pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
78
991k
source
stringlengths
37
43
__label__wiki
0.940033
0.940033
HomeHere are the names of all Prince Louis' godparents Here are the names of all Prince Louis' godparents July 24, 2018 | by Farooque Omer Prince William and Kate Middleton's third child, Prince Louis, was christened in a private ceremony where his godparents were also announced. According to The Royal, friends and family of the Duke and the Duchess gathered in the Chapel Royal at St. James' Palace, on July 9, 2018. Kensington Palace announced six godparents to 11-month-old Prince Louis. The three godmothers and three godfathers of the Prince include Guy Pelly, Nicholas van Cutsem, Harry Aubrey-Fletcher, The Lady Laura Meade, Mrs. Robert Carter (Hannah Gillingham), and Lucy Middleton. Read more on our Twitter account @amomama_usa. Pelly, a renowned high society nightclub founder, is friends with Prince William and his brother, Prince Harry. Van Cutsem is a family friend, whose daughter, Grace, was a bridesmaid at the wedding of William and Kate in 2011. Aubrey-Fletcher and William went to Musgrove School and Eton. Further details about the guests and godparents at the christening of Prince Louis have been announced: https://t.co/pBg5a4p5ff — The Duke and Duchess of Cambridge (@KensingtonRoyal) July 9, 2018 Lady Laura is the wife of William’s close friend James, who happens to be Princess Charlotte’s godfather. Carter is a school friend of the Duchess while Lucy Middleton is her cousin. The official portraits from Prince Louis’ christening were taken by Matt Holyoak, who had also taken pictures for Queen Elizabeth and Duke of Edinburgh, Prince Philip’s 70th wedding anniversary. Conspicuous by their absence at their service on July 9 were the Queen and the Duke. William’s third child was baptized by the Archbishop of Canterbury, the Most Reverent Just Welby, in the Chapel Royal at St. James’ Palace. The godparents were part of the private ceremony which began at 4 p.m. and went on for 40 minutes. It also marks the first time when the Duke and Duchess of Cambridge were photographed with their three children, four-year-old Prince George, three-year-old Princess Charlotte, and Prince Louis. Others in attendance were Prince of Wales Charles, his wife, the Duchess of Cornwall Camilla, the Duke and Duchess of Sussex, Prince Harry and Meghan, Mr. and Mrs. Michael Middleton, and Mr. and Mrs. James Mathews. Prince Louis Arthur Charles was born on April 23, St. George’s Day in the private Lindo Wing of St. Mary’s Hospital in Paddington, London. For his christening, he was dressed in the traditional cream gown, which was used for his older siblings as well. It is a replica of the lace and satin dress made by Queen Victoria for her eldest daughter in 1841. Royal Apr 01, 2019 Here's How Kate Middleton Responded to a Question about 'Baby Number 4' A post shared by Duke and Duchess of Cambridge (@kensingtonroyal) The original robe was worn for all Royal christenings including the Queen. Dressmaker to the Queen, Angela Kelly, was responsible for making the replica dress to preserve the original. The first member of the Royal family to wear the replica gown was the youngest of her eight grandchildren, James, Viscount Severn. Louis’ elder brother, Prince George, too was baptized in the Chapel Royal, while his sister, Princess Charlotte was christened at the Church of St. Mary Magdalene in Sandringham. Right after the ceremony, all the guests attended a private tea at Clarence House. They were served slices of cake taken from a tier of William and Kate’s wedding cake. Royal Mar 15, 2019 Kate Middleton Revealed Sweet Achievements of Little Prince Louis Who Is Already 10-Months Old Every Potential Godparent for Meghan and Harry’s Future Baby, Including Princess Eugenie Princess Charlotte was the little royal star until the camera captured Prince Louis in pants Little Prince Louis looks so grown-up in exclusive royal photo just released as a Christmas card Lady Gaga Stuns in Schiaparelli Couture Dress at the Presidential Inauguration — See Details of Her Outfit
cc/2021-04/en_head_0031.json.gz/line2045
__label__cc
0.621897
0.378103
WSU Ag Research Center, WSU Extension Break Record for Grant Awards PULLMAN, Wash. – Fiscal 2009 was a record-breaking year in terms of grant awards to faculty members in the Washington State University College of Agricultural, Human, and Natural Resource Sciences and WSU Extension. The WSU Agricultural Research Center, housed in CAHNRS, topped its fiscal 2008 total for grant awards by nearly $6 million, jumping from $27.7 million to $33.4 million for fiscal 2009, which ended June 30. WSU Extension grant awards grew from $25.5 million in fiscal 2008 to approximately $29 million in FY09. In both cases, it is the largest dollar amount of grant dollars awarded in recent history. “Achieving this kind of success in the current economic environment speaks volumes about the quality and initiative of our faculty,” said Dan Bernardo, CAHNRS dean and director of WSU Extension. “We use the state dollars we receive to leverage even more to fund projects that directly benefit the state in agriculture, natural resources and the human sciences.” Ralph Cavalieri, associate dean of CAHNRS and director of the WSU Agricultural Research Center, agreed. “The bulk of the credit here goes to the faculty who recognize the increasing need for additional resources, especially in light of declines in state appropriations,” he said. Linda Kirk Fox, associate dean of CAHNRS and assistant director of WSU Extension, said the grant awards for Extension programs reflect the increasing strength of partnerships between WSU Extension faculty and organizations throughout the state. “With a presence in each of the state’s 39 counties, there are numerous opportunities to partner at the local level to make a difference in the lives of Washingtonians,” she said. “Even in tight economic times, our county partners and others continue to funnel scarce dollars into Extension programs.” In WSU Extension, grant dollars support programs for agriculture, but also for child nutrition, low impact development, improved water quality and rural economic development. In CAHNRS, the majority of the grant awards will go toward agricultural research on everything from integrated pest management in vineyards and automated orchards to drought resistant wheat and breaking down biomass for biofuels. Dan Bernardo, Dean, 509-335-4561 Ralph Cavalieri, associate dean, 509-335-4487
cc/2021-04/en_head_0031.json.gz/line2046
__label__cc
0.555276
0.444724
WSU wins national award for water-saving research Water scarcity – one of the toughest challenges predicted for the 21st century – is being addressed by Washington State University. As part of a multistate research program, WSU is among 19 land-grant universities honored recently for their efforts to help farmers irrigate their land more efficiently, especially during droughts and water shortages. Subsurface microirrigation system for 12-year-old grape vines at WSU Roza Research Farm near Prosser, Wash. Photo by Pete Jacoby, WSU. “A safe, reliable supply of water is inextricably linked to food security,” said Sonny Ramaswamy, director of the USDA National Institute of Food and Agriculture. “The five-fold increase in irrigated acres that took place during the 20th century cannot be repeated in the 21st century—there isn’t the space. Instead, we must increase efficiency of the irrigated farmland we have, and that is what this project is doing.” The national Microirrigation for Sustainable Water Use W-2128 research program was presented the 2014 Experiment Station Section Excellence in Multistate Research Award by the USDA National Institute of Food and Agriculture and the Experiment Station Committee on Organization and Policy at the Association of Public and Land-Grant Universities annual meeting in Orlando, Florida. The award recognizes outstanding efforts of researchers and extension specialists who have come together to tackle a priority issue that no one institution can address on their own. More crop per drop Irrigation systems that apply high volumes of water over wide areas can lose a lot to runoff, wind, or evaporation and result in over- or under-watered plants. In contrast, microirrigation systems reduce water waste and can produce more crop per drop. These systems use special timers, sensors, and a network of narrow tubes to deliver the right amount of water and nutrients to plants at the right time. Microirrigation also decreases contaminants carried to surface water and groundwater and can improve the quality of agricultural crops. In the last five years, the W-2128 microirrigation research program has led to new equipment and tools that are easier to install, more durable, and more precise. Engaging farmers around these advances has encouraged adoption of microirrigation systems and led to significant economic and environmental impacts. Wine grapes sip water WSU scientists and extension specialists have assisted farmers with microirrigation for over two decades. Pete Jacoby, professor of crop and soil sciences and the project lead, said that as a result, most of the 50,000 acres of wine grapes in Washington are grown under microirrigation. The use of microsprinklers in combination with surface drip systems continues to increase in tree fruit and juice grape production, he said. New research funded as a continuation of the W-2128 project, referred to as W-3128, is under way to determine the role of new and advanced methods of subsurface drip irrigation in cooperation with Washington wine grape growers. The study will compare plant responses to water applied at subsurface depths of up to four feet and water applied via surface drip irrigation.This research could help reduce costs associated with pumping water and help conserve water resources by curtailing water loss to weeds and evaporation. Pete Jacoby, Department of Crop and Soil Sciences “If this new technique of subsurface microirrigation proves effective, I believe wine and juice grapes can be grown with less than half the water required to do so with current surface drip irrigation systems,” Jacoby said. Other land-grant institutions participating in the national project include: Auburn University; University of Arizona; University of California, Davis; University of California, Division of Agriculture and Natural Resources; Colorado State University; University of Florida; University of Hawaii; University of Idaho; Iowa State University; Kansas State University; Mississippi State University; University of Nebraska; New Mexico State University; Cornell University; Oregon State University; University of Puerto Rico; Texas A&M AgriLife Research; University of the Virgin Islands; Natural Resources Conservation Service and Agricultural Research Service. Pete Jacoby, WSU Department of Crop and Soil Sciences, 509-335-3495
cc/2021-04/en_head_0031.json.gz/line2047
__label__wiki
0.828562
0.828562
WTO and Its Implications Topic of Holland Lecture PULLMAN, Wash. — Daniel A. Sumner, director of the Agricultural Issues Center at the University of California, Davis, will deliver the Phillip C. Holland Lecture at Washington State University on March 23. Sumner, who is also the Frank H. Buck Jr. Professor in the department of agricultural and resource economics, will lecture on “The World Trade Organization and Its Implications for Pacific Northwest Agriculture.” The free public lecture is scheduled at 4:15 p.m., Thursday, March 23, in Todd 216. Sumner served as deputy assistant secretary and later assistant secretary for economics in the U.S. Department of Agriculture from 1990-93. He was responsible for oversight and guidance of data collection, projections, economics research and policy analysis for U.S. agriculture. From 1987-89, he served as senior staff economist on the President’s Council of Economics Advisers. Sumner is considered to be one of the leading experts on policy issues surrounding U.S. agricultural trade. The World Trade Organization assumed the powers of the General Agreement on Tariffs and Trade in 1995. Since then, the WTO has stood in the middle of numerous controversies and has dealt with major trade disputes between major powers. The WTO’s rulings on tuna, petroleum products and shrimp have riled environmentalists. Many groups have expressed concern over the lack of transparency in WTO proceedings. Others fear loss of sovereignty to the trade body. Many of these issues came to a head at the WTO summit in Seattle last December. The Phillip C. Holland Lectureship was established in the will of WSU President Ernest O. Holland and named in honor of his father. It was established to bring lecturers of national and international stature to the institution to speak on questions dealing with the social problem, finance, education or other special fields, either in liberal arts, fine arts, science or engineering.
cc/2021-04/en_head_0031.json.gz/line2048
__label__wiki
0.838413
0.838413
New gene drive technology evokes hopes and fears The graphic illustrates how when a mosquito with a gene drive mates with a wild-type mosquito, the CRISPR mutation (blue) can potentially spread quickly through a population. The idea of introducing a novel gene into a few individuals that then spreads through an entire population sounds like a premise for science fiction. And yet fiction can be prophetic. Cornell researchers have used mathematical models to illuminate the promises – and potential problems – of a new genome editing mechanism, called a gene drive. The mechanism has been long discussed but only recently demonstrated in fruit flies in labs at the University of California, San Diego, using genome-editing technology called CRISPR. The gene drive mechanism may allow scientists to control malarial mosquitoes or pesticide-resistant pests, for example, by using CRISPR to introduce a mutation (allele) into a few individuals in a population and have that mutation quickly spread through the entire population. But researchers fear such gene drives could have unintended consequences, such as spreading into an unintended species. Cornell researchers report the need to thoroughly understand the population dynamics and behavior of artificial gene drive systems, according to a recent paper in the journal Genetics. To do this, they created a simple mathematical model to test how quickly and how far an introduced allele might spread. “The time for these CRISPR alleles to spread and become fixed in a population is on the order of tens of generations,” said Rob Unckless, the paper’s first author and a postdoctoral research fellow in the Department of Molecular Biology and Genetics. “That’s incredibly fast.” Under natural selection, a beneficial gene may take hundreds of generations to reach high frequencies in a population, he added. CRISPR technology was first derived from a bacterial immune response that uses RNA to protect itself against plasmids and viruses by breaking specific DNA sequences in the pathogen’s genome. With the CRISPR technology, researchers have co-opted that system to edit any gene, allowing them to make precise genetic changes for a desired effect. Each individual within higher species has two copies of every gene, one from each parent. UCSD researchers figured out how to use an autonomous CRISPR system to edit a gene and change the corresponding allele so that it carries the new genetic edit. Once an embryo has a CRISPR allele, that individual organism will develop two exact copies, which it passes on to its offspring. The mechanism then continues through subsequent generations, thereby spreading an allele rapidly through a population. Now researchers can take a gene that has a fitness cost, such as male sterility, and move it through a population, something very unlikely under natural selection. The mathematical model showed that an introduced allele is more likely to become fixed in a population when that allele efficiently converts its corresponding allele into a match, and when the fitness costs to the individual are weak. Under natural conditions, a single copy of any mutation is almost always lost. But Cornell researchers found a single mutation introduced in one individual spread to the entire population close to one-third of the time, assuming that the CRISPR allele perfectly converted its corresponding allele, and the introduced allele carried a fitness cost where an individual produced 40 percent fewer offspring. “That’s one of the things that is scary, if you imagine that one of these alleles gets into a population that you don’t want it in,” Unckless said. For example, a CRISPR gene that controls mosquitos that carry dengue may jump to a related species that perhaps doesn’t feed on humans. A bigger concern would be if a CRISPR gene somehow transferred through a mite or wasp to honey bees, Unckless said. “There is so much we don’t know, but it’s also so promising,” Unckless said. “Nobody has done the modeling, so we are working on this.” Co-authors include Philipp Messer and Andrew Clark, both at Cornell, and former Cornell postdoctoral researcher Tim Connallon, who is now at Monash University in Australia. The study was funded by the National Institutes of Health and the Australian Research Council.
cc/2021-04/en_head_0031.json.gz/line2049
__label__wiki
0.81529
0.81529
IARC building aims for LEED certification November 27, 2012 | Andre Salles Fermilab is constructing the IARC Office, Technical and Education Building with a view to being green. The new building is on track to receive the U.S. Green Building Council’s Leadership in Energy and Environmental Design certification. Rendering: Ross Barney Architects If you travel Fermilab’s streets, you’ve no doubt seen that work is proceeding quickly on the Illinois Accelerator Research Center. When it’s finished, the project team hopes the new building will become the laboratory’s first to achieve the U.S. Green Building Council’s Leadership in Energy and Environmental Design (LEED) certification. And because of changing Department of Energy regulations, it will also likely be the last. When it’s completed next year, IARC will cover about 83,000 square feet, and approximately 48,000 of that will be new construction. (The new building will join with the existing CDF assembly building, which will be refurbished after construction is completed.) The new center will house mostly offices and technical and educational facilities, and its purpose will be to bring private companies together with Fermilab scientists to find further practical uses for the lab’s research. It will also be remarkably energy-efficient, according to IARC building Project Manager Rhonda Merchut. The IARC team is aiming for a LEED gold certification for the new building, as required by the DOE at the time of the project’s inception. That means that every element of the project, from design to purchasing materials to construction, has been carried out with the environment and energy conservation in mind. For instance, the building has been designed with a geothermal HVAC system, consisting of 40 wells drilled 510 feet into the ground, allowing the earth to be used as a heat source in winter and a heat repository in summer. Seventy-six percent of the steel used in the building so far contains recycled content, Merchut said, and to date 91 percent of all waste generated by the construction has also been recycled. The goal is to maximize the amount of material that comes from local sources, she said. The energy-efficient design of the new building is expected to save 30 percent over the baseline energy costs of a similar-sized building. In fact, that’s a requirement to get the points needed for a LEED gold certification, Merchut said. The new IARC building will include a pair of green roofs—essentially grass and vegetation planted on sections of the roof. The layer of soil and grass absorbs heat, Merchut said, and provides a nicer view for those in offices overlooking it. With so many benefits, why is DOE turning away from LEED certification for its new buildings? Ironically, it’s because they found a way to be more efficient. DOE initially required LEED gold certification for any new buildings costing more than $5 million, starting in 2008. But according to Rod Walton, FESS environmental officer, a new DOE order issued in May 2011 signaled a different approach—federal guiding principles will now be the standard for environmentally friendly and energy-efficient projects. These principles, Walton said, offer more freedom and better oversight and will take less staff time to comply with, since LEED demands extensive paperwork for approval. Additionally, Walton said, LEED is designed for office buildings, not the experimental halls Fermilab usually builds. “It would drive us crazy trying to get LEED gold certification for Mu2e, for example,” he said. Whatever the method, the philosophy of sustainability and environmentalism remains the same, and it’s one Fermilab is committed to. In fact, many of the principles already in place at the lab helped fulfill the LEED requirements for the IARC building. “By and large, the lab does pretty well,” Walton said. “We’re conscientious.” —Andre Salles
cc/2021-04/en_head_0031.json.gz/line2050
__label__wiki
0.984427
0.984427
Origin of the term In movie industry terminology, a sound track (two words) or just track is an audio recording created or used in film production or post-production. Initially the dialogue, sound effects, and music in a film each has its own separate track (dialogue track, sound effects track, and music track), and these are mixed together to make what is called the composite track, which is heard in the film. A dubbing track is often later created when films are dubbed into another language. The contraction soundtrack (one word) came into use with the advent of so-called "soundtrack albums" in the early 1950s. First conceived by movie companies as a promotional gimmick for new films, these commercially available recordings were labelled and advertised as "music from the original motion picture soundtrack." This phrase was soon shortened to just "original motion picture soundtrack." More accurately such recordings are made from a film's music track, because they usually consist of the isolated music from a film, not the composite (sound) track with dialogue and sound effects. Soundtrack has since come to denote three different things: the recorded sound accompanying a visual medium such as a motion picture, television show, or video game, just the music in it alone, or a genre of music ("soundtrack music" or "soundtracks"). The abbreviation OST is often used to describe the musical soundtrack on a recorded medium, such as CD, and it stands for Original Soundtrack; however, it is sometimes also used to differentiate the original music are heard and recorded versus a rerecording or cover of the music. Movie and television soundtracks Film score and Film soundtrack The term soundtrack now most commonly refers to the music used in a movie (or television show), and/or to an album sold containing that music. Sometimes, the music has been recorded just for the film or album (e.g. Saturday Night Fever). Often, but not always, and depending on the type of movie, the soundtrack album will contain portions of the score, music composed for dramatic effect as the movie's plot occurs. In 1908, Camille Saint-Saens recorded the first music specifically for use in a motion picture (L'assasinat du duc de Guise), and releasing recordings of songs used in films became prevalent in the 1930s. Henry Mancini, who won an Emmy Award and two Grammys for his soundtrack to Peter Gunn, was the first composer to have a widespread hit with a song from a soundtrack. By convention, a soundtrack record can contain all kinds of music including music "inspired by" but not actually appearing in the movie; the score contains only music by the original film's composer(s). Soundtrack may also refer to the music used in video games. While sound effects were nearly universally used for action happening in the game, music to accompany the gameplay was a later development. Rob Hubbard and Martin Galway were early composers of music specifically for video games for the 1980s Commodore 64 computer. Koji Kondo was an early and important composer for Nintendo games. As the technology improved, polyphonic and often orchestral soundtracks replaced simple monophonic melodies starting in the late 1980s and the soundtracks to popular games such as the Dragon Quest and Final Fantasy series began to be released separately. In addition to compositions written specifically for video games, the advent of CD technology allowed developers to incorporate licensed songs into their soundtrack. (The Grand Theft Auto series is a good example of this.) Furthermore, when Microsoft released the Xbox in 2001, it featured an option allowing users to customize the soundtrack for certain games by ripping a CD to the hard-drive. Book soundtracks Only a few cases exist, of an entire soundtrack being written specifically for a book. A soundtrack for J. R. R. Tolkien's The Hobbit and his trilogy The Lord of the Rings was composed by Craig Russell for the San Luis Obispo Youth Symphony. Commissioned in 1995, it was finally put on disk in 2000 by the San Luis Obispo Symphony. For the 1996 Star Wars novel Shadows of the Empire (written by author Steve Perry). Lucasfilm chose Joel McNeely to write a score. This was an eccentric, experimental project, in contrast to all other soundtracks, as the composer was allowed to convey general moods and themes, rather than having to write music to flow for specific scenes. A project called "Sine Fiction" has made some soundtracks to novels by science fiction writers like Isaac Asimov and Arthur C. Clarke, and has thus far released 19 soundtracks to science-fiction novels or short stories. All of them are available for free download. The 1985 novel Always Coming Home by Ursula K. Le Guin, originally came in a box set with an audiocassette entitled Music and Poetry of the Kesh, featuring three performances of poetry, and ten musical compositions by Todd Barton. In comics, Daniel Clowes' graphic novel Like a Velvet Glove Cast in Iron had an official soundtrack album. The original black-and-white Nexus #3 from Capitol comics included the "Flexi-Nexi" which was a soundtrack flexi-disc for the issue. Trosper by Jim Woodring included a soundtrack album composed and performed by Bill Frisell. Many audio books have some form of musical accompaniment, but these are generally not complex enough to count as a complete soundtrack. World Soundtrack Awards 2007
cc/2021-04/en_head_0031.json.gz/line2053
__label__wiki
0.816156
0.816156
NCC gets set to fix wonky Hog's Back swing bridge Jon Willing Aug 01, 2018 • Last Updated August 1, 2018 • 2 minute read Hog's Back Bridge . Operated by the NCC, it is in need of some serious repairs. Photo by Wayne Cuddington /Postmedia Armed with millions in new federal money, the National Capital Commission is swinging into action to fix the banged-up 42-year-old bridge at Hog’s Back. The agency is looking for a design and technical consultant to provide advice on the bridge upgrades, which could happen in 2019. The preliminary cost of construction is $2.5 million, according to tender documents. Up until recently, the NCC didn’t have a big pot of money for asset rehabilitation. The federal budget announced last February provided the agency with $55 million for critical infrastructure repairs. The NCC has not yet released a full list of projects covered by the money, but the Hog’s Back swing bridge is expected to be part of the agency’s plans. The city can no longer rely on the swing bridge for access over the Rideau Canal. It has conked out in the past, requiring shutdowns of the Hog’s Back connection between Prince of Wales Drive and Colonel By Drive. Breakdowns have also stopped boats from crossing between the canal and Rideau River. The NCC doesn’t want to replace the bridge altogether. Tender documents call for rehabilitation. The 26.5-metre-long bridge, which has two spans crossing the canal, weighs 248 tonnes and dates back to 1976. According to the NCC’s documents, the steel bridge swings around up to 20 times a day during peak boating season. The mechanical and electrical controls are in sync with the canal lock system. The components that allow the bridge to swing open and close are deteriorating. Major work in 2006 and 2008 made repairs to the bridge deck grating, electrical room and mechanical devices, the NCC says. There was also work done in 2016-2017. The bridge hasn’t been a big problem during the 2018 boating season. There were two failures at the beginning of startup operations, but it’s nothing like 2017. Mayor Jim Watson and River Coun. Riley Brockington have pushed the NCC for answers on the untrustworthy bridge. Brockington wrote to the agency last year asking what it’s doing to fix the bridge after a string of closures over the 2017 summer. The NCC has thought about replacing the bridge, either by installing a new swing bridge or building an elevated fixed bridge. Both options would be expensive and, according to the NCC’s estimates, the fixed bridge would cost $3 million more. A rehabilitated bridge would add 20-30 more years to its lifespan before a full replacement is required, the agency says in the documents. A replacement could be required between 2038 and 2048. The scope of the work could include repairs to the masonry around the bridge, rails and pathway tunnels. The NCC expects the work in 2019 will coincide with the replacement of the adjacent bridge at Hog’s Back Falls under the responsibility of Parks Canada. The NCC and the winning design consultant will have to figure out how to manage auto, bike and pedestrian traffic when the swing bridge closes for construction. The contract documents bring up the idea of a temporary bridge that could keep traffic flowing, while acknowledging it would come with an additional cost. There’s also a question about impacts to boat traffic, but the NCC intends to allow boats through during the season between mid-May and mid-October. Construction in 2019 could start in April and last until the end of November, but the timeline still needs to be finalized. jwilling@postmedia.com twitter.com/JonathanWilling
cc/2021-04/en_head_0031.json.gz/line2056
__label__wiki
0.665149
0.665149
Home Life & Style Destinations St. Petersburg The ‘Venice of the North,’ Russia’s Baltic treasure, is home to hundreds of years of czarist art, history and culture. Chuck Mai The Hermitage is a popular stop for fans of art and culture. It’s the city of Fyodor Dostoyevsky, Anna Akhmatova, Pyotr Ilich Tchaikovsky and Aleksandr Pushkin. It’s a magnificent expanse of rivers, canals and harbors spread across 40 islands – the “Venice of the North.” While St. Petersburg was founded by Peter the Great, it was named for St. Peter and designed in the tradition of the great cities of Western Europe with long boulevards and grand public squares. From 1924 to 1991 in the Soviet era, the city on the Baltic Sea was known as Leningrad. The popular Summer Garden welcomes tourists to explore the flora and fauna. One of St. Petersburg’s finest hotels is also one of its best-located. The Belmond Grand Hotel Europe on the bustling Nevsky Prospect, St. Petersburg’s main street, is within easy walks of the Summer Garden, the State Russian Museum, the Hermitage Museum and the Church of the Savior on Spilled Blood. The hotel is a bit of an artifact itself; constructed at the beginning of the 19th century, it features a neo-baroque facade and art nouveau designs. It houses Russia’s oldest continuously serving restaurant, L’Europe, and the Caviar Bar and Restaurant, offering 15 kinds of caviar and 35 varieties of vodka. A new public park was recently installed on New Holland, one of the city’s man-made islands. Visitors enjoy everything from public art and sporting events to concerts. A gigantic flea market called Udelka sells it all: wares from the Soviet days, items from Turkey, vintage luggage, 1990s T-shirts, toys from yesteryear, authentic Soviet clothing, and parts from Russian cars built in 1960s and 1970s. Palace Square is the heart of the bustling city. Neighborhood bookshops – St. Petersburg has dozens – offer lots of titles and magazines while also serving as meeting places for thoughtful discussion. Plus, many serve coffee. The live music scene is big. One popular, somewhat grungy venue is Slam City on Grazhdanskaya Street; it serves up U.S.-inspired garage rock. Other musical genres also flourish. the interior of the hermitage museum, founded in 1764, boasts intricate designs. The 254-year-old Hermitage is one of the most interesting museums in the world. It was founded by Catherine the Great to exhibit her massive collection of paintings and classical antiquities. The compound comprises six buildings, including the Winter Palace, home of the czars for many years and open for tours. In 2014, a contemporary wing called the General Staff Building opened to rave reviews, particularly for its grand staircase and luminous glass ceiling. St. Isaac’s Cathedral, completed in 1858 after 40 years of construction, remains a marvelous testament to neo-classical architecture. The building, which survived Nazi bombing during World War II, once served as a museum of atheism in Soviet days. Church of the Savior on Blood, Saint-Petersburg, Russia The State Russian Museum consists of the Mikhailovsky Palace, the Stroganov Palace, the Benois Wing, Saint Michael’s Castle and the Marble Palace. In all, it’s the largest collection of Russian fine art in St. Petersburg. Many pieces are exquisite gifts presented to czars and represent Russia’s many ethnicities. The lavishly decorated, onion-domed Church of the Savior on Spilled Blood was built on the spot where Czar Alexander was assassinated in 1881. Refurbished in 1997, the building has ceilings and interior walls covered with more than 80,700 square feet of intricate mosaics. More than 150 top-notch cultural offerings occur from late May to late July, when the sun never fully sets. The Stars of the White Nights features ballet, opera and classical music performances and concerts, plus added special events. Previous articleCashing in on Bloody Beginnings Next articleNew Gear for the New Year
cc/2021-04/en_head_0031.json.gz/line2057
__label__wiki
0.770715
0.770715
Capital, Human, TechCrunch Human Capital: Uber and Lyft’s ongoing battle with the law and a brief history of diversity at Snap Welcome back to Human Capital (formerly known as Tech at Work), which looks at all things labor in tech. This week presented Uber and Lyft with a fresh labor lawsuit as a judge heard arguments from Uber, Lyft and lawyers on behalf of the people of California in a separate suit brought forth by California’s attorney general. Meanwhile, Snap recently released its first-ever diversity and inclusion report — something the company had been holding off on doing for years. Below, we’ll explore the nuances and the significance of these lawsuits, as well as Snap’s track record with diversity and inclusion. Let’s get to it. Gig life CA Superior Court Judge Ethan P. Schulman heard arguments regarding a preliminary injunction that seeks to force Uber and Lyft to reclassify their drivers as employees In May, California Attorney General Xavier Becerra, along with city attorneys from Los Angeles, San Diego and San Francisco, sued Uber and Lyft, alleging the companies gain an unfair and unlawful competitive advantage by misclassifying workers as independent contractors. The suit argues Uber and Lyft are depriving workers of the right to minimum wage, overtime, access to paid sick leave, disability insurance and unemployment insurance. In June, plaintiffs filed a preliminary injunction in an attempt to force Uber and Lyft to comply with AB 5 and immediately stop classifying their drivers as independent contractors. This week, more than 100 people tuned in to the hearing regarding the preliminary injunction. The hearing, held on Zoom, initially was only able to hold just 100 people. But the interest in the case forced the court to increase its webinar capabilities to 500. There hasn’t been a ruling yet, but Judge Schulman said we could expect one likely within a matter of days, rather than weeks. In the hearing, Schulman expressed how hard it is to determine the impact of a preliminary injunction in this case. For example, how Uber and Lyft would comply with the injunction is unknown, as are the economic effects on drivers, such as their ability to earn income, the hours they would be able to work and their eligibility for state benefits, Schulman said. “I feel a little bit like I’m being asked to jump into a body of water without really knowing how deep it is, how cold the water is and what’s going to happen when I get in,” he said. Here are some other key quotes from the hearing: Rohit Singla, counsel for Lyft The proposed injunction would cause irreparable injury to Lyft and Uber, and would actually cause massive harm to drivers and harm to riders. Matthew Goldberg, deputy city attorney for San Francisco We think the parties have drastically overstated precisely what they would need to do to be in compliance with the law. The other lawsuits against Uber and Lyft Earlier in the week, California Labor Commission sued Uber and Lyft in separate lawsuits. The goals of the separate suits are to recover the money that is allegedly owed to these drivers. By classifying drivers as independent contractors rather than employees, both Uber and Lyft have not been required to pay minimum wage, overtime compensation, nor have they been required to offer paid breaks or reimburse drivers for the costs of driving. What these lawsuits share is a core focus and argument that Uber and Lyft are misclassifying their drivers as independent contractors and breaking the law. These two companies have been sued many, many times for their labor practices, specifically as they pertain to the classification of their respective drivers as independent contractors. What’s different about the latest string of lawsuits is that they’re coming in light of a new law that went into effect in California earlier this year that is supposed to make it harder for these gig economy companies to classify their workers this way. The lawsuits are also coming from legislative bodies, rather than from drivers themselves. This moment has been a long time coming. Uber faced its first high-profile labor lawsuit back in 2013, when Douglas O’Connor and Thomas Colopy sued Uber for classifying them as 1099 independent contractors. Uber settled the lawsuit several years later in 2019 by paying out $20 million to O’Connor and Colopy, as well as the other class members. Stay Woke Snap finally releases a diversity report Snap, after declining to release diversity numbers for years, finally decided now was the time to make them public. Before we jump in, let’s take a quick look at Snap’s history with diversity. 2016: Snap came under fire for a couple of filters that many people called out as being racist. The first was a Bob Marley filter that basically enabled some sort of digital blackface. The second time it had to do with a lens that was supposed to be a take on anime characters. Instead, there was an outcry about Snapchat enabling yellowface. 2017: “We fundamentally believe that having a team of diverse backgrounds and voices working together is our best shot at being able to create innovative products that improve the way people live and communicate. There are two things we focus on to achieve this goal. The first—creating a diverse workplace—helps us assemble this team. We convene at the conferences, host the hackathons, and invest in the institutions that bring us amazing diverse talent every year. The second—creating an inclusive workplace—is much harder to get right, but we believe it is required to unleash the potential of having a diverse team. That’s because we believe diversity is about more than numbers. To us, it is really about creating a culture where everyone comes to work knowing that they have a seat at the table and will always be supported both personally and professionally. We started by challenging our management team to set this tone every day with each of their teams, and by investing in inclusion-focused programs ranging from community outreach to internal professional development. We still have a long and difficult road ahead in all of these efforts, but believe they represent one of our biggest opportunities to create a business that is not only successful but also one that we are proud to be a part of” – Snap’s S-1 2018: A former Snap engineer criticized the company for a “toxic” and “sexist” culture. Snap CEO Evan Spiegel later said the letter was “a really good wake-up call for us.” 2019: Snap hired its first head of diversity and inclusion, Oona King. King previously worked at Google as the company’s director of diversity strategy. June 2020: Spiegel reportedly said in an all-hands meeting the company will not publicly release its numbers. Snap, however, disputed the report, saying it would release that data. August 2020: Snap releases its first-ever diversity report showing its global workforce is just 32.9% women, while its U.S. workforce is 4.1% Black, 6.8% Latinx and less than 1% Indigenous. Snap’s numbers are not good, but also nothing out of the ordinary for the tech industry. What’s novel about Snap’s report, however, is the intersectional data breakdown. You’ll note that the representation of Black women (1.3%) is lower than the representation of Black men (2.8%). The same goes for all race/ethnicity categories. Across all distinct races, there are more men than women. Again, this is not good, but it’s to be expected, unfortunately. Black Founders Matter, a fund focused on Black entrepreneurs, makes first investment Gig workers for Target’s delivery service say tipping glitches are cutting into pay
cc/2021-04/en_head_0031.json.gz/line2062
__label__cc
0.645333
0.354667
Perry High School Alumni Association, Inc. Honor Roll Celebration Died in Military Service Deceased – 1970 – Current Deceased – 1960 – 1969 Legacy Awards Honor Roll Member – Bezdicek, Albert Joe “Bert” PHS Alumni Honor Roll Member Albert Joe “Bert” Bezdicek Bert (Albert) Bezdicek was born southeast of Perry to Frank and Mary Bezdicek. He married Wilma Stark of Mangum, Oklahoma. Bert had many achievements in the livestock business, banking, and agricultural development at the state and national level. Bert attended Pikes Peak District 79 School through eighth grade. He and close friends started the Perry 4-H Club. He was the president and held offices at the local, county and district levels. His Noble County Livestock Judging Teams won state and regional contests, and he was a delegate to the National 4-H Congress in Chicago in 1946. He graduated from Oklahoma A&M with a bachelor’s degree in 1951. He was a member of the Collegiate Livestock Judging Team, winners of several national contests. He remained active in the OSU Animal Science Alumni Association of which he was president. Bert was manager in Wisconsin of the largest privately owned U. S. Purebred Angus farm, and President of the Wisconsin Angus Association, Mid America Angus Association, and the Chicagoland Angus Association. He was an internationally recognized judge for livestock. He returned to Oklahoma in 1973 as Trust Officer of the First National Bank of Oklahoma City. During a 20-year banking career he held top executive positions in several large banks. After returning to Oklahoma, he studied at the University of Tulsa and the Oklahoma City University School of Law. Bert was President of the Southwest Livestock Foundation, Oklahoma 4-H Foundation, Oklahoma City Farm Club, the National Trust Real Estate and Oil & Gas Association, and Oklahoma Farm Managers and Rural Appraisers Association. He served as a Director of the Oklahoma City Chamber of Commerce and as Vice Chairman of major Chamber councils. He was a member of the International Association of Energy Economists, American Agriculture Law Association, and Key Club, and he served on Gov. David Boren’s Agribusiness Development Committee. He was a Contributing Editor to the National Agri-Finance Magazine and the Successful Farming Magazine, as well as panel member for the Texas Real Estate Research Center. His awards are too many to mention in this brief biography. Bert retired from banking in 1993 and started a small oil company, BEZ Resources LLC, located south of Perry. In January 1999 Bert and Wilma retired in Perry, where he is serving as Director for the Perry Memorial Hospital Foundation Board and is a lay leader of the First United Methodist Church of Perry. He and Wilma have three daughters, Sandy, Peggy, and Pam, and three grandsons. © 2015 Perry High School Alumni Association, Inc. Address: 606 Cedar, Perry, OK 73077 Mailing: P. O. Box 327, Perry, OK 73077 Email: PerryOKAlumni@att.net
