text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
The global outbreak of coronavirus is the latest in a series of zoonotic diseases including SARS, bird flu, swine flu, ebola, and HIV/Aids that have moved from animals into human populations. Nor are major outbreaks of infectious diseases new. Think of the Spanish influenza in 1918-19, Asian influenza in 1957-58, and the Hong Kong influenza pandemic of 1968-69. Pandemics are as unpredictable as earthquakes. Since 1970, many countries have invested resources into development of national influenza preparedness plans and into building global influenza surveillance and monitoring systems. The early-warning systems include a network of laboratories capable of identifying the reference strain of the epidemic. The amount of funding that countries should invest in these efforts to prepare and respond to a pandemic is an example of decision-making under uncertainty. Like other national disaster planning activities, the amount of funding should be based on assumptions of the probability of catastrophic outcomes. But despite scientists having warned of the inevitable outbreak of a major pandemic, the investment in public health systems has not responded with the amount of funding necessary to reduce the probability of a major outbreak. We understood the risk the results would be sensationalised, but good public policy requires transparent information based on rigorous well-documented methods. The SARS warning was ignored. Although very few people died from SARS, the economic costs were significant. This should have prompted governments to focus on investing vastly more on improving public health systems in the poorest countries, where a range of factors increase the probability of a major disease outbreak. Despite repeated warnings, funding for many development projects, particularly in the area of public health and disease prevention, have been cut by many governments. What is needed is significant funding for medical research and far greater funding for public health, in all countries but especially in the poorest countries. It is also clear much greater focus globally should be on simple, low-cost, educational interventions to promote the better hygiene practices that can have a massive impact on transmission. There were two main reasons for the research Roshen Fernando and I produced on seven possible scenarios for how COVID-19 might unfold. First, it is not clear how a disease will evolve and spread. One technique to assist policymakers in planning responses under uncertainty is scenario analysis. Scenarios allow policymakers to understand potential outcomes under different assumptions that capture the uncertainty to be explored. The seven scenarios in this research were shared with policymakers globally before being published. The second goal was to demonstrate how costly a pandemic could be and therefore how much governments should be spending to respond to the current outbreak – and how much over time they should spend to minimise the probability of a major future pandemic. We understood the risk the results would be sensationalised, but good public policy requires transparent information based on rigorous, well-documented methods. Hopefully the scenarios we published do not eventuate. It is important, though, that if one of the scenarios does emerge governments can respond with the best policies and their populations are able to take precautions to minimise the impact. What we did There are many excellent studies by epidemiologists that model the likely spread of disease. We followed an alternative approach developed by economists for modelling SARS. This takes the observed real-time data from China and attempts to predict what might happen to the transmission of the disease to all countries, We then use this projected epidemiological data from all countries to develop a set of economic shocks that can be implemented into a global economic model. To project the transmission of COVID-19 across countries we developed a range of indicators of a country's vulnerability to a pandemic. These include quality of governance, public health quality, links to the epicentre country, indicators of government capacity and many others. These indicators are combined into an “Index of Vulnerability”. Given observed data for China on the attack rate (the proportion of the entire population who become infected), case-fatality rate (proportion of those infected who die) and implied mortality rate (proportion of total population who die), the Index of Vulnerability is applied to the Chinese data to generate country-specific mortality rates. Countries more vulnerable than China will have higher rates of mortality and morbidity, and countries less vulnerable will have lower epidemiological outcomes, Given the epidemiological assumptions for all countries, we created an additional set of filters that convert these assumptions into economic shocks such as reduced labor supply in each country (mortality and morbidity), the rising cost of doing business in each sector including disruption of production networks in each country, consumption reduction due to shifts in consumer preferences over each good from each country, rise in equity risk premiums on companies in each sector in each country (based on exposure to the disease) as well as vulnerabilities to changing macro-economic conditions We then implemented these shocks into a widely used global economic model called the G-Cubed model. This model has many countries, many sectors in each country, many firms and households. Each region/country has a government and a central bank. The model predicts how the economy will respond. As it is not possible to predict the likelihood of how a virus will spread, we chose seven possible scenarios which included a range of different assumptions. The scenarios vary by attack rate, mortality rate and the countries that experience the epidemiological shocks. These assumptions were based on previous pandemics. Scenarios 1-3 assumed the epidemiological events are isolated to China. The economic impact on China and the spillovers to other countries are through trade, capital flows and the impacts of changes in risk premiums in global financial markets, as determined by the model. Scenarios 4-6 are the pandemic scenarios in which the epidemiological shocks occur in all countries to differing degrees. Scenarios 1-6 assumed the shocks are temporary. Scenario 7 is a case where a mild pandemic is expected to recur each year for the indefinite future. The results in the table for per cent loss of GDP in 2020 demonstrate how wide-ranging the possible economic outcomes might be and how large the costs can be under some plausible scenarios. Clearly, if the world were to head down a worse-case scenario, policymakers should be willing to incur much greater economic costs in order to minimise the impact of the pandemic. We find the expected economic costs of the four pandemic scenarios far outweigh the amount governments have been spending to minimise these outcomes. The size of the estimated economic and social costs from a pandemic should be yet another a wake-up call to governments to invest heavily in public health systems in their own countries but also to improve public health and economic development prospects in poor countries. In a world veering towards nationalism, COVID-19 sends a clear message that global cooperation, especially on public health and reducing poverty, has potentially enormous economic and social benefits for all citizens. Fetching latest articles
<urn:uuid:742c2b37-c7ff-424d-a8dc-7b5a33bd8a34>
CC-MAIN-2022-33
https://www.afr.com/policy/health-and-education/how-to-understand-the-risks-of-100-000-viral-deaths-20200304-p546ok
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00267.warc.gz
en
0.942254
1,404
3.515625
4
Empowered by forgiveness A Christian Science perspective: We can’t afford to allow the heartaches to overshadow the beauty of life. Forgiveness, based on Christ Jesus’ example, is a foundational way that we can stay out of the chaos and remain committed to the good. Our family had suffered some hard knocks. God had led us forward. Our Christian Science branch church and Sunday School had sustained us over and over again. God was our mainstay and my heart yearned to know that my youngest child in particular would be OK. This dinner conversation was an assurance that this teenager was learning to live the love of God he was being taught: “Skander, have I taught you that forgiveness is important?” “Sure, Mom,” he replied without hesitation. “How did I do that?” “Well, maybe I shouldn’t say you taught me. I just know that forgiveness is important.” “So, you know for sure that it’s a value of yours?” “Yeah, I know it’s my value because I try to do it, and in fact I enjoy doing it.” “Can you give me an example?” “I can’t think of one now.” “Well, the fact that you enjoy doing it is really good.” “Mom, what’s making you talk about this?” (with genuine concern). “I just read an article that said it’s important for parents to teach forgiveness because by the time kids are teenagers it’s usually hard for them to forgive.” “I don’t agree with that at all. In fact, I think teenagers are good at forgiveness because teenagers know the importance of cutting people slack.” “Why? Because teenagers know they need slack more than others?” “I guess that’s a way of saying it. I think the problem is self-righteousness – feeling so much better than anyone else. If somebody doesn’t think they need slack, they think other people shouldn’t get a break either.” “Maybe that’s how I’ve taught you forgiveness – you’ve needed to forgive me for my mistakes.” “Mom, your mistakes aren’t any worse than mine” (with great tenderness). It was one of those dinner table conversations that worked. I remember feeling after this that even though my son had many more years of schooling to come, I could glimpse his budding maturity and thoughtful spirituality. It tempered my concern about whether he could overcome the difficulties of his childhood, and being raised by a single mom. His joy in practicing forgiveness promised he would be able to think beyond his circumstances and practice the resilience that is a necessary part of life. He had learned that the source of the good in his life was God’s ongoing love. Human life can be a mix of great tragedy and great beauty. I’ve found that sorting through the best and learning from the worst is essential to progress. We can’t afford to allow the heartaches to overshadow the beauty. Forgiveness, based on Christ Jesus’ example, is a foundational way that we stay out of the chaos of mortal mind and remain committed to the good. One of the things that makes us withhold forgiveness is that it doesn’t always seem to affect other people’s behavior. But the motive for forgiveness is to honor God’s harmonious government of the universe. Doing this in the face of discord is especially powerful because it prepares thought to admit the goodness that overshadows the sin. Christ Jesus must have foreseen the importance of tenacity in forgiveness when he counseled Peter to forgive someone more than once, more than 10 times, even more than 100. Jesus’ demand was to forgive 490 times if necessary (see Matthew 18:21, 22). Sometimes people resolve to change and then don’t, perhaps because the human mind’s resolve to change is not reliable. So, in order to practice true forgiveness, our capacity to forgive has to be greater than the stubbornness of the human mind. Where do we get that strength? One of the basic tenets of Christian Science points to the power source. The first part reads: “We acknowledge God’s forgiveness of sin in the destruction of sin and the spiritual understanding that casts out evil as unreal” (Mary Baker Eddy, “Science and Health with Key to the Scriptures,” p. 497). Our great support in this work is that God is the power behind forgiveness. In the practice of forgiveness, it is God’s view of creation that is asserting itself. God sees man as unblemished, and the omnipotence of God commands creation in a way that the divine reality is known. This divine influence neutralizes the resistance to forgiveness. God makes known the innocence He has established in each of us, as the very image and likeness of His own being. Winning this conviction through our own prayer is an essential way of supporting another’s progress. When we can make the separation of sin from someone else, we’re embracing the individual in a mental atmosphere that makes it easier for that individual to make the mental shift to their own freedom. It becomes easier to see authentically how God upholds the perfection of creation. Innocence is the foundational fact of man’s being – of your real being and mine. Our relationships with others must be based on this fact in order to experience the full blessing of knowing each other. God has endowed each of us with the capacity to defend our own and others’ freedom to be our God-expressed selves. True forgiveness recognizes that sin – sensuality, willfulness, greed, or some other error – never has been a part of God’s man. So it can’t be part of the individual we are being asked to forgive. Whatever effort we make on behalf of others, it pales before the blessing they are designed to be. The sin is never greater than the divine purpose of showing forth God’s being. Forgiveness says: “I will not wait for you to be worthy of my love. Right now, I will love you as God does, forever. And I will defend your capacity to love, and to be who you truly are.” Adapted from the Christian Science Sentinel.
<urn:uuid:d1d5b101-4e05-4187-b047-081d077d67d1>
CC-MAIN-2016-44
http://www.csmonitor.com/Commentary/A-Christian-Science-Perspective/2014/0507/Empowered-by-forgiveness
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00561-ip-10-171-6-4.ec2.internal.warc.gz
en
0.961075
1,379
1.875
2
Thomas Harrison and Rachel Emerson Posted by mikegen48 on September 12, 2013 Thomas Harrison was born circa 1777 in Virginia. He died in 1870 in Pennsylvania. Thomas married Rachel Emerson about 1798 in Virginia. Rachel was born in 1777 in Virginia. She died in 1838 in Pennsylvania. They had the following children: Thomas Harrison was born in 1800 in Sussex County, Virginia. He died during 1834 in Brooke County, Virginia. Martin Harrison was born about 1804 in Virginia. He died in 1884 in Virginia. Christina Harrison was born on 4 Apr 1807 in Virginia. She died in 1859 in Virginia. Christopher Harrison was born during 1807 in Virginia. He died in 1870 in Brooke County, Virginia. Abraham Harrison was born about 1811 in Pennsylvania. Michael Harrison was born in 1814 in Pennsylvania. He died during 1873 in Brooke County, Virginia. Lewis Harrison was born during 1817 in Venango County, Pennsylvania. He died in 1819 in Pennsylvania. Paul Harrison was born in 1819 in Venango County, Pennsylvania. He died on 3 Dec 1886 in Virginia. John Harrison was born on 24 Sep 1822 in Pennsylvania. He died in 1905 in Clark County, Indiana.
<urn:uuid:91c81f3d-1d5b-41fb-a390-e4bb9fc9a613>
CC-MAIN-2017-04
https://mikegen48.wordpress.com/2013/09/12/thomas-harrison-and-rachel-emerson/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00292-ip-10-171-10-70.ec2.internal.warc.gz
en
0.994698
260
2.109375
2
As Preppers, we can fall into the trap of thinking that our food storage preps are fairly easily taken care of. It’s easy to dismiss some of the complexity that goes into planning how to feed your family, but take a closer look. Are you committing some of these food storage mistakes? Have you committed these food storage mistakes? 1 – LACK OF VARIETY Most people don’t have enough variety in their food storage. 95% of the people I’ve worked with only stored the 4 basic items we mentioned earlier: wheat, milk, honey, and salt. Statistics show most of us won’t survive on such a diet for several reasons. - Many people are allergic to wheat and may not be aware of it until they are eating it meal after meal. - Wheat is too harsh for young children. They can tolerate it in small amounts but not as their main staple. - We get tired of eating the same foods over and over and many times prefer not to eat than to sample that particular food again. This is called appetite fatigue. Young children and older people are particularly susceptible to it. Store less wheat than is generally suggested and put the difference into a variety of other grains, particularly ones your family likes to eat. Also, store a variety of beans. This will add a variety of color, texture, and flavor. Variety is the key to a successful storage program. It is essential that you store flavorings such as tomato, bouillon, cheese, and onion. Also, include a good supply of the spices you like to cook with. These flavorings and spices allow you to do many creative things with your grains and beans. Without them, you are severely limited. One of the best suggestions I can give you is to buy a good food storage cookbook. Go through it and see what your family would really eat. Notice the ingredients as you do it. This will help you more than anything else to know what items to store. 2 – EXTENDED STAPLES Few people get beyond storing the four basic items, but it is extremely important that you do so. Never put all your eggs in one basket. Store dehydrated and/or freeze-dried foods as well as home canned and store-bought canned goods. Make sure you add cooking oil, shortening, baking powder, soda, yeast, and powdered eggs. You can’t cook even the most basic recipes without these items. Because of limited space, I won’t list all the items that should be included in a well-balanced storage program. They are all included in The New Cookin’ With Home Storage cookbook, as well as information on how much to store, and where to purchase it. 3 – VITAMINS Vitamins are important, especially if you have children, since children do not store body reserves of nutrients as adults do. A good quality multivitamin and vitamin C are the most vital. Others may be added as your budget permits. 4 – QUICK AND EASY AND PSYCHOLOGICAL FOODS Quick and easy foods help you through times when you are psychologically or physically unable to prepare your basic storage items. No cook foods such as freeze-dried are wonderful since they require little preparation. MRE’s (Meals Ready to Eat), such as many preparedness outlets carry, canned goods, etc. are also very good. Psychological Foods are the goodies – Jello, pudding, candy, etc. – you should add to your storage. These may sound frivolous, but through the years I’ve talked with many people who have lived entirely on their storage for extended periods of time. Nearly all of them say these were the most helpful items in their storage to normalize their situations and make it more bearable. These are especially important if you have children. 5 – BALANCE Time and time again I’ve seen families buy all of their wheat, then buy all of another item, and so on. Don’t do that. It’s important to keep well-balanced as you build your storage. Buy several items, rather than a large quantity of one item. If something happens and you have to live on your present storage, you’ll fare much better having a one-month supply of a variety of items than a year’s supply of two to three items. 6 – CONTAINERS Always store your bulk foods in food storage containers. I have seen literally tons and tons of food thrown away because they were left in sacks, where they became highly susceptible to moisture, insects and rodents. If you are using plastic buckets make sure they are lined with a food-grade plastic liner available from companies that carry packaging supplies. Never use trash can liners as these are treated with pesticides. Don’t stack them too high. In an earthquake they may topple, the lids pop open, or they may crack. A better container is the #10 tin can which most preparedness companies use when they package their foods. 7 – USE YOUR STORAGE In all the years I’ve worked with preparedness one of the biggest problems I’ve seen is people storing food and not knowing what to do with it. It’s vital that you and your family become familiar with the things you are storing. You need to know how to prepare these foods. This is not something you want to learn under stress. Your family needs to be used to eating these foods. A stressful period is not a good time to totally change your diet. Get a food storage cookbook and learn to use these foods! It’s easy to solve these food storage problems once you know what they are. The lady I talked about at the first of the article left realizing what she had stored was a good beginning, but not enough. As she said, “It’s better to find out the mistakes I’ve made now while there’s still time to make corrections.” This makes a lot more sense. If you’re one who needs to make some adjustments, that’s okay. Look at these food storage mistakes as suggestions and add the things you’re missing. It’s easy to take a basic storage and add the essentials to make it livable, but it needs to be done. As I did the research for my cookbook I wanted to include recipes that gave help to families no matter what they had stored. As I put the material together it was fascinating to discover what the pioneers ate is the type of things we store. But if you have stored only the 4 basics, there’s very, very little you can do with it. By adding even just a few things it greatly increases your options, and the prospect of your family surviving on it. As I studied how the pioneers lived and ate, my whole feeling for food changed. I realized our storage is what most of the world has always lived on. If it’s put together the right way we’ll be returning to good basic living with a few goodies thrown in.
<urn:uuid:87c9c956-0b85-47a6-a461-abfee10f60ee>
CC-MAIN-2022-33
https://theprepperjournal.com/2013/10/25/7-prepper-food-storage-mistakes/?amp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00072.warc.gz
en
0.973028
1,477
1.8125
2
by Lupita Salazar Letscher The Senate voted this weekend, in the first step of a long debate set to begin in earnest after Thanksgiving. This post will give you an idea of where we’re going in the Senate debate on health reform and how to understand things a little better along the way. The Process. The basic process for a Senate to pass a bill is simple – introduce the bill, debate it, amend it on the floor, and pass it (or don’t). In practice, however, and especially in health reform, this process could take weeks and a thousand amendments before anyone, including Democrats, are ready to vote up or down on anything. Here’s an idea of what we can expect in the Senate debate of their version of a health reform bill – the Patient Protection and Affordable Care Act – with a handy glossary of terms (below): - START. The Senate vote this weekend on the motion to proceed to consideration of the health reform bill marked the official start of debate on the Patient Protection and Affordable Care Act. This was one of at two votes to invoke cloture during this process and needed at least 60 YEA votes to avoid a filibuster and move forward on health reform. - MIDDLE. From the end of November thru December 23rd (when they are scheduled to adjourn), the Senate will be in session debating the health care reform bill. Amendments may be offered at any time on the floor, new issues may surface at any moment, and points of order will be raised ad infinitum. Each amendment that comes up will probably need a filibuster-proof 60 votes to pass. - END. The Senate will eventually need to end the debate and vote on whether to pass the bill as amended on the floor. Unless all 100 Senators can all agree unanimously to end the debate, Senator Reid will need to hold another vote to invoke cloture, this time to close consideration of the bill – which will take, again, 60 votes. If the votes aren’t there for cloture, the debate can’t end and the bill can’t move out of the Senate and into Conference Committee with the House. The Vocabulary. You’re going to hear a lot of buzzwords thrown around on the news, if you haven’t already. Here’s the ones we just used, in order of appearance: - Motion to proceed to consider is a motion, usually offered by the Majority Leader, to bring a bill up for consideration on the Senator floor. Senators can debate this motion until enough of them (60) vote to close debate. - Cloture limits the time left for Senators to debate a motion and it’s the only process that will overcome a filibuster. It takes 60 Senators to vote for cloture (or ‘to invoke cloture’) and it caps the time left for debate at an additional 30 hours. - Filibuster is any attempt by a Senator, or a group of Senators, to block or delay action on a bill. Senate Republicans have threatened to filibuster health reform in the Senate by dragging out the debate, requiring a reading of the bill out loud on the floor, offering procedural motions (each of which takes their own vote), and/or offering an endless string of amendments. - Point of order is a claim made by a Senator that a rule of the Senate is being violated. Senators may raise or reserve a point of order, which means that the Chair must stop debate on the floor, consider the point of order, and determine whether a Senate rule was broken. - Conference Committee (aka: Conference) is the process by which two different version of a bill are combined into one single piece of legislation. Typically, the leadership staff on the committee’s of jurisdiction over the bill negotiate the conference bill. So for health reform, some selection of leadership from the Senate HELP and Finance Committee and House Education & Labor, Energy & Commerce and Ways and Means Committees will work out the final health reform bill from Congress. Once the Conference Committee has selected the best of both bills, the legislation will go back to the floor of both chambers for an up-or-down vote. Once the bill comes out of conference, it cannot be amended.
<urn:uuid:0766b3ff-bfe3-4ada-a11b-d87ff75ec2a6>
CC-MAIN-2022-33
https://blog.nachc.org/process-ing-the-senate/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00074.warc.gz
en
0.947838
873
1.632813
2
There is doubt among some scientists and others that a Creator God is alive and reigning over this universe. Others, however, watch an amazing phenomenon that occurs occasionally over Earth and ponder whether such a thing can happen just by accident. That phenomenon is the fact that our moon happens to be 238,900 miles from Earth and a much more massive sun is 92.96 million miles away -- but from Earth, those vastly different distances make the moon appear to fit EXACTLY over the sun to form total solar eclipses. Too Exact to Be an Accident? This Aug. 21, as such an eclipse cuts a 60-mile wide swath across America from Oregon to South Carolina, Hugh Ross believes it will demonstrate a fit that is far too exact to be mere serendipity. "Right now, the Sun is 400 times farther away from us than the Moon," this astronomer and minister told CBN News. "But the Sun is 400 times bigger. So that's why you get a perfect solar eclipse." Ross founded Reasons to Believe, a group that uses science to point toward what they believe is a Creator God. On the other side, however, is astronomer Dr. Bethany Cobb Kung of Washington, D.C.'s George Washington University. "It's a big universe and there are a lot of coincidences. I think it's just a random happenstance," Kung said of the eclipse phenomenon. But that doesn't keep her from being in awe of what she'll witness Aug. 21. "It just happens to be that the Moon, being much smaller than the Sun of course, also is much closer. And that alignment ends up being just perfect," she said. Though they may disagree over whether these eclipses are created or coincidence, both Kung and Ross agree humans are fortunate to exist at just this time on planet Earth. That's because only during this period can the Sun and Moon form such an exact fit. Moon on the Move "The moon is moving farther away from the Earth. So over time — a long, long time — eclipses will not be observable from here on Earth. At least, not total solar eclipses," Kung pointed out. "So we happen to live in a really good time because the alignments are right; the distances are right; the relative sizes are right. So it's pretty exciting." Meanwhile, Ross also sees a divine hand in mankind being on the planet at just this right time to see these wonders above. "It hasn't always been that way because the Moon was much closer," he said. "The Moon will be farther away. God created us human beings at that one moment in the history of the Earth where we can witness total solar eclipses. And because of that, we've been able to make amazing scientific discoveries, some of which actually give us substantial evidence that there is a God behind it all." This Show Only Happens Here Ross also pointed out that in a solar system with eight planets and dozens of moons, only the Sun, Earth and Moon are at just the right distances from each other to form these exact fits in the sky over Earth. It doesn't happen on any of the other seven planets. Ross wrote about these locations and this time in a recent essay called "Thank God for Perfect Solar Eclipses." "In other words, the only place where humans can live in the solar system is also the only place where perfect solar eclipses occur and these eclipses are occurring at the one time when human observers can appreciate them," Ross wrote. Kung does agree with Ross that Sun, Earth and Moon occupy a unique position for forming these solar spectaculars, like what the world will witness Aug. 21. 'A Pretty Astounding Thing' "You have to have the right alignment between the objects and you have to have the right sizes and position," Kung said. "So it is a pretty astounding thing that everything lines up just right for us to have this experience." Ross finds further proof of fine-tuning when it comes to the Moon. He explained that compared to all the other moons in the solar system, our Moon is a massive one orbiting relatively close to a fairly small planet. "And because our Earth has one gigantic moon not too far away, the gravity of that Moon stabilizes the tilt of our rotation axis," he explained. "Right now, we're at 23-and-a-half degrees. And that only varies by plus or minus one degree over the history of the Earth. That gives us stable climates, and because of stable climates, we're able to sustain human beings on the face of the Earth." All the other planets, not having a massive moon close by, tilt wildly from one side to the other over time. "Therefore, they have climate instability that rules out the possibility of life," Ross explained. How the Moon Affects the Earth's Rotation Another hugely important thing about the Moon is it's close enough to exert tidal friction on the Earth, which has slowed the planet's rotation rate in a crucial way. As Ross put it, "When the Earth was first formed, it had a rotation rate of about two or three hours a day. Now it's 24 hours a day. Twenty-four hours a day is optimal rotation rate for advanced life." Then he added, "If you had time, I could give you another dozen features about the moon that must be fine-tuned to make possible life here on planet Earth." Kung believes none of this points to proof of a Creator God, but she's not totally dismissive of the faithful -- though she sticks to her guns. "You know, other people could have other feelings like there is a divine power to it. That's people's personal thoughts and opinions," she told CBN News. "But I just know the universe is huge. There are a lot of different, interesting things that happen in it just by random chance." No Moon, No Man On the other hand, Ross and his friends at Reasons to Believe say they can list 20 characteristics of the Moon fine-tuned precisely to make life possible here on Earth. So Ross hopes as people prepare for and view the Aug. 21 dark wonder above, they'll do it with a grateful heart. And he suggested, "Next time you look up at the Moon, thank God for the way He designed it because otherwise, you wouldn't be able to enjoy life."
<urn:uuid:d27534e5-1aca-43bb-a318-ad78bb478a05>
CC-MAIN-2022-33
https://www1.cbn.com/cbnnews/us/2017/august/a-fluke-or-something-more-the-divine-handprint-that-marks-this-solar-phenomenon
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00071.warc.gz
en
0.959528
1,333
2.375
2
We have made a complete guide to track your cell phone in case it has been lost or stolen, which includes the service Find my device from Google, which most Android devices have to be located remotely and online. There are several ways to access this service, in the event that for any reason you have problems tracking your equipment with the one you usually use. Through this online Google platform you can see the current location of your cell phone simply by logging in with the Google account that is associated with your Android device. You’ll also see the caption “Last Seen X Time Ago,” meaning that was the last time the device had an Internet connection. In addition to being able to see the location on a map, you have the option to make it sound at maximum volume for 5 minutes, even if it is set to silent, something useful if you have just lost it and think it is close. You can also remotely lock the computer and put your contact information on the screen. Finally you can remotely erase your mobile data, including the Gmail account. However, please note that by performing this last action you will no longer be able to track it or perform the indicated actions. This method consists of simply entering ” find my android “, ” find my cell phone ” or ” find my mobile ” (without quotes) in the Google search engine (apparently it does not work typing “find my device”). If you are logged in with your Google account on the search engine website (from the blue “login” button at the top) with the same account that is associated with your lost cell phone, it will automatically return the map with the first result location of your cell phone (if you don’t do this, you may see the error “Device unavailable”). If you touch on the map you will be taken to the page Find my official device from where you will have the option to block and delete Android data. You will also have a shortcut to ring the device at high volume even if it is silent (which for some reason in my case I see it disabled) and another one of “Recover”, which takes you to the control panel of your Google account where you will be offered several tips to get it back. More about this in the next section. In this case you may see «Last synchronization: date» which means that it was the last time that the device was detected connecting to the Internet. Here I have seen a date of several days ago compared to what the Find my device tool showed and I am not sure why the information is different. Google account control panel In the administrator of your Google account (myaccount.google.com), “Security” tab you will see the “Your devices” section, where you have the option “Find a lost device”. On the next screen choose the device you want to track, confirm the password for your Google account and click on the “Find” button. You also have the “Make it sound” option, which works exactly similar to what was previously described. Here you will also see the information «Last synchronization», which also indicates the last time the mobile was connected to the Internet. Unfortunately, sometimes this information did not coincide with the information provided by the “Find my device” service indicated above. Additionally, Google offers you other options to recover your lost or stolen cell phone, such as remotely blocking the device, deactivating your Google account on the mobile, deleting your data and also suggestions such as communicating with your operator in order to protect your number or to block the IMEI. The interesting thing about this option is that it allows you to lock the screen and ring the device without tracking it. This is particularly useful to avoid generating the notification located device that appears on the mobile when tracking. If you enter the official website of Find my device, it will immediately begin to locate your device and generate the indicated notification, something that may not be convenient for you if, before alerting the thief in this way, you first want to block it or make it ring. The Find My Device service also has a mobile app. The objective is that you can install it on the mobile of any friend or family member to track your stolen cell phone from anywhere. You simply have to log in with the Google account associated with your lost phone and you can see its location on a map in a very similar way to the web version. From this application you will also be able to carry out the rest of the actions offered by the other previous tools, such as ringing the computer, locking it remotely, deleting its data and also seeing the status of the network and how much battery is left in your mobile. To avoid leaving your Google account registered on someone else’s cell phone, I suggest using the “Log in as a guest” option. Note that the Find My Device service depends on an Internet connection and that the location of the device is enabled. Furthermore, in order for this location to be as accurate as possible, the “High Accuracy” setting (GPS + WiFi + Mobile networks) must be activated in the location settings. If not, and unless it is a remote area with few or no cellular antennas or WiFi networks, you may see large distance radios. In the worst case, your device may appear as “Not Available” or similar notices. How to block a lost cell phone by adding contact information on the screen How to see the location history of your cell phone on Google Maps This notification may prevent you from recovering your lost or stolen cell phone Receive updates: SUBSCRIBE by email and join 10,000+ readers. Follow this blog on Facebook and Twitter.
<urn:uuid:a169258f-e239-4009-a11b-2a5f97c5362f>
CC-MAIN-2022-33
https://howandroidhelp.com/4-ways-to-access-googles-find-my-device-service/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00470.warc.gz
en
0.95278
1,205
1.617188
2
Gone are the days when the most complicated choice you had to make in the milk section of the dairy aisle was reduced fat or whole. Now, you will find carton after carton of dairy-like beverages made from foods you never thought could be “milked” — almonds, oats, rice, peas. While cow’s milk is still the most popular according to retail sales, non-dairy alternatives hit an estimated $2.95 billion last year, up 54% from five years earlier, according to the market research firm Mintel. These plant-based alternatives are typically made by soaking the legume, nut, grain or other main ingredient and then pressing and straining the liquid, or “milk.” Many people prefer them because they want or need to avoid dairy, but some choose them because they believe they are healthier than cow’s milk. Some experts urge consumers to look beyond the hype and to examine the nutrition label, however, because some may not be as healthful as they seem. Q: Are plant-based milks good for me?This will depend on which type of plant milk you drink, whether it is fortified, how many added sugars it contains and how it fits into your overall diet. You should not assume, for instance, that plant milks contain the same nutrients as cow’s milk, even if the drink is white and has the same creamy texture. And some of the sweetened versions can contain more added sugar than a doughnut. “In general, these non-dairy milks have been promoted as healthier, and that’s not necessarily the case,” said Melissa Majumdar, a spokeswoman for the Academy of Nutrition and Dietetics. Cow’s milk is naturally rich in protein, calcium, potassium and B vitamins, and is often fortified with vitamin A (which is naturally present in whole milk) and vitamin D. While many plant-based milks are enriched with many of the nutrients found in cow’s milk, not all are. And many do not provide enough of certain key nutrients like protein, potassium and vitamin D, Jackie Haven, deputy administrator for the U.S. Department of Agriculture’s Center for Nutrition Policy and Promotion, wrote in an email: “Usually, these beverages do not include all of the necessary nutrients needed to replace dairy foods.”That being said, non-dairy beverages can be important alternatives for those who are allergic or intolerant to milk or who are otherwise avoiding dairy. And they can be a part of a healthy diet as long as you pay attention to the nutrition facts label and make sure you are getting the same essential nutrients you would normally get from real milk.“You can still meet your nutrition goals without drinking cow’s milk,” said Megan Lott, a nutritionist and deputy director for the Healthy Eating Research program at Duke University . “It just takes really educating yourself. ”Q: How do the different types of plant milks compare? A: According to SPINS , a market research company, the six most popular plant-based milks based on sales data from the past year are almond, oat, soy, coconut, pea and rice (excluding blended versions, like coconut almond).Here is how the original or unsweetened versions of each stack up to one another and to whole milk in terms of taste, protein, calories, fats and other attributes. (We used whole milk for comparison because it has become more popular in recent years, but keep in mind that the USDA dietary guidelines recommend drinking low fat and skim versions rather than whole. All versions below contain calcium and vitamin D. Almond milk: This nutty-flavoured beverage is the most popular plant milk, according to SPINS. One cup of the unsweetened version has just 37 calories — about a quarter the amount in whole milk — and about 96% less saturated fat. But it is no match for cow’s milk (or raw almonds themselves) in terms of protein — it has just about 1 gram, compared with the 8 grams present in whole milk. If you have a nut allergy, experts recommend avoiding it as it may trigger an allergic reaction.Oat milk: Sales of this thick, creamy drink increased by 182% since last year, according to SPINS, making it one of the fastest growing plant milks. One cup of the popular Oatly! brand’s original version has little saturated fat (0.5 grams) and slightly fewer calories than whole milk (120 versus 146), but has 7 grams of added sugars (plain milk has none) and only 3 grams of protein.One cup does have some fibre — 2 grams — but Dr. Edwin McDonald IV, an associate director of adult clinical nutrition at the University of Chicago Medicine, said that is not very much. “If you are looking for health benefits from oat milk, you’re better off eating oatmeal,” he said. One cup of oatmeal, for instance, has twice as much fiber as one cup of oat milk. Fiber is important for gut health, cholesterol and blood sugar control, and for maintaining your weight.Soy milk: When fortified with calcium and vitamins A and D, soy milk is the only non-dairy milk that is comparable to cow’s milk in terms of nutrient balance, according to the dietary guidelines. One cup has 6 grams of protein, 105 calories and about 89% less saturated fat than whole milk. Made from soybeans, it has a similar consistency to cow’s milk and is a natural source of potassium.“If you are looking for more of a nutritionally balanced milk substitute, then pea and soy are going to be the best,” said Dr. David Ludwig, an endocrinologist and obesity researcher at Boston Children’s Hospital.While there has been some concern about the estrogen-mimicking compounds called isoflavones in soy, there is not enough data to prove any harm or benefit. If you are allergic to soybeans, though, experts say to avoid it.Coconut milk: Made from the grated meat of coconuts, it is naturally sweet and has about half as many calories as whole milk, but has little protein (0.5 grams per cup), and has 5 grams of saturated fats — about the same amount as whole milk — with no healthy unsaturated fat. As with dairy fat, there is the concern that coconut fat can raise the levels of LDL, or “bad,” cholesterol, said Alice H. Lichtenstein, a Gershoff professor of nutrition science and policy at Tufts University. Pea milk: Sometimes called “plant protein milk,” this beverage is made from yellow split peas. As with other plant milks that are made from legumes, like soy milk, pea milk is high in protein (8 grams per cup) and unsweetened versions contain about half the calories of whole milk, and just half a gram of saturated fat. “My favourite non-dairy milk is pea milk,” said McDonald, who is lactose intolerant and a trained chef. That is because of its protein, and a texture he likens to cow’s milk — somewhat creamy with a mild taste.Rice milk: Made from brown rice, the milk has a naturally sweet taste. It has slightly fewer calories than whole milk (115 versus 146 per cup), and no saturated fat; however it is very low in protein (0.7 grams per cup). When compared with other plant-based milks, “there doesn’t seem to be any benefit from rice milk,” Lichtenstein said.The beverage also has fast-digesting carbohydrates, Ludwig said, which can quickly convert into glucose, spiking insulin and blood sugar levels — a potential concern for people with diabetes or with severe insulin resistance. Q: Should I be concerned about added sugars? A: Yes. To make plant milks more palatable, manufacturers will often add sugars in the form of cane sugar, rice syrup and more. While one cup of plain cow’s milk contains 12 grams of sugars, all of it comes from naturally occurring lactose, which is digested more slowly and keeps your metabolism more stable over time than refined sugars.However, for some, a cup of coffee with unsweetened milk is not satisfying. “People like the sweetened versions of those,” said Suzanne Devkota, an assistant professor at the Cedars-Sinai Medical Center who specializes in nutrition and metabolism. “But now the carbohydrate level of the plant alternative is twice as much as the cow’s milk.” Unsweetened almond milk, for instance, has just 2 grams of naturally occurring sugar per cup. The same amount of WestSoy Chocolate Peppermint Stick Soymilk has 25 grams of sugar — 2 1/2 times the amount in one original glazed doughnut from Krispy Kreme. Make sure to keep an eye on the nutrition label, and watch out for flavoured versions, like those labelled “vanilla” or “chocolate,” because they often contain added sugar.“What you don’t want is to have a non-dairy product really be your dessert,” said Penny Kris-Etherton, a professor of nutritional sciences at Penn State. “You want it to function as a dairy product in your diet.” Q: Are plant milks worth the money?A. While the price of plant-based milks can range widely — from $3 or more for a half-gallon — regular milk is often much cheaper. A gallon of whole, on average, costs $3.58.“Cow’s milk is going to be the least expensive,” said Majumdar, of the Academy of Nutrition and Dietetics. “But it has the most nutrients, so you are getting more bang for your buck.”Christopher Gardner, a nutrition scientist and professor of medicine at Stanford Prevention Research Center, however, said that for him, the higher price of plant milks is worth it for animal welfare and environmental reasons. “I’ve never met a belching soybean or pea,” he said, referring to cows’ emissions of methane gas. “If you are an eco-warrior, it could be worth the cost.”Not all plant milks are eco-friendly, though. It requires an estimated 15 gallons of water to grow just 16 almonds; and most are grown in drought-stricken California. Q: Are plant-based milks bad for me? A: “We don’t have to be afraid of them,” Ludwig said. “But concern creeps in as you start to increase the amount.” Because of their lack of certain nutrients, low level of protein and high amount of carbohydrates in some, Ludwig recommended drinking no more than one cup per day. While there have been many studies on cow’s milk and how it affects bone health and heart disease risk, there is very little research into plant milks because most have not been around for as long.Young children also should not be exclusively swapping plant milks for cow’s milk unless there is a medical or special dietary reason for them to do so, since some plant milks may not provide the same essential nutrients they would otherwise get from cow’s milk. Gardner said that it is important to focus on consuming whole foods, and not the processed versions. Eating whole soybeans, oat cereals and almonds is preferable to drinking their milks. “When you make milk of them, you are removing some of the nutrients,” he said. Source: Dawn MacKeen, New York Times, May 14,2021
<urn:uuid:8052f42f-4a35-44da-883b-e1fd92fda003>
CC-MAIN-2022-33
https://dairynews7x7.com/replacing-dairy-with-plant-based-milk-may-not-be-as-beneficial-as-you-think/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00667.warc.gz
en
0.957152
2,476
2.578125
3
Cybercommunity - We are a problem Another year, another load of articles saying that cyber threats are the worst they have ever been. Yet, still, consistently, the worst thing is the attitude of some cyber practitioners. Day after day, month after month, we see silly comments loaded with attitude from our professional community. This attitude plays a key part in why the cyber risk is getting worse. ``Look at company X, how dare they don’t do security, they are just crap” etc etc. This attitude is toxic, for several reasons - but it is also incredibly stupid. Why? Well, so far, the most prevalent cybersecurity people on LinkedIn that go after companies publicly have just a proven track record of their ineptitude (along with anyone that goes along with it spreading it without verifying), because 99% of cases are complete false positives. Additionally, so far, since I am that guy - most of the people stating these blindingly obvious vulnerabilities they have detected (their words, not mine) on these companies have got serious critical issues of their own. Therefore they end up cementing the ``do as I say, not as I do” approach to cybersecurity, which isn’t my recommended security posture for any organisation. However, let’s say for argument’s sake, they do find a vulnerability, it is genuine. And you report it as a personal ego boost or an advert for your cyber company. Let’s break that down. If I found your wallet in the street, I would find you by using the name on your credit card on social media, and attempt to contact you. If I couldn’t find you, I would then hand the wallet to a local police station, and go about my day. I would not take a picture of your credit card, front and back, and put it on a website tagging the person saying “this person is a complete moron. Left their wallet in the street. Exposed their own credit card!” Catch my drift? If you do this, please do add the letters ‘un’ into your job title of Ethical Hacker. However, my biggest gripe with this attitude is the fact that if that is how you communicate externally about this, it affects how you communicate your cybersecurity risks and issues internally, to your company, to your friends, and this makes a huge problem. People make mistakes. People have lives. During a time of a crisis, an incident, or a security vulnerability, they need to know that there is a friendly neighbourhood cyberperson available who will help, guide, train, nurture, and assist in a way that betters cybersecurity as a whole. What they don’t need is someone going immediately to ``Hands of Blaming Stations”. If we had an accident on a ship, like I had when HMS Grimsby decided to become the little ship that could become a Tank in Norway, we decided to deal with the flood and crisis first, rather than work out who was to blame. That focus, the `After Action Report’, if you will, is important, but can happen at another time - and you focus on roles and positions, not names, to stop it from becoming the blame game. All of this concludes into something we should understand about people. Labelling Theory. If you don’t know it, and you are working in cyber, you should. There are more than enough resources to learn about how your communications can be affected by this, but in a very simple sentence; “If you treat victims of cybersecurity attacks as idiots, they will comply.” Victim blaming creates more cybersecurity incidents. Communication breakdowns create more cybersecurity incidents. People not approaching you at the stage when it is a cybersecurity event before it develops into an incident creates more cybersecurity incidents. On a serious note, we have to better educate ourselves about the fact that things change. I still see companies and organisations recommending three monthly changing passwords, even though we know these reduce your security posture. I still see places using insane password complexity rules that make it impossible for a human to remember, but easy for a computer to crack. In summary, if you think you are an Expert in everything, you are in the wrong field. Break down these barriers. Become the go to in your organisation. Publicly praise when things go well, quietly educate and lead when things go wrong. Don’t be “that guy”.
<urn:uuid:84adb7ba-0be8-4df6-8c27-7660092022a1>
CC-MAIN-2022-33
https://www.idontslack.com/communications/labelingtheory/cyberthreat/2022/07/28/21stCentury.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00274.warc.gz
en
0.963151
941
1.609375
2
I don't like our society (American, capitalistic society). There are huge flaws that are happening that may destroy it. I've said before that I'd prefer a socialist type of society. But I know that heavy regulation to get people to behave won't work. It is unnatural. Humans aren't bees or ants, and don't do well in that type of society. We are naturally competitive, and have a hierarchical nature. Socialistic societies take away too much freedom and individuality. We need to manage and regulate ourselves. As much as I want people to "behave", I realize now that it can't be forced. People can't and won't change unless they want to. We are getting out of hand though, and things should be actively done to change the worst aspects of our society if we want it to survive. Those of you saying that our country is becoming too socialistic(entitlements, welfare, etc) may be right. Still, corporations are doing their share in ruining this country too. Building up the middle class may be the only solution. I'm old enough to have seen my country move further and further away from socialist ideas and I've seen freedom eroded as quickly as socialism has receded. Individuality has gone as well, now the pressure to conform is even greater as heavy regulation takes hold. The "me" society has seen a massive increase in anti-social behaviour with the consequential increase in laws controlling our freedom. by Charles James4 years ago Rarely do I get involved with Politics -especially American. However, recently, I came across several photos depicted the US President with the likeness of one A. Hitler. I really do not see the comparison. Good and... by Kathryn L Hill3 years ago -today in the Forums, it was stated that socialism offers freedom and low taxes. This is what we have learned today, 3/9/13 from advocates of Social Democracy for the United States (A Social Democracy promotes a gradual... by spiritactor7 years ago I believe that, ultimately, Democracy is a gift we continually give OURSELVES. But, as a society, a nation, are we ACCEPTING and USING it? by Don W7 years ago Is "sustainable capitalism" an oxymoron? Can a sustainable model for capitalism be found? by kerryg6 years ago Just read a really interesting article on social democracy by Tony Judt called "What Is Living and What Is Dead in Social Democracy."I recommend the whole article, but this is one passage that stood out to me... by wanzulfikri5 years ago If not, how come? Are there any other alternatives to democracy that we haven't heard of and should be the best replacement to democracy? Copyright © 2017 HubPages Inc. and respective owners. Other product and company names shown may be trademarks of their respective owners. HubPages® is a registered Service Mark of HubPages, Inc. HubPages and Hubbers (authors) may earn revenue on this page based on affiliate relationships and advertisements with partners including Amazon, Google, and others.
