can do to fix it or make it better.
Feedback is greatly appreciated.
click to view original size
Pygame.org account Comments
If you wish to leave a comment with your pygame.org account, please sign in first.
pygame.org welcomes all python game, art, music, sound, video and multimedia projects. If they use pygame or not.
Oct 22, 2016
Oct 17, 2016
Oct 11, 2016
Oct 10, 2016
Oct 3, 2016
Oct 1, 2016
Sep 29, 2016
Sep 19, 2016
Sep 17, 2016
|
<urn:uuid:655750de-2d69-48c4-8a1c-4a486b0b3d7c>
|
CC-MAIN-2016-44
|
http://www.pygame.org/project-The+Feeble+Diddle-1027-2015.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00066-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.931419
| 359
| 1.632813
| 2
|
Plants are essential to everyone's lives. Welcome to Plantlife.
27 IPAs have been identified in Montenegro and a conservation project developed at Cijevna Canyon IPA.
Montenegro covers an area of almost 14,000 km² and is bordered by Albania, Bosnia-Hercegovina, Croatia, Kosovo and Serbia. It falls within Mediterranean and Alpine biogeographic zones. On a European scale Montenegro is believed to have the greatest number of vascular plants per unit area, and contains many national and Balkan endemics – Asperula, Campanula, Dianthus, Edrianathus and Ophrys are just a few of the important genera. The natural and semi-natural habitats include forest (oak, beech and coniferous), grasslands and the coastal habitats of the Adriatic Sea.
The IPA project in Montenegro has been exceptionally well publicised and received a high level of positive public interest.
Montenegro has 27 IPAs, covering 708,606 hectares. There is good coincidence between the Montenegrin IPA network and the Emerald Network (designated under the Bern Convention) and 11 IPAs are protected either fully or partially. This, however, leaves nearly 60% of Montenegro’s IPAs unprotected. Other than National Parks, ‘protected areas’ in Montenegro do not have management plans or any regulation of potentially damaging activities.
Most IPAs in Montenegro are owned part by the state and part by private land owners. Tourism and recreation are the dominant land uses at 81% of sites and thus, unsurprisingly, development threatens 78%, with over half of the sites threatened specifically by tourist development. This is a particular problem on the coast. Forestry and mixed agriculture take place on almost half of Montenegrin IPAs and low level wild plant harvesting on one third. One third of sites are also threatened by deforestation and burning of vegetation. The mismanagement of water resources threatens five lake and coastal IPAs at an acute level.
Fact-sheets on the Montenegrin IPAs are available on the IPA Online Database.
- PETROVI?, D. (Ed), 2009, Važna Biljne Staništa – U Crnoj Gori IPA projeket. Important Plant Areas in Montenegro. Green Forest, Montenegro.
- Zelena Gora (Green Forest)
South-east Europe is one of the most diverse regions in Europe for wild ...
|
<urn:uuid:ba218bb1-e68b-4805-942c-5af11a96312f>
|
CC-MAIN-2017-04
|
http://www.plantlife.org.uk/international/wild_plants/IPA/other_ipa_projects_worldwide/europe/montenegro-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00273-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.899351
| 506
| 3.046875
| 3
|
Consider that any link in the chain that connects server to storage could fail. If the applications provided by...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
the server are so important that it makes sense to spend additional money to protect them, then hardware redundancy is an important early step.
Of course, you may choose to have redundant servers, redundant switches and redundant storage. Making everything redundant, and then double-connecting everything together can certainly be an expensive proposition. If all of this stuff were free, then it'd be an easy decision. Everybody would make all computer systems redundant. Of course, life isn't that simple, and it ultimately comes down to a financial decision: Does the cost of downtime for this application warrant spending money on extra hardware, and the software this is required to manage it?
Note that you could get further increases in availability by having three of everything, or even four or five. However, in general, going beyond dual redundancy (except in the case of extremely critical applications) is overkill. Of course, it's still a financial decision, and without knowing a lot more about your environment, I cannot tell you exactly what makes sense there.
Hope this helps.
Dig Deeper on Disk drives
Related Q&A from Evan Marcus
Storage expert Evan Marcus compares software and hardware RAID and outlines the benefits and drawbacks of each.continue reading
This expert answer explains the purpose of creating LUNs and details reasons for creating multiple LUNs.continue reading
This advice details the hardware and software requirements for setting up two data servers in fail-safe cluster mode for high availability.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.
|
<urn:uuid:ae129caf-ace2-42d5-88a6-a35a0f517654>
|
CC-MAIN-2017-04
|
http://searchstorage.techtarget.com/answer/How-many-Fibre-Channel-connections-do-I-need-for-high-availability
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00077-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.926503
| 377
| 1.671875
| 2
|
[Edited by wcutler May 11, 2008]: I'm leaving in all my anguished questions, but we can answer this now: the trees in this first posting are all Kanzans, and wherever there are rows of these showy pink trees lining one or both sides of whole blocks, they're Kanzans, in Vancouver anyway. See my posting this year of three tree shapes, asking if they all can be Kanzan, and see Douglas Justice's reply about a week later that yes, Kanzans do take all those shapes, depending on conditions and pruning. This thread has some good examples of Pink Perfection blossoms. Pink Perfections are very rare in Vancouver, and when the trees are starting to blossom, the peachy colour makes them very obvious - or as Douglas says "a piece of cake". I didn't believe that last year; now I do. If we don’t get help with this, I’m threatening to post the 100 photos I’ve taken so far of (is it) Pink Perfection or Kanzan (just KIDDING, Daniel). I even know some things: - Kanzan (and Akebono) are the most planted trees in Vancouver - Kanzan have a more vase shape, Pink Perfection are more open and drooping - Pink Perfection blossoms are lighter in colour than Kanzan - Pink Perfection are less vigorous looking than Kanzan - Pink Perfection have a white dot in the centre. - Pink Perfection have two-toned blossoms. All the above helped us not one bit, unless every frilly pink thing in Vancouver’s West End is Pink Perfection, but that’s not supposed to be the case. Some questions we had: Is it the dot that’s important, or the colour of the dot? All the trees we saw April 10 had a yellow dot. What centre do Kanzan have or is it that you can't see the centre? Even on older blossoms? Is it that a petal that will be two-toned, or in the blossom as a whole? Everything we saw had colour variations in the blossoms. I’m looking an answer for each set of tree photos. [Edited Feb 24: I can get the photos next to the text now.] They're all shown tree followed by its blossoms. 1 & 2 shape fits my understanding of Pink Perfection. 3 & 4 shape fits my understanding of Kanzan. 5 & 6 seems like a hefty Kanzan frame with droopy Pink Perfection branches. 7 & 8 seems like delicate Pink Perfection frame with upright Kanzan branches. 9 & 10: this tree is on Pendrell at Thurlow in Vancouver and is a very fine looking tree. It’s so much fuller than the other frilly pink trees, and bloomed about two weeks earlier, so I wonder if it’s not one of the two in question at all (like maybe Hodulai?), or is it just that it’s such an old healthy tree? All my new scout friends and I thank you.
|
<urn:uuid:ca4117bf-e0ee-44b7-9649-9884b47090be>
|
CC-MAIN-2022-33
|
https://ubcbotanicalgarden.org/threads/kanzan-vs-pink-perfection-large-showy-double-pink-blossoms-bronze-leaves-late-sea.24645/#post-84695
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00069.warc.gz
|
en
| 0.936933
| 643
| 1.640625
| 2
|
To complement the MASSAGE Magazine article, “The Auth Method of Forearm Massage: Massaging the Hips,” , in the February 2011 issue. Article summary: The Auth Method of Forearm Massage teaches an effortless technique for massaging the hips. Because the hips are some of the largest and strongest muscles in the body, they are no match for the massage therapist’s comparatively smaller and more fragile thumbs, fingers or hands. Big jobs require big tools. The forearms are perfect for working the vast terrain of the hips and the many layers of tension that can develop here. This is probably the most important area to work with the forearms. The tissue is the thickest here, and the bigger the tool, the better.
, L.Ac., L.M.T., N.C.T.M.B.
- More leverage. Massage is a laborious profession; it’s very physical. To maintain a busy practice, it is essential to work efficiently. One way to do this is to use your body weight instead of muscular force to massage your client. By using your forearms, you’ll have a steady, strong base of contact to lean onto.
- Increased career longevity. Many massage therapists leave the profession because of wrist or hand injury. By using your forearms, you’ll be able to protect the fragile joints of the hands.
- Greater surface area. With an increased surface area of contact, you can work on more of your client in less time, making your practice more efficient. Your clients will feel like they are getting more for less.
- Increased durability. A stronger tool lasts longer. The forearms are larger and less fragile than the fingers or thumbs, so your massage practice will thrive longer.
- Effortless deep-tissue work. Because you’ll have more leverage when working with your forearms, the deep-tissue work you do on your clients will be less demanding. You’ll be able to work deeper on your clients, with less fatigue.
- Satisfy the needs of larger clients. The forearms are a big tool capable of doing a big job. This makes them ideal for working the larger muscle groups of any of your clients.
- More contact. Clients come to massage therapists for contact. By using the forearms, you increase contact with your clients. This contact is comforting to your clients.
- It feels good. Forearm massage is just as soothing as massage with the hands. It might take time to develop sensitivity in the forearms, but the sensitivity is there. Listen to your client’s body; it will tell you how fast and how deep to go.
Shari Auth, L.Ac., L.M.T., N.C.T.M.B., is creator of the Auth Method of Forearm Massage and the instructional massage DVD, Auth Method: A Guide to Using the Forearms. She is also certified in the Rolf Method of Structural Integration. Auth teaches continuing education workshops for massage therapists, has a full-time practice in the healing arts in New York City and has been practicing since 1995. For DVD and workshop information, visit http://authmethod.com. For information on her practice, visit http://shariauth.com.
|
<urn:uuid:db645c88-b4a4-4ebf-9a03-f82d31d565d8>
|
CC-MAIN-2022-33
|
https://www.massagemag.com/8-great-reasons-to-massage-with-your-forearms-8556/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00670.warc.gz
|
en
| 0.918176
| 687
| 1.515625
| 2
|
The answer has been sought after through the centuries. Fortunately for us...we live in an age of increased knowledge...so the process is no longer a mystery as it was for our ancestors of long ago.
We not only understand the process of how are pearls made naturally, but man has figured out
So, as there are sheep farms....there are now pearl farms...where pearls are the "crop."
In a nutshell
How are pearls made? For those of you who want a simple straight-forward answer in a few words:
How are pearls made in saltwater oysters? A saltwater pearl is made by inserting a mother-of-pearl bead nucleus(most often made from pigtoe clam shell from a USA river) along with a tiny piece of mantle tissue (living epithelial cells from another oyster) into the oyster. The mantle tissue forms a "pearl sac" around the bead and the oyster then coats the bead with nacre, which is the pearly substance.
How are pearls made in freshwater mussels?
A freshwater pearl is made a similar way, but the mother of pearl bead nucleus is eliminated. Freshwater mussels will make a pearl when only a tiny piece of mantle tissue is inserted inside. When multiple pieces of mantle tissue are inserted, multiple pearls are formed. (One reason freshwater pearls are usually a lower price....one mussel can create more than one pearl.)
How are pearls made?
Here is a more detailed explanation...for those of you wanting to understand more thoroughly the question: How are pearls made.
It all starts with baby oysters which are either artificially bred in a hatchery or allowed to spawn naturally as in Tahiti.
Baby oysters are put in cages and suspended in water, but not just any water will do...there must be an adequate food supply for the oysters.
A good combination for sea oysters is to be in a bay which is supplied by a freshwater river which brings food along with it, but too much freshwater can endanger the oysters life....so a delicate balance must be found.
Temperature is also important. Oysters like warm water...about 75 degrees is ideal...and sudden temperature changes can kill the oyster, and if not kill it, the quality of the pearl can be affected. To ensure the health of oysters, some pearl farmers move their oysters to warmer seas during the winter.
When the oyster is 2-3 years old....he can start his occupation of pearl growing.
How are pearls made?
Understanding the mother of pearl nucleus.
As stated in the nutshell explanation, a mother of pearl bead is inserted as a nucleus...but why a mother of pearl bead? The Chinese, in the 13th century were implanting lead Buddhas into mussels and the mussels in turn coated the Buddhas with nacre (pearl substance)...so essentially anything can be coated with nacre. But...drilling a hole in the pearl causes the nacre to heat and expand. It's important to have the nucleus made of a similar material...so the rate of expansion can be equal, otherwise the pearl can shatter.
For saltwater pearls the mother of pearl bead is essential. These mussels must be harvested (strict quotas must be followed here in the USA for removal of these mussels), steamed, meat removed and cleaned shells shipped to special factories which prepare these mother of pearl nuclei.
How are the nuclei prepared?
First, the shells are cut into large strips, then the rough outer shell is chipped from the inner shell and they are hammered into fairly small pieces and finally ground into round balls which vary in size from 2.5-8 millimeters, and polished until very smooth.
Now, the nuclei are sold to pearl farmers for implantation.
Insertion of the mother of pearl nucleus
Watch a Video of Pearl Nucleating.
In understanding how pearls are made, we know that early in the morning of the day an oyster will receive a nucleus, they are taken out of the water and placed in dry containers in a shady spot. After about 1/2 hour all the oysters will have opened their shells. At this point they are "pegged," meaning that a worker slips a wooden wedge into the crack to hold them open. If they don't open, they are returned to the water for another 24 hours.
Once pegged, they go to the "operating room"...a sunny room filled with well-trained experts who will perform the precise, and delicate implantation.
Each operator has strips of prepared living mantle/epithelial tissue to be inserted with the nuclei. One oyster must die to provide this tissue which is cut from its mantle and its rough edges cut away, for 14-15 inserted nuclei. Too bad...but that is how pearls are made. The strip of tissue is cut into tiny squares and stays alive for 2 hours...so must be used within that time frame.
The oyster is secured in a clamping device in front of the operator and either the wooden wedge is left in place or a retractor which allows the shells to be forced further apart is inserted. If the oyster is opened too far...it dies.
With dentist-like precision, the operator who has trained extensively and learned how pearls are made, quickly makes a 1/2 inch incision into the body of the oyster at the gonad or at the connective tissue. Then skillfully places the mantle tissue and nucleus (dipped in water and held by a suction tool) into this slit, being careful to get them directly next to each other. If not in direct contact, the pearl sac will not form.
