pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
145
1M
source
stringlengths
37
43
__label__wiki
0.81549
0.81549
The Role of Information and Social Interactions in Retirement Plan Decisions: Evidence from a Randomized Experiment NBER Working Paper No. w8885 53 Pages Posted: 11 Apr 2002 Last revised: 21 Oct 2008 See all articles by Esther Duflo Esther Duflo Massachusetts Institute of Technology (MIT) - Department of Economics; Abdul Latif Jameel Poverty Action Lab (J-PAL); National Bureau of Economic Research (NBER); Centre for Economic Policy Research (CEPR); Bureau for Research and Economic Analysis of Development (BREAD) Emmanuel Saez University of California, Berkeley - Department of Economics; National Bureau of Economic Research (NBER) MIT Department of Economics Working Paper No. 02-23 Number of pages: 48 Posted: 12 Jun 2002 Number of pages: 53 Posted: 11 Apr 2002 Last Revised: 21 Oct 2008 Date Written: April 2002 This paper analyzes a randomized experiment to shed light on the role of information and social interactions in employees' decisions to enroll in a Tax Deferred Account (TDA) retirement plan within a large university. The experiment encouraged a random sample of employees in a subset of departments to attend a benefits information fair organized by the university, by promising a monetary reward for attendance. The experiment more than tripled the attendance rate of these treated individuals (relative to controls), and doubled that of untreated individuals within departments where some individuals were treated. TDA enrollment 5 and 11 months after the fair was significantly higher in departments where some individuals were treated than in departments where nobody was treated. However, the effect on TDA enrollment is almost as large for individuals in treated departments who did not receive the encouragement as for those who did. We provide three interpretations, differential treatment effects, social network effects, and motivational reward effects, to account for these results. Duflo, Esther and Saez, Emmanuel, The Role of Information and Social Interactions in Retirement Plan Decisions: Evidence from a Randomized Experiment (April 2002). NBER Working Paper No. w8885. Available at SSRN: https://ssrn.com/abstract=307122 Esther Duflo (Contact Author) Massachusetts Institute of Technology (MIT) - Department of Economics ( email ) 50 Memorial Drive Room E52-544 Abdul Latif Jameel Poverty Action Lab (J-PAL) ( email ) HOME PAGE: http://www.povertyactionlab.org/ Centre for Economic Policy Research (CEPR) Bureau for Research and Economic Analysis of Development (BREAD) ( email ) University of California, Berkeley - Department of Economics ( email ) 549 Evans Hall #3880
cc/2019-30/en_head_0010.json.gz/line2587
__label__cc
0.603246
0.396754
May 3, 2019 | Uncategorized Medison issues open letter to Knight shareholders, detailing strong momentum for change created by its campaign to end conflicts of interest and revitalize Knight’s strategy If Medison nominees do not achieve majority Board representation, Medison believes nothing meaningful will change at Knight Medison remains committed to ongoing engagement with shareholders to bring necessary change to Knight, including at very next opportunity Medison pledges to pursue its Diamond strategy in Canada independently PETACH TIKVA, Israel, May 3, 2019 – Medison Biotech (1995) Ltd. (“Medison”), which together with its affiliates owns more than 10.4 million shares or 7.3% of Knight Therapeutics, Inc. (TSX:GUD) (“Knight” or the “Company”), today issued the following open letter regarding the strong momentum for change it has created through its campaign. Further it detailed its intention if its nominees are unable to achieve Board representation with the ability to effect meaningful change, including pledging to pursue a Diamond strategy in Canada through a new company, independent of Knight. The full text of the letter to Knight shareholders is included below: Dear Fellow Shareholders, I am writing to you as we approach the proxy voting deadline for this year’s annual and special meeting of shareholders of Knight Therapeutics, in order to share with you my thoughts about our campaign to bring a New Day For Knight. Our campaign is a great victory for all Knight shareholders – we already created a strong change in wind… Three months into the election process, during which we invested substantial time and resources and met with most of the largest shareholders of Knight across Canada and the United States, I’d like to share with you that our first mission has been completed in a very successful manner. Through our advocacy, we have created a dynamic that has led to the beginnings of real change for the better: 1. Jonathan Goodman has started to listen and engage with shareholders. After we publicly raised our concerns, shareholders engaged directly with Jonathan Goodman. We understand that a during a number of these discussions, shareholders expressed their extreme disappointment and were very critical of management and the incumbent board. Jonathan Goodman can no longer claim that his shareholders are happy. We, Cambridge/CI and many other shareholders who expressed their concerns both publicly and privately are certainly unhappy. 2. Jonathan Goodman has admitted that the “invest in funds” strategy is a colossal failure. As a direct result of our campaign, Jonathan Goodman has now publicly acknowledged Knight’s failure to realize any strategic value from Knight’s $138M commitment to venture capital funds. It took Jonathan Goodman and the company four years to admit that these investments were an expensive mistake and to cease making further additional investments of this nature. Jonathan Goodman is finally openly and honestly admitting this colossal failure as a direct result of our campaign. 3. Jonathan Goodman has begun to refresh Knight’s board. As a direct result of our campaign, Knight has nominated Michael Tremblay, a seasoned executive with substantial pharma experience, to the board. Michael Tremblay, who is independent from Knight, Jonathan Goodman and the Goodman family, has very similar background to our nominees. In our opinion it is too little and too late, but the addition of Michael Tremblay to Knight’s board is exactly what we were hoping for. 4. Jonathan Goodman can no longer act upon or ignore his conflicts of interest. Our campaign revealed the truth about Jonathan Goodman’s interest in his competing family business (Pharmascience) to all Knight shareholders. Jonathan Goodman publicly admitted to these conflicts of interest by placing his interest in Pharmascience in a “blind trust.” This action was only taken by Jonathan Goodman as a result of our campaign, though it does nothing to resolve the conflicts of interest. All shareholders now have an eye on Jonathan Goodman’s actions and are mindful of his economic misalignment. As a result, many of Knight’s institutional investors are voting FOR our proposed enhanced governance by-law, which was also backed by Glass Lewis, that will force Jonathan Goodman to remove these conflicts or resign as CEO. 5. Knight has committed to distribute excess cash. As a direct result of our campaign, Knight has acknowledged that it sits on excess cash and has adopted our share buyback plan, almost word for word. I would like to remind all of you why we started this campaign. In the last three and a half years, since Medison became the second largest shareholder of Knight, I have become aware of numerous and serious flaws in Knight’s leadership and operational focus, which ultimately exposed the fact that Knight has no coherent business strategy. It has failed to build its pharma business and it suffers from untenable and unprecedented conflicts of interest. There can be no doubt that Knight’s governance has had a direct influence on the poor performance of the company and its stock price. Today’s stock price incorporates the market’s judgment about Knight’s business prospects: there is almost no value in the stock for anything other than cash and financial assets. Put differently, investors do not assign any value to the ability of Jonathan Goodman and management to generate returns from the company’s assets. As a concerned shareholder and a pioneer in establishing pharma operations, I decided to step up and do whatever I could to convince Jonathan Goodman to change course before going public with our proxy contest, but to no avail. As many of you know, Jonathan Goodman is a good person, but is also extremely stubborn. With respect to Knight, he has shown that he is not ready to listen to any idea that is not his own. He is simply not open to constructive feedback even if this feedback would benefit all of the shareholders he claims to represent. Only six months ago, Jim Gale and Jonathan Goodman told me that there is not a single shareholder who is unhappy with their investment in Knight, something that we have learned during this process is very far from the truth. Our campaign has received tremendous support from shareholders. This week I attended the Bloom Burton & Co. Healthcare Investor Conference in Toronto. I was approached by many Knight shareholders who congratulated me for the positive impact our campaign has already had and expressed their gratitude for our efforts in “rocking the boat” at Knight. Both ISS and Glass Lewis, the two largest independent proxy advisory firms, recognized the need for new directors at Knight and the serious issues with the current business and conflicts of interest. BUT, the achievements and wins created directly by our campaign are just a start and could easily be lost if they are not supported by additional measures. I believe that real and long-term change can only be achieved by replacing a majority of the board. Adding one, two or three of our nominees to Knight’s board could be perceived as a great outcome for a typical activist investor. But we are neither typical nor activist. In light of this, I have decided that I will NOT serve on Knight’s board unless we have the majority required to influence the future direction of our company or we have adequate assurances that Knight would pursue the “diamonds” strategy and remove the conflicts of interest. I also believe that most of our nominees will not serve on the board as part of a minority after Jonathan Goodman attacked their competence and their character. Short of replacing a majority of the board, the only way for shareholders to be 100% certain that the company would engage in the new “diamonds” strategy is if Jonathan Goodman were to set up structural assurances and guarantees to ensure the execution of such new strategy and remove conflicts. We believe that this is very unlikely. This Tuesday I heard Jonathan Goodman in his public address to the conference continue to support his failed strategy and continue to support Jim Gale as an “independent” chairman. Therefore, my fellow shareholders, I urge you to ensure that necessary changes are implemented at Knight, either by supporting the replacement of a majority of the board or by demanding that Jonathan Goodman give sufficient assurances that he will aggressively pursue our proposed “diamonds” strategy and eliminate the conflicts of interest. Finally, if shareholders choose to continue with Knight’s current management, board and strategy, I will not forego the great opportunity of our proposed “diamonds” strategy. In this event, I will recommend to Medison’s board of directors that Medison pursue this strategy in Canada independently of Knight. Of course, as a major shareholder in Knight, I continue to hope that Knight succeeds. But, if it instead continues to falter, I will continue to work to bring necessary change to the board at the very next opportunity. Knowing Knight’s board, I believe I can be more effective operating from the outside as an active shareholder. Should this be the case, we will maintain an open dialogue with all Knight shareholders and continue to highlight key findings and perspectives as appropriate, including updates through our website, www.NewDayforKnight.com Meir Jakobsohn Medison encourages shareholders to view profiles of its director nominees and read its Information Circular at www.NewDayForKnight.com for the complete, accurate story about Knight’s failure to create value for shareholders, Medison’s highly qualified and independent nominees, and the best path forward for Knight and its shareholders. VOTE ONLY GOLD TODAY If you have any questions and/or need assistance completing your GOLD form of proxy or VIF, please call Shorecrest at 1-888-637-5789 (toll-free) or 647-931-7454 (collect calls accepted), or e-mail contact@shorecrestgroup.com. About Medison Medison is one of the world’s largest commercial partners of leading global biotech companies. Backed by three generations of experience in the healthcare industry since 1937, Medison is uniquely qualified to provide the complete spectrum of integrated services for international companies looking to enter or expand their presence in Israeli and selected ROW markets. Over the years, Medison has become the partner of choice for biotech companies that produce highly innovative, cutting edge therapeutics for commercialization in the Israeli market and is currently the second largest pharmaceutical company in Israel, with over CAD 250 million in revenues annually and over 270 employees. Medison runs a corporate venture arm with a dedicated research and evaluation team boasting deep scientific and commercial backgrounds. Medison also operates a scouting program to cater to its partners and is an active investor in life science projects around drug development and digital health. Additional information can be found at www.medison.co.il. Forward Looking Statement This news release contains forward-looking statements and forward-looking information within the meaning of applicable securities laws, including, without limitation, Medison’s and Knight’s respective priorities, plans and strategies. All statements and information, other than statements of historical fact, included herein are forward-looking statements, including, without limitation, statements regarding activities, events or developments that Medison expects or anticipates may occur in the future. These forward-looking statements can be identified by the use of forward-looking words such as “may”, “will”, “expect”, “intend”, “plan”, “estimate”, “anticipate”, “believe” or “continue” or similar words and expressions or the negative thereof. There can be no assurance that the plans, intentions or expectations upon which these forward-looking statements are based will occur or, even if they do occur, will result in the performance, events or results expected. We caution readers not to place undue reliance on forward-looking statements contained herein, which are not a guarantee of performance, events or results and are subject to a number of risks, uncertainties and other factors that could cause actual performance, events or results to differ materially from those expressed or implied by such forward-looking statements. These factors include: changes in Knight’s strategies, plans or prospects; general economic, industry, business, regulatory and market conditions; actions of Knight and its competitors; conditions in the pharmaceutical industry; risks relating to government regulation and changes thereto, including in respect of the regulations concerning board composition, proxy solicitation and shareholder meetings; the state of the economy including general economic conditions globally and economic conditions in the jurisdictions in which Knight operates; the unpredictability and volatility of Knight’s share price; and dilution and future sales of securities of the Company. These factors should not be construed as exhaustive. Certain forward-looking statements contained herein may be considered to be future-oriented financial information or a financial outlook for the purposes of applicable Canadian securities laws. Future oriented financial information and financial outlook contained herein about prospective financial performance, financial position or cash flows are based on assumptions about future events, including economic conditions and proposed courses of action, based on the applicable management team’s assessment of the relevant information available to them at the applicable time, and to become available in the future. In particular, the information contains projected operational information for future periods which are based on a number of material assumptions and factors. The actual results of the applicable operations for any period could vary from the amounts set forth in these projections, and such variations may be material. Further, there is no assurance or guarantee with respect to the prices at which any securities of Knight will trade, and such securities may not trade at prices that may be implied herein. See above for a discussion of the risks that could cause actual results to vary from such forward-looking statements. Readers are cautioned that all forward-looking statements involve known and unknown risks and uncertainties, including those risks and uncertainties detailed in the continuous disclosure and other filings of Knight, copies of which are available on the System for Electronic Document Analysis (“SEDAR”) at www.sedar.com. We urge you to carefully consider those risks and uncertainties. The forward-looking statements contained herein are expressly qualified in their entirety by this cautionary statement. Unless expressly stated otherwise, the forward-looking statements included herein are made as of the date of this news release and Medison disclaims any obligation to publicly update such forward-looking statements, except as required by applicable law. www.NewDayForKnight.com Shorecrest Group Christine Carson Gagnier Communications Dan Gagnier dg@gagnierfc.com
cc/2019-30/en_head_0010.json.gz/line2590
__label__wiki
0.658856
0.658856
Too Big to Jail: Our Banking System's Latest Disgrace By Neil Barofsky You can be forgiven if you watched the Department of Justice’s announcement yesterday of a $1.92 billion settlement with HSBC with a sense of disappointment--and déjà vu. The event checked all the boxes in a theatrical routine that has become all too familiar. Descriptions of breathtaking misconduct involving the facilitation of massive drug trafficking and transactions with rogue terror-sponsoring nations? Check. Broad boasts about the "historic" nature of the settlement that will certainly end the type of criminal misconduct alleged? Check. Mea culpas from the offending institution with promises that it has really learned its lesson this time and will never ever engage in dastardly conduct again? Yep, that too. Nothing, however, was quite as it appeared. Sure, HSBC paid a record fine, but there was something vitally important missing from yesterday's press conference: actual criminal charges for obvious criminal conduct. Some perspective: HSBC sent more than $800 million in bulk cash from Mexico to the United States, a good chunk of which apparently represented proceeds from some of the most notorious Colombian drug cartels. As someone who tried the first narcotics money laundering case involving extradition from Colombia, let me assure you that this is a lot of money, the discovery of which usually generates vigorous prosecutions and lengthy prison sentences. And it wasn’t HSBC’s only dirty business: There were also hundreds of millions of more dollars of illegally disguised transactions with rogue nations such as Iran and Sudan. Why no criminal charges? Why instead only some remedial measures and a "historical" fine that can be measured in weeks -- not years -- of earnings? It certainly wasn’t for lack of evidence. No, instead the government determined that HSBC is not only too big to fail, but also too big to jail. As the New York Times first reported, even though there were strong voices within DOJ pushing for criminal charges, the big banks' best friends within the government (the Treasury Department, of course, and other unnamed regulators) were too fearful that an indictment could destabilize the global financial system. Yes, it's 2008 all over again. In the name of systemic stability, a megabank again escapes accountability for its actions, rescued by compliant officials. In some aspects, DOJ's surrender is understandable. Notwithstanding regulatory reform efforts in the U.S. and the UK, the largest banks are in many ways even more systemically dangerous today than when we bailed them out in 2008. This indirect acknowledgment that we have failed to fix the too-big-to-fail problem has potentially dire consequences. One of the reasons why we have a criminal justice system, of course, is to deter criminal behavior. If you know that you will be punished for putting your hand in the cash register at your local supermarket (or illegally stripping out information from a monetary transaction that identifies the source nation as Iran), you are less likely to do so. But if the government offered a blanket waiver from criminal accountability for a certain group -- let's say all left-handed people over six feet tall or a handful of banks deemed so large and so significant that their indictment could destroy the global financial system -- we would expect that those exempted would no longer be deterred from committing criminal acts. And although lefty giants may otherwise lack a predisposition for boosting cash, in recent years the largest banks have demonstrated an unbridled zeal for pushing the boundaries of the law as part of their relentless pursuit of profits. DOJ's actions with regards to HSBC are beyond unfair: They are downright terrifying for weakening the general deterrence for megabanks, both foreign and domestic, which could rationally interpret yesterday's actions as a license to steal. The enduring presumption of bailouts in our banking system already drives the largest banks to take on too much risk with too little disclosure and too much leverage, a toxic cocktail that will inevitably lead to another financial crisis. Yesterday's action now spikes the punch with a new toxin, confirmation that criminal penalties are off the table, leaving a worst-case scenario of a fine totaling far less than even a single quarter's earnings. Given the potential profits of criminal behavior and the unlikelihood of personal consequences for the executives directing it, the message is clear: Crime pays. This will inevitably lead to more reckless risk-taking that will further undermine systemic stability and lead to an even greater financial meltdown down the road. There is, of course, a solution for our emerging two-tier system of justice. The largest banks need to be broken up, the only realistic way to truly end both too big to fail and too big to jail. But since our government has demonstrated a reluctance to do so, perhaps the next time a megabank presents HSBC's argument that it should not be criminally charged because it would destabilize the financial system, instead of capitulating to this threat, DOJ should require at a bare minimum that in return for allowing the bank to survive, it must break itself up, ensuring that it could never hold the justice system hostage again. Otherwise, we can look forward to many more press conferences that are long on drama but short on impact. Neil Barofsky was the Special United States Treasury Department Inspector General to oversee the Troubled Assets Relief Program from 2009 until his resignation in February 2011. He is currently a senior fellow at the NYU School of Law and is the author of Bailout (Free Press, 2012). Mexico, Politics, finance, United States, HSBC, Department of Justice, The Plank
cc/2019-30/en_head_0010.json.gz/line2591
__label__wiki
0.729468
0.729468
Courtesy of The Kurland Agency Jazz Line News » News » Sonny Rollins to Guest Star on The Simpsons. By David La Rosa | Oct 12, 2012, 08:09 AM Sonny Rollins has been cast in an upcoming episode of The Simpsons. The Saxophone Colossus will appear in spring 2013 as himself in an episode of the popular animated comedy. In the episode, Jazz fan Lisa Simpson protests the ‘holographic exploitation’ of Bleeding Gums Murphy, parodying the outrage at the hologram of rapper Tupac Shakur that appeared at last year’s Coachella music festival. After Lisa organizes a boycott of the label, Rollins appears as a hologram to defend the label’s use of virtual images. His appearance has been a long time coming. In the first season of The Simpsons a saxophonist, called Bleeding Gums Murphy, plays the saxophone on a bridge in the middle of the night, a reference to Rollins practicing on the Williamsburg Bridge in New York. Famously, when Michael Jackson guest starred in an episode of The Simpsons in 1991, one of the conditions of his appearance was that he would speak as his character and a sound-alike (Kipp Lennon) will singing parts as a part of a prank to his brothers. Hopefully Rollins will make no such stipulation so that we can hear some of his unique tenor madness in the episode. Also in the episode, a rich Texan develops a taste for Moe’s homemade whiskey, and during a visit to Grampa’s nursing home, Bart outdoes the nurses in providing care for the elderly residents. Sonny Rollins is the first Jazz musician to make an appearance in The Simpsons since Tito Puente’s appearance in the legendary 1995 “Who Shot Mr. Burns?” saga. Others of a more soulful persuasion to make an appearance on The Simpsons include Lionel Richie, Elton John, Barry White, and Sting. The Simpsons airs Sunday at 8pm EST on Fox. Listen to Lisa Simpson and Bleeding Gums Murphy jamming “Second Grade Blues” below: Next Tia Fuller: Angelic Warrior Previous Amikaeyla: ‘Being In Love’ Duke Ellington Royalty Dispute Nears Judgement U.S. DoT Announce New Rules For Air Travelers With Instruments Yoshi’s San Francisco Jazz Club Sold Diana Krall to perform solo at Montreal Jazz Festival
cc/2019-30/en_head_0010.json.gz/line2592
__label__wiki
0.909466
0.909466
Protests escalate as Hong Kong marks handover to China Associated Press / 05:08 PM July 01, 2019 A black Hong Kong flag flies as protesters replaced with the Chinese flag that is normally set up next to a Hong Kong flag (left) in Hong Kong on July 1, 2019. AP HONG KONG — Combative protesters tried to break into the Hong Kong legislature Monday as a crowd of thousands were marching in that direction on the 22nd anniversary of the former British colony’s return to China. With a crowd of a hundred or so people around them, a small group of people repeatedly rammed a cargo cart and poles into a glass panel. After they managed to get the cart wedged into the damaged panel, police grabbed the cart away from them. They also posted a sign saying to the protesters, stop charging before we use force. The unexpected disruption delayed the march, but the crowd of thousands soon began moving out of Victoria Park even as police asked the marchers to change their route or cancel the march. Both the combative protesters and the marchers oppose a government attempt to change extradition laws to allow suspects to be sent to China to face trial. The proposal has increased fears of eroding freedoms in the territory that was returned to China in 1997. The embattled leader of Hong Kong pledged to be more responsive to public sentiment in a speech at a flag-raising ceremony. Carrie Lam has come under withering criticism for trying to push through the legislation. She said a series of protests and marches that have attracted hundreds of thousands of students and other participants in recent weeks have taught her that she needs to listen better to the youth and people in general. “This has made me fully realize that I, as a politician, have to remind myself all the time of the need to grasp public sentiments accurately,” she said in a five-minute speech to the gathering in the city’s cavernous convention center. She insisted her government has good intentions, but said “I will learn the lesson and ensure that the government’s future work will be closer and more responsive to the aspirations, sentiments and opinions of the community.” Hong Kong leader thanks police after clashes with ‘rioters’ Parents of Hong Kong protester who died urge others to live HK protesters to continue though bill declared ‘dead’ Security guards pushed pro-democracy lawmaker Helena Wong out of the room as she walked backward shouting at Lam to resign and withdraw the “evil” legislation. She later told reporters she was voicing the grievances and opinions of the protesters, who could not get into the event. The annual march starting in the afternoon was expected to be larger than usual because the proposed extradition bill has awakened broader fears that China is eroding the freedoms and rights guaranteed to Hong Kong for 50 years under a “one country, two systems” framework. Two marches in June against the legislation drew more than a million people, according to organizer estimates. The government has suspended debate on the bill indefinitely, but protest leaders want it formally withdrawn and Lam’s resignation. They also are demanding an independent inquiry into police actions during a June 12 protest, when officers used tear gas and rubber bullets to disperse protesters who blocked the legislature on the day debate on the bill had been scheduled to resume. The police say the use of force was justified, but have largely since adopted softer tactics, even as protesters besieged police headquarters in recent days, pelting it with eggs and spray-painting slogans on its outer walls. The area around Golden Bauhinia Square, where the flag-raising ceremony took place, was blocked off from Saturday to prevent protesters from gathering to disrupt it. Before the morning ceremony, protesters trying to gain access to the square were driven back by officers with plastic shields and batons, the retreating protesters pointing open umbrellas to ward off pepper spray. “We are horrified, this is our obligation to do this, we are protecting our home,” said Jack, a 26-year-old office worker who would only give his first name. “I don’t know why the government is harming us. It’s harming the rule of law, the rule of law is the last firewall between us and the Chinese Communist Party.” /ee Nancy Binay returns to father’s roots, takes oath in Isabela TAGS: Hong Kong legislature, Hong Kong protests, protesters LOOK: Celebrities take on the #AgeChallenge
cc/2019-30/en_head_0010.json.gz/line2593
__label__cc
0.647299
0.352701
Conrad Ruppert and his wife, JoAnn, were ready to hop in the car and drive to South Carolina for vacation. Sure, a quick visit to Carle was going to have to happen first, but that wasn’t going to delay their plans; then came a diagnosis from Allan File, MD, in Wound Healing. “The idea was that we would get right back in the car, which was all packed, and leave,” Conrad said. “That’s when we found out the wound was infected, and Dr. File explained that the healing they had hoped to see to that point wasn’t occurring.” Conrad had a diabetic ulcer that turned into a bone infection. The pain didn’t affect his life too much, up until that point. And Dr. File—as well as podiatrists Philip Logsdon, DPM, and Sean Grambart, DPM—hoped the treatment would be minimal. When things turned, though, Conrad considered it a blessing that the physicians didn’t sugarcoat it. “They told me, bottom line, if the infection goes untreated and doesn’t heal, then I could lose my foot,” he said. “Well, if you put it that way, then I’m motivated.” Motivation can make a difference, but Conrad also needed a treatment plan. Following Dr. Grambart's minor surgery to clean up the wound, he went back to Wound Healing. Dr. File then turned to a process he became amazed by in 2004, and has since used since 2005—Hyperbaric Oxygen (HBO) therapy. This treatment places patients in a pressurized chamber to breathe pure oxygen. The extra oxygen enters the plasma of the blood, increasing 10 to 15 times the amount of oxygen available to the compromised tissue. This oxygen helps new blood vessels form, which can save the wounded area. “The way we treat people with HBO often leaves them wondering, ‘How does this work so quickly?’ Dr. File said. “It can be confusing, but it comes down to this on and off switch that we know provides a boost to the blood flow and produces a lot more blood vessels. “Then it’s just about the body producing this remarkable response.” Dr. File recalled that Conrad went through 45 treatments to improve his particular wound. That meant the patient visited Wound Healing every day, Monday through Friday, for two-hour sessions over the course of nine weeks. Each session lasted about 90 minutes. “It’s like being in a submarine that’s pressurized, and the chamber can actually go much further than what we use it for,” Dr. File said. “All that we ask is that the patients be reasonably healthy when they come for a session.” Conrad said the treatment was not physically demanding or at all painful. Rather, the toughest part was the mental hurdle he had to clear by dedicating himself to this treatment. His life changed. Not only did he have to set aside the time to come in, he also complied with doctors’ orders. That meant keeping weight off his foot, keeping his blood sugar under control, eating a diet high in protein and remaining diligent with cleaning and bandaging the wound. The patient credited staff members like LaToria Jake and Kandice Bemount with always being a positive influence. Just as important as the staff, the doctors and the technology, though, was his wife, JoAnn—who he called his “lead nurse.” “Conrad and his wife did everything we asked of him. And guess what? That made a huge difference,” Dr. File said. “I could tell his wife was with him every step of the way, and she played a huge role in his improvement. “In this instance—and so many similar ones—it’s the patient who does the work. We can lead a horse to water, but … .” During the healing process, Conrad was able to maintain a high quality of life. A scooter helped him get out of the house, and even over to the University of Illinois where he teaches a course on railroad engineering. And his excitement about the healing process grew as he saw consistent improvement. “Once I started on HBO, every time I came in I was pretty amazed,” Conrad said. “Dr. File would look at it, and I could tell immediately each time that it was getting better. His measurements confirmed those thoughts. “It was like, ‘Wow, this is progress. Whatever we’re doing, let’s just keep doing it.’” And they did, to the point Conrad came in for one more appointment in September. Dr. File doesn’t expect to see him anymore. The long road marks a successful conclusion. “Sometimes patients think the HBO or Wound Healing staff saved their foot, but the biggest contributing factor is the patient’s compliance,” said Dr. File. “Outcomes like Conrad’s are gratifying for me, and I’m happy he’s back to feeling well and resuming his normal activities. "People like Conrad are a major part of why I love this work.” And for Conrad the happy ending began when the fall semester started a few weeks ago. Nearly healed, he still uses his scooter to zip around campus, but increasingly he walks on his own two feet. Through all the changes and improvement, Conrad doesn’t anticipate becoming lackadaisical now. “The treatment worked, and I’m healed, but I don’t want to go through that again,” he said. “Working with the doctors and the nursing staff at Carle was certainly a positive experience. But the first thing this tells me is that I need to alter my lifestyle. I don’t want to have this problem again.” carle hyperbaric oxygen ulcer foot infection wound diabetes healing Retired officer rehabs his way back from ‘widow maker’ Get those ZZZs: Your heart will thank you Student uses diabetes experience to make lasting impact
cc/2019-30/en_head_0010.json.gz/line2594
__label__wiki
0.711107
0.711107
Why weather forecasters still struggle to get the big storms right by Jeffrey B. Halverson, The Conversation Snow on the ground after a winter storm. Credit: NASA Goddard MODIS Rapid Response It was March 2017, and a winter storm named Stella promised to deliver up to a foot and a half of snow to New York City and parts of New Jersey. Officials pushed out blizzard warnings, suggesting the city was under imminent snowy siege. But only 7 inches fell. Then-Gov. Chris Christie blasted forecasters. "I don't know how much we should be paying these weather guys," he said. "I've had my fill of the National Weather Service after seven and a half years." For anyone following the weather, forecasts for big storms are sometimes still roller-coaster rides – with sudden shifts in track or intensity. As a meteorologist who forecasts for a large urban market, I can attest to the frustration. Why can't we get it right every time, given this era of 24/7 weather data, dozens of satellite and sophisticated computer models? The answer lies in the quirks between the most popular forecasting models. Battle of the models Computer forecast models have become the mainstay of weather prediction across North America and many other parts of the world. Run on fast supercomputers, these sophisticated mathematical models of the atmosphere have gotten better over the past couple decades. Human forecast skill has improved by approximately one day per decade. In other words, today's four-day forecast is as accurate as a three-day forecast was a decade ago. Forecasters in the U.S. routinely examine several models, but the two most discussed ones are the American and the European. When the models disagree on the track of a big storm, forecasters must often choose which they believe is most correct. This decision can make or break a critical forecast. Most meteorologists agree that the European model is the most skillful. This was cemented in March 1993, when it correctly forecast the track and intensity of a historical Nor'easter. Called the "Storm of the Century," the storm dropped a blanket of heavy snow from the Gulf Coast to the northern tip of Maine. The storm was a milestone for what is termed medium-range forecasting, or forecasts made three to seven days out. The European model nailed the prediction five days in advance. That meant officials could declare states of emergency before the first flakes ever flew. Fast forward to 2012, and the Euro was still making correct calls on big, dramatic storms. But this time, the lead time went beyond eight days. The storm was Hurricane Sandy, a massive Atlantic storm. More than a week in advance, the European model predicted an oddball westward jog in Sandy's track, whereas the American model arced it eastward and harmlessly away from the East Coast. Score: another major victory for the European. Forecasts before Hurricane Sandy disagreed on the storm’s track. Credit: National Hurricane Center European versus American Why does the European do so well, compared to its American counterpart? For one, it's run on a more powerful supercomputer. Two, it has a more sophisticated mathematical system to handle the "initial conditions" of the atmosphere. And three, it's been developed and refined at an institute whose singular focus is on medium-range weather prediction. In the U.S., the medium-range American model is part of a suite of several models, including several short-range prediction systems that run as frequently as every hour. The time, intellectual focus and costs are shared among as many as four or five different types of models. The public has heard about the European model's victories. But forecasters also know that the American model is quite skillful; it's had its share of wins, albeit less high-profile. One of these was Winter Storm Juno, a 2015 Nor'easter that severely impacted the New England coast. Forecasters put out a dire warning for 24 to 36 inches of snow across all of New York City. In an unprecedented move, Mayor Andrew Cuomo shut down the subway system in advance, a move never done for an impending snowstorm. This doomsday snow forecast was based on the European model. The American model predicted that the storm would be displaced about 50 miles further eastward – shifting the big thump of snow away from the city proper. In reality, Juno took this eastward track and Central Park ended up with "only" 10 inches – a significant amount if snow, but not a crippling 2 to 3 feet. The unnecessary economic losses from the city's shutdown were huge, putting meteorologists on the defensive. In the case of winter storm Stella, the American model massively overpredicted snowfall. But a short-range model called the North American Model correctly predicted a storm track 50 to 100 miles further east. Predicting the weather It all comes down to this: Weather forecasters have many choices for predictive models. The art of forecasting is based on years of experience spent with each model, learning the unique biases and strengths of each. The National Weather Service and other forecasting outfits have made strides in better communicating forecast uncertainty, given the inherent spread in the models. But it still often comes down to that gut feeling: European or American? Researchers are taking steps to improve U.S. medium-range weather prediction by doubling the computer speed and tweaking the way the model ingests data. Companies like Panasonic and IBM have entered the arena with their own novel weather prediction models. In the meantime, while we wait for the American model to "catch up" to the skill of the European, there are a few ways people can learn to decipher the forecast message. Individual model runs are less skillful beyond about five days; what you're looking for is run-to-run consistency. Also, seek out forecasts that frame the predictive uncertainty. For instance, a forecast may suggest alternate scenarios for an upcoming snowstorm: a 20 percent chance of up to 15 inches, or a 20 percent chance that only 4 to 6 inches will fall. Hurricane Joaquin? There's no perfect forecast, so stay tuned This article was originally published on The Conversation. Read the original article. Citation: Why weather forecasters still struggle to get the big storms right (2018, April 6) retrieved 17 July 2019 from https://phys.org/news/2018-04-weather-struggle-big-storms.html Science Says: Sorting the 'spaghetti' of hurricane scenarios Weather Service decided last minute not to cut snow forecast Winter storm in US Midwest snarls roads, hits flights US vs. European hurricane model: Which is better? Forecasters: New, lesser storm may hit East Coast They also struggle to get climate change 'right'.
cc/2019-30/en_head_0010.json.gz/line2596
__label__wiki
0.803028
0.803028
Upstate farm team better than Blakeman I took in some speeches this afternoon at the state Conservative Party conference in Colonie, and a trio of upstate Republican-Conservative county executives, Chris Collins of Erie, Maggie Brooks of Monroe and Joanie Mahoney of Onondaga, came across well. Collins was touted as a gubernatorial candidate until a couple of gaffes caused him to withdraw, and when I'd heard him on Fred Dicker's Talk 1300 radio show he put me off with constant references to the cult-like Six Sigma business management b.s. (at least I assume it's b.s., and have no interest in investigating the matter). But Collins gave an entertaining recital of his county's battle with the U.S. Department of Justice regarding alleged civil rights violations at the jail, and Brooks had some OK stuff about Albany's "sense of entitlement" and "toxic culture that favors patronage and partisanship" over ordinary people. The star of the show, however, was Mahoney. Following Brooks, who had read a speech too fast, Mahoney spoke directly to the almost 300 people in the room, gathering confidence as she described her battles with the CSEA and other efforts to restrain spending. She is also relatively young (born in 1965), a married lawyer with four children and not afraid of a kiss, who was introduced as "from a pro-life family" and seems like a breath of fresh air in New York politics. But when an actual potential statewide candidate, Long Island Republican Bruce Blakeman (who aims to take on Sen. Kirsten Gillibrand) started speaking, he was so bad he drove me out of the room. One thundering cliche followed another, about "out of control spending" and how the Democrats say they'll just tax the rich but there aren't enough rich people to pay for their programs so they'll tax the middle class, too, and "We don't have a revenue problem, we have a spending problem." Every stale line was presented as if we'd never heard it before, and he was promising to "focus laser-like" on something or other when I made it through the door. Open up NY hospitals for Haitians This story about the U.S. suspending medical flights from Haiti because of a bookkeeping issue with Florida hospitals is incredible and outrageous. Maybe Gov. Paterson can offer some hospital space in New York, and break the federal logjam. No source of revenue left untapped by Cuomo campaign There was a Google ad today atop the blog of a friend of mine, Musings of a (Fairly) Young Contrarian, for Cuomo 2010. When I clicked on it and filled in the sign-up page, it took me to a fund-raising pitch for the attorney general, who hasn't said what exactly he's running for this year, but is universally expected to challenge Gov. David Paterson. No wonder Cuomo has far out-raised the incumbent governor, who is busy alienating unions, politicians and other power-brokers because he has to balance the state budget, while his challenger ignores those difficult issues of public policy and concentrates on scouring the Internet for campaign funds. New York gets stiffed on rail grants The Obama administration's $8 billion plan for rail improvements awards a measly $151 million to New York state. The president is announcing it in Tampa, where the feds will pony up $1.25 billion on the line from there to Orlando. I guess that's another drawback of New York not being a swing state, or having a governor on the outs with the administration, or an ineffective congressional delegation, or something. Limousine liberalism rides again Gov. Paterson's budget proposal has drawn fire from regional representatives, with upstaters bemoaning prison closings and New York City pols like Democratic Sen. Liz Krueger finding plenty to complain about. "New York City shoulders a disproportionate amount of pain,” says Krueger, citing an aid cut and: "Restructuring the STAR program by limiting the NYC Personal Income Tax STAR Benefit. This will cost New York City residents an estimated $200 million in new taxes. STAR has always disproportionately benefitted land-owners outside of New York City, and that fact will only be exacerbated by the limiting of the NYC Personal Income Tax STAR Benefit." That's one way to put it. The New York Post -- no proponent of higher taxes -- said this about Paterson's proposal: "It called for ending the STAR property-tax benefit on homes worth more than $1.5 million and limiting the program's tax credit to the first $250,000 of income." So the only people paying more would be living in homes worth more than $1.5 million and/or earning more than $250,000 a year. Krueger is generally considered one of the most liberal members of the New York State Legislature, although -- or because -- her Manhattan district runs north from Gramecy Park through midtown and the Upper East Side. These days, for New York Democrats from Chuck Schumer on down, liberalism means never having to say you're sorry to the people who work at places like Goldman Sachs. Krueger also portrays herself as a champion of reform, and like that other ethics poseur Sen. Daniel Squadron was all too ready to settle for a weaker bill than Paterson had proposed. Well, she explained, "We must now continue our progress and pass legislation that will limit lobbyist contributions, reform campaign finance rules, revoke the pensions of elected officials convicted of a crime while in office, and restrict how campaign funds can be spent.” That, however, is not a comprehensive list of what last week's ethics bill left out. She didn't mention Paterson's proposal to require legislators to publicly reveal the amount and sources of their private-sector incomes. The bill that was passed last week (which Paterson calls inadequate and plans to veto) improves disclosure some, but among other weaknesses it lets lawyers like Speaker Sheldon Silver and Senate leader John Sampson continue to conceal their private clients. So not only have conservatives given up conserving, but the new liberal mantra is protect the powerful and pay tribute to the rich. It's a secret Another "print exclusive" in today's Times Union, although if it's like last week's the link will take you to the full story in a day or two. Today's is a nice job by Jim Odato about how most state legislators won't reveal anything about their private-sector incomes -- not even as much as would be required in an ethics bill they passed by near unanimous votes last week. Gov. Paterson, who wants tougher disclosure rules (along with term limits and other things) has vowed to veto the Legislature's bill as insufficient. It has always seemed to me extraordinary that legislators, especially the most powerful ones, can get away with this without being effectively challenged. There has been little pressure on them to voluntarily disclose their income and its sources, which they could do regardless of what the law requires. (If potential clients do not want to be publicized, there are plenty of other lawyers they could hire apart from those serving in the state Legislature.) In the case of Joe Bruno, the secrecy he maintained about his private business consultancy enabled corruption, a federal jury decided last month. Yet his successor as Senate leader, John Sampson, and as Republican leader, Dean Skelos, and his longtime colleague Assembly Speaker Sheldon Silver, to this day decline to reveal their private incomes, and have not supported legislation (as proposed by Paterson) to require lawyers like themselves to list their private clients. This would be a good topic for the public hearings on ethics which the Brennan Center is calling for. Don't hold your breath for the Legislature to schedule them. Skelos half right on ethics Senate Republican leader Dean Skelos says that although he and his colleagues voted for the ethics bill yesterday, that doesn't necessarily mean they would vote to override Gov. Paterson's promised veto. From Skelos' statement: "We share the Governor's concerns that the legislation has problems and needs to be improved, which is why we offered three amendments to the bill that were rejected by every Senate Democrat." One of those Democrats, Ruben Diaz, was the only senator to vote against the bill itself, on the grounds that politician-lawyers should have to reveal their clients (which the governor's bill, but not the one passed yesterday, would require). That's also a reason cited by Republican Assemblyman Jack Quinn for his negative vote, one of two in that chamber. But that issue was not brought up in the Republican Senate amendments. Last time I checked, Skelos did not reveal the clients (or income) of his private legal practice --- just like another two lawyers, Senate Democratic leader John Sampson, and Assembly Speaker Sheldon Silver. Last year, when Senate Democrats said the Assembly ethics bill did not go far enough, a naive person might have hoped that the disclosure provisions would be strengthened -- but that didn't happen (they added campaign-finance provisions instead). Skelos is right to urge negotiations now between the governor and Legislature to come up with a better bill that could be enacted. In a rational world with a functional state government, that what his new stand would help bring about. Paterson's necessary budget Gov. Paterson's budget proposal includes less money for education, where state spending has been out of control for years. The complaints about the governor's plan from the prosperous mayor of prosperous New York City are a good sign. Means-testing services for special-needs children, and restructuring STAR, are a couple of good ideas in the proposal that would put more of the budget-balancing burden on those who can best afford it. The governor's critics, who are many, and potential opponents including Andrew Cuomo, should be required to provide specific alternatives that would actually make the numbers add up. Nobody -- except for the occasional nonpolitician like E.J. McMahon -- is going to be able to do that. NYPIRG's Horner working on ethics bill I'm not sure how meaningful legislative schedules are these days, but the Senate and Assembly are supposed to take up their ethics bill tomorrow (Wednesday). Blair Horner, legislative director of NYPIRG, has been going back and forth between the Senate Republicans and Democrats, trying to resolve differences that blocked passage of an ethics bill in that house last year. Then, the sticking point was what Republicans saw as an effort to undermine the Board of Elections and transfer its enforcement authority to a potentially partisan body. The new bill (backed by NYPIRG but not by Common Cause and the Brennan Center) strengthens the BOE instead, but Horner is still trying to address GOP objections and won't predict how the vote will come out. (Senate Democrats predict victory.) Horner, while still smarting over Gov. Paterson's attack on the goo-goos in the State of the State, grudgingly conceded (we talked at length in the Senate lobby today) that the governor's ethics proposals for the Legislature, regarding oversight and disclosure, may be superior to what is in the Assembly-Senate bill. But he cautioned he had not yet read the governor's legislation, which was only released today in the budget bills, and objected to one provision in which the executive director of the proposed new ethics oversight agency would not have a fixed term but would serve at the pleasure of the board. Horner is clearly much more interested in the bill backed by legislative leaders, which unlike the governor's has a chance of passing (unfortunately, there do not seem to have been any negotiations between the two branches). He also defended the back-door disclosure provision in the Assembly-Senate bill, requiring lobbyists and their clients to report business relationships with legislators. That would result in most lawyer-legislators' clients becoming public, he said. Race to the bottom Gov. Paterson and NYC Mayor Bloomberg didn't pull any punches in their statement tonight on the Legislature's failure to pass legislation to qualify for $700 million or so in federal "Race to the Top" funding.The Democratic governor and independent mayor blasted the Assembly and Senate Democratic leadership, and most of the legislators they praised were Republicans. (Maybe the Senate Republicans have finally smartened up and will start taking Paterson's side against the Senate Democrats.) The key issue is charter schools, which the feds are pushing while sabotaging the current voucher program in Washington, D.C. Seems to me the growth of charters is bad news for Catholic schools, but alleviating that doesn't seem to be on anybody's radar screen. I had a long chat in the Assembly chamber today with Mike Fitzpatrick, a Long Island Republican who is probably the most principled and consistent conservative in the Legislature. He supports charters as an alternative to and competition for regular public schools, providing educational opportunity for people who can't afford to pay tuition, and hadn't thought about them as damaging Catholic and other private schools. Fitzpatrick supports vouchers, and his wife is secretary at Our Lady of Providence school in Islip, which has been under financial pressure but is subsidized by the Diocese of Rockville Centre. But charters aren't an issue there: There's only one in Suffolk County, and it's nowhere near Fitzpatrick's district. Fitzpatrick, by the way, said he thought Nassau County Executive Tom Suozzi lost in November because after chairing the commission on controlling school property taxes, he seemed to lose interest in the issue. That squares with my perception the last time I saw Suozzi. Here's the key graf from the Paterson-Bloomberg release: "On behalf of the City and the State, we want to thank Senator Dean Skelos for his efforts to pass this important legislation. In addition, we would like to thank Senators Craig Johnson, Ruben Diaz Sr., and members of the Senate Republican Conference, Assemblymembers Sam Hoyt and Brian Kolb and members of the Assembly Republican Conference and the other legislators who supported the Governor's legislation which offered our State the greatest opportunity to receive Round 1 Race to the Top funding. Since introducing that bill on January 7th, the Governor met on several occasions with the Legislative Leaders, there were numerous staff meetings and the Governor's office was open to negotiations. The Governor revised the legislation to reflect many of the concerns raised by the Leaders and their members. But, those efforts were not met halfway by our Legislative Leaders. It was not until the 11th hour that Legislative Leaders, without notice or negotiation, submitted their own! bill on the Race to the Top competition - a bill that would ultimately have undermined the improvement that the Race to the Top grants intend to achieve."
cc/2019-30/en_head_0010.json.gz/line2599
__label__cc
0.715205
0.284795
Poor Legal Climate Leads to Higher Auto Insurance Rates Lower jury trial threshold could help bring rates down Louisiana has once again earned the dubious distinction of having the most expensive auto insurance rates in the country. A recent USA Today article highlighted the rankings compiled by Insure.com, which put Louisiana in the No. 1 spot for the third year in a row. Amy Danise, editorial director of Insure.com is quoted as saying, “Louisiana can’t catch a break. It is consistently at the top of our rankings.” Based on annual premiums for more than 750 vehicles from the 2013 model year, Louisianians pay an average of $2,699/ year for car insurance. That’s 2.5 times more than the amount citizens pay in Maine, which is the least expensive state for car insurance. The experts say that Louisiana’s judicial system may be to blame for the high rates (this comes as no surprise to those of us who are familiar with the state’s legal system). One problem most often cited is Louisiana’s $50,000 jury trial threshold. Because of this unique state law, lawsuits involving claims under $50,000 go before judges instead of juries. In a recent analysis of civil jury trial threshold limits for all 50 states, LLAW found that the vast majority of states have no threshold for civil jury trials, and among the 14 states that do, Louisiana’s threshold is, by far, the highest in the nation. At $50,000, Louisiana’s jury trial threshold is roughly more than 28 times the national average of $1,742.40. The practical impact of this is that it forces many auto insurance cases before a single elected judge, who determines fault and sets awards, as opposed to allowing the plaintiff or the defendant the right to request a trial before a 12-person jury. This takes citizens out of the process, puts more power into the hands of our elected judges, and it makes us stand out like a sore thumb when auto insurers are calculating rates. Louisiana’s excessive $50,000 threshold serves as yet another example of how Louisiana law is far out of alignment with most other states, and it contributes to our state’s growing negative reputation. On the most basic level, it simply raises everyone’s cost of operating a car in Louisiana. Lawmakers should correct this law and bring Louisiana’s jury trial threshold back into alignment with the vast majority of states. It may actually help to bring down rates—after all this is one list where we do NOT want to stay on top! Louisiana Lawsuit Abuse Watch is a non-partisan, non-profit citizens’ watchdog group dedicated to raising awareness about the negative impact of lawsuit abuse and its costs to Louisiana workers, consumers, taxpayers and small businesses. Learn more at www.llaw.org. Categories: Featured, JusticeBy Robert Ross March 22, 2013 PreviousPrevious post:Don’t Forget Course ChoiceNextNext post:New Study: Governor Jindal’s Tax Reform Plan Benefits Louisiana Economy
cc/2019-30/en_head_0010.json.gz/line2600
__label__wiki
0.964658
0.964658
CFL CANADIAN QUARTERBACK INTERNSHIP PROGRAM PARTICIPANTS UNVEILED 10 quarterbacks to gain valuable experience and knowledge by being embedded with CFL teams at training camp Wednesday, May 15, 2019 — TORONTO (May, 15, 2019) – The Canadian Football League (CFL) announced the U SPORTS quarterbacks that will participate in the Canadian Quarterback Internship Program at CFL training camps in advance of the 2019 season. The Canadian quarterback internship program started in 2010 and was made mandatory for all teams by the CFL in 2012. The program allows Canada’s best young pivots to participate in practice drills as well as team and positional meetings while continuing to develop and hone their skills at the quarterback position. Players who have taken part in the program over the years include: Michael O’Connor (18’ TOR, 16’ BC, 15’ BC), Chris Merchant (18’ HAM, 17’ CGY), Hugo Richard (17’ MTL, 15’ OTT) Noah Picton (15’ SSK) Andrew Buckley (14’ CGY) & Marshall Ferguson (13’ CGY). Below is the list of quarterbacks taking part in training camps with CFL teams this year Hunter Guenard Edmonton Eskimos Adam Sinagra Pointe Claire, QC Mason Nyhus Des Catellier Sawyer Buettner Moose Jaw, SSK. Hamilton Tiger-Cats Tre Ford Clay Sequeira Pierrefonds, QC Bailey Wasdal Maxime Bouffard Dimitrios Sinodinos Hunter Guenard | Acadia Axemen | BC Lions In just his third season, first as a starting quarterback for the Axemen, Hunter Guenard had an outstanding 2018 campaign where he was selected as an AUS All-Star. He posted 1,910 yards passing last season to lead the AUS in passing yards, passing yards per game (238.8 years/game), touchdown passes (12), a passing percentage of 65.6% and a passing efficiency of 152.3. Adam Sinagra | Calgary Dinos | Edmonton Eskimos In 2018 Sinagra averaged more than 400 passing yards per game and set a U SPORTS record with 3,233 yards, leading the Dinos to a perfect 8-0 regular season. His offence was the most potent in the nation, averaging more than 570 yards per outing, with Sinagra tossing for 23 touchdowns and, in one outing at Saskatchewan, turning in the best single-game performance in 35 years with his 569 passing yards. His efforts landed him the Hec Crighton Trophy as the nation’s outstanding football player, along with University of Calgary and Canada West male athlete of the year honours and a nomination for the Lieutenant Governor Athletic Award as the U SPORTS male athlete of the year. At last week’s East-West Bowl in Ottawa, Sinagra was the MVP after going 13-for-19 for 320 yards and two TDs as the West squad picked up a 35-17 win. Mason Nyhus | Saskatchewan Huskies | Calgary Stampeders Entering 2019 as the starting quarterback for the first time in his university career, third-year business student Mason Nyhus will take over the reins of a University of Saskatchewan Huskies team that won the program’s 12th Hardy Cup title in 2018. In two seasons as a back-up to Kyle Siemens, Nyhus has completed 43 passes for 690 yards and five touchdowns while playing in all 16 regular season games since arriving on campus. Primarily used in short-yardage situations last season, Nyhus also rushed for a touchdown in 2018. Des Catellier | Manitoba Bisons | Saskatchewan Roughriders Quarterback Des Catellier will enter his second year as Manitoba's starting pivot in 2019. He made huge strides in 2018, throwing for 2,012 yards and 16 touchdowns, the latter of which tied him for second in the Canada West conference. Over the Calgary native's last two seasons, he's thrown for 3,154 yards and 23 scores while also holding the best completion percentage in program history (minimum 500 yards passing per year), at 62.6%. Sawyer Buettner | Ottawa Gee-Gees | Winnipeg Blue Bombers Buettner, a native of Moose Jaw, Saskatchewan, joined the Ottawa Gee-Gees in 2018 after three years under centre with the Regina Thunder of the CJFL. The 6-2, 210 lb. former Team Canada quarterback led the nationally-ranked Gee-Gees to a 6-2 (2nd OUA) regular season record in his first year on campus. At the helm of the Garnet and Grey offence, Buettner racked up 1,470 yards, 14 touchdowns, and a 145.4 passer efficiency rating in seven regular season games played. A highlight of his freshman season was leading the Gee-Gees to a victory over Carleton in the Panda Game. Buettner threw for 243 yards and five touchdowns en route to a 38-27 win in front of a sold out crowd of over 24,000 at TD Place. The following week at Toronto, Buettner had his best statistical game of the year, throwing for 405 yards and four touchdowns in the win. Tre Ford | Waterloo Warriors | Hamilton Tiger-Cats In only his second season as quarterback, Tre Ford (Niagara Falls, ON) electrified the crowd on a weekly basis by putting up eye-popping numbers, leading U SPORTS in touchdown passes (27), and OUA in passing yards (2,822) and completion percentage (74.1% - a new OUA single-season record). He also threw the fewest interceptions amongst all qualified passers (two) while rushing for 641 yards - good for sixth in the OUA. Ford shattered several school records including most passing yards in a single game, doing so twice with games of 463 yards (win over Windsor) and 472 yards (win over Laurier that clinched Waterloo’s first playoff berth since 2003). Ford followed up his OUA and U SPORTS rookie of the year awards in 2017 by winning the 2018 OUA MVP award. He was also awarded the 2019 Totzke Trophy as Waterloo Warriors’ male athlete of the year. Clay Sequeira | Toronto Varsity Blues | Toronto Argonauts Sequeira enters his fourth season with the University of Toronto Varsity Blues this fall. The native of Pierrefonds, QC dressed and started in four games for the Blues in 2018 before being sidelined due to injury. During those four games he went 72-for-127 for 875 yards and two touchdowns, including a career-high 367 yards versus Waterloo on September 1. Sequeira also ranked second on the team with 196 rushing yards and one touchdown last season. He represented U of T at the 2019 East West Bowl on May 11 in Ottawa. Bailey Wasdal | StFX X-Men | Ottawa REDBLACKS A 6-1, 193 lbs. business student from Calgary, Alta., Wasdal wrapped up his first season with the AUS champion, St. FX X-Men. Third in conference passing, he went 121-196 in eight games played with a 61.7% passing percentage, averaging 186.8 yards per game and 7.6 yards per attempt. Wasdal threw nine touchdown passes and also rushed for six of his own TDs. A versatile QB out of the pocket, he was seventh overall in AUS rushing, averaging 43.4 yards per game with 52 carries for 346 total yards. The freshman pivot led the X-Men (6-2) to an AUS playoff semifinal win over Acadia, followed by a 33-9 Loney Bowl championship victory over SMU to earn them a berth in the national Uteck Bowl. Maxime Bouffard | Bishop’s Gaiters | Montreal Alouettes Bouffard transferred to Bishop’s for the Winter 2019 semester after spending the fall at Concordia. The Sherbrooke native played his Cégep football in his hometown at the Cégep de Sherbrooke. He follows in his brother Alexandre’s footsteps as a Bishop’s Gaiter. The elder Bouffard was an annual Academic all-Canadian and a former quarterback turned receiver on the gridiron with the Gaiters. Dimitrios Sinodinos | McGill | Montreal Alouettes Quarterback Dimitrios Sinodinos will be returning for his third year at McGill University, where he became a starter in his sophomore campaign. In seven games last fall, he completed 87 of 195 pass attempts for 1,069 yards, six touchdowns and seven interceptions. The 5-foot-11, 185-pound native of Laval, Que., was also credited with 15 rushing attempts for 32 yards and one TD. A 21-year-old electrical engineering major, Sinodinos registered his career-best single-game performance in a 57-13 loss to Laval, the eventual Vanier Cup national champions. He went 17-for-36 passing, for 223 yards, one TD and one pick, on Oct. 13, 2018. In 15 regular season games over his two seasons with McGill, he is 142-for-302 passing, for a .470 completion ratio, 2,118 yards, nine TDs and 12 INTs. A two-time academic all-star with Vanier College, a Div. 1 program in the Quebec CEGEP league, Sinodinos has maintained that standard since joining McGill, where he has twice merited Academic All-Canadian honours and made the Principal’s Student-athlete Honour Roll. He recently won the team’s Dr. Strachan Hartley Memorial Trophy as the player who best combines academic excellence with football prowess. CFL training camps are set to open on May 19. The 2019 season begins on June 13 when the Saskatchewan Roughriders face off against the Hamilton Tiger-Cats. Fans can stay up to date on all the non-stop action at CFL.ca, follow the 2019 season from around the world, and join us at a game. The 107th Grey Cup presented by Shaw will be played at McMahon Stadium in Calgary on Sunday, November 24. Lucas Barrett Manager, Communications & Public Affairs, Canadian Football League lbarrett@cfl.ca @LucasBarrett9 cfl.ca
cc/2019-30/en_head_0010.json.gz/line2610
__label__wiki
0.684363
0.684363
Mikko at CeBIT Global Conference 2017 Mikko Hypponen is the Chief Research Officer for F-Secure. He has worked with F-Secure in Finland since 1991. Mr. Hypponen has led his team through the largest outbreaks in history. His team took down the world-wide network used by the Sobig.F worm. He was the first to warn the world about the Sasser outbreak, he named the infamous Storm Worm and he has done classified briefings on the operation of the Stuxnet worm. Mikko Hypponen has assisted law enforcement in USA, Europe and Asia on cybercrime cases. He has written for magazines such as Scientific American and Foreign Policy and for newspapers like The New York Times. Mr. Hypponen has addressed the most important security-related conferences worldwide. He is also an inventor for several patents, including US patent 6,577,920 “Computer virus screening”. Mikko Hyppoen has keynoted or spoken at various conferences around the world, including RSA, Black Hat and DEF CON. In addition to data security events, Hypponen has delivered talks at general-interest events, such as TED, TEDx, SXSW and Google Zeitgeist. He’s also spoken at various military events, including AFCEA events and the NATO CCD COE’s ICCC. He has been the subject of dozens of interviews in global TV and print media, including in Vanity Fair. Mr. Hypponen, born in 1969, was selected among the 50 most important people on the web by the PC World magazine. He also received the Virus Bulletin Award, awarded every ten years, as “Best in industry”. Hyppönen is a columnist for BetaNews. He has also written on his research for CNN. In 2011, he was ranked 61st in Foreign Policy’s Top 100 Global Thinkers report. Apart from computer security issues, Mr. Hypponen enjoys collecting and restoring classic arcade video games and pinball machines from past decades. Mikko at RootedCON Mikko Hypponen is a worldwide authority on computer security and the Chief Research Officer of F-Secure. He has written on his research for the New York Times, Wired and Scientific American and lectured at the universities of Oxford, Stanford and Cambridge. Hypponen has been listed on Foreign Policy Magazine’s Top 100 Global Thinkers list. He’s also the Curator for the Malware Museum […] Mikko at Cloud Security Expo Mikko Hypponen is the Chief Research Officer for F-Secure. He has worked with F-Secure in Finland since 1991. Mr. Hypponen has led his team through the largest outbreaks in history. His team took down the world-wide network used by the Sobig.F worm. He was the first to warn the world about the Sasser outbreak, he […] Mikko at PING
cc/2019-30/en_head_0010.json.gz/line2611
__label__wiki
0.534619
0.534619
Justia Patents US Patent for Secure web tunnel Patent (Patent # 5,805,803) Secure web tunnel May 13, 1997 - Digital Equipment Corporation In a computer implemented method, a client computer connected to a public network such as the Internet makes a request for an intranet resource to a tunnel of a firewall isolating the intranet from the Internet. The request is made in a public message. The tunnel sends a message to the client computer to redirect to a proxy server of the tunnel. The client computer send a token and the request for the resource the proxy server. If the token is valid, the request is forwarded to the intranet, otherwise, the user of the client computer must first be authenticated. Latest Digital Equipment Corporation Patents: Web-Based Electronic Mail Server Apparatus and Method Using Full Text and Label Indexing Electrostatic discharge protection clamp for high-voltage power supply or I/O with nominal-or high-voltage reference Method and apparatus for clustering-based signal segmentation Speech interface for computer application programs Method and apparatus for reducing heat generation in a portable computer This invention relates generally to distributed computer systems, and more particularly to securely accessing private systems via a public network. One of the most utilized networks for interconnecting distributed computer systems is the Internet. The Internet allows user of computer systems to exchange data all over the world. Connected to the Internet are many private networks, for example, corporate or commercial networks. These private networks have been called "intranets." To facilitate data exchange, intranets generally use the same communications protocols as the Internet. These Internet protocols (IP) dictate how data are formatted and communicated. As a characteristic of the Internet, the protocols are layered in a IP stack. At higher levels of the IP stack, such as the application layer (HTTP), the user information is more readily visible, while at lower levels, such as the network level (TCP/IP), the data can merely be observed as packets or a stream of rapidly moving digital signals. Superimposed on the Internet is a standard protocol interface for accessing World-Wide-Web (Web) resources, such servers, files, Web pages, mail messages, and the like. One way that Web resources can be accessed is by a Web browser such as Netscape Navigator (.TM.), or Microsoft Explorer (.TM.). The locations or addresses of Web resources, at the application layer, are specified with Uniform Resource Locators (URLs), for example, "http://www.digital.com." Gaining access to Web resources is relatively simple. Therefore, it is important that unauthorized access is carefully controlled. Access to intranets is normally controlled by network gateways including firewalls. Firewalls prevent tampering with private resources by unauthorized users. The firewall can also restrict and track the movement of data from inside the firewall to systems outside the firewall. The operation of the firewall is determined by security policies. This has created a problem. If a strict security policy is enforced, for example, "never allow an external computer to connect with an internal computer," then there is no satisfactory mechanism to allow a user, who can only connect to the public Internet, to gain access to resources inside the firewall. For example, company employees who are away from the office may need access to private Web servers to read their mail. There are some prior art mechanisms that provide some access via "tunnels," but these generally have one or more defects or drawbacks. For example, the AltaVista (.TM.) tunnel from Digital Equipment Corporation provides a virtual secure link from a client computer outside the firewall to resources inside the firewall. The AltaVista tunnel has the following characteristics. Security depends on a detailed understanding of how communication packets might be forwarded within a client computer. As a problem, the AltaVista technique provides access to any resource inside the firewall. This may not be desired. Because the technique operates at lower levels of the protocol stack, it is impractical for the firewall to log or audit all transactions which traverse the firewall, so security breaches are difficult to detect and intercept. In fact, the integrity of an entire internal network depends on low-level configuration options in, for example, employees' lap-top computers which may easily be compromised. In another prior art technique, an intranet operator may permit a user to "dial-in" from the outside world using a protocol called PPP with authentication by encrypted passwords. However, this methodology violates many security requirements: data traffic typically runs unencrypted over public non-secure lines, and there is almost no auditing or logging of transactions. In yet another technique, intranets may make specific resources available to computers outside the firewall using a secure protocol such a secure socket layer (SLL). However in many intranets where the resources are too amorphous and constantly changing, it would be impractical or almost impossible to identify specific resources which may be accessed. Therefore, it is desired to provide a secure technique to access selected intranet resources from a client computer connected to the Internet. The invention provides a computer implemented method for conducting secure communications with private portions of an intranet connected to a client computer via a tunnel and a public access network such as the Internet. As an advantage, security features are provided using the application layer of the Internet protocol stack. Initially, the client computer connected to the Internet makes a request for a resource of the intranet in a public message to a redirector of the tunnel. In one aspect of the invention, the tunnel can be implemented as part of an intranet firewall. In response, the client computer receives from the redirector a redirect reply in a second public message. If the client computer has not been authenticated, the client computer communicates with a checker of the tunnel to perform the necessary authentication. As a result of a successful authentication, the client computer can make the same request for the resource in a first secure message to a proxy server of the tunnel. In this case, the request to the proxy server includes a token. The token can be a secure certificate, or a cookie installed in the client computer as part of the authentication process. The proxy server, after validating the token, passes the request to the resource via the intranet using a public message. The resource responds to the request, and the reply is forwarded, via the proxy, to the client computer, again using a secure protocol on the public portion of the network. Authentication of the client computer is performed with the checker of the tunnel using secure messages. For example, the client computer makes a secure authentication request. The checker supplies the client computer with, for example, a HTML "form." The user of the client fills-out the form with appropriate user identification, which when correct, causes the checker to supply the token. In another aspect of the invention, the messages from the client computer to the tunnel components are formulated by a Web browser. The browser is reconfigured to use secure protocols when communicating with the checker and the proxy server of the tunnel. FIG. 1 is a block diagram of an arrangement of a distributed computer system including a secure gateway according to the invention; FIG. 2 is a diagram of a message exchange in the system of FIG. 1; and FIG. 3 is a flow diagram of request and responses according to the invention. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS In FIG. 1, an arrangement 100 provides secure access to private intranet resources via a public network. In the Figures, broken lines indicate that signals are communicated using non-secure HTTP protocols, and solid lines indicate secure protocols such as a combination of HTTP and SSL, e.g., HTTPS. Although, specific Internet protocols are suggested because these are widely used by current Web browsers, it should be understood that the invention can just as well be worked with other protocols. A client computer (CLIENT) 110 is connected to a public network 120, e.g., the Internet. Also connected to the network 120, via a firewall 130 and a tunnel 140, is a private network 150, e.g., an intranet. The intranet 150 includes private resources 160 such as Web servers (S) 161, input/output devices (I/O) 162, and data (D) 163. The data can include Web pages, files, databases, mail messages, and the like. The client computer 110 can be a workstation, PC, lap-top, or any other conventionally configured computer. The client 110 can be a borrowed or rented. The client 110 executes standard operating system software, e.g., UNIX (.TM.), Windows95 (.TM.), or NT (.TM.), and application software programs. One of the application programs which can execute on the client 110 is a Web browser 111. The Internet 120 communicates data using Internet protocols (IP) logically arranged in an IP stack. A top or application layer of the IP stack uses HTTP protocols. A firewall 130 prevents unauthorized access to the private resources 160 by enforcing security policies. The tunnel 140, described in greater detail below, allows users of the client 110 to gain access to selected resources 160. In FIG. 1, the firewall 130 and tunnel 140 are shown as a separate component, however, the firewall and tunnel may be implemented as part of a single computer system. During operation of the arrangement 100, a user of the client 110 desires to access selected private resources without compromising the security policies enforced by the firewall 130. In addition, users of the intranet 150 are allowed to export private data 163 in a secure manner. Therefore, the tunnel 140 includes a checker 141 a redirector 142, and a proxy server 143. With respect to the Internet 120, the tunnel 140 operates inside the firewall 130. The tunnel 140 can invoke non-secure HTTP and secure HTTPS connections. In the preferred embodiment of the invention, the components 141-143 are implemented as software processes executing on the same system that implements the firewall 130. However, it is should be understood that these processes could also be implemented with specially designed hardware circuits, or on separate computer systems in cases where the anticipated data traffic is large or geographically dispersed. Although, the invention is described in terms of the HTTP and HTTPS, because these protocols are currently in vogue for Web browsers, any other protocols for performing network transactions would be equally satisfactory. During operation of the arrangement 100, a user of the client computer 110 makes a connection, via the network 120, with the tunnel 140 using a public Internet service provider (ISP) such as AT&T (.TM.) or Earthlink (.TM.). Alternatively, a computer connected to the Internet at a "cyber-cafe" such as Cybersmith (.TM.) can be used. Many other connection mechanisms can also be used. FIG. 2 and 3 shows the exchange of messages 200 which occur between the client computer 110, and the components of the tunnel 140 and the resources of the intranet 150 after the connection has been established. Initially, the user specifies a private intranet resource to be accessed using the browser 111 of the client 110. The location of the private resource is specified using a URL. The public request 310, e.g., "get http://M/P," to access the resource is communicated to the redirector 142 in a message 201 using the non-secure (public) protocol HTTP. The notation "M/P" indicates some resource such as a server, file, Web page, mail message, or the like. The redirector 142, in a public response 320, responds with a message 202. The message 202 is intended to redirect the browser 111 to communicate with the proxy server 143 using a secure protocol, e.g., HTTPS, in further communications. At this point, if the client 110 is already known to the proxy server, then proceed with message 209, i.e., request 370 below. Otherwise, in the case where the client is unknown, the redirected browser makes a secure request 330 in a message 203 to the proxy server 143 for the desired resource. In the case, where the client 110 is unknown, the proxy server 143 replies a message 204 to demand that the user makes an authentication request 205 using the checker 141, e.g., a redirect 340 to the checker 141. In response to the request 205, the checker 141 sends a form 206 to the client computer 110 to allow the user to supply authentication information, for example, a user name and password. User identification (ID) is replied (350) in message 207. Alternatively, a secure challenge-response authentication can be performed with a cryptographic device, such as a cryptokey or smart card, in the user's possession. The name and password can be verified against a user database maintained inside the firewall 130. As a result of the interchanges with the checker 141, the client computer can be provided, in step 360, a validation token 299 in message 208. The token can be in the form of an X.500 certificate. Alternatively, the token 299 can be a short-term password to authenticate the user on the HTTPS connection. The short-term password might automatically get installed in the client 110 as a Web "cookie" as a side-effect of the interchange. The message 208 also redirects the browser 111 to further communicate with the proxy server 143. Therefore, in a next message 209, the client send the request for the resource plus the token 299 to the proxy server 143. When the proxy server 143 receives the message, it validates the token 299. If the token is valid, then the proxy server 143 behaves as a conventional proxy server. The proxy server 143 forwards the authenticated request 210 to the specified resource 160 inside the firewall 130 using the non-secure HTTP protocol. The resource 160 replies to the request with, for example private data, in message 211. The proxy server 143 then forwards the data, using secure HTTPS protocol, in a message 212 (step 380). Subsequent requests for private resources during the session can be handled as follows. The resource is specified in a public message 201 to the redirector 142. The redirector replies message 202. The client 110 now in possession of the token 299 replies message 208 (step 370) causing the further interchange of message 210-212 between the proxy and the server controlling the private resource 160. As described above, one aspect of the invention is a mechanism whereby the URL of the requested resource causes the user's Web browser 111 to contact the proxy server 143 of the secure Web tunnel 140. Two possible embodiments of this mechanism are possible. In a first way, HTTP is replaced with HTTPS while the redirected URL retains the original host name. In a second way, the redirected URL is chosen so that its "host name" is the host name of the private Web tunnel proxy server 143. In this case, the entire original URL is encoded in the remainder of the redirected URL. When the secure Web tunnel 140 receives a request for such a URL, it can recover the original URL and proxy the request to the resource inside the firewall associated with that URL. In both ways, the browser configuration causes the tunnel 140 to use the proxy server 143 for the redirected URL. Either mechanism can be used by the invention. The first way is simpler, however the second way offers "transportability" features described below. Therefore, if transportability is desired or required, the second way is preferred. Transportability is described as follows. A user has used the client computer's browser 111 to access a resource at a URL via the secure Web tunnel 140. The browser 111 will display the redirected URL as the URL (or "location") of the current resource. It is desired, but perhaps not essential, that the user could communicate this URL to another resource inside the firewall so that a user of the resource can use the redirected URL. This feature is called "transportability." If transportability is deemed a requirement, then it is not possible to use the browser's proxy mechanism to deal with the redirected URL, since other user's browser would not be so configured. Therefore, the first mechanism above is not satisfactory, while the second way guarantees transportability. Note, when the user accesses the private resource, these resources may well contain links (URLs) to other private resources. For practicality, it is desired that these resources can transparently be accessed without additional work by the tunnel. The tunnel 140 according to the invention achieves this. In summary, the Web tunnel as described herein provides the following features. The identity of the user can securely be authenticated before a connection with a private resource server is established. Data communicated between the client computer and the intranet 150 is secure from unauthorized eavesdropping. The user can access the resources through the tunnel using HTTPS SSL without any modifications of the intranet or the client themselves. The foregoing description has been directed to specific embodiments of this invention. It will be apparent, however, that variations and modifications may be made to the described embodiments, with the attainment of all or some of the advantages. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the spirit and scope of the invention. 1. A computer implemented method for accessing a resource (of an intranet using a client computer connected to a public network, comprising the steps of: receiving in a tunnel of a network firewall a request for a resource of an intranet in a first public message over the public network from a client computer; sending, from the tunnel to the client computer, a redirect to a proxy server request in a second public message; receiving, from the client computer in the proxy server, a token and the request for the resource in a first secure message over the public network; and forwarding, from the proxy server, the request for the resource to the intranet if the token is valid. 2. The method of claim 1 further comprising: replying to the request for the resource from the intranet to the proxy server. replying to the request for the resource from the proxy server to the client computer in a second secure message over the public network. sending, from the proxy server to the client computer, a redirect to a checker request in a third secure message if the token is invalid. sending, from the checker to the client computer, the token in a fourth secure message if a user of the client computer is authenticated. sending a user identification form to a Web browser of the client computer; and receiving user identification from the client computer. 7. The method of claim 1 wherein the token is an Internet cookie temporarily installed in the client computer. 8. The method of claim 1 wherein the token is a secure certificate. 9. The method of claim 1 wherein the first public message is received by a redirector of the tunnel. reconfiguring, by the client computer, a Web browser of the client computer in response to the second public message. 11. The method of claim 1 wherein the resource is a data record of the intranet. 12. The method of claim 11 wherein the data record is a Web page. 13. The method of claim 11 wherein the data record is a mail message. 14. The method of claim 1 wherein the resource is a server of the intranet. 15. The method of claim 1 wherein the tunnel includes the proxy server. 16. The method of claim 1 wherein the public messages are communicated using HTTP protocols, and the secure messages are communicated using HTTPS protocols. 17. The method of claim 16 wherein the HTTPS protocol includes a secure socket layer. 18. The method of claim 1 wherein the network is the Internet, and the firewall isolates the intranet from the Internet. 19. The method of claim 1 wherein the first public message is received by a redirector of the tunnel, and wherein the token is validated by a checker of the tunnel. 5325362 June 28, 1994 Aziz 5485455 January 16, 1996 Dobbins et al. 5550984 August 27, 1996 Gelb 5623601 April 22, 1997 Vu 5720035 February 17, 1998 Allegre et al. Date of Patent: Sep 8, 1998 Assignee: Digital Equipment Corporation (Maynard, MA) Inventors: Andrew D. Birrell (Los Altos, CA), Edward P. Wobber (Menlo Park, CA), Martin Abadi (Palo Alto, CA), Raymond P. Stata (Palo Alto, CA) Primary Examiner: Ly Hua Attorney: Dirk Brinkman Current U.S. Class: 395/18701; 395/18801; 395/20058 International Classification: G06F 1314;
cc/2019-30/en_head_0010.json.gz/line2617
__label__cc
0.74861
0.25139
Why Acupuncture? Gallery & Testimonials About Dr. Paul "First things first, please call me Derek." "I wanted to be a veterinarian my whole life. I got here by way of the U.S. Naval Academy and six years of Naval Service, but I got here. I love what I do now and am proud to call myself a Vet twice-over." After graduating from Annapolis, Dr. Paul served on an aircraft carrier for two years in support of Operation Southern Watch and at NORAD in Cheyenne Mountain Operations Center for three years, including as the on-duty Air Battle Management Officer on 9/11/2001. He received the Joint Service Achievement Medal from The Secretary of the Navy for his actions and conduct on that day. Dr. Paul graduated from the University of Illinois College of Veterinary Medicine, where he managed the Wildlife Medical Clinic and pursued a concentration in Wildlife and Conservation Medicine. He received additional training with EnviroVet in South Africa during vet school, and his interest in wildlife and conservation medicine remains today. Dr. Paul is a Licensed DVM (Doctor of Veterinary Medicine) and is also certified by the International Veterinary Acupuncture Society as a CVA (Certified Veterinary Acupuncturist). Dr. Paul completed several clinical rotations and a Medical/Surgical Internship before becoming an emergency veterinarian, practicing ER and critical care medicine at several clinics in the Denver area over the last ten years. He also has experience in surgery and as a general practitioner. He regularly provides relief staffing to GP clinics and Emergency hospitals throughout the Denver area. Dr. Paul's interest in holistic and non-invasive treatment options led to his study of veterinary acupuncture. Derek is married to JoAnn, an experienced Certified Veterinary Technician, and they have two school-aged children. They also have two rescue dog fur babies, Gidget and Pancho. The Paul family recently had to say goodbye to their not-furry baby, Spike the rescue hedgehog. [Coming soon: chickens!] They live near Red Rocks and love to hike, have dance parties in the living room, grow their own food, and eat local while supporting Colorado's craft brew industry. Copyright © 2019 Phoenix Animal Wellness Solutions, Inc. - All Rights Reserved.