cc/2021-04/en_head_0031.json.gz/line2067
__label__cc
0.552762
0.447238
Pearls and Pigs METAPEARLS Cannes 2015: the bittersweet memories of Desplechin’s “Golden Years” Homepage, PEARLS Some of my favourite films from last year – Whiplash, Tu Dors Nicole – were first screened at the 2014 Directors’ Fortnight (or Quinzaine des Réalisateurs, as my francophile self undoubtedly prefers), so it’s no wonder that I was especially looking forward to this year’s edition. As things go, I only managed to see one film – only one! – , but I’m so glad that it was Arnaud Desplechin’s latest, My Golden Years. Described as a prequel to his 1996 My Sex Life…Or How I Got Into An Argument, the drama takes the form described in its original title, Trois Souvenirs de Ma Jeunesse (literally “three memories from my youth”). Mathieu Amalric, a regular with Desplechin, reprises his role as Paul Dedalus, but largely leaves the scene to Quentin Dolmaire, who plays his younger incarnation. The film starts with Paul’s return to France after many years spent in Tajikistan. Stopped at the border because of an issue with his documents, he is held for questioning, which triggers his memories. He remembers moving in with his great aunt after some awful fights with his mother, and that’s the first chapter. He remembers his adventurous trip to Moscow with his then best friend, and the muted melancholy with which Paul recalls a friendship that has since dissolved is possibly one of the most delicate and moving moments in My Golden Years. More than anything though, he remembers Esther, the third and longest memory in this bittersweet drama. As beautiful as she is insolent, Esther is so totally out of Paul’s reach that it’s only natural to see them ending up together. Watching their long-distance relationship, romantically sustained by countless letters, brief phone calls and monthly visits, is heart-wrenching, and we truly feel for the couple as they go through ups and downs, separations, crises and the occasional infidelities. For a film so imbued in melancholy, My Golden Years is surprisingly funny. Esther’s cutting disdain for the other girls is as pungent as it is funny, and the hilarious skirt-dropping scene has quickly become one of the most talked about moments in the film. Paul’s younger brother’s peculiar take on religion is also a constant source of laughter. My Golden Years is aided by a lively soundtrack and a vivid cinematography, which stop it (and us) from wallowing in nostalgia. On the contrary, the saturated colours, warm light and soft focus that pervades many of its scenes suggest the serenity that only comes once time has glossed over memories, hiding the most painful bits away. The result is a poetic film about what could have been and what has been instead. Paul Dedalus acknowledges that his best days may be behind him, but seems to be at peace with that, choosing to savour those beautiful memories instead of giving in to self-pity. An almost cathartic journey that will make you smile as you wipe a tiny tear from your eye, it goes to Desplechin’s credit that he manages to achieve that without the slightest attempt at manipulating his audience. I might have not seen the other films in competition, but I know who I’m rooting for tonight. Bravo, et bonne chance. May 23, 2015 pearlspigs Tagged adolescence, arnaud desplechin, bittersweet, Cannes, Cannes 2015, coming of age, directors' fortnight, Drama, festival de Cannes, loss, Love, mathieu amalric, melancholy, Melodrama, memories, my golden years, nostalgia, past, pearl, Pearls, quinine, quinine des realisateurs, trios souvenirs de ma jeunesse Leave a comment ← CANNES 2015: MON ROI, A PROZAC (AND CASSEL) -IMBUED LOVE STORY TRIBECA 2015: ALBERT MAYSLES’ ‘IN TRANSIT’ LEAPS INTO THAT RIDE TO NOWHERE → Follow Pearls and Pigs on Twitter
cc/2021-04/en_head_0031.json.gz/line2073
__label__cc
0.729748
0.270252
Cellular network devices FortiOS™ Handbook SSL VPN for FortiOS 5.0 01-504-112804-20131030 Copyright© 2013 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herein were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. docs.fortinet.com kb.fortinet.com support.fortinet.com training.fortinet.com FortiGuard fortiguard.com Document Feedback Change Log....................................................................................................... 5 Introduction to SSL VPN .................................................................................. 8 SSL VPN modes of operation .................................................................................. 9 Web-only mode ................................................................................................. 9 Tunnel mode ..................................................................................................... 9 Port forwarding mode ...................................................................................... 10 Application support.......................................................................................... 11 SSL VPN and IPv6 ................................................................................................. 11 Traveling and security............................................................................................ 11 Host check ....................................................................................................... 11 Cache cleaning ................................................................................................ 12 Basic Configuration........................................................................................ 13 User accounts and groups .................................................................................... Authentication .................................................................................................. MAC host check .............................................................................................. IP addresses for users ..................................................................................... Authentication of remote users........................................................................ Configuring SSL VPN web portals......................................................................... SSL connection configuration.......................................................................... Portal configuration.......................................................................................... Personal bookmarks ........................................................................................ Custom login screen ........................................................................................ Tunnel mode and split tunneling...................................................................... The Connection tool widget............................................................................. Configuring security policies.................................................................................. Firewall addresses ........................................................................................... Create an SSL VPN security policy.................................................................. Create a tunnel mode security policy ............................................................. Split tunnel Internet browsing policy................................................................ Enabling a connection to an IPsec VPN .......................................................... Additional configuration options ............................................................................ Routing in tunnel mode.................................................................................... Changing the port number for web portal connections .................................. SSL offloading.................................................................................................. Customizing the web portal login page .......................................................... Host check ....................................................................................................... Creating a custom host check list ................................................................... Windows OS check.......................................................................................... Configuring cache cleaning ............................................................................. Configuring virtual desktop.............................................................................. Configuring client OS Check............................................................................ Adding WINS and DNS services for clients ..................................................... Setting the idle timeout setting ....................................................................... SSL VPN logs................................................................................................... Monitoring active SSL VPN sessions............................................................... Troubleshooting ..................................................................................................... 35 The SSL VPN client......................................................................................... 37 FortiClient............................................................................................................... 37 Tunnel mode client configuration .......................................................................... 38 Setup examples .............................................................................................. 39 Secure internet browsing....................................................................................... Creating an SSL VPN IP pool and SSL VPN web portal.................................. Creating the SSL VPN user and user group .................................................... Creating a static route for the remote SSL VPN user ...................................... Creating security policies................................................................................. Results ............................................................................................................. Split Tunnel ............................................................................................................ 41 Creating a firewall address for the head office server ..................................... 42 Results ............................................................................................................. 44 Multiple user groups with different access permissions example ......................... General configuration steps............................................................................. Creating the firewall addresses........................................................................ Creating the web portals.................................................................................. Creating the user accounts and user groups .................................................. Creating the security policies........................................................................... Create the static route to tunnel mode clients................................................. Index ................................................................................................................ 51 Change Description Minor edit - setting web portal tunnel-mode IP pools. Added RFCs 2246, 4346, 5246, 6101, and 6176 for SSL and TLS support. New FortiOS 5.0 release. Fortinet Technologies Inc. FortiOS Handbook Handbook v5.0What’s New for FortiOS 5.0 Chapter 1 SSL VPN for FortiOS 5.0 • Introduction to SSL VPN provides useful general information about VPN and SSL, how the FortiGate unit implements them, and gives guidance on how to choose between SSL and IPsec. • Basic Configuration explains how to configure the FortiGate unit and the web portal. Along with these configuration details, this chapter also explains how to grant unique access permissions, configure the SSL virtual interface (ssl.root), and describes the SSL VPN OS Patch Check feature that allows a client with a specific OS patch to access SSL VPN • The SSL VPN client provides an overview of the FortiClient software required for tunnel mode, where to obtain the software, install it and the configuration information required for remote users to connect to the internal network. • Setup examples explores several configuration scenarios with step-by-step instructions. While the information provided is enough to set up the described SSL VPN configurations, these scenarios are not the only possible SSL VPN setups. Introduction to SSL VPN Over the past several years, as organizations have grown and become more complex, secure remote access to network resources has become critical for day-to-day operations. In addition, businesses are expected to provide clients with efficient, convenient services including knowledge bases and customer portals. Employees travelling across the country or around the world require timely and comprehensive access to network resources. As a result of the growing need for providing remote/mobile clients with easy, cost-effective and secure access to a multitude of resources, the concept of a Virtual Private Network was developed. SSL VPNs establish connectivity using SSL, which functions at Levels 4 - 5 (Transport and Session). Information is encapsulated at Levels 6 - 7 (Presentation and Application), and SSL VPNs communicate at the highest levels in the OSI model. SSL is not strictly a Virtual Private Network (VPN) technology allows clients to connect to remote networks in a secure way. A VPN is a secure logical network created from physically separate networks. VPNs use encryption and other security methods to ensure that only authorized users can access the network. VPNs also ensure that the data transmitted between computers cannot be intercepted by unauthorized users. When data is encoded and transmitted over the Internet, the data is said to be sent through a “VPN tunnel”. A VPN tunnel is a non-application oriented tunnel that allows the users and networks to exchange a wide range of traffic regardless of application or protocol. The advantages of a VPN over an actual physical private network are two-fold. Rather than utilizing expensive leased lines or other infrastructure, you use the relatively inexpensive, high-bandwidth Internet. Perhaps more important though is the universal availability of the Internet - in most areas, access to the Internet is readily obtainable without any special arrangements or long wait times. SSL (Secure Sockets Layer) as HTTPS is supported by most web browsers for exchanging sensitive information securely between a web server and a client. SSL establishes an encrypted link, ensuring that all data passed between the web server and the browser remains private and secure. SSL protection is initiated automatically when a user (client) connects to a web server that is SSL-enabled. Once the successful connection is established, the browser encrypts all the information before it leaves the computer. When the information reaches its destination, it is decrypted using a secret (private) key. Any data sent back is first encrypted, and is decrypted when it reaches the client. FortiOS supports the SSL and TLS versions defined below. SSL 2.0 Table 1. SSL and TLS version support table. SSL VPN modes of operation When a remote client connects to the FortiGate unit, the FortiGate unit authenticates the user based on user name, password, and authentication domain. A successful login determines the access rights of remote users according to user group. The user group settings specify whether the connection will operate in web-only mode or tunnel mode. Web-only mode Web-only mode provides remote users with a fast and efficient way to access server applications from any thin client computer equipped with a web browser. Web-only mode offers true clientless network access using any web browser that has built-in SSL encryption and the Sun Java runtime environment. Support for SSL VPN web-only mode is built into the FortiOS operating system. The feature comprises of an SSL daemon running on the FortiGate unit, and a web portal, which provides users with access to network services and resources including HTTP/HTTPS, telnet, FTP, SMB/CIFS, VNC, RDP and SSH. In web-only mode, the FortiGate unit acts as a secure HTTP/HTTPS gateway and authenticates remote users as members of a user group. After successful authentication, the FortiGate unit redirects the web browser to the web portal home page and the user can access the server applications behind the FortiGate unit. When the FortiGate unit provides services in web-only mode, a secure connection between the remote client and the FortiGate unit is established through the SSL VPN security in the FortiGate unit and the SSL security in the web browser. After the connection has been established, the FortiGate unit provides access to selected services and network resources through a web portal. FortiGate SSL VPN web portals have a 1- or 2-column page layout and portal functionality is provided through small applets called widgets. Widget windows can be moved or minimized. The controls within each widget depend on its function. There are predefined web portals and the administrator can create additional portals. Configuring the FortiGate unit involves selecting the appropriate web portal configuration in the user group settings. These configuration settings determine which server applications can be accessed. SSL encryption is used to ensure traffic confidentiality. For information about client operating system and browser requirements, see the Release Notes for your FortiGate firmware. Tunnel mode offers remote users the freedom to connect to the internal network using the traditional means of web-based access from laptop computers, as well as from airport kiosks, hotel business centers, and Internet cafés. If the applications on the client computers used by your user community vary greatly, you can deploy a dedicated SSL VPN client to any remote client through its web browser. The SSL VPN client encrypts all traffic from the remote client computer and sends it to the FortiGate unit through an SSL VPN tunnel over the HTTPS link between the web browser and the FortiGate unit. Another option is split tunneling, which ensures that only the traffic for the private network is sent to the SSL VPN gateway. Internet traffic is sent through the usual unencrypted route. This conserves bandwidth and alleviates bottlenecks. In tunnel mode, remote clients connect to the FortiGate unit and the web portal login page using Microsoft Internet Explorer, Firefox, Chrome, Mac OS, or Linux. The FortiGate unit acts as a secure HTTP/HTTPS gateway and authenticates remote users as members of a user group. After successful authentication, the FortiGate unit redirects the web browser to the web portal home page dictated by the user group authentication settings. If the user does not have the SSL VPN client installed, they will be prompted to download the SSL VPN client (an ActiveX or Java plugin) and install it using controls provided through the web portal. SSL VPN tunnel mode can also be initiated from a standalone application on Windows, Mac OS, and Linux. When the user initiates a VPN connection with the FortiGate unit through the SSL VPN client, the FortiGate unit establishes a tunnel with the client and assigns the client a virtual IP address from a range of reserved addresses. The client uses the assigned IP address as its source address for the duration of the connection. After the tunnel has been established, the user can access the network behind the FortiGate unit. Configuring the FortiGate unit to establish a tunnel with remote clients involves enabling the feature through SSL VPN configuration settings and selecting the appropriate web portal configuration for tunnel-mode access in the user group settings. The security policy and protection profiles on the FortiGate unit ensure that inbound traffic is screened and processed securely. The user account used to install the SSL VPN client on the remote computer must have administrator privileges. If you are using Windows Vista, you must disable UAC (User Account Control) before installing the SSL VPN tunnel client. This UAC setting must be disabled before the SSL VPN tunnel client is installed. IE7 in Windows Vista runs in Protected Mode by default. To install SSL VPN client ActiveX, you need to launch IE7 by using 'Run as administrator' (right-click the IE7 icon and select 'Run as administrator'). For information about client operating system requirements, see the Release Notes for your FortiGate firmware. For information on configuring tunnel mode, see “Tunnel mode and split tunneling” on page 21. Port forwarding mode While tunnel mode provides a Layer 3 tunnel that users can run any application over it, the user needs to install the tunnel client, and have the required administrative rights to do so. In some situations, this may not be desirable, yet the simple web mode does not provide enough flexibility for application support. For example, using an email client that needs to communicate with a POP3 server. The port forward mode, or proxy mode, provides this middle ground between web mode and tunnel mode. SSL VPN port forwarding listens on local ports on the user’s computer. When it receives data from a client application, the port forward module encrypts and sends the data to the FortiGate unit, which then forwards the traffic to the application server. The port forward module is implemented with a Java applet, which is downloaded and runs on the user’s computer. The applet provides the up-to-date status information such as addressing and bytes sent and received. On the user end, the user logs into the FortiGate SSL VPN portal, and selects a port forward bookmark configured for a specific application. The bookmark defines the server address and port as well as which port to listen to on the user’s computer. The user must configure the application on the PC to point to the local proxy instead of the application server. For information on this configuration change, see the application This mode only supports client/server applications that are using a static TCP port. It will not support client/server applications using dynamic ports or traffic over UDP. For information on configuring a port forward tunnel, see “Port forward tunnel” on page 21. With Citrix application servers, the server downloads an ICA configuration file to the user’s PC. The client application uses this information to connect to the Citrix server. The FortiGate unit will read this file and append a SOCKS entry to set the SOCKS proxy to localhost. The Citrix client will then be able to connect to the SSL VPN port forward module to provide the connection. When configuring the port forwarding module, an selection is available for Citrix servers. For Windows Remote Desktop Connections, when selecting the RDP option, the tunnel will launch the RDP client and connect to the local loopback address after the port forward module has been initiated. SSL VPN and IPv6 FortiOS supports SSL VPN using IPv6 addressing using IPv6 configurations for security policies and addressing including: • Policy matching for IPv6 addresses • Support for DNS resolving in SSL VPN • Support IPv6 for ping • FTP applications • SMB • Support IPV6 for all the java applets (Telnet, VNC, RDP and so on) Traveling and security Because SSL VPN provides a means for “on-the-go” users to dial in to the network while away from the office, you need to ensure that wherever and however they choose to dial in is secure, and not potentially compromising the corporate network. When setting up the portal, you can include two options to ensure corporate data is safe; a host check for antivirus software, and a cache cleaner. Host check You can enable a host integrity checker to scan the remote client. The integrity checker probes the remote client computer to verify that it is safe before access is granted. Security attributes recorded on the client computer (for example, in the Windows registry, in specific files, or held in memory due to running processes) are examined and uploaded to the FortiGate unit. For more information, see “Host check” on page 30. Cache cleaning You can enable a cache cleaner to remove any sensitive data that would otherwise remain on the remote computer after the session ends. For example, all cache entries, browser history, cookies, encrypted information related to user authentication, and any temporary data generated during the session are removed from the remote computer. If the client’s browser cannot install and run the cache cleaner, the user is not allowed to access the SSL-VPN portal. For more information, see “Configuring cache cleaning” on page 32. Configuring SSL VPN involves a number of configurations within FortiOS that you need to complete to make it all come together. This chapter describes the components required, and how and where to configure them to set up the FortiGate unit as an SSL VPN server. The configurations and steps are high level, to show you the procedures needed, and where in FortiOS they are located. For real-world examples, see the chapter, “Setup examples” on page 39. There are three or four key steps to configuring an SSL VPN tunnel. The first three in the points below are mandatory, while the other is optional. This chapter will outline these four key steps, as well as additional configuration you can do for tighter security and monitoring. The key steps are: • Create user accounts and user groups for the remote clients. (“User accounts and groups” on page 13) • Create a web portal to define user access to network resources. (“Configuring SSL VPN web portals” on page 17) • Configure the security policies. (“Configuring security policies” on page 22) • For tunnel-mode operation, add routing to ensure that client tunnel-mode packets reach the SSL VPN interface. (“Routing in tunnel mode” on page 29) • Setup logging of SSL VPN activities. (“SSL VPN logs” on page 34) User accounts and groups The first step for an SSL VPN tunnel is to add the users and user groups that will access the tunnel. You may already have users defined for other authentication-based security policies. These users and groups are identified when creating the security policy when defining the authentication rules. The user group is associated with the web portal that the user sees after logging in. You can use one policy for multiple groups, or multiple policies to handle differences between the groups such as access to different services, or different schedules. To create a user account • in the web-based manager, go to User & Device > User > User Definition, and select Create • in the CLI, use the commands in config user local. All users accessing the SSL tunnel must be in a firewall user group. User names can be up to 64 characters long. To create user groups • in the web-based manager, go to User & Device > User > User Groups and select Create • in the CLI, use the commands in config user group. Remote users must be authenticated before they can request services and/or access network resources through the web portal. The authentication process can use a password defined on the FortiGate unit or optionally use established external authentication mechanisms such as RADIUS or LDAP. To authenticate users, you can use a plain text password on the FortiGate unit (Local domain), forward authentication requests to an external RADIUS, LDAP or TACACS+ server, or utilize PKI certificates. For information about how to create RADIUS, LDAP, TACACS+ or PKI user accounts and certificates, see the Authentication Guide. FortiOS supports LDAP password renewal notification and updates through SSL VPN. Configuration is enabled using the CLI commands: config user ldap edit <username> set password-expiry-warning enable set password-renewal enable For more information, see the Authentication Guide. MAC host check When a remote client attempts to log in to the portal, you can have the FortiGate unit check against the client’s MAC address to ensure that only a specific computer or device is connecting to the tunnel. This can ensure better security should a password be compromised. MAC addresses can be tied to specific portals and can be either the entire MAC address or a subset of it. MAC host checking is configured in the CLI using the commands: conf vpn ssl web portal edit portal set mac-addr-check enable set mac-addr-action allow config mac-addr-check-rule edit "rule1" set mac-addr-list 01:01:01:01:01:01 08:00:27:d4:06:5d set mac-addr-mask 48 IP addresses for users After the FortiGate unit authenticates a request for a tunnel-mode connection, the FortiGate unit assigns the SSL VPN client an IP address for the session. The address is assigned from an address range (IP Pool) which is a firewall address that defines an IP address range. Take care to prevent overlapping IP addresses. Do not assign to clients any IP addresses that are already in use on the private network. As a precaution, consider assigning IP addresses from a network that is not commonly used (for example, 10.254.254.0/24). To set tunnel-mode client IP address range - web-based manager 1. Go to Firewall Objects > Address > Addresses and select Create New. 2. Enter an Name, for example, SSL_VPN_tunnel_range. 3. Select a Type of IP Range. 4. In the Subnet/IP Range field, enter the starting and ending IP addresses that you want to assign to SSL VPN clients, for example 10.254.254.[80-100]. 5. In Interface, select Any. 6. Select OK. To set tunnel-mode client IP address range - CLI If your SSL VPN tunnel range is for example 10.254.254.80 - 10.254.254.100, you could enter config firewall address edit SSL_tunnel_users set type iprange set end-ip 10.254.254.100 set start-ip 10.254.254.80 You can select the tunnel-mode IP Pools in two places: • The VPN > SSL > Config page IP Pools setting applies to all web portals that do not specify their own IP Pools. • The web portal Tunnel Mode widget IP Pools setting, if used, applies only to the web portal and overrides the setting in VPN > SSL > Config. See “Tunnel mode and split tunneling” on Authentication of remote users When remote users connect to the SSL VPN tunnel, they must perform authentication before being able to use the internal network resources. This can be as simple as assigning users with their own passwords, connecting to an LDAP server or using more secure options. FortiOS provides a number of options for authentication as well as security option for those connected The web portal can include bookmarks to connect to internal network resources. A web (HTTP/HTTPS) bookmark can include login credentials so that the FortiGate unit automatically logs the user into the web site. This means that the user logs into the SSL VPN and then does not have to enter any more credentials to visit preconfigured web sites. Both the administrator and the end user can configure bookmarks, including SSO bookmarks. To add bookmarks as a web portal user, see “Adding bookmarks” on page 67. Setting the client authentication timeout The client authentication timeout controls how long an authenticated user will remain connected. When this time expires, the system forces the remote client to authenticate again. As with the idle timeout, a shorter period of time is more secure. The default value is 28800 seconds (8 hours). You can only modify this timeout value in the CLI. For example, to change the authentication timeout to 18 000 seconds, enter the following config vpn ssl settings set auth-timeout 18000 You can also set the idle timeout for the client, to define how long the user does not access the remote resources before they are logged out. For information see “SSL connection configuration” on page 18. Allow one time login per user You can set the SSL VPN tunnel such that each user can only log into the tunnel one time concurrently per user per login. That is, once logged into the portal, they cannot go to another system and log in with the same credentials again. To do this, go to VPN > SSL > Portal and select to disable Allow Multiple Concurrent Sessions for Each User. It is enabled by default. To configure in the CLI, enter the commands: config vpn ssl web portal edit <portal_name> set limit-user-logins enable Once set, once the user has logged in, no other user can use the same login credentials. Strong authentication with security certificates The FortiGate unit supports strong (two-factor) authentication through X.509 security certificates (version 1 or 3). The FortiGate unit can require clients to authenticate using a certificate. Similarly, the client can require the FortiGate unit to authenticate using a certificate. For information about obtaining and installing certificates, see the Authentication Guide. You can select the Require Client Certificate option in SSL VPN config so that clients must authenticate using certificates. The client browser must have a local certificate installed, and the FortiGate unit must have the corresponding CA certificate installed. When the remote client initiates a connection, the FortiGate unit prompts the client browser for its client-side certificate as part of the authentication process. To require client authentication by security certificates - web-based manager 1. Go to VPN > SSL > Config. 2. Select Require Client Certificate. 3. Select Apply. To require client authentication by security certificates - CLI set reqclientcert enable If your SSL VPN clients require strong authentication, the FortiGate unit must offer a CA certificate that the client browser has installed. In the FortiGate unit SSL VPN settings, you can select which certificate the FortiGate offers to authenticate itself. By default, the FortiGate unit offers its factory installed (self-signed) certificate from Fortinet to remote clients when they connect. To enable FortiGate unit authentication by certificate - web-based manager 2. From the Server Certificate list, select the certificate that the FortiGate unit uses to identify itself to SSL VPN clients. To enable FortiGate unit authentication by certificate - CLI For example, to use the example_cert certificate set servercert example_cert FortiOS will check the server certificate to verify that the certificate is valid. Only valid server certificates should be used. NSA Suite B cryptography support FortiOS supports the use of ECDSA Local Certificates for SSL VPN Suite B. The National Security Agency (NSA) developed Suite B algorithms in 2005 to serve as a cryptographic base for both classified and unclassified information at an interoperable level. FortiOS allows you to import, generate, and use ECDSA certificates defined by the Suite B cryptography set. To generate ECDSA certificates, use the following command in the CLI: exec vpn certificate local generate ec Configuring SSL VPN web portals The SSL VPN portal enables remote users to access internal network resources through a secure channel using a web browser. FortiGate administrators can configure log in privileges for system users and which network resources are available to the users. This step in the configuration of the SSL VPN tunnel sets up the infrastructure; the addressing, encryption, and certificates needed to make the initial connection to the FortiGate unit. This step also is where you set up what the remote user sees when the connection is successful. The portal view defines what resources are available to the remote users and what functionality they have on the network. SSL connection configuration To configure the basic SSL VPN settings for encryption and log in options, go to VPN > SSL > Config. IP Pools Select Edit to select the range or subnet firewall addresses that represent IP address ranges reserved for tunnel-mode SSL VPN clients. Server Certificate Select the signed server certificate to use for authentication. If you leave the default setting (Self-Signed), the FortiGate unit offers its factory installed certificate from Fortinet, to remote clients when they connect. Require Client Select to use group certificates for authenticating remote clients. When the remote client initiates a connection, the FortiGate unit prompts the client for its client-side certificate as part of the authentication process. For information on using PKI to provide client certificate authentication, see the Authentication Guide. Encryption Key Select the algorithm for creating a secure SSL connection between the remote client web browser and the FortiGate unit. This will depend on what the web browser of the client can support. The FortiGate unit supports a range of cryptographic cipher suites to match the capabilities of various web browsers. The web browser and the FortiGate unit negotiate a cipher suite before any information is transmitted over the SSL link. Idle Timeout Type the period of time (in seconds) that the connection can remain idle before the user must log in again. The range is from 10 to 28800 seconds. Setting the value to 0 will disable the idle connection timeout. This setting applies to the SSL VPN session. The interface does not time out when web application sessions or tunnels are up. You can also set the authentication timeout for the client, to define how long the user can remain connected to the network. For information see “Setting the client authentication timeout” on page 15. Login Port Enter the port number for HTTPS access. Enable Endpoint Select so that FortiClient registers with the FortiGate unit when connecting. If you configured a registration key by going to System > Config > Advanced, the remote user is prompted to enter the key. This only occurs on the first connection to the FortiGate unit. Advanced (DNS and Enter up to two DNS servers and/or two WINS servers to be provided WINS Servers) for the use of clients. Portal configuration The portal configuration determines what the remote user sees when they log in to the portal. Both the system administrator and the user have the ability to customize the SSL VPN portal. To view the portals settings page, go to VPN > SSL > Portal. There are three pre-defined default web portal configurations available: • full-access • tunnel-access • web-access Each web portal type include similar configuration options. Select between the different portals by selecting one from the drop-down list in the upper right corner of the window. You can also create a custom portal by selecting the plus sign next to the portal drop-down list. The name for the portal Portal Message This is a text header that appears on the top of the web portal. A color styling for the web portal. Select one or two column layouts for the widgets that appear on the web portal page. Enable Tunnel Mode If your web portal provides tunnel mode access, you need to configure the Tunnel Mode widget. These settings determine how tunnel mode clients are assigned IP addresses. Enable Split Tunneling Select so that the VPN carries only the traffic for the networks behind the FortiGate unit. The user’s other traffic follows its normal route. Select an IP Pool for users to acquire an IP address when connecting to the portal. There is always a default pool available if you do not create your own. Client Options These options affect how the FortiClient application behaves when connected to the FortiGate VPN tunnel. When enabled, a check box for the corresponding option appears on the VPN login screen in FortiClient, and is not enabled by default. Save Password - When enabled, if the user selects this option, their password is stored on the user’s computer and will automatically populate each time they connect to the VPN. Auto Connect - When enabled, if the user selects this option, when the FortiClient application is launched, for example after a reboot or system startup, FortiClient will automatically attempt to connect to the VPN tunnel. Always Up (Keep Alive) - When enabled, if the user selects this option, the FortiClient connection will not shut down. When not selected, during periods of inactivity, FortiClient will attempt to stay connected every three minutes for a maximum of 10 minutes. Enable Web Mode Select to enable web mode access. Select the applications the user can access when connected over the VPN portal. Include Session Info Select to display the Session Information widget on the portal page. The Session Information widget displays the login name of the user, the amount of time the user has been logged in and the inbound and outbound traffic statistics. Include Connection Tool Select to display the Connection Tool widget on the portal page. Use the Connection Tool widget to connect to a internal network resource without adding a bookmark to the bookmark list. You select the type of resource and specify the URL or IP address of the host computer. Include Bookmarks Select to include bookmarks on the web portal. Bookmarks are used as links to internal network resources. When a bookmark is selected from a bookmark list, a pop-up window appears with the web page. Telnet, VNC, and RDP require a browser plug-in. FTP and Samba replace the bookmarks page with an HTML file-browser. Prompt Mobile Users to If a remote user is using web browser to connects to the SSL Download FortiClient App VPN in web mode they are prompted to download the FortiClient Application. The remote user can accept or reject the notification. If the user accepts, they are redirected to the FortiClient web site. Allow Multiple Concurrent You can set the SSL VPN tunnel such that each user can only log Sessions for Each User into the tunnel one time concurrently per user per login. That is, once logged into the portal, they cannot go to another system and log in with the same credentials again. To prevent multiple logins, clear the check box. Adding bookmarks A web bookmark can include login credentials to automatically log the SSL VPN user into the web site. When the administrator configures bookmarks, the web site credentials must be the same as the user’s SSL VPN credentials. Users configuring their own bookmarks can specify alternative credentials for the web site. To add a bookmark 1. On the VPN > SSL > Portal page, ensure Include Bookmarks is enabled. 2. Select Create New and enter the following information: Select a category, or group, to include the bookmark. If this is the first bookmark added, you will be prompted to add a category. Otherwise, select Create from the drop-down list. Enter a name for the bookmark. Select the type of link from the drop-down list. Telnet, VNC, and RDP require a browser plug-in. FTP and Samba replace the bookmarks page with an HTML file-browser. Enter the IP address source. Select if you wish to use single sign-on for any links that require When including a link using SSO, ensure to use the entire url. For example, http://10.10.1.0/login, rather than just the IP address. Enter a brief description of the link. For more configuration options, see “Additional configuration options” on page 28. Personal bookmarks The administrator has be ability to view bookmarks the remote client has added to their SSL VPN login in the bookmarks widget. This enables the administrator to monitor and, if needed, remove unwanted bookmarks that do not meet with corporate policy. To view and maintain remote client bookmarks, go to VPN > SSL > Personal Bookmarks. On mid-range and high end FortiGate units, this feature is enabled by default. On low-end FortiGate units, it must be enabled. To enable personal bookmarks 1. Go to System > Admin > Settings. 