Time to recuperate
The wedge or retractor are removed and the oyster placed instantly into sea water. This whole process takes less than 60 seconds...but the oyster will take the next 6 weeks recuperating from the shock.
After the "shock period" is over, the oysters are again raised to the surface and inspected and cleaned. Any oysters that didn't survive are discarded.
How are pearls made?
For 2-4 years the oysters are allowed to grow and will experience this process, continuing to layer the nucleus with nacre....making a lovely pearls....and providing rich rewards for its owner.
The process for freshwater pearls is similar, but no bead nucleus is needed and more than one square of mantle tissue can be inserted, as stated above, allowing for more than one pearl to grow in each mussel.
So...how are pearls made?...I hope you now understand the process a little bit more.
Civil Rights for the UNBORN!
|
<urn:uuid:fd1d6532-1a9d-4980-9747-c137d5d17c99>
|
CC-MAIN-2016-44
|
http://www.karipearls.com/how-are-pearls-made.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00343-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.957634
| 1,398
| 3.03125
| 3
|
An experiment to test how cement sets in microgravity conditions is one of 34 to be included in the latest resupply mission to the International Space Station (ISS). The resupply mission launched in the early hours of the morning from NASA Wallops Flight Facility in Virginia on 21 May aboard Orbital ATK’s Cygnus spacecraft.
According to AFP, the test aims to explore how cement acts in space and whether it will harden as it does on earth – key knowledge ahead of any attempt to set up habitats in low-gravity environments.
The Microgravity Investigation of Cement Solidification (MICS) project aims to “explore the complex process of cement solidification, specifically to help better describe the hydration reaction and microstructure formations in a cement paste solidified in a microgravity environment,” according to the NASA website.
In on-orbit portion of MICS will comprise the hydrating of dry cement powders that vary by type of cement, type of additives, number of additives, and amount of water. Video of the mixing process will be recorded and all samples will be returned to Earth to test and analyses.
Read the article online at: https://www.worldcement.com/the-americas/21052018/cement-experiment-included-in-latest-iss-resupply/
|
<urn:uuid:d148eb18-4d7c-48d9-9281-4e7259ac276b>
|
CC-MAIN-2022-33
|
https://www.worldcement.com/the-americas/21052018/cement-experiment-included-in-latest-iss-resupply/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00678.warc.gz
|
en
| 0.87849
| 280
| 3.203125
| 3
|
CHAPTER XIV — THAT WHICH CONCERNS A PRINCE ON THE SUBJECT OF THE ART OF WAR
A prince ought to have no other aim or thought, nor select anything else for his study, than war and its rules and discipline; for this is the sole art that belongs to him who rules, and it is of such force that it not only upholds those who are born princes, but it often enables men to rise from a private station to that rank. And, on the contrary, it is seen that when princes have thought more of ease than of arms they have lost their states. And the first cause of your losing it is to neglect this art; and what enables you to acquire a state is to be master of the art. Francesco Sforza, through being martial, from a private person became Duke of Milan; and the sons, through avoiding the hardships and troubles of arms, from dukes became private persons. For among other evils which being unarmed brings you, it causes you to be despised, and this is one of those ignominies against which a prince ought to guard himself, as is shown later on. Because there is nothing proportionate between the armed and the unarmed; and it is not reasonable that he who is armed should yield obedience willingly to him who is unarmed, or that the unarmed man should be secure among armed servants. Because, there being in the one disdain and in the other suspicion, it is not possible for them to work well together. And therefore a prince who does not understand the art of war, over and above the other misfortunes already mentioned, cannot be respected by his soldiers, nor can he rely on them. He ought never, therefore, to have out of his thoughts this subject of war, and in peace he should addict himself more to its exercise than in war; this he can do in two ways, the one by action, the other by study.
As regards action, he ought above all things to keep his men well organized and drilled, to follow incessantly the chase, by which he accustoms his body to hardships, and learns something of the nature of localities, and gets to find out how the mountains rise, how the valleys open out, how the plains lie, and to understand the nature of rivers and marshes, and in all this to take the greatest care. Which knowledge is useful in two ways. Firstly, he learns to know his country, and is better able to undertake its defence; afterwards, by means of the knowledge and observation of that locality, he understands with ease any other which it may be necessary for him to study hereafter; because the hills, valleys, and plains, and rivers and marshes that are, for instance, in Tuscany, have a certain resemblance to those of other countries, so that with a knowledge of the aspect of one country one can easily arrive at a knowledge of others. And the prince that lacks this skill lacks the essential which it is desirable that a captain should possess, for it teaches him to surprise his enemy, to select quarters, to lead armies, to array the battle, to besiege towns to advantage.
Philopoemen,(*) Prince of the Achaeans, among other praises which writers have bestowed on him, is commended because in time of peace he never had anything in his mind but the rules of war; and when he was in the country with friends, he often stopped and reasoned with them: "If the enemy should be upon that hill, and we should find ourselves here with our army, with whom would be the advantage? How should one best advance to meet him, keeping the ranks? If we should wish to retreat, how ought we to pursue?" And he would set forth to them, as he went, all the chances that could befall an army; he would listen to their opinion and state his, confirming it with reasons, so that by these continual discussions there could never arise, in time of war, any unexpected circumstances that he could not deal with.
(*) Philopoemen, "the last of the Greeks," born 252 B.C., died 183 B.C.
But to exercise the intellect the prince should read histories, and study there the actions of illustrious men, to see how they have borne themselves in war, to examine the causes of their victories and defeat, so as to avoid the latter and imitate the former; and above all do as an illustrious man did, who took as an exemplar one who had been praised and famous before him, and whose achievements and deeds he always kept in his mind, as it is said Alexander the Great imitated Achilles, Caesar Alexander, Scipio Cyrus. And whoever reads the life of Cyrus, written by Xenophon, will recognize afterwards in the life of Scipio how that imitation was his glory, and how in chastity, affability, humanity, and liberality Scipio conformed to those things which have been written of Cyrus by Xenophon. A wise prince ought to observe some such rules, and never in peaceful times stand idle, but increase his resources with industry in such a way that they may be available to him in adversity, so that if fortune chances it may find him prepared to resist her blows.
|
<urn:uuid:ca1a2ade-9b4f-4480-a5a3-eb438aa4a650>
|
CC-MAIN-2017-04
|
https://www.cliffsnotes.com/literature/p/the-prince/summary-and-analysis/chapter-14/chapter-14-1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00327-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.98379
| 1,072
| 2.625
| 3
|
- 1. BLACK SKY SHINING OBJECTS THE KITE
- 2. Plans for a 6 foot Rokkaku
- 3. MBK Delta Kite Plans
- 4. MBK Delta Kite Plans
- 5. MBK Rokkaku Kite Plans
- 6. News from Windswept Kites Attention kite builders a new
- 7. PDF Plans Box Kite Plans DIY Free Plans To Build Wooden
- 8. Build a Kite Aerial graphy Rig
- 9. How to Make a Kite for Kids A Tailless Kite
- 10. Public Lab Inspirational deltas
- 11. Inspiration Monday
- 12. 16 Printable Kite Template Designs Excel PDF Formats
- 13. How to Make a Kite – DIY Box Kite
- 14. Kite Plans
- 15. MBK Diamond Kite Plans
- 16. Issue 71 Kite Plan Crowell Cross Deck Kites
- 17. Image result for diy kiteboard fins
- 18. many kind of kite plan Creative ideas for kids
- 19. Hang Glider Ski Kite 12 wingspan DIY How To build PLANS
- 20. MBK Delta Kite Plans
- 21. Butterfly Kite DIY INSTRUCTIONS This one of the
- 22. How to Make a Kite Learn Play Imagine
- 23. Public Lab DIY Light Delta kite Rogallo wing
Top 23 Diy Kite Plans
.Lacking different methods of fire illumination, the Zippo Emergency Situation Fire Kit is perfect to sling in your backpack for, yes, emergency situations just! It evaluates hardly anything and also is about the size of a common Bic cigarette lighter making it an excellent enhancement to your very own DIY fire starter kit too.
1. BLACK SKY SHINING OBJECTS THE KITE
Best DIY Kite Plans
from BLACK SKY SHINING OBJECTS THE KITE. Source Image: alidadpersia2.blogspot.com. Visit this site for details: alidadpersia2.blogspot.com
Activities for children which are enjoyable points to do during snow days, stormy days, and also the vacations. These home made diy craft packages include stitching packages, craft sets, slime kits, precious jewelry kits, paint packages, art sets, doll kits, along with baking sets. Hopefully, these tasks will engage your youngster’s creativity and also be enjoyable dullness busters or simply something awesome to do with each other!
2. Plans for a 6 foot Rokkaku
And also those craft kits are coming back with a vengeance – and also with many brand-new models. With the surge of inspiring platforms like Pinterest, crafting has actually seen a huge increase in popularity.
3. MBK Delta Kite Plans
Generally, in order to do concrete DIY projects, you have to get remarkably massive bags of concrete mix. But this set keeps it basic with just enough to make one planter (or candle holder). It doesn’t consist of paint, but if you take place to have any kind of around, the ornamental possibilities are countless!
4. MBK Delta Kite Plans
No one ever before has adequate lip balm, which is a reality. Learn how to make it on your own with this cocoa butter-based set, as well as maybe you’ll start feeling encouraged to make more all-natural, DIY appeal items as a hobby (did you recognize dried beet powder makes great flush?!). Oh, and also another attractive thing about these kits? They are constructed in D.C. by women in transitional housing programs, giving them a chance to establish their resumes and also employment abilities.
5. MBK Rokkaku Kite Plans
Tassels are appearing anywhere. Right here’s just how to hop on the pattern with an enjoyable DIY variation! Each of these kits features cord, string, directions, and also an optional clip ring so you can affix it to bag bands – and even your tricks.
6. News from Windswept Kites Attention kite builders a new
$40 BUY NOW No one ever has enough lip balm, which is a reality. Learn how to make it on your own with this cacao butter-based set, and perhaps you’ll begin feeling urged to make even more natural, DIY beauty products as a leisure activity (did you understand dried beetroot powder makes great flush?!). Oh, and also an additional attractive feature of these kits? They are put together in D.C. by women in transitional real estate programs, providing an opportunity to create their resumes and employment abilities.
7. PDF Plans Box Kite Plans DIY Free Plans To Build Wooden
Absolutely No Creations DIY Paper Bead Kit $31 BUY NOWPaper grains are extremely easy to make, as well as can be rolled to 5 various sizes with this kit. The tough part is cutting all the paper, yet this kit comes with 140 pre-cut strips to make it very easy on you. You’ll also locate glass grains, flexible cord, glossy varnish, glue, and also a brush in the kit.
8. Build a Kite Aerial graphy Rig
Package $31 BUY NOWThis kit has everything you require to make numerous bars of all-natural soap, but the cool part is that you do not need to make it at one time. You can take your time playing around with this kit that includes a variety of recipes, ingredients, molds, and necessary oils. Every little thing is organic and also all-natural also, so no demand to stress over gross chemicals getting on your skin.
9. How to Make a Kite for Kids A Tailless Kite
appearing anywhere. Here’s just how to hop on the fad with an enjoyable DIY version! Each of these sets includes cable, string, directions, and an optional clip ring so you can connect it to bag bands – or even your secrets.
10. Public Lab Inspirational deltas
Feel confident, there are lots of methods you can transform that old surface into a new one without breaking your budget plan. From actual stone to resilient concrete, right here are 5 DIY packages that will provide your hideous kitchen counter a gorgeous new coating.
11. Inspiration Monday
A DIY resurfacing set is an economical option that’s a portion of the price. An additional good to recognize, they keep old kitchen counters out of land fills, which benefits the world.
12. 16 Printable Kite Template Designs Excel PDF Formats
Just how long will it take you to DIY? That you understand, most countertop resurfacing packages make use of numerous finishes.
13. How to Make a Kite – DIY Box Kite
Rust-Oleum makes a resurfacing kit called, Countertop Transformations. It creates a textured stone-like coating on laminate surface areas. What makes this kit various from the remainder? Rather than making use of spreadable stone, concrete, or paint, it uses ornamental chips complied with by an epoxy finish. The entire DIY process takes 2 days.
14. Kite Plans
There are a number of epoxy kitchen counter resurfacing kits readily available that start at around $250 each. While they’re all created for DIY use, each kit we found is filled with dangerous VOCs, so we can not recommend them for your kitchen.
Yikes, your old counter top sure is ugly! Structurally speaking, it remains in ALRIGHT shape, however its worn out appearance makes your kitchen appearance dated. Of course, you would enjoy to change it. However you can’t pay for to mount laminate – and also granite.Rest guaranteed, there are a lot of means you can transform that old surface area right into a new one without busting your spending plan. From genuine rock to long lasting concrete, here are five DIY packages that will certainly offer your hideous counter top a lovely new coating.
15. MBK Diamond Kite Plans
7. Caron Roll-Up Art Set – This basic, very easy, and low-cost gift concept is perfect for on-the-go kids. 8. Finger Creature’s Package- Free printable puppet gift box, product checklist as well as guidelines make this DIY present simple and also charming. 9. Gardening Kit- Children can dig in the dust and also see things grow no matter the season. 10. Titan Bubble Package – A fantastic DIY present concept with bubble recipe, how-to instructions as well as totally free printable tags. 11. Super Craft Set – Fill a tackle box with all the artsy smart stuff a little woman can request for. 12. Stick Puppet Kit-This creature kit is a terrific way to consume remaining craft supplies creating a best DIY child present.
16. Issue 71 Kite Plan Crowell Cross Deck Kites
13. Journal Package -This kit features a complimentary printable for labeling package and also all of its material. 14. Fairy Residence Set – Assembled this super-quick, ADORABLE, little, fairy house building package with left over craft materials. 15. Sand Castle Package- This includes guidelines for sand play dough as well as a straightforward material checklist to create an enjoyable child gift. 16. Dinosaur Dig Kit -If you have a budding paleontologist in your home, right here is the excellent gift.