<urn:uuid:54eaf337-26b2-4900-adbb-c7c49ca8386f>
CC-MAIN-2017-04
http://hubpages.com/politics/forum/120792/rethinking-capitalism-and-democracy
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00189-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961939
644
1.726563
2
Gender and Economy The Project Working Group (PWG) on Gender and Economy is a subsidiary body within the governing structure of the UN Special Programme for the Economies of Central Asia (SPECA). The member countries of the Programme are Afghanistan, Azerbaijan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan. The United Nations Economic Commission for Europe (UNECE) and the United Nations Economic and Social Commission for Asia and the Pacific (ESCAP) provide overall support to the Programme. The SPECA Project Working Group on Gender and Economy was established following the decision of the SPECA Governing Council taken at its first session (Baku, Azerbaijan, 27 June 2006). It works to raise awareness on the interdependency between gender and economy through sharing good practices in mainstreaming gender in economic policies, policy-oriented research and projects as well as developing cross-sectoral linkages and synergies with other relevant areas of the SPECA activities Terms of Reference Project Working Group Sessions Ad Hoc Meeting of the SPECA PWG on Gender and Economy 4 November 2010, Geneva, Palais des Nations
<urn:uuid:d33b0af1-ee32-429b-8ea9-5686397b3945>
CC-MAIN-2017-04
http://www.unece.org/index.php?id=806&L=1&type=111
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00374-ip-10-171-10-70.ec2.internal.warc.gz
en
0.863699
234
1.804688
2
Materials that self-assemble and self-destruct once their work is done are highly advantageous for a number of applications – as components in temporary data storage systems or for medical devices. For example, such materials could seal blood vessels during surgery and re-open them subsequently. Dr. Andreas Walther, research group leader at DWI – Leibniz Institute for Interactive Materials in Aachen, developed an aqueous system that uses a single starting point to induce self-assembly formation, whose stability is pre-programmed with a lifetime before disassembly occurs without any additional external signal – hence presenting an artificial self-regulation mechanism in closed conditions. Biologically inspired principles for synthesis of complex materials are one of Andreas Walther’s key research interests. To allow the preparation of very small, elaborate objects, nanotechnology uses self-assembly. Usually, in man-made self-assemblies, molecular interactions guide tiny building blocks to aggregate into 3D architectures until equilibrium is reached. However, nature goes one step further and prevents certain processes from reaching equilibrium. Assembly competes with disassembly, and self-regulation occurs. For example, microtubules, components of the cytoskeleton, continuously grow, shrink and rearrange. Once they run out of their biological fuel, they will disassemble. This motivated Andreas Walther and his team to develop an aqueous, closed system, in which the precise balance between assembly reaction and programmed activation of the degradation reaction controls the lifetime of the materials. A single starting injection initiates the whole process, which distinguishes this new approach from current responsive systems that always require a second signal to trigger the disassembly. The approach uses pH changes to control the process. The scientists press the start button by adding a base and a dormant deactivator. This first rapidly increases the pH and the building blocks – block copolymers, nanoparticles or peptides – then assemble into a three-dimensional structure. At the same time, the change of pH stimulates the dormant deactivator. PhD student Thomas Heuser explains: “The dormant deactivator slowly becomes activated and triggers an off-switch. But it takes a while before the off-switch unfolds its full potential. Depending on the molecular structure of the deactivator, this can be minutes, hours or a whole day. Until then, the self-assembled nanostructures remain stable.” Currently a hydrolytic reaction is used to activate the dormant deactivator. However, Andreas Walther and his team are already working on more sophisticated versions, which include an enzymatic reaction to slowly start the self-destruction mechanism. Dr. Janine Hillmer | idw - Informationsdienst Wissenschaft How gut bacteria can make us ill 18.01.2017 | Helmholtz-Zentrum für Infektionsforschung Nanoparticle Exposure Can Awaken Dormant Viruses in the Lungs 16.01.2017 | Helmholtz Zentrum München - Deutsches Forschungszentrum für Gesundheit und Umwelt Yersiniae cause severe intestinal infections. Studies using Yersinia pseudotuberculosis as a model organism aim to elucidate the infection mechanisms of these... Researchers from the University of Hamburg in Germany, in collaboration with colleagues from the University of Aarhus in Denmark, have synthesized a new superconducting material by growing a few layers of an antiferromagnetic transition-metal chalcogenide on a bismuth-based topological insulator, both being non-superconducting materials. While superconductivity and magnetism are generally believed to be mutually exclusive, surprisingly, in this new material, superconducting correlations... Laser-driving of semimetals allows creating novel quasiparticle states within condensed matter systems and switching between different states on ultrafast time scales Studying properties of fundamental particles in condensed matter systems is a promising approach to quantum field theory. Quasiparticles offer the opportunity... Among the general public, solar thermal energy is currently associated with dark blue, rectangular collectors on building roofs. Technologies are needed for aesthetically high quality architecture which offer the architect more room for manoeuvre when it comes to low- and plus-energy buildings. With the “ArKol” project, researchers at Fraunhofer ISE together with partners are currently developing two façade collectors for solar thermal energy generation, which permit a high degree of design flexibility: a strip collector for opaque façade sections and a solar thermal blind for transparent sections. The current state of the two developments will be presented at the BAU 2017 trade fair. As part of the “ArKol – development of architecturally highly integrated façade collectors with heat pipes” project, Fraunhofer ISE together with its partners... At TU Wien, an alternative for resource intensive formwork for the construction of concrete domes was developed. It is now used in a test dome for the Austrian Federal Railways Infrastructure (ÖBB Infrastruktur). Concrete shells are efficient structures, but not very resource efficient. The formwork for the construction of concrete domes alone requires a high amount of... 10.01.2017 | Event News 09.01.2017 | Event News 05.01.2017 | Event News 18.01.2017 | Life Sciences 18.01.2017 | Health and Medicine 17.01.2017 | Earth Sciences
<urn:uuid:02f98a7e-4b58-49c2-ab6a-8ac66c91740d>
CC-MAIN-2017-04
http://www.innovations-report.com/html/reports/life-sciences/dwi-scientists-program-the-lifetime-of-self-assembled-nanostructures.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00503-ip-10-171-10-70.ec2.internal.warc.gz
en
0.877662
1,153
3.296875
3
Embed Size (px) Transcript of Quantum dots QUANTUM DOTS TARAN PREET SINGH (MS12044) What Really Quantum Dots Are?? QUANTUM DOTS (QDs) are nanometer-scale semiconductor crystals composed of groups IIVI e.g.( CdS, CdSe ) or IIIV elements, and are defined as particles with physical dimensions smaller than the exciton Bohr radius, whose excitons are confined in all three dimensions of space. The term quantum dot was coined by Mark Reed in 1988; however, they were first discovered in a glass matrix by Alexey Ekimov in 1981 and in colloidal solutions by Louis E. Brus in 1985. Energies in semiconductor Electrons and holes are confined in all three dimensions of space by a surrounding material with a larger bandgap.Discrete energy levels (artificial atom).A quantum dot has a larger bandgap.Like bulk semiconductor, electrons tend to make transitions near the edges of the bandgap in quantum dots. The confinement of the electrons results in the appearance of the energy statesshown in the figure(right) The energy of the lowest state is given by: The energy of the other states is En = n2h2 = E1 n28mL2 Where Energy of the quantum dot is dependent on Size of the quantum dot due to QUANTUM CONFINEMENT EFFECT. Controlling the size of nanocrystal, quantum dots can be tuned to emit any color of light. HOW TO Make Quantum dotsQuantum dots can be made by various methods such as :LITHEOGRAPHYCOLLIDAL SYNTHESISEPITAXY Colloidal SynthesisColloidalsemiconductorNano crystalsaresynthesizedfrom precursor compounds dissolved in solutions, much like traditionalchemical processes.i.e: lead sulfide(PbS), lead selenide(PbSe), cadmium selenide(CdSe), cadmium sulfide(CdS), indium arsenide(InAs), and indium phosphide(InP) CMOS technology can be employed to fabricate silicon quantum dots. Ultra small (L=20nm, W=20nm) CMOS transistors behave as single electron quantum dots when operated at cryogenic temperature. Highly ordered arrays of quantum dots may also be self-assembled byelectrochemicaltechniques. A template is created by causing an ionic reaction at an electrolyte-metal interface which results in the spontaneous assembly of nanostructures. optical properties of quantum dots a - EXCITION b - EMISSION Quantum confinement effects give rise to unique optical and electronic properties in QDs, giving them numerous advantages over current fluorophores, such as organic dyes, fluorescent proteins and lanthanide chelates. The narrow emission and broad absorption spectra of QDs makes them well suited to multiplexed imaging, in which multiple colours and intensities are combined to encode genes, proteins . photostability Photostability is yet another factor in most fluoroscence application, where the quantum dot is having the advantage, unlike organic dyes(fluorophores) which BLEACH after only few minutes after exposure of light, QD are photostable can go multiple cycle of excitation and emission for hours with high level of brightness and photobleaching threshold. QD is shown more photostable than organic dyes Dihydrolipoic acid (DHLA)-capped cadmiumselenide-zinc sulfide (CdSe-ZnS) QDs showed no loss in intensity after 14 h, and were nearly 100 times as stable as, and also 20 times as bright as, rhodamine 6 G. Quantum dots may some day light your homes, offices, streets,and entire cities.Quantum dot LEDs can now produce any color of light, includingwhite.Quantum dot LEDs are extremely energy efficient. They use onlya few watts, while a regular incandescent lamp uses 30 or morewatts for the same amount of light A linear array of quantum dots that can be defined by metal electrodes on silicon with voltage applied so that single electron is trapped at each quantum dot at low temperature . Place in a external magnetic field, the Zeeman spin states of these electrons constitute cubits of the QUANTUM COMPUER medical imagingQuantum dots may one day save your life. Medical imaging has begun to use colloidal(in liquid solution) quantum dots much like the ones youll look at today. The photo belowshows human red blood cells, in which specific membrane proteins are targeted andlabeled with quantum dots. The number of purple features, which indicate the nuclei ofmalaria parasites, increases as malaria development progresses. Quantum dots last longer in your systemand are brighter than many organic dyesand fluorescent proteins previously usedto illuminate the interiors of cells. Theyalso have the advantage of monitoringchanges in cellular processes (they last along time) while most high-resolutiontechniques like only provide images ofcellular processes frozen at one momentQuantum dots (red dots above) can be designed to bind to specificcell receptors (green things). In this way researchers can monitor allkinds of processes in living cells QuaNtum Dots in HD TV REFerences T. Jamieson et al. / Biomaterials 28 (2007) 47174732 www.researchgate.net/post/What_is_Quantum_confinement_effect www.wikipedia.com/quantumdot cs.lbl.gov/news-media/news/2015/what-theblank-makes-quantum-dots-blink
<urn:uuid:b0acf7e0-6b9f-4e4c-95c7-368cd19f065a>
CC-MAIN-2022-33
https://fdocuments.net/document/quantum-dots-58bac6610d6ea.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00678.warc.gz
en
0.860761
1,257
3.71875
4
Dresden's fame is inseparably bound up with its great musical tradition: the Dresdner Kreuzchor boys' choir is more than 500 years old. On Saturdays, the choir sings vespers in Kreuzkirche (Church of the Holy Cross, summer 6 p.m., winter 5 p.m.). The Dresden State Orchestra, one of world's leading orchestras, plays in the magnificent Semper Opera House. Its name is directly linked with more than 300 years of opera history in Saxony. Famous composers, such as Weber, Wagner and Strauss, brought musical theater in Dresden to full bloom. On holidays, the Dresdner Kapellknaben boys' choir and the Cathedral Choir perform near-operatic Catholic sacred music in the Hofkirche (Court Church). At the vespers service on Saturday afternoons you can hear the famous Silbermann organ (May through October). Dresden Philharmonic Orchestra, which gives concerts in the Kulturpalast almost every weekend, also enjoys worldwide fame. Not to forget light entertainment: The Dresden State Operetta features operettas and musicals every day except Mondays.
<urn:uuid:c2b298fc-e4a5-45a5-a330-d474c7858a8f>
CC-MAIN-2017-04
https://www.maritim.com/en/hotels/germany/hotel-internationales-congress-center-dresden/leisure-tips
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00071-ip-10-171-10-70.ec2.internal.warc.gz
en
0.903878
247
1.585938
2
Sexuality, space and migration: South Asian gay men in Australia This paper investigates the relationship between migration, private space and sexual expression for South Asian gay men who have relocated to Melbourne, Australia. Little is known about South Asian gay men who have moved to Australia, or the role of mobility and spatial setting in constituting their sexualities. To tackle this gap, 23 South Asian gay men (21–50 years old) living in Melbourne were interviewed. This paper discusses emergent themes on the contribution of migration and private space to constituting sexual identities. Cultural expectations for marriage, social stigma about homosexuality and a lack of private spaces for sexual exploration, constrained the participants' sexual expression in South Asia. These factors underpinned some men's migration decisions. But while living away from family and country of origin provide private spaces and greater freedom, ‘coming out’ and expressing homosexual interests within private domestic space in Australia is not always easy or possible. Document Type: Research Article Affiliations: Australian Research Centre in Sex, Health and Society, La Trobe University, 215 Franklin Street, Melbourne, VIC 3000, Australia Publication date: 2012-08-01
<urn:uuid:e17cb0d4-f385-4641-b109-e6fb48e9472d>
CC-MAIN-2017-04
http://www.ingentaconnect.com/content/bsc/nzg/2012/00000068/00000002/art00003
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00309-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908997
238
1.53125
2
Ed Broadbent / The Globe and Mail Twenty-five years ago, on Nov. 24, 1989, I stood in the House of Commons and moved a motion to abolish the scourge of child poverty in Canada by the year 2000. I was optimistic. The 11-year timetable was realistic, the goal reachable. And politicians seemed prepared to act. Prime minister Brian Mulroney and Liberal leader John Turner strongly supported the resolution and it passed unanimously. Unfortunately, we have failed to meet the challenge. A goal without a plan turned out to be merely a hope. It’s true that child poverty has declined since 1989, when measured by the low-income cut-off, which looks at the ability of low-income families to meet the bare necessities of life. But beyond subsistence levels of food, shelter and clothing, a major gap remains in the lives of these children. The global standard for international comparisons is the low income measure. It calculates the proportion of children who live in families with less than half the median income. While many are beyond mere subsistence, families at this level have diminished possibilities. They cannot afford to buy their kids hockey equipment, enroll them in piano lessons or pay the cost of school trips. By this global measure, we have utterly failed to create equality of opportunity. This child poverty rate is a national disgrace. It jumped from 15.8 per cent in 1989 to 19.2 per cent in 2012, according to a Statistics Canada custom tabulation for Campaign 2000. The Harper Conservatives have continued to let down the country’s poor children and their parents. They have not increased targeted income supports for low-income families. Instead, they are expanding flat rate benefits, similar to the old family allowance program abolished as regressive by Mr. Mulroney’s government. These taxable payments are too low to have a real impact on poverty. They don’t come close to paying the costs of child care; they don’t create a single child-care space. While failing the poor, the Conservatives are proposing new measures that disproportionately favour affluent families. Income-splitting will cost $2-billion a year and deliver no benefit at all to single parents or to two-parent families with both earners in the lowest tax bracket. The maximum benefit of $2,000 will go mainly to very high-income traditional families with a single earner. The late Jim Flaherty appropriately rejected such unfairness while serving as minister of finance. The growing gap between the poor and the middle-class, let alone the top 1 per cent, flies in the face of the democratic ideal that all children should have equal opportunities to develop their talents and capacities to the full. Canadians agree that more must be done. A new poll of 3,000 Canadians, conducted by Greenberg Quinlan Rosner Canada on behalf of the Broadbent Institute, has found that two-thirds (64 per cent) want more action from the federal government. There is no big secret about what works. More equality and lower poverty rates exist where there are good jobs, strong unions, generous child benefits, affordable housing programs and comprehensive child care services. Commitment, not new ideas, is what Canada needs. A practical agenda is available. In terms of meeting the bare necessities of life, some progress has been made. Raising child tax benefits has helped. The National Child Benefit Supplement, launched by the federal government and the provinces in 1998, targeted more federal cash benefits to low-income families. However, it has not been increased for seven years. The Caledon Institute and Campaign 2000 have long proposed that child tax benefits should be increased beyond mere subsistence to the point where the maximum amount meets the actual costs of raising children. The current maximum of $3,654 per child is not enough to push many families with low wages and insecure jobs above the poverty line. We also need much more low-income housing. Affordable, high-quality child care and early learning programs are also needed. These allow parents, especially single parents, to work, and also expand opportunities for low-income children. Quebec has led the country with low-cost public daycare. In the past 25 years, we have lifted a number of children out of destitution, but we have failed them and hundreds of thousands of other children when it comes to providing equal opportunity to the enriched life open to the majority of Canadians. Canada can and must do better – hope is not enough.
<urn:uuid:6efac872-7b5b-43f1-9dd3-b0278239991f>
CC-MAIN-2017-04
http://www.broadbentinstitute.ca/canada_has_failed_to_create_equality_of_opportunity_broadbent
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00264-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957651
917
2.53125
3
FREE Book of the Day: 1st to 5th July 2022 Gurzil: The Wars of Wrath: Book One – Myth and Legend, Fantasy WITH THE FALL AND SACK OF ROME, the barbarian hordes of the east claimed the lands of the Western Empire and brought forth an age of tyranny. AGAINST THIS DARKNESS, TWO HEROES WILL RISE THEY COME FROM WORLDS APART BOUND TOGETHER BY MAGIC AND CURSED BY FATE ON THE WAR-RAVAGED ISLAND of Britain, King Cedric of Wessex launches a treacherous blitz attack against the kingdoms of the Romano Britons. Hopelessly outnumbered, the last descendent of King Lear, George of Bertilack, must hold the Saxon advance long enough for his sworn enemy, Arthur Pendragon of Camelot, to unite the Britons in common cause. FAR TO THE SOUTH, in the deserts of Libya, Princess Sabra of Saline fights against a more insidious foe. However, the shadowy cult that holds her people in bondage is more formidable than she realizes. For the god they worship is no idol of dead stone or gold. HE IS THE LAST of his kind, an ancient evil, a relic of an age when fallen angels and nephilim ruled over mankind. For centuries, he has waited, but now the dragon Gurzil is ready to make his move. FOR THIS HAS BEEN FORETOLD AND THIS WILL COME TO PASS
<urn:uuid:0c6f2d86-a613-44f3-8352-2671cd2c985b>
CC-MAIN-2022-33
https://indiebookbutler.com/free-book-of-the-day-1st-to-5th-july-2022/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00071.warc.gz
en
0.892007
316
1.53125
2
The School Story Written by Andrew Clements Reviewed by Seth G (age 9) The School Story is the story of a young girl, Natalie Nelson. Natalie is writing a fabulous book called The Cheater. The only problem is that Natalie's mom, Hannah Nelson, doesn't know that Natalie is writing a book. Natalie's mom is a publisher. Natalie thinks asking her mom to publish her book is asking too much of a favor, especially because Natalie's mom has a mean boss. I can't tell you the ending because it's too good. I like the part when Natalie reads her book, The Cheater, because it's a really good story. This book reminded me of when I was writing a book that my friends thought was good. I found Zoe interesting because she likes to argue and I like to argue. I recommend this book to kids because it is so good I just couldn't wait to finish the book.
<urn:uuid:723995a1-e2ad-4cd8-94ac-0a1418a6fe4c>
CC-MAIN-2022-33
https://spaghettibookclub.org/review.php?reviewId=7421
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00266.warc.gz
en
0.983725
191
1.554688
2
Texas wind power cutting emissions, environmental group says A new study says Texas' renewable energy standards have been by far the biggest contributors to cutting greenhouse gas emissions. The study, released today by Environment Texas, estimates that the state has reduced GHG emissions by nearly 20 million tons in 2012, of which 12.6 million tons came from policies mandating electricity production from renewable sources, a requirement largely filled with wind power. Texas is the nation's biggest producer of electricity from wind, and last year wind supplied nearly 10 percent of all the electricity used in the state. Also contributing to lower GHG emissions were energy-efficiency requirements and other state and federal policies, the study said. The study said that nationally, emissions of carbon dioxide declined more than 12 percent between 2007 and 2012. -- Jim Fuquay
<urn:uuid:ce4a00b9-c0f4-4b70-9015-6fd8e2cd9ec2>
CC-MAIN-2017-04
http://blogs.star-telegram.com/dfwjobs/2014/03/texas-wind-power-cutting-emissions-environmental-group-says.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00063-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957158
162
3.15625
3
At Housing Now we take an “all of the above” approach when it comes to increasing funding for affordable housing. Fortunately, there are two major efforts underway to expand funding for housing and related services. A coalition of groups has formed to pay for critical social programs through a “high earners income tax”. Formed in response to Trump’s election, they seek to protect the city from the likelihood of Federal budget cuts and to expand funding for transportation, housing, and other critical needs. You can find more information about their proposal at https://trumpproofseattle.org/ This proposal has already inspired support from Seattle's Mayor and at least one City Councilmember. As we support this effort, we will endeavor to update this section with the latest income tax news. The other big proposal is for a sales tax increase to pay for homeless reduction. We have mixed feelings about this. On the one hand, a focused effort on finding homes for everyone is long overdue. On the other hand, sales tax is one of our most regressive taxes. Low income people tend to pay a much higher percent of their income towards sales tax then higher income people (citation needed). The propose .01% increase in Sales Tax would cost a low income household $30 per year. One option which needs to be seriously discussed is a low income tax mitigation program. Ideally it should be an automatic program when people file for their income tax return they get an automatic boost to their refund coming out of city (and or county) funds. This could not only make any tax increases more progressive in their outcomes, it could begin to mitigate what is already one of the most regressive tax structures in the nation. Furthermore, with the structure in place for this program, additional funds from a high earners income tax could boost the size and qualification criteria for this program. We will discuss this concept in further detail in a forthcoming article.
<urn:uuid:c51683d5-d804-4f99-8152-6e06ba3e99fa>
CC-MAIN-2022-33
https://www.housingnowseattle.org/more_funding
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00068.warc.gz
en
0.963965
393
1.625
2
6 April 2021 The Geneva Academy and the International Committee of the Red Cross (ICRC) are organizing – in the context of our Digitalization of Conflict joint initiative – a student essay competition open to all undergraduate students from universities (including military academies) anywhere in the world. Students are invited to discuss, in their essays, which measures – including technical, policy, and legal – states should put in place to avoid or at least reduce the risk of civilian harm from military cyber operations during armed conflicts. ‘This issue is at the forefront of current protection questions during armed conflicts and we look forward to receive inputs from the young generation – who can look at this issue with fresh eyes and propose out of the box solutions – on how to ensure the continued relevance of international humanitarian law in these contexts,’ underlined Professor Robin Geiss, Swiss Chair of International Humanitarian Law at the Geneva Academy. ‘Our research aims at mapping the terrain and at consulting various stakeholders. Students, as the leaders and decision-makers of tomorrow, are definitely part of the exercise,’ he added. The jury – composed of ICRC and Geneva Academy experts – will select the three best essays which will be announced at the public launch of ICRC’s forthcoming report on Avoiding Civilian Harm during Military Cyber Operations. The winning essay will be published on the ICRC’s Humanitarian Law & Policy Blog, in a blog series on the same theme in the summer of 2021. ‘This is a great opportunity for students to share their views and thinking about such an important topic. At the ICRC, we know that there are many young people who care about the diverse challenges posed by new technologies and we look forward to learning from their contributions,’ said Dr Kubo Mačák, Legal Adviser at the ICRC. The deadline for submissions is Monday 31 May 2021. Competition rules and all further details of the call can be found here. After passing the first round and qualifying for the competition’s final stage, Helmer Jonelid and Edward Millet – enrolled in our LLM in International Humanitarian Law and Human Rights – participated in the final rounds of the Nelson Mandela Moot Court. These took place in Geneva from 18 to 21 July 2022. Half of the class of our LLM in International Humanitarian Law and Human Rights – 26 students – pleaded on 21 May at Villa Moynier on the 2008 South Ossetia armed conflict between Russia and Georgia. This short course, which can be followed in Geneva or online, discusses the extent to which states may limit and/or derogate from their international human rights obligations in order to prevent and counter-terrorism and thus protect persons under their jurisdiction. This short course, which can be followed in Geneva or online, analyses the main international and regional norms governing the international protection of refugees. It notably examines the sources of international refugee law, including the 1951 Geneva Convention Relating to the Status of Refugees, and their interaction with human rights law and international humanitarian law.
<urn:uuid:af3a7a3f-0976-4553-9924-11cc8d70e092>
CC-MAIN-2022-33
https://www.geneva-academy.ch/news/detail/431-student-essay-competition-avoiding-civilian-harm-during-military-cyber-operations
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00276.warc.gz
en
0.940689
644
1.796875
2
UK to provide anti-tank weapons to Ukraine Britain says it is supplying Ukraine with anti-tank weapons to help it defend itself from a potential invasion, during a stand-off with Russia which has massed troops near the Ukrainian border. Western countries say they fear Russia is preparing a pretext for a new assault on Ukraine, which it invaded in 2014. Moscow denies any plans for an attack, but has said it could take unspecified military action unless the West agrees to a list of demands, including banning Ukraine from ever joining NATO. Talks last week ended with no breakthrough. Kyiv has asked Western countries for arms to help it protect itself. "We have taken the decision to supply Ukraine with light anti-armour defensive weapon systems," British Defence Secretary Ben Wallace told parliament on Monday, saying the first systems were already delivered and a small number of British personnel would provide training for a short period of time. He did not specify the number or type of weapons that were being sent, but said: "They are not strategic weapons and pose no threat to Russia. They are to use in self-defence." "These are short-range .... but nevertheless it would make people pause and think what they were doing and if tanks were to roll into Ukraine, invade it, then they would be part of the defence mechanism." Wallace said he had invited Russian Defence Minister Sergei Shoigu to visit London in the next few weeks to discuss the crisis, though he did not know whether the Russians would accept. "The current gap is wide but not unbridgeable. I still remain hopefully that diplomacy will prevail. It is President (Vladimir) Putin's choice," Wallace said.
<urn:uuid:9d91a818-31db-4cd1-9e67-fe6b90dc524e>
CC-MAIN-2022-33
https://www.sheppnews.com.au/world/uk-to-provide-anti-tank-weapons-to-ukraine/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00472.warc.gz
en
0.981892
347
1.585938
2
Governing Law and Regulations New York Department of Environmental Conservation (DEC) Office of Air Resources, Climate Change, and Energy Division of Air Resources New York City Department of Environmental Protection (DEP) U.S. Environmental Protection Agency (EPA) Region 2 See ADDRESSES & CONTACTS for addresses and telephone numbers. See national section for basic information and federal regulations. Comparison: State vs. Federal • Rules. The federal rules for the management of chlorofluorocarbon (CFC), hydrochlorofluorocarbons, and other ozone depleting substances are effective in New York, although the state has not incorporated the rules into its own regulations. There are no state regulations pertaining to CFC management. See the national section CFC MANAGEMENT for more information. New York requires facilities that emit or have the potential to emit more than 100 tons of a regulated pollutant to submit an emissions statement to DEC. A regulated pollutant includes Class I and Class II ozone-depleting compounds. See the state section AIR EMISSIONS PERMITS for more information on emissions statements. • Administration and enforcement. EPA administers and enforces the CFC management requirements. DEC administers and enforces the state's air emissions regulations. New York City DEP works in conjunction with DEC to administer and enforce the state regulations within New York City. REFRIGERANT MANAGEMENT PROGRAM Sources that contain regulated refrigerants in quantities above the ...
<urn:uuid:de115211-c73f-4bca-a30a-7dc9619562dc>
CC-MAIN-2017-04
http://www.blr.com/Environmental/Air/Air-Ozone-Depleting-Substances-in-New-York
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00032-ip-10-171-10-70.ec2.internal.warc.gz
en
0.833995
308
2.203125
2
- The Star mini-submarine is a piece of technology in the Generation One continuity family. The Star mini-submarine is one of Wheeljack's pet projects, a submersible to allow even Transformers not equipped to function underwater to do so. The Star is kept offshore, and can be guided by remote control. The Star can comfortably fit two normal-sized Transformers. It has a lock to allow one to enter or exit underwater, lights for deep-submersion, radio communications, variable-frequency sonar and an advanced holographic mapping system. The Star is extremely quiet and difficult to detect unless it draws attention to itself. The Star is a prototype, not a production model. It's not shielded against high-frequency disruption, and its viewports are not built to withstand an impact. Find Your Fate JuniorEdit When Bumblebee was trapped on the bay's floor, Skids used the Star's onboard computer to translate the basic vocabulary of the nearby dolphins, asking them to rescue him. The sub went haywire under Frenzy's high-frequency assault. It either sank, or had its electronics fried by Skids.
<urn:uuid:c5356b61-9342-48a8-b331-bc93fa6c3a82>
CC-MAIN-2017-04
http://transformers.wikia.com/wiki/Star_mini-submarine
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00228-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938087
236
2.203125
2
According to the recent producer price index monthly update, which was published today, the PPI for finished goods rose by 1.1% in September compared with August’s index. This report serves as an indicator for the developments in the U.S core CPI to be published next week. This is the second month in row in which the PPI rose by a higher rate than 1% gain. Last month, the PPI rose by 1.7%. On an annual scale, the PPI rose by 2.1% during the past 12 months. During September, the food index edged up by 0.2%; further, the energy index hiked again by 4.7%. Thus, the main reason for the rise in PPI was mainly due to the hike in oil prices. On the other hand, the Producer Price index excluding food and energy remained unchanged during September 2012. This PPI ex food and energy is estimated to have a lagged negative linear correlation with gold price; i.e. as the PPI increases, gold price tends to fall the next day. On the other hand, the PPI excluding food and energy tends to have a positive linear correlation with silver price. These relations are mainly via the shifts in U.S dollar. If this relation will hold up in this month’s publication, this news isn’t likely to have a substantial effect on the prices of precious metals. Currently (as of 17:08 GMT), the prices of gold and silver are falling; the major stock indexes, such as Dow Jones and S&P500 are edging down; the Euro/USD is modestly rising. For more on this subject:
<urn:uuid:428e655a-5a35-42a3-bd29-694ffaba8795>
CC-MAIN-2017-04
http://www.tradingnrg.com/u-s-producer-price-index-rose-by-1-1-in-september-october-2012/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00549-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968324
346
1.507813
2
In order to further reduce the cost of laminate flooring to achieve the purpose of reducing the substrate density, wear-resistant layer of aluminum oxide to reduce means such as obsolete, and now some manufacturers have replaced formaldehyde glue trimeric clear plastic, sugar substitute Formaldehyde glue, these laminate flooring not only do not wear, and the layers and layers are not a bonding force, waterproof, anti-deformation ability to become weak, as well as printed with ordinary ink floor color, The result of the floor a few months on the discoloration, adhesive glue with a white latex instead of the D3 glue, the degree of adhesion decline, with a single layer of alternative double-layer, with sand added to the substrate to increase the substrate weight "," Strength "gives a feeling of high hardness. You have to ask how low the price of laminate flooring, depending on how high manufacturing methods, in short, no matter how low the price to sell, businesses also maintain adequate profits, and the lower the price of laminate flooring, the higher the profit margin. "Solid wood flooring prices have been relatively high, but now the price much more than we originally imagined." A pair of young unmarried couples from the floor after the store out, it is discouraged to say. Faced with changes in the market, in the Sun City and Yueyang Street, each with a floor dealership Mr. Feng has been depressed in recent days. Related links: how install wood plastic board
<urn:uuid:850e1a3f-8a2f-4985-9859-828c3e9f2c39>
CC-MAIN-2017-04
http://www.dotapod.com/forum/thread-27576-1-1.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00514-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950737
307
1.515625
2
Go to the main menu Skip to content Go to bottom REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS > Journal Vol & Issue Elastomers and Composites Journal Basic Information Journal DOI : The Rubber Society of Korea Editor in Chief : Volume & Issues Volume 34, Issue 5 - Dec 1999 Volume 34, Issue 4 - Oct 1999 Volume 34, Issue 3 - Jul 1999 Volume 34, Issue 2 - May 1999 Volume 34, Issue 1 - Mar 1999 Selecting the target year Functionally Graded Polyurethane Elastomers Prepared By Electrophoresis Zhang, Yuefan ; Shiiba, Tetsuro ; Furukawa, Mutsuhisa ; Elastomers and Composites, volume 34, issue 5, 1999, Pages 383~390 Functionally graded polyurethane elastomers PUEs/grad. Poly(dimethylammoninum ethylacrylate bromide)(PDMAEA) were prepared by the method of electrophoresis. Results of elemental analysis showed that concentration of PDMAEA had gradient across the thickness(2mm) of the base PUEs. The modified PUEs(PUEs/grad. PDMAEA) containing high concentration of PDMAEA displayed low degree of swelling in benzene which was poor solvent for PDMAEA, and high degree of swelling in water which was good solvent. For the each layer of modified PUEs, glass transition temperature, dynamic storage modulus were stooled by DSC, Rheovibron DDV-IIC dynamic viscoelastomer. The chemomechanical properties of modified PUEs was explored by the electric-stimulus. Effect of Plasticizers on Mechanical Properties of PVC Compounds Oh, D.H. ; Kim, D.J. ; Seo, K.H. ; Elastomers and Composites, volume 34, issue 5, 1999, Pages 391~398 Di-2-ethyl hexyl phthalate (DOP) and di-2-ethyl hexyl adiphate (DOA) were mixed with poly(vlnvl chlorides) [PVC] which have different degrees of polymerization (DP). Tensile strength, elongation, density, abrasion resistance, and hardness of these compounds were measured, High molecular weight PVC(DP 2500) was superior to that of DP 1300 for tensile strength, Hardness. But elongation and abrasion resistance of P1300 systems were better than those of P2500 systems. The densities of both systems were almost same. On the other hand, DOP Plasticized PVC was superior to DOA plasticized one for tensile strength, elongation, hardness. In cases of density, abrasion resistance, and flexual resistance, DOA systems were better than those of DOP systems. Synthesis and Emulsification of Polyurethane Anionomer Ann, Choun-Kee ; Jin, Je-Yong ; Lee, Gyung-Won ; Choi, Sei-Young ; Elastomers and Composites, volume 34, issue 5, 1999, Pages 399~406 Polyurethane (PU) prepolymers were synthesized from polytetramethylene ether glycol (PTMG), 4,4'-diphenylmethane diisocyanate (MDI), toluene 2,4-diisocyanate (TDI) and isophoron diisocyanate (IPDI). After chain extention using dimethyol propionic acid (DMPA), aqueous polyurethane anionomers were prepared from triethyl amine (TEA) as a neutralizer. The effect of the content of chain extender and the degree of neutralization on the state of emulsification, adhesive strength, viscosity, glass transition temperature and physical properties of emulsion cast film were investigated using UTM, Viscometer and DSC. EPDM Compounds for Electric Insulator Kim, In-H. ; Hwang, S.H. ; Kim, Jin-K. ; Elastomers and Composites, volume 34, issue 5, 1999, Pages 407~413 Non-ceramic composite insulator has been interested in the power industry because of its good characteristics in mechanical properties, mass product and design availability. Also it is lighter, and less unexplosive, compared to a ceramic insulator. Especially EPDM rubber composite insulator can be used for long-term in contaminated environments because of its hydrophobicity. This paper showed the rheological properties, the electrical properties, and contact angles to check the hydrophobicity and the recoverability of the EPDM compounds. Also, we investigated surface morphology of the compound by SEM. A Study on the Properties of Ethylene-Vinyl Acetate Emulsion Blended with SBR, Urethane and Epoxy Latex Choi, Sang-Goo ; Elastomers and Composites, volume 34, issue 5, 1999, Pages 414~422 SBR, polyurethane and epoxy latex were separately blended with ethylene-vinyl acetate(EVA) emulsion In . EVA emulsion was not reacted with latexes in liquid phase and mixtures had good stroage stability. The viscosity of cement mixtures was elevated to 20,000cps in hours by mixing. The mixtures mixed with pigment represented high viscosity and showed higher viscosity as time goes by. Mixtures had higher hardness with mixing SBR than mixing epoxy or urethane. The hardness was suddenly increased over cement content 30%. showed pencil hardness . The increase of hardness in high solids was depended upon not only the condensation of latexs but also the coagulation and adhesion of cement particle.
<urn:uuid:164ceb6a-648b-4706-bc28-93b355f11ac1>
CC-MAIN-2017-04
http://www.koreascience.or.kr/journal/JournalIssueList.jsp?kojic=HKGMCJ&volno=34&issno=5&cnov_no=&year_GB=1999
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00055-ip-10-171-10-70.ec2.internal.warc.gz
en
0.883706
1,248
1.679688
2
With health care in place, one of the most important things you do is get the most out of your health care coverage. Take care of your preventive services. Those are very key. Your vaccination, immunizations, stay on top of those. And also, get your preventive checkups to make sure that you can be alerted to the early signs of serious illnesses and chronic diseases. The sooner that you can find out about them, the faster that the care can start and the faster the rehabilitation. So make sure that you get the most out of your health care and stay on top of your preventive services. The information in this document is based on preliminary review of the national health care reform legislation and is not intended to impart legal advice. The federal government continues to issue guidance on how the provisions of national health reform should be interpreted and applied. The impact of these reforms on individual situations may vary. This overview is intended as an educational tool only and does not replace a more rigorous review of the law’s applicability to individual circumstances and attendant legal counsel and should not be relied upon as legal or compliance advice. As required by US Treasury Regulations, we also inform you that any tax information contained in this communication is not intended to be used and cannot be used by any taxpayer to avoid penalties under the Internal Revenue Code.
<urn:uuid:b197996f-a0f8-425b-9fba-54d6d47aedcb>
CC-MAIN-2017-04
http://www.bcbsm.com/index/health-insurance-101/selecting-right-plan/get-most-insurance/transcript.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00472-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946309
265
1.6875
2
An international conference spanning three days dedicated to the Khanate of Kokand concluded in Uzbekistan. The conference, entitled "The Role of the Kokand Khanate in the Development of Statehood and Cultural Heritage of the Turkic Peoples," was organized by the Organization of Turkic States (OTS) and Uzbekistan's Tourism and Cultural Heritage Ministry, in cooperation with various higher education institutions of Uzbekistan. The event was organized as part of the "Tabarruk Ziyarat" initiative put forward by Uzbek President Shavkat Mirziyoyev at the Turkistan Summit and in line with the announcement of Kokand as the Tourism Capital of the Turkic World. More than 100 participants, including scholars from universities, research institutes of the member and observer states as well as representatives of local academia, attended the event hosted by Kokand University. Speaking at the opening ceremony on June 8, Uzbek Deputy Prime Minister, Minister of Tourism and Cultural Heritage Aziz Abdukhakimov, underlined the importance of the conference for cultivating new impetus for scientific research on the unexplored aspects of the history of the statehood of the Turkic peoples. Also, for his part, Secretary General of the International Organization of Turkic Culture (TURKSOY) Sultan Raev said that the cultural values of the Khanate of Kokand and of similar ancient cities of the Turkic World, which are known for their rich history and culture, must be unveiled and widely introduced to the world through such conferences. Azimov Mirvokhid, deputy secretary general of the Organization of Turkic States, said the event would contribute to further expanding joint activities on researching and popularizing our common history and cultural legacy around the world, strengthening cultural and humanitarian ties, and deepening solidarity among the Turkic people. Please click to read our informative text prepared pursuant to the Law on the Protection of Personal Data No. 6698 and to get information about the cookies used on our website in accordance with the relevant legislation. 6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca hazırlanmış aydınlatma metnimizi okumak ve sitemizde ilgili mevzuata uygun olarak kullanılan çerezlerle ilgili bilgi almak için lütfen tıklayınız.
<urn:uuid:76422027-e2c6-4bd7-9eb5-ba9c56e25329>
CC-MAIN-2022-33
https://www.dailysabah.com/world/asia-pacific/uzbekistan-hosts-international-conference-on-central-asian-khanate/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00070.warc.gz
en
0.916182
508
1.882813
2
Write of Passage is a six-week educational program exploring the impact of American graffiti art on global culture. Curated by Sacha Jenkins, one of the premier voices in hip-hop and graffiti writing culture and editorial director of Mass Appeal, Write of Passage also incorporates an art exhibition, serving as the centerpiece to the educational program. Running October 19 - November 23, the exhibition will celebrate graffiti’s origins and influences, including rare canvasses, vintage apparel and over 100 original graffiti artifacts. The mix of subway artifacts, graffiti writer mementos, photography and groundbreaking artwork will be showcased alongside four interactive installation areas within the exhibition space. Among the artists with works in the exhibition are Daze and Futura, Haze, who will show rare early sketches, David "Chino" Villorente, Alan Bortman, Chris Pape, Easy, Miss 17, Freedom, Cycle, Fargo, Greg "SP" Lamarche, Krink, Mare 139, Cost, CES, Jay "J.SON" Edlin, Keo, Mark Ali Awfe, False, Tommy Rebel, A-ONE, Dondi White, Serve, Ed "Metal Man" Walker, Kaves, Trap IF, False, VFR, , Cope 2, Daze, Harley Spiller, Haze, Henry Chalfant, Louie KR.ONE Gasparro, YES 2, Samuel Kleiman, Sharp, Todd "Reas" James, Wayne COD, and more. Write of Passage will be open to the public every Saturday from 1-5 p.m. during the run of the program, at 218 W. 18th St., New York, NY. Follow Red Bull on Twitter for more updates.
<urn:uuid:7e49e294-6c81-4215-babe-b0cef73c9e42>
CC-MAIN-2017-04
http://www.redbull.com/us/en/music/stories/1331615215174/graffiti-legends-to-takeover-red-bull-studios-nyc
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00184-ip-10-171-10-70.ec2.internal.warc.gz
en
0.885161
354
1.5
2
Prisoners of War in the farm field, Houlton, 1945 Contributed by Aroostook County Historical and Art Museum Camp Houlton was established in 1944 for the internment of prisoners of war to provide laborers for local farms to harvest peas, pick potatoes and other work. The prisoners were paid a dollar a day in scrip that they could spend at the post exchange, the base store, for toiletries, tobacco, chocolate, and even beer. Not all POWs were allowed to work on the farms for security reasons. Many farmers came to see the POWs who worked their fields as good laborers rather than enemy soldiers. In this picture, the POW farm workers are posing for the picture with the farmer's wife. Pictures of POWs are unusual because photographing POWs was not allowed. - Title: Prisoners of War in the farm field, Houlton, 1945 - Creation Date: 1945 - Subject Date: 1945 - Town: Houlton - County: Aroostook - State: ME - Media: monochrome photograph - Dimensions (cm): 6.5 x 10.5 - Collection: Catherine Bell Collection - Object Type: Image For more information about this item, contact: Cross Reference Searches LC Subject Headings Please post your comment below to share with others. If you'd like to privately share a comment or correction with MMN staff, please use this form.
<urn:uuid:5d52d63c-64c9-4d46-9f8a-05c23c168836>
CC-MAIN-2016-44
http://www.mainememory.net/artifact/13568
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00045-ip-10-171-6-4.ec2.internal.warc.gz
en
0.930383
306
3.3125
3
Ockam at Oktane 2021 - A builders guide to Trust. Matthew Gregory CEO Enterprises need to be able to trust the data that flows through their business operations. What happens when that data is generated at the edge, in IoT, or connected devices that live outside of the data center? How should you think about trust as your business processes move out to the edge? More so: how difficult will it be to build and operate this new generation of applications? Enjoy this builders guide to Trust in autonomous connected applications. We'll show how cloud services can establish lightweight secure channels with IoT and edge devices that guarantee end-to-end data integrity, authenticity, and authorization. This demo will show how a fleet of machines can be enrolled with cloud services and how applications can exchange attribute based cryptographic credentials to ensure granular, dynamic, policy driven access control. This blog and video is a reproduction from Okta's Oktane 2021 conference.