2. In the Display Options on GUI section, select SSPVPN Personal Bookmark Management. Custom login screen You can create a custom log in for your remote SSL VPN users. When configured with a security policy, when the user connects to the SSL VPN portal, a custom log in screen appears. With this screen, you can define the address, customize the look and define how many users are can connect at any one time to the portal. To configure the login screen, go to VPN > SSL > Custom, and selecting Create New. When adding the URL Path, you only need to enter the subdirectory or site. The FortiGate unit will complete the remainder of the address. For example, if the sub site is corpusers, only enter corpusers. The final URL that appears is http://172.20.120.230/corpusers. The login port is separately configured by going to VPN > SSL > Config. When configuring with the security policy, when you create SSL VPN Authentication Rules, you can select the specific portal login screen. Tunnel mode and split tunneling If you want your web portal to have tunnel mode access, select Tunnel Mode when creating a new portal. Enable Split Tunneling so that the VPN carries only the traffic for the networks behind the FortiGate unit. The user’s other traffic follows its normal route. Port forward tunnel Port forwarding provides a method of connecting to application servers without configuring a tunnel mode connection, and requiring the installation of tunnel mode client. Set up the portal as described at “Configuring SSL VPN web portals” on page 17. To configure the application, create a bookmark with the Type of PortForward. Ensure that Port Forward is enabled in the Applications list. The Connection tool widget The Connection Tool widget enables a user to connect to resources when isn’t a bookmark. Ensure that what you want remote users to connect to is enabled in the Applications list of the General settings, by selecting the Settings button in the portal configuration window. To configure the Connection Tool widget - CLI To change, for example, the full-access portal Connection Tool widget to allow all application types except Telnet, you would enter: edit full-access config widget set allow-apps ftp rdp smb ssh vnc web Configuring security policies You will need at least one SSL VPN security policy. This is an identity-based policy that authenticates users and enables them to access the SSL VPN web portal. The SSL VPN user groups named in the policy determine who can authenticate and which web portal they will use. From the web portal, users can access protected resources or download the SSL VPN tunnel client application. This section contains the procedures needed to configure security policies for web-only mode operation and tunnel-mode operation. These procedures assume that you have already completed the procedures outlined in “User accounts and groups” on page 13. If you will provide tunnel mode access, you will need a second security policy — an ACCEPT tunnel mode policy to permit traffic to flow between the SSL VPN tunnel and the protected Firewall addresses Before you can create security policies, you need to define the firewall addresses you will use in those policies. For both web-only and tunnel mode operation, you need to create firewall addresses for all of the destination networks and servers to which the SSL VPN client will be able to connect. For tunnel mode, you will already have defined firewall addresses for the IP address ranges that the FortiGate unit will assign to SSL VPN clients. The source address for your SSL VPN security policies will be the predefined “all” address. Both the address and the netmask are 0.0.0.0. The “all” address is used because VPN clients will be connecting from various addresses, not just one or two known networks. For improved security, if clients will be connecting from one or two known locations you should configure firewall addresses for those locations, instead of using the “all” address. To create a firewall address, in the web-based manager, go to Firewall Objects > Address > Address, and select Create New. Create an SSL VPN security policy At minimum, you need one SSL VPN security policy to authenticate users and provide access to the protected networks. You will need additional security policies only if you have multiple web portals that provide access to different resources. You can use one policy for multiple groups, or multiple policies to handle differences between the groups such as access to different services, or different schedules. The SSL VPN security policy specifies: • the remote address that corresponds to the IP address of the remote user. • the local protected subnet address that corresponds to the IP address or addresses that remote clients need to access. The local protected subnet address may correspond to an entire private network, a range of private IP addresses, or the private IP address of a server or host. • the level of SSL encryption to use and the authentication method. • which SSL VPN user groups can use the security policy. • the times (schedule) and types of services that users can access. • the UTM features and logging that are applied to the connection. Do not use ALL as the destination address. If you do, you will see the “Destination address of Split Tunneling policy is invalid” error when you enable Split Tunneling To create an SSL-VPN security policy - web-based manager 1. Go to Policy > Policy > Policy and select Create New. 2. Select the Policy Type as VPN and the Policy Subtype as SSL-VPN. 3. Enter the following information: Incoming Interface Select the name of the FortiGate network interface to that connects to the Internet. Remote Address Select all. Local Interface Select the FortiGate network interface that connects to the protected network. Local Protected Subnet Select the firewall address you created that represents the networks and servers to which the SSL VPN clients will If you want to associate multiple firewall addresses or address groups with the Destination Interface/Zone, from Destination Address, select the plus symbol. In the dialog box, move the firewall addresses or address groups from the Available Addresses section to the Members section, then select OK. SSL Client Certificate Select to allow access only to holders of a (shared) group certificate. The holders of the group certificate must be members of an SSL VPN user group, and the name of that user group must be present in the Allowed field. See “Strong authentication with security certificates” on page 16. Cipher Strength Select the bit level of SSL encryption. The web browser on the remote client must be capable of matching the level that you select. 4. Under Configure SSL-VPN Authentication Rules, select Create New. Add a user group to the policy. The New SSL VPN Authentication Rule window opens on top of the security policy. Enter the following information and then select OK. You can select Add again to add more groups. Select user groups that can connect to the SSL VPN tunnel. User(s) Select individual users that can connect to the SSL VPN tunnel. Select always. Select service in the left list and use the right arrow button to move them to the right list. Select the ALL service to allow the user group access to all services. SSL-VPN Portal Select the portal the users connect to. Custom Login Select to choose a configured login screen. For more information, see “Custom login screen” on page 21. Your identity-based policies are listed in the security policy table. The FortiGate unit searches the table from the top down to find a policy to match the client’s user group. Using the move icon in each row, you can change the order of the policies in the table to ensure the best policy will be matched first. You can also use the icons to edit or delete policies. To create an SSL VPN security policy - CLI To create the security policy by entering the following CLI commands. config firewall policy set srcintf port1 set dstintf port2 set srcaddr all set dstaddr OfficeLAN set action ssl-vpn set nat enable config identity-based-policy set groups SSL-VPN set schedule always set service ALL set sslvpn-poprtal <portal_name> Create a tunnel mode security policy If your SSL VPN will provide tunnel mode operation, you need to create a security policy to enable traffic to pass between the SSL VPN virtual interface and the protected networks. This is in addition to the SSL VPN security policy that you created in the preceding section. The SSL VPN virtual interface is the FortiGate unit end of the SSL tunnel that connects to the remote client. It is named ssl.<vdom_name>. In the root VDOM, for example, it is named ssl.root. If VDOMs are not enabled on your FortiGate unit, the SSL VPN virtual interface is also named ssl.root. To configure the tunnel mode security policy - web-based manager 1. Go to Policy > Policy> Policy and select Create New. 2. Leave the Policy Type as Firewall and leave the Policy Subtype as Address. 3. Enter the following information and select OK. Select the virtual SSL VPN interface, such as ssl.root. Source Address Select the firewall address you created that represents the IP address range assigned to SSL VPN clients, such as SSL_VPN_tunnel_users. Outgoing Interface Select the interface that connects to the protected network. Select the firewall address that represents the networks and servers the SSL VPN clients will connect to. To select multiple firewall addresses or address groups, select the plus sign next to the drop-down list. Select Accept. Enable NAT Select Enable. To configure the tunnel mode security policy - CLI edit <id> set srcintf ssl.root set dstintf <dst_interface_name> set srcaddr <tunnel_ip_address> set dstaddr <protected_network_address_name> This policy enables the SSL VPN client to initiate communication with hosts on the protected network. If you want to enable hosts on the protected network to initiate communication with the SSL VPN client, you should create another Accept policy like the preceding one but with the source and destination settings reversed. You must also add a static route for tunnel mode operation. Routing for tunnel mode If you your SSL VPN operates in tunnel mode, you must add a static route so that replies from the protected network can reach the remote SSL VPN client. To add the tunnel mode route - web-based manager 1. Go to Router > Static > Static Routes and select Create New. For low-end FortiGate units, go to System > Network > Routing and select Create New. 2. Enter the Destination IP/Mask of the tunnel IP address that you assigned to the users of the web portal. 3. Select the SSL VPN virtual interface for the Device. To add the tunnel mode route - CLI If you assigned 10.11.254.0/24 as the tunnel IP range, you would enter: config router static set device ssl.root set dst 10.11.254.0/24 set gateway <gateway_IP> Split tunnel Internet browsing policy With split tunneling disabled, all of the SSL VPN client’s requests are sent through the SSL VPN tunnel. But the tunnel mode security policy provides access only to the protected networks behind the FortiGate unit. Clients will receive no response if they attempt to access Internet resources. You can enable clients to connect to the Internet through the FortiGate unit. To add an Internet browsing policy Select the virtual SSL VPN interface, ssl.root, for example. address range assigned to SSL VPN clients. To configure the Internet browsing security policy - CLI To enable browsing the Internet through port1, you would enter: set srcaddr SSL_tunne_users set dstaddr all Enabling a connection to an IPsec VPN You might want to provide your SSL VPN clients access to another network, such as a branch office, that is connected by an IPsec VPN. To do this, you need only to add the appropriate security policy. For information about route-based and policy-based IPsec VPNs, see the IPsec VPN Guide. Route-based connection To configure interconnection with a route-based IPsec VPN - web-based manager Incoming Interface Select the virtual SSL VPN interface, ssl.root, for example. Select the firewall address that represents the IP address range assigned to SSL VPN clients. Select the virtual IPsec interface for your IPsec VPN. Destination Address Select the address of the IPsec VPN remote protected subnet. Enable. To configure interconnection with a route-based IPsec VPN - CLI If, for example, you want to enable SSL VPN users to connect to the private network (address name OfficeAnet) through the toOfficeA IPsec VPN, you would enter: set dstintf toOfficeA set srcaddr SSL_tunnel_users set dstaddr OfficeAnet set action accept Policy-based connection To configure interconnection with a policy-based IPsec VPN - web-based manager 2. Select the Policy Type as VPN and leave the Policy Subtype as IPsec. Select the firewall address that represents the IP address range assigned to SSL VPN clients. Outgoing VPN Interface Remote Protected Subnet Select the address of the IPsec VPN remote protected subnet. Select the Phase 1 configuration name of your IPsec VPN. Allow traffic to be initiated from the remote site NAT inbound 4. Configure inbound NAT from the CLI: set natinbound enable To configure interconnection with a policy-based IPsec VPN - CLI name OfficeAnet) through the OfficeA IPsec VPN, you would enter: set action ipsec set inbound enable set outbound enable set vpntunnel toOfficeA In this example, port1 is connected to the Internet. Additional configuration options Beyond the basics of setting up the SSL VPN, you can configure a number of other options that can help to ensure your internal network is secure and limit the possibility of attacks and viruses entering the network from an outside source. Routing in tunnel mode If are creating a SSL VPN connection in tunnel mode, you need to add a static route so that replies from the protected network can reach the remote SSL VPN client. Changing the port number for web portal connections You can specify a different TCP port number for users to access the web portal login page through the HTTPS link. By default, the port number is 443 and users can access the web portal login page using the following default URL: https://<FortiGate_IP_address>:443/remote/login where <FortiGate_IP_address> is the IP address of the FortiGate interface that accepts connections from remote users. To change the SSL VPN port - web-based manager 1. If Current VDOM appears at the bottom left of the screen, select Global from the list of VDOMs. 3. Type an unused port number in Login Port, and select Apply. To change the SSL VPN port - CLI This is a global setting. For example, to set the SSL VPN port to 10443, enter: config global config system global set sslvpn-sport 10443 SSL offloading Configuring SSL offloading that allows or denies client renegotiation, is configured in the CLI. This helps to resolve the issues that affect all SSL and TLS servers that support renegotiation, identified by the Common Vulnerabilities and Exposures system in CVE-2009-3555. The IETF is currently working on a TLS protocol change that will permanently resolve the issue. The SSL offloading renegotiation feature is considered a workaround until the IETF permanently resolves the issue. The CLI command is ssl-client-renegotiation and is found in config firewall vip command. Customizing the web portal login page The default web portal login page shows only the Name and Password fields and the Login button, centred in the web browser window. You can customize the page with your company name or other information. The login page is a form of replacement message, in HTML format. You can modify the content to display a customized message. Note that there are specific fields that must remain in the code to ensure the page appears correctly in the user’s browser. Before you begin, copy the default web portal login page text to a separate text file for safe-keeping. Afterward, if needed you can restore the text to the original version. To configure the SSL VPN login page - web-based manager 1. If you want to edit the global login page and Current VDOM appears at the bottom left of the screen, select Global from the list of VDOMs. 2. Go to System > Config > Replacement Messages. 3. Expand the SSL VPN row and select SSL VPN login page. 4. Edit the HTML text. Note the following content that must remain on the page: • The login page must contain a form with ACTION="%%SSL_ACT%%" and METHOD="%%SSL_METHOD%%" • The form must contain the %%SSL_LOGIN%% tag to provide the login form. • The form must contain the %%SSL_HIDDEN%% tag. When you enable AV, FW, or AV-FW host checking in the web portal Security Control settings, each client is checked for security software that is recognized by the Windows Security Center. As an alternative, you can create a custom host check that looks for security software selected from the Host Check list. For more information, see “Portal configuration” on page 18. The Host Check list includes default entries for many security software products. Host integrity checking is only possible with client computers running Microsoft Windows To configure host checking - CLI To configure the full-access portal to check for AV and firewall software on client Windows computers, you would enter the following: set host-check av-fw To configure the full-access portal to perform a custom host check for FortiClient Host Security AV and firewall software, you would enter the following: set host-check custom set host-check-policy FortiClient-AV FortiClient-FW Creating a custom host check list You can add your own software requirements to the host check list using the CLI. Host integrity checking is only possible with client computers running Microsoft Windows platforms. Enter the following commands: config vpn ssl web host-check-software edit <software_name> set guid <guid_value> set type <av | fw> set version <version_number> Enter the Globally Unique IDentifier (GUID) for the host check application, if known. Windows uses GUIDs to identify applications in the Windows Registry. The GUID can be found in the Windows registry in the HKEY_CLASSES_ROOT section. To get the exact versioning, in Windows right-click on the .EXE file of the application and select Properties. Select the Version tab. Windows OS check The Windows patch check enables you to define the minimum Windows version and patch level allowed when connecting to the SSL VPN portal. When the user attempts to connect to the web portal, FortiOS performs a query on the version of Windows the user has installed. If it does not match the minimum requirement, the connection is denied. The Windows patch check is configured in the CLI. The following example shows how you would add an OS check to the g1portal web portal. This OS check accepts all Windows XP users and Windows 2000 users running patch level 3. To specify the acceptable patch level, you set the latest-patch-level and the tolerance. The lowest acceptable patch level is latest-patch-level minus tolerance. In this case, latest-patch-level is 3 and tolerance is 1, so 2 is the lowest acceptable patch level. edit g1portal set os-check enable config os-check-list windows-2000 set action check-up-to-date set latest-patch-level 3 set tolerance 1 config os-check-list windows-xp set action allow Configuring cache cleaning When the SSL VPN session ends, the client browser cache may retain some information. To enhance security, cache cleaning clears this information just before the SSL VPN session ends. The cache cleaner is effective only if the session terminates normally. The cache is not cleaned if the session ends due to a malfunction, such as a power failure. To enable cache cleaning To enable cache cleaning on the full-access portal, you would enter: set cache-cleaner enable Cache cleaning requires a browser plug-in. If the user does not have the plug-in, it is automatically downloaded to the client computer. Configuring virtual desktop Available for Windows XP, Windows Vista, and Windows 7 client PCs, the virtual desktop feature completely isolates the SSL VPN session from the client computer’s desktop environment. All data is encrypted, including cached user credentials, browser history, cookies, temporary files, and user files created during the session. When the SSL VPN session ends normally, the files are deleted. If the session ends due to a malfunction, files might remain, but they are encrypted, so the information is protected. When the user starts an SSL VPN session which has virtual desktop enabled, the virtual desktop replaces the user’s normal desktop. When the virtual desktop exits, the user’s normal desktop is restored. Virtual desktop requires the Fortinet cache cleaner plug in. If the plug in is not present, it is To enable virtual desktop To enable virtual desktop on the full-access portal and apply the application control list List1, for example, you would enter: set virtual-desktop enable set virtual-desktop-app-list List1 Configuring virtual desktop application control You can control which applications users can run on their virtual desktop. To do this, you create an Application Control List of either allowed or blocked applications. When you configure the web portal, you select the list to use. Configure the application control list in the CLI. To create an Application Control List - CLI If you want to add BannedApp to List1, a list of blocked applications, you would enter: config vpn ssl web virtual-desktop-app-list edit "List1" set action block config apps edit "BannedApp" set md5s "06321103A343B04DF9283B80D1E00F6B" Configuring client OS Check The SSLVPN client OS Check feature can determine if clients are running the Windows 2000, Windows XP, Windows Vista or Windows 7 operating system. You can configure the OS Check to do any of the following: • allow the client access • allow the client access only if the operating system has been updated to a specified patch (service pack) version • deny the client access The OS Check has no effect on clients running other operating systems. To configure OS Check OS Check is configurable only in the CLI. config os-check-list {windows-2000 | windows-xp | windows-vista | windows-7} set action {allow | check-up-to-date | deny} set latest-patch-level {disable | 0 - 255} set tolerance {tolerance_num} Adding WINS and DNS services for clients You can specify the WINS or DNS servers that are made available to SSL-VPN clients. DNS servers provide the IP addresses that browsers need to access web sites. For Internet sites, you can specify the DNS server that your FortiGate unit uses. If SSL VPN users will access intranet sites using URLs, you need to provide them access to the intranet’s DNS server. You specify a primary and a secondary DNS server. A WINS server provides IP addresses for named servers in a Windows domain. If SSL VPN users will access a Windows network, you need to provide them access to the domain WINS server. You specify a primary and a secondary WINS server. To specify WINS and DNS services for clients - web-based manager 2. Select the Expand Arrow to display the Advanced section. 3. Enter the IP addresses of DNS servers in the DNS Server fields as needed. 4. Enter the IP addresses of WINS servers in the WINS Server fields as needed. To specify WINS and DNS services for clients - CLI set dns-server1 <address_ipv4> set wins-server1 <address_ipv4> Setting the idle timeout setting The idle timeout setting controls how long the connection can remain idle before the system forces the remote user to log in again. For security, keep the default value of 300 seconds (5 minutes) or less. To set the idle timeout - web-based manager 2. In the Idle Timeout field, enter the timeout value. The valid range is from 10 to 28800 seconds. To set the idle timeout - CLI set idle-timeout <seconds_int> SSL VPN logs Logging is available for SSP VPN traffic so you can monitor users connected to the FortiGate unit and their activity. For more information on configuring logs on the FortiGate unit, see the Logging and Reporting Guide. To enable logging of SSL VPN events - web-based manager 1. Go to Log&Report > Log Config > Log Settings. 2. Select Enable, and select VPN activity event. To view the SSL VPN log data, in the web-based manager, go to Log&Report > Log & Archive Access and select either the Event Log or Traffic Log. In event log entries, look for the sub-types “sslvpn-session” and “sslvpn-user”. For information about how to interpret log messages, see the FortiGate Log Message Monitoring active SSL VPN sessions You can go to User & Device > Monitor to view a list of active SSL VPN sessions. The list displays the user name of the remote user, the IP address of the remote client, and the time the connection was made. You can also see which services are being provided, and delete an active web session from the FortiGate unit. To monitor SSL VPNs - web-based manager To view the list of active SSL VPN sessions, go to VPN > SSL-VPN > Monitor. When a tunnel-mode user is connected, the Description field displays the IP address that the FortiGate unit assigned to the remote host. If required, you can end a session/connection by selecting its check box and then selecting the Delete icon. Here is a list of common SSL VPN problems and the likely solutions. No response from SSL VPN URL Check SSL VPN port assignment (default 10443). Verify the SSL VPN security policy. Error: “The web page cannot be Check URL: https://<FortiGate_IP>:<SSLVPN_port>/remot e/login Tunnel connects, but there is no Check that there is a static route to direct packets destined for the tunnel users to the SSL VPN interface. See “Routing for tunnel mode” on page 25. Tunnel-mode connection shuts down after a few seconds This issue occurs when there are multiple interfaces connected to the Internet, for example, a dual WAN configuration. Upgrade to the latest firmware then use the following CLI command: set route-source-interface enable Error: “Destination address of Split Tunneling policy is invalid.” The SSL VPN security policy uses the ALL address as its destination. Specify the address of the protected network When trying to connect using FortiClient the error message “Unable to logon to the server. Your user name or password may not be configured properly for this connection. (-12)” appears. When trying to login to the web portal, login and password are entered and login page will be sent back. Cookies must be enabled for SSL VPN to function in Web portal or with FortiClient. Access to the web portal or tunnel will fail if Internet Explorer has the privacy Internet Options set to High. If set to High, Internet Explorer will: Block cookies that do not have a compact privacy policy. Block cookies that use personally identifiable information without your explicit consent. The SSL VPN client The remote client connects to the SSL VPN tunnel in various ways, depending on the VPN • Web mode requires nothing more than a web browser. Microsoft Internet Explorer, Firefox, and Apple Safari browsers are supported. For detailed information about supported browsers see the Release Notes for your FortiOS firmware. • Tunnel mode establishes a connection to the remote protected network that any application can use. This requires FortiClient SSL VPN application that sends and receives data through the SSL VPN tunnel. If the client computer runs Microsoft Windows, they can download the tunnel mode client from the web portal Tunnel Mode widget. After installing the client, they can start and stop tunnel operation from the Tunnel Mode widget, or open the tunnel mode client as a standalone application. The tunnel mode client is available on the Start menu at All Programs > FortiClient > FortiClient SSL VPN. If the client computer runs Linux or Mac OS X, the user needs to download the tunnel mode client application from the Fortinet Support web site. See the Release Notes for your FortiOS firmware for the specific operating system versions that are supported. On Linux and Mac OS X platforms, tunnel mode operation cannot be initiated from the web portal Tunnel Mode widget. The remote user must use the standalone tunnel client application. • The virtual desktop application creates a virtual desktop on a user's PC and monitors the data read/write activity of the web browser running inside the virtual desktop. When the application starts, it presents a ‘virtual desktop’ to the user. The user starts the web browser from within the virtual desktop and connects to the SSL VPN web portal. The browser file/directory operation is redirected to a new location, and the data is encrypted before it is written to the local disk. When the virtual desktop application exits normally, all the data written to the disk is removed. If the session terminates abnormally (power loss, system failure), the data left behind is encrypted and unusable to the user. The next time you start the virtual desktop, the encrypted data is removed. Remote users can use FortiClient software to initiate an SSL VPN tunnel to connect to the internal network. FortiClient uses local port TCP 1024 to initiate an SSL encrypted connection to the FortiGate unit, on port TCP 443. When connection using FortiClient, the FortiGate unit authenticates the FortiClient SSL VPN request based on the user group options. The FortiGate unit establishes a tunnel with the client and assigns a virtual IP address to the client PC. Once the tunnel has been established, the user can access the network behind the FortiGate unit. FortiClient software is available for download at www.forticlient.com and is available for Windows, Mac OS X, Apple iOS and Android. Tunnel mode client configuration The FortiClient SSL VPN tunnel client requires basic configuration by the remote user to connect to the SSL VPN tunnel. When distributing the FortiClient software, provide the following information for the remote user to enter once the client software has been started. Once entered, they can select Connect to begin a SSL VPN session. Connection Name If you have pre-configured the connection settings, select the connection from the list and then select Connect. Otherwise, enter the settings in the fields below. Remote Gateway Enter the IP address or FQDN of the FortiGate unit that hosts the SSL VPN. Enter your user name. Use this field if the SSL VPN requires a certificate for authentication. Client Certificate Select the required certificate from the drop-down list. The certificate must be installed in the Internet Explorer certificate store. Setup examples The examples in this chapter demonstrate the basic configurations needed for common connections to the SSL VPN tunnel and portals, applying the steps outlined in the chapter “Basic Configuration” on page 13. The example included are: • Secure internet browsing • Split Tunnel • Multiple user groups with different access permissions example Secure internet browsing This example sets up an SSL VPN tunnel to provide remote users the ability to access the Internet while travelling, and ensure that they are not subjected to malware and other dangers, by using the corporate firewall to filter all of their Internet traffic. Essentially, the remote user will connect to the corporate FortiGate unit to surf the Internet. ogi 34.2 er L 12.1 U 0.2 wa .136 .ro ing ssl rows Using SSL VPN and FortiClient SSL VPN software, you create a means to use the corporate FortiGate to browse the web safely. Creating an SSL VPN IP pool and SSL VPN web portal 1. Go to VPN > SSL > Config and for IP Pools select SSLVPN_TUNNEL_ADDR1. 2. Create the SSL VPN portal to by going to VPN > SSL > Portal and selecting tunnel-access in the upper right-hand corner drop-down list box. Creating the SSL VPN user and user group Create the SSL VPN user and add the user to a user group configured for SSL VPN use. 1. Go to User & Device > User > User Definition and select Create New to add the user: twhite 3. Go to User & Device > User > User Groups and select Create New to add twhite to a group called SSL VPN: SSL Group 4. Move twhite to the Members list. Creating a static route for the remote SSL VPN user Create a static route to direct traffic destined for tunnel users to the SSL VPN tunnel. 1. Go to Router > Static > Static and select Create New to add the static route. Destination IP/Mask 10.212.134.0/255.255.255.0 ssl.root The Destination IP/Mask matches the network address of the remote SSL VPN user. Create an SSL VPN security policy with SSL VPN user authentication to allow SSL VPN traffic to enter the FortiGate unit. Create a normal security policy from ssl.root to wan1 to allow SSL VPN traffic to connect to the Internet. 3. to add the SSL VPN security policy: wan1 Local Protected Subnet all 4. Select Create New for Configure SSL-VPN Authentication Rules and add an authentication rule for the remote user: Selected User Groups tunnel-access 6. Select Create New to add a security policy that allows remote SSL VPN users to connect to 7. Leave the Policy Type as Firewall and leave the Policy Subtype as Address.: Using FortiClient SSLVPN application, log into the VPN using the address https://172.20.120.136:443/ and log in as twhite. Once connected, you can browse From the FortiGate web-based manager go to VPN > Monitor > SSL-VPN Monitor to view the list of users connected using SSL VPN. The Subsession entry indicates the split tunnel which redirects to the Internet. Split Tunnel For this example, the remote users are configured to be able to securely access head office internal network servers, and browse the Internet through the head office firewall. This will enable the remote user to use the FortiGate security to connect to the internal network and the .1 w 20 an .1 1 br l.ro ow o si t This solution describes how to configure FortiGate SSL VPN split tunnelling using the FortiClient SSL VPN software, available from the Fortinet Support site. 10 ser .2 Lo fic it of Un d te ea a H tiG SL r mo Us ffic r ad ve He Ser .168.1 Using split tunneling, all communication from remote SSL VPN users to the head office internal network and to the Internet uses an SSL VPN tunnel between the user’s PC and the head office FortiGate unit. Connections to the Internet are routed back out the head office FortiGate unit to the Internet. Replies come back into the head office FortiGate unit before being routed back through the SSL VPN tunnel to the remote user. Creating a firewall address for the head office server 1. Go to Firewall Objects > Address > Addresses and select Create New and add the head office server address: Head office server Subnet / IP Range 2. For IP Pools select SSLVPN_TUNNEL_ADDR1. 3. Create the SSL VPN portal to by going to VPN > SSL > Portal and select the plus sign in the upper right of the window. 4. Enter the following: Connect to head office server SSLVPN_TUNNEL_ADDR1 Enable Tunnel Mode Enable Create the SSL VPN user and add the user to a user group. 1. Go to User & Device > User > User Definition, select Create New and add the user: 3. Go to User & Device > User > User Groups and select Create New to add twhite to the SSL VPN user group: 1. Go to Router > Static > Static and select Create New 2. For low-end FortiGate units, go to System > Network > Routing and select Create New: 2. Select the Policy Type of VPN and the Policy Subtype as SSL-VPN. 3. Complete the following: 4. Under Configure SSL-VPN Authentication Rules select Create New to add an authentication Groups(s) Add a security policy that allows remote SSL VPN users to connect to the Internet. 6. Select Create New. 8. Complete the following and select OK: Using the FortiClient SSL VPN application on the remote PC, connect to the VPN using the address https://172.20.120.136:443/ and log in with the twhite user account. Once connected, you can connect to the head office server or browse to web sites on the Internet. From the web-based manager go to VPN > Monitor > SSL-VPN Monitor to view the list of users connected using SSL VPN. The Subsession entry indicates the split tunnel which redirects SSL VPN sessions to the Internet. Multiple user groups with different access permissions example You might need to provide access to several user groups with different access permissions. Consider the following example topology in which users on the Internet have controlled access to servers and workstations on private networks behind a FortiGate unit. Figure 1: SSL VPN configuration for different access permissions by user group 17 Por 2.2 t 1 t_1 /24 bne 1.0 Su 1.10 t_ /2 ne 1.0 ub 0 /H 1. T 1. H .1 S . N .1 S 1. T .1 S .1 am 1 rt 3 1. Po 1.20 .11 t 2 In this example configuration, there are two users: • user1 can access the servers on Subnet_1 • user2 can access the workstation PCs on Subnet_2 You could easily add more users to either user group to provide them access to the user group’s assigned web portal. General configuration steps 1. Create firewall addresses for • the destination networks • two non-overlapping tunnel IP address ranges that the FortiGate unit will assign to tunnel clients in the two user groups 2. Create two web portals. 3. Create two user accounts, user1 and user2. 4. Create two user groups. For each group, add a user as a member and select a web portal. In this example, user1 will belong to group1, which will be assigned to portal1. 5. Create security policies: • two SSL VPN security policies, one to each destination • two tunnel-mode policies to allow each group of users to reach its permitted destination 6. Create the static route to direct packets for the users to the tunnel. Creating the firewall addresses Security policies do not accept direct entry of IP addresses and address ranges. You must define firewall addresses in advance. Creating the destination addresses SSL VPN users in this example can access either Subnet_1 or Subnet_2. To define destination addresses - web-based manager 1. Go to Firewall Objects > Address > Addresses. 2. Select Create New, enter the following information, and select OK: Subnet_1 Creating the tunnel client range addresses To accommodate the two groups of users, split an otherwise unused subnet into two ranges. The tunnel client addresses must not conflict with each other or with other addresses. To define tunnel client addresses - web-based manager 1 Go to Firewall Objects > Address > Addresses. Tunnel_group1 IP Range 10.11.254.[1-50] 3. Select Create New, enter the following information, and select OK. 10.11.254.[51-100] Creating the web portals To accommodate two different sets of access permissions, you need to create two web portals, portal1 and portal2, for example. Later, you will create two SSL VPN user groups, one to assign to portal1 and the other to assign to portal2. To create the portal1 web portal 1. Go to VPN > SSL > Portal and select the plus icon in the upper right corner. 2. Enter portal1 in the Name field. 3. In Applications, select all of the application types that the users can access. 4. In IP Pools, select Tunnel_ group1. 2. Enter portal2 in the Name field and select OK. 4. In IP Pools, select Tunnel_ group2 Later, you can configure these portals with bookmarks and enable connection tool capabilities for the convenience of your users. Creating the user accounts and user groups After enabling SSL VPN and creating the web portals that you need, you need to create the user accounts and then the user groups that require SSL VPN access. Go to User & Device > User > User Definition and create user1 and user2 with password authentication. After you create the users, create the SSL VPN user groups. To create the user groups - web-based manager 1. Go to User & Device > User > User Groups. 3. From the Available list, select user1 and move it to the Members list by selecting the right arrow button. 5. Repeat steps 2 through 4 to create group2, assigned to portal2, with user2 as its only Creating the security policies You need to define security policies to permit your SSL VPN clients, web-mode or tunnel-mode, to connect to the protected networks behind the FortiGate unit. Before you create the security policies, you must define the source and destination addresses to include in the policy. See “Creating the firewall addresses” on page 45. Two types of security policy are required: • An SSL VPN policy enables clients to authenticate and permits a web-mode connection to the destination network. In this example, there are two destination networks, so there will be two SSL VPN policies. The authentication, ensures that only authorized users access the destination network. • A tunnel-mode policy is a regular ACCEPT security policy that enables traffic to flow between the SSL VPN tunnel interface and the protected network. Tunnel-mode policies are required if you want to provide tunnel-mode connections for your clients. In this example, there are two destination networks, so there will be two tunnel-mode policies. To create the SSL VPN security policies - web-based manager Local Protected Interface 4. Under Configure SSL-VPN Authentication Rules, select Create New and enter the following portal1 5. Select OK, and then select OK again. 10.Select OK, and then select OK again. To create the tunnel-mode security policies - web-based manager 3. Enter the following information, and select OK: sslvpn tunnel interface (ssl.root) Create the static route to tunnel mode clients Reply packets destined for tunnel mode clients must pass through the SSL VPN tunnel. You need to define a static route to accomplish this. To add a route to SSL VPN tunnel mode clients - web-based manager Destination IP/Mask 10.11.254.0/24 This IP address range covers both ranges that you assigned to SSL VPN tunnel-mode users. See “Creating the tunnel client range addresses” on page 46. Select the SSL VPN virtual interface, ssl.root for example. In this example, the IP Pools field on the VPN > SSL > Config page is not used because each web portal specifies its own tunnel IP address range always up 19 client certificates 18 server certificate and SSL VPN 18 timeout setting 15 auto connect 19 bookmarks, personal 21 cache cleaner 12 certificate, server 18 checking windows version 31 custom login page 30 custom login screen 21 FortiClient 39, 42 keep alive 19 save password 19 host check 30 custom software 31 introduction 11 MAC address 14 OS patch 33 idle timeout setting 34 installation on Vista 10 IP addresses, tunnel mode 14 enabling SSL VPN events 34 setting event-logging parameters 34 login page, custom 30 login screen 21 login, one time 16, 20 modes of operation port forwarding 10 tunnel mode 9 web-only mode 9 one-time login 16, 20 OS patch check 31, 33 FortiClient 19 patch check, host OS 33 personal bookmarks 21 forwarding 10 number, web-portal connections 29 remote Internet access 39 routing 29 save password, FortiClient 19 security policy, web-only mode access 22 server certificate 18 single login 16, 20 Single Sign On (SSO) 15 split tunnel 41 split tunneling 42 SSL VPN allow/deny client renegotiation 29 checking client certificates 18 event logging 34 host OS check 33 specifying server certificate 18 specifying timeout values 18 Subsession 41 Virtual Desktop 37 web portal 17 SSO (Single Sign On) 15 timeout values 18 configuring FortiGate server 24 IP address range 14 user accounts 13 user groups 13 different access permissions 44 customize login 17 customizing login page 30 setting login page port number 29 security policy for 22 windows version check 31 X.509 security certificates 16 SSL VPN for FortiOS 5.2 - Fortinet Document Library SSL VPN for FortiOS 5.6.3 - Fortinet Document Library FortiOS Handbook: SSL VPNs - Fortinet Document Library FortiGate SSL VPN Guide - Fortinet Document Library FortiOS Handbook: SSL VPNs What`s New for FortiOS 5.0 What`s New for FortiOS 5.2 - Fortinet Document Library What`s New in FortiOS 5.2.5 FortiOS v3.0 MR7 SSL VPN User Guide Authentication for FortiOS 5.6 Authentication for FortiOS 5.6.3 FortiOS™ Handbook - High Availability FortiOS 5.4 Cookbook - Fortinet Document Library FortiOS v5.2.0 (beta 4) Release Notes
cc/2021-04/en_head_0031.json.gz/line2074
__label__wiki
0.680225
0.680225
The next pillar of moral repair has to do with recognizing that whether you're an individual or you're a country, you're not going to have the future you want if you're not willing to clean up the past. That's why it's time to pay reparations for slavery and why it's time to take reparative measures towards Native Americans in this country. Both of those things represent an underlying turbulence and toxicity that this country will not be free of until we do the right thing. Sometimes people talk about random acts of kindness; but when it comes to the moral repair of this country, we need more than random acts of kindness — we need huge, strategized acts of doing the right thing. Shareable Videos - Reparations Reparations - An Idea Whose Time Has Come Reparations are a Stimulus - Marianne Williamson A Plan for Reparations - Marianne Williamson The Reparations Plan Race relations remains one of the greatest problems facing our country today. In this as with every other issue, a core principle of a Williamson presidency will be solving problems by addressing their underlying causes. America cannot have the future we would wish for ourselves, and for our children, unless we’re willing to clean up issues left over from the past. I do not believe the average American is a racist, but I believe the average American is undereducated about the history of race in America. When our history is viewed through a clear lens - historically, economically and morally - white America is seen owing a debt to the descendants of slaves. That is why I support, and have a plan for, a program of reparations to the descendants of American slaves.