17. Image result for diy kiteboard fins
17. Pen Chum Kit – Gather a pencil box, paper, pens, envelopes, as well as maybe a reward and also you’re excellent to go on this DIY youngster present. 18. Novice Stitching Kits – Below is a straightforward idea for kids who appreciate beginning stitching projects. 19. Snowman Kit – Set this cute DIY gift with a cost-free printable as well as you’re in business. 20. Band in a Box Kit – This DIY set is made totally from recycled products. Save your peanut butter container for the BAND. 21. Relationship Bracelet Package – To make this easy present kit you just need to head over to your neighborhood craft shop. It also features a complimentary printable. 22. Scientific Research Experiment Set – Consists of a checklist of experiments to attempt as well as a material list. This is such a trendy gift for children.
18. many kind of kite plan Creative ideas for kids
29. Inside Man Kit – This package can operate more like a secret video game or a solve-the-crime package. Such a wonderful gift suggestion! 30. Mustache Disguise Set – With a little felt, flexible and also a couple of various other fabrics, these are very easy to make. 31. Medical professional Set – Exists a medical professional in the house? There can be with this imaginative DIY present. 32. Library Play Set – Let your child transform your book collection right into an “in the house” library. 33. Magic Set – A straightforward homemade magic package made from fundamental family products provide youngsters with hrs of countless creative play! 34. Vet Kit – My kids do not have a pet, so they act their stuffed animals live. They would certainly love this DIY play kit to look after their stuffed pals.
19. Hang Glider Ski Kite 12 wingspan DIY How To build PLANS
35. Blog Post Workplace Play Package – My youngsters love to obtain mail and with this cute play kit, they can give everybody in the house some mail. 36. Garden Explorer – There’s no factor incredible present ideas need to remain within! Here is a straightforward and also inexpensive DIY child gift to give your youngster some outside enjoyable! 37. Hogwarts’ Potions Set – This Harry Potter-themed gift is best for spells as well as potions course. There are instructions for a DIY wand and a spell book! 38. Spy Set- Below is an adorable DIY spy carrying case with buck shop equipment. 39. Investigative Package – No enigma is too great when you have actually got your detective package available! 40. Play Teacher Package – Bust out the paper and also pencils, due to the fact that it’s time for institution! Knowing is even more fun when you’re the educator!
20. MBK Delta Kite Plans
41. Mail Provider Package – This is a craft for the stitching mommies available. This is a beloved little DIY gift with terrific instructions for every single item. Time to break out the sewing equipment! 42. Child’s Load & Play Stove Package -This is the prettiest little stove as well as it’s little enough to pack around and also go into the car. Have oven, will travel! 43. Pirate Costume Set – Embrace your inner Pirate, (ARGGHH!) and also make a really basic pirate costume that functions great for playtime around the house or for a themed birthday event. Really great instructions! 44. Dress up PACKAGE – My youngsters LIKE to spruce up! This is a great start for collecting every one of things you require to have an excellent outfit box! 45. Fireman Outfit Kit – Making a firefighter’s air tank out of recycled products is economical and also a fun addition to a kid’s dress-up collection! 46. Baker’s Set -Put together some baking devices and products to make the perfect DIY gift for a junior master chef!
21. Butterfly Kite DIY INSTRUCTIONS This one of the
Shadow Puppet Ft Set – This kit it fantastic for fts and terrific for shadow puppets! Child’s Tinkering Package – This gift is sure to bring out the builder in your child, a play kit made of genuine devices! PVC Structure Package – This is a great present concept for the little building contractor in your life.
22. How to Make a Kite Learn Play Imagine
These homemade diy craft packages include sewing kits, craft packages, scum packages, jewelry packages, paint kits, art sets, doll packages, as well as baking sets. Fairy Residence Kit – Placed with each other this super-quick, ADORABLE, little, fairy home structure package with left over craft supplies. Band in a Box Package – This DIY set is made totally from recycled materials. Secret Representative Kit – This package can work even more like a secret video game or a solve-the-crime package. Detective Package – No secret is too great when you have actually got your investigator set on hand!
23. Public Lab DIY Light Delta kite Rogallo wing
Tasks for kids which are fun points to do throughout snow days, rainy days, and also the holidays. These homemade diy craft sets consist of sewing packages, craft sets, scum sets, precious jewelry sets, paint kits, art packages, doll packages, in addition to baking kits. With any luck, these tasks will certainly involve your kid’s creative imagination and also be amusing dullness busters or just something great to do together!
Originally posted 2017-09-02 20:56:52.
|
<urn:uuid:d39bc9d1-ec30-47d3-b74e-b2f20b8168a6>
|
CC-MAIN-2022-33
|
https://stunningplans.com/diy-kite-plans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00474.warc.gz
|
en
| 0.918311
| 3,135
| 2.078125
| 2
|
Human rights activists are criticizing Ivorian President Alassane Ouattara's regime for only arresting and charging his enemies following a six-month, post-electoral power struggle that plunged the country back into civil war.
This week saw dozens of allies to former Ivorian leader, Laurent Gbagbo, face charges in relation to post-electoral violence, including 58 army officers accused Thursday of crimes ranging from murder and rape to buying illegal arms and recruiting mercenaries.
In total, Ivory Coast has charged as many as 94 military and political allies of Mr. Gbagbo, who remains under arrest following his capture by forces loyal to current president, Alassane Ouattara, in April.
Since taking office in May, Mr. Ouattara has repeatedly promised to investigate abuses and bring perpetrators on both sides to justice.
Rights groups say he must follow up his statements with action.
Vice President of the Ivorian Movement for Human Rights, Doumbia Yacouba, says so far, only Gbagbo allies have been arrested, even though it has been established and recognized by the government that there were violent acts committed by both sides. Yacouba says for justice to be credible, it must be balanced. He says they expect to see arrests made in Mr. Ouattara's camp as well.
Yacouba says the justice system is still in disorder, but once prisons are operational again and judges are trained and back in their offices, there will be no more excuses.
Pressure on the new president to act is expected to increase following Thursday's announcement by the U.N. Mission in Ivory Coast that the country's armed forces have carried out 26 extrajudicial killings in the past month, many of them in the country's still volatile west.
The rights representative for the U.N. mission, Guillaume Ngefa, said his office has documented more than 100 human rights violations between mid-July and mid-August. He said those included 85 illegal arrests.
The Republican Forces of Ivory Coast, as the country's new integrated army is called, incorporates former rebel fighters from the North who were instrumental in bringing Mr. Ouattara to power.
Matt Wells is the Ivory Coast researcher for international watchdog, Human Rights Watch. "It's less and less possible each day for the government to claim that these are just out of control elements. This is now the official army of Cote d'Ivoire, and it's time for the government both its civilian and military leaders to step up and make sure that there is control," he said.
Human Rights Watch (HRW) has documented reprisal killings, war crimes and abuses by forces loyal to Mr. Ouattara both during and after their April offensive.
HRW expressed concern earlier this week when Mr. Ouattara promoted two former rebel commanders who have been accused of grave human rights abuses to new posts within the Republican Forces.
One of them, Martin Kouakou Fofié, has been on the U.N. Security Council sanctions list since 2006 for violations committed during the first Ivorian conflict.
HRW researcher Wells says these commanders need to be brought to justice. "Certainly there's the reality that many of these commanders, of the former Forces Nouvelles that became the Republican Forces, swept Ouattara into power, but at the same time Ouattara owes more than anything to the victims on both sides in order to move the country forward, to remove the country from the nightmare of impunity that has haunted it for the past decade," he said.
Violence began in Ivory Coast following a November presidential poll when Mr. Gbagbo refused to concede defeat to Mr. Ouattara. Pro-Gbagbo militia and security forces are accused of turning heavy artillery on civilians and inciting attacks of West African immigrants, among other abuses.
In all, rights groups say the post-electoral crisis killed more than 3,000 civilians and displaced hundreds of thousands.
|
<urn:uuid:b7a72f2b-e49b-4cf9-a14c-7e9e5ab3a98c>
|
CC-MAIN-2017-04
|
http://www.voanews.com/a/human-rights-activists-criticize-one-sided-justice-in-ivory-coast-127660438/158655.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00242-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.97335
| 816
| 1.546875
| 2
|
The necessary cookies allow the site to function properly.
There are 300 trading houses (or maisons de négoce) which, for several centuries, have been a major financial and economic force known by the name of “Place de Bordeaux".
Wine trading began in Bordeaux around the 11th century with the development of business between Bordeaux and England. At the time, practically all of the wines were bought in bulk at the estate then aged in the cellars owned by the négociants who were then in charge of selling them.
Wine négociants must be versatile, combining technical expertise, market knowledge, as well as sales and logistics capabilities.
Gironde négociants handle over 70% of Bordeaux wine sales, exporting to over 170 countries.
They have a dual role:
- selling selected crus (grand crus or wines bottled at the estate by the winegrower);
- producing wine: négociants blend, age and sell wines under their own brand names, providing consumers with a guarantee of know-how, and retailers with a guarantee of regular supply.
At the forefront of technical and market knowledge, négociants have played a role in modernizing practices by developing partnerships with chateaux and directly at their own wine estates (one out of two négociants is also an owner).
Lastly, Gironde négociants are a fundamental component of the Primeur process since they are the ones who financially support the stock of wines from the most recent vintage of classified crus and equivalents, which will be aged at the chateaux for 18 to 24 months.
To learn more, visit the website: Bordeaux Négoce.
|
<urn:uuid:e80a6b46-a556-49ca-88a6-e266ef1efd95>
|
CC-MAIN-2022-33
|
https://www.bordeaux.com/us/Our-know-how/Wine-Professions/Trading
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00075.warc.gz
|
en
| 0.947845
| 368
| 2.203125
| 2
|
Teens will learn how to create a variety of different embroidery stitches, and use them to make their own embroidery sampler for reference and practice at home. This is a basics class, no experience necessary! Registration required.
Event Type(s): Tweens & Teens
Age Group(s): high school
Register For Event
You must log in to register for this event.
Oops! - There was a problem in authenticating your card:
|
<urn:uuid:2c1b6c2e-8cbf-474d-9d5f-85e5002c2826>
|
CC-MAIN-2022-33
|
https://lexpublib.evanced.info/signup/eventdetails?eventid=76248&lib=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00067.warc.gz
|
en
| 0.922927
| 104
| 1.539063
| 2
|
The Global Research Institute, formerly the Institute for the Theory and Practice of International Relations, made a splash during Homecoming 2018 with the launch of its new name and brand and its Shark Tank competition, now in its fifth year. President Katherine A. Rowe gave the introductory speech to a large audience in Commonwealth Auditorium, and alumni of the contest and from across the university came to learn about student innovation and guess who would win.
At the Institute’s Research Shark Tank final event, students pitch their international policy concepts to a panel with the goal of winning up to $20,000 in research funds to pursue their project. They’ve partnered with professors, alumni and staff to craft fully developed proposals as well as dramatic pitches with the hope of persuading the judges to deem their proposal worthy of funding. So, as exciting as the show is, the staging and drama are merely the public face, the culmination of a lot of work, preparation and substantive research behind the scenes and in the foot-noted and graph-filled proposals the contestants share with the judges.
Why Shark Tank?
The mission of the Institute is to support student and faculty teams to do globally applied research. Professor David Trichler, director of programs for the Global Research Institute, explains that, “As part of that mission we want to support an entrepreneurial mindset. Shark Tank permits the students to get a sense of what it is like in the driver's seat on generating ideas and then building those ideas out through a consultative and iterative process with faculty and practitioners.”
Although the glamour comes with the final contest, Trichler sees the value coming in the work leading up the show.
“In Shark Tank they learn persistence,” he said, “the value of picking up the phone or emailing someone with more experience to get smart quickly, how to build a team, the importance of resourcing and knowing your limitations, and ideally, how to define and communicate a problem that needs to be solved and a way to try to solve it.”
The final show condenses into a carefully structured 90-minute work over more than one semester. Trichler explained the process: “Shark Tank happens in two phases. The first is what one might consider a semifinal round, in which students go through a series of workshops and classes and pitch their ideas to a panel of faculty. Last spring they pitched to Carrie Dolan (assistant professor in the Department of Kinesiology and Health Sciences and research fellow in public policy), Brad Parks ’03 (co-executive director of AidData), and Amy Oakes (University associate professor for Teaching Excellence and director, International Relations Program); and in the summer it was Mike Tierney ’87 (George and Mary Hylton Professor of Government and International Relations and co-director, Global Research Institute), Jaime Settle (associate professor, Government), and Shawna Metzger (visiting assistant professor, Government. Each of those rounds sent two or three students to the final round.”
That means that some of the students have been working on their ideas for as long as 10 months.
The final five
Five projects made it to the final at Homecoming. They were (in order of their presentation):
- Supporting Translators: National Security Concerns on the U.S. Failure to Help Allies Abroad by Charles Geddes ’19 and Diana Ibarra ’20.
- The Internet of Things: Why We Need Airbags for the Internet by Lexi Pacheco ’20 and Katie Weinsheimer ’21.
- Mobile Microinsurance: Understanding Barriers to Microinsurance Uptake Among Rural Farmers [in East Africa] by Henry Crossman ’19, Darrien Spitz ’19, and Kayla Temple ’20.
- Mapping Resiliency: Geocoding Hezbollah’s Social Welfare Investment by Adam Kearney ’20 and Alexander Nocks ’19.
- Food for the Future: A Call for Better Aid (a project to gather and create a framework for data to help predict effects of climate change on crop yields in Cote d’Ivoire) by Andrea Chavez ’19, Kia Garrett ’19, and Jack Pohlmann ’19.
The William & Mary Sharks this year represented years of experience in development, policy and business, and were clearly knowledgeable about the fields and even the specific ideas pitched:
- Peter Atwater ’83, President of Financial Insyghts LLC.
- Katie Sell Garcia ’99, Acting Director, Office of Market and Partnership Innovations, Bureau for Food Security at USAID.
- Caitlin Moorman ’07, Head of Insights and Analytics at Indiegogo.
- Theresa Whelan ’87, Principal Deputy Assistant Secretary of Defense for Homeland Defense and Global Security, Department of Defense.
They didn’t indulge in the kind of grandstanding for the cameras or insulting histrionics that increase television ratings, but they also didn’t cut the students any slack. Whether asking why they hadn’t pursued private sector funding to wondering what the actual value of the research or end product would be, they urged the students to refine their thinking and support their premises. They also made suggestions for improving the proposal. For instance, Garcia noted that not only was the research on microinsurance useful and timely, but that the students should reach out to Michael Carter, professor of Agricultural and Resource Economics at UC Davis, who is conducting similar research and would be a useful resource.