<urn:uuid:cf539620-0531-4329-98ba-985819be2ba7>
CC-MAIN-2022-33
https://www.ockam.io/blog/oktane_2021_trust
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00671.warc.gz
en
0.927894
202
1.609375
2
|2020ok Directory of FREE Online Books and FREE eBooks| The Cia And The U-2 Program, 1954-1974 by Gregory W. Pedlow And Donald E. Welzenbach (Respecting the intellectual property of others is utmost important to us, we make every effort to make sure we only link to legitimate sites, such as those sites owned by authors and publishers. If you have any questions about these links, please contact us.) A comprehensive & authoritative history of the CIA's manned overhead reconnaissance program (MORP), which from 1954 to 1974 developed & operated 2 extraordinary aircraft, the U-2 & the A-12 OXCART. Describes not only the program's technological & bureaucratic aspects, but also its political & international context. The MORP, along with other overhead systems that emerged from it, changed the CIA's work & structure in ways that were both revolutionary & permanent. The formation of the Directorate of S&T in the 1960s, principally to develop & direct reconnaissance programs, is the most obvious legacy of the events in this study. Related Free eBooks
<urn:uuid:a0615446-be43-4ebd-8f3e-d6abd8907374>
CC-MAIN-2017-04
http://2020ok.com/books/82/the-cia-and-the-u-2-program-1954-1974-20682.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00426-ip-10-171-10-70.ec2.internal.warc.gz
en
0.917874
227
2.5625
3
U.S. banks suffer 149 percent rise in bad loans New data on each of 8,000 banks show the breadth of recession’s impact [WHEN WILL THEY LEARN – A BAD CREDIT RISK IS A BAD RISK FOR A REASON] While a large majority of banks were still healthy, 163 ended the year with more troubled loans than capital, up from only 13 a year earlier, according to the analysis of data from the Federal Deposit Insurance Corp. by msnbc.com and the Investigative Reporting Workshop at American University in Washington, D.C. Nationwide, seven out of every 10 banks were less well prepared to withstand their potential loan losses than a year earlier. The analysis relies on information reported quarterly to the FDIC, calculating each bank’s troubled asset ratio, which compares troubled loans against the bank’s capital and loan loss reserves. Although attention has focused on the largest banks, which hold the lion’s share of deposits, the analysis shows how widespread the problems in the banking industry became in 2008 as the mortgage meltdown and broader recession unfolded. Msnbc.com is publishing information on the nation’s 400 largest banks as well as all banks with high ratios of troubled loans at year’s end. And the American University group has created a new Web site, BankTracker, to provide information on the financial health of every bank in the country. The American Bankers Association opposes the publishing of such figures for mainstream consumption. It said that no single figure can capture the complexity of the rapidly changing financial situation at an individual bank, and that the public may not be prepared to handle that information. “Frankly, you could cause a run on a bank unnecessarily,” said John Hall, ABA spokesman. “By widely publicizing this ratio, while the analyst community often uses it, when it’s put in the general public’s hands often they get confused and don’t understand that this doesn’t necessarily mean the bank can’t come back. ‘People may not understand the context’ The ABA’s chief economist, James Chessen, agreed, saying, “In this environment where confidence has been shaken, it’s easy to play into those kinds of fears, where people may not understand the context.” But a representative of the Independent Community Bankers of America, which represents 5,000 mostly smaller banks, said he didn’t oppose the publishing of such figures. “As far as caring about the health of your institution, or the institution you do business with, I think it’s prudent for any consumer to have a basic understanding of how the bank is doing. Banks are required to report their statement of condition on a quarterly basis. People just have to understand that it’s only a snapshot in time, and literally the day after that snapshot was taken, conditions could change positively or negatively.” This troubled asset ratio isn’t a predictor of the future. It doesn’t show “who’s next to fail.” Bankers and regulators point out that some unhealthy banks have quietly gotten healthier, through state or federal supervision, better management, injections of additional capital, or because borrowers who were behind have been able to get current on their payments. Although the FDIC keeps a “troubled bank list,” it does not make that list public, for fear of starting a panic among customers. The numbers don’t reveal certain exotic troubled assets that have contributed to the problems at the larger banks, such as mortgage-backed securities and collateralized debt obligations, meaning the ratios may underestimate the size of the problem at certain banks. But like a high cholesterol level, it and similar ratios have been commonly used by regulators and analysts as one indicator of banks in need of closer scrutiny. It offers insight into a major problem that more banks are facing: the general risk of the deepening recession, combined with risky lending by certain banks. ‘Horrendous decisions’ [Many mandated by Congress or under threat of lawsuit] Fine, of the community bankers association, said he expects about 120 banks to fail this year. Over two years, that would make about 150, far below the more than 2,500 that failed in the agriculture lending shock of 1984-1992. The community bankers have tended to portray the banking problems as isolated among the big banks, with their creation and use of mortgage-backed securities and other non-traditional instruments. [A very accurate protrayal – ask your local community banker – while your at it ask him how he fees about the Government charging his “safe” bank higher FDIC fees – which she/he must pass on to his customers to pay for the mistakes made in Congress and on Wall Street] The small banks have an advertising campaign, comparing Wall Street’s recklessness with Main Street’s quiet conservatism. As Fine says, “We’re getting hit by the shrapnel of the explosions on Wall Street. That’s wounding some of the banks and killing some of the others.” “You’ve got good bankers and you’ve got bankers doing not so good. Was there a percentage of banks that got caught up in the go-go hysteria? I’m sure there was. You had bankers who made horrendous decisions in community banks, and we’ve seen what the management of the larger banks did, which is a train wreck. But the vast majority of the 8,000, well into the 90th percentile, are doing well, or are victims of the general economic funk we’re in, or happen to be in an area where the economy went to hell in a hand basket. “When I look at the banks closed by the FDIC, about half of those that have failed would have failed in a very mild recession, because they just weren’t very well run banks,” Fine said. “They were barely hanging on anyway.” What’s the trend? There was a significant deterioration in 2008 in the ability of banks to withstand potential losses from troubled loans. If a ratio of 100 is a sign of severe stress, then an additional 150 banks moved past that level in 2008, for a total of 163. That’s 2 percent of the nation’s banks. Some analysts have said that any ratio over 20 percent is an early warning sign. An additional 1,349 banks moved past that level, for a total of 2,308. That’s 28 percent of the nation’s banks. Most banks still have relatively low levels of troubled loans. But there was a doubling of the median troubled asset ratio for all banks in the U.S., to 9.87 from 4.94 a year earlier. For banks with two years of data, the total of troubled assets rose to $235.29 billion at the end of 2008. A year earlier, for the same banks, it was $94.62 billion. That’s an increase of 149 percent. Out of 8,198 banks for which we have two years of data, 5,784 — or 71 percent — had a higher troubled asset ratio at the end of 2008 than a year earlier. Only 1,974 banks, or 24 percent, showed improvement over the period. And 440 banks, or 5 percent, stayed the same. The picture was worse for the largest 100 banks: 90 showed declining strength. Only seven improved, and one maintained the same ratio. (Two did not report data that could be compared: IndyMac Bank failed in July 2008 and was opened by the FDIC under a new name, IndyMac Federal Bank. Bank of China, in New York, did not report capital and reserves.) The largest bank with a ratio over 100 is AmTrust Bank of Cleveland, which had a ratio of 130 at year end, or 30 percent more troubled loans than capital and reserves. AmTrust missed a year-end deadline set by its regulator to raise more capital. A spokeswoman, Donna Winfield said Monday in an e-mail, “We have, as previously reported, developed a comprehensive risk-reduction strategic plan that is designed to assure our long-term viability. We have every confidence that we can implement this plan successfully. In addition we are looking at opportunities to raise capital through actions such as our recent agreement to sell our Columbus branches.” Who calculated the ratio? Wendell Cochran, senior editor of the Investigative Reporting Workshop, devised the ratio. A former business reporter for the Kansas City Star, the Des Moines Register and Gannett News Service, Cochran may have been the first journalist to create this measure of bank health. He did that while covering banking for the Des Moines Register in the early 1980s. Later, at Gannett News Service, he was involved in projects published at USA Today and elsewhere that calculated this ratio for every bank and savings and loan in the nation. Cochran now teaches journalism at American University. Others do similar calculations. The most widely used is the so-called Texas Ratio, created during the 1980s by a banking consultant. You can find various formulas for calculating a Texas Ratio, but they are all attempts to measure a bank’s ability to cover potential losses. READ ABOUT THE NEW “MORTAGE CRISIS” – “New” Mortgage Defaults at record levels – “Modified” Mortgage Defaults at record levels.
<urn:uuid:3938a3e9-9b41-40e5-b2c7-973250d7b5fe>
CC-MAIN-2017-04
https://mcauleysworld.wordpress.com/2009/03/17/economic-recovery-us-banks-suffer-149-percent-rise-in-bad-loans-how-is-your-bank-doing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00390-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959484
1,984
1.75
2
“The Origins of Abstraction,” the current exhibit at the Carnegie Gallery, presents a wide array of abstract works from local artists with a singular goal. “[‘The Origins of Abstraction’ is designed] to be an education on what abstract art is. So we decided to do the origins of what [artists] can abstract from,” said Peggy Mintun, who co-organized the exhibit with gallery director Stephanie Rond. “We wanted to give people the idea that’s it not just putting paint on canvas; I don’t know where this is going to go.” Mintun, whose “Broken Butterfly” oil painting is featured in the exhibit, said abstraction can form organically during the process of creation, but often the artist sets out with a foundation. It’s the reason the exhibit’s call for artists asked for participants to enter works with “a definitive source of abstraction.” Nature, emotion, architecture, gender and technology are just some of the sources artists examined for the exhibit. The collection of works — juried by Elsie Sanchez and Barbara Vogel — features many individually strong pieces by a number of accomplished artists, including former CCAD president Dennison Griffith and Kaveri Raina, who was awarded GCAC residencies in Dresden this year. The best representations of thoughtful abstraction were selected from more than 150 submissions by 68 artists. “I’ve been involved in juried shows and abstract shows, but I’ve never seen so many entries. We wanted to be very selective of what we put in the show and to have a variety of different mediums,” Mintun said of the two-dimensional, ceramic, sculpture, mixed media and photography pieces in “Origins.” Also important was the placement of the individual works in relation to other adjacent ones within the gallery, which is located inside the Columbus Metropolitan Library’s main branch downtown. Some are situated as groupings to flow together, either aesthetically or conceptually, while others act as juxtaposition. Mintun wants viewers to recognize the most important relationship each work in “Origins” has with abstract art as a process. “I want people to take away that there’s a lot more consideration and knowledge that’s put into it,” Mintun said.
<urn:uuid:27adcb52-844b-4761-8a00-99adeefe95ea>
CC-MAIN-2017-04
http://www.columbusalive.com/content/stories/2014/08/14/exhibit-preview-the-origins-of-abstraction-offers-insight-into-the-method.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00276-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971025
504
1.84375
2
Schools get a rocket for ducking targets Douglas Osler pointedly underlined the important role local government can play in raising attainment at a time when councils are becoming nervous over Labour's plans to subject education services to HMI scrutiny, and when there is increasing uncertainty over their place under a Scottish parliament. Following last week's HMI review of the way Standard grade and Higher targets are managed, Mr Osler told The TES Scotland: "Where authorities showed considerable commitment and gave strong leadership, engaging schools in a constructive approach, targets were set which were realistic and challenging. "Where there was a lack of commitment and leadership, considerable autonomy was given to schools and they used that autonomy to lower targets by more than the agreed one per cent flexibility. "That is very worrying because it means the challenge for pupils has been lowered. But it also underlines the important role that education authorities can play, with their schools, in raising attainment." HMI considers that 13 authorities either did not use the leeway of "exceptional circumstances" allowed to vary targets or used them sparingly, a further 13 were found to have broadly acceptable targets although some unacceptable exceptions were claimed, and six set targets which were based on "invalid" circumstances. There are to be no recriminations, however, and schools will not be ordered to increase their targets following the agreement on flexibility hammered out in bumpy negotiations last year between directors of education and Brian Wilson, the previous Education Minister, to give schools "a sense of ownership". But the worst offenders will be expected to exceed, not just meet, their targets. In addition, HMI will henceforth pronounce on the appropriateness of targets when inspectors report on schools. Mr Osler has now sent a letter to the three groups of authorities explaining the findings. The investigation was ordered last September after the Education Minister expressed concern at the approach of some authorities. "The process must be as rigorous as possible," Helen Liddell said then. But, with an election looming, Mrs Liddell may have decided that high-profile intervention at this time might not be advisable. This was reflected in her reaction to the 5-14 targets. Although most will be wide of the mark by 2001, she opted for the relaxed comment that "schools are taking the first important steps to improvement". Criticism of failure by some schools to set realistic targets was therefore left to Mr Osler. Exceptional circumstances are defined as situations affecting one school but unlikely to affect another, such as the recent Glasgow closures and mergers or a fire. In such cases, targets can be decreased by more than 1 per cent. Among unacceptable excuses that were used to lower targets schools claimed there was no tradition of pupils achieving five or more Highers, blamed disruption caused by building work, said an excess of boys in a year was likely to drag down performance, or cited a new headteacher or too many probationers. These excuses are "unacceptable and frankly absurd", Mr Osler said. The Inspectorate's report found "concern that more demanding targets were potentially demotivating and carried the risk of adverse impact on the school's reputation if they were not met". HMI was more impressed by authorities and schools that "adopted a stronger approach in the belief that they should commit themselves to 'having a go' - even when the challenge seemed tough - and that no stigma would attach to missing the target in such circumstances". Despite specific reservations, however, the general conclusion by HMI is that "a good start to setting targets has been made".
<urn:uuid:0d0bab47-4cc7-47c7-b536-e7e02e41b5ce>
CC-MAIN-2016-44
https://www.tes.com/news/tes-archive/tes-publication/schools-get-a-rocket-ducking-targets
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00054-ip-10-171-6-4.ec2.internal.warc.gz
en
0.978644
735
1.78125
2
Save our rhinos for people in the future No kid has the right to lose a mother or father very early on, and no child rhino has the right to go through a similar misfortune. This was the feeling which Petronel Nieuwoudt, proprietor of Care for Wild Africa, blended among the 87 Gr. 5 students at Fairview Primary School in Barberton on Friday. World Rhino Day occurred last week Thursday. Care for Wild Africa, a safe-haven for stranded creatures, for example, rhinos, related to Kishugu, began a mindfulness drive among schools in the territory. Fairview Primary was the first of many schools in the territory to find out about the different dangers, which imperil our rhinos. "Kishugu's ethos is to have an effect and our trademark, for everyone's benefit, wins in all that we do. We put stock in teaching and supporting our networks. Kishugu, through Working on Fire, saves lives, the climate and property and hence by supporting Care for Wild Africa, we satisfy that commitment," expressed Kishugu's CEO, Chris de Bruno Austin. Care for Wild Africa has serious areas of strength for an against poaching, and the impact it has on stranded rhinos. "We perceive the significance of making mindfulness around the poaching plague," Petronel expressed. "Undesirable fierce blazes likewise represent a danger to creatures and rhinos. Particularly on the grounds that the Lowveld is in such nearness to the Kruger National Park and other game stores," said Naranda Leeuwner, Head of Corporate Communication at Kishugu. "Youngsters should know that by lighting fires (whether for the purpose of cooking or other fire related exercises) can make shocking impacts. By knowing the different fire risks, networks can help with disposing of the deficiency of lives, creatures and property, by simply being fire cognizant. "The present kids are the upcoming pioneers and hence we need to motivate them to really focus on themselves as well as other people, yet additionally nature. They need to figure out how to safeguard their own legacy, and rhinos have a major influence of it. We are special to in any case see rhinos in the wild today, and our people in the future merit a similar honor." Petronel finished up.Save our rhinos for people in the future. Content created and supplied by: WorldNews24/7 (via Opera News ) Opera News is a free to use platform and the views and opinions expressed herein are solely those of the author and do not represent, reflect or express the views of Opera News. Any/all written content and images displayed are provided by the blogger/author, appear herein as submitted by the blogger/author and are unedited by Opera News. Opera News does not consent to nor does it condone the posting of any content that violates the rights (including the copyrights) of any third party, nor content that may malign, inter alia, any religion, ethnic group, organization, gender, company, or individual. Opera News furthermore does not condone the use of our platform for the purposes encouraging/endorsing hate speech, violation of human rights and/or utterances of a defamatory nature. If the content contained herein violates any of your rights, including those of copyright, and/or violates any the above mentioned factors, you are requested to immediately notify us using via the following email address operanews-external(at)opera.com and/or report the article using the available reporting functionality built into our Platform See More
<urn:uuid:78f282d3-d27f-47eb-9871-c64776e43ccc>
CC-MAIN-2022-33
https://za.opera.news/za/en/others/c1bf659e787157a7137e72d6591effb9
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00672.warc.gz
en
0.944065
757
2.40625
2
Discussion in 'RC General & Getting Started' started by monsterrcbuilder04, Apr 3, 2004. a gas motor is a 4 stroke and a nitro is 2 stroke i thought you can get a 2 or 4 stroke in both. they have 2 stroke gas motors. a weed wacker is a 2 stroke Gas ,diesel engines use pistons and rings that is the big differents, we use a piston that slides up an down on a tappered sleeve. Separate names with a comma.
<urn:uuid:bbed5960-f521-4d41-b920-3da7757dbf5e>
CC-MAIN-2016-44
http://zealot.com/threads/engine.6156/page-2
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00056-ip-10-171-6-4.ec2.internal.warc.gz
en
0.908798
107
1.617188
2
Sets of letters and symbols for making boards for communicating face-to-face. External memory units, modems, adapters and cables, CD and DVD drives and networking devices etc. Accessories for devices for notifying or reminding a person about people, important activities or events of daily life. Writing based communication devices with a standard keyboard. Features screen output, speech output or printed output. Devices for heating the body or an area of the body for therapeutic purposes; Included are, e.g., IR lamps and preheated cushions Body-worn watches with speech, sound or vibration. They can announce the time and can have alarm or reminder functions. Included are watches with visual display or tactile dashes and hands in combination with auditiv or vibrating reminder functions. Devices for slowing down or stopping a wheelchair or holding it in a fixed position Software designed to help users to manage daily life. Included are also software or equipment for mobile phones, paging receivers etc. Devises to show the remaining time, e.g. timers and hourglasses. Electronic devices showing the year, month, week, day, and time.
<urn:uuid:e1e96fd2-66a7-4e9a-b609-82d6f79969b1>
CC-MAIN-2017-04
http://www.hmi-basen.dk/en/r10x.asp?linkinfo=55324
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00390-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908074
240
2.078125
2
You’ve probably heard the saying that “cash is king,” and whether you own a business or not, it is a truth that applies. Most discussions of business and personal “financial planning” involve tomorrow’s goals, but those goals may not be realized without attention to cash flow today. Management of available cash flow is a key in any kind of financial planning. Ignore it, and you may inadvertently sabotage your efforts to grow your company or build personal wealth. Cash flow statements are important for any small business. They can reveal so much to the owner or CFO, because as they track inflows and outflows, they bring non-cash items and expenditures to light. They denote your sources and uses of cash, per month and per year. Income statements and profit and loss statements (P&L) may provide inadequate clues about that, even though they help you forecast cash flow trends. Cash flow statements can tell you what P&L statements won’t. Are you profitable, but cash-poor? If your company is growing by leaps and bounds, that can happen. Are you personally taking too much cash out of the business and unintentionally letting your growth company morph into a lifestyle company? Are your receivables getting out of hand? Is inventory growth a concern? If you’ve arranged a loan, how much is your principal payment each month and to what degree is that eating up cash in your business? How much money are you spending on capital equipment? A good cash flow statement tracks your operating, investing and financing activities. Hopefully, the sum of these activities results in a positive number at the bottom of the cash flow statement. If not, the business may need to change to survive. In what ways can a small business improve cash flow management? There are some fairly simple ways to do it, and your cash flow statement can typically identify the factors that may be sapping your cash flow. You may find that your suppliers or vendors are too costly; maybe you can negotiate (or even barter) with them. Like many companies, you may find your cash flow surges during some quarters or seasons of the year and wanes during others. What steps could you take to improve it outside of the peak season or quarter? What kind of recurring, predictable sales can your business generate? You might want to work on the art of continuity sales — turning your customers into something like subscribers to your services. Perhaps price points need adjusting. As for lingering receivables, swiftly preparing and delivering invoices tends to speed up cash collection. Another way to get clients to pay faster: offer a slight discount if they pay up, say, within a week (and/or a slight penalty to those who don’t). Think about asking for some cash up front, before you go to work for a client or customer (if you don’t do this already). While the Small Business Association states that only about 10 percent of entrepreneurs draw entirely on their credit cards for startup capital, there is still a temptation for an owner of a new venture to go out and get a high-limit business credit card. It might be better to shop for one with cash back possibilities or business rewards in mind. If your business isn’t set up to receive credit card payments, consider it — the potential for added cash flow could render the processing fees utterly trivial.1 How can a household better its cash flow? One quick way to do it is to lessen or reduce your fixed expenses, specifically loan and rent payments. Another step is to impose a ceiling on your variable expenses (ranging from food to entertainment), and you may also save some money in separating some or all those expenses from credit card use. Refinancing — if you can do it — and downsizing can certainly help. There are many, many free cash flow statement tools online where you can track family inflows and outflows. (Your outflows may include bugaboos like long-term service contracts and installment payment plans.) Selling things you don’t want can make you money in the short term; converting a hobby into an income source or business venture could help in the long term. Better cash flow boosts your potential to reach your financial goals. A positive cash flow can contribute to investment, compounding, savings — all the good things that tend to happen when you pay yourself first. Todd Kockelman, Retirement Income Certified Professional, is a registered representative with Packerland Brokerage Services Inc. and may be reached at 651-204-0655 or [email protected] 1 – mallbusinesscomputing.com/tipsforsmallbusiness/5-tips-for-a-smoother-small-business-cash-flow.html [11/19/12]
<urn:uuid:f0a57083-1fb5-4992-838f-4473db32b99d>
CC-MAIN-2017-04
http://stillwatergazette.com/2013/11/01/column-underappreciated-fundamental-cash-flow/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00349-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948229
984
1.96875
2
I got a propane hand torch today at Walmart to use for some minor plumbing work. It worked for a little but now it won't light. It's one of those self lighting ones. I tried using another fire source (a match) and it won't hold a flame. The propane will ignite but it won't stay lit if I take away the match. Anyone got any suggestions? My hand torch won't light? - Yahoo! Answers: On Free Chat Line My Propane Torch Won't Light | eHow UK: Instant Approval. My Butane Lighter Won't Light | eHow: I got a propane hand torch today at Walmart to use for some minor plumbing work. It worked for a little but now it won't light. It's one of those self My Lighter Hisses But Won’t Light - BuyLighters.com: My Propane Torch Won't Light. Propane torches are most commonly used to weld or solder metal objects together (such as metal pipes). If your current propane torch is Tiki Torches Won’t Light | Tiki Torches | Outdoor: My Propane Torch Won't Light; X. Must See: Slide Shows. Test out your lighter before holding it up to the propane How to Light Bernzomatic Torches. Propane torch problem - YotaTech Forums: My Lighter Hisses But Won’t Light: Black Ops Kilo Triple Flame Torch Lighter W/Built in Punch Cutter: Colibri Butane 3 Fluid Oz Can (Continental US Only) Screen won't turn on - BlackBerry Forums at: I've posted an update to this issue in a new post covering another reason your torches might not light. You can read it at: My Outdoor Torches STILL Won't ANE BRUN - THE LIGHT FROM ONE LYRICS: The igniter on my propane torch doesn't seem to be igniting the propane i'm feeding it. but it still won't ignite the propane. while you try to light it, My Outdoor Torches STILL Won’t Light! | Tiki Torches: BlackBerry Torch 9800; Screen won't turn on; If you press on the lower left hand corner, I dropped my Torch and I think I caused some problems with one of Propane "bottle" torch won't stay lit -: I am holding your torch I won't hold it no more You can have it, take it, The light from one I'll need both my hands to hold my own I need only one light
<urn:uuid:f4f8dd66-0d7a-44c8-9dbe-e25b6cfd53df>
CC-MAIN-2017-04
http://homemaking.authpad.com/my-hand-torch-won-t-light
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00128-ip-10-171-10-70.ec2.internal.warc.gz
en
0.881017
536
1.546875
2
July 9 — SPRINGFIELD — The Illinois State Board of Education (ISBE) has distributed fiscal 2022 school maintenance grants totaling $30 million in state funds to more than 600 eligible applicants. Local schools receiving funding: $50,000 each to Rossville-Alvin CUSD 7, Oakwood CUSD 76, Salt Fork CUSD 512, and Vermilion Association for Special Education; and Westville CUSD 2 received $48,819. The grantees will use the money to improve and maintain educational infrastructure throughout the state of Illinois. The School Maintenance Grant Program is a dollar-for-dollar matching government grant open to school districts, cooperative high schools, vocational centers and special education cooperatives. Eligible applicants can receive up to $50,000 to use toward completing proposed maintenance projects. “By investing in our educational infrastructure, we are helping Illinois students thrive,” said Gov. JB Pritzker. “Our state’s youth spend much of their days inside school buildings. It is our duty to ensure that these facilities are safe, clean, well lit and adequately ventilated. With this funding, our children will learn and grow in sustainable and healthy environments – as they deserve.” “Every single Illinois student deserves access to safe and healthy facilities that support their well-being and academic growth,” said State Superintendent of Education Dr. Carmen I. Ayala. “School districts across the state have significant facility needs. We have learned from the pandemic the importance of ventilation to prevent the spread of disease. These grants can help schools make the necessary upgrades to make buildings safer, healthier and more energy efficient, saving taxpayers’ money in the long run. We are grateful to the General Assembly and the Governor for funding these extremely important school maintenance grants.” To be eligible for school maintenance grants, applicants must be able to raise all awarded government funds and commit to completing proposed projects within two years of the distribution of funding. Funds must be used exclusively for the upkeep or maintenance of educational buildings, but applicants are free to submit projects that include multiple types of work for a single building or a single type of improvement for multiple buildings. There is compelling evidence that quality infrastructure enables better teaching, improves educational outcomes and protects student health. Simple improvements like better lighting, improved ventilation, updated heating and cooling, and better accessibility can help keep students happy, healthy, and engaged. School maintenance grants are awarded in order of five priorities: emergency projects made necessary by a disaster; health/life safety projects to remodel or improve an existing structure; government priority projects needed to conserve energy or improve the care of students in an area where the applicant receives Illinois School Code funding; permanent improvement projects to modernize building systems (e.g. HVAC, plumbing); and other.
<urn:uuid:def678a8-7c6a-4fe0-a9fc-5565311aa0e7>
CC-MAIN-2022-33
https://medieco.info/schools-receive-subsistence-allowances/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00474.warc.gz
en
0.939804
577
1.640625
2
Blasphemous Soccer Balls The U.S. military in Afghanistan expressed regret for a publicity campaign aimed at winning hearts and minds that ended up offending scores of Muslims. U.S. troops on Friday dropped dozens of free soccer balls for Afghan children from helicopters in an area of southeastern Afghanistan, all marked with flags of various countries. A problem arose in that the balls depicted the Saudi Arabian flag, which features the Islamic declaration of faith and includes the names of Allah and the prophet Mohammed. The idea of kicking something bearing their names is considered deeply offensive to Muslims. “This ball … carries a message with it which, like an atom bomb, can cause carnage and insecurity in all parts of Afghanistan,” said a leading Afghan private daily Cheragh. Fawad Ahmad, a shopkeeper in Kabul, said: “Americans themselves create insecurity by ignoring religious sensitivity, it is against Islam.” A spokeswoman for the U.S. military in Afghanistan said the ball distribution was part of a “goodwill humanitarian aid mission … for the enjoyment of Afghan children.” Captain Vanessa Bowman said the military had been unaware of the sensitivity of the issue. “We do regret any disturbances caused,” she said. This begs the question, what doesn’t offend Islam? Simply existing as a non-Muslim offends Islam, so how can you win? Retrieve the soccer balls and give them to children who will appreciate them. Israeli children come to mind. I suppose all you can do now is file this one under no good deed goes unpunished and call it a day.
<urn:uuid:f69ad00f-af5c-4a23-9d95-1aa1ee10197f>
CC-MAIN-2017-04
https://lordcrimson.wordpress.com/2007/08/27/blasphemous-soccer-balls/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00575-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94793
331
1.570313
2
Even though university foundations are private, they’re typically expected to communicate clearly with universities, said Merrill P. Schwartz, vice president for AGB Consulting. But that communication doesn’t always mean talking directly to faculty members or students. “Having good communication between foundations and universities and reporting on how funds are used is important and expected,” Schwartz said. “The communication is usually quite good, but it might not be with a student or faculty member.” "Colorado is rare in electing regents to oversee its university system, a practice that is more common for community colleges. Just three other states--Michigan, Nebraska and Nevada--elect regents to exercise control over at least some of their universities, according to the Association of Governing Boards of Universities and Colleges." There are lessons in this for policymakers across the country. The implicit dichotomy between a humanizing education and a lucrative one is false. Employers consistently say they seek graduates who can think independently and analytically. Students learn to do so by means of technical skills, of course — which public universities teach — but also by learning the great and timeless ideas an education at a Public Ivy conveys. Some cautioned against setting overly restrictive standards for what outside work is and is not considered beneficial to the institution, however. Merrill Schwartz, vice president for AGB Consulting, said overly bureaucratic standards should be avoided. “These are professional, grown people with good judgment, and they will come up with a standard for whether this is in the interest of the institution or not,” Schwartz said. “Institution leaders should be thinking carefully about all these issues, reviewing and developing policies, and preparing to articulate how endowment management practices and policies advance institutional missions and purposes,” says David Bass, director of foundation programs and research at the Association of Governing Boards of Universities and Colleges.
<urn:uuid:9b45b3f9-f9cd-438e-9b53-da3318924028>
CC-MAIN-2016-44
http://agb.org/news
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00240-ip-10-171-6-4.ec2.internal.warc.gz
en
0.957753
384
1.765625
2
Research issued: 10/09/2019 Bedford Borough Council and SCAPE have worked closely together since 2012 to address the growing need for school places across the borough, culminating in the conversion of the borough’s education system from three to two-tiers. ‘Better learning’ is our new report that details the success of this ongoing collaboration and the results we have achieved together. The document also showcases the journey, the scale of the programme, case studies and the fantastic outcomes achieved through adopting modern methods of construction. The Bedford story; Between 2011 – 2017, the population of Bedford borough grew by 7.9%*, creating an unprecedented demand for schools, housing and community facilities. At this time, Bedford borough’s school estate was littered with temporary and inadequate classrooms and so they turned to SCAPE to help address this situation. Working closely with SCAPE, Bedford were able to work with an experienced team who are experts in public buildings and specialists in educational design. The teams worked with project planners to identify which schools were at most in need of new classrooms and provide appropriate solutions that, not only met each school’s brief, but also allocated budget. This collaboration enabled savings of £35m based on projected costs. As a result of the involvement in the extensive temporary classroom replacement programme, SCAPE was selected to undertake feasibility studies at 40 schools across the borough in 2015. The teams were tasked to determine each lower, middle and upper school’s requirements to convert to either a primary or secondary school. From this, they were directly appointed to lead the design for each of the projects that arose for the three to two-tier conversion programme. Big challenges demand bold, robust responses. That’s what our SCAPE Bedford programme has delivered to meet the challenge of a growing population, new and growing communities and rising numbers of schoolchildren overall. Mayor Dave Hodgson, Bedford Borough Council After five years of hard work with school education at the heart of the agenda, Bedford Borough Council can now celebrate an expansive school building programme that has ensured the borough’s local schools can serve their communities through accessible, superior and engaging teaching and learning environments, inspiring to both pupils and staff. The collaborative approach has resulted in 343 new or refurbished classrooms, accommodating more than 9,200 pupils and increasing the percentage of primary school pupils being allocated their first-choice school from 92.3% in 2014 to 95.7% in 2018**. - 97% SME engagement - 99% Waste diverted from landfill - 9.4/10 client satisfaction: service Additionally, two of the key school build projects, Wixams Academy and Wixams Tree Primary School, were part-funded by the Education and Skills Funding Agency. These projects also created: - 233 apprenticeship weeks - 194 student site visits - 100% waste diverted from landfill Through our ongoing relationship with Bedford Borough Council, we have enabled a positive change for the whole of Bedford which demonstrates the fantastic outcomes that can be achieved through true collaboration. Bedford Borough Council are now able to provide current and future residents with the certainty of an outstanding education for their children for many years to come. Mark Robinson, Chief Executive, SCAPE *Source: Office of National Statistics and 2011 Census ** Source: Department for Education, Statistics: School Applications
<urn:uuid:3fbea9e0-bb1b-467c-bea5-523609015908>
CC-MAIN-2022-33
https://www.scape.co.uk/research/better-learning
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00269.warc.gz
en
0.958899
683
2
2
Doctor insights on: Muscle Weakness Or Pain In Distal Muscles I have muscle weakness and pain that gets worse every day. A steroid is the only thing that has helped. Could it be my immune system attacking muscles? It is a body tissue that has the ability to contract. It shortens and generates force. It relaxes and returns to its original length. Muscles move joints, stabilize the body, move air and food through the organs, act as valves for bladder, bowel and other organs. They control movement of the eyes. They help us express ourselves by changing the shape of our ...Read more I have read that twitching is only a concern if muscle weakness is present. Can pain in knees and other joint pain along with twitching be weakness? Does myofascial pain syndrome cause swelling? Such as my arms and legs, and does it cause muscle weakness? Unable to abduct upper left leg due to worsening muscle weakness. Lower back pain x6 yrs. Mri spine "not bad" mild disc herniation l4/l5/s1. Now what? If muscle weakness: You should be evaluated by spine specialist. Either neurosurgery or orthopedic spine fellowship trained doctor who can relieve the pressure on the nerve by that disc. Assuming you have had conservative care, including physical therapy, possible injections by pain management, adjustment by chiropractor very briefly. ...Read moreSee 1 more doctor answer How can I diagnose and heal from these long term symptoms: muscle weakness and pain, extreme sensitivity to light, odor and touch? My cpk test was done 5 days ago and value came 218. One month ago I started feeling TMJ pain. Because of that pain muscle weakness too. ? Depends of type: of tarantula. Many species of tarantulas are not harmful to humans. If a tarantula bites it might be a “dry” bite – injecting little to no venom. However, the bite of some tarantulas can cause pain & swelling at the site, muscle cramping, fever, difficulty breathing and exhaustion. The Chinese Bird Spider (a type of tarantula) has been blamed for one death in China. ...Read moreSee 1 more doctor answer - Talk to a doctor live online for free - Muscle pain and weakness in left arm - Muscle pain and weakness in arms and legs - Muscle or nerve pain in lower back - Ask a doctor a question free online - Muscle or nerve pain in arm - Muscle or nerve pain in neck - Sharp stabbing pain in calf muscle - I have a sharp pain in my chest when i cough or sneeze what causes this - Talk to a neurologist online
<urn:uuid:f13aeb49-bd8c-480d-8716-eb9f39f6f642>
CC-MAIN-2016-44
https://www.healthtap.com/topics/muscle-weakness-or-pain-in-distal-muscles
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00466-ip-10-171-6-4.ec2.internal.warc.gz
en
0.934299
563
2.15625
2
Diplomatic relations with the Principality of Liechtenstein were established on 4 April 2003.Liechtenstein is covered by the Embassy of the Republic of Serbia in Bern, while the interests of Liechtenstein in Serbia are represented by the Swiss Embassy in Belgrade. Serbia's bilateral relations with Liechtenstein are good, but of lesser intensity.Significant space for the improvement of bilateral relations exists in the field of economy, education and culture. The Prime Minister of Serbia A. Brnabić and the Prime Minister of Liechtenstein A. Hasler met on the side-lines of the 50th session of the World Economic Forum in Davos (20 – 24 January 2020). Trade relations between Serbia and Liechtenstein are regulated by the Free Trade Agreement between Serbia and the EFTA countries, which entered into force at the end of 2011.The free trade zone was formed in 2014. For now, only the Hilti company, which sells machine tools, has its representative office in Belgrade. In the period January – November 2020, the value of exports from Serbia to Liechtenstein amounted to 5.4 million euros, and the value of imports 890 thousand euros.During the first quarter of 2020, the inflow based on investments from Liechtenstein amounted to 0.26 million euros.According to preliminary data from the National Bank of Serbia, at the end of 2019, foreign investments in Serbia from Liechtenstein amounted to 4.49 million euros.At the end of 2018, the balance of foreign direct investments from Liechtenstein to Serbia amounted to 106.91 million euros. The Republic of Serbia has not signed any bilateral agreement with the Principality of Liechtenstein. Embassy of the Republic of Serbia in Bern (Switzerland):http://www.berne.mfa.gov.rs/ Embassy of Switzerland in Belgrade:http://www.eda.admin.ch/belgrade. Ministry of Foreign Affairs of the Republic of Serbia: Department ofEurope (DE); tel. 00 381 (0)113068326/8247; e-mail: email@example.com. PRINCIPALITY OF LIECHTENSTEIN Form of government Head of State Prince Hans Adam II dr Daniel Risch Minister of Foreign Affairs Date of establishment of bilateral relations 4 April 2003
<urn:uuid:989bed9b-68d8-4c30-8cca-b902397e8e66>
CC-MAIN-2022-33
https://www.mfa.rs/en/foreign-policy/bilateral-cooperation/liechtenstein
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00265.warc.gz
en
0.897511
547
1.773438
2
Posted on 01 Nov 2016 14:42 Hoisin sauce is a sweet and spicy soybean-based sauce that is widely used in Chinese cooking as both an ingredient and a condiment. It regularly accompanies Peking duck in the United States. A Cantonese specialty, the Chinese name of hoisin sauce is haixian (Cantonese hoisin), which translates confusingly to "sea-delicious" even though it contains no seafood ingredients and is used more in meat dishes or as a barbecue sauce or glaze. Hoisin is made from a paste of yellow soy beans seasoned with sugar, vinegar, chiles, garlic, sesame oil, salt, and spices. It may also contain red coloring and thickeners. Different brands may contain different amounts of ingredients and different spices so that the flavor of Hoisin sauce varies quite a bit but is always spicy and sweet. The texture of hoisin can vary from thin to thick and creamy. There are many fermented yellow bean sauces used in Chinese cooking. Hoisin can be thought of as similar to a type sweet bean sauce called tin min jeong in Cantonese or tin mian jiang in Mandarin. These are typically a pureed soybean sauce mixed with sugar and various flavorings. Most of these "sweet bean" sauces, however, are not actually as sweet as Hoisin, and can actually be quite salty. Best Brands of Hoisin Sauce Avoid the typical grocery store brands of hoisin sauce with vaguely Chinese sounding names. Instead, look for more authentic brands in specialty stores, Asian markets, or online. Two widely recommended brands are Koon Chun and Lee Kum Kee. This article contains one or more Amazon affiliate links. See full disclosure.
<urn:uuid:6e4b417e-8c9e-488a-930f-84a162eb7e9f>
CC-MAIN-2017-04
http://www.culinarylore.com/specialty-foods:what-is-hoisin-sauce?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+CulinaryloreArticles+%28CulinaryLore+Articles%29
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00079-ip-10-171-10-70.ec2.internal.warc.gz
en
0.924718
357
2.328125
2
Eduardo Paolozzi: Collaging Culture Artist(s): Eduardo Paolozzi Author(s): Simon Martin Year published: July 2013 Publisher: Pallant House Gallery Publisher Location: Chichester Total Pages: 128 Illustrations: Illustrated in colour throughout 1 in stock Published to accompany the major exhibition of Eduardo Paolozzi: Collaging Culture at Pallant House Gallery, this book (the first major show on Paolozzi for nearly forty years) reproduces over a hundred key artworks alongside a range of fascinating contextual material. It positions Paolozzi as a major figure in the history of twentiethcentury art, and considers his relationship to Surrealism and European Modernists such as Giacometti and Dubuffet alongside his contributions to the Independent Group and the development of British Pop Art. From his iconic images cut from the pages of American magazines, to his robotic sculptures expressing man’s relationship with technology, the book explores the central importance of collage as both a working process and an approach to bringing together disparate sources of inspiration. The book also considers Paolozzi’s role as a designer of textiles for Hammer Prints Ltd. and Horrockses, his ceramics for companies such as Wedgwood Ltd., and his later public monuments. Written by Simon Martin, Head of Collections and Exhibitions at Pallant House Gallery, it also includes texts by Eduardo Paolozzi and Professor Sir Colin St John Wilson RA.