cc/2019-30/en_head_0010.json.gz/line2619
__label__wiki
0.995835
0.995835
Chris Brown “Indigo” (Album Stream) by PhillyCustoms June 28, 2019 5:10 pm Listen to Indigo by Chris Brown Following up his massive project Heartbreak on a Full Moon, Chris Brown returns with Indigo. The project holds 32 new Chris Brown songs, with features from Drake, Juvenile, Tyga, Nicki Minaj, Lil Jon, Gunna, Lil Wayne, Joyner Lucas, Justin Bieber, and many more. Listen to Indigo below. Chris Brown “Undecided” Chris Brown returns with his new single, “Undecided”. Listen to the track below and stay tuned for the music video, directed by Chris Brown… Ella Mai “WHATCHAMACALLIT” (Feat. Chris Brown) Two of the most talented bop creators of this generation connect on “WHATCHAMACALLIT.” The Ella Mai and Chris Brown track appears on the “Boo’d… Short Dawg “Stop Playing” (Feat. Chris Brown) Short Dawg aka FRESH delivers his new single “Stop Playing.” The record features an appearance from Chris Brown. Stream the song below. Agnez Mo “Overdose” (Feat. Chris Brown) Agnez Mo collaborates with Chris Brown for her new single “Overdose.” A video for this song has already been shot and will debut soon…. Casanova “Left, Right” (Feat. Chris Brown & Fabolous) (Official Music Video) New York emcee Casanova delivers a visual for his Chris Brown and Fabolous assisted single “Left, Right.” Peep the visual above and stay tuned… Fat Joe & Dre “Attention” (Feat. Chris Brown) Supporting their forthcoming album Family Ties, Fat Joe and Dre release the Chris Brown assisted single, “Attention.” Stream the song below and stay tuned… Chris Brown “To My Bed” (Official Music Video) Chris Brown supports last years album Heartbreak On A Full Moon with a visual for “To My Bed”. Stream the album here and watch… Tee Grizzley “Fuck It Off” (Feat. Chris Brown) Tee Grizzley connects with Chris Brown on his latest single “Fuck It Off”. The song will land on his debut album Activated, which drops… Yo Gotti “Save It for Me” (Feat. Chris Brown) (Official Music Video) Yo Gotti revisits his I Still Am album from last year with a brand new music video for “Save It For Me” featuring Chris… Kirko Bangz “Date Night (Same Time)” (Feat. Chris Brown) Houston artist Kirko Bangz collaborates with with Chris brown on his new single “Date Night (Same Time)”. His debut album is on the way… Lil Dicky “Freaky Friday” (Feat. Chris Brown) (Official Music Video) It’s been almost three years since Lil Dicky released his debut album, Professional Rapper. Today, Lil Dicky returns with “Freaky Friday” featuring Chris Brown…. Blac Youngsta “Booty Remix” (Feat. Chris Brown, Young Jeezy & Trey Songz) Blac Youngta’s massive track about shaking ass gets an official remix. For the Booty Remix, Chris Brown, Young Jeezy, and Trey Songz get in… Remy Ma “Melanin Magic (Pretty Brown)” (Feat. Chris Brown) (Official Music Video) With her sophomore album 7 Winters, 6 Summers dropping sometime in 2018, Remy Ma releases the official video for her single “Melanin Magic (Pretty… King Combs “Love You Better” (Feat. Chris Brown) Diddy‘s son King Combs returns with a new single titled “Love You Better.” The record features Chris Brown on the hook and the sound… Remy Ma “Melanin Magic (Pretty Brown)” (Feat. Chris Brown) After dropping her Nicki Minaj diss “Wake Me Up” with Lil Kim a few months ago, Remy Ma is back with “Melanin Magic (Pretty…
cc/2019-30/en_head_0010.json.gz/line2620
__label__wiki
0.842613
0.842613
THREE MORE PROS COMMIT TO THE 51st RBC HERITAGE HILTON HEAD ISLAND, S.C. — Sam Burns, Cameron Champ and Zach Johnson have committed to the 51st RBC Heritage Presented by Boeing. South Carolina’s only PGA TOUR event is taking place April 15-21, 2019 on Hilton Head Island. Burns, just 22-years-old, is a rookie on the PGA TOUR. He finished T3 earlier this season at the Sanderson Farms Championship. The Shreveport, Louisiana native won last year’s Savannah Golf Championship on the Web.com TOUR and will be making his first start at the RBC Heritage. Champ is having a standout rookie season on the PGA TOUR. The 23-year-old won the Sanderson Farms Championship and earned two additional top tens. He also won the 2018 Utah Championship on the Web.com TOUR. The Sacramento, California native attended Texas A&M before turning pro in 2017. He will be competing at Harbour Town for the first time. Zach Johnson has earned 12 wins on the PGA TOUR including the 2007 Masters. The Cedar Rapids, Iowa native won the hearts of RBC Heritage fans that year when he honored his commitment to the RBC Heritage and finished sixth. He was on the leaderboard earlier this season, when he finished tied for seventh at the RSM Classic. He will be competing at Harbour Town for the 14th time.
cc/2019-30/en_head_0010.json.gz/line2621
__label__wiki
0.556418
0.556418
Privacy and Data Protection under threat from EU Council agreement Following today's Justice Ministers Council meeting in Luxembourg where an agreement was reached on the proposal for a General Data Protection Regulation (GDPR), Privacy International and European Digital Rights (EDRi) issued the following statement: In January 2012, the European Commission, following extensive consultations, published a draft Regulation. The initiative had three priorities - modernisation of the legal framework for the protection of personal data, harmonisation of the rules across the EU (proposing a single Regulation rather than a Directive that is implemented via 28 national laws) and maintaining existing levels of protection. A stated purpose was also to enhance individuals' rights by giving them greater control of their personal information, and to make enforcement more effective - both are major failures of the current legislation. The objective of modernisation has not been achieved. Key elements of modernisation have been weakened to the point of meaninglessness. Rules on data breaches, privacy by design and, especially profiling, are far too weak and unclear. Harmonisation has become a parody of its original intentions. The existing Directive consists of 34 articles. The Council's position has 48 exceptions where Member States can do what they want, not including the broadening of the list of exceptions provided for in Article 21. In fact, Article 21 has broadened government powers so much that they can effectively run a coach and horses through all the rights and protection in this piece of legislation and render it null and void. The objective of maintaining the levels in the 1995 Directive has not been achieved, inter alia for the reasons below. The European Commission had previously said that, as an absolute red line, standards would not be allowed to slip. Joe McNamee, Executive Director of European Digital Rights, said: "This agreement is quite simply a brazen effort to destroy Europe's world leading approach to data protection and privacy. The Council position is a mixture of reckless disregard for citizens' fundamental rights and pandering to special interests that led to draft legislation where the number of exceptions is higher than the total number of articles in the previous Directive." Equally, citizens and consumers will lose effective control of their personal data as a result of this legislation; and continuing illegal activity by businesses will remainunpunished. Anna Fielder, Board Chair of Privacy International, said: “If the purpose of this reform was to strengthen people’s control over their personal information and improve enforcement, our governments have achieved the exact opposite. The Council revisions to the draft data protection Regulations have done their best to disembowel some of the fundamental principles and further disempower individuals and their representatives by weakening rights. Moreover, any notion of harmonised, predictable rules across the Union have gone out of the window; in over a quarter of all the articles of this Regulation individual governments can develop their own rules." KEY ELEMENTS OF THE AGREEMENT The proposal undermines purpose limitation: The current text of the GDPR allows for the further processing of personal data “for archiving purposes in the public interest or scientific, statistical or historical purposes.” However, it is unclear what those statistical and scientific purposes are. Any large company that makes profit out of exploiting personal data could claim to be processing data for scientific purposes. This loophole is broadened further still by the new and controversial text of Article 6.4: "Further processing by the same controller for incompatible purposes on grounds of legitimate interests of that controller or a third party shall be lawful if these interests override the interests of the data subject." The proposal moves from data minimisation to “non-excessive” data processing: The proposed Article 5(c) removes the obligation to keep processing to a minimum and weakens it to “non-excessive” processing. The Council amendment removes the obligation that the data “shall only be processed if, and as long as, the purposes could not be fulfilled by processing information that does not involve personal data”. This provides room for data controllers to process more data than necessary. The grounds for processing are increasingly vague: The "legitimate interest" justification for data processing without consent is the vaguest ground for processing, offering a lot of scope for industry to process data if they can claim a "legitimate interest" in doing so. Weaker redress and enforcement provisions: Under the Council version, organisations defending citizen and consumer interests can no longer complain to authorities or take judicial actions on behalf of many individuals whose privacy rights have been breached. Data protection authorities do not have the resources to investigate every individual complaint and people to not take individual legal actions, particularly for privacy breaches that are not visible. Without this collective redress right, effective enforcement will continue to be weak. Data transfers outside the EU: privacy regulation privatised or handed to unaccountable public bodies: The Regulation opens the gates to a massive Trojan horse in these provisions, by specifically amending the articles that refer to privacy seals/trust-marks (called"certification mechanisms") and to codes of conduct. Privacy seals and codes of conduct can be useful in providing guidance to specific sectors and providing extra information to individuals using a service. But they cannot be a guarantee of adequate privacy protections in a country where privacy enforcement is weak, particularly if the envisaged systems of monitoring and oversight are delegated to some private body. Furthermore public authorities and bodies can transfer personal information at will to public bodies outside the EU without any reference to data protection authorities or need for cooperation across the EU (the so-called consistency mechanism). Serious implications for people's health and human rights: The Council proposals would allow further processing of health data, including genetic data on a massive scale; indefinite retention of health data including genetic data such as whole genomes without people’s knowledge or consent; and sharing of this data with third parties, including companies such as Google, without people’s knowledge or consent, usually with names stripped off (pseudo-anonymised) but in a way which allows results to be reconnected to individuals later on, or combined with other data sets (e.g. social care,education). European Digital Rights (EDRi) is a not-for-profit association of 33 digital civil rights organisations from 19 European countries. Our objectives are to promote, protect and uphold civil rights in the field of information and communication technology. Fight Data Retention Law Challenging Corporate Data Exploitation Target Stakeholders What this work resulted in A Global Standard for Data Protection Law
cc/2019-30/en_head_0010.json.gz/line2624
__label__cc
0.592719
0.407281
Procrastination: Cultural Explorations An interdisciplinary conversation at the University of Oxford The Procrastination Seminar Conference, 2 July 2014 Summary & Media The Mañanarama Cunctator Prize Conveners Cutting the Cord We’re delighted to present Frank Hangler’s ‘Cutting the Cord’, winner of the 2014 Cunctator Prize, as generously judged by Henry Hardy and Mark Pottle of the Isaiah Berlin Literary Trust. Here’s Frank’s glorious poster (click for PDF); his paper is below. Cutting the Cord: technology as the source of (and solution to?) procrastination By Frank Hangler | Oxford Internet Institute | @hangler Procrastination is hardly a novel phenomenon, but in the digital era, it may have reached its apotheosis. Today’s Internet user is subject to a constant stream of e-mails, viral memes, addictive games, social media updates, and Wikipedia spelunking sessions. It’s raining lolcats and doges—and it would appear to be wreaking havoc with our productivity. “The hidden cost of Gangnam Style,” a chart recently released by The Economist, tabulates the opportunity cost to humanity of the 140 million hours we spent watching the rapper PSY’s horse dance antics: twenty Empire State Buildings, or six Burj Khalifas, or an entire Wikipedia (“Daily chart: The hidden cost of Gangnam Style,” 2014). No surprise, then, that many employers continue to block “time-wasting” websites such as Facebook or Twitter, or that studies have found that digital technologies are distracting to workers (R. Williams, 2014). Intriguingly, however, in combatting technological temptation, we are increasingly turning to technology itself. Some might grumble about the lack of character-building discipline this entails. But what is more interesting is what this behaviour tells us about life in the digital era. The Economist, The hidden cost of Gangnam Style The use of technology to prevent procrastination and encourage productivity is not new. In the 1920s, Science and Invention publisher Hugo Gernsback invented human blinders: “The Isolator”, a large helmet that restricted its user’s vision and hearing—and even supplied oxygen from an external tank to counteract drowsiness (Novak, 2013). For perhaps obvious reasons, The Isolator never quite took off. Some simpler technologies have been found more fruitful. The Pomodoro Technique, developed by Francesco Cirillo in the 1980s, advocates the use of a kitchen timer (such as the common tomato-shaped variety which lent the technique its name) to break up time into blocks of twenty-five minutes of work, followed by breaks of three to five minutes (Cirillo, 2014a, 2014b). Among other techniques, David Allen’s productivity manual Getting Things Done (2002) suggests a system of forty-three folders—one for each day of the month and month of the year—to help organize physical artefacts and reminders. More unusually, Internet critic Evgeny Morozov locks his smartphone and router cable in a timer-controlled safe, allowing him to work without the distraction of the Internet (Tucker, 2013). The Isolator in action, via A Great Disorder In the digital era, it’s not surprising that such physical approaches have been either replaced or augmented by technologies running on the very devices that seem to have exacerbated the problem of distraction. Both the Pomodoro Technique and Getting Things Done have their own mobile applications. Some word processors, such as Microsoft Word, iA Writer, and Byword, virtually mimic the narrow eye-slit of the Isolator by offering different kinds of “focus modes”—for instance, by making the application full-screen or highlighting only the line of text currently being edited. At the more extreme end of the spectrum are digital implementations of Morozov’s safe: applications such as Freedom (80Pct Solutions, 2014) and SelfControl (Stigler & Lambert, 2014) that can be used to block the Internet, entirely or in part according to customizable blacklists, for pre-specified lengths of time. Nothing short of a reboot (in the case of Freedom) or specific technical knowhow (in the case of SelfControl) can re-enable Internet access once the digital timer has been set. (Freedom features prominent authors such as Nick Hornby, Naomi Klein, and Zadie Smith amongst its admirers.) Other technologies exist that are only possible in the digital age. The WiFi-enabled “SnūzNLūz” alarm clock threatens to punish lie-ins with automatic donations to ideologically repugnant causes via direct debit (ThinkGeek, 2014). Though the SnūzNLūz was an April Fool’s joke, the concept of pecuniary punishment of procrastination has found traction in at least two real web-based services, Beeminder (2014) and stickK (2014). These sites reward the diligent, but their very business models are essentially wagers on the fundamental idleness of their customers. A similar service, RescueTime (2014), somewhat more benignly tracks and reports on how users spend their time on their computers from day-to-day—but without the risk of penalty, except for crises of conscience. The names and iconography of these technologies provide interesting clues to how we think of procrastination and unproductiveness. The icon for SelfControl is a skull and crossbones (“death to procrastination,” it seems to suggest); Freedom’s is a clock (“time’s running out”). When we are quite literally left to our own devices, we are incapable of focus, self control, or, ultimately, freedom: we are slaves to our appetites, thralls to unproductivity. The promise of these applications is emancipation. But, some might argue, what about the virtue of actually practicing discipline, restraint, or willpower? Rather than growing in virtue by struggling with our temptations, we are offered the easy route of clicking a button, of being constantly nudged by timers and focus modes, of fooling ourselves into work. Using extrinsic approaches to eliminate distractions altogether seems like a quick fix, a cheat. We have replaced our forty days in the wilderness, with the attendant risks (and character-building rewards), with life in a hermetically sealed room—safe and unchallenging. SelfControl logo I think this view is self-flagellating, for three reasons. First, it’s possible that we worry a little too much about procrastination to begin with, at least in the sense that we see it as a danger unique to the digital era. The word itself has been attested at least since the sixteenth century (“procrastination, n.,” 2014); the fable of the industrious ant and the lazy grasshopper dates to the classical era. Nor should we begrudge ourselves reasonable leisure. “[H]umanity has at least been entertained,” The Economist wryly comments on their Gangnam Style infographic (“Daily chart: The hidden cost of Gangnam Style,” 2014). Though 16,000 human-years spent watching the video is an initially staggering statistic, it still means that, on average, each of the world’s seven billion inhabitants only spent 1.2 minutes of their time watching. This is hardly excessive entertainment. The Internet can be undeniably distracting; the claims it makes on our attention—possibly the last truly scarce good in the materially-wealthy West (see, for instance, Goldhaber, 1997)—can be profound; in the end, it is possibly even addictive (Young, 1998). But procrastination is not new. It is as old as work itself. Psy: ‘hardly excessive entertainment’ Second, the notion that we should be alarmed at using digital technology to combat distraction plays into the idea of what the sociologist Nathan Jurgenson has termed “digital dualism”—that online life is somehow separate and distinct from “real” life (2011). Digital dualist narratives also tend to depict the “real” world as somehow purer or worthier than the digital one. The problem with digital dualism, however, is that there is not really any such thing as “cyberspace.” At a very concrete level, the Internet is physically grounded; though we feel as though we are peering through our computer screens into a separate digital world, it is as real as anything else we experience. It is more profitable to think of the Internet in terms of affordances: in other words, the modalities it permits and implicitly encourages, and those it denies or discourages. To return to the issue of attention, it may well be true that Internet technologies can be especially distracting; advertising, for instance, can be more intrusive than in traditional media, with full-page takeovers and auto-playing videos. And many (otherwise) intelligent people are spending a significant amount of time and effort designing ever more attention-grabbing distractions. “The best minds of my generation are thinking about how to make people click ads,” lamented former Facebook employee Jeff Hammerbacher (Vance, 2011). There is an arms race for our attention; faced with the unique challenges of Internet-related distraction, then, we should not feel bad about mustering technological weapons against the abuse of technology. We should not assume that traditional, offline techniques are better or more valid than online ones. Indeed, the proliferation of applications designed to help us focus is more an indication of ingenuity and adaptability in response to the onslaught of hard-to-avoid distractions. “Our brains are so easy to fool that it’s borderline embarrassing; you might as well salvage some self-respect by exploiting that fact,” writes the technology journalist Oliver Burkeman (2010). Evgeny Morozov, by re:publica Finally, we should not unnecessarily elevate the virtue of struggle. To be sure, discipline and willpower in the face of unavoidable temptation are laudable. But there is nothing unseemly—indeed there is something prudent— about avoiding temptation altogether; and thankfully, we need not take such drastic measures as St Francis of Assisi did when he flung himself into a rose bush. When we can help ourselves focus with software, coping with technological temptation by eschewing technology seems unnecessarily scrupulous. Morozov said about his safe, “It’s not that I can’t say ‘no’ to myself. I just waste too much energy having the internal conversation. I’d rather delegate the control to my safe and use my remaining willpower to get something done” (Tucker, 2013). Replying to those who ridiculed the practice, even this deeply techno-skeptical thinker said, “I have no problem with the safe, frankly. It fits very well with my vision for technology. It’s okay to delegate certain things to technology” (C. Williams, 2013). Applications such as Freedom and SelfControl do not operate autonomously. The user must still have the willpower to click the button that blocks their Internet, after all. And though that is a simple act, and is likely to be easier than exerting the full effort of our will to avoid distraction, it is not without virtue (Millgram, 2010). In sum, then, we shouldn’t castigate ourselves for marshalling what defences we can against distraction, when it does indeed transition from reasonable entertainment to compulsive procrastination. Instead, it is worth pondering what our use of technology contra technology tells us about life in the digital age. It suggests that though distraction and procrastination are nothing new, the affordances of Internet-enabled computing—the near-ubiquitous connectivity, the malleability of web content, the steady stream of notifications—can exacerbate the problem; but other affordances—“distraction-free” modes, the ability to cleanly, easily, and reversibly sever our Internet connections—can similarly help us fight it. Another factor is that we now find ourselves enjoying entertainment on the same device we use for work. This can be undeniably problematic when, for instance, we spend too much time on YouTube rather than programming, researching, writing, or performing other work that is temporarily painful but ultimately satisfying. But this convergence of uses actually points to another idea. The era of always-on Internet encourages us to actually reassess the idea of procrastination itself. The Silicon Valley venture capitalist Paul Graham writes, “No matter what you work on, you’re not working on everything else. So the question is not how to avoid procrastination, but how to procrastinate well” (2005). In fact, one study suggests that some kinds of “cyberloafing” might actually boost productivity (Academy of Management, 2014). Social media, Wikipedia, and online news are not necessarily “good” procrastination—but they should not automatically be considered bad, either. These activities can strengthen social ties, encourage learning, and invite serendipitous innovation just as much as they can distract us from the more important tasks at hand. Some work profits from long blocks of steady concentration, and for such times, we have applications such as Freedom and SelfControl—or safes. But having information readily available can also be a boon. The novelist Ned Beauman, though himself an avid user of Internet-blocking applications, nevertheless says the Internet is “Inextricably part of my method. […] I don’t consider Wikipedia a distraction; I find it really useful. Most of the time you’re learning something” (Wilkinson, 2012). What we should encourage is not a complete disconnection from technology to avoid procrastination, nor a condemnation of the Internet as an inherently procrastinatory medium, but rather a contextual approach—aided, when appropriate, by technology itself—that enables us to work when we need to, and surf when we don’t. Frank Hangler is an MSc student at the Oxford Internet Institute, interested in big data, smart cities, and the rhetoric of technology. He has several years of professional experience in design and development. He holds a BA (Honours) in Political Science and a Bachelor of Computer Science, both from the University of British Columbia. [Links active as of 13 June 2014] 80Pct Solutions. (2014). Freedom – Internet Blocking Productivity Software. Academy of Management. (2014). Internet browsing at work? It’s a pause that refreshes workers and enhances their productivity, new research finds. Allen, D. (2002). Getting Things Done. London: Piatkus. Beeminder. (2014). Beeminder. Burkeman, O. (2010). This column will change your life: Is self-discipline the key to success? The Guardian. Cirillo, F. (2014a). Frequently Asked Questions. The Pomodoro Technique. Cirillo, F. (2014b). Get Started. The Pomodoro Technique. Daily chart: The hidden cost of Gangnam Style. (2014). The Economist. Goldhaber, M. H. (1997, April 7). The attention economy and the Net. First Monday. Graham, P. (2005). Good and Bad Procrastination. Jurgenson, N. (2011). Digital Dualism versus Augmented Reality. Cyborgology. Millgram, E. (2010). Virtue for Procrastinators. In The Thief of Time: Philosophical Essays on Procrastination. Oxford University Press. Novak, M. (2013). Thinking Cap: A Helmet That Seals Out External Sounds and Sights. Pacific Standard. procrastination, n. (2014). OED Online. RescueTime. (2014). RescueTime: Time management software for staying productive and happy in the modern workplace. StickK. (2014). stickK − Change Starts Now. Stigler, C., & Lambert, S. (2014). SelfControl. ThinkGeek. (2014). SnūzNLūz – Wifi Donation Alarm Clock. Tucker, I. (2013). Evgeny Morozov: “We are abandoning all the checks and balances.” The Guardian. Vance, A. (2011). This Tech Bubble Is Different. Businessweek. Wilkinson, C. (2012). Shutting out a world of digital distraction. The Telegraph. Williams, C. (2013). Google is run by adolescents, says Evgeny Morozov. The Telegraph. Williams, R. (2014). Internet “fuels procrastination and lowers productivity.” The Telegraph. Young, K. S. (1998). Internet Addiction: The Emergence of a New Clinical Disorder. CyberPsychology & Behavior, 1(3), 237–244. doi:10.1089/cpb.1998.1.237 Posted in: Conference details, Mañanarama | Tagged: internet, meme, prize, procrastination, productivity, technology, writing The Ostrich Pillow (2013) The Sleep Eliminator (1923) 3 thoughts on “Cutting the Cord” Pingback: Guest post: Procrastination Conference at OCLW | Oxford Centre for Life-Writing Pingback: The 2 July procrastination-fest: a summary | Procrastination: Cultural Explorations Pingback: The New York Times on Procrastination Oxford | Procrastination: Cultural Explorations Procrastinate via email Past procrastination Past procrastination Select Month November 2014 October 2014 September 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 Twittering away Follow Procrastination: Cultural Explorations on WordPress.com
cc/2019-30/en_head_0010.json.gz/line2625
__label__wiki
0.512989
0.512989
Arrests after 18-year-old stabbed in chest and leg 25 Jan 2019 David Grantham (Photo: istock.com / Gary O’Kane) Surrey Police have made three arrests after an 18-year-old was stabbed in the chest and leg on Wednesday evening (23 January), in an incident believed to have taken place in the Woodlands Road area of Earlswood. Police said on Friday morning (25 January): “We have arrested three males (aged 16, 17 and 18) on suspicion of attempted murder after police were called to East Surrey Hospital at around 23.30 on 23 January, after an 18 year old man had arrived with stab wounds to his chest and leg. The three have subsequently been released on police bail. The victim (who has since been transferred to another unnamed hospital) is in a stable condition with potentially life changing injuries.” Police believe the incident happened in the Woodlands Road area of Earlswood, near Redhill, and said there would be an increased police presence in the area as officers seek to establish more details. Detective Inspector Jackie Elkins said: “While clearly a shocking incident, I want to be reassure the community that these men knew each other and there is no wider risk to the general public. I want to thank the local community for their support and assistance as we conduct a thorough investigation of what happened and bring those responsible to justice. I would ask people who may know these men not to speculate publicly, but instead to contact us to help us build a picture of who they are and why this has happened.” Anyone who has any information that could assist the investigation, either because they know the individuals involved, or because they witnessed something in the Woodlands Road area on Wednesday night, is asked to contact Surrey Police on 101 (999 in an emergency) or online quoting reference PR/45190008252. Information can also be given anonymously to the independent charity Crimestoppers on 0800 555 111, or via their anonymous online form. Surrey Police
cc/2019-30/en_head_0010.json.gz/line2634
__label__cc
0.50691
0.49309
Ramsau—Our new hiking tour in Germany and a painting by Thomas Fearnley Now here’s a nice painting. The work is called Ramsau, and it’s an oil on paper, painted en plein air and laid on canvas by Norwegian artist, Thomas Fearnley (1802-1842). Ramsau holds a lot of meaning for us because it’s a picturesque stop on our new Alpino Wunderbar hiking tour. Located in the Berchtesgaden National Park, just outside of Berchtesgaden, Germany, Ramsau is a quintessential southern Bavarian village. This particular sketch is dated 1832, but like so many fairytale villages in the Alps, the Ramsau of today looks virtually identical to the tranquil hamlet that Fearnley painted 180 years ago. While, admittedly, the simple dirt track is now a modern road, tradition lives on in Ramsau. Women still rake hay in traditional dress, cows gather on the hillside and thin wisps of woodsmoke promise home cooked Bavarian meals and a warm bed. The Gasthof Oberwirt, the prominent building in the foreground, is a Bavarian inn that has been welcoming travelers for 500 years. The church in the background, with its onion-domed steeple that is characteristic of the region, is called Pfarrkirche St. Sebastian, (literally translated—parochial church St. Sebastian). The church was built in 1512. The mountain in the background is called the Hoher Göll (2,522 meters). With an elevation of just over 8,000 feet, the Hoher Göll is not a particularly tall mountain by Alps standards, but it is significant because it straddles the border between the German state of Bavaria and the Austrian city of Salzburg. The Hoher Göll is also a pleasure to admire and photograph, as evidenced by Fearnley’s work. Did Thomas Fearnley stay at the Gasthof Oberwirt during his sejour in Ramsau? We don’t know. What we do know is that Thomas Fearnley and his traveling companions, Wilhelm Bendz and Joseph Petzl, spent one week in the village during their 700-kilometer (435 mile) walk to Italy. (Climbers—Note Joseph’s last name!) According to diary entries by Bendz, the date of this painting, September 20th, 1832, was the last day the trio stayed in the village before continuing their hike across the Alps and into Italy. If you’d like more info on Thomas Fearnley, or the history of this work, then head over to My Daily Art Display. The site’s author, Jonathan, wrote a nice piece about Fearnley and Ramsau, so we won’t replicate the story here. Just give Jonathan a visit, and then check out our new Alpino Wunderbar hiking tour. We spend three days hiking in the vicinity of Ramsau and Berchtesgaden, Germany before moving across the border to Kitzbühel, Austria. We finish our week-long, transalpine hiking tour in Cortina d’Ampezzo, Italy, famous for its stunning location in the heart of the Italian Dolomites. For Sale: Limited Edition Paintings of Our Favorite Hikes in EuropeDecember 9, 2015 A Portrait of the CotswoldsDecember 7, 2010 Italy for Art LoversFebruary 2, 2010 Don’t Pity the Humble PainterDecember 4, 2009
cc/2019-30/en_head_0010.json.gz/line2639
__label__wiki
0.790654
0.790654
Ticket FAQ Salisbury in Fiction Contact/Get Involved The Salisbury Story Prize Salisbury Lit Fest 2018 Home / Our Patrons Mark Dawson Mark is the USA Today bestselling author of the John Milton and Beatrix Rose books, downloaded more than 2million times around the world. On the festival, Marks says: ‘Salisbury Literary Festival is a long-time coming: with an amazing heritage from Golding to Creasey and Pratchett, it’s the perfect place for writers and readers to gather and talk about books.’ Barney Norris Barney is a critically acclaimed playwright, poet and author. Barney’s debut novel, Five Rivers Met on a Wooded Plain, was published by Transworld (Doubleday) in April 2016 to critical acclaim, and was a Waterstones and Foyles Book of the Month. His second novel, Turning For Home, was published in 2018. On the festival, Barney says: ‘Salisbury Literary Festival will give voice to a vibrant scene that’s been growing very quickly over the last few years, spreading by word of mouth through the pubs and meeting rooms of the city. The place is really starting to sing its stories, and now there’s a capstone to what this community has been building together, a highlight to the year.’ Kristina Stephenson Kristina is the author and illustrator of bestselling children’s picture book series ‘Sir Charlie Stinky Socks’. She trained as a set and costume designer and has worked in theatre and television. When her first child was born she turned to illustration, working for publishers in the UK and USA. She was inspired to write her first book by her son, Charlie, and ‘Sir Charlie Stinky Socks’ now numbers 9 adventures. She has also written picture book series ‘Molly Maybe’s Monsters’ for Simon and Schuster and is collaborating with the best-selling author Caryl Hart, whilst also writing her own middle grade series. Kristina makes regular appearances at schools, libraries and festivals, and was Illustrator in residence at the 2017 Edinburgh International Book Festival. salisburyliteraryfestival@gmail.com Web design Yorkshire by Feel Design
cc/2019-30/en_head_0010.json.gz/line2641
__label__wiki
0.59765
0.59765
County letter supports RR sales tax effort Lance Martin A letter from Halifax County commissioners supporting the efforts of Roanoke Rapids City Council to seek legislative approval of a referendum for voters to decide on a 1-cent sales tax increase in November has been released. The letter, dated January 15, and signed by Chairman Vernon Bryant, was sent to the North Carolina General Assembly and also includes a copy of the city’s resolution. Bryant said this afternoon the letter was specifically sent to Representative Michael Wray and Senator Toby Fitch as well as Roanoke Rapids Mayor Emery Doughtie and the county board of commissioners. County support of the proposal comes in the third and last paragraph of the letter after the county explained in the second paragraph the county does not expect it would receive a proportionate increase in its sales tax income as the city’s resolution states. “The county does not understand or expect that to be the case,” the letter says. The second paragraph explains, “Based upon additional information from the city, it is proposed that the desired additional sales and use tax would be subject to voter approval in the city of Roanoke Rapids only and if approved would be levied by the city council on sales only in the city of Roanoke Rapids.” Bryant said county commissioners and staff are still exploring whether the county will receive any benefit. The letter concludes, saying, “Nonetheless, by action of the Halifax County Board of Commissioners, I am authorized to advise you that Halifax County supports the efforts of the city of Roanoke Rapids to obtain an additional one-cent local option sales and use tax applicable only in the city of Roanoke Rapids.” Doughtie said this afternoon said he understands the paragraph which refutes whether the county would see a proportionate increase should the proposal get on the ballot and gain voter approval. “What I told Mr. (County Attorney Glynn) Rollins whatever needs to be done to make it move forward I’m open to obtain input from other entities. We have a problem and we are limited to how we can fix it.” However, the mayor said, “I’m glad they are supporting us. We need their support. I want them to feel whatever benefits the city benefits the community at large.” Doughtie said next month state lawmakers are expected to go back in session. “Once it goes to Michael he knows the corridors to get it to the floor.” The mayor said the city will hold off on forums until the legislature votes to allow a referendum be put on the ballot. “If it doesn’t go anywhere we won’t need to have the forums.” Of the people Doughtie has talked to about the matter, he said 80 percent to 90 percent have been positive. “Others that have been negative, once you explain what we do with the money, what few resources we have to get income, it seems to make the conversation move forward.” The money generated from the sales tax increase, if it should pass in a referendum by voters only within the city limits, would be used to pay off the remaining Roanoke Rapids Theatre debt, allowing the city to allocate other money to infrastructure improvements. “Resurfacing roads, repairing culverts have been on the backburner,” Doughtie said. “We struggle with equipment, maintenance.” Bryant said, “We think that the mayor and Roanoke Rapids City Council are trying to move forward from the sale of the theater and in doing so we feel they have done the right thing and have been diligent in restructuring the debt while at the same time maintaining services.” The board of commissioner chair said, “On behalf of the Halifax County Board of Commissioners, we certainly hope the North Carolina General Assembly in its infinite wisdom will allow the citizens of Roanoke Rapids to vote on this matter. None of us like tax increases whether property or sales. With sales tax everyone is included. If there’s going to be a tax this is the one to do.” Bryant credited the city for making a sale on the theater and for looking “at ways of moving forward without burdening the taxpayers. The board of commissioners feels good about the position the city has taken in retiring the debt of the theater. They have asked us to support the sales tax which will not burden the property owners but will be shared by everyone including visitors.” TAGS: halifaxnews, halifaxcountynews, roanokerapidsnews, roanokerapidscitycouncil, halifaxcountyboardofcommissioners, salestax
cc/2019-30/en_head_0010.json.gz/line2648
__label__cc
0.638532
0.361468
Helping Out Year 5 By Mike Walley / August 19, 2018 Providing Extra Resources for Upper Key Stage 2 Many teachers and teaching assistants are busy planning their forthcoming scheme of work as they prepare for the start of the next academic year. Recently, Everything Dinosaur was contacted by a Year 5 teacher who was working on lesson plans for the science element of the national curriculum, specifically that part of the topic area that covered evolution, natural selection and Darwinism. They intended to look at the geology of their local area and explain what life was like in the very distant past. Around 300 million years ago, the school would have been underwater, covered by a shallow tropical sea that teemed with life. Evidence for this can be found in the numerous limestone outcrops in the area. The limestone is used as a local building material and the teacher planned to use these resources to help explain about the area’s geological past. Setting Out to Explore the Local Geology of the Area Evidence of an ancient tropical sea to be found on the school buildings. Picture Credit: Everything Dinosaur The picture (above) shows a form of limestone called oolitic limestone. The term means “egg stone”, as the texture of the rock’s surface resembles fish eggs. The circular patterns are the remains of ooliths that make up the limestone rock. Fragments of sea shell, or grains of sand are rolled around on the sea floor and as they move they collect CaCO3 (calcium carbonate). Concentric layers of this material are formed and it is these that give the rock its characteristic appearance. The teacher hopes to inspire the Year 5 pupils by showing them the geology on their doorstep. The School Would Have Been Underwater Millions of Years Ago An ancient sea scene. Picture Credit: Open University/Everything Dinosaur Team members supplied some extra resources and provided advice to help this teacher plan for this very creative topic area.
cc/2019-30/en_head_0010.json.gz/line2662
__label__cc
0.530652
0.469348
Home » Science Notes Posts » Science History » Today In Science History – September 30 – Hans Geiger Today In Science History – September 30 – Hans Geiger 1 This entry was posted on September 30, 2014 by Todd Helmenstine (updated on March 9, 2018 ) Hans Geiger (1882 – 1945) September 30 is Hans Geiger’s birthday. Geiger was the German physicist best known for the invention of the Geiger counter and the Geiger-Marsden experiment. The Geiger-Marsden experiment is more commonly known as the “Gold foil experiment” that demonstrated the existence of the atomic nucleus. The prevailing theory dealing with the structure of the atom was known as the ‘plum pudding’ model. The atom was a collection of electrons distributed in a region of positive charge. These electrons were distributed much like the plums in a plum pudding made of positive charge: in there, but not ordered in any way. Ernest Rutherford arranged for Hans Geiger and Ernest Marsden to test this theory. Their idea was to fire positively charged alpha particles towards a thin foil of gold. If the plum pudding model was true, the alpha particles would be deflected away from the atoms overall positive charge. Because the electric field produced by single atoms is small, the deflection of the alpha particle should also be small. In effect, alpha particles should appear to pass straight through a sample of atoms. When they fired their beam of alpha particles through the gold foil, they found the particles mostly traveled straight through the sample, a significant number of them were being scattered all over the place. Clearly, the plum pudding model was incorrect. They could only get these path deflections if the atom’s positive charge was more concentrated within the atom or a nucleus of charge. One side issue to the gold foil experiment was the need to detect alpha particles. One solution to this problem was the invention of the Geiger counter. Geiger counters are radiation detectors. The basic set-up is a sealed metal tube with a wire running down the center axis. The tube is filled with an inert mixture of gasses. When an electric charge is applied to the central wire, an electric field forms between the wire and inside edge of the tube. When a particle or photon of radiation enters the tube, the gas ionizes and becomes conductive. This causes a change in the tube’s electric field and produces a small current on the wire until the gas reverts to its stable form. This current spike is recorded by the device. Many Geiger counters have displays that show the number of current spikes per unit of time but most early models only sent the current spike to a speaker. The current causes the speaker to click when radiation is detected. The more clicks, the more radiation encountered. in the form of a counter, audible signal to show it has detected radiation. The sensitivity of the device can be changed by the initial voltage applied to the central wire. Geiger counters can easily be purchased from scientific supply houses or even Amazon.com. The prices range from $50 to $1000, depending on the options, sensitivity, and particles it can detect. Using one can be a surprising adventure when you find radioactivity in places you never suspected before. Notable Science Events for September 30 2014 – Martin Lewis Perl died. Perl is an American physicist who was awarded half the 1995 Nobel Prize in Physics for the discovery of the tau lepton. The tau lepton is an extremely short lived (2.9 x 10-13 seconds) negatively charged elementary particle. Tau leptons have 3477 times the mass of electrons. The particle was detected during collisions between positrons and electrons using the SPEAR (Stanford Positron Electron Asymmetric Rings) particle accelerator. This accelerator could build up particle energies to 4.8 GeV, high enough to create tau particles. 1994 – André Michel Lwoff died. André Michel Lwoff (1902 – 1994) Lwoff was a French microbiologist who was awarded a third of the 1965 Nobel Prize in Medicine for the discovery that lysogenic bacteria (bacteria that is infected by viruses) remain lysogenic in future generations. This showed the bacteriophage genetically insert themselves into the bacteria and reproducing itself. He also found a non-infecting bacteriophage that he called prophage that inhibited virus reproduction. The prophage was later found to become active when exposed to ultraviolet light which gave evidence to cancerous tumors could be caused by mutations of an inactive or dormant virus. 1985 – Charles Richter died. Charles Richter (1900 – 1985) USGS Richter was an American seismologist who is best known for the logarithmic earthquake magnitude scale that bears his name. When an earthquake occurs, the maximum amplitude of the shake is measured on a seismometer and assigned a Richter number. A quake with a value of 5 on the Richter scale is 10 times more powerful than a quake with a value of 4. 1951 – Barry James Marshall was born. Marshall is an Australian physician who shares the 2005 Nobel Prize in Medicine with J. Robin Warren for the discovery of the Helicobacter pylori bacterium. He showed this bacteria is the main cause of most peptic ulcers and not things like stress or spicy food. 1943 – Johann Deisenhofer was born. Deisenhofer is a German biochemist who shares the 1988 Nobel Prize in Chemistry with Robert Huber and Hartmut Michel for the determination of the structure of the proteins essential for photosynthesis. They used x-ray crystallography to determine the structure of the protein and greatly increased the understanding of the mechanism of photosynthesis of plants and bacteria. 1939 – Jean-Marie Lehn was born. Lehn is a French chemist who shares with Jean-Marie Lehn and Charles Pedersen the 1987 Nobel Prize in Chemistry for their research and development of host-guest chemistry. Host-guest chemistry is where two or more molecules/ions bond in unique ways due to their structure in other than covalent bonds. Lehn created molecules that acted as a cage molecule where a central molecule or atom would get trapped within a cavity created by the cage molecule. 1905 – Nevill Francis Mott was born. Mott was an English physicist who shared the 1977 Nobel Prize in Physics with Philip W. Anderson and J. H. Van Vleck for their independent work with the electronic structure of magnetic and disordered systems. A disordered system is a solid with no long range order to the group of molecules that make up the solid. Glass is an example of a disordered system. 1882 – Hans Geiger was born. 1870 – Jean Perrin was born. Jean Baptiste Perrin (1870 – 1942) Perrin was a French physicist who discovered cathode rays were actually made up of corpuscular negative charges (electrons). He is best known for verifying Einstein’s theories of Brownian motion and calculating Avogadro’s number, the number of molecules per mole of a gas. His work in determining the equilibrium constant of suspended solutions would earn him the 1926 Nobel Prize in Physics. 1802 – Antoine Jérôme Balard was born. Antoine Jérôme Balard (1802 – 1876) Balard was a French chemist who isolated and identified the element bromine. He was conducting a general investigation of seawater when he found the previously unknown element in seaweed and several marine animals. 1694 – Marcello Malpighi died. Marcello Malpighi (1628 – 1694) Malpighi was an Italian physician who is considered the father of microscopic anatomy and histology. He also used the microscope to study the development of chick embryos and insects do not have lungs, but breathe through tracheae holes in their skin. ← Printable 20 Amino Acids Study Sheet Druckbare Periodensystems der Elemente – Printable Periodic Table in German →
cc/2019-30/en_head_0010.json.gz/line2663
__label__wiki
0.82363
0.82363
Exclusive: An Idea For Mo-Cap Oscar Awards By Alan Tudyk by Chris Agar Motion-capture is undoubtedly one of the most revolutionary aspects in all of moviemaking, as it allows digital characters to be brought to life with a greater sense of realism. Actors playing these roles have their actual physical movements captured while they are on-set, and in post-production are covered with so-called "digital makeup" that is the CGI creation viewers see in the final product. Films such as The Lord of the Rings, Avatar, and the rebooted Planet of the Apes would not be possible without these advancements, and now mo-cap is more prevalent than ever. Last year, one of the most notable instances was Alan Tudyk's standout work as scene-stealing droid K-2SO in Rogue One: A Star Wars Story. Over the past decade or so, there's been a great debate regarding mo-cap in the film industry. Many people would like to see these performances be recognized at awards shows like the Oscars, but the Academy's regulations are fickle in that department and seem unlikely to change. It seems odd for such an important step forward to be ignored completely, but Tudyk himself has an idea for a compromise he thinks might work. When Screen Rant visited ILM earlier this month, we had the opportunity to speak with Tudyk and Rogue One animator Hal Hickel, who primarily worked on K-2SO. When asked about mo-cap and awards, the two had very interesting perspectives: Tudyk: I would say they should be, because who doesn’t want an Oscar? But they should be a team. It would be a co-award because it is not just one or the other. [To Hickel] My art instructed your art. They meet. So, one wouldn’t work without the other. Hickel: ... What I would say is I think absolutely a motion-capture performance should be honored in the Best Actor or Best Supporting Actor category. Where I differ is, I think we already have an award for visual effects. So for a character who’s just amazing, who’s a motion-capture character – this is not motion-capture, but think of John Hurt as the Elephant Man. We don’t see his face in the whole film, but Oscar worthy performance. And, you could also nominate the make-up artist in the make-up category. That’s kind of how I think of it. Tudyk's concept of a co-award is fascinating and may be able to appeal to both sides of the argument. When it comes to mo-cap, there is a question of actor vs. animator and who is ultimately responsible for what is on the big screen. As Tudyk says, it's a team effort. He portrayed K-2SO in what was lovingly called the "computer pajamas" and interacted with his co-stars during principal photography (making everyone's job easier). But when director Gareth Edwards wrapped, ILM was tasked with placing the "actual" droid in the footage. Hickel told us that they "skewed very closely to what Alan did" to preserve his performance, but they still had to manipulate the end result in some respects. For instance, K-2SO's eyes moved around to show emotion, something that wasn't possible to depict until ILM took over. Of course, Hickel makes a solid point as well. John Hurt was nominated for his heartbreaking turn in The Elephant Man, even though he was completely obscured by awards-worthy makeup for the entire film. Hurt's appearance in that film was heavily altered by a different department that has their own Oscars category, so it reads as logical to keep everything separate. The "digital makeup" argument can be controversial since it seems to discredit what the VFX team does, but it's interesting that there are some animators in the industry who subscribe to that belief. Whether the Academy ever opens up to mo-cap remains to be seen, but Tudyk did have another fix if his co-award pitch isn't good enough: "Watch the movie with the actor in his pajamas and stilts." Stay tuned to Screen Rant for more coverage from our visit to ILM! MORE: Rogue One Producer Has Another Spinoff Idea Rogue One: A Star Wars Story will be available on Blu-ray April 4, 2017. Tags: star wars, star wars: rogue one Space Jam 2 Gets Girls Trip Director Malcolm D. Lee Thor Is Now Marvel’s Longest-Running Franchise
cc/2019-30/en_head_0010.json.gz/line2664
__label__cc
0.628633
0.371367
Register - opens a dialog box Sign in - opens a dialog box 1 Choose your room Step 1 of 3 2 Enter your details Step 2 of 3 3 Final details Step 3 of 3 When would you like to stay? 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 July '19 August '19 September '19 October '19 November '19 December '19 January '20 February '20 March '20 April '20 May '20 June '20 July '20 August '20 September '20 October '20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Copyright © 1996–2019 Booking.com. All rights reserved. This website uses cookies. Click here for more information. Close 886930,835220,661987,904460,905770,904160,899090,905500,911630,897420,661987|1
cc/2019-30/en_head_0010.json.gz/line2667
__label__wiki
0.881507
0.881507
On the runway, calming jitters and building confidence STYLE: Above, left, freshman Danielle Finn modeled a red button down coat. Senior Ari Sassover, middle, donned a black floral dress and corduroy jacket. Sophomore Rebecca Cohen, right, wore a long floral dress with sandles. BP Photos by Neima Fax Shani Shaham, Staff Writer Filed under Features, Top Stories Standing in the Shalhevet gym, freshman Danielle Finn attempted to tame the butterflies in her stomach Jan. 13 while an audience of women from throughout the Los Angeles Jewish community waited in anticipation for the long-planned event to begin. The gym had been completely transformed, with a runway starting from the stage and splitting the room in half, mechitzahs to hide the models from the audience, vendors’ booths along the edges of the room, the and blue and gold balloons in every corner. Awaiting their turns on the makeshift runway were female students were dressed in vibrant, trendy and modest clothing as volunteer models in the Fourth Annual Shalhevet Womens Fashion Show. Danielle said she might not have been able to do it if not for the advice of Gabby Grunfeld and Kira and Jackie Faerstain, co-presidents of the Fashion Club, which sponsored the event. “The idea of walking down the aisle is really nerve-wracking,” said Danielle after the show, “but the co-presidents told us to be confident with it and to just be ourselves. So when it was my turn to walk, I decided to put my own spin on it and to have fun with it.” The fashion show is also an amazing opportunity to create a space where all Jewish women can gather together and create a warm and confident community.” — Gabby Grunfeld, 12th grade Shalhevet’s Fashion Club was created in 2015, and immediately initiated the fashion show, which was directed to raise money for the senior Poland-Israel Experience. It raised $2,450 this year, according to Gabby Grunfeld. However, some of it was subtracted because of the security that needed to be paid. But in addition to fundraising, ever since the first year, the fashion show’s mission has been to create a close-knit community and to embolden all the women in the room. “We put on the fashion show to empower women in the Jewish community by showing them that regardless of observance or belief that you can have fun and play with fashion, and you can still be colorful and unique within yourself,” said Gabby. Toward that end, the three co-presidents aided and advised the models with conquering their nerves prior to the show. Models practiced walking the runway in the hours before the show started with hopes to help ease the nerves that come from standing on a stage in front of a big audience. Along with relieving stagefright, the rehearsals had brought the girls closer together. “At one point before all the people started to show up, all the models were just hanging out, trying on each other’s outfits and helping everyone get ready,” said Danielle. “We were just having fun.” Danielle wore a cheetah print midi wrap dress layered with a long red button-down coat. While walking down the runway, she didn’t give into all the eyes that followed her every step. “I didn’t really like the way my outfit looked on me, but Gabby helped me see it in a different light,” said Danielle. “She gave me the idea to close the show by taking the jacket off when I got to the end of the runway, and then carry it over my shoulder while I walked back.” Walking down the runway may be an intimidating experience at first, but for models who have been in the fashion show in its previous years, the challenge has turned into something fun and memorable. Senior Ari Sassover was a model in the fashion show’s second year — her sophomore year — and this year decided to participate one last time. “The first time I was a model I was really scared, but this year it was much more fun and I wasn’t really nervous,” said Ari. “It’s really nice that the models are not just from one grade, so students can become friends with one another even if they are in a different class. The fashion show is another chance to strengthen the Shalhevet community amongst the girls.” Ari modeled a knee-length black floral dress paired with a black corduroy cropped jacket. She walked down the runway with the jacket halfway off to show reveal the dress underneath. “I tried to be as in the moment as I could and just enjoy being with my friends,” said Ari. “Knowing that the funds raised went to charity made the fashion show so much more meaningful.” Along with Gabby, her fellow co-presidents Jackie and Kira Faerstain worked for almost a year on this year’s show. When last year’s show ended, they immediately got to work staying in contact with the clothing stores and vendors. Student show reflected feminism through modest fashion Shalhevet provides the runway, stage, and tables. Clothing vendors also showed up at the event. “The fashion show is also an amazing opportunity to create a space where all Jewish women can gather together and create a warm and confident community,” said Gabby. Reflecting on her experience in this year’s show, Danielle said she hoped it could turn into something that is a bigger part of school and the greater community. “I think that next year we could bring in other aspects to make it more of an amazing event,” said Danielle in an interview with the Boiling Point. “This is such a cool event and I think that if we could add more things to get more people from the school to come then it could only get better and more valuable towards the community.” Get the latest from The Boiling Point. Sign up for our news feed. Columns COLUMN: Cheating? Columns COLUMN: A year after Parkland, living for those wh…
cc/2019-30/en_head_0010.json.gz/line2671
__label__cc
0.621292
0.378708
Pauline (Kasten) "Polly" Frost Add Photo Add Memory Light Candle Add Condolence Obituary of Pauline (Kasten) Frost Pauline “Polly” (Kasten) Frost, age 92 of Atmore, Alabama died on June 18, 2019. Polly was born on March 30, 1927 in New Jersey to the late Paul and Melida Kasten and grew up in New Brunswick, New Jersey. She graduated from New Brunswick High School. Following graduation, Polly was employed by Johnson and Johnson and Maytag. Polly married Walter Frost on November 1, 1947 (they would be married for 51 years). Following their marriage, they moved to Watertown and then Bedford to raise their family. Polly worked as a wedding sales/coordinator in Judy’s Dress Shop in Bedford, office worker at Miller Disposal in Bedford, and for The Raytheon Corporation in Waltham before retiring. Polly was very involved with The Bedford Womens Community Club in Bedford and was a member of the First Baptist Church in Bedford. She was also a very supporting wife of Walter in the Bedford Minute Men. Polly was a gourment cook and was a member of the “Gourmet Group” in Bedford. Polly was blessed with the gift of song and a beautiful voice where she sang in the church choirs all of her life. Polly is preceded in death by her loving husband Walter in November 1998. A while after Walter’s passing, Polly moved to Baldwinsville, NY, then to Atmore, AL. Loving mother of Randall and his wife Gail Frost of Liverpool, NY, Douglas and his wife Theresa Frost of Atmore, AL, and Suzanne Bishop of Atmore, AL; sister, Veronica and her husband Richard Brown of OH; and grandchildren, Lenore Hall, Daniel Frost, Thomas Frost, Lynette Bishop, James Bishop, Paul Frost and Sara Whitaker. Polly was also blessed with 14 great-grandchildren. A service of the celebration of her life was held on Friday, June 21, 2019 in Johnson-Quimby Funeral Chapel in Atmore, Alabama with Bro. Doug Odom officiating. Burial will be held in Shawsheen Cemetery in Bedford at a later date. In lieu of flowers, please make donations to your church of worship. Send Flowers Print Add Condolence
cc/2019-30/en_head_0010.json.gz/line2672
__label__cc
0.648735
0.351265
advocacy|early career|membership|news|psychotherapy bulletin When I was in graduate school, the Scientist-Practitioner Model was every clinical psychologist’s ideal. We were trained to appreciate, understand, and actually do research following the lines of the Boulder Model (1949 Conference). In 1973, a new clinical psychology training model was proposed at the Vail Conference on Professional Training in Psychology. The Practitioner-Scholar model placed more emphasis on clinical practice. Over the next 45 years, these two models of training produced psychologists with either PhD or PsyD degrees. While both models value both science/scholarship and practice, the emphasis of the models has tended to direct psychologists towards one or the other. Market forces reinforced these silos. In my early life as a professional psychologist, at a counseling center housed in a major women’s and children’s hospital, we saw patients, trained students and residents, and had time to do our own research. Within a decade, however, the pressure to produce greater “billables” increased to the point where research was squeezed out and finally the training program’s funding was cut. Like so many of my colleagues, I then moved into independent practice and no longer engaged in anything but clinical work, with an occasional cameo appearance as a teacher. This was a sad loss to those of us who had created a program that seemed to embody the Boulder Model and valued the Vail Model. Independent practice can be isolative and unless you try very hard, there is a tendency to settle into doing what you have been doing and no longer seek new information (Editors’ Note: For more on the ethical implications of this, see Barnett & Corcoran’s piece on “Competence, Ethical Practice, and Going It Alone,” in this issue). Our story is not at all unusual. In their 2015 article, LeJeune and Luoma noted that most clinical psychologists work in private fee-for-service settings with little, if any, opportunity to engage in psychological research. The bulk of psychological research is produced by a small minority of psychologists working primarily in academic settings removed from clinical practice. (Norcross & Karpiak, 2012). (p. 421) LeJeune and Luola (2015) propose one interesting solution, outlined in their article, but for those of us who are settled into solid clinical practices, there is another option: The Society for the Advancement of Psychotherapy (SAP)! In our Division 29, the SAP, we have all the elements of the profession: the clinical practitioners, the researchers, the academics, the teachers, the mentors. We are a home for clinical work in all its dimensions, and particularly welcome students and early-career psychologists. So why join? First, and this is a boon for everyone, it’s a really good deal. Membership dues are low, thanks in large part to the success of our journal Psychotherapy (see below) and it is not necessary to be a member of APA to be a member of the SAP. Second, why not be a member? Isn’t it your civic duty? But seriously… If you are a student, you can interact with the people whose books you have been reading in school, and with others at various career stages. We have live opportunities to do this at Convention every year with our “Lunch with the Masters” events where students not only get a free meal, but also the chance to talk with a range of senior psychologists. There are also grants and awards for student members. We like to encourage students to be on all our committees, and we have a dedicated student position on the SAP Board. We’re friendly! For early-career psychologists (ECPs), the SAP has grants and awards, mentorship programming, and, again, the opportunity to be side-by-side with esteemed senior colleagues. We have a dedicated Board position for ECPs as well, and actively seek their input on all our committees. For more on ECP issues, join the ECP listserv, check Leigh Ann Carter’s (2017) take on benefiting from membership, or see Rayna Markin’s (2017) article on mentoring. We really are friendly. Mid-career psychologists who might otherwise be isolated in their professional silos can come together and share their work. Clinicians talk with researchers, researchers talk with teachers, and we thus recreate the integrated model of scientist/scholar and practitioner. Our senior psychologists also benefit from membership in the Society, often by giving mentorship and role modeling to their colleagues. No matter how senior you are, you also learn from the upcoming generation of psychologists and it is great to see the pipeline in action (Editors’ Note: And, should you be considering closing a private practice or retirement, see O’Leary, 2018, or Tom Barrett’s article on “Retirement Myths” in this issue). In his presidential column for the Bulletin (2018), Michael Constantino congratulated the winners of all the Society’s awards and honors. The list is truly impressive and hopefully inspiring. All members of the Society have the advantage of receiving our quarterly journal Psychotherapy. It is a great resource and an esteemed place to publish. The Psychotherapy Bulletin is the other official publication of the Division of Psychotherapy. It serves as the primary communication with members and publishes short articles and official notices from the Society. Finally, the Society has two delegates to the APA Council of Representatives, the governing body of the association, and as such represents the voice of psychotherapy in all its forms at the national level. So please join or renew your membership and encourage others to join too. Adam-Terem, R. (2018). Why Join?. Psychotherapy Bulletin, 53(4), XX-XX. Carter, L. A. (2017). Looking ahead in the new year: How you can benefit from your Society membership in 2017. Psychotherapy Bulletin, 52(1), 32-34. Constantino, M. (2018). President’s column: Thank you, Division 29 friends and colleagues. Psychotherapy Bulletin, 53(3), 2-4. LeJeune, J. T., & Luoma, J. B., (2015). The integrated scientist-practitioner: A new model for combining research and clinical practice in fee-for-service settings. Professional Psychology: Research and Practice, 46(6), 421–428. Markin, R. (2017). New mentoring hour program for early career psychologists: Getting mentorship one hour at a time. Psychotherapy Bulletin, 50(2), 54-55. O’Leary, M. (2018). Closing a private practice. Psychotherapy Bulletin, 53(3), 12-16. 2018 Candidate Statements 2017 Candidates Statement Opportunities for Students/ECPs in the Society Rosemary Adam-Terem, Ph.D. « Thrills, Chills, and Social Justice in Forensic Psychology Trainee Perspectives on the Importance of Self-Care and Research in Clinical Supervision »
cc/2019-30/en_head_0010.json.gz/line2686
__label__cc
0.717742
0.282258
Do you know your rights ? Sovereign or Slave? To Commissioner of IRD Response from Commissioner for IRD Notice of Intent TAX Employer Deductions NOTICE Bank Deductions NOTICE Declaration of Human Rights 1926 Slavery Convention Proclamation of Self Determination Proclamation Template 1956 Supplementary Convention 2012 Rule of Law Covenant on Civil and Political Rights Nuremburg Principles Commercial Lein Public Servant Oaths Is this the end of Income Tax Death of Taxes Home‎ > ‎Documents‎ > ‎ 1956 SUPPLEMENTARY CONVENTION ON THE ABOLITION OF SLAVERY, THE SLAVE TRADE AND INSTITUTIONS AND PRACTICES SIMILAR TO SLAVERY Adopted in Geneva, Switzerland on 7 September 1956 [http://www2.ohchr.org/english/law/slavetrade.htm] Preamble 2 Section I. Institutions and practices similar to slavery 2 Article 1 2 Section II. The slave trade 3 Section III. Slavery and institutions and practices similar to slavery 4 Section IV. Definitions 4 Section V. Cooperation between States Parties and communication of information 5 Section VI. Final clauses 5 The States Parties to the present Convention, CONSIDERING THAT freedom is the birthright of every human being, MINDFUL THAT the peoples of the United Nations reaffirmed in the Charter their faith in the dignity and worth of the human person, CONSIDERING THAT the Universal Declaration of Human Rights, proclaimed by the General Assembly of the United Nations as a common standard of achievement for all peoples and all nations, states that no one shall be held in slavery or servitude and that slavery and the slave trade shall be prohibited in all their forms, RECOGNIZING THAT, since the conclusion of the Slavery Convention signed at Geneva on 25 September 1926, which was designed to secure the abolition of slavery and of the slave trade, further progress has been made towards this end, HAVING REGARD TO the Forced Labour Convention of 1930 and to subsequent action by the International Labour Organisation in regard to forced or compulsory labour, BEING AWARE, however, that slavery, the slave trade and institutions and practices similar to slavery have not yet been eliminated in all parts of the world, HAVING DECIDED , therefore, that the Convention of 1926, which remains operative, should now be augmented by the conclusion of a supplementary convention designed to intensify national as well as international efforts towards the abolition of slavery, the slave trade and institutions and practices similar to slavery, HAVE AGREED AS FOLLOWS: Section I. Institutions and practices similar to slavery Each of the States Parties to this Convention shall take all practicable and necessary legislative and other measures to bring about progressively and as soon as possible the complete abolition or abandonment of the following institutions and practices, where they still exist and whether or not they are covered by the definition of slavery contained in article 1 of the Slavery Convention signed at Geneva on 25 September 1926: (a) Debt bondage, that is to say, the status or condition arising from a pledge by a debtor of his personal services or of those of a person under his control as security for a debt, if the value of those services as reasonably assessed is not applied towards the liquidation of the debt or the length and nature of those services are not respectively limited and defined; (b) Serfdom, that is to say, the condition or status of a tenant who is by law, custom or agreement bound to live and labour on land belonging to another person and to render some determinate service to such other person, whether for reward or not, and is not free to change his status; (c) Any institution or practice whereby: (i) A woman, without the right to refuse, is promised or given in marriage on payment of a consideration in money or in kind to her parents, guardian, family or any other person or group; or (ii) The husband of a woman, his family, or his clan, has the right to transfer her to another person for value received or otherwise; or (iii) A woman on the death of her husband is liable to be inherited by another person; (d) Any institution or practice whereby a child or young person under the age of 18 years, is delivered by either or both of his natural parents or by his guardian to another person, whether for reward or not, with a view to the exploitation of the child or young person or of his labour. With a view to bringing to an end the institutions and practices mentioned in article 1(c) of this Convention, the States Parties undertake to prescribe, where appropriate, suitable minimum ages of marriage, to encourage the use of facilities whereby the consent of both parties to a marriage may be freely expressed in the presence of a competent civil or religious authority, and to encourage the registration of marriages. Section II. The slave trade 1. The act of conveying or attempting to convey slaves from one country to another by whatever means of transport, or of being accessory thereto, shall be a criminal offence under the laws of the States Parties to this Convention and persons convicted thereof shall be liable to very severe penalties. (a) The States Parties shall take all effective measures to prevent ships and aircraft authorized to fly their flags from conveying slaves and to punish persons guilty of such acts or of using national flags for that purpose. (b) The States Parties shall take all effective measures to ensure that their ports, airfields and coasts are not used for the conveyance of slaves. 3. The States Parties to this Convention shall exchange information in order to ensure the practical co-ordination of the measures taken by them in combating the slave trade and shall inform each other of every case of the slave trade, and of every attempt to commit this criminal offence, which comes to their notice. Any slave who takes refuge on board any vessel of a State Party to this Convention shall ipso facto be free. Section III. Slavery and institutions and practices similar to slavery In a country where the abolition or abandonment of slavery, or of the institutions or practices mentioned in article 1 of this Convention, is not yet complete, the act of mutilating, branding or otherwise marking a slave or a person of servile status in order to indicate his status, or as a punishment, or for any other reason, or of being accessory thereto, shall be a criminal offence under the laws of the States Parties to this Convention and persons convicted thereof shall be liable to punishment. 1. The act of enslaving another person or of inducing another person to give himself or a person dependent upon him into slavery, or of attempting these acts, or being accessory thereto, or being a party to a conspiracy to accomplish any such acts, shall be a criminal offence under the laws of the States Parties to this Convention and persons convicted thereof shall be liable to punishment. 2. Subject to the provisions of the introductory paragraph of article 1 of this Convention, the provisions of paragraph 1 of the present article shall also apply to the act of inducing another person to place himself or a person dependent upon him into the servile status resulting from any of the institutions or practices mentioned in article 1, to any attempt to perform such acts, to being accessory thereto, and to being a party to a conspiracy to accomplish any such acts. Section IV. Definitions For the purposes of the present Convention: (a) "Slavery" means, as defined in the Slavery Convention of 1926, the status or condition of a person over whom any or all of the powers attaching to the right of ownership are exercised, and "slave" means a person in such condition or status; (b) "A person of servile status" means a person in the condition or status resulting from any of the institutions or practices mentioned in article 1 of this Convention; (c) "Slave trade" means and includes all acts involved in the capture, acquisition or disposal of a person with intent to reduce him to slavery; all acts involved in the acquisition of a slave with a view to selling or exchanging him; all acts of disposal by sale or exchange of a person acquired with a view to being sold or exchanged; and, in general, every act of trade or transport in slaves by whatever means of conveyance. Section V. Cooperation between States Parties and communication of information 1. The States Parties to this Convention undertake to co-operate with each other and with the United Nations to give effect to the foregoing provisions. 2. The Parties undertake to communicate to the Secretary-General of the United Nations copies of any laws, regulations and administrative measures enacted or put into effect to implement the provisions of this Convention. 3. The Secretary-General shall communicate the information received under paragraph 2 of this article to the other Parties and to the Economic and Social Council as part of the documentation for any discussion which the Council might undertake with a view to making further recommendations for the abolition of slavery, the slave trade or the institutions and practices which are the subject of this Convention. Section VI. Final clauses No reservations may be made to this Convention. Any dispute between States Parties to this Convention relating to its interpretation or application, which is not settled by negotiation, shall be referred to the International Court of Justice at the request of any one of the parties to the dispute, unless the parties concerned agree on another mode of settlement. 1. This Convention shall be open until 1 July 1957 for signature by any State Member of the United Nations or of a specialized agency. It shall be subject to ratification by the signatory States, and the instruments of ratification shall be deposited with the Secretary-General of the United Nations, who shall inform each signatory and acceding State. 2. After 1 July 1957 this Convention shall be open for accession by any State Member of the United Nations or of a specialized agency, or by any other State to which an invitation to accede has been addressed by the General Assembly of the United Nations. Accession shall be effected by the deposit of a formal instrument with the Secretary-General of the United Nations, who shall inform each signatory and acceding State. 1. This Convention shall apply to all non-self-governing trust, colonial and other non-metropolitan territories for the international relations of which any State Party is responsible; the Party concerned shall, subject to the provisions of paragraph 2 of this article, at the time of signature, ratification or accession declare the non-metropolitan territory or territories to which the Convention shall apply ipso facto as a result of such signature, ratification or accession. 2. In any case in which the previous consent of a non-metropolitan territory is required by the constitutional laws or practices of the Party or of the non-metropolitan territory, the Party concerned shall endeavour to secure the needed consent of the non-metropolitan territory within the period of twelve months from the date of signature of the Convention by the metropolitan State, and when such consent has been obtained the Party shall notify the Secretary-General. This Convention shall apply to the territory or territories named in such notification from the date of its receipt by the Secretary-General. 3. After the expiry of the twelve-month period mentioned in the preceding paragraph, the States Parties concerned shall inform the Secretary-General of the results of the consultations with those non-metropolitan territories for whose international relations they are responsible and whose consent to the application of this Convention may have been withheld. 1. This Convention shall enter into force on the date on which two States have become Parties thereto. 2. It shall thereafter enter into force with respect to each State and territory on the date of deposit of the instrument of ratification or accession of that State or notification of application to that territory. 1. The application of this Convention shall be divided into successive periods of three years, of which the first shall begin on the date of entry into force of the Convention in accordance with paragraph 1 of article 13. 2. Any State Party may denounce this Convention by a notice addressed by that State to the Secretary-General not less than six months before the expiration of the current three-year period. The Secretary-General shall notify all other Parties of each such notice and the date of the receipt thereof. 3. Denunciations shall take effect at the expiration of the current three-year period. 4. In cases where, in accordance with the provisions of article 12, this Convention has become applicable to a non-metropolitan territory of a Party, that Party may at any time thereafter, with the consent of the territory concerned, give notice to the Secretary-General of the United Nations denouncing this Convention separately in respect of that territory. The denunciation shall take effect one year after the date of the receipt of such notice by the Secretary-General, who shall notify all other Parties of such notice and the date of the receipt thereof. This Convention, of which the Chinese, English, French, Russian and Spanish texts are equally authentic, shall be deposited in the archives of the United Nations Secretariat. The Secretary-General shall prepare a certified copy thereof for communication to States Parties to this Convention, as well as to all other States Members of the United Nations and of the specialized agencies. IN WITNESS WHEREOF the undersigned, being duly authorized thereto by their respective Governments, have signed this Convention on the date appearing opposite their respective signatures. DONE AT the European Office of the United Nations at Geneva, this seventh day of September one thousand nine hundred and fifty-six. 1956 Supplementary Convention on the Abolition of Slavery-doc.doc Universal Sovereign,
cc/2019-30/en_head_0010.json.gz/line2692
__label__cc
0.562544
0.437456