The results of the competition were announced at the homecoming barbecue at the Global Research Institute’s Scotland Street offices. In spite of a determined, steady rain, students, faculty, alumni and friends and family members crowded the porch and front lawn to hear Trichler announce the winners. He began by explaining that a frequent part of entrepreneurship is failing and trying again. There would be three winners, and he would work with them to figure out what funding they would receive. He also said he would continue to work with the two teams that didn’t win, because he still supported their ideas.
The winners (in no order) were:
- Mobile Microinsurance: Understanding Barriers to Microinsurance Uptake.
- Mapping Resiliency: Geocoding Hezbollah’s Social Welfare Investment.
- Food for the Future: A Call for Better Aid.
Links to the concept notes to all projects are available online here: https://wmblogs.wm.edu/globalresearch/shark-tank-2018-concept-notes/
Alexander Nocks of the Mapping Resiliency project was enthusiastic about the win, but also the work that went into it:
“With faculty support throughout the Shark Tank process, Adam (Kearney) and I had the rare privilege of designing our project from start to finish,” he said. “Now that we've received funding, we have the opportunity to carry our work even further, implementing our project to produce new knowledge that shapes real-world policies. Being empowered to do all that in undergrad is the Global Research Institute advantage.”
But the magic of the Shark Tank is bigger than the win.
Jamie Siminoff, a contestant on the television show had his idea of a video doorbell rejected in 2013. He described wanting to cry after the show. He isn’t crying now. Earlier this year he sold his company “Ring” to Amazon for $1 billion, and even better revenge, he’s now a guest shark himself.
Not everyone can be a winner at W&M, either. “There is a point during their idea generation and development phase each semester in which I think ‘This time, they are not going to pull this off,’” Trichler said. “And each semester, I am impressed by how they keep pushing and thinking and creating to come up with the core of a very good idea, and one that can have an impact.”
Tierney often says that the message of the work of the Institute is that a good idea can come as easily from a grey-haired faculty member or an undergraduate. Trichler concurs.
“Good ideas are no respecter of age, and they often do not come as a lightning bolt from the blue, but rather from grit and failure and perseverance. And that is perhaps the best life lesson I could hope they take away,” he said.
Rowe sees a value not only for the students, but for the university and the world around us.
“It’s places like the Global Research Institute that help William & Mary be the place you come when you have, as they say there, ‘unsolvable problems requiring data that is unmeasurable and methodologies that haven’t been invented yet,’” she said in her opening remarks. “You come to William & Mary and that’s the place to go to do those things. And as we’ll see with these students, the future of solving unsolvable problems with previously unmeasurable data, with methods that we’re just inventing right now, is bright indeed.”
|
<urn:uuid:6b284341-cb2d-4cb7-884d-78b4b8b08c12>
|
CC-MAIN-2022-33
|
https://www.wm.edu/news/stories/2018/shark-tank-solving-tough-problems-with-innovative-data.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00668.warc.gz
|
en
| 0.957088
| 1,945
| 1.953125
| 2
|
Author Pat Kirkham discusses the opening titles for The Cardinal, from her authoritative book Saul Bass: A Life in Film and Design.
The beautiful live-action title sequence for this story of a priest who rises to the rank of cardinal reveals a remarkable sensitivity to light and pattern. A commanding piece of photography and editing, its elegant restraint counterbalances a majesty and beauty that might otherwise overwhelm.
The sequence locates place, time and character: a young priest at the Vatican, the physical and spiritual center of the Roman Catholic Church, in Fascist Italy in the 1930s. A series of cross fades of steps, columns, mosaic pavements and surrounding spaces produce visceral visual pleasures. The powerful shadows and the slow movement of a solitary silhouette across a landscape, at once specific and abstract, suggest a darker side to this apparent serenity.
The obligations and control — from which the main character never quite escapes — are suggested by the length and strength of the cast shadows. The darkness of the shadows is still in the mind when the camera moves to graffiti, with its abrupt reminder of the greater shadow of Fascism. Jerome Moss's score highlights the isolation of the priest and hints at tensions between him and his Church.
It was easier to come up with a title sequence for this film than it was to find a symbol. Saul stated, “No matter how I tried to pictorialize it, I always wound up [with] a kind of ecclesiastical character in the graphic material, which tended to type it as a religious film or dull documentary. What I wanted to advertise was the film's general dramatic quality, with a sense of strength and impact.”
In the end, the symbol was created out of the name of the film, using lettering to convey a sense of monumentality. Imposing in its own right, the size and importance of the word "cardinal" is greatly reduced in significance by the power and towering presence of "the," the structure of which symbolizes a greater power than that of the Cardinal, namely the Vatican.
Pat Kirkham is Professor in the History of Design, Decorative Arts and Culture at the Bard Graduate Center for Studies in the Decorative Arts, Design & Culture, New York. She has written and edited a number of books, including Charles and Ray Eames (1998) and Women Designers in the USA 1900–2000 (2001).
©2011 Laurence King Publishing Ltd. Used with permission.
Titles: Saul Bass
Discover more Saul Bass
SAUL BASS: A LIFE IN FILM AND DESIGN
By Jennifer Bass and Pat Kirkham
|
<urn:uuid:81dacdea-a5db-4df8-8efc-436d838e5469>
|
CC-MAIN-2022-33
|
https://d.cdnv2.artofthetitle.com/title/the-cardinal/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00674.warc.gz
|
en
| 0.943048
| 568
| 2.109375
| 2
|
Q: Can I still ride a Class I, II, III or IV ATV on public lands if my Oregon driver’s license is suspended?
A: No. Having a suspended driver’s license also suspends you from operating any class of ATV on public lands in Oregon.
Q: Can I ride two-up (double) on my ATV or off-road motorcycle?
A: There are no ATV-specific laws about passengers other than making sure they have a seat and a floor pan or foot pegs OAR 735-116-0000. However there is a motor vehicle law that says the passenger cannot be in the operator’s lap or embrace ORS 811.190 “Driver Operations With Obstructing Passenger”. This is a Class D traffic violation.
ATV Safety Education Card
Q: What is the minimum age to operate an ATV, Motorcycle, or Side-by-side in Oregon?
A: There is no minimum age for riding a Class I ATV in Oregon. The minimum age for motorcycle riders is seven years old. Youth under 16 operating a Class IV ATV must meet the manufacturer's minimum age recommendation.
Q: Who is required to have a ATV Safety Education Card?
A: All Class I and III riders must have an ATV Safety Education Card
Q: I’m from another state or country and wish to ride an ATV or motorcycle in Oregon. Do I need to take the online ATV safety education course and carry an Oregon ATV Safety Education Card?
A: Yes, all non-residents riding in Oregon are required to take the online ATV Safety Course and carry an ATV Safety Education Card. They are exempt if they possess a card issued by another state or country.
Q: I don’t like to carry my wallet when I ride. Must I carry my ATV Safety Education Card on my person?
A: No. The law only requires that you must possess the card. That means that the card could be in a zip lock next to the battery. Having the card at home or back in your car is not “possessing” the card from a law enforcement point of view.
Q: What requirements are there for youth operating Class IV ATVs?
Q: My child has already taken OPRD’s on-line Safety Course and the ASI hands-on RiderCourseSM, will they need to get retrained in 2012?
A: No. Those who have already received hands-on training via ASI or MSF and have completed the on-line safety training (above) have already met this requirement and can get a new, endorsed, ATV Safety Education Card at no cost now! Just send us a copy of the card provided by the hands-on instructor with an application and we’ll do the rest.
**To save information typed into this form, you must have Adobe Reader version 8.0, which is available for free from the link at the bottom of this site.
Q: Why is there a need for youth rider fit requirements?
A: Special fit requirements have been created because of the large number of crashes involving riders under age 16. Crash research clearly identifies that riding too-large adult-sized quads is a significant injury and fatality risk. Rider fit requirements help parents and law enforcement officers measure a “proper fit” between youth and the quad they are operating.
Q: What are the rider-fit requirements?
A: A Class I operator (quad rider), under the age of 16, must meet all the following minimum physical size requirements (Rider Fit) in relationship to the vehicle:
1. Brake Reach: With hands placed in the normal operating position and fingers straight out, the first joint (from the tip) of the middle finger will extend beyond the brake lever and clutch.
2. Leg Length: While sitting and with their feet on the pegs, the knee must be bent at least 45 degrees.
3. Grip Reach: While sitting upright on the quad with hands on the handle bars and not leaning forward, there must be a distinct angle between the upper arm and the forearm, and;
4. The rider must be able to turn the handle bars from lock to lock while maintaining grip on the handle bars and maintaining throttle and brake control.
5. Disabled riders are allowed to use prosthetic devices or modified or adaptive equipment to achieve rider fit.
Q: Are there similar rider fit requirements for youth riding Class III All-Terrain Vehicles (motorcycles)?
A: No. This requirement was not a part of Senate Bill 101.
Q: Can my 12-year-old child go to the American Safety Institute (ASI) training course on his 250 cc quad?
A: No. ASI has their own rules for matching the age of the rider to the ATV.
Q: Who must wear a helmet?
A: All riders any class ATV under the age of 18.
Q: Are there any exceptions to youth wearing a helmet?
A: Yes. A helmet does not need to be worn if the youth is riding in a street-legal Class II vehicle registered in Oregon.
Q: What kind of helmet must be worn?
A: DOT (or Snell) approved motorcycle helmet with the chin strap fastened.
Q: Who must be supervised?
A: All youth under 16 operating Class I, III, or IV ATVs on public lands must be supervised.
Q: How old must a “Supervisor” be?
A: Supervisors of youth on ATVs must be 18 or over.
Q: The law states that the supervising adult must have a valid ATV Safety Education Card. Am I supposed to go through on-line ATV training before I can ride with my child?
A: Yes. All youth under age 16 operating a Class I or Class III ATV on public lands must be supervised by an adult who is at least 18 years old and holds a valid ATV Safety Education Card
. As a result, any adult supervising a youth under age 16 must also complete the on-line safety training course starting on January 1, 2009.
Q: The law says that the supervising adult must be able to provide immediate assistance and direction. What does that mean?
A: The youth being supervised must be able to hear and see the supervising adult. The adult needs to be capable of providing assistance to the youth without delay.
Q: How will a law enforcement officer handle an unsupervised youth?
A: Based on the youth operator’s age, an officer may choose to cite the youth under ORS 821-170 (or 821.172) “Operation of Class I (or Class III) all-terrain vehicle without driving privileges” or write a traffic citation against the responsible adult under ORS 821.291 (or 821.292) “Endangering a Class I (or Class III) All-Terrain Vehicle Operator”. All are Class C traffic violations.
|
<urn:uuid:0a21e96b-9da9-4bcd-824c-b6b786209e02>
|
CC-MAIN-2016-44
|
http://www.oregon.gov/OPRD/ATV/Pages/qa.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00056-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.933925
| 1,482
| 1.601563
| 2
|
When women undergo MRIs to check for breast cancer, the scans sometimes reveal suspicious masses elsewhere in the body, which can generate a lot of anxiety and require more testing. But a new study suggests these masses are often not cancerous.
Breast MRIs are different from mammograms, and physicians usually use them in women who are at high risk for developing breast cancer and those who already have the disease, to get a more detailed view of the breast and better assess their condition. But sometimes a piece of tissue outside the breast can show up as a bright spot on the scan and suggest that breast cancer has spread to another area in the body. Doctors call these cases extra-mammary findings.
To see how often such findings on breast MRIs turn out to be cancer, the researchers reviewed medical records of 1,322 women who had undergone the procedure at the University of Iowa between 2007 and 2012.
They found that in 130 women, or about 10 percent of all cases, the scans picked up a suspicious mass in the body, but in only six, or 4.6 percent of the cases where something was picked up, did more testing show the mass was indeed breast cancer that had spread to another area of the body, according to the study, which was presented June 1 at the annual meeting of the American Society for Clinical Oncology, in Chicago.
These six cases represented 0.5 percent of all breast MRIs in this study, the researchers said.
The results show that MRI scans are useful in finding these cancers, but also that only a few of the findings are actually cancer, which could help patients manage their anxiety, said study researcher Dr. Catherine Moore of the University of Iowa.
Previous studies have found a higher rate of incidental findings on breast MRIs. In one study of 1,535 breast MRIs, researchers found that about 18 percent of scans picked up a mass outside the breast, but only 20 percent of those were confirmed to be cancer. That study was published November 2011 in the journal European Radiology.
In the new study, Moore and colleagues also found that most of the masses the MRI scans revealed were in the liver and bone. The incidental MRI findings were more likely to occur in postmenopausal women, and women who had breast cancer, particularly those who had the hormone receptor- positive type of breast cancer.
|
<urn:uuid:25fdac25-9399-4cce-9a02-559f1cc4c0b9>
|
CC-MAIN-2022-33
|
https://www.livescience.com/46324-breast-mri-finds-cancer-elsewhere.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz
|
en
| 0.979386
| 477
| 2.96875
| 3
|
Cancer Epidemiol, Biomarkers & Preven 2009 (Apr); 18 (4): 1050–9 ~ FULL TEXT
Korde LA, Wu AH, Fears T, Nomura AM, West DW, Kolonel LN, Pike MC, Hoover RN, Ziegler RG
National Cancer Institute,
Bethesda, MD, USA.
INTRODUCTION: Historically, breast cancer incidence has been substantially higher in the United States than in Asia. When Asian women migrate to the United States, their breast cancer risk increases over several generations and approaches that for U.S. Whites. Thus, modifiable factors, such as diet, may be responsible.
METHODS: In this population-based case-control study of breast cancer among women of Chinese, Japanese, and Filipino descent, ages 20 to 55 years, and living in San Francisco-Oakland (California), Los Angeles (California) and Oahu (Hawaii), we interviewed 597 cases (70% of those eligible) and 966 controls (75%) about adolescent and adult diet and cultural practices. For subjects with mothers living in the United States (39% of participants), we interviewed mothers of 99 cases (43% of eligible) and 156 controls (40%) about the daughter's childhood exposures. Seventy-three percent of study participants were premenopausal at diagnosis.
RESULTS: Comparing highest with lowest tertiles, the multivariate relative risks (95% confidence interval) for childhood, adolescent, and adult soy intake were 0.40 (0.18-0.83; P(trend) = 0.03), 0.80 (0.59-1.08; P(trend) = 0.12), and 0.76 (0.56-1.02; P(trend) = 0.04), respectively. Inverse associations with childhood intake were noted in all three races, all three study sites, and women born in Asia and the United States. Adjustment for measures of westernization attenuated the associations with adolescent and adult soy intake but did not affect the inverse relationship with childhood soy intake.