<urn:uuid:72a38a99-17af-4e6b-ab35-c929eed3bf0a>
CC-MAIN-2022-33
https://pallantbookshop.com/product/eduardo-paolozzi-collaging-culture/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.934866
346
1.90625
2
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers. In day-to-day life, business situations present decision-making opportunities that may affect peoples' lives either negatively or positively. Working for companies often require adherence to ethical models in making choices and decisions. There are two main ethical theories that try to elucidate on decision making in business. This paper is going to use the utilitarianism theory, and the ethical theory to elucidate on the decisions that can be made in a case study involving a business firm and an employee. Crane and Matten (2007, p. 102) write that consequentialism theory is a model that is used to judge the rightness or wrongness of decisions and actions basing on its consequences. Under the consequentialism theory, the most prominent example is utilitarianism, which asserts that an action is good if it produces the best results for the greatest number of people (Beauchamp, Bowie, & Arnold, 2009, p. 95). This essay will try to look into the options that the stakeholders in the case have in handling the situation to come up with solutions that will leave the greatest number of people happy. It will apply the ethical theories, utilitarianism, and virtue ethics theory to the case in elucidating the choice of action for each of the stakeholders. Utilitarianism theory asserts that a decision is morally right if the sum of the people to benefit from it is more than those who are likely to be saddened by the choice. It relies on the principle of the greatest happiness in providing judgment. The notion of utility is the key basis of judgment. The dilemma that the firm faces is whether the decision is ethical or unethical. Sam is the member of the firm who is mostly affected by the situation because he owes allegiance to the firm, and has to be sincere to his sister, and other children and mothers elsewhere. Identification of Stakeholders and ethical issues in the case; objectives and responsibilities There are various stakeholders in the case who have to make decisions, or whom the decisions made by a few will affect either positively or negatively. Basing on the ethical theories, one can summarize that short-term negative effects to the consumer side guarantees short term and long term benefits for the company side due to the choice of action that the firm stakeholders are likely to make. Each stakeholder faces different ethical issues in the case and has different objectives and responsibilities. The objective and responsibilities will be unethical if they favor a small number of people, and morally ethical if they favor the largest number of stakeholders according to the utilitarianism theory of ethics. The major stakeholders in the case are Sam, the executives, the firm, Michael, Baby Mobile Shareholders, Project Team, Parents, Babies/Users, and Suppliers. Sam is one of the main stakeholders who face the most challenging ethical issue. He owes allegiance to the firm, but he is morally conscious that the decision that the firm makes is not right. Michael is another stakeholder who has an ethical dilemma. He has the responsibility of ensuring that the firm makes a profit with the least expenses. Additionally, he the mission of ensuring that the organization achieves its goals, but will this happen at the expense of innocent consumers; hence he faces this ethical issue. Baby mobile shareholders are also stakeholders who have to have ethical considerations in coming to the decisions to execute the product selling. Therefore, this presents an ethical situation. Employees are parents, or would be parents who have the duty of protecting the consumers by promoting the sale of high quality products by the firm. Incidentally, they are duty bound to protect the interests of the firm because by the end of the day, they would need salary. The company executives also face ethical issues, for instance, they have to promote the interest of the firm and make profits. However, they have to uphold the image of the firm by presenting high quality products to the customers. The suppliers have an ethical dilemma in that they have to retain a cordial relationship with the firm by providing the best products on time. They also aim at making profits. The firm faces several ethical issues, including maintaining its image to the consumers, sustaining its market permanently, satisfying its customers, and making a profit. achieving organization's goals, good reputation for the firm, Meet deadline, profit, upholding the reputation, promote consumer safety , innovating the design, meeting the deadline within design constraints making profit for the firm, achieving organization's goals, maintaining the reputation of the firm, manage time and design frame be clear to team about expectations, communication to shareholders, meeting deadline, making profit, upholding the company reputation, safety of consumers , promotion of innovation Baby mobile shareholders return on investment, profitability of the firm, upholding the reputation for the firm Investing in the firm and ensuring profitability achieving organization's goals, Upholding the firm reputation, meeting the deadline, Meeting the deadline, Upholding the reputation, ensuring the safety of the consumers, and communicating with other departments maintaining good reputation of the firm Delivering of good work/ quality, Communication with other employees and departments, working together to achieve the companies goals and objectives Sustainability in the market, making profit, Environmental awareness, customer satisfaction and safety satisfying shareholders wants and needs, upholding good reputation Safety of customers, payment to employees, Safety of their children, Quality products for their children, take care of children safety from harm Maintaining good relationship with the firm Timely delivery of goods, high safety standards, Sam is at the helm of making a decision that could profit the company and harm the consumers or harm the company and save the consumer. The problem is the timing of the decision. This is because the company has limited time to impress the shareholders at the expense of the consumer. The executives have the responsibility of customer safety and, therefore, should not ignore their responsibility as they try to manage their objective. Crane and Matten (2007, p. 104) argue that there is a symbiotic relation connecting ethics and business, whereby ethics naturally materialize from a profit-oriented business. However, Crane and Matten (2007, p. 105) point out that there are two approaches to the argument, a weak and strong argument. The weak argument illustrates that good business is often a result of good ethics. This means that moral and sound business practices are a guarantee to good business or profit as a result of reduced product liability lawsuits. Sam should consider "the long-term benefits of a business are gained by seeking a trusting affiliation with the consumers" (Soares, 2008, p. 554). The strong version of profit motive (Soares, 2008, 545) approach argues, in a competitive and free market, for example, a capitalist market in this case, the profit motive brings about a morally appropriate business environment. The company initial object of funding the research and design team was to meet customer demands. If the company can meet the customer demands; including safety, then the business can survive; however, if the business does not heed to the customer demand, it will surely fail. Sam should consider which place he wants to be in the future. The company he works for would be in the midst of future failure in case he opts for silence. However, if Sam speaks out, the safety of the consumer will be guaranteed, and his career will be in jeopardy. Sam decision to act as a whistle blower would affect all the stakeholder of the issue in different ways. Whichever decision Sam makes he would act as a hero. For example, if he goes silent, he would be a hero for the company, and if he speaks out, he would end up as a hero for the consumer. Impact of protagonist If he takes action If he does not take action Will not meet the deadline, The company will maintain its reputation. Will become a hero to everyone except the company they work for. Might lose his job Get special recognition from executives, Stand at career execution in the future. Keeping quiet for Sam is unethical and is punishable by law and professional bodies He will be self-guilt Not achieve organizational goals and profits, Maintain good reputation, Job loss because he was not able to meet deadline and control Sam. Get promotion because he was heading the design team and was able to impress the shareholders, he might get recognition through awards, salary increment and promotion. Get demotion and kicked out of the design team. The management would put blame on the research department, Get recognition and more resources to better their innovation. The management would be willing to support a team that they can 'trust' Lose customer base, Possible law suit for fake products, Safe products for consumers Will retain good customer base will lose reputation Safety for children guaranteed, Save money that could be used to handle the risk and enjoy value of their cash. Get less value for their money, Expose their kids to risks. Will lose money on health issues and fake products Exposed to safety risks The philosophy in this ethical theory considers the idea that an action or a decision is morally right if it positively affects the greatest number of people. Therefore, this theory implies the principle of the greatest happiness, and emphasizes on the consequences of the action by weighing the good against the bad consequences. In essence, the theory encourages the action that results in the greatest amount of good consequences and discourages the one that results in the least amount of good. The underlying perspective in this theory is the economic principle of utility, which is probably the ultimate objective in human life. The purpose of man is to maximize their pleasures and minimize the pain at the same time; hence, measuring utility in terms of pain verses pleasure. The suitability of an action being done depends on the pleasure to be derived from the action. This is the basic definition of utilitarianism in detail (Mendola, 2006, p. 2). For example, the case presents Sam, who has to make a decision basing on the results of the decision by the firm. He has the moral obligation to protect his sister's daughter and other children. He is also duty-bound to protect the interests of the firm, where he is a member of staff. The decency of his decision will base on the number of people who will benefit from his action. If the number of beneficiaries is than the number of more, those affected negatively, then Sam has to proceed to denounce the company decision. If otherwise, then he can keep quiet and let the company sell the product. Michael also has options that will affect several people either positively or negatively. First, he can decide to deter the executives from proceeding with the marketing plan, or he can decide to take no action and let the executives proceed with the plan. Both ways, the action will benefit some players, and some players will lose. This is where the utilitarianism theory has to apply. He as to weigh the number of those to benefit verses the number of those to lose. Weight of Benefit and Harm In Regard To Whistle blowing The stakeholders in the case have various options that will affect others either positively or negatively. First, Sam can decide to take the action of cautioning the company against marketing the product, or he can decide to take no action. If he decides to take action, the benefits will be numerous. First, the public will consider him as ethical and honest; hence he will be branded as a hero. Further, he will save the children from harm due to the defected products, especially his niece. The company will not lose prestige for selling defected products and above all, he will not walk around with guilt conscience. Other benefits that will accrue from Sam taking an action include long-term profits for the firm since it will retain its consumer base and will uphold its image in the public. The employees will retain their integrity for availing quality products to consumers. To the parents, they will keep their children safe from injuries and will save money from buying defective products. The above are some of the benefits that all the stakeholders will attain if Sam takes an action. However, there will be several harms in case he takes the action. These will include the fact that he stands a high chance losing his job as an employee of the firm, the organizational goals will not be attained, and therefore, Michael is likely to lose his job as well. The company and the shareholders will definitely make losses, although this might be short term because the products will not be marketed. Basing on the fact that the employees will not meet the deadline and the shareholders are not likely to get their dividends, the other employees of the company will lose their jobs. The project team will fail to meet the deadline and the company will incur a short-term loss. The suppliers will definitely lose their market and they will make losses. On the other hand, should Sam decide not to take an action, there will be benefits like retaining his job and helping his Michael and the team to meet the deadline. Michael will be recognized by the company executives as a good team leader, and is likely to get a promotion. Further, the company will make short-term profits and the shareholders will get their satisfaction and dividends. The hard work of the team will attract remuneration and the company will profit from the sale of the products. There will also be numerous harms should Sam decide not to take action. First, he will live and work with guilt conscience. There will be concerns of safety issues from the consumers and the firm is likely to be sued for that. Due to this, the firm will lose its image and prestige to the public. This will lead to withdrawal of shareholders and loss of consumer base to other companies. The firm will make long-term losses, which will lead to loss of jobs for Michael and employees. The parents will have to incur expenses in the treatment of their children and purchasing of defected mobiles. Finally, the firm and the suppliers will have to face legal suit from parents for availing defective products. Take action: benefit: 22 harm: 11 Does not take action: benefits: 12 harm: 26 These results are indications that there will be more harm if he does not take action and less benefit. More benefits will accrue from him taking an action. This implies that Sam will be justified to take an action against his company. Elements of Virtue ethics Griseri and Seppala (2010, p. 54), the virtue theory uses the perspective of looking at a good life as the basis of understanding moral actions, rather than basing on the judgment of right or wrong. Judgment of one's life as good is based on the individual's character by considering the features of their personality. This theory considers the fact that a good personality is what makes an individual's life to be good. The personality aspect introduces the idea of virtue. By virtue, philosophers mean a good moral character that prompts individuals to act in a certain way, for instance, kindness, and politeness, among others. This theory asserts that virtues do not compel people to behave in a certain way, but rather it increases the probability of them behaving in that way. Virtues can be implemented in businesses in the daily lives. In administration and decision-making, virtues are the basic boundaries that distinguish success and failures. In the case at hand, the decision that Sam takes can be driven by the urge for justice, truthfulness honesty, and generosity to do the right thing by blowing the whistle. The decision is ethically correct, because despite blowing the company secrets, he would be helping majority of the stakeholders. Majority of the stakeholders would benefit from the decision to blow the whistle. The elements in the consumer side would benefit wholly from the decision. This is a non-consequentialist theory at play. Personal moral qualities that would be relevant in this case include truthfulness, integrity, fairness and courage. Integrity and courage are necessary for Sam to speak the whole truth about the scenario of how the company harms the flourishing and well-being of the consumer. This way, the company will not be honest with the customers for selling poor quality products. Further, it will lack the aspect of fairness and its customers will lose trust in it. Tom should also be courageous enough to stop the marketing of the defective mobiles, although the company will consider him a liability. In most cases, working in fraudulent companies may be challenging if one is ethically moral. This is because being moral implies that one represents the public more than they represent the company in most cases. Whistle blowing is "the disclosure of organizational member's (former or current) disclosure of illegal, immoral, or illegitimate practices under the control of their employers to persons or organizations that may be able to effect action" (Koehn, 1999, p. 71-73). In the case of Sam, he would have taken the right path that meets equal and fair activities. The path is not dependent on ethical theories but rather on personal principles and the moral obligation of employees to the company and the clients as well. The employee has the moral obligations to safeguard the company future and to provide the client with their value of money. Business is conducted because of offering the value of money. In the case of Sam, the executives cannot claim that the defect on the infant carrier is a quality issue. This is because the infant carries are subjected to flexibility in use, safety, and convenience. If the quality issue was something like fading of colors, he would have gone silent. However, the quality issue at hand is very critical as it would directly affect and harms the client. Therefore, it is only moral and wise to protect the customer from the harm. Understanding the ethical theories is one of the essential aspects while dealing with business decision-making processes. As in the above case, utilitarianism theory tries to elucidate the actions taken by individuals in dilemma situations (Mendola, 2006, p. 2), which do not provide positive feedbacks from all directions. It applies the notion that an action is morally right if the greatest numbers of people are positively affected. At the same time, the virtue theory contradicts by asserting that the quality of life of an individual is the basis of judgment of what should be moral and what should be immoral. This theory bases on the notion that a person lives a good life because of the virtues they possess. Examples of virtues include honesty, truthfulness, among others.
<urn:uuid:be43a3f6-e4a5-42ba-ac4a-1811c2f4b5d7>
CC-MAIN-2017-04
https://www.ukessays.com/essays/commerce/business-and-society-application-of-ethical-theories-commerce-essay.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00067-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956195
3,821
2.578125
3
Provides an explanation of the nature, different aspects and impact of globalization, relating global trends to general management issues and showing how different global changes and their effects interrelate. It is supported by the book's Internet homepage which incorporates teacher's notes. Globalization and Business Practice SAGE Publications, Incorporated Managing Across Boundaries Education & Reference
<urn:uuid:57a34333-e259-4058-9fc0-d56ad5782786>
CC-MAIN-2017-04
https://www.dymocks.com.au/book/globalization-and-business-practice-by-barbara-parker-9780761956945/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00205-ip-10-171-10-70.ec2.internal.warc.gz
en
0.792062
73
2.3125
2
Supporting Teachers & Students Tuscumbia native Helen Keller once said that, "Alone we can do so little; together we can do so much." This is the motto of the Athens City Schools Foundation. When everyone contributes a small amount, the power of those combined contributions make a significant difference in the educational lives of students and teachers in Athens City Schools. Established in 1994 as a 501(c) nonprofit organizatin, the foundation's mission is to raise funds that can be given back to teachers and students. These benefits are realized through the Third Grade Violin Program with the Huntsville Symphony Orchestra School, the Teacher Classroom Grant Program and The Ralph and Lib Brett Fund. Click here to learn more about the Athens City Schools Foundation. Together we make a difference.
<urn:uuid:bacc356a-efe6-49c6-9b6d-153bc094a4f6>
CC-MAIN-2022-33
https://www.acs-k12.org/domain/956
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00671.warc.gz
en
0.929549
161
1.617188
2
One of the reasons why I often shoot RAW+Jpeg is to take advantage of in-camera effects or film simulation modes. The images with effects are saved as Jpegs. The master files are in the RAW format. By capturing those RAW files too, I have fully editable images to further experiment with further if I wish, especially if I don't like the way the Jpegs turned out. Both images captured at the same time with a Fujifilm X20 compact camera. Picture on the left is the RAW file, and on the right is a B&W recorded using Fujifilm's Film Simulation mode. By shooting RAW+Jpeg, I get both files. Photos by Derrick Story. When it's time to upload these files to Aperture, I choose "Both - Separate Originals" for my RAW+Jpeg pairs. I *do not* recommend using the other Pairs settings because the files get linked together. This proves to be a problem up the road. Once the files are in my Aperture library, I select Auto Stack (Stacks > Auto Stack) and set the timing to 0:01. This creates a pairing for each of my compositions - one Jpeg with one Raw. If I want to tidy up the library, I can Close All Stacks (Stacks > Close All Stacks), and I only see one version of each pair. You even have control over which version by using the Pick command. By using this technique, I'm more willing to experiment with the interesting effects included in my camera because I will always have the RAW file too. Use this technique to explore the unique features of your camera. Aperture Tips and Techniques To learn more about Aperture, check out my Aperture 3.3 Essential Training (2012) on lynda.com. Also, take a look at our Aperture 3 Learning Center. Tons of free content about how to get the most out of Aperture. The Digital Story on Facebook -- discussion, outstanding images from the TDS community, and inside information. Join our celebration of great photography!
<urn:uuid:61b7d57d-68c0-4c3f-a280-8224b18cb7b9>
CC-MAIN-2017-04
http://thedigitalstory.com/2014/02/manage-raw-plus-jpeg-pairs.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00535-ip-10-171-10-70.ec2.internal.warc.gz
en
0.91337
436
1.570313
2
Share this infographic on your site! Embed this infographic on your site! How To Become A Backyard Zookeeper Love zoo animals? Have questionable morals and ethics? Then running a backyard zoo could be for you! The Cost of Animals I'm sure right now you are thinking "well gee, I'd love to have a backyard zoo, but the cost must be astronomical!" No way Jose, it's actually extremely cheap! Check out these low, low prices! Exotic Animal Laws Now your next hurdle will be the local laws that exist where you want to start your crazy backyard zoo. Luckily in many parts of the US there are NO LICENSING OR PERMIT LAWS WHATSOEVER. If you live in Alabama, Idaho, Missouri, Nevada, North Carolina, Ohio, South Carolina, West Virginia, Wisconsin it's your lucky day! In these 12 states you just need to get a permit: Arizona, Delaware, Indiana, Maine, Mississippi, Montana, North Dakota, Oklahoma, Pennsylvania, Rhode Island, South Dakota, Texas These states ban some animals but not others: Arkansas, Florida, Illinois, Kansas, Louisiana, Michigan, Minnesota, Nebraska, Virginia And if you live in these states, then you probably should move, because they clearly don't understand your long standing dream to own a giraffe: Alaska, California, Colorado, Connecticut, Georgia, Hawaii, Iowa, Kentucky, Maryland, Massachusetts, New Hampshire, New Jersey, New Mexico, New York, Oregon, Tennessee, Utah, Vermont, Washington, Wyoming Exotic Pet Ownership: By The Numbers We obviously don't condone owning exotic wildlife, and think the current laws in many states are INSANE. Backyards zoos recently received worldwide attention when a Zanesville, Ohio man released his menagerie of animals, leading to the deaths of numerous bears, lions, tigers, wolves and other animals. But surely YOUR backyard zoo will end better than this: Hopefully, we will all learn from the Zanesville massacre and and keep wild animals wild.
<urn:uuid:1cbb13e9-6fcc-4a36-b66c-b3aede8eb3d1>
CC-MAIN-2017-04
http://www.howdoibecomea.net/backyard-zoo/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00145-ip-10-171-10-70.ec2.internal.warc.gz
en
0.877113
424
1.710938
2
The program has a powerful tool to modify the printing of specific colors. The tool is available from the Control Center or the button on the sidebar and it will allow you to: - Modify the printing of any color of the design without modifying the whole print. For instance, in order to modify a corporative color of a design, which is being printed together with an image, we can give precision to the color of the logotype without modifying the global color of the image. - Assign a determinate color to an ink cartridge or a combination of them. This is particularly useful for printers with more than 4 ink cartridges where it is possible to use the rest of the cartridges for special colors, such as reds, greens, whites, fluorescents, etc. This will allow a part of the design to be printed with a fluorescent color, for example, without modifying the rest of it. - Modify the printing of any color of the design, reading the real color of a sample printed in color with a spectrophotometer. Although this is a variation of section 1, the color entry precision is very useful. To use this option the file (PSD, TIFF or PDF) opened in print document requires embedded spot colors to have a replacement reference. Once opened, it will show in the list for 'Color Replacement' at the Properties section, with the values for original color as well as the modified color. - Once the spot color is picked it will be shown on the list. - If your document contains multiple spot colors overlapping, then multiple colors will be detected. - If your document does not contains spot colors or has areas that do not have spot colors, then no color will be detected. CIELab: which stands for the spatial coordinates of the color and expresses their values (a,b) and luminosity (L). Although it is a value which is difficult to imagine, there are many colors which are usually expressed this way, since it is a representation of color which doesn't depend on any device (printer, screen, scanner, etc). We have the possibility of entering the values L, a and b, which can be saved in the spot color replacement library. RGB (Entry): showing the original color values of Red, Green, Blue of the input profile. If, for instance, we see a red dominant in the already printed color, we can correct only value R, by lowering it. CMYK (Entry), showing the original color values of Cyan, Magenta, Yellow and Black of the input profile . As in the previous case, it is possible to correct the color dominants. In both cases we can change the values only but not saving in the spot color replacement library, because the a different profile can have a different input profile that can change individually the output color. Possibility of entering a CMYK or RGB values without their being modified by the profile of the exit color, i.e., we will enter a real value which will be sent to the printer. For instance, if we want to obtain a "pure red", we can specify the values: Magenta (M)=100, Yellow (Y)=100. The 'Apply ink control' option will assign light inks. In case our printer has light inks such as light magenta, grey, etc, we can specify a multichannel replacement color. By default we must enter the values of all the colors, but keeping the Automatic Light Inks option activated, the program will be the one to calculate automatically the ink percentages. Minimize dE will make the program look for the color with the less difference (dE) to the original. For that, it makes an exhaustive search within the printer's profiles. Every spot color replacement can have an independent gradient calculation. - Natural (default) linearises the color to have a smoother transition maintaining the ink tonal characteristics. - Natural (Unlinearized) uses the ink’s own behavior, so we’ll have brusque variations of color. - Emulate linearises the color and adjusts the tone of the gradient to achieve similar results when printing on different machines. Be aware that direct ink recipes with spot color inks (fluor inks) can be in mode Natural or Natural (unlinearised). Add color into spot color replacement file Under the Color replacement configuration window there is the option to add the color replacement configuration under a name. Whenever you want to use that configuration, you can select the name given to it from a drop-down list, into the Color replacement table in the Color tab within the Printer Scheme manager. If your document has multiple spot colors listed that should be added into the color table, then select multiple colors with shift and mouse-click, which will enable the option "Add selection" to add colors to selected color table. Obtaining Color by Reading from Device It is possible reading colors directly from a spectrophotometer. This proceeding will add a lot of precision, since we will be measuring a color directly from a real sample. Press the Measure... button once the spectrophotometer is correctly placed (consult the list of devices supported by neoStampa to your usual provider). Select the correct device, which is automatically assigned when device is connected. If necessary, set the communication port where such device is connected and the parameters for scanning. Press Read! to make the reading once the spectrophotometer's pointer is on the color sample to be measured. This value will be in the color components' section. Once the colors are replaced, you will see the color change on the document preview and the next to the color in the list a printer icon is displayed. Adding all spot colors as patches to the document, you can do it using the 'Print document information' option from Crop and Register Marks section.
<urn:uuid:7f1dc5da-a6e3-490c-8c03-15b5fb3d958d>
CC-MAIN-2022-33
https://inedit.freshdesk.com/en/support/solutions/articles/14000137196-how-to-work-with-color-replacement-
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00675.warc.gz
en
0.865534
1,225
2.671875
3
The Nazi Party The National Socialist German Workers’ Party—also known as the Nazi Party—was the far-right racist and antisemitic political party led by Adolf Hitler. The Nazi Party came to power in Germany in 1933. It controlled all aspects of German life and persecuted German Jews. Its power only ended when Germany lost World War II. The Nazi Party was founded in 1920. It sought to woo German workers away from socialism and communism and commit them to its antisemitic and anti-Marxist ideology. Adolf Hitler became the Führer or Leader of the Nazi Party and turned it into a mass movement. He aimed to lead the German “master race” to victory in the "racial struggle" against “inferior” peoples, especially the Jews. The Nazis ruled Germany as a one-party, totalitarian dictatorship from 1933 to 1945. The Party used its power to persecute Jews. During World War II, Nazi propaganda portrayed “the Jews” as Germany’s true enemy and depicted their destruction as necessary for the Germans’ survival. The Nazi Party was the radical far-right movement and political party led by Adolf Hitler. Its formal name was the National Socialist German Workers’ Party (Nationalsozialistische deutsche Arbeiterpartei or NSDAP). Nazi ideology was racist, nationalist, and anti-democratic. It was violently antisemitic and anti-Marxist. The Nazi Party was founded in 1920, but won little popular support until the crisis of the Great Depression. In 1933, the German president appointed Hitler Chancellor. At the time, non-Nazis dominated Germany’s government. However, the Nazis used emergency decrees, violence, and intimidation to quickly seize control. The Nazis abolished all other political parties. They declared Germany a one-party state with Hitler as its supreme leader. Origin of the Nazi Party After World War I ended, Germany experienced great political turmoil. The Treaty of Versailles (1919) imposed harsh terms on Germany, which had lost the war. In addition, the country saw the overthrow of its monarchy. In its place was the new Weimar Republic, a democratic government. Racist and antisemitic groups sprang up on the radical right. They blamed Jews for Germany’s defeat in the war. These groups opposed the Weimar Republic and the Treaty of Versailles. They were against democracy, human rights, capitalism, socialism, and communism. They advocated to exclude from German life anyone who did not belong to the German Volk or race. In September 1919, Hitler attended a meeting of one of these groups in Munich, the German Workers’ Party. This small political organization sought to convert German workers away from Marxist Socialism. At the meeting, Hitler’s public speaking skills attracted notice. He was recruited to a leading role. In 1920, Hitler changed the Party’s name to the National Socialist German Workers’ Party. “National Socialism” was a racist and antisemitic political theory. It had been developed in Hitler’s native Austria as the antithesis of Marxist Socialism and Communism. Marxists, for example, advocated for the global solidarity of the world’s workers. They called for the abolition of nation states. National Socialists, however, sought to unify members of the German Volk in complete obedience to the state. They called for a strong state to lead the “master race” in the “racial struggle” against “inferior races,” especially the Jews. Hitler formulated a 25-point program in 1920. The program would remain the Party’s only platform. Among its points, it rejected the Versailles settlement. It also demanded to unify all people of German “blood.” The program called for a Greater Germany ruled by a strong central state. The country was to acquire new lands and colonies. The program would deny citizenship and rights to all non-Germans, particularly Jews. The Nazi Party grew steadily under Hitler’s leadership. It attracted support from influential people in the military, big business, and society. The Party also absorbed other radical right-wing groups. In 1921, Hitler organized a paramilitary force called the Storm Troops (Sturmabteilung, SA). SA members were war veterans and members of the Free Corps (Freikorps), paramilitary units that battled left-wing movements in postwar Germany. The Beer Hall Putsch On November 8-9, 1923, Hitler and his followers staged a failed attempt to seize control of the Bavarian state. They believed this would trigger a nationwide uprising against the Weimar Republic. The uprising began in the Bürgerbräu Keller, a Munich beer hall. World War I hero General Erich Ludendorff, Hitler, and other Nazi leaders led the march. About 2,000 Nazis and sympathizers followed. City police clashed with the marchers, leading to an exchange of gunfire. Four police officers and 14 Nazis were killed. After the putsch, German authorities banned the Nazi Party. Several of its leaders were arrested and charged with high treason. Hitler was convicted and sentenced to 5 years in jail. After only eight months, he was released for “good behavior.” While in prison, Hitler began dictating his book, Mein Kampf. The book set out his world view and personal mission. Hitler believed he was destined to lead the German “master race” in the battle between races to control land and resources. He would achieve this by creating a racially pure state and conquering Lebensraum (living space) in the Soviet Union. Further, he would destroy the Germans' ultimate enemy, the Jews, and their most dangerous weapon: Judeo-Bolshevism. Mein Kampf was published after Hitler’s release. It did not become a bestseller in Germany until after he became Chancellor. The Rise of the Nazi Party After the putsch failed, Hitler concluded that the way to destroy the Weimar Republic was through democratic means. In 1925, he persuaded Bavaria’s leaders to lift the ban on the Nazi Party. Hitler promised that he would seek power only through elections. He then reestablished the Nazi Party under his complete control. What came to define the Party was not its 25-point program, but rather complete loyalty to its Führer or Leader, Hitler. The Nazi Party prepared to stand in the elections. It organized branches in each German state. These branches worked to establish cadres in regions, cities, towns, and villages. The Nazi Party had a rigid top-down command structure. Officials were appointed from above rather than elected by members. In each region, a Gauleiter or District Leader served as head. This position was appointed by Hitler and answered directly to him. The 1928 Reichstag Elections The Nazi Party's membership had quadrupled by the 1928 elections for the Reichstag, Germany's parliament. However, it won only 2.6% of the votes and 12 seats. Despite its name, the National Socialist German Workers’ Party won little support from industrial workers. This did not concern Hitler, who was seeking to create a mass movement. He aimed to appeal to the many groups that disliked the Weimar Republic and feared socialism and communism. Hitler emphasized propaganda to attract attention and interest. He used press and posters to create stirring slogans. He displayed eye-catching emblems and uniforms. The Party staged many meetings, parades, and rallies. In addition, it created auxiliary organizations to appeal to specific groups. For example, there were groups for youth, women, teachers, and doctors. The Party became particularly popular with German youth and university students. The 1930 Reichstag Elections What most contributed to the Nazi Party’s success was Germany’s economic collapse during the Great Depression, beginning in 1929. The crisis resulted in widespread unemployment and poverty. It also led to an increase in crime. Germans’ resulting anger and fear left them vulnerable to arguments from the extreme right and left. The 1930 elections saw a sharp rise in support for both the Nazis and the Communists. The Nazis had more support, though, winning 18.3% of the vote and 107 seats. With this outcome, they became the second largest party in the Reichstag. President Hindenburg and his conservative advisers did not want the largest party, the Socialists, to form a government and so tried to rule by presidental decree. They hoped in time to amend the constitution and establish authoritarian rule. The 1932 Reichstag Elections Increased political divide led to increased violence. The SA was especially violent. By 1932, it had amassed 400,000 members. That summer, there were deadly street battles and daily assassinations. More and more Germans came to agree with Hitler’s argument that parliamentary democracy was destroying Germany by catering to special interests. Hitler asserted that the nation needed a strong leader to unite Germany and rule in the national interest. The Party did not emphasize antisemitism in its general campaign messaging. In the July 1932 elections, the Nazis became the largest party in the Reichstag. The Party had won 37.4% of the vote and 230 seats. Hitler, however, refused to join a coalition government unless he was appointed Chancellor. Hindenburg opposed this demand. The Reichstag elections had to be held again in November 1932. The Nazi Party remained the largest party, but had won two million fewer votes than in July. The Party dropped to 196 seats, with 33.1% of the vote. By this time, Germany’s economy was on the mend and the Party’s popularity was receding. The odds for the Weimar Republic’s survival appeared to be improving. Then, on January 30, 1933, Hindenburg appointed Hitler Chancellor in a coalition government. It was not dominated by Nazis, but rather by members of the conservative German National People’s Party and non-partisan professionals from the bureaucracy. Hindenburg took this step after his advisers assured him that the conservative members could control Hitler. They believed they could use Hitler’s mass following to amend the constitution and create an authoritarian state. Germany becomes a one-party dictatorship under Hitler Once he became chancellor, Hitler moved quickly to bring the government under Party control. He persuaded Hindenburg to dissolve the Reichstag and announce new elections. The Nazis’ campaign platform called to unify all good Germans in the fight to eradicate “Marxism,” meaning both communism and socialism. The Nazi Party saturated Germany with its propaganda. Meanwhile, the government restricted the opposition press. In much of Germany, SA and SS (Schutzstaffel) members were deputized as auxiliary police. They used their powers to attack, arrest, and kill communists. On February 27, 1933, there was a fire in the Reichstag building. The fire provided the excuse to declare a state of emergency. This allowed the government to abolish civil liberties and take over state governments. In the March 5 Reichstag elections, the Nazi Party won 44% of the vote. Together with its coalition partner, the Party barely won a majority of seats. Hitler used arrests, intimidation, and false promises to get the necessary votes to pass the Enabling Act on March 23. This “enabled” Hitler and his cabinet to dictate laws without approval from the Reichstag or President. The Nazi Party did not only seize control of all levels of government. It also worked to control all aspects of German economic, social, and cultural life. This process was called Gleichschaltung, or "coordination." All other political parties were abolished by July 14, 1933. Germany was declared a one-party state under the Nazi Party. Government, legal, and educational institutions were purged of Jews and suspected political opponents. Workers, employers, writers, and artists came under control of Nazi organizations. Sports and leisure activities, too, fell under Nazi control. Only the military and the churches escaped “coordination.” Threat from Within By 1934, the main threat to Hitler’s continued control of the government came from within the Nazi Party, specifically the SA. SA men were eager to punish enemies and cash in on the Nazi takeover. Their violence and intimidation was met with increasing public disapproval. To reassure the nation, Hitler announced that the revolutionary phase of the “national uprising” had ended. Among the SA, however, there was talk of a second revolution. This was to be led by SA commander Ernst Röhm. By this time, the SA had 4.5 million members. It far outnumbered the Reichswehr, Germany’s armed forces. Röhm made no secret of his desire to subordinate the military to the SA. In June 1934, Germany's generals made clear to Hitler that he had to tame the SA or face a military coup. On June 30, 1934, Hitler executed a bloody purge of the SA. The purge became known as the “Night of the Long Knives.” The estimated 150 to 200 victims included Röhm and other SA leaders, as well as conservative figures who had earned Nazi displeasure. Though subordinate to the SA, the SS carried out most of the murders. As reward, Hitler made the SS an independent Nazi organization. Its leader Heinrich Himmler answered directly to Hitler. On August 2, 1934, President Hindenburg died. Every member of the German armed forces was then ordered to swear an oath of personal loyalty to Hitler. German military leaders had welcomed the slaughter of SA leadership. Without opposition, Hitler abolished the separate position of Reich President. He declared himself Führer and Reich Chancellor, the absolute ruler of the German people. The Nazi Party in Power All “Aryan” Germans were expected to participate in organizations run by the Nazi Party. However, the Party itself remained elite by limiting its membership. According to the “leadership principle,” it retained its top-down command structure. There were leaders at every level: regional, county, municipal, precinct, and neighborhood. Leaders were appointed from above and oversaw popular conformity to Nazi standards. Before it came to power, the Party had also created a government-like apparatus. Departments were responsible for the same areas as government ministries. For instance, there were departments for foreign policy, justice, labor, and economics. This structure never replaced the German bureaucracy. However, it acted alongside it and in continual competition with it. Hitler transformed one party office into a government agency when he made propaganda chief, Joseph Goebbels, head of the new Propaganda Ministry. Goebbels created a cult of personality that glorified Hitler as Germany’s infallible savior. Nazi propaganda became inescapable in Germany. It dominated the press, film, radio, and public spaces. Portraits or statues of Hitler appeared everywhere. Every city and town renamed a street or public space to honor him. In public, ordinary Germans were expected to praise Hitler and give the so-called German greeting ("Heil Hitler!"). Propaganda permeated school curricula as well. Children, for example, learned odes praising Hitler’s leadership in public schools. Leni Riefenstahl’s film “Triumph of the Will” vividly portrays the image of Hitler as an almost divine leader. The film is based on one of the Party’s massive rallies at Nuremberg. The Nazi Party’s control of every level of government allowed it to pursue its antisemitic agenda. The central government enacted sweeping antisemitic decrees. Even before that, though, Nazi officials persecuted Jews at the local level. Jews were excluded from professions, businesses, and public spaces. Propaganda portrayed Jews as poisonous vermin plotting to destroy the German Volk though capitalism and bolshevism. Nazi leaders claimed that “the Jews” started World War II. The war was portrayed as a struggle for German survival. The Nazi claim that the Jews intended to destroy the Germans became the excuse for the Germans to destroy the Jews. Defeat of Nazi Germany By the late 1930s, the vast majority of Germans supported Hitler and the Nazi state. The only organized attempt to oust Hitler and the Nazi Party occurred on July 20, 1944. By this time, Germany’s defeat in World War II appeared inevitable. Following Hitler’s suicide on April 30, 1945, Germany surrendered and was occupied by Allied forces. The Allies banned the Nazi Party and declared it a criminal organization. They tried top Nazi leaders for crimes against humanity, among other crimes. To this day, the Nazi Party is banned in Germany.
<urn:uuid:feb005bd-cf7d-4059-a137-ddccc80173e6>
CC-MAIN-2022-33
https://encyclopedia.ushmm.org/content/en/article/the-nazi-party-1?parent=en%2F10864
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00466.warc.gz
en
0.971914
3,474
3.734375
4
National output of goods and services rose by 0.7 per cent between the third and fourth quarters, according to figures published by the Central Statistical Office. Bank of England data on bank lending and the amount of money circulating in the economy confirmed the picture of steady growth, which is running slightly more strongly than economists had expected. National output of goods and services in 1993 as a whole was 2 per cent higher than in 1992, almost double the growth rate City analysts forecast a year ago. That compares with falls of 2.3 and 0.5 per cent in the previous two years. The recovery has been driven by cuts in interest rates and the fall in the pound since Britain left the European exchange rate mechanism in 1992. The Chancellor yesterday stuck to his Budget forecast of at least 2.5 per cent growth this year. The economy has now grown for seven successive quarters, equalling the duration of the recession. About 85 per cent of the fall in output during the downturn has been reversed. The record is slightly less impressive when volatile North Sea oil and gas production is excluded, giving 0.5 per cent growth in the fourth quarter and 1.8 per cent for 1993 as a whole. Growth was evenly spread across most parts of the economy, with only agriculture, construction and government services lagging behind. Manufacturing output is thought to have grown by about 0.5 per cent in the fourth quarter. A survey of consumers by Gallup for the European Commission showed that most people are still relatively unconcerned that the tax rises will hurt either the economy or their finances. Confidence is higher than before the November Budget and people are more willing to buy big items than at any time since 1988. Defending the Chancellor's recent admission that tax rises would 'check' recovery, Mr Heseltine said: 'It isn't a question of eliminating the recovery. It is of course an economic factor that is going to have a negative effect against which you have to set the positive effects.' Most positive was the very substantial increase in spending made possible by falling interest rates, he said on BBC Radio 4's The World at One. Tax changes would be coming through in April at the same time as building societies reduced mortgage payments. But he went on: 'The Chancellor is determined not to give the impression that all the problems are over, that there won't be any hiccups, that the garden is all rosy and set fair. That's not life. It's not economic reality.' The FT-SE index of 100 leading London shares rose 14.2 points to close at a record 3,484.2. The market has been driven upwards in recent weeks by the prospect of another interest rate cut to boost recovery. City economists believe the Chancellor is holding fire until he sees the effect of the tax rises, but most expect base rates to fall by at least another half- point to 5 per cent sometime in the spring. Mr Heseltine's remarks came as Labour prepared to challenge Tory opponents of value-added tax on domestic fuel to rebel in the Commons and force redrafting of the Finance Bill. Gordon Brown, Labour's shadow Chancellor, said: 'What people now understand is that they are going to pay extra tax on their bills, from their wage packets, on their mortgages and the pounds 3 to pounds 4 a week rise in National Insurance.' He published a list of 12 Tory MPs who have argued against VAT on fuel. However Labour has been able to reopen the issue only by tabling an amendment to a motion for next Tuesday's Second Reading of the Finance Bill, stating that the Bill is not acceptable because it fails to repeal the tax. Rebels would be voting against the whole Budget legislation. Nicholas Winterton, Conservative MP for Macclesfield and a past rebel, said he would vote to remove VAT on heat and light, but he could not destroy the whole Bill. Buoyant bank lending. . . . .19 View from City Road. . . . . .20Reuse content
<urn:uuid:8eb7f8a8-881e-4362-bb18-85c021b8830d>
CC-MAIN-2017-04
http://www.independent.co.uk/news/ministers-cautious-despite-2-growth-output-strong-in-1993-but-tax-rises-could-endanger-recovery-1408609.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00320-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968925
817
1.914063
2
coal folks hash out communication, trust issues Journalists, coal-company officials and business associates of the coal industry -- more than a dozen in each category -- gathered in the booming coal town of Pikeville, Ky., on April 17, 2006, to talk about the difficulties they have with each other and try to forge a more mutually beneficial The Coal-Media Roundtable was sponsored by the Institute for Rural Journalism and Community Issues and the Appalachian News-Express, the Pikeville newspaper. News-Express Publisher Marty Backus, who suggested the roundtable, and Institute Director Al Cross called the meeting a success, and said it might be repeated, as often as annually. "For years, the relationship between the coal industry and the media has been rocky at best," Neil Middleton, news anchor for WYMT-TV in Hazard, said in introducing the station's report on the meeting. Middleton and co-anchor Danielle Morgan attended the roundtable. "A journalist's job is to provide information for the public. A coal miner's job is to provide energy for the nation, but when those paths cross, it isn't always a pretty meeting," Morgan told viewers, introducing a video clip of her interview with Mike Browning, editor of The Logan Banner in "When we called to get information on one disaster, we were hung up on six times," Browning said, expanding on an episode he had related at the roundtable. Coal executives said that happens, and calls aren't returned to certain journalists, because of inaccurate or biased reporting. "When you give them a statement, it will be edited for content, taken out of context," said Paul Matney of TECO Energy, which mines in southeastern Kentucky. Cross urged coal companies to give every journalist at least one break, and discuss problems they have with stories, not cut off communication. He also urged reporters to do stories about the booming coal business, to get to know people in the industry and develop sources in a less or non-adversarial climate. The most experienced coal reporter at the table, Ken Ward Jr. of the Charleston Gazette, said information about disasters should come from government officials, who have control over disaster sites and are paid to issue information to the public -- unlike most coal companies, which lack a spokesperson and are usually preoccupied by trying to rescue miners and not disposed to deal with reporters. Ward told industry representatives that the best argument they have to make against those who would severely limit their activities, such as mountaintop-removal mining, is their essential role in providing electric power for the nation. Participants on all sides said they knew people who do not realize that most electricity comes from coal and most coal is used to make steam used to generate electricity. Ward also told the coal folks, "My job is not to tell your story," or write articles that artificially balance six paragraphs adverse to the industry with six favorable to it. He said the industry has naturally come under more media scrutiny since the Sago Mine disaster, in which 12 miners died and there was a false report that they had survived. "The media and the coal industry are in a whole new world after Sago," The day ended with better feelings on both sides. "I think this is a good first step," said Bill Caylor, president of the Kentucky Coal Association. He called for more such meetings, and tours of mines by journalists. Just sitting around the same table and talking helps, said David Gooch, executive director of Pikeville-based Coal Operators and Associates. "It's a matter of trust," he told the roundtable. "Trust comes from association." To see WYMT's full report, click here, then click on the story in the Video list. The roundtable was an outgrowth of "Covering Coal," an Institute conference that was held in November at the Graduate College of Marshall University in South Charleston, W. Va., and attended by Backus and other journalists. For a report on that conference, click to reprint items from The Rural Blog is hereby granted, on the condition that clear credit is given to the original source of the material. If the blog provides information for a story, please let us know by sending an e-mail to email@example.com. Institute for Rural Journalism and Community Issues helps non-metropolitan media define the public agenda in their communities, through strong reporting and commentary on local issues and on broader issues that have local impact. Its initial focus area is Central Appalachia, but as an arm of the University of Kentucky it has a statewide mission, and it has national scope. It has academic collaborators at Appalachian State University, East Tennessee State University, Eastern Kentucky University, Georgia College and State University, Indiana University of Pennsylvania, Marshall University, Middle Tennessee State University, Ohio University, Southeast Missouri State University, the University of North Carolina-Chapel Hill, the University of Tennessee-Knoxville, Washington and Lee University, West Virginia University and the Knight Community Journalism Fellows Program at the University of Alabama. It is funded by the John S. and James L. Knight Foundation and the University of Kentucky, with additional financial support from the Ford Foundation. To get notices of Rural Blog postings and other Institute news, click
<urn:uuid:5090ff5f-37ec-46f2-96b4-8e1b67ee82dd>
CC-MAIN-2017-04
http://www.uky.edu/CommInfoStudies/IRJCI/roundtable.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00287-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946992
1,176
1.515625
2
- Encounters with locals - Nature Reserve / Wildlife Observation / Safari - Hiking / Trekking - Place or Historical Monument - Sustainable Tourism I loved trekking in the Dana Reserve. Mainly because there are not many tourists, except at the ecolodge centre, which is a stop off for groups. The landscapes are beautiful, the scenery is very mineral with its peaks of rocky sandstone, limestone and granite. We're really on the edge of the desert but the greenery is ever present. Dana is an amazing biosphere reserve, I saw Nubian ibex while I was there (a species of local mountain goat) and some Syrian wolf tracks but sadly no wolves. I stayed over night at the Rummana Campsite, under the stars and by the camp fire, I will hold on to these special memories. I walked the 4 hour long Dana Village Trail, with a compulsory guide as the hike is quite difficult. Dana village itself is very picturesque , it dates from the 19th century, is built from stone and overlooks the reserve. There are some nice local craft items. Stay with a host family, it is fair tourism and ecological, strongly recommended!