cc/2021-04/en_head_0031.json.gz/line2076
__label__cc
0.578498
0.421502
Our Sweet Queen Anne Cottages Posted on June 8, 2018 June 11, 2018 by Michael Herschensohn “At First Avenue West and West Garfield Street, these Craftsman bungalows are of minor significance individually. As a group, they provide a rhythm and consistency of scale.” Steinbrueck and Nyberg No one understood better than Victor Steinbrueck and his colleague Folke Nyberg how much Seattle or Queen Anne’s historic working-class housing defined the city. The six identical working-class Craftsman bungalows they referred to in their 1975 poster still stand on West Garfield Street between the alley and First Ave. W. Four of them face north on Garfield; one sits on First Avenue W. while the sixth one backs up to it from the alley. As Steinbrueck and Nyberg suggest, the historic value of buildings often lies more in the urban patterns they create than in their individual distinctiveness. The pattern Steinbrueck and Folke captured. In 1975, Victor Steinbrueck embarked on a project with Folke Nyberg and Historic Seattle to identify and publish a series of ten posters inventorying Seattle’s outstanding historic buildings. Queen Anne was lucky to get one of them. In fact, the Queen Anne Historical Society and its volunteers, some of whom are still active today (6/2018), worked on the project. Completing their survey in the early days of the American historic preservation movement, Steinbrueck and Nyberg were hell bent on recognizing that along with the high style buildings often favored by the movement, the vernacular ones were those that really defined a neighborhood’s historic character. The poster authors understood profoundly how a sense of place can give meaning to a community like ours. As Historic Seattle notes on its website, “Each inventory includes photographs and brief descriptions of common building types, significant buildings, and urban design elements.” Steinbrueck, an architect and University of Washington professor, had already secured an important place in Seattle’s architectural history as the primary designer of the Space Needle and as the leader of the movement to save the Pike Place Market. Steinbrueck especially valued creating and protecting public spaces. For him, the Space Needle’s importance lay as much in the sexy hour-glass figure he had imagined as in the incredible visual access it gave visitors to the mountains, lakes and sound that make our city such a wonderful place to live. Steinbrueck’s ironic white male fisherman on a totem pole looking out from the Pike Place Market to Elliott Bay and the Olympic Mountains in Steinbrueck Park (posthumously named for him) makes sure we never forget the importance of Seattle’s captured landscapes. In fact, Steinbrueck’s design (with landscape architect Richard Haag) of Betty Bowen Viewpoint (see https://qahistory.org/betty-bowen/) at the western end of Highland Drive repeats the captured landscape spirit right here on Queen Anne. In the Queen Anne inventory, Steinbrueck and Nyberg noted that like many Seattle neighborhoods with great views, Queen Anne hosted many large houses for the very rich. They also took care to report a variety of buildings that characterized the different ethnic and economic groups that once lived here and acknowledged the many working-class structures that peppered Queen Anne between 1902 and our modern gentrification era. From the street, the six cottages, which you can find just west of the Gilbert apartment building on Queen Anne Avenue, are amazingly intact. The one at 1548 First West has been altered, appearing now with a second story and vinyl siding, a sad feature it shares with its neighbor on the corner. Each cottage has a recessed porch. Each cottage had two bay windows, one on the street facing façade protected by a shed roof and one under the eaves on the side away from the porch. The remodeled ones have lost theirs. Bay window Shed roof. Palladian order. Leaded glass in transom windows. The street facing bays serve as the most prominent decorative features with a three-part Palladian window capped by transom windows of leaded glass. Alternating the plan from cottage to cottage as evidenced by the location of recessed porch protected tenant privacy. Wood shingles sheathed the first stories while the gable ends sported imitation beams dividing stucco panels spread on fir lathe. In 1910, the 940 square foot cottages had five rooms and five fixtures: tub, toilet, basin, sink and a hot water tank. Initially heated by stoves, they were inside and out simple but functional modern places to which working class folks retreated after a hard day on the job. All six lookalike structures are of post and beam construction with apparently one concrete wall helping to hold them up. To be clear, that meant they stood directly on posts resting on the ground and that they had no concrete foundations. In 1910, it was common to build inexpensive houses like that. Seattle’s Side Sewer records indicate that all six were attached to the sewer on February 2, 1910. Owned by H.J. Collins, they were constructed by J. Johnson, the building’s contractor. As late as 1923, the six cottages remained in the ownership of the Collins family. Steinbrueck and Nyberg never would have labeled the cottages as ‘Cheap,’ but that’s the way they are described on the 1937 King County Assessor records I consulted at the Puget Sound Regional Archives at Bellevue College. Truth to tell, they must have always appeared cheap. Certainly, Joseph B. O’Hearon who bought the one on the alley in February 1959 for $4,000 must have thought so. Today, the $12,000 price tag on the bungalow at 23 W. Garfield in 1963, strikes me as a bargain. The alley house at Garfield and 1st W. In the end, calling these miraculously preserved buildings cheap may not be an insult. In fact, the adjective leads nicely to a deep appreciation of the “rhythm and consistency of scale” that made them important for Steinbrueck and Nyberg. It is also a good reason we would do well to protect and preserve them as a sweet reminder of simpler times when workers first took Counterbalance streetcars to the top of the hill. Posted in Places, Single FamilyTagged Craftsman, residences Our newest city landmark: Edris Skinner Nurses Home 320 West Kinnear Place: Matzen Residence
cc/2021-04/en_head_0031.json.gz/line2081
__label__cc
0.638844
0.361156
How does mathematics work? If I am given a parking lot with ten thousand cars and I want to determine whether one of the cars is orange, the only way I can do this is go through the parking lot examining each car until I find one that is orange or I examine each car and conclude that there are no orange cars. However, if I want to the determine whether there are any nontrivial integer solutions to the equation of Fermat's Last Theorem (xn + yn = zn, n > 2), I do not have to examine every possible solution, in which there are an infinite number of them. If I am clever I can mathematically prove that there are no such solutions, just as Wiles and Taylor did in the 1990s. So my question is what is it about mathematical problems like FLT which allow a person to bypass the brute force search of the parking lot problem? I am really asking, "How does mathematics work?" TheSimpliFire Craig FeinsteinCraig Feinstein Your premise is not necessarily true. For example, you could take a picture of the entire neighbourhood from a plane, at a resolution that will capture car-sized objects, and see if it contains any orange pixels. If not, you know there are no orange cars in the neighbourhood, even though you don't even know whether or not there are any cars at all there. – alephzero Jul 21 '19 at 18:25 Mathematics works because it only answers questions about what happens according to instructions we ourselves specified in advance (as Kant famously pointed out). If the lot was filled according to a set of instructions that specified colors for each spot you can find out the colors without looking at the cars at all. The "lot" of integers is filled according to just such instructions, the Peano axioms. – Conifold Jul 21 '19 at 22:36 Suppose you are at a parking lot in a city that does not allow orange cars. You would then not need to examine the whole parking lot (assuming you trust the city's police force) but can immediately conclude that you will find no orange cars. Fermat's Last Theorem is stated in an environment that let's you conclude certain things about solutions to the given equation. It turns out that all solutions are outlawed by axioms in the environment. This is certainly not as trivial to conclude as my example with cars, but I hope it's clear enough what I mean. – WorldSEnder Jul 22 '19 at 0:01 Your idea about the orange cars only works that way because there's no sorting, the cars are in random order, and you don't know anything about one car based on its position. You could easily search fewer cars if they're sorted already, say into ROYGBIV - if you find a red car next to a yellow car, you know there are no orange cars. – David Rice Jul 22 '19 at 14:30 You could also make some assumptions, such as the year. As Henry Ford is said to have said "You can have any car color you want, as long as it is black". Then picking a timeline in sync with that you can safely say there are no orange cars because orange wasn't available as color choice then. – CrossRoads Jul 22 '19 at 17:47 If you want to take a more constructive point of view, you need to reinterpret things accordingly. For example, "not P" should be interpreted as the assertion "P implies a contradiction". Accordingly, Fermat's last theorem says: Given any solution to xn + yn = zn, n > 2, you can deduce a contradiction To prove this statement, you don't need to examine every possible instance — you merely need to exhibit a recipe for how you would construct a contradiction if you were given a solution. So what is contradiction? Say "1=0". Why? Because it doesn't "work" And we are back to the OP question : What is "workingness" in math? – Rusi-packing-up Jul 21 '19 at 5:49 @Rusi "So what is contradiction? Say "1=0". Why?" I'm not sure whether you haven't studied any university-level math, but any formal mathematicial definition of "numbers" will include the statements "there are two objects called "0" and "1" with the following properties … and this is what we mean by "equality" … and as an axiom of the number system, 0 is not equal to 1". – alephzero Jul 21 '19 at 18:32 @Rusi: You cannot ask for rigor and simultaneously demand high school level math. They are not doing math in high school, they are doing paint by numbers. – Kevin Jul 22 '19 at 11:44 @Rusi: The fact remains that high-school-level math covers neither of those things, instead focusing on rote application of recipes such as "isolate X on one side of the equation." We never explain to students why they are solving for X in particular, or even what they are actually doing when they solve for X. So it should be unsurprising that we cannot answer a question such as this without taking a detour through math that they have not seen. – Kevin Jul 22 '19 at 12:27 I wouldn't say it results in a contradiction, I'd say it results in a self-evidently false statement; it violates an axiom of our reasoning system. An "axiom" is a statement or proposition which is regarded as being self-evidently true. A violation of an axiom is self-evidently false; like 1=0. Thus, given any values of integers (x,y,z,n) with n>2, then x^n +y^n = z^n can be manipulated to produce a self-evidently false statement. – Amadeus Jul 22 '19 at 18:25 The math solution is, to find out properties of the things we work with, and prove those. Then we re-search those properties for more properties we can now prove. And on those more intricate properties, we build even more complex proofs. In the case of your parking lot, the mathematician might start by asking: What do I know about this parking lot? The answer might be that it's the staging area of a factory where the finished cars are waiting to be shipped. The natural next question would be, whether the factory actually can produce orange cars. If we find that the answer is "no", we may continue to check other possible loopholes like the question whether other cars than freshly built cars from the factory are parked there. The result is a proof along the lines of: This parking lot only contains cars of Ford model Ts, which always comes in black, so no car on the parking lot can be orange. Ok, slightly contrived example, but you get the idea. For a look the other way round, take for example the proof that there are infinitely many prime numbers. It goes like this: I assume that there is only a finite number of primes. If that's true, I can multiply them all in finite time to get a product N. Consquently, N must be divisible by all primes. This means that N+1 is not divisible by any prime, I always get a remainder of exactly 1 when dividing by any number that divides N. Thus, N+1 is itself a prime, and my finite list of primes was not complete. This is bullshit. It contradicts my assumption. Since I didn't make a mistake in deriving this bullshit, my assumption must be bullshit. I conclude that there is an infinite number of primes. You see, all this proof really does, is to derive other facts from the given facts. It did not need to look at every integer. It did not need to look at each prime. It just assumed that the opposite was true, derived some consequences (properties of the numbers N and N+1), and used that to show that the assumption was wrong. Much in the same way that above we didn't even look at a single car, we just checked some properties of the parking lot to determine that there is no orange car on that parking lot. The trouble with this method is, that we can never prove everything that's true. That's another property of mathematical proofs that's been proven by Gödel. We can derive some astounding properties of many things we can formalize, but in the end almost all questions that are possible to ask require an infinite amount of time and space to prove them. Math is, by its very nature, restricted to those questions that have a finite proof which is actually easy enough for humans to find. cmaster - reinstate monicacmaster - reinstate monica “...almost all questions that are possible to ask require an infinite amount of time and space to prove them.” This is not what Gödel proved, nor do I think it’s close to an accurate statement. I’m not sure where this idea came from. What Gödel did prove is that in any axiomatic mathematical system that has enough complexity to encode basic arithmetic, there are theorems that cannot be proven. – Santana Afton Jul 24 '19 at 12:23 @SantanaAfton Gödels proof was a diagonalization proof. This proof structure is the same as that of the proof that there are more real numbers (uncountably infinite) than natural numbers (countably infinite). And, I guess you'd agree if I said that almost all real numbers are neither natural nor rational (also countable). So, while the proof itself just proves the existence of a single additional true statement for which no finite proof exists, it does prove that the set of true statements has at least uncountable cardinality, and thus that almost all true statements lack a finite proof. – cmaster - reinstate monica Jul 24 '19 at 13:08 I agree that what the proof says is that the cardinality of {true statements} is higher than the cardinality of {representable statements}, but it’s not clear to me that this is equivalent to saying that “almost all questions that are possible to ask require an infinite amount of time and space to prove them.” I see what you’re going for here, though. – Santana Afton Jul 24 '19 at 16:55 @SantanaAfton In math, we generally know only three classes of cardinality: Finite cardinalities (zero, one, two, ... elements), the countable cardinality (infinite amount, but you can assign a number to each element), and the uncountable cardinality (any function that associates natural numbers with elements from the set misses pretty much every element). Note the "the" in both cases. You cannot just add a countable amount to a countable set to get uncountable, you must at least add a countable number of countable sets to get an uncountable set. The result is infinitely larger. – cmaster - reinstate monica Jul 24 '19 at 17:42 There are at least countably many cardinalities that we lump into the word “uncountable.” There is no unique uncountable cardinality. Moreover, certainly a countable union of countable sets is still countable — it will never be uncountable. How is this relevant to my comment? – Santana Afton Jul 24 '19 at 17:45 What makes mathematical statements about infinite domains work is a belief in realism, that is, a belief that these statements represent on face-value something real. If they represent something real then according to Michael Dummett this implies a belief in the principle of bivalence regarding these statements. With realism each of these statements has a semantic content. They are either true or false even before one finds out by constructing a proof or disproof of the statement. If they have this semantic content then there is no reason not to allow the inference rules used to provide proofs or disproofs of these statements to include the law of the excluded middle reflecting the principle of bivalence about these statements. For an anti-realist the situation is different. These mathematical statements are not true until one has constructed a proof of the statements. Furthermore, the inference rules used in those proofs cannot include the law of the excluded middle since that assumes a belief that the statements are true or false prior to providing a proof. The choice of being a realist or an anti-realist regarding mathematical statements does not carry much significance for most people. This may be another reason why such mathematics works or why such statements are culturally acceptable: there is little at stake for most people one way or the other. However, the choice between realism and anti-realism may not involve such cultural indifference for all classes of statements. For example, consider statements about the future. Does the principle of bivalence apply to statements about the future now or do we have to wait and see what actually happens? If these statements represent a reality about the future, then there are no alternate paths for us to take, we have no free will and determinism is true. That would be a cultural motivation for rejecting realism about that class of statements. Dummett, M. (1991). The logical basis of metaphysics. Harvard university press. You should add that Dummett was an anti-realist!!! ie there's more nontriviality (and subtlety!) in what you are saying. – Rusi-packing-up Jul 21 '19 at 20:29 @Rusi He was an anti-realist. I don't want to suggest that he wasn't. His presentation of realism as characterized by the principle of bivalence for mathematical statements may be considered an anti-realist perspective of realism. – Frank Hubeny Jul 21 '19 at 21:09 Aside: excluded middle does not imply two-valued logic; all Boolean algebras obey the law of the excluded middle. Also, one can adopt the law of noncontradiction without insisting on the excluded middle: e.g. intuitionistic logic in the form of Heyting algebra. – user6559 Jul 22 '19 at 4:06 "What makes mathematical statements about infinite domains work is a belief in realism" -- does this mean that if mathematicians stopped being realists then Fermat's Last Theorem would stop working? This seems to suggest that the truth of mathematical statements depends on the subjective state of mathematicians -- which is a profoundly antirealist position. – John Coleman Jul 22 '19 at 11:39 @JohnColeman If realism about mathematical statements is true, that is, the belief that mathematical statements are either true or false is true, then it would be a realist position that recognizes that. Taking a different stance would be potentially anti-realist. Noting that it depends on this belief merely notes that we have a choice regarding these statements that we don't usually consider. Considering that choice is neither realist nor anti-realist. If mathematicians stopped being realists they may assess FLT differently. – Frank Hubeny Jul 22 '19 at 15:03 This question sort of leads in two directions. The first direction is proof theory, which describes how mathematical proofs work. They formalize a process of manipulating statements according to a set of rules, much like a game. Reach the statement you wish to reach, and you win the game. There are many games out there, with different sets of rules. Some of those rule sets permit making sweeping statements about sets of objects, or even classes of objects. For example, many proofs use mathematical induction, a rule that permits a mathematician to condense an infinite number of steps into one, provided it fits the precise shape of that rule. The more interesting question leads in the other direction: why does mathematics seem to be so darn good at being applicable in real life? Consider I may be able to prove that "O ∈ Z/H", or some equivalently fancy string of characters forming a mathematical sentence, and "prove" that it is true, but it is nothing more than a game I played with symbols unless it can be translated into real life, perhaps as "If there's an orange car here, it must be in a handicap spot." And, frankly, mathematics has a curiously good track record for being able to be applied this way. Some of this is simply a matter of how long we've been developing it. We've had a lot of time to hone it. There's plenty of other ways to get reliable information besides mathematics. In particular, wisdom often does not rely on such games. You may find an old man who simply nods and says "Yep, there's an orange car in a handicap spot. Here, I can take you to it." (Later, you may find out that he owned the orange car... you can find the answer to your question many ways!) Now when mathematics reaches out to the larger and larger reaches, such as dabbling with infinity, it gets harder to test it empirically. We find ways, mind you (calculus based physics being my favorite), but we start realizing that it simply may *or may not be true! Indeed there are some who play by rulesets that disagree with modern math (constructivists, in particular, play with a much more strict ruleset which does not permit as many infinite steps tucked away like we tend to do). The final reason I'd consider for why math is so effective is known as reverse mathematics. This is the study of how little one needs to assume to make the proofs work. This looks at what happens as we refuse to make assumptions about how the universe works. We may cease to assume that multiplication is commutative (ab ≠ ba), or may assume Robinson Arithmetic rather than the more powerful Peano arithmetic that we are used to. Each time we drop an assumption, we gain the ability to describe a larger set of possible operations with which to model reality. As we grasp at the faint edges of mathematics, we find its hard to come up with counterexamples showing that a model doesn't work. This, while not quite philosophical, has a bit of a self-fulfilling prophecy bit to it. Nice answer. However, when you say "mathematical induction, a rule that permits a mathematician to condense an infinite number of steps into one", that's not quite right: A proof of full induction provides a receipt for constructing a finite proof for every (finite) natural number. While this receipt provides an infinite count of proofs (equal to the count of natural numbers), each of these proofs is perfectly finite in itself. I know, I'm splitting hairs here, but sometimes the fine distinctions are important (and fun), and they are always important in math. – cmaster - reinstate monica Jul 23 '19 at 18:30 We can do the same thing for a parking lot problem as we do for Fermat's Last Theorem. Suppose we want to determine whether one of the cars is both orange and not orange (see note). I don't think anyone would need to go through the parking lot or even give so much as a cursory look to any of the cars. We can do the same thing for a mathematical problem as we do for your parking lot problem. Suppose we want to know how many even integers there are. Well, we could just go through the set of integers. We wouldn't finish the job but we wouldn't finish a parking lot problem either if the parking lot had an infinite number of cars in it. And, for maths problems, it is simpler for some of them to just count on our fingers than to try and solve the thing logically. For example, how many 1's in the first one hundred digits of the decimal part of π? It is a mathematical problem since there is likely a logical solution to it, but, like your parking lot problem, it is also one you can solve using an algorithm because it is a finite problem. However, it is precisely the method you use to solve a problem which is either mathematical or not mathematical. Mathematics is both logical and formal. It is also fundamentally an abstraction and therefore a generalisation. The same theorem applies to an infinity of possible concrete situations. Logic isn't specific to mathematics. Any problem we solve requires some logic. Formalisation isn't specific to mathematics either. But mathematics involves these three aspects. It is also an extreme form of generalisation. Science also relies on abstraction: a necessarily small set of observations and experiments make the basis for generalising to a particular type of phenomena. Mathematics goes well beyond that. The same mathematical theorem or theory will potentially apply to very different species of phenomena. You can count cows just as much as atoms, and the whole of arithmetic applies just as well to cows as to atoms. This in turns requires that mathematics, unlike science, completely ignores empirical evidence (except of course, if it is applied mathematics). So, mathematics is a discipline where people assume abstract premises, often called axioms, expressed in as rigorous a way as possible using an often specially made-up formalism and go on logically inferring from that perfectly abstract and formal conclusions, i.e. theorems, that potentially apply to many completely different types of real-world phenomena. Something only mathematics and Aristotelian logic can do. There is also a number of mathematical problems that still don't have any known mathematical solution. One of the most well-known and perplexing example, given its apparent simplicity, is that of the prime numbers. A prime number n is a natural number, i.e. a positive integer, which is not equal to the product of any two natural numbers other than 1 and n itself. For example, 2, 5, 17, 53 are prime numbers. 12 is not a prime since it is the product of 2 by 6, or 4 by 3, or indeed 2 by 2 by 3. So, we can give a proper definition to the notion of prime number and assert confidently that if n is a prime number, there are no two natural numbers p and q, other than 1 and n itself, such that n = pq. However, there is as yet no known formula to identify all prime numbers. We don't know of any algorithm listing all prime numbers. Of course, mathematicians are perfectly capable of deciding whether one particular number is or not a prime. However, what they seem interested in is a formula for listing all primes. They already have discovered various formulas to identify a number of subsets of all primes. But no general formula yet. Existing formulas leave out an infinity of prime numbers. You have one parking lot with an infinity of cars and you also have several infinite lists of orange cars together with their location in parking lot. This is a lot of orange cars you know where they are. However, there is still an infinity of orange cars not on any of your lists, somewhere in the parking lot you don't know where. Thus, for an infinity of cases, to know whether a number n is a prime or not, you have to use your parking lot procedure to try and see if it is or not divisible by any of the natural numbers between 1 and n. This is a cumbersome procedure. A formula would be much more convenient, be less exhausting, give the result faster and with less risk of error. Discovering whether one number is a prime or not, however, is not the job of mathematicians. The job of mathematicians is to find the general formula once the premise of the definition of prime numbers is accepted (and given all other accepted premises relative to numbers). Could "orange and not orange" fail to be a contradiction, voiding my point? Cars could be painted not at all with orange paint but looking orange from a distance for example... Yes, what colour things are is nothing like a black-and-white issue... However, I did say "orange and not orange", not something else. So, let's assume cars may be painted with yellow and red dots all over and look orange from a distance. Even then cars will either be orange or not orange, and this whatever criterion you decide to use to assess whether a car is "orange". The argument that red and yellow dots would make a car both orange and not orange, which would therefore make the predicate "orange and not orange" true is the fallacy of equivocation. The equivocation is in having, if only implicitly, two different criteria to assess whether a car is orange. You can't do that. You have to use the same criterion not only for all cars but for "orange" and for "not orange". The criterion may be "looks orange to me", or "is painted with orange paint all over", or indeed anything at all, like, is painted black, or "smells good". This is how, and indeed why, logic works. But it will only work if you use it to begin with. SpeakpigeonSpeakpigeon The paragraph "Thus, for an infinity of cases ..." makes no sense to me. For each single number, you can decide in principle whether it's prime; but there are infinitely many numbers. In the analogy, there are infinitely many parking lots now. Then it's not like "for infinitely many parking lots, you have to go through all cars there". Rather, you can only check finitely many parking lots anyway, with whatever method you have. – Torsten Schoeneberg Jul 22 '19 at 17:46 As an aside, there are many formulae which single out primes; if you are generous, already Eratosthenes's sieve is such a formula. en.wikipedia.org/wiki/Formula_for_primes Some mathematicians are interested in deciding how efficient such formulae can be made; I think more mathematicians are interested in problems like, what's the asymptotic density of primes in a set of the form X? That would be something like: we figured out that if we only check the lots #1, #11, #21, #31, ... we are sure there will still always come another one where all cars are orange. – Torsten Schoeneberg Jul 22 '19 at 17:53 Even if you changed the phrase 'both orange and not orange" to "both orange and not-at-all orange", a pointillist could paint a car in completely non-orange colors, so that from a distance the car would appear to be orange. – Jasper Jul 22 '19 at 22:03 Mathematics works because mathematics has a defined set of rules for manipulating mathematical symbols and entities. If we start with a specific mathematical phrase, we apply the rules in some sequence to achieve different mathematical phrases until we reach an outcome we want (a contradiction, a scope limitation, a relation...). If there were solid rules for how people parked cars — e.g., that no one ever parked an orange car next to another orange car; that no one ever parked an orange car on Tuesday; that orange cars always park next to blue signs — then we could do 'proofs' to try to determine whether there was an orange car in the parking lot. In other words, if we know rule #3 holds, and we know the parking lot has no blue signs, then we would know (without ever getting out of our chairs) that there are no orange cars in it. Likewise, if we do something in mathematics where we do not know an obvious rule, then we are always reduced to brute-force counting methods. If we don't know the binomial theorem, then the only way to calculate probabilities is to list out and count every possible permutation of a random event. A 'proof' is nothing more than the logical manipulation of symbolic rules. When we have such rules, proofs are possible; when we don't, they're not. But rules of this sort are a mixed blessing. The more tightly defined rules are, the more restricted the domain of inquiry. Do we want a world in which we are always obliged to park our orange cars net to blue signs, just to make the lives of parking control officers more systematic? Something that's pretty important to state is that it's not easy! Fermat's Last Theorem took a while to prove, and while what the statement means is to some extent a trivial consequence of its phrasing in first order logic, we didn't actually know whether or not it was a true statement for about 400 years before it was eventually proved. The epistemology of Mathematics has a long and complicated literature, but broadly speaking, logical reasoning is our most important tool for apprehending its facts and objects. From foundational axioms, we apply rules of inference to derive new statements of fact about the domains we take the axioms to describe. The structure of rules and derivations we call Proof, and the new statements that we have derived are call Theorems. If we take mathematical axioms to describe privileged domains, then our understanding of the different kinds of systems of inference we might use will be informed by how we generally observe those domains to behave, or how we want those domains to behave in order to put them to effective use. A good example is the Dedekind-Peano axioms, which we take to describe the system of Natural Numbers. This system is useful to us because it helps us understand what we mean when we talk about finite counting, and about what it means to carry out sequential operations in a countable way. We can often prove things about the Natural numbers as a whole by appeal to this systematic definition and through the use of logical inference. In effect, rather than directly appealing to the natural numbers as individual objects, we are actually proving new theorems about the axiom system; since the natural numbers satisfy this axiom system, we as a result get to know new things about those numbers. However! Even this is controversial, because when you ask a question about what, exactly, we are taking the axioms to describe, you might get wildly different answers. A Platonist will say that the numbers simply exist in some abstract real way, and the axioms are our interpretation of things we currently know for sure about them. A Structuralist may say that numbers are just features of the regularity of the known scientific world, and that the axioms are fairly strongly confirmed hypotheses about how the world works. A Logicist will say that there could be many different interpretations of what the numbers are, but we can safely define what we mean using the cognitive or categorical resources we use to reason about the world in general; the axioms just define which resources we're particularly interested in exploring. And a Formalist or Fictionalist might go a step further and say that numbers might just be human constructions as a result of the regularity of our thinking and writing about maths, and the axioms may not describe anything in reality at all save for those principles we want to build our formal empires on. There is a nice introduction to some of this thinking on the SEP article for the Philosophy of Mathematics, and it's worth noting that a diversity of approaches is probably good for stimulating creativity in mathematical practice. Paul RossPaul Ross Perhaps mathematics is more similar to your parking lot scenario than you suggest. After all, there are formulae P(x, y, z, n) in Peano arithmetic which are true for every instance of (x, y, z, n), but for which there is no finite proof, assuming consistency of course. You could have a parking lot having an infinite number of cars whose memberships are so random and arbitrary that the only way to confirm that no orange car exists in the lot is to check each one. Thus if no orange car exists in the lot, it would be unprovable. Peano arithmetic is incomplete. There is a so-called "Godel sentence" P(x, y, z, n) that "true but improvable." I like the answers by @TedWrigley and @cmaster, and want to take them one step further with the analogy: Mathematics does not decide whether all cars in a parking lot are orange. Mathematics decides whether in a city which has such-and-such bylaws (and is situated in a country which has such-and-such laws and constitution), it is legally possible that all cars in that lot are orange. (Or maybe even necessary, as in: non-orange cars are illegal here.) This can be decided without ever looking at any parking lot at all. Actually, looking at actual parking lots at best can give vague heuristic ideas to decide that question, but never actually solve it. The question of "realism" that some other answers address is then akin to asking whether A) a city with such laws exists B) whether everyone in those cities abides by the laws. But that is outside the scope of math. (I think in the metaphor, A would be "modelling" in the sense of logic and proof theory, and B is "modelling" and doing experiments in physics/chemistry/whatever.) Torsten SchoenebergTorsten Schoeneberg First of all, you do not need infinite entities to state your problem. The Traveling Salesman Problem would be a good example. In many popular texts people claim that you need to check all the n! possibilities to find the minimal length tour of a "traveling salesman". This is not true. There are many algorithms which find the optimal solution and prove it, without going through all the possibilities. An even simpler example: You can find the shortest road trip from New York to Boston without considering every possible trip on the road network. You can prove it. The key here is the triangle inequality. When you start building a road trip and you have gone from New York to California you know that all road trips starting that way are longer than the one you already know, so you can skip a very large number of road trips without ever considering them explicitly. The key here is structure. The million cars in your parking lot are completely unstructured. The road network has a lot of structure. A trip does not get shorter when you add a road or changes its value in a pseudo-random matter. J Fabian MeierJ Fabian Meier You use words like determine, examine, prove. And assume that the objects of those verbs are somehow same or related. That (implied) object is... The word law has 3 distinct usages: Empirical laws are verified /falsified Mathematical1 laws are discovered and applied Legal laws2 are enforced and broken In different terms Empirical (physical) laws are properties of the world Math laws are properties of our brains Legal laws are ossifications of societal dos and donts In other words your question is more linguistic even though it has a venerable philosophical pedigree. Just imagine the word "law" which in English is 3-way pun to instead have 3 different words and there is no question! Further readings/study Analytic vs synthetic a priori vs a posteriori logicism/formalism vs intuitionism rationalism vs empiricism 1 I've written the above from the pov that math and logic are largely the same field. Not all mathematicians agree. 