DISCUSSION: Soy intake during childhood, adolescence, and adult life was associated with decreased breast cancer risk, with the strongest, most consistent effect for childhood intake. Soy may be a hormonally related, early-life exposure that influences breast cancer incidence.
From the Full-Text Article:
Breast cancer rates are consistently higher in Western countries than in Asia ; yet, among Asian migrants to the United States, breast cancer risk increases over several generations and eventually approaches that for U.S. White women . Thus, the protective factors, presumably related to Asian diet and lifestyle, are modifiable and not genetic. Early studies suggested that the increase in breast cancer risk did not appear until the second generation, among Asians born in the United States, contrary to the patterns noted for other major cancers . Therefore, it was hypothesized that exposure to Western lifestyle at an early age was critical in breast carcinogenesis [3-5]. These intriguing observations were the rationale for our study of breast cancer in Asian American women, in which we sought to elucidate the lifestyle and environmental factors responsible for increased risk in the West.
Epidemiologic studies of adult soy intake and breast cancer risk have reported mixed results , although studies in Asian and Asian American populations have generally suggested that soy is protective, possibly because of higher levels of soy consumption [7-13]. A recent meta-analysis of soy intake and breast cancer concluded that strong support exists for the hypothesis that soy intake in the amount consumed in Asian populations is protective against breast cancer . More consistent, and perhaps more intriguing, are three studies examining adolescent intake, each of which showed a decreased risk of breast cancer among women with high soy [15, 16] or phytoestrogen intake. Early-life exposures are increasingly being recognized as important in breast carcinogenesis and may act by altering the hormonal milieu . It is plausible that soy intake early in life affects breast cancer risk through a hormonal mechanism, as numerous animal studies and some clinical data have suggested that soy has weak estrogenic properties [20, 21]. Furthermore, several investigators have proposed that age at consumption of phytoestrogens influences their effect on breast cancer risk [6, 22-24]. To our knowledge, our study is the first to address the association between childhood soy intake and breast cancer risk.
We have previously described a modest inverse association between adult tofu intake and breast cancer risk in this population-based case-control study in Asian American women . In the present analysis, we use the wide variation in soy intake in this migrant population to examine the effects of soy intake across the lifespan. We seek to characterize the relative contributions of soy intake during childhood, adolescence, and adulthood and to evaluate whether soy is itself protective or merely an indicator of other Asian lifestyles that reduce breast cancer risk.
Soy intake during childhood, adolescence, and adult life were each associated with a decreased risk of breast cancer. For women in the highest and middle tertiles of childhood intake compared with the lowest tertile, risk was significantly reduced by ~60%. The inverse trend was also significant (P = 0.03). The inverse association with childhood soy intake was noted in all three races, all three study sites, and women with and without a family history of breast cancer. Furthermore, this effect of childhood diet was not attenuated by adjustment for soy intake in adolescence or adulthood. Instead, the weaker effects of adolescent and adult diet were eliminated by adjustment for childhood soy intake. These results suggest that soy intake in early life may be especially relevant to breast carcinogenesis.
It has been proposed that soy intake is merely an indicator of Asian lifestyles that reduce breast cancer risk. However, adjustment for the cultural practices significantly associated in with breast cancer risk our study did not noticeably weaken the protective effect of childhood soy intake. Because the inclusion of individual cultural and lifestyle practices in the model might not have sufficiently controlled for acculturation, we also adjusted for migration history, shown previously to predict a 6-fold gradient in breast cancer risk in this migrant population . Even addition of this variable, our best measure of acculturation, did not attenuate the association between childhood soy intake and breast cancer risk. These results suggest that soy intake during childhood may itself modulate biological mechanisms.
We believe that our study is the first to explore the role of childhood soy intake in the development of breast cancer. In previous epidemiologic studies examining adolescent intake, breast cancer risk was significantly reduced by ~50% in women with high soy or phytoestrogen intake during this period [15-17]. In these studies, the inverse relationship seen with adolescent intake was stronger than that with adult intake and persisted after controlling for adult soy consumption. Studies that have looked only at adult soy intake have reported less consistent results , but protective effects have generally been noted in Asian and Asian American populations . It is likely that the absolute levels of adult soy intake are higher in Asian and Asian American populations. However, an additional explanation is that adult soy intake is a more reliable indicator of childhood and adolescent soy intake in Asian populations than in non-Asian populations. Indeed, in our study, the inverse association between childhood soy intake and breast cancer was comparable in Asian American women born in the East and the West, whereas the more modest inverse association with adult soy intake was more pronounced in Asian American women born in the East.
Estrogen is known to play an important role in breast carcinogenesis. Both high circulating estrogen levels and postmenopausal estrogen therapy are associated with increased risk of postmenopausal breast cancer [29, 30]. Furthermore, most of the adult reproductive, menstrual, and lifestyle factors that influence breast cancer risk, such as age at first birth, parity, age at menarche, age at menopause, and postmenopausal adiposity, likely act through hormone-related mechanisms. Childhood exposures may also affect breast cancer risk through hormonal mechanisms. In a large cohort of Danish women, Ahlgren et al. found associations between breast cancer risk and childhood height, weight, and rate of growth . Other studies have reported similar associations [32-35]. In addition, several studies have suggested that overweight and obesity during childhood and adolescence decrease the risk of premenopausal breast cancer perhaps independent of their influence on body mass index in the early adult years [33, 35-37].
Studies of Japanese atomic bomb survivors and women who have received radiation treatment for Hodgkin's lymphoma have suggested that breast tissue may be particularly susceptible to carcinogens in the years before its terminal differentiation. One hypothesis for the decreased risk of breast cancer associated with childhood obesity is that exposure to estrogens produced in adipose tissue during this critical period induces earlier mammary gland maturation , which, in turn, decreases sensitivity to carcinogens. A diet high in soy early in life may protect against breast cancer through a similar mechanism because several experimental studies have suggested that soy isoflavones have weak estrogenic effects in the breast [40, 41]. Animal models also support the theory that early exposure to these phytoestrogens induces earlier differentiation of terminal duct lobules [42, 43] and reduces the incidence and multiplicity of carcinogen-induced tumors . In a recent study in Sprague-Dawley rats by Cabanes et al. , prepubertal exposure to estradiol and genestein (the isoflavone most abundant in soy) resulted in persistent up-regulation of the tumor suppressor gene BRCA1 in the mammary gland. Thus, several plausible mechanisms exist whereby early-life exposure to phytoestrogens can alter breast cancer risk .
Although the strength, statistical significance, and internal consistency of our results for childhood soy intake are provocative, our study does have limitations. Our estimate of soy intake is approximate, and because we did not ask about usual portion size, we were not able to perform a detailed analysis based on estimated phytoestrogen intake. The dietary interview did not systematically include sources of the less common phytoestrogens, so we could not assess their effect. In addition, we depended on a mother's recollection of what she usually fed her daughter during childhood. Evidence suggests that a mother's recollection of early-life exposures [46-49], and specifically early diet , is reasonably valid. Alternative approaches to investigating early diet, such as collecting information prospectively in childhood or asking adults to recall their childhood eating patterns, may actually be more problematic.
An additional limitation is the reduced number of subjects for whom we could interview mothers about childhood exposures, which decreased statistical power. Although the point estimates for the association between soy intake and breast cancer risk indicate a stronger effect for childhood than adolescent or adult soy intake, the 95% CI around the estimate for childhood intake are quite wide; thus, a weaker effect is possible. Nonetheless, both the RR for high soy intake during childhood, relative to low, and the test for trend reached statistical significance.
The statistical design excluded women ages >55 years to maximize the number of subjects for whom we could obtain childhood data by interviewing their mothers. Nonetheless, a number of our study participants (61%) had mothers who were deceased or not living in the United States, and the mothers of an additional 16% were not interviewed because either the mother or the daughter declined participation. Therefore, the subset of women for whom we have childhood dietary data might not be representative of the larger number of women included in our population-based study. In particular, women who were postmenopausal or older at breast cancer diagnosis often had to excluded from the childhood soy analyses. Although the subset might not be fully representative, the proportion of study participants with childhood dietary data was similar in cases and controls. It is likely that the subjects with childhood information, all of whose mothers were currently living in the United States, were born in the United States or migrated to the United States at a young age and therefore were more westernized. These women would be expected to have a higher absolute risk of breast cancer, lower levels of childhood soy intake, and weaker effects of childhood soy exposure. Therefore, our results in this subset may have underestimated the influence of childhood soy exposure in a more representative Asian American population.
This study also has distinct strengths. We have reported previously a 6-fold gradient in breast cancer risk by migration patterns in these Asian American women . This gradient is comparable with the historic international differences in breast cancer rates between Asia and the West. Thus, this migrant population, similar in ethnic background but diverse with regard to lifestyle, facilitates examination of the modifiable lifestyles that contribute to breast cancer risk. Although several measures of acculturation were positively correlated with breast cancer risk, it was striking that adjustment for these measures of acculturation, and for a composite variable representing migration history, did not attenuate the protective effect of childhood soy intake. Therefore, soy may have a biological role in modulating breast cancer risk, and the timing of this exposure may be critical.
Our epidemiologic analysis is the first to clearly support a role for childhood soy intake in the etiology of breast cancer. The contribution of modifiable childhood exposures to breast carcinogenesis has been postulated for decades, but rarely tested, because of the challenges of designing and fielding an appropriate study. Although the results of our single study are not sufficiently robust to serve as the basis for individual dietary modification or public health policy, they suggest the need for a paradigm shift: for the careful examination of the role of childhood exposures in determining breast cancer risk through in vitro, animal, and appropriately designed epidemiologic studies.
|
<urn:uuid:a30ad7d7-df75-48cd-b49b-30a10beee158>
|
CC-MAIN-2017-04
|
http://www.chiro.org/nutrition/ABSTRACTS/Childhood_Soy_Intake.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00454-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.950258
| 2,771
| 2.296875
| 2
|
PITTSBURGH, Nov. 14, 2016 - Individuals with mild cognitive impairment have a new resource in Pittsburgh with the recently established Brain Training and Exercise (BRiTE) mind and body wellness program, developed by a team of clinicians and scientists at the University of Pittsburgh with expertise in cognition and behavior. The program works to stimulate the brain and body of those with known or suspected cognitive impairment with the goal of improving overall health and wellness.
"There already are effective and well-developed programs that provide home care and nursing homes that benefit individuals with more advanced disease, yet there is little available for individuals with very mild cognitive deficits," said James T. Becker, Ph.D., professor of psychiatry, neurology and psychology at Pitt. "The BRiTE program provides these individuals with the opportunity to maintain their active occupational and social lifestyles."
The BRiTE program is housed in an 800-square-foot space in Oakland, which is equipped with padded carpeting for physical activity. Stations around the room can be configured to host various classes, including cognitive strategy, music, art and yoga training among others. All activities are designed to reduce frailty, increase strength and endurance and improve balance and stability.
All program participants undergo an initial evaluation to generate a wellness profile of physical, cognitive, emotional and social health. This profile provides a baseline, allowing the individual participants to track their progress through the program as they utilize the various cognitive and physical stimulation programs.
The BRiTE team, including Becker, Oscar L. Lopez, M.D., director of both BRiTE and the University of Pittsburgh Alzheimer's Disease Research Center, and Elizabeth Skidmore, Ph.D., chairperson of the Department of Occupational Therapy at the University of Pittsburgh School of Health and Rehabilitation Sciences, have been collaborating with experts at Fundació ACE Barcelona Alzheimer Treatment and Research Center since 1998. This center pioneered a model of nonpharmacological programs to help stimulate cognitive, behavioral and physical functions to improve social and occupational functions.
Grifols International has provided funding for this new program in Pittsburgh.
"We are tremendously thankful for their support and the opportunity to provide these state-of-the-art programs in Pittsburgh," said Lopez. "The BRiTE program will provide the area's population with a new program to support cognitive health that is not available elsewhere in the United States at this time."
The BRiTE program will celebrate its opening with an event for its founding members, funders, clinicians and staff today at 10 a.m. To attend, please contact Courtney Caprara at 412-592-8134 or email@example.com.
|
<urn:uuid:c1798046-63d4-440e-8eda-8e114ddd158d>
|
CC-MAIN-2022-33
|
https://www.upmc.com/media/news/brite-program
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00468.warc.gz
|
en
| 0.936308
| 551
| 1.796875
| 2
|
The study covered in this summary was published on researchsquare.com as a preprint and has not yet been peer reviewed.
Acneiform eruptions in patients with colorectal cancer are more extensive and severe when targeted cancer therapies are used in combination instead of alone.
Eruptions are particularly bad when combining EGFR and MEK inhibitors.
Prophylactic tetracycline does not prevent or decrease the severity of eruptions.
Why This Matters
Acneiform eruptions are a common side effect of single-agent targeted therapy.
The impact of combination therapy on cutaneous toxicity in colorectal cancer has not been previously described.
The findings make the case for increased vigilance and early aggressive treatment when patients receive targeted therapy combinations as well as a need for new prophylactic strategies.
Investigators reviewed 122 patients taking combination targeted therapies for colorectal cancer.
Most patients had stage IV colon cancer and had failed multiple lines of treatment.
The most common combinations were MEK plus PD-L1 inhibitors (30% of patients), EGFR plus MEK inhibitors (18%), and MEK plus PD-1 inhibitors (10%).
Overall, 105 patients (86%) developed a rash and 87 (71%) developed an acneiform eruption.
Seventy-five patients (61%) underwent subsequent dose modifications.
The median time from treatment initiation to acneiform eruption was 14 days.
Acneiform eruptions occurred in 86% of the EGFR/MEK inhibitor group, online prescriptions adderall xr 73% of the MEK/PD-L1 inhibitor group, and 67% of the MEK/PD-1 inhibitor group.
Among patients who developed acneiform eruptions, 94% had head and neck involvement, 74% had trunk involvement, 35% had bilateral upper extremity involvement, and 16% had bilateral lower extremity involvement.
The EGFR/MEK inhibitor group had the most severe eruptions and were the most likely to have lower extremity involvement.
Prophylactic tetracyclines did not prevent rashes or decrease their severity.
Of the six patients treated with oral retinoids, four demonstrated complete resolution, one had lasting improvement, and one improved for 8 months before worsening.