<urn:uuid:efa2ae2b-e772-4390-a73b-d1a055234ea5>
CC-MAIN-2022-33
https://www.evaneos.com/jordan/holidays/places/936-dana/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00076.warc.gz
en
0.95814
263
1.640625
2
Some of the common ENT problems treated in the hospital are listed below. You can always consult our specialists for additional advice or information on any symptoms not appearing in the list. • Treatment for hearing loss – This is a common problem faced by a large section of the patients belonging to all age groups. Hearing loss can be conductive – due to problems in the ear canal, middle ear or the ear drum. It can also be a sensorineural hearing loss (SNHL) – due to problems of the inner ear as a result of nerve related conditions. • Otoscelerosis – Hearing loss due to an abnormal bone growth near the middle ear. • Hearing testing for the new-born • Tinnitus – imaginary ringing noise in the ear • Treatment for ear aches and ear infections for infants and other age groups • Swimmer’s ear – a painful condition due to acute infection arising out of the the water getting trapped in the ear. Often affects children and teenagers. • Otitis media – inflammation of the middle ear due to infections. It is also the most common cause of hearing the loss in children. • Vertigo, motion sickness, and Meniere’s disease – dizziness, loss of equilibrium and balance disorders while walking or standing. • Ear molds • Ear trauma due to injury Nose and Mouth • Sinusitis and polyps • Nasal congestion and stuffy nose • Postnasal drips – caused by increased secretion of mucus and related swallowing problems • Taste and smell disorders • Various types of nosebleeds – commonly found in children • Broken nose – arising out of injuries or falls • Mouth sores • Tumors or growth in the mouth • Obstructive sleep apnea • Breathing difficulties • Allergy testing and immunotherapy Throat & Voice • Treatment for swallowing problems • Gastroesophagal reflex (GERD) • Laryngitis – a sore throat and hoarseness • Various Vocal cord problems
<urn:uuid:cc02c0dc-ba10-4e15-956c-25fee9048f4b>
CC-MAIN-2022-33
https://www.emccochin.com/sub-department-list/ent-problems-treatment-cochin/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00674.warc.gz
en
0.902721
438
2.875
3
Your entire life is a symptom of the ideas that go on in your head. This is a quote made renowned by Australian tv producer and also writer Rhonda Byrne, who published her very successful self-help book The Secret in 2006. Guide took place to sell more than 30 million duplicates, get a myriad of star fans including Oprah Winfrey, Will Smith and also Ellen DeGeneres, as well as form the bedrock of manifestation techniques seen around the world today How To Properly Manifest Law Of Attraction. However showing up, which is essentially willing your objectives right into existence, isn’t specifically a brand-new sensation. Based upon the Law of Destination, which was part of the New Thought motion as well as theorised by 19th century spiritualist Phineas Quimby, showing up is everything about the belief that our ideas are power. The concept has its foundations in numerous philosophical as well as religious customs, from Hermeticism as well as Transcendentalism to Hinduism, as well as has actually been broadened on by several Twentieth Century philosophers such as Napolean Hillside (Think and Grow Rich, 1937) and Louise Hay (You Can Recover Your Life, 1984). To put it merely, manifesting purposes to place the person in the driver’s seat of their own life as well as makes them responsible for the positive and also negative impacts in their lives. What Is manifesting? Contrary to the idea that ‘seeing is believing’, manifesting is all about counting on something in order to see it come your way. ‘Showing up is the capacity to utilize the power of your mind to change as well as create the truth you experience,’ explains self-development instructor Roxie Nafousi. Nafousi started manifesting at the age of 27 after experiencing an addition to drug, alcohol and also cigarettes for numerous years, as well as really feeling a lack of self-regard and objective. Feeling something ‘click’ in her mind after paying attention to a podcast on manifesting, the mother-of-one has actually since carved out a name for herself in the health market, and also lately ended up being a Sunday Times bestselling author complying with the publication of her publication Manifest: 7 Actions to Living Your Best Life. ‘ [Showing up] is a method that benefits literally every location of your life because it equips you to come to be the best variation of yourself that exists, personify the person you most intend to come to be, as well as assist you to unlock the unlimited capacity that you need to create the life of your dreams,’ she continues. What are the actions for manifesting? The thought of starting on your showing up journey might have you wishing to run for capitals, particularly if you’re not used to taking time out to rest with your thoughts. As opposed to immediately spending a lot of money on bullet journals, fancy looking felt tip pens or panicking at the sight of a yoga exercise mat, Nafousi says showing up begins with a specific acquiring clarity on how they actually want their life to look, and also just how they intend to really feel in six months or a year from now. For some, this could be accomplished by producing a vision board you ‘d see in a meeting space full of crucial expressions, timelines and also images. For others, it may entail visualization reflection. 1. Understand what you intend to manifest ‘ Be crystal clear about what it is that you wish to manifest and also be as outlined as feasible. If you want to manifest more money for instance, be specific – how much cash, by when do you intend to acquire this quantity, how does it feel to have this abundance of cash in your life, what would you make with the cash? On a piece of paper, jot down what exactly it is that you want and also visualise exactly how you would certainly feel if you reached your goals. Let your emotions cut loose and compose them all down. 2. Work on your attitude Attempt to conquer your limiting ideas as well as ensure your mindset is in positioning with your goals If you desire something, however deep down you do not believe you deserve it, you will certainly press that objective additionally away. 3. Take heartfelt activity in the direction of your goals. Put in whatever function you can from your side to relocate you closer towards your goal, and also leave the remainder to the universe. The experts recommend making actionable objectives that are sensible to meet as well as accomplish, whether it’s going on a daily stroll to inevitably reach your 10km run objective, or connecting to possible companies by means of email if you intend to alter professions by the end of the year. 4. Method gratitude Be grateful wherefore you already have as well as grateful wherefore various other beautiful true blessings are ahead. Stuart Sandeman, owner of Breathpod and host of BBC Radio 1’s Decompression Procedure states that gratefulness ‘will certainly help move your way of thinking from “absence” to “wealth”, which indicates you’ll choose to focus your energy on every little thing you have in contrast to what you do not’. 5. Increase your vibration Some of the methods I advise which help to raise my vibration are yoga, meditation, exercise, a plant-based diet plan, bordering myself with positive and motivating people, sleeping and waking very early with eight hours of rest, paying attention to self-development podcasts, journaling and also exercising appreciation. Check out ELLE UK’s listing of the most effective podcasts for 2022 right here. 6. Be open and responsive Energy streams, where interest goes. Give loving power to whatever is in line with your objectives. Once you are in this state of circulation, you will certainly start to draw in more of the right people and scenarios to aid you satisfy your goals. And in the due program of time, you will find yourself walking through doors you once hoped would certainly open up. When as well as exactly how should you manifest? From purchasing a Deliveroo to your door in under as well as hour, or selecting the express check out at Sainsbury’s, we’re all guilty of wanting instant gratification in today’s tech-driven world. Yet, in much the same manner in which treatment and exercise can not produce overnight results, materializing is a slow-burning method that requires dedication as well as perseverance. Materializing advantages actually every area of your life To start, Sandeman recommends those interested in symptom start their day with a devoted breathwork, visualisation as well as appreciation technique in the morning, and finish their day by developing a vision board to aid enhance the procedure. You can have a look at Sandeman’s day-to-day breathwork manifestation methods below. What are the largest mistaken beliefs and also issues bordering manifesting One of the biggest issues bordering materializing is individuals thinking that it’s an easy procedure ‘or that imagining one’s desires is enough’ to see modification, says Nafousi. For instance, by constantly telling deep space you desire a brand-new cars and truck, you’re not amazingly going to locate a shiny Ferrari on your driveway without doing some sensible job to attain that objective. ‘There is no replacement for hard work!’ she includes. Unlike common belief, hopefulness alone isn’t going to produce alter either. While some research studies have found those with a positive attitude are most likely to accomplish their aspirations, Fatmata Kamara, a psychological health and wellness registered nurse consultant at Bupa UK argues that success is affected by the behaviour adopted from a positive way of thinking, rather than manifesting alone. ‘Previous research study has likewise found the capacity to imagine occasions prior to they happen can assist with decision making procedure, suggesting the choice manufacturer is able to remove choices which would certainly be less successful,’ she claims.
<urn:uuid:3f0dac12-2836-4f25-9a57-fc9868c0ee53>
CC-MAIN-2022-33
https://www.kurtsik.org/how-to-properly-manifest-law-of-attraction/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00073.warc.gz
en
0.966846
1,668
1.703125
2
Bumpers should also be replaced when there is a major crack that goes through the entire piece of metal. Car owners should also consider replacing their bumpers when there is major paint damage. Car owners will be happy to know that a majority of bumper issues can be repaired instead of requiring an entire replacement. Can you drive with a damaged front bumper? Missing, unsafely attached, or damaged bumpers can make one’s car illegal. So, make sure that the front and rear bumpers are connected to the vehicle’s chassis or frame securely. Police officers may issue a ticket to drivers who are found operating unsafe cars. Is it worth replacing bumper? However, more often than not, replacing the bumper is unnecessary! … Bumper replacements are only necessary when the bumper is severely damaged and the total cost to repair it is higher than a replacement. Replacing a bumper could cost anywhere between $500-$700 for labor and $385-$925 for parts at an auto body shop. Is it better to repair or replace a bumper? However, extensively damaged bumpers are usually better replaced than repaired. Since the bumpers are designed as shock absorbers to lessen the force of an impact, repairing a compromised bumper could result in more damage during a future accident. What’s the difference between bumper and bumper cover? A bumper is meant to protect the car, other bodywork, and occupants during a collision. A bumper cover covers the actual bumper. It may be designed for additional safety, performance, or for aesthetic reasons. Can a front end collision cause engine damage? Potential Engine and Transmission Damage The final type of problems that can be caused by front end collisions include potential engine or transmission damage. … Both transmission and engine damage are costly but necessary to repair if damage has occurred. Can a bumper just fall off? Bumpers can come off during an accident or just by bumping into a curb while parking. The part of the bumper that may fall off is called the bumper fascia — the outer plate covering the actual bumper. The fascia provides extra spring upon impact, protecting your radiator and other vital engine parts from damage. Can a bumper be popped back in? As long as the clips havent been broken, yes it can be popped back in. only way to see if they’ve been broken is to pop it out and look, or just pop it back in and see if it holds. Just try to pop it back in, no harm in trying. Will be updated periodically. What happens if you don’t fix a cracked bumper? Cracks and Dents Affect the Bumper’s Structural Integrity Even if you fix the bumper, it will no longer have the same strength as it did before. If another collision happens, the bumper would not absorb the impact. This inability to absorb the impact could lead to further damage to your car’s body. Can a body shop fix a bumper? Typically minor scratches, dents and chips can be easily repaired using specialized tools found in an auto body shop. The shop will also repaint or blend any repaired areas on the bumper to make sure it is an exact color match to the rest of the vehicle. When should you replace your bumper? If there is a dent, it can be easily brought back to its original form by repairing. If there is any kind of breakage, it’s better to replace the bumpers to maintain uniformity and condition of your car. What causes bumper damage? Even so, a glancing blow can scrape the paint, crack the plastic, or leave a layer of the other car’s paint on your bumper. More severe impacts will cause the bumper to split open, dent, or crumple inward. An impact can also damage the hooks that attach the bumper to your car. Can you replace a bumper yourself? Replace a rusted or dented pickup bumper yourself A rusty or dented bumper can drag down the whole appearance of a pickup that’s in otherwise good shape. Having it replaced by a pro will set you back $1,000, but you can save $500 or more in labor and parts by doing the job yourself. It takes only a few hours. How much does it cost to replace bumper cover? Some models will cost as much as $1,500 for the bumper cover itself. All in all, you should expect to pay around $700 – $900 for a replacement job in most cars (for just one bumper, two bumpers will likely double the cost). Can you drive without a bumper cover? Yes it is illegal to drive without a proper bumper.
<urn:uuid:32c95c79-18bc-45e4-ae45-eaf998ccf1b8>
CC-MAIN-2022-33
https://rodgerschevrolet.com/auto-repair/do-i-have-to-replace-my-front-bumper.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00271.warc.gz
en
0.947276
969
1.882813
2
Caring for the community Johnson & Johnson taking responsibility for our society is embodied in our charity and staff volunteers’ activities as well as the efforts we make to sustain and preserve the environment. Carrying out the "Because we care, we act", Johnson & Johnson has been actively involved in various charity/philanthropic causes, caring for society in a variety of ways, including by providing direct funding for projects, donating products, employee participation, and contributing to communities, the general public, and the environment. Johnson & Johnson's contribution strategy is mainly focused on three areas: building health care capacity; saving & improving lives; preventing diseases & reducing stigma. We provide care for various aspects and various stages of a person's life. In 2012 alone, Johnson & Johnson implemented 33 contribution programs, such as Johnson’s Baby Touch, Safe Kids Program, Go West, Care for Elders in Psychological Crisis and Cultural Relics’ Preservation Project. 8,612 employees participated in the company organized volunteer activities, a total of 19,804 voluntary hours were contributed and 79,923 people in need were helped.
<urn:uuid:684e1871-87c4-42f0-af5f-df2ff92bcc75>
CC-MAIN-2017-04
http://jnj.com.cn/en/our-caring/our_responsibility/caring_for_community
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00226-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953283
227
1.882813
2
The Bradford Woods Elementary School Library provides students and staff access to materials in a variety of genres and subjects to enrich their love of reading. In addition to print books, we also have eBooks that students can access using our library catalog, Destiny Discover. Using TigerID, students access Destiny Discover to view both our print books and our eBooks. Students can then use their account to checkout eBooks while at home or at school – both during the school year and throughout the summer. They can also view their checkout history and create a list of favorite books that they have read. Students can also checkout eBooks by using their SORA app, which is found in TigerID. North Allegheny provides access to several subscription databases such as the PebbleGo collection, World Book Encyclopedia, Access PA/Power Library, CultureGrams and World Almanac for Kids. These resources are available both at school and at home. Links to these resources are located on a tab to the left called Elementary Library Resources. Logins for these databases are available through your child’s class in Blackboard – look under the Class Information tab in their Library/Tech Class in Blackboard. Each week, students attend library/information technology classes taught by the librarian, Mrs. Flaherty. Book exchanges, story times, the Celebration Book Club, March Book Madness (grades 4-5), the Summer Reading Program through Northland Library, author visits and other reading activities support the development of literacy. Classes in first through fifth grades will receive a report card grade at the end of each semester. Additional collaborative library/information technology lessons delivered in conjunction with classroom teachers are encouraged whenever possible because of the wide applicability of information and technology skills to all areas of study. We also host two book fairs a year where all money raised goes to purchase new books for the library and pay for other library-related programs. The BWE Library is a place to explore topics, discover new interests, learn about the world around us, ask questions, find answers, and unleash your imagination. We are so happy that you are here!
<urn:uuid:ea3007d5-2d89-4050-ae4d-2d18599bd26a>
CC-MAIN-2022-33
https://www.northallegheny.org/Domain/141
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00271.warc.gz
en
0.953528
432
2.515625
3
- You are here: Dissertation Defense – Monica Marks MSE Grad Presentation Wednesday, May 18, 2022 - 12:00pm Web Link: https://bluejeans.com/4142944177 Quaternary Ammonium Cation Bis-MPA Dendron PDMS Hybrid Copolymers: Synthesis, Characterization, Behavior and Functional Use as Macromolecular Additives in Sylgard 184 Prof. Mark Losego, Co-Advisor, MSE Prof. Mary Lynn Realff, Co-Advisor, MSE Prof. Julie Champion, ChBE Prof. Natalie Stingelin, ChBE/MSE Anita Mizusawa, PhD, Toray Advanced Composites This work aims to address the research question: Can quaternary ammonium cation dendron-PDMS hybrid copolymers be utilized as surface active macromolecular additives in Sylgard 184? In attempts to answer this question several steps were taken: - Synthesis of a library of quaternary ammonium cation (QAC) small molecule zwitterion building blocks of different hydrophobicity (alkyl chain lengths C4, C8, C12, C16) - Synthesis of a library of QAC bis-MPA dendrons of different branching (G1, G2 G3, G4) and different hydrophobicity (C4, C8, C12, C16) using esterification chemistry - Synthesis of a library of QAC bis-MPA dendron-PDMS hybrid copolymers of different branching (G1, G2 G3, G4) and different hydrophobicity (C4, C8, C12, C16) using CuAAC “click” chemistry - Development of processing and cure conditions in order to incorporate the hybrid additives into Sylgard 184 QAC bis-MPA dendrons were tested in solution for antimicrobial activity against gram negative E. coli, gram positive S. epidermidis and yeast S. cerevisiae. Preliminary surface testing was performed in combination with cure profile. In addition, dendron-PDMS hybrid behavior was probed via several physical characterization techniques. Ultimately, this work illustrates the first reported QAC bis-MPA type dendrons and their biocidal activity, the first reported dendron-PDMS hybrid copolymers and their behavior and preliminary studies displaying their potential use as surface active additives in Sylgard 184.
<urn:uuid:e0f131bf-a262-4f30-8e05-9a97d063cc42>
CC-MAIN-2022-33
https://www.mse.gatech.edu/events/dissertation-defense-%E2%80%93-monica-marks
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00671.warc.gz
en
0.862636
549
1.515625
2
Jerusalem is the holiest place for the Jewish people. On this mini walking tour, we’ll visit the Jewish Quarter in the Old City of Jerusalem and learn the basics of Judaism. We’ll talk about the history of the Jewish settlement in Jerusalem, visit the main sites of the Jewish Quarter, and even visit a synagogue. This tour is perfect for those who don’t know a lot about the Jewish people and want to get a bit familiar. We’ll meet at Jaffa Gate and continue on foot to the Jewish Quarter of Jerusalem. We’ll begin with the history of the area on which the Jewish Quarter stands. Then, we’ll get familiar with some of the main traditions and rituals of Judaism. We’ll also visit one of the quarter’s synagogues, and of course, finish the tour at the Western Wall, the holiest place to the Jewish people. Why join a mini tour? Israel Walking Tour’s mini tour is a great opportunity to tour fascinating places with a professional guide AND in a small group! On my mini tours, you won’t feel crowded with tons of other people in the group. That’s because there will be only up to 6 participants on each tour. This is a perfect option for solo travelers or couples who want to explore Jerusalem with a guide but don’t have the budget for a completely private tour. This tour is not what you’re looking for? Check out more mini walking tours in Israel. *Certified Israeli tour guide. *Entry tickets to one of the quarter’s synagogues. Personal expenses are not included. More to know * Meeting point: Jaffa Gate * Please come in modest clothes for the holy places. That means that cover the knees, and shirts with sleeves. Whoever will not come in appropriate clothing, will not be able to enter the synagogue and the Western Wall. * The tour will take about 3 hours. * Expect to walk about 2 km on this walking tour. * Please bring comfortable walking shoes, enough water for the tour, a hat, sunscreen, and sunglasses. Make sure you are dressed according to the weather forecast. * There is a long set of stairs going down to the Western Wall. Please make sure you are ok with walking down stairs before registering for this tour. I’m Lior and I’ll be your guide on this tour. I’m a certified tour guide and love to wander around the Old City of Jerusalem. As a Jew, I can tell you the insides of the Jewish traditions. I’m always happy to hear new ideas and questions. Check out the upcoming tours Want a private tour? Prefer a private walking tour in the Jewish Quarter of Jerusalem? Contact me or send me an email at firstname.lastname@example.org with your tour request.
<urn:uuid:1557775f-1a64-42ab-b875-d379ee1980b0>
CC-MAIN-2022-33
https://israelwalkingtours.com/into-the-jewish-quarter-of-jerusalem-a-mini-walking-tour/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00071.warc.gz
en
0.866699
614
1.804688
2
BELMONT, Calif., Jan. 14, 2016 /PRNewswire/ — SunEdison, Inc. (NYSE: SUNE), the largest global renewable energy development company, today announced it has signed solar power purchase agreements with 25 California elementary, middle, and high schools. SunEdison plans to install high-performance solar parking canopies at each of the campuses. By switching to solar, the schools expect to save more than $30 million on energy costs over the next 20 years. The five unified school districts saving money with the new solar systems are Dixon, Downey, Duarte, Livermore, and Newman Crows Landing. The districts signed 20-year power purchase agreements with SunEdison for more than 7.4 megawatts of solar, installed as parking canopies in each school’s parking lot. Solar parking canopies provide shade for parked cars while generating cost-effective, clean solar energy. “Installing a SunEdison solar system is one of the most immediate and effective means for schools to control their energy costs, and thanks to California’s reasonable net metering policy this option is available to all schools in the state,” said Sam Youneszadeh, SunEdison’s regional general manager of its Western U.S. solar business. “Using parking lot space for solar solves two problems: it provides much-needed shade for cars from the scorching California sun, and it lowers electricity costs – typically a school’s second largest expense. We’ve helped more than 150 schools become not only more self-sufficient, but also enabled them to free up funds to maintain their buildings and ensure they continue to be safe and positive learning environments.” With SunEdison’s solar power purchase agreements, these schools will enjoy the benefits of solar energy without any up-front cost. SunEdison installs, owns, and operates each system while the schools buy the solar electricity at lower rates than offered by their local utility. “This project shows how districts can become more self-sufficient financially,” said Dr. Allan Mucerino, Duarte Unified School District’s Superintendent. “And from an educational perspective, our students can learn how consumers make decisions about purchasing energy. I’m excited that we’re able to provide a hands-on experience for our students, with these solar systems we are teaching our students about one of the fastest growing sectors of the economy.” California joint powers authority SPURR helped the districts arrange the solar power agreements with SunEdison. SPURR helps its clients get a high-performance solar system from a reputable solar company through its competitive procurement program. “These school districts are getting the best value by choosing SunEdison,” said Michael Rochman, SPURR’s managing director. “SunEdison’s solar solutions are far superior to anything else we have seen in the marketplace, and they have the track record to ensure these systems are maintained their entire life.” The solar systems are expected to generate enough energy to offset more than half of all electricity used at each school. That same amount of electricity can power 1,700 Californian homes a year. The systems also avoid more than 136 million pounds of carbon dioxide emissions over 20 years—the same amount sequestered by 51,000 acres of U.S. forest a year. That’s an area more than one and a half times the size of San Francisco. SunEdison intends to complete the solar parking canopies in 2016. SunEdison Services, which manages, monitors, and reports energy output for SunEdison’s global assets, will operate and maintain the solar system. SunEdison is the largest global renewable energy development company and is transforming the way energy is generated, distributed, and owned around the world. The company develops, finances, installs, owns and operates renewable power plants, delivering predictably priced electricity to its residential, commercial, government and utility customers. SunEdison is one of the world’s largest renewable energy asset managers and provides customers with asset management, operations and maintenance, monitoring and reporting services. Corporate headquarters are in the United States with additional offices and technology manufacturing around the world. SunEdison’s common stock is listed on the New York Stock Exchange under the symbol “SUNE.” To learn more visitwww.sunedison.com. Forward Looking Statements This communication contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements involve estimates, expectations, projections, goals, assumptions, known and unknown risks, and uncertainties and typically include words or variations of words such as “anticipate,” “believe,” “intend,” “plan,” “predict,” “outlook,” “objective,” “forecast,” “target,” “continue,” “will,” or “may” or other comparable terms and phrases. All statements that address operating performance, events, or developments that SunEdison expects or anticipates will occur in the future are forward-looking statements. Forward-looking statements are subject to risks and uncertainties that could cause actual results to differ materially from those suggested by the forward-looking statements. Factors that might cause such differences include, but are not limited to, a variety of economic, competitive, and regulatory factors, many of which are beyond SunEdison’s control and are described in SunEdison’s Form 10-K for the fiscal year ended December 31, 2014, as well as additional factors it may describe from time to time in other filings with the Securities and Exchange Commission. Forward-looking statements provide SunEdison’s current expectations or predictions of future conditions, events, or results and speak only as of the date they are made, but SunEdison can give no assurance that these expectations and assumptions will prove to have been correct and actual results may vary materially. SunEdison disclaims any obligation to publicly update or revise any forward-looking statement, except as required by law. SOURCE SunEdison, Inc.
<urn:uuid:da7467ff-8da2-4d16-b81e-2d6c8352140e>
CC-MAIN-2022-33
https://solarenergymedia.com/solar-parking-lots-to-save-25-california-schools-more-than-30-million/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz
en
0.939561
1,312
1.757813
2
Jeremy Gay explains how you can build your own budget sump — even from a fire-damaged tank reject. A sump is such a useful addition to any reef aquarium that I decided to build one as cheaply as possible. It’s just a tank attached to your main tank in which you can put equipment, heat, change and filter water from that main tank. Because it is purely functional and doesn’t have to look good I decided to track down any old tank, in any condition, as long as it held water. One of my local shops had a fire a few years ago and was selling off fire-damaged stock. I purchased a terribly blackened tank for £10. It was old, scratched and covered in soot, but, pheonix-like, it would rise again. The result is a rather rough looking but highly functional marine sump and, best of all, it’s on a budget of just £40. That comes in about half what you would spend on a new equivalent. Bargain! No substitute for true quality This DIY sump is in no way meant to replace or replicate the excellent build quality you would expect from a professional aquarium manufacturer. I built this because I needed a sump, yet was short on time and finances. To find a reputable sump manufacturer refer to the classified ads at the back of this and every issue of PFK. 1. This 60 x 38 x 30cm/24 x 15 x 12” tank was a right old mess, so I stripped off all the old blue painted backing, pulled off the tatty black tank trim and gave the whole lot a good old scrub. 2. The tank has bracing bars, but this would only ever be half filled and be further strengthened by the baffles front to back. So, using a knife, I cut down the silicone and removed the old bracing bars. 3. I place the protein skimmer in the tank and then draw a line where the first piece of glass will be stuck. The first baffle will set the water height in the first chamber, which in this case is 20cm/8". 4. I bought four pieces of 6mm glass for £20. I simply hold them in place with sticky tape. If you want to move stuff later cut out the baffles and re-stick elsewhere. Aquarium-safe silicone costs £10 for a large tube. 5. To create the baffled system, the central pane needed to be raised up into position. CD cases were used to temporarily hold everything in place while the silicone cured, then the final panes were added. 6. Leave for 24 hours for the silicone to cure. The sump is now ready for protein skimmer, heater and return pump and can be installed in the cabinet underneath your tank.
<urn:uuid:40b44478-5d1f-4109-a22a-5481f160ff91>
CC-MAIN-2022-33
https://www.practicalfishkeeping.co.uk/features/how-to-build-a-sump-for-a40
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00077.warc.gz
en
0.965083
588
1.851563
2
It’s Research Wednesday! Where I share the latest, or most fascinating, in the science of friendship. “The majority of lonely people (62.5 percent) were married or living with others — an indication that feeling lonely and being alone are not the same. ‘It’s not the quantity but the quality of your relationships that matters,’ said Dr. Carla M. Perissinotto, a geriatrician who led the study. ‘You can’t tell who may be feeling lonely. It’s not just a little old lady living all alone.'” (“A Longer Life Is Lived With Company,” New York Times, 9/11/2012) The study mentioned above found what anyone who’s ever read this blog already knows: Make friends, live longer. But the interesting finding, IMHO (that’s webspeak, I just learned, for In My Humble Opinion. Aren’t I hip?), is the note that the people who qualify as lonely aren’t necessarily the ones in isolation. Intuitively, we know this. Maybe the loneliest you’ve felt was at a party full of people. Or you were alone at the movie theaters, enjoying Les Miz, and felt totally content. Personally, one of my loneliest times was when I realized I was short on local friends. This, even though I was newly married, had family less than a mile away, and went to an office full of ladies every day. Loneliness isn’t about how isolated you are, it’s how isolated you feel. It’s about self-perception. After all, plenty of people who find themselves in the exact opposite situation as I was in–surrounded by friends but lacking a romantic partner–feel lonely, too. According to Perissinotto, the necessary next phase of research is to find out why people are lonely. A pretty valuable first step given that apparently 20 percent of the population is chronically lonely. 20 percent! That’s nutters. Tell me: Have you ever felt lonely in a situation where you were anything but alone? Was it hard to talk about? Personally, I hated saying I was lonely, even when I was, because I felt like I sounded ridiculous. “I just got married and am constantly surrounded by people… I’m so lonely!” It sounds like melodrama, even if it’s real. Have you been there?
<urn:uuid:f073dfce-1ce5-4044-a5cd-9cd94e891cf1>
CC-MAIN-2016-44
https://mwfseekingbff.com/2013/01/09/being-alone-feeling-alone/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00126-ip-10-171-6-4.ec2.internal.warc.gz
en
0.96582
529
1.6875
2
Mish Moved to MishTalk.Com Click to Visit. Now that employment distortions related to the government shutdown in October are behind us, let's take a detailed look at the recent and growing discrepancy between jobs as reported on the establishment survey and employment as reported on the household survey. Jobs vs. Employment Discussion Before diving into the details, it is important to understand limits on data, and how the BLS measures jobs in the establishment survey vs. employment in the household survey. Establishment Survey: If you work one hour that counts as a job. There is no difference between one hour and 50 hours. Establishment Survey: If you work multiple jobs you are counted twice. The BLS does not weed out duplicate social security numbers. Household Survey: If you work one hour or 80 you are employed. Household Survey: If you work a total of 35 hours you are considered a full time employee. If you work 25 hours at one job and 10 hours at another, you are a fulltime employee. Household Survey vs. Establishment Survey Over time, and with revisions, the two data series move in sync (as they should in normal conditions): - People get jobs (employment should rise) - People lose jobs (employment should drop) However, there has been a serious discrepancy between the two data series in the last year that is not apparent in the above chart. A few tables will show what I mean. Household vs. Establishment Year-Over-Year Comparisons Household vs. Establishment Year-Over-Year Averages |Yoy Change Household||(5,435)||381||1,725||2,506||1,109| |Yoy Change establishment||(5,537)||707||1,968||2,204||2,293| |Monthly Average Household||-453||32||144||209||92| |Monthly Average Establishment||-461||59||164||184||191| Household vs. Establishment Month-Over-Month Changes |Month||Household||Establishment||M/M Change HH||M/M Change Establishment| The third table shows the volatile nature of the data, especially the household survey. It's the second table that is the important one. Take special note of the bottom two lines in the second table. Until this past year, the establishment survey and household survey moved tightly. In the last 12 months, the payroll survey averaged a gain of 191,000 jobs a month while the household survey averaged less than half of that at 92,000 jobs per month. Obamacare is the most likely explanation for the discrepancy. Recall that the definition of fulltime under Obamacare is 30 hours, but fulltime to the BLS is 35 hours. Next, consider what happens under Obamacare if someone working 34 hours is cut back to 25 hours, then picks up another parttime job. Prior to Obamacare 34 hours worked = 1 parttime job household survey 34 hours worked = 1 job establishment survey Person cut back to 25 hours and takes a second job for 10 hours Here is the new math 25 + 10 = 1 fulltime job on the household survey. 25 + 10 = 2 jobs on the establishment survey. In my example, the household survey totals up all the hours and says, voilla! (35 hours = full time). So a few extra hours that people pick up working 2 part time jobs now throws someone into full time status – thus no surge in part-time employment, but there is a surge in jobs. I commented on this discrepancy last month and repeat my claim again today. Request to ADP To prove my thesis, we need to weed out duplicate social security numbers. The BLS can't, but ADP can. I contacted them twice but to no avail. I would like ADP to crunch the data and determine how many duplicate social security numbers show up vs. the same months in prior years. If I am wrong it won't be the first time. But let's have a look at the numbers and see what they say. For further discussion and a synopsis of what really happened in today's job report, please see Beneath the Headline Numbers, Not a Good Jobs Report Mike "Mish" Shedlock
<urn:uuid:cb59efb8-1188-4052-9252-d63f6b3bb74a>
CC-MAIN-2016-44
http://globaleconomicanalysis.blogspot.com/2013/12/enormous-discrepancy-between-jobs-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00386-ip-10-171-6-4.ec2.internal.warc.gz
en
0.874786
895
1.78125
2
Why a Grandmother Went to Rural Texas and Used a Frog Secretion to Rid Toxins from Her Body Kimberly Chilcote, a grandmother of five, came to this tiny Texas town from Tucson to learn how to heal others with sapo—an Amazonian medicine derived from a tree frog, found in Bolivia, Brazil, Colombia, Peru, Venezuela, and the Guianas. But first, she must be healed. The air in the room is filled with the smell of Florida water. The medicine man sits in the corner, chanting and shaking a shacapa, a rattling leaf bundle. Chilcote puts protection oil on herself, and then the medicine man takes a tamishi vine stick, and burns three holes in her upper arm. He peels back the burned skin. On a long, flat, hardwood stick, there is a dried, clear lacquer-like substance, taken from an Amazonian tree frog. Using a knife, he mixes it with his own saliva into a froth that looks like egg whites. Then, using the knife, he applies it to her burned flesh. Within minutes, Chilcote, 46, is sitting, shaking a rattle, and the medicine man is singing a prayer of healing over her. Her face flushes, her chest heaves. Her cheeks swell—frog face, they call it. Then she vomits into a bag. After a few minutes, the medicine man feels her forehead. She is warm, and he asks if she’d like some water. She nods, and he gently pours water over her head. It drips down, and she sways. Fifteen minutes later, she’s laughing. Sapo, also called kampo or kambo, is made up of the secretions of the Phyllomedusa bicolor frog. This giant waxy monkey tree frog is found in aquariums throughout the U.S.—but the frogs in captivity don’t secrete sapo. The process of sapo collection does not harm the wild frogs. The frogs are captured for the collection process, then released back into the wild. Traditionally, sapo is used by the Matsés people of the Peruvian Amazon to sharpen their senses, improve their hunting skills and to be able to take long walks without hunger, thirst or exhaustion. They also use it to watch the development of a fetus. Peter Gorman, a journalist and chef, is also the medicine man (my words, not his) who has written about experiencing sapo, and was perhaps the first non-indigenous person to bring it out of the jungle. He is the one teaching Chilcote about the sapo. Sapo isn’t traditionally given in a ceremony like the one he performs, but he does so because, he says, sapo is abrupt and ceremony can ease people into the experience, where they otherwise might panic from the first come-on of the substance in their system. Sapo, says Chilcote after a few days of receiving the medicine, “is a group of many different peptides and amino acids that interact with our system. They cross the blood-brain barrier, and have a strong effect on the pituitary gland.” Sapo isn’t scheduled by the Controlled Substances Act, and it’s not illegal in the U.S. People claim the effect of sapo is an intense physical, emotional and spiritual experience that lasts about 15 minutes. Those who have taken the medicine report feeling clearer, sharper and better in the days following its administration. While some people will brag about how much sapo they’ve "done," each dose and experience can be different, and dosage isn’t determined by weight or body size. Chilcote believes sapo may be good for cardiovascular conditions, mental and emotional issues, and cancers. It’s gotten some attention for addiction cessation, but treatment for addiction would not typically occur with a few sessions of sapo alone. Chilcote says the sapo “pulls toxins from wherever we store them." Chilcote says a good candidate to use sapo depends on the kinds of medications a person is on and their stability and history. She note a person on chemotherapy drugs or with a history of extreme violence, among other things, might not be the best candidate for the medicine. And Gorman stresses it should not be used by pregnant or breast-feeding women. There are practitioners around the country who are reasonably public about sapo use. Some have studied in Brazil, or with Gorman in Texas. People should not order sapo online and should never self-administer a substance with no verified uses that may or may not be the real thing. After the purge of the sapo, the body needs to rest, says Chilcote. But then there is “a clarity.” “It comes on fast and hard and it’s brutal for 15 to 20 minutes. You are sure you’re dying, and then there’s a break, and you realize ‘I just made it through,’ and it feels beautiful. It’s brutal, and then beautiful. You feel clean and clear.”
<urn:uuid:af6fed94-bb15-43e3-9841-98583b24867a>
CC-MAIN-2022-33
https://www.alternet.org/2017/10/sapo-healing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00069.warc.gz
en
0.94966
1,108
2.46875
2
Once upon a time, medical diagnosis was a subtle art with simple tools—the sight, sounds, feel, even smell and taste of the patient, combined with personal and family history and the physician’s skill and experience. Even with the advent of more complex instruments, from stethoscopes and thermometers through scopes, monitors, and blood tests, the administration and interpretation of diagnostic procedures remained within the realm of medical practice, or at least within the treating physician’s extended world of medical or scientific colleagues at a hospital, with whom he enjoyed a direct collegial relationship. Lab tests for transfusion and transplant patients are created under exceptionally stringent standards, but are so customized that they do not lend themselves to manufacturing rules – Andrea Zachary of the American Society for Histocompatibility & Immunogenetics This situation has dramatically changed during the past 50 years. The rapid introduction of new diagnostics has greatly improved medical care, and also added new costs and scientific complexity. Two distinct paths for diagnostic tests emerged: some are still developed and produced by internal hospital analytic and pathology labs, but a growing number are purchased as packaged kits from manufacturers, or contracted out through commercial service companies. The oversight of the two routes is different. Those created in hospital labs, sometimes deprecatingly called “home brew,” fall under facility quality standards, notably the CLIA (Clinical Laboratory Improvement Amendments) regulations administered by CMS (Centers for Medicare & Medicaid Services). CLIA establishes lab requirements at five levels of stringency according to the complexity of the diagnostic tests. Higher-level CLIA certificates require regular facility inspections that evaluate physical set-up, procedures, personnel training and proficiency, quality control, and record-keeping. Labs must document their assessment of test clinical relevance, but CLIA inspectors only monitor analytic validation, relying on lab directors or clinical consultants to determine whether the tests actually yield the medically useful information they are purported to do. Other organizations, including the College of American Pathologists and the American College of Medical Genetics, provide guidelines or recommendations, and New York State has its own strict clinical lab requirements, though these all lack the nationwide consistency and authority of federal regulation. FDA regulation evolved along a path very different from the medical practice model. Originally focused on fraudulent and mislabeled medical products, the Agency included safety considerations in the Food Drug & Cosmetic Act of 1938, and required premarket demonstration of drug safety and effectiveness following the 1962 Kefauver-Harris Amendments. Some high-risk devices and a few diagnostics were informally regulated as drugs, but only with the Medical Device Amendment of 1976 was device regulation legally formalized. Diagnostics swept along with devices Diagnostics were swept along with devices. In 1976, aside from the raw chemical reagents and laboratory procedures – neither within FDA’s jurisdiction – the critical components of diagnostics were the hardware used to process tests. The original Division of Clinical Laboratory Devices evolved into the current Office of In Vitro Diagnostics (OIVD). If OIVD’s placement within CDRH was serendipitous, the flexible, risk-based Quality System Regulation approach to devices lends itself well to the explosive development of new diagnostic modalities (or as well as possible, with caveats). Drugs, devices, and biologics are different, hence there are different FDA centers with different rules. But diagnostics differ from all of them. And one diagnostic is not like another. FDA-regulated IVDs, like medical devices, are subject to various pre- and post-market requirements, and are classified based on risk. Fifty percent of IVDs are Class I, including erythrocyte sedimentation rate tests, differential culture media, and other low risk tests that are exempt from premarket clearance, requiring only registration, general controls, record-keeping, and post-market reporting. Forty-two percent are Class II – e.g. factor deficiency, antimicrobial susceptibility, or thyroid stimulating hormone tests – that require 510(k)s and special controls such as performance standards. Class III diagnostics that require PMAs, eight percent of the current universe, are high-risk tests whose results directly or strongly influence patient management of a serious disease, e.g. cancer screening tests, companion diagnostics, hepatitis B or C and HIV tests, and continuous glucose monitors. There are dangers of improperly validated tests, but there are more dangers from not having the tests – Paula Revell of the American Society for Microbiology Technically, FDA has authority over all diagnostics, as defined under 21 CFR 809.3: “In vitro diagnostic products are those reagents, instruments, and systems intended for use in diagnosis of disease or other conditions, including a determination of the state of health, in order to cure, mitigate, treat, or prevent disease or its sequelae.” As a practical matter, FDA has exercised “enforcement discretion,” a revocable hands-off attitude that has been used in other areas, as with certain health claims about foods, or allowing entry of limited quantities of some foreign drugs for personal use. The FDA stance on diagnostics began to shift in the 1990s. The “ASR rule,” a set of three 1997 regulations on analyte specific reagents, sought to ensure the quality of key components of finished IVDs or LDTs such as antibodies, nucleic acid sequences, receptor proteins, and ligands. A 2006 draft guidance on the regulation of In Vitro Multivariate Index Assays (IVDMIAs), revised in 2007 but never finalized, sought greater control over complex tests that used proprietary algorithms to analyze multiple variables in the diagnosis or prediction of disease. Here, too, the concern was a lack of scientific or methodological transparency, meaning that health care providers were unable to evaluate the clinical validity of tests they employed. At the same time, IVD manufacturers objected to the erosion of the level playing field. Tests with similar risks, or even the same test, can enter clinical practice through either the LDT or IVD route. Clinicians may not differentiate between the two, though the journey along the FDA-regulated pathway is longer, steeper, and more costly than that for LDTs, some of which are now offered beyond the walls of individual institutions through what seems to some an alternative, below-the-radar pathway with lower costs and less certain guarantees. FDA oversight of LDTs to change The July meeting opened with remarks by CDRH director Jeffrey Shuren and Principal Deputy Commissioner Joshua Sharfstein, who stated that FDA regulatory oversight of LDTs would change, though just how remains unknown. Nearly 70 stakeholder presentations and four panel discussions made clear that the journey would be neither straight nor swift. The most contentious discussions fell within a few areas: whether the FDA regulation of products or the CLIA regulation of laboratories is a more appropriate model; whether FDA procedures would stifle innovation, limit patient access to needed tests, and raise barriers for tests developed for small populations or to meet transient emergency needs; how diagnostic tests should be risk-stratified; and whether, if FDA does claim oversight of a vast range of LDTs, the Agency has the necessary resources. Need to create inventory of all available diagnostic tests Speakers and attendees generally agreed that an invaluable first step would be the creation of an inventory of what diagnostic tests currently exist. The NIH has a voluntary genetic test registry, but no broader, mandatory requirement is in place to identify the thousands of tests in use. Knowledge of what these tests are, of the evidence supporting their clinical utility, and the sort of post-market surveillance of adverse events required under FDA regulations, are distributed in the peer-reviewed literature and in the minds of lab personnel. There was general agreement that duplicative regulation of identical tests by multiple organizations is wasteful. Some maintained that the CLIA regulation of clinical laboratories is adequate, and that the LDT model fosters a valuable close working relationship between health care providers and the pathologists and clinical lab staff who help interpret diagnostic test results. On the other hand, FDA history is riddled with examples where the clinical judgment of practitioners, lacking the broad statistical evidence available to FDA, failed to perceive serious problems only discernible on a population-wide basis. The agility of labs to respond to urgent or immediate needs was a major topic of discussion. Col. Alan Magill of the Walter Reed Army Institute of Research pointed out that virtually all diagnostics used with tropical diseases are not and never will be FDA approved. These aim at very small markets and would vanish overnight if any obstacle were put in the road. Andrea Zachary of the American Society for Histocompatibility & Immunogenetics stated that lab tests for transfusion and transplant patients are created under exceptionally stringent standards, but are so customized that they do not lend themselves to manufacturing rules. Others pointed out the episodic, emergency need for certain tests, whether to look at health risks to workers cleaning up Gulf oil spills or at the World Trade Center site, or for public health surveillance of emerging pathogens or food-borne diseases. Richard Naples of BD, which manufactures regulated IVD kits, concurred that one size does not fit all diagnostic tests and that there must be flexibility commensurate with population size and clinical need. “There are dangers of improperly validated tests,” said Paula Revell of the American Society for Microbiology, “but there are more dangers from not having the tests.” This balance between patient access and the responsiveness of tests to public health needs against the desire to have consistent, high standards of analytic and clinical reliability were the most difficult challenge in the meeting. From FDA’s perspective, marketed manufactured tests fall under the Agency’s jurisdiction and must meet certain requirements. The opportunistic expansion by some laboratories and companies of LDTs into what look a lot like a commercially distributed IVD is a difficult phenomenon to manage. One size does not fit all diagnostic tests; there must be flexibility commensurate with population size and clinical need – Richard Naples of BD Defining risk for diagnostics If risk is the criterion for differentiating the type and degree of appropriate regulation, how is risk defined? Risk can be stratified according to the type of disease, and the risk-benefit profile of the medical intervention that follows a test, but a single diagnostic test is rarely the sole determiner of a life-or-death treatment. As representatives of the American Association for Clinical Chemistry and the College of American Pathologists pointed out, one should also factor in the complexity of the test, the ability of hospital labs or clinicians independently to gauge clinical validity, and the overall clinical context in which tests are employed. Presenters from laboratories and smaller, innovative commercial entities voiced concern over the potentially prohibitive costs of meeting CDRH requirements in a market where profit margins tend to be slim. There was also much worry that CDRH, already struggling to meet its current work load with existing resources, would be overwhelmed by the onslaught of thousands of new diagnostic tests. Suggestions for handling this challenge included grandfathering in relatively simple, low-risk tests that are well understood and widely accepted parts of current clinical practice (as pre-amendment devices were grandfathered in 1976), making extensive use of external review panels, or simply taking a more thorough and reasoned approach to the division of diagnostics between LDTs overseen under CLIA and IVDs regulated by FDA, but upgrading higher-risk LDTs to IVD status while down-classifying lower-risk IVDs. Direct-to-consumer diagnostic kits Considerable discussion hovered around direct-to-consumer marketed diagnostic tests, notably genomic screening services that purport to provide personal disease risk profiles. Though some presenters – mostly those who made and offered such testing services – defended the value of the information they provided, most commentators were critical of the sometimes questionable lab oversight and the lack of reliable medical guidance to help consumers understand the results they received. Arguably the most egregious problems with DTC genomics tests – some grotesquely highlighted in a 2006 GAO study on “nutrigenetic testing”—are more properly a target for FTC scrutiny than for the FDA. In the closing panel discussion at the end of two days, moderator Joan Scott of the Genetics Public Policy Center at Johns Hopkins asked for suggestions on next steps. “More workshops like this,” replied Elizabeth Kato of AHRQ, while other panelists suggesting letting FDA take the next step, further defining the questions, identifying stakeholders to help further flesh out the answers, and issuing a draft guidance that would elicit the next round of discussion. - Webcast of the FDA/CDRH Public Meeting: Oversight of Laboratory Developed Tests (LDTs), July 19-20, 2010. http://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/ucm212830.htm - Individual stakeholder presentations at the meeting: http://www.regulations.gov/search/Regs/home.html – docketDetail?R=FDA-2010 - PowerPoint presentations by FDA speakers can be requested by sending an e-mail to Katherine Serrano in OIVD Device Evaluation and Safety at firstname.lastname@example.org. - FDA Overview of IVD Regulation: http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/IVDRegulatoryAssistance/ucm123682.htm - Current CLIA regulations: http://wwwn.cdc.gov/clia/regs/toc.aspx - May 2010 AHRQ Technology Assessment, “Quality, Regulation and Clinical Utility of Laboratory-developed Molecular Tests”: http://www.cms.gov/determinationprocess/downloads/id72TA.pdf - July 2007 FDA Draft Guidance on IVDMIAs: http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/ucm079148.htm - September 2007 FDA Guidance: FAQs on Analyte Specific Reagents (ASRs): http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm078423.htm - April 2008 Final SACGHS report on the oversight of genetic testing: http://oba.od.nih.gov/oba/SACGHS/reports/SACGHS_oversight_report.pdf - 2006 Testimony before the Special Committee on Aging, U.S. Senate, on Nutrigenetic Testing: http://aging.senate.gov/events/hr162gk.pdf
<urn:uuid:c6aa9828-b81f-4afd-9829-6a125e96c33a>
CC-MAIN-2022-33
https://www.medtechintelligence.com/feature_article/lab-developed-tests-vs-in-vitro-diagnostics-balancing-patient-safety-access-innovation-and-commerce/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00073.warc.gz
en
0.937317
3,048
2.34375
2
Dr. Alexander Artikis from SKEL organised a half-day tutorial on Complex Event Recognition, during the European Conference on Artificial Intelligence (ECAI 2016), in the Hague, the Netherlands. Tutorial description: In this tutorial, we review complex event recognition technologies. We focus on the Chronicle Recognition System (CRS), the Event Calculus (EC), ProbLog and Markov Logic Networks (MLN). CRS is a purely temporal reasoning system that allows for efficient event recognition. EC allows for the representation of temporal and atemporal constraints. Consequently, EC may be used in applications requiring spatial reasoning. ProbLog and MLN, unlike EC and CRS, allow for uncertainty representation and are thus suitable for complex event recognition in noisy environments.