All submissions are initially read by one of our two SMJS lead editors. S/he decides whether the submission should be sent out for external peer review. We make use of this desk review phase to swiftly identify submissions we find unsuitable for publication in SMJS for reasons of quality, remit or area of focus. We aim to provide desk review decisions within three weeks of submission. Submissions considered suitable for external peer review are sent to two or more independent experts, who assess the article for clarity, validity, and sound methodology. Authors may be invited to recommend or ask for the exclusion of specific individuals from the peer review process. The journal does not guarantee to use these suggestions. All reviewers must be independent from the submission and will be asked to declare all competing interests. The journal operates a double-blind peer review process, meaning that authors and reviewers remain anonymous for the review process. The review period is expected to take around eight weeks. Reviewers are asked to provide formative feedback, even if a submission is not deemed suitable for publication in the journal. Based on the reviewer reports the lead editor will make a recommendation for rejection, minor or major revisions, or acceptance. Overall editorial responsibility rests with the journal’s three Editor-in-Chief, who are supported by an expert, international Editorial Board. The journal is happy to accept submissions of papers that have been loaded onto preprint servers or personal websites, have been presented at conferences, or other informal communication channels. These formats will not be deemed prior publication. Authors must retain copyright to such postings. Authors are encouraged to link any prior posting of their paper to the final published version within the journal, if it is editorially accepted. Diverse Group of Reviewers The journal employs two slightly different pools of peer reviewers for research articles and practice-oriented articles, respectively: Research articles are reviewed by two external researchers with a PhD degree Practice-oriented articles are reviewed both by a researcher with a PhD degree and a person closely affiliated to practice, typically a person with a military background. Reviewers are asked to provide comment on the below topics and guidelines: Content: Does the article fit within the scope of the journal? Is the submission original, relevant and rigorous? Are the problem, matter, and purpose clearly phrased? Is the author’s depth of understanding of the issues researched adequate? Are the sources and references adequate? Has the existing knowledge base been explored and built upon? Are the chosen methodologies appropriate and have they and the evidential base been appropriately used? Does the conclusion reflect the argument in the main body text and bring something new to the debate? Structure and argument: Does the abstract summarise the arguments in a succinct and accurate way? Is the manuscript logically structured and do the arguments flow coherently? Is there enough reference to methodology in the introduction and are the arguments fully evidenced and substantiated? Does the introduction signpost the arguments in the logical way and does the conclusion adequately summarise them? Figures/tables: Does the author’s use of tables, charts, figures or maps illustrate the arguments and support the evidential base? Is the quality of the formatting and presentation adequate? Formatting: Does the submitted file adhere to the general author guidelines listed for the journal? Are the citations and references formatted to house-style? Language: Is the text well written and jargon free? Please comment on the quality of English and need for grammatical improvement. Review recommendation: A) Accept submission, B) Revision required, C) Resubmit for review, D) Decline submission The journal strongly encourages authors to make all data associated with their submission openly available, according to the FAIR principles (Findable, Accessible, Interoperable, Reusable). This should be linked to from a Data Accessibility Statement within the submitted paper, which will be made public upon publication. If data is not being made available within the journal publication, a statement from the author should be provided to explain why. Data obtained from other sources must be appropriately credited. When depositing data for a submission, the below should be considered: The repository the data is deposited in must be suitable for this subject and have a sustainability model. The data must be deposited under an open license that permits unrestricted access (e.g. CC0, CC-BY). More restrictive licenses should only be used if a valid reason (e.g. legal) is present. The deposited data must include a version that is in an open, non-proprietary format. The deposited data must have been labelled in such a way that a 3rd party can make sense of it (e.g. sensible column headers, descriptions in a readme text file). Research involving human subjects, human material, or human data, must have been performed in accordance with the Declaration of Helsinki. Where applicable, the studies must have been approved by an appropriate ethics committee. The identity of the research subject should be anonymised whenever possible. For research involving human subjects, informed consent to participate in the study must be obtained from participants (or their legal guardian). A ‘Data Accessibility Statement’ should be added to the submission, prior to the reference list, providing the details of the data accessibility, including the DOI linking to it. If the data is restricted in any way, the reasoning should be given. A list of data repositories is available at http://oad.simmons.edu/oadwiki/Data_repositories. Preprint Policy The journal allows authors to deposit draft versions of their paper into a suitable preprint server, on condition that the author agrees to the below: The author retains copyright to the preprint and developed works from it, and is permitted to submit it to the journal. The author declares that a preprint is available within the cover letter presented during submission. This must include a link to the location of the preprint. The author acknowledges that having a preprint publicly available means that the journal cannot guarantee the anonymity of the author during the review process, even if they anonymise the submitted files (see review policy). Should the submission be published, the authors are expected to update the information associated with the preprint version to show that a final version has been published in the journal, including the DOI linking directly to the publication. The journal strongly recommends that all authors submitting a paper register an account with Open Researcher and Contributor Identifier (ORCID). Registration provides a unique and persistent digital identifier for the account that enables accurate attribution and improves the discoverability of published papers, ensuring that the correct author receives the correct credit for their work. As the ORCID remains the same throughout the lifetime of the account, changes of name, affiliation, or research area do not effect the discoverability of an author's past work and aid correspondence with colleagues. The journal encourages all corresponding authors to include an ORCID within their submitting author data whilst co-authors are recommended to include one. ORCID numbers should be added to the author data upon submission and will be published alongside the submitted paper, should it be accepted. Competing Interests, Funding and Ethics To ensure transparency, all authors, reviewers and editors are required to declare any interests that could compromise, conflict or influence the validity of the publication. Competing interests guidelines can be viewed here. In addition, authors are required to specify funding sources and detail requirements for ethical research in the submitted manuscript (see Author Guidelines). All authors must confirm that they fit the definition of an author (see Authorship Guidelines), during submission. Corrections and Retractions The Press handles different kinds of error in accordance with guidelines from the Committee on Publication Ethics (COPE), where applicable. All articles have their proofs checked prior to publication by the author/editor, which should ensure that content errors are not present. Please contact the editorial manager if you believe an article needs correcting. Post-publication changes are not permitted to the publication, unless in exceptional circumstances. If an error is discovered in a published article then the publisher will assess whether a Correction paper or Retraction is required. This ensures that the error can be appropriately corrected, whilst the integrity of the publication record is not broken. Please contact the publisher for the full Correction/Retraction policy. Misconduct and Complaints Allegations of misconduct will be taken with utmost seriousness, regardless of whether those involved are internal or external to the journal, or whether the submission in question is pre- or post-publication. All reasonable steps will be taken to identify and prevent the publication of papers where research misconduct has occurred, including plagiarism, citation manipulation, and data falsification/fabrication. If an allegation of misconduct is made to the journal, it must be immediately passed on to the publisher, who will follow guidelines from the Committee on Publication Ethics (COPE) on how to address the nature of the problem. Should the matter involve allegations against a member of the journal or publishing team, an independent and objective individual(s) may be sought to lead the investigation. Should an author wish to lodge a complaint against an editorial decision or the editorial process in general they should first approach the Editor-in-Chief of the journal, explaining their complaint and ask for a reasoned response. Should this not be forthcoming or inadequate, they should raise the matter with the publisher, who will investigate the nature of the complaint and act as arbiter on whether the complaint should be upheld and investigated further. This will follow guidelines set out by COPE. Practice-oriented Articles
cc/2019-30/en_head_0010.json.gz/line2693
__label__cc
0.749633
0.250367
Additional Terms PagesClose Legal Navigation Effective: January 31, 2018 These Customer Terms of Service (the “Customer Terms”) describe your rights and responsibilities when using our online workplace productivity tools and platform (the “Services”). Please read them carefully. If you are a Customer (defined below), these Customer Terms govern your access and use of our Services. If you are being invited to a workspace set up by a Customer, the User Terms of Service (the “User Terms”) govern your access and use of the Services. We are grateful you’re here. These “Customer Terms” Form a Part of a Binding “Contract” These Customer Terms (or, if applicable, your written agreement with us) and any Order Form(s) (defined below) together form a binding “Contract” between Customer and us. If any terms in the Customer-Specific Supplement apply to Customer (e.g., if Customer is a U.S. government entity), those terms are also incorporated herein by reference and form part of the Contract. “We,” “our” and “us” refers to the applicable Slack entity in the section entitled “Which Slack Entity is Customer Contracting With?” below. Your Agreement On Behalf of “Customer” If you purchase subscription(s), create a workspace (i.e., a digital space where a group of users may access the Services, as further described in our Help Center pages), invite users to that workspace, or use or allow use of that workspace after being notified of a change to these Customer Terms, you acknowledge your understanding of the then-current Contract and agree to the Contract on behalf of Customer. Please make sure you have the necessary authority to enter into the Contract on behalf of Customer before proceeding. Customer Choices and Instructions Who is “Customer”? (Hint: There can be only one) “Customer” is the organization that you represent in agreeing to the Contract. If your workspace is being set up by someone who is not formally affiliated with an organization, Customer is the individual creating the workspace. For example, if you signed up using a personal email address and invited a couple of friends to work on a new startup idea but haven't formed a company yet, you are the Customer. Signing Up Using a Corporate Email Domain If you signed up for a plan using your corporate email domain, your organization is Customer, and Customer can modify and re-assign roles on your workspace (including your role) and otherwise exercise its rights under the Contract. If Customer elects to replace you as the representative with ultimate authority for the workspace, we will provide you with notice following such election and you agree to take any actions reasonably requested by us or Customer to facilitate the transfer of authority to a new representative of Customer. What This Means for Customer—and for Us Individuals authorized by Customer to access the Services (an “Authorized User”) may submit content or information to the Services, such as messages or files (“Customer Data”), and Customer may exclusively provide us with instructions on what to do with it. For example, Customer may provision or deprovision access to the Services, enable or disable third party integrations, manage permissions, retention and export settings, transfer or assign workspaces, share channels, or consolidate workspaces or channels with other workspaces or channels. Since these choices and instructions may result in the access, use, disclosure, modification or deletion of certain or all Customer Data, please review the Help Center pages for more information about these choices and instructions. Customer will (a) inform Authorized Users of all Customer policies and practices that are relevant to their use of the Services and of any settings that may impact the processing of Customer Data; and (b) ensure the transfer and processing of Customer Data under the Contract is lawful. Ordering Subscriptions A subscription allows an Authorized User to access the Services. No matter the role, a subscription is required for each Authorized User. A subscription may be procured through the Services interface, or in some cases, via an order form entered into between Customer and us (each, an “Order Form”). Please see the Help Center for more information on procuring subscriptions and inviting new Authorized Users. Each Authorized User must agree to the User Terms to activate their subscription. Subscriptions commence when we make them available to Customer and continue for the term specified in the Services “check-out” interface or in the Order Form, as applicable. Each subscription is for a single Authorized User for a specified term and is personal to that Authorized User. We sometimes enter into other kinds of ordering arrangements, but that would need to be spelled out and agreed to in an Order Form. During an active subscription term, adding more subscriptions is fairly easy. Unless the Order Form says otherwise, Customer may purchase more subscriptions at the same price stated in the Order Form and all will terminate on the same date. Check out our Help Center pages for additional information on setting up a workspace and assigning roles. We may share information about our future product plans because we like transparency. Our public statements about those product plans are an expression of intent, but do not rely on them when making a purchase. If Customer decides to buy our Services, that decision should be based on the functionality or features we have made available today and not on the delivery of any future functionality or features. Choosing to be a Beta Tester Occasionally, we look for beta testers to help us test our new features. These features will be identified as “beta” or “pre-release,” or words or phrases with similar meanings (each, a “Beta Product”). Beta Products may not be ready for prime time so they are made available “as is,” and any warranties or contractual commitments we make for other Services do not apply. Should Customer encounter any faults with our Beta Products, we would love to hear about them; our primary reason for running any beta programs is to iron out issues before making a new feature widely available. The more suggestions our customers make, the better the Services become. If Customer sends us any feedback or suggestions regarding the Services, there is a chance we will use it, so Customer grants us (for itself and all of its Authorized Users and other Customer personnel) an unlimited, irrevocable, perpetual, sublicensable, transferable, royalty-free license to use any such feedback or suggestions for any purpose without any obligation or compensation to Customer, any Authorized User or other Customer personnel. If we choose not to implement the suggestion, please don’t take it personally. We appreciate it nonetheless. Non-Slack Products Our Services include a platform that third parties may use to develop applications and software that complement Customer’s use of the Services (each, a “Non-Slack Product”). We also maintain a directory called the Slack App Directory where some Non-Slack Products are available for installation. THESE ARE NOT OUR SERVICES, SO WE DO NOT WARRANT OR SUPPORT NON-SLACK PRODUCTS, AND, ULTIMATELY, CUSTOMER (AND NOT US) WILL DECIDE WHETHER OR NOT TO ENABLE THEM. ANY USE OF A NON-SLACK PRODUCT IS SOLELY BETWEEN CUSTOMER AND THE APPLICABLE THIRD PARTY PROVIDER. If a Non-Slack Product is enabled for Customer’s workspace, please be mindful of any Customer Data that will be shared with the third party provider and the purposes for which the provider requires access. We will not be responsible for any use, disclosure, modification or deletion of Customer Data that is transmitted to, or accessed by, a Non-Slack Product. Check out our Help Center pages for more information. Please review our Privacy Policy for more information on how we collect and use data relating to the use and performance of our websites and products. Customer and Authorized Users Customer must comply with the Contract and ensure that its Authorized Users comply with the Contract and the User Terms. We may review conduct for compliance purposes, but we have no obligation to do so. We aren't responsible for the content of any Customer Data or the way Customer or its Authorized Users choose to use the Services to store or process any Customer Data. The Services are not intended for and should not be used by anyone under the age of 16. Customer must ensure that all Authorized Users are over 16 years old. Customer is solely responsible for providing high speed internet service for itself and its Authorized Users to access and use the Services. Our Removal Rights If we believe that there is a violation of the Contract that can simply be remedied by Customer’s removal of certain Customer Data or Customer’s disabling of a Non-Slack Product, we will, in most cases, ask Customer to take direct action rather than intervene. However, we may directly step in and take what we determine to be appropriate action, if Customer does not take appropriate action, or if we believe there is a credible risk of harm to us, the Services, Authorized Users, or any third parties. Payment Obligations For Customers that purchase our Services, fees are specified at the Services interface “check-out” and in the Order Form(s) — and must be paid in advance. Payment obligations are non-cancelable and, except as expressly stated in the Contract, fees paid are non-refundable. For clarity, in the event Customer downgrades any subscriptions from a paid plan to a free plan, Customer will remain responsible for any unpaid fees under the paid plan, and Services under the paid plan will be deemed fully performed and delivered upon expiration of the initial paid plan subscription term. Check out our Help Center pages for more information about payment options. If we agree to invoice Customer by email, full payment must be received within thirty (30) days from the invoice date. Fees are stated exclusive of any taxes, levies, duties, or similar governmental assessments of any nature, including, for example, value-added, sales, use or withholding taxes, assessable by any jurisdiction (collectively, “Taxes”). Customer will be responsible for paying all Taxes associated with its purchases, except for those taxes based on our net income. Should any payment for the Services be subject to withholding tax by any government, Customer will reimburse us for such withholding tax. Fair Billing Policy We believe customers should only pay for subscriptions that are actually used, so we offer a Fair Billing Policy. Certain exceptions and conditions may apply, as noted in the Services interface “check-out” or in an Order Form. Any credits that may accrue to Customer’s account (for example, from a promotion or application of the Fair Billing Policy), will expire following expiration or termination of the applicable Contract, will have no currency or exchange value, and will not be transferable or refundable. Credits accrued to a workspace on a free subscription plan will expire if the workspace’s plan is not upgraded to a paid plan within ninety (90) days of accrual, unless otherwise specified. For more information on credits, please see the Help Center. Downgrade for Non-Payment If any fees owed to us by Customer (excluding amounts disputed reasonably and in good faith) are thirty (30) days or more overdue, we may, without limiting our other rights and remedies, downgrade any fee-based Services to free plans until those amounts are paid in full, so long as we have given Customer ten (10) or more days’ prior notice that its account is overdue. Notwithstanding the second paragraph of the “Providing the Services” section below, Customer acknowledges and agrees that a downgrade will result in a decrease in certain features and functionality and potential loss of access to Customer Data, as illustrated by comparing the plans in the Pricing Guide. Providing the Services Customer isn’t the only one with responsibilities; we have some, too. We will (a) make the Services available to Customer and its Authorized Users as described in the Contract; and (b) not use or process Customer Data for any purpose without Customer’s prior written instructions; provided, however, that “prior written instructions” will be deemed to include use of the Services by Authorized Users and any processing related to such use or otherwise necessary for the performance of the Contract. Be assured that (a) the Services will perform materially in accordance with our then-current Help Center pages; and (b) subject to the “Non-Slack Products” and “Downgrade for Non-Payment” sections, we will not materially decrease the functionality of a Service during a subscription term. For any breach of a warranty in this section, Customer’s exclusive remedies are those described in the sections titled “Termination for Cause” and “Effect of Termination”. Keeping the Services Available As further described in our Help Center pages, for some of our Services, we also offer specific uptime commitments paired with credits, if we fall short. In those cases, the credits will serve as what the lawyers call liquidated damages and will be Customer’s sole remedy for the downtime and related inconvenience. For all Service plans, we will use commercially reasonable efforts to make the Services available 24 hours a day, 7 days a week, excluding planned downtime. We expect planned downtime to be infrequent but will endeavor to provide Customer with advance notice (e.g., through the Services), if we think it may exceed five (5) continuous minutes. Protecting Customer Data The protection of Customer Data is a top priority for us so we will maintain administrative, physical, and technical safeguards at a level not materially less protective than as described in our Security Practices page. Those safeguards will include measures for preventing unauthorized access, use, modification, deletion and disclosure of Customer Data by our personnel. Before sharing Customer Data with any of our third party service providers, we will ensure that the third party maintains, at a minimum, reasonable data practices for maintaining the confidentiality and security of Customer Data and preventing unauthorized access. Customer (not us) bears sole responsibility for adequate security, protection and backup of Customer Data when in Customer’s or its representatives’ or agents’ possession or control. We are not responsible for what Customer’s Authorized Users or Non-Slack Products do with Customer Data. That is Customer’s responsibility. The Slack Extended Family We may leverage our employees, those of our corporate affiliates and third party contractors (the “Slack Extended Family”) in exercising our rights and performing our obligations under the Contract. We will be responsible for the Slack Extended Family’s compliance with our obligations under the Contract. Ownership and Proprietary Rights What’s Yours is Yours… As between us on the one hand, and Customer and any Authorized Users on the other, Customer will own all Customer Data. Subject to the terms and conditions of the Contract, Customer (for itself and all of its Authorized Users) grants us and the Slack Extended Family a worldwide, non-exclusive, limited term license to access, use, process, copy, distribute, perform, export and display Customer Data, and any Non-Slack Products created by or for Customer, only as reasonably necessary (a) to provide, maintain and update the Services; (b) to prevent or address service, security, support or technical issues; (c) as required by law or as permitted by the Data Request Policy; and (d) as expressly permitted in writing by Customer. Customer represents and warrants that it has secured all rights in and to Customer Data from its Authorized Users as may be necessary to grant this license. And What’s Ours is Ours We own and will continue to own our Services, including all related intellectual property rights. We may make software components available, via app stores or other channels, as part of the Services. We grant to Customer a non-sublicensable, non-transferable, non-exclusive, limited license for Customer and its Authorized Users to use the object code version of these components, but solely as necessary to use the Services and in accordance with the Contract and the User Terms. All of our rights not expressly granted by this license are hereby retained. As further described below, a free subscription continues until terminated, while a paid subscription has a term that may expire or be terminated. The Contract remains effective until all subscriptions ordered under the Contract have expired or been terminated or the Contract itself terminates. Termination of the Contract will terminate all subscriptions and all Order Forms. Unless an Order Form says something different, (a) all subscriptions automatically renew (without the need to go through the Services-interface “check-out” or execute a renewal Order Form) for additional periods equal to one (1) year or the preceding term, whichever is shorter; and (b) the per-unit pricing during any automatic renewal term will remain the same as it was during the immediately prior term. Either party can give the other notice of non-renewal at least thirty (30) days before the end of a subscription term to stop the subscriptions from automatically renewing. Termination for Cause We or Customer may terminate the Contract on notice to the other party if the other party materially breaches the Contract and such breach is not cured within thirty (30) days after the non-breaching party provides notice of the breach. Customer is responsible for its Authorized Users, including for any breaches of this Contract caused by its Authorized Users. We may terminate the Contract immediately on notice to Customer if we reasonably believe that the Services are being used by Customer or its Authorized Users in violation of applicable law. Termination Without Cause Customer may terminate its free subscriptions immediately without cause. We may also terminate Customer’s free subscriptions without cause, but we will provide Customer with thirty (30) days prior written notice. Effect of Termination Upon any termination for cause by Customer, we will refund Customer any prepaid fees covering the remainder of the term of all subscriptions after the effective date of termination. Upon any termination for cause by us, Customer will pay any unpaid fees covering the remainder of the term of those subscriptions after the effective date of termination. In no event will any termination relieve Customer of the obligation to pay any fees payable to us for the period prior to the effective date of termination. Data Portability and Deletion We are custodians of Customer Data. During the term of a workspace’s subscriptions, Customer will be permitted to export or share certain Customer Data from the Services; provided, however, that because we have different products with varying features and Customer has different retention options, Customer acknowledges and agrees that the ability to export or share Customer Data may be limited or unavailable depending on the type of Services plan in effect and the data retention, sharing or invite settings enabled. Following termination or expiration of a workspace’s subscriptions, we will have no obligation to maintain or provide any Customer Data and may thereafter, unless legally prohibited, delete all Customer Data in our systems or otherwise in our possession or under our control. Please review our Security Practices page for more information on how Customer itself can initiate deletion. Representations Disclaimer of Warranties Customer represents and warrants that it has validly entered into the Contract and has the legal power to do so. Customer further represents and warrants that it is responsible for the conduct of its Authorized Users and their compliance with the terms of this Contract and the User Terms. EXCEPT AS EXPRESSLY PROVIDED FOR HEREIN, THE SERVICES AND ALL RELATED COMPONENTS AND INFORMATION ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS WITHOUT ANY WARRANTIES OF ANY KIND, AND WE EXPRESSLY DISCLAIM ANY AND ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, TITLE, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. CUSTOMER ACKNOWLEDGES THAT WE DO NOT WARRANT THAT THE SERVICES WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR-FREE. OTHER THAN IN CONNECTION WITH A PARTY’S INDEMNIFICATION OBLIGATIONS HEREUNDER, IN NO EVENT WILL EITHER CUSTOMER’S OR THE SLACK EXTENDED FAMILY’S AGGREGATE LIABILITY ARISING OUT OF OR RELATED TO THE CONTRACT OR THE USER TERMS (WHETHER IN CONTRACT OR TORT OR UNDER ANY OTHER THEORY OF LIABILITY) EXCEED THE TOTAL AMOUNT PAID BY CUSTOMER HEREUNDER IN THE TWELVE (12) MONTHS PRECEDING THE LAST EVENT GIVING RISE TO LIABILITY. THE FOREGOING WILL NOT LIMIT CUSTOMER’S PAYMENT OBLIGATIONS UNDER THE “PAYMENT TERMS” SECTION ABOVE. IN NO EVENT WILL EITHER CUSTOMER OR ANY MEMBER OF THE SLACK EXTENDED FAMILY HAVE ANY LIABILITY TO THE OTHER PARTY OR TO ANY THIRD PARTY FOR ANY LOST PROFITS OR REVENUES OR FOR ANY INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, COVER OR PUNITIVE DAMAGES HOWEVER CAUSED, WHETHER IN CONTRACT, TORT OR UNDER ANY OTHER THEORY OF LIABILITY, AND WHETHER OR NOT THE PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING DISCLAIMER WILL NOT APPLY TO THE EXTENT PROHIBITED BY APPLICABLE LAW. The Services support logins using two-factor authentication (“2FA”), which is known to reduce the risk of unauthorized use of or access to the Services. We therefore will not be responsible for any damages, losses or liability to Customer, Authorized Users, or anyone else if any event leading to such damages, losses or liability would have been prevented by the use of 2FA. Additionally, Customer is responsible for all login credentials, including usernames and passwords, for administrator accounts as well the accounts of your Authorized Users. We will not be responsible for any damages, losses or liability to Customer, Authorized Users, or anyone else, if such information is not kept confidential by Customer or its Authorized Users, or if such information is correctly provided by an unauthorized third party logging into and accessing the Services. The limitations under this “Limitation of Liability” section apply with respect to all legal theories, whether in contract, tort or otherwise, and to the extent permitted by law. The provisions of this “Limitation of Liability” section allocate the risks under this Contract between the parties, and the parties have relied on these limitations in determining whether to enter into this Contract and the pricing for the Services. Our Indemnification of Customer We will defend Customer from and against any and all third party claims, actions, suits, proceedings, and demands alleging that the use of the Services as permitted under the Contract infringes or misappropriates a third party’s intellectual property rights (a “Claim Against Customer”), and will indemnify Customer for all reasonable attorney’s fees incurred and damages and other costs finally awarded against Customer in connection with or as a result of, and for amounts paid by Customer under a settlement we approve of in connection with, a Claim Against Customer; provided, however, that we will have no liability if a Claim Against Customer arises from (a) Customer Data or Non-Slack Products; and (b) any modification, combination or development of the Services that is not performed by us, including in the use of any application programming interface (API). Customer must provide us with prompt written notice of any Claim Against Customer and allow us the right to assume the exclusive defense and control, and cooperate with any reasonable requests assisting our defense and settlement of such matter. This section states our sole liability with respect to, and Customer’s exclusive remedy against us and the Slack Extended Family for, any Claim Against Customer. Customer's Indemnification of Us Customer will defend Slack and the members of the Slack Extended Family (collectively, the “Slack Indemnified Parties”) from and against any and all third party claims, actions, suits, proceedings, and demands arising from or related to Customer’s or any of its Authorized Users’ violation of the Contract or the User Terms (a “Claim Against Us”), and will indemnify the Slack Indemnified Parties for all reasonable attorney’s fees incurred and damages and other costs finally awarded against a Slack Indemnified Party in connection with or as a result of, and for amounts paid by a Slack Indemnified Party under a settlement Customer approves of in connection with, a Claim Against Us. We must provide Customer with prompt written notice of any Claim Against Us and allow Customer the right to assume the exclusive defense and control, and cooperate with any reasonable requests assisting Customer’s defense and settlement of such matter. This section states your sole liability with respect to, and the Slack Indemnified Parties’ exclusive remedy against Customer for, any Claim Against Us. Limitations on Indemnifications Notwithstanding anything contained in the two preceding sections, (a) an indemnified party will always be free to choose its own counsel if it pays for the cost of such counsel; and (b) no settlement may be entered into by an indemnifying party, without the express written consent of the indemnified parties (such consent not to be unreasonably withheld), if (i) the third party asserting the claim is a government agency, (ii) the settlement arguably involves the making of admissions by the indemnified parties, (iii) the settlement does not include a full release of liability for the indemnified parties, or (iv) the settlement includes terms other than a full release of liability for the indemnified parties and the payment of money. Each party (“Disclosing Party”) may disclose “Confidential Information” to the other party (“Receiving Party”) in connection with the Contract, which is anything that reasonably should be understood to be confidential given the nature of the information and the circumstances of disclosure including all Order Forms, as well as non-public business, product, technology and marketing information.Confidential Information of Customer includes Customer Data. If something is labeled “Confidential,” that’s a clear indicator to the Receiving Party that the material is confidential. Notwithstanding the above, Confidential Information does not include information that (a) is or becomes generally available to the public without breach of any obligation owed to the Disclosing Party; (b) was known to the Receiving Party prior to its disclosure by the Disclosing Party without breach of any obligation owed to the Disclosing Party; (c) is received from a third party without breach of any obligation owed to the Disclosing Party; or (d) was independently developed by the Receiving Party. Protection and Use of Confidential Information The Receiving Party will (a) take at least reasonable measures to prevent the unauthorized disclosure or use of Confidential Information, and limit access to those employees, affiliates and contractors who need to know such information in connection with the Contract; and (b) not use or disclose any Confidential Information of the Disclosing Party for any purpose outside the scope of this Contract. Nothing above will prevent either party from sharing Confidential Information with financial and legal advisors; provided, however, that the advisors are bound to confidentiality obligations at least as restrictive as those in the Contract. Compelled Access or Disclosure The Receiving Party may access or disclose Confidential Information of the Disclosing Party if it is required by law; provided, however, that the Receiving Party gives the Disclosing Party prior notice of the compelled access or disclosure (to the extent legally permitted) and reasonable assistance, at the Disclosing Party's cost, if the Disclosing Party wishes to contest the access or disclosure. Without limiting the foregoing, please review the Data Request Policy for details on how requests may be made for the disclosure of Customer Data and how we will handle those requests. If the Receiving Party is compelled by law to access or disclose the Disclosing Party’s Confidential Information, the Disclosing Party will reimburse the Receiving Party for its reasonable cost of compiling and providing access to such Confidential Information as well as the reasonable cost for any support provided in connection with the Disclosing Party seeking a protective order or confidential treatment for the Confidential Information to be produced. The sections titled “Feedback is Welcome,” “Non-Slack Products,” “Our Removal Rights,” “A Condition of Use,” “Payment Terms,” “Credits,” “The Slack Extended Family,” “What’s Yours is Yours…,” “And What’s Ours is Ours,” “Effect of Termination,” “Data Portability and Deletion,” “Representations; Disclaimer of Warranties,” “Limitation of Liability,” “Our Indemnification of Customer,” “Customer’s Indemnification of Us,” “Limitations on Indemnifications,” “Confidentiality” and “Survival,” as well as all of the provisions under the general heading “General Provisions,” will survive any termination or expiration of the Contract. Customer grants us the right to use Customer’s company name and logo as a reference for marketing or promotional purposes on our website and in other public or private communications with our existing or potential customers, subject to Customer’s standard trademark usage guidelines as provided to us from time-to-time. We don’t want to list customers who don’t want to be listed, so Customer may send us an email to feedback@slack.com stating that it does not wish to be used as a reference. Neither us nor Customer will be liable by reason of any failure or delay in the performance of its obligations on account of events beyond the reasonable control of a party, which may include denial-of-service attacks, a failure by a third party hosting provider or utility provider, strikes, shortages, riots, fires, acts of God, war, terrorism, and governmental action. Relationship of the Parties; No Third Party Beneficiaries The parties are independent contractors. The Contract does not create a partnership, franchise, joint venture, agency, fiduciary or employment relationship between the parties. There are no third party beneficiaries to the Contract. Email and Slack Messages Except as otherwise set forth herein, all notices under the Contract will be by email, although we may instead choose to provide notice to Customer through the Services (e.g., a slackbot notification). Notices to Slack will be sent to feedback@slack.com, except for legal notices, such as notices of termination or an indemnifiable claim, which must be sent to legal@slack.com. Notices will be deemed to have been duly given (a) the day after it is sent, in the case of notices through email; and (b) the same day, in the case of notices through the Services. As our business evolves, we may change these Customer Terms and the other components of the Contract (except any Order Forms). If we make a material change to the Contract, we will provide Customer with reasonable notice prior to the change taking effect, either by emailing the email address associated with Customer’s account or by messaging Customer through the Services. Customer can review the most current version of the Customer Terms at any time by visiting this page and by visiting the most current versions of the other pages that are referenced in the Contract. The materially revised Contract will become effective on the date set forth in our notice, and all other changes will become effective upon posting of the change. If Customer (or any Authorized User) accesses or uses the Services after the effective date, that use will constitute Customer’s acceptance of any revised terms and conditions. No failure or delay by either party in exercising any right under the Contract will constitute a waiver of that right. No waiver under the Contract will be effective unless made in writing and signed by an authorized representative of the party being deemed to have granted the waiver. The Contract will be enforced to the fullest extent permitted under applicable law. If any provision of the Contract is held by a court of competent jurisdiction to be contrary to law, the provision will be modified by the court and interpreted so as best to accomplish the objectives of the original provision to the fullest extent permitted by law, and the remaining provisions of the Contract will remain in effect. Except with respect to the Slack Extended Family, neither party may assign or delegate any of its rights or obligations hereunder, whether by operation of law or otherwise, without the prior written consent of the other party (not to be unreasonably withheld). Notwithstanding the foregoing, either party may assign the Contract in its entirety (including all Order Forms), without consent of the other party, to a corporate affiliate or in connection with a merger, acquisition, corporate reorganization, or sale of all or substantially all of its assets. Customer will keep its billing and contact information current at all times by notifying Slack of any changes. Any purported assignment in violation of this section is void. A party’s sole remedy for any purported assignment by the other party in breach of this section will be, at the non-assigning party’s election, termination of the Contract upon written notice to the assigning party. In the event of such a termination by Customer, we will refund Customer any prepaid fees covering the remainder of the term of all subscriptions after the effective date of termination. Subject to the foregoing, the Contract will bind and inure to the benefit of the parties, their respective successors and permitted assigns. Which Slack Entity is Customer Contracting With? All references to ‘Slack,’ ‘we,’ or ‘us’ under the Contract, what law will apply in any dispute or lawsuit arising out of or in connection with the Contract, and which courts have jurisdiction over any such dispute or lawsuit, depend on where Customer is domiciled. Slack Contracting Entity Slack Technologies, Inc. San Francisco County, California Slack Technologies Limited The Contract, and any disputes arising out of or related hereto, will be governed exclusively by the applicable governing law above, without regard to conflicts of laws rules or the United Nations Convention on the International Sale of Goods. The courts located in the applicable venue above will have exclusive jurisdiction to adjudicate any dispute arising out of or relating to the Contract or its formation, interpretation or enforcement. Each party hereby consents and submits to the exclusive jurisdiction of such courts. In any action or proceeding to enforce rights under the Contract, the prevailing party will be entitled to recover its reasonable costs and attorney’s fees. The Contract, including these Customer Terms and all referenced pages and Order Forms, if applicable, constitutes the entire agreement between the parties and supersedes all prior and contemporaneous agreements, proposals or representations, written or oral, concerning its subject matter. Without limiting the foregoing, the Contract supersedes the terms of any online agreement electronically accepted by Customer or any Authorized Users. However, to the extent of any conflict or inconsistency between the provisions in these Customer Terms and any other documents or pages referenced in these Customer Terms, the following order of precedence will apply: (1) the terms of any Order Form (if any), (2) the portions of the Customer-Specific Supplement that apply to Customer (if any), (3) the Customer Terms and (4) finally any other documents or pages referenced in the Terms. Notwithstanding any language to the contrary therein, no terms or conditions stated in a Customer purchase order, vendor onboarding process or web portal, or any other Customer order documentation (excluding Order Forms) will be incorporated into or form any part of the Contract, and all such terms or conditions will be null and void.
cc/2019-30/en_head_0010.json.gz/line2694
__label__wiki
0.764072
0.764072
From Ragtime to Hip-hop A Century of Black American Music Woog, Adam The syncopated rhythms of ragtime music sprung out of African American communities in cities such as St. Louis, Chicago, and Kansas City and paved the way for popular music at the end of the nineteenth century. In subsequent decades, black communities fostered and developed genres such as jazz, blues, rhythm and blues, and soul, all of which had a massive influence on contemporary rock and roll. Hip-hop and rap grew in the 1970s and 1980s and directly explored issues facing African Americans through the lens of sharp lyrics and ?electronic ?beats. This extensive survey traces the diversity, innovation, and history of black music in America. Alternative Title: Century of Black American music Publisher: Detroit, Mich. : Lucent Books, c2007. Branch Call Number: 780.8996073 Characteristics: 104 p. : ill. ; 24 cm. Read more reviews of From Ragtime to Hip-hop at iDreamBooks.com African Americans — Music — History and Criticism — Juvenile Literature. Popular Music — United States — History and Criticism — Juvenile Literature. Music — United States — History and Criticism — Juvenile Literature. Find it at SLPL
cc/2019-30/en_head_0010.json.gz/line2695
__label__wiki
0.841719
0.841719
Chip Hall of Fame: Signetics NE555 A humble timer chip that became the Swiss Army knife of countless circuits Chip Hall of Fame: MOS Technology 6502 Microprocessor Chip Hall of Fame: Fairchild Semiconductor μA741 Op-Amp Photo: Hans Camenzind Manufacturer: Signetics Category: Logic It was the summer of 1970, and chip designer Hans Camenzind was working as a consultant to Signetics, a Silicon Valley semiconductor firm. The economy was tanking. He was making less than US $15,000 a year and had a wife and four children at home. He really needed to invent something good. And so he did. One of the greatest chips of all time, in fact. The 555 was a simple-to-use IC that could function as a timer or an oscillator. Still popular today, the chip was a smash hit, winding up in kitchen appliances, toys, spacecraft, and a few thousand other things. “And it almost didn’t get made,” recalled Camenzind for IEEE Spectrum a few years before he died in 2012. The idea for the 555 came to him when he was working on a circuit called a phase-locked loop. With some modifications, the circuit could work as a simple timer: You’d trigger it and it would run for a certain period. Simple as it may sound, there was nothing like that around. At first, Signetics’ engineering department rejected the idea. The company was already selling components that customers could combine to make timers. That could have been the end of it. But Camenzind insisted. He went to Art Fury, Signetics’ marketing manager. Fury liked it. Camenzind spent nearly a year testing breadboard prototypes, drawing the circuit components on paper, and cutting sheets of Rubylith masking film. “It was all done by hand, no computer,” he says. His final design had 23 transistors, 16 resistors, and 2 diodes. One of the keys to the 555’s success was that designers managed to get the circuit down to requiring just eight pins, which meant a small and compact package as seen in this early version. Photo: Mark Richards/Computer History Museum In the end it was the intuition of one engineer—Hans Camenzind that led to one of the most successful chips of all time. Photo: Hans Camenzind Fans of the 555 can build a working replica of the timer out of discrete transistors. Photo: Evil Mad Scientist Laboratories When the 555 hit the market in 1971, it was a sensation. In 1975 Signetics was absorbed by Philips Semiconductors, now NXP, which says that many billions have been sold. Engineers still use the 555 to create useful electronic modules as well as less useful things, like “Knight Rider”–style lights for car grilles. And for hard-core 555 fans, you can even build a drop-in “macrocircuit” replica kit, assembled out of discrete transistors. Chip Hall of Fame Hans Camenzind NXP Signetics timer
cc/2019-30/en_head_0010.json.gz/line2699
__label__cc
0.696718
0.303282
Human Capital Management Information System Executive Search and Consultancy Staff Leasing and Staff Augmentation Services Outsourced Training and Development Service Partner Enterprise Resource Planning Solutions General Manpower Solutions Springboard Search Springboard Select Springboard Snap HR Springboard Career Portal 7 Reasons You Should Outsource IT to the Philippines By Henrico Chan|2019-07-08T12:10:11+08:00July 8th, 2019|HR Outsourcing, HR Services, HR Solutions| The IT outsourcing industry in the Philippines has been blooming. Outsourcing in the Philippines currently employs more than 2 million people and account for one of the biggest contributors to the growing Philippine economy. In fact, the past decade shows that outsourcing to the Philippines has seen a 30 percent growth. So what exactly makes the Philippines a great outsource destination especially when it comes to information technology? Keep reading to find out. What is IT outsourcing? Before we get into the reasons on why we should outsource IT to the Philippines, we must first understand what IT outsourcing is. IT outsourcing is the process of subcontracting or using a third party such as another company or an external IT outsourcing organization to effectively deliver information technology-enabled services such as IT or HR solutions, management systems, and headhunting services. For example, if your company doesn’t have the resources to create a HR management system or maybe you don’t have the staff to be able to headhunt through IT, what you can do is make a third party that actually specializes in that field to do it for you for a cost. There are a variety of reasons why various companies, organizations, and businesses use IT outsourcing, specifically outsourcing them to Philippine outsourcing agencies. Why should you outsource IT to the Philippines? One of the hottest destinations for outsourcing IT solutions and IT services is the Philippines. Listed below are the reasons why outsourcing to the Philippines in general is incredibly business friendly and viable. 1. Cost One of if not the biggest reasons for outsourcing IT to the Philippines is the immense cost-savings businesses can savor. Aside from the cost of labor usually being half of what it is in other countries and states, you don’t have to pay for the office rent, powerful computers, human resources, legal costs, and much more. It is only natural that capital moves to countries with cheaper tax rates, lower rent costs, flexible trade regulations and affordable labor. A lot of CEOs and business owners can dramatically enhance their bottom line by outsourcing IT to the Philippines as saving money is pretty much the biggest reason organizations have been outsourcing to the Philippines. 2. More Access to Skills and Talent Your business or organization’s human resources won’t always have the skills, especially when it comes to information technology. In addition to that, headhunting and recruitment for these necessary skills will definitely be a hassle. This makes outsourcing IT to certified IT service companies who actually specialize in information technology more viable. In comparison to other countries, Philippine companies can hire a lot of skilled and willing talent much quicker, which has a lot to do with the country’s educational system and the abundance of BPO related courses in various universities. 3. Language Compared to other countries, the Philippines has a substantial advantage when it comes to language. This is because English is an official language in the Philippines as it is used on a daily basis. In addition to that, a lot of people in the Philippines know how to speak Chinese, the most spoken language in the world. Having two of the top 3 most spoken languages worldwide on their belt makes it a lot of sense to consider Philippine companies as outsourcing candidates. This makes this BPOs easier to work with as language never becomes a hindrance. 4. Data Privacy and Security The Philippine government is very particular in ensuring that the business process outsourcing (BPO) industry in the Philippines is able to thrive and demonstrate growth. To ensure this the government has set up deliberate laws and legislations to facilitate the sharing of confidential data, an inevitability when it comes to outsourcing, especially in information technology. Since the nature of outsourcing requires sharing some confidential data, the Philippine government set the data privacy act in 2012 to establish strict regulations to protect valuable data from the client. With this, you can be sure that your data is kept private and confidential when you invest in Philippine outsourcing companies especially in the case of information technology. The BPO industry is a powerful economic structure in the Philippines as mentioned above. The government recognizes this and therefore has done an excellent job in facilitating BPO growth through policy development. This makes them incredibly concerned with data privacy and security, setting up strict regulations regarding the subject. 5. Reduced Legal Liabilities Among the many concerns of running an organization or a business is leaving your processes open to legal liabilities such as lawsuits. Although, if you outsource to the Philippines, you vindicate yourself from the hassle as Philippine outsourcing companies are legally strong to maintain customer and client relations. You essentially don’t have to hire more employees, or deal with lawsuits and internal politics as all of these will be taken care of by the outsourcing agency. This gives you more time and resources to focus on other business processes in your organization that may involve your core competencies. 6. Shared and Reduced Risk All business investments carry some sort of risk in some shape or form. Whether it is the constantly changing dynamics of the market, unpredictable financial conditions, or the evolving technology there is always something that cannot be predicted. Outsourcing companies manage a lot of the risk for you. With more industry knowledge, outsourcing agencies generally do better risk decision-making in their areas of expertise, which in this case is information technology. 7. Flexibility and More Focus Through outsourcing, you can construct a team that specializes in different parts of information technology resulting in a more diversified collective skill set that spans over a range of tasks. In addition to that, language barriers won’t be much of a problem when outsourcing to the Philippines as stated in reason number 3. Outsourcing your non-core competencies such as information technology specialization will not only allow you to be more efficient but will also allow you to focus on other business processes such as developing and growing your business as well as center on other aspects that your in-house resources actually specialize in. After all, not all organizations and businesses have the internal resources to specialize in niche skills like information technology. 8. Efficient Implementation of New Technology A good outsourced IT service agency in the Philippines will have the resources to start projects immediately. If you were to handle the same project internally may take months to recruit and train competent staff while outsourcing IT to the Philippines will bring instant years of experience and will save you a ton of time and resources on your hands. The global economy is inevitably headed towards globalization and organizations are under pressure to gain some sort of competitive advantage whether it’s cutting costs, being more efficient, or providing a better customer experience. As a business, how would you do so with limited resources? Springboard is a BPO company stationed in the Philippines that not only provides excellent IT services and solutions, but also offers headhunting recruitment services, HR services, executive search, HR consultancy, and lots more. If you own a business or are a leader and major decision-maker in an organization or company, consider checking out Springboard if you’re interested in offshoring information technology or outsourcing services to the Philippines in general. For more info: https://springboard.com.ph/ Share this to company struggling with their hirings! FacebookTwitterGoogle+TumblrPinterest About the Author: Henrico Chan Differences of Staff Leasing and Full Outsourcing Signs You Should Hire an HR Consultant 5 Tips in Choosing the HR Outsourcing Service in the Philippines Find a Topic Staff Leasing 8 Reasons Successful Businesses Use Executive Search Firms 5 Best Reasons to join for a Manpower Agency Springboard Philippines, founded in 2013, is a group of companies based mainly in Metro Manila that focuses on executive search and HR outsourcing solutions for Philippine and international clients. > Human Capital Management Information System > Executive Search and Consultancy > Recruitment Process Outsourcing > Staff Augmentation / Staff Leasing > Outsourced Training and Development Service Partner > Enterprise Resource Planning Solutions > General Manpower Solutions > Springboard Search > Springboard Select > Springboard Snap HR © Copyright All Rights Reserved. Springboard Philippines
cc/2019-30/en_head_0010.json.gz/line2701
__label__cc
0.745981
0.254019
2003 / 03 — March Issue of American Cinematographer Footsteps Worth Following, Witold Sobocinski, PSC receives the ASC International Achievement Award Man Without Fear, Daredevil brings a comic book hero to the big screen Illuminating an Idea, Shedding light on Chuck Barris in Confessions of a Dangerous Mind Forging a Nation, Gods and Generals marches through the Civil War Grace Under Pressure, Coral Reef Adventure plumbs the ocean's depths A Pair of Aces, John Seitz, ASC proved to be an ideal cinematographer for director Billy Wilder 2009 / 07 — July Issue of American Cinematographer 2008 / 10 — October Issue of American Cinematographer 2006 / 07 — July Issue of American Cinematographer 2000 / 08 — August Issue of American Cinematographer 2008 / 09 — September Issue of American Cinematographer 2006 / 11 — November Issue of American Cinematographer 2009 / 06 — June Issue of American Cinematographer 2002 / 05 — May Issue of American Cinematographer
cc/2019-30/en_head_0010.json.gz/line2704
__label__cc
0.566094
0.433906
Eastern Health to Introduce New Groundbreaking Program May 30, 2014 · by Eastern Health · in Leading the Way. · Plans set for introduction of Molecular Imaging Program Eastern Health is getting a new PET… and it’s not the furry kind! Eastern Health has announced its plans to launch a Molecular Imaging Program that will introduce a positron emission tomography/computerized tomography (PET/CT) scanner to this province. A PET/CT scanner, like the one purchased by Eastern Health. Photo courtesy of Phillips Medical. Dr. Peter Hollett, Clinical Chief of Nuclear Medicine at Eastern Health and member of the Molecular Imaging Steering Committee, believes that the introduction of such a program will greatly improve health care in this province. Dr. Peter Hollett, clinical chief of nuclear medicine at Eastern Health. “Operating our own PET/CT scanner within this province provides the people we serve with a better chance at fighting various illnesses and experiencing more positive health outcomes.” A PET/CT scanner is a vital diagnostic tool most commonly used to detect and assess and help determine treatment for a large number of cancers. This technology is also used for the assessment and diagnosis of cardiac disease and some neurological disorders, including dementias such as Alzheimer’s disease and movement disorders such as Parkinson’s disease. “A PET/CT scan would be able to tell a physician whether their patient’s chemotherapy is working far in advance of any other imaging techniques, it will allow physicians to monitor blood flow in the heart more effectively and will provide a means to positively diagnose Alzheimer’s disease from other types of dementia, which is something we could not previously do in this province,” added Peter. Cyclotron to be introduced In conjunction with the PET/CT scanner, Eastern Health will operate a cyclotron, a device used to create medical isotopes. Medical isotopes are used in PET/CT imaging, as well as some other diagnostic imaging procedures currently available through Eastern Health’s Nuclear Medicine Program. Members of Molecular Imaging Steering Committee checking out a Cyclotron. Eastern Health later purchased this same model. “Operating a cyclotron in close proximity to the PET/CT scanner will ensure the stable and timely supply of the medical isotopes needed to carry out the scanning process, which is crucial to providing a reliable and efficient Molecular Imaging Program,” said Peter. As the medical isotope is made up of radioactive material, the regulatory processes for operating a cyclotron are extensive. There are two principal federal regulatory agencies involved – Canadian Nuclear Safety Commission (CSNC) and Health Canada. In addition, there will be numerous safety protocols in place to ensure that the radioactive material does not get released into the environment, including filtration systems within the air release system, lead walls and extensive radiation monitoring. “We have no doubt that the processes outlined by the federal regulatory agencies, matched with the design of the facility and our organization’s commitment to quality and safety, will ensure that this cyclotron is operated safely, so that we can produce the medical isotopes needed to diagnose and treat man diseases,” added Peter. Introducing Dr. Conor McGuire While the program is still in the planning stages Eastern Health has already recruited one physician who will be influential in the development and operation of the Molecular Imaging Program, Dr. Conor McGuire. Dr. McGuire was recruited from the University of Alberta, where he held the position of Medical Director of the Molecular Imaging Program. Dr. McGuire was instrumental in the introduction of the Molecular Imaging Program at the University of Alberta. Dr. Conor McGuire. “I loved my job at the University of Alberta Hospital in Edmonton — it was my dream job, but my heart was always in Newfoundland. My wife, Carolyn, and I are both thrilled to be home with family, friends and our new grandson. I am also thankful to be part of a team that will introduce this state-of-the-art program that will greatly improve the health outcomes of many people in this province,” says Dr. McGuire. Dr. McGuire grew up in Gander and Grand Falls, NL. After completing his first year of medical school at Memorial University, he was paralyzed in a driving accident. His fellow medical students and the local medical community were determined to support him in his recovery from the accident. As a result the first annual Monte Carlo Charity Gala was launched in 1977 to raise money to purchase a wheelchair lift for his family’s van to help Dr. McGuire get back in action. Since its initiation, the Monte Carlo Charity Gala has continued to grow, as the event attracts upwards to 1,000 people annually, raising over $250,000 for Newfoundland and Labrador charities. Dr. McGuire received his Doctor of Medicine in 1981, completed his radiology residency at MUN in 1987 and went on to further specialize in Nuclear Medicine at the University of Western Ontario in London, Ontario. “After my spinal cord injury, I was given the opportunity to continue my vocation in medicine and was encouraged by virtually everybody at the medical school, in particular my fellow students, to do so. I believe that MUN and Newfoundland and Labrador is one of very few places that this could happen. I remain tremendously honored and grateful and am happy to be able to give something back after all these years.” New facility being built A new facility to house the Molecular Imaging Program will be constructed next to the Dr. H. Bliss Murphy Cancer Centre at the Health Sciences Complex. Drawing of the future Molecular Imaging Facility. The tender for the construction of the new Molecular Imaging Facility was awarded to Pomerleau Inc. at a cost of $24,990,000. This facility will see the consolidation of the existing Nuclear Medicine Services within Eastern Health at one site, contain innovative safety features, provide adequate treatment space to run the program, and include infrastructure for future expansion of the Cancer Care Program. The Molecular Imaging Facility is designed to meet the requirements of Leadership in Energy and Environmental Design (LEED) silver level certification. LEED provides a means of anticipating the environmental impact of a building through aspects such as energy consumption and materials used to provide a more environmentally friendly building. Construction work is ongoing to prepare for the new structure. In August 2013, work began to create a new entrance at the emergency department of the Janeway Children’s Health and Rehabilitation Centre. This entrance was created by moving a section of Clinch Crescent between Mosdell and the Elaine Dobbin Centre for Autism further north from its existing location. Pomerleau Inc. will begin constructing the new facility during summer 2014. During the construction of the building, normal construction-related safeguards will be in place; however, due to the scale of the project, the public is asked to proceed with caution and to expect traffic delays on Clinch Crescent throughout the duration of this project. Eastern Health is anticipating that the Molecular Imaging Program will be in full operation by 2016. For more information about the program, please visit the Molecular Imaging Program website or check out the below video. ■ This story was written by Jackie O’Brien, media relations manager with Eastern Health. Tags: Cancer Care, Cardiac Care, change, cyclotron, Dr. H. Bliss Murphy Cancer Centre, health sciences complex, innovation, Molecular Imaging Program, neurology, nuclear medicine, PET/CT, state-of-the-art technology ← Seeking the next adventure – one paramedic’s experience in the field No IFS, AND or BUTTS! → One response to “Eastern Health to Introduce New Groundbreaking Program” UnderpaidOverworked June 7, 2014 at 2:36 pm · · Reply → Great idea. We dont have the staff to facilitate the programs and care we do have NOR the money to pay them, but we’re going to spend 24 MILLION dollars to introduce more facilities we can’t properly staff or pay for. wow
cc/2019-30/en_head_0010.json.gz/line2705
__label__cc
0.677435
0.322565
Oct 15 Not Your Mom’s Horror Movie: Alucarda (1977) TFS Halloween Directed by Juan López Moctezuma, 1977’s Alucarda, is not your mum’s horror movie. Unless your mum is a bit of a freak who loves copious amount of blood, believes the Catholic Church is full of corrupt, evil folks, and thinks nothing of sullying religious objects. In which case, your mum is cool as fuck. Cherish her. Set in the late 1800s, Alucarda (Tina Romero) is a 15-year-old orphan who has lived her entire life in a convent. We come into the story as another orphan, Justine (Susana Kamini), is moving into the convent. The two become fast friends and they get themselves into mischief. Or, as much mischief as two young women can get into in a convent, like frolicking in the forest, cavorting with gypsies, and welcoming demons they release unto the world. You know, the usual stuff. Now, if you haven’t guessed, this convent is a little unusual. Of all the weird shit that goes on, one of the strangest things might be what the nuns are wearing. Instead of wearing a regular habit, these nuns are swathed in what appears to be gauze. Gauze that is covered in blood. What kind of blood? Whose blood is it? Well, you’ll have to watch the movie, but let’s just say that these images of the nuns walking around stained with blood is one that sticks with you. Let me just say a few words about Romero as Alucarda; hers is an absolutely fearless performance. She plays Alucarda with complete and total abandon. She is glorious and when she’s onscreen, you can’t take your eyes off her. It’s a shame she didn’t go on to bigger things because she is terrific. And, boy, am I covetous of her hair. I was trying to think of a way to describe Alucarda as my husband and I rewatched the movie the other day. I came up with, “The movie is like if Jodorowsky got together with Ken Russell and mixed in a bit of Andy Milligan while they were at it.” And if that doesn’t pique your interest, I’m not sure what will. Visually and aurally, you will be assaulted. Alucarda is lurid, loud, and lascivious. There’s a little something in it to offend just about everyone in the best way possible. Director Juan López Moctezuma was a Mexican director with a lot to say about the Catholic Church in Alucarda. When I say a lot, I mean a whole fucking lot. The film is chock full of imagery depicting all sorts of sacrilege. The powers that be in the movie are not shown in a flattering light. They’re oppressors who deserve everything coming to them from the girls. I’m guessing this one isn’t on rotation in the Vatican’s movie selections. Then again, maybe it is. I’m looking at you, Young Pope. If you want to watch something a little different this spooky season, you should absolutely seek out Alucarda. I first saw the movie via the Mondo Macabro DVD. Sadly, the movie has yet to be released on Blu-ray but please don’t let that stop you from watching it. Seeing it in the condition I did just adds to the experience. While I’m at it, if you haven’t explored the world of Mexican horror films, please do. There are some real gems in there just waiting for you to discover. This year’s Fantasia Fest has plenty of films worth checking out and we picked a few to keep an eye on! Six months in and we have 17 reasons why we think it’s been a pretty good year in film, so far. The sounds of Berberian Sound Studio tell the true Giallo story. Harrison creates a primer specifically for those of us that are new to anime and getting ready for Netflix’s streaming of NEON GENESIS EVANGELION! Talk Film Society's Pixar Top 10 Get ready for Toy Story 4 by checking out the TFS staff’s ten favorite Pixar movies. A Love Letter to Booksmart Hannah Holway dives into her love of Booksmart, a timely coming-of-age classic. The Definitive Ranking of the X-Men Franchise Our ranking of the 11 films in Fox Studio’s X-Men franchise. The Problem with The Perfection Callie explores the many problematic aspects of the Netflix horror film. 10 Essential Films from Hindi Cinema, Part 3 Manish selects 10 more films to serve as a primer to Hindi cinema that range from classics to modern hits. Every Single Night, Baby: Quentin Tarantino’s Kill Bill 15 years after the release of the revenge saga, a look back at its maternal melodrama. horror, halloween, alucarda Sarah Jane is originally from Southern California but she's now settled in Austin, TX. She's seen over 5,300 movies in her lifetime. She resides with her husband, their kiddo, and three cats. Her favorite films are Deep Red, Le Samourai, and Miller's Crossing. Follow Sarah on Twitter Oct 15 A Grown Up Ghost Story: The Changeling Oct 14 Breaking from the Slasher Mold: Sleepaway Camp (1983)
cc/2019-30/en_head_0010.json.gz/line2709
__label__cc
0.6312
0.3688
Convertible Note Seed Financings: Econ 101 for Founders Editor’s note: Scott Edward Walker is the founder and CEO of Walker Corporate Law Group, a boutique corporate law firm specializing in the representation of entrepreneurs. Check out his blog or follow him on Twitter as @ScottEdWalker. This is the second part of a three-part primer on convertible note seed financings. Part 1, entitled “Everything You Ever Wanted To Know About Convertible Note Seed Financings (But Were Afraid To Ask),” addressed certain basic questions, such as (i) what is a convertible note? (ii) why are convertible notes issued instead of shares of common or preferred stock? and (iii) what are the advantages of issuing convertible notes? This part will address the economics of a convertible note seed financing and the three key economic terms: (i) the conversion discount, (ii) the conversion valuation cap and (iii) the interest rate. Part 3 will cover certain special issues, such as (i) what happens if the startup is acquired prior to the note’s conversion to equity? and (ii) what happens if the maturity date is reached prior to the note’s conversion to equity? What Is a Conversion Discount? As discussed in part 1, in the context of a seed financing, a convertible note is a loan that typically automatically converts into shares of preferred stock upon the closing of a Series A round of financing. A conversion discount (or “discount”) is a mechanism to reward the noteholders for their investment risk by granting to them the right to convert the amount of the loan, plus interest, at a reduced price (in percentage terms) to the purchase price paid by the Series A investors. In other words, the founders are saying to the investors, in effect, if you take this risk and give us money today, we’ll reward you by giving you “20% off” at our Series A round down the road (20% being the usual discount, as discussed below). For example, if the investors in a $500,000 convertible note seed financing were granted a discount of 20%, and the price per share of the Series A Preferred Stock were $1.00, the noteholders would convert the loan at an effective price (referred to as the “conversion price”) of $0.80 per share and thus receive 625,000 shares ($500,000 divided by $0.80). That’s 125,000 shares more than a Series A investor would receive for its $500,000 investment and a 1.25x return on paper ($625,000 divided by $500,000). (The foregoing example does not include accrued interest on the loan, which is typically about 5%-7% annually, as discussed below.) Discounts generally range from 10% (on the low side) to 35% (on the high side), with the most common being 20%. In Fenwick & West’s 2011 Seed Financing Survey (the “Fenwick Survey”), the percentage of convertible note seed financings that granted a discount to investors was 67% in 2010 and 83% in 2011; and the median discount was 20% in both 2010 and 2011. One of the significant advantages of issuing convertible notes, as opposed to shares of preferred stock, is the extraordinary flexibility they offer in connection with “herding” prospective investors and raising the round. Clearly, a greater discount can be offered to early investors who are assuming more risk, particularly where the startup is closing its financing on a rolling basis over an extended period of time (as is the trend). Moreover, a note can include a discount that increases over time – e.g., (i) 1.5% per month up to 25%; or (ii) 10% if the Series A round closes within 6 months, 15% if it closes between 6 and 12 months, and 20% if it closes after 12 months. In the Fenwick Survey, the percentage of convertible note seed financings that included a discount which increased over time was 25% in 2010 and 5% in 2011. Finally, founders should be aware that investors will sometimes push for the issuance of warrants in lieu of a discount. In a seed round, this makes no sense and only creates more paperwork and, accordingly, higher legal fees. In the Fenwick Survey, the percentage of convertible note seed financings that included the issuance of warrants was 0% in both 2010 and 2011. What is a Conversion Valuation Cap? A conversion valuation cap (or “cap”) is another mechanism to reward the noteholders for their investment risk (and for their efforts in increasing the value of the startup as a result of introductions, advice, etc.). Specifically, a cap is a ceiling on the value of the startup (i.e., a maximum dollar amount) for purposes of determining the conversion price of the note — which (like a discount) thereby permits investors to convert their loan, plus interest, at a lower price than the purchase price paid by the Series A investors. Using the example above, let’s assume the cap were $5 million and the pre-money valuation in the Series A round were $10 million. If the noteholders invested $500,000 and the price per share of the Series A Preferred Stock were $1.00, the noteholders would convert the loan at an effective price of $0.50 per share ($5,000,000 divided by $10,000,000) and thus receive 1,000,000 shares ($500,000 divided by $0.50), which is 500,000 shares more than a Series A investor would receive for its $500,000 investment and a 2x return on paper ($1,000,000 divided by $500,000), not including any accrued interest on the loan. Notice that if there were a 20% discount and no cap, the noteholders would only receive 625,000 shares or a 1.25x return, as noted above. If we bump-up the pre-money valuation to $20 million and the cap remains at $5 million, you can see how the noteholders are rewarded (and protected): Their $500,000 loan now converts at an effective price of $0.25 per share ($5,000,000 divided by $20,000,000) and they would thus receive 2,000,000 shares ($500,000 divided by $0.25), which is 1,500,000 shares more than a Series A investor would receive for its $500,000 investment and a 4x return on paper ($2,000,000 divided by $500,000), not including any accrued interest on the loan. Again, if there were a 20% discount and no cap, the noteholders would only receive 625,000 shares or a 1.25x return. As you can see, noteholders with a 20% discount and no cap would receive 625,000 shares whether the pre-money valuation in the Series A round were $10 million, $20 million or $50 million. This is why sophisticated investors vehemently argue that a note without a cap (i) misaligns the interests of the founders and the investors; and (ii) penalizes investors for their efforts in helping the startup increase its value. The math can be tricky, but the bottom line is that noteholders without a cap do not share in any increase in the value of the startup prior to the Series A round. Accordingly, as discussed in detail in part 1, a cap is akin to a valuation in a priced round (i.e., if the startup were issuing shares of common or preferred stock); however, the beauty of a cap is that it is not a valuation for tax purposes — which facilitates the financing by allowing the founders to grant different caps to different investors. In the Fenwick Survey, the percentage of convertible note seed financings that included a cap was 83% in 2010 and 82% in 2011; and the median valuation cap was $4 million in 2010 and $7.5 million in 2011. How Do the Discount and the Cap Interrelate? If the convertible note includes both a discount and a cap, the applicable language will typically provide that the conversion price will be the lower of (i) the price per share determined by applying the discount to the Series A price per share; and (ii) the price per share determined by dividing the cap by the Series A pre-money valuation. As reflected in the examples above, the reason the conversion price is the “lower of” (not the “higher of”) is because the lower the conversion price, the more shares the noteholders are issued upon conversion. In the first example above where the discount was 20%, the cap was $5 million and the pre-money valuation was $10 million, we saw that the conversion price was (i) $.80 when we applied the discount to the Series A price and (ii) $.50 when we divided the cap by the pre-money valuation. Accordingly, the conversion price would be $.50 (the lower of) for purposes of computing the number of shares issued to the noteholders upon conversion. Now watch what happens if we drop the pre-money valuation to $6 million: Applying the discount, the conversion price, of course, stays the same at $.80; but when we divide $5 million (the cap) by $6 million (the pre-money valuation), we get $.83, which is obviously higher than $.80 — and thus the discount applies, not the cap. This is a bit counter-intuitive because the pre-money valuation exceeds the cap by $1 million. Notice, however, that unless the pre-money valuation were greater than $6,250,000, the cap would not be triggered ($5,000,000 divided by $6,250,000 equals $.80). If this weren’t confusing enough, there is one other complex issue that founders need to be aware of with respect to discounts and caps: the additional liquidation preference that is created. Indeed, this is a particular problem, and could result in a substantial windfall to investors, in a large convertible note financing with a low conversion price. For example, in a $2 million convertible note financing with a 50% discount (or a 50% conversion cap ratio), the noteholders would receive $4 million worth of shares of Series A Preferred Stock upon conversion (not including accrued interest), which would include whatever liquidation preference is attached to the shares (typically 1x). Accordingly, the noteholders would receive an extra $2 million of liquidation preference. There are several different approaches to solving this issue, the most elegant of which is to convert the notes into a different series of preferred stock (e.g., Series A-1), with a liquidation preference per share equal to the conversion price; however, for purposes of this post, it’s enough for founders simply to be aware of this issue and how it relates to discounts and caps. What is the Typical Interest Rate and How Do the Investors Get Paid? The third and final piece of the economics puzzle is the interest rate component. Again, a convertible note is a loan and typically requires the startup to pay simple (not compounded) interest on the amount of the loan. Interest rates on convertible notes have historically been in the range of 7%-10% annually, but recently have dropped to the 5%-7% range. In the Fenwick Survey, the median annual interest rate in convertible note seed financings was 6% in 2010 and 5.5% in 2011. As alluded to in the examples above, the interest is not paid in cash on a periodic basis like a typical loan, but instead accrues (or accumulates), and then the total amount of interest due is added to the loan amount and converted into shares of preferred stock upon the closing of the Series A round. For example, if the interest rate were 5% in a $500,000 convertible note seed financing and the Series A closing occurred on the one-year anniversary of the convertible note closing, the investors would convert an additional $25,000 ($500,000 x .05). Each state has its own laws (called “usury” laws) that limit the maximum interest rate that may be charged on a loan. In California, for example, unless an exemption applies, the maximum annual interest rate for a non-consumer loan is the higher of (i) 10% or (ii) 5%, plus the rate charged by the Federal Reserve Bank of San Francisco on advances to member banks on the 25th day of the month prior to the date of the loan (or, if earlier, the date of the written loan commitment).