This was a single-center study with a limited number of patients.
Data came from electronic medical records.
There was no funding for the work, and the investigators didn’t report any relevant disclosures.
This is a summary of a preprint research study, “Acneiform eruptions with combination targeted cancer therapy in colorectal cancer patients,” led by Marina Ibraheim of the University of Texas Health Science Center at Houston. The study has not been peer reviewed. The full text can be found at researchsquare.com.
M. Alexander Otto is a physician assistant with a master’s degree in medical science and a journalism degree from Newhouse. He is an award-winning medical journalist who worked for several major news outlets before joining Medscape. He is also an MIT Knight Science Journalism fellow. Email: [email protected]
Follow Medscape on Facebook, Twitter, Instagram, and YouTube.
Source: Read Full Article
|
<urn:uuid:4ff8ee3d-2bb1-4ab1-a6d1-18b66a515d80>
|
CC-MAIN-2022-33
|
https://wotabo.com/online/renova-b/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00473.warc.gz
|
en
| 0.945746
| 684
| 1.804688
| 2
|
FOR IMMEDIATE RELEASE
May 3, 2013
The Inspector General for the Social Security Administration (SSA) is warning the public, and Social Security beneficiaries in particular, to be aware of fraud scams that target personal information. Criminals use phone calls, emails, and other methods to obtain personal information, then use it to commit identity theft.
In the most recent scam, identity thieves obtain the personal information of Social Security beneficiaries and use that information to attempt to open a ‘my Social Security’ account on SSA’s website. If successful, they then use that account to redirect the beneficiary’s direct deposit benefits to an account controlled by the thief.
This should in no way discourage people from using SSA’s ‘my Social Security’ feature, which enables the public to view their earnings history and estimated benefits, and allows beneficiaries to obtain a host of services online; in fact establishing your account eliminates the risk of a new account being opened by an identity thief. This type of crime does, however, serve as a reminder to protect your personal information as you would any other thing of value. Once thieves have your personal information, they can use it to open credit accounts, buy homes, claim tax refunds, and commit other types of fraud.
If you receive information from SSA indicating that you have opened a ‘my Social Security’ account, and you did not open an account, you should contact Social Security so that appropriate action may be taken, and the matter may be referred to the Office of the Inspector General. You can do so by visiting or calling a local SSA office or calling SSA’s toll free customer service at 1-800-772-1213. Deaf or hearing-impaired individuals can call Social Security’s TTY number at 1-800-325-0778.
Identity thieves obtain personal information in any number of ways. They may pose as Government officials in an attempt to convince you to provide personal and financial information. They may also claim that you have won a lottery or other prize, but you must provide personal information or even send money to pay “fees,” “taxes,” or other expenses before you can claim your winnings.
To help prevent this type of fraud, the Inspector General recommends that you:
never provide your personal information when receiving unsolicited calls or contacts
never agree to accept pre-paid debit cards or credit cards in another person’s name
never agree to send or wire money to an unknown person
always contact your local SSA office if you receive a call from a person claiming to be from SSA, and that person asks you to provide your Social Security number or other information.
To verify the legitimacy of a caller who claims to be an SSA employee, call your local Social Security office, or Social Security’s toll-free customer service number at 1-800-772-1213. If you find that someone has stolen or is using your personal information to open credit accounts or for other non-SSA-related purposes, you should report that to the Federal Trade Commission at www.ftc.gov/idtheft or 1-877-ID-THEFT. You can also find more tips on protecting your personal information on that FTC website. And you can report suspicious activity involving Social Security programs and operations to the Social Security Fraud Hotline, or by phone at 1-800-269-0271. Deaf or hearing-impaired individuals can call OIG’s TTY number at 1-866-501-2101.
For more information, please visit http://oig.ssa.gov/newsroom and follow the SSA OIG on Facebook and Twitter. For information about your Social Security benefits, contact your local Social Security office or visit www.socialsecurity.gov.
|
<urn:uuid:077eb98d-c8be-4324-9945-6f5673bb14ac>
|
CC-MAIN-2017-04
|
https://oig.ssa.gov/newsroom/news-releases/may3advisory
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00070-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.89434
| 801
| 1.875
| 2
|
After the Storm
August 28, 2013 by Yugen
Over the weekend, we experienced the heaviest rain fall since the storm that followed the fire. In fact, Tenshin Roshi who was present for part of the storm thought it was some of the heaviest rain he has ever seen at Mountain Center. The good news: we incurred almost no damage.
He had prior warning that the storm was coming through, so we had time to prepare. It was the tail-end of a tropical storm and there were fears earlier in the week that it was going to hit even harder than it eventually did. We cleared the entire parking lot, moving vehicles to higher ground or using them to evacuate. Anything that was at risk of being caught in debris flow was moved to higher ground. We dug out the stream bed running by the kitchen and Buddha Hall with the tractor, so there was a deeper and wider channel for the water and debris to flow through. Above this channel was another channel about 20 feet long and 5 feet deep which we dug a few weeks ago.
When the rain fell, it fell quickly and heavily. As predicted, it fell too quickly for the ground to absorb it, so sheets of water and mud slid down through the valley. The water and debris was caught in the deep channels we dug by the kitchen, and once these filled, the water flowed through the stream bed and followed the diversion we created to take the water behind the hogan (the octagonal building near the office), rather than in front of the office. The rationale here was clear: if the water and debris flowed through the old stream bed, the office and possibly the workshop would be at risk. For this reason, we diverted the stream bed away from these buildings.
There was no damage to the parking lot or any of the buildings and all the debris and water flowed through the stream bed as we had hoped. There will be more tractor work to re-dig some of the trenches along the stream bed and also some of the trenches along the side of the main road which got filled in by debris during the storm. Compared to the last post-fire storm, there was virtually no damage that occurred. The measures we already have in place worked this time.
This storm was good lesson for us in how to prepare and to see how the water and debris flow. Although the rain was heavy, it was not prolonged, lasting only a few hours. We certainly need to look at what might happen during prolonged storms, as areas which haven't yet experienced debris flow still could in the future under different conditions. We have Robert Hewitt from the NRCS (Natural Resources Conservation Service) coming on Friday for an on-site inspection. The NRCS did not receive any extra funding from the government to help with the post-fire clean up, but they want to help in ways that they can, and for us, an on-site inspection will be very useful. Depending on what Robert finds, it will give us a good sense as to whether the geo-technical engineer who is working with us would have good reason to come down for an inspection as well. Robert may be able to provide recommendations as to what kind of barriers we could use and in which locations in order to protect the various buildings.
Reid, the geo-technical engineer, has been speaking with a geologist at the Forest Service and has already been given some useful information in terms of what happened during the storm immediately following the fire. It looks like the BAER report which we were waiting on immediately after the fire (which is still not a public document yet) will not be of that much use anyhow. The broad brush recommendation may not really help us in the way that the more detailed modeling from the USGS (United States Geological Survey) will. The preliminary findings are going through the process of being checked and approved before being released, but Reid hopes to be able to have access to some of this information soon. The USGS also want to install a rain gauge on our property to see how well their modeling data holds up over time. This is great for us, as it will help us with our safety assessments during storms. Certain amounts of rainfall over a period of time can lead to flash flooding and debris flow, and a gauge will help us determine this more accurately. With the residents evacuated from Saturday night through Wednesday morning (today) it felt like it did during the fire—not knowing what we might return to find. It was a great relief to discover that there was virtually no damage to the center and the work we have already done was enough to avert further disaster. Over the next few weeks we will be reinforcing and adding to the channels and diversions we already have in place, and hopefully the visit on Friday from NRCS will give us more of a sense of direction as to how best continue with the work.
We have more storms forecast for this week, but none are predicted to be heavy and there are no current flash flood warnings for the area, so we aim to remain at the center this week and continue with the schedule.
Tom, our plumber, staked the provisional work done at the well site in with metal stakes to prevent it from being washed out during the storm.
The channels that we dug before the kitchen along the stream bed.
|
<urn:uuid:ba6e1bdb-50cd-4592-850f-4ae6f6cee2ec>
|
CC-MAIN-2016-44
|
http://zmc.org/blog/2013/08/after-the-storm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00116-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.98432
| 1,077
| 1.554688
| 2
|
|Explaining how intelligence may be an emergent property rooted in the urge to take control of all possible futures, Alex Wissner-Gross has developed an equation that may explain intelligence itself, and in doing so, may dramatically impact the world of AI.|
Richard Feynman once wrote that if human civilization were destroyed and you could pass on only a single concept to our descendants to help them rebuild civilization, that concept should be that all matter around us is made out of tiny elements that attract each other when they are far apart, but repel each other when they are close together.
For Alex Wissner-Gross, the equivalent statement to pass on to descendants to help them build artificial intelligence or to help them understand human intelligence is "That it should be viewed as a physical process that tries to maximize future freedom of action and to avoid constraints in its own future."
This grand view of intelligence has emerged as a guiding principle for Wissner-Gross's own work in development of Entropica, an artificial intelligence platform that has been tested for use in robotic motion planning, computer game play and financial market trading maximization.
Wissner-Gross began his work in artificial intelligence by first trying to understand the fundamental physical mechanisms that underlay intelligence.
In a paper published earlier this year, Wissner-Gross detailed how intelligent behavior stems from the impulse to seize control of future events in the environment. This is the exact opposite of the classic science-fiction scenario in which computers or robots become intelligent, then set their sights on taking over the world.
In the video above, Wissner-Gross shows how the equation can be applied to artificial intelligence. As the demonstration of Entropica suggests, intelligent behavior doesn't just correlate with the production of long term control of future events, or entropy, it actually emerges from it.
With the equation as a fundamental algorithm, Entropica was able to pass multiple animal intelligence tests, play games and even earn money trading stocks, all without being instructed to do so.
Wissner-Gross is an American scientist, inventor, and entrepreneur. In 2003, he became the last person in MIT history to receive a triple major, with bachelors degrees in physics, electrical engineering, and mathematics, while graduating first in his class from the MIT School of Engineering. In 2007, he completed his Ph.D. in Physics at Harvard, where his research on programmable matter, ubiquitous computing, and machine learning was awarded the Hertz Doctoral Thesis Prize. He currently holds academic appointments as an Institute Fellow at the Harvard University Institute for Applied Computational Science and as a Research Affiliate at the MIT Media Lab.
SOURCE TEDx Talks
|By 33rd Square||Subscribe to 33rd Square|
|
<urn:uuid:6931ac6c-e103-4215-8333-6386047a4925>
|
CC-MAIN-2017-04
|
http://www.33rdsquare.com/2013/12/an-equation-for-intelligence.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00439-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.956124
| 570
| 2.984375
| 3
|
Dancing After Hours
Of the nine books of fiction Andre Dubus has published in the last twenty years, seven of them are collections of short fiction; thus he is usually included as part of the so-called renaissance of the short story that has taken place since the 1970’s. However, Dubus’ fiction is neither like the self-reflexive experiments of Donald Barthelme, nor the minimalist realism of Raymond Carver. Rather, Dubus’ short fictions are more like the kind of stories that Bernard Malamud would have written had he not been Jewish, Flannery O’Connor would have written had she not been southern, or Raymond Carver would have written had he been Catholic. In short, Dubus’ stories have always manifested a hopeful spirituality and an optimistic humanism that has marked him as thematically old-fashioned and technically conservative among younger short-story writers.
As it has been for Dubus’ fiction in the past, most of the short stories in Dancing After Hours are based on the conviction, belief, or hope that most human beings are seeking love rather than sex, relationships rather than one-night stands, and the security of family rather than the adventure of the temporary thrill. Perhaps because Dubus himself is nearing sixty, most of the men and women in these stories are middle-aged or older. Perhaps because an accident caused him to lose a leg and be confined to a wheelchair in 1986, several of these stories focus on men who have been physically disabled and are trying to find a way to cope with their inability to walk. Perhaps because Dubus’ third wife left him a few months after his accident, most of these stories focus on men and women nostalgically looking backward to a time when they loved and were loved or hopefully looking forward to a time when they will love and be loved again.
As in his earlier Paul Clement series of stories, which focused on the coming-of-age of a young man, Dubus here features the same character in more than one story. In “Falling in Love,” readers meet the young Ted Briggs, who has come back from the Vietnam War with a wounded leg that forces him to use a cane. After impregnating a liberated and independent young woman, he is filled with rage when she refuses either to marry him or to have the baby. He bitterly complains to a friend, who, like him, is also alone and getting older, that he will never have sex with another woman who insists on killing his baby. As if this statement has left a gap that needs closing, in a later story in the collection, “All the Time in the World,” readers learn of LuAnn Arceneaux, a woman who has had many lovers but no real love and who also fears growing old alone, who meets the now-mature Ted Briggs. In what seems a match made in heaven, LuAnn, like Ted, does not want a relationship that begins with sex, nor does she want to conceive a child that she does not want. When Ted makes a token sexual overture she puts him off, and he is glad. She is filled with joy at the possibility of loving and being loved by Ted, and the story ends with her eagerness and anxiety about the future, knowing that love will bring her both joy and pain.
Ted and LuAnn appear again in “The Timing of Sin,” the central theme of which is announced in the opening sentence: “On a Thursday night in early autumn she nearly committed adultery.” LuAnn is forty-three in this story and works part- time at a home for teenage girls. Surrounded by young women who have been neglected or abused and now are troubled and alone, she becomes attracted to the soft-spoken director of the girls’ home. Most of the story is a conversation between LuAnn and a friend who tells her about her previous adultery and the breakup of an earlier marriage, a breakup that she still regrets. LuAnn describes her own almost-adultery that took place in a car. In the process of the encounter, as LuAnn and the director try to get her jeans off, she sees herself walking into her house and not finding her husband Ted or her children there, and she knows she cannot be unfaithful. As she tells her friend, it is not that she was being good, it was the jeans that saved her. Had she been wearing a skirt, there would not have been those few seconds of thoughtful hesitation. Knowing now how easy adultery is and hard relationships are to maintain, she dismisses the triviality of being saved by jeans and asserts that it must have been God or grace that saved her.