<urn:uuid:bac1ad37-4a84-423c-ba9a-b7a628c8cdb8>
CC-MAIN-2022-33
https://www.iit.demokritos.gr/el/newsevents/complex-event-recognition-tutorial-at-ecai-2016-2/?custom-field-7=nef_lab_group&custom-field-value-7=5136
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00277.warc.gz
en
0.825728
184
2.109375
2
Wondered where you'd left that millisecond pulsar of yours? Don't fret, Nasa's Fermi Gamma-ray Space Telescope has found it and nine other equally impressive pulsars. The "surprisingly powerful" NGC6624 millisecond pulsar has put scientists into a spin, as it challenges existing theories about how these objects form. Nine new gamma-ray pulsars were found by another team looking at the Fermi data. Scientists are excited about it because this one appears to have been born only millions of years ago, while similar pulsars are usually a billion years or more old. Paulo Freire, the study's lead author at the Max Planck Institute for Radio Astronomy in Bonn, Germany, said: "It's amazing that all of the gamma rays we see from this cluster are coming from a single object. It must have formed recently based on how rapidly it's emitting energy. It's a bit like finding a screaming baby in a quiet retirement home." Nasa describes a pulsar as a type of neutron star that emits electromagnetic energy at periodic intervals and the closest thing to a black hole that can be observed. A teaspoonful full of neutron star weighs as much as Mount Everest, crushing half a million times more mass than Earth into a sphere no larger than a city.
<urn:uuid:f12a1d78-b2d4-4a3e-b7aa-682c16539876>
CC-MAIN-2017-04
http://www.huffingtonpost.co.uk/2011/11/04/nasa-fermi-youngest-millisecond-pulsar_n_1075580.html?ref=tw
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00435-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956221
271
3.03125
3
|Número de publicación||US7657070 B2| |Tipo de publicación||Concesión| |Número de solicitud||US 11/336,468| |Fecha de publicación||2 Feb 2010| |Fecha de presentación||20 Ene 2006| |Fecha de prioridad||20 Ene 2006| |También publicado como||CA2573732A1, CA2573732C, CN101004412A, CN101004412B, CN103207105A, CN103207105B, EP1811281A2, EP1811281A3, EP1811281B1, EP2267427A1, EP2267427B1, US20070172100| |Número de publicación||11336468, 336468, US 7657070 B2, US 7657070B2, US-B2-7657070, US7657070 B2, US7657070B2| |Cesionario original||Sakura Finetek U.S.A., Inc.| |Exportar cita||BiBTeX, EndNote, RefMan| |Citas de patentes (19), Otras citas (13), Citada por (19), Clasificaciones (11), Eventos legales (2)| |Enlaces externos: USPTO, Cesión de USPTO, Espacenet| The present invention relates to a system of processing and examining biological specimens in a laboratory environment. In various settings, examination of biological specimens is required for diagnostic purposes. Generally speaking, pathologists and other diagnosticians collect and study samples from patients, and utilize microscopic examination, and other devices to assess the samples at cellular levels. Numerous steps typically are involved in pathology and other diagnostic process, including the collection of biological samples such a blood and tissue, processing the samples, preparation of microscope slides, staining, examination, re-testing or re-staining, collecting additional samples, re-examination of the samples, and ultimately the offering of diagnostic findings. Numerous medical or veterinary personnel may be involved in the diagnostic processes, including surgeons, phlebotomists or other operating personnel collecting samples, pathologist, histologists and other personnel processing, transporting and examining the samples and so on. The complexity of the tissue handling procedures from operating theatre to laboratory and back to diagnosticians or surgeons have become increasingly complex in large medical environments where high volumes of samples need to be handled, processed and examined on a daily basis. Various steps of the tissue handling procedures have been automated using instruments each of which typically are controlled by a dedicated computer or an on-board computerized controller. In some laboratories, information can be shared between automated instruments and/or a networked laboratory or hospital information system, such as to store patient or tracking data. One example of an automated instrument is an automated tissue processing system in which biological samples are fixed and infiltrated with paraffin in an automated fashion. Such a tissue processing systems are the TISSUE-TEK® VIP™ and the TISSUE-TEK® XPRESS® processing systems available from Sakura Finetek U.S.A., Inc. of Torrance, Calif. Another example of automation is an automated microscope slide coverslipper, which applies coverslips to microscope slides in an automated fashion. An example of such an automated coverslipper is the TISSUE-TEK® SCA™ coverslipper available from Sakura Finetek U.S.A., Inc. of Torrance, Calif. A further example of automation in laboratories is an automated microscope slide stainer, in which various stains, other reagents and washes are automatically applied to batches of microscope slides. An example of such an automated slide stainer is the TISSUE-TEK® DRS™ stainer system available from Sakura Finetek U.S.A., Inc. of Torrance, Calif. Despite the assistance of automated instruments, pathologists, other diagnosticians and laboratory personnel typically must be involved in numerous steps during the processing and examination of biological samples. For example, once a sample has been stained, the sectioned stained sample on a microscope slide typically is physically examined under a microscope. This typically involves transport of the microscope slide to a diagnostician who is located outside the laboratory, or in other cases may involve a diagnostician going to the laboratory to examine the microscope slide. Following this initial examination step, the diagnostician evaluates whether additional testing is required. Such additional testing might involve collecting further samples from a patient, or further testing of samples already collected. For example, the diagnostician may require that the existing sample be sectioned further and a different staining regimen or other protocol be applied. This can result in iterations of one or more of collection, grossing, processing, infiltration, embedding, sectioning, coverslipping, staining, examination etc. All of this can result in time delays, as well as tissue impairment. Following the iterations of additional tests and procedures, the pathologist repeats the examination process, and may then request still further tests in an iterative fashion until an ultimate finding is reached. Even with automated instruments in these processes, there are numerous transport, and human interventions required. Accordingly, there is a need for a system and method of biological specimen processing and examination that increases automation and accuracy involved in automation, reduces the amount of transport of processed specimens in the examination process, and reduces lag times, inconvenience and potential for degradation involved in iterative diagnostic and processing steps. Moreover there is a need for increased speed in these processes to enhance diagnosis and treatment. The present invention alleviates to a great extent the disadvantages of the known systems and methods of automated biological specimen processing and examination by providing an automated system in which biological specimens are processed with feedback data provided via networked communications, and wherein diagnostic image data is created and delivered to desired people, such as diagnosticians, and further instructions can be generated for iterative processing and review, without the necessity of individual slide review, if desired. In the present system, an automated processing apparatus is provided to collect and process biological samples, take images of the microscope data, deliver the images as desired for review and then determine further processing steps. In one example, a specimen is collected and then processed as desired in order to generate stained microscope slides. This includes automated tissue processing including paraffin infiltration, with data recorded in a hospital or laboratory information system. The processed specimen is passed on for embedding as desired, either in the same automated machine or in another one. Again, data is optionally generated and recorded. The embedded specimen may then be passed on for sectioning, with data again optionally generated and recorded. The sections are positioned on microscope slides as desired, coverslipped and optionally de-paraffinized, washed and stained in any desired order with data again optionally generated and recorded at any desired times in these automated processes. The completed microscope slides are imaged under microscopic examination, such as by using a digital camera incorporating a charge-coupled device (CCD) imager, and the image data is stored and delivered as desired. In one embodiment, the image data is passed on to an interpretation module, such as a pattern recognition system, which generates a preliminary diagnosis such as based on comparison with a pattern database or pattern determination protocol(s). Generation of additional microscope slides can be instructed automatically depending on the determination of the interpretation system (such as additional staining, or additional sectioning, staining coverslipping, or additional sample gathering, processing, embedding, sectioning, coverslipping etc.). Then additional images are created and examined using the pattern recognition module as desired, and any additional processing may be requested. In addition, a diagnostician, such as a surgeon or pathologist, may access the image data and the interpretation module reports at any point during or at the end of this process, to request additional diagnosis activity or to instruct the automated system as desired. In one example, the diagnostician orders that additional sectioning and staining protocols be performed. In addition, based on the image data or pattern recognition reports, the diagnostician may request delivery of one or more microscope slides for personal inspection. Alternatively, the system may automatically position one or more microscope slides in a designated area for delivery to the diagnostician, or the system may make the slides available in any other fashion, whereby examination by a diagnostician can be performed. In one embodiment, a “Reflex Staining” procedure is implemented. In that procedure, the system recommends specific staining and/or testing of biological samples based on pattern recognition reports of reports of an interpretation module. In another aspect of the invention, the movement of both information and biological samples are provided. For example, biological samples proceed through processing, embedding, microtomy, staining and optional coverslipping systems, and to an imager. Following imaging, the sample may undergo further sectioning, staining etc. prior to being sent to a pathologist or storage. The information generated in the material processing devices can be accessed and otherwise shared by other devices and computers, including the interpretation module, information systems, and diagnostician work station, among others. In another aspect of the invention, image data may be transmitted through an information path (such as a network or plural networks) to an interpretation module, which communicates with one or more databases and conducts pattern recognition to assist in the automated interpretation. Once the interpretation has generated results, the system may then route the material to undergo additional testing, request additional material to be tested, or route the material to a diagnostician or storage facility. In one example, the diagnostician may be notified that results are available for their consideration by electronic notification, such as by an e-mail, computer screen pop-up announcement, banner announcement, pager message or automated phone call. The diagnostician may consider the image data, the interpretation report, and/or other data, and may agree with the interpretation, disagree, provide other diagnosis, or order additional procedures. The diagnostician or a technician also can optionally intervene and override recommendations of additional procedures by the interpretation module. The system may route samples in various ways. For example, the sample may be interpreted as normal and routed to the diagnostician. The sample may alternatively be interpreted as abnormal or diseased and routed to the diagnostician with a preliminary finding. The sample could also be interpreted as abnormal with no identified finding or recommendation and therefore sent to the diagnostician for assessment. The interpretation module can access any desired data in order to formulate its report, in addition to the image data provided by the imaging system. For example, the interpretation module may consider the patient's records to determine prior conditions and known risk factors related to various ailments. Likewise, other images within the information system can be compared and contrasted to achieve multiple purposes, such as assessing the progression of a disease. Based on the information acquired in this process, the system can monitor a particular patient's ongoing condition, or it can be used on a broader scale to assess epidemiological information on a large number of individuals. In one summary aspect of the invention, a system of processing biological specimens is provided including a biological material handling system, a communication infrastructure in communication with the material handling system, slide imaging module and an interpretation module in communication with the slide imaging module utilizing the slide image data in order to generate an initial interpretation of the image data. The slide imaging module is in communication with the interpretation module either via a direct data link (wireless or wired), via the communications infrastructure or both. In other aspects of the invention a determination module generating staining instruction data and/or a slide staining module carrying out at least one staining procedure and receiving said staining instruction data, and/or a sectioning device, and/or a sectioning instruction receiving module, and/or a coverslipper module, and/or other material handling or processing components suitable for generating material image data and transferring it to either an automated system and/or human for viewing and interpretation. These and other features and advantages of the present invention will be appreciated from review of the following detailed description of the invention, along with the accompanying figures in which like reference numerals refer to like parts throughout. In the following paragraphs, the present invention will be described in detail by way of example with reference to the accompanying drawings. Throughout this description, the preferred embodiments and examples shown should be considered as exemplars, rather than as limitations on the present invention. As used herein, the “present invention” refers to any one of the embodiments of the invention described herein, and any equivalents. Furthermore, reference to various aspects of the invention throughout this document does not mean that all claimed embodiments or methods must include the referenced aspects. In overview, the system of the present invention involves apparatuses and systems for performing a series of operations including tissue collection, processing, examination and iterative processing or collection as shown in There are numerous possibilities for processing the sample for such examination. For example, a blood sample might be drawn and a small amount positioned on a microscope slide and coverslipped, such as done in a hematology laboratory. Optional staining or other testing protocol may then be performed. In the embodiments illustrated in After a sample, or group of samples, is prepared for examination, it may be examined and the data may be made available to a diagnostician and/or an interpretation module, as illustrated with box 30. In an embodiment, the examination is conducted optically such as via microscope, but other forms of examination may also be performed. Image data may be created, such as using a digital imager including CCD technology. The image data preferably is made available for access by a diagnostician if desired, and optionally the diagnostician is notified such as by electronic notification, such as by an e-mail, computer screen pop-up announcement, banner announcement, pager message or automated phone call. In a preferred embodiment, the image data may also be accessed, or otherwise made available, to an interpretation module. The interpretation module conducts digital processing, such as by using pattern recognition technology in order to develop a preliminary diagnosis, and generates instructions or recommendations for additional processing. The additional processing, illustrated with box 40, may include collecting additional biological samples, or further processing samples already collected such as running additional or different test procedures or staining protocols (as illustrated in boxes 10 and 20). Then examination, imaging and interpretation of the sample may be continued until the system or diagnostician deems it to be complete. These repeated tests and examinations are referred to herein as iterative processing, testing or examination. In another aspect of the invention, the diagnostician may access reports that are based on the comparison data created by the interpretation module. In a further aspect of the invention, the diagnostician may order or conduct further iterative processing, testing or examination. In the illustrated examples, the material pathways represent examples of transport paths that may be traveled by a physical sample in a laboratory or hospital. A typical progression of the material from one station to the next is depicted by the direction of the arrow. However, it should be understood that the processing stations are provided as examples, as are the directions of material flow. It shall be appreciated that more, fewer or other processing stations may be used in practice of the present invention, and/or more, fewer or other material paths and directions may be used in the practice of the present invention. Any form of transport may be used that is sufficient to transport the material as indicated by the material pathways. For example, material may be robotically transported from one station to the next. It may also, or alternatively, be hand carried from one station to the next. Additionally, one machine may perform multiple steps with no physical movement of the material from one station to another being required. In the embodiment of The processing and embedding station may include manual or automated processing leading to a paraffin infiltrated and embedded sample. It should be appreciated that processing and embedding system 1090 may include multiple pieces of automated processing equipment, or it may include a combination of one or more pieces of automated processing equipment with manual processes. In one example, an automated tissue processor is used at the processing and embedding station 1090. In another embodiment an automated embedding instrument is used. In another embodiment, these instruments are at two different locations and there is a material pathway (not shown) between them. Alternatively, they may be incorporated in a single instrument, or can be in two instruments with automated transport between. The same is true of all the processing stations discussed herein, namely that they can be combined and automated as desired. This reflects the flexibility of the present system in that it is adaptable to any of the numerous automated solutions available, under development, or conceivably developed in the future. Following processing and embedding system 1090 the material may be transported along path 1097 to a microtome station 1100, also referred to as “microtomy”. Material sections, or slices, are created in microtome station 1100, although it should be understood that any technology of creating sections thin enough for microscopic examination may be used. It should be appreciated that if thin material sections are not needed for examination microtomy would not be necessary. In a typical practice of the invention, sections created in microtome station 1100 are positioned on microscope slides. Following microtomy 1100, the biological tissue sections (and slides) may move along pathway 1107 to a staining system 1110. Any staining or other test protocol may be performed as desired. In a preferred embodiment, an automated stainer is used. In an example, staining with hematoxylin and eosin (“H & E”) is performed in an staining system 1110. Following staining, the samples may be transported along material path 1117 to a coverslipper system 1120 to be coverslipped. It should be appreciated that coverslipping and staining are both optional and, if included, may be performed manually or automatically. In the embodiment shown in In an embodiment, the coverslipper and staining systems are automated and combined in a single automated device. In another alternative, a coverslipper system is not required. In still another embodiment, the coverslipper system 1120 is located downstream of the imager 1130 in the material path. It therefore should be understood that if a coverslip is applied, that application may occur at any desired location, either before or after imaging and before or after staining. Generally speaking, following coverslipper system 1120, the pre-examination processing is complete, and the tissue sample(s) are ready for the examination processing. As the material proceeds along the material pathways and through the processing systems, information may be shared between the numerous devices using various information pathways that form a communications infrastructure 1200. It should be noted that communications infrastructure 1200 may be any form of communication system enabling communications between and amongst individuals, computer systems and/or automated processing systems. In an example, the communications infrastructure may be a computer network that is wired, wireless or a combination of wired and wireless. For example, information access points may be wired into the network and/or joined to the network via a wireless portal. Although the illustrated example shows a networked system in which communications are performed via a network, direct communications also may be conducted. For example in one embodiment, processing and embedding system 1090 may have a direct communications link with staining system 1110 and may access the communications network via a node in staining system 1110, or alternatively it may have a direct network link. It should be understood that any suitable communications pathway structure is envisioned which would enable suitable sharing of information between and amongst various system components. Likewise, it should be understood that, in other embodiments, not all of the system components may have a direct communications path. Furthermore, it should be understood that the communication pathways can take any form, such as digital, analog, wired, wireless, paper, oral, telephonic, etc. In an embodiment, a laboratory network may be provided as the portion of the communications infrastructure 1200 between and amongst the laboratory instruments, depicted with reference numbers 1080, 1090, 1100, 1110, 1120, 1130, 1140, 1230, and also the laboratory information system 1220 and other work stations 1240 and 1245 (which might include a computer system such as for example one or more personal computers and/or computer servers). The laboratory network may be networked with a hospital network that is also a part of the communications infrastructure 1200. In such an embodiment, other devices may have access to the information available on the laboratory information system 1220 or other laboratory devices via the communications infrastructure 1200. Such other devices include for example, diagnostician or administrator work stations 1240, a hospital information system 1210, and in some embodiments the interpretation module 1230 as well. It should be understood that the flexibility of the information pathways is directed to enable the necessary information flow to track biological samples being processed however desired, and to distribute the necessary information to the appropriate users. Numerous alternative communications system structures may be selected to meet this need, and the illustrated and discussed examples are provided for illustrative purposes only, not to limit the scope or flexibility of the system. Referring to the illustrated example, information pathway 1085 represents an example of a communications pathways between the grossing station 1080 and any other desired component via communications infrastructure 1200. Likewise, communications pathways 1095, 1105, 1115, 1125, 1135, 1155, 1215, 1225, 1235, 1245, 1255 and 1265 represent examples of communications pathways between processing and embedding stations 1090, microtomy 1100, staining system 1110, coverslipper system 1120, imager 1130, storage facility 1150, hospital information system 1210, laboratory information system 1220, interpretation module 1230, diagnostician work station 1240, technician work station 1250, and/or local or remote data storage 1260, or any other desired component. The sharing of information may be automated, manual or conceptual. For example, information may be shared directly by two machines in communication with each other, it may be made available to a user who can manually input it into another device, or a single machine comprising more than one device shown in In another embodiment of the invention, biological specimens, containers, workpieces, and locations throughout the system may be identified with machine understandable codes, such as provided by RFID tags, shape identifiers, color identifiers, numbers or words, other optical codes, barcodes etc. The identifiers can be recorded to generate data provided to a database, such as data maintained in data storage device 1260, by a PC (any computing devices), hospital information system 1210, laboratory information system 1220 or any combination thereof. Examples of data that may be tracked include patient information and history, information regarding biological sample(s) collected, arrival and departure times of biological samples, tests performed on the samples, processes performed on the samples, reagents applied to the samples, diagnoses made, associated images and so on. The next step performed by the automated system for processing and examining biological specimens is examining the specimen. In that step, the biological sample is received by imager 1130 after being processed for imaging as desired. In the example illustrated in The type of information generated is intended to be sufficient for the interpretation module 1230 to perform its interpretation processing and generate the desired report. The interpretation module 1230 may take any desired form, such as for example, a dedicated computing system, or alternatively it may be a module running on a computing system used for multiple purposes. In additional examples, it may be freestanding, a part of the imager 1130, part of the hospital information system 1210, part of the laboratory information system 1220, or it may be in any location where data may be received from the imager 1130. Although the figures depict a single interpretation module 1230, it should be understood that plural interpretation modules 1230 also may be used. In further examples, diagnostician work stations 1245 may include interpretation modules 1230 or interpretation module clients that enable the diagnostician to locally conduct an interpretation based on the data available including, without limitation, image data from the imager 1130. In the embodiment of Following imaging in the imager 1130, the further processing of the imaged sample may be routed either as directed by a technician, diagnostician or other person, or preferably as automatically indicated by the interpretation module 1230. The interpretation module 1230 for example is configured to determine whether the particular sample needs to undergo additional processing, in which case it may proceed along material pathway 1147, or alternatively that it should go to a storage facility 1150, in which case it proceeds along material pathway 1157, or alternatively that it should go to a diagnostician or other personnel for personal inspection, in which case it proceeds along material pathway 1247. In the illustrated example, where the sample proceeds for additional processing, sample is returned to stainer 1110 via pathway 1147 where it may undergo other operations such as special staining, immunohistochemistry (“IHC”), in situ hybridization (“ISH”), multiplexing or other staining or testing procedures. Subsequently, the sample may proceed along the material path as already discussed, for example, back to the imager 1130. Ultimately it is desired that the tested and imaged sample be stored as indicated by storage 1150. In this example, after personal inspection by a diagnostician or other person, the sample may be returned for further processing, such as to staining system 1110 or for storage, such as in storage facility 1150. Later, the processed sample can optionally be retrieved from the storage facility 1150 if desired. The work stations, such as diagnostician work stations 1240 or other work stations, such as technician work stations 1250 can have any desired structure, including computing systems in communication via the communications infrastructure 1200 with other components of the system. The work stations may optionally also include other components that might be useful in a work area, such as material storage units, furniture, phones etc. In an embodiment, the work stations 1240, 1250 provide access to information concerning the processing of biological samples, and the results of the processing, including image data from the imager 1130 and interpretation data or reports from the interpretation module 1230. Other examples of systems for processing biological specimens are illustrated in In the illustrated example, the image data proceeds along data path 2135 to interpretation module 1230, located in the reflex staining unit 2300. Although a direct data path is indicated, it should be understood that communication by any of the apparatus discussed previously, including networks, may be used to provide data to the interpretation module 1230, or to provide an access location at which the interpretation module 1230 can access data, such as a local or remote data storage module 1260. Although communications infrastructure 1200 is not illustrated in The embodiment shown in The system illustrated in Referring now to Briefly, material proceeds from grossing 1080 to processing and embedding 1090 to microtomy 1100 and then to reflex staining system 4300. From reflex staining system 4300, the material may be sent back and forth between diagnostician review 4150 and/or storage 4170, and also between each of those two stations. Each of these stations has the same description and material sharing characteristics as the corresponding station discussed above in relation to the embodiment of The embodiment shown in Communication infrastructure 4200 provides communication of information to other locations in the hospital and may provide communication of information to external locations, such as universities, other hospitals, remote facilities, and the internet. It should be understood that communication path 4205 between laboratory communication infrastructure 4400 and communication infrastructure 4200 is optional. If communication path 4205 is removed, the material and information handling apparatus embodiment shown in Next, a section is created, such as with a microtome or other sectioning device, as shown in step 5120. Once sectioned, the material is then placed on the slide, and may undergo H & E staining, as shown by steps 5130 and 5140. Two pathways are shown with these steps to illustrate the optional order these steps may be performed. Following these procedures, a coverslip optionally may be placed on the slide in the optional coverslipping step 5150. Imaging 5160 is the next step shown in the flow chart of After the interpretation has identified the material as normal, abnormal with a recognized abnormality, or abnormal with an unrecognized abnormality requiring no additional testing, the decision from Other Tests Required on Slide Based on Interpretation? step 5180 results in a “no” response. Once a “no” result occurs, the material and slide can be sent to the diagnostician or stored in the end step Send Slide to Pathologist or Storage 5210, discussed in more detail below. Additionally, a “no” result from Other Tests Required on Slide Based on Interpretation? 5180 step also advances the process to the next decision step, which determines if additional sections are required based on the interpretation, as shown in step 5200. Step 5200 queries whether one or more additional slides should be prepared to undergo additional testing. This step is answered in the affirmative in the event that the material under consideration was found to be abnormal and further testing of other samples is desired. A “yes” response from step 5200 returns the process to the earlier step 5120 of creating a tissue section and the process is continued from that step. In another embodiment of this system, several sections of biological material initially may be prepared at step 5120. In that embodiment, an affirmative response from the Other Sections Required Based on Interpretation? step 5200 directs the staining of one of the already prepared slides. Still referring to the Other Sections Required Based on Interpretation? step 5200 of In an alternate embodiment, each slide is sent to storage in the end step and the images, interpretations, and other information are sent to the diagnostician in a piecemeal fashion. For example, this embodiment may deliver information electronically to the diagnostician's computer so that the diagnostician has real-time access to information and the progression of the system operation. At the conclusion of all imaging and evaluation of the biological material, a message can be communicated to the diagnostician advising of the completion of the process. Once the pathologist or other diagnostician has reviewed any or all of the information communicated by the process shown in The flow chart shown in The interpretation module system begins with the receipt of image information from imaging step 5160, as shown in step 6100. Preferably, this image data information is automatically transferred between the devices. After the interpretation module receives the image data, it may gather information from one or more available databases in access database step 6110. The databases may be included in a hospital information system, a laboratory information system, and/or a patient database, such as those discussed above. Information from the databases may be filtered or screened as desired in the optional narrowing classification step 6120. In this step, criteria may be utilized to focus the database information to specific data, or alternatively to exclude certain data from the database information. For example, information regarding tissue type may be used to confine the communications to information concerning tissue of the same type of material. As another example, the communicated information may focus on images taken of prior samples from the same patient in order to facilitate tracking the progression of that person's particular condition. Once the interpretation module has access to the database and any optional narrowing criteria has been applied, it may proceed to the conduct pattern recognition step 6130, in that step, the image data of the sample is compared known information from the database or databases. After the comparison is made, the next step 6140 requires an interpretation in which the interpretation module may provide a preliminary finding based on the comparisons made during the pattern recognition. The system may optionally repeat the method by returning to the access database step 6100 one or more times before proceeding. In a preferred embodiment, the interpretation step 6140 also generates information relating to whether additional tests or staining should be conducted on the already tested samples and/or whether additional samples should be tested. The information generated can assist a diagnostician or the system in making decisions later in the flow chart shown in Thus, a slide management and interpretation system and method are provided. One skilled in the art will appreciate that the present invention can be practiced by other than the preferred embodiments which are presented in this description for purposes of illustration and not of limitation, and the present invention is limited only by the claims that follow. It is noted that equivalents for the particular embodiments discussed in this description may practice the invention as well. |Patente citada||Fecha de presentación||Fecha de publicación||Solicitante||Título| |US4761075 *||8 Dic 1986||2 Ago 1988||Hitachi, Ltd.||Cellular analysis system| |US5733721 *||20 Nov 1992||31 Mar 1998||The Board Of Regents Of The University Of Oklahoma||Cell analysis method using quantitative fluorescence image analysis| |US5933519 *||3 Jun 1997||3 Ago 1999||Neo Path, Inc.||Cytological slide scoring apparatus| |US6032678 *||13 Mar 1998||7 Mar 2000||Shraga Rottem||Adjunct to diagnostic imaging systems for analysis of images of an object or a body part or organ| |US7050620 *||28 Mar 2002||23 May 2006||Heckman Carol A||Method of assaying shape and structural features in cells| |US7346200 *||18 Nov 1999||18 Mar 2008||Ikonisys, Inc.||Method and apparatus for computer controlled cell based diagnosis| |US7346205 *||25 Mar 2004||18 Mar 2008||Bartron Medical Imaging, Llc||System and method for rapidly identifying pathogens, bacteria and abnormal cells| |US20030228038 *||31 Mar 2003||11 Dic 2003||Chroma Vision Medical Systems, Inc., A California Corporation||Method and apparatus for automated image analysis of biological specimens| |US20040253662||26 Oct 2002||16 Dic 2004||Heid Hans L.||Method and devices for the cross-referencing of identification of object supports for microtomised analytical samples and for the generation of said identification| |US20050144044||29 Sep 2004||30 Jun 2005||Samsung Electronics Co., Ltd.||System and apparatus for efficiently utilizing network capacity in a healthcare setting| |US20050159982||10 Ene 2005||21 Jul 2005||Wayne Showalter||Laboratory instrumentation information management and control network| |US20050235542||12 Abr 2005||27 Oct 2005||Leica Microsystems Nussloch Gmbh||Microtome for producing thin sections| |US20060210432||8 Mar 2005||21 Sep 2006||Cytyc Corporation||Specimen vial cap handler and slide labeler| |WO2001037192A1||18 Nov 1999||25 May 2001||Ikonisys, Inc.||Method and apparatus for computer controlled cell based diagnosis| |WO2003045560A2||22 Nov 2002||5 Jun 2003||Lab Vision Corporation||Automated tissue staining system and reagent container| |WO2004059288A2||22 Dic 2003||15 Jul 2004||Dakocytomation Denmark A/S||Isolated communication sample processing system and methods of biological slide processing| |WO2004074845A2||23 Feb 2004||2 Sep 2004||Vision Biosystems Limited||Analysis system and procedure| |WO2004099937A2||5 May 2004||18 Nov 2004||Robodesign International, Inc.||Microarray dispensing with real-time verification and inspection| |WO2007078842A1||15 Dic 2006||12 Jul 2007||Ventana Medical Systems, Inc.||Automated lean methods in anatomical pathology| |1||"Absolute Intelligence," http://www.sakura-americas.com/products/DRS.html, Jun. 29, 2005.| |2||"Automation Systems manage hematology testing processes," Thomas Publishing Company, Nov. 15, 2005 (4 pages).| |3||"Creating new horizons in productivity," http://www.sakura-americas.com/products/xpress.html, Jun. 29, 2005.| |4||"Discover the unique union of staining and coverslipping," http://www.sakura-americas.com/products/prismafilm-1.html, Jun. 29, 2005.| |5||"Fast coverslipping; quality results," http://www.sakura-americas.com/products/sca.html, Jun. 29, 2005.| |6||"Our Products," http://www.sysmex.com/usa/ourproducts/our-products-detail.cfm?p-id=33, Dec. 22, 2005.| |7||"Sysmex Releases the World's First Automated Hemotology Slide Preparation Unit with Web Camera," http://www.sysmex.co.jp/en/news/press /2004/040909.html, Sep. 9, 2004 (3 pages).| |8||"Training and Workshops," http://www.biogenex.com/rpfile.php?pagename=workshops, Dec. 22, 2005.| |9||"Discover the unique union of staining and coverslipping," http://www.sakura-americas.com/products/prismafilm—1.html, Jun. 29, 2005.| |10||"Our Products," http://www.sysmex.com/usa/ourproducts/our—products—detail.cfm?p—id=33, Dec. 22, 2005.| |11||Anderson, Ross, "Haematology Completely Automated Using an Innovative Dual HST Transportation System, Meru Work Area manager and Molis Software," Sysmex J. Int., 2003, pp. 48-52, vol. 13, No. 1.| |12||European Search Report for EP Appln No. 07100808.0, mailed Dec. 27, 2007 (8 pages).| |13||Gombrich, Eric, et al., "Toward an automated paradigm for cancer screening," IVD Technology, Nov./Dec. 2001 (10 pages).| |Patente citante||Fecha de presentación||Fecha de publicación||Solicitante||Título| |US8139831 *||2 Dic 2008||20 Mar 2012||Siemens Aktiengesellschaft||System and method for unsupervised detection and gleason grading of prostate cancer whole mounts using NIR fluorscence| |US8165363 *||2 May 2008||24 Abr 2012||Aperio Technologies, Inc.||System and method for quality assurance in pathology| |US8571286||23 Abr 2012||29 Oct 2013||Leica Biosystems Imaging, Inc.||System and method for quality assurance in pathology| |US8719053||16 Jul 2004||6 May 2014||Ventana Medical Systems, Inc.||Laboratory instrumentation information management and control network| |US8812329||4 Abr 2007||19 Ago 2014||Ventana Medical Systems, Inc.||Laboratory instrumentation information management and control network| |US8885900||29 Oct 2013||11 Nov 2014||Leica Biosystems Imaging, Inc.||System and method for quality assurance in pathology| |US8977017 *||15 Sep 2011||10 Mar 2015||The General Hospital Corporation||System and method for support of medical diagnosis| |US9052256||11 Mar 2014||9 Jun 2015||Leica Biosystems Nussloch Gmbh||Method for processing and embedding tissue| |US9097629||11 Mar 2014||4 Ago 2015||Leica Biosystems Nussloch Gmbh||Tissue cassette with retractable member| |US9122905||14 Jul 2014||1 Sep 2015||Leica Biosystems Imaging, Inc.||System and method for quality assurance in pathology| |US9150907||15 May 2014||6 Oct 2015||General Electric Company||Microfluidic flow cell assemblies and method of use| |US9349036||31 Ago 2015||24 May 2016||Leica Biosystems Imaging, Inc.||System and method for quality assurance in pathology| |US9389154||11 Mar 2014||12 Jul 2016||Leica Biosystems Nussloch Gmbh||Tissue cassette with biasing element| |US20050038676 *||16 Jul 2004||17 Feb 2005||Wayne Showalter||Laboratory instrumentation information management and control network| |US20070196909 *||4 Abr 2007||23 Ago 2007||Wayne Showalter||Laboratory instrumentation information management and control network| |US20080273788 *||2 May 2008||6 Nov 2008||Aperio Technologies, Inc.||System and Method for Quality Assurance in Pathology| |US20090161928 *||2 Dic 2008||25 Jun 2009||Siemens Corporate Research, Inc.||System and method for unsupervised detection and gleason grading of prostate cancer whole mounts using nir fluorscence| |US20120135449 *||3 Feb 2012||31 May 2012||General Electric Company||Iterative staining of biological samples| |US20130071002 *||21 Mar 2013||Takeshi Otsuka||System and method for support of medical diagnosis| |Clasificación de EE.UU.||382/128, 382/133, 382/209, 382/217, 382/129, 382/181| |Clasificación cooperativa||G01N15/1475, G01N1/312| |Clasificación europea||G01N1/31B, G01N15/14H3| |20 Ene 2006||AS||Assignment| Owner name: SAKURA FINETEK U.S.A., INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEFEBVRE, GILLES;REEL/FRAME:017502/0300 Effective date: 20060116 Owner name: SAKURA FINETEK U.S.A., INC.,CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEFEBVRE, GILLES;REEL/FRAME:017502/0300 Effective date: 20060116 |8 Feb 2013||FPAY||Fee payment| Year of fee payment: 4
<urn:uuid:7a78dca6-b643-416d-a02b-a351b3a14250>
CC-MAIN-2016-44
http://www.google.es/patents/US7657070?dq=flatulence
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00550-ip-10-171-6-4.ec2.internal.warc.gz
en
0.871486
9,134
1.539063
2
Sometime in the 1890s the society based in the Mount Zion Chapel, Commonhall Street must have decided to build a new chapel as headquarters of the Second Circuit. ‘On 20th April 1898 the stone laying ceremony took place for a replacement church, the ‘City Temple’ in Hunter Street. This was the only Methodist Church within the City Walls and was officially opened on 1st February 1899. It took 22 years to clear the debt from building this church. … Hunter Street was a family church with a very warm, friendly spirit. The final service at the church was on 10th September 1967, just 68 years after its opening. The congregation then united with those of St. John Street and George Street and, after the transition period, settled in the renewed premises at Wesley [St John Street] in February 1970.’ The chapel was described as ‘brick with stone dressings, with a tower and spire’ . There are several images in Reference . It is marked as ‘Church’ on a 1911 map , on the south side of Hunter Street at the junction with Hunter’s Walk, about 200m west of the cathedral. It could seat 575 (slightly smaller than the Commonhall Street chapel that it replaced). On 28th October 1903 a census was taken in Chester of religious buildings and attendance at worship. The record for the Hunter Street Chapel was: capacity 500; attendance 282 . The Chester Record Office holds Marriage Registers for 1916-48. 1. Bicentennial History: Wesley Methodist Church, Chester’ by Brian C. Heald 2012 page 21 accessed online Jan 2021. 2. British History Online; then Browse catalogue>Victoria County History – Chester>A History of the County of Chester: Volume 5 Part 2, the City of Chester: Culture, Buildings, Institutions>Churches and religious bodies: Protestant Nonconformity>Methodists>Primitive Methodists
<urn:uuid:b43fb5b2-f3de-485a-a1ae-98232b3bf4e8>
CC-MAIN-2022-33
https://www.myprimitivemethodists.org.uk/content/chapels/cheshire/c-d-cheshire/chester-city-temple
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00471.warc.gz
en
0.959952
415
2.421875
2
Around 60% of all web servers ran Linux, but we don’t have any data that could tell which among the Linux distributions are widely used or preferred. If you ask me, here are some of the best and perhaps popular distro for web servers: Slackware is the oldest surviving Linux distribution so there are no doubts about its reliability. It aspires for design stability and simplicity, using plain text files for configuration and making as few modifications to software packages as possible from upstream. As they say, there is no better, more customizable, standard distro than Slackware. Gentoo is a highly flexible and fast distro that is built on top of the Linux kernel and based on the Portage package management system. It describes itself as a metadistribution, “because of its near-unlimited adaptability”. Unlike a standard software distribution, the user compiles the source code locally according to their chosen configuration in Gentoo. Its package management is designed to be versatile, , portable, easy to maintain, and optimized for the user’s machine. Debian is a strict advocate of the free and open source philosophies. It is known for amplitude of options like its support for a wide range of computer architectures that ranges from the Intel/AMD 32-bit/64-bit to the ARM architecture. Some of the others notable features of Debian are the APT package management system, repositories with large numbers of packages, and the high quality of releases. RHEL (Red Hat Enterprise Linux) When we talk about Linux web servers, we shouldn’t fail to include RHEL. It is released in server versions for x86, x86-64, Itanium, PowerPC and IBM System z. Though it’s proprietary, it costs less than Microsoft’s web server software. RHEL is also known for its excellent technical support and service. If you want to get all the goodness of Red Hat Enterprise Linux but don’t want to spend a dime, then CentOS is for you. CentOS is based on RHEL and aims to provide a free enterprise class computing platform and strives to maintain 100% binary compatibility with its upstream distribution. Technical support is mainly provided by the community through its official mailing lists, web forums, and chat rooms. But don’t just limit your choices from my list, as there are other distros that are as capable as the above mentioned.