2 Rupert Sheldrake makes an interesting point that using "law" for Mosaic law as well as Newton's law is peculiar (ethnocentricity??) Rusi-packing-upRusi-packing-up Math is a toolkit, nothing more or less. If we have a problem, perhaps we can find some mathematical tools that will help. For example we are given a parking lot containing 10,000 cars. We are asked to determine whether one of them is orange, without inspecting every car. Consider a related problem. Given a throw of a pair of dice, what are the probabilities that various sums will occur? It's even worse than the cars because not only are the facts of the next roll unknown, they can't even be examined as we can at least examine the cars. Yet, Fermat and Pascal worked out the mathematical theory of probability. Since then, probabilistic and statistical methods have been part of math and also physical science. Statistical mechanics in physics, statistics in the social sciences. https://en.wikipedia.org/wiki/History_of_probability Perhaps we can apply some statistical thinking to the parking lot. We could make some assumptions, that there are n colors with such and such a distribution, so many red, so many blue, so many orange. Based on that, we could determine how likely it is that there's at least one orange car; and we can even determine how likely our estimate is to be true. We can improve the accuracy of our estimate by obtaining some outside knowledge about our assumptions. Perhaps the parking lot belongs to a car factory and consists of newly manufactured units. Then we can ask the plant manager how many orange cars are out there. Or we can refer to car industry literature about the popularity of various car colors. This is how a lot of science works these days. Statistical mechanics and quantum physics for example. The field of AI works that way. How do we teach a machine to play chess? These days they just program in the rules, let the machine play billions or trillions of games against itself, keep track of which moves lead to wins and which don't, and then turn it loose. This literally knowledge-free computing strategy plays at an advanced grandmaster level. It turns out that in some problem domains, you literally don't need to know anything ... just do what statistically works. https://en.wikipedia.org/wiki/AlphaZero There are even probabilistic proofs of mathematical theorems. Feynman I recall had a probabilistic proof of Fermat's last theorem. http://www.lbatalha.com/blog/feynman-on-fermats-last-theorem Bitcoin and cryptocurrencies work using probabilistic reasoning. In truth we can never be certain that a transaction is valid. We are certain beyond statistical reason; but never certainty. Likewise computer security. The probabilities are built into the crypto algorithms. So in fact your example illustrates a shift in scientific viewpoint. These days we care about probabilities and not absolute truth. The world is run by probability and statistics, not certainties. And math has a toolkit for that. Part of the problem may be you jumped to a complicated mathematical proof and compared it against a brute-force real world proof. In many ways, they can be more similar. For example, I can look at the historical record and tell you there were no Ford cars built before Henry Ford's birth in 1863. I don't have to check the year of manufacture of every Ford car in the entire world. I could come up with a logical argument for this; akin to a Ford car is a car made by the Ford motor company; a car is a type of product; products made by a company necessarily are made after the company was started; a company is started necessarily after the birth of its founders. With a basic concept of time that nothing can be made by X before X exists, you can prove this. To get somewhere in logic you may have to define some unproveable definitions and axioms that you can build up on. Similarly, I could construct an argument that there are no even prime numbers greater than 2. I can define that a prime number is a natural number greater than 1 that has only itself and 1 as factors, and can also define even numbers as numbers that are divisible by 2. I can then come up with a proof by contradiction that if there was a even prime number greater than 2, it would have 1, itself, and 2 as at least three distinct factors and hence couldn't be prime. I don't have to check the infinite number of potential even prime numbers that are greater than 2. dr jimbobdr jimbob I suspect the OP's example shows that there exists problems that require us to do an exhaustive search of each case, not that all problems are like this. Some like FLT are not given the proof. – Frank Hubeny Jul 23 '19 at 22:07 But, as a mathematician would, you also made an assumption: that as you are walking around the lot no new cars arrive which may be orange changing the state of the system (parking lot). Brute force is an impossibility in any dynamic system due to the nature of cognitive reasoning. Anchoring assumptions must be made in all cases. Sometimes they are subtle. It’s rather physiological limitations of our brains. Perhaps a future General AI will break these shackles as a brute force chess player goes down every state permutation. I am not sure how adding the assumption that no new orange cars arrive affects the problem of finding one orange car among the ten thousand already in the lot. One still has to check each car. Also I don't see how brute force is an impossibility in this case. It would just take a long time. – Frank Hubeny Jul 22 '19 at 18:08 It seems like you're asking how we can "know" things about a set S of values when there is not an algorithm which can explicitly verify the property for each element of S (at least not in a finite amount of time). We can imagine that this might occur with an infinite set. Let me provide an example: How do we know that every multiple of 4 is even? That is, how do we know that for every s in the set S = {x: x = 4·k, k ∈ ℤ} it is the case that s = 2·m, m ∈ ℤ? Consider an arbitrary s in S. Then s = 4·k for some integer k by the definition of S. And 4 = 2·2. Then s = 4·k = 2·2·k = 2(2·k), which is an even number. Since s was an arbitrary element of S, and s was even, via a law of logic called universal generalization, we may conclude that every element of S is even (even though S has infinitely many elements). Now, a next question is, how do we know universal generalization works for sure? Well, by an incredible result called Godel's Incompleteness Theorem mathematics/logic can't be used to prove its own correctness (roughly speaking). This is partly which mathematics relies on axioms, which are statements which can't be proven. See this question on axioms in mathematics. The philosophical implications of Godel's Incompleteness Theorem are massive and beyond what I can really address here. Given that mathematics cannot prove its correctness, you may find this question on the unreasonable effectiveness of mathematics interesting. Evan RosicaEvan Rosica Math Doesn't Work. We build complex systems, and then we can prove that they cannot be proven sound using proof systems we trust. Then we keep using them. In effect, we keep using Math because it keeps on working. We have no strong reason to assume that our infinitely large constructs we build in Mathematics are not nonsense, and that the theories we build around them can distinguish truth from falsehood, once we pass really simple Mathematics. We have lots of weak reasons; we have these complex systems, and they haven't collapsed. And when we use these complex systems to reason about concrete things, they surprisingly often give results that can be tested concretely. So, Math as a source of absolute truth doesn't work, but Math as a source of practical predictions about concrete experience works. So we keep using Math because Math Just Works. Let us look at your parking lot problem. We'll do a variant, because your problem isn't all that interesting. Instead of "Orange" how about "There is a car that can be arranged as the tallest car in the parking lot, such that all of the other cars can be arranged in order, where all of the cars 'earlier' in the order are at least 1 inch shorter than the cars later". This has some structure we can exploit. Now, the classic way to prove this would be to take each car, then look at all the possible ways to arrange the other cars, and determine if the property we want is satisfied. This will take a while, as there are 10000! (10000 factorial) ways to arrange all of the cars in the parking lot, which is a big number (you'll die before you finish). Math lets us take that structure, and state "well, if a car is the tallest in that order, it must be 1 inch taller than the previous, which must be 1 inch taller than its previous, all the way down", and state the tallest car in the order must be at least 10,000 inches tall. Now we have reduced the problem. Instead of having to examine every order of car in the parking lot, we can show that no order can exist unless there is a car that is 10,000 inches tall. In fact, this can be generalized with math -- given a lot with N cars and the requirement, it can only be satisfied if there is a car that is at least N inches tall. The "cheating" part here is that one of our axioms of counting numbers in mathematics explicitly states what we need to do in order to make a statement about all counting numbers; typically the principle of (mathematical) induction is used. (This, together with some relatively basic mathematical options, results in a system that cannot be proven both sound and complete in itself; ie, Math Doesn't Work). If we know our parking lot is in a parking garage, and there isn't 10,000 inches of height, we can even skip looking at the cars! So we've solved the "ordered car" problem without having to examine every car. What more, we generated a statement about "ordered cars" in arbitrary sized lots. Now, suppose a parking lot is defined to have a fixed max height, or cars are defined as things no taller than 6' tall. Then using that, plus the above solutions, we can show that no parking lot with more than 72 cars has the "ordered car" property. There are a finite number of lots with 72 or fewer cars; we simply examine all of them, and then we can claim (without looking at larger lots) that there are no parking lots that satisfy the "ordered car" problem. This is reasonably similar to how FLT was proven. They created some really complex mathematical structures that relate back, in extremely obscure ways, to the integer solutions of FLT. They then showed that (a) any such solution to FLT would imply a structure with certain properties must exist (equivalent to "a car ordering would imply a 10,000 inch car"), and (b) no such structure can exist (equivalent to "no car is 10,000 inches tall") Similar to the "small lot" subproblem, often such mappings are not complete; if you can reduce the uncovered cases to a finite amount, those can be checked "manually". This, roughly, is how the 4-color mapping problem was solved; they reduced it down to many many many remaining cases, then got a computer to check those manually. YakkYakk Maybe there is a shorter answer. I've been puzzled by this very question myself all of my life (I am almost 50), until very recently, when I run into this beautiful insight by a Russian internet blogger (Torvald). Let's see if I can do it justice retelling/translating: all mathematicians do is reason about mathematical objects that they themselves create to abstract different notions. So, to answer your question, math consists of creating proofs, and to arrive at one a mathematician creates abstractions, or "notation", which is used to represent the problem and reason about it. postoronnimpostoronnim Not the answer you're looking for? Browse other questions tagged philosophy-of-mathematics or ask your own question. Does mathematics always need axioms? What philosophies does Wigner's “Unreasonable Effectiveness of Mathematics” threaten? Scientific truth vs. mathematical truth Why does statistics work? Mathematics Essential Does the mind work with unconscious mathematical underpinnings? How does actual infinity (of numbers or space) work? If mathematics can predict how nature is what does is say about nature it self? Does pure mathematics express something about objects? Does philosophy of mathematics affect mathematical research? Why does mathematics work in the physical sciences?
cc/2021-04/en_head_0031.json.gz/line2086
__label__cc
0.621308
0.378692
Alien 42: Special Profession Yi Ti read it in a minute and discovered it’s an announcement talking about how the comics for this novel was about to be published. It also said something about her——to support the publishing company, web comic updates might slow down appropriately. This was a common phenomenon. For example, if a serial novel was sold for publication, the contract would have a condition that before the book was officially published, there must be no ending on the website. If it has ended, then the physical book must have extras that were not in the web series. In this age of online reading, paper book sales inevitably entered a low tide, so businesses took various approaches to increase sales. For example, the cover was made beautifully and packed in plastic. On the one hand, it felt like “an untouched, new and beautiful” book. On the other hand, it made it impossible to look at the contents, so you just bought it for curiosity’s sake——this was called “looking forward to buying, regretting after buying”. Nevertheless, the reading experience brought by paper books were still difficult to replace. At least Yi Ti firmly believed that touching paper stained with ink with your hands could make you “feel the words” more than touching the cold screen with your hands. But then again, it’s not that stressful for Yi Ti to make her “slow down”. After all, she’s not “drawing” with both hands. After a period of trial and error, she got used to using the mind converter, so she could make a considerable number of comics in a day. After signing the contract, she had given all the current drafts to Formaldehyde. He was shocked at that time, and admired again and again, “You really love Aggregate! Only true love can do all of this!”. Yi Ti: “……” She really didn’t know what to say. One problem was that the drawings given by Yi Ti were all colored. The publishers believed that if this was the case, the cost would be much higher than ordinary black and white comics. However, the manuscript was really good, so it would be a shame to switch it to the black and white version. Besides, readers who were used to the colored version might not like this set. So in the contract, the publishers first set up a “pre-sale” with the Wei Feng website. In short, it’s cheaper to buy now, then it could be mailed to the buyer after printing. Once this opportunity was missed, buying it would cost XX yuan. They took this opportunity to touch the taste of the readers. If sales were high, it’d be printed on a large scale after that. If not, cooperation could be stopped temporarily. Of course, because this cooperation was different from the past, Wei Feng website would also receive higher profits than usual but a considerable part of this would be given to Aggregate and Yi Ti which pleased everyone. After all, even if she had no confidence in her comics, she was quite confident in Aggregate’s novel. Just as she thought about it, Formaldehyde sent a message, telling her that she also had to post the news when she updates today. She could just copy Aggregate’s announcement. Yi Ti returned an “ok” and seeing that it was almost time to update (Her update time was almost like Aggregate, 11:30 am and 5 pm), she also put the announcement with the comic into the deposit box. Shortly after, they were released. Plagiarism is shameful! (picks nose) ……Formaldehyde made me do it. Won’t you still go to jail even if you’re not the boss behind the scenes? (dead fish eyes) Can you bail me out? I’ll think about it. After a while, the “prosecutors for personal fraud” imposed conditions, which was to make Yi Ti help draw him in a “2D character”. The reason was that on the author’s page of the comic, he didn’t want his picture printed there. He didn’t want to show his real appearance, so he asked for a drawing. Yi Ti thought that she also didn’t want to show her appearance! So she agreed decisively, making an appointment to hand in the drawing at this time tomorrow. When she ended this conversation, Cecil also just pulled out his tentacles from the computer, and asked: “Xiao Ti, does this game exist on my computer?” “No.” Yi Ti shook her head. She couldn’t play well before since she didn’t know how, so she uninstalled it. Also, “When I was playing, I was stuck in the old version. It’s been updated several times since then and you don’t want it to get stuck, right?” He answered with certainty: “It wouldn’t.” Yi Ti was stunned. Ah, yes, this thing seemed to have been transformed by him——anything made by Cecil was trustworthy! “Do you want to try it out?” “En, in the words of you Earthlings——theory must be combined with practice.” His voice was very serious. Yi Ti: “……” She always felt like those words didn’t fit the scenario. She coughed softly, trying to remove the “triple chinned Cecil” from her mind as she said, “Then I will download it for you.” “No need.” Cecil waved his little tentacles, “When I extracted the information just now, I incidentally put the installation package together. It went directly to your computer.” Saying so, he inserted the small tentacles into the jack on the left side of the computer. At this point, the jelly alien officially entered the game journey, and after more than an hour of playing, he seemed to be “addicted to it”. Yi Ti thought, if the game makers on Earth knew this, they would definitely feel proud! With no business, she simply closed the shop doors, went back to her bedroom and took the mind converter. She put it on her head and began to “draw” the appearance of Aggregate. What kind of person was Aggregate? Yi Ti thought hard. Just now, she asked if he could provide a picture, but she was ruthlessly rejected. She also said she could just change his photo. Cough, he rejected her again. So she could only rely on imagination. Aggregate……Aggregate……Aggregate…… Her thoughts diverged endlessly, and a human figure gradually formed. Yi Ti looked at the picture displayed on the desktop computer, speechless. The young man in the conversation had a face that was not handsome but still looked good. It’s just that the dead fisheyes and unshaven beard undoubtedly affected the image, making him look lazy and decadent. And he only wore the simplest shirt and shorts, with his legs up showing crumbling slippers. He was sitting in front of a computer watching a movie, holding a cucumber in one hand and the other hand holding a half-smoked cigarette. There was already a pile of soot on the ground. “He’d probably smack me if I sent this.” She mumbled to herself. No matter how you look at it, this image was ten thousand miles away from the gravely demanded “wise deity with a military bearing, uncommon noble temperament, and most importantly, a heroic tenacious face” ah! But, she can’t fool her heart! If the old Aggregate was really “tall and mighty” in her mind, he wouldn’t look like such a wretched guy to her! But, how to say it, she always felt that he looked like the person she met in Computer City that day, the one who sensed her sight. Of course, it’s not exactly the same, but the temperament was similar. After slightly modifying a few details, Yi Ti decided——it was him. Next was “Long XiaoTian’s” image. This was undoubtedly the most difficult part. If it’s “Yi Ti”, it would be simple. The problem was, “Long XiaoTian” was male. Why didn’t she just copy the picture in the ID? Yi Ti thought and found a copy of the ID card that Cecil printed out that day. After taking a closer look, she processed it into a 2D image in her head. After finishing, she wasn’t satisfied. It’s not that she didn’t like it, but……compared to Aggregate, it seemed too ordinary. Yi Ti blinked and suddenly came up with a great idea. And then, if it was like this……and like that…… A few minutes later. Putting the two pictures together, Yi Ti nodded again and again. She had to say, this really illustrated the truth that “they are an author and a reader”. She silently praised herself! After this was done, the time unknowingly went past twelve. Because she already notified Liang Chen in advance, Yi Ti made some lunch by herself. She ate but not fully, after all, there’s a big dinner tonight. But what slightly troubled her was—— Morning, Cecil was playing a game. Noon, Cecil was playing a game Afternoon, Cecil was playing a game. Evening, Cecil was playing a game. In the end, Yi Ti thought that the so-called “shock therapy” would not work on aliens. She felt it’d become super bad if it went on like this! If she said before that he might become “obsessed with games” as a joke, well now, wasn’t it the complete fact? Before dinner, she finally couldn’t hold back. She picked him up and said: “I say……Cecil……” “What?” The jelly alien’s tentacles didn’t leave the keyboard. He didn’t remove his eyes off the screen either and answered absentmindedly. “Game……is it fun?” “It’s interesting.” “……” Worst case! Yi Ti swallowed, silently repenting to the father and mother who were far away from the planet——sorry, your young son had become an internet-addicted teenager. She asked again, “Where is it interesting?” “Probability?” This answer was a bit strange. “En.” Cecil’s answer was a little fanatical, “This game was full of chances. For example, the explosion rate of killing large copies, the success rate of strengthening weapons, probability of opening treasure chests to get good items……” “……why do you study this kind of thing?” Cecil’s tentacles stopped, then, turned his head to look at her. Don’t know why, Yi Ti thought that his expression was a little eerie: “My first orange weapon, when strengthening to level 10, broke.” “The explanation of games on Earth was that it gave direct pleasure, but this game is depriving people of pleasure. I have seen people crying more than once.” Yi Ti swallowed again: “What do you want to do?” Help, what’s going on with this completely misguided line of thought? “I want to work out a formula for probability built into game companies, publish it, and let everyone stop crying about it.” “……” Then the people at the game company would be the one in tears, right? Yi Ti held her forehead, was this “a tragedy caused by an orange weapon”? Should she praise the game company’s skill for pulling hatred? It seemed like this was the first time Cecil acted unexpectedly childish, but, it was also pretty cute. She unconsciously thought so and then laughed. “But, Cecil, if a game has no probability at all when you hit the monsters, you’ll know what will happen in advance. It’d become boring, right?” It’s like if a person knew in advance what kind of person they would meet in the next second and what would happen next, they’d feel that this life was boring. Although this analogy might not be appropriate, Yi Ti thought the meaning was similar. Cecil thoughtfully said: “It’s really the most exciting time when the monsters burst out.” “Yes, it’s this feeling of the gap between imagination and reality that makes people not want to stop!” “But my cracked orange weapon was the saddest moment.” “……” How long would he mind this? Previous Post Alien 40: Got A Message Next Post Alien 42: Special Profession One thought on “Alien 41: He Became Addicted To Games” Queen Fuzzy Bug says: Cecil is the best jelly boyfriend– I mean, friend out there. I really love him to gooy bits!
cc/2021-04/en_head_0031.json.gz/line2090
__label__wiki
0.621296
0.621296
FYI: 20 E. Krol E. Hoffman Merit Network, Inc. FYI on "What is the Internet?" This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. This FYI RFC answers the question, "What is the Internet?" and is produced by the User Services Working Group of the Internet Engineering Task Force (IETF). Containing a modified chapter from Ed Krol's 1992 book, "The Whole Internet User's Guide and Catalog," the paper covers the Internet's definition, history, administration, protocols, financing, and current issues such as growth, commercialization, and privatization. A commonly asked question is "What is the Internet?" The reason such a question gets asked so often is because there's no agreed upon answer that neatly sums up the Internet. The Internet can be thought about in relation to its common protocols, as a physical collection of routers and circuits, as a set of shared resources, or even as an attitude about interconnecting and intercommunication. Some common definitions given in the past include: * a network of networks based on the TCP/IP protocols, * a community of people who use and develop those networks, * a collection of resources that can be reached from those Today's Internet is a global resource connecting millions of users that began as an experiment over 20 years ago by the U.S. Department of Defense. While the networks that make up the Internet are based on a standard set of protocols (a mutually agreed upon method of communication between parties), the Internet also has gateways to networks and services that are based on other protocols. To help answer the question more completely, the rest of this paper contains an updated second chapter from "The Whole Internet User's Guide and Catalog" by Ed Krol (1992) that gives a more thorough explanation. (The excerpt is published through the gracious permission of the publisher, O'Reilly & Associates, Inc.) The Internet (excerpt from "The Whole Internet User's Guide and Catalog") The Internet was born about 20 years ago, trying to connect together a U.S. Defense Department network called the ARPAnet and various other radio and satellite networks. The ARPAnet was an experimental network designed to support military research--in particular, research about how to build networks that could withstand partial outages (like bomb attacks) and still function. (Think about this when I describe how the network works; it may give you some insight into the design of the Internet.) In the ARPAnet model, communication always occurs between a source and a destination computer. The network itself is assumed to be unreliable; any portion of the network could disappear at any moment (pick your favorite catastrophe--these days backhoes cutting cables are more of a threat than bombs). It was designed to require the minimum of information from the computer clients. To send a message on the network, a computer only had to put its data in an envelope, called an Internet Protocol (IP) packet, and "address" the packets correctly. The communicating computers--not the network itself--were also given the responsibility to ensure that the communication was accomplished. The philosophy was that every computer on the network could talk, as a peer, with any other computer. These decisions may sound odd, like the assumption of an "unreliable" network, but history has proven that most of them were reasonably correct. Although the Organization for International Standardization (ISO) was spending years designing the ultimate standard for computer networking, people could not wait. Internet developers in the US, UK and Scandinavia, responding to market pressures, began to put their IP software on every conceivable type of computer. It became the only practical method for computers from different manufacturers to communicate. This was attractive to the government and universities, which didn't have policies saying that all computers must be bought from the same vendor. Everyone bought whichever computer they liked, and expected the computers to work together over the network. At about the same time as the Internet was coming into being, Ethernet local area networks ("LANs") were developed. This technology matured quietly, until desktop workstations became available around 1983. Most of these workstations came with Berkeley UNIX, which included IP networking software. This created a new demand: rather than connecting to a single large timesharing computer per site, organizations wanted to connect the ARPAnet to their entire local network. This would allow all the computers on that LAN to access ARPAnet facilities. About the same time, other organizations started building their own networks using the same communications protocols as the ARPAnet: namely, IP and its relatives. It became obvious that if these networks could talk together, users on one network could communicate with those on another; everyone would benefit. One of the most important of these newer networks was the NSFNET, commissioned by the National Science Foundation (NSF), an agency of the U.S. government. In the late 80's the NSF created five supercomputer centers. Up to this point, the world's fastest computers had only been available to weapons developers and a few researchers from very large corporations. By creating supercomputer centers, the NSF was making these resources available for any scholarly research. Only five centers were created because they were so expensive--so they had to be shared. This created a communications problem: they needed a way to connect their centers together and to allow the clients of these centers to access them. At first, the NSF tried to use the ARPAnet for communications, but this strategy failed because of bureaucracy and staffing problems. In response, NSF decided to build its own network, based on the ARPAnet's IP technology. It connected the centers with 56,000 bit per second (56k bps) telephone lines. (This is roughly the ability to transfer two full typewritten pages per second. That's slow by modern standards, but was reasonably fast in the mid 80's.) It was obvious, however, that if they tried to connect every university directly to a supercomputing center, they would go broke. You pay for these telephone lines by the mile. One line per campus with a supercomputing center at the hub, like spokes on a bike wheel, adds up to lots of miles of phone lines. Therefore, they decided to create regional networks. In each area of the country, schools would be connected to their nearest neighbor. Each chain was connected to a supercomputer center at one point and the centers were connected together. With this configuration, any computer could eventually communicate with any other by forwarding the conversation through its neighbors. This solution was successful--and, like any successful solution, a time came when it no longer worked. Sharing supercomputers also allowed the connected sites to share a lot of other things not related to the centers. Suddenly these schools had a world of data and collaborators at their fingertips. The network's traffic increased until, eventually, the computers controlling the network and the telephone lines connecting them were overloaded. In 1987, a contract to manage and upgrade the network was awarded to Merit Network Inc., which ran Michigan's educational network, in partnership with IBM and MCI. The old network was replaced with faster telephone lines (by a factor of 20), with faster computers to control it. The process of running out of horsepower and getting bigger engines and better roads continues to this day. Unlike changes to the highway system, however, most of these changes aren't noticed by the people trying to use the Internet to do real work. You won't go to your office, log in to your computer, and find a message saying that the Internet will be inaccessible for the next six months because of improvements. Perhaps even more important: the process of running out of capacity and improving the network has created a technology that's extremely mature and practical. The ideas have been tested; problems have appeared, and problems have been solved. For our purposes, the most important aspect of the NSF's networking effort is that it allowed everyone to access the network. Up to that point, Internet access had been available only to researchers in computer science, government employees, and government contractors. The NSF promoted universal educational access by funding campus connections only if the campus had a plan to spread the access around. So everyone attending a four year college could become an Internet user. The demand keeps growing. Now that most four-year colleges are connected, people are trying to get secondary and primary schools connected. People who have graduated from college know what the Internet is good for, and talk their employers into connecting corporations. All this activity points to continued growth, networking problems to solve, evolving technologies, and job security for networkers. What Makes Up the Internet? What comprises the Internet is a difficult question; the answer changes over time. Five years ago the answer would have been easy: "All the networks, using the IP protocol, which cooperate to form a seamless network for their collective users." This would include various federal networks, a set of regional networks, campus networks, and some foreign networks. More recently, some non-IP-based networks saw that the Internet was good. They wanted to provide its services to their clientele. So they developed methods of connecting these "strange" networks (e.g., Bitnet, DECnets, etc.) to the Internet. At first these connections, called "gateways", merely served to transfer electronic mail between the two networks. Some, however, have grown to translate other services between the networks as well. Are they part of the Internet? Maybe yes and maybe no. It depends on whether, in their hearts, they want to be. If this sounds strange, read on--it gets stranger. Who Governs the Internet? In many ways the Internet is like a church: it has its council of elders, every member has an opinion about how things should work, and you can either take part or not. It's your choice. The Internet has no president, chief operating officer, or Pope. The constituent networks may have presidents and CEO's, but that's a different issue; there's no single authority figure for the Internet as a whole. The ultimate authority for where the Internet is going rests with the Internet Society, or ISOC. ISOC is a voluntary membership organization whose purpose is to promote global information exchange through Internet technology. (If you'd like more information, or if you would like to join, contact information is provided in the "For More Information" section, near the end of this document.) It appoints a council of elders, which has responsibility for the technical management and direction of the Internet. The council of elders is a group of invited volunteers called the Internet Architecture Board, or the