cc/2019-30/en_head_0010.json.gz/line2716
__label__wiki
0.602075
0.602075
BlackBerry Announces Colorful QWERTY Q5 with BB10, Aimed at Emerging Markets Since their optimistic launch of the BlackBerry Z10, we haven’t heard much of the Canadian-based company that we all used to know it as RIM. Today, Thorstein Heins took the stage at BlackBerry Live to introduce a modest, but interesting device. Going by the name of Q5, this handset features a classic QWERTY keyboard and a medium-sizes screen of 3.1 inches. The BlackBerry Q5 has a simple and stylish design which will surely be seen appealing by teenagers. Arriving this June in Europe, Middle East, Africa, Asia and Latin America, the Q5 can be interpreted as a cheaper option for the fully featured Q10, a variant bringing high end technical specifications to all physical keyboard lovers. But let’s see what’s so interesting about this newly announced device. BlackBerry Q5 features and magic powers Remarks to official specs and other intrusive details like that were not made public during the official presentation and will most likely be revealed in the following weeks. On the other hand, there was quite a fuss when it came to functionality and features that can be realistically enjoyed by the user. For instance, the phone comes with a chic form that places a 3.1-inch touchscreen above a classic model of BlackBerry keys that have been redesigned to accommodate faster typing, while supplying greater comfort. Available in red, pink, white and black, the Q5 is powered by the latest BlackBerry 10 platform and also integrates a nice range of software-based marvels. As with its more evolved siblings, the BlackBerry Q5 will arrive with the Time Shift Mode and Story Maker functions, which can edit pictures and add them to various social services. Moreover, using BBM’s smart Screen Share function, a normal chat can be instantly transformed into a live video conversation that makes use of the front-facing camera. Speaking of conversations, share and updates, all of these would be available in the BlackBerry Hub section. BlackBerry Q5: aimed at young consumers and business people The phone will be available in the following colors: White, Pink, Red, Black which shows that it’s definitely aimed at the younger segment of the market. We don’t know yet the price, but if it’s going to be around $300-$400 (wild guess), then the Canadian company has a chance of attracting customers with the help of its operating system BlackBerry 10. However, it will be interesting to see how many lovers of the QWERTY are there still in the world. My bet is that, if this device comes with a price below the market standard, then it also might get some love from business people. We live in a period where everybody’s cutting costs, so BlackBerry might have a chance of getting back the love of enterprises with this device. BlackBerry CEO’s Thorsten Heins words on the BlackBerry Q5 smartphone: BlackBerry is excited to bring the new BlackBerry Q5 smartphone to our customers in selected markets around world. The BlackBerry Q5 gives you the best of everything with its cutting-edge BlackBerry 10 functionality and a physical QWERTY keyboard. It is for youthful fans that are passionate, confident and bold, and it makes it easy for them to have fun, create, share and stay connected. To wrap things up, the Q5 is basically a cheaper model that probably sacrifices high-end internal components to bring almost the same end-user functionality to those that do not afford a flagship smartphone, such as the Z10 and Q10. Although called as affordable, the price of this device has yet to surface. Radu Tyrsina contributed to this post Photo Credits:TheVerge Last updated by Alex Serban, on 16-Dec-16 Alex Serban Feature Writer Alex holds an engineering degree in Telecommunications and has been covering technology as a writer since 2009. Customization is his middle name and he doesn’t like to own stock model gadgets. When he’s away from the keyboard, simpler things like hiking, mountain climbing and having a cold drink make his day.
cc/2019-30/en_head_0010.json.gz/line2717
__label__wiki
0.560173
0.560173
Home » World » Not backing down in quest for immigration figures: Trump Not backing down in quest for immigration figures: Trump Previously, the White House had fought to include a question on citizenship in the 2020 census, which was subsequently blocked by the Supreme Court, Xinhua news agency reported Donald Trump (file photo) Washington: US President Donald Trump has announced that his administration was “not backing down” in the fight to know how many citizens and non-citizens were in America, at a time when the country is increasingly divided over the immigration issue. Previously, the White House had fought to include a question on citizenship in the 2020 census, which was subsequently blocked by the Supreme Court, Xinhua news agency reported. In the days before Trump’s Thursday’s announcement, rumours swirled in the press that Trump would fight the Supreme Court’s decision. In a speech at the White House, Trump said due to litigation and opposition, the US administration would not push for the inclusion of the question in the decennial census. However, he issued an executive order to have every government department collect data on how many citizens and non-citizens are living inside the US. The departments would then have to hand over all information to the US Department of Commerce. By issuing his executive order, Trump effectively circumvented the Supreme Court to find an alternative way to find out how many illegal migrants are living in the US, instead of challenging the decision of the nation’s highest court. “We will defend the right of the American people to know” how many citizens are in the US, which is “vital” to forming policy, the President said. We must know “how many illegal aliens” are in the United States, he said. “We’re aiming to count everyone”, he added. Trump’s executive order came at a time when the immigration issue is of crucial importance to his base. Many Trump supporters believe illegal migrants take working class jobs, depress wages, and bring drugs and crime over the border. Democrats had pushed against including the citizenship question in the census, with House leader Nancy Pelosi saying Democrats would challenge the White House if it tried to include the citizenship question. Before Thursday’s decision, experts argued that many immigrants would not likely answer such a question, and that could reduce population counts in the census that are utilized to figure out how many seats in Congress each state is given. Counts from the census, which also include those living in the US illegally, are used to determine how many seats to allocate in the House of Representatives. The Census Bureau has said requiring citizenship data would make illegal migrants not want to participate in the census. That would shift power and funds away from Democrat-headed cities with large populations of immigrants. A study by Yale University from last year found that there may be as many as twice the number of migrants living illegally in the US as previously thought — the number could be as high as 22 million. Most are of Latin American origin. Controversy about the citizenship question was fuelled by the emergence of evidence that findings from a now-dead Republican expert on legislative redistricting had a major impact on the administration’s policy deliberations, Efe news reported. The study by Thomas Hofeller was among some 75,000 documents found on a computer hard drive obtained by the American Civil Liberties Union. Using “citizen voting age” population as the redistricting population base would be “advantageous to Republicans and Non-Hispanic Whites”, Hofeller wrote. The hard drive was discovered by the expert’s daughter, Stephanie Hofeller Lizon, after his death in August 2018. The Washington Post reported that Lizon also found documents that Hofeller shared his conclusions with Christa Jones, chief of staff to Census Bureau director Steven Dillingham. Trump administration officials denied having been influenced by Hofeller’s work.
cc/2019-30/en_head_0010.json.gz/line2719
__label__cc
0.612156
0.387844
Archives for posts with tag: Animal Welfare Action Plan The Victorian Farmers Federation (VFF) describes itself as “an active, powerful lobby group dedicated to the interests of farmers and making a difference to communities”. On 5th January 2018, the organisation issued a statement in which it said it had “slammed” key aspects of the Victorian state government’s recently released animal welfare action plan. In what he described as a “stern warning to government”, president David Jochinke condemned the proposal to introduce the concept of sentience to animal welfare legislation. In its action plan, the government had described “sentience” as the notion that animals “experience feelings and emotions such as pleasure, comfort, discomfort, fear and pain”. Similarly, the Oxford dictionary defines the adjective “sentient” as “able to perceive or feel things“. The government’s examples of pleasure and fear are psychological in nature, while comfort, discomfort and pain can be psychological and physical. In condemning the government’s proposal, was Jochinke implying that animals do not experience physical and psychological pain? Alternatively, was he implying that any pain they may experience does not matter? Jochinke claimed the proposal would “introduce language into law that can be manipulated by animal extremists for their own purposes”. It is easy to brand people as “extremists” when they act on the belief that animals have a right to live without being exploited by farmers and others. Are those farmers not extreme when they harm animals? At the present time (as referred to in more detail below), they are permitted to perform acts that would be illegal if they involved a companion animal such as a dog or cat. The “purposes” of so-called “animal extremists” generally involve protecting the interests of animals, unlike the profit motive, at animals’ expense, of most farmers. Cartesian scientists and farmers The term “Cartesian scientists” stems from the seventeenth century philosopher René Descartes, who argued that only humans have minds and therefore the ability to think. His followers took the argument to also mean that animals cannot feel. In his book “Animals like us”, author Mark Rowlands wrote: “If you were an animal in the seventeenth or eighteenth centuries, then one of the things you should have made a point of avoiding would be Cartesian scientists. If not, then, you could expect to find yourself nailed to a vivisection board, being slowly cut open. You would be conscious throughout. The Cartesian scientists did not take any steps to prevent your suffering or pain for one very simple reason: they did not believe you were capable of suffering or feeling pain.” Like most of us, VFF and its members may be horrified by the actions of Cartesians, as described by Rowlands. However, routine actions of farmers at the current time, with the full support of the law, are also deplorable. Such actions are currently permitted by means of exemptions to the erroneously titled “Prevention of Cruelty to Animals Act”. As I have stated elsewhere, the government continues to outrageously claim the exemptions do not permit cruelty to occur when, by their nature, they do. Here are a few examples (generally performed without pain prevention or relief): hot-iron branding; tail docking; ear notching; teeth clipping; castration; dehorning; removal of toe segments; lifelong confinement indoors (often in cages); forced separation of mothers and babies; and forced breeding, often involving stimulation by humans, penetration with artificial devices, and ongoing confinement. A key concern for farmers In an article written for Stock and Land, VFF livestock president, Leonard Vallance, stated: “The introduction of sentience into law will only provide a platform for the argument against the existence of farm animal production systems as has been exposed by extremists in Europe.” If Vallance is seeking to indicate that horrific routine practices only occur overseas, then his claim is not valid. Such practices have been extensively exposed in Australia, with a prominent example being the Aussie Farms website. Vallance’s concerns about a platform for arguments against farm animal production systems may be well founded. Legislation that acknowledged sentience and was claimed by its authors to promote care and respect of animals, while also allowing acts of cruelty, could be regarded as callous and contradictory. There is no indication in the government’s action plan that it intends removing legislative exemptions. Indeed, the plan appears to strongly support the livestock sector. Even where standards or codes of practice stipulate protective practices, they are often vague and therefore easy to overlook. For example, the Australian Animal Welfare Standards and Guidelines for Sheep specify that “sheep and lambs should be provided with adequate shelter”. They go on to say that, in the absence of natural protection, “consideration should be given” to the provision of shade, windbreaks or sheds. Farmers may briefly consider such measures, without necessarily doing anything about them. It was estimated in 2012 that around 15 million lambs die each year in Australia within 48 hours of birth due to inadequate protection in bitterly cold conditions. VFF vice president creates a new word The VFF’s vice president, Brett Hosking, recently released a video on Twitter, expressing concern over the government’s action plan. In it, he appears to have created a new word, “sentenance”. He used it or “sentinent” four times, presumably intending to mean “sentience” and “sentient”. Hosking only referred to the psychological aspects, failing to acknowledge the physical component. (He used words such as “emotions”, “thoughts”, “happy”, “sad”, “nervous”, “anxious”, “scared”, “afraid” and “excited”.) As indicated by these comments, he is not convinced that any animals are “sentinent”: “Whether animals are ‘sentinent’ or not, I’m not really sure. I like to think that when my dog runs up to see me in the morning that he’s running up because he wants to hang out with me because I’m a fun fellow, but it could be just instinct because he’s used to, you know, [he] knows that things are all right when I’m around.” He also reiterated a point made by VFF in its statement, by arguing that using the word “sentinent” in legislation would mean, “what we’re kind of saying is that animal welfare depends on the animal, not on the person doing it.” The VFF’s statement argued: “Animal welfare law is about addressing human behaviour towards animals, not addressing animals”. Leonard Vallance made a similar point in his article. In his video, Hosking went on to say: “It’s kind of like saying that if the animal doesn’t get sad or upset, then it’s all right to be cruel to them, and that doesn’t really rest easy with me. [It’s a] little bit like saying it’s okay to discriminate against someone as long as they don’t realise it’s happened.” That is a fallacious argument, in that it fails to acknowledge the fact that all animals farmed by VFF members are sentient. Hosking and VFF seemingly fail to accept that the existence of animal sentience, and the need to prevent cruel practices, are inextricably linked. Here’s the tweet: Animal welfare is really important to our farmers – let’s get it right! @VicFarmers @vff_livestock @farmer_dj @Adam_Jenkins2 @VFF_UDV pic.twitter.com/6MURF0SR7Q — Brett Hosking (@HoskingBrett) January 17, 2018 With the Victorian government failing to indicate it will remove legislative exemptions in favour of the livestock sector, along with the VFF’s attitude toward sentience, what chance do “production” animals have of avoiding cruelty? The most effective way to minimise cruelty in food consumption is to avoid animal-based products. We have a choice, and should use it for the benefit of those who have none. Paul Mahony Victorian Farmers Federation, “About us”, https://www.vff.org.au/vff/The_VFF/AboutUs/vff/About_Us/About_Us.aspx?hkey=d1685f71-c8b5-43ae-b571-a2594d327d9d (accessed 22 Jan 2018) Victorian Farmers Federation, “Farmers condemn unnecessary animal welfare legislation”, 5 January 2018, https://www.vff.org.au/vff/Media_Centre/Media2018/Farmers_condemn_unnecessary_animal_welfare_regulation.aspx Agriculture Victoria, Animal Welfare Action Plan, Jan 2018, http://agriculture.vic.gov.au/agriculture/animal-health-and-welfare/animal-welfare/animal-welfare-action-plan Rowlands, M., “Animals like us”, Verso Books, London, 2002 (p. 3) Agriculture Victoria, “Prevention of Cruelty to Animals Legislation”, http://agriculture.vic.gov.au/agriculture/animal-health-and-welfare/animal-welfare/animal-welfare-legislation/prevention-of-cruelty-to-animals-legislation (accessed 23 Jan 2018) Victorian Farmers Federation, “Livestock Group”, https://www.vff.org.au/vff/Industries/Livestock/Industry_Structure/vff/Industry_Groups/Livestock/Industry_Structure.aspx?hkey=ffb4d11e-ed46-4217-8a21-426c01a08e2a (accessed 22 Jan 2018) Vallance, L., “Farmers care about the welfare of animals”, Stock and Land, 11 Jan 2018, http://www.stockandland.com.au/story/5160138/farmers-care-about-the-welfare-of-animals/?cs=4587 The Aussie Farms Repository, http://www.aussiefarms.com.au/ (accessed 23 Jan 2018) Australian Animal Welfare Standards and Guidelines: Sheep, http://www.animalwelfarestandards.net.au/sheep/ Neales, S., “End to the silence about 15 million dead lambs”, The Australian, 3 Sep 2012, http://www.theaustralian.com.au/news/nation/end-to-the-silence-about-15-million-dead-lambs/news-story/dcfd08eddf63e33380a5f26004c596bf (This reference relates to the main image, as referred to below.) Victorian Farmers Federation, “Board of Directors”, https://www.vff.org.au/vff/The_VFF/Board_of_Directors/vff/About_Us/Profiles.aspx?hkey=ade72ab8-85f4-4c59-8572-e8cc5827c671 (accessed 22 Jan 2018) Hosking, B., Twitter @HoskingBrett, 17 Jan 2018, https://twitter.com/HoskingBrett/status/953428962943819776 Melbourne Sheep Save Tags agriculture victoria, animal agriculture, animal cruelty, Animal Rights, Animal Welfare Action Plan, Factory farming, Free range, jaala pulford, livestock, sentient, Victorian Farmers Federation Categories animal cruelty, Animal Rights
cc/2019-30/en_head_0010.json.gz/line2722
__label__cc
0.705025
0.294975
Before Turning Earth was born... March 3, 2016 Tallie Maughan The pottery studio at Stanford university. This picture was the background image on my computer for 5 years. People often ask about the story behind Turning Earth. It happened again today so I thought that this time I'd share my answer with you. I grew up around ceramics. My mother is a self-taught potter, a jack-of-all-trades kind of an artist who dabbles in everything. We had a wheel in our sitting room and a kiln in our conservatory. However, I wasn't all that interested. I associated clay with 'pottery class', the course my mum taught for children using the studio in the local comprehensive on a Saturday morning, which meant I had to get out of bed early at the weekend and so felt like drudgery. Then, after working hard at university thinking I wanted to be a poet, and then an academic, I found myself in the corporate world as a sustainability consultant. I was bored out of my mind and disillusioned. I decided to take a course in pottery at Hackney Community College, because I wanted to do something more directly creative. I picked up the clay and got on the wheel and I had one of those memorable, life-changing moments of clarity. I felt like I'd been alive for a thousand years, as if I had been throwing pots for lifetime after lifetime. It was the first of many visionary experiences I've had in a ceramics studio. Soon after, I quit the job and moved to California and briefly married an unknown novelist who couldn't get published. We had a romantic summer while he was retraining in journalism at Stanford University. They had an open-access pottery studio for all their students - and it wasn't even used by the art department. People who were studying as engineers, who have since been snapped up by Google, mathematicians, very mentally creative people, all used the studio as a way to create balance in their lives. Their level of skill was amazing - in my opinion, it wasn't paralleled by people coming out of masters courses in the UK. And this was just a hobby. Part of me wanted to be a potter, but I had another big part of my personality that wanted to do something organisational. I didn't want to have to choose. I felt angry that the UK seemed to offer only two choices - either do evening classes and dabble but don't really get into it, or quit your job and do a three-year degree. It seemed to me (and still does) that I didn't want to either be an artist or not be one. I didn't want to choose; I wanted to do both. I wanted a hobby studio that was good enough that I could turn pro if I wanted to. One day, on the Stanford Campus, throwing a set of plates on the shores of a dried up lake, under the California sun and surrounded by agapanthus and hummingbirds, I had the idea for Turning Earth. It came out of my own moment of perfect happiness. I then went on a tour of the US, working as a theatre manager, and was able to try out ten different studios in five different States. I studied each of them and stored up the best elements for Turning Earth. One in particular, Mudfire in Atlanta, Georgia, gave us the membership model that makes everything work. Long story short, the novelist became a New York Times bestseller, and I - inspired - moved back to the UK and started looking for a place to set up. It took about a year. I started reaching out to other people who wanted the place to exist as much as I did and built a community around it. We crowdfunded the studio and sold places in advance. And now there are hundreds of people that use the studio every week, many of whom graduate to becoming full-time professionals without having to take the college route. Many others just use the place for therapy. Since we opened, the vision of what is possible at Turning Earth has continued to grow. It feels as if we are still at the beginning. ← Building BloQs, the makerspace movement, and an introduction to OWL.Turning Earth featured in Ceramic Review! →
cc/2019-30/en_head_0010.json.gz/line2731
__label__wiki
0.955235
0.955235
Joe Tidy - Biography and Images Joe Tidy is a reporter for Sky News Joe graduated from Loughborough University with an English degree and worked for a year as Multi-Media Editor for Loughborough Students’ Union on the student TV, Radio and Magazine. His first job was with BBC South Today where he freelanced for almost a year as a newsroom Broadcast Journalist from July 2009. At the time he also freelanced as a researcher for Five News. In November 2009 he moved to CBBC Newsround as the weekend presenter before going full-time with the programme in October 2011 with the move to Media City in Salford. Between South Today and Newsround, Joe worked at BBC Oxford reporting, VJing, presenting and item producing. Joe joined Sky News in October 2013. Joe Tidy on Twitter: @JoeTidy Biography & Images • Sky News Reporters Rowland Manthorpe: Biography and Images Rowland Manthorpe is Technology Correspondent for Sky News He joined Sky in August 2018 from WIRED UK, where he served as Associate Editor from October 2015, and Senior Editor from January 2018. Rowland started out as a freelance writer for… Read more Martha Kelner: Biography and Images Martha Kelner is a Sport Correspondent for Sky News Martha joined Sky News in November 2018 and is a former Guardian Chief Sport Reporter. She was named Sports Journalist of the Year at this year’s Society of Editors Press Awards…. Read more Deborah Haynes: Biography and Images Deborah Haynes is Foreign Affairs Editor at Sky News. She is best known for her work as defence editor for The Times as well as documenting the dangers Iraqi interpreters have faced since British troops withdrew from Iraq. Haynes graduated… Read more
cc/2019-30/en_head_0010.json.gz/line2733
__label__cc
0.594782
0.405218
Tyne Tees celebrates 60 years on air Updated: Tuesday 15 January 2019 Tyne Tees – the ITV television franchise for North East England – is celebrating 60 years on air today. It launched on 15 January 1959 from studios at a converted warehouse in City Road, Newcastle upon Tyne, remaining in the city until July 2005 when Tyne Tees moved to smaller studios in Gateshead. A look back on 60 years of Tyne Tees was shown on tonight’s news programme, which you can watch below: https://tvnewsroom.org/wp-content/uploads/2019/01/ITV-Tyne-Tees-60-years-Part-1.mp4 News • ITV News Nina Hossain named as lead presenter for ITV’s Lunchtime News ITV News has appointed Nina Hossain as lead presenter for ITV’s Lunchtime News. Nina, who has won the RTS Nations and Regions Presenter award for the past two years, is currently the main presenter for ITV News London and is… Read more Lucy Meacock celebrates 30 years at Granada Reports Regional news presenter Lucy Meacock celebrates 30 years at Granada Reports today. Meacock has been the lead female presenter on the news bulletin since 1988 where she has won 2 Baftas. One for coverage of the Hillsborough disaster. Lucy’s career… Read more Peston loses microphone during live report
cc/2019-30/en_head_0010.json.gz/line2734
__label__wiki
0.999436
0.999436
2018 World Snooker Championship – Live TV Coverage on BBC & Eurosport Updated: Saturday 21 April 2018 The 2018 World Snooker Championship takes place from Saturday 21 April to Monday 7 May at the Crucible Theatre in Sheffield, England. It will be the twentieth and final ranking event of the 2017/2018 season, where Mark Selby is a two-time defending champion, having defended his 2016 title with an 18–15 win against John Higgins in the 2017 final. The tournament will be broadcast live by the BBC and Eurosport. Hazel Irvine and Jason Mohammad will be joined throughout the tournament by Steve Davis, John Parrott, Stephen Hendry, Peter Ebdon, Dennis Taylor, John Virgo, Ken Doherty, and Alan McManus. BBC TV Schedule Saturday, 21 April 13:45-16:35, BBC One 10:00-14:00 & 19:00-20:00 (Not BBC Two Scotland and NI), BBC Two 10:00-13:00, 16:30-18:00 & 19:00-23:00, BBC Red Button Tables One & Two, 10:00-14:00; 14:30-18:30; 19:00-23:00, BBC iPlayer, Connected TV and online Highlights, 00:05-00:55, BBC Two Extra, 00:55-02:55, BBC Two Replays, 13:00-14:30 & 18:00-19:00, BBC Red Button Sunday, 22 April 10:00-12:15 & 14:30-18:00, BBC Two Highlights, 23:25-00:15, BBC Two BBC2 NI (00:35-01:25, BBC Two NI) Extra, 00:15-02:15, BBC Two (01:25-02:15, BBC Two NI) Monday, 23 April Highlights, 23:15-00:05, BBC Two (00:05-02:05, BBC Two Wales; 23:45-00:35, BBC Two NI) Extra, 00:05-02:05, BBC Two (00:55-02:05, BBC Two Wales; 00:35-02:05, BBC Two NI) Extra (repeat), 04:25-06:20, BBC Red Button Tuesday, 24 April Highlights (repeat), 06:20-07:10 & 09:10-10:00, BBC Red Button Extra (repeats), 04:25-06:20, 07:10-09:10, BBC Red Button Wednesday, 25 April Highlights, 23:15-00:05, BBC Two (23:45-00:35, BBC Two Scotland) Highlights (repeat) 06:20-07:10 & 09:10-10:00, BBC Red Button Extra, 00:05-02:05, BBC Two (00:35-02:05, BBC Two Scotland) 13:00-18:00, BBC Two 13:00-18:00 & 19:00-23:00, BBC Red Button Tables One & Two, 13:00-18:00 & 19:00-23:00, BBC iPlayer, Connected TV and online Highlights, 23:15-00:05, BBC Two (23:45-00:35, BBC Two NI) Highlights (repeat), 06:20-07:10, 09:10-10:00 & 12:10-13:00, BBC Red Button Extra (repeats) 04:35-06:35, 07:25-09:20 & 10:10-12:10, BBC Red Button Replays, 18:00-19:00, BBC Red Button Highlights, repeats, 06:20-07:10 & 09:10-10:00, BBC Red Button Extra (repeats) 04:25-06:20, 07:10-09:10, BBC Red Button 10:00-12:00, 16:30-17:30 & 19:00-20:00, BBC Two Highlights (repeats) 06:20-07:10 & 09:10-10:00, BBC Red Button Highlights (repeats), 06:20-07:10 & 09:10-10:00, BBC Red Button Tables One & Two, 13:00-18:00; 19:00-23:00, BBC iPlayer, Connected TV and online Highlights (repeats), 06:35-07:25, 09:20-10:10 & 12:10-13:00, BBC Red Button Extra (repeats), 04:35-06:35, 07:25-09:20, 10:10-12:10, BBC Red Button Tuesday, 1 May Tables One & Two, 10:00-14:00, 14:30-18:00; 19:00-23:00, BBC iPlayer, Connected TV and online Wednesday, 2 May Thursday, 3 May 19:00-23:00, BBC Red Button Table One, 13:00-18:00, BBC iPlayer, Connected TV and online Highlights (repeats) 06:30-07:20, 09:20-10:10 & 12:10-13:00, BBC Red Button Friday, 4 May 10:00-12:00, 13:00-15:00, 16:30-18:00 & 19:00-21:00, BBC Two 16:00-18:00, 21:00-23:00, BBC Red Button Table One, 10:00-12:00; 13:00-18:00; 19:00-23:00, BBC iPlayer, Connected TV and online Table One, 10:00-18:00; 19:30-22:00, BBC iPlayer, Connected TV and online Sunday, 6 May Final – 14:00-17:30 & 19:00-23:00, BBC Two Monday, 7 May Sports Coverage • BBC Sport - Eurosport - Snooker BBC secures exclusive rights to UEFA Women’s Euro 2021 The BBC has secured exclusive rights to UEFA Women’s Euro 2021. The corporation will bring extensive coverage of every game from grounds throughout England across TV, radio and online. The announcement follows on from the BBC’s coverage of the record-breaking… Read more USA v Netherlands – FIFA Women’s World Cup Final 2019 – Live TV Coverage on BBC The BBC will broadcast the Women’s World Cup final this afternoon as USA take on the Netherlands at Stade de Lyon in France. The Americans gained revenge for a penalty-shootout loss at the hands of Japan in the 2011 final… Read more England v Sweden – Women’s World Cup 2019 – Live TV Coverage on BBC One The BBC will broadcast the third-place play-off in Women’s World Cup 2019 this afternoon. The match, between England and Sweden, takes place at the Stade de Nice in France. England are aiming to bounce back from the disappointment of narrowly… Read more
cc/2019-30/en_head_0010.json.gz/line2735
__label__cc
0.544818
0.455182
« Back to article Health/Fitness » Health 4 Undiscussed Side Effects of Sleep Apnea It's estimated that 22 million Americans have sleep apnea, and that 80 percent of moderate to severe cases are undiagnosed. Also known as Obstructive Sleep Apnea Syndrome (OSAS), the condition affects between 5 and 20 percent of adults and 10-20 percent of children. While many are familiar with some side effects — loud snoring, disturbed sleep, and daytime sleepiness — other related issues are talked about less, but can be quite severe. "The disruption of nasal breathing can affect digestion, brain function, mood, attention, growth, heart health, head pain, metabolism and much more," says Dr. Edmund Lipskis, director of the Centre For Integrative Orthodontics and co-author with his wife, Dr. Lynn Lipskis, of Breathe, Sleep, Live, Smile: Integrative Treatments for TMJ/TMD, Sleep Apnea, Orthodontics. "But sleep apnea in children can be treated at a young age. The symptoms include irritability, lack of concentration, poor school performance, pseudo ADHD, and nighttime bed wetting." Obstructive sleep apnea occurs when a blocked airway prevents the body from getting the oxygen it needs. Breathing can stop for several seconds numerous times during the night. "This causes the brain to wake up so the sleeper can breathe," Dr. Lipskis says. "People with OSA usually don't remember every instance of waking up, but the result is fragmented sleep." Dr. Lynn Lipskis adds that proper diagnosis, combined with advanced technology, can lead to successful treatment. She says there are more than 100 FDA-approved appliances for treating sleep apnea and proper selection is key to addressing the individual's special needs. "For adults, that can mean therapy using an oral appliance," she says. "For children, it can mean orthopedic orthodontics for airway development and correction." The Lipskis team points out four of the less-discussed but serious side effects of sleep apnea: Depression is linked with OSA and works both ways. "That is, people who are depressed are more likely to develop OSA, and people with OSA are more likely to develop depression," Dr. Lynn Lipskis says. "One study found that slightly less than half of people with OSA showed depressive symptoms. This is not so surprising, considering that restful sleep is so important for physical and mental health." As with depression, chronic pain may be a cause of, or may be caused by, OSA. A study found that over half the people with OSA had chronic widespread pain and that the risk was higher in women than in men. Hormone Disruption Sleep is a critical time for the body to regulate hormones. "An important one to note is the growth hormone HGH, which is produced during Stage 3 sleep," Lipskis says. "It helps with cell reproduction, cell regeneration, and metabolism. If Stage III sleep is cut short, or never reached, HGH can't perform its job. So rather than repairing itself during sleep, the body continues to break down." This is the frequent need to urinate at night. "People with OSA are more likely to get up in the middle of the night to go to the bathroom," Dr. Edmund Lipskis says. "That's because it affects the release of antidiuretic hormone (ADH), which prevents fluid from filling the bladder and prevents the need to urinate during the night. When ADH can't do what it's supposed to, the bladder fills and the urge to urinate appears. This is yet another way that OSA disturbs proper bodily functions and compounds disordered sleep." "If you suffer from OSA or suspect you do, have a sleep study done, which includes a diagnosis by a medical physician," Dr. Lynn Lipskis says. "This is the only way to correctly diagnose OSA or other sleep disorders. OSA should be treated as a serious medical condition because the consequences go far beyond daytime fatigue." Add your comment here: Comments on Facebook Popular Stories in Health/Fitness 9 Summer Fitness and Fashion Essentials Virginia Man Donates Kidney to Protest Gay Blood Donation Restrictions Ask the Doc :: The Sadly Lacking Research on Same Sex Intimacy In this edition of Ask a Doc, sexual health expert and physician in residence at Roman Health Dr. Michael Reitano shines the spotlight on how sexual health studies handle erectile dysfunction in same sex relationships-emphasis on relationships.
cc/2019-30/en_head_0010.json.gz/line2736
__label__wiki
0.699386
0.699386
You are here: Home » Community, Planning » Plans for five new homes on greenfield site in Blackboys Thursday, May 18, 2017 | Last updated 8 minutes ago Plans for five new homes on greenfield site in Blackboys Plans have been submitted to build five detached homes on land next to the recreation ground in Blackboys. This Google map shows land, which could be developed with five detached homes, to the north west of the piece of land marked Blackboys Cricket Club. It has a green hedge boundary. An application before Wealden Council includes access, landscaping and other associated infrastructure. Twenty parking spaces would be provided. Two for each property within double garages and two on each driveway. Pre-application discussions Documents say informal pre-application discussions held with the council in January confirmed the proposal was acceptable in principle. The land is between Highlands and the Blackboys Recreation Ground on the south side of the B2102. It is a greenfield, generally flat, site of about one-and-a-half acres in open countryside outside any development boundary and outside the High Weald Area of Outstanding Natural Beauty. The land which currently serves as a paddock is described as “redundant”. A design and access statement says the homes would be sustainably located adjacent to the core area for Blackboys, about 320 metres from the primary school and about 500 metres from the Blackboys Inn. A church is 720 metres from the site and The Grove Farmhouse Cafe is about 1,000 metres away. It is suggested the new homes be arranged in a “broadly circular fashion” around the site. Three fronting highway The statement says: “The three dwellings fronting the highway would be set back from the road at a distance of approximately 13m. This is in keeping with the surrounding residential properties with frontages on the north side of the B2102. “Two further dwellings sit behind the dwellings adjacent to the highway to the rear of the site. This is not dissimilar to the development pattern found in between John Dann Close and School Lane. A new access would be created on the “off-centre to the eastern side of the site”. The statement says Blackboys is identified as an area potentially capable of accommodating a “modest additional growth” during the next plan period. It concludes that substantial support is given to the proposal by the Government’s desire to “boost significantly the supply of housing” and this is particularly important given the current five-year housing land supply shortage in Wealden. Uckfield Line passengers brace for more misery Holy Cross goes to town in celebrating ‘Good’ Ofsted rating China, Japan, Vietnam – top holiday choices for Uckfield travellers
cc/2019-30/en_head_0010.json.gz/line2738
__label__wiki
0.828721
0.828721
2 Chainz is the stage name of Atlanta rapper Tauheed Epps, once known as Tity Boi in the Atlanta-based Playaz Circle. Epps launched a successful solo career in 2010, and began issuing a parade of Top 40 hits while becoming the go-to artist for guest verses. His breakout year was 2012, when he landed on Kanye West's "Mercy" and Nicki Minaj's "Beez in the Trap" before dropping his official debut, Based on a T.R.U. Story, for Def Jam. With three platinum hits — "No Lie" featuring Drake, "Birthday Song" featuring Kanye West, and "I'm Different" — the album hit number one on the Billboard 200, and easily reached platinum status. Born and raised in College Park, Georgia, he first went solo in 2007 with the mixtape Me Against the World. The 2Pac references continued with his 2009 mixtapes Trap-A-Velli and All Ice on Me, but 2010's Me Against the World 2: Codeine Withdrawal hit his style on the nose with the last bit of its title, and when DJ Teknikz and DJ Frank White collected his best street tracks in 2011, the hard and hazy set of cuts was dubbed the Codeine Cowboy mixtape. That same year he was featured on David Banner's "Yao Ming" and Big K.R.I.T.'s "Money on the Floor." The year 2012 was major for 2 Chainz. He featured on Kanye West's "Mercy" and Nicki Minaj's "Beez in the Trap," then released his official debut, Based on a T.R.U. Story, for Def Jam. The album featured three hits ("No Lie" featuring Drake, "Birthday Song" featuring Kanye West, and "I'm Different") and hit number one on the album charts, reaching platinum status. Other guests included Lil Wayne, Nicki Minaj, and Mike Posner, while production was handled by the likes of the-Dream and Drumma Boy. Following later announcements that 2 Chainz had been working on new material with Pharrell Williams and Drake, a sequel, B.O.A.T.S. II: Me Time, arrived in September 2013. The album featured the hits "Feds Watching" and "Where U Been." 2 Chainz was also heard on singles from B.o.B ("Headband"), Major Lazer ("Bubble Butt"), and Juicy J ("Bandz a Make Her Dance") that year. In 2016, after additional featured appearances, he released "Feel Like Cappin'" along with the album ColleGrove, a collaboration with Lil Wayne, although only 2 Chainz was credited due to label issues. By the end of the busy year, he had dropped a handful of additional mixtapes and debuted the Drake-assisted single "Big Amount." Led by the hit "Good Drank," featuring Quavo and Gucci Mane, Pretty Girls Like Trap Music, his fourth proper album for Def Jam, arrived in 2017. The album peaked at number two on the Billboard 200 and topped the R&B and Hip-Hop charts. 2 Chainz followed with appearances on tracks by Steve Aoki ("Without U"), Jeezy ("Floor Seats"), Eminem ("Chloraseptic [Remix]"), and Migos ("Too Playa"). In early 2018, he issued his fourth EP, The Play Don't Care Who Makes It (Def Jam), featuring appearances by YG and Offset. Early 2019 saw 2 Chainz team up with Ariana Grande for the single "Rule the World", which appeared on the full-length Rap or Go to the League, which arrived later that March. ~ David Jeffries 2 ChainzAriana Grande Rap Or Go To The League Kanye WestGucci ManeBig Sean2 ChainzTravis ScottYo GottiQuavoDesiigner Money In The Way Threat 2 Society TRU, Vol. 1+ Tyti Boi Daniel Son Necklace Don, Vol. 2 Pretty Girls Like Trap Music Hibachi For Lunch Felt Like Cappin COLLEGROVE Trapavelli Tre' Tru Life Dope Peddler 2 B.O.A.T.S. II #METIME (Deluxe) B.O.A.T.S. II #METIME Based On A T.R.U. Story (Chopped Not Slopped) Based On A T.R.U. Story Hot Wings Are A Girl’s Best Friend OSBS Bigger Than You The Play Don’t Care Who Makes It 2nd To None Wake Up & Cook Up Zaytoven Gang Up Olha A Explosão (Remix) Mc Kevinho MFN Right (Remix) Good Drank 2.0 BFF (Remix) [feat. Jeezy] - Single Freebase Real Live Pro (feat. 2 Chainz) A-Mafia Composer, Lyricist YG2 ChainzBig SeanNicki Minaj 2 Dollar Bill 2 ChainzLil WayneE-40 A Conversation with Elliott Wilson & 2 Chainz CRWN2 Chainz Kill 'Em With Success EearzScHoolboy Q2 ChainzMike Will Made-It Girl's Best Friend 2 ChainzTy Dolla $ign 2 ChainzDrakeQuavo Dreezy2 Chainz 2 ChainzYGOffset Lil JonOffset2 Chainz 2 ChainzTravis Scott Door Swangin Sleep When U Die Trap Check 2 ChainzMigos Car Test2 Chainz It's A Vibe 2 ChainzTy Dolla $ignTrey SongzJhené Aiko
cc/2019-30/en_head_0010.json.gz/line2739
__label__cc
0.592929
0.407071
No Boys Allowed? Engaging Men in Women’s Leadership Development Initiatives March 22, 2018 Taryn Oesch, CPTM5 min read “This is a man’s world,” sang James Brown in 1966. “But it wouldn’t be nothing, nothing, without a woman or a girl.” In 2018, while the leadership gender gap tells us that, in some ways, it’s still a man’s world, it’s also still true that both men and women are needed for success. And while there are many possible causes and solutions to the gender gap, learning and development holds at least one key to its extinction. And it will take both men and women to get there. The Business Case for Gender Diversity The first step is making a business case for women’s leadership development. In their 2017 “Women in the Workplace” report, LeanIn.org and McKinsey & Co. found that when “men believe their organizations prioritize gender diversity because it leads to better business results, they are significantly more likely to think it matters. In the same vein, when men think companies prioritize gender diversity because it is ‘fair to all people,’ they are more likely to be personally committed.” The report concluded from these findings, “Companies need to better communicate that gender diversity efforts are not a zero sum game but rather benefit all employees” and back up gender diversity efforts with a business case supported by data. The first step is making a business case for women’s leadership development. Fortunately, we have that data in spades. For example, McKinsey and DDI research has found that gender-diverse companies perform better financially. Companies in the top 25 percent based on gender or racial and ethnic diversity are more likely to have returns above their national industry means, and companies whose leadership are at least 30 percent women are 12 times more likely to be among the top-performing companies. Joanna Barsh, co-chair of the International Council on Women’s Business Leadership’s Leadership Working Group and author of “How Remarkable Women Lead,” says it’s also important that a company’s leadership match its customer base. Since, in many industries, that customer base is largely made up of women, gender diverse leadership just makes good business sense. “More diverse teams actually come up with better solutions,” Barsh adds, “particularly for non-linear, complex problems. Those problems are the ones that most business leaders now face. One single person doesn’t have the skills and experience to solve those problems; you need diversity of thought, diversity of background, different skillsets and experiences.” On the other hand, researchers from KPMG and the 30% Club believe that a business case alone isn’t enough: “The personal case for gender diversity is a much more powerful lever when advocating for change, especially when the case is made by men.” Leaders shouldn’t be afraid to use emotional and authentic storytelling to make the case as well as business data. In a turbulent, fast-changing company undergoing transformation, female leaders can be a huge benefit, Barsh says. “On average, women ask a lot of questions, bring a growth mindset, are more participative in terms of getting more ideas and more thoughts and more people, bringing more positive emotion into the workplace … In general, women bring a lot to the table in the kind of times that we’re in.” It’s up to L&D to highlight those experiences and behaviors that we need now and demonstrate that gender diversity will bring them to the organization. Including Men in the Women’s Club While women-only training and resource groups have become popular, some experts say that having a mixed audience is beneficial for both men and women. “For development programs to work,” says Giovanna Ramazzina, head of corporate sales for Kaplan Leadership and Professional Development, “they have to reflect the reality that participants face every day. The business world is currently male-dominated, so we not only need women to be able to navigate it with confidence but also men to listen, participate and buy in to our efforts to make it more inclusive and diverse. The biggest problem is that leadership training for women is still seen as an experience for women only. This intensifies the distance between men and women and isolates the issue.” Cathy Light, founder and CEO of Leadership Balance, agrees, saying that new coed programs can help men “be more open to learning how they can be more inclusive.” Tara O’Sullivan, chief creative officer at Skillsoft, says many organizations are moving away from women-only training and moving toward inclusion councils and other programs that include people in both the majority group (i.e., white men) and people in less represented groups (i.e., women, people of color, etc.). “When you have a critical mass of women in the room,” Barsh says, “I think you actually do create a tremendous benefit, for both the men and the women who are in the program.” Ramazzina recommends having women-only groups for social support and coed groups for learning. Of course, the #MeToo movement has created some unprecedented gender dynamics in the workplace, including some anxiety on men’s parts to mentor or work alone with women. This, combined with the unconscious, implicit bias that everyone, regardless of gender, possesses to some degree, means that evidence-based anti-harassment and anti-bias training are more important than ever. Help both men and women understand appropriate and inappropriate workplace behaviors as well as how to “catch themselves when they are about to fall into the [unconscious bias] trap,” as Ramazzina puts it. Barsh agrees, saying that “by going into those threshold moments, [L&D can] improve people’s self-awareness and do a great job toward helping all of the men and women who are making those mistakes just do better.” Finally, include gender topics in executive training. O’Sullivan says that “the tone at the top and the mood at the middle” must be supportive of diversity and inclusion. “No amount of training in the world” will fix the gender gap if the workforce doesn’t believe executives are on board. “Change must start from the top,” Ramazzina says, “and has to be taken as a serious commitment, so we begin any [diversity and inclusion] program by analyzing a real-life case study in the organization. This encourages top teams to open their eyes to what happens in their business and, most importantly, see what helps and what hinders their inclusivity vision.” Most people – men and women – genuinely want to see more gender balanced leadership. What’s more uncertain is how to make that happen. By engaging both genders in women’s leadership development initiatives, we can create more inclusive cultures, which will translate into better results both for individual leaders and for the organizations they lead. By engaging both genders in women’s leadership development initiatives, we can create more inclusive cultures. March was Women’s Leadership Month at TrainingIndustry.com. Check out our research report “Women’s Access to Leadership Development: A Tale of Two Experiences” by clicking here, watch our webinar recording, listening to this podcast episode or read the other great articles we published this month on developing women leaders: Women Lead the Way in Learning and Development Cracking the Code For Inclusion: How the Power of One Can Make it Happen Developing Women Leaders in the Public Sector Coaching as an Equalizer: Closing the Gender Gap in Leadership The Catalyst for Balanced Leadership: Best Practices for Women’s Leadership Development 8 Ways L&D Departments Can Help Women Break Down the Leadership Barrier Three Ways Women Leaders Can Rid Their World of Imposter Syndrome How Learning and Development Can Help Close the Gender Gap in Sales A New “Mommy Track”: How Returnships Can Help Close the Gender Gap 5 Leadership Skills Women Can Use to Improve Their Company’s Bottom Line #diversity and inclusion #executive development #Leadership Training #unconscious bias #women in leadership Taryn Oesch, CPTM Taryn Oesch is an APEX Award-winning editor at Training Industry, Inc., where she manages online content.
cc/2019-30/en_head_0010.json.gz/line2742
__label__cc
0.634578
0.365422
Meeting of Foreign Ministers of the Global Coalition to Defeat ISIS العربية , Русский , Français Media Note U.S. Secretary of State Michael R. Pompeo will host a day of meetings with the foreign ministers of the Global Coalition to Defeat ISIS on February 6 in Washington, D.C. The full 79-member Coalition will meet for in-depth discussions on the impending territorial defeat of ISIS in Iraq and Syria, which is the result of four years of Coalition and our partners’ efforts, and a significant milestone towards delivering ISIS an enduring defeat. Ministers will discuss the next phase of the campaign in Iraq and Syria, which will focus on protecting against a resurgence of ISIS through stabilization and security assistance. Ministers will also discuss important next steps in degrading ISIS’s global networks and affiliates outside Iraq and Syria. These meetings are taking place at a key moment in our coordinated fight. The United States is determined to prevent a resurgence of ISIS in Syria and Iraq after the withdrawal of U.S. forces from Syria takes place, and remains committed to working with the Global Coalition to continue to destroy ISIS remnants and thwart its global ambitions. As ISIS is defeated on the battlefield, the Coalition will continue its stabilization efforts to facilitate the safe and voluntary return home of those who have been displaced by the violence. The Global Coalition regularly meets to coordinate and enhance combined efforts to counter ISIS. The last Ministerial took place in Brussels on July 12, 2018, with select members of the Coalition. The last meeting at the Political Director level took place in Rabat, Morocco, on June 26, 2018.
cc/2019-30/en_head_0010.json.gz/line2743
__label__cc
0.583706
0.416294
Use Hocus pocus in a sentence Hocus pocus Definition meaningless talk "Don't you see what a hocus-pocus you have made?" Such a hocus-pocus I never knew. "What hocus-pocus has been here?" Churchill is a man above hocus-pocus. Hocus-pocus, a juggler: a juggler's trick. "I will have no hocus-pocus, no humbug, no Jesuitry." It struck him now as a childish farce—an absurd hocus-pocus. What was the meaning of his hocus-pocus talk about miracle gold. "Oh, I used a little justifiable hocus-pocus about the medicine." A sort of hocus-pocus... now you are my wife, now you aren't my wife. There is no sleight-of-hand or hocus-pocus in the benefits it seeks to confer. "We’re that now, save for the hocus-pocus of the parsons you set such store by." There’s such a thing as hocus-pocus to steal away the value of a piece of property. Is not this something like a piece of Jules Verne's delicious scientific hocus-pocus? But if we don't carry out this hocus-pocus first, she will not credit what comes after. All this, of course, is hocus-pocus, and the judicious are not deceived by it for an instant. I could have found it in me to laugh at the whole miserable hocus-pocus, had I been less indignant. And may I ask you, Professor Hocus Pocus, or whatever your name is, whom you are calling a schoolboy? "There's some hocus-pocus about this," whispered Trask, as he and Locke moved forward for a private talk. "Hocus pocus" appears to have been a mock Latin expression first used as the name of a juggler or conjurer. "I was anxious to see for myself, naturally, suspecting some hocus-pocus, so I ventured to be respectfully dubious." His voice was shaky, and if there had been light enough to see it, his face was gray with terror of his own hocus-pocus. He felt no shame at going in for hocus-pocus at his time of life, and buying his son's affection, mine, by his kindnesses. He exhorted, he interpreted dreams, he warned, he performed the complicated hocus pocus that brought luck or averted calamity. The Finance Minister's hocus-pocus expedients for balancing the Budget have been unanimously rejected by the Budget Committee. "That is, you can't start with a glass of cool water and, hocus-pocus, get it to separate into warm water and ice cube, right?" He had acquired a certain amount of clerical hocus-pocus by having been a novice in a monastery, whence he was kicked out for sacrilege. The job seems so absurdly trivial, even to so mean an understanding, that he can’t refrain from glorifying it with a bit of hocus-pocus. Duplicity, chicane, guile, chicanery, trickery, cunning, circumvention, deceit, deception, artifice, dissimulation, double-dealing, hocus-pocus. There were two ways of escaping this dilemma: one was to withdraw the warriors; the other, by some hocus-pocus, to abrogate the neutrality. HOCUS, a shortened form of "hocus pocus," used in the 17th century in the sense of "to play a trick on any one," to "hoax," which is generally taken to be a derivative.
cc/2019-30/en_head_0010.json.gz/line2748
__label__cc
0.514804
0.485196
Now We Know Why Marco Rubio's Security Detail Was Increased @jenvanlaar Posted: Aug 13, 2017 8:41 PM Sen. Marco Rubio (R-FL) has been a vocal critic of Venezuela's corrupt government, and especially of "influential former military chief and lawmaker" Diosdado Cabello, whom he has labeled "the Pablo Escobar of Venezuela" on multiple occasions. Last week we reported that Rubio's security detail had been increased, but neither Rubio's office nor the Capitol Police would comment. The Miami Herald has obtained a memo distributed to law enforcement agencies by the Department of Homeland Security describing an "order to have Senator Rubio assassinated," and that they believed Cabello was behind the order. "[I]t also warned that “no specific information regarding an assassination plot against Senator Rubio has been garnered thus far” and that the U.S. had not been able to verify the threat. That Cabello has been a vocal Rubio critic in Venezuelan media was also noted, a sign federal authorities are well aware of the political bluster complicating the situation. According to the memo, Cabello might have gone as far as to contact “unspecified Mexican nationals” in connection with his plan to harm Rubio. The U.S. believes Cabello controls all of Venezuela’s security forces." Rubio's additional security detail was first spotted July 19, the same day Rubio repeated his "Pablo Escobar" characterization of Cabello during a Senate hearing. Authorities have suspected for quite some time that Cabello, who dubbed the Senator "Narco Rubio" on Twitter last week, is involved in drug trafficking.
cc/2019-30/en_head_0010.json.gz/line2751
__label__wiki
0.618638
0.618638
Products>A Concise Dictionary of Theology, 3rd ed. A Concise Dictionary of Theology, 3rd ed. by Gerald O’Collins, Edward G. Farrugia Paulist Press Gain immediate access to concise, accurate definitions of theological terms from “Abba” to “Zwinglianism,” written by two of today’s top Catholic theologians. In this third edition of A Concise Dictionary of Theology, Gerald O’Collins and Edward G. Farrugia identify 1,000 terms, providing necessary information about their origin, and their place in church history. This is not an edited work, rather, each entry is written by O’Collins and Farrugia, giving it a fresh, accessible tone that sets it apart traditional dictionaries. With Logos Bible Software, this valuable volume is enhanced with cutting-edge research tools. Scripture citations appear on mouseover in your preferred English translation. Important terms link to dictionaries, encyclopedias, and a wealth of other resources in your digital library. Powerful topical searches help you find exactly what you’re looking for. Tablet and mobile apps let you take the discussion with you. With Logos Bible Software, the most efficient and comprehensive research tools are in one place, so you get the most out of your study. Contains 1,000 key terms for both Western and Eastern Christianity Places terms in their historical context Reflects the latest scholarship and research Includes the Twenty-One Ecumenical Councils of the Catholic Church This convenient, up-to-date compendium will be a valued desk companion. Recommended. Title: A Concise Dictionary of Theology 3rd ed. Authors: Gerald O’Collins and Edward G. Farrugia Publisher: Paulist Press Gerald O’Collins, SJ, is a Jesuit priest and former dean of theology at Gregorian University in Rome. He is an honorary research fellow of MCD University of Divinity and an honorary adjunct professor at Australian Catholic University. He earned his BA and MA from the University of Melbourne, and was ordained a Jesuit priest in 1963. He earned his PhD from Cambridge University in 1968. He taught at the Pontifical Gregorian University in Rome from 1974 to 2006. He holds several honorary doctorates, and has earned many awards and honors. In 2006 he was made a Companion of the General Division of the Order of Australia for his contributions to theological scholarship and ecumenical initiatives. He is author or coauthor of 60 books, including Jesus: A Portrait and The Legacy of John Paul II. Edward G. Farrugia, SJ, was ordained a Jesuit priest in 1963. He earned a PhD in philosophy and another in theology from St. Louis University, Missouri. Farrugia has taught at the Pontifical Oriental Institute in Rome since 1981. He is professor of dogmatics and eastern patristics. He also teaches at universities around the world, including the Pontifical Gregorian University in Rome.