<urn:uuid:23c9230d-a28e-41ee-87bf-792ab35c24ae>
CC-MAIN-2022-33
https://www.getwide.com/best-linux-distro-for-web-server/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00269.warc.gz
en
0.940621
514
2.140625
2
The lonely life of Elizabeth Bishop A new biography sheds light on Elizabeth Bishop, one of America’s finest poets Elizabeth Bishop: A Miracle for Breakfast. By Megan Marshall. Houghton Mifflin Harcourt; 365 pages; $30. ELIZABETH BISHOP did not like to give much away about herself. While others were writing confessional poetry, she ensured that she wrote at a distance. Poems which in original drafts mentioned characteristics of a lover were revised, sometimes as many as 17 times, in order to make the final work as polished and as impersonal as possible. She was a lesbian who never publicly admitted to the term, even as younger gay poets in the 1970s embraced it (partners were friends or even a “secretary”). She was an alcoholic who was ashamed of her drinking, but never sought long-term treatment. Poetry was a way of “thinking with one’s feelings”, but those feelings were often obscured, hidden within a parenthesis or written from the perspective of someone very different from herself. This is why she makes a fascinating subject for a biographer. “A Miracle for Breakfast”, the first full-length biography in two decades, ably manages to bring Bishop to life. Megan Marshall, who was taught by the poet at Harvard in 1976, recalls how she could seem prim and aunt-like to her students: “a grimmer, grayer, possibly even smaller woman than I’d remembered…dressed smartly but uncomfortably.” Yet beneath this prim veneer of control was a rich, turbulent personality. Bishop herself was aware of the contrast, writing to one lover while she was teaching at the University of Washington in 1966: “Everyone treats me with such respect and calls me Miss B—and every once in a while I feel a terrible laugh starting down in my chest…how different I am from what they think, I’m sure.” Bishop’s past was indeed more complicated than many knew, even those close to her. Ms Marshall has had access to a previously unknown trove of letters that Bishop wrote to her psychiatrist and to various lovers, which became available after the death of her executor and last lover, Alice Methfessel, in 2009. These depict an unsettled, unhappy childhood. When Bishop was just three her mother was hospitalised for mental illness. She was brought up by a series of relatives. One uncle molested her and was violent, grabbing her by the hair and dangling her over of the railing of a second-floor balcony. “Maybe lots of people have never known real sadists at first hand,” Bishop later wrote to her psychiatrist. “I got to thinking that they [men] were all selfish and inconsiderate and would hurt you if you gave them a chance.” Bishop’s adult life was no less tumultuous. A man she briefly dated committed suicide a year after she rejected his marriage proposal. He sent her a postcard as a suicide note: “Elizabeth, Go to hell.” One of her lovers managed to crash a car carrying Bishop and one of her friends (whom she was also in love with); Bishop and her lover were fine, but her friend, who had been a painter, lost her arm and could not paint again. Bishop often drank herself into a stupor, starting “the hour before dawn” and sometimes continuing even until she was hospitalised. Her partner of over a decade, Lota de Macedo Soares, a Brazilian self-taught landscape designer, overdosed after a breakdown partly caused by Bishop’s infidelity. Ms Marshall’s skill prevents this narrative from becoming depressing. The Bishop that emerges from her telling may be at times morose or ashamed of her drinking (wishing, as she wrote to Methfessel, that she could be more like writers who “drink worse than I do, at least badly & all the time, and don’t seem to have any regrets or shame—just write poems about it”). But she also appears vivacious, attractive and full of life. Even the worst heartbreak brought out wonderful poetry, such as her most famous poem, “One Art”, which starts: “The art of losing isn’t hard to master;/so many things seem filled with the intent/to be lost that their loss is no disaster.” Three relationships in particular illuminate a lighter side to Bishop: her time with Soares in Brazil, which inspired some of her finest work (“Hidden, oh hidden/in the high fog/the house we live in,/beneath the magnetic rock…”); her later years with Methfessel; and her friendship with Robert “Cal” Lowell, the one other writer with whom she immediately felt at ease. Bishop first met Lowell in 1947 at a dinner party in New York. They stayed in touch for the rest of their lives, writing over 400 letters to one another. Lowell supported her and helped her find grants and postings, and praised her work. He carried around a poem of hers in his wallet as a talisman. They were so different; Lowell wrote hundreds of confessional poems, often quoting from other people’s letters to him. The relationship between the two is one of the joys of this book. As Ms Marshall puts it: “Elizabeth would always remember the younger poet’s endearingly ‘rumpled’ dark-blue suit and the ‘sad state of his shoes’ on the night of their first meeting, how handsome he was despite needing a haircut, and, most of all, ‘that it was the first time I had ever actually talked with someone about how one writes poetry’.” Ms Marshall intersperses chapters about Bishop with chapters of memoir, which touch upon her time as Bishop’s student. This gives the biography a sense of authenticity, but it interrupts the flow of the narrative. It also seems in sharp contrast with her intensely private subject. But this is a small price to pay for a biography which at last illuminates one of America’s finest, and most elusive, poets. This article appeared in the Culture section of the print edition under the headline "The art of losing" From the March 18th 2017 edition Discover stories from this section and more in the list of contentsExplore the edition With tellingly varying degrees of success The author has long tracked the world’s slide into rancorous sectarianism The celebrated film composer is making rock records once more
<urn:uuid:9a244487-75bf-415b-a06d-13260fefd104>
CC-MAIN-2022-33
https://www.economist.com/books-and-arts/2017/03/16/the-lonely-life-of-elizabeth-bishop
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00066.warc.gz
en
0.984895
1,389
1.578125
2
The commercial and career interests of a wide range of writers and speakers are best served when they are communicating to an audience. Boldly stated, it is in their personal interest to publicly disseminate information to an audience at every opportunity. That opportunity might present itself by the writing of a book, the publication of an article, or even the release of a new TV show. But I am not just talking about writers, journalists and academics! There is a wide range of people who (somehow) benefit from writing or speaking about particular matters upon which they claim (or profess) knowledge. Nearly all communities (large or small) are populated by such persons, who we might loosely label as ‘publishers’. For present purposes, a ‘publication’ occurs (in law) each time a publisher separately communicates with an audience. Indeed, this blog is but one example of such a ‘publication’. Although strictly not in ‘writing’ in the traditional sense, it has been communicated online. Therefore it has been communicated to a section of the public. It can also (hopefully) be readily understood by the ‘audience’ who reads these blogs. In defining that audience, it might refer to the potential readers of legal blogs who can read English and who understand the basic messages being conveyed. Better known examples of ‘publications’ include newspapers, TV programs, radio talk-back shows and movies. However, the phenomenon of social media has spawned a vastly greater platform for the publication of information to a wider public. The potential audience to a particular publication might consist of readers or viewers from the various continents and countries of the world (in whichever language they read or speak). Nor does the publication have to be in written form. The various videos and clips on YouTube are examples of non-written publications (being in a musical or visual form). And it is not suggested there is a numerical limit on the size of an audience. The relevant audience to a particular publication could range between a single person through to a large social or business gathering. Therefore, the following person or persons constitute an audience to a ‘publication’ in the eyes of the law: - The reader of a handwritten note (i.e. sent to that person) - A gesture made by a spectator in response to a referee or umpire’s call - A comment yelled out at a football or hockey match - A discussion between a few friends at a café or - A lecture given at a business or an educational function As we have said, the single publication of a note by (eg. passing it to a friend) is capable of constituting a ‘publication’ to that particular person. If the Law rules that the publication is defamatory in its content, then the publisher may be sued in a Court of law. Whether a publication is defamatory will be the subject of a separate blog in this series. In short, the publication could be defamatory if it is a lie which might bring the person referred to in the publication, into ‘contempt’ or ‘ridicule’ in the minds of the relevant audience. For instance, a statement in a community news article that a politician (e.g. the local mayor) had an extra-marital affair could well be defamatory. If the publisher can prove the truth of the comment, he or she should be able to defend any claim of defamation. However, the question becomes more complicated when the allegation is not completely false nor true, but might be misleading. If the sole reader of a personal note repeats the content of that note to someone else, a ‘fresh’ publication takes place in the eyes of the Law. The same rule of re-publication applies where some of the members of an audience later communicate that publication to third parties. The case summaries below are intended to provide some examples of different defamation claims. They are matters which have been ruled upon by the Courts as to such issues as publication, liability, and remedies. Australian Consolidated Press Ltd v Ettingshausen The party bringing the defamation claim in this case was a prominent rugby league footballer. A photo was taken of him while showering with some other footballers, which showed his penis. The photo was subsequently published in a magazine (without his knowledge or approval), alongside suggestive text highlighting a display of masculine nudity. The footballer’s lawyers argued that the publishing of the photograph would lead an ordinary reader to assume that the footballer had: given permission for the photograph to be published; posed for the photograph for the purposes of its publication; and was thereby unfit to continue his promotional work with young people. Was the publication of the nude photograph defamatory? The magazine publication including the nude photograph of the footballer was held to be defamatory in nature. As a result, the footballer was awarded a sum of money in compensation. Tabbaa v Nine Network Pty Ltd (No 10) The case concerned the broadcasting of the “60 Minutes” program and its subsequent online publication containing an interview with Nadia Tabbaa. During the interview, she claimed to have been mistreated by her father for a number of years. Following the publication, Mr Tabbaa, (Nadia’s father), brought an action in defamation against the owners of the program. Was the content of the interview published (as part of the “60 Minutes” program) defamatory? The publication of Nadia’s interview (as part of the broadcasting of the “60 Minutes” program on television), and its subsequent publication online, was not defamatory. Nadia’s comments regarding the treatment she experienced by Mr Tabbaa constituted her honest opinion. They could not be characterised as false or misleading. Additionally, it was in the public interest to enable such content to be published. Tingle v Harbour Radio Pty Ltd (No 4) The case concerned the radio broadcasting of words to the effect that a politician had been bragging and lying, and which referred to him as a ‘foolish politician’. In fact, the politician was a highly regarded person in the community, with a reputation for integrity. The radio station soon after making the comments, issued an apology to the politician (upon realising that the statements made were untrue). However, the politician sued as the broadcast had caused him great distress. Was the radio-broadcasting of the statements about the politician’s character defamatory? The statements broadcast by the radio station were held to be false and defamatory. Accordingly, compensation was ordered to remedy the humiliation and distress suffered by the politician. Contact us by either submitting the contact form or calling us on 08 9221 8337 (Ask for Tony or Andrew). A free 10-minute consultation is available (by appointment) for new enquiries.
<urn:uuid:9be54760-1985-4a17-8297-0a54f0d29fd5>
CC-MAIN-2022-33
https://www.irwinlegal.com.au/law-advice-wa/defamatory-comments-to-publish-or-perish/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00078.warc.gz
en
0.967757
1,462
2.734375
3
When Angelo is restoring an old church in Rome, he finds a small bird, barely breathing. Not being able to find somewhere safe to leave her, he has no choice but to take her home with him. Despite Angelo's 'professional dislike for pigeons', the pair become friends, and Angelo names the bird Sylvia. Eventually, Sylvia is able to repay Angelo's kindness by supporting him when he needs it most. - Format: Paperback - Pages: 48 pages, chiefly col. ill - Publisher: Andersen Press Ltd - Publication Date: 07/08/2008 - Category: Picture books - ISBN: 9781842708422 Free Home Delivery on all orders Pick up orders from local bookshops
<urn:uuid:892b21d6-f4cb-406e-8e9b-76cd0dd728df>
CC-MAIN-2017-04
http://www.hive.co.uk/Product/David-Macaulay/Angelo/6914296
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00088-ip-10-171-10-70.ec2.internal.warc.gz
en
0.896173
153
2.328125
2
A peanut butter sandwich (sometimes a peanut butter and jelly sandwich) was a Human sandwich food consisting of peanut butter between two slices of bread. Often, it would also feature a jelly of some sort. Jonathan Archer explained that the Chef of the Enterprise NX-01 was able to prepare anything from a peanut butter and jelly sandwich to turkey "with all the trimmings" when asked by Liam Brennan. (ENT: "Breaking the Ice") A ferengi was apparently eating a peanut butter and jelly sandwich retrieved from the mess hall at Captain Archer's request for food. (ENT: "Acquisition") In 2376, Captain Janeway prepared pot roast when she invited Lyndsay Ballard to dinner in the Captain's quarters, however her infamous replicator liquefied the pot roast and they were forced to eat peanut butter sandwiches. Ballard didn't mind too much, stating that she had lived on them at Starfleet Academy. (VOY: "Ashes to Ashes") In 2377, Tom Paris made peanut butter toast for his wife, B'Elanna Torres, but she could not eat it in time, because she had an appointment in sickbay with The Doctor regarding her pregnancy. (VOY: "Lineage") Later that year, during a meal prepared by Seven of Nine, she offered to replicate a peanut butter and jelly sandwich for Paris when he asked for salt for the quail that she had prepared. (VOY: "The Void")
<urn:uuid:0a931993-71bf-4edf-927c-122b14653eef>
CC-MAIN-2016-44
http://memory-alpha.wikia.com/wiki/Peanut_butter_sandwich
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00004-ip-10-171-6-4.ec2.internal.warc.gz
en
0.977852
300
1.742188
2
‘Bound by heART’ is an initiative of BTB in collaboration with SOS Children’s Villages of India to spread joy and love through the medium of art and creativity. The organization has been doing excellent work with children and we feel privileged to be able to do our small bit towards their fantastic endeavour. SOS Children’s Villages of India has been ensuring not just childcare, but also wholesome child development for parentless and vulnerable children since more than five decades, reaching out to currently more than 30,000 children. Come, make a difference. Be a changemaker. Support here: https://www.soschildrensvillages.in/ As a part of this endeavour, we conducted the Bound by heART Mother’s Day contest which is a beautiful coming together of the visual and literary art forms. Talented kids from SOSCVI give us a vision and the writers at BTB decorate it with their magical words. Hari always knew there was a woman or girl inside him. He used to hide his sister’s clothes. Sometimes, he did make-up or danced with a feminine grace. Soon, his mannerisms and style caught the attention of the society, and all started bullying him in school. He was also sexually abused and was labeled with many terms – Chikna, Chakka, Trans and more. These were used to put him down. Life was miserable for him. One day, his dad beat him up when he did not stop behaving like a woman. He was 16 years old then. He ran away and started living on the footpath. There he saw kids getting exploited . At times, he missed his mom and tears overflowed from his eyes. He had a small picture of his mom in his purse which he often looked at for strength. He began doing odd jobs and at times, also had to beg. Eventually, he found a place to stay in a small hotel room where he started working as a cook or helper. He was surer now that he identified as a woman and underwent a sex change operation after a few year. The metamorphosis was painful. He changed his name to Sheila. Sheila then adopted some street children. She started a school for them under a railway bridge called ‘Chaya’ named after her Mom. Some rag pickers, beggars or urchins started coming there as she gave them food also. She collected wood or sold tea at times. She also created a small garden where she often grew flowers or vegetables to sell. She worked so hard for all her children. Sometimes though, some good samaritans gave her children toys, gifts or books for which she was grateful. Soon, good word spread about them and her journey and efforts became viral on social media. Help came around but in all this, she never forgot her mom; her helplessness and misery because her son was different. One day, she decided to go with all her kids to meet her mom. She was heartbroken to see that her mother looked frail and forlorn. Her drunkard husband had left her to her fate . She hugged her and said,” Look ma, what I got for you. You did not lose a child. I have got so many children for you. I shall take you in my home and look after you”. Mother’s eyes were teary. She kept sobbing and tightly hugged her child and said, “What unconditional love you have for the world though they mistreated you. I am proud to have you as my child.” Sheila’s mother went with her and stayed with her till her last breath. // This story has been penned by Soma Mukherjee taking inspiration from the artwork in this post created by P. Abhinaya //
<urn:uuid:1f414ab7-d3dd-4071-800f-df571052e42e>
CC-MAIN-2022-33
https://beyondthebox.in/2022/06/29/he-she-and-them-unconditional-love/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00468.warc.gz
en
0.991743
791
1.765625
2
Some people find that giving the shelves a quick dust, cleaning the kitchen, or even rearranging the closet is just as good for their mental health as using a mindfulness app. When some individuals feel overwhelmed or stressed out, they might try yoga, mindfulness, or even a massage. In fact, for some people even after a stressful day, the sheer sight of a tidy and ordered home can help them relax and de-stress. It’s beneficial for you to keep your home tidy and participate in the cleaning process. In reality, studies demonstrate that cleaning, or the lack thereof, can have an immediate effect on mental health. There are several ways that cleaning might improve your mental health. It can give you a sense of control over your surroundings, for example, and it can also occupy your thoughts with a soothing repetitive task. Additionally, it can lift someone’s spirits and give them a sense of satisfaction and success. Cleaning can relieve stress for a variety of reasons. Cleaning can be a way for people to regain some control over their lives when they feel as though they are living in an uncertain world. People who clean feel more in charge of and in control of their surroundings. Additionally, mess and disarray can be quite distracting, making it difficult to concentrate or finish other tasks, and they can cause you to feel caught in a rut. Therefore, if you feel the impulse to clean and organize your space when you’re worried, your mind and body are probably trying to find a method to create some order in your surroundings. You can even get cleaner air with specific plants. Top Deep Cleaning Tips Clean out the garage and shed; often they can become so cluttered with things that mold, bacteria, and even vermin can grow there. You might need to hire pest control services and conduct some extensive deep cleaning. Clean out an inefficient drain. As soon as you notice that your drain is starting to clog, pour a half cup of baking soda and then a half cup of vinegar down the drain. Cover with a wet cloth to contain the effects that mimic a science fair. After five minutes, flush with hot water. Replace worn-out towels. Is there a pattern on the wet towel you placed in your gym bag? Take it outside, clean the mildew spores off of it, and then leave it in the sun to air dry for three hours. After pre-soaking in a bleach and water solution, the machine washes the item, see the care tag to ensure it’s safe. Sanitize the cabinets. Cabinets can get dirty when you’re cooking, just like your kitchenware can. Pour some dish soap into a spray bottle with warm water to get rid of the oil. After rinsing, use a clean, well-wrung cloth to dry. Take everything out of the fridge and give it a deep clean. It is something often forgotten about but it is where all our food is so needs to be looked after and clean so it doesn’t affect food quality. Want a modern home on a budget? Subscribe and get this FREE GUIDE to learn the tips, tricks, and my best resources to create a family-friendly modern home on a budget!
<urn:uuid:bf9f30c9-7f2f-45a4-b7c8-f87d033c5553>
CC-MAIN-2022-33
https://acraftedpassion.com/mental-health-and-cleaning-how-they-are-linked/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00467.warc.gz
en
0.94772
669
2.34375
2
Millions of dollars are flowing into the race for state superintendent of public instruction, driven in large part by outside groups not affiliated with the candidates – $19.4 million to date. Using data from the California Secretary of State’s Office, EdSource created a web app to explore the finances behind the campaigns of incumbent Tom Torlakson and challenger Marshall Tuck, as well the outside groups spending money to support or oppose them. Earlier this year, EdSource developed an open source data-driven app that crunches raw campaign finance data. It provides details about which outside special interest groups are financially supporting or opposing the candidates and who is contributing to those committees. The app visualizes campaign finance data and provides different ways to explore it. EdSource will update the data on a nearly daily basis as new contributions and independent expenditures are reported. To use the app, click on buttons near the top of the chart. Notes are provided at the bottom of each chart to explain methodology. All questions about the app can be directed to John C. Osborn.
<urn:uuid:6fba3c66-ee08-4964-bf9d-8b3044cd567b>
CC-MAIN-2017-04
https://edsource.org/2014/a-look-at-whos-funding-torlakson-and-tuck/69036
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00291-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937661
218
1.648438
2
Deconvolution in Optical Microscopy Deconvolution is a computationally intensive image processing technique that is being increasingly utilized for improving the contrast and resolution of digital images captured in the microscope. The foundations are based upon a suite of methods that are designed to remove or reverse the blurring present in microscope images induced by the limited aperture of the objective. Nearly any image acquired on a digital fluorescence microscope can be deconvolved, and several new applications are being developed that apply deconvolution techniques to transmitted light images collected under a variety of contrast enhancing strategies. Among the most suitable subjects for improvement by deconvolution are three-dimensional montages constructed from a series of optical sections. The basic concepts surrounding acquisition of serial optical sections for deconvolution analysis are presented with a schematic diagram in Figure 1. The specimen is an idealized cell from which a series of optical sections (illustrated on the right) are recorded along the z-axis of a generalized optical microscope. For each focal plane in the specimen, a corresponding image plane is recorded by the detector and subsequently stored in a data analysis computer. During deconvolution analysis, the entire series of optical sections is analyzed to create a three-dimensional montage. As a technique, deconvolution is often suggested as a good alternative to the confocal microscope. This is not strictly true because images acquired using a pinhole aperture in a confocal microscope can also be analyzed by deconvolution techniques. However, a majority of the deconvolution experiments reported in the literature apply to images recorded on a standard widefield fluorescence microscope. Modern deconvolution algorithms have yielded images of comparable resolution to that of a confocal microscope. In fact, confocal microscopy and widefield deconvolution microscopy both work by removing image blur, but do so by opposite mechanisms. Confocal microscopy prevents out-of-focus blur from being detected by placing a pinhole aperture between the objective and the detector, through which only in-focus light rays can pass. In contrast, widefield microscopy allows blurred light to reach the detector (or image sensor), but deconvolution techniques are then applied to the resulting images either to subtract blurred light or to reassign it back to a source. Confocal microscopy is especially well suited for examining thick specimens such as embryos or tissues, while widefield deconvolution microscopy has proven to be a powerful tool for imaging specimens requiring extremely low light levels, such as living cells bearing fluorescently labeled proteins and nucleic acids. Sources of Image Degradation The sources of image degradation can be divided into four independent phenomena: noise, scatter, glare, and blur. Figure 2 presents examples of the visual impact of each of these on the same image. The principal task of deconvolution methods is to remove the out-of-focus blur from images. Deconvolution algorithms can and do remove noise, but this is a relatively simple aspect of their general overall performance. Noise can be described as a quasi-random disarrangement of detail in an image, which (in its most severe form) has the appearance of white noise or salt-and-pepper noise, similar to what is seen in broadcast television when experiencing bad reception (Figure 2(a)). This type of noise is referred to as "quasi-random" because the statistical distribution can be predicted if the mechanics of the source are known. In digital microscopy, the main source of noise is either the signal itself (often referred to as photon shot noise) or the digital imaging system. The mechanics of both noise sources are understood and therefore, the statistical distribution of noise is known. Signal-dependent noise can be characterized by a Poisson distribution, while noise arising from the imaging system often follows a Gaussian distribution. Because the source and distribution of common noise in digital mages is so well understood, it can be easily removed by application of the appropriate image filters, which are usually included in most deconvolution software packages as an optional "pre-processing" routine. Scatter is usually referred to as a random disturbance of light induced by passage through regions of heterogeneous refractive index within a specimen. The net effect of scatter is a truly random disarrangement of image detail, as manifested in Figure 2(b). Although no completely satisfactory method has been developed to predict scatter in a given specimen, it has been demonstrated that the degree of scattering is highly dependent upon the specimen thickness and the optical properties of the specimen and surrounding embedding materials. Scatter increases with both specimen thickness and the heterogeneity of the refractive index presented by internal components within a specimen. Similar to scatter, glare is a random disturbance of light, but occurs in the optical train (lenses, filters, prisms, lens mounts, etc.) of the microscope rather than within the specimen. The level of glare in a modern microscope has been minimized by the employment of lenses and filters with antireflective coatings, and the refinement of lens forming techniques, optical cements, and glass formulations. Figure 2(c) illustrates the effect of uncontrolled glare. Blur is described by a nonrandom spreading of light that occurs by passage through the imaging system optical train (Figure 2(d)). The most significant source of blur is diffraction, and an image whose resolution is limited only by blur is considered to be diffraction-limited. This represents an intrinsic limit of any imaging system and is the determining factor in assessing the resolution limit of an optical system. Optical theory proposes sophisticated models of blur, which can be applied, with the assistance of modern high-speed computers, to digital images captured in the optical microscope. This is the basis for deconvolution. Because of its fundamental importance in deconvolution, the theoretical model for blur will be discussed in much greater detail in other parts of this section. However, it should be emphasized that all imaging systems produce blur independently of the other forms of image degradation induced by the specimen or accompanying instrumental electronics. It is precisely this independence of optical blur from other types of degradation that enables the possibility of blur removal by deconvolution techniques. The interaction of light with matter is the primary physical origin of scatter, glare, and blur. However, the composition and arrangement of molecules in a given material (whether it be glass, water, or protein) bestows upon each material its own particular set of optical properties. For the purposes of deconvolution, what distinguish scatter, glare, and blur are the location where they occur and the possibility of generating a mathematical model for these phenomena. Because scatter is a localized, irregular phenomenon occurring in the specimen, it has proven difficult to model. By contrast, because blur is a function of the microscope optical system (principally the objective), it can be modeled with relative simplicity. Such a model renders it possible to reverse the blurring process mathematically, and deconvolution employs this model to reverse or remove blur. The Point Spread Function The model for blur that has evolved in theoretical optics is based on the concept of a three-dimensional point spread function (PSF). This concept is of fundamental importance to deconvolution and should be clearly understood in order to avoid imaging artifacts. The point spread function is based on an infinitely small point source of light originating in the specimen (object) space. Because the microscope imaging system collects only a fraction of the light emitted by this point, it cannot focus the light into a perfect three-dimensional image of the point. Instead, the point appears widened and spread into a three-dimensional diffraction pattern. Thus, the point spread function is formally defined as the three-dimensional diffraction pattern generated by an ideal point source of light. Depending upon the imaging mode being utilized (widefield, confocal, transmitted light), the point spread function has a different and unique shape and contour. In a widefield fluorescence microscope, the shape of the point spread function resembles that of an oblong "football" of light surrounded by a flare of widening rings. To describe the point spread function in three dimensions, it is common to apply a coordinate system of three axes (x, y, and z) where x and y are parallel to the focal plane of the specimen and z is parallel to the optical axis of the microscope. In this case, the point spread function appears as a set of concentric rings in the x-y plane, and resembles an hourglass in the x-z and y-z planes (as illustrated in Figure 3). An x-y slice through the center of the widefield point spread function reveals a set of concentric rings: the so-called Airy disk that is commonly referenced in texts on classical optical microscopy. Two x-z projections of point spread functions showing different degrees of spherical aberration are presented in Figure 3. The optical axis is parallel to the vertical axis of the image. The point spread function on the left displays minimal spherical aberration, while that on the right shows a significant degree of aberration. Note that the axial asymmetry and widening of the central node along the optical axis in the right hand image leads to degraded axial resolution and blurring of signal. In theory, the size of the point spread function is infinite, and the total summed intensity of light in planes far from focus is equal to the summed intensity at focus. However, light intensity falls off quickly and eventually becomes indistinguishable from noise. In an unaberrated point spread function recorded with a high numerical aperture (1.40) oil immersion objective, light occupying 0.2 square micrometers at the plane of focus is spread over 90 times that area at 1 micrometer above and below focus. The specimen utilized to record these point spread function images was a 0.1 micrometer-diameter fluorescent bead mounted in glycerol (refractive index equal 1.47), with immersion oils having the refractive indices noted in the figure. An important consideration is how the point spread function affects image formation in the microscope. The theoretical model of image formation treats the point spread function as the basic unit of an image. In other words, the point spread function is to the image what the brick is to the house. The best an image can ever be is an assembly of point spread functions, and increasing the magnification will not change this fact. As a noted theoretical optics textbook (Born and Wolf: Principles of Optics) explains, "It is impossible to bring out detail not present in the primary image by increasing the power of the eyepiece, for each element of the primary image is a small diffraction pattern, and the actual image, as seen by the eyepiece, is only the ensemble of the magnified images of these patterns". As an example, consider a population of minute fluorescent beads sandwiched between a coverslip and microscope slide. An in-focus image of this specimen reveals a cloud of dots, each of which, when examined at high resolution, is actually a disk surrounded by a tiny set of rings (in effect, an Airy disk; see Figure 4(a)). If this specimen is removed from focus slightly, a larger set of concentric rings will appear where each dot was in the focused image (Figure 4(b)). When a three-dimensional image of this specimen is collected, then a complete point spread function is recorded for each bead. The point spread function describes what happens to each point source of light after it passes through the imaging system. The blurring process just described is mathematically modeled as a convolution. The convolution operation describes the application of the point spread function to every point in the specimen: light emitted from each point in the object is convolved with the point spread function to produce the final image. Unfortunately, this convolution causes points in the specimen to become blurred regions in the image. The brightness of every point in the image is linearly related by the convolution operation to the fluorescence of each point in the specimen. Because the point spread function is three-dimensional, blurring from the point spread function is an inherently three-dimensional phenomenon. The image from any focal plane contains blurred light from points located in that plane mixed together with blurred light from points originating in other focal planes. The situation can be summarized with the idea that the image is formed by a convolution of the specimen with the point spread function. Deconvolution reverses this process and attempts to reconstruct the specimen from a blurred image. Aberrations in the Point-spread Function The point spread function can be defined either theoretically by utilizing a mathematical model of diffraction, or empirically by acquiring a three-dimensional image of a fluorescent bead (see Figure 3). A theoretical point spread function generally has axial and radial symmetry. In effect, the point spread function is symmetric above and below the x-y plane (axial symmetry) and rotationally about the z-axis (radial symmetry). An empirical point spread function can deviate significantly from perfect symmetry (as presented in Figure 3). This deviation, more commonly referred to as aberration, is produced by irregularities or misalignments in any component of the imaging system optical train, especially the objective, but can also occur with other components such as mirrors, beamsplitters, tube lenses, filters, diaphragms, and apertures. The higher the quality of the optical components and the better the microscope alignment, the closer the empirical point spread function comes to its ideal symmetrical shape. Both confocal and deconvolution microscopy depend on the point spread function being as close to the ideal case as possible. The most common aberration encountered in optical microscopy, well known to any experienced and professional microscopist, is spherical aberration. The manifestation of this aberration is an axial asymmetry in the shape of the point spread function, with a corresponding increase in size, particularly along the z-axis (Figure 3). The result is a considerable loss of resolution and signal intensity. In practice, the most common origin of spherical aberration is a mismatch between the refractive indices of the objective front lens immersion medium and the mounting medium in which the specimen is bathed. A tremendous emphasis should be placed on the importance of minimizing this omnipresent aberration. Although deconvolution can partially restore lost resolution, no amount of image processing can restore lost signal. Wes Wallace - Department of Neuroscience, Brown University, Providence, Rhode Island 02912. Lutz H. Schaefer - Advanced Imaging Methodology Consultation, Kitchener, Ontario, Canada. Jason R. Swedlow - Division of Gene Regulation and Expression, School of Life Sciences Research, University of Dundee, Dundee, DD1 EH5 Scotland. Questions or comments? Send us an email. © 1998-2015 by Michael W. Davidson and The Florida State University. All Rights Reserved. No images, graphics, scripts, or applets may be reproduced or used in any manner without permission from the copyright holders. Use of this website means you agree to all of the Legal Terms and Conditions set forth by the owners. This website is maintained by our
<urn:uuid:5006f614-34e5-4cba-aebb-dd1e6f4c938f>
CC-MAIN-2017-04
https://micro.magnet.fsu.edu/primer/digitalimaging/deconvolution/deconintro.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00040-ip-10-171-10-70.ec2.internal.warc.gz
en
0.923769
3,084
2.75
3
|By Kevin Remde|| |January 20, 2013 04:00 PM EST|| The article I’m writing for part 13 our “31 Days of Servers in the Cloud” series involves using App Controller to create a virtual machine. But to do this, you first need to connect and associate App Controller (a component of System Center 2012) with your Windows Azure subscription. So in today’s Part 12, as a preliminary document for part 13, in this article I’m going to show you how to connect App Controller to your Windows Azure account. To do this, we need to have a few preliminaries in place: - You have a Windows Azure subscription, and have requested the ability to preview the use of Windows Azure virtual machines. (If you don’t have an account, you can start a free 90-day trial HERE.) - You have System Center 2012 App Controller installed. (Download the System Center 2012 Private Cloud evaluation software HERE.) NOTE: In my examples I’m using System Center 2012 SP1 App Controller, which at the time of this writing is available to TechNet and MSDN subscribers and volume license customers only; but will very soon be generally available. I will update this blog post as soon as that happens. Connect App Controller to your Windows Azure subscription To make this happen, you first have to have a management certificate in place. This makes up the bulk of the complexity involved. It must be a management certificate that has a key length of at least 2048 bits and resides in the Personal certificate store. To make this all work, you’ll need both a .cer file, which is the exported certificate that you’ll upload as the management certificate in Windows Azure, and a.pfx (personal information exchange) certificate file that you’ll use to connect App Controller to your Azure subscription. You can create this self-signed certificate easily in one of two ways: - If you have Visual Studio installed, you can use the makecert command from the Visual Studio command prompt to create the certificate and at the same time create the exported .cer file that you can upload into Azure. Ore… - More likely if, like me, you’re not a developer, you’ll use IIS (Internet Information Services) to create the self-signed certificate. Add IIS either as a role to a Windows Server, or even as an to Windows 8. For my example, I’m going to use IIS that I’m going to install on Windows 8. Install IIS on Windows 8 In the “Turn Windows features on or off” section of the “Add or Remove Programs” (just search from your Start Screen), add the IIS Management Console feature: Generate the Self-Signed Certificate Once installed, open up the IIS Manager. Double-click on “Server Certificates”, and then in the Actions pane on the right, select “Create Self-Signed Certificate”. Give your certificate a friendly name that you’ll recognize later, and click OK. Export the .pfx File Next, we need to export the new certificate as a .pfx file. (This is the file we’ll later use to connect App Controller to our Windows Azure subscription.) You can create this from IIS Management as well. With your new certificate selected, click export in the Actions pane. Choose a file name and destination for the file, set a password, and click OK. Once this is done, and if you have no further use of IIS on your Windows 8 machine, you can remove it just as easily as you added it. You won’t need it for anything more here. Generate the .cer file. Now we need a .cer file – the exported certificate that we will upload into our Windows Azure subscription. The certificate we just created is in the Local Computer certificates store, so we could either need to use MMC and the “Certificates” snap-in to get to and export the certificate from there, OR we could import the .pfx into the personal certificate store and then export it from there. I’ll describe the latter.. Run certmgr.msc as a quick way to open up MMC connected to the current user’s certificate store, and navigate to Personal –> Certificates Right-Click on Certificates, and under All Tasks, select Import… In the Certificate Import Wizard, click Next, and then browse to and select your recently created .pfx file. (NOTE: You’ll have to change the file type you’re looking for to include .pfx files in order to see it as you navigate) Enter the password you used to secure your .pfx file, and click Next. Leave the Certificate Store as the Personal store. Click Next, and then click Finish to complete the import. Now in the list of your certificates in the personal certificate store, you should see a certificate that contains a friendly name you used earlier (in my case it’s “MyAzureMgmtCert”). Right-click on your certificate, and under All Tasks, select Export. Just use the defaults through this wizard, browse to a location for and name your certificate: Click Next and then Finish. Okay. Now you have both the .pfx and the .cer files you’ll need to connect App Controller to Windows Azure. Upload the .cer to Windows Azure. In the Windows Azure portal, at the bottom left, select Settings, and then click Upload. Browse to and select your .cer file: Click the Check Box, and in a few seconds you should see a notification telling you that your upload is successful. You should also see your certificate added to the list of management certificates Connect App Controller to Windows Azure Before we make the connection, we’ll need to have our Windows Azure Subscription ID. The subscription ID is a long set of numbers, formatted to look something like this: 00000000-0000-0000-0000-000000000000 You can get this a number of different ways. - If you have any storage defined or any virtual machines created, you can select them and see the subscription ID on the bottom right of the “quick glance” information. - If you have Windows Azure PowerShell installed and connected to your subscription, you can simply run the “Get-AzureSubscription” cmdlet to see the Subscription ID. - Or most easily since we’ve just uploaded one, you can see the subscription ID as one of the columns in our list of management certificates. Copy the subscription ID to the clipboard. Now we’re ready to open up App Controller and log in as your administrative account. In the Overview pane, under Public Clouds, click “Connect a Windows Azure Subscription” Paste your subscription ID into the appropriate field, browse to and select your .pfx certificate file, enter the password, and give your connection a name and optional description. Once you click OK, you should soon see that you have a Windows Azure subscription connected. If you had any virtual machines or services running in Windows Azure, you’ll be able to see those represented here also. And that’s it! You’re connected! Now you can do really cool things like using App Controller to create Virtual Machines in Windows Azure. I hope you found this useful! If you have any questions or comments, please add them to the comments and we can discuss them. The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ... Jan. 17, 2017 10:30 PM EST Reads: 2,312 IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app... Jan. 17, 2017 10:30 PM EST Reads: 626 WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong. Jan. 17, 2017 09:15 PM EST Reads: 7,504 SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here Jan. 17, 2017 08:00 PM EST Reads: 11,587 A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights. Jan. 17, 2017 06:45 PM EST Reads: 6,209 Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i... Jan. 17, 2017 05:15 PM EST Reads: 3,561 Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way. Jan. 17, 2017 04:45 PM EST Reads: 3,049 Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob... Jan. 17, 2017 04:30 PM EST Reads: 2,904 The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. Jan. 17, 2017 04:15 PM EST Reads: 1,978 SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C... Jan. 17, 2017 02:30 PM EST Reads: 1,741 With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p... Jan. 17, 2017 02:15 PM EST Reads: 3,636 In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Jan. 17, 2017 02:00 PM EST Reads: 5,378 Things are changing so quickly in IoT that it would take a wizard to predict which ecosystem will gain the most traction. In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen: HomeKit, Brillo and Alljoyn. In his session at @ThingsExpo, Adam Justice, vice president and general manager of Grid Connect, will review what happens when smart devices don’t work togethe... Jan. 17, 2017 01:45 PM EST Reads: 267 "Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY. Jan. 17, 2017 12:45 PM EST Reads: 4,473 "There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci... Jan. 17, 2017 12:45 PM EST Reads: 5,554 The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ... Jan. 17, 2017 12:45 PM EST Reads: 5,062 SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E... Jan. 17, 2017 11:45 AM EST Reads: 5,717 SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c... Jan. 17, 2017 11:45 AM EST Reads: 1,912 20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Jan. 17, 2017 11:45 AM EST Reads: 4,195 In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc... Jan. 17, 2017 10:30 AM EST Reads: 1,654
<urn:uuid:0282ef76-669e-45bb-bb34-d280fb5fbd26>
CC-MAIN-2017-04
http://dotnet.sys-con.com/node/2510444
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00234-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916923
3,933
1.5625
2
Special Survey On Californians And Their Housing: Housing Costs Lead Many Californians To Consider Moving Homeownership a Major Dividing Line Between Haves, Have Nots SAN FRANCISCO, California, November 18, 2004 — Although Californians deeply value their quality of life in the Golden State, a surprising number say that the cost of housing could drive them away, according to a new survey released today by the Public Policy Institute of California (PPIC) in collaboration with the Hewlett, Irvine, and Packard Foundations. The survey’s large sample size (2,502) and multilingual interviews (conducted in English, Spanish, Chinese, Korean, and Vietnamese) make this the most comprehensive survey on housing and housing policy to date. Overall, Californians express grave concerns about the cost of housing and see little upside to the run-up in housing prices. In fact, one quarter (24%) of Californians today say the cost of housing in their part of California is forcing them to seriously consider moving – to another part of the state or away from California altogether. This sentiment is highest among coastal residents, and many are acting on it: A recent PPIC study found that coastal Californians are driving much of the Central Valley’s population boom. Nearly all Californians (94%) perceive that home values have been increasing in their region, with 84 percent saying they have increased a lot in recent years. Some see broad benefits to skyrocketing housing prices – most residents (82%) view it as at least somewhat important to the economic vitality of their part of the state. But they express greater ambivalence about this phenomenon as it relates to them personally. Specifically, 49 percent of Californians say that increasing average home values in their part of the state are a bad thing for them and their families, while 41 percent call it a good thing. One reason for this perspective? Californians worry about the fallout of increasing prices for younger family members. Three in four adults (77%) say they are at least somewhat concerned that the cost of housing will prevent the younger generation in their family from buying a home in their region of the state. Moreover, one in three (31%) cite a more immediate effect of housing costs – that is, it places a financial strain on their households today. “Californians understand the economic value of our hyper real estate market, but they also feel the pinch of high prices,” says PPIC Statewide Survey Director Mark Baldassare. A majority of Californians (55%) view the availability of affordable housing as a big problem in their region today, placing it just below traffic congestion (59%) and far above the lack of well-paying jobs (35%), population growth (35%), and air pollution (30%) as a regional concern. Orange and San Diego County residents are the most likely (63%) and Central Valley residents the least likely (39%) to see affordable housing as a big problem in their area. Homeownership: The Great Divide Beyond regional differences, homeownership represents a profound dividing line between the “haves” and “have nots” in California today. About six in 10 California adults say they own their own home. Majorities of whites (71%) and Asians (59%) own their homes; majorities of Latinos (55%) and blacks (51%) are renters. A large majority of U.S.-born residents (68%) are homeowners, while immigrants (55%) are more likely to rent. And the likelihood of owning a home increases sharply with age, income, and education. Homeownership rates also have serious implications for elections and politics in the state. Seventy-five percent of likely voters in the state’s elections are homeowners, while a majority of those who are not registered to vote are renters. As a result, voters’ preferences largely reflect the opinions of homeowners. “Despite all the recent focus on coastal versus inland California or blue versus red counties, we need look no further than the demographics of homeownership to see a great social divide facing our state,” says Baldassare. Consistent with this divide, homeowners express greater satisfaction than do renters with their quality of life: - While 89% of state residents say they are at least somewhat satisfied with their current housing and neighborhood, homeowners are far more likely than renters to say they are very satisfied with their housing (75% to 34%) and community (65% to 41%). - Homeowners (68%) are also more likely than renters (34%) to report a high degree of satisfaction with the amount of living space in their home. Overall, 86 percent of Californians are at least somewhat satisfied with their living space and privacy, with Central Valley residents more likely than others to be very satisfied. - Neighborhood safety is less of a concern for homeowners than for renters: 64 percent of residents who own homes say they are very satisfied with the security of their neighborhoods, compared to 40 percent of renters. Whites (64%) are more likely than Asians (47%), Latinos (41%), and blacks (38%) to hold this view. Given the dramatic rise in home values, homeowners have another reason to feel good. Indeed, 93 percent of homeowners say that the value of their home has increased in recent years, and 76 percent say it has increased a lot. Nevertheless, these large increases in equity do not make most homeowners confident that they could buy another home, given the current market. Only a slim majority (53%) say it is very likely (23%) or somewhat likely (30%) that they could find a home they could afford and would want to buy in their part of California. Of those who say their home values have increased a lot, only 23 percent think they would be able to find another home to buy in their region. Although 86 percent of renters in California hold onto the hope of being homeowners someday, only 18 percent believe it is very likely they will find a home they can afford, with fewer than half (49%) saying it is at least somewhat likely. Renters in the Inland Empire are more likely than others to believe they can find a home to buy in their region. Whites (11%) are much less likely than Latinos (23%) and blacks (25%) to be optimistic about finding a home to buy in their part of the state. Homeownership in Low-Income Communities Harder to Regardless of their housing status, many state residents express concern about the housing options that are available in low-income and minority neighborhoods. Most Californians (55%) – and majorities across racial/ethnic groups – believe that these neighborhoods are less likely than other communities to attract developers to build new single-family homes. And by more than a two-to-one margin (54% to 25%), state residents are also more likely to think that buyers in low-income communities have a harder time rather than an easier time qualifying for loans than buyers in other neighborhoods. Blacks (74%) and Democrats (57%) are far more likely than whites (48%) and Republicans (45%) to hold this view. Little Support – But Lots of Ideas – for Government Housing Given their worries about housing availability and affordability, how do residents feel about the related policies of their state and local governments? Only one in four (23%) believes that state government is doing an excellent or good job on housing and land use policy, with a similar percentage (22%) giving state leaders poor ratings on the topic. However, there is a lack of consensus about whether or not state government should alter its policies in response to rising housing costs or shortages. Half (50%) think state government is doing enough (33%) or too much (17%) to encourage construction, while 37 percent say government could do more. And 52 percent say the state government should maintain current land use and environmental restrictions even if it increases the cost of new housing, compared to 40 percent who support easing such restrictions. However, residents do get behind a number of specific proposals aimed at promoting the development of new housing: Majorities favor shifting property tax dollars from state to local governments as an incentive for local leaders to approve new housing developments (57%); using transportation funding as an incentive to encourage local governments to develop integrated plans for housing, jobs, and transit (59%); and providing “smart growth” guidelines to local governments (54%). At the local government level, Californians are only slightly more supportive of the way leaders are handling land use and housing issues: 33 percent say they are doing an excellent (6%) or good (27%) job. Despite this ambivalence, most residents (67%) believe local governments should work together to develop regional plans for housing development and land use. And they also see a role for themselves at the ballot box: 61 percent say they would support a local bond measure to subsidize the cost of building affordable housing, and 53 percent would reject efforts to slow down the pace of development in their More Key Findings - Community Spirit— Page 2 Two in three residents (66%) say their neighborhoods have a sense of community. This perception increases with age, homeownership, and length of residence. - Commuting Satisfaction — Page 3 Three in four employed residents (77%) say they are either very satisfied (44%) or somewhat satisfied (33%) with their commute to work. Fewer workers (52%) express satisfaction with the public transit options that are available to them, with one-third (32%) saying they are dissatisfied with public transit. - The Lure of the Single-Family Home — Page 10 percent of Californians would prefer to live in a single-family detached home, even if it means they have to drive to work and to travel locally. However, a majority (53%) also say they would choose to live in a small home with a small backyard if it means a shorter commute to work. - Urban vs. Suburban — Page 11 Californians are divided when asked if they would be willing to trade the typical features of suburban communities for more urban amenities: 48 percent prefer to live in a mixed-use neighborhood if it means proximity to stores and services, while an almost equal number (49%) choose a residential-only neighborhood. About the Survey This survey – a collaborative effort of the Public Policy Institute of California, The William and Flora Hewlett Foundation, The James Irvine Foundation, and The David and Lucile Packard Foundation – is a special edition of the PPIC Statewide Survey. Findings of this survey are based on a telephone survey of 2,502 California adult residents interviewed between October 21 and November 1, 2004. Interviews were conducted in English, Spanish, Chinese, Korean, or Vietnamese. The sampling error for the total sample is +/- 2%. The sampling error for subgroups is larger. For more information on methodology, see Mark Baldassare is research director at PPIC, where he holds the Arjay and Frances Fearing Miller Chair in Public Policy. He is founder of the PPIC Statewide Survey, which he has directed since 1998. His book, A California State of Mind: The Conflicted Voter in a Changing World, is available at www.ppic.org. PPIC is a private, nonprofit organization dedicated to improving public policy through objective, nonpartisan research on the economic, social, and political issues that affect Californians. The institute was established in 1994 with an endowment from William R. Hewlett. PPIC does not take or support positions on any ballot measure or on any local, state, or federal legislation, nor does it endorse, support, or oppose any political parties or candidates for
<urn:uuid:f4d0e061-a8d7-4418-9f5f-51477aa48eac>
CC-MAIN-2017-04
http://www.ppic.org/main/pressrelease.asp?i=528
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00319-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959954
2,468
1.921875
2
"NEW ORLEANS -- Flying over southeast Louisiana, it's easy to see human fingerprints on what's left of the wetlands below." "Marshes have been slashed by straight-edge canals, pipelines and trappers' lines. In many areas, banks of dredged muck piled along canals are all that's left of coastal prairies. Many other canals have vanished entirely as wetlands eroded into open water. The oil and gas industry, which owns about 80 percent of Louisiana's coast, has carved 10,000 miles of canals in the marshes. While scientists debate the scope of industry's role in the state's loss of 1,900 square miles of land over the last century, few dispute that it has had one. Now, a government panel created to oversee protective levees here in the wake of Hurricane Katrina has filed a lawsuit against 97 oil and gas companies that aims to force them to repair or pay for the damage they caused to the marshes."