IAB. The IAB meets regularly to "bless" standards and allocate resources, like addresses. The Internet works because there are standard ways for computers and software applications to talk to each other. This allows computers from different vendors to communicate without problems. It's not an IBM-only or Sun-only or Macintosh-only network. The IAB is responsible for these standards; it decides when a standard is necessary, and what the standard should be. When a standard is required, it considers the problem, adopts a standard, and announces it via the network. (You were expecting stone tablets?) The IAB also keeps track of various numbers (and other things) that must remain unique. For example, each computer on the Internet has a unique 32- bit address; no other computer has the same address. How does this address get assigned? The IAB worries about these kinds of problems. It doesn't actually assign the addresses, but it makes the rules about how to assign addresses. As in a church, everyone has opinions about how things ought to run. Internet users express their opinions through meetings of the Internet Engineering Task Force (IETF). The IETF is another volunteer organization; it meets regularly to discuss operational and near-term technical problems of the Internet. When it considers a problem important enough to merit concern, the IETF sets up a "working group" for further investigation. (In practice, "important enough" usually means that there are enough people to volunteer for the working group.) Anyone can attend IETF meetings and be on working groups; the important thing is that they work. Working groups have many different functions, ranging from producing documentation, to deciding how networks should cooperate when problems occur, to changing the meaning of the bits in some kind of packet. A working group usually produces a report. Depending on the kind of recommendation, it could just be documentation and made available to anyone wanting it, it could be accepted voluntarily as a good idea which people follow, or it could be sent to the IAB to be declared a standard. If you go to a church and accept its teachings and philosophy, you are accepted by it, and receive the benefits. If you don't like it, you can leave. The church is still there, and you get none of the benefits. Such is the Internet. If a network accepts the teachings of the Internet, is connected to it, and considers itself part of it, then it is part of the Internet. It will find things it doesn't like and can address those concerns through the IETF. Some concerns may be considered valid and the Internet may change accordingly. Some of the changes may run counter to the religion, and be rejected. If the network does something that causes damage to the Internet, it could be excommunicated until it mends its evil ways. Who Pays for It? The old rule for when things are confusing is "follow the money." Well, this won't help you to understand the Internet. No one pays for "it"; there is no Internet, Inc. that collects fees from all Internet networks or users. Instead, everyone pays for their part. The NSF pays for NSFNET. NASA pays for the NASA Science Internet. Networks get together and decide how to connect themselves together and fund these interconnections. A college or corporation pays for their connection to some regional network, which in turn pays a national provider for its access. The concept that the Internet is not a network, but a collection of networks, means little to the end user. You want to do something useful: run a program, or access some unique data. You shouldn't have to worry about how it's all stuck together. Consider the telephone system--it's an internet, too. Pacific Bell, AT&T, MCI, British Telephony, Telefonos de Mexico, and so on, are all separate corporations that run pieces of the telephone system. They worry about how to make it all work together; all you have to do is dial. If you ignore cost and commercials, you shouldn't care if you are dealing with MCI, AT&T, or Sprint. Dial the number and it works. You only care who carries your calls when a problem occurs. If something goes out of service, only one of those companies can fix it. They talk to each other about problems, but each phone carrier is responsible for fixing problems on its own part of the system. The same is true on the Internet. Each network has its own network operations center (NOC). The operation centers talk to each other and know how to resolve problems. Your site has a contract with one of the Internet's constituent networks, and its job is to keep your site happy. So if something goes wrong, they are the ones to gripe at. If it's not their problem, they'll pass it along. Finally, a question I can answer. It's not that I have a crystal ball (if I did I'd spend my time on Wall Street instead of writing a book). Rather, these are the things that the IAB and the IETF discuss at their meetings. Most people don't care about the long discussions; they only want to know how they'll be affected. So, here are highlights of the networking future. New Standard Protocols When I was talking about how the Internet started, I mentioned the International Standards Organization (ISO) and their set of protocol standards. Well, they finally finished designing it. Now it is an international standard, typically referred to as the ISO/OSI (Open Systems Interconnect) protocol suite. Many of the Internet's component networks allow use of OSI today. There isn't much demand, yet. The U.S. government has taken a position that government computers should be able to speak these protocols. Many have the software, but few are using it now. It's really unclear how much demand there will be for OSI, notwithstanding the government backing. Many people feel that the current approach isn't broke, so why fix it? They are just becoming comfortable with what they have, why should they have to learn a new set of commands and terminology just because it is the standard? Currently there are no real advantages to moving to OSI. It is more complex and less mature than IP, and hence doesn't work as efficiently. OSI does offer hope of some additional features, but it also suffers from some of the same problems which will plague IP as the network gets much bigger and faster. It's clear that some sites will convert to the OSI protocols over the next few years. The question is: how many? The Internet has been an international network for a long time, but it only extended to the United States' allies and overseas military bases. Now, with the less paranoid world environment, the Internet is spreading everywhere. It's currently in over 50 countries, and the number is rapidly increasing. Eastern European countries longing for western scientific ties have wanted to participate for a long time, but were excluded by government regulation. This ban has been relaxed. Third world countries that formerly didn't have the means to participate now view the Internet as a way to raise their education and technology levels. In Europe, the development of the Internet used to be hampered by national policies mandating OSI protocols, regarding IP as a cultural threat akin to EuroDisney. These policies prevented development of large scale Internet infrastructures except for the Scandinavian countries which embraced the Internet protocols long ago and are already well-connected. In 1989, RIPE (Reseaux IP Europeens) began coordinating the operation of the Internet in Europe and presently about 25% of all hosts connected to the Internet are located in Europe. At present, the Internet's international expansion is hampered by the lack of a good supporting infrastructure, namely a decent telephone system. In both Eastern Europe and the third world, a state-of-the- art phone system is nonexistent. Even in major cities, connections are limited to the speeds available to the average home anywhere in the U.S., 9600 bits/second. Typically, even if one of these countries is "on the Internet," only a few sites are accessible. Usually, this is the major technical university for that country. However, as phone systems improve, you can expect this to change too; more and more, you'll see smaller sites (even individual home systems) connecting to the Internet. Many big corporations have been on the Internet for years. For the most part, their participation has been limited to their research and engineering departments. The same corporations used some other network (usually a private network) for their business communications. After all, this IP stuff was only an academic toy. The IBM mainframes that handled their commercial data processing did the "real" networking using a protocol suite called System Network Architecture (SNA). Businesses are now discovering that running multiple networks is expensive. Some are beginning to look to the Internet for "one-stop" network shopping. They were scared away in the past by policies which excluded or restricted commercial use. Many of these policies are under review and will change. As these restrictions drop, commercial use of the Internet will become progressively more common. This should be especially good for small businesses. Motorola or Standard Oil can afford to run nationwide networks connecting their sites, but Ace Custom Software couldn't. If Ace has a San Jose office and a Washington office, all it needs is an Internet connection on each end. For all practical purposes, they have a nationwide corporate network, just like the big boys. Right behind commercialization comes privatization. For years, the networking community has wanted the telephone companies and other for-profit ventures to provide "off the shelf" IP connections. That is, just like you can place an order for a telephone jack in your house for your telephone, you could do this for an Internet connection. You order, the telephone installer leaves, and you plug your computer into the Internet. Except for Bolt, Beranek and Newman, the company that ran the ARPAnet, there weren't any takers. The telephone companies have historically said, "We'll sell you phone lines, and you can do whatever you like with them." By default, the Federal government stayed in the networking business. Now that large corporations have become interested in the Internet, the phone companies have started to change their attitude. Now they and other profit-oriented network purveyors complain that the government ought to get out of the network business. After all, who best can provide network services but the "phone companies"? They've got the ear of a lot of political people, to whom it appears to be a reasonable thing. If you talk to phone company personnel, many of them still don't really understand what the Internet is about. They ain't got religion, but they are studying the Bible furiously. (Apologies to those telephone company employees who saw the light years ago and have been trying to drag their employers into church.) Although most people in the networking community think that privatization is a good idea, there are some obstacles in the way. Most revolve around the funding for the connections that are already in place. Many schools are connected because the government pays part of the bill. If they had to pay their own way, some schools would probably decide to spend their money elsewhere. Major research institutions would certainly stay on the net; but some smaller colleges might not, and the costs would probably be prohibitive for most secondary schools (let alone grade schools). What if the school could afford either an Internet connection or a science lab? It's unclear which one would get funded. The Internet has not yet become a "necessity" in many people's minds. When it does, expect privatization to come quickly. Well, enough questions about the history of the information highway system. It's time to walk to the edge of the road, try and hitch a ride, and be on your way. We would like to thank O'Reilly & Associates for permission to reprint the chapter from their book by Ed Krol (1992), "The Whole Internet User's Guide and Catalog." Hoffman, E. and L. Jackson. (1993) "FYI on Introducing the Internet --A Short Bibliography of Introductory Internetworking Readings for the Network Novice," 4 p. (FYI 19, RFC 1463). To find out how to obtain this document and other on-line introductory readings, send an e-mail message to: nis-info@nis.merit.edu, with the following text: send access.guide. Krol, Ed. (1992) The Whole Internet User's Guide and Catalog, O'Reilly & Associates, Sebastopol, CA. ISBN 1-56592-025-2. Quarterman, J. (1993) "Recent Internet Books," 15 p. (RFC 1432). The Internet Society E-mail: isoc@cnri.reston.va.us Ed Krol Computing and Communications Service Office Univ. of Illinois Urbana Champaign (UIUC) 1304 W Springfield EMail: e-krol@uiuc.edu Ellen Hoffman 2901 Hubbard, Pod-G EMail: ellen@merit.edu (FYI 20) RFC 20 (STD 80) RFC 1463 (FYI 19)
cc/2021-04/en_head_0031.json.gz/line2091
__label__wiki
0.896521
0.896521
News | Policy Young Carers Given Funding Boost Xavier Smerdon The Abbott Government will provide 150 extra scholarships for young carers in an attempt to get them back into school. Xavier Smerdon | 31 March 2015 at 10:11 am After completing the final leg of the 500km Pollie Pedal, an event that raises money for Carers Australia, in Launceston, Tony Abbott announced that he would provide funding for more bursaries to help young carers. Abbott said the Young Carer Bursary Programme allowed carers up to 25-years-old to continue study or vocational training. He said a further 150 bursaries would be funded by the Government at a cost of $450,000. “Too often, carers sacrifice their education,” Abbott said. “Carers Australia received 800 applications for bursaries this year. In response to this high demand, the Government will provide a further 150 bursaries worth a total of $450,000 – on top of the 150 bursaries already announced.” Abbott said the Government would also provide Carers Australia with $50,000 to support the delivery of the bursaries. “There are more than 300,000 young carers aged under 25 years in Australia who look after people with disability, people with physical or mental health issues, or older people in need of help,” he said. “These young people are likely to live in single parent, low-resource households. “Many young carers come from Indigenous and culturally and linguistically diverse backgrounds.” Assistant Minister for Social Services, Mitch Fifield, said young carers needed more support. “[Carers] have to juggle study, often part time work, and their caring responsibilities, and too often, something has to give and too often the thing that gives is their study,” Senator Fifield said. “So we as a Government wanted to do something practical to support young carers and we announced before the last election that we would have a $3 million programme over three years to introduce young carer bursaries, which will provide support to young carers for things such as a laptop, or course fees, or books. The money goes to the student and they can use that in the way that they think best. “$3,000 for each eligible young carer student. It’s a small token of the community’s appreciation for the work that young carers do and we hope that the additional 150 young carer bursaries will make a difference in the lives of young carers and help them to continue either their school study, or their post-secondary study.” Xavier Smerdon | Journalist | @XavierSmerdon Xavier Smerdon is a journalist specialising in the Not for Profit sector. He writes breaking and investigative news articles. Tags : Carers, Carers Australia, tony abbott, Does the chaos of US politics have any impact on Australia? Neil Pharaoh Monday, 18th January 2021 at 5:39 pm Australia urged to steer clear from overly punitive lockdown measures Predictions for 2021: Charities Dr Gary Johns Thursday, 14th January 2021 at 7:30 am
cc/2021-04/en_head_0031.json.gz/line2095
__label__cc
0.551673
0.448327
Port Authority sued over still-unbuilt church near ground zero By Chris Kokenes, CNN A lawsuit claims that the owners of the World Trade Center reneged on an agreement for rebuilding a Greek Orthodox church destroyed in the collapse of the twin towers after the attacks of September 11, 2001. The lawsuit, filed Monday in federal court in Manhattan, cites "...arrogance, bad faith, and fraudulent conduct" on the part of the Port Authority of New York and New Jersey in an agreement that would have allowed St. Nicholas Church to rebuild at 130 Liberty St., adjacent to the church's original location. Filed under: 9/11 • Belief • Christianity • Church • Courts • Greek Orthodox Church • New York • United States Nigeria's celebrity preacher wants to save your soul Editors note: Every week CNN International's African Voices highlights Africa's most engaging personalities, exploring the lives and passions of people who rarely open themselves up to the camera. This week we profile Enoch Adeboye, one of the world's most influential spiritual leaders. Dressed in simple trousers and a shirt and bowtie, Enoch Adeboye's modest appearance belies the enormous influence and power he wields. The Nigerian pastor, known to his flock as "Daddy," is one of the world's most influential spiritual leaders. On any given night, he can draw more than a million to his service at Nigeria's Redeemed Christian Church of God. His fervent sermons, coupled with his magnetic personality, have turned the Pentecostal church into one of the fastest-growing evangelical congregations across the globe. Filed under: Africa • Nigeria • Pentecostal Comments (1,568 comments) My Take: Science and spirituality should be friends Editor's Note: Deepak Chopra is founder of the Chopra Foundation and a senior scientist at the Gallup Organization. He has authored over 60 books, including The Soul of Leadership, which The Wall Street Journal called one of five best business books about careers. By Deepak Chopra, Special to CNN For most people, science deserves its reputation for being opposed to religion. I'm not thinking of the rather noisy campaign by a handful of die-hard atheists to demote and ridicule faith. I'm thinking instead of Charles Darwin, whose theory of evolution has proved victorious over the Book of Genesis and its story of God creating the universe in seven days. Since then, God has been found wanting when measured against facts and data. With no data to support the existence of God, there is also no reason for religion and science to close the gap between them. Yet the gap has indeed been closing. Filed under: Culture & Science • Leaders • Opinion • Science
cc/2021-04/en_head_0031.json.gz/line2098
__label__cc
0.707939
0.292061
RPGaDAY Thirty-One August 31, 2017 August 29, 2017 / Renaissance Gamer / Leave a comment What do you anticipate most for gaming in 2018? On a personal note, I’m excited by the prospect of more and regular gaming. The groups I play with and DM for have become much better at scheduling, which means a regular gaming schedule overall, which means more games getting played every week. Currently I DM for two groups and play in two others, which averages out to three games every two weeks. I have two other groups for Pathfinder which I need to get back on track, though I might be switching at least one of those groups to another game system. That would get me up to two games a week with a nice balance between running and playing. That would leave me room to run the occasional one-shot game for systems I like and want to try out. As for RPGs as a whole, I’m looking forward to seeing how the industry will continue to change in 2018. Live-streaming games continues to be popular, led by Critical Role and Maze Arcana, and that has had a huge impact on the popularity of Dungeons & Dragons, and other games to a lesser extent. I’m curious to see if that popularity continues through another year, and what effect that will have on the industry. Paizo just released Starfinder, and the response has been strong so that seems poised to impact the industry. But sci-fi games have always been a harder sell than fantasy RPGs, so how big that impact will be depends on how well Paizo develops it going forward. And digital tools and supports continue to develop for tabletop gaming, so I look forward to watching how that affects my hobby in 2018. In the meantime, I have the rest of 2017 to get through. This is the final post for RPG a Day 2017, so we return you to our regularly scheduled 2+ posts a week. So stay tuned! RPGaDAY Thirty What is an RPG genre-mashup you would most like to see? Let me start by saying what genres I’m tired of seeing mashed in RPGs: anything to do with zombies or cthulhu. Zombies are well over in my opinion. They’ve been done well once or twice, but now it’s time to move along. And I love cthulhu (Ia! Ia! Ftagn!) but if we need horror and dread there is plenty in our own world to use without dragging poor Cthulhu out of R’lyeh all the time. If you want cthulhian dread, play Call of Cthulhu or Trail of Cthulhu. It’s not really a genre as far as I’m aware, but I would love to see more social consciousness and awareness seep into gaming. Science fiction and fantasy, as genres, have always been at the forefront of challenging social norms and pushing boundaries in what we believe is possible. I’d love to see games which, instead of focusing the players on imaginary issues, directed them toward solving real issues we face now. Maybe that’s why I’m burnt out on Cthulhu in games; it’s something unknowable which man cannot possibly stand against in any meaningful way. But there are tonnes of things against which we can make a stand, and making games to demonstrate that may be one of the best ways to show folks that they can do something in their real lives. Don’t worry, I don’t think that means that we leave off killing goblins, or zapping…space goblins (maybe I need to examine my anti-goblin attitudes). And I’m not advocating some sort of “educational game” like Social Consciousness RPG. But why not some games which deal with issues of race? Or poverty? And hey, maybe they’re out there and I just haven’t seen them yet. That would be amazing to look forward to, so please share any that you know. RPGaDAY Twenty-Nine What has been the best-run RPG Kickstarter you have backed? One I’m currently in the throes of, the Reaper Bones 4 Kickstarter. Every time Reaper runs a Kickstarter for their new Bones line of miniatures, it is is like getting a birthday present that keeps getting cool stuff added to it. Okay, and you have to pay for, but still. Every campaign starts with a $30,000 goal which gets blown by in minutes; with a little less than a week to go, they are sitting at $1,820,275. Their method is simple. To get the core set of miniatures, the buy-in is $100. That sounds like a lot, but wait, there’s more! The base set usually starts with about 25-30 miniatures, ranging in size from the standard character size minis to large minis like giants and such, to huge minis like a 13″ tall dragon. As the campaign goes along, Reaper alternates between adding minis to the base set and releasing add-ons which can be added to your order for the listed price. Currently, at $100 the base set gets you 125 miniatures, plus a package each of 1″ and 2″ round bases. And there is every chance another dozen or so miniatures will be added to the base set before the September 2 deadline, so even with shipping that works out to less than a dollar per miniature. On miniatures which would retail between $3 and $15 in stores. How can I not back this Kickstarter? Definitely check it out, it’s a very impressive campaign and it draws me in every time they run it. RPGaDAY Twenty-Eight August 28, 2017 / Renaissance Gamer / Leave a comment What film/series is the biggest source of quotes in your group? Depends on the group. One group is packed with Old Gamers, so we tend to a lot of quotes from Eighties and Nineties sci-fi and fantasy movies (Ice Pirates, Ladyhawke, Time Bandits), with the standard stuff from the Indiana Jones and Star Wars franchises. Some of my younger groups, however, tend to quote from Harry Potter or the latest Doctor Who. And then I’m a big fan of new series like Killjoys and Dark Matter, so I’ll quote them when the opportunity presents. I find every gaming group has their own list of favourite quotes, and that can tell me a lot about how I’m going to fit in that group. Not so much the quotes themselves, but how members of a group react if you don’t “get” the quote. Because it’s a form of shared communication within the group, how the group treats outsiders really comes through in how they treat you as you learn the special codes and phrases. I’ve sometimes pretended not to understand a movie reference, just to see their reaction. And I’ve left groups where this stuff was meant to be a gatekeeping device. I only have so much time to game in a week, so if a group thinks I need to pass some sort of quiz to play with them, I don’t need to be there. RPGaDAY Twenty-Five, Twenty-Six, Twenty-Seven August 27, 2017 / Renaissance Gamer / 1 Comment What is the best way to thank your GM? Be a good player. Show up on time, shut off the electronics at the table, and pay attention. In combat, be ready when your turn comes around so you aren’t slowing things down. Your GM puts in a bunch of work behind the scenes which you will never see. Thank them with your attention and good behavior. But I’ll also accept an ice-cold Crabbie’s ginger beer or three. Which RPG provides the most useful resources? Pathfinder RPG, just by sheer volume of useful sourcebooks and gaming material. If I wanted to start another Pathfinder campaign, I’d be literally spoiled for choice because I’d have a sourcebook and probably an adventure path to support me where ever I set the campaign in Golarion. Heck, I could start the campaign on another planet in the solar system and be okay, because there’s a sourcebook for that. And that doesn’t include the very useful flip-mats, magnetic combat pad, miniatures (paper and plastic), and the many other support products they have available. You could start a Pathfinder campaign with very little advance preparation, and that can be a godsend for the busy GM. What are your essential tools for good gaming? Having just said how much I love the many tools available from Paizo for gaming, I’m not going to back-track a bit and say: nothing. There is no piece of equipment, really, that I absolutely must have in order to run a game. Obviously, if I’m just playing then I need whatever the system requires me to have to play. But if I’m GMing, I can do that with nothing more than paper and a pencil (I don’t include those as tools, because I have them around all the time, even when I’m not gaming). I can ask a few questions to get an idea of what the players want to play, a few more to get an idea of the setting and tone they want, and we can go. Flipping the question a bit, and assuming I’m already in a campaign for something, then my answer is also: player buy-in. I’m willing to tweak things to better fit my players and their characters, but I need my players to trust me and buy-in to the world I’m creating. If I don’t have that then the game isn’t going to be fun for any of us, and I’d rather just play a boardgame. RPGaDAY Twenty-Three, Twenty-Four Which RPG has the most jaw-dropping layout? It’s not one that I own, but please check out anything to do with Invisible Suns by Monte Cook Games. It Kickstarted as a deluxe gaming system, and it is a beautiful work of art before you even play the game. Add to that all the gorgeously-themed digital support for the game, and in my opinion the game is definitely worth the high price tag. I wouldn’t want every game to go this route, but I’m happy there are a few games releasing luxury versions. Share a PWYW publisher who should be charging more. All of them. I don’t think pay what you will should be an option. I think if you are selling stuff on DriveThru RPG or DMs Guild, or any other online venue, you should set your price and spit in their eye if they don’t like it. That doesn’t mean go overboard, but figure out your price and run with it. Personally, I am less likely to purchase something which is pay what you can. I realize that makes me different from most people, but seeing PWYC next to an item tells me that the author doesn’t have confidence in their work. And if they don’t why would I? I should note, I don’t have an issue with free items, because to me that’s just a useful marketing tool. I’ve given away things here on the blog, after all. Having an item or two you give away so folks can decide if your style matches what they are looking for is just good business, especially in this hobby. But otherwise, set your price. RPGaDAY Twenty-Two Which RPGs are the easiest for you to run? My desire for crunch has shifted through my RPG carreer. I find myself less enthused about keeping track of myriad rules and ensuring players follow them. When I GM something like Pathfinder, I believe it’s up to the player to keep track of their character’s rules details. If they forget something at a crucial point, so sad, moving on! But that can create an antagonistic feeling at the gaming table and I try to avoid setting up a GM vs Player dynamic. So these days I tend toward games which don’t have a lot of crunch. Kobolds Ate My Baby! is a good example. It has a very simple rules system which is intuitive and gets out of the way of the players and lets them get to the not-so-serious business of being kobolds. And I like that. Once everyone has the rules sorted we just play, and I can improvise the stories without having to parse rules all the time. I think this contributes to my enjoyment of D&D 5E. The current version borrows so heavily from earlier editions, while incorporating more modern system design, that I can comfortably just play the game without worrying about keeping a bunch of fiddly rules straight. I’ve played this game for so long it’s almost a reflex at this point. Even if I don’t know a rule, I can usually make something up to get us through the moment, and I usually find I was accidentally pretty close to the actual rule. RPGaDAY Nineteen, Twenty, and Twenty-One Which RPG features the best writing? This seems to be another way of asking which RPG do I enjoy reading the most, and there are a few which top the list. I have enjoyed reading Shadowrun RPG material over the years, because they use the conceit that what you are reading is a BBS/Forum post. So the books are peppered to a greater or lesser extent with comments from characters in the Shadowrun world, and was such a cool way to immerse the reader in the world. Currently I enjoy reading material for The Laundry RPG. The layout and sidebars help reinforce the bureaucratic nature of the game setting, and the excerpts from Charles Stross’ The Laundry Files helps set the tone very nicely. I’m also in the middle of my annual re-read of the original Volo’s Guides, which are still my favourite supplements for any game setting. What is the best source for out-of-print RPGs? I’ve found Noble Knight Games to be my best bet for finding something out-of-print. I have a few other places I’ll check if they don’t have the thing, like Troll and Toad or Ebay, but generally if NK doesn’t have it it’s not available. Or at least not available at a price point or in a condition I want to buy. That said, if all I want is the information, not the physical book itself, then DriveThruRPG is my go-to resource for finding a clean .pdf copy I can read. Yes, I know I could likely find a free .pdf to download with just a Google search. But I always check DriveThru RPG first, because if they have it it means the company is getting some of the money from it’s sale, and I like keeping my hobby healthy by supporting game companies. Only if I can’t find it there do I search for a scanned .pdf, as my assumption at that point is that the company has no interest in making money off the product. And I think I may have suggested it before, but check out sales at your local library. My library has a book sale of donated items every couple of months or so, and I can pickup soft cover books for $1 and hard cover books for $2. The last time I made it out to one, I walked away with 38 sourcebooks for $38, which is a pretty sweet price however you measure it. I just grab whatever I can find, because a sourcebook has to be pretty bad that I can’t get at least $1 worth of material from it, regardless of the game it’s for. Which RPG does the most with the least words? There are a number of really great one-page RPGs which do a yeoman’s work, but my current fav is John Harper’s Lasers & Feelings. The mechanics are incredibly simple, and yet tell you everything you need to know about not just the character, but the setting. And the game is super friendly to GMs who are low on prep time, with a simple yet evocative adventure generator. If you’re caught short on game night and need something quick and easy to play, bring this up on your tablet or laptop and get playing. RPGaDAY Eighteen Which RPG have you played the most in your life? No question, Dungeons & Dragons takes the title. I started playing when I discovered the game at age ten (I even wrote about it once), and I don’t think more than a few months have gone by since then when I haven’t been playing some form of Dungeons & Dragons. Being my first roleplaying game is certainly a part of my long love affair with D&D. But it has been useful as my baseline as I explore other games, a handy comparative as I explore new games and whether I like them. Saying that, it’s not that a game has to be like D&D for me to enjoy it. It’s more that I want a game to give me a similar feeling to when I discovered D&D. I want a roleplaying game to excite me, I want to need to play it. I want the act of making a character for the game to be engaging. I remember very well how I felt about all of this when I played D&D for the first time, and I compare my first exposure to every other game I’ve ever played to that feeling. How close it replicates that feeling for me determines how much I’ll enjoy a particular game. RPGaDAY Fifteen, Sixteen, and Seventeen Which RPG do you enjoy adapting the most? I’ve posted quite often about the fun I’m having developing my own world for my D&D 5E campaigns. Whether it was planned or not, I think it was smart for WotC to launch the new edition without a defined campaign setting, as it allowed DMs to decide for themselves where they wanted the game set. And while they did eventually release material set in the Forgotten Realms, that hasn’t been so obtrusive as to overshadow the game’s use in other settings. I’ll get back to posting about my campaign setting, Cotterell, over the next few months. There have been changes and additions to the setting which have come through game play with my two campaign groups. As well, as I’ve had time to think more about the world, I’ve changed aspects of it which neither group has encountered yet, so the surprise will still be intact. Which RPG do you enjoy using as is? There is no RPG I’ve ever played or game-mastered that I haven’t modified in some way, so the honest answer is none. The Pathfinder RPG, however, comes as close as I get to playing/running a game without heavy modding or house-ruling. The Golarion setting is so rich and well-detailed, I rarely have to do anything beyond adjusting details to fit a particular group of characters. As well, there are just so many character options that I have rarely had to mod the rules to get a particular character build. I’ll admit that Pathfinder isn’t for everyone, and I’ll also admit it sometimes deserves its nickname of “Mathfinder”. It is definitely a game which appeals to the players who loved D&D 3.5 (I was one) and want to keep that kind of game going. I still enjoy running and playing it; I have never succumbed to the need to decry a game once it fell out of heavy rotation for me. While the new D&D and several other indie games have caught me eye of late, I keep coming back to Pathfinder for the rich setting. And I’m excited to see what Starfinder holds in store. Which RPG have you owned the longest but not played? There is no one RPG which can claim this title, as I collect RPG material new and old. So I have shelves of games I have picked up to read, but have never made it to the table. I used to have a low-level anxiety about that fact, but I’ve since sorted that out. Because I collect and somewhat study tabletop games, my purchasing drives and habits are different from most gamers, who tend to purchase only what they’ll immediately use. And the material I buy certainly sees use, even if I don’t play it all the time. That said, when my local RPG convention rolls around I try to dust off some games I haven’t looked at in a while, and sign up to run those. So if you’re in Edmonton and coming to IntrigueCon (and you should), I’ll be running sessions for The Laundry RPG as well as an Indian-Jones inspired scenario for Kobolds Ate My Baby!. I might add a third session, but I’ll wait and see what everyone else is running first; I might find I want to play more than I want to GM for a third time.