cc/2019-30/en_head_0010.json.gz/line2752
__label__cc
0.537334
0.462666
Occupy, kettling and Strasbourg stress – The Human Rights Roundup 23 January 2012 by Wessen Jazrawi Welcome back to the human rights roundup, a regular bulletin of all the law we haven’t quite managed to feature in full blog posts. The full list of links can be found here. You can also find our table of human rights cases here and previous roundups here. by Wessen Jazrawi First, a plea from the Pink Tape family law blog to donate to BAILII, particularly if you run a blog that links to BAILII or if you are a lawyer who relies on BAILII for transcripts, or to simply do their online survey: BAILII – Pink Tape. This blog would not exist without the excellent service provided by BAILII – please help them by donating and doing the survey. Wilton Park The report from the Wilton Park conference, where the good and great of Europe met to discuss the future of the European Court of Human Rights, has been published. Suggestions included requiring individuals to show that non-examination of the case would cause a “significant disadvantage” and introducing a “universal periodic review” procedure, such as that used by the UN. It was recognised that national implementation was by far the biggest challenge that the system faced. The full report can be found here. Stress in Strasbourg Also on the topic of reform of the European Court of Human Rights, Prime Minister David Cameron is to give a speech in Strasbourg on Wednesday, and this has been heavily trailed by the media. See Cameron to tell Europe’s judges to stop interfering in British law (Daily Mail), Britain challenges power of human rights court (Telegraph) and PM to Euro court: Stop the meddling (Sun). The Prime Minister will be well aware that the controversial court issued 3 judgments concerning the UK this week. In a ruling that has caused controversy, the Court found that suspected terrorist Abu Qatada could not be deported to Jordan because there remained the risk that evidence obtained using torture would be used against him. For an analysis of the judgment, click here: Suspected terrorist may not be deported to Jordan Strasbourg rules. For commentary by the Guardian, click here. In another ruling, the Court approved UK justice when it found that “whole life” tariffs for murder with no hope of release (except by the Secretary of State on compassionate grounds) was not a breach of Article 3. For an article by UKHRB, click here: Whole life sentences for murder not in breach of Convention says Strasbourg and for an article by the Justice Gap, click here. For commentary by Liberty on both judgments, click here: Court of Human Rights prefers British style justice to Jordanian law. Finally, in the third case, the Court found that the Article 3 rights of 2 men indicted for murder in the United States would not be violated if they were extradited, despite risking death penalty or sentences of life imprisonment without parole. For a summary of all three cases, see Adam Wagner’s post Strasbourg: L’enfant terrible. See also this article by the Guardian on the wider context of the power struggle between the UK and Strasbourg. More hacking news: a great article by David Allen Green in the New Statesman on the question of what the Times did or did not know about computer hacking when it went to the High Court to defend their outing of Nighthawk, an anonymous police blogger: What did the Times know about computer hacking and when? 370,000 migrant workers on the dole? And here’s a great article by jwci debunking the Telegraph article on migrant workings claiming the dole: 370000 migrants on the dole. Really? Click here for an interesting piece on sharia law and whether decisions taken by sharia tribunals are binding as regards divorce. Legal blogger Carl Gardner has queried whether some of the claims in the article are legally correct, in particular whether Sharia law have “legal force” in divorce proceedings. More on the Children Rights Alliance judicial review For an article discussing the Children’s Rights Alliance attempts to force the Ministry of Justice to track down and contact people who may have been subjected to unlawful restraint while in Secure Training Centres as youths – which failed because CRA was not itself the victim of any human rights breach – click here. See also Rosalind English’s post City of London v Samede [2012] EWHC 34 (QB). Occupy London is to be evicted. The court held that the extent and duration of the Occupy encampment and the public nuisance inherent in their obstruction of the highway, amongst other factors, warranted the eviction. According to a post by Nearly Legal, permission to appeal was refused but the High Court has stayed enforcement for 7 working days, to 4 pm on 27 January, to allow them to challenge that decision. R (on the application of Associated Newspapers Ltd) v Leveson (As Chairman of the Leveson Inquiry [2012] EWCA 57 Admin. Associated Newspapers loses its application for judicial review of Lord Leveson’s decision to allow journalists to give evidence anonymously. R (on the application of McClure and Moos) v Commissioner of Police of the Metropolis [2012] EWCA Civ 12. Metropolitan Police win their appeal against the High Court ruling that the tactic used had been unlawful. The Court of Appeal took into account the fact that the Divisional Court had substituted its own view of whether a breach of the peace was imminent, instead of assessing whether the police had been reasonable in their view. The Government of the United States of America v Richard O’Dwyer. Richard O’Dwyer’s attempt to resist extradition failed. He attempted to block his extradition by relying on a combination of human rights and other objections relating to the manner and circumstances surrounding the request. Joseph Lennox Holmes (Appellant) v Royal College of Veterinary Surgeons (Respondent) [2011] UKPC 48. The disciplinary procedures of the Royal College of Veterinary Surgeons did not give rise to any appearance of bias so as to breach a practitioner’s right to a fair trial. UK Human Rights Blog posts R (Associated Newspapers) v Lord Justice Leveson: Challenge to Anonymity Ruling Dismissed January 22, 2012 1 Crown Office Row Is the European Court of Human Rights obsessively interventionist? – Andrew Tickell January 22, 2012 1 Crown Office Row Should bankers be named and shamed? Strasbourg latest January 22, 2012 Rosalind English The god of free trade: why Austria cannot stop big lorries from using its motorways January 21, 2012 David Hart QC Extradition of murder accused to US not breach of human rights January 19, 2012 Isabel McArdle No deportation for Abu Qatada, but where are we now on torture evidence? – Professor Adam Tomkins January 19, 2012 Metropolitan Police succeed in G20 “kettling” appeal – Wessen Jazrawi January 19, 2012 Occupy London to be evicted – full judgment January 18, 2012 Adam Wagner Sign up to free human rights updates by email, Facebook, Twitter or RSS
cc/2019-30/en_head_0010.json.gz/line2759
__label__wiki
0.542418
0.542418
by Paul Glastris When I worked at U.S. News & World Report, we had an editor, a world-weary veteran of Time, who liked to tell the following story. In 1979, he said, Time ran a cover story on cocaine, then a hip, growing but still fringe phenomenon. That issue of the magazine turned out to be one of the worst-selling in Times history. Two years later, when coke had spread to the American mainstream and was wreaking all kinds of havoc, Time published another cover story on cocaine. That issue became one of the magazines all-time bestsellers. The lesson, he said, was that it is dangerous to get too far ahead of the news; what readers really want is sense made of the news theyve already heard about. I thought of this editors story as we were putting together the current issue of the Washington Monthly, which celebrates the magazines fortieth anniversary. Flipping through stacks of yellowing old issues, looking for great pieces that would make engaging reading today (you can find all of the excerpts here), I was struck by how often the magazine did precisely the opposite of what my U.S. News editor recommended. The Monthly has long made a habit of publishing stories that were months or even years ahead of the news, usually for the purpose of sounding alarms about unrecognized problemsalarms which often turned out to be well worth heeding. A few examples: In 1980, Gregg Easterbrook wrote a cover story explaining that the space shuttle, then under construction, had so many problemsespecially its solid rocket boosters and heat-shielding tilesthat it risked being destroyed in flight. Which, alas, happened in 1986 and then again in 2003, for precisely the reasons Easterbrook foresaw. In March of 2003, Nicholas Confessore predicted, rightly, that the imminent U.S. invasion of Iraq would undermine the readiness of our already-overstretched all-volunteer army and lead to falling reenlistments and crushingly burdensome redeployments. A year later, Benjamin Wallace-Wells looked at the supercharged real estate market, the Feds loose money policy, and Alan Greenspans odd pronouncements about the splendors of adjustable rate mortgages, and predicted that the housing bubble is likely to burst, and when it does it may very well take the American economy down with it. Those are just three of the many, many stories the magazine called right (there are a number we called wrong, too; you can see a collection of both here). So what is the secret to our prescience? Part of it is frequency of publication: when youre putting out a monthly (now bimonthly) magazine its nearly impossible to be on the news, so you have to learn to be ahead of it. Part of it is the blessing, as it were, of having a relatively small, already-well-informed readership that is looking for something beyond the daily headlines. But more than anything, it is a consequence of the unique mission founder Charlie Peters set out for the magazine, a mission Nicholas Lemann reassesses in this issue. Charlie wanted the magazine to scrutinize the performance of government with fierce honesty but also with the intent of making it work better. Where the traditional investigative reporter probes government agencies and programs looking for illegality, the classic Monthly writer looks for bureaucratic weaknesses and policy mistakes which, if left unattended, could lead to disaster. It is the opportunity to do this kind of thinking-mans reporting that has lured so much great young talent to the Monthly over the years. These journalists have typically gone on to positions of prominence at more mainstream publications, bringing some of the Washington Monthly sensibility with them. Today, that mainstream press is suffering a drastic downsizing. As a result, there are fewer and fewer reporters covering government, even as government itself is growing in size and reach. While we can pray that our current political leaders are skillful enough to manage this expansion deftly, their ability to do so would be greatly enhanced if there were enough journalists out there on the front lines providing early warnings of trouble in time for adjustments to be made. The big debate in journalistic circles right now is whether bloggers and smaller niche publications can fulfill some of the watchdog role that the traditional news organizations are abandoning. The answer is not at all clear, but the Monthlys forty-year track record provides some clues. Yes, large media companies with big mass audiences have advantages. But a smaller audience can bring with it freedom from pressure to follow the herd. Yes, a lot of bloggers are young and amateurish. But most Monthly writers have been young and relatively inexperienced, too. Easterbrook, Confessore, and Wallace-Wells were twenty-nine, twenty-six, and twenty-five, respectively, when they broke their big stories, and none had written on those subjects before. What the journalistic landscape will look like in coming years is anyones guess. Whats clear is that the model of journalism pioneered by the Washington Monthly is more relevant and more needed than ever. This site and all contents within are Copyright 1969-2011 Washington Monthly Editorial offices: 1200 18th Street NW, Suite 330, Washington, DC 20036 Paul Glastris Paul Glastris is the editor in chief of the Washington Monthly.
cc/2019-30/en_head_0010.json.gz/line2763
__label__wiki
0.976056
0.976056
Celebrating 20 Years Of Serving Seniors by Lynn Kutter | April 10, 2019 at 10:30 a.m. LYNN KUTTER ENTERPRISE-LEADER Farmington Senior Activity & Wellness Center celebrated its 20th anniversary last week. As part of the ceremony, the center recognized the Phillips family for their contribution in making the center a reality. Bonnie Phillips, who is deceased, sold the land to the city of Farmington at a discounted price. A plaque was presented to her children. PIctured are Carol Tyree, left, Connie Thomas, Roy Hummel, Paul Phillips, Mayor Ernie Penn and Jim Ferguson. Hummel, Penn and Ferguson served on the senior center building committee. FARMINGTON -- Farmington's senior center is successful because it has the city and the community behind it and supporting it, said Brad Bailey, executive director with Area Agency on Aging of Northwest Arkansas. "For these senior centers to really work, you've got to have community involvement," Bailey said during a ceremony to celebrate the center's 20th anniversary. "The common thread has been the support of the city and the citizens of a town." Bailey has only been executive director for a couple of months but has been with Area Agency on Aging since November 1999. "I want to say congratulations to the community of Farmington," Bailey said. "It looks great." He threw out some statistics to show how the center impacts the community. For the program year July 1, 2017, through June 30, 2018, Farmington Senior Activity & Wellness Center served 12,825 meals out of the building for weekday lunches. This does not include meals for special events. The center delivered 13,380 meals to homebound residents in Farmington, West Fork and Greenland. It provided 17,317 units of socialization and 1,244 transportation units. Farmington also is a Medicaid provider through the AR Choices program. "We're touching people who come to the center and people who can't come," Bailey said. The center's operations budget is $320,000 for the current program year. The center receives state and federal monies but not enough to cover the budget. To make up the difference, the center takes in donations for its services and sponsors many fundraisers throughout the year. Mayor Ernie Penn welcomed those to the celebration and gave a brief history of the senior center. More than 20 years ago, a group of senior adults had a vision for their own building, Penn said. A town meeting was held on the idea and Penn remembers Jerry Hunton, county judge at the time, saying the project needed leadership. As Hunton said this, he placed one hand on Penn's shoulder and the other hand on Jim Ferguson's shoulder, Penn said. Both Penn and Ferguson served on the Building Committee for a new senior center. The city already had the land on U.S. Highway 62, purchased from Bonnie Phillips for a discounted price. It also had $40,000 in seed money from Area Agency on Aging but needed more money. Penn, who was on the City Council during this time, said the Broyles Estate had bequeathed $200,000 to the city, and he and the rest of the Building Committee had to convince the council to dedicate $150,000 of this toward the senior center. "After a lot of heated discussion, we finally got the money," Penn said. While the construction costs were taken care of, the city still had to figure out a way to furnish the building. "That was done by the citizens of this community," Penn said. People came forward with cash donations and in-kind donations. "It was definitely a project of love. We believe and I still believe our senior community is the most important part of our community," Penn said. He said he considered it an honor to serve as mayor. However, he gave the greatest credit to his wife, Kelly Penn, who also is Farmington city clerk, saying he appreciated her support and encouragement. "She's been my inspiration," Ernie Penn said. Former City Council member Roy Hummel, who also served on the Building Committee, presented a plaque to Bonnie Phillips' children in appreciation for their mother's gift to sell the land to the city of Farmington. "Twenty years ago, if someone had told me we would be gathering in a facility like this, I wouldn't have believed them," Hummel said. He recalled a saying from his mother when he was growing up, "Give me my flowers while I'm here." At the time Hummel said he didn't know what she meant. "As I got older, I knew exactly what she meant," Hummel said. "Today, this senior center is a good example of that." Preston Beeks, pastor of Main Street Baptist Church in Farmington, said the senior center has helped the community and the churches in the area. "I've been blessed by this facility and what goes on here," Beeks said. General News on 04/10/2019 Print Headline: Celebrating 20 Years Of Serving Seniors
cc/2019-30/en_head_0010.json.gz/line2765
__label__wiki
0.538403
0.538403
OLYMPIC WINTER GAMES PYEONGCHANG 2018 Best ways to reach PyeongChang Getting from Seoul to the Olympic Games host city is easy with high-speed and convenient options PyeongChang, home of the Olympic Winter Games in 2018, is a beautiful, mountainous county in the northeast of South Korea. But the very rugged conditions that make PyeongChang a prime spot to host The Winter Olympics also make it challenging to reach. There are no direct international flights to the county, and while it is not particularly remote, PyeongChang is just far enough off the beaten track that it shows an entirely new side of Korea, foreign even to those familiar with Seoul. Despite its seclusion, there will be at least two easy ways to reach PyeongChang when The Winter Olympics begin on February 9, 2018. South Korea’s premier ski resorts may only be two and a half hours away by car or bus, but they feel a world away from the capital. Contrasting the constant energy and glitz of Seoul, PyeongChang offers a quaint, rural atmosphere where traditional Korean culture and architecture is much more prominent. Traveling to PyeongChang by road provides the opportunity to see the hills and mountains of the Korean countryside up close. To truly explore these areas, visitors may want to consider renting a car. Rates as low as $10 USD a day for a week-long rental are easy to find, but the bus will always be cheaper and takes paperwork and complicated booking arrangements out of the picture. While there is always some risk of running into traffic, especially around Seoul, the journey is worth it because of its unique beauty. Going by road allows you to experience some of the same mountain passes and valleys traveled by the peddlers in the stories of beloved Korean writer Lee Hyo-seok. Lee’s short story “When the Buckwheat Blooms” is both an important part of the country’s literary tradition and a touching glance at what life was like in PyeongChang more than 80 years ago. Those particularly interested in culture should consider visiting the Lee Hyo-seok Culture Village, a well-preserved traditional village near Lee’s birthplace. By rail Of course, the scenic route and long drive may not be right for everyone. Luckily, there’s good news for those who just want to get slope-side as fast as possible. Korea’s newest high-speed railway should be available to whisk visitors from Incheon International Airport in Seoul directly to a station near Olympic Village in PyeongChang. Currently under construction, the $3.7 billion USD railway will feature a bullet train that will reach a top speed of 300 km/h (186 mph). With that speed and a journey of only 113.7 kilometers (70.6 miles), the ride is expected to take around an hour. The railway passes through mountainous terrain and will gradually rise 700 meters above sea level (over 2,000 feet) during the trip from coastal Seoul to mountainous PyeongChang. Locals say this altitude is ideal for promoting good health, and the phrase “Happy 700” features prominently on many PyeongChang souvenirs. No matter the mode of transit used, savvy PyeongChang travelers should be sure to bring their Visa cards. For more than 30 years Visa has sponsored the Olympic Games, and is the only card accepted at Olympic venues. Credit cards are also a must when traveling to South Korea: 73 percent of all purchases in the country are made with credit or debit cards, and a growing number of businesses do not accept cash at all. PyeongChang prepares to host the world In just one year, the world will shift its gaze to the mountainous region of South Korea to watch top athletes skate, ski and slide for gold. Global Innovation Centers An immersive experience to explore new technologies. Online shopping has never been simpler. The Visa Everywhere Initiative All Innovation news
cc/2019-30/en_head_0010.json.gz/line2766
__label__wiki
0.967846
0.967846
Added on April 25, 2019 Images News Netwok We have contained militancy: DGP Biweekly ban on civilian traffic on NH a "temporary measure": Gen Dhillon Photo/Javed Khan Srinagar: Director General of Police, Dilbag Singh today said that 2018 and the year so far had been successful in containing militancy in the Valley, barring stray incidents, including the February 14 Pulwama suicide attack. "This year, stone-pelting and law and order engagements reduced drastically. We did face some law and order situations during counter-insurgency operations, but those have been fewer than before," Singh said. He said the recruitment of local youths into militancy has dipped. "That is a very healthy sign. There were very large-scale successes in counter-insurgency operations. Two-seventy-two (272) terrorists were neutralised in 2018 and many were apprehended," he said, adding "we stopped a very big number of youths from joining the wrong path (militancy)." The state's top cop said militants killed last year included many commanders of JeM and Lashkar-e-Taiba (LeT). "A total of 46 foreign militants have been killed last year and in the current year -- 27 belonged from JeM and 19 from LeT. Foreign elements getting neutralised has made a big dent to the ongoing militancy," he said. The DGP said, “The successes during the current year have been quite commendable and troops on the ground have done a very good job”. He also said planning by the officers led to smooth conduct of the first three phases of the Parliamentary polls. "Around 70 militants have been neutralised and a large number have been apprehended. The law and order has been generally under control. We haven't experienced much law and order problems during this election -– the three phases of which are over. Minor issues have been there, but there has not been poll-related violence as experienced in 2017 because of very good planning by the officers on the ground. We do hope the rest of the two phases pass off peacefully," he said. Elections will be held in the state on April 29 and May 06 as part of phases 4 and 5. Lt Gen K J S Dhillon said, after the Pulwama suicide attack the security forces launched an offensive against the Jaish-e-Mohammed (JeM) in the Valley, resulting in a situation where “no one is willing to take up the leadership of the outfit”. "Forty-one militants were killed. Twenty-five of them belonged to JeM. Thirteen were foreign terrorists -- Pakistanis and category A plus and above," said Lt Gen Dhillon, at a joint press briefing accompanied by Jammu and Kashmir's Director General of Police (DGP) Dilbag Singh and Inspector general, CRPF, Zulfiqar Hassan at the police control room here. "We targeted the JeM leadership and the situation now is such that there is no one willing to take up the leadership of the JeM in the valley. In spite of Pakistan's best efforts, we will continue to suppress the JeM," Lt Gen Dhillon, who is the Commander of the Srinagar-based Chinar Corps, said. Lt Gen Dhillon said operations against militants in the hinterland and along the Line of Control will continue with full vigour and they will not let militancy rise to the serious levels as before. He urged the local militants to surrender. He also requested the youths to not come close to the encounter sites. He said the biweekly ban on civilian traffic on Srinagar-Jammu national highway was a "temporary measure". The DGP said after the last two phases of the elections were completed, the traffic ban will be reviewed. "I think it is under review by the government and after the two phases of elections in south Kashmir are over, more relaxation is expected," he said. When asked about fewer encounters taking place after the polls commenced, Singh said the operations are on, but the engagements have lessened as the security forces' focus is on the peaceful conduct of elections. Referring to the poll percentage in the first leg of the poll in south Kashmir, he said the poll percentage was a reflection of the prevailing situation. "A percentage of around 13 percent is good considering the situation in south Kashmir. People showed courage and voted despite threats. It is everyone's right and no one can be forced to vote either," he said. The DGP said a militant was arrested from Bathinda area of Jammu in connection with a blast in Banihal earlier this month. "He is linked to the Banihal blast case and is being investigated. We will share further details with you later," Singh said. Images News Netwok
cc/2019-30/en_head_0010.json.gz/line2771
__label__wiki
0.590309
0.590309
Movies starring Robert Knepper That's Life! (1986) 102 mins Comedy, Drama "That's Life" is one of those movies which when you split up into all its little sections works but unfortunately when you bring them together as a whole they don't work. For example we have this basic story of a man who has ... D.O.A. (1988) 96 mins Mystery, Thriller In fairness I have not seen the 1950 version of "D.O.A." so making comparisons is impossible, all I know is that the 1950 version was a film-noir. As to the 1988 remake or reimagination and I say reimagination for a reason, w... Renegades (1989) 106 mins Action , Crime, Drama You can sum up "Renegades" by saying Kiefer Sutherland and Lou Diamond Phillips in an unlikely buddy situation go after bad guys, it's daft and demands that you just watch it for the action and the comedy, but nothing else. T... Perry Mason: The Case of the Fatal Fashion (1991) 95 mins Crime, Drama, Mystery, TV Movie I wonder what Raymond Burr, Barbara Hale and William R. Moses' reactions were when ever they read the latest Perry Mason script. Maybe Moses wondered how many times he would get shot at whilst maybe Burr wondered how many sce... Hitman (2007) 100 mins Action , Crime, Thriller It has been a long time since I really played video games and as such have never played the game on which "Hitman" is based. But to be honest you don't need to have played the game because "Hitman" is a simple formula driven ... 104 mins Action , Adventure , Crime When I sat down to watch "Transporter 3" I did so expecting little, I hadn't been impressed by "Transporter 2" and its outrageous action and was expecting this latest movie to follow suit and deliver even more outrageous nons... Earth's Final Hours (2011) 84 mins Action , Sci-Fi, TV Movie Earth's Final Hours: A scientist, an FBI agent and his teen hacker son try to prevent the end of the world from happening... R.I.P.D. (2013) 96 mins Action , Comedy, Fantasy Thinking about it, with "R.I.P.D." being a 12A in the UK there could be teens who watched this on its release who weren't even born back in 1997. You may wonder why I mention 1997 but that was the year "Men in Black" came out... * This is purely a list of reviews on The Movie Scene featuring the name Robert Knepper as one of the principle cast members. Simple list of Robert Knepper movies Peeping Tom (1960)
cc/2019-30/en_head_0010.json.gz/line2773
__label__cc
0.560429
0.439571
Mallena's Musings: Supernatural 13.06 "Tombstone" Written by Mallena For this article, I decided to stir things up a bit. I’m in a weird mood, so I’m doing some very strange and random musings at the end of my Supernatural review. You’re welcome. I’m not the biggest fan of this episode; it starts with a cold open that doesn’t add to the drama, but detracts from it. Sam and Dean found out that Castiel’s alive, so instead of going straight there, we have to watch Dean and an unknown fellow in a graveyard. To make the early scenes even more banal, this happens: “Oh Cas, you’re back.” Hug, hug. “Now, let’s go get Jack and work a case.” That’s it, really? We’ve had so many deaths and resurrections on this show; some of them get me blubbering like nobody’s business, but this time I’d like to quote the musical, A Chorus Line : Six months later I heard that Karp had died. And I dug right down to the bottom of my soul…and cried. Cause I felt nothing. Sorry, folks, but that’s how I feel about Castiel’s death and return. Don’t get me wrong, I enjoyed him for many a season. It’s only been in the last few years that I’ve realized that he’s not contributing very much to my enjoyment of the show. I miss all the variations of Cas that we used to have and I hope that his story becomes more interesting. It might be that Dabb has many twists, turns, thrills, chills, and epic moments for our angel buddy in the coming months. Right? Maybe? I do enjoy Dean’s antics, up to a point, though many of them almost seem like caricatures of Dean Winchester. Sleeping with his gun, being grumpy over coffee, fanboying about the western memorabilia - they seem old hat, somehow. Jensen does look good in western wear, I’ll admit to that. I’m not thrilled with the idea that Dean’s all better now because he got his angel friend back. “Whoopdy frigging doo,” as they say on Crazy Ex-Girlfriend. I did like it when he climbed in that hole in the ground – now that was very amusing. There’s no way that I’d have done it. Just the thought of getting stuck and not being able to get out…that scares me almost as much as possibly meeting that ghoul around a bend. Dean’s brave, though. We learned in “Jump the Shark” that Dean’s good at earthen tunnels and finding ghouls. Sam digs around a gravesite with his bare hands for a clue. I have a clue for him: wear gloves next time, eww. The monster this time is just okay, but I did enjoy the fellow who helps Dean. If the show’s going to separate Sam and Dean, at least they gave us someone interesting. It’s not the same as our boys, though. After a shoot-out, in which Sam and Dean couldn’t hit the side of a barn, we get poor Jack feeling terrible that a security guard unwisely stepped into his line of fire. That’s definitely an accident; if that guard had just stayed back, he would have been fine. It’s a miracle that no one else is hit by stray bullets. On a cop show I watched, they had an episode where a man fires a gun into the air to scare off a car thief, and the bullet kills a man a block over. Bullets were flying everywhere, but like when Sam and Dean trash a motel room fighting, no one seems to be anywhere nearby. I’m sad that Jack thinks so little of himself and that he can only think about the bad things he’s done, not all the good he’s done and could still do. Huh, that reminds me of someone. Oh, yeah. Sam’s in this episode, too. He looks nice when he’s all a-sleeping. Jack’s reunion with Cas is sweet, but I’m rolling my eyes at the ending. Did Jack get lessons in avoidance from Mary? Jack didn’t want to risk hurting Sam, Dean, or Castiel – so, I guess he’s going to take the chance of hurting strangers that he comes across in his travels, instead. Oh, well. Random Musings with Bonus Songs for Castiel I’m reminded of City Slickers (1991) when I watch this western-themed episode of Supernatural. It’s like we send Dean Winchester to an Old West dude ranch. He finds his smile as he travels with his returned friend, the Angel “I don’t sleep at all” Castiel, young “I don’t sleep much” Jack, and Sam “I love watching him sleep” Winchester. (That last quote’s mine.) Here’s a song I wrote for Castiel: (set to the tune of “Oh Christmas Tree.”) Oh Castiel, Oh Castiel, Why’d you have come back so quickly? We never had time to properly miss thee. And we’re afraid that you will get between The epic brotherhood of Sam and Dean. Please pray to Chuck for better writing. When Jack said, “You’re afraid of me,” I immediately thought of Anthony Fremont from The Twilight Zone. I love the old series, but I really love the movie version that was produced in 1983. “Kick the Can” and “It’s a Good Life” with Kathleen Quinlan as Helen Foley, were my favorite segments. In this version, Helen decides to take Anthony on the road with her. She’s going to teach him to do good things, instead of bad. Just don’t get him angry, Helen, if you don’t want to see something really scary. I’ve modified this song in Castiel’s honor: Little Dean had an angel that they wouldn't let him keep So, he put him up for sale at a price he thought was cheap He took him to a neighbor to ask him for advice He said, "Leave Castiel here. He can help me smite the mice. But the Cas came back, he wouldn't stay away He was sitting on the porch the very next day The Cas came back, he didn't want to roam The very next day it was Home, Sweet Home. Then Dean met a man who was driving way out West He would take Castiel along as a special honored guest The steering wheel was wobbly, he drove into a tree The car was just a total wreck as anyone could see Castiel came back, he didn't want to roam So, Sammy bought a gun from the Human Cannonball He put Castiel inside with Tri-Nitro Alcohol When he pulled the trigger, the cannon made a roar The neighbors all surrendered 'cause they thought it was a war Then Sammy gave the Cas to a man who had a bomb When he took Castiel away, he was acting cool and calm And then the bomb exploded, it made an awful sound They searched and searched for ages but the man was never found This song is a popular children's and folk tune which has evolved from a song of the same name written by Harry S. Miller in 1893. This version of the song was featured on The Muppet Show. Athena reminds me of Geena Davis, quite a bit. This picture is from one of my favorite movies, A League of Their Own. Dean wears a string tie called a bolo. My dad wore those all the time when I was growing up. He was born in Montana just before the Great Depression and died in Utah almost 85 years later. My dad always said that he loved his string ties because he never could figure out how to tie the other ones, very well. I’d also like to invite you to watch this gem of a slideshow, which was written/produced/directed by Alice Jester: http://thewinchesterfamilybusiness.com/articles/article-archives/slideshows/18275-the-winchester-family-business-short-attention-span-theater-presents-castiel-s-lament Th, th, th, that’s all folks! ----Mallena Image courtesy of news.uark.edu
cc/2019-30/en_head_0010.json.gz/line2779
__label__wiki
0.902127
0.902127
Why Atiku Should Be Investigated For Treason – BMO wikinaija April 11, 2019 April 11, 2019 No Comments on Why Atiku Should Be Investigated For Treason – BMO Buhari Media Organisation, BMO, has urged the Department of State Services, DSS, to investigate the former Vice President Abubakar Atiku’s romance with foreign bodies, especially the United States of America, in pursuit of his alleged stolen mandate to succeed incumbent President Muhammadu Buhari. BMO also accused Atiku of seeking to destabilise the country in a bid to realise his failed ambition to be President. This, it said, is the reason he had been lobbying the US authorities to recognise him as authentic President, even though he overwhelmingly lost the February 23 Presidential election to President Muhammadu Buhari. BMO said in a statement signed by its Coordinator Niyi Akinsiju and Secretary Cassidy Madueke that the step the former Vice President was taking was a treasonable act that had its dire consequences. “We had in the past drawn attention to the desperation of the failed PDP Presidential candidate to rule Nigeria at all cost and it is becoming more obvious with his latest gambit. “Not satisfied with pushing out cooked-up figures which he and his party claimed they got from the server of the Independent National Electoral Commission (INEC), and are using as the basis of their legal challenge at the Presidential Election Petition Tribunal, Alhaji Abubakar is now using lobbyists in order to con the United States to his side. “We at BMO are not surprised because we had raised an alarm even before the election that PDP elements had been preparing ground for what they called a ‘Venezuelan option’ by instigating the international community against the President Buhari-led administration, and by raising all sorts of false alarms. “And now that news has filtered out that Atiku has hired some prominent American lawyers to lobby the US Congress and the Executive to recognise him as President, it beggars belief that a man who rose to the position of Vice President could be engaged in acts that amount to treasonable felony, especially as the legally authorised body in election matters, INEC, declared that he lost the Presidential election,” the group said. It also pointed that some of the measures being taken by the failed Presidential candidate to win American support is the ploy that he is the man to prevent ‘genocide, poverty, corruption and strife’ in Nigeria. BMO added: “We have seen how banditry has suddenly threatened to spiral out of control in Zamfara State and some other parts of North-Western Nigeria almost immediately after the election. These are places that were relatively peaceful before and during the election and which also had a reasonable turn out of voters. “It should not be a surprise that this spectre of violence is deliberately orchestrated and coordinated as part of a game plan to make the incumbent President look helpless and win US support for the failed PDP presidential candidate who is not even known to be popular in that part of the country “. The pro- Buhari group urged the US authorities to guard against being used by unpatriotic Nigerians to work against an election that their representative in the country had hailed as largely free and fair It said: “Even though Ambassador Stuart Symington had, in the run-up to the election appeared to show some sympathy for the opposition, apparently based on media reports that had been deliberately skewed to present the incumbent in bad light, he was fair enough to rate the election as reasonably credible. “We also need to remind the Americans that the main local election observer group they funded, the Youth Initiative for Advocacy, Growth and Advancement (YIAGA) validated Buhari’s victory as declared by INEC, using a Parallel Voter Tabulation (PVT) compiled by 3,030 observers. “Aside from that, the European Union, UK, France and Russia have since congratulated President Buhari on his re-election with all of them hailing the process as credible and transparent. “We now wonder why Atiku Abubakar would take his desperation to the extent of seeking a Venezuelan-style US intervention in an election that he lost overwhelmingly, and at a time he has filed a legal challenge to the outcome of the election”. BMO also urged Nigerians to be prepared to defend the mandate they freely and overwhelmingly gave to President Buhari in February. Boko Haram: Shettima Speaks Out Come Of Meeting With Defence Minister, Army Chief, DSS DG Police Unveils Abductors Of Lagos Fire Service Boss, 6 others
cc/2019-30/en_head_0010.json.gz/line2780
__label__cc
0.621765
0.378235
United Kingdom of Great Britain and Northern Ireland (the) Canada and partners announce historic investment in education for women and girls in crisis and conflict situations 9 June 2018ReliefWeb Canada, along with the European Union, Germany, Japan, the United Kingdom, and the World Bank, announced an investment of close to $3.8 billion CAD, marking a fundamental shift toward improving access and reducing barriers to quality education around the world. The announcement represents the single largest investment in education for women and girls in crisis and conflict situations. It has the potential to make a difference in the lives of millions of the world’s most vulnerable women and girls. UN chief announces first-ever High-Level Panel on Women's Economic Empowerment 21 January 2016UN News Centre United Nations Secretary-General Ban Ki-moon today announced the first-ever High-Level Panel on Women's Economic Empowerment to provide leadership and mobilize concrete actions aimed at closing economic gender gaps that persist around the world. (-) Remove The World Bank filter The World Bank
cc/2019-30/en_head_0010.json.gz/line2783
__label__wiki
0.505787
0.505787
Deals of the week: Tencent back in the spotlight and AT&T sells Movil interests Just as we were becoming concerned by the lack of activity coming out of China’s hyperactive digital giants, Tencent has broken the tension with a sizeable purchase of a 20% stake in 58.com. Tencent might well be taking advantage of its rival Alibaba’s quiet period in the run-up to its hefty IPO. In other deals, Latin American major America Movil bought back its stake from US telecoms giant AT&T, leaving the companies free to compete in emerging markets. Finally, Belgian media holding De Persgroep bought out struggling UK publisher Mecom Group as London corporate finance turned away from the company. Tencent expands presence in online classifieds Chinese e-commerce major Tencent has further diversified its huge portfolio by purchasing a 20% stake in online classifieds company 58.com for $736 million. The company continues to look for new investments in a Chinese market that has few major interests left untouched by one of three local giants, Baidu, Alibaba and Tencent. Despite a growing interest in foreign ventures, all three companies continue to invest primarily at home. Tencent’s latest deal is aimed at bolstering its online content and increasing its presence in China’s e-commerce sector as it looks to compete more closely with Alibaba. In turn, 58.com is set to benefit from the generated traffic from Tencent’s messaging services WeChat and QQ. The 20% stake amounts to 36.8 million Class A and B ordinary shares. Tencent also hopes the deal will expand the choice of local services and merchants available to Tencent users. Carlos Slim consolidates America Movil ownership Inmobiliaria Carso, the holding company of Mexican billionaire Carlos Slim, is paying $5.6 billion for AT&T’s stake in Latin American telecoms giant America Movil. The move is unlikely to appeal to the numerous voices that have been calling out the monopolistic practices of Slim in the region, as he gains stronger control over the company. However, the deal actually allows AT&T to become a competitor to America Movil in Latin America as it rids itself of a potential conflict of interests and becomes free to focus on expanding recently acquired DirecTV in the region. Penetration of digital services is rising rapidly in dynamic economies such as Mexico, Brazil and Colombia, providing opportunities for providers. Belgian group to buy ailing UK publishing business In another demonstration of the struggling print business, Belgian media group De Persgroep is to buy embattled UK newspaper publisher Mecom Group for $334 million. The UK firm was making heavy losses and could no longer rely on funds coming from London corporate finance. Mecom was founded in 2005 and made aggressive debt-fueled acquisitions across Europe but was caught short when the Eurozone sovereign debt crisis hit the region and print revenues spiraled downwards in the face of online competition.
cc/2019-30/en_head_0010.json.gz/line2786
__label__cc
0.588422
0.411578
We're Coming for You February 27, 2009 Dana Hunter2 Comments No more free lunch for incumbents. No more job security. No more helpless handwringing as you Blue Dogs and spineless gits and corporate bitches get drunk on your own power. There will now be consequences for your actions: Some of the most prominent names in progressive politics launched a major new organization on Thursday dedicated to pinpointing and aiding primary challenges against incumbent Democrats who are viewed as acting against their constituents’ interests. Accountability Now PAC will officially be based in Washington D.C., though its influence is designed to be felt in congressional districts across the country. The group will adopt an aggressive approach to pushing the Democratic Party in a progressive direction; it will actively target, raise funds, poll and campaign for primary challengers to members who are either ethically or politically out-of-touch with their voters. The goal, officials with the organization say, is to start with 25 potential races and dwindle it down to eight or 10; ultimately spending hundreds of thousands on elections that usually wouldn’t be touched. It is a concept bound — indeed, designed — to ruffle the feathers of powerful figures in Washington, in part because the names behind it are now institutions themselves. With $500,000 currently in the bank, Accountability Now will be aided, in varying forms, by groups such as MoveOn, SEIU, Color of Change, Democracy for America, 21st Century Democrats and BlogPAC. FireDogLake’s Jane Hamsher and Salon.com’s Glenn Greenwald will serve in advisory roles, while Markos Moulitsas of DailyKos will conduct polling, with analytical help from 538.com’s Nate Silver. This has been in the works since that FISA fuckery in June. Remember that time? Our vaunted political rulers lined up with Bush and voted an appreciable chunk of our Constitution away. Strange Bedfellows arose out of our anger and disgust, and morphed into Accountability Now PAC. While we weren’t able to defeat Blue Dogs Chris Carney and John Burrows, we surely gave them the shock of their young political lives. And you may have noticed that Steny Hoyer has all of a sudden discovered that it may be a good idea to sound like a Democrat again. All that, before the PAC was even fully functional. 2010’s gonna be interesting, especially for Dems who don’t serve their constituents’ interests. And, lest you think this is just a far-left witch hunt borrowing a page from the Cons, keep this in mind: In a conversation with the Huffington Post, Hauser, Hamsher and Greenwald said that the process by which targeted incumbents were chosen would not constitute an ideological litmus test. The goal, they noted, was simply to follow the numbers: figure out which Members were casting votes that were out of tune, philosophically speaking, with their constituent’s public opinion readings. Granted, we’d love more progressives. But following the numbers means that it’s truly the will of the people that decides. If that means we don’t end up with an ultra-progressive challenger, so be it. Incumbents who aren’t incurring their constituents’ wrath likely have nothing to fear – much. Unless, of course, they pull another stunt like trying to immunize corporations for illegal spying, in which case I wouldn’t count on polling data to save their hides. And if they were planning to stand in the way of broadly popular initiatives, they’re fucked: By empowering the grassroots, Accountability Now will help create the political space needed to enable President Obama to make good on the many progressive policies he campaigned on – such as getting out of Iraq, ensuring access to affordable health care for every man, woman and child, restoring our constitutional liberties and ending torture. In 2007, grassroots activists banded together to oust Al Wynn out of office, and it shook House Democrats to their core. Similarly, we learned in 2006 how even a primary challenge that does not win could change behavior, as Jane Harman has been more accountable to the concerns of her constituents after a tough primary race against Marcy Winograd. It’s going to be interesting to see how this impacts the Washington old-incumbents’ club. As Accountability Now notes, “nothing focuses the mind of a politician on listening to citizens better than a primary.” Change is coming. About damned time. Ba-Boom August 9, 2008 jacob1 Comment As of 8:12 PM Pacific, the AccountabilityNow PAC’s moneybomb stands at $154,302. That’s a fuck of a lot of accountability. Muchos gracias to all who donated. Those who didn’t still can, if they’d like – don’t let the fact it’s not August 8th anymore stop you. Enough of us working together can ensure we’re a force for change. Drop the Bomb August 8, 2008 jacob Let’s make it loud, proud, and unforgettable. It's Not Too Late to Jump Into Bed We’ve settled the difficulties with Jane Hamsher’s elbows, Cujo359’s stopped shedding, and I’ve gotten help with my snoring. There’s no better time than now to join us in bed. There’s 3,240 of us right at the moment. That means your donation doesn’t have to be big to talk big. Why donate, you ask me? Why should I bomb Washington with my hard-earned dough? So glad you asked: The force and power of a moneybomb is simple and straightforward. We all donate on the SAME DAY, and working together we send our political leaders (Democrat and Republican) a freedom message they will never forget. So help us make it work. Pledge today; then come back and donate on the 8th. Let’s show our leaders once and for all that there is a POWERFUL movement here that will settle for nothing less than constitutional governance in America. That’s right. It’s for that poor, abused bit o’ parchment otherwise known as the Constitution of the United States of America. It’s for that document that has stood between us and tyranny for over 200 years. It’s for that hope, and promise, and the rule of law. Some politicians have gotten the idea that once elected, they don’t have a mandate to protect the freedoms and rights enshrined in that document. We beg to differ. Money talks, and we plan to force them to listen. We’re doing it on August 8th for the symbolism: That is the day in 1974 when Richard Nixon was forced to resign from office for his lawbreaking and surveillance abuses. That day illustrates how far we have fallen in this country in less than 35 years, as we now not only permit rampant presidential lawbreaking and a limitless surveillance state, but have a bipartisan political class that endorses it and even retroactively protects the lawbreakers. And if you want to know how your cash will be used, Glenn Greenwald can ‘splain. He doesn’t just sum up. What we’re doing here is no more and no less than changing the way politicians calculate the cost/benefit ratio of their actions. If they realize there’s a steep political price to be paid for shitting upon our constitutional rights and freedoms, they’ll likely choose to shit elsewhere. Those who don’t will rightfully get their arses kicked. The politicians who have enabled Bush to break our laws with impunity, who have extended vast warrantless wiretapping powers without so much as a thought for the Fourth Amendment’s guarantee that we shall be secure from unreasonable search and seizure, who have allowed America to slip-slide down the slope toward a totalitarian surveillance state, need to be made very aware that there are consequences for their actions. Money talks. Our money can make them listen. Bob Barr Endorses the Constitution July 22, 2008 jacob1 Comment It’s no secret I’m thrilled that Bob Barr is running for President. I’m hoping he’ll draw off a good number of reluctant McCain supporters: he’s just conservative enough to manage it. And now I have a whole new reason to recommend him: he’s a privacy advocate who’s decided that FISA is poison to privacy. He’s endorsed the Strange Bedfellows coalition by way of saying, “That’s just about enough unbridled government power, thanks so much:” A lot of media attention has been focused on our privacy or, more appropriately, the invasion of our privacy by the government. The recent law that allows the government to intercept our phone calls and emails without any legitimate probable cause is the most glaring example. Ultimately we lose some freedom with virtually every new law or government regulation, but this particular law, FISA, is the granddaddy of all invasions of our privacy. For the last several years Bob Barr has been fighting the government’s intrusion into our privacy at every step. There have been other organizations standing shoulder to shoulder with Bob. But, the recent focus on the invasion of our privacy has motivated a whole new group of concerned activists to join together in an effort to stop the government’s encroachment into our lives. Some of the names of the organizers of this new group, AccountabilityNowPac, may be familiar to you. They come from a large variety of backgrounds and political beliefs joined in the common interest of protecting our privacy. If you get a chance please take a look at their web site to learn more about them. Feels pretty good to be recognized by a presidential candidate. I hope his stand shames the other two into remembering this little thing called the Fourth Amendment. Maybe then we’ll see that nice, embarrassed shuffle sideways. That delightful, “What FISA fiasco? Oh, that. Yeah, I, uh, now that I’ve had some time to think about it, I’ve realized I was temporarily insane in supporting that idiotic bill. My first act as President will be to kick that bit of legislation to the curb. Yay, Fourth Amendment!” Look, one can dream. Someone Get This Disaster Out of Office July 16, 2008 jacob I suspect Bush is going to spend the next six months doing his level best to destroy everything he can get his hands on. He knows he won’t be leaving a legacy, but scorched earth. He won’t try to turn things around: he’ll play the screaming, spoiled toddler he always does, and break the toys he’s been playing with rather than give them back. Need proof? Digby has the latest in an unbroken string of outrages, coming just after Bush gleefully vetoed the Medicare bill: But this thumb in the eye of doctors and medical providers who dared to oppose his cuts to their paychecks is nothing compared to what his Health and Human Services Department has in store: The Bush administration wants to require all recipients of aid under federal health programs to certify that they will not refuse to hire nurses and other providers who object to abortion and even certain types of birth control. Under the draft of a proposed rule, hospitals, clinics, researchers and medical schools would have to sign “written certifications” as a prerequisite to getting money under any program run by the Department of Health and Human Services. The rule defines “abortion” so broadly that it could also apply to birth control pills and emergency contraception. And because the rule would apply to federal health programs, low-income and uninsured women will be most affected. This is an extension of the “Landmine Project,” to install both personnel and federal rules requirements that would enshrine radical conservative goals inside of government. Even if we have a century of careful, conscientious Democratic rule, I don’t think we’ll be able to undo all of the evil this one spiteful fucktard has done. I hope this man ends up in the Hague for war crimes. I just wish it would happen before he finishes his little project to ensure that Americans don’t get proper healthcare and women end up as chattel in the eyes of the government. Bush should have been impeached in 2006. Cheney should have ended up in prison. Our witless Democrats left them in power, and I’m afraid the cowards won’t have the political will to clean up the mess once they’re gone. We’re going to have to work hard to elect people who have actual spines this time around. We've Lost the Battle – But the War Must Go On So. A travesty of a surveillance bill has passed. The Powers that Be seem to expect the furor to die down now that the FISA amendment’s a done deal. Some former defenders of civil liberties might buy the argument that “I’m not a terrorist, I don’t talk to terrorists, so FISA ain’t nuthin’ to me!” Others contort themselves to find reasons why the new bill isn’t a total “Fuck you!” to the Fourth Amendment. It would perhaps be beneficial to point out that you’re all utterly fucking wrong. There are tremendous good reasons not to let Wednesday’s vote go unchallenged. First, let’s have a look at what broad spying powers have been used for in the past (emphasis added in all): From Wikipedia’s COINTELPRO article: The Final report of the Church Committee concluded: “Too many people have been spied upon by too many Government agencies and too much information has been collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret informants, but also using other intrusive techniques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous — and even of groups suspected of associating with potentially dangerous organizations — have continued for decades, despite the fact that those groups did not engage in unlawful activity. Groups and individuals have been harassed and disrupted because of their political views and their lifestyles. Investigations have been based upon vague standards whose breadth made excessive collection inevitable. Unsavory and vicious tactics have been employed — including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform. Governmental officials — including those whose principal duty is to enforce the law —have violated or ignored the law over long periods of time and have advocated and defended their right to break the law. The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor established procedures for supervising intelligence agencies. Congress has failed to exercise sufficient oversight, seldom questioning the use to which its appropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the judiciary has been reluctant to grapple with them.”[17][18] From Bill Moyers’s journal, regarding Project Shamrock: One important program brought to light by the Committee was Project Shamrock — domestic surveilliance that was subsequently prohibited by FISA. Shamrock was a NSA surveillance program stretching from 1947 to the mid-70’s that involved the copying of telegrams sent by American citizens to international organizations. L. Britt Snider, former CIA Inspector General and council on the Church Committee, describes the project he was tasked to investigate: Every day, a courier went up to New York on the train and returned to Fort Meade with large reels of magnetic tape, which were copies of the international telegrams sent from New York the preceding day using the facilities of three telegraph companies. The tapes would then be electronically processed for items of foreign intelligence interest, typically telegrams sent by foreign establishments in the United States or telegrams that appeared to be encrypted. Shamrock actually predated the NSA, which was created by President Truman in 1952, and began as a continuation of censorship efforts conducted by the the Army Security Agency during WWII. As Fritz Schwarz explains to Bill Moyers, the program began with benign intentions, yet, “if you have secrecy and lack of oversight, you’re going to get abuse.” By the time the hearings began, many estimate the NSA was analyzing 150,000 messages a month. And then there’s the Huston Plan: The Huston Plan was a 43 page report and outline of proposed security operations put together by White House aide Tom Charles Huston in 1970. It first came to light during the 1973 Watergate hearings headed by Senator Sam Ervin (a Democrat from North Carolina). The impetus for this report stemmed from President Richard Nixon wanting more coordination of domestic intelligence in the area of gathering information about purported ‘left-wing radicals’ and the anti-war movement in general. Huston had been assigned as White House liaison to the Interagency Committee on Intelligence (ICI), a group chaired by J. Edgar Hoover, then Federal Bureau of Investigation (FBI) Director. Huston worked closely with William C. Sullivan, Hoover’s assistant, in drawing up the options listed in what eventually became the document known as the Huston Plan. Among other things the plan called for domestic burglary, illegal electronic surveillance and opening the mail of domestic “radicals”. At one time it also called for the creation of camps in Western states where anti-war protesters would be detained. The American Prospect points out another delight in the surveillance smorgasboard: It’s important today to recall that the object of much of the Church committee’s investigation were the abuses the CIA and other intelligence agencies inflicted on Americans here at home. They included the Huston Plan, a proposal to have the agencies infiltrate and disrupt student and other dissenting organizations; Operation HT Lingual, in which the CIA had for 20 years been opening the mail that Americans (including Richard Nixon and Hubert Humphrey) had sent to the Soviet bloc; and other operations that kept files, ran wiretaps, and performed medical experiments on U.S. citizens. Now. Tell me again how giving the government broad, unchecked spying powers is something no law-abiding citizen should ever worry about. “But Dana!” some of you will undoubtedly wail. “Things are different now. FISA still stands – in fact, Barack Obama himself said that this new law ‘restores FISA and existing criminal wiretap statutes as the exclusive means to conduct surveillance – making it clear that the President cannot circumvent the law and disregard the civil liberties of the American people. It also firmly re-establishes basic judicial oversight over all domestic surveillance in the future.’ How could Obama-wan be wrong?” To which I reply, “Glenn Greenwald knows.” And it’s only gotten worse since more information has come out: In the podcast, Jaffer details exactly what warrantless surveillance powers the new FISA bill vests in the President, along with the reasons they are so pernicious. He underscores the extraordinary fact that the surveillance program implemented by Congress yesterday does not merely authorize most of the President’s so-called “Terrorist Surveillance Program” that gave rise to this scandal in the first place, but is actually much broader in scope even than that lawless program, because there is not even any requirement in the new FISA law that the “target” of the surveillance have any connection whatsoever to Terrorism, nor is there any requirement that the Government believe the “target” is an agent of a foreign power or terrorist organization, or even guilty of any wrongdoing at all. As Georgetown Law Professor Marty Lederman wrote today (emphasis his): The new statute permits the NSA to intercept phone calls and e-mails between the U.S. and a foreign location, without making any showing to a court and without judicial oversight, whether or not the communication has anything to do with al Qaeda — indeed, even if there is no evidence that the communication has anything to do with terrorism, or any threat to national security. Those claiming that this new FISA law is just some sort of innocuous or mild extension of the Government’s surveillance powers under the old FISA law should listen to Jaffer’s extremely clear and detailed explanation of what this law really is, how invasive the powers it creates are, and why it tramples on core Constitutional protections. The podcast can be heard here. Scary enough, but of course there’s more. Russ Feingold knows more about the illegal spying program this law is designed to enshrine than we ever will. And he has nothing good to say about this: I sit on the Intelligence and Judiciary Committees, and I am one of the few members of this body who has been fully briefed on the warrantless wiretapping program. And, based on what I know, I can promise that if more information is declassified about the program in the future, as is likely to happen either due to the Inspector General report, the election of a new President, or simply the passage of time, members of this body will regret that we passed this legislation. I am also familiar with the collection activities that have been conducted under the Protect America Act and will continue under this bill. I invite any of my colleagues who wish to know more about those activities to come speak to me in a classified setting. Publicly, all I can say is that I have serious concerns about how those activities may have impacted the civil liberties of Americans. And as if that’s not enough, I’ve got a cherry to put on top: And then there is the entire, unresolved matter of what James Comey was describing when he said that the spying activities in which the Bush administration was engaged for years were so patently illegal and unconscionable that even he, John Ashcroft and FBI Director Robert Mueller — right-wing ideologues all who approved of the lawless “Terrorist Surveillance Program” — all threatened to resign en masse if those still-unknown activities continued. Can you imagine how bad that had to have been? These aren’t leftist ACLU-loving civil libertarians we’re talking about here – quite the opposite – and even they couldn’t stomach what Bush was getting up to. Those lawsuits that just got shut down by retroactive immunity were our best chance of finding out just what was done in the name of national security. Digby has a chilling conclusion to make: We will have no way of knowing if or how they are using these powers to “preserve the nation” (In the days after 9/11 we know for a fact that they did use them to monitor dissenters.) Presidents will undoubtedly be tempted to use them for political purposes under that doctrine, just as Nixon did, if the populace ever becomes that vociferous again. Who knows what “preserving the nation” will mean next time? Whatever doesn’t kill the authoritarian beast only makes it stronger. We’ll be dealing with the fallout from this for yet another 30 years. Indeed, this time it may just stick forever. We ain’t letting it. No fucking way. The ACLU filed suit against the new law within an hour of Bush signing it. You can show your whole-hearted support for their effort to derail this travesty of a bill by pledging a small monthly donation here. You can sign their newspaper ad here. The Electronic Frontier Foundation is also filing suit on a complimentary front. Support their efforts here. And you can join me and my Stange Bedfellows in bed here. Trust me in this. We can make a difference. We just have to make enough of a ruckus so that we’re impossible to ignore. Our civil liberties depend on it. Look Who Dana's Sleeping With! July 9, 2008 jacob3 Comments It’s a little hard to see, but this is what I found when I was looking for my name on the Strange Bedfellows list: That’s right. I’m sleeping right next to this fellow: I was delighted to discover Slobber and Spittle camped so close to En Tequila Es Verdad. We’re not strange bedfellows at all: we share many of the same viewpoints, especially regarding the outrage that is the new FISA legislation. Which is what makes us Strange Bedfellows, o’ course. You can jump into bed with us, too. All you have to do is sign up. And there you’ll be, cuddled up with a bunch of folks who take their Constitution seriously, no matter what part of the political spectrum they happen to hail from. Look at that face. Can you resist that face? You know you can’t. You could do a lot worse than end up in bed with Dana, Cujo359, Glenn Greenwald, Jane Hamsher, and a whole passel of other folks who are passionate about civil liberties. Heh. Passion. And you see the rich possibility for innuendo here, right? Update: Slightly clearer version, courtesy of Cujo359 himself!
cc/2019-30/en_head_0010.json.gz/line2790
__label__wiki
0.705025
0.705025
Village People – North Ferriby United on Wednesday 30th December 2015 14:13 PM My footballing year started on New Year’s Day with a dilemma as to where to head to. AFC Goole or North Ferriby United. A toss of a coin some 362 days ago determined our destination for the first game on 2015, The Victoria Pleasure Grounds in Goole, where we watched a 1-1 draw against Lincoln United. Almost a year on and as we headed across The Humber Bridge we had the same options. That was until Northern Steve checked the Interweb and discovered that The Amateurs (Lincoln United for those unfamiliar with step 8 team nicknames) game at Goole had fallen foul to the weather. North Ferriby United v Bradford Park Avenue it was to be then. It’s been quite a year for The Villagers. Their penalty shoot out win over Wrexham at Wembley Stadium in the FA Trophy gained them national headlines, then just a few weeks later owners Eman and Steve Forster, Daughter and Son-in-Law of Hull City’s multi-millionaire owner Assem Allam announced they would be selling up, throwing the club into chaos. Their investment into the facilities and squad gave the club a clear advantage, allowing them to compete with clubs with much bigger resources. Their average attendance is just over the 300 mark and shows just how much the club has to fight to compete with the likes of Stockport County or FC United of Manchester who average crowds nearly 10 x the size. During the summer the owners had a change of heart, deciding to stay put and that appears to have spurred the team on to push for promotion to Conference National. Prior to this game they sat in 3rd place, just two points off the top of the table and on a decent run of form, although nobody wants to remind them about the defence of the trophy they proudly have on display at the ground, losing 2-1 in the FA Trophy First Round to Stocksbridge Park Steels from the Evostik League South. The first thing that strikes you driving into North Ferriby is that it is tiny. A one pub, two church village sitting on the banks of the Humber Estuary with a population of 3,893 to be precise and once the home to William Wilberforce. Wilberforce, a man who fought against all the odds to see his dream of a slave-free British empire come to pass, would certainly approve of the dogged approach The Villagers are taking to make their mark on Non-League football. The approach to the ground is still very county league – down an unlit lane alongside the allotments. After a brief visit to the club shop to pick up some Official North Ferriby fizzy rings, the smell from the snack bar enticed us. “Sorry luv’, we’ve not got any cheese for the cheesy chips. I can do you them with gravy but they won’t be called cheesy chips?” Who were we to moan? Pre-match got even better when we were invited into the boardroom to “meet” the FA Trophy himself, possibly the biggest football trophy I’ve ever got my hands on and approximately 7 times larger than the UEFA Intertoto Cup which is still on display in the boardroom at Upton Park. The crisp Humberside air was frequently punctuated by the rattle of a train passing above the far-side stand. Ironically, the last ground I went to where the game could be watched from a passing train carriage was Goole’s Victoria Pleasure Grounds. I’m sure there is a whole book out there somewhere, combining two of the least social past times. There was a decent crowd in for the visit of Bradford Park Avenue, although it appeared the visitors hadn’t brought any fans with them, until I realised Bradford normally played in green and white, the same colours as North Ferriby United. Bradford FC, as they are often referred to, are one of 35 clubs to have played in all four of the top tiers of English football, although they are along way from being able to compete at that level again. The original club which competed in the Football League were replaced by Cambridge United in 1970 after failing to gain re-election and folded a few years later. The new club have climbed up from the very bottom of the county league structure, and should be applauded for how far they have come, joining the Conference North in 2012. Formalities over, it was time to enjoy the final game of 2015, cup of tea in one hand, non-cheesy gravy soaked chip in the other. North Ferriby United 1 Bradford Park Avenue 0 – Grange Lane – Monday 28th December 2015 This was one of those games that for an hour seemed as if it was destined to be goal less. Despite the efforts of both teams, and the antics of both keepers, the goals seemed to be living charmed lives. It is always interesting watching other Non-League clubs and trying to assess how we would fare against them. North Ferriby’s centre-forward, the giant Tom Denton, may have looked like a stereotypical target man but the home side’s approach play was more subtle than that. Denton threw himself at everything and if I was allowed to bet on football I would have had a tenner on him being he opening scorer. Northern Steve, who can bet on football, suggested that it would be a waste of a tenner and backed Stoke City v Everton to have less than 1.5 goals. The second half saw both teams have chances in the opening exchanges. That man Denton should have done better when he was unmarked in the box but he put too much force into his downward header and it bounced over the bar. However, he was on target in he 64th minute, finishing off a superb run and cross from Middleton. Alas, the full back got himself sent off ten minutes later with a needless tackle from behind on the touchline that saw the referee brandish a second yellow. Despite having the one man advantage Bradford PA couldn’t breakdown the stubborn North Ferriby defence in the last 15 minutes and the final whistle brought relief more than anything from the 500 plus crowd, as well as three vital points in their push for the top spot. Despite the hype around the off-the-field set up at North Ferriby United you couldn’t visit a nicer club. Everyone we met seemed to be proud to work for the club and the danger here could actually be promotion to a higher level. Having seen what the step up actually means in terms on infrastructure for a club at this level I’m not sure they are ready for it yet. Having to handle the logistics for the visit of Stockport County and FC United of Manchester twice in a season is very different to having to arrange segregation and policing for every home game. But that’s the pay off for progress I guess. At last, the wait is over… Apart from my trip to the dark side a few weeks ago to watch the New York Red Bulls, my season ended over two months ago. Last season I managed to shoe-horn in 104 games in 14 countries ...
cc/2019-30/en_head_0010.json.gz/line2794
__label__wiki
0.72061
0.72061
Book Review: How to Change Your Mind: The New Science of Psychedelics by Michael Pollan by Barbara the Bibliophage | Aug 10, 2018 | LEARN: Everything Else | 0 comments To learn what the latest Michael Pollan book, How to Change Your Mind, is about just check out its subtitle: What the New Science of Psychedelics Teaches Us About Consciousness, Dying, Addiction, Depression, and Transcendence. Pollan creates an epic book. It’s part memoir, part history, and part science and medicine text. Pollan interweaves each of these elements seamlessly. He uses this style often and it should be familiar to fans of The Omnivore’s Dilemma, for one. But don’t expect it to be studious or boring. The fabric of this book is just as colorful as 1960s tie dye. It spins and wiggles. Most of all, now I think completely differently about the positive potential of psychedelic drugs. You might think LSD or Magic mushrooms began with Timothy Leary and “Turn On, Tune in, Drop out.” In fact, mushrooms with psychoactive capabilities have been used since ancient times. And LSD was developed decades before Leary in a completely scientific setting. Pollan explains both origin stories thoroughly. Through the last 50-60 years, public perception of psychedelics has shifted back and forth. Of course, they’ve been illegal in the U.S. since 1966. But people also use them to assist in spiritual and emotional journeys, both before and since then. Originally the psychological community embraced their potential. And now that same group is also contributing to the future of psychedelics. Many other types of scientists have investigated the role of psychedelics in life as we know it. For example, one theory aims to prove that apes ingesting psilocybin led to changes in the hominid brain, including societal bonding and analytical thinking. It’s called the Stoned Ape Theory. Psilocybin is the psychoactive drug compound found in over 200 types of mushrooms. Researchers are studying various psychedelics for medical purposes, according to Pollan. Multiple respected institutions have conducted drug trials to investigate these possibilities. One example is giving psilocybin “to terminal cancer patients as a way to help them deal with their “existential distress” at the approach of death.” Additionally psychedelics are being tested for use with patients whose depression is both major and intractable. Pollan intersperses research information with stories from study participants, which adds both relevance and gravitas. Pollan also tries mightily to describe his own various experiences with psychedelics. All the while he says that words fail to adequately describe his experiences. His explorations explain the advantages of “guided journeys” for introspection and spiritual advancement. Rather than randomly ingesting psilocybin, there’s a lot of logic to creating some ceremony and having other (non-ingesting) people around to keep you safe. Those “guides” also serve to help “ingesters” to emotionally process and integrate their psychedelic journeys. This structure harkens back to the way hallucinogenic substances have been used for centuries. I had many laughs at Pollan’s stories. In one, he’s with an expert hunting for a certain type of mushrooms called azzies. “We’re obviously not the first people to hunt for azzies in this park, and anyone who picks a mushroom trails an invisible cloud of its spore behind him; this, he believes, is the origin of the idea of fairy dust. At the end of many of those trails is apt to be a campsite, a car, or a Winnebago.” Having ready many fantasies set in the fairy world, this seems oddly logical to me. More than the laughs, I gained true insight into the nature of these psychedelic journeys. Pollan balances the science and history expertly with the more groovy aspects of his book. I received a digital advanced reader copy of this book in exchange for this honest review. Many thanks to NetGalley, Penguin Press, Penguin Random House, and most importantly, Michael Pollan for the opportunity.
cc/2019-30/en_head_0010.json.gz/line2797
__label__cc
0.670546
0.329454
Pharrell Buys Tyler Perry’s Los Angeles Mansion [PHOTOS] Pharrell Williams is now the proud owner of a gorgeous mansion that was formerly owned by famed director Tyler Perry. According to The Blast, the “Lemon” creator recently purchased the 17,000 square-foot property on May 11 for $15.6 million. Perry originally bought the property in 2017 for $14.5 million, so he can flip it. The filmmaker had it on the market for $17 million but cut Skateboard P a deal and walked away with a $1 million profit. The luxurious mansion boasts ten bedrooms, 11 bathrooms, a huge swimming pool, tennis court, outside dining area and a Koi pond that flows through the entire compound. The home is also surrounded by large glass windows that give a complete bird’s eye view of the mountains and hills. There’s even a rock sculpture outside near the entrance. Overall, Pharrell and his family will be bouncin’ around bouncin’ in their new home. Take a look at photos of Pharrell’s new palace below. Check Out Pharrell's New Home Once Owned By Tyler Perry 15 Rappers Who've Only Gotten Better With Age Filed Under: Pharrell, Pharrell Williams, Tyler Perry Categories: Hip-Hop, Photo Galleries, Photos
cc/2019-30/en_head_0010.json.gz/line2801
__label__cc
0.605466
0.394534
- The Energy Mix - https://theenergymix.com - Wildfire Leaves Fort McMurray with Higher Rates of Depression, Substance Abuse, PTSD Posted By Alexandra Bly In Canada,Drought, Famine & Wildfires,Health & Safety,Sub-National Governments | Full Story: Canadian Broadcasting Corporation @CBCNews Primary Author Bob Weber/The Canadian Press @row1960 peter_pdp/Instagram A paper in an international journal is pointing to increased rates of depression and related mental health problems in Fort McMurray, almost exactly 2½ years after a ferocious wildfire nicknamed “The Beast” tore through the town and forced the entire population to evacuate. The paper in the International Journal of Mental Health and Addiction “suggests the fire cast a lasting shadow over the lives of many residents,” CBC reports. “But the research also revealed a way to help dispel the darkness.” SUBSCRIBE [1] Vincent Agyapong, the psychiatrist and University of Alberta professor who produced the study, was in Fort Mac when the fire hit. He assisted patients at the local hospital before evacuating himself. “When he returned to his clinical practice in the city, after the immediate chaos subsided, he realized he had a chance to learn something about resilience,” CBC states. A previous study had placed the rate of probable post-traumatic stress disorder (PTSD) of 12.8%, far above the provincial average. Six months after the fire, the survey found that nearly 15% of respondents—17% of women and 10% of men, compared to a province-wide rate of 3.3%—had some kind of major depressive disorder. As well, “we found that those who presented with (depressive disorder) were far more likely to present with alcohol use disorder and substance use disorder, as well as nicotine dependence,” Agyapong told CP. “We found out 15% fulfill the criteria for an alcohol use disorder and nine per cent fulfil the criteria for a substance abuse disorder. These are large numbers that we cannot just discount.” The study pinpointed human contact and support as the most important factor in protecting people from depression and keeping them resilient. “Receiving support from family and friends can actually protect you from possible major depressive disorder,” Agyapong said. “Those who reported they received no support were about 13 times more likely to present with a major depressive disorder compared to those who reported they received high levels of support.” That means it’s “important for the community to pull together and for family members, friends, and relatives of people to actually reach out to them on the phone and offer every practical help that they can be able to offer,” he added. “It’s not just help in the moment. It’s also help that’s going to protect their mental health down the line.” Alberta Health spokesperson Kirsten Goruk agreed that “wildfire disasters are associated with a negative impact on the mental and physical health of those affected, and those effects can be delayed in onset and can persist over several years.” She added that “recovery takes time, and some residents are still in various stages of recovery.” Article printed from The Energy Mix: https://theenergymix.com URL to article: https://theenergymix.com/2018/11/05/wildfire-leaves-fort-mcmurray-with-higher-rates-of-depression-substance-abuse-ptsd/ [1] SUBSCRIBE: http://eepurl.com/Z7ZCr Copyright © 2017 The Energy Mix. All rights reserved.