<urn:uuid:fbca1593-96ab-428e-bb85-82266cdcac6c>
CC-MAIN-2017-04
http://www.sej.org/print/headlines/levee-board-picks-fight-oil-and-gas-industry-roiling-la
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00246-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974107
200
2.65625
3
The Help Stop TB team is hard at work analyzing the data they’ve received so far from World Community Grid. They recently chose two new data analysis tools, which will help them better understand the behavior of the bacterium which causes tuberculosis. Hello everyone, and thank you for contributing your computer time to Help Stop TB! We would have never completed so many simulations if it wasn’t for you! Help Stop TB was created to examine a particular aspect of the highly resistant and adaptable bacterium that causes tuberculosis. The bacterium has an unusual coat which protects it from many drugs and the patient's immune system. Among the fats, sugars and proteins in this coat, the TB bacterium contains a type of fatty molecules called mycolic acids. Our project simulates the behavior of these molecules in their many configurations to better understand how they offer protection to the TB bacteria. With the resulting information, scientists may be able to design better ways to attack this protective layer and therefore develop better treatments for this deadly disease. Choosing Data Analysis Tools and Methods Since our previous mini update in November, Athina has been focusing on analysing our simulation data, and at the same time she is writing up her PhD thesis. As a team, we have now achieved our main goal, which was to come up with a robust and efficient analytical strategy. This will enable us to efficiently process the heaps of data we’re receiving from the simulations conducted by World Community Grid volunteers, and will answer our questions about mycolic acids’ conformational behaviour and its biological implications. The analysis protocol that we have decided on combines a variety of different analytical tools and methods. One of the tools we are using is a PCA (principal components analysis) clustering technique developed at the School of Pharmacy at the University of Nottingham. This tool has helped us categorise the shapes that mycolic acids adopt throughout the simulations. In turn, this gives us a clearer idea about which shapes are the most dominant ones. Figures 1 and 2 below are examples of how we are looking at the shapes of mycolic acids. These structures are important as we are looking at all the possible conformations that mycolic acids can assume in order to try to understand how those molecules work, how their conformations dictate any biological implications and/or affect the disease itself, in the hope to find any links and discover more for prevention methods. Because it has been shown that mycolic acids tend to demonstrate complex conformational behaviours with frequent folding and unfolding events, it is important to assess the frequency of those events. Understanding the frequency in which mycolic acids change from one folding conformation into another may help underpin important aspects of their biological behaviour. Additionally, the length of time that the molecules choose to remain in a certain adopted conformational pattern may also elucidate further biological implications. Each molecule assumes different shapes throughout its folding pathway and these shapes can be very dependent to each other. From the PCA clustering tool data, we have extracted important information regarding the dependency (Figure 1) between the different shapes the molecules assume. Another analytical approach that we employed was the distance matrix analysis. We created and analysed matrices (Figure 2) of the distances of all the carbon atoms along the mycolic acid chain. This method can provide further insight into the frequency of the folding events and can also help us understand more about the flexibility of each structure. We have also tested the suitability of a dihedral angle clustering tool which was developed at the Centre for Molecular Design (CMD) at the University of Portsmouth. This tool was computationally less intensive than the distance matrix analysis, but unfortunately it could not address the frequent refolding events that the mycolic acids demonstrate, thus making it challenging to extract meaningful data. However, the test cases that we analysed with this technique confirmed the predominant clusters that we had found with our PCA tools. We will now use the best choice of analysis options to build a picture for all the different mycolic acids, and will subsequently link the individual behaviour with experimental data on mycolic acid population in bacterial cell walls and their individual roles therein. That was all our news for now! Thank you again for your contributions, and let’s all wish good luck to Athina with her writing! Until the next time, happy crunching! - Researchers Partner with World Community Grid to Help Stop a Leading Killer - Help Stop TB Researchers Begin First Stages of Data Analysis - Help Stop TB Uncovers New Data on Mycolic Acids - Help Stop TB Researchers Seek New Team Members - A Graduation, a Paper, and a Continuing Search for the Help Stop TB Researchers
<urn:uuid:bdd1efb0-7a7d-498f-936d-1baf6828ae87>
CC-MAIN-2022-33
https://www.worldcommunitygrid.org/about_us/article.s?articleId=515
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00479.warc.gz
en
0.939441
970
2.59375
3
German recluse found hiding £1billion Nazi art collection including work by Picasso, Matisse and Dix to be given pictures back - 1,401 paintings discovered in 2012 in apartment of Cornelius Gurlitt - Works thought to be a £1billion trove of potentially stolen Nazi art - Under new deal, art historians will have a year to investigate pictures - If they can prove work was stolen Gurlitt will return it to owners - However, if they cannot, or if they don't finish research, he will get it back - Gurlitt's spokesman said he expects 300 to 350 paintings to be returned Cornelius Gurlitt, 81, who hid a £1bn trove of suspected stolen Nazi art has died in his Munich flat A German recluse accused of hording £1billion worth of art thought to be stolen by the Nazis is to get some paintings back, a court has ruled. Thousands of works by masters such as Pablo Picasso, Henri Matisse and Otto Dix were discovered in the house of 81-year-old Cornelius Gurlitt in 2012 during a small-scale tax investigation. Gurlitt has now agreed to return any work which investigators can prove was stolen, but if there is no evidence of theft after a year then the paintings will be released to him. Of the 1,401 works found at his Munich home, roughly 500 are currently in doubt. Gurlitt's spokesman said he expects to get between 300 and 350 works back. Gurlitt inherited the collection from his father, Hildebrand, who took orders from Adolf Hitler to buy and sell so-called 'degenerate' and Jewish art to fund the party's activities during the 30s and 40s. German prosecutors seized the art trove in February 2012 as part of a tax investigation after Gurlitt aroused the suspicion of German customs officials who stopped him on a train from Switzerland carrying a large sum of cash. The collection, which includes works by Picasso, Matisse and Dix was discovered inside his Munich apartment Under a new deal with prosecutors, art historians will have a year to examine the 1,401 works to establish where they came from and if they were stolen (pictured, a work by Otto Dix) Under the terms of the new deal, the art will be held at a secret location for a year while historians carry out background checks on each of the paintings. After the year is up any painting they cannot prove is stolen, or any painting which they have not finished studying, will be returned to Gurlitt. Augsburg state prosecutor Matthias Nickolai said: 'We have come across new evidence in the course of the investigation ... that leads us to re-evaluate the legal situation.' Gurlitt was set to have the paintings returned at the end of the year if investigators could not unearth whether they were stolen (painting by Henri Matisse) One of the pieces of work discovered in his flat was this masterpiece by Franz Marc Gurlitt's lawyer Tido Park applauded the decision to release the art, saying: 'It's a good day for Cornelius Gurlitt.' The German government has come under fire - especially by families whose relatives were robbed by the Nazis - for keeping silent for almost two years about the trove of art works. Gurlitt was arrested in 2012 but it wasn't until last year that knowledge of the collection became public. Most watched News videos - Devastating plane crash captured on dashcam camera in Malta - Incredible bear-hug with not-so-grizzly animal at sanctuary - Tom Hanks teases Trump over election rigging claims in SNL skit - Mum spits on man after argument breaks out over parking - Is this the creepy moment the corpse of a girl OPENS her eyes? - Terrifying moment a massive huntsman spider carries a MOUSE - Rescue dog finally runs again after an unhappy life in a cage - EXCLUSIVE: Shocking moment Kumbuka attempts to smash glass - Moment McDonald's staff violently attack 'racist' customer - 'The Naked Chef' cooks up tasty chai pudding in his underwear - Mother shaves daughters hair after she 'bullies cancer girl' - In memory of Pete Burns: August 1959 - October 2016 The comments below have been moderated in advance. The views expressed in the contents above are those of our users and do not necessarily reflect the views of MailOnline. We are no longer accepting comments on this article.
<urn:uuid:4e657876-3c1c-4c94-9f21-8a921e0c7eeb>
CC-MAIN-2016-44
http://www.dailymail.co.uk/news/article-2600801/German-recluse-hiding-1billion-Nazi-art-collection-including-work-Picasso-Matisse-Dix-given-pictures-back.html?ITO=1490
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00158-ip-10-171-6-4.ec2.internal.warc.gz
en
0.969783
944
1.703125
2
The size of the stock market relative to the size of the economy is at its highest level ever, raising concerns that the market’s recent all-time highs are detached from reality. The likes of legendary investors Warren Buffett and Paul Tudor Jones have measured the stock market in this, or similar ways in the past to determine if it is overvalued or undervalued. While some valuation measures are based on fickle analyst estimates, the equity market cap-to-GDP ratio is based on concrete and simple data. The same goes for Buffett’s reportedly preferred gauge, equity market cap-to-gross national product, and the cyclically adjusted price-to-earnings ratio, created by Nobel Prize winner Robert Shiller. CAPE, the ratio of the stock market to historical earnings, is near the highest since the dot-com bubble. These big picture looks at economic health are basically showing investors are unrealistically valuing future growth. The equity market cap-to-GDP ratio is at an all-time high, above 200%, Goldman Sachs noted to clients last week. With the S&P 500 up more than 1% in 2020, following a near 30% rally last year, stocks are more expensive by historical standards. The ratio measures the value of all public companies and divides it by U.S. GDP. The chart is similar to one Buffett said he watches as a key measure of valuation, calling it in a Fortune magazine article in 2001 “probably the best single measure of where valuations stand at any given moment.” The Oracle of Omaha said he likes the market cap-to-GNP ratio to be around 70% to 80% — it sits around 187%, by CNBC’s calculations. Hedge fund manager Jones also reportedly watches a variant of the Buffett gauge. In 2017, Jones said the market’s value relative to the economy should be “terrifying” to the Janet Yellen-led Federal Reserve due to low interest rates. The Fed later hiked rates three times in 2017, two times after Jones’ comments. Ultimately the central bank got the warning and reversed itself, cutting rates three times last year helping the economy to catch up. CAPE is near the highest since the 2000 dot-com bubble, when internet stocks rose and eventually collapsed, shedding nearly 80% of value within seven months. The CAPE ratio is a measure that compares stock valuations from different eras by averaging earnings over 10 years, eliminating some of the short-term volatility of each market cycle. Currently, CAPE sits around 28, in the 90th percentile, which Shiller called “significant” in a New York Times article this year. To be sure, it was slightly higher in September 2018, a period that preceded a significant market sell-off. High valuations, low earnings growth Such remarkable gains in 2019 have left U.S. stocks expensive — in the 10th decile, meaning equities have been cheaper at least 90% of the time. “Such elevated valuations in past periods have weighed on equity returns over the subsequent five years and lowered the odds of positive outcomes,” Goldman Sachs Investment Strategy Group CIO Sharmin Mossavar-Rahmani said in the group’s 2020 outlook. “That the bulk of last year’s returns came from higher valuations, and not growth in earnings, only compounds investors’ concerns.” Low rates make it OK? Some economists and traders contend low interest rates instituted by central bankers around the world are the cause of the high valuations and maintain they should allow for higher PEs without big cause for concern. However, Shiller noted interest rate levels historically do not correlate with the CAPE ratio. Stocks continue to climb to record highs and seem to disregard geopolitical pressures. Shiller attributes the gains to “animal spirits,” a sense of optimism and inclination toward risk. “High animal spirits in the stock market are often associated with the disparagement of traditional authority and expert opinion,” Shiller wrote, which he said is being inspired by President Donald Trump’s “Make America Great Again” narrative. “The rise of an explicit belief in irrationality like this one is troubling on many levels,” Shiller wrote in The New York Times. To be sure, some investors will argue a shift away from more capital-intensive businesses in the U.S., like railroads, utilities and manufactures, could have contributed to the disconnect between stocks and the economy. Some of the biggest companies in the world were built through the use of very little capital and software, but have led the largest expansion in U.S. history. View original Post
<urn:uuid:1dd37ff6-61e7-4025-95ed-1782267e4f6d>
CC-MAIN-2022-33
https://betterfinancialhealth.com/finance/the-stock-market-has-never-been-this-big-relative-to-the-economy-signaling-it-could-be-overvalued/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00476.warc.gz
en
0.948894
988
1.859375
2
Help your fifth grader improve his vocabulary with this vocab building worksheet, which will ask him to find three synonyms for three different words. Looking for a worksheet that can help your kid's vocabulary skills? This printable will help practice his vocabulary. What's in a word? Sometimes an anagram! Teach your child some wild wordplay with this anagrams worksheet. Flex your child's vocabulary skills with this worksheet, which has your child helping a mixed up restaurant reviewer rearrange words. Reinforce your child's vocabulary skills with this fun worksheet, which challenges your child to find synonyms for Jill's three wishes. Give your 5th grader's vocabulary a boost while deepening his U.S. history knowledge with this social studies worksheet. This worksheet is a slam dunk for metaphors! Your young writer will learn what makes up a metaphor, and then practice making a few of her own. Your fifth grader will learn impressive words like "tenacious" and "strident" in this vocabulary builder worksheet. Learn some new words with this worksheet. Reinforce known and new words with your child using this vocabulary worksheet. Learn words like "recitation," "incorporate," and more.
<urn:uuid:0035c16e-1e40-4a6a-9ddd-0ca8dc3429ca>
CC-MAIN-2017-04
https://www.education.com/collection/groozie/vocabulary/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00269-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94373
263
4.0625
4
Anyone who shares the goal, emblazoned on the wall in the lobby of the World Bank—OUR DREAM IS A WORLD FREE OF POVERTY—needs to read this sobering book by former World Bank Senior Research Economist, William Easterly. Named after Rudyard Kipling’s 1899 poem, Easterly provides an assessment of foreign aid’s successes—and more frequently—its disasters. Despite spending $2.3 trillion (yes, trillion), nearly three billion people live on less than two dollars day; eight hundred and forty million people in the world don’t have enough to eat; and ten million children die every year from easily preventable diseases; the West still can’t get twelve-cent medicines to children to prevent one-half of all malaria deaths. Contrast this situation to millions of children receiving Harry Potter novels the day they are released. What’s the difference? The former is based on top-down planning, while the latter is not. The right plan is to have no plan. The central conclusion of the book is eloquently summarized by Friedrich Hayek, in The Fatal Conceit: The Errors of Socialism: The curious task of economics is to demonstrate to men How little they really know About what they imagine they can design There’s not one person in the world who knows how to make a pencil, yet any of us can get a pencil relatively easily, without a White House pencil czar, despite the fact that it takes, literally, thousands of people millions of interactions to make one (as Milton Friedman brilliantly explains in this short video). Easterly draws a very useful distinction between Planners and Searchers: Have good intentions Decide what to supply Develop global blueprints Know the answers Believe outsiders impose solutions Receive no feedback Are not held accountable Set priorities, deny trade-offs Look for what works Ask, What’s in demand? Deal with local conditions Don’t have answers in advance Believe only insiders have knowledge Receive instantaneous feedback Held accountable for results Understand there are only trade-offs NGOs and social entrepreneurs Folks like Jeffrey Sachs, Bono, Bob Geldof and George W. Bush are Planners. Geldof told the New York Times, “Something must be one; anything must be done, whether it works or not.” The World Bank (where Easterly worked for more than 16 years) and the IMF—the Sisters of Nineteenth Street—are also clearly in the Planners camp. The Planner’s Paradox No matter how much you may want it, it doesn’t make sense to have as your goal that your cow will win the Kentucky Derby. It’s much more useful to ask, “What useful things can a cow do?” Aid agencies are cows, not racehorses, according to Easterly. He tells the story of his nine-year old daughter asking him, “Why do ambulances make so many accidents?” The presence of the IMF and World Bank is a consequence of poverty, not the cause. Yet the problem is their very presence does cause further pile-ups due to rubbernecking bureaucratic planners, a phenomenon Easterly fails to explain fully, though he does equate aid to the “natural resource curse” (think oil-producing countries) with all of its concomitant negative effects on economic growth. Another paradox is free markets—they work, but free market reforms do not (think Russia). Same with democracy; it works, but it cannot be imposed, since the majority may vote to abolish it. It’s amusing that in Eastern Europe, after the fall of the USSR, the Big Six accounting firms were the chief recipients of foreign aid dollars, paid to draft new laws and create free markets, which had little effect on local customs. In fact, in 2003, KPMG’s Bearing Point received a contract from USAID to create a free market in Iraq. Hiring accountants and consultants to create a free market is like appointing a eunuch to edit Playboy. A free market is not created from a top-down plan; it doesn’t have goals, which is why we don’t need a White House book czar to ensure children get Harry Potter books. It’s also why we have no Jell-O shops in New York, but plenty of bagel shops. Easterly does a masterful job of debunking the three legends of poverty with an overwhelming amount of empirical evidence: Legend Part One: The poorest countries are stuck in a poverty trap from which they cannot emerge without an aid-financed big push. Legend Part Two: Whenever poor countries have lousy growth, it is because of a poverty trap rather than bad government. Legend Part Three: Foreign aid gives a big push to countries to achieve a takeoff into self-sustained growth. Too Many Politicians Easterly applies the principal-agent problem to that of foreign aid, explaining that it’s really the politicians who are the principals—not the poor—and the aid agencies are their agents. Thus, agencies are not held accountable by the very people they are trying to help. There are far too many agencies who are each responsible for a plethora of objectives. When the objectives are not met, each agency can blame the others. If everyone is responsible, no one is. It’s much easier to fart in a crowded elevator, since no one knows who’s to blame, than one where there are only two people. He asks you to compare the cleanliness of your dining room with your attic. The poor are invisible, located in the rich world’s attic (especially the United Nations). Agencies only have to have visible plans and good intentions to delight the politicians, not produce actual results for the poor. Easterly claims aid agencies have been bogged down the aid agencies in the equivalent of its Vietnam: AIDS. Despite a number of health triumphs—one area where the agencies have actually produced some good results—they have utterly failed on AIDS. What’s the Answer? Easterly concludes that aid will never be able to end poverty, only homegrown free markets can do that with any efficacy. The solution: First, do no harm. In my mind, this means abolishing the World Bank, the IMF, and most other government-to-government aid agencies, as they have done demonstrably more harm than good. But Easterly does believe that aid agencies can do some good, if they are held accountable for narrow results. Good luck with that. I don’t think it’s possible, otherwise it would have already happened. No doubt some NGOs and social entrepreneurs are achieving positive results in some limited areas. He cites Global Giving as aid’s version of online dating, with some positive results accomplished. The problem with these types of efforts is they detract from the real issue: we shouldn’t study poverty, for even if we knew the root causes, what would we do with that knowledge—create more of it? We need to study how wealth is created. And it’s not created through aid agencies and NGOs giving away malaria nets and free medicines. Rather, it’s created through a culture of exalting free minds in free markets, where entrepreneurship flourishes and continuously lifts people out of the perils of poverty. It is our only hope. One optimistic note that Easterly cites is that the children coming of age today have only known markets, and will make them better due to digital technology. Time will tell, though I’m much less sanguine about this view. But I remain a paranoid optimist, as long as we realize that the goal is to create wealth, the one and only antidote to creating a world free of poverty.
<urn:uuid:12c1ae1b-31f4-4cc8-a7e7-f25594e53d95>
CC-MAIN-2016-44
http://verasage.com/resources/recommended-reading/book-review-the-white-mans-burden/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00241-ip-10-171-6-4.ec2.internal.warc.gz
en
0.942162
1,663
2.484375
2
Wednesday, April 11, 2012 You've probably heard that in three days it will be the 100th anniversary of the Titanic tragedy, but did you knew that there is a common point between the Titanic and DLP Molly Brown Riverboat ? The answer is simple: the common point is Molly Brown herself as the real Molly Brown, a quite extraordinary woman, was aboard the Titanic on that fateful night, when the ship hit an iceberg. Molly Brown survived and i thought you may be interested to see how she looked. So here is a rare picture of her giving a cup in gratitude to Arthur Rostron, captain of the Carpathia, the ship who saved 706 passengers of the Titanic. Just a bit of trivia about DLP riverboat who was refurbished last year, so next time you'll board on the Molly Brown, you will know a bit more about the real Molly Brown, who inspired the ship.
<urn:uuid:25ca0ce3-ab21-4bd6-a646-fea24e0dea9f>
CC-MAIN-2017-04
http://disneyandmore.blogspot.com/2012/04/what-is-common-point-between-titanic.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00303-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967093
185
2.03125
2
Written in EnglishRead online |Statement||edited by Stanley A Plotkin, Bernadino Fantini.| |Contributions||Fantini, Bernardino., Jenner, Edward, 1749-1823., Pasteur, Louis, 1822-1895., Plotkin, Stanley A., 1932-| |LC Classifications||QR189 .I546 1995| |The Physical Object| |Pagination||379 p. :| |Number of Pages||379| Download Vaccinia, vaccination, vaccinology MRNA vaccines represent a promising alternative to conventional vaccine approaches because of their high potency, capacity for rapid development and potential for low-cost manufacture and safe administration. However, their application has until recently been restricted by the instability and ineffi Cited by: There is overwhelming scientific consensus that vaccines are a very safe and effective way to fight and eradicate infectious diseases. The immune system recognizes vaccine agents as foreign, destroys them, Vaccinia "remembers" them. When the virulent version of an agent is vaccinology book, the body recognizes the protein coat on the virus, and thus is prepared to respond, by first neutralizing the MeSH: D One live rotavirus vaccine, RV5 (RotaTeq), is produced through genetic manipulation of the wild-virus strains. Selected References. Pink Book webinar series, “Principles of Vaccination” recast (accessed Septem ). Plotkin S. Vaccines, vaccination, and vaccinology. Infect Dis ;– The book is also suitable for everyone involved in designing and conducting clinical vaccine trials, and is the ideal companion to vaccination larger reference book Vaccinology: Principles and Practice. About the Editors Drs. Vaccination Barrett and Gregg Milligan are world-renowned experts in vaccine development and viral immunology. The Vaccine Book, Second Edition provides comprehensive information on the current and future state of vaccines. It reveals the scientific opportunities and potential impact of vaccines, including economic and ethical challenges, problems encountered when producing vaccines, how clinical vaccine trials are designed, Vaccinia how to introduce vaccines into widespread use. Vaccine Information Statements (VISs) are information sheets produced by the CDC that explain both the benefits and risks of a vaccine to vaccine recipients. Federal law requires that healthcare staff provide a VIS to a patient, parent, or legal representative before vaccination dose of certain vaccines. DNA vaccines are also said to be more stable than conventional vaccines in warm climates "if kept dry and/or sterile at pH8," says Church. In Nigeria, children line up for a polio vaccine, but. mRNA Vaccines: Disruptive Innovation in Vaccination May WHITE PAPER. Corporate Headquarters | Bent Street | Cambridge, MA p: f: vaccination From the development of each vaccine to its use in reducing disease, Plotkin’s Vaccines, 7th Edition, provides the expert information you need to provide optimal care to your patients. This award-winning text offers a complete understanding of each disease, as well as the latest knowledge of both existing vaccines and those currently in research and development. Kathleen Neuzil, M.D., professor in vaccinology and director of the Center for Vaccine Development and Global Health at the University of Maryland School of Medicine, echoes Schaffner’s sentiment and points to the flu vaccine for comparison: There are multiple formulations on the market, including the injectable high-dose vaccine and the. Vaccinology: An Essential Guide outlines in a clear, practical format the entire vaccine development process, from conceptualization and basic immunological principles through to clinical testing and licensing of vaccines. With an outstanding introduction to the history and practice of vaccinology, it also guides the reader through the basic science relating to host immune responses to pathogens. Vaccinology in Latin America: A Resource for Immunization Managers. This book, developed out of Sabin's annual Vaccinology Course for immunization managers, seeks to provide immunization professionals with the tools they need to ensure the technical and operational success of their programs. The chapter topics were selected based on feedback provided by course participants over the years. Pro 1 Vaccines can save children’s lives. The American Academy of Pediatrics states that “most childhood vaccines are vaccination effective in preventing disease.” According to [email protected], a United Nations Foundation partner organization, vaccines save million children from preventable diseases every year , which Vaccinia to roughly children saved every hour. Vaccinology: An Essential Guide outlines in a clear, practical format the entire vaccine development process, from conceptualization and basic immunological principles through to clinical testing and licensing of vaccines. With an outstanding introduction to the history and practice of vaccinology, it also guides the reader through the basic science relating to host immune responses to pathogens.5/5(1). This book is aimed to introduce teens and preteens to vaccines, their history, and the facts surrounding them, and does that extremely well. Haelle has a gift for presenting complex information in a way that's both engaging and easy for a young, new reader - without sacrificing nuance or the main s: A Brief History of Vaccine Routes. Historically, the oldest vaccines, such as for smallpox, were given by scarification of the skin. When a more systematic approach to vaccines took off in the. Sarah Gilbert, professor of vaccinology at Oxford University, who is heading its Covid vaccine research, told the Lords committee that none of the vaccines in. The International Society for Vaccines is an organization that engages, supports, and sustains the professional goals of a diverse membership in all areas relevant to vaccines. Latest News November Paper of the Month Available. Human Vaccines & Immunotherapeutics is an international journal of vaccinology and immunotherapy that publishes novel and experimental vaccine research.&nbs Letter to the editor concerning the article ‘Association between rotavirus vaccination and risk of intussusception among neonates and infants: a systematic review and meta-analysis. Immunizations, or vaccines as they're also known, safely and effectively use a small amount of a weakened or killed virus or bacteria or bits of lab-made protein that imitate the virus in order to. Abstract. Reverse vaccinology defines the process of antigen discovery starting from genome information. From its first application to Neisseria meningitidis group B, this approach has gradually evolved and is now accepted as a successful method of vaccine discovery, as it can be exploited to develop vaccines against many types of pathogens. Current reverse vaccinology approaches. The NFID Clinical Vaccinology Course (CVC) was conducted as a virtual event on Novemberdue to the COVID pandemic. By transitioning to a virtual format, the program offered a safe and meaningful exchange of scientific and clinical information, educational programming, and networking opportunities for all participants. Vaccines is a well-written book on the subject of providing crucial information to students and researchers in the field of vaccinology. The introductory chapter, contributed by the editor (Dr. Vijay Kumar) of the book, provides the brief introduction to the history of the development of current forms of vaccine, which is difficult to find easily in one place. In addition, other chapters of. About this book. Covering all aspects of vaccine research and development in one volume, this authoritative resource takes a comprehensive and systematic approach to the science of vaccinology focusing not only on basic science, but also on the many stages required to commercialize and navigate the regulatory requirements for human application. Louis Pasteur’s rabies vaccine was the next to make an impact on human disease. And then, at the dawn of bacteriology, developments rapidly followed. Antitoxins and vaccines against diphtheria, tetanus, anthrax, cholera, plague, typhoid, tuberculosis, and more were developed through the s. The company adapted its platform—the plasmid and means for testing it—to make a vaccine for SARS-CoV DNA-plasmid vaccines work by transferring the genetic blueprint to. The first vaccines. The first vaccine was introduced by British physician Edward Jenner, who in used the cowpox virus (vaccinia) to confer protection against smallpox, a related virus, in to that use, however, the principle of vaccination was applied by Asian physicians who gave children dried crusts from the lesions of people suffering from smallpox to protect against the. Vaccines (ISSN X; CODEN: VBSABP) is an international peer-reviewed open access journal published quarterly online by MDPI. The American Society for Virology (ASV) is affiliated with Vaccines and their members receive a discount on the article processing charges. Open Access —free for readers, with article processing charges (APC) paid by authors or their institutions. Vaccine effectiveness- ability of vaccine to prevent outcomes of interest in the “real world” Primary care settings Less stringent eligibility Assessment of relevant health outcomes Clinically relevant treatment selection and follow- up duration Assessment of relevant adverse events Adequate sample size to detect clinically relevant. The Vaccine Education Center at Children's Hospital of Philadelphia provides complete, up-to-date and reliable information about vaccines to parents and healthcare professionals. We are a member of the World Health Organization's (WHO) Vaccine Safety Net because our website meets the criteria for credibility and content as defined by the Global. First vaccines. Edward Jenner invented a method to protect against smallpox in The method involved taking material from a blister of someone infected with cowpox and inoculating it into another person’s skin; this was called arm-to-arm inoculation. To prevent the flu, the CDC recommends annual flu vaccination for everyone ages 6 months or older. Adults age 50 and older should not get the nasal spray flu vaccine. The flu can cause serious complications in older adults. Pneumococcal vaccine. The CDC recommends the pneumococcal vaccines — there are two — for adults age 65 and older. This is a timeline of the development of prophylactic human vaccines. Early vaccines may be listed by the first year of development or testing, but later entries usually show the year the vaccine finished trials and became available on the market. Although vaccines exist. Clinical Vaccinology and Immunisation is an educational resource for UK health care workers that provides a range of information about vaccines and their roles in reducing the impact of vaccine preventable infections at an individual level. The 31st National Immunisation Conference for Healthcare Workers is coming soon. BOOK NOW. Website Sections. This book has several strong points. Although there are many textbooks that deal with vaccinology, few attempts have been made to bring together descriptions of vaccines in history, basic bioinformatics, various computational solutions and challenges in vaccinology, detailed experimental methodologies, and cutting-edge technologies. 6 | VACCINE FACT BOOK VACCINE FACT BOOK 6 IGURE In addition to combining several serotypes of a disease-causing organism in a single vaccine (e.g. valent pneumococcal conjugate vaccine), vaccines against different disease-causing organisms can be combined to provide protection against several different diseases. These. 28 J.S. Smith, Patenting the Sun: Polio and the Salk Vaccine (New York: Anchor Books, ) Crossref, Medline, Google Scholar; J.P. Baker, “Immunization and the American Way: Four Childhood. The diseases that childhood vaccines are meant to prevent are most likely to occur when a child is very young and the risk of complications is greatest. That makes early vaccination — sometimes beginning shortly after birth — essential. If you postpone vaccines until a child is older, it might be too late. The Fluad vaccine, a flu vaccine licensed for adults aged 65 years and older, contains an adjuvant called MF59, which is an oil-in-water emulsion containing squalene. The. Pardi N, Hogan MJ, Porter FW, et al. mRNA vaccines - a new era in vaccinology. Nat Rev Drug Discov. ; 17(4): Weiss R, Scheiblhofer S, Thalhamer, J. Generation and Evaluation of Prophylactic mRNA Vaccines Against Allergy. About Us. Parents should be informed about both the benefits and the risks associated with vaccines -- without pressure, propaganda, or agenda. So we brought together more than 60 of the world's foremost health experts to investigate both sides of this contentious debate to give you the science, the history, and the untold story the REAL information you need to make an informed decision on. Rappuoli R, Pizza M et al. Vaccines, new opportunities for a new society. Proceedings of the National Academy of Sciences of the United States of America.34 (): This page last update: MM-YYYY.The extraordinary speed with which mRNA technology has delivered what appear to be safe and highly efficacious vaccines for preventing COVID herald the start of a “golden age of vaccinology,” according to C. Buddy Creech, director of the vaccine research program at Vanderbilt University in Nashville and principal investigator on the phase III trial of Moderna Inc.’s mRNA COVID
<urn:uuid:2e34a3dd-b7ec-474a-9f31-6de6d9165754>
CC-MAIN-2022-33
https://fapyzimezuse.aureusid.com/vaccinia-vaccination-vaccinology-book-15775al.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00274.warc.gz
en
0.917914
2,806
2.875
3
I think that most of the longevity advice we’ve been given is total garbage. This morning, I was surprised as I spoke with a friend whose mom had an objectively hard life – the kind typical of the WW2 era. She had immigrated from Europe, was orphaned, struggled her entire life in New York City, had very few breaks – ever – and suffered through injury, illness, death, car accidents and more. You would think that she would be fragile from so much adversity, and would eventually pass away earlier in life. You would think that she would live shorter. Listening to most of the advice on how to live better, people always say to just to just “take it easy.” In other words, they’re saying to just have an easy life, don’t strive for too much, make sure to relax and not burn yourself out, etc. But I was shocked when I heard about the age of my friend’s mom: 87. I could’ve sworn she was in her mid 60’s. Maybe 70. Maybe. She was still walking around normally, with very little stiffness. She had loads of personality. And she was completely there. And she looked young. Really young. It wasn’t until I took more time to think about it did I realize that an easy life doesn’t necessarily equal a long one. Why An Easy Life Doesn’t Make You Live Longer It sounds simple in theory: we’re all stressed out, so the solution to better health is just to take it easy and do less, right? I thought that made sense too. In an article mentioned in TIME Magazine, research done by Stanford researchers Howard S. Friedman and Leslie R. Martin sought to analyze some of the factors that allowed people to live to an old age. Their results were eventually profiled in a book called The Longevity Project. One of their interesting conclusions was the following: “The qualities of a prudent, persistent, well-organized person, like a scientist-professor — somewhat obsessive and not at all carefree” are the qualities that help lead to a long life. “Many of us assume that more relaxed people live longer, but it’s not necessarily the case.” Why? Conscientious behavior influences other behaviors. Conscientious people tend to make healthier choices, including who they marry, where they work, and the likelihood they’ll smoke, drive too fast, or follow doctors’ orders. And that one personality aspect in particular – hard workers, and not relaxed surfer dudes on the beach – do live longer (with exceptions) for some interesting reasons. I’m not going to focus on diet and exercise – I’ve featured 23 people that lived to be 100+, and we know that diet matters. But we’re talking about the inner, intangible aspects of health here. So why is it that this one mindset allows people to live longer? Why Hard Workers Live Longer I once knew an older guy that had lived the typical “work the latter” type of lifestyle. He worked like a dog in the finance industry to get his way to the top, finally was doing well financially, and a few decades later it was time to retire, get his nice place in North Carolina, tend his garden and play some golf. A week after retirement I overheard someone talking about him: “Dude, have you seen Bill? I saw him walking around the street like a zombie – almost like he had Alzheimer’s. He was just wandering aimlessly down the road. I thought it was a homeless person by how he was acting, or someone who was lost. It’s crazy.” This guy had had so much self directed purpose for five decades, that now that there wasn’t a reason to get up in the morning, a challenge, something to put him into flow, he couldn’t function. This is typical of ambitious, hard workers. Retirement is deadly for the mind. Purpose, Meaning & The Great Life Another story: there’s an elderly woman on the street I grew up on, who was a traveling and army nurse during World War 2. She has lived alone her entire life, and still lives alone, and you know what always gets me? Anytime I see her (without her seeing me), she always has this huge smile plastered on her face. Unfortunately, I never asked her what her “secret” was, but several years ago my mom did, and here’s what she said: “The world is so interesting and there are so many interesting places to see and things to do!” Pretty simple, but pretty profound right? If life’s interesting, there’s a pretty damn good reason to keep on living, isn’t there? And if there’s no point in waking up in the morning because life’s a bore – what’s the point? Why not go back to sleep forever? This is one of those intangible aspects of health that doctors aren’t too keen on talking about. It’s not always easy to say how much being happy or being miserable affects health and longevity – despite the fact that we all see it. Hard workers often work hard for a purpose. The immigrant who wants a better life for her kids. The father who wants a better life for his wife and sons. The person who is tired of waking up to the 9-5 grind and repeating the same, monotonous, meaningless day, over and over – who wants something better. All these people have a deep why behind their hustle and work ethic. Maybe that’s why they go on to live long lives: purpose. People with a large purpose are persistent, they are unwilling to quit, they are tenacious, and they are much harder to beat down than the average person. Willing Yourself to Death and The Power of Work & Busyness As a Purpose In the 18th century, as a BBC article mentions, a cruel prank was played on a medical assistant that wasn’t well liked: Doctors have long known that beliefs can be deadly – as demonstrated by a rather nasty student prank that went horribly wrong. The 18th Century Viennese medic, Erich Menninger von Lerchenthal, describes how students at his medical school picked on a much-disliked assistant. Planning to teach him a lesson, they sprung upon him before announcing that he was about to be decapitated. Blindfolding him, they bowed his head onto the chopping block, before dropping a wet cloth on his neck. Convinced it was the kiss of a steel blade, the poor man “died on the spot”. This is clearly just one anecdotal example, but virtually everyone knows an elderly person, grandparent, or even a parent that decided “I’ve lived a long life, and it’s my time.” Not long after, they passed away. It’s also interesting that I’ve seen so many elderly married couples where one partner will die, and the other will die within six months from no other apparent illness besides loneliness or unhappiness. No doubt the mind is powerful. With this immigrant hustle that I keep coming back to, there’s often a really strong purpose for living and existing. Sometimes the purpose is as simple as making your parents proud, providing a better future for your kids, or just surviving another day and trying to feed yourself. This kind of internal fire to live, improve, hustle, work, and keep going is really interesting to me. So rather than taking it easy, walking on eggshells, and worrying about work and being busy – maybe it’s time to stay busy, but maybe be more busy doing the right stuff. The right stuff that leads you to a sense of purpose. The right stuff that leads you to a powerful why. And the right stuff that leads to the tenacious, bull mindset willing to push you through any obstacles on the path. Some images: freedigitalphotos.net
<urn:uuid:b5a8fda1-3284-4c7f-992b-0bed566ef596>
CC-MAIN-2016-44
http://modernhealthmonk.com/longevity-and-hard-life/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00106-ip-10-171-6-4.ec2.internal.warc.gz
en
0.974987
1,741
2.078125
2
Indiana announces crowdfunding rules INDIANAPOLIS – Hoosiers who don’t have a fistful of cash now have a way to become equity investors in Indiana businesses. The secretary of state’s office has developed new rules that allow individuals to use crowdfunding to invest up to $5,000 at a time in privately owned businesses. It also permits Hoosier entrepreneurs to use the increasingly popular online fundraising strategy to raise up to $2 million to start or expand a business. State lawmakers this year passed legislation on crowdfunding that went into effect Tuesday and led to this opportunity for small investors to support homegrown firms. “It is intended to be one more tool to help Indiana companies get off the ground and stay productive,” Secretary of State Connie Lawson said this week. “This new market will change the way Indiana entrepreneurs and investors connect.” Traditional crowdfunding began as an online fundraising strategy to allow the public to donate small amounts of money. More typically, the money is donated through social networking websites to help artists, musicians, filmmakers and others. But under the new law, businesses can use crowdfunding to attract investors. “It’s going to be really important for a lot of small businesses throughout Indiana to be able to raise funds this way,” said Jason Whitney, executive director of the Innovation Center, a business incubator in Richmond. “I’m really proud of the state of Indiana for taking this step forward and being one of the first states to offer this for our entrepreneurs.” Michigan and Wisconsin started crowdfunding online investment programs this summer, Lawson said. Georgia and Kansas have similar investment opportunities, but not online. Nationally, Congress passed in April 2012 the JOBS Act, which instructed the Securities and Exchange Commission to draft rules to implement crowdfunding. But rules haven’t been created yet. In Indiana, the online crowdfunding can be used in conjunction with more traditional financing options, according to Lawson. But with more small investors, crowdfunding may allow entrepreneurs to better stay in control of the vision and direction of their businesses, she said. Previously, she said the only people who could invest in private business offerings were “accredited investors” — those with a $1 million net worth or an individual income of $200,000 or joint income of $300,000. During the Great Depression, the federal government banned private companies from soliciting investments from the general public to limit fraud. But Lawson said much more transparency and disclosure exists now because of the Internet, so this restriction on small investors is no longer needed. Still, investors need to be wary. “Hoosiers need to be aware of the risks before they invest, and they should always do their research before investing,” said state Securities Commissioner Carol Mihalik, who helped develop the rules with staff and the advice of local businesses. Rules under the new law help limit the risk. Businesses that want to participate have to register with the secretary of state’s office and submit their offerings and financial information and the names of their escrow agent and Internet hosts. If companies don’t want to submit their financial data, they can only raise $1 million through crowdfunding. Investors visit the Internet host sites to learn about companies in which they want to invest. Funds anyone invests will be directed to an escrow account until the business has raised the amount of funds it committed to raise in a period of time it chooses. If all the money is raised in that time period, the funds are invested in the company. If not, investors get their money back. “We will monitor crowdfunding just like any other security,” said Lawson. She doesn’t expect many businesses to use this method at first, but she expects it will catch on as more businesses realize its benefits. Lawson said crowdfunding could be helpful to businesses such as restaurants, breweries, organic farms, tech firms and other startups.
<urn:uuid:a9d4d86a-6fc5-4846-b26c-a4f9b0f98d66>
CC-MAIN-2022-33
https://www.courier-journal.com/story/news/local/indiana/2014/07/02/indiana-announces-crowdfunding-rules/12113407/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00267.warc.gz
en
0.955993
816
1.835938
2
My daughter celebrated her birthday last week , adn she wanted to have a « Princess » themed party. By coincindence I came across this DIY tutorial on how to make Laces crown on pagingfunmums and I tried it , it was so easy to make and beautiful that my daughter still wears it ! You will need : - Lace (‘Cluny’ or ‘Guipure’ Lace ) - Fabric stiffner - Acrylic paint - Paint brush and/or paint sponge - ‘Bling’..you can use pearls, beads, diamantes etc. I found everything at my local craft store - Glue gun or very strong craft glue - Spray paint (optional) Start by drenching your lace in the favric stiffener. Lay all the lace pieces onto a large piece of baking paper, then paint the fabric stiffener onto each piece ensuring all parts were completely covered. Let it dry for one hour or over night. Now , the decoration of the crown can have many ways : - You can paint/sponge the lace with acrylic paint, then cover it with matching glitter - You can also spray paint the lace and cover it with matching glitter whilst, then add perals or diamantes using glue gun. Once the crowns are completely dry , measure on the sizing by placing it on the head of your duaghter , then trim any excess lace and glue together. You can be creative in decorating your crowns depending on what you or your daughter might like .
<urn:uuid:44e3b7cd-5b6a-49f2-8379-82bcec1a2d80>
CC-MAIN-2017-04
http://www.canadiansavers.ca/blog/diy-lace-crowns
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00316-ip-10-171-10-70.ec2.internal.warc.gz
en
0.925226
328
1.554688
2
Heavy snow and freezing temperatures have caused problems across the UK’s road network, amid warnings there could be worse weather to come. Many parts of the country endured their coldest night of the winter on Friday, with a low of minus 12.4C recorded, and heavy snow fell in Scotland, northern England and the Midlands during Saturday. The Met Office has issued an amber alert for much of the UK and has predicted parts of Cumbria, Lincolnshire, North Yorkshire, the Peak District and the Midlands could see up to 15cm of snow by Sunday. It is expected most places will wake up to a blanket of snow, with falls already having begun in East Anglia and London and likely to amount to 10cm.Conditions have made driving difficult and the AA said it expected to deal with double its usual number of callouts on Saturday, while the RAC revealed it had attended 70 per cent more breakdowns than normal. Kevin Andrews, RAC patrol ambassador, said: ‘It looks like we’re going to get a dangerous cocktail of driving conditions, with heavy snow and sub-zero temperatures making the roads extremely treacherous.’ Heathrow Airport has already made plans for bad weather on Sunday and announced a reduced timetable featuring just 70 per cent of its scheduled flights. PICTURES: Heavy snow covers the UK
<urn:uuid:39b24956-7396-4a65-b86f-8c37cdcd5048>
CC-MAIN-2017-04
http://metro.co.uk/2012/02/04/heavy-snow-expected-for-much-of-uk-as-weather-deteriorates-308444/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00267-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964331
277
1.804688
2
100% Authentic KN95 respirator mask: - CE Certified, genuine, and engineered to ensure performance surpasses industry standards. - Protection: Filters out at least 95% of airborne particles. - Top Quality: Made of high-grade safety standard materials including 5 layers of protection. - Comfort: Elastic soft ear hooks & thin multi-layer design provides maximum comfort. A KN95 respirator mask is a protective device specifically designed to achieve a very close facial fit and provide maximum filtration of airborne particles. The respirator is able to block at least 95 percent of extremely small particles (0.3 microns). When properly fitted, the filtration capabilities of KN95 respirators may exceed other face masks. KN95 respirators can be used for: nail salon, construction, mining, textile, manufacturing, food safety, pharmaceutical, electric, and other industries that require protection from harmful particles. Individuals with chronic respiratory, cardiac, and other medical conditions that make it difficult to breathe should check with their health care provider before using an KN95 respirator as the KN95 respirator may make it harder for the wearer to breathe. KN95 respirators are not intended for children or people with facial hair. A proper fit cannot be achieved and the KN95 respirator will not provide full protection. Masks are intended for one time use only. If breathing becomes difficult after long term use, remove the respirator, properly discard the mask, and replace it with a new one. To safely discard your KN95 respirator mask, place it in a plastic bag and place it in the trash. Thoroughly wash your hands after handling a used mask and before putting on a new one. Masks should also be discarded after each patient encounter and after aerosol-generating procedures. It should also be discarded if it becomes damaged or deformed, no longer forms an effective seal to the face, becomes wet or visibly dirty, breathing becomes difficult, or if it becomes contaminated with blood, respiratory or nasal secretions, or other bodily fluids from others. Please note: KN95 masks are NOT NIOSH approved N95 masks. WARNING: This respirator helps protect against certain contaminants along with proper hygiene procedures. It may not eliminate the risk of contracting disease or infection.
<urn:uuid:aa868dc2-ea3b-4441-899a-5ac8e1d2008b>
CC-MAIN-2022-33
https://purus-skin.com/kn95-for-adults-white-2d-type-2-masks/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00078.warc.gz
en
0.891408
474
1.960938
2