cc/2021-04/en_head_0031.json.gz/line2100
__label__wiki
0.97466
0.97466
US airstrikes gravely wound, possibly kill, ISIS leader, al-Baghdadi U.S. airstrikes ‘hit ISIS leader’: Terror group chief ‘critically wounded’ in Iraq after coalition forces bomb jihadi leaders Al-Baghdadi’s death or wounding by US or coalition airstrikes has been reported twice before, most recently in September, with the stories ultimately proving unverifiable. This time the news appears to be far more credible, as it is being reported by multiple, highly credible, sources. ~ Thomas Madison By Kieran Corcoran, Mail Online, and Reuters Wounded? Abu Bakr al-Baghdadi, leader the so-called Islamic State, is said to be among those targeted American war planes have reportedly launched a strike on a gathering of ISIS leaders, critically wounding their leader. Abu Bakr al-Baghdadi was hurt in the strikes today, according to local witnesses and government sources. Two witnesses confirmed that bombs had fallen on the town of al-Qaim, next to the Syrian border. Local government sources described how an aircraft had swooped over a meeting of senior ISIS figures and dropped its payload, killing more than a dozen people. Another witness said that eight people had died when a bomb struck a market. A local hospital was said to be overwhelmed with the volume of patients from the raid – including al-Baghdadi. Local ISIS officials were reportedly roaming the streets with loudspeakers ordering residents to donate blood to help the wounded. Striking Baghdadi would be the most significant blow yet in the campaign against ISIS, who have been defiant in the face of sustained air attacks from the U.S. Air Force and allies. A provincial leader from Anbar in western Iraq, as well as his deputy, are said to be among those killed instantly by the bombs. Al-Qaim and the neighbouring Syrian town of Albukamal are on a strategic supply route linking territory held by Islamic State in Iraq and Syria. The so-called Caliph, who declared himself leader of all the world’s Muslims in a televised speech, was formerly a prisoner of the U.S. during their occupation of Iraq. The shady figure was eventually released, and rose through the ranks of the jihadist groups which eventually united to form ISIS, or the Islamic State. Iraqi security officials could not immediately comment on the reported raid. The U.S. military did not confirm or deny the strike. Attacks: Two strikes were reported, one at al-Qaim, near the Syria-Iraq border, and a second in the ISIS stronghold of Mosul Separately, the coalition of air forces, which includes Great Britain’s RAF and Canadian fighter planes, struck a convoy just outside Mosul, ISIS’s stronghold city in northern Iraq. U.S. officials would not confirm or deny whether Baghdadi, the group’s overall leader, had been targeted, though one said that the coalition’s airstrikes had not been targeting any particular meeting. IS-affiliated Twitter accounts rushed to deny the reports, with one tweeting: ‘I can report to the Muslims that Amir Al-Momineen Abu Bakr Al-Baghdadi Hafid hu’allah is alive and well.’ Prisoner: al-Baghdadi, shown before his rise to power, was held as a prisoner by the U.S. during the occupation of Iraq The hardline Sunni Islamic State’s drive to form a caliphate in the two countries has helped return sectarian violence in Iraq to the dark days of 2006-2007, the peak of its civil war. It has also created a cross-border sanctuary for Arab militants, as well as foreign fighters whose passports could allow them to evade detection in Western airports. The U.S. strikes coincide with violence elsewhere in Iraq, after jihadist-style attacks hit the Iraqi capital of Baghdad. On Saturday night a car bomb killed eight people in Baghdad’s mostly Shi’ite Sadr City, police and hospital sources said. The blasts bring to 28 the day’s toll from bombs in the Iraqi capital and the western city of Ramadi. Two bombs exploded in separate attacks in Baghdad’s mainly Shi’ite Amil district, said a police source. ‘A driver parked his car and went to a cigarette stall, then he disappeared. Then his car blew up, killing passers-by,’ the source said, describing one of the two attacks in Amil. In the mostly Shi’ite al-Amin area of Baghdad, another car bomb killed eight people, medical sources said. The attack by a suicide bomber on a checkpoint in Ramadi in Anbar killed five soldiers. ‘Before the explosion, the checkpoint was targeted with several mortar rounds. Then the suicide humvee bomber attacked it,’ said a police official. There was no claim of responsibility for the bombings, but they resembled operations carried out by Islamic militants. In the town of Baquba, 40 miles northeast of Baghdad, a gunman killed a Shi’ite militiaman, and a car bomb targeting a police officer killed his 10-year-old son, security sources said. Air strikes: The reports say that U.S. warplanes dropped bombs on the town of al-Qaim in Iraq. Pictured is an earlier strike against ISIS in Kobani, on the Turkey-Syria border Western and Iraqi officials say U.S.-led air strikes are not enough to defeat the al Qaeda offshoot and Iraq must improve the performance of its security forces to eliminate the threat from the group, which wants to redraw the map of the Middle East. President Barack Obama has approved sending up to 1,500 more troops to Iraq, roughly doubling the number of U.S. forces on the ground, to advise and retrain Iraqis in their battle against Islamic State. The Iraqi prime minister’s media office said the additional U.S. trainers were welcome but the move, five months after Islamic State seized much of northern Iraq, was belated, state television reported. SOCCER-LOVING PHD STUDENT WHO BECAME WORLD’S WORST TERRORIST WITH $10 MILLION BOUNTY ON HIS HEAD: WHO IS ABU BAKR AL-BAGHDADI? Abu Bakr Al-Baghdadi is the relatively discreet leader of the Islamic State extremist group. He used to play for his mosque’s soccer team and has a PhD in Islamic history. But after spending four years in a US camp during the Iraq occupation, he emerged as one of the most brutal terrorists in the world. The government placed a $10 million bounty on his head in 2011 when intelligence identified his movements as critically dangerous. This warrant was publicized once more following the beheadings of US nationals James Foley and Steven Sotloff as well as Britons David Haines and Alan Henning. He maintained a low profile for months as ISIS, the group’s original name, rose to global infamy and Al Qaeda denounced them as ‘too extreme’. But he finally revealed himself to the public with a speech, filmed and posted on YouTube, in the first week of July this year. Born Awwad Ibrahim al-Badri al-Samarri in 1971 near Samarra, Iraq, he came from a Sufi family – a tolerant form of Islam. In the 1990s, he completed a PhD in Baghdad and played soccer with friends. But he fell out with mosque leaders and fled to Anbar province where he joined Sunni groups protesting the US occupation. American forces detained Baghdadi at Camp Bucca in 2005 shortly after the Iraq invasion. He was released when the camp closed in 2009. He was thought to be ‘bad but not the worst’ sources told The Daily Beast. But he then joined the Islamic States of Iraq and Syria, and rose up the ranks rapidly. After allegedly killing the leader, Abu Omar Baghdadi, he took hold of the terror group. The United States spent $25billion on the Iraqi military during the U.S. occupation that toppled Saddam Hussein in 2003 and triggered an insurgency that included al Qaeda. Washington wants Iraq’s Shi’ite-led government to revive an alliance with Sunni tribesmen in Anbar province which helped U.S. Marines defeat al Qaeda. Such an alliance would face a more formidable enemy in Islamic State, which has more firepower and funding. Police Colonel Shaaban Barazan al-Ubaidi, commander of a rapid reaction force in Anbar, said security forces retook eight villages. His account could not be immediately confirmed. Completing this poll grants you access to Powdered Wig Society updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use. Read more: http://www.dailymail.co.uk/news/article-2826488/U-S-air-strikes-hit-ISIS-leader-Abu-Bakr-al-Baghdadi.html#ixzz3IbIizclQ
cc/2021-04/en_head_0031.json.gz/line2104
__label__cc
0.536939
0.463061
Integrated Defense and Security Solutions Awarded Contract Modification to Advance Cargo Skid Screening BOXBOROUGH, Mass.–(BUSINESS WIRE)–#aircargo–Integrated Defense and Security Solutions (IDSS) has been awarded a modification to their contract with the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to accelerate development for the new DETECT™ CS320. The DETECT™ CS320 leverages the capability of the company’s award winning DETECTTM 1000 computed tomography (CT) scanner to enhance screening capability for full-size skids. The $1.3 million modification would leverage the capability of the DETECT™ 1000 imaging platform to deliver a high resolution fully rotatable 3-D image, providing operators with the most comprehensive non-intrusive inspection tools to quickly identify explosives, and weapons hidden within full-sized packaged cargo pallets or skids without breaking them down. The Artificial Intelligence (AI) detection algorithms will be enhanced to provide automated detection of potential threats and items of interest. “IDSS is pleased to partner with DHS S&T to advance this innovative technology by applying Computed Tomography with AI algorithms to the problem of skid screening. This approach will improve the security and speed of inspecting full cargo skids without impeding the flow of commerce. The solution has wide-ranging application for both aviation and customs inspection. This new capability will be game-changing for aviation and potentially customs inspection by increasing the number of skids that can be scanned each day without increasing manpower,” said Jeffrey Hamel, President and CEO of IDSS. Integrated Defense and Security Solutions is a small business which develops and manufactures security technology based in Boxborough, Massachusetts. The company was founded in 2012 by a team of security experts with the goal of developing security solutions to address current and future threats to aviation. Our first product, the DETECT™ 1000 has received certification by the Transportation Security Administration (TSA), and the European Civil Aviation Conference (ECAC) for explosives detection in carry-on baggage. While designed initially for explosives detection, the DETECT™ 1000 superior image quality and x-ray information has been leveraged for the Non-Intrusive Inspection (NII) of mail and parcels as well as cargo of all sizes. In December 2019, IDSS was recognized as the grand prize winner in the DHS Opioid Detection Challenge (www.opioiddetectionchallenge.com) for its algorithm development and rapid detection capability for identifying illicit opioids in international mail and packaging. This program brings the superior imaging and AI algorithms to scan complete skids for aviation and customs inspection. Sissy Pressnell, IDSS Spressnell@idsscorp.net
cc/2021-04/en_head_0031.json.gz/line2106
__label__wiki
0.582597
0.582597
Orin Kerr, of the Volokh Conspiracy — never trust anyone involved in a conspiracy — has just published an article for the Stanford Law Review about the Internet and the Fourth Amendment. The article has been discussed by Scott Greenfield, Jeff Gamso, and “Publius”; the last name is a pseudonym “for any contributor [to Affirmative Links] who wishes to use the name.” This time, Publius appears to be Jamie Spencer from Austin Criminal Defense Lawyer; he has written on this issue before. I’m jumping into the fray because I’ve written a time or two about that quaint, ancient relic known as the Fourth Amendment myself. Kerr’s article doesn’t really change the fact that nobody believes in the Fourth Amendment anymore. He as much as admits that when he says, “Technology neutrality assumes that the degree of privacy the Fourth Amendment extends to the Internet should try to match the degree of privacy protection that the Fourth Amendment provides in the physical world.” My original intent when I sat down to write this article was to explain my disagreement with Kerr’s approach. As I began to write the set-up, I realized the set-up itself was taking on the dimensions of an article of its own. I don’t want to leave out the set-up, nor do I want to risk that people will avoid what I have to say because the article is too long. Therefore I intend more than one article addressing Kerr’s proposal, with this one being concerned with foundational issues I think are important to any such discussion. Fifty-Four Words Kerr’s article is painful to read, not just because of the amazing redundancy — he apparently adheres to the belief that if you repeat the same thing often enough, it will become real — but because it proposes the devastation wreaked upon the Fourth Amendment in meatspace be extended to cyberspace. What we ought to be doing is using the problems that technology highlights with Fourth Amendment jurisprudence as an indicator of just why and how to get back to some more natural meaning for the principle enshrined by our Founders in its fifty-four words. To do that, we need to remember that those fifty-four words were not brought forth in a vacuum; they were born of concerns over potential flaws in the then-newly-adopted United States Constitution. Concomitantly, it would behoove us to recall why the original Constitution was itself written. When we consider these two issues, what we find is a common purpose: the limitation of government so as not to limit individual liberty any more than absolutely necessary. Those fifty-four words, by the way, state: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. (U.S. Const., amend. iv.) The Purpose of the United States Constitution The Constitution of the United States grew out of the recognition of a necessary fact of life. Some people have referred to it as “a necessary evil” — I think I may have even done that a time or two myself — but that’s not entirely accurate. A government, in and of itself, while necessary, is not evil. It is merely an institution, like other institutions, which is constituted by human beings. Human beings have unfortunate tendencies to look after their own interests, sometimes to the detriment of others. When people begin to live near enough to one another to have regular contact, this can become problematic. People in that situation are subject to the unfair deprivation of life, liberty, and the pursuit of happiness caused by those individuals, or groups of individuals, who are inadequately concerned about the impact of the pursuit of their interests upon the interests of others. This “threat” to the individual can come both from those in the immediate vicinity, as well as those who come from further away. The Founders of our government — the United States government — believed that the best way to deal with both the internal and external threats to individual liberty within the geographical area they claimed as their own was to make an agreement to establish an institution with just enough power to protect these basic individual liberties. And no more. The little-read preamble to the little-read document they wrote which constituted that institution states: We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defence, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America. This Preamble to the United States Constitution explains why the United States was constituted, or set up. The rest of the document explained how the United States was set up. It determined the basics as to the parts, or branches, of the United States government, as well as (again, the basics of) how those parts were to operate and what powers each had. Additionally, the State governments would continue to exist and these were intended to serve as a further limitation — creating more inefficiency — on any national government. Inefficient Government: An Insurance Policy for Freedom Today it is not at all uncommon to complain about how “inefficient” the United States government is. Contrary to what some would have us think, this is not a design flaw. The government was supposed to be inefficient. Our Founders believed that the best way to achieve the purpose of the constitution — note the use of a lowercase “c” — of what they believed to be the best type of government was to divide the power of government amongst various “branches” and then to pit the branches against one another in such a way that no single branch could govern alone; each branch had to work in some kind of harmony with the other. Since no single individual — and likely no single group — could gain control of all three branches of government, this was felt to be the safest way to create a beast necessary to protect individual liberties without allowing the beast to become more powerful than those it protected. This created the system we’ve come to call “checks and balances.” Constitutional Purpose: The Limitation of Government and the Protection of Individual Liberties In short, the United States government was intended to be the Guardian of individual liberties, our Protector. Despite the unfortunately unexplicated phrase “promote the general Welfare” in the preamble to the Constitution, the United States government was meant to do nothing more than keep one individual, group, or, in the case of potential invasion from outside, country or group of countries, from nullifying our individual freedoms. In fact, it was this strong sense of individualism that nearly prevented the United States from coming into existence at all. Too many of us today have done exactly what the Founders feared: we have forgotten the purpose of the Constitution. That’s the purpose of a constitution — to limit the powers of a government so that it does not abuse its monopoly over the use of force and possibly even make the situation worse than if there had been no government at all. (Jacob G. Hornsberger, “Liberty and the Constitution” (August 2001) Freedom Daily/The Future of Freedom Foundation.) Fear & Further Limitations of the Beast The fear of government was not shared by all the Founders, just as fear of government is not shared by all Americans today. Those promoting the constitution (small “c”) of the United States believed, or at least said they believed, that the Constitution (big “C”) of the United States was worded in such a way as to make fears that the government itself could become a problem for individual liberty unfounded. Many of the promoters of the Constitution repeatedly argued that the form of government it established was a limited government, with limited powers: While the Framers could not anticipate the tremendous growth that this nation has experienced since its founding, they did anticipate that a government that exists by the authority of the governed must be limited in its power over the citizenry lest it cease to be a government of the people but one that dictates to and controls the people. Each Branch of the Federal Government has specific Constitutional responsibilities that are outlined for that Branch. (Ken Taylor, “The Constitution Part XI: Limited Government” in The Constitution Series.) Despite reassurances from those promoting the Constitution that no government established by that Constitution could become powerful enough to trample the rights of the very People who established it, enough people in what we call “the original 13 Colonies” shared a fear of government. In fact, so many people feared this that another fear developed amongst those promoting the Constitution: the United States might never come to be; the Constitution might not be ratified. So a compromise was put forth. In addition to the limitations that already existed within the Constitution, certain basic rights were enshrined in a series of “Amendments” to the Constitution. The idea was to placate those prescient American settlers by ensuring that no matter how powerful the government became and no matter how it tried to shake off the limitations of the original Constitution, it would be explicitly forbidden from trampling the most basic of rights, the fundamental individual liberties necessary to build and maintain a vibrant, thriving, freedom-loving Republic. With the promise that a “Bill of Rights” would be adopted, the United States Constitution was finally ratified by enough States that it went into effect. The date was March 4, 1789. In September of that year, the 1st Congress proposed a Bill of Rights which was eventually ratified by enough States to go into effect on December 15, 1791. Lost Moorings: An Initial Complaint on Kerr’s Proposal My first — but certainly not my last — beef with Kerr’s article is that it is completely unleashed from this original mooring. Kerr begins his article by stating: The method of this Article is premised on an assumption I call “technology neutrality.” Technology neutrality assumes that the degree of privacy the Fourth Amendment extends to the Internet should try to match the degree of privacy protection that the Fourth Amendment provides in the physical world. (Orin Kerr, “Applying the Fourth Amendment to the Internet: A General Approach” (2010) 62 Stan.L.Rev. 1005, 1007 (available here).) The idea is to “map the protections of the Fourth Amendment from physical space to cyberspace.” (Kerr, supra, 62 Stan.L.Rev. at 1007.) The rationale behind this is not explained; it is, as Kerr says, assumed. This assumption, however, is wrong for at least three reasons. First, it assumes that the Fourth Amendment has been correctly applied in the so-called “real world,” or meatspace. Second, Kerr’s assumption presumes that a mapping of whatever “protections” may still exist in meatspace can be adequately mapped to cyberspace. Third, Kerr believes that it makes sense to do these things, or at least that doing so isn’t nonsense. None of these views is correct. As I said above, the set-up to reach this point has taken longer than I anticipated. I felt it was important to lay the groundwork for my objections before moving on to my objections. Thus, my reaction to Kerr’s article is broken down into what I expect will be at least two (and perhaps three) parts. Ultimately, the problem with keeping the Constitution — and thus the Fourth Amendment — alive today is not to extend some near-dead version of it to what is believed to be another new and necessary arena of governmental intrusion into the lives of the citizens whose liberties it was formed to protect, but to recognize that the damn thing is barely holding onto life as it is, and to revitalize it. Kerr’s suggested approach fails to recognize this. Kerr’s constitutional amnesia assumes there is nothing wrong with the destruction of the Fourth Amendment — in fact, he does not even recognize it has been destroyed. Instead, he ratifies its wounds and suggests furthering the damage by extending its lack of protection to a new arena. Home » Criminal Defense Blog » Search & Seizure » Orin Kerr’s Fourth Amendment & The Internet: Foundations Orin Kerr says: I look forward to the series of posts. I tend to disagree with your take on the history of the Fourth Amendment, however. My sense of the history is that the Framers intended the Fourth Amendment as a fairly narrow restriction: It blocked the fledgling federal government from obtaining general warrants or using writs of assistance, the practices that the English King had used that had so disturbed the colonists given that such practices were generally thought to be in violation of English common law. Especially in an era before professional police forces, this was actually a quite narrow goal. Of course, the narrow intended role of the Fourth Amendment doesn’t necessarily mean that role couldn’t expand, which of course it did, in particular during the Warren Court era. But I do think it suggests that “the original mooring” of the Fourth Amendment to which you respond may not quite as original as you suggest. But with that caveat, I look forward to the series. Reply! THANK YOU!!! And it’s not just the 4th Amendment. I believe today the greatest problem we face is so many in power gladly follow evolved, expedient POLICIES, instead of looking at cases independently, following jurisprudence, their oaths and the written laws. Regulations and policies are often void simply because they’re nonsensical or stupid, etc. But anyone in power seems to want more. Judges don’t bother with posting oaths and bonds, politicians don’t bother considering their constituents’ opinions, and elected representative in general have lost their way—failing their exact purpose, to provide representative government so we don’t have to use democratic chaos. (And how much time can be left now that the feds voted themselves & Wall Street Comrades the treasury?? The guys who own Congressjacks also own the media, the Fed, influence the school boards, you name it. We ARE taxed without representation, whether liberal or conservative!! Only a few neo-cons and leftists are getting what they want: more for them, at any cost.) Fresno Area News Fresno Bee: Crime News KSEE24: Your Central Valley ABC30: Fresno County Crime Goes Viral Dammit, Jim! I’m Engineer, Which Makes Me a Doctor Tulare County Suspends Trials The Herd Mentality Totality of the Circus Dances Shaka, When the Walls Fell The Optics of Racism Chasing Ink The Criminal Defense Blues Website Housekeeping Appellate Squawk California Supreme Court Criminal Law Blog Digital Age Defense Gamso for the Defense Jamison Koehler’s Law Blog Lawfare: Hard National Security Choices LexBlog The Defense Rests The Trial Warrior Blog Fresno Cannabis Joniverse Pixelita Designs Topics Select Category Administrivia Advertising Blogs & Bloggers Civic Stupidity Cops Commiting Crimes Coronavirus Corruption Courts & Courthouses Crime & Economy Criminal Law Death Penalty Drugs Due Process DUI Offenses DUI/DWI Entrapment Ethics & Law Evidence Fifth Amendment Foundations of the United States Fourth Amendment Freedom of Speech Gangs Government Stupidity Guns & Other Weapons Hiring a Lawyer Humorous Immigration & Criminal Law Immigration Law Informants Instrumentalism Internet Judicial Misconduct Jurors Jurors & Juries Juvenile Justice Law & Science Law & Social Issues Law & Society Legal Language Legal Research & Writing Libertarianism Marijuana Marijuana Law My Practice & Experiences News News & Media Newsletters Obituary Other Lawyers Philosophy of Law Plea Bargains Police Compassion Police Misconduct Police State Political Comments Practicing Law Prisons & Prisoners Prosecutorial Misconduct Punishment Quick Look Race Reasonable Doubt Religion Right to Counsel Right to Privacy Right to Remain Silent Rule of Law Science & Law Search & Seizure Sex Sixth Amendment Snitches Stupidity Technology & Law Testimonials The Internet & The Law The Truth The Whole Truth And Nothing But The Truth Transportation Molestation Administration United States Constitution United States Supreme Court Veterans Archives Select Month January 2021 December 2020 November 2020 October 2020 September 2020 August 2020 June 2020 May 2020 March 2020 February 2020 June 2019 July 2018 May 2018 March 2018 February 2018 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 November 2016 September 2016 August 2016 July 2016 June 2016 May 2016 March 2016 January 2016 December 2015 November 2015 October 2015 August 2015 July 2015 June 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 September 2009 August 2009 July 2009 June 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008
cc/2021-04/en_head_0031.json.gz/line2110
__label__cc
0.707736
0.292264
The Debate Over Trump’s Nationalism Robert Taylor, Opinion Editor Over the past month, President Trump has self described himself as a nationalist. To quote the president: “A globalist is a person that wants the globe to do well, frankly, not caring about our country so much. And you know what? We can’t have that. You know, they have a word. It sort of became old-fashioned. It’s called a nationalist. And I say, really, we’re not supposed to use that word. You know what I am? I’m a nationalist, OK? I’m a nationalist.” News outlets such as CNN have expressed displeasure at President Trump’s adoption of the term, saying “It primarily conjures two close associations: Nazism and white nationalism.” While this is an op-ed piece, I will put both side’s arguments in context before explaining which side I support and why. President Trump’s argument implies that he is a nationalist because he cares more about our country than he cares about the world, a view that is supported by Webster’s dictionary, which states that nationalism is “a sense of national consciousness exalting one nation above all others and placing primary emphasis on promotion of its culture and interests as opposed to those of other nations or supranational groups”. CNN and other news outlets argue that to be a nationalist is to place oneself among the ranks of Hitler, Mussolini, and other fascists, all of whom were self described nationalists and took the meaning and implications of the word to extremes. My view on this is that both side’s arguments have merits. President Trump is correct in asserting that he is a nationalist because he is putting his country’s needs and industry above all other countries, and CNN is correct in saying that, historically, self-declared nationalism is often found in people who express severe and outrageous viewpoints. Even though the word “nationalist” has a negative historical context, President Trump is well within his rights to describe himself as a nationalist and is accurate in doing so. Many, if not all, of his policies are nationalistic. His desire to improve America’s trade deals and stance militarily can easily be described as nationalistic because he puts the interests of Americans above those in other countries. His desire to place America’s culture above those of others have led him to increase restrictive immigration policies and say improper things to and about immigrants and their families. While I disagree with many of President Trump’s policies, I feel obliged to point out that what he has done does not put him on the extreme wrong side of history. He is on the wrong side of it for many reasons, but none of the reasons place him even close to other self-proclaimed nationalists. To conclude, I will express my view in a short sentence: nationalism correctly describes President Trump’s policies, however even though he has self-declared as a nationalist, he is not automatically a horrible person. COVID and College The Politics of Belarus Explained and What We Need To Do Teacher Superlatives Violence During Hong Kong Protests Continues and Worsens Should impeachment proceedings begin? Yes. Chromebooks: Good or Bad? Is Impeachment Really The Answer? The Best Places to Eat in Town! Declaring a National Emergency for a Border Wall A Technicality at Best
cc/2021-04/en_head_0031.json.gz/line2111
__label__wiki
0.697273
0.697273
Library and Reading Room The library and the reading room have been functioning from the very beginning of the institution. When the Mission was shifted to its own premises, the library and reading room were organized in the ground floor of the main building to which a wing was added in 1944. Dispensary and Library Building-1950 The foundation stone of a new building (dispensary on the ground floor and first floor reading room/library) was laid by Sri Sankar Prasad, Chief Commissioner of Delhi, on May 1, 1949, the design again being done by Sri N.K.Kothari. This was opened by the then Hon’ble Health Minister Rajkumari Amrit Kaur on August 27, 1950. (This is the corner building on our campus, where still the homeopathy dispensary works out of. The Axis bank works out of part of the building.) With the eager reception received by the library from it’s users, the first floor library soon began to feel the shortage of space. However, under the leadership of the then Secretary of Delhi Centre and later the 13th President of the Ramakrishna Math and Mission, Belur Math, Swami Ranganthanandaji, the present library with an area of 2772 sq. ft. on the ground floor and an auditorium with 1000 seats on the first floor were constructed. The foundation stone of the library and the lecture hall building was laid by Swami Nishreyasananda on the birthday of Sri Ramakrishna on March 6, 1954. Pandit Nehru cutting the ribbon during inauguration of the library building and auditorium – 23rd Nov 1956 Constructed at a cost of Rs. 3,33,000, the new library building and auditorium were formally inaugurated by the then Prime Minister of India, Pt. Jawaharlal Nehru on November 23, 1956. Attended by two thousand persons, the meeting was addressed by him in Hindi. Describing Swami Vivekananda as a great leader who spread the message of peace, harmony and fellowship, he emphasised that the basic approach to human problems as envisioned by Swamiji was indispensable today, if the world was to be saved from disaster. He called upon the youth of India to study the soul-stirring messages of Swami Vivekananda who “shook the soul of India and moulded India’s mind and national thought.” The library is open to members for the purpose of reading and reference work on all days except Mondays and other notified holidays. The library has a reading room facility and also a lending section for the benefit of borrowers, but books are issued to members residing in Delhi only. The library is equipped with books on generalities, philosophy and related disciplines, religion, social sciences, languages, pure sciences, technology (applied science), arts, literature, rhetoric, geography, history, etc. covering 13 languages, including French and Russian. The library provides dailies in English and Hindi and periodicals in several Indian languages. A Modernized and Upgraded General Library: total number of books 42542, books issued 3595, total annual attendance 50,898, newspapers 10 and periodicals 152. During the year, 826 old but valuable books (in English, Bengali, Sanskrit and Hindi) were digitized and uploaded in our website for public access. Library membership details are available here. Vivekananda Reading Room (Fully Air-conditioned Reading Room) We receive frequent requests from our members for A.C reading room. As per our constant endeavor for providing more and more facilities to our readers, we have decided to provide A.C. reading room facility to ‘select members’. A.C.Reading Room membership details are available here Last updated: October 15, 2020 at 16:48 pm
cc/2021-04/en_head_0031.json.gz/line2114
__label__wiki
0.878837
0.878837
Skepticism About Induction Another way of challenging our scientific knowledge is to challenge our knowledge of all unobserved cases and our ability to make justified predictions about what will happen on the basis of previous observations. The skeptic about induction claims that while we might observe many, many instances of As that are Bs this does not allow us to know that the next A we observe will be a B (or even reasonably believe that it will be or is likely to be a B). This sort of inductive skepticism poses a major threat to our scientific knowledge as well as our commonsense knowledge of the world around us. After all, we depend on this sort of inference (from observed cases to what we expect to observe in the future) every day. This chapter argues that again the skeptical challenge can be overcome by carefully understanding the sort of explanationist account of evidential support which has been developed in earlier chapters. Good Explanation Fundamental Form Explanatory Reasoning Inductive Reasoning Reflective Equilibrium Armstrong, D. M. (1983). What is a law of nature? Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar Beebe, J. (2009). The abductivist reply to skepticism. Philosophy and Phenomenological Research, 79, 605–636.CrossRefGoogle Scholar Black, M. (1954). Problems of analysis. Ithaca: Cornell University Press.Google Scholar Black, M. (1958). Self-supporting inductive arguments. Journal of Philosophy, 55, 718–725.CrossRefGoogle Scholar Black, M. (1963). Self-support and circularity: A reply to Mr. Achinstein. Analysis, 23, 43–44.CrossRefGoogle Scholar Boghossian, P. (2000). Knowledge of logic. In P. Boghossian & C. Peacocke (Eds.), New essays on the a priori (pp. 229–254). Oxford: Clarendon Press.CrossRefGoogle Scholar BonJour, L. (2010). Epistemology: Classic problems and contemporary responses (2nd ed.). Lanham: Rowman & Littlefield.Google Scholar Boyce, K. (2014). On the equivalence of Goodman’s and Hempel’s paradoxes. Studies in History and Philosophy of Science, 45, 32–42.CrossRefGoogle Scholar Braithwaite, R. (1953). Scientific explanation. Cambridge, UK: Cambridge University Press.Google Scholar Broad, C. D. (1952). Ethics and the history of philosophy. London: Routledge.Google Scholar Carnap, R. (1968). Inductive intuition and inductive logic. In I. Lakatos (Ed.), The problem of inductive logic (pp. 258–267). Amsterdam: North-Holland Publishing Company.CrossRefGoogle Scholar Enoch, D., & Schechter, J. (2008). How are basic belief-forming methods justified? Philosophy and Phenomenological Research, 76, 547–579.CrossRefGoogle Scholar Feigl, H. (1950). De principiis non disputandum…?: On the meaning and the limits of justification. In M. Black (Ed.), Philosophical analysis: A collection of essays (pp. 113–147). Freeport: Prentice Hall.Google Scholar Feldman, R. (2003). Epistemology. Upper Saddle River: Prentice Hall.Google Scholar Foster, J. (1982–1983). Induction, explanation and natural necessity. Proceedings of the Aristotelian Society, 83, 87–101.Google Scholar Foster, J. (2004). The divine lawmaker. Oxford: Clarendon Press.CrossRefGoogle Scholar Fumerton, R. (1980). Induction and reasoning to the best explanation. Philosophy of Science, 47, 589–600.CrossRefGoogle Scholar Goodman, N. (1965). Fact, fiction, and forecast. Cambridge, MA: Harvard University Press.Google Scholar Harman, G. (1965). The inference to the best explanation. Philosophical Review, 74, 88–95.CrossRefGoogle Scholar Harman, G. (1968). Enumerative induction as inference to the best explanation. Journal of Philosophy, 64, 529–533.CrossRefGoogle Scholar Harman, G. (1973). Thought. Princeton: Princeton University Press.Google Scholar Harman, G. (1986). Change in view. Cambridge, MA: MIT Press.Google Scholar Hempel, C. G. (1945). Studies in the logic of confirmation (I). Mind, 54, 1–26.CrossRefGoogle Scholar Hesse, M. (1969). Ramifications of ‘grue’. British Journal for Philosophy of Science, 20, 13–25.CrossRefGoogle Scholar Hume, D. (1739–1740/1978). A treatise of human nature. Oxford: Clarendon Press.Google Scholar Hume, D. (1748/1975). Enquiries concerning human understanding. Oxford: Clarendon Press.Google Scholar Jones, G. E. (1982). Vindication, Hume, and induction. Canadian Journal of Philosophy, 12, 119–129.CrossRefGoogle Scholar Kyburg, H. E., Jr. (1956). The justification of induction. Journal of Philosophy, 53, 394–400.CrossRefGoogle Scholar Kyburg, H. E., Jr. (1965). Discussion: Salmon’s paper. Philosophy of Science, 32, 147–151.CrossRefGoogle Scholar Kyburg, H. E., Jr. (1974). Comments on Salmon’s ‘inductive evidence’. In R. Swinburne (Ed.), The justification of induction (pp. 62–66). Oxford: Oxford University Press.Google Scholar Lycan, W. G. (1988). Judgement and justification. Cambridge, UK: Cambridge University Press.Google Scholar Matheson, J. (2012). Epistemic relativism. In A. Cullison (Ed.), Continuum companion to epistemology (pp. 161–179). London: Continuum.Google Scholar Papineau, D. (1993). Philosophical naturalism. Oxford: Blackwell.Google Scholar Reichenbach, H. (1938). Experience and prediction. Chicago: University of Chicago Press.Google Scholar Reichenbach, H. (1949). The theory of probability. Berkeley: University of California Press.Google Scholar Salmon, W. (1957). Should we attempt to justify induction? Philosophical Studies, 8, 33–48.CrossRefGoogle Scholar Salmon, W. (1974). The pragmatic justification of induction. In R. Swinburne (Ed.), The justification of induction (pp. 85–97). Oxford: Oxford University Press.Google Scholar Skyrms, B. (1975). Choice and chance (2nd ed.). Belmont: Wadsworth.Google Scholar Strawson, P. F. (1952). Introduction to logical theory. London: Methuen.Google Scholar Van Cleve, J. (1984). Reliability, justification, and the problem of induction. Midwest Studies in Philosophy, 9, 555–567.CrossRefGoogle Scholar Vogel, J. (manuscript). Explanation, truth, and the external world. http://fitelson.org/current/vogel.pdf Ward, B. (2012). Explanation and the new riddle of induction. Philosophical Quarterly, 62, 365–385.CrossRefGoogle Scholar Weintraub, R. (1995). What was Hume’s contribution to the problem of induction? Philosophical Quarterly, 45, 460–470.CrossRefGoogle Scholar Weintraub, R. (2013). Induction and inference to the best explanation. Philosophical Studies, 166, 203–216.CrossRefGoogle Scholar White, R. (2005). Explanation as a guide to induction. Philosopher’s Imprint, 5, 1–29.Google Scholar McCain K. (2016) Skepticism About Induction. In: The Nature of Scientific Knowledge. Springer Undergraduate Texts in Philosophy. Springer, Cham. https://doi.org/10.1007/978-3-319-33405-9_12
cc/2021-04/en_head_0031.json.gz/line2122
__label__wiki
0.758887
0.758887
Rajasthan housing board receives possession of 24 MLA bungalows Out of 54, the Rajasthan Housing Board (RHB) has received the possession of 24 MLA bungalows and started the demolition drive. The revenue earned after selling the land of these bungalows at Lal Kothi and Jalupura will be utilised to construct the apartments. JAIPUR: The work to generate revenue for the construction of luxurious eight-storey building to accommodate 160 MLAs has gathered steam. Out of 54, the Rajasthan Housing Board (RHB) has received the possession of 24 MLA bungalows and started the demolition drive. The revenue earned after selling the land of these bungalows at Lal Kothi and Jalupura will be utilised to construct the apartments. RHB, commissioner, Pawan Arora said, “We are receiving to expect the possession of entire bungalows in next two months. The bungalows in RHB possession are being demolished,” The RHB is taking the demolition work at steady pace as the permission to increase the height of the building is awaited. An official informed, that the RHB has proposed to construct an eight-storey building in the periphery of legislative assembly to accommodate 160 MLAs. Considering the project as a special case, the 28-metre building height has been proposed against the 15-metre mentioned in the building bylaws. Although, the design has received in-principle approval, the final nod to provide relaxation in the bylaws will be received by the urban development and housing (UDH) minister Shanti Dhariwal, as for the assembly’s structural dominance, in the 100-metre periphery, the height of the buildings is restricted up to 15 metre. At present, RHB has proposed to construct the apartment till the base height of the dome. After the work was awarded to RHB, a design of the apartments has been prepared. The flat would measure 3,200 square feet and comprise of four bedrooms, one drawing room, a kitchen and one room for domestic help. As per the previous design, the JDA has proposed 176 flats. However, the idea did not go well with the committee which is overseeing the project, as the open area was less. Rajasthan Housing Board MLA bungalows in Rajasthan
cc/2021-04/en_head_0031.json.gz/line2124
__label__cc
0.729094
0.270906
Asset Records Background Records Booking Records Felony Records Judgment Records License Plate Lookup Lien Records Misdemeanor Records People Records Probation Records Hickman County TN Jail Inmate Lookup, Hickman County, TN State: All States Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware District of Columbia Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington West Virginia Wisconsin Wyoming Conducting a search on Recordsfinder.com is subject to our Terms of Service and Privacy Notice. You acknowledge that Recordsfinder.com is not a consumer reporting agency under the FCRA and the information provided cannot be used for any unlawful purpose. Hickman County TN Jail Hickman County Jail is a medium security county jail located in city of Centerville, Hickman County, TN. It houses adult male inmates (above 18 years of age) who are convicted for crimes which come under Tennessee state law. Most of the inmate’s serving time in this prison are sentenced for the period of over a year and are sentenced for crimes which are serious in nature. The prison is operated and maintained by Tennessee Department of Corrections (DOC). Hickman County TN Jail Contact Details Address: 108 College Avenue, Hickman, TN City: Centerville Phone 1: 931-729-6143 Type: County Jail Mailing to Inmates and Staff Inmate Visiting Days and Hours © Copyright 2021 Accucom Corporation. All rights reserved. DPPA Reasons The information found in RecordsFinder search results originates from public sources, and is not created or verified by RecordsFinder. We cannot guarantee that the information you receive through RecordsFinder searches is accurate or up to date. Your use of RecordsFinder is conditioned on your review and acceptance of our Terms of Service and Privacy Policy. Pursuant to the Fair Credit Reporting Act ("FCRA"), RecordsFinder is not a “consumer reporting agency.” As such, RecordsFinder does not provide "consumer reports" under the FCRA. RecordsFinder limits the use of information you obtain from search results. You may not use such information to discriminate against any consumer; to consider a consumer’s eligibility for personal credit or insurance, employment, housing, or a government license or benefit; or to otherwise affect a consumer’s economic or financial status or standing.