cc/2019-30/en_head_0010.json.gz/line2805
__label__cc
0.67778
0.32222
Death, Love, Mystery, and Myth: Little Words and Mighty Swords By Bradley J. Birzer|2018-11-15T17:04:53-05:00September 1st, 2010|Categories: Books, Bradley J. Birzer, Featured, G.K. Chesterton, Literature| My talk today is about death, love, mystery, and myth. G.K. Chesterton wrote some of most stirring words of the past century in his “Ballad of the White Horse.” The Men of the East may search the scrolls, For sure fates and fame, But the men that drink the blood of God Go Singing to their shame The wise men know what wicked things are written on the sky, They trim sad Lamps, they touch sad strings, Heaving the heavy purple wings, Where the forgotten seraph kings Still plot how God shall die.[1] Out of the mouth of the Mother of God like a little word come I; For I go gather Christian men from sunken paving and ford and fen, To die in battle, God knows when, By God, but I know why. And this is the word of Mary, The word of the world’s desire: “No more of comfort shall ye get, Save that the sky grows darker yet and the sea rises higher.” Then silence sank.[2] Though it was ostensibly a poem about an event in the ninth century, King Alfred’s valiant defense of the Christian Anglo-Saxons against a massive invasion by barbarian infidels, “The Ballad of the White Horse” really served as a thinly veiled, gallant call to arms for those who would have to suffer through the miseries and pains of the twentieth century, the deadliest century in the history of the world. Though Chesterton wrote the poem before the horrors began, he prophetically believed that a world that was embracing the materialism of Marx, Freud, and Spencer would only come to ruin. Indeed, the twentieth century was one that witnessed the flourishing of the vast filth and blatant inhumanity of the killings fields, the holocaust camps, and the gulags. Whether in the camps of the European or Asian ideologues, some humans, convinced of the righteousness of their cause, viewed all other human persons as nothing more than a collection of parts, ready to be dismembered and reassembled in Picasso-esque fashion, or perhaps simply quartered and then quartered again. Armed with the ideological doctrines of fascism, National Socialism, and Communism, the twentieth-century became a century of the inverted vision of Ezekiel: wheels within wheels, endlessly spinning, the abyss ever expanding, ever within reach. The names of the ideologues may have varied, but they were all of the same stripe, and, in the end, they will most likely arrive in the same place, their names absent from the Book of Life. And to them, I say “good riddance, may justice be done.” Each denied the uniqueness and dignity of the human person, seeing him or her not as Imago Dei, in the image of God, but, instead, tragically, as only a means to an end; nothing but a cog in a vast machine, and the system—as all systems are wont to do—run amok. Indeed, with modernity and its many servants, the Logos wept, and in marched the new gods: Demos, Leviathan, and Mars. And, they quickly took possession of the field, claiming victory, and setting up their supposed utopias, based on race, class, or any other fanciful human notion. Once we have overturned history and superstition, the new prophets of the new gods argued, we should start at the year zero. Once this has been accomplished, man—or at least certain men—might attain godhood—and the apotheosis began. And, then…the terror reigned. No bright and creative utopias of liberated individuals flourished. But, instead, the specter of cold, brutal, and endless death. Indeed, in the twentieth century, the vivid colors of the glorious reality of Creation became the dull grays of conformity, and, then, very quickly, with failure after failure to perfect the man or woman, the bright reds of blood became one with the browns and blacks of mud; an unholy, coagulating, turbid muck. Those four colors: gray, red, brown, and black define the previous century. The new gods—Demos, Leviathan, and Mars—demanded many sacrifices, and their murderous appetites seemed insatiable. Their toll of deaths in the twentieth century overwhelm our imaginations and steal much of our innocence away from us: 200,000,000—by the latest count, but more are being unearthed—human beings, each created uniquely in a certain time, in a certain place, for a certain purpose. For, nature makes nothing in vain. But, we have no room to breathe a sigh of relief that we have left the twentieth-century. For, the new gods have not departed; they have simply taken on new names. For certainly the killing has not ceased simply because we’ve entered a new century. The brave new worlds continue. The twentieth century witnessed the greatest slaughter in history, but the twentieth-first century has continued apace: with 160,000 Christians being murdered per year since 1991. Shockingly, over 65% of all Christian martyrdoms in the past 2,000 years have occurred in the last 86 years! T.S. Eliot described it best in his dramatic homage to St. Thomas A Beckett, with the Chorus: Now I fear disturbance of the quiet season: Winter shall come bringing death from the sea, Ruinous spring shall beat at our doors, Root and shoot shall eat our eyes and our ears Disastrous summer burn up the beds of our streams And the poor shall wait for another decaying October. Why should the summer bring consolation For autumn fires and winter fogs? What shall we do in the heat of summer But wait in barren orchards for another October? Some malady is coming upon us. We wait, we wait, And the saints and martyrs wait, for those who shall be martyrs and saints. Destiny waits in the had of God, shaping the still unshapen: I have seen these things in a shaft of sunlight. Destiny waits in the hand of God, not in the hands of statesmen Who do, some well, some ill, planning and guessing, Having their aims which turn in their hands in the pattern of time. Come, happy December, who shall observe you, who shall preserve you?[3] And, yet, despite the optimism of the end of Eliot’s chorus, many in the past century waited and waited for December to come, the blessed moment of the Incarnation to celebrate. For many citizens of the past, foul century, though, waiting, longing, and suffering under the reign of the new gods, Good Friday represented far more than Christmas. The blood of the martyrs built the Church in the first several centuries AD. What will the blood of the twentieth and twenty-first century martyrs build? Absolutely nothing, if we forget their sacrifice. And, even worse, less than nothing if we mock their sacrifice. As Americans, we too easily forget or ignore their sacrifices in our historical memory—after all, it happened “over there, somewhere in Europe and Asia, and they’ve always had problems.” Or, so we comfort ourselves even as our Mexican brethren, connected to us by a very long—if often permeable—border suffered some of the worst excesses of attempted genocide between 1917 and 1930. But, Chesterton gave us words of hope. The little words. What are they? Who are they? The Word is obvious—that which and who Created the World, that Which and Who Entered the World; that which Redeemed it; that which conquered Death; that which will one day bring all things back to right order. The stoics and Christians know it as the Logos; the Jews as the Memra who will come. So, in our own ways, we may each understand “the Word.” But, again, what about Chesterton’s Little Words? Well, you are a little word, and I am a little word. Each person behind me is a little word. Each one of us is glorious in that we are Imago Dei. It is a terrible burden, and an awesome grace. For, as little words, we are called to sacrifice. Not others—as the ideologues of the twentieth and twenty-first century believe—but our very selves. This is not mere theory, mere wishful thinking, or mere romanticism. This is reality. And, we can find evidence for it throughout history. Indeed, the West itself, is the product of sacrifice: the sacrifice of 300 Spartans at Thermopylae. When the last Greek died at the Gates of Fire, the West was born. We see it in Jesus Christ, as the greatest exemplar of sacrifice. Others, though, in the classical and Christian world followed his example, before and after the Incarnation: Leonidas, Socrates, Cicero, Sts. Peter and Paul, Stephen, Felicity, Perpetua, and Boniface; Sts. Thomas A Becket, Thomas More, and John Fisher; the many men of the Continental Army and Patriot movement of the 1770s and 1780s; the 620,000 men who gave their lives for a better republic in the American Civil War; and the many men who served their country and their faith in WWI, WWII, Korea, Vietnam, and the 2 Gulf Wars. And, most recently, who can forget Tom Burnett—that 38-year old Wall Street Banker, father of three girls, husband to a beautiful wife, and a devout Christian. This man, a former college football player for St. John’s College in Minnesota, a lover of business as well as of ancient Greek philosophy, helped two other courageous western men drive a jet airliner into rural Pennsylvania soil on a clear September morning, 2001. “We’re all going to die, but three of us are going to do something about it. I love you honey.” These were the last words his wife heard over the cell phone. What better words could serve us in a new century? But, at heart, we must ask: what is sacrifice? Is it always blatant heroism? In the City of God, St. Augustine tells us that the early Church refused to use the word “hero,” for it was a pagan term involving will power. But, he conceded, if the Church were to appropriate the word, it would have to give it to the martyrs. For, what is sacrifice, but the highest form of love, nothing more and nothing less. And, Love is the force that created the universe, animates all things, and, in its own time, bring all things back to right order. We see it everyday and in every moment of history. We see it in the many western martyrs mentioned above. I see it in the vast dead of the twentieth-century, most of whom are forgotten, many of whom simply disappeared into the shadow worlds of the Gestapo and KGB. In the words of Eliot’s chorus: Even in us the voices of seasons, the snuffle of winter, the song of spring, the drone of summer, and voices of beasts and birds, praise Thee. We Thank Thee for Thy mercies of blood, for Thy redemption by blood. For the blood of Thy martyrs and saints shall enrich the earth, shall create the holy places. For wherever a saint has dwelt, wherever a martyr has given his blood for the blood of Christ, There is holy ground, and the sanctity shall not depart from it Though armies trample over it, though sightseers come with guide-books looking over it… From such ground springs that which forever renews the earth.[4] But, love is not dead, and it is certainly not about death. Immensely far from it; for love conquers death. And, I, right here and right now, see love in front of me, and I see it behind me. I see it to my right, and to my left. For love is ultimately quite simple, and it comes in a variety of different packages. In its highest form, it is the willingness to lay down one’s life for another. But, it is also the willingness to change the baby’s diaper at three in the morning, when one’s spouse would like to sleep. It is the willingness to follow the lead of a college professor of rhetoric and classics to fix bayonets and charge down a Pennsylvania hill on a hot, humid July afternoon in 1863. It is also the willingness to forgo a Friday evening party because the person in the dorm room next to yours needs someone to talk to, right then and right there. For, each one of us is called to love. Nature makes nothing in vain. For, no one is made for this earth. . . To be an exemplar of pride, covetousness, lust, anger, gluttony, envy, or sloth no one is made to live a quiet life of desperation no one is made to be a mere player on a stage no one is made to be a cog in a machine For, no one is made to be a means to some earthly end For, no one is made to be a consumer; merely choosing between Wal-Mart and Target; between Pepsi, Coke, and R.C. For, no one is made to spend his time in front of the TV Instead, we are called to prudence, justice, temperance, fortitude, faith, hope, and love. We are called to be extraordinary in ordinary situations. We are called to greatness. We are, after all, Imago Dei, each a little word. As I look back over the past two thousand years of civilization, I see three profound gifts, each a sword, ready to aid us. The first is Romano-Celtic. A lady of supreme beauty rises from a lake, and she bequeaths—temporarily—to a young Celtic man with an unlikely, non-Celtic name of Arthur, the Sword of the Roman Duke of Britain, Excalibur. With it, he is to restore order to his kingdom, under siege from within and from without. He forms his company of warriors, marries the stunning Guineivere, and creates the kingdom he was meant to create. But, fallen men behave in fallen ways, and Arthur’s men are offered the supreme choice: worldly, false beauty or otherworldly, true beauty; Guinevere or the Holy Grail, the cup of the Last Supper. Even the Sword of the Lady of the Lake can not attenuate such a choice. Lancelot chose poorly, Galahad chose wisely. Divided, the kingdom dies. For my second sword, I choose a blade forged in the mythical fires of the first age of the world. A short blade, its purpose is to vanquish the world of incarnate demons. Toward the end of the third age of the world, two unlikely suffering servants, Frodo and Sam, journeyed into Hell itself, carrying the Ring of Power, the burden of the world, to its doom. The guardian at the gates of hell, Shelob, the unholy spawn of an evil of the ancient world, traps the two. Frodo unsheaths the sword, Sting, and says bravely to Sam, “Come, let us see what Sting can do. It is an elven-blade. There were webs of horror in the dark ravines of Beleriand where it was forged.” When Shelob gets the best of Frodo, Sam takes up the sword. As Tolkien wrote, “Sam did not wait to wonder what was to be done, or whether he was brave, or loyal, or filled with rage. He sprang forward with a yell, and seized his master’s sword in his left hand. Then he charged. No onslaught more fierce was ever seen.” But, even with his small victory, all seemed lost, for Frodo was most likely mortally wounded. And, yet, not all was lost. Deep within Mordor, “Sam saw a white star twinkle for a while. The beauty of it smote his heart, as he looked up out of the forsaken land, and hope returned to him that in the end the Shadow was only a small and passing thing: there was light and high beauty forever beyond its reach.”[5] Sam saw Beauty; such Beauty demonstrated for him the permanence of the Good, and he fought for the truth of the One, the One who created all things and Who allows us the privilege of being little words, agents in His Grand Story. Sam’s hope is the hope that springs forth from the Grace imparted by the Incarnation, the Death, and the Resurrection of Christ. It is the hope that reminds us that the baptized must sanctify the world and “redeem the time.” It is the hope that reminds us that God makes nothing in vain, and that Grace and Grace alone perfects fallen and sinful nature. It is the hope that each one of us is born in a certain time, and a certain place, for a certain purpose. It is the hope that reminds us that we mean something, that God loves us so much that He blessed us by making us a part of His Story: the story that began when He spoke the Universe into Existence; the story in which The Father sent His only Son to live with us for 33 years, fully God and fully man, to teach, and then to suffer, and then to die on a piece of Wood, betrayed by even his closest friends. But St. John remained. And from the cross, Jesus turned to His Mother, and said, “Behold your son.” It is the hope that Mary and St. John held in their hearts. It is the hope that comes after three days of anxiety, gripping frustration, and utter despair, as the women at the tomb understand that the One they mourned conquered Death, ransoming us from our own follies for no other reason than. . . Love. Indeed, it is the hope that all things are created and animated by the Love of the Spirit. Love is, after all, the greatest force in the Universe. Even Samwise Gamgee, the mythical Hobbit living in a pre-Christian world—the land between heaven and hell, this Middle-earth— understood that. And, so should we. Let not future generations say of us: we slept. Instead, may they remember us as those who fought the good fight for the Logos and for humanity. Let it be said that in the twenty-first century we took up either of our mythically-laden swords and wielded them with all the force imaginable. We would be blest indeed if a future historian wrote of us: “No onslaught more fierce was ever seen.” Just as the Enemy arrives in new packages and in a variety of different forms throughout time, so too does the Army of the Logos. As with Arthur and Sam, each little word—you and I—arises at the time he or she is most needed. And, we are each lent the weapon which we will best wield. Understood properly, we should come to realize that each sword is the embodiment of the same sword, and that the damage it inflicts upon the Enemy is vast and incalculable. When we understand that Excalibur and Sting are one and the same, we will hold in our hands the third sword: the Sword of the Spirit, the sword of love. And, through Grace, we will conquer. This address, “Little Words and Mighty Swords,” was originally delivered at the spring 2004 Hillsdale College convocation, March 18, College Baptist Church, Hillsdale, Michigan. Chesterton, The Ballad of the White Horse, 15-6. T.S. Eliot, “Murder in the Cathedral,” 176-77. T.S. Eliot, “Murder in the Cathedral,” 221. Tolkien, The Return of the King, 199. About the Author: Bradley J. Birzer Bradley J. Birzer is the co-founder of, and Senior Contributor at, The Imaginative Conservative. He is the Russell Amos Kirk Chair in History at Hillsdale College and Fellow of the Ronald Reagan Presidential Library. Dr. Birzer is author of In Defense of Andrew Jackson, Russell Kirk: American Conservative, American Cicero: The Life of Charles Carroll, Sanctifying the World: The Augustinian Life and Mind of Christopher Dawson, J.R.R. Tolkien’s Sanctifying Myth: Understanding Middle-Earth, co-editor of The American Democrat and Other Political Writings by James Fenimore Cooper, and co-author of The American West. AHR Sep 1, 2010 at 8:50 am - Reply Gilbert Magazine did a disservice to humanity by failing to publish this important speech. Ray Schneider Jan 9, 2013 at 4:48 pm - Reply It would have been a good piece in Gilbert … did someone call their attention to it? Brad Birzer Jan 10, 2013 at 6:40 pm - Reply Ray, thanks. I tried to get a hold of them year ago, but gave after a while. Frankly, I lost interest in the magazine entirely after this. Though, I certainly wish it well! Glad to have Winston's TIC!!! Steve Jan 15, 2013 at 10:40 pm - Reply A very important piece for this day, and the days that follow. John Krueger Feb 15, 2013 at 8:35 am - Reply Nine years later, we do our killing with drones, GPS, and mockery of anything resembling values. Indeed, one can have it all – cradle to grave government freebies, abortion on demand, and enough “safe” prescription drugs to stay stupid and addicted for a lifetime. The only stance against this cultural rot is to continue telling the truth. Whether your speech ever got to a magazine, at least a few hundred people got a dose of the truth that day, and I got a reminder of it this morning. Thanks for your strong words.
cc/2019-30/en_head_0010.json.gz/line2806
__label__cc
0.572171
0.427829
Welcome to ABC Radio National. Skip to: RN Navigation RN Search RN Content Programs beginning with 0 Programs beginning with A Programs beginning with B Programs beginning with C Programs beginning with D Programs beginning with E Programs beginning with F Programs beginning with G Programs beginning with H Programs beginning with I Programs beginning with J Programs beginning with K Programs beginning with L Programs beginning with M Programs beginning with N Programs beginning with O Programs beginning with P Programs beginning with Q Programs beginning with R Programs beginning with S Programs beginning with T Programs beginning with U Programs beginning with V Programs beginning with W Programs beginning with X Programs beginning with Y Programs beginning with Z AWAYE! Background Briefing Best Of The Festivals Blueprint for Living Boyer Lectures RN Breakfast Country Breakfast Current Affairs Specials Download This Show RN Drive Earshot The Economists God Forbid Great Moments In Science Health Report The History Listen Ideas (CBC) It's Not A Race Late Night Live Law Report The Minefield The Music Show The Naked Scientists The Party Room The People Vs The Philosopher's Zone Rear Vision Religion and Ethics Report Saturday AM Saturday Extra Science Friction The Science Show The Screen Show Shooting The Past Soul Search The Stage Show Stop Everything Sum Of All Parts Sunday Extra This Working Life Who Runs This Place? World Docos World Business Report ABC Radio National Search RN The contingent workforce and the growth of digital taylorism Broadcast: Sunday 28 August 2016 10:30AM (view full episode) Image: Work will be more mobile and flexible in the future; but also less secure. (Seth Werkheiser / Flickr CC BY-SA 2.0) Around 86 percent of all new jobs created in Australia over the past twelve months were part-time; while in the United States estimates suggest that around 40 percent of the workforce are now employed on temporary contracts. The size of the so-called “contingent” workforce is on an upward trajectory. We explore what’s driving the trend and what it means for employees. And is a digital form of “taylorism” also on the rise? Professor Phillip Brown from Cardiff University says yes and he explains why. Nearly 90 per cent of the jobs created in Australia over the last 12 months were part-time or casual. Are promises of 'freedom' and 'flexibility' an illusion? Antony Funnell: Here's a term you may or may not be familiar with—the 'contingent workforce'. And here's a definition. Wikipedia will do: Reading: A contingent workforce is a provisional group of workers who work for an organisation on a non-permanent basis, also known as freelancers, independent professionals, temporary contract workers, independent contractors or consultants. Antony Funnell: And the contingent workers are among us. You might be one yourself, or will be soon. Hello, this is Future Tense, I'm Antony Funnell and today's show is about future employment trends. Just a few days ago the Australian Bureau of Statistics released labour force data showing what The Age newspaper's economics editor Peter Martin describes as a 'continuing slide' in the number of full-time jobs in Australia, a 'hollowing out' of the jobs market. The employment figures he was referring to for the month of July saw the number of full time positions in Australia decrease by around 45,000, while part-time employment numbers went up by more than 71,000. According to Bill Mitchell from the Centre for Full Employment and Equity at the University of Newcastle, Australia is now well on the way to becoming 'a nation of part-time employment growth with all the attendant consequences'. And he's pointed out that in the past 12 months, 86% of the total net jobs created in Australia were part-time in nature. But Australia isn't unique in that respect, just ask US employment and jobs expert Kevin Wheeler, who regularly speaks around the world about the changing workforce and employment dynamics. Kevin Wheeler: I think there's no doubt that the growth of this so-called contingent workforce is continuing to grow. I know it's significantly large in Australia. It's quite large here in America, probably approaching close…between 30% and 40% of the workforce is in that contingent workspace. And clearly those people in that space have less security, have less certainty around the benefits and so forth that they receive. But on the other hand they are vastly more liberated from the constraints of the work environment. They can choose their place of work, their hours of work, what they actually do for work, who they choose to work with or for. So it is very liberating for those people, but they trade the liberation for less security. It's really an equation almost between do you give up freedom and choice for security, how much of that are you willing to give up? I think we are going to live in a world where we are going to continuously have a group of people who really want to be liberated, who want the choice, who want freedom, and you're going to live with a group of people who really do seek security. And I think for certainly the next 20 years we are not going to see that secure job completely disappear, but it's certainly going to shrink and become a smaller portion of the workforce. So if we look back 10 years ago, probably 90% of the workforce at least was in that permanent kind of job arrangement. I think you're going to see that drop down to half of the workforce or less in the next few years. And that is neither good nor bad. It's going to be a choice of individuals, and I think certain individuals will choose a career and lifestyle that is more predictable, and many others are going to choose a lifestyle that is more free and choiceful. So I think we're going to live in a world that's got both of those elements. I don't think it's good or bad, it just sort of it is. Antony Funnell: Implicit in what Kevin Wheeler had to say there was the idea that most of those who will end up as so-called 'contingent workers' in the future will do so because it suits their lifestyle, that it's a choice thing, as he says. And this may well be true for many, but it's hard to imagine that everybody will have a choice. Economist and analyst Jason Murphy: Jason Murphy: Yes, there has been an explosion in the use of contractors by firms, especially new economy firms like Uber. And what we see is that people who would formerly have had really employment contracts with these big companies are instead being employed on their own terms. They have to set up an ABN and manage their own tax affairs and their own super. And the company has very limited responsibilities to them compared to the responsibilities that it would have if those people were employees. That's a massive advantage for the companies, it limits their liabilities and limits their downside risk in the case that their business starts going less well. So it's a huge new trend and it really does make the workforce more vulnerable I think. Antony Funnell: There is an argument though that people like this, that increasingly people want flexibility in their lives. What would you say to that? Jason Murphy: Antony, I absolutely agree with that. I'm a perfect example of that. I have informal contracting arrangements with a number of companies around Australia and I work on a sort of fairly irregular basis for different places and I cobble together a full-time week out of various little scraps of work. And for me that is absolutely wonderful, I appreciate it and I enjoy it. But I moved to that after a number of years of working proper full-time work and having a decent CV, and I think for people who are just starting out in the workforce that sort of an arrangement would be a far more intimidating and less pleasant way of living their lives. Antony Funnell: Intimidating in what sense? Jason Murphy: I think the worry that your cash flow is going to run out next week would be ever present. Certainly it would be extremely difficult to get credit for the sort of things that Australians like to do, like buying a house. And so that worry about money I think would be ever present in your mind if you were forced into this kind of an arrangement. Antony Funnell: Depending on the country in which you live, what it means to be a contingent worker is going to vary. In Australia at least, contingent workers are covered under the 2008 Independent Contractors Act. Tui McKeown: This is the definition; those who operate their own business and who contract to perform service for others without having the legal status of an employee. So that's really important to begin with. It's saying you are not an employee. They perform services for others without legal status of employees, that is they are engaged by a client under a commercial contract rather than as an employee under the employment contract. So you are completely outside of the legal systems we have in place for employees. Independent contractors have the same rights as their clients under common law to control the terms of the contract. There is a lot of complexities in that particular one but what it's saying very, very definitely, you are a business, you are not an individual human being. Antony Funnell: Dr Tui McKeown is a senior lecturer in the Business School at Monash University. Tui McKeown: Yes, you've got a basically your primadonna workforce at one side, the grunt at the other. Since the legislation came in, since we've had that terminology we are collecting data on these people. What we haven't had the opportunity to do is go and work with the ABS and actually drill down into that data. I certainly know from my own research that, yes, that polarisation is absolutely there and it's even in areas like IT where everyone thinks, yes, those guys are paid lots of money. Well, you've got your completely court dependent sorts, often we call them sham contractors, I'm not sure I agree with that particular term…but the idea is that the power is somehow not with the individual, whereas our definition we've just looked at seems to imply that there is that equality. Because you are a business, you have exactly the same bargaining rights, power out there as any other business. These are people going from one job, one gig to the next, and they are very, very hard to capture, they are very elusive. And the biggest single thing we find with a lot of them when you do get them, they are working in multiple jobs at once, and that's something no data system anywhere has ever been able to gather, this idea that people aren't just doing one job at a time. You might come and do your interview in the morning as a journalist, you're going and doing something else at lunchtime, and you may be under a completely different company, a completely different business name. So one person…I mean, the worst I've come across is somebody has got 12 different identities and they are all registered as separate businesses. And it does seem to be increasing. You know, people sitting like me who are supposedly a permanent full-time tenured academic, and you've got your own freelancer company on the side. Antony Funnell: We know that in the United States they have a phenomena which they call the working poor where people are so badly paid that they have to take on two, three, even four jobs. How does that relate to this idea of the freelance economy, and, as you say, people taking on multiple jobs? Is that a sign then that many of these freelancers perhaps aren't making enough money from one particular contract so they have to take on multiple contracts at once? Tui McKeown: Look, again, I think that gets back to the idea of our original definition had this very nice idea that we've all got labour market control and that it's a relationship between equals. Most people who have done freelancing themselves know that you negotiate for what you think that the other party is going to pay, particularly if they are a larger employer, and your ability to command large prices is so dependent on the current circumstances. So yes, it is a huge concern of bodies like the unions, obviously of the International Labour Organisation and the rest, that we may be in the process of creating a race to the bottom. So we've got the illusion of the gig economy, of the Ubers and the rest, and people supposedly doing well…well, even some of the things coming out about Uber where they actually do seem to be targeting some of their drivers who are marginalised, vulnerable and the rest, and exploiting them. There is that real tension. Antony Funnell: So the nature of what it means to be an employee is changing. And so too are the requirements for being an employer. And Uber is a good example. It can become a major company, creating potentially tens of thousands of jobs in a country like Australia, but not be considered and not consider itself a major employer. Jason Murphy: You know, the payroll at Uber would be far smaller than if it had to manage all those people themselves. So the administrative overheads are far lower, not to mention the legal obligations that employers have to their employees. So Uber doesn't have to take nearly so much concern over OH&S or making sure that these people are actually paid a decent amount per hour. You know, Uber drivers could easily be driving a six-hour shift and coming home with $50. That wouldn't fly if they were employees of Uber. Antony Funnell: So do you see the success of these kind of companies, often called gig economy companies, do you see them becoming a role model for other organisations? Are other more traditional organisations looking at, say, the things that Uber is doing and saying, well, why can't we do that as well? Jason Murphy: Certainly you see that in companies that are in strife. So the media industry, which I do a lot of work in, is increasingly moving to freelance writers, contract employees essentially, because of the flexibility that it affords them. And I think other companies that have big surges in demand will do the same. So it will be a role model for other companies, but it will probably spread only slowly to companies that are doing very well. Antony Funnell: Economist Jason Murphy. Now, as we've heard, the trend toward employing people on a temporary, not permanent basis is widespread, it's across industries and professions. But as Jason Murphy indicated earlier, it's well and truly the norm with so-called 'gig' or 'new economy' companies. And those sorts of companies have also lead the way in attacking conventional workplace regulations and employee conditions. Let's get a perspective now from Dr Melissa Gregg. Dr Gregg is a researcher at Intel Corporation and is the author of the book Works Intimacy. Melissa Gregg: The advocates for gig work tend to suggest that the workers who benefit from this the most are those who want to have more control over when they work. In that sense it's a positive development. But at the same time the moment in history when this sharing economy came to fruition was also a time when a lot of people were losing access to the kinds of jobs that would allow them to have traditional kinds of benefits, traditional kinds of guarantees, of security, and also traditional expectations of time being predictable. So there's a certain correlation between what is called the jobless recovery from the global recession where employment may be coming back, but employment of the kind that we were used to talking about in terms of jobs, meaning you get some kind of entitlement and some kind of reciprocity with your employer, those jobs tend to be on the decline. And so the tension for me is who is getting more access to these flexible schedules and how do they differ in kind and in nature from the kinds of people who are losing from this other downturn in the sorts of predictable jobs that may have been around earlier. Antony Funnell: When we talk about a company like Uber, yes, you could say that they have been seeking more flexibility with regulations, but at times their very robust PR would seem to suggest that they are by and large anti-regulation, that they would like as few regulations as possible. What shall we make of that? Are we likely to see a trend whereby corporations and companies follow that kind of lead and start to question many of the regulations and conditions that have been put in place over the last 100 or so years? Melissa Gregg: I think it's a little unlikely that we are going to see something quite as unique as the Uber phenomenon. Again, when it comes to displacing just so many stakeholders all at once, I think that it's been an iconic change because it has managed to strike at the heart of a number of institutions that people thought were hard to move. And there some of the key advocates for labour in unions and also in legal representation have had to react much more quickly that I think is conventional. Whether other companies are going to have recourse to those tactics will depend a lot on their financial backing, and that is also the unusual dimension here, is that with Silicon Valley becoming such a concentrated location for wealth and venture capital funding, it is sort of unprecedented territory really in terms of how far some of these companies that do take on these iconic roles will really push. I think it's going to be interesting to watch. Antony Funnell: Melissa Gregg. Now, if all of what we've heard sounds to you like a recipe for potential future industrial strife, that may well be the case, according to Kevin Wheeler. The next two decades, he says, will be an interesting time as many of the workplace arrangements and conditions we once took for granted come under continuous challenge. Kevin Wheeler: I think it's very, very obvious to people who look at history as to why we are the way we are today, people were seeking security after the recession and after the wars, it was a horribly disruptive time, no one had any security, physical or economic. So there was a huge cry for security and protection and they looked to the government to provide this for the. And I think we see that all over Europe, certainly in Australia and New Zealand and other countries, and in the US to some degree, maybe not quite to the level that it is in Europe and other places. But very understandable. And now we've got a youthful population growing up that has always had everything, that has never suffered any of those hardships, and they can't understand why we want to be so protected and why we are looking for this security. So we've got sociological, psychological things going on here that are very, very significant and not trivial. To your point, it's going to be a fascinating time to be alive, it's really interesting to see how this evolves and where it goes. I think the writing is truly clear that more and more people will be in this contingent space, and we're going to have to see how the laws evolve to accept that and to provide at least a light level of protection around that. [MUSIC: Noel Coward, 'There are Bad Times Just around the Corner'] Antony Funnell: Well, maybe not. We'll just have to wait and see. This is Future Tense, I'm Antony Funnell and today's program is looking at the changing workforce. Early last century, Henry Ford took the ideas of an industrial engineer named Frederick Winslow Taylor and revolutionised his car assembly line. Instead of employing highly skilled craftsmen who worked in teams to build cars from the bottom to the top, Ford broke up the work into a whole series of constituent tasks, and then one person was assigned to replicate that one simple task day after day after day. That approach became known as mechanical Taylorism. If you were a worker, it was a disaster because it turned what were high skilled jobs into repetitive low skilled jobs, but it greatly increased the productivity that Ford's company was able to achieve and it made him a personal fortune. Now, I mention all of this because Phillip Brown, our next guest, believes one of the great future threats to the quality and quantity of work is from the rise of a new form of Taylorism. Brown is a distinguished research professor at Cardiff University in Wales. Phillip Brown: The question really for us today is to what extent are we seeing the rise of digital Taylorism, which is the same kind of process but this is around white-collar work. So to what extent do we see companies trying to capture the knowledge which is usually associated with technical, professional, managerial forms of work, trying to capture the knowledge to understand the business process a lot better so that they can break that process down, they can simplify it. Because if they can simplify it they can then codify it, and if they can codify it then they can create new forms of software which capture that knowledge. And that changes again that relationship between a cadre of top managers and those beneath them. And we think that this is precisely what is going on. And if you think about globalisation, globalisation for a company means the alignment of business practices. You can't align your business practices if you are doing completely different things in different places, but if you can standardise knowledge and you can standardise the way you do things, and if you can use new technologies as a way of achieving that, then obviously you are putting yourself in a good position in order to actually achieve economies of scale and scope. Antony Funnell: And the types of jobs that are being affected or the types of employees that are being affected by this so-called digital Taylorism are people we would have only a few years ago thought their jobs would have been immune from this kind of breaking down and reassigning of work tasks. Phillip Brown: Exactly. I mean, what actually is happening is that companies are increasingly segmenting or finding new ways of stratifying their knowledge workers. So what they are doing is saying, okay, we need a cadre of people at a top of our organisation with permission to think. These people are given discretion, they can continue to really work through where the business is going. But beneath them there are quite large numbers of those who are pretty highly qualified, many of them will have university degrees, who will find that many aspects of their jobs are actually not giving them the discretion that they anticipated, that, as we mentioned before, that their knowledge is captured within the software. And you can see how this might play out, for example, in teaching in the future in the ways in which students were presented with high profile academics or really well worked out examples which allow then the teacher just to spend time on discussing that knowledge which is pre-programmed for them. And the same thing is likely to happen in universities, you'll get your star professors who will give a presentation which will be recorded and can be distributed anywhere around the world, and then you'll get a whole cadre of doctoral part-time employees who will provide seminar backup and mark assignments. And we are seeing this happening all the time already. So actually this is impacting on many of the areas we didn't think it would have an impact on before. And so we're talking about professional managerial high-level technical areas of work where we are seeing this divide, and you can actually see it in terms of income data. If you look at some of the income data within occupations such as the legal profession or even in academia, what you see is those at the top being paid significantly more and seeing their incomes rise much quicker than those at the median, in the middle, and those at the bottom seeing no rise whatsoever. So we are seeing this stretching of income which is also reflected in the changing nature of employment within the professions. Antony Funnell: And so, according to Phillip Brown, when you combine this digital Taylorism effect with increasing automation, you not only get fewer middle class, white collar jobs, the ones that are left behind are far less rewarding. And there are also profound implications, he says, for the way in which we educate people. Phillip Brown: We are already seeing within higher education these assumptions around user pay models, that we can charge students more to go to university on the assumption that there is a premium over the lifetime in terms of their income. Well, for a lot of people that's simply not going to be realised. And that for us is one of the key issues that we've got to try to work out because what it challenges, it challenges the established opportunity bargain, that relationship between education, jobs and income. And we've simply assumed that the pattern we've had in the past will continue into the future. And we think that is being challenged in pretty fundamental ways. Antony Funnell: And yet we still see a focus, don't we, on higher education as a way of future proofing employment into the future. Phillip Brown: Yes, we do see higher education as the best way forward for young people and developing the economy. And let's be perfectly clear about it, if you go to university you've got more chance of being in employment than if you don't go to university. You've got more chance of earning more than someone who doesn't go to university. But the actual differences are not that great. In fact some of those who don't go to university who are at the top of what they do, they end up earning more than the graduates at the median level. So it's a bit of a mixed picture. But I think the problem we've got is, one, we convinced ourselves that the future economy is knowledge-based and therefore it is going to be high skilled. These two things need to be taken apart and not assumed to be the same thing. And also, especially in an age of increasing inequality, we like to, in my view, pretend that there are opportunities there for everybody, and anybody can get into these jobs if they get the right education. That clearly isn't the case at all. And the reason why we push higher education is really because we don't want to answer or address the difficult question. We constantly want to assume that the labour market can deliver efficiency and crucially social justice. And the fact is that the labour market is basically seriously congested, and it can't cope with the demands made upon it. And that means that we are going to have to address broader questions of how we distribute income and wealth, and ultimately what the real purpose of education is. And we are some way from having that debate at the moment. Antony Funnell: And for governments, a lot of us, particularly in the West, are dissatisfied with the level of leadership that we have from political parties, from politicians at the moment, but for governments there are some very serious social issues here that will need to be dealt with. Phillip Brown: There are serious issues for government, and of course, maybe it's slightly ironic, but for governments which are under pressure themselves to balance budgets which they are finding it very hard to do, then the very tools of digital Taylorism are being used within public services in terms of shared services and such things as a way of reducing their costs. But the wider implication of this is that the very model that governments have worked with in terms of providing opportunity and discussions, for example, around social mobility, the ideas around social mobility cling onto the view that there are going to be increasing numbers of good job opportunities for people as the society becomes more technologically advanced. And what this totally ignores are the very processes of standardisation digital Taylorism which have seriously put the brakes on that. And what that does, that increases competition for a relatively small number of places. Of course it depends in terms of which kinds of occupations you are talking about. I'm not suggesting for one second there aren't some skills shortages in some areas, there are, about overall we are seeing a much more congested system of education where everybody is now striving to get those top grades. If you get a B now it's like being a failure because you need an A or an A+, and this reproduces itself in the labour market as well. This does not make it a happy place. So I think there are some really big issues about how we are educating our young people today, and about the sorts of opportunities they will confront in the future. And it is very important for governments to start to address these sorts of issues, because if they don't we are confronting a world of increasing competition and very significant inequalities. And none of what we are suggesting is going to address those sorts of inequalities. So in a way maybe what we are seeing…I mean, people are now beginning to talk about are we entering a world of post-capitalism, I'm not sure about that, but what we are seeing I think is maybe the end of the industrial era. Now, that seems like an old-fashioned thing to say because everybody has been talking about post-industrial knowledge-based economies, but at the heart of industrial society is the labour market, and it is that relationship ultimately between skills, jobs and incomes, and it strikes me that it is that that is really breaking down. And new technologies are contributing to the breaking down of that relationship in ways which were not predicted by virtually all the main writers in this field, and certainly not by the politicians. Antony Funnell: An important issue indeed, and one, as Professor Brown said, that's had very little public scrutiny or discussion. Phillip Brown, distinguished research fellow at Cardiff University in Wales. We also heard today from economist Jason Murphy, workplace researcher Dr Melissa Gregg at Intel, Dr Tui McKeown, a senior lecturer in the Business School at Monash University in Melbourne, and US employment and jobs expert Kevin Wheeler, the founder and president of the Future of Talent Institute. Karin Zsivanovits is my co-producer here at Future Tense. The sound engineer this week was Peter McMurray. I'm Antony Funnell. Founder and president of the Future of Talent Institute Dr Tui McKeown Senior Lecturer, Department of Management, Monash University Melissa Gregg Principal Engineer, Client Computing Group, Intel Phillip Brown Distinguished Research Professor School of Social Sciences, Cardiff University Kevin Wheeler - Future of Talent Institute Tui McKeown - profile Phillip Brown - profile Melissa Gregg - The Atlantic articles Antony Funnell Karin Zsivanovits Sunday 10.30am Repeated: Friday 5.30am Presented by Antony Funnell Explore Radio National About RN ABC Listen Frequency finder
cc/2019-30/en_head_0010.json.gz/line2814
__label__wiki
0.785961
0.785961
revisit your childhood Resident Evil 2 for PlayStation 4: Everything you need to know The battle of the G-Virus starts all over again Essa Kidwell and Jennifer Locke Close your eyes and imagine yourself back to 1998. You're on the couch eating Cookie Crisp when you load up your PlayStation and Resident Evil 2 starts up. Now, you won't have to imagine you're playing one of your favorite childhood games, you'll actually be able to play it in real life. This year at E3 2018 Capcom took the world by storm by showing us a trailer for their upcoming game, Resident Evil 2: the remake. Not only will you be able to play this classic edition of Resident Evil, but you'll be able to do so on your shiny PlayStation 4. With improved graphics and gameplay I'm ready to lose a few days out of my life to binge this game. If you're interested in the new remake of Resident Evil 2, read on below to learn everything you'll need to know! What's new with Resident Evil 2? Ahead of the acclaimed survival horror's anticipated remake, keep up to date on all new information that we receive, from trailers to gameplay details and everything in between. January 8, 2019 - Get the 1-shot demo soon! If you are incredibly hyped up to get your hands on Resident Evil 2, you have a special treat coming your way from Capcom. Starting on January 11 and running for the rest of the month you will be able to play a demo of the forthcoming remake. However, you had better be paying attention when you play because you will only get once chance to enjoy it. This is a one-shot demo which means that you will have only 30 minutes to play the demo. After that thirty minutes is up you will have to wait for the full game. Now that's what I call a teaser! January 7, 2019 - Get to the Safehouse! As Capcom continues to build up hype in preparation of the release of Resident Evil 2 on January 25, they dropped an enigmatic little video into their YouTube account today. The creepy video features some understated visuals while we hear a radio announcer telling us that we would safest if we made our way to the safehouse at the Racoon City Police Department. Now at first blush, it may appear as if this is just another teaser for the forthcoming game. However, at the very end of the video, some text splashes across the screen that states "Coming Soon. London 2019". If I didn't know any better I would say that this is eluding to some sort of Resident Evil ARG or even an escape room of sorts. I am certianly intruiged but I guess we will all have to wait and see what this is about. December 4, 2018 — Early previews shed more light on what to expect Some early Resident Evil 2 Remake previews are starting to trickle out, and they offer more details that we didn't get from Capcom's original announcement. The early consensus is that the Raccoon City Police Station — wherein much of the game takes place — has gotten its due diligence in being a major part of what made the original game so spooky, mysterious, and fun. The previous also deliver the news that the modernized third-person controls and camera angles feel right at home. The new perspective gives you ample time to enjoy and appreciate the upgraded graphics, which, by the way, are said to be just as top notch as you'd expect from a contemporary title. And just as we saw with Resident Evil 7, Resident Evil 2's remake uses resource scarcity perfectly as a tool to heighten the tension and add to the uncertainty of the situation unfolding in Raccoon City. Sony's official hands-on coverage comes with a full 20-minute gameplay clip to give us a taste of what we can expect when Resident Evil 2 launches January 25, 2019. Check it out above. If you were hoping for some classic threads on your favorite characters, you're in luck. Both Leon and Claire's classic costumes will be unlockable in the game for free. Leon is able to sport his Classic Police costume while Claire can don her Classic Jacket. Should you decide to splurge and get the Deluxe or Collector's editions, you'll have access to five additional costumes as well; three for Claire and two for Leon. If you need a refresher on the game's story, Capcom also released a story trailer at TGS 2018. Resident Evil 2 has certainly never looked so good. While E3 gave us our first look at Leon's gameplay, Gamescom 2018 graced us with new footage showing off Claire Redfield. As Claire is in the midst of a vicious boss battle, the developer also took part in an interview with IGN discussing how it felt to return to these iconic characters with a more robust engine. For players looking to have a more difficult or easier experience, Resident Evil 2 is implementing a feature similar to that which debuted in Resident Evil 4 to do just that. "In terms of the standard difficulty, it does adjust based on player performance," said producer Yoshiaki Hirabayashi in an interview with VG247. "I'd like to believe that you were doing really well and so the difficulty ramped up even more. But we have it tuned so that no matter how well you're doing, there's always going to be that sense of dread and tension there. "Also, we are definitely implementing things that assist the player if they choose to utilize that stuff such as auto game. If a player thinks, hey, I'd rather have an easier time going through this, we will have those sorts of options as well." In terms of performance, Capcom confirmed that the game would support 4K on both PlayStation 4 Pro and Xbox One X with "a stable, high-framerate experience." Earlier comments from brand manager Mike Lunn regarding its performance seemed to indicate that players would have a choice between either 4K or 60FPS on higher-end consoles, but could not play with both simultaneously. It's unclear if Capcom is working to enable a 4K at 60FPS mode. Update June 13, 2018: Capcom confirms both Fourth Survivor and Tofu modes will be included in the game. Everyone remembers how hard and outright ridiculous it was to try beating Resident Evil 2 as a massive piece of Tofu. You read that right. After you completed the main campaign of the game you unlocked the Tofu Mode, which allowed you to take the form of a giant piece of Tofu and make all the zombies go Vegan. Another mode you could unlock if you completed both Leon and Claire's campaigns with A rankings, was the Fourth Survivor mode. This is a mode where item boxes weren't connected, aiming was manual and included a few proto-type only options that weren't available on other modes. Capcom has confirmed that both of these modes will be included in the remake and I don't think I've stopped screaming yet. The second trailer shown at E3 gave us glimpses of gameplay. One thing that's been confirmed from this video is that you'll be playing from a (now) popular third person view from the perspective of over Claire or Leon's shoulder. The old Resident Evil games were played from a fixed camera angle which was bittersweet to say the least. During the press release Capcom confrimed we would still have some gameplay modes from the original game, but with modernized controls. A look into the world Another big mention during the press release was "- the characters themselves appear sharper than ever and the grotesque hordes of zombies are brought to life with a horrifyingly realistic wet gore effect. Zombies now react in real time as they take instant visible damage, making every bullet from the player count. Stunning lighting brings the familiar rooms and corridors of Raccoon City Police Department to new life." This means it's not just a simple remaster where they took the told game and threw some new graphics updates on it. The remake for Resident Evil 2 is built from the groud up and I can't wait to see what it looks like. A few familiar faces We're back in Raccoon city and it looks like we'll be revisitng our old friends Leon Kennedy and Claire Redfield as playable characters in this remake, much like we were able to in the original. Not just that, but from the looks of the trailers I see Mr. X and WIlliam Birkin as well. I know some people aren't a fan of playing remastered or rebuilt games, but hear me out on this one. Capcom officials have noted, "- has been completely rebuilt from the ground up for a deeper narrative experience. Using Capcom's proprietary RE Engine, Resident Evil 2 offers a fresh take on the classic survival horror saga" So this most certainly won't just be another remasted game. Details are thin but I'm willing to bet with all the information we have now that you're going to see aspect of the story you've never seen before. And, if that's the case, it will have to come with all new missions that you won't know all the answers to because you beat the game 100 times when you were twelve. Release date and pre-order options Mark your calenders, January 25, 2019 is the date you want to save for this game to release. If you're interested in pre-ordering the game for yourself you can check out your options here. The standard edition of the game is available for preorder for $59.99. See at Game Stop See at Best Buy The Deluxe edition of the game is available for preorder for $69.99 but, since there is no information on any upcoming DLC the Deluxe edition might not be worth ordering as of yet. What are you most excited for with this new release? What are you least excisted for? We don't have a whole lot of information as it stands, but as soon as we get more we'll keep this post updated. Be sure to keep checking back in for updates and, as always, tell us what you think in the comment section below! Updated November 2018: We've updated this with new trailers featuring additional costumes for both Leon and Claire.
cc/2019-30/en_head_0010.json.gz/line2818
__label__wiki
0.784889
0.784889
Click to copyhttps://apnews.com/f3f667b96cb5421589e8d1676314a039 Louisiana asks public help with invasive Asian swamp eels BATON ROUGE, La. (AP) — An invasive species of swamp eel has been found in New Orleans, and a state biologist says it’s the first time this species has been found in the United States. Investigators don’t know whether the Asian swamp eels were released accidentally or on purpose in Bayou St. John, said Robert Bourgeois, aquatic nuisance species coordinator for the Louisiana Department of Wildlife and Fisheries. They might have been released from an aquarium or for food, he said. They eat the same things native animals and fish do - fish, frogs, shrimp, crawfish, and other aquatic invertebrates, such as worms and insects - but their effect on native species is not known, Bourgeois said. “It is no threat to humans. It is a common food fish in Asia,” he said. Bourgeois said other species of Asian swamp eels have been found over the years in New Jersey, Hawaii, Georgia, and Florida. The brown, gold-speckled eels don’t have fins, while native eels do, he said. They can grow up to 2½ feet (three-quarters of a meter) long. The department is checking nearby water bodies to see whether the eels have spread. “Currently we have not found them anywhere outside the bayou,” Bourgeois said. The department is asking the public to help find out how widespread they are by putting any found into a plastic bag, labeling it to show exactly where it was found, putting it in the freezer, and emailing the department at aquaticinvasives@la.gov or calling 225-765-3977 to arrange for pickup.
cc/2019-30/en_head_0010.json.gz/line2820
__label__wiki
0.545404
0.545404
Obama sends letter to TSA over uniform flap BY MARY WISNIEWSKI Illinois senator and Democratic presidential hopeful Barack Obama sent a letter to the head of the U.S. Transportation Security Administration Thursday expressing “serious concerns” over TSA uniforms being left out in the open at O’Hare Airport. Obama was responding to a report in the Chicago Sun-Times that TSA uniforms, TSA radios with access to a secure channel, sensitive security information and a cashbox were left unsecured at airport checkpoints. TSA said there was no security breach and that the materials were within the “sterile area” beyond the checkpoints. Security breach hits O'Hare But an airport security expert said the uniforms could have been stolen and used to impersonate TSA officers. “As you know, terrorists have attempted to impersonate law enforcement and other security officials in order to gather intelligence, conduct counter-surveillance, and even carry out attacks,” Obama wrote in a letter to TSA Assistant Secretary Edmund “Kip” Hawley. “Considering the extraordinary security threats our nation faces every day, reports suggesting that uniforms could possibly be accessed are wholly unacceptable.” Obama, who is a member of the Senate Homeland Security and Governmental Affairs Committee, asked Hawley to provide further information to highlight areas where improvements may be “urgently needed,” and requested guidelines governing the security of uniforms and other equipment. Obama also wondered whether TSA staff or staff of the Department of Homeland Security is concerned about theft of screener uniforms or other items as a terrorist tactic. “I know that the more than 40,000 TSA screeners work diligently to screen millions of passengers and bags every day across America, but their efforts will be compromised if seemingly mundane, but still critical security protocols are not followed,” Obama wrote. The information about the unsecured items was provided in a March 14 Chicago Department of Aviation report obtained by the Chicago Sun-Times.
cc/2019-30/en_head_0010.json.gz/line2823
__label__wiki
0.795395
0.795395
PTSD diagnosus a moving target Criteria for PTSD remain in flux as the diagnostic manual now enters its fifth reworking. Under the old definition, in order to qualify for the diagnosis, a person's response must have involved "intense fear, helplessness, or horror." That criterion is missing from the proposed DSM-V. Dr. Matthew J. Friedman, executive director of the Department of Veterans Affairs' National Center for PTSD, likes to think of the revision process in the same way he views the evolution of our laws. "It's a living construct," says Friedman, a professor of psychiatry at Dartmouth Medical School and member of the anxiety disorder working group for DSM-V. "It's constantly changing as new scientific information pours in." So fast, indeed, that regulators sometimes have a hard time keeping up. The VA is considering a rule change that would make it easier for noncombat troops to qualify for PTSD benefits. The proposed regulation, published in August, still cites the old "fear, helplessness, or horror" requirement. Other proposed changes in the diagnostic criteria would lower the threshold for PTSD. For instance, under the old definition, a person must have "experienced, witnessed, or was confronted with an event or events that involved actual or threatened death or serious injury, or a threat to the physical integrity of self or others." Under the proposed revision, it would be enough if a person "learned" that a traumatic event had occurred to a close friend or relative or had experienced "repeated or extreme exposure to aversive details of the event(s)" - such as a police officer "repeatedly exposed to details of child abuse." None of this changes the fact that, as a constellation of self-reported symptoms, PTSD is very subjective. "We don't have a laboratory test for PTSD," says Bruce Dohrenwend, a psychiatric epidemiologist at Columbia University and part of a team that re-examined results of the landmark National Vietnam Veterans Readjustment Study, which helped introduce the term PTSD to the masses. But Friedman says even that might be changing. "We now have very solid research that there are alterations in brain structure and neurocircuitry is affected, etc.," he says. Still, the challenge of diagnosing the disorder remains. In 2008, Dr. Norma Perez suggested in an e-mail to staff at the VA hospital in Temple, Texas, that they "refrain from giving a diagnosis of PTSD straight out." Perez, a clinical psychologist and leader of the PTSD treatment team there, felt the staff lacked the "time to do the extensive testing that should be done to determine PTSD," and asked employees to "consider a diagnosis of Adjustment Disorder, R/O (rule out) PTSD." A probe by the VA's inspector general determined there was no intent to misdiagnose, though some veterans' groups accused the federal government of clamping down on PTSD in order to save money. Maj. C. Alan Hopewell, an Army neuropsychologist and head of the Traumatic Brain Injury Clinic at Fort Hood, Texas, believes the PTSD diagnosis is "abused and overused." In nine months with the 785th Medical Company (Combat Stress Control) during the Iraq troop surge, Hopewell and his colleagues saw more than 25,000 patients. Of those he saw for potential PTSD, he estimates that one third were actually troubled by something happening on the home front, and another third had "just general adjustment problems." "I am the first person to make an accurate diagnosis and to help people have whatever treatment or whatever benefits they deserve," says Hopewell. "When our emphasis is on giving everybody disability, it creates people who HAVE disabilities."