The last story about LuAnn and Ted, “Out of the Snow,” is the most powerful one. It is the year following the almost-adultery, and the relationship between husband and wife is intimate and loving. Little happens in the story until LuAnn comes home from the grocery store and is shocked to discover that she has been followed into her house by two men. Seeing herself stripped naked, struck, choked, and raped, with every bit of herself taken away from her, she is filled with rage and fiercely strikes back. In three tense and highly detailed paragraphs, Dubus describes a woman defending her whole self with such ferocity and yet cold- blooded control that the reader cannot help but be completely caught up in it. Making use of a teakettle and a skillet on the stove, LuAnn smashes the men, breaking bones and bringing blood until they crawl pitifully away. In some ways, the scene...
(The entire section is 2156 words.)
|
<urn:uuid:48f43d62-bb66-4584-b66d-0b7915c58221>
|
CC-MAIN-2017-04
|
https://www.enotes.com/topics/dancing-after-hours/in-depth
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00033-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.984671
| 1,170
| 1.578125
| 2
|
Pathology and Medical Labels
Medical, Pharmacuetical, Cosmetics and Pathology Sectors
We have the knowledge, experience and innovative solutions to help you track and identify all types of medical items. Compatibility with existing systems (such as Cerner), and the need for reliable labels and equipment are extremely important in the medical industry. At Barcode Australia, we understand this, and we'll build a unique solution that'll work for you.
Below is a short summary of the most commonly used medical labels we produce:
- Test Tube Labels
- Blood Bag Labels
- Barcode Labels
- Multi-Cut Sheet Labels
- Patient Information Labels
- Security Seal Labels
Popular Cerner Certified Label Printers:
- Toshiba B-FV4T
- Toshiba B-FV4D
- Toshiba B-EX4T1
If you're interested in any of these products or need assistance, just contact us and we'll answer any questions you may have.
We have The Solution
As custom label manufacturers, we ensure that all our products meet your requirements. We ensure our clients receive the right medical labels and equipment for their systems to ensure effectiveness in every stage of the tracking process.
With all new clients, we create and test our labels in partnership with you before committing to larger production runs. This ensures:
- the right adhesive is selected for your application
- the right face stock is used
- Barcodes achieve a 100% read rate on all of your scanning equipment.
- The data is correctly formatted for your MIS systems. We can program any requirements for data in a barcode, including customised check digits, random numbering, colour coding matched to data, combinations of 1D and 2D barcodes, time/date stamped.
- Labels are secure. For clients with security concerns, we now produce barcoded labels with variable infra red security print. Every label is uniquely coded and only visible under black light, ensuring labels have not been substituted. A great addition for chain of custody applications.
Get Started Now
Contact our team today, and we'll discuss exactly what you need for a successful identification system.
|
<urn:uuid:68dd44fe-e0da-40e3-a82c-eb35f3a44e23>
|
CC-MAIN-2022-33
|
https://www.barcodeaustralia.com.au/medical-and-pathology-labels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz
|
en
| 0.888356
| 452
| 1.5625
| 2
|
Workshop: The Setup Phase Moodle ISU
Workshops are an assignment with a peer assessment component. A typical workshop is a long-term activity and can take up to several days or even weeks to complete. The workshop workflow is divided into five phases. You will manually move the workshop from phase to phase when you are ready to move on.
There are many options in creating a workshop. For additional assistance, contact the ITRC - (208)-282-5880 or email email@example.com
You will want to see the additional Workshop guides for more information about each phase:
Create a Workshop
- Turn editing on. For more information, see Moodle ISU Overview
- Locate the week/topic where you would like to add the workshop.
- Click Add an Activity or resource.
- Select Workshop.
- Click Add.
- In the Workshop name field, Type the name of the workshop. This will show to the students on the front page.
- In the Description field, Type instructions for the workshop and any other information you would like the students to see.
Note: If you wish to have the description displayed to students on the homepage, Check Display description on course page.
For more information on how the assessment grade is calculated, see Workshop module
- From the Grading strategy dropdown menu, Select which grading method you would like to use.
- Accumulative grading: Grades and comments are given for specific aspects of the work.
- Comments: Only comments are given during the assessment phase. No grade is given.
- Number of errors: Comments can be given and a checklist of yes/no is given as a grade regarding specified assertions to be considered during the assignment.
- Rubric: A rubric with specific grading requirements set by you (the instructor) is used to assign a grade.
- From the first Grade for submission dropdown menu, Select the maximum grade for the student’s own submission grade.
- From the second Grade for submission dropdown menu, Select the gradebook category where the grade should be placed in the gradebook.
- If you do not use categories in your gradebook, leave as Not categorized.
- From the first Grade for assessment dropdown menu, Select the maximum grade for how well the student assesses others.
- From the second Grade for assessment dropdown menu, Select the gradebook category where the grade should be placed in the gradebook.
- If you do not use categories in your gradebook, leave as Not categorized.
Note: After creating the workshop, you will need to edit the assessment form. For information on editing the assessment forms, see Workshop: Editing the Assessment Forms
Note: Grading strategies cannot be changed once the workshop has moved to the Submission Phase.
- Decimal places in grades: This option will allow you to specify the number of decimal places in the grades.
- In the Instructions for submission text field, Type instructions to the students for submitting their work. These instructions will be shown to the the students at the beginning of the Submission Phase.
- From the Maximum number of submission attachments dropdown menu, Select the number of files the student may need to submit.
- From the Maximum submission attachment size dropdown menu, Select the maximum size of an individual file to be uploaded.
Note: 1MB is generally more than sufficient for most word documents. If your students are turning in files that include pictures (i.e., Magazine layouts, PowerPoint files) you will want to increase the file size as well as discuss how to compress images.
- To allow students to submit work after the submission deadline, Check the Allow submissions after deadline checkbox.
- In the Instructions for assessment text field, Type instructions to the students for assessing their peers’ work. These instructions will be shown to the the students at the beginning of the Assessment Phase.
- To allow students to assess their own submission and receive a grade, Check the Students may assess their own work checkbox.
- Overall feedback mode - provides a text field at the bottom of the assessment form. Reviewers can put the overall assessment of the submission there or provide additional explanations of their assessment.
- Maximum number of overall feedback attachments - limits the number of attachments the reviewer can attach.
- Maximum overall feedback attachment size - limits the size of the attachment files.
- Conclusion - displays a text to all participants at the end of the activity.
- Use examples - Allows the user to assess examples without it being counted for a grade.
- These examples are provided by the instructor.
- The Mode of examples assessment dropdown menu provides three options:
- Assessment of example submission is voluntary
- Examples must be assessed before own submission
- Examples are available after own submission and must be assessed before peer assessment
- To set a specific submission window, at the end of the Open for submissions from line, Check Enable.
- This option determines when the students will be able to submit their work. However, the Setup Phase must be completed and the workshop must be in the Submission Phase in order to allow submissions.
- From the Open for submissions from dropdown menus, Select the desired date and time.
Note: If you do not enable Open for submissions from, the students can submit their work as soon as you move to the Submission Phase.
Note: The time is military time, so 5:00 pm is 17:00. Midnight is 0:00, or the first hour of the day. We strongly suggest NOT using midnight. Friday at midnight will be displayed Saturday at 0:00 and may cause confusion.
- To set a submission deadline, at the end of the Submissions deadline line, Check Enable.
- From the Submissions deadline dropdown menus, Select the desired date and time.
Note: If you do not enable the Submissions deadline date, the students can submit their work at any time during the Submission Phase.
Note: ISU Maintenance on IT services may be any Tuesday, Wednesday or Thursday beginning at 11:00 pm through 6:00 am the following day. We strongly suggest NOT having any due date/times during these windows.
- To set a specific assessment window, at the end of the Open for assessment from line, Check Enable.
- This option determines when the students will be able to assess their peers’ work. However, the Setup and Submission Phases must be completed and the workshop must be in the Assessment Phase in order to allow assessments.
- From the Open for assessment from dropdown menus, Select the desired date and time.
Note: If you do not enable Open for assessment from, the students can submit their work as soon as you move to the Assessment Phase.
- To set an assessment deadline, at the end of the Deadline for assessment line, Check Enable.
- From the Deadline for assessment dropdown menus, Select the desired date and time.
Note: If you do not enable the Assessment deadline date, the students can assess their peers’ work at any time during the Assessment Phase.
Common module settings
- Choose whether to Show or Hide the Page (default is Show)
- Enter an ID number only if you want a way of identifying the activity for grade calculation purposes. If the activity is not included in any grade calculation then the ID number field may be left blank.
For more information on common module settings, see Groups and Groupings
For more information on restricting access, see Restrict Access
For more information on activity completion, see Activity Completion
Saving the Workshop
Please note that, while you are saving the settings of the workshop, you have not yet completed the Setup Phase. Based on some of the criteria selected in creating the workshop, you will have a list of items that will need to be completed.
- Click Save and display to view the workshop.
- Click Save and return to course to be taken back to the main course page.
- Click Cancel to delete the workshop.
Note: Your next step will be to edit the Assessment Form.
For more information on editing Assessment Forms, see Workshop: Editing Assessment Forms
For more information, see Workshop settings
For additional information, contact the ITRC (208) 282-5880 or email firstname.lastname@example.org
This work was done by Instructional Technology Resource Center at Idaho State University and is licensed under the Creative Commons Unported License. To view a copy of this license, visit Attribution Noncommercial 3.0 United States or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA.
|
<urn:uuid:e34f5274-78c4-4328-9cd4-eb66b6815a05>
|
CC-MAIN-2017-04
|
https://docs.google.com/a/isu.edu/document/d/1fmPPn1lEBwhV6wO3ROr53esIYXqJdThQ379Zw8tZ_Cc/pub
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00027-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.881787
| 1,779
| 2.078125
| 2
|
I shared my piece on James Holmes and white privilege over at The Daily Kos. At this point, it has about 550 comments. Do check it out and chime in. Of course, there is racism denying and deflection among the comments; but many of the most common observations involve the claim that James Holmes is a "sociopath," "crazy," or a "psychopath." As such, that should be the framework through which his deeds are viewed.
Consequently, we must a priori grapple with questions surrounding mental health and personal responsibility. I absolutely agree. However, there could be a more basic fact which drove Holmes' behavior that the general public and the pundit classes are loathe to acknowledge.
Moreover, James Holmes' deeds make the rest of us feel "good" and "normal" because such conclusions identify murder, mayhem, and violence as "unnatural" acts. In this framework, to kill at will is therefore made "crazy." Many people would not want to admit that violence is perhaps something natural for humans given that we are apex predators, and our history is one of blood and destruction.
Until the premier headshrinkers get access to The Batman Shooter and practice their craft, we must entertain the fact that Holmes simply killed at will because he could. Nothing more, nothing less. The banality of evil is real. They are not all bogeymen, some killers are pedestrian, boring, uninteresting, opportunists. Some of these killers are just run of the mill bureaucrats.
Richard Overy interviewed Nazi war criminals before their trials at Nuremberg. His book, Interrogations: Inside the Minds of the Nazi Elite, is a tour through the wickedness that is man given the opportunity to kill with impunity. The subjects of Overy's interviews--SS soldiers, guards, and others--are true sociopaths.
For example, here is an interview between one of the guards at Auschwitz and his interrogator:
Source: (HQ BAOR, interrogation reports from No. 1 Sub-Centre, 10 Dec 1945. (D) Taped conversation held on 3 Nov 1945 between Ernst von Gottstein and Eugen Horak - Document 13 in Interrogations: Inside the Minds of the Nazi Elite, Penguin, 2001, pp. 371-74.
Comment: Ernst von Gottstein (Hauptbauleiter OT, Gauamtsleiter fur Technik, Gau Karnten) and Eugen Horak (interpreter in Gruppe VI/C of the RSHA). If any subsequent information about Eugen Horak's service record and how he ended up in Auschwitz has come to light, I am not aware of it. Department VI/C was responsible for espionage and counter espionage abroad, C was responsible for Russia and Japan.
Horak: I was present in Vienna when they were loading up people for one of those mass evacuations. Hundreds were crammed into wagons, which normally took a couple of cows. And they were thoroughly beaten up as well. I went up to a young SS man and asked if the beating up was really necessary. He laughed and said they were only scum anyway. You know the whole thing was so unnecessary and one could well have got on without it ... what was the purpose of all that beating up? I have nothing at all against the gas chambers. A time can come when it is useful to the race to eliminate certain elements. Extermination is one thing but there is no need to torture your victims beforehand.
I saw some incredible things at Auschwitz. Some SS guard personnel could not stand it any longer and had to be sent to a nerve clinic. When my party arrived we were divided into two sections: those who were really keen on the whole affair, and those like myself who were continually asking for something to distract us. .... One SS company actually mutinied and tried to get themselves posted to the front. But they had to carry out their orders. It was just at the time that Ogruf [sic] Dix gave the orders to increase the death rate.
Von Gottstein: The motto of the SS ought to have been 'Meine Ehre ist Gehorsam' (My Honour is Obedience).
Horak: You're quite right. .... These people lose all feeling. Roschke for example once told me quite callously that he had volunteered for duty in the crematorium because they got so much time off afterwards. This duty was absolutely repulsive. One had to stand the whole night in the crematorium. There was only one door and no windows. The two sentries had to go in, lock the door and pass the key through the peephole to the officer outside. They were only connected to the outside world by telephone. An NCO and a private were normally on duty, but in a concentration camp experience counts a good deal more than rank. The one with more experience generally had a pistol and the other a rifle. There were nine people on duty in the crematorium, themselves known candidates for the gas chamber. They knew too much and were eventually exterminated as opportunity arose.
There were four ovens on the left side of the crematorium and the gas chamber was on the right - a normal size room with a narrow door and no windows. They did not use gas but a powder which at a certain temperature gave off poisonous fumes. It must have been quite agreeable because the people never made a mess. The sentries had to see that the nine people on duty didn't escape through the ventilators. And they watched them pulling the bones and the pieces of flesh which hadn't burned out of the ovens, or dragging the bodies from the gas chamber and cramming them into the ovens. There was only room for one body in each oven. There was a horrible smell of lime and burning flesh, something like the strong smell of urine ... (both laughing). But you get so used to it that you could eat your sandwiches in there too.
I do not know if James Holmes is part of Horak's tribe. We must wait, gather evidence, and let the experts do their work before coming to such a conclusion.
The more comforting decision rule has us lumping The Dark Knight Rises mass murderer in with sociopathic Hollywood characters like Hannibal Lecter, or real life monsters such as the SS guards at the Nazi death camps, or those men who ran the slave ships during The Middle Passage.
We can sleep easier that way.
We can sleep easier that way.