cc/2019-30/en_head_0010.json.gz/line2824
__label__wiki
0.873915
0.873915
Airport information and maps for Syukuran Aminuddin Amir Airport: LUW Airport Information: IATA / ICAO Codes: LUW / WAMW Airport Names: Syukuran Aminuddin Amir Airport Bandara Syukuran Aminuddin Amir Location: Luwuk, Central Sulawesi, Indonesia GPS Coordinates: 1°2'16"S by 122°46'13"E Area Served: Luwuk Elevation: 56 feet (17 meters) View all routes: Routes from LUW Facts about LUW Map of Nearest Airports to LUW List of Nearest Airports to LUW Map of Furthest Airports from LUW List of Furthest Airports from LUW Facts about Syukuran Aminuddin Amir Airport (LUW): The closest airport to Syukuran Aminuddin Amir Airport (LUW) is Bolaang Airport (BJG), which is located 46 miles (74 kilometers) W of LUW. The furthest airport from Syukuran Aminuddin Amir Airport (LUW) is Tepoe Airstrip (KCB), which is nearly antipodal to Syukuran Aminuddin Amir Airport (meaning Syukuran Aminuddin Amir Airport is almost on the exact opposite side of the Earth from Tepoe Airstrip), and is located 12,257 miles (19,726 kilometers) away in Kasikasima, Suriname. Because of Syukuran Aminuddin Amir Airport's relatively low elevation of 56 feet, planes can take off or land at Syukuran Aminuddin Amir Airport at a lower air speed than at airports located at a higher elevation. This is because the air density is higher closer to sea level than it would otherwise be at higher elevations. In addition to being known as "Syukuran Aminuddin Amir Airport", another name for LUW is "Bandara Syukuran Aminuddin Amir". Syukuran Aminuddin Amir Airport (LUW) currently has only 1 runway. Map of Nearest Airports from Syukuran Aminuddin Amir Airport: List of Nearest Airports from Syukuran Aminuddin Amir Airport: 1 45.79 miles (73.69 km) W Bolaang Airport (BJG) Bolaang, Indonesia 2 115.86 miles (186.46 km) N Jalaluddin Airport (GTO) Gorontalo, Indonesia 3 142.00 miles (228.53 km) SW Soroako Airport (SQR) Soroako, Indonesia 4 174.89 miles (281.46 km) NNW Pogogul Airport (UOL) Buol, Indonesia 5 198.60 miles (319.62 km) WSW Andi Jemma Airport (MXB) Masamba, Indonesia 6 211.71 miles (340.71 km) S Haluoleo Airport (WMA) (KDI) Kendari, Indonesia 7 232.67 miles (374.45 km) NE Sam Ratulangi International Airport (SRA) (MDC) Manado, Indonesia 8 279.64 miles (450.03 km) WSW Tampa Padang Airport (MJU) Mamuju, West Sulawesi, Indonesia 9 307.78 miles (495.32 km) S Betoambari Airport (BUW) Bau-Bau, Buton, Indonesia 10 333.88 miles (537.32 km) SE Namrole Airport (NRE) Buru, Indonesia 11 355.69 miles (572.43 km) SW Sultan Hasanuddin International Airport (SHIAM) (UPG) Makassar, Indonesia 12 374.41 miles (602.56 km) WNW Bontang Airport (BXT) Bontang, Indonesia 13 377.69 miles (607.84 km) NNE Naha Airport (NAH) Tahuna, Indonesia 14 406.21 miles (653.73 km) W Sultan Aji Muhamad Sulaiman Airport (BPN) Balikpapan, East Kalimantan 15 410.97 miles (661.39 km) ESE Pattimura Airport (PTA) (AMQ) Ambon, Indonesia Map of Furthest Airports from Syukuran Aminuddin Amir Airport: List of Furthest Airports from Syukuran Aminuddin Amir Airport: 1 12,257.34 miles (19,726.22 km) NW Tepoe Airstrip (KCB) Kasikasima, Suriname 2 12,253.33 miles (19,719.77 km) SSW Porto de Trombetas Airport (TMT) Porto Trombetas, Oriximiná, Pará, Brazil 3 12,235.12 miles (19,690.46 km) NW Vincent Fayks Airport (OEM) Paloemeu, Suriname 4 12,208.61 miles (19,647.80 km) NNW Cayana Airstrip (AAJ) Awaradam, Suriname 5 12,198.87 miles (19,632.14 km) NNW Djoemoe Airstrip (DOE) Djumu (Djoemoe), Suriname 6 12,197.54 miles (19,629.99 km) NE Lethem Airport (LTM) Lethem, Guyana 7 12,185.13 miles (19,610.02 km) NNW Botopasi Airstrip (BTO) Botopasi, Suriname 8 12,178.70 miles (19,599.67 km) S Júlio Belém Airport (PIN) Parintins, Amazonas, Brazil 9 12,174.14 miles (19,592.32 km) NNW Laduani Airstrip (LDO) Ladouanie, Suriname 10 12,167.18 miles (19,581.13 km) ENE Boa Vista-Atlas Brasil Cantanhede International Airport (BVB) Boa Vista, Roraima, Brazil 11 12,160.13 miles (19,569.79 km) NW Drietabbetje Airstrip (DRJ) Drietabbetje, Suriname 12 12,151.62 miles (19,556.08 km) NW Maripasoula Airport (MPY) Maripasoula, French Guiana 13 12,145.73 miles (19,546.60 km) N Washabo Airstrip (WSO) Washabo, Suriname 14 12,144.00 miles (19,543.82 km) SW Santarém–Maestro Wilson Fonseca Airport (STM) Santarém, Pará, Brazil 15 12,136.70 miles (19,532.08 km) NW Stoelmans Eiland Airstrip (SMZ) Stoelmans Eiland, Suriname
cc/2019-30/en_head_0010.json.gz/line2828
__label__wiki
0.637285
0.637285
Daily Ratings & News for Parker-Hannifin Complete the form below to receive the latest headlines and analysts' recommendations for Parker-Hannifin with our free daily email newsletter: Parker-Hannifin (NYSE:PH) Downgraded by Bank of America to Neutral Parker-Hannifin (NYSE:PH) was downgraded by investment analysts at Bank of America from a “buy” rating to a “neutral” rating in a report issued on Friday, The Fly reports. A number of other equities research analysts have also commented on PH. Stifel Nicolaus raised shares of QUALCOMM from a “hold” rating to a “buy” rating and upped their price objective for the company from $57.00 to $100.00 in a research note on Tuesday, April 16th. Citigroup upped their price objective on shares of SolarWinds from $20.00 to $23.00 and gave the company a “buy” rating in a research note on Monday, May 6th. JPMorgan Chase & Co. set a GBX 3,200 ($41.81) price objective on shares of Diageo and gave the company a “neutral” rating in a research note on Wednesday. Morgan Stanley upped their price objective on shares of Williams-Sonoma from $52.00 to $56.00 and gave the company an “underweight” rating in a research note on Wednesday. Finally, Wells Fargo & Co upped their price objective on shares of Apollo Global Management from $38.00 to $42.00 and gave the company an “outperform” rating in a research note on Wednesday. Two analysts have rated the stock with a sell rating, thirteen have assigned a hold rating and six have given a buy rating to the company’s stock. Parker-Hannifin presently has a consensus rating of “Hold” and a consensus price target of $179.12. Get Parker-Hannifin alerts: NYSE:PH opened at $163.42 on Friday. The company has a fifty day moving average price of $164.27. The company has a debt-to-equity ratio of 0.71, a quick ratio of 1.07 and a current ratio of 1.56. Parker-Hannifin has a 52 week low of $140.82 and a 52 week high of $193.19. The company has a market cap of $20.75 billion, a price-to-earnings ratio of 15.68, a P/E/G ratio of 1.45 and a beta of 1.55. Parker-Hannifin (NYSE:PH) last posted its quarterly earnings data on Thursday, May 2nd. The industrial products company reported $3.17 EPS for the quarter, beating the Zacks’ consensus estimate of $3.01 by $0.16. Parker-Hannifin had a net margin of 10.04% and a return on equity of 26.27%. The company had revenue of $3.69 billion for the quarter, compared to analyst estimates of $3.72 billion. During the same period in the prior year, the firm posted $2.80 EPS. The company’s quarterly revenue was down 1.7% on a year-over-year basis. As a group, equities analysts expect that Parker-Hannifin will post 11.63 EPS for the current year. In related news, VP Robert W. Malone sold 336 shares of the stock in a transaction on Thursday, May 30th. The shares were sold at an average price of $156.76, for a total transaction of $52,671.36. Following the transaction, the vice president now directly owns 24,260 shares of the company’s stock, valued at $3,802,997.60. The sale was disclosed in a legal filing with the SEC, which can be accessed through this hyperlink. 1.12% of the stock is owned by corporate insiders. A number of institutional investors and hedge funds have recently added to or reduced their stakes in PH. Norges Bank acquired a new position in Parker-Hannifin during the fourth quarter worth $357,950,000. Pennsylvania Trust Co raised its holdings in Parker-Hannifin by 29,994.5% during the first quarter. Pennsylvania Trust Co now owns 1,625,103 shares of the industrial products company’s stock worth $117,980,000 after buying an additional 1,619,703 shares during the last quarter. Robeco Institutional Asset Management B.V. raised its holdings in Parker-Hannifin by 52.6% during the first quarter. Robeco Institutional Asset Management B.V. now owns 596,840 shares of the industrial products company’s stock worth $102,434,000 after buying an additional 205,670 shares during the last quarter. Scout Investments Inc. acquired a new position in Parker-Hannifin during the first quarter worth $33,768,000. Finally, Financial Advocates Investment Management raised its holdings in Parker-Hannifin by 100,195.1% during the fourth quarter. Financial Advocates Investment Management now owns 183,540 shares of the industrial products company’s stock worth $14,541,000 after buying an additional 183,357 shares during the last quarter. Hedge funds and other institutional investors own 79.64% of the company’s stock. About Parker-Hannifin Parker-Hannifin Corporation manufactures and sells motion and control technologies and systems for various mobile, industrial, and aerospace markets worldwide. The company operates in two segments, Diversified Industrial and Aerospace Systems. The Diversified Industrial segment provides static and dynamic sealing devices; filters, systems, and diagnostics solutions to monitor and remove contaminants from fuel, air, oil, water, and other liquids and gases; connectors, which control, transmit, and contain fluid; hydraulic, pneumatic, and electromechanical components and systems for builders and users of industrial and mobile machinery and equipment; and critical flow components for process instrumentation, healthcare, and ultra-high-purity applications, as well as components for use in refrigeration and air conditioning systems, and in fluid control applications for processing, fuel dispensing, beverage dispensing, and mobile emissions. Recommended Story: What does EPS mean? Receive News & Ratings for Parker-Hannifin Daily - Enter your email address below to receive a concise daily summary of the latest news and analysts' ratings for Parker-Hannifin and related companies with MarketBeat.com's FREE daily email newsletter. Rhythm Pharmaceuticals (NASDAQ:RYTM) Upgraded by Stifel Nicolaus to “Buy” Netflix (NASDAQ:NFLX) Given Sell Rating at Wedbush
cc/2019-30/en_head_0010.json.gz/line2831
__label__wiki
0.827898
0.827898
Opening the Gates Clearing the Way for More Women to Hold Political Office By Judith Warner Posted on May 19, 2017, 10:00 am (AP/Jose Luis Magana) Sen. Kamala Harris (D-CA) speaks during the Women's March on Washington, January 21, 2017. In order for women to achieve political parity, the whole system that chooses and supports candidates has to change. Introduction and summary The 2016 elections were a historic disappointment for advocates of women’s political parity in the United States. Not only did the first female major party candidate for the White House fail to win the highest office in the land, but around the nation, political representation by women continued its now nearly two-decades-long stall as well. Women comprise 50.8 percent of the U.S. population.1 Yet as January 2017 began: Women made up just 19.4 percent of incoming members of the House2 and held just 21 percent of the seats in the U.S. Senate3 They were 24.8 percent of state legislators, 10 percent of governors, and only 18.8 percent of mayors of all U.S. cities with more than 30,000 residents4 They were down one governorship since 2016,5 had lost one seat in the U.S. House of Representatives, and had gained just one seat in the U.S. Senate6 Overall, they occupied less than 25 percent of elected offices at all levels of government in the United States7 The gloomy statistics on women’s political fortunes coexist, oddly enough, with solid signs that, in recent years, American attitudes toward women in public office have significantly changed for the better. In June 2015, 92 percent of Americans said that they were ready to elect a female president8—and in November 2016, Americans did just that, choosing Hillary Clinton in the popular vote by a margin of nearly 3 million.9 A considerable body of polling and academic research has shown that Americans have overwhelmingly moved past many of the traditional sexist attitudes that held female would-be politicians back in the past.10 Americans no longer believe that women are constitutionally unfit for elected office. In fact, a sizable minority believes that, in some respects, women are even better suited for office than men.11 Get the Latest on Women's Issues In other words, these days, if women run, they can win12—particularly if they’re Democrats. According to new research from the Center for American Women and Politics at Rutgers University, women were 28 percent of Democratic candidates for the U.S. House of Representatives in the 2016 general election—and 32 percent of Democratic winners; they were 11 percent of Republican candidates for the House and 9 percent of Republican winners. On the Senate side, women were 31 percent of Democratic candidates in the November election and 42 percent of winners, while Republican women were 12 percent of candidates and 5 percent of winners.13 Democrat or Republican, however, women are not running for elected office at anywhere near the rate they need to in order to achieve something even close to parity. In the 2014 campaign season, the last year for which a full set of numbers is available, women were only 28 percent of candidates for federal, state, and local office in the United States. That same spring, women made up 29 percent of elected officials at the federal, state, and local levels, according to the Reflective Democracy Campaign, which compiled both sets of numbers.14 The near-parallelism of these percentages is compelling, particularly when viewed in light of earlier research showing that women are about as likely as men to win congressional elections in comparable races15—if they get on the ballot—and more recent research showing that they’re almost as likely as men to succeed in mayoral races, if they get on the ballot.16 Further research shows that if they make it onto the ballot and run in comparable races, women do as well as men in fundraising too.17 Women of color provide a glimmer of hope in gloomy 2016 congressional election results The one bright spot in the otherwise bleak electoral landscape of November 2016 was the news that nine new women of color were elected to the U.S. Congress, bringing the total number of women of color in the U.S. House of Representatives and the Senate to 38—the highest level in our nation’s history.18 Despite this happy development, however, the level of political representation for women of color overall remains unacceptably low: Although they make up 19 percent of the U.S. population, women of color represent only 7.1 percent of the total number of members of Congress, 4 percent of governors, and 5.4 percent of state legislators.19 As the dust settles from the 2016 campaign year and as advocates of women’s political parity turn to contemplating next steps, a few basics are clear: As Hillary Clinton’s decisive, nearly 3-million-vote win of the U.S. popular vote indicates, Americans do see women as viable political leaders. This willingness to vote for women, however, is not translating into steadily increasing numbers of women in political office. To figure out why—and then prevent this disconnect from continuing—it’s time to move on from old analyses that focus uniquely on voter bias and look instead at what’s preventing voters from having the chance to express their support for women candidates in the first place. Doing so requires a detailed look at the structural impediments to women’s political participation—the whole constellation of forces having to do with recruitment, fundraising, and the support of political power brokers, or so-called gatekeepers—that keep women off ballots and out of office. Correcting the problem will require a set of concrete and structural solutions to open up the political universe to the most diverse range of newcomers, including women of all races and socio-economic backgrounds. This report explores in detail how institutional forces having to do with candidate selection and support operate, and why they tend to keep women out. It also proposes a set of structural solutions to address this problem through both voluntary measures and public policy. Notably, the report recommends that: Our political parties should change how they recruit and groom candidates, and they should set voluntary numerical goals to encourage a rapid rise in the percentage of women on ballots Cities, states, and the U.S. Congress should enact legislation to reduce the role of big money in elections and adopt systems of small-donor public financing States should pay officeholders a living wage to permit those without independent means or highly flexible careers to pursue careers in public service, and they should make sure that their legislative bodies adopt the same sorts of family-friendly workplace policies that private-sector employers now use to attract and retain women Individual donors and political action committees should set voluntary goals to increase funding for women candidates, particularly in open-seat elections, which offer the best opportunities for outsiders Shifting the public conversation on women’s political progress from a discussion of attitudes—among voters, the media, and the so-called ambition gap among potential women candidates themselves—to the structural factors that block women’s progress will require a major change, not just in tactics but also in mentalities. Americans tend to view running for office through an up-by-the-bootstraps, “Mr. Smith Goes to Washington” storyline and to downplay the structural factors that have historically expanded the choices and enhanced the political opportunities of some at the expense of others. The belief that the political path is equally open to all people with enough gumption to follow it, however, is naive. In the long term, real structural factors have created a permanent political class of white, male—and in recent decades, increasingly wealthy—Mr. Smiths. For our political leaders to be so unrepresentative of modern-day America is toxic for our democracy. It reinforces the now-pervasive belief that our government is divorced from and unresponsive to the concerns of everyday people. And as we have recently seen, this belief reinforces the sort of political nihilism that allows destructive extremism to grow. Women make up just more than half of the U.S. population.20 They account for 47 percent of the U.S. labor force21 and 49 percent of the college-educated workforce,22 while at the same time they perform the lion’s share of caregiving for children and other relatives.23 This means that their grounding in the day-to-day challenges that most Americans face could not be more complete—and that the need for their leadership could not be more pressing. Voters are ready—but women aren’t running In the latter decades of the 20th century, it seemed that as women moved up in the professions, and as public attitudes toward women’s responsibilities and capabilities gradually improved, political parity would follow. Unfortunately, this has not been the case. The 1970s and 1980s saw slow but steady increases in women’s representation in the U.S. House and Senate, accelerated dramatically by the surge of new female members following the 1992 congressional elections—termed the “Year of the Woman”—that brought 28 new women to Congress.24 But recent decades have brought much more uneven progress. The percentage of women in Congress actually dropped in 2010,25 before rising again in 2014 and then staying flat in 2016. At 23.7 percent, women’s representation in statewide elected offices as governors, lieutenant governors, state comptrollers, and the like is also down from a high point of 28.5 percent in 2000.26 There were nine female governors in 2004 and 2007; there are only four today—one fewer than postelection, now that South Carolina Gov. Nikki Haley (R) has been confirmed as U.S. ambassador to the United Nations.27 And the percentage of women who serve as state legislators, which stands today at 25 percent, has essentially remained flat since 2009.28 This persistent underrepresentation of women at all levels of elected office, from city councils on up, means that they aren’t taking their place in the political pipeline that will produce America’s future leaders. In fact, the Institute for Women’s Policy Research has calculated that if the pace of women’s progress continues at the same rate it has since 1960, political parity will not be reached in the United States until the year 2117.29 What explains this glacial rate of change? For a long time, the perceived culprit was voter sexism—with good reason. As recently as the 1970s, deep-seated prejudice against female politicians still held sway in a wide portion of the electorate. In 1977, fully 47 percent of respondents to the General Social Survey, a nationally representative sampling of Americans conducted by the National Opinion Research Center at the University of Chicago, expressed agreement with the belief that “most men are better suited emotionally for politics than most women.”30 That number had dropped to 17 percent by 2014, the most recent year for which results are available31—and polling by the Pew Research Center in 2015 found that 75 percent of Americans said women and men make “equally good political leaders.” Pew also discovered that significant and consistent majorities of Americans now believe there are no meaningful differences between men and women when it comes to leadership traits such as decisiveness, ambition, and intelligence.32 In fact, rather than being viewed as a handicap, being female can now work to candidates’ advantage. In the past decade, female senators’ well-publicized bipartisan dinners, co-sponsorship of legislation, and—most famously—ability to lead their fractious colleagues to the budget deal that ended the 2013 government shutdown have led to the widespread belief that female politicians are more skilled than men in the art of compromise—a view shared by 34 percent of Americans, according to Pew.33 Baby bust—or boon? The presence of young children was a major, often fatal, stumbling block for female candidates for decades. When Patricia Schroeder, a Democrat from Colorado, first ran for the U.S. House of Representatives in 1972, she fielded constant, reproachful questions about the whereabouts of her two children, then ages 2 and 6. In an interview with the author, she recalled how this led her, on her first day in Congress, to finally snap, “I have a brain. I have a uterus. They both work.”34 Assumptions and expectations regarding motherhood remained highly problematic through the early 1990s. “When I ran for the first time often I was asked, ‘well, what are you going to do with your kids?’” recalled Sen. Patty Murray (D-WA), who was elected into office during the so-called Year of the Woman in 1992. “That question is not asked anymore today. It’s not an anomaly. It’s what so many women and men have to do. It’s not a barrier. It’s something expected.”35 Voter sexism, and outright misogyny, do, of course, still exist; the 2016 presidential election provided countless examples, generated by both candidates and voters. And while data on how women fare as candidates for state-level executive office are very limited, one 2015 study36 conducted for the Barbara Lee Family Foundation by Kelly Dittmar, a scholar at the Center for American Women and Politics, did yield some troubling results. Dittmar studied the nine gubernatorial campaigns in 2014 in which women were on the ballot—looking at press coverage, polls, debates, social media, and campaign output—and interviewed candidates and members of their campaign staffs. She found, consistent with previous research, that women candidates had to prove their qualifications for executive office while also meeting voters’ higher “likeability” demands upon them as candidates. What this appears to mean is that in order to win, women campaigning for executive office must perform gender in just the right way to hit the sweet spot in voter attitudes—conforming to positive stereotypes while countering negative ones. In an interview for this report, Dittmar, the author of a 2015 book on gender in statewide races,37 observed that there were “different rules” and “different expectations” for the female gubernatorial candidates she studied. “Winning could be, for women, evidence that they navigate this terrain successfully,” she said.38 When it comes to legislative elections, however, a solid body of research has emerged to make the case that gender bias on the part of voters does not play a meaningful role at the ballot box. For example, Barbara Burrell, professor emerita of political science at Northern Illinois University, studied the role of gender in election campaigns for Congress spanning 1968 to 2010 for her 2014 book, Gender in Campaigns for the U.S. House of Representatives. Her conclusion: “Not only do women win when they run, they run in the same ways and face the same obstacles as male candidates.”39 More recently, for their 2016 book Women on the Run: Gender, Media, and Political Campaigns in a Polarized Era, Danny Hayes and Jennifer Lawless, political scientists at George Washington University and American University, respectively, examined voter attitudes, voting behavior, and media coverage in every congressional district in the United States during the 2010 and 2014 midterm elections. They concluded that the “vast majority” of women candidates were treated “no differently” than men by voters and the media.40 Academic researchers such as Burrell, Dittmar, Hayes, and Lawless do not argue that all sexism is gone from the American political scene. On the contrary, experimental studies conducted in laboratory settings, in which subjects are tested on their views of hypothetical male and female candidates, still show the presence of some forms of classic gender bias. But what the new research shows is that, when people are called upon to make voting decisions in real-life settings, those abstract beliefs about men and women don’t have much meaning. What really matters, in our increasingly divided times, is a candidate’s party and ideology. In 2014, Kathleen Dolan, a professor of political science at the University of Wisconsin-Milwaukee, published an innovative study that made this distinction clear. She surveyed 3,200 people in nine different states, first testing their abstract views of gender by evaluating their reactions to hypothetical male and female candidates, and then returning to see how they evaluated real candidates in their own local races for the U.S. House and Senate. Like Lawless and Hayes, Dolan found little evidence that gender stereotypes came into play in real-world political decisions—political party and accompanying ideology were what mattered the most.41 “There is a distinction between occasional, albeit high-profile, examples of sexist behavior and systematic gender bias in campaigns,” Hayes and Lawless explained in an op-ed in The Washington Post in May 2016. “Women are under-represented not because of what happens on the campaign trail, but because they are much less likely to run in the first place.”42 Indeed, from 1980 to 2012, women made up only 13 percent of all candidates in primaries for U.S. Congress.43 In light of this, their 19 percent current representation in Congress could be seen as an outsized success. What keeps women out of office The privilege of incumbency How are we to square the new research that tells us that women campaigning for public office are treated and thought of as well as men with the fact that women’s political representation is still so woefully inadequate? A big part of the answer lies in understanding that there’s an essential caveat to many of the studies that show men and women doing equally well as candidates. Those studies are designed to isolate the effect of gender by comparing men’s and women’s chances at winning legislative office, all else being equal—that is, after factoring out real-life differences so that you can compare “apples to apples” such as incumbents to incumbents. The problem is that the real-life trajectories of male and female candidates is rarely an apples-to-apples proposition. Take the issue of incumbency, which gives officeholders an enormous advantage at election time. Men were 81 percent of the incumbent members of the U.S. House of Representatives in 2016. Incumbents ran in 90 percent of House races that year. And 97 percent of those incumbents won their races.44 The same general pattern holds at every level of elected office in the United States. A gatekeeper system that helps insiders and limits ballot access This political establishment—call it a system of gatekeepers—determines who is recruited and encouraged to run for office, who gets fundraising resources, and who wins endorsements—in other words, who gets on the ballot and in which races. Gatekeepers are political power brokers—party leaders, big donors, and key advocacy groups such as unions and chambers of commerce—who identify, recruit, and groom candidates, rally support and funding for them, and confer upon them the blessing of “viability” that signals to other funders and power brokers that they’re the ones to back. These decisions are generally made quickly, in advance of filing deadlines, and the names put forward are generally drawn from a small pool of long-term party faithful. Favored candidates tend to be familiar faces who will predictably uphold party interests and—above all—have easy access to money and the ability to devote considerable personal resources, including time, to their campaigns.45 Candidates without personal fortunes or ready access to wealthy donors are deemed not to be viable. Overlooked early on by the powers that be, their unviability often becomes a self-fulfilling prophecy, as groups that fund candidates decide to devote their resources to races that seem easier to win. Not surprisingly, women—and women of color in particular, who generally have lower incomes, lower net worths, and far less social and professional access to big donors—tend to get short shrift in this early “wealth primary”46 and are eliminated as players long before voters have a chance to encounter them. Making it through this first voterless primary has proven a particularly enduring problem for women of color, who tend to have the hardest time breaking into the social networks that will bring them the level of private donations they need to convince gatekeepers that their campaigns are viable investments. Even those who eventually rise to star status, such as newly elected Sen. Kamala Harris (D-CA), often find that they must work twice as hard at the start of their political careers to take on the gatekeeper establishment.47 Women of color face extra fundraising challenges Campaigning while female—always a complicated game—takes on a whole new level of complexity once race is factored into the equation; the standards of viability are even higher, appearance is all the more scrutinized, and “relatability” is tougher to achieve. For Nina Turner, the former Ohio Senate minority whip, all this added up to major problems in convincing donors of her viability when she ran for the office of Ohio secretary of state in 2014, aiming to become the first African American from the Democratic Party to win a statewide office in Ohio.48 Although Turner had a considerable public profile, was a media favorite, and had the statewide backing of unions and other grassroots organizations, her opponent, the Republican incumbent Jon Husted, out-fundraised her nearly three-to-one. In an interview with the author, she attributed her fundraising difficulties in part to the fact that donors typically calibrate how much money they will give a candidate to how they judge the candidate’s ability to fundraise, holding off on giving their maximum support until a candidate has hit a fundraising threshold. The game of fundraising is played with “a stacked deck,” Turner said. “How do you create equity in funding African American and Latino women who have less access to fundraising money in the first place, if your standard for giving money is that the person has to hit a certain threshold?”49 Lack of recruitment and encouragement All people—men and women alike—are more likely to run for office if asked. Yet as women are less likely than men to think they are qualified to run for office,50 they especially need to be asked, often repeatedly. And they are less likely to get that encouragement.51 None of the women interviewed for this paper reported having been actively recruited by the powers that be. “Oh Lord, no. Not in the slightest,” said Teresa Purcell, who managed Sen. Murray’s first, long-shot race for the U.S Senate in 1992, when asked if party gatekeepers had sought Murray out and supported her early on in that campaign. A 2014 report from the Institute for Women’s Policy Research reached similar conclusions. After conducting 60 interviews with female candidates, officeholders, and congressional staff members, the researchers found that 51 percent of the female candidates and elected officials said they had never been encouraged by party leaders to run for higher office, and 71 percent said they had never had such encouragement from other power brokers. In fact, a number of women interviewed for this report spoke of subtle dissuasion: for example, party officials telling women not to mount primary challenges to incumbents in their own party. And even when they were given the nod to run, women were often encouraged to compete in difficult races where their own party was more likely to lose. The high personal and financial costs of a political career Many local and state-level elected offices pay so poorly that it’s very difficult for people without deep pockets—or a high-earning spouse—to consider a career in politics. Legislators in Texas earn just $7,200 per year, for example, plus a $190 per diem for expenses, while those in New Mexico earn no yearly salary and are provided a daily allowance of up to $163 for official expenses.52 In some states, the problem of low pay is mitigated by the fact that legislative office is considered a part-time job. But that is of little help for those whose jobs don’t permit them much flexibility or who have caretaking responsibilities that make commuting to a statehouse far from home all but impossible. This again keeps candidates without personal wealth, support on the homefront, or career flexibility—disproportionately women—from running in state-level elections and eventually finding their place in the pipeline for higher office. Combating the structural impediments to women’s progress with structural solutions Establishing alternative networks States with long-entrenched and powerful gatekeeper networks, which retain some of the vestiges of the old so-called political machines, such as Pennsylvania, have tended historically to have considerably lower levels of female representation. On the other hand, states where traditional political machines have tended to be less entrenched, often in the West, have typically provided more opportunities for female politicians. In Oregon, for example, women have had their own support structures, in the form of a political action committee, or PAC, started in 1987 to fund female candidates and a nonprofit, the Oregon Women’s Campaign School, founded in 1979 to train and encourage female candidates.53 The results speak for themselves: In 2016, Oregon had a female governor, secretary of state, attorney general, and speaker of the state House.54 Starting this year, a majority of the state legislature’s Democrats will be women.55 The national organization EMILY’s List, founded in 1985 to fund pro-choice Democratic women for elected office, was formed with the knowledge that early money is the key to both sustained fundraising and institutional support, and it is now the largest and best-known alternative network supporting women candidates. Since its inception, the organization has raised more than $500 million and trained more than 9,000 women, with more than 900 of them winning office.56 In more recent years, Emerge America has become another leading organization training Democratic women to run for office and bringing strong potential female contenders to the attention of traditional gatekeepers. In 2016, Emerge fielded 213 women as candidates for office in 17 red and blue states—and 70 percent of them won their races.57 Working around gatekeepers, taking on the establishment With training and support from Emerge America, Annissa Essaibi George, a public high school teacher and yarn store owner, first ran for the Boston City Council in 2013—and in 2015 she won an at-large seat, dislodging one of the council’s longest-serving members, 18-year veteran Stephen J. Murphy. In doing so, she became the first Arab American to serve on Boston’s traditionally white, male council. Having an alternative gatekeeper structure behind her was key. According to George, the city’s traditional power brokers showed little interest in her candidacy—until her poll numbers showed her doing so well that they had no choice. “A number of people tried to talk me out of running. It was anything from ‘You can’t do it this year because you’re not going to win’ to ‘It’s too hard to beat incumbents’ to ‘Your children are too young; you have to wait another two years,’” she said. “The people who tried to talk me out of running were people who support the establishment. They sort of wished me well and sent me on my way, and in the final weeks they were saying they’d known I could do this and they’d known from the start I’d do well.”58 Changing voting systems and electoral structures to help level the playing field for outsiders The winner-take-all systems that govern how most elections work in the United States give enormous power to incumbents, who are primarily white men. Many of those advocating for a government that is more representative of American voters now argue that to open up more space for women and people of color, we need to change those winner-take-all systems in ways that create more opportunities for outsiders. One such reform, currently adopted by more than a dozen cities,59 is a process known as ranked-choice voting. In this system, also called instant runoff voting, voters select more than one candidate in order of preference. The candidate losing by the largest margin—the lowest vote-getter overall—is then eliminated, with that candidate’s votes transferred to voters’ second-choice candidate. The process repeats until a single winner remains. Ranked-choice voting was adopted by San Francisco in 2002 and Oakland, California, in 2006. In June 2016, a study by the organization FairVote analyzed the effect of ranked-choice voting on local elections in the San Francisco Bay Area and found that the use of the system was associated with the election of more women, people of color, and women of color.60 Current Minneapolis Mayor Betsy Hodges (D) credits ranked-choice voting with helping her win office in 2013. Like other advocates of the system, she has argued that ranked-choice voting motivates candidates to appeal to larger swaths of voters, in order to win those who might designate them as their second choice. At the same time, the risk of offending voters creates a disincentive for engaging in highly negative attacks on opponents. All of this, proponents say, reduces the potential ugliness of campaigning—which, research shows, is a particular turnoff for women—and makes elections more hospitable. The 2013 Minneapolis mayoral race was so hospitable, in fact, that no fewer than 35 candidates crowded the ballot. To prevent a replay, in 2014, Minneapolis voters passed a measure increasing the $20 filing fee for would-be candidates for mayor to $500.61 In November, voters in Maine narrowly approved a ballot measure making it the first state to adopt ranked-choice voting to elect its U.S. senators and members of the House of Representatives, as well as future governors and state legislators.62 The 2018 election will be the first using the new system. Multiwinner legislative elections Another method that has shown some success in increasing the number of women in elective office is the creation of multimember legislative districts, where several candidates compete for multiple seats in one district, instead of a single seat, as is currently the case in all U.S. House races and most state legislative elections. In single-winner districts, the inherent advantages of incumbency make it extremely challenging for newcomers to break in, and the winner-take-all nature of elections means that campaigns have a tendency to be hostile. However, in multiwinner legislative elections, voters choose a slate of candidates in their districts. In Maryland, for example, voters elect three state House members and one state senator from each of the 47 legislative districts.63 The argument in favor of multimember legislative districts holds that such a system essentially requires candidates to try to appeal to a larger slice of the electorate and tends to lead to a somewhat more congenial campaign environment. Advocates point out that multiwinner legislative elections have a track record of leading to the election of more women, both in the United States and abroad.64 Skeptics note, however, that New Jersey is one notable state that uses multimember districts to elect all members of its state House but that also, until quite recently, has had a notably poor track record of electing women to office. Ten American states currently use such a system to elect representatives to at least one house of their state legislature.65 Ward- or district-based local elections Yet another reform, which has been adopted by cities such as Austin, Texas, and Seattle, is a shift away from selecting city council members through at-large citywide elections toward selecting at least some council members through ward- or district-based elections. Such elections cost candidates less money and tend to encourage a more grassroots approach to campaigning. In addition, ward- or district-based elections have proven to greatly increase the field of candidates in city council elections and thus, directly or indirectly, can increase the representation of women.66 There is, however, a significant caveat concerning the efficacy of both of the above measures: Studies seeking to measure the representation of women overall have shown them to yield positive results, but when results are broken down by race, there are indications that they do not help the chances of women of color. A 2006 study by Becki Scola, a political scientist at Saint Joseph’s University, analyzed the relationship among a number of state demographic, ideological, and structural factors and women’s legislative representation. The study concluded that the factors that predict the presence or absence of women of color in state legislatures are not the same as those that predict the representation of white women or of women overall. In particular, Scola found that a state’s use of multimember legislative districts did not lead to a greater political presence for women of color.67 A 2008 study by Jessica Trounstine and Melody Valdini—political scientists at the University of California, Merced, and Portland State University, respectively—looked at city council races in more than 7,000 cities and showed that the use of ward- or district-based systems instead of at-large systems helped black men and white women win elections, but had no effect for African American women and Latinas.68 The reason for these discrepancies was not clear in the studies and will require further research. There are a number of concrete actions that can and should be taken to address the structural impediments to women’s leadership in U.S. politics. Change how political parties recruit and groom candidates Our political parties need to fundamentally re-examine how they identify, recruit, and back candidates and put into place systems that hold party powers that be accountable for change. To get up to speed, the parties should set voluntary numerical goals for the recruitment of female candidates for primary elections in any given year. To identify top-notch potential female candidates, party officials at both the national and state levels should work with groups that recruit and train women to run for office and make a long-term investment in grooming talented women who can ultimately emerge as leaders. These groups, in turn, must make determined good faith efforts to find a diverse pool of women and tailor their recruitment and training programs in ways that address the distinct needs of women of color, who face an additional set of challenges in breaking through gatekeeper barriers and acquiring the sort of social capital that leads to both name recognition and the ability to fundraise on a large scale. The notion of setting voluntary numerical goals for recruitment implies a far more flexible practice than the gender quotas now used internally by the Democratic and Republican parties. (The membership of the Republican National Committee includes one man and one woman from every state and territory, and the Democratic Party’s convention delegates are split evenly between men and women.69) It would be relatively easy to build on the parties’ stated desire for gender equity through nonbinding candidate recruitment goals. It would be advisable as well for the parties to make concerted efforts to ensure much greater gender diversity in their leadership structures. Reduce the role of big money in determining who runs for election Once women are established candidates running in congressional-level races, they have the ability to fundraise as well as men. Yet a relative lack of personal wealth and lack of connections to donors with deep pockets pose a serious problem for would-be female candidates looking to get started in politics. Women tend to be less well-off than men and are less likely than men to have the networks to generate large donations. This means that women are less likely to get the attention of gatekeepers and, by extension, less likely to get the funds they need to run successful campaigns. Campaign finance reform that reduces the importance of having access to big money is essential to promoting the chances of women candidates, and of women of color in particular. Although there are no public financing systems in place for elections to most federal offices, 13 states and a number of localities—including New York City; Los Angeles; Seattle; and Montgomery County, Maryland—have some form of voluntary public funding of some elections.70 Public financing systems include block grants of public funding for candidates, vouchers or tax credits for small political contributions, and small-donor public financing, in which small individual donations are matched by public funds at a fixed rate.71 The five states with public funding for legislative elections—Arizona, Connecticut, Hawaii, Maine, and Minnesota—all have levels of female representation in their state legislatures that are higher than the national average.72 In 2002, Arizona also elected its first woman governor—Janet Napolitano (D)—after adopting a system of public funding for statewide elections two years earlier.73 Both Arizona, which uses a statewide block grant program, and New York City, which uses a system of small-donor public financing, saw increases in the number of women and people of color running for office once they established public financing systems.74 In New York City’s small-donor public financing program, candidates who qualify by reaching a threshold level of very small donations receive matching funds at a 6-to-1 ratio for the funds they raise from individual donors.75 The program has been so successful that more than 90 percent of the primary candidates in citywide elections opted into it in the past two election cycles.76 Advocates credit the system with aiding the elections of Letitia James, public advocate for the City of New York and the first African American woman to hold citywide elected office, and Melissa Mark-Viverito (D), the first Puerto Rican and Latina to hold a citywide elected position, who currently serves as the speaker of the New York City Council.77 The Center for American Progress recommends that more cities and states adopt small-donor public financing of elections and has supported legislation at the federal level—the Fair Elections Now Act in the Senate and the Government By the People Act in the House—that would establish public funding for congressional elections. CAP has also previously argued strongly in favor of implementing robust small-donor public financing programs to counteract the corrupting role of big money in state judicial elections.78 Target more PAC spending to women, particularly in open-seat elections By removing the hurdle of taking on an incumbent, open-seat races have historically been the best way for women and other historic outsiders to gain entry to legislative office. Two of the new women of color joining the U.S. Senate this year—Kamala Harris and Catherine Cortez-Masto (D-NV)—for example, won in open-seat races.79 Yet new research from the Center for Responsive Politics shows that one key group of gatekeepers—institutional donors—isn’t getting the message.80 A November 2016 report, co-authored with Common Cause and Representation 2020, looked at political contributions to female candidates for the U.S. House and Senate in the 2010, 2012, 2014, and—when available—2016 election cycles and examined patterns of direct giving from individual donors, political action committees, and leadership PACs, as well as outside spending by party committees and super PACs, to women running in open-seat races.81 The report found that PACs, membership PACs, and leadership PACs alike “systematically” underfunded women running in those open-seat races.82 If gatekeepers with financial power want to put their money where their mouth is on increasing the presence of women in office, they need to earmark more of their resources for women. Deep-pocketed individual donors, leadership PACs, and PACs in general should set voluntary numerical goals for the number of women they will support in each campaign cycle and prioritize funding women who run in open-seat races. Women of color receive the lowest rate of funding, on average, of all congressional candidates. Their total contributions from donors giving more than $200 averaged $330,000 in 2014, compared with $450,000 for men of color and almost $700,000 for white candidates, both male and female.83 Pay state legislators a living wage and support them with work-family policies Currently, only 12 states pay their legislators a salary that is at least as high as the state’s median household income.84 The low pay—and in some cases, no pay—provided by many state legislatures to their members means that only people who are able to forgo considerable time and income can afford to be on the ballot. This excludes anyone without a highly flexible schedule, considerable support at home, and significant personal wealth. Therefore, states should increase pay for legislators so that potential candidates with breadwinning responsibilities can devote themselves to public service. Despite current voter hostility toward elected officials, this is not an impossible goal, even in conservative states. In 2015, for example, Arkansas raised state legislator base pay almost 150 percent, from $15,869 to $39,400 per year.85 The private sector has long known that workplace practices that help employees integrate their professional and personal responsibilities are key to recruiting and retaining talented women. Our legislative bodies need to catch up to this awareness and adopt practices aimed at easing the logistical hurdles faced by lawmakers with caretaking responsibilities, as well as those who live far from state capitals. This means that state legislatures must adopt scheduling practices that limit early morning meetings and evening floor debates and votes, as well as allow telecommuting—and proxy voting—when feasible. Conclusion: Beyond the ‘ambition gap’ The underrepresentation of women in U.S. politics does serious damage to the legitimacy of our democratic institutions. If significant numbers of Americans believe that our government is best described as an “old boys’ club,” as a plurality of likely 2016 voters polled by the Women Donors Network’s Reflective Democracy Campaign in 2014 asserted,86 then they clearly do not feel it is responsive to their needs. And as the anger and resentment expressed in the 2016 presidential election cycle showed, this feeling of alienation from government can lead to extremely destructive outcomes. The lack of women in U.S. politics can no longer be blamed primarily on voter sexism, nor should it be blamed on a simplistic idea of a so-called female ambition gap. Political ambition does not exist in a vacuum; it stems from a sense of what’s possible. That’s why any discussion of political parity that focuses on women’s internal processes regarding the decision to run without taking into account the external forces weighing upon that decision will necessarily miss the mark. A truly meaningful approach to increasing women’s representation must acknowledge that despite vast improvements in voter attitudes toward female leaders, men and women still encounter a very uneven playing field when they run for office. Moreover, the structural impediments that mark that field have very deep roots and represent a wide array of entrenched interests. Decades of focus on voter bias and women’s states of mind have not proven terribly effective in increasing women’s political representation in the United States. But international examples of rapid change via quotas87 and, increasingly, examples of successful, homegrown campaign finance and election system reform clearly indicate that structural solutions do work. Moving forward, the United States needs high-quality research to track the effects of measures such as small-donor public financing, voluntary recruitment and funding goals, and election system reform on increasing the representation of women in office, with special attention to the political fortunes of women of color. Judith Warner is a Senior Fellow at the Center for American Progress. She is also a contributing writer for The New York Times Magazine and the author of a number of best-selling books, including Perfect Madness: Motherhood in the Age of Anxiety. I am extremely grateful to all my colleagues at the Center for American Progress who generously gave their time and thought to this report. I am particularly indebted to the Art and Editorial team and to Kaitlin Holmes and Danielle Corley for fact-checking, and I am thankful to have had input from Carmel Martin, Michele Jawando, Liz Kennedy, Jocelyn Frye, and Shilpa Phadke. I owe an extra debt of gratitude to the many women cited in this paper who made time in their busy schedules to speak with me, and was very fortunate throughout to have been able to consult with Brenda Choresi Carter, Andrea Dew Steele, Kate Black, and Cynthia Terrell. U.S. Bureau of the Census, “Quick Facts: United States,” available at https://www.census.gov/quickfacts/table/SEX255215/00 (last accessed January 2017). ↩ Center for American Women and Politics, “Current Numbers,” available at http://www.cawp.rutgers.edu/current-numbers (last accessed January 2017). ↩ Center for American Women and Politics, “Women in Elective Office 2016,” available at http://www.cawp.rutgers.edu/women-elective-office-2016 (last accessed January 2017); Center for American Women and Politics, “Women in Elective Office 2017,” available at http://www.cawp.rutgers.edu/women-elective-office-2017 (last accessed January 2017). ↩ Center for American Women and Politics, “No Breakthrough at Top of Ticket, But Women of Color Gain in Congress,” Press release, November 9, 2016, available at http://www.cawp.rutgers.edu/sites/default/files/resources/press-release-post-election-2016.pdf. ↩ Kelly Dittmar, “Candidates Matter: Gender Differences in Election 2016” (New Brunswick, NJ: Center for American Women and Politics, 2017), available at http://www.cawp.rutgers.edu/sites/default/files/resources/closer_look_candidates_matter_2.14.17.pdf. ↩ Daniel Bush, “The Hidden Sexism That Could Sway the Election,” PBS NewsHour, available at http://www.pbs.org/newshour/features/hidden-sexism (last accessed January 2017); Justin McCarthy, “In U.S., Socialist Presidential Candidates Least Appealing,” Gallup, June 22, 2015, available at http://www.gallup.com/poll/183713/socialist-presidential-candidates-least-appealing.aspx. ↩ Lisa Lerer, “Clinton Wins Popular Vote by Nearly 2.9 Million,” The Associated Press, December 22, 2016, available at http://bigstory.ap.org/article/2c7a5afc13824161a25d8574e10ff4e7/clinton-wins-popular-vote-nearly-29-million. ↩ Most notably, by Kathleen Dolan and Timothy Lynch. See Kathleen Dolan and Timothy Lynch, “It Takes a Survey: Understanding Gender Stereotypes, Abstract Attitudes, and Voting for Women Candidates,” American Politics Research 42 (4) (2014): 656–676; Danny Hayes and Jennifer L. Lawless, “There’s much less gender bias in politics than you think. Here’s why,” The Washington Post, May 24, 2016, available at https://www.washingtonpost.com/news/monkey-cage/wp/2016/05/24/how-much-does-gender-bias-affect-u-s-elections/?utm_term=.96504203dbab; Deborah Jordan Brooks, “Assessing the Double Bind: Public Reactions to Displays of Toughness by Male and Female Candidates” (Hanover, NH: Dartmouth College, 2010); Barbara Burrell, Gender in Campaigns for the U.S. House of Representatives (Ann Arbor, MI: University of Michigan Press, 2014). ↩ Pew Research Center, “Chapter 2: What Makes a Good Leader, and Does Gender Matter?” In “Women and Leadership: Public Says Women Are Equally Qualified, but Barriers Persist” (2015), available at http://www.pewsocialtrends.org/2015/01/14/chapter-2-what-makes-a-good-leader-and-does-gender-matter. ↩ Political Parity, “Women Candidates and Their Campaigns” (2015), available at https://www.politicalparity.org/wp-content/uploads/2015/08/Parity-Research-Women-and-Campaigns.pdf. ↩ Dittmar, “Candidates Matter: Gender Differences in Election 2016.” ↩ Reflective Democracy Campaign, “Reflective Democracy: Ballot Demographics” (San Francisco: Women Donors Network, 2015), available at http://wholeads.us/candidates/wp-content/themes/phase2/pdf/full-report.pdf. ↩ Burrell, Gender in Campaigns for the U.S. House of Representatives. ↩ A recent report from the City University of New York Institute for State and Local Governance found that in 2015, “18.2 percent of elected mayors in the top 100 U.S. cities are women” and “19.3 percent of mayoral candidates in the top 100 U.S. cities were women.” The authors stated, “Our results indicate that when they run for office, women perform almost as well as men in mayoral elections.” See Jocelyn Drummond, Qian Zhang, and Victoria Lawson, “Who Runs Our Cities? The Political Gender Gap in the Top 100 Cities” (New York: CUNY Institute for State and Local Governance, 2016), available at http://equalityindicators.org/wp-content/uploads/2016/09/CUNY_ISLG_Who_Runs_Our_Cities.pdf. ↩ For a thorough and well-explained literature review of research on female candidates’ fundraising outcomes, see Kira Sanbonmatsu, “Money and Women Candidates” (Cambridge, MA: Political Parity, 2015), available at https://www.politicalparity.org/wp-content/uploads/2015/08/Parity-Research-Women-Money.pdf. ↩ Center for American Women and Politics, “No Breakthrough at Top of Ticket, But Women of Color Gain in Congress.” ↩ Center for American Women and Politics, “Women of Color in Elective Office 2017”; Who Leads Us?, “Do America’s Elected Officials Reflect Our Population?”, available at http://wholeads.us/electedofficials (last accessed January 2017). ↩ U.S. Bureau of the Census, “Quick Facts.” ↩ Bureau of Labor Statistics, “Employment Status of the Civilian Noninstitutional Population by Age, Sex, and Race,” available at http://www.bls.gov/cps/cpsaat03.htm (last accessed July 2016). ↩ Bureau of Labor Statistics, “Employment Status of the Civilian Noninstitutional Population 25 Years and Over by Educational Attainment, Sex, Race, and Hispanic or Latino Ethnicity,” available at http://www.bls.gov/cps/cpsaat07.htm (last accessed July 2016). ↩ Kim Parker, “Despite progress, women still bear heavier load than men in balancing work and family,” Fact Tank, March 10, 2015, available at http://www.pewresearch.org/fact-tank/2015/03/10/women-still-bear-heavier-load-than-men-balancing-work-family. ↩ U.S. House of Representatives, “The Decade of Women, 1992–2002,” available at http://history.house.gov/Exhibitions-and-Publications/WIC/Historical-Essays/Assembling-Amplifying-Ascending/Women-Decade/ (last accessed January 2017). ↩ Center for American Women and Politics, “Republican Women Follow National Winning Pattern: Newcomers Take Many House Races, But Only One New Senate Seat, Three New Governors; Many Democratic House Incumbents Fall,” Press release, November 3, 2010, available at http://www.cawp.rutgers.edu/sites/default/files/resources/pressrelease_11-23-10.pdf. ↩ Center for American Women and Politics, “Historical Summary of Women in Statewide Elective Executive Office: 1969–Current,” available at http://www.cawp.rutgers.edu/historical-summary-women-statewide-elective-executive-office-1969-current (last accessed January 2017). ↩ Center for American Women and Politics, “History of Women Governors,” available at http://www.cawp.rutgers.edu/history-women-governors (last accessed January 2017). ↩ Center for American Women and Politics, “Women in Elective Office 2017”; National Conference of State Legislatures, “Women in State Legislatures for 2016,” September 20, 2016, available at http://www.ncsl.org/legislators-staff/legislators/womens-legislative-network/women-in-state-legislatures-for-2016.aspx. ↩ Institute for Women’s Policy Research, “Chapter 1: Political Participation.” In “The Status of Women in the States: 2015” (2015), available at http://statusofwomendata.org/explore-the-data/political-participation/political-participation-full-section. ↩ Robert Darcy, Susan Welch, and Janet Clark, Women, Elections, and Representation, 2nd ed. (Lincoln, NE: University of Nebraska Press, 1994). ↩ General Social Survey Data Explorer, “Women Not Suited for Politics,” available at https://gssdataexplorer.norc.org/variables/591/vshow (last accessed January 2017). ↩ Pew Research Center, “Chapter 2: What Makes a Good Leader, and Does Gender Matter?” ↩ Former Rep. Patricia Schroeder, phone interview with author, September 11, 2015. ↩ Sen. Patty Murray, phone interview with author, September 22, 2015. ↩ Barbara Lee Family Foundation, “Unlocking the Door to Executive Office: Essential Tips for Women Candidates” (2015), available at http://oe9e345wags3x5qikp6dg012.wpengine.netdna-cdn.com/wp-content/uploads/Unlocking-the-Door-to-Executive-Office_Essential-Tips-for-Women-Candidates-11.16.15-FINAL.pdf. ↩ Kelly Dittmar, Navigating Gendered Terrain: Stereotypes and Strategy in Political Campaigns (Philadelphia: Temple University Press, 2015). ↩ Kelly Dittmar, phone interview with author, September 16, 2015. ↩ Barbara Burrell, Gender in Campaigns for the U.S. House of Representatives; Barbara Burrell, phone interview with author, September 9, 2015. ↩ Danny Hayes and Jennifer L. Lawless, Women on the Run: Gender, Media, and Political Campaigns in a Polarized Era (New York: Cambridge University Press, 2016). ↩ Kathleen Dolan and Timothy Lynch, “It Takes a Survey: Understanding Gender Stereotypes, Abstract Attitudes, and Voting for Women Candidates,” American Politics Research 42 (4) (2014): 656–676; Kathleen Dolan, phone interview with author, September 15, 2015. ↩ Hayes and Lawless, “There’s Much Less Gender Bias in Politics Than You Think. Here’s Why.” ↩ Shauna Shames, “Where Women Win: Closing the Gap in Congress” (Cambridge, MA: Political Parity, 2016), available at https://www.politicalparity.org/research/where-women-win. ↩ Ballotpedia, “United States House of Representatives Elections, 2016,” available at https://ballotpedia.org/United_States_House_of_Representatives_elections,_2016 (last accessed January 2017). ↩ Interviews in support of this include Teresa Purcell, phone interview with author, November 13, 2015; Jessica Byrd, phone interview with author, November 9, 2015; Brenda Choresi Carter, phone interview with author, November 5, 2015. ↩ In 1993, Jamin Raskin and John Bonifaz, writing in the Yale Law & Policy Review, coined the term “wealth primary” to describe “the extraordinary power” of private money to shape who can run for and win public office in America. See Jamin Raskin and John Bonifaz, “Equal Protection and the Wealth Primary,” Yale Law & Policy Review 11 (2) (1993): 273–332. ↩ Personal communication from Andrea Dew Steele, president and founder, Emerge America, January 25, 2017. ↩ Anna Brand, “‘30 in 30’: Women Candidates to Watch in 2014—Nina Turner,” MSNBC, August 21, 2014, available at http://www.msnbc.com/msnbc/30-30-women-candidates-watch-2014-nina-turner. ↩ Nina Turner, phone interviews with author, September 24, 2015, and July 19, 2016. ↩ Jennifer L. Lawless and Richard L. Fox, “Men Rule: The Continued Underrepresentation of Women in U.S. Politics” (Washington: Women & Politics Institute, 2012), available at https://www.american.edu/spa/wpi/upload/2012-men-rule-report-web.pdf. ↩ Jennifer L. Lawless and Richard L. Fox, “Why Are Women Still Not Running for Public Office?”, Issues in Governance Studies 16 (2008): 1–20, available at https://www.brookings.edu/wp-content/uploads/2016/06/05_women_lawless_fox.pdf; Jennifer L. Lawless, “It’s the Family, Stupid? Not Quite . . . How Traditional Gender Roles Do Not Affect Women’s Political Ambition” (Washington: Center for Effective Public Management at Brookings, 2014), available at https://www.brookings.edu/wp-content/uploads/2016/06/Lawless_GenderRoles.pdf. ↩ National Conference of State Legislatures, “2016 Survey: State Legislative Compensation, Session Per Diem and Mileage” (2016), available at http://www.ncsl.org/Portals/1/Documents/legismgt/2016_Leg_Comp_Session_Per%20Diem_Mileage.pdf. ↩ See Women’s Investment Network Political Action Committee, “Who We Are,” available at http://oregonwinpac.com/who-we-are (last accessed January 2017); Oregon Women’s Campaign School, “About,” available at http://oregonwomenscampaignschool.org/about (last accessed January 2017). ↩ Nigel Jaquiss, “Oregon Is in the Midst of an Explosion of Female Political Power,” Wilamette Week, August 19, 2016, available at http://www.wweek.com/news/2016/08/19/oregon-is-in-the-midst-of-an-explosion-of-female-political-power. ↩ Hillary Borrud, “Oregon House Democrats Look Ahead to Female Majority in 2017,” The Oregonian, November 16, 2016, available at http://www.oregonlive.com/politics/index.ssf/2016/11/oregon_house_democrats_look_ah.html. ↩ EMILY’s List, “Home,” available at http://emilyslist.org (last accessed January 2017). ↩ Personal communication from Steele, January 25, 2017. ↩ Annissa Essaibi George, phone interview with author, November 17, 2015. ↩ FairVote, “Ranked Choice Voting in U.S. Elections,” available at http://www.fairvote.org/rcv_in_us_elections (last accessed February 2017). ↩ Sarah John and others, “The Impact of Ranked Choice Voting on Representation: How Ranked Choice Voting Affects Women and People of Color Candidates in California” (Takoma Park, MD: Representation 2020, 2016), available at https://fairvote.app.box.com/v/RCV-Representation-BayArea. ↩ Jeff Achen, “Special Report: Ranked Choice Voting—The Minneapolis Experiment,” The Uptake, November 25, 2014, available at http://theuptake.org/2014/11/25/special-report-ranked-choice-voting-the-minneapolis-experiment-2. ↩ Nik DeCosta-Klipa, “Maine Became the First State in the Country Tuesday to Pass Ranked Choice Voting,” Boston.com, November 10, 2016, available at https://www.boston.com/news/politics/2016/11/10/maine-became-the-first-state-in-the-country-to-pass-ranked-choice-voting. ↩ Thomas F. Schaller, “Multi-Member Districts: Just a Thing of the Past?”, University of Virginia Center for Politics, March 21, 2013, available at http://www.centerforpolitics.org/crystalball/articles/multi-member-legislative-districts-just-a-thing-of-the-past. ↩ On increased civility in elections thanks to ranked-choice voting, see FairVote, “Ranked Choice Voting in Practice: Candidate Civility in Ranked Choice Elections, 2013 & 2014 Survey Brief” (2015), available at https://fairvote.app.box.com/v/APSA-Civility-Brief-2015. On multimember legislative elections, see Representation 2020, “The State of Women’s Representation 2013–2014: American Women in Elected Office & Prospects for Change” (2013), available at http://d3n8a8pro7vhmx.cloudfront.net/themes/5707f5a06a21dbdb81000001/attachments/original/1467134849/rep2020Report-2013-14.pdf; Todd Donovan, Caroline Tolbert, and Kellen Gracey, “Campaign Civility Under Preferential and Plurality Voting in US Cities,” Paper prepared for the 2014 State Politics and Policy Conference, University of Indiana, May 2014, available at http://www.indiana.edu/~sppc2014/Papers/Donovan%20et%20al.pdf. ↩ Ballotpedia, “State legislative chambers that use multi-member districts,” available at https://ballotpedia.org/State_legislative_chambers_that_use_multi-member_districts (last accessed February 2017). ↩ Emily Agliano, “Locally, Voting Systems Affect Women’s Representation,” Representation 2020, November 3, 2015, available at http://www.representation2020.com/locally_voting_systems_affect_women_s_representation. ↩ Becki Scola, “Women of Color in State Legislatures: Gender, Race, Ethnicity and Legislative Office Holding,” Journal of Women, Politics & Policy 28 (2006): 43–70. ↩ Jessica Trounstine and Melody E. Valdini, “The Context Matters: The Effects of Single-Member Versus At-Large Districts on City Council Diversity,” American Journal of Political Science 52 (3) (2008): 554–569, available at https://pdfs.semanticscholar.org/5774/c88cf8c496de2585cc019cca56106795e53b.pdf. ↩ The Republican National Committee, “The Rules of the Republican Party,” available at https://s3.amazonaws.com/prod-static-ngop-pbl/docs/Rules_of_the_Republican+Party_FINAL_S14090314.pdf (last accessed January 2017); Democratic National Committee, “Delegate Selection Materials for the 2016 Democratic National Convention” (2014), available at http://demrulz.org/wp-content/files/12.15.14_2016_Delegate_Selection_Documents_Mailing_-_Rules_Call_Regs_Model_Plan_Checklist_12.15.14.pdf. ↩ National Conference of State Legislatures, “Overview of State Laws on Public Financing,” available at http://www.ncsl.org/research/elections-and-campaigns/public-financing-of-campaigns-overview.aspx (last accessed January 2017). ↩ Demos, “Designing Public Financing Systems to Advance Equity and Independent Political Power” (2016), available at http://www.demos.org/publication/designing-public-financing-systems-advance-equity-and-independent-political-power. ↩ National Conference of State Legislatures, “Women in State Legislatures for 2016”; National Conference of State Legislatures, “Overview of State Laws on Public Financing.” ↩ Megan Moore, “Names in the News: Gov. Janet Napolitano,” National Institute on Money in State Politics, December 19, 2008, available at http://www.followthemoney.org/research/institute-reports/names-in-the-news-gov-janet-napolitano. ↩ DeNora Getachew and Ava Mehta, eds., “Breaking Down Barriers: The Faces of Small Donor Public Financing” (New York: Brennan Center for Justice, 2016), available at https://www.brennancenter.org/publication/breaking-down-barriers-faces-small-donor-public-financing; Center for Governmental Studies, “Public Financing in California: A Model Law for 21st Century Reform” (2011), available at http://www.ilcampaign.org/wp-content/uploads/2014/07/CGS-Model-Hybrid-Matching-System.pdf. ↩ Demos, “Designing Public Financing Systems to Advance Equity and Independent Political Power.” ↩ Heather McGhee, “New Voices a Result of Reform,” Times Union, March 25, 2014, available at http://www.timesunion.com/opinion/article/New-voices-a-result-of-reform-5346573.php. ↩ Billy Corriher, “Public Financing of Judicial Races Can Give Small Donors a Decisive Role” (Washington: Center for American Progress, 2012), available at https://www.americanprogress.org/issues/courts/reports/2012/12/12/47657/public-financing-of-judicial-races-can-give-small-donors-a-decisive-role/. ↩ Center for Responsive Politics, Common Cause, and Representation 2020, “Individual and PAC Giving to Women Candidates” (2016), available at https://d3n8a8pro7vhmx.cloudfront.net/fairvote/pages/4944/attachments/original/1480999514/Giving_to_Female_Candidates_2016.pdf. ↩ Amelia Thomson-DeVeaux, “How Much Should State Legislators Get Paid?”, FiveThirtyEight, April 7, 2016, available at http://fivethirtyeight.com/features/how-much-should-state-legislators-get-paid. ↩ Max Brantley, “Update: Commission Approves Big State Official Pay Raises,” Arkansas Blog, March 16, 2015, available at http://www.arktimes.com/ArkansasBlog/archives/2015/03/16/todays-the-day-legislators-get-their-pay-raise. ↩ Who Leads Us and Women Donors Network, “Making the Case for Reflective Democracy: Research Brief” available at http://wholeads.us/pdf/who-leads-us-messaging-research-brief.pdf (last accessed January 2017). ↩ Pippa Norris and Drude Dahlerup, “On the Fast Track: The Spread of Gender Quota Policies for Elected Office.” Working Paper RWP15-041 (Harvard Kennedy School of Government, 2015), available at https://research.hks.harvard.edu/publications/getFile.aspx?Id=1234. ↩
cc/2019-30/en_head_0010.json.gz/line2834
__label__wiki
0.864029
0.864029
Honduras: Half-truths for Berta Cáceres and her family The irregularities in the investigation and court proceedings relating to the murder of prominent human rights defender Berta Cáceres, combined with the fact all those who masterminded the crime have still not been identified, lead to the conclusion that neither the right to justice, the right to the truth, nor the right to reparation have been guaranteed in this emblematic case, Amnesty International said today. “By excluding the victims from the murder trial of human rights defender Berta Cáceres and by having the Public Prosecutor’s Office – an institution that has repeatedly been reported for violating their rights – act as their representative, the path to justice and truth has been blocked for the defender’s family” said Erika Guevara-Rosas, Americas Director at Amnesty International. “Despite the ruling delivered today in this emblematic case, the Honduran justice system must demonstrate its commitment to the truth and identify all those who planned and ordered the murder of Berta Cáceres” Today, the National Criminal Court concluded the trial against the eight individuals accused of the murder of the Indigenous Lenca leader and environmental defender, which occurred on 2 March 2016. Douglas Bustillo (a retired military officer), Henry Hernández (a former soldier), Edilson Duarte Meza, Óscar Torres, Sergio Rodríguez Orellana (a director for DESA, the company that built the Agua Zarca dam to which the activist was opposed) and Mariano Díaz Chávez (an army major) were all found guilty by the court. Emerson Duarte Meza was found not guilty. David Castillo, the general manager of DESA arrested on 2 March 2018, is still pending trial. Irregularities during the proceedings Throughout the investigation, the family of the human rights defender and Gustavo Castro, the only person to have witnessed the killing, have reiterated that the Honduran Public Prosecutor’s Office failed to ensure genuine and full access to the case file and the evidence. As the court did not take the appropriate measures to ensure the victims had access to the evidence and the case file, the representatives of Berta Cáceres’ family and Gustavo Castro filed a motion to recuse the members of the court, deeming them to lack the impartiality required to hear and rule on the case. This petition prompted the suspension of the trial, which had been scheduled to begin on 17 September. The court reconvened to commence the trial on 19 October. The lawyers for Berta Cáceres’ family and Gustavo Castro did not appear in court on the grounds that starting the trial would be illegal, given that the ruling on the writ of amparo, submitted precisely to avoid said commencement, was still pending. On that same date, the court declared the trial to have been abandoned by Berta Cáceres’ family and Gustavo Castro. Consequently, the court decided that the Public Prosecutor’s Office should assume representation of the human rights defender’s family and the aforementioned witness. The court’s decision to force the victims to be represented by Public Prosecutor’s Office violates the guarantee of due process and thereby affects the victims’ right of access to justice, to the truth and to reparation. Representation of the victims should not have been left to an institution that they had repeatedly reported for infringing their rights. Stigmatisation and possible acts of discrimination As the trial progressed, the Civic Council of Popular and Indigenous Organisations of Honduras (COPINH) and the Broad Movement for Dignity and Justice (MADJ), the organisation to which the lawyers for Berta Cáceres’ family belong, were the focus of smear campaigns that sought to discredit their work with human rights. The authorities neither refuted these accusations nor advocated the importance of defending human rights in order to protect the members of the abovementioned organisations from further attacks. According to COPINH, on 31 August 2018, court staff forced Indigenous attendees to remove their traditional clothing before entering the courtroom and refused entry to some Indigenous attendees because there weren’t enough seats. In contrast, delegates from the diplomatic corps of various embassies were allowed to enter and extra seats were provided for them. For more information, contact Elizabeth Berton-Hunter, Media Relations 416-363-9933 ext 332 bberton-hunter@amnesty.ca Honduras: Court is violating the rights of Berta Cáceres’ family https://www.amnesty.org/en/latest/news/2018/10/tribunal-vulnera-derechos-de-la-familia-de-berta-caceres/ Honduras: Berta Cáceres’ family left without legal representation in court https://www.amnesty.org/en/documents/amr37/9286/2018/en/ Honduras: Authorities must guarantee the safety of defenders and journalists targeted in smear campaigns https://www.amnesty.org/en/latest/news/2018/09/honduras-autoridades-deben-garantizar-la-seguridad-de-defensores/ Honduras: Judicial authorities must investigate all those responsible for the killing of Berta Cáceres https://www.amnesty.org/en/latest/news/2018/07/honduras-judicial-authorities-must-investigate-all-those-responsible-for-the-killing-of-berta-caceres/
cc/2019-30/en_head_0010.json.gz/line2836
__label__wiki
0.735027
0.735027
Art Talk with Rachel Grossman By Paulette Beete and Rebecca Gross From the premiere of dog & pony dc's A Killing Game, which included live and scripted tweeting by characters and audience. Foreground, from left to right: Sean Paul Ellis, J. Argyl Plath, and Genna Davidson. Photo by C. Stanley Photography For thousands of years, theater has operated in pretty much the same way: audience members sit in seats facing a stage and watch actors and actresses as they perform. But at dog & pony dc, the line between player and spectator has become increasingly blurred. Using social media, games, and other forms of interaction, the company has sought to make the audience an active member of each production. Recently, we had the opportunity to speak with dog & pony dc co-founder Rachel Grossman, who defined the concept of “devised theater,” and shared her thoughts on the intersection of art and technology, her journey to becoming a theater professional, and where dog & pony dc looks for inspiration. NEA: What do you remember as the very first time you engaged with the arts in any way at all? RACHEL GROSSMAN: For eight years before I was born and two years after, my father was a theater professor at a liberal arts college. So I probably was engaging with the arts before I actually remember engaging with the arts. He was a huge opera buff, so there was always opera being played every Sunday morning my entire childhood into teenage years. I took dance lessons and wanted to be a ballerina until my body stopped growing proportionally in a way that was beneficial to that. So I don't know that I can say I either remember learning how to swim or being in love with the performing arts because it was always a part of my upbringing. NEA: What was your journey to becoming a working artist? GROSSMAN: My undergraduate degree is in political science with an emphasis in political theory, which I'm not really putting to immediate, obvious good use. I didn't know what I wanted to do when I graduated from college and I was thinking, well, the one thing I could do is just make more theater. At that point theater became my primary art form, and I do mean theater-making sort of broadly. I performed, I had some directing, [I had] done a lot of backstage works and design works…. I ended up getting an internship at Baltimore Center Stage… So in the first 12 years basically, I was a theater artist in the sense that I was facilitating experiences through community arts projects and education programming for students, which was predominantly older elementary, middle, and high school, but I've worked or run programs from say, pre-K all the way through senior citizens. I've had the benefit of working at five major regional theaters in the DC-Baltimore metropolitan area…. So the trajectory to me becoming the artist that I am today is really about [realizing] I was making all this art with other people for them and facilitating those programs and those processes and finally said, "What if I make it for myself with my peers?" And then that transitioned into founding dog & pony dc. It transitioned into me leaving my 12-year career in education for I-don't-know-what and then immediately ending up at Woolly [Mammoth Theatre] working with them to help launch the Connectivity Initiative, which I think is its own form of artistry. And then eventually I moved on and focus now solely on dog & pony and its growth. NEA: Before we move on to your current art practice, I’m curious, from your years working in arts education, what you saw as the benefits of that work? GROSSMAN: It’s become a bit passé now to say, but I really strongly believe we are moving as an economy and a culture---both in the country and worldwide---from this information society to a creative and innovation information society. And with that shift comes a real need for changing the way that we are thinking and using our brains. American culture and education has been dominated by very left-brained, fact and information-driven, linear thinking.… I loathe to say no one is an artist, or that being a doctor or being a lawyer or being an accountant is not creative, but there is a [mindset] of “I learn these rules and then I apply these rules.” I think to be able to recombine ideas, to look to the next generation of ideas, to work collectively, to do any of the things that are being done in technology really requires the exercising of the right side of the brain and creativity. And I think that’s why arts education is so important because we need to be… training our youth how to think and how to be analytic and interpretive and how to apply knowledge and concepts in a way that is growing the idea and moving it forward. I think that's exactly what the arts do… in addition to just being awesome and fun. NEA: Let's return to dog and pony dc. Can you talk about your mission, and also explain what devised theater is? GROSSMAN: dog and pony dc is an ensemble-based, devised theater company focused on creating performances that provide audiences new ways of experiencing theater. So that's the mission speak for you. Breaking it down, we are a company of artists [who] create our own work, devising it collectively as an ensemble…. [We] all identify as cross-disciplinary even though some of [us] are professional artists making [our] living in one area. One of the guiding principles of dog and pony dc, or an underlying tenet is called audience integration, which is about the intentional incorporation of the audience into the devising process, focusing on what the impact of the performance is going to be on the audience and what the role of the audience is going to be in the show. Role is [a] kind of elastic or flexible term. [It] could be the role in the narrative, the role in the experience. But it’s sort of seeking to exploit and capitalize on that special energy of a community of people that are in one room together. That's like glomming all the performers and the audience together into one so that all of us are the agents of action of the night out together. NEA: Can you give that a little context? Is it a new idea, is it an old idea? GROSSMAN: I think in some ways it [goes] back to the original roots of theater, and goes back to moments of theater happenings in the late ‘60s and early ‘70s. The idea that we are acknowledging the audience as opposed to turning off the lights…and pretend[ing] theater is being produced in spite of the audience. We do our thing and you do your thing, and there are appropriate ways the audience can respond or engage with the work, but only as laughter or being moved or applauding. So I don't know that it's revolutionary. I think all of us in the company, to varying degrees, were getting bored with going to theater and being ignored in the experience, or feeling like what was happening on stage was happening whether or not we were actually watching it. We're looking for experiences [that are] intentionally trying to move us in some ways. And certainly [we] would rejoice in experiences that literally moved us, asked us to do something or to be a part of that live experience. NEA: Do you think you ever run the risk of having an audience member walk in and think, "I don't want any part of this?" How do you get a more traditional spectator to become comfortable with participatory theater? GROSSMAN: We're always really conscience that at least right now, in the phase the company is in, we are not making work in a warehouse. We are not making work outside of an identifiable, traditional theatrical construct where we have a playing area and an audience area. If you didn't want to fully engage, and you wanted to step back and witness, that's perfectly legitimate and perfectly fine. There should never be anything that you are forced to do. That being said, we construct our shows as delicately and intricately as possible. We tend to use the word “scaffolding.” So we scaffold the experience so that we are progressively trying to invite everyone every step of the way into engaging with the show to their maximum capacity and comfort level. Our show Beertown I think is the clearest example. The first thing we do before the show even starts is invite everyone to come with a dessert to the potluck. If you have brought something to the potluck, you're already taking a step towards saying, "Okay, I'll buy into this experience as something I am not just going to watch." Everybody gets a name tag, everybody gets a commemorative t-shirt. We count off in the audience. So just saying your number out loud is the invitation to engage in a non-traditional sense. But looking at our newest piece, A Killing Game, everybody is asked to change seats at one point---we call it "redistricting"---and everyone has a random color they are assigned. We say, "Okay, redistricting begins now," and we tell them where they go. But we don't say, "Everybody show me your purple card," so if you chose to just sit where you were in the audience and the audience redistricted around you, that would be fine. But we have yet to have that happen. I think that's because nothing is forced; everything is an invitation, not an expectation. There is a point at which you say, "Where is this going to take me?" and curiosity gets the better of you. NEA: How do ideas spark for dog & pony? GROSSMAN: All of our worked is framed or begins with some sort of question that we are interested in. We're interested in exploring the answer to a guiding question or an essential question. How do individuals navigate community? is the question for Beertown. How do we perpetuate hype in the face of crisis? is the question for A Killing Game. By the time we have made a piece and are performing it, we are actually posing that same question, through the performance, to the audience. So to go back to this concept of idea and sources, for Beertown we basically started exploring the idea of individual within the community as being an American identity. [We] did a lot of work on how has that idea been expressed, did a lot of reading, a group reading of novels and other plays, and watching movies. A constant synthesizing between what ideas we are actually attracted to and then how do we make those ideas performative. I don't know what that process is other than just research, analysis, and then synthesis into performance. For A Killing Game, it actually started with Eugène Ionesco’s play, Jeux de Massacre, which is translated into Killing Game; the phenomenon around the 1932 War of the World's broadcast which we heard about first in a Radio Lab episode; and the game, Flux, which is a card game with ever-changing [rules]. So it’s looking at these three sources and how they, in different ways, tell the story of the way we respond to crisis and emergency, and the way that people form community and play at crisis and emergency. The ideas of the show sort of grew out of that. NEA: One of the other things I am really interested in is how you integrate social media into the productions. Has that always been a part of what you were doing? GROSSMAN: A Killing Game has social media built into the performance, and Beertown has social media extend the performance out into the real world. Beertown had a town website, and characters had Facebook pages and some characters had e-mail addresses which everyone had access to and would e-mail. We made the decision to do that because it sort of serves as that final bridge between the world of the play and our world. [It] playfully legitimized a town that we made up in the eyes of all the audience members. It was sort of our version of program notes, if you will. In a program, they say, "This is the history of the play and this is the background of the characters and this is what the characters are like." But it comes from a very removed and academic place. So we just said, “What if all that information was given to you by a website as if it was written by the town citizens and headed by the librarian, and if you had further questions about things you wanted to know about the town or the history or something that happened in the show, you would just ask them?” Just like you would ask any person. It seemed like the natural choice to do at that point and when we moved into creating A Killing Game, we were looking at hype and hysteria and how crises are managed now. Twitter and social media platforms are such a part of the way we communicate in times of crisis. You look at natural disasters: it's coming out on Twitter before it ever hits a regular news cycle. Sadly after the campus shooting at Virginia Tech, all of a sudden, nationwide campuses started text and Twitter campaigns in case of an emergency. So it just seemed appropriate that we should have that embedded in our show as part of the storytelling. NEA: There's this huge discussion going on allowing social media in the theatrical space. What are your thoughts on this? GROSSMAN: Because [social media] was a part of the story arc and the experience arc of the show, there is pretty much no problem from our standpoint about it. There's been very little problem from the audience's standpoint about it, to the point that cell phones go off in the middle of the show and no one actually turns their head to look, which is shocking. The first night that happened, where a cell phone loudly went off, I was very conscious because where I was sitting, I had most of the audience around me. I was very conscience that nobody flinched, nobody looked, nobody did anything and it actually rang a couple times and it went off. It was very low-key because we all had our phones on. It was sort of an acceptable part of where we were. The biggest concern we've had is people feeling like they might be missing something. [In] one of the scenes right now, there's an auditory series of newscasts that are tuning in and out on the radio, and there's a Twitter script as well. So if you are on Twitter and you're looking and you're listening, you get to see what characters are tweeting about it---that complements what's happening. And then of course you have audience members tweeting about what they are seeing as well. [But] if you don't tweet, it doesn't matter. You can follow along if you want to, or we'll send you what happened the next day or we'll publish what happened the day before---the scripted, so to speak, tweet. The Twitter components are always the same every night. NEA: Do you think there's a way to integrate social media into more traditional theater pieces? GROSSMAN: I am talking with other companies at this point about projects for that. I think a lot of it has to do with clear communication, and that's something we have certainly done with this show. It’s clearly communicating, “This is a part of the experience." There are a lot of perceived negatives. Like it’s going to be distracting, it’s going to ruin the design, people aren't going to pay attention to what's happening on stage, they are going to be so engrossed in their device, it's rude. I think those are all prejudgments that people have made before they have actually tested or used any of it…. I think we have yet to think creatively about how to use it, but we've been able to build up a lot of concern about what would happen if we did do anything. I feel like each theater or each organization saying, "We're going to try to use this type of technology, in this select way and see what happens," is a more healthy way to approach it rather than, "There are going to be all these problems, we have to contain it and control it." NEA: There seems to be this really fertile ground where arts and technology intersect. Let’s talk about that space. GROSSMAN: I think technology and Web 2.0 culture is a creative culture, a creative economy. I think when we look at the intersection, it’s because it is artistic. It is about generating ideas, creating conversation. And it is about storytelling. Stories are happening. People are self-curating all the time on the web through video and through Facebook, through Twitter. It’s like people looking at…an avocado and a strawberry and being like, “What would we do with these things? What if you put them in a salad and put some spinach on it?" They are not actually that different, but there is this perception that they are two separate things. Technology has this perception right now of being so accessible, because it is, and so immediate and so understandable and recognizable. And there are so many art forms that aren't, that don't have that perception of having open access and immediate sharing and the sense of community building, which is bizarre. So I think there is this idea that one can help us get to the other, to what we are missing in the other. NEA: In your pie in the sky vision of ten years from now, how would you love to see theater transformed by technology? GROSSMAN: This trajectory that we are on right now with using Twitter in the show is how we can really continue to expand and explode the live possibility of theater by using social media. How are all the immediate elements that technology provides us able to infuse performances, and also create greater access for people to engage in that live experience that may not actually be live in the room that night. Our dream, in some ways, particularly for A Killing Game, is that people would be tweeting from outside the show into the show and that would be affecting what was happening inside the show. So it takes our audience integration to the next level. Our audience could be in Hawaii. NEA: How does that then expand your idea of audience? GROSSMAN: I think it allows us to tap into arts experiences very much the way we'd like to happen to the lives of others. It creates a new vision for access. Accessibility is one of those words I kind of get a shiver about because I think it’s co-opted and buzzed so much… [But] if I am sending tweets [during a play] like "Oh my gosh, I just died," and "Holy cow, look at this woman, she's so crazy," and I take a picture of one of the characters and you say "Oh my god, what are you doing," and I am like, "We are at this play," and we start a conversation about what I'm doing in a performance that really challenges openly, and very publicly, what your perception of theater actually is, you're like, "Well, if I can take my phone in that's great, I would love to go in there.” I want to start controlling, self-curating, and having fun within this experience. Right now people are writing plays in 140 characters and I think that's interesting, but for me it doesn't expand the art. What's inherent within the art form is the live communal conversation that happens around a shared artistic event. So I am curious how technology can infuse and further exploit the live-ness, but also open up visions of what the art form is to others. NEA: What do you think the role of the artist in the community? Conversely, do you think the community has a responsibility to the artist, and if so, what is it? GROSSMAN: I am a theater artist that's drawn to making work that's conversational in nature. So I feel like the role of the artist is to be a conversation-starter. It's about framing a topic, a subject, a statement in a different manner and a different way than we have it framed for us every day. That hopefully suggests or provokes deeper contemplation and dialogue about that topic or that issue. Hopefully inherent in that is the artist then also is more of a provocateur as opposed to an entertainment…The artist is saying, "Let me challenge those ideas that make you comfortable, or that make you secure, or that validate ways that you think about the world and how you operate within it." I think that's the artist's responsibility, to serve its community---community being a very elastic word. I think the community's responsibility back to the artist is to value and support the role of inquiry and of questioning. A Killing Game, audience participation, Beertown, dog & pony dc, interactive theater, National Endowment for the Arts, NEA, Rachel Grossman, theater, Twitter
cc/2019-30/en_head_0010.json.gz/line2841
__label__cc
0.693451
0.306549
Platform Review Moving Words Residencies & After School Programs Jump The Turnstile Original Mixed Media Productions Arts Programs for Senior Citizens Bridging Gaps Stories In Motion Staff & Interns A Cross National Collaboration of Musical Composers, Poets and Dancers The Intonation project is a collaboration between American poets and composers from the Jerusalem Academy of Music and Dance in Israel. Our goal is to foster a deeper understanding of one another’s cultures, artistic process and humanity through the exploration of the idea of the “body” and how its dissimilarities unite us. The poets will participate in a residency where they will each give a talk on the concept of the body. They will then write a poem inspired by the ideas discussed, which will be sent to the composers in Jerusalem, where they will create and structure a musical narrative based on the poetry. The compositions will be sent back to the United States to be performed and recorded by musicians and then choreographed by dancers who will perform the original work to a wide audience, who will in-turn become part of the project as they internalize the ideas presented. This is a circuitous process that emphasizes the idea of equality, inclusion and a deeper understanding of the self as it is reflected in the many selves our bodies inhabit. The artists chosen for the project come from different cultural and religious, socio-economic and artistic backgrounds, which leads to a multi-layered scope of what art/artist in America or Israel looks and sounds like. We strive to showcase the assertion that there is no singular definition of an experience; though we are situated on two different continents and use different modes of expression, we seek to bridge this gap by inviting both sets of artists to use their craft and culture to explore the thing that we all share in common, our bodies, our humanity. There are bodies of water in between us, there are histories that separate us and yet what we hope to achieve is a deeper understanding of one another’s plight and the beauty of our shared differences written across one body of work.
cc/2019-30/en_head_0010.json.gz/line2842
__label__wiki
0.721549
0.721549
Nick Scott to head Ashfield Land in London Nick Scott has been appointed as Director and head of Ashfield’s new London office. Nick, who was previously Head of Asset Management at Triangle Group, will be responsible for opening and building the Ashfield offering in London. At what is both an exciting and challenging time for the London property market, Nick will work on advancing Ashfield’s existing development pipeline as well as being responsible for sourcing new investment and development opportunities at values of between £5 million to £20 million. “The London and South East property market is one of the most vibrant and dynamic in the world at the moment,” said Nick. “Ashfield Land already has a fantastic reputation and I’m excited to come on board and help to grow the company’s presence here. I’m confident that the team we’ll build in London will identify and secure some great development and investment opportunities.” Nick brings a wealth of experience to London with over 20 years’ experience in the property industry. He spent three years as Head of Retail Property at Schroder Property Investment Management where he managed the £0.6bn retail and leisure portfolio, with other previous appointments including Director at New River and Director of Development at Parkridge Developments Limited. Nick is a member of the Royal Institution of Chartered Surveyors and a member of the Investment Property Forum. Claire Cope Director, BA (HONS), MPlan, MRTPI E: clc@ashfieldland.co.uk Privacy PolicyTerms & ConditionsSite Map Website by JFD© ASHFIELD LAND 2019COMPANY REGISTRATION NUMBER: 02634101
cc/2019-30/en_head_0010.json.gz/line2844
__label__wiki
0.507219
0.507219
Home / Gallery / Paintings / Peggy’s Cove Lighthouse “Peggy’s Cove Lighthouse” is an original oil-on-canvas painting by Jonathan Whitlock, an artist who makes his home in Lancaster, Pennsylvania. The painting was inspired by trips to Peggy’s Cove in Nova Scotia with family. Jonathan used it as a vehicle to expand his capability with brushes, improving fine-line work that he says is difficult, “but not impossible.” The work depicts a classic white lighthouse tower on a rock foundation, with a bagpiper in the foreground. It is a peaceful image, featuring a color palette in white, grey and sky blue. “Peggy’s Cove Lighthouse” is one-of-a-kind, with no prints or duplicates, though the village has inspired the artist to create multiple works. It measures 24 inches by 36 inches. Category: Paintings Minimum donation allowed$430.00 Village of Peggy’s Cove Three in a Row Music & Art I What Do You See: A Rabbit? Music & Art II
cc/2019-30/en_head_0010.json.gz/line2846
__label__wiki
0.658228
0.658228
Les Levine, Resurrection 2 Feb — 6 May 2019 at the Irish Museum of Modern Art in Dublin, Ireland Les Levine, Resurrection. Courtesy of Irish Museum of Modern Art Resurrection (1972-2016) is a new work by the world renowned artist Les Levine. In 2010 Levine donated an 80-piece photographic work to the IMMA Collection entitled The Troubles: An Artist’s Document of Ulster (1979), in memory of his parents Muriel McMahon and Charles Levine. The work was produced from photographs he had taken while in Belfast and Derry in 1972. Levine makes the point that The Troubles was the first major media work of art. In contrast to the media, however, Levine’s approach was to capture events from a human point of view rather than a political one. Careful to avoid bias, he wanted the photographs to tell their own story. Revisiting the series in 2015 Levine was struck by the sheer number of images of children. This process resurrected the intense feelings that he had experienced while documenting Northern Ireland in 1973, and resulted in this revision of the original work. Selecting a number of these images of children, Levine has attributed a question to each photograph. Each image is also surrounded with contact sheets of all the photos he took in 1972, providing extra context for the viewer while they ponder the questions and arrive at their own answers. IMMA’s mission is to connect audiences and art, providing an extraordinary space in Ireland where contemporary life and contemporary art connect, challenge and inspire on another. IMMA shares, develops and conserves the Irish National Collection of Modern and Contemporary Art for now for the future. Museum profile More from Irish Museum of Modern Art A Vague Anxiety 1 Apr — 18 Aug 2019 A Fiction Close to Reality 1 Apr — 29 Sep 2019 1 Feb — 29 Sep 2019 Then and Now, Janet Mullarney More in Ireland Permanent event at Galway City Museum in Galway Medieval Galway: Galway Within The Walls Prehistoric Galway Revolution in Galway
cc/2019-30/en_head_0010.json.gz/line2850
__label__wiki
0.845713
0.845713
The Prodigy Asks Fans To Line Keith Flint's Funeral Procession Route posted by Katrina Nattress - Mar 24, 2019 The Prodigy singer Keith Flint is being laid to rest on March 29 during a private memorial at Saint Mary's church in Essex, England; however, the band is inviting fans to line the procession route. "Fans are invited to line the procession route, starting at 3pm in Braintree, Essex on Fri 29th March, to pay their final respects & 'raise the roof' for Keef!" the industrial rockers wrote on Twitter, alongside a graphic mapping out the route. "If anyone wishes to lay flowers or tributes these should be sent to St Mary's church in Bocking, no later than 2pm Friday." 'The church service will just be for family and close friends, but there will be speakers relaying the ceremony outside the church for everyone to hear," The Prodigy added in a second tweet. Check out both posts below. Flint was found dead in his Essex home on March 4. His cause of death was later revealed, confirming that he hung himself. A toxicology report is still pending, with a hearing scheduled on July 23. The singer was 49 years old. Since his passing, The Prodigy has cancelled all scheduled tour dates. Though the band has put a pause on live shows, it is slated to release a new single, “Fight Fire With Fire,” on Record Store Day.
cc/2019-30/en_head_0010.json.gz/line2851
__label__wiki
0.872133
0.872133
Kristoff St. John died of heart disease, coroner says Posted 2:22 pm, March 19, 2019, by CNN Wire, Updated at 02:24PM, March 19, 2019 PASADENA, CA – FEBRUARY 21: Actor Kristoff St. John attends the 45th NAACP Awards Non-Televised Awards Ceremony at the Pasadena Civic Auditorium on February 21, 2014 in Pasadena, California. (Photo by Alberto E. Rodriguez/Getty Images for NAACP) Actor Kristoff St. John, who starred on the CBS daytime soap opera “The Young & the Restless,” died of heart disease, according to the Los Angeles County Coroner. St. John, who played Neil Winters, was found dead at a home in the Woodland Hills area of Los Angeles in February. He was 52. The coroner’s office said St. John’s significant conditions included “myocardial bridging of left anterior descending coronary artery.” Alcohol was also a contributing factor. His death was ruled an accident. St. John joined the cast of “The Young & the Restless” in 1991. After his death, co-stars and Hollywood peers were among those who mourned St. John’s loss. “The pain of grief and mental health should be addressed in the same realm as ‘physical’ ailments,” wrote actress Viola Davis. “No real words except….I hope you found peace. God bless those you loved who were left behind. With all my heart and empathy.” ‘Young & the Restless’ begins bidding farewell to Kristoff St. John Disney Channel star Cameron Boyce died of natural causes, according to preliminary report John Singleton, ‘Boyz n the Hood’ director, is dead at 51 Luke Perry featured in new ‘Once Upon a Time in Hollywood’ trailer 77 community members became Americans today at St. John’s Church Arts and Entertainment National Comedian Tim Conway dead at 85 John Singleton, ‘Boyz n the Hood’ director and writer, hospitalized after stroke Instagram Local Man arrested for killing Tommie, the dog set on fire in a Richmond park Virginia This Morning The Death of a Founding Father Arts and Entertainment News Peter Mayhew, Chewbacca actor, dead at 74 Arts and Entertainment Local Showtime’s ‘The Good Lord Bird’ holding casting call for actors in Richmond
cc/2019-30/en_head_0010.json.gz/line2852
__label__wiki
0.720908
0.720908
BR Home Page > Players > Mariano Rivera > 2011 Pitching Game Logs Position: Pitcher Born: November 29, 1969 in Panama, Panama pa High School: La Chorrea (Panama, Panama) Debut: May 23, 1995 (Age 25-175d, 14,273rd in MLB history) vs. CAL 3.1 IP, 8 H, 5 SO, 3 BB, 5 ER, L vs. TBR 1.1 IP, 0 H, 0 SO, 0 BB, 0 ER Hall of Fame: Inducted as Player in 2019. (Voted by BBWAA on 425/425 ballots) Agents: SFX Fernando Cuza • Previously: Bob Gilhooley, Jim Bronner, Randy Hendricks, Alan Hendricks Full Name: Mariano Rivera Nicknames: Mo, Super Mariano or The Sandman Pronunciation: \rih-VAIR-uh\ Twitter: @MarianoRivera Relatives: Cousin of Ruben Rivera 13x All-Star 5x World Series WS MVP ALCS MVP AS MVP 5x Rolaids Relief Mariano Rivera Overview More Rivera Pages More Mariano Rivera Pages at Baseball Reference Mariano Rivera page at the Bullpen Wiki Team Record in Appearances: 53-11 Days of Rest Inning/Score Appearance Matrix Multiple inning appearances: 3, Entered with runners on base: 10 2011 Pitching Game Log Click pitches for details from BrooksBaseball.net Exited 979 1 Mar 31 NYY DET W,6-3 9-GF S(1) 99 1.0 0 0 0 0 1 0 0 0.00 3 12 9 2 1 0 2 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .46 0.036 0.53 9t --- 0 out a3 9t end a 3 980 2 Apr 2 NYY DET W,10-6 9-GF S(2) 1 0.1 0 0 0 0 0 0 0 0.00 1 3 3 0 0 1 0 0 0 0 2 0 0 0 0 1 0 0 0 0 0 0 .43 0.012 0.52 9t 1-3 2 out a4 9t end a 4 981 4 Apr 4 NYY MIN W,4-3 9-GF S(3) 1 1.0 1 0 0 0 1 0 0 0.00 4 14 12 5 0 1 2 1 1 0 0 0 0 0 0 4 0 0 0 0 0 0 2.35 0.169 0.53 9t --- 0 out a1 9t end a 1 982 5 Apr 5 NYY MIN L,4-5 9-9 0 1.0 1 0 0 0 2 0 0 0.00 4 13 10 2 2 1 1 1 0 0 0 0 0 0 0 4 0 0 0 0 0 0 2.80 0.144 0.53 9t --- 0 out tie 9t 3 out tie 983 6 Apr 7 NYY MIN W,4-3 9-GF S(4) 1 1.0 0 0 0 0 0 0 0 0.00 3 7 4 0 0 1 2 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 2.18 0.169 0.53 9t --- 0 out a1 9t end a 1 984 10 Apr 13 NYY BAL W,7-4 9-GF S(5) 5 1.0 0 0 0 0 1 0 0 0.00 3 16 12 2 1 0 2 1 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .46 0.036 0.53 9t --- 0 out a3 9t end a 3 985 11 Apr 14 NYY BAL W,6-5 10-GF(10) W(1-0) 0 1.0 1 0 0 0 0 0 0 0.00 3 7 5 0 0 2 1 1 0 0 0 0 0 0 0 3 0 0 0 1 0 0 2.38 0.144 0.53 10t --- 0 out tie 10t end tie 986 13 Apr 16 NYY TEX W,5-2 9-GF S(6) 1 1.0 1 0 0 0 1 0 0 0.00 4 12 11 5 2 0 3 1 0 0 0 0 0 0 0 4 1 0 0 0 0 0 .46 0.036 0.53 9t --- 0 out a3 9t end a 3 987 14 Apr 17 NYY TEX W,6-5 9-GF S(7) 0 1.0 0 0 0 0 1 0 0 0.00 3 16 10 3 1 1 1 0 1 0 0 0 0 0 0 3 0 0 0 0 0 0 2.18 0.169 0.53 9t --- 0 out a1 9t end a 1 988 15 Apr 19 NYY @ TOR L,5-6 9-9 BS(1) 1 1.0 4 2 2 1 0 0 0 1.93 7 25 18 1 0 4 2 1 0 0 0 0 0 0 0 6 1 0 0 1 0 0 4.24 -0.404 -1.48 9b --- 0 out a2 9b 3 out tie 989 18 Apr 24 NYY @ BAL W,6-3 8-9 BS(2) 4 1.1 2 1 1 1 2 0 0 2.53 6 33 21 4 4 0 3 2 0 0 2 0 0 0 0 5 1 0 0 0 0 0 4.82 -0.153 0.02 8b 1-3 2 out a1 9b 3 out tie 990 21 Apr 27 NYY CHW W,3-1 9-GF S(8) 2 1.0 0 0 0 0 1 0 0 2.31 3 23 16 5 1 1 1 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.00 0.078 0.53 9t --- 0 out a2 9t end a 2 991 24 Apr 30 NYY TOR W,5-4 9-GF S(9) 2 1.0 1 0 0 0 0 0 0 2.13 4 18 14 3 3 0 4 1 1 0 0 0 0 0 0 4 1 0 0 0 0 0 2.62 0.169 0.53 9t --- 0 out a1 9t end a 1 992 25 May 1 NYY TOR W,5-2 9-GF S(10) 0 1.0 0 0 0 0 0 0 0 1.98 3 9 7 3 0 1 2 0 1 0 0 0 0 0 0 3 0 0 0 0 0 0 .46 0.036 0.53 9t --- 0 out a3 9t end a 3 993 26 May 2 NYY @ DET W,5-3 9-GF S(11) 0 1.0 0 0 0 0 1 0 0 1.84 3 9 7 2 1 2 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.21 0.093 0.51 9b --- 0 out a2 9b end a 2 994 30 May 6 NYY @ TEX W,4-1 9-GF S(12) 3 1.0 0 0 0 0 2 0 0 1.72 3 14 10 4 2 1 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .59 0.047 0.55 9b --- 0 out a3 9b end a 3 995 33 May 10 NYY KCR W,3-1 9-GF S(13) 3 1.0 1 0 0 0 1 0 0 1.62 3 16 9 3 2 2 0 0 0 0 0 0 0 0 0 3 0 0 0 1 0 0 2.20 0.078 0.53 9t --- 0 out a2 9t end a 2 996 34 May 11 NYY KCR L,3-4 9-9 0 1.0 0 0 0 0 1 0 0 1.53 3 14 9 4 0 2 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.85 0.144 0.53 9t --- 0 out tie 9t 3 out tie 997 38 May 15 NYY BOS L,5-7 9-GF 3 1.0 1 0 0 1 1 0 0 1.45 5 21 12 3 1 1 2 1 1 0 0 0 0 0 0 4 0 0 0 0 0 0 .38 0.019 0.53 9t --- 0 out d2 9t end d 2 998 40 May 17 NYY @ TBR W,6-2 9-GF 1 0.1 0 0 0 0 0 0 0 1.42 1 6 4 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 .20 0.005 0.31 9b -2- 2 out a4 9b end a 4 999 41 May 18 NYY @ BAL W,4-1 9-9 BS(3) 0 1.0 2 1 1 0 0 0 0 1.80 5 9 8 1 0 2 3 1 1 0 0 0 0 0 0 4 0 0 0 0 1 0 4.09 -0.296 -0.49 9b --- 0 out a1 9b 3 out tie 1000 48 May 25 NYY TOR W,7-3 9-GF 6 1.0 1 0 0 0 1 0 0 1.71 4 12 10 2 2 1 2 0 0 0 0 0 0 0 0 4 0 0 0 0 0 0 .44 0.016 0.53 9t --- 0 out a4 9t end a 4 1001 50 May 28 NYY @ SEA L,4-5 12-GF(12) L(1-1) 2 0.1 3 1 1 1 0 0 0 2.11 5 17 9 2 0 1 3 3 0 0 0 0 0 0 0 4 1 0 1 0 0 0 3.37 -0.373 -2.06 12b --- 0 out tie 12b end d 1 1002 54 Jun 1 NYY @ OAK W,4-2 9-GF S(14) 3 1.0 0 0 0 0 1 0 0 2.01 3 16 12 4 0 1 1 0 1 0 0 0 0 0 0 3 0 0 0 0 0 0 1.17 0.089 0.49 9b --- 0 out a2 9b end a 2 1003 56 Jun 4 NYY @ LAA W,3-2 9-GF S(15) 2 0.1 0 0 0 0 0 0 0 1.99 1 1 1 0 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 0 0 3.36 0.092 0.21 9b 1-- 2 out a1 9b end a 1 1004 57 Jun 5 NYY @ LAA W,5-3 9-GF S(16) 0 1.0 2 0 0 0 1 0 0 1.90 4 13 11 3 1 1 2 1 0 0 0 0 0 0 0 4 0 0 0 1 0 0 3.06 0.083 0.46 9b --- 0 out a2 9b end a 2 1005 61 Jun 10 NYY CLE W,11-7 9-GF 4 0.2 1 0 0 0 0 0 0 1.85 3 6 5 0 2 0 3 0 2 0 3 2 0 0 0 3 0 0 0 0 0 0 .64 0.013 -0.39 9t 123 1 out a6 9t end a 4 1006 67 Jun 16 NYY TEX W,3-2 9-10 5 2.0 1 0 0 0 0 0 0 1.71 7 20 15 3 1 4 3 1 1 0 0 0 0 0 0 7 0 0 0 0 0 0 2.17 0.287 1.06 9t --- 0 out tie 10t 3 out tie 1007 69 Jun 18 NYY @ CHC W,4-3 9-GF S(17) 1 1.0 2 1 1 0 1 1 0 1.98 4 12 11 2 3 1 2 1 0 0 0 0 0 0 0 4 0 0 0 1 0 0 3.05 0.083 -0.54 9b --- 0 out a2 9b end a 1 1008 71 Jun 20 NYY @ CIN W,5-3 9-GF S(18) 1 1.0 1 0 0 0 1 0 0 1.91 4 19 13 3 1 3 0 0 0 0 2 2 0 0 0 4 0 0 0 0 0 0 1.78 0.082 -0.54 9b 12- 0 out a4 9b end a 2 1009 72 Jun 22(1) NYY @ CIN W,4-2 9-GF S(19) 1 1.0 0 0 0 0 2 0 0 1.84 3 16 10 2 2 1 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.14 0.086 0.48 9b --- 0 out a2 9b end a 2 1010 76 Jun 26 NYY COL W,6-4 9-GF S(20) 3 1.0 0 0 0 0 3 0 0 1.78 3 14 9 3 3 0 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.00 0.078 0.53 9t --- 0 out a2 9t end a 2 1011 78 Jun 29 NYY MIL W,5-2 9-GF S(21) 2 1.0 0 0 0 0 1 0 0 1.72 3 12 9 3 0 1 1 0 1 0 0 0 0 0 0 3 0 0 0 0 0 0 .46 0.036 0.53 9t --- 0 out a3 9t end a 3 1012 80 Jul 1 NYY @ NYM W,5-1 9-GF 1 0.2 1 0 0 0 0 0 0 1.69 3 11 9 3 0 3 0 0 0 0 1 0 0 0 0 3 0 0 0 0 0 0 .36 0.015 0.47 9b 1-- 1 out a4 9b end a 4 1013 82 Jul 3 NYY @ NYM L,2-3 9-9 BS(4) 1 1.0 2 1 1 1 1 0 0 1.91 6 21 13 4 2 3 1 1 0 0 0 0 0 0 0 5 0 0 0 0 0 1 3.66 -0.321 -0.56 9b --- 0 out a1 9b 3 out tie 1014 87 Jul 9 NYY TBR W,5-4 9-GF S(22) 5 1.0 0 0 0 0 1 0 0 1.85 3 11 7 2 1 1 1 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 2.18 0.169 0.53 9t --- 0 out a1 9t end a 1 1015 91 Jul 16 NYY @ TOR W,4-1 9-GF S(23) 6 1.0 2 0 0 0 2 0 0 1.80 5 28 23 5 2 1 2 0 0 0 0 0 0 0 0 5 0 0 0 0 0 0 1.43 0.044 0.52 9b --- 0 out a3 9b end a 3 1016 93 Jul 18 NYY @ TBR W,5-4 9-GF S(24) 1 1.0 0 0 0 0 1 0 0 1.75 3 8 6 1 2 0 2 0 1 0 0 0 0 0 0 3 0 0 0 0 0 0 2.53 0.188 0.47 9b --- 0 out a1 9b end a 1 1017 95 Jul 20 NYY @ TBR W,4-0 9-GF 1 1.0 0 0 0 0 2 0 0 1.70 3 9 9 4 1 1 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .21 0.016 0.47 9b --- 0 out a4 9b end a 4 1018 99 Jul 24 NYY OAK W,7-5 8-GF S(25) 3 1.1 4 1 1 0 0 0 0 1.88 7 23 16 3 3 4 3 3 0 0 2 0 0 0 0 7 0 0 0 0 0 0 2.63 0.141 0.16 8t -23 2 out a2 9t end a 2 1019 101 Jul 26 NYY SEA W,4-1 9-GF S(26) 1 1.0 0 0 0 0 2 0 0 1.83 3 11 9 3 3 0 1 1 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .46 0.036 0.53 9t --- 0 out a3 9t end a 3 1020 106 Jul 31 NYY BAL W,4-2 9-GF S(27) 4 1.0 0 0 0 0 0 0 0 1.79 3 13 8 0 2 0 3 1 1 0 0 0 0 0 0 3 0 0 0 0 0 0 1.00 0.078 0.53 9t --- 0 out a2 9t end a 2 1021 107 Aug 1 NYY @ CHW W,3-2 9-GF S(28) 0 1.0 0 0 0 0 1 0 0 1.74 3 9 9 1 2 2 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 2.72 0.211 0.53 9b --- 0 out a1 9b end a 1 1022 111 Aug 5 NYY @ BOS W,3-2 9-GF S(29) 3 1.0 1 0 0 0 2 0 0 1.70 4 14 10 3 1 2 0 0 0 0 0 0 0 0 0 4 0 0 0 0 0 0 3.64 0.209 0.53 9b --- 0 out a1 9b end a 1 1023 113 Aug 7 NYY @ BOS L,2-3 9-9 BS(5) 1 1.0 1 1 1 0 0 0 0 1.87 4 9 6 2 0 2 2 0 0 0 0 0 0 0 0 2 1 0 0 0 1 0 3.78 -0.291 -0.47 9b --- 0 out a1 9b 3 out tie 1024 114 Aug 9 NYY LAA L,4-6 9-GF L(1-2) 1 1.0 2 2 2 0 0 1 0 2.23 5 19 12 2 1 3 2 1 0 0 0 0 1 0 0 5 0 0 0 0 0 0 2.79 -0.402 -1.47 9t --- 0 out tie 9t end d 2 1025 116 Aug 11 NYY LAA W,6-5 9-GF S(30) 1 0.2 1 1 1 0 0 1 0 2.40 3 10 7 3 0 1 2 0 0 0 2 2 0 0 0 3 0 0 0 0 0 0 1.58 0.050 -1.56 9t -23 1 out a4 9t end a 1 1026 119 Aug 15 NYY @ KCR W,7-4 9-GF S(31) 3 1.0 0 0 0 0 1 0 0 2.35 3 13 10 3 0 2 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .52 0.040 0.50 9b --- 0 out a3 9b end a 3 1027 120 Aug 16 NYY @ KCR W,9-7 9-GF S(32) 0 1.0 0 0 0 0 2 0 0 2.30 3 15 10 2 4 1 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.19 0.090 0.50 9b --- 0 out a2 9b end a 2 1028 125 Aug 21 NYY @ MIN W,3-0 9-GF S(33) 4 1.0 0 0 0 0 2 0 0 2.25 3 10 8 3 3 1 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 .52 0.040 0.50 9b --- 0 out a3 9b end a 3 1029 127 Aug 24 NYY OAK L,4-6 9-9 2 1.0 0 0 0 0 2 0 0 2.20 3 12 7 2 1 0 1 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.85 0.144 0.53 9t --- 0 out tie 9t 3 out tie 1030 132 Aug 29 NYY @ BAL W,3-2 9-GF S(34) 4 1.0 0 0 0 0 1 0 0 2.16 3 18 12 3 2 2 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 2.67 0.204 0.51 9b --- 0 out a1 9b end a 1 1031 133 Aug 30 NYY @ BOS W,5-2 9-GF S(35) 0 1.0 1 0 0 0 1 0 1 2.12 5 18 12 8 0 1 2 1 1 0 0 0 0 0 0 4 1 0 0 0 0 0 1.27 0.044 0.53 9b --- 0 out a3 9b end a 3 1032 135 Sep 1 NYY @ BOS W,4-2 9-GF S(36) 1 1.0 1 0 0 2 2 0 0 2.08 6 28 17 5 3 0 2 1 0 0 0 0 0 0 0 4 0 0 0 0 0 0 3.38 0.097 0.53 9b --- 0 out a2 9b end a 2 1033 136 Sep 2 NYY TOR W,3-2 9-GF S(37) 0 1.0 0 0 0 0 1 0 0 2.04 3 12 8 3 0 1 1 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 2.18 0.169 0.53 9t --- 0 out a1 9t end a 1 1034 139 Sep 5 NYY BAL W,11-10 9-GF S(38) 2 1.0 2 1 1 0 1 0 1 2.17 6 27 16 7 1 0 4 2 1 0 0 0 4 0 0 5 0 0 0 0 0 0 2.93 0.078 -0.47 9t --- 0 out a2 9t end a 1 1035 140 Sep 6 NYY BAL W,5-3 9-GF S(39) 0 1.0 0 0 0 0 1 0 0 2.13 4 15 11 5 1 2 1 1 0 0 0 0 0 0 0 4 0 0 0 0 0 1 1.97 0.078 0.53 9t --- 0 out a2 9t end a 2 1036 145 Sep 11 NYY @ LAA W,6-5 9-GF S(40) 4 1.0 1 0 0 0 0 0 0 2.09 3 14 10 2 2 2 1 0 1 0 0 0 0 0 0 3 0 0 0 1 0 0 3.47 0.187 0.46 9b --- 0 out a1 9b end a 1 1037 147 Sep 13 NYY @ SEA W,3-2 9-GF S(41) 1 1.0 1 0 0 0 2 0 0 2.05 3 15 8 3 1 1 0 0 0 0 0 0 0 1 0 3 0 0 0 0 0 0 3.41 0.183 0.45 9b --- 0 out a1 9b end a 1 1038 150 Sep 17 NYY @ TOR W,7-6 9-GF S(42) 3 1.0 0 0 0 0 1 0 0 2.02 3 15 9 4 0 1 1 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 2.69 0.207 0.52 9b --- 0 out a1 9b end a 1 1039 152 Sep 19 NYY MIN W,6-4 9-GF S(43) 1 1.0 0 0 0 0 1 0 0 1.98 3 13 9 4 1 1 1 1 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.00 0.078 0.53 9t --- 0 out a2 9t end a 2 1040 154 Sep 21(1) NYY TBR W,4-2 9-GF S(44) 1 1.0 0 0 0 0 1 0 0 1.95 3 11 8 2 1 1 1 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 1.00 0.078 0.53 9t --- 0 out a2 9t end a 2 1041 159 Sep 25(2) NYY BOS L,4-7 9-9 3 1.0 1 0 0 1 1 0 0 1.92 5 17 8 3 1 2 1 1 0 0 0 0 0 0 0 3 0 0 1 0 0 0 3.69 0.144 0.53 9t --- 0 out tie 9t 3 out tie 1042 161 Sep 27 NYY @ TBR L,3-5 8-GF(8) 1 0.1 0 0 0 0 1 0 0 1.91 1 11 8 2 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 .34 0.009 0.31 8b -2- 2 out d2 8b end d 2 53-11 W-L:1-2,Sv:44,BSv:5 1.9 61.1 47 13 13 8 60 3 2 1.91 233 915 70% 19% 8% 0.94 19% 10% 0 17 35% 5 1 0 219 7 0 2 6 2 2 2.15 3.316 16.31 You are here: BR Home Page > Players > Mariano Rivera > 2011 Pitching Game Logs
cc/2019-30/en_head_0010.json.gz/line2865
__label__wiki
0.93376
0.93376
Local business stories of the year Jon Chesto and Steve Adams A look at the 2007 happenings that have had/will have the biggest impact on the Boston area. There were few sections of the economy left untouched by the continued weakening of the housing market in 2007. The market slump's impact expanded as foreclosures rose and mortgage lenders and the companies that backed them ran into trouble, making it harder for many borrowers to get the loans they needed. The corporate deal-making frenzy of recent years slowed down as the availability of credit tightened, but there were still several major acquisitions with local significance. The Greater Boston commercial office market, which had been red-hot for the past two years, also cooled off, but several giant retail projects continued to move forward. These are just a few of the big changes in 2007 that affected the state's business community; several stand out as ones that will have a long-lasting impact. 1. HOUSING WOES The local housing market had seemed like it could be turning the corner after a two-year downturn over the summer, when sales and prices were relatively flat compared with the same time in 2006. But then the national housing market's woes, including the blowout in the subprime lending sector, hammered Wall Street, tightening up credit and making it much harder to get jumbo mortgages and other nontraditional loans. The aftershocks were felt in Massachusetts, where home prices and sales volumes resumed their declining trend during the fall. Now experts are saying they don't expect a true turnaround in the housing market until next summer, at the earliest. 2. IDENTITY THEFT Retailers of varying sizes have had to deal with the threat of identity theft, particularly as credit and debit cards become increasingly popular alternatives to checks and cash. But no data breach can compare in size to the one that Framingham-based retailer TJX Companies disclosed in January. The company eventually said that as many as 46 million bank card accounts could have been compromised, but other companies that sued TJX said the number was much higher than that. Here in Massachusetts, the TJX data breach seemed to serve as the final nudge the state Legislature needed to pass an identity theft protection bill. 3. CASINO GAMBLING The odds of a casino coming to Massachusetts increased significantly once the Mashpee Wampanoag tribe won federal recognition. The tribe took control of several big pieces of land in Middleboro, and in doing so deeply divided the community over whether a casino should be built there. In reaction, Gov. Deval Patrick proposed a plan that would allow for three casino resorts, each in a different part of the state, as a way to give the state more control over casino gambling. But the bill still faces stiff opposition in the House, where Speaker Sal DiMasi continues to express concerns about expanded gaming. 4. AUTO INSURANCE RATES For the first time in 30 years, state officials took a major step toward increasing auto insurance competition in the state. Insurance Commissioner Nonnie Burnes replaced the old system, in which the commissioner sets a standard set of rates for all insurers, with a new one that still gives her the authority to review each insurer's rates. The goal was to attract more insurers to the state, including big national companies such as Geico and Progressive. But the switch has attracted only a minimal interest among insurers that don't already do business here. The average rate will drop next April, but many customers will see price increases under the new system. 5. HOLLYWOOD EAST Massachusetts became Hollywood East as state lawmakers improved the state's already-generous tax incentives for movie makers that essentially reimburse production companies for up to 22.5 percent of their expenses in the state. The new law this summer apparently opened the floodgates: Several major motion pictures (such as ``Pink Panther 2,'' ``The Women,'' ``The Box'' and ``Bachelor No. 2'') have since come to the state to be filmed and more are on the way. Meanwhile, plans are under way for the state's first permanent major movie studio complex in Plymouth. 6. RETAIL DEVELOPMENT BOOM Retail development continued to boom south of Boston in 2006, driven by the increasing popularity of outdoor lifestyle centers. The Shoppes at Colony Place, a 150,000-square-foot outdoor shopping center, opened in September as a complement to the big box component of the Colony Place project that opened in 2005. The 20-store lifestyle center contains a mix of boutiques and restaurants. The Kraft family, owners of the New England Patriots, made their first venture into the retail sector, opening the first phase of their Patriot Place shopping center next to Gillette Stadium in Foxboro in November. The center, which will eventually total 1.3 million square feet, is anchored by New England's first Bass Pro Shops. Developers gained final permits for Westwood Station, a 4.5 million-square-foot mixed-use development at the former University Avenue industrial park. The project is a joint venture of Cabot, Cabot & Forbes, New England Development and Commonfund Realty. The first phase will consist of 495 condos built atop street-level retail shops, part of the 1.3 million-square-foot retail portion of the $1.5-billion project. W/S Development of Newton plans a 530,000-square-foot lifestyle center called Legacy Place at the National Amusements headquarters in Dedham. The theater chain's headquarters also will be rebuilt at the site. 7. FINANCIAL SERVICES MEGAMERGERS State Street Corp. CEO Ron Logue didn't have to go far to find his next acquisition candidate. He targeted Investors Financial Services Corp., based in the John Hancock tower, in a deal valued at more than $4 billion. The acquisition, which was announced in February and was completed in July, cemented State Street's position as the No. 2 provider of custodial services to asset managers in the world, and strengthened its position in the growing hedge fund market. The acquisition led to about 1,700 job cuts, primarily among Investors Financial workers. But it will allow State Street to better compete against two of its biggest rivals, Bank of New York and Mellon Financial Corp., which also merged this year. 8. VIDEO GAME SUPERSTARS Two local video game developers struck it big with blockbuster releases in 2007 amid a renaissance in the Massachusetts computer game industry. Westwood-based Turbine Inc.'s ``Lord of the Rings Online: Shadows of Angmar'' shot to the top of the charts among massive multiplayer games after its launch in April. Quincy-based Irrational Games, now known as 2K Boston, created a stir in August when it launched ``BioShock,'' which quickly became the most-talked-about first-person shooter title in gamers' circles. 9. CHANGES AT THE TOP AT TALBOTS Talbots CEO Arnold Zetcher announced in February that he would step down in early 2008 after 20 years at the helm of the Hingham-based women's clothing retailer. Under Zetcher's leadership, Talbots grew from 109 stores and $360 million in annual sales to nearly 1,300 Talbots and J. Jill stores with $1.8 billion in sales. Zetcher expanded the company by opening stores in traditional malls, shopping centers and downtown areas. The company also launched children's and plus-sized stores, and has been test-marketing a Talbots Men concept. The company made its first acquisition in 2006, buying Quincy-based rival J. Jill. Trudy Sullivan left a top executive position at Liz Claiborne to succeed Zetcher at Talbots. 10. TOUGH TIMES AT TWEETER Tweeter Home Entertainment Group filed for Chapter 11 bankruptcy in June. Tweeter's business model as a retailer of high-end audio and video products has come under increasingly stiff competition from bigger rivals such as Wal-Mart, Best Buy and Circuit City. Falling margins on flat-screen TVs particularly hurt the Canton-based company's prospects, although it has made some headway with efforts to focus on home-installation services. The 102-store chain was acquired for $38 million by hedge fund Schultze Asset Management of Purchase, N.Y. CEO Joe McGuire resigned shortly after the change of ownership and was succeeded by George Granoff, a former executive for the Party City, Bradlees and Ames chains. The Patriot Ledger
cc/2019-30/en_head_0010.json.gz/line2868
__label__wiki
0.673941
0.673941
Banks's Stadium to Host 1988 Reunion Evening 10:00 am Sunday, 16 October 2016 @BescotBanter Banks's Stadium On Friday, 18th November Walsall Football Club's Banks's Stadium will be hosting a reunion of Tommy Coakley’s famous 1988 Saddlers side. During the 1987/88 season Walsall finished third in the Old Division Three and went on to earn promotion in the Play-Offs after thrashing opponents Bristol City by four-goals-to-nil in a replay. Club legend David Kelly scored a hat-trick, with Phil Hawkers also on target in front of more than 13,000 fans at Fellows Park – a fitting way to mark the club's centenary year! Andy Dornan, Mark Goodwin, Alex Taylor, Trevor Christie, Mark Rees, Paul Jones, Kenny Mower, Stuart Rimmer, Peter Hart, David Kelly, Phil Hawker, Gary Childs, Mark Taylor, Chris Marsh, Willie Naughton, Keith Bertchin, Craig Shakespeare and Tommy Coakley will all be in attendance. Tickets for the evening are on sale now at a cost of just £15 for season ticket holders and £20 for non-season ticket holders. The price includes a pie, chips and a pint and there will also be an opportunity to meet the players and ask them questions in a special Q&A session. To book your ticket, or if you require further information, please call the Banks's Stadium Ticket Office on 01922 651416 or contact the club's Commercial Manager Wayne Thomas via 01922 651400. Banks's Stadium
cc/2019-30/en_head_0010.json.gz/line2871
__label__wiki
0.830464
0.830464
Staying Strong in Recovery After working for decades to overcome addiction, Valaida reached a milestone just a few days ago – 15 months of sobriety. Valaida was recently recognized during a celebratory ceremony for graduates of an intensive residential addiction treatment program. She says that she felt so proud walking across the stage in a cap and gown. Now she has a special certificate, engraved keychain and tassel – not to mention a lasting sense of pride – to remind her of this achievement. Valaida says that the last 15 months were rewarding but difficult. In the midst of her treatment program, she lost a parent, but managed to get through her grief without turning to drugs. When she first started looking for jobs after getting sober, she says that she didn’t know if she was going to make it. Although she was finally sober, she says that she was not quite ready to live on her own. “I was panicking because I didn’t have anywhere to go,” she says. A woman who worked with Valaida told her about Calvary Women’s Services. Valaida says that when she visited Calvary, she felt like it was a place where she could continue to concentrate on her sobriety. She has been attending daily Relapse Prevention Group meetings and meeting with a therapist to stay strong in her recovery. “I’m doing what I’m supposed to do here,” she says. Valaida keeps a realistic view about the challenges that are still ahead. What keeps her going some days is her sense of humor. Her laugh is often heard bouncing around the LEAP (Life Skills, Education & Arts Program) learning area in the afternoons. “I just like to see people happy and smiling. I’m tired of being down,” she says. Volunteer Spotlight: Krystal Ramseur Krystal Ramseur, a performer with the Washington Improv Theather (WIT), leads a weekly improvisation class for women experiencing homelessness as part of Calvary Women’s Services’ educatio… Volunteer Spotlight Read Post
cc/2019-30/en_head_0010.json.gz/line2873
__label__wiki
0.604074
0.604074
The £575,000 plan to move Newmarket's police officers into a fire station Police and fire services say the move will save money and allow them to work more closely together Jordan Day Newmarket fore station (Image: Richard Marsham) Ambitious plans for Newmarket’s police officers and firefighters to share the same headquarters are being showcased to the public next week. Suffolk Police and Suffolk Fire and Rescue Service have announced proposals to relocate the town’s existing police station, in Vicarage Road, to the fire station, in Willie Snaith Road. The scheme is set to cost around £575,000 and would see the two emergency services sharing the same base in Willie Snaith Road. "Crucially important" Tim Passmore, Suffolk’s Police and Crime Commissioner, said: “Working together is absolutely key to meet the financial challenges that we face. “I am very pleased with the existing shared stations across the county – it saves money and improves the joint working of these two key blue-light services. “The public’s view on this initiative is crucially important and I look forward to meeting with the local communities to hear their views.” Funding for the project will be shared between the two services but it is hoped the Government will provide some grant funding. Suffolk County Council’s Cllr Matthew Hicks, cabinet member for public protection, said: “Our partnership on property has grown and evolved over time. “We already have six shared stations with police and these are working well. “Our plans to develop and improve Newmarket fire station will help us become even more cost effective and we will be able to work much more closely together in the town.” A public consultation event is being held at the King Edward VII Memorial Hall in Newmarket High Street on Wednesday, October 26 from 9am-2pm. People can also have their say by emailing fire.businesssupport@suffolk.gov.uk or spcc@suffolk.pnn.police.uk quoting ‘Newmarket Consultation’.
cc/2019-30/en_head_0010.json.gz/line2874
__label__cc
0.692459
0.307541
Home > Newsroom > Water as a Heritage Mar 22, 2017 Mar 28, 2017 | News Water as a Heritage By: Dr. Dan Sonke, Director of Sustainable Agriculture at Campbell. Water and agriculture are part of my heritage. I grew up on an almond orchard in California. Not only did we depend on water for our almonds to grow, but my father worked a day job for one of California’s oldest irrigation districts. You could say it’s in my blood. As Campbell’s Director of Sustainable Agriculture, I work with farmers to promote sustainable practices on the farm. Engagement with farmers is central to Campbell’s commitment to Real Food and Transparency. California Water Action Collaborative Two years ago, when California was in the midst of a multi-year drought, Campbell and other food and beverage companies along with non-profit organizations came together to form what is now known as the California Water Action Collaborative or CWAC. And, yes, our group has decided to embrace the fact that our acronym sounds like the noise made by waterfowl (CWAC)! CWAC is a coalition of 21 organizations actively working to improve water security in California for people, business, agriculture and nature. Campbell is proud to be at the table to work together to find solutions. Just last week, CWAC came together in the Central Valley of California to visit an almond orchard owned by Nick Blom, not far from my family’s own orchard, to learn about a new technique that could benefit Nick and his community for years to come. Working with CWAC, his local irrigation district, the University of California, and other partners, Nick is taking storm water and applying it to his orchard in the winter for the explicit purpose of recharging groundwater. This way, the water is stored underground so that during the next drought, there is a “savings bank” that farms and cities can use. Campbell and Sustainable Agriculture At Campbell, we have been working with our tomato farmers to use water responsibly. For example, we’ve been working to reduce the amount of water used for producing tomatoes in California and began collecting data five years ago to document and drive progress. In 2012, drip irrigation, which improves water efficiency and optimizes fertilizer use, was used on 38% of our tomato farmers’ acres. Since then, more than 65% of the tomato acres have adopted drip irrigation. As a result, water applied has decreased by almost 22% (per pound of tomato). The innovation sharing through CWAC helps inform how Campbell engages with its California tomato farmers to move from water efficiency to resiliency for farms and communities. What Nick is doing on his farm creates a pathway for farmers to “put water in the bank” and I’m excited to see this practice replicated to accelerate water conservation. After all, water is a resource on which we all depend, whether urban or rural, farmer or environmentalist. It’s a part of everyone’s heritage. For more on Campbell’s sustainability efforts, see our CSR report. CWAC members visit with Nick Blom, Sustainable Conservation staff, Almond Board of California staff, and researchers from the University of California, Davis and Berkeley Laboratories. Photo courtesy of Alex Karolyi, Sustainable Conservation.
cc/2019-30/en_head_0010.json.gz/line2875
__label__wiki
0.745005
0.745005
June/July/Aug 2012 The Left-Facing Page Michael Szalay’s Hip Figures: A Literary History of the Democratic Party Evan Kindley Hip Figures: A Literary History of the Democratic Party (Post*45) BY Michael Szalay. Stanford University Press. Paperback, 336 pages. $24. While abstract ideas of “power” and “politics” are catnip to contemporary literary figures, the actual exercise of political power in the American electoral process tends to be their analytic kryptonite. But things were not ever thus. Michael Szalay’s fascinating new book, Hip Figures, reminds us of a time, not long ago, when literary intellectuals set great store by mainstream political parties, and vice versa. Szalay’s book focuses on the postwar era—a high-water mark, he contends, for the mutual influence of mainstream politics and American fiction. “In the decades following the Second World War,” he writes, “during the heyday of the American novel’s prestige, when it was unclear to the Democrats how they should understand the base of their power or the nature of their interests, it seemed plausible to . . . novelists that they might change the party in significant ways.” Evidently, it seemed plausible to the Democrats, too. The Kennedy and Johnson administrations, in particular, flattered and cultivated writers; Gore Vidal stated that 1960 was the year when “politics and literature officially joined forces.” William Styron went sailing with JFK and regaled the president with tidbits from his research for The Confessions of Nat Turner. Even writers who weren’t hobnobbing with the political elite felt strongly about their party’s candidates: Ralph Ellison called Johnson “the greatest American President for the poor and for Negroes” and loved his “unreconstructed Texas accent”; and a young Joan Didion “voted, ardently, for Barry Goldwater” and commented decades later, “Had Goldwater remained the same age and continued running, I would have voted for him in every election thereafter.”(She later drifted into the Democratic Party, in reaction to the rise of Ronald Reagan, and was much taken with Jesse Jackson in 1988.) The four decades after 1945 marked an epochal shift in the Democratic Party. The party’s transformation was complex, and Szalay tracks it along several axes, from the increasing prominence of what he, following John and Barbara Ehrenreich, calls “the professional managerial class” to the growing importance of African Americans, who “between 1936 and 1964 . . . represented the single largest new voting bloc to enter the party.” The Democrats’ postwar political strategy required them to appeal to these new black voters without alienating educated white professionals—and here, in Szalay’s story, is where “hip” enters the picture. “The fantasies of hip that have mattered most to liberalism first emerged in novels,” Szalay claims—though, like many students of the idea, he’s hard-pressed to supply a sure-footed delineation of what does and doesn’t count as “hip.” Ultimately, he decides that hip is about a certain performance of race, and more specifically about a performance of the relation between black and white. Norman Mailer’s 1957 manifesto “The White Negro: Superficial Reflections on the Hipster” is the key text for Szalay: “In . . . the phrase ‘white Negro,’” he writes, “we witness the strained union of two groups; it performs uneven integration on behalf of a party still committed, in 1957, to the aftereffects of Jim Crow.” Throughout Hip Figures, Szalay develops an extended—and, at times, strained—comparison between midcentury hip and nineteenth-century minstrelsy, interpreting both as ways of generating “socially permissible codes of identification between white and black Americans.” This hip synthesis of white and black, Szalay believes, was what helped the Democrats gain the advantage in the 1960s, and novelists were some of its primary champions. Mailer famously called Kennedy “the Hipster as Presidential Candidate,” writing in Esquire of the “patina of that other life, the second American life, the long electric night with the fires of neon leading down the highway to the murmur of jazz” that he thought the candidate possessed. Mailer, as per usual, hogs a lot of the attention in Hip Figures, but Szalay also finds time to rescue some lesser-known authors from the archive, providing generous and intriguing readings of writers such as Chandler Brossard, Richard Condon, Ishmael Reed, and Hal Bennett. As Szalay’s argument progresses, he engages increasingly with books and writers for whom he seems to have more contempt than respect; words like repellent and appalling begin to crop up fairly regularly. This moralistic rhetoric tends to mar otherwise excellent discussions of Saul Bellow’s Mr. Sammler’s Planet, Styron’s Confessions of Nat Turner, E. L. Doctorow’s Book of Daniel, and John Updike’s Rabbit, Run and Rabbit Redux. Szalay is particularly tough on Didion, the only woman in his roster of hip literary interlocutors. “Didion wants us to know that she likes people who happen to have black skin,” Szalay writes of a scene in Slouching Towards Bethlehem; “what she doesn’t like, she insists, is any form of symbolic blackness.” Hip Figures begins and ends with the 2008 election of Barack Obama—a landmark moment in the politics of race and hipness alike. In ideological terms, however, Szalay notes that Obama shares many points of affinity with his Democratic predecessor, Bill Clinton; like Clinton, he observes, Obama embodies a brand of neoliberal hip—with the obvious additional advantage of actually being our first black president, thereby claiming the laurel Toni Morrison famously bestowed on Clinton in 1998. It’s not clear just how much of this analysis will prove out in the Obama era’s feints toward a “postracial” politics. Maybe, just maybe, we’re also “posthip”—in which case the story Szalay tells would indeed end in the Clinton era, with the contest between hip and square giving way to one between plutocrats and technocrats. It’s much more likely, though, that the specters of hip will continue to haunt our politics, and we owe Szalay a debt for laying them out in such critical detail here. Evan Kindley is the managing editor of the Los Angeles Review of Books. He is working on a book called Critics and Connoisseurs: Poet-Critics and the Administration of Culture.
cc/2019-30/en_head_0010.json.gz/line2878
__label__cc
0.613319
0.386681
The solar PV system is expected to meet 90% of the school's electricity demand Dryden, NY Tompkins Cortland Community College The 2.6 megawatt Tompkins Cortland Community College solar array, located on its main campus in Dryden, New York is expected to meet 90 percent of its electricity demand, generating the equivalent amount of electricity needed to power approximately 440 homes annually. TC3 is purchasing the clean energy produced from the solar energy system’s owner over the 25-year term of the power purchase agreement. TC3 expects to realize first-year savings of approximately $30,000, with potentially greater annual savings as retail utility rates increase over time. TC3’s solar array enables the school to replace the majority of its fossil fuel-generated electricity with renewable energy. This means cleaner air and water, fewer greenhouse gas emissions, and a healthier climate for future generations. The installation will offset 2,160 metric tons of CO2 annually, which is the equivalent of taking 455 cars off the road or the amount of carbon sequestered by 1,771 acres of U.S. forests each year. The project has been made possible in part by New York’s solar policies, which have supported rapid development through incentives, supportive permitting procedures and other programs to get more solar deployed. This past spring, the State’s NY-Sun initiative awarded $46 million for large-scale solar energy projects through the NY-Sun Competitive PV Program administered by the New York State Energy Research and Development Authority. TC3, one of the 64-member institutions of the State University of New York system, serves more than three thousand students on its 220-acre campus. Solar System Details System Size AE 1000NX AE 3TL Production Estimates KWH MONTHLY KWH ANNUALLY KWH 30 YEARS Energy Storage Details Energy Capacity Battery Units Read More View Project sPower Riverhead Solar Farm Houghton, NY Houghton College Barstow Community College
cc/2019-30/en_head_0010.json.gz/line2879
__label__wiki
0.920802
0.920802
Police Watch: April 27, 2012 By Eric Gustafsson - April 27, 2012 Happy Endings? THURSDAY, APRIL 19, 2:15 p.m. — A 20-year-old female student reported to Binghamton’s New York State University Police that she was being harassed at her station in the East Gym Wellness Center, said Investigator Patrick Reilly. The victim saw a 20-year-old male student walking around the Wellness Center and asked him if he needed any help, after which he responded in an inappropriate manner. The suspect said he wanted to set up a massage room, and after opening one of the rooms, he grabbed the victim’s wrist. The victim told him to leave. The suspect continued to speak in an inappropriate manner, and the victim called a co-worker to help. The suspect left after the co-worker came, and the victim filed a report with University Police. Beer pong tournament, my room THURSDAY, APRIL 19, 7:14 p.m. — A Sodexo worker from the College-in-the-Woods Nite Owl reported to University Police that a dining hall table had been stolen, Reilly said. The table had some of the legs broken, and it had been put out so it would be picked up by the University Trash Department. The worker found the table top gone and filed a report with the University Police Department. Someone had seen several male students carrying the table away, but could give no description. Dude, I can totally climb this FRIDAY, APRIL 20, 6:07 p.m. — Officers on patrol were called to the Science IV/V courtyard after someone reported that people were trying to climb a light post, Reilly said. The officers found three male students in the area, who admitted they were “just trying to climb stuff.” The officers told the students that their actions were potentially harmful to themselves and those around them, and asked them to leave the area. The students complied, and there were no further complaints. Those were some expensive faucets SUNDAY, APRIL 22, 1:50 p.m. — The University Police Department received a report from the Chenango Champlain Collegiate Center that two sinks had been broken in one of the bathrooms, Reilly said. There were no suspects, but each of the broken faucets cost $150. The case is still under investigation.
cc/2019-30/en_head_0010.json.gz/line2883
__label__cc
0.505542
0.494458
What Is The Lord Of Light From 'Game Of Thrones'? R'hllor Could Be A Symbol For Something Much Bigger By Sabienna Bowman Melisandre has been going on about the Lord of Light, or "the one true god," for four seasons now, but what is the Lord of Light on Game of Thrones really? In the Season 6 episode "Hold the Door," a new Red Priestess, Kinvara, suggested the Lord of Light might be a more tangible presence than anyone ever imagined. Kinvara knew about the most private experience of Varys' life, and even offered to name the voice he heard speak to him the night he became a eunuch. Kinarva's insight appeared to be more than a parlor trick. Her belief in Dany as the one who was promised comes from a place of deep religious belief, but is there a man behind the flames of R'hllor or is the Lord of Light simply an idea? When it comes to religion in the world of Game of Thrones , the show has tended to paint the devout as zealots. The High Sparrow and his ilk reek of corruption and sanctimony, and Melisandre has never been the picture of sanity. She may be able to raise the dead and hide her true form, but she also advocates human sacrifice. From the burning of Shireen to Cersei's walk of shame and the many assassinations done in the name of the Many Faced God, religious acts have traditionally been bloody and highly questionable in this world. There are a few things fans know for sure though: magic exists, and the prophecy of the Lord of Light appears to be coming to pass. The Lord of Light's followers believe their god is locked in a battle with the Great Other (potentially the Night's King and his army), and it is only through the rebirth of Azor Ahai that the world can be saved. The followers of the Lord of Light believe the battle is very real and its players are physical entities. Both Melisandre and Kinvara have claimed the Lord of Light speaks directly to them, but the audience has yet to hear a voice. From the perspective of the viewer, characters like Melisandre and Kinvara may believe the Lord of Light is a god with a voice and a will, but, until that voice is heard onscreen, it leaves a huge question mark by the Lord of Light. What Melisandre and Kinvara call the Lord of Light could be a force, something beyond human understanding. The Lord of Light could be the magic that brings people back from the dead, the giver of prophetic dreams, and the ancient source of the Children of the Forest's ability to create the White Walkers. When it comes to religion, you have to believe in what you cannot see, no matter what your faith is. The Red priests and priestesses may call their god the Lord of Light, but they could be completely off base. The old gods of the North could be the ones pulling the strings, or the Seven, or hey, even the Drowned God. All of these "gods" could just be ideas, names for the magic flowing through the world that the characters cannot fully understand. The other possibility is the Lord of Light is human. He could be speaking directly to his chosen people and maneuvering Dany, Tyrion, Jon Snow, and the rest of the characters into place so the grand battle between light and dark can play out. Maybe he doesn't see himself as a god, but his power is so expansive that he allows people to believe he is. A Reddit user even recently posited Bran Stark could be the Lord of Light thanks to his ability to warg into humans and the Night King's interest in killing him. It makes just as much sense for the Lord of Light to be someone ancient from the time before the Children of the Forest created the White Walkers. Maybe he was even the one who drove the dagger into the Night King's chest — in which case, he would be a she according to the scene from the show. Nothing prompts the creation of a religion quite like unleashing pure evil on the world, am I right? There is a good chance the mystery of who or what the Lord of Light truly is will never be solved. Even if the war between fire and ice plays out, that does not prove the existence of a Lord of Light. As with all religions, the Lord of Light is whatever you want it to be — at least until he, she, or it makes its presence known in a significant, tangible way. Images: HBO; Giphy (2)
cc/2019-30/en_head_0010.json.gz/line2887
__label__wiki
0.982227
0.982227
Here's What Apple Computers Looked Like During Their Early Years On Thursday, Apple set a record as the first public company in Wall Street history to be worth $1 trillion. Here's a look back at the formative years of the tech giant. By Gabriel H. Sanchez Gabriel H. Sanchez BuzzFeed News Photo Essay Editor Posted on August 2, 2018, at 5:49 p.m. ET Tom Munnecke / Getty Images Steve Jobs, cofounder of Apple Computer Inc., at the first West Coast Computer Faire, where the Apple II computer was debuted in San Francisco, 1977. Science & Society Picture Library / Getty Images The Apple II was designed and built by Steve Jobs and Steve Wozniak by the end of 1976 as the first mass-marketed personal computer. David Tenenbaum / AP Joel Skolnick, a computer store manager in Cambridge, Massachusetts, displays a memory board of an Apple II computer on Nov. 15, 1978. Left: Jobs poses with an Apple II computer, 1981. Right: The Apple III computer was first introduced in 1980 and was intended to be aimed at business users. It was the first Apple machine to incorporate a built-in 5.25-inch floppy disk drive and high-resolution graphics built into the motherboard. Robert R. Mcelroy / Getty Images Journalist Elizabeth Peer poses with a range of Apple computers in New York, 1982. Corbis / Getty Images Michela Alioto, a woman with paraplegia, undergoes physical therapy with the aid of an Apple II Plus on Sept. 24, 1983. Sal Veder / AP Wozniak (left center) and Apple's then-CEO John Sculley (far right), and Jobs (center) discuss the new Apple IIc at a press conference in San Francisco, 1984. Youth members of a local computer club in San Francisco try out the keyboards of the new Apple IIc computer on April 24, 1984. Science & Society Picture Librar / Getty Images The Macintosh Portable computer in 1989. James D. Wilson / Getty Images Children use Apple computers in their classroom in San Francisco, 1994. Left: Apple President and CEO Michael Spindler during a news conference at the company's headquarters in Cupertino, California, on Jan. 23, 1996. Right: Two young Burmese monks walk past a billboard advertising Apple Macintosh computers on May 25, 1996, in Rangoon, Myanmar. Paul Sakuma / AP Exhibitors show off Macintosh products at the Macworld convention in San Francisco on Jan. 12, 1996. The following week saw Apple posting a $68 million operating loss for the quarter with the expectation to lay off at least 1,000 employees. Baron Byron, a computer salesperson at Computerware in Palo Alto, California, demonstrates Apple's Newton device at his store on May 22, 1997. Steve Castillo / AP Apple employees walk past giant computer icons adjacent to the company's headquarters in Cupertino, California, on Feb. 3, 1997. Julia Malakie / AP Jobs stands at a podium as Bill Gates, then the chief executive of Microsoft, appears on a video screen to address the Macworld convention and announce the new alliance between Apple and Microsoft on Aug. 6, 1997. Str Old A salesperson shows a potential customer new models during the Apple Expo show in Paris, on Sept. 18, 1997. Victoria Arocho / ASSOCIATED PRESS A man buys an anti-Windows T-shirt from a sidewalk vendor outside the World Trade Center in Boston on Aug. 7, 1997. Gilles Mingasson / Getty Images Cars drive by an Apple Computer billboard on March 31, 1998, in Los Angeles. Ted Thai / Getty Images Apple's new iBook laptop computer on July 1, 1999. Toshifumi Kitamura / AFP / Getty Images A boy tries out an Apple iMac computer in Tokyo, 1999. William Stevens / Getty Images Steve Jobs in Paris on Sept. 17, 1998. John Sculley was CEO of Apple in 1984. An earlier version of this post misstated his name and title. Gabriel H. Sanchez is the photo essay editor for BuzzFeed News and is based in New York City. Contact Gabriel H. Sanchez at gabriel.sanchez@buzzfeed.com.
cc/2019-30/en_head_0010.json.gz/line2888
__label__wiki
0.823753
0.823753
Home ♃ Recent Stories ☄ Four freshman members mean a new start for the Birmingham School Board ♃ Recent Stories ☄ Four freshman members mean a new start for the Birmingham School Board By Sam Prickett For The Birmingham Times Birmingham City School Board-Central Office (Google Maps) Four new members and one incumbent were elected to the Birmingham Board of Education in the Tuesday runoff elections, reshaping the board from the one seated in 2013. In District 4, incumbent Daagye Hendricks secured re-election while candidates Douglas Ragland (District 1), Mickey Millsap (District 5), Patricia McAdory (District 7), and Sonja Q. Smith (District 8) all were elected to their first terms. They will join Terri Michael (District 2), Mary Drennen Boehm (District 3), Cheri Gardner (District 6), and Sandra Brown (District) — all of whom won election outright during the Aug. 22 municipal election. In unofficial results: Ragland, a former superintendent of Midfield City Schools received 2,319 votes or 51.73 percent to Small’s 2,164, 48.27 percent. Small, a political newcomer, is pastor of New Mount Zion Baptist Church. Ragland has finished second in the runoff and had previously run unsuccessfully for the District 1 seat in 2011 and 2013. Hendricks finished second to challenger Edward Maddox entering the runoff, but Hendricks captured 2,185 votes or 51.23 percent of the vote to Maddox’s 2,080 or 48.77 percent on Tuesday. Both candidates had previous board experience with Hendricks having served since 2013 and Maddox who had been a board member from 2009 to 2012 and board president from 2011 until he resigned in 2012 and stepped down as part of a plea agreement with the Jefferson County District Attorney’s office. Michael “Mickey” Millsap received 2,570 votes, 56.58 percent, to David T. McKinney’s 1.972, or 43.42 percent. Millsap, who worked as a public school teacher in Sumter County, Alabama, had the largest lead of any school board candidate going into the runoff, having received nearly twice the number of votes McKinney, an educator in the Birmingham metro area for more than 10 years. That margin shrunk but Millsap finished first again. Patricia McAdory received 3,055 votes, 60.01 percent of the vote to Walter Wilson’s 2,036, or 39.99 percent. McAdory had worked for several decades as an educator in the Birmingham city schools system; Wilson, who had previously mounted an unsuccessful campaign for city council in 2009, had served as a substitute teacher, assistant football coach, and parent-community coordinator in the Birmingham city school system. While this race was separated by 75 votes when Sonja Q. Smith finished first in the Aug. 22 municipal election the runoff election on Tuesday wasn’t close. Smith, an educator, lecturer and mentor, received 2,837 votes, 63.67 percent, to Bozeman-Henderson’s 1,619, 36.33 percent. Bozeman-Henderson is the Job Readiness/GED Coordinator for the City of Birmingham Municipal Court. Birmingham Board of Education Birmingham City Schools Daagye Hendricks Douglas Ragland Michael "Mickey" Millsap Patricia McAdory Sonja Smith Previous articleFormer Vice President Joe Biden visits Birmingham to boost Doug Jones’ Senate hopes Next articleBirmingham’s new mayor will work with three new city councilors
cc/2019-30/en_head_0010.json.gz/line2890
__label__wiki
0.592046
0.592046
A NY courtroom gave every detained Non-White immigrant a lawyer. The results were staggering November 10, 2017 / Tron Nick From [Vox] Omar Siagha has been in the US for 52 years. He’s a legal permanent resident with three children. He’d never been to prison, he says, before he was taken into Immigration and Customs Enforcement detention — faced with the loss of his green card for a misdemeanor. His brother tried to seek out lawyers who could help Siagha, but all they offered, in his words, were “high numbers and no hope” — no guarantee, in other words, that they’d be able to get him out of detention for all the money they were charging. Then he met lawyers from Brooklyn Defender Services — part of the New York Immigrant Family Unity Project, an effort to guarantee legal representation for detained immigrants. They demanded only one thing of him, he recalls: “Omar, you’ve got to tell us the truth.” But Siagha’s access to a lawyer in immigration court is the exception. There’s no right to counsel in immigration court, which is part of the executive branch rather than the judiciary. Often, an immigrant’s only shot at legal assistance before they’re marched in front of a judge is the pro bono or legal aid clinic that happens to have attorneys at that courthouse. Those clinics have such limited resources that they try to select only the cases they think have the best shot of winning — which can be extremely difficult to ascertain in a 15-minute interview. But advocates and local governments are trying to make cases like Siagha’s the rule, not the exception. Soon, every eligible immigrant who gets detained in one of a dozen cities — including New York, Chicago, Oakland, California, and Atlanta — will have access to a lawyer to help fight their immigration court case. The change started at Varick Street. The New York Immigrant Family Unity Project started in New York City in 2013, guaranteeing access to counsel for detained immigrants. According to a study released Thursday by the Vera Institute for Justice (which is now helping fund the representation efforts in the other cities, under the auspices of the Safe Cities Network), the results were stunning. With guaranteed legal representation, up to 12 times as many immigrants have been able to win their cases: either able to get legal relief from deportation or at least able to persuade ICE to drop the attempt to deport them this time. So far, cities have been trying to protect their immigrant populations through inaction — refusing to help with certain federal requests. Giving immigrants lawyers, on the other hand, seemingly makes the system work better. And if it works, it could leave the Trump administration — which is already upset with the amount of time it takes to resolve an immigration court case — very frustrated indeed. (The Department of Justice, which runs immigration courts, didn’t respond to a request for comment.) [MORE] November 10, 2017 / Tron Nick/ Comment South Carolina to Stop Jailing Poor ... White Hearing Officer Re-instates ...
cc/2019-30/en_head_0010.json.gz/line2896
__label__wiki
0.931302
0.931302
Superman & The Legion of Superheroes: DnA on big blue and leaving 'Legion' by Arune Singh – on Dec 11, 2003 It's been a busy few days for Dan Abnett and Andy Lanning, known to fans as the writing collective DnA. While they've got an anticipated run on the Superman comics in January, they're also leaving the DC Comics series they breathed new life into for the past five years, "Legion" (as reported first by "Lying In The Gutters"), though they won't confirm the new creative team. DnA spoke to CBR News briefly about leaving "Legion" and their perspective on Superman. "First up, let's confirm we'll be leaving 'Legion' as of issue #33," revealed the British duo, who speak as one in interviews. "We've had a fine old run and enjoyed every minute of it. Sixty issues straight, that's five years. We've told all the stories we wanted to ...with one exception...and it was high time somebody else got a chance to play. We'd like to take this opportunity to thank our editors Mike McAvennie and Steve Wacker for making it so much fun, and our artists - especially Olivier Coipel and Chris Batista. And we'd like to thank the readers for being so loyal and so vocal in their praise and support. Long live the Legion! "Before you ask...the story we didn't get to finish was the one involving Tinya and Jo's son, Cub. There'll be a lot of things left dangling when we go, lots of unresolved subplots and character arcs, that's just the way it works. But the only story we had a definite ending and resolution worked out for was Cub. Originally, DC allowed us to stay on as long as we wanted to finish up what we were doing, so we had planned on leaving with #36 after telling the Cub story. Sadly, they had to pull three issues off us to make things fit with the incoming team, and we realised we wouldn't have room to do the Cub story after all. It's our only regret. Our last, great Legion story, never to be told." While going from "Legion" to the Superman titles make sense from the relation between the two properties, it was a different relation that brought DnA to that part of the DCU. "We were invited. Eddie Berganza decided it was high time we rekindled the working relationship that had enjoyed itself so much on 'Resurrection Man.'" Though both writers are enthusiastic to tackle Big Blue, it's been said that the British usually aren't too fond of Superman, but as to why, DnA reply, "No idea! Do they? Too American maybe? We dunno. It would be fairer to say that a lot of creators 'dislike' Superman because it's hard to find drama in a story about a man who can do just about anything. That's the challenge with Supes." Growing up with a different variety of comics- like "2000 A.D"- one might expect DnA to tackle Superman from another perspective and frankly, you'd be correct. "As you'll see, we define him by comparison and by defamiliarisation. Showing what he is by showing how others aren't him." With that in mind, the story that DnA are crafting doesn't involve Superman… at least not directly. "It was DC's [decision]...driven by continuity. That's the hand we were dealt...it was up to us to play it." Don't worry, you'll see the Superman cast- even some you may not have seen in a little while. "[You'll see] All of them, especially Lois. It's very much a Metropolis story." The contrasting and comparing of Superman will be in relation to Mr. Majestic, the Wildstorm Comics hero who is somewhat of a riff on the classic caped crusader. "They're very alike in some many obvious ways and yet utterly different in several key areas. Maj has got that detached super-intellect thing going on. He lacks all of Clark's human nobility and empathy." But will it affect Wildstorm Continuity, taking one of the key members of the past WildC.A.T.S team and placing him in the DCU? "We don't know about Wildstorm continuity," admit DnA. "As for the rest, maybe, if DC like what we've got in mind [in regards to telling more stories with Maj]." Despite speculation, this story does not tie in to the time altering events in "Legion" and will stand on it's own. "Only in the fact that it's all DCU continuity related. This is a fresh deal for us." Also onboard for the Superman stories is artist Karl Kerschl and DnA say that they didn't ask for him specifically, but were glad to collaborate with him once more. "Eddie's choice, but one which we heartily welcomed. We've worked with Karl before, on the 'Ice-Man' mini from Marvel and his work is great. Great detail, great sense of place, and great story-telling. This stuff looks amazing!" The future is bright for DnA and while they'd like to tackle Superman again ["Ask Eddie...depends how good a job he thinks we did."], there are other DC heroes they'd like to write about, namely "Green Lantern...oh, and Wonder Woman...and the Flash is cool...and, oh! JLA obviously...and..." Bendis Confirms, Tim Drake's New Identity Pushed Back to Young Justice #8 Immortal Hulk #25 Lands Double-Sized, End of the Universe Issue
cc/2019-30/en_head_0010.json.gz/line2899
__label__wiki
0.791085
0.791085
Accused killer talked about the crime on Snapchat A 19-year-old man accused of killing an acquaintance during an alcohol-fueled fight, then dumping the victim's body in Valley Center and mentioning the slaying on the social media app Snapchat, plea Published: 1:34 PM PDT May 3, 2017 Updated: 1:42 PM PDT May 3, 2017 VISTA (CNS) - A 19-year-old man accused of killing an acquaintance during an alcohol-fueled fight, then dumping the victim's body in Valley Center and mentioning the slaying on the social media app Snapchat, pleaded not guilty Wednesday to a charge of murder. Salvador Alejandro Sanchez of Escondido was arrested Sunday on suspicion of murdering Maithem Alfuraiji, 20, three days earlier. The cause and circumstances surrounding his death have not been made public. Sanchez allegedly "dumped the victim's body and buried it in tall grass" in an area off East Paradise Creek Lane in Valley Center, Escondido police Lt. Justin Murphy said. On Saturday, friends of the victim saw Snapchat posts from the suspect alluding to a possible homicide and alerted the San Diego County Sheriff's department, which in turn notified the Escondido Police Department. Sanchez posted text statements, but not incriminating photos or video, police said. Without elaborating, Deputy District Attorney Claudia Plascencia said details of the case were still emerging. A preliminary hearing was set for May 16. The body of Alfuraiji, an Escondido resident, was discovered Sunday. Sanchez was taken into custody in the vicinity of Ash Street and Grand Avenue that afternoon, Murphy said. Anyone with information on the case was asked to call Detective John O'Donnell at (760) 839-4756, or the Escondido Police Department's anonymous tip line at (760) 743-8477. Sanchez -- who's being held on $2 million bail -- faces 25 years to life in prison if convicted. He will be back in court May 11 for a readiness conference.
cc/2019-30/en_head_0010.json.gz/line2900