It is more frightening to accept that James Holmes could just be the killer next door. Am I wrong? Given the right combination of circumstances, are we not all capable of mass murder like James Holmes?
|
<urn:uuid:c1f68d8c-618b-4bd3-a2ba-539c3362e61d>
|
CC-MAIN-2016-44
|
http://www.chaunceydevega.com/2012/07/there-was-horrible-smell-of-lime-and.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00065-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.975973
| 1,381
| 1.601563
| 2
|
The Supreme Court denied a stay of execution to Christopher Brooks on Thursday evening. He is due to be executed by Alabama Thursday for the 1992 murder of Jo Deann Campbell.
Justice Sonia Sotomayor, joined by Justice Ruth Bader Ginsburg, noted that the constitutionality of Alabama's death sentencing system rests on shaky ground after last week's decision striking down Florida's death sentencing system. She concluded, though, that "procedural obstacles" in this case — likely the fact that he was convicted in the 1990s and that the recent decision would not apply to his conviction — led her to vote against the court taking up Brooks's case.
Justice Stephen Breyer went further, writing that he would have granted a stay. In a short statement dissenting from the denial of a stay, he added, "The unfairness inherent in treating this case differently from others which used similarly unconstitutional procedures only underscores the need to reconsider the validity of capital punishment under the Eighth Amendment."
The justices also denied a stay of execution to Brooks based on a second claim he raised regarding the drugs the state plans to use to execute him. There were no noted dissents to that ruling.
WASHINGTON — Lawyers for an Alabama man due to be executed on Thursday have asked the Supreme Court to step in and stop his execution because of claimed similarities between the death sentencing laws in Alabama and Florida — whose death sentencing scheme was struck down by the justices this past week.
If the execution of Christopher Brooks, convicted for the 1992 murder of Jo Deann Campbell, goes forward, it would be the third execution in the country this year — but the first for Alabama since 2013.
Brooks is due to be executed at 6 p.m. Central Time, unless the courts or Alabama Gov. Robert Bentley delay or halt the execution.
Brooks met Campbell at a summer camp, and Campbell allowed Brooks to stay at her place one night. She didn’t show up to work the next day.
Campbell was found bludgeoned to death underneath her bed in her apartment, according to court documents. Brooks was later seen driving Campbell’s car, and had her credit card in his possession. Police found Brooks had also cashed Campbell’s paycheck and had pawned some items from her apartment.
The questions before the Supreme Court relate to the trial at which Brooks was convicted and the way the state plans to execute him.
Alabama, like Florida, places the final decision of whether to impose death on the judge — not a jury. A petition for a writ of certiorari and application for a stay of execution in Brooks's case arguing that such a system is barred by the U.S. Supreme Court were filed at the court after business hours on Tuesday, lawyers for Brooks told BuzzFeed News.
The filings, provided to BuzzFeed News, came hours after the Alabama Supreme Court had denied Brooks's initial request that the state court put his execution on hold while it determined the effect of the U.S. Supreme Court's decision in the Florida case, Hurst v. Florida.
Brooks was sentenced to death in 1993 for the 1992 murder of Jo Deann Campbell. The jury in his case had recommended a death sentence on an 11-1 vote. Judge James Hard, after hearing additional evidence, sentenced Brooks to death.
In the petition, mostly a repeat of the argument (discussed at length here) rejected in a one-sentence order by the Alabama Supreme Court, the lawyers argue that because of the significant similarities between the Alabama and Florida death sentencing laws, "Alabama's use of advisory juries in its capital-sentencing scheme violates Hurst."
Beyond that, however, Brooks's lawyers face an uphill battle convincing the justices that the Hurst decision — or even its earlier capital sentencing juries decision from 2002 — applies to Brooks because his case is no longer on direct appeal (and was not even by 2002). This retroactivity question, which likely will be heavily argued in cases finalized between the 2002 decision and this past week's decision, is a much harder question for an inmate like Brooks.
On Wednesday the state opposed the request, arguing that Alabama's death sentencing scheme remains constitutional under both the 2002 decision and this past week's Hurst ruling.
A key reason, the state argues, backing up that view is the fact that the Supreme Court had previously ruled that the state's system is constitutional — and allowed Alabama executions to proceed even after it had agreed to hear the Florida case.
Regardless, the state argues, even if it were to be held to apply to Alabama's death sentencing law, the Hurst ruling is not retroactive under prior Supreme Court precedent and, as such, "Hurst changes nothing for Brooks."
Brooks's lawyers filed a reply brief, arguing, as to the retroactivity, that it could be argued that "Hurst's affirmation of the jury right should constitute a watershed rule" — one of the standards used by the court for determining whether a ruling applies retroactively.
Additionally, Brooks is also asking the U.S. Supreme Court to stay his execution over concerns about the drugs that will be used in his execution.
Alabama plans on using midazolam, which is a sedative, followed by a paralytic and a drug that stops the heart.
The three-drug protocol Alabama uses is identical to the combination of drugs the U.S. Supreme Court upheld in a ruling last year. In that case, Glossip v. Gross, the court also held that inmates challenging a method of execution must present an available, alternative means of execution that would be significantly less likely to cause substantial pain.
As an alternative, Brooks suggests a one-drug protocol using only midazolam, sodium thiopental, or pentobarbital.
Pentobarbital is a hard drug for corrections officials to get their hands on, and the Alabama Department of Corrections says they are unable to get it. Sodium thiopental has no FDA-approved manufacturers, and it would be illegal for states to import the drug — although that has not stopped other states. Midazolam has never been used as the sole drug in an execution, and so far the courts have been skeptical that it would prove more effective than the three-drug protocol Alabama plans to use.
In Brooks's petition before the Supreme Court, his lawyers raise the question of whether a statement by prison officials that they cannot obtain the offered "alternative means" — here, a different drug protocol — is sufficient to defeat the inmate's claim.
|
<urn:uuid:a7b781af-a637-4f98-a874-0f253b21ebf7>
|
CC-MAIN-2022-33
|
https://www.buzzfeednews.com/article/chrisgeidner/lawyers-for-alabama-man-ask-supreme-court-to-halt-thursdays
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00674.warc.gz
|
en
| 0.972961
| 1,340
| 1.851563
| 2
|
Challenged by the Vishwa Hindu Parishad (VHP) to issue a fatwa (religious edict) declaring India a Dar al-Aman (country friendly to Islam), where jihad (holy war) is meaningless, the country’s top Islamic seminary, the Darul Uloom at Deoband, on Sunday did just that.
The fatwa was read out at a large rally in Bhubaneshwar organised by the Orissa unit of the Jamiat Ulema-e-Hind, attended by Chief Minister Navneen Patnaik and numerous other bigwigs. The Jamiat has been holding a series of such rallies across the country in recent months to denounce terrorism.
“The Indian Constitution guarantees equal protection and rights for all communities. Therefore, for Muslims,
India is Dar al-Aman or a Muslim friendly country,” the fatwa said.
In Islamic theology, geographical areas are often divided into Dar al-Islam (country where Islamic law prevails), Dar al-Harb (country hostile to Islam) or Dar al-Aman.
In Dar al-Harb territory, jihad is legitimate. The fatwa added that India had ceased to be a Dar al-Harb with the end of colonial rule.
The VHP had also urged the Darul Uloom to spell out whether Muslims should regard Hindus as kafirs (non-believers). The same fatwa responded by noting that all non-Muslims were indeed kafirs, which should not be regarded as a pejorative term. “Muslims should consider Hindus as their brothers and sisters,” it said. “Islam does not permit injustice against non Muslims.”
The fatwa came from the hand and seal of Mufti Maulana Mahmood Hasan Bulandshehri of Darul Uloom’s fatwa department, in response to questions posed by Maulana Mahmood Madani, who heads the Jamiat.
“We decided to have the question asked and the answer provided before the VHP actually brought such a query to us,” said a source at Darul Uloom. “Had the VHP done so, we would have faced a procedural problem in replying, since fatwas are issued only in response to questions posed by Muslims.”
The meeting also passed a resolution condemning the Mumbai attacks though it stopped short of blaming Pakistan for it.
|
<urn:uuid:aa01b804-8fb6-4479-8638-c815b3547842>
|
CC-MAIN-2017-04
|
http://www.hindustantimes.com/india/fatwa-declares-india-as-being-islam-friendly/story-u8qrajDOFMubFYJKyMiFhL.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00120-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.956492
| 503
| 1.9375
| 2
|
Just what Wiring Diagram?
A new wiring diagram is an easy visual representation from the physical connections plus physical layout of an electrical system or circuit. It shows how the electrical wires are connected with each other and will also demonstrate where fixtures and elements may end up being linked for the method.
When and the way to Use a Wiring Picture Use wiring diagrams to assist inside building or manufacturing the circuit or perhaps computer. They are also useful with regard to making repairs.
Zmodo Camera Wiring Diagram
DIY enthusiasts use cabling diagrams nevertheless they are usually also common in home building plus auto repair. Regarding example, a home builder will need to confirm the physical location associated with electrical outlets plus light fixtures utilizing a wiring diagram in order to avoid costly faults and building code violations.
How to be able to Draw a Circuit Plan SmartDraw comes with pre-made electrical wiring diagram templates. Modify hundreds of electric symbols and swiftly drop them into the wiring diagram. Special control handles about each symbol let you quickly resize or perhaps rotate them as necessary.
To draw the wire, simply click on on the Draw Lines option on typically the left hand aspect of the sketching area. If a person right click on the line, you may replace the line's colour or thickness and add or get rid of arrowheads as required. Pull a symbol onto the line and it will place itself and click into place. Once connected, it will certainly remain connected even when you move typically the wire.
If you need additional symbols, click on the arrow close to the visible library to bring up a fall menu and select Even more. You'll be in a position to search with regard to additional symbols and open any appropriate libraries.
Click on Set Line Hops in the SmartPanel to show or hide line hops at crossover factors. You can even change the particular size and shape of your collection hops. Select Display Dimensions to display the size of your cables or size of your component.
Just how is a Wiring Diagram Different from a Schematic?
A new schematic shows the plan and function for an electrical routine, but is not concerned with the particular physical layout from the wires. Wiring blueprints show how the wires are linked and where these people should found in the particular device, as well as the physical connections between just about all the components.
How is a Wiring Diagram Different from a new Pictorial Diagram? As opposed to a pictorial diagram, a wiring picture uses abstract or simplified shapes plus lines to exhibit parts. Pictorial diagrams usually are often photos together with labels or highly-detailed drawings of the particular physical components.
Common Wiring Diagram Symbols If the line pressing another line offers a black us dot, it means the lines are attached. When unconnected ranges are demonstrated bridging, you'll see a new line hop.
|
<urn:uuid:6a304c1a-8c89-4166-a20a-ec80fb60e1ac>
|
CC-MAIN-2022-33
|
https://allschematic.coloring.best/zmodo-camera-wiring-diagram-free-download/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00471.warc.gz
|
en
| 0.900179
| 581
| 3.234375
| 3
|
Key Difference – Fetch vs Push
Fetch and Push are two terms that you will encounter when you set up an email client. When setting up your email account, you will have a couple of options to choose from. Those options include fetch and push. You might also have the Manual option. These two terms determine the process of initiation when sending an email to the client from the server. The key difference between fetch and push lies in the process of initiation; Fetch is initiated by the client whereas Push is initiated by the server. Fetching was the primary mode of retrieving email before push became a reality.
Modern email accounts like Gmail come with the push option. This email feature can be utilized by at least one of our many email accounts we manage. With the advent of smartphones being able to send and receive emails, many people are confused about the two terms fetch and push.
What is Fetch?
With fetch, the client will check the server to see if an email has arrived. If one or more emails are found, they will be downloaded to the client device. Fetch can be configured for interval checks from a few minutes to few hours. Thus, when compared with push, fetch is slower and may take longer to respond. If this interval is longer, there will be a delay in receiving the email. This delay can be minimized by reducing the time interval. The downside of reducing the interval between fetches is that it can consume more battery for each fetch regardless whether new mail has being received or not. Data transmission will also be required for each fetch. This interval can be set up to every 15 minutes, 30 minutes, 1 hour or for manual value. In the above context, we can clearly see that fetch is not an ideal option since the email will not be delivered instantly. This may not be good enough if you are receiving a lot of emails.
What is Push?
With push, the client device does not need to check the server on a regular basis to see if a mail has arrived. When an email arrives at the server, it will be automatically notified to the client and the delivery of the email will take place. As the delivery of the mail is done automatically in push, this is faster when compared with fetch. Push does not query the server in a regular manner as with fetch. The role of push is to update the server with its IP address so that the server will know how to contact the client easily.
Push is a relatively new methodology that comes in IMAP when compared with older protocols like POP. Older protocols like POP cannot use the push feature; it only comes with fetch capabilities. Email providers like Google and Yahoo are able to support major protocols. So they support both push and fetch option. Other email service providers need to be checked to see if they can support both the push and fetch retrieval features.
There is also an option called Manual that will give you full control over the data that you receive. The message will appear as soon as you open mail, refresh the screen for viewing the mailbox or messages.
What is the difference between Fetch and Push?
Fetch: With fetch, you have to check the server to see if an email has arrived.
Push: Emails will be buzzed into your inbox instantly with push just like an SMS or an MMS.
Fetch: Fetch is initiated by the client
Push: Push is initiated by the server
Fetch: Fetch is comparatively slower as the client has to check the server at regular intervals.
Push: Push is comparatively faster as the server will forward the mail received automatically to the client.
Fetch: Fetch will consume more power as checking the server is done at regular intervals.
Push: Push will consume less power as the process of sending the email is done automatically.
Power consumption may vary as push will need to maintain a constant internet connection to receive the emails automatically. This will also consume power from the client device.
Fetch: Fetch is supported by all protocols
Push: Push is not supported by all protocols.
Fetch vs. Push Summary
Push: As soon as the server receives the mail it will be pushed onto the client device.
Fetch: Check the server to see if messages have arrived in regular intervals. The messages will be downloaded on the client device while this checking takes place.
Manual: Checks for mail when the mail app is opened.
“566337” (Public Domain) via Pixbay
|
<urn:uuid:9c5205c1-63c3-4099-8f32-28e8eee62323>
|
CC-MAIN-2017-04
|
http://www.differencebetween.com/difference-between-fetch-and-vs-push/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00342-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.946084
| 916
| 2.296875
| 2
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.