cc/2021-04/en_head_0031.json.gz/line2125
__label__wiki
0.748422
0.748422
← Ski Area and Retail shop litigate who pays for guest accident at ski area. Sign up to be a Volunteer at the Quizno’s Pro Challenge → Upky v. Marshall Mountain, Llc, 2008 MT 90; 342 Mont. 273; 180 P.3d 651; 2008 Mont. LEXIS 94 Posted: January 17, 2011 | Author: Recreation Law | Filed under: Legal Case, Montana, Ski Area | Tags: Bamboo Poles, Closre, Jump Closed, Retailer, ski area, Ski Jump, skiing, Snowboarder, snowboarding |Leave a comment CHAD UPKY, Plaintiff, v. MARSHALL MOUNTAIN, LLC, Defendant, and MARSHALL MOUNTAIN, LLC, Third-Party Plaintiff and Appellant, v. BOARD OF MISSOULA, INC. and BOARD OF MISSOULA, LLC, Third-Party Defendants and Appellees. DA 06-0109 SUPREME COURT OF MONTANA 2008 MT 90; 342 Mont. 273; 180 P.3d 651; 2008 Mont. LEXIS 94 May 16, 2007, Submitted on Briefs March 18, 2008, Decided April 3, 2008, Released for Publication PRIOR HISTORY: APPEAL FROM: District Court of the Fourth Judicial District, In and For the County of Missoula, Cause No. DV 02-112. Honorable John W. Larson, Presiding Judge. Upky v. Marshall Mt., 2004 Mont. Dist. LEXIS 3716 (2004) CASE SUMMARY: PROCEDURAL POSTURE: Plaintiff accident victim brought a negligence suit against defendant ski area owner, which in turn filed a complaint against third-party defendant ski jump builder for contribution or indemnification. After a jury trial on the third-party complaint, the District Court of the Fourth Judicial District, County of Missoula (Montana), entered judgment in favor of the builder. The owner appealed. OVERVIEW: After the ski area owner and the accident victim came to a settlement, the ski jump builder was allowed to amend its answer to the owner’s complaint, pursuant to M.R. Civ.P. 15(a), to include a claim that the victim’s negligence, in combination with that of the owner, caused his injuries. The supreme court held that the trial court did not err when it permitted the builder to amend its answer, and that even if there was error, it was harmless because: (1) the jury, in determining that the builder was not negligent, did not reach the question whether the victim was negligent; and (2) thus there was no prejudice to the owner. The supreme court also held that the record demonstrated that substantial credible evidence supported the jury’s verdict that the builder was not negligent; because the evidence was conflicting; the supreme court deferred to the jury’s determination as to which evidence was more credible. OUTCOME: The trial court’s judgment was affirmed. CORE TERMS: jump, amend, bamboo, poles, jury verdict, comparative negligence, skiers, ski, credible evidence, constructed, prejudiced, snowboard, morning, jury’s decision, conflicting evidence, unfinished, harmless, ski area, snowboarders, patrol, verdict form, responsive pleading, reasonable mind, inspected, non-party, apportion, predicate, credible, manager, marked COUNSEL: For Appellant: Gig A. Tollefsen, Berg, Lilly & Tollefsen, P.C., Bozeman, Montana. For Appellees: Maxon R. Davis, Davis, Hatley, Haffeman & Tighe, Great Falls, Montana. JUDGES: JOHN WARNER. We Concur: JIM RICE, JAMES C. NELSON, PATRICIA COTTER, BRIAN MORRIS. OPINION BY: John Warner [***652] [**274] Justice John Warner delivered the Opinion of the Court. [*P1] Third-party plaintiff Marshall Mountain, LLC (Marshall Mountain) appeals from a judgment entered in the Fourth Judicial District Court, Missoula County, in favor of third-party defendants Board of Missoula, Inc. and Board of Missoula, LLC (Board of Missoula), dismissing its third party complaint after a jury verdict in Board of Missoula’s favor. [*P2] We restate and address the issues on appeal as follows: [*P3] 1. Did the District Court err when it granted Board of Missoula’s motion to amend its answer to allege comparative negligence by Chad Upky? [*P4] 2. Was the jury’s verdict that Board of Missoula was not negligent supported by substantial credible evidence? [*P5] On February 12, 1999, eighteen year old Chad Upky was rendered a paraplegic in a skiing accident at Marshall Mountain ski area. The injuries occurred when Upky skied over a ski jump ramp constructed at Marshall Mountain for use in an upcoming snowboard competition. Upky became inverted when he skied over the jump and was injured when he landed. [**275] [*P6] Board of Missoula was a local snowboard shop that in the years before Upky’s accident had worked with Marshall Mountain to construct jumps for use in snowboard competitions at the ski area. In prior years, the jumps had been constructed up to two weeks before the competition and had remained open for use by skiers at Marshall Mountain. In 1999, Marshall Mountain’s [***653] owner, Bruce Doering, and Board of Missoula’s co-owner, Wright Hollingsworth, agreed to construct a jump for use in that year’s competition. The ski jump on which Upky was injured was constructed two days before the accident. Doering later claimed, on behalf of Marshall Mountain, that he understood the jump would be open for use before the February 1999 competition. To the contrary, Hollingsworth asserted that he and Doering had agreed the jump would be closed prior to the 1999 competition. [*P7] On Wednesday, February 10, 1999, before the snowboard competition scheduled for the next Saturday, Hollingsworth went to Marshall Mountain after the ski area closed for the evening and built the jump with the help of Marshall Mountain’s snowcat operator, Tyson Miller. Miller and Hollingsworth worked on the jump from about 10:00 p.m. Wednesday night until 2:00 a.m. the next morning. Hollingsworth later said that he wanted to hand finish the jump in the daylight using shovels. It was his opinion that the jump should not be opened for use until it was finished. He said that before he left early Thursday morning he laid bamboo poles across the jump to indicate that it was closed. Hollingsworth said that he believed the ski patrol would see the bamboo poles when they inspected the area in the morning and would keep the jump closed. Later, members of the ski patrol and other employees of Marshall Mountain disagreed about whether there were bamboo poles across the jump on Thursday morning. [*P8] No matter whether Hollingsworth had marked the jump as closed with bamboo poles, the jump was open for use by skiers and snowboarders that Thursday and again on Friday. Doering and the ski patrol examined the jump, and it was left open for skiers and snowboarders. Doering stated that he had ultimate authority on whether or not to allow Marshall Mountain patrons to use the jump. Several employees of Marshall Mountain used the jump with no problem. [*P9] On Friday, the day of Upky’s accident, the jump was open throughout the day. Late in the day, a Marshall Mountain employee suggested to Doering that they close the jump due to changing snow [**276] and lighting conditions. However, Doering decided to keep the jump open. Chris Laws, Board of Missoula’s retail manager, was at Marshall Mountain on Friday. He noticed the jump was open, even though he understood it was supposed to be closed. [*P10] On Friday evening, Upky and some friends approached the jump. Upky claimed that he tried to slow himself going into the jump by snowplowing with his skis and went over the jump at a controlled speed. Other witnesses to the accident, including Doering and Laws, stated the Upky “bombed” the jump by going into it extremely fast. Upky suffered severe injuries as a result of his fall, including a broken neck that resulted in his paraplegia. [*P11] In 2002, Upky brought suit against Marshall Mountain, alleging that its negligence was the cause of his injuries. Upky made no claim against Board of Missoula. In its answer, Marshall Mountain denied any negligence and asserted affirmative defenses, including Upky’s comparative negligence. Marshall Mountain filed a third-party complaint against Board of Missoula seeking contribution or indemnification, asserting that Board of Missoula was responsible for any negligence in the construction of the jump. In its answer, Board of Missoula denied it had been negligent and went on to claim that the jump was unfinished when Upky used it and that it had cordoned off the jump to prevent its use prior to the competition, but Marshall Mountain negligently allowed the use of the jump on the day of Upky’s accident. Subsequently, Board of Missoula, in response to a request for admission, admitted that it had left the jump in an unfinished condition and that it was dangerous. However, it qualified the admission to state that the actions of Marshall Mountain in removing the bamboo poles marking the jump closed and allowing its patrons to use the jump were careless and caused Upky’s injuries. [*P12] Following discovery, Board of Missoula moved for summary judgment, arguing that it was not negligent as a matter of law. The District Court denied the motion for summary judgment in November 2003. [***654] [*P13] In December 2003, Marshall Mountain and Upky settled Upky’s claim. In March 2004, the District Court noted that because of the settlement only Marshall Mountain’s claims against Board of Missoula remained to be litigated; Upky’s claims against Marshall Mountain were later dismissed. [*P14] In July 2004, Board of Missoula moved to amend its answer, pursuant to M. R. Civ. P. 15(a), to include a claim that Upky’s negligence, in combination with that of Marshall Mountain, caused his [**277] injuries, and to have the jury determine the extent of his negligence as a non-party under § 27-1-703, MCA. Board of Missoula’s amended answer reasserted the claim in the original answer that Board of Missoula was not negligent and Marshall Mountain was negligent for allowing skiers to use the unfinished jump. The amended answer only added the assertion that both Upky and Marshall Mountain caused or contributed to the damages alleged by Upky. Board of Missoula did not attempt to withdraw its admission that the jump was dangerous. Marshall Mountain opposed the motion, arguing that it came too late and the amendment adding a claim of comparative negligence by Upky would be unfairly prejudicial. The District Court granted the motion to amend. [*P15] A jury trial on the third-party complaint began December 5, 2005. At trial, numerous witnesses provided conflicting evidence on the events surrounding Upky’s injuries. The witnesses’ testimony varied widely on whether Doering and Hollingsworth had agreed to close the jump prior to the competition, whether Hollingsworth placed bamboo poles on the jump, and how dangerous, if at all, the jump was for skiers and snowboarders. There was also conflicting evidence regarding the exact circumstances of Upky’s fall, specifically how far away he was when he began approaching the jump and how fast he went over the jump. [*P16] The special verdict form submitted to the jury first instructed it to determine if Board of Missoula was negligent. Only if the jury found that Board of Missoula was negligent was it to decide if Upky and Marshall Mountain were also negligent and fix the percentages of negligence. The jury returned its verdict finding that Board of Missoula was not negligent. Thus, it did not apportion fault. The District Court entered a final judgment in favor of Board of Missoula. Marshall Mountain appeals. [*P17] Issue 1: Did the District Court err when it granted Board of Missoula’s motion to amend its answer to allege comparative negligence by Chad Upky? [*P18] The Montana Rules of Civil Procedure provide for amendments to pleadings: [HN1] A party may amend the party’s pleading once as a matter of course at any time before a responsive pleading is served or, if the pleading is one to which no responsive pleading is permitted and the action has not been placed upon the trial calendar, the party [**278] may so amend it at any time within 20 days after it is served. Otherwise a party may amend the party’s pleading only by leave of court or by written consent of the adverse party; and leave shall be freely given when justice so requires. M. R. Civ. P. 15(a). [HN2] While amendments are not permitted in every circumstance, we have emphasized that, as Rule 15(a) states, leave to amend should be “freely given” by district courts. Loomis v. Luraski, 2001 MT 223, P 41, 306 Mont. 478, P 41, 36 P.3d 862, P 41. District courts should permit a party to amend the pleadings when, inter alia, allowing an amendment would not cause undue prejudice to the opposing party. Prentice Lumber Co. v. Hukill, 161 Mont. 8, 17, 504 P.2d 277, 282 (1972) (quoting Foman v. Davis, 371 U.S. 178, 182, 83 S. Ct. 227, 230, 9 L. Ed. 2d 222 (1962)). [*P19] Marshall Mountain claims it was prejudiced by the amendment to the pleadings which allowed the jury to consider Upky’s negligence. However, the jury heard all of the evidence concerning the actions of Board of Missoula presented by Marshall Mountain, which included the admission that the jump was dangerous, and nevertheless determined that Board of Missoula was not negligent. Thus, it did not reach the question [***655] of whether Upky was negligent. As the jury did not consider any negligence on the part of Upky in reaching its verdict, there was no prejudice to Marshall Mountain. [HN3] When a special verdict requires a jury to answer a question only if it first determines that a predicate question is answered in the affirmative, and the jury answers the predicate question in the negative, we have consistently held that the party objecting to the submission of the second, unanswered question is not prejudiced. Under such circumstances we consider any error harmless, and decline to interfere with the jury’s decision. See e.g. Payne v. Knutson, 2004 MT 271, PP 17-18, 323 Mont. 165, PP 17-18, 99 P.3d 200, PP 17-18 (concluding there was no prejudice to the plaintiff where the jury was not instructed to apportion negligence among the defendants because the jury found the plaintiff was more than 50% negligent and thus could not recover); Peschke v. Carroll College, 280 Mont. 331, 343, 929 P.2d 874, 881 (1996) (concluding that although a district court erred in admitting a videotape, it went to the issue of causation, which the jury did not reach, and the error was thus harmless); Drilcon, Inc. v. Roil Energy Corp., 230 Mont. 166, 173, 749 P.2d 1058, 1062 (1988) (declining to address appellant’s argument that the special verdict form erroneously included non-parties because the jury apportioned negligence only among the parties to the action and appellant was not prejudiced). [**279] [*P20] We affirm the District Court’s order allowing Board of Missoula to amend the pleadings to allege Upky’s comparative negligence because Marshall Mountain was not prejudiced by it and any error was harmless. [*P21] Issue 2: Was the jury’s verdict that Board of Missoula was not negligent supported by substantial credible evidence? [*P22] [HN4] This Court does not review a jury verdict to determine if it was correct. We review a jury’s decision only to determine if substantial credible evidence in the record supports the verdict. Campbell v. Canty, 1998 MT 278, P 17, 291 Mont. 398, P 17, 969 P.2d 268, P 17; Wise v. Ford Motor Co., 284 Mont. 336, 343, 943 P.2d 1310, 1314 (1997). Substantial evidence is “evidence that a reasonable mind might accept as adequate to support a conclusion” and may be less than a preponderance of the evidence but must be more than a “mere scintilla.” Campbell, P 18. [*P23] [HN5] It is the role of the jury to determine the weight and credibility of the evidence, and this Court will defer to the jury’s role. Seeley v. Kreitzberg Rentals, LLC, 2007 MT 97, P 21, 337 Mont. 91, P 21, 157 P.3d 676, P 21, overruled on other grounds, Giambra v. Kelsey, 2007 MT 158, P 27, 338 Mont. 19, P 27, 162 P.3d 134, P 27. [HN6] We view the evidence in the light most favorable to the prevailing party. Where conflicting evidence exists, we will not overturn a jury’s decision to believe one party over another. Samson v. State, 2003 MT 133, P 11, 316 Mont. 90, P 11, 69 P.3d 1154, P 11. [*P24] The record before us demonstrates that substantial credible evidence supports the jury’s verdict that Board of Missoula was not negligent. Hollingsworth testified that he and Doering agreed the jump would be closed prior to the competition. Hollingsworth also testified that he had marked the jump closed with bamboo poles the night it was constructed, and other testimony supported this assertion. There was also evidence that only Marshall Mountain had the ultimate decision-making authority to open or close the jump. Marshall Mountain’s manager, Doering, testified he inspected the jump and thought it was safe. This evidence, which does not include the testimony describing Upky’s actions, provided the jury with an adequate basis to support its decision that Board of Missoula was not negligent. Campbell, P 18. [*P25] There is also evidence which would tend to show Board of Missoula was negligent. However, because the evidence is conflicting we defer to the jury’s determination as to which evidence is more credible. Seeley, P 21. We conclude that the record contains sufficient [**280] evidence for reasonable minds to conclude that Board of Missoula was not negligent. [***656] CONCLUSION [*P26] The District Court did not err when it permitted Board of Missoula to amend its answer, and the jury verdict is supported by substantial credible evidence. [*P27] Affirmed. /S/ JOHN WARNER We Concur: /S/ JIM RICE /S/ JAMES C. NELSON /S/ PATRICIA COTTER /S/ BRIAN MORRIS Copyright 2011 Recreation Law 720 Edit Law, Recreaton.Law@Gmail.com
cc/2021-04/en_head_0031.json.gz/line2126
__label__cc
0.705308
0.294692
Ryan Van Horne Journalist, writer, and playwright About Ryan Van Horne Tag Archives: criminal justice Ghomeshi should be forced to testify Jian Ghomeshi, and others accused of sexual assault, should have to testify and face cross-examination. It flies in the face of a basic tenet of law, and there’s a section of the Canadian Charter of Rights and Freedoms that will prevent this from happening, but Ghomeshi should really have to go on the hot seat. He is the one on trial, after all. Instead, the women who have accused him of sexual assault are the ones facing rigorous cross-examination. Some would say they are being grilled by Ghomeshi’s lawyer, Marie Henein. It’s all well and good to have a fair trial and make sure you don’t send an innocent person to jail, but we have a problem in Canada. An estimated 90 per cent of sexual assaults go unreported and of the 10 per cent that are reported, only 25 per cent lead to a conviction. That’s an alarming failure rate and it’s not because women are imagining they’ve been raped or sexually assaulted. What can the federal government do to turn the tables? They could pass a law that would force those accused of sexual assault to testify and be cross-examined. Section 11 of the Canadian Charter of Rights and Freedoms would normally prevent someone from being compelled to testify in a case in which they are the accused, but there is a trump card the federal government can play. If Justin Trudeau’s new Liberal government is serious about solving the problem of unsolved and unreported sexual assaults in this country, it should pass a law forcing accused rapists to testify and have their comments and personal histories sifted through and torn apart. The federal government could do this if it invoked Section 33 of the Charter. Also known as the Notwithstanding Clause, it would allow such a law to stand for five years at a time at which time the federal government could let it lapse if it’s not working, or renew it if it is. When you’re faced with a problem that has reached such epic proportions, you need to get creative and you need to get serious. How much would such a measure help? I don’t know, but it won’t hurt. It would certainly wipe the smug look off a lot of faces and knowing they’ll have to sit in the hot seat could act as a deterrent. The other solution is to teach men not to rape, but that only works on the nice guys, so let’s roll out the Notwithstanding Clause and use it to fix a problem. 1 Comment Posted in Freelancing, Human rights, Justice Tagged #sexual consent, Canadian Charter of Rights and Freedoms, Criminal Code of Canada, criminal justice, Jian Ghomeshi, Notwithstanding Clause, Sexual assault BrandYourself profile Hear the Otherworldly Sounds of Skating on Thin Ice | National Geographic youtu.be/v3O9vNi-dkA via @YouTube 5 days ago RT @DanPriceSeattle: GE promised its CEO a huge bonus if stock hit $19. It didn't So GE re-did the contract so the bonus kicks in at $10/s… 6 days ago RT @PaulSeesequasis: mistahi-maskwa (Big Bear) and pihtokahânapiyiwin (Poundmaker) at Stony Mountain Penitentiary, ca. 1886. Remember Stony… 2 weeks ago @PriyaSam Congrats! 🙌🏽 1 month ago @FoodProfessor An abomination. 1 month ago Follow @ryanvanhorne Department of Common Sense Save Blue Mountain Birch Cove Lakes Wishing for peace in the Balkans IKEA’s dark secret Nova Scotia Power parent company doubles in size Atlantic Fringe Emera Magazine writing Nova Scotia Power
cc/2021-04/en_head_0031.json.gz/line2128
__label__wiki
0.725594
0.725594
Workers comp: Who has jurisdiction? Stacey Gaasch, as personal representative of the estate of the late Troy Gaasch, brought suit against St. Paul Fire & Marine Insurance Company, which provided workers compensation insurance to Troy’s employer. The action sought to recover for wrongful death, breach of contract, and bad faith in delaying an in-hospital nutrition consultation for Troy until days before his death. After his work-related injury, Troy required multiple surgeries. He allegedly became malnourished with accompanying weight loss, and physicians and a nurse practitioner recommended a nutrition consult. Troy died in the hospital approximately six months after the consult was recommended. Prior to his work-related injury, Troy underwent gastric bypass surgery and allegedly suffered from a malabsorption syndrome secondary to this surgery. A disagreement arose between the insurer and Troy concerning whether the insurer was required to pay for a nutritional consult. The insurer claimed Troy’s nutritional problems were created before his work-related injury and his nutritional state in the hospital was not a result of the work-related injury. During his hospitalization, Troy’s counsel requested an order from the Workers’ Compensation Court for treatment by a nutritionist. The form was filed three days before Troy’s death. Two days later and one day before his death, St. Paul Fire & Marine approved the request for a nutritional consult. Troy died on February 26, 2010. A few months later, the Workers’ Compensation Court held a hearing on the issue of death benefits. The court found “without a doubt that claimant died as a direct result of the original injury.” The court made findings in support of this conclusion and relied on one doctor’s report and another doctor’s autopsy report. The court awarded a lump-sum payment, continuing payments, and an amount for funeral expenses. The payments were ordered to be paid to Troy’s surviving spouse and two children. This order was affirmed in part and modified in part by a three-judge panel of the court. The order was reduced because one of the children was an adult. The panel agreed that Troy died as a direct result of his original work-related injury combined with “consequential injuries.” The Court of Civil Appeals agreed in a subsequent appeal. Stacey Gaasch brought an action in which she alleged that St. Paul Fire & Marine failed to provide Troy reasonable and necessary medical treatment as required by “the final orders of the Oklahoma Workers’ Compensation Court.” Stacey said the insurer breached its duty of good faith and characterized this allegation as a bad faith claim. Stacey characterized the second part of the petition as a claim for wrongful death. She alleged that Troy’s survivors suffered compensable damages arising from the insurer’s breach of its duty of good faith and fair dealing associated with the insurance contract. The third part of the petition alleged that St. Paul (1) continued to deny approval of reasonable and necessary medical treatment until the day before Troy died and (2) made statements shortly before his death that it would be cheaper for the insurer if Troy would die, and (3) that the insurer’s conduct and statements caused Stacey severe emotional distress. St. Paul filed a motion to dismiss, and it was granted on Stacey’s claim of bad faith and denied on her wrongful death claim. Stacey voluntarily dismissed with prejudice the claim against St. Paul for intentional infliction of emotional distress. Subsequently St. Paul sought summary judgment on Stacey’s wrongful death claim, and it was granted. Stacey appealed. On appeal, the court noted that Stacey’s action arose from a workers compensation policy and a court-ordered duty imposed on that policy where (1) Stacey alleged that a death had occurred and (2) workers compensation death benefits previously were paid for that death. The court said that Stacey’s action to recover for Troy’s injury was governed by workers compensation jurisdictional remedies. The court stated: “This workers’ compensation insurance carrier had its legal duty for providing payment adjudicated by an order of the Workers’ Compensation Court. [Stacey], like any other claimant seeking to enforce an award requiring an insurer to provide a benefit, ‘must first utilize the mechanism provided in section 42(A) of the Act and have the award certified for enforcement.’ The insurer has a workers compensation statutory right to defend its conduct in the context of its good-cause burden.” The court said that Stacey attempted to go around this procedure by characterizing her claim as a breach of contract and an action for damages resulting from an alleged wrongful death. “The clear public policy … requires available workers’ compensation remedies for any type of wrongful death claim to be pursued in the Workers’ Compensation Court when required by the workers’ compensation statutes.” The trial court’s summary judgment in favor of St. Paul was affirmed. Gaasch/Estate of Gaasch vs. St. Paul Fire & Marine Insurance Company-Supreme Court of Oklahoma-February 6, 2018-2018 WL 716466. Blood is thicker In UIM dispute, sauce for the goose is sauce for the gander LUNCHTIME SLIP AND FALL
cc/2021-04/en_head_0031.json.gz/line2130
__label__wiki
0.979632
0.979632
MLS Ticker: LAFC adds Wright-Phillips, SKC acquires defender Reid on loan, and more By Larry Henry Jr. February 14, 2020 6:15 pm Follow @lhenry019 By Larry Henry Jr. | February 14, 2020 6:15 pm Follow @lhenry019 Bradley Wright-Phillips is officially an LAFC player after joining one of the league’s deadliest attacking fronts in MLS. The club signed Wright-Phillips on Friday, six days after the forward announcing via social media he would be joining LAFC. He comes to the West Coast after spending the last seven seasons with the New York Red Bulls, becoming one of the league’s prolific goalscorers. “Bradley is one of the most prolific goalscorers in MLS history and the type of player that can be a difference-maker for us,” LAFC EVP & General Manager John Thorrington said. “He brings invaluable experience to the group as a proven winner in our league, and we look forward to welcoming him and his family to the Club.” Wright-Phillips, a two-time MLS Golden Boot Winner, MLS Best XI selection and MLS All-Star, has scored 108 goals in 195 regular season appearances. The 34-year-old forward has also appeared in at least one postseason match every year since joining the league in 2013. 2019 saw Wright-Phillips score two goals and register four assists in 23 regular season games. He appeared in all four Concacaf Champions League matches as well for the Red Bulls. He joins an LAFC attack which features reigning league MVP Carlos Vela, Diego Rossi, and Brian Rodriguez. Sporting KC adds West Ham defender Reid on loan Sporting KC gained the experience of an international center back for the 2020 MLS season. New Zealand Men’s National Team center back Winston Reid joined the club on loan Friday from English Premier League side West Ham United. The 31-year-old World Cup veteran will occupy an international roster spot for 2020. Reid joined the Hammers in 2010 from Danish side Midtjylland and eventually totaled 222 appearances in all competitions for the London club. He made 30 or more EPL appearances in three seasons for the Hammers, while also playing one season in the English Football Championship. However, he comes in with zero senior appearances over the past two seasons. A native of New Zealand, Reid has earned 25 caps for his country’s National Team, appearing in the 2010 FIFA World Cup. He made one appearance for the All Whites in 2019 and will look to help a Sporting KC backline which struggled last season. Peter Vermes’ side failed to make the MLS Cup Playoffs in 2019. Minnesota United adds defensive depth with Aja signing Minnesota United added depth to their defensive corps on Friday with an experienced MLS centerback. The club signed Uruguayan defender José Aja on Friday, who will not occupy an international roster spot. Aja joins the likes of Ike Opara, Michael Boxall, and Brent Kallman in Adrian Heath side’s center back pool. “Jose is another valuable piece for us to add. With Brent’s [Kallman] suspension early on, we feel as though we’re a little bit light at centerback,” Heath said. “To get somebody who’s been in the league, got a Green Card, has come for the opportunity of staying here long-term — we felt it was too good of an opportunity to turn down. Especially as the lad’s played in the league and knows the league inside out. He’s a big, strong, athletic centerback. I think he’ll be another huge addition to our squad.” Aja joins the Loons from Chile’s Primera Division side Union Espanola, where he’s made five appearances since signing with them in 2019. The former Orlando City and Vancouver Whitecaps defender totaled 42 league appearances over two prior seasons in MLS. A 6-feet-4 defender, Aja has also played with Nacional and Racing Club during his professional career. He has scored three career goals since his professional career began in 2014. Kallman was handed a 10-match suspension by MLS back in mid-September for violating the league’s Substance Abuse policy. RSL re-sign midfielder Mulholland Real Salt Lake retained the services of another experienced midfielder ahead of the upcoming MLS season. Luke Mulholland was re-signed on Thursday, ahead of his seventh season with the club. Mulholland joins the likes of Kyle Beckerman and Donny Toia who were also re-signed this offseason. “Luke is an established member of our club and community and we are thrilled to have him back in an RSL jersey for the 2020 season,” RSL General Manager Elliot Fall said. “He is a player who has dealt with significant adversity over the last couple years and has bounced back in a fantastic way. Without his contributions, the Real Monarchs would not have had the postseason success they did last year – that alone shows his level of professionalism and character. He is a role model for our young players both on the field and in the locker room” Since being acquired by the Tampa Bay Rowdies of the former NASL in 2014, Mulholland has appeared in 123 matches, scoring 16 goals and adding 16 assists. A native of Preston, England, Mulholland has also made five playoff appearances for RSL. In 2019, he made eight regular season appearances for Real Monarchs, tallying one goal and one assist. He then was a key component of the USL Championship squad on its playoff run with one assist in four matches, who eventually won the 2019 USL Championship title. RSL finished third in the 2019 MLS regular season, winning one playoff game before falling to eventual Cup winners Seattle Sounders. Whitecaps sign Pecile to Homegrown Contract The Vancouver Whitecaps FC made their fifth Homegrown signing in the past year on Friday. Whitecaps BMO Academy System product Damiano Pecile signed an MLS Homegrown contract, becoming the 22nd academy product in the club’s history to do so. The 17-year-old joins Thomas Hasal, Georges Mukumbilwa, Patrick Metcalfe, and Gianfranco Facchineri as Development Squad players who have signed in the last year. Pecile spent 2019 playing with the Whitecaps FC Development Squad, including trips to face international competition in England, South Korea, and Mexico, with the Academy Under-19 side, and with Canada’s Under-17 Men’s National team. “Damiano is a talented young prospect who still has a great deal of room to develop and improve,” Whitecaps sporting director Axel Schuster said. “For now, Damiano will continue to play with our Development Squad, as well as our U-19 team. We will continue to evaluate the best options for him, which may include a loan in the coming months should it make sense for his progression.” Pecile originally joined the Whitecaps FC BMO Academy System in August of 2015. In his 56 appearances, the midfielder scored 20 goals. He could play a vital part for the Whitecaps turnaround in 2020 after missing the MLS Cup Playoffs a year ago. MLS, Major League Soccer
cc/2021-04/en_head_0031.json.gz/line2133
__label__cc
0.654347
0.345653
SCG News News from the Network Global Spin 12,000+ Attorneys SCG Legal is a worldwide network of 117 independent law firms. Founded in 1989 and now ranked in Chambers Global as well as in Canada and Asia Pacific, the network includes firms—70% of which are Chambers ranked with Chambers-ranked attorneys in the balance—that house legal, regulatory and, in many countries, public policy practices. Members serve clients in major commercial centers and capitals in more than 60 countries, every U.S. state capital city including Chicago, Los Angeles, New York City and the District of Columbia. Firms in the network are unified by a culture of premier legal practices and industry leadership; an elevated dedication to client service and responsiveness; a commitment to diversity and inclusion; and a devotion to transparent, innovative and fair billing practices. Carefully curated over the past 30 years and now comprising more than 12,000 attorneys—many of whom are corporate and community leaders in their home jurisdictions—SCG Legal’s network has the global reach, resources and influence to quickly mobilize teams that drive value and assist clients with matters of all sizes, including ‘bet the company’ representations, for a wide variety legal matters involving complex litigation, restructurings, employment issues, M&A deals, corporate transactions and more. As a worldwide community of mainly regional firms, SCG Legal enables its members to serve clients through a trusted referral network of experienced and politically connected attorneys and professionals that includes former government officials such as ministers, members of congress, governors, mayors, attorneys general and legislative and administrative agency leaders. Consequently, the network has earned global esteem by consistently representing many of the world’s leading companies, organizations and startups in a wide range of economic, political and regulatory matters across more than 100 jurisdictions … while offering the kind of personal attention larger global firms often promise—but can seldom deliver—and typically at far more reasonable billing rates. SCG Legal’s network is unified by premier legal practices, industry leadership and collegiality. This bond uniquely positions member firms to provide accurate and comprehensive information about activities in major commercial centers and capitals around the world, anticipating and proactively addressing shifts in international legal and regulatory landscapes on a daily basis to help advocate for clients on matters with local, regional and global impact. Dynamic collaboration is a hallmark of SCG Legal, ensuring member firms attract and retain clients from a wide variety of industries through partnering opportunities that offer more value and a full suite of international services. No matter where a client’s interests reach—on Earth, in our galaxy or beyond—members can provide the strategic resources necessary to navigate any legal challenge. This reality is constantly reinforced through SCG Legal’s robust, relevant and timely resource offerings, which enable attorneys and legal professionals to stay up-to-date through training programs, practice and industry group committees, regional teams, topical webinars, breaking news alerts and more. Carefully curated over the past 30 years and now comprising more than 12,000 attorneys—many of whom are corporate and community leaders in their home jurisdictions—SCG Legal’s network has the global reach, resources and influence to quickly mobilize teams that drive value and assist clients with matters of all sizes, including ‘bet the company’ representations, for a wide variety of legal matters involving complex litigation, restructurings, employment issues, M&A deals, corporate transactions and more. Alina A. Gorokhovsky, CEO | agorokhovsky@scglegal.com Diane B. Case, Director of Operations | dcase@scglegal.com Asia & Pacific Rim 2,800 attorneys | 12 firms | 79 offices Fueled by significant growth, the Asian & Pacific Rim economies have expanded into the largest in the world. As the region continues to change and government agencies implement new laws and regulations, it will be increasingly important that companies bring in experienced counsel with significant regional resources and local political connections to ensure new policies and procedures do not endanger investments and deals focused on the development, production and purchase of products and services. SCG Legal’s member firms collaborate across all jurisdictions, which enables the development of effective client-focused teams to ensure companies achieve their objectives. With leading attorneys in each country—Australia, Beijing, Hong Kong, Shanghai, India, Japan, New Zealand, Singapore, Taiwan, Thailand, Vietnam—SCG Legal’s network represents some of the most sophisticated companies and business groups, including high-tech, electronics, life sciences, health care, transportation, manufacturing, chemical, raw materials and energy, in nearly every significant regulated and unregulated industry in the region. 40 attorneys | 3 firms | 7 offices SCG Legal’s member firms in Africa are located in I Kenya, Nigeria and South Africa. These firms represent clients with some of the largest and most complex deals, projects, developments and investments in their respective countries. They provide legal and strategic advice as well as important local connections and knowledge to help clients maximize opportunities for their business interests. International clients also benefit from each firm’s significant intelligence and experience related to the laws, regulations, cultures and customs fundamental to each country. 600 attorneys | 9 firms | 17 offices SCG Legal is noted globally as one of Canada’s leading law firm networks and is the only network in the country with independent firms in nine of the ten provinces: Alberta, British Columbia, Manitoba, New Brunswick, Newfoundland, Nova Scotia, Ontario, Quebec and Saskatchewan and representation in all three territories: Northwest Territories, Nunavut and Yukon. These member firms have been providing strategic legal counsel to some of the largest Canadian and international companies for more than 100 years. Eight of the nine firms are Chambers ranked across a diverse group of practices. Canada’s member firms consistently work together to provide a comprehensive range of legal, regulatory and public policy services to corporations of varying sizes, academic institutions, governments, Indigenous peoples and other organizations in corporate and commercial matters, litigation and dispute resolution and issues involving labor and employment, insurance, intellectual property and emerging technology, energy, construction, education, tax, real estate, privacy, professional regulatory, health and medical malpractice. In Europe, SCG Legal’s network includes independent firms in almost every country. These firms, including 18 Chambers ranked across a diverse group of practices, represent many of the largest international and domestic clients in their respective countries. Member firms are able to offer sound, cost-efficient guidance through the interconnected policies and regulations of the European Union while also providing critical insights into the very different realities of operating in individual countries. Consequently, these firms proactively and seamlessly collaborate to help clients meet complex legal objectives through matters ranging from competition/antitrust, corporate, M&A, data privacy and employment to finance, restructurings, bankruptcies, commercial litigation, international arbitration and real estate as well as a wide range of regulatory matters. 920 attorneys | 18 firms | 40 offices Latin America has grown into one of the most diverse and complex regions in which to do business and SCG Legal’s network has matched its stride. Member firms, representing clients across more than 40 offices, have a long and successful history of counseling on matters ranging from manufacturing, hospitality and leisure, telecom, technology, life sciences, natural resources and international trade to dispute resolution, M&A, tax, public policy and regulations. Attorneys and policy professionals leverage their global insights and local knowledge of political, legislative, business and cultural practices to advance client business objectives throughout the region and beyond. 5,500 attorneys | 52 firms | 252 offices SCG Legal was founded in the U.S. in 1989 by the governors of 17 American states. The organization began with the premise that clients would be best served by lawyers who not only knew the law but were also familiar with how and by whom it was made. This point of view ultimately led the founders to locate and associate with law firms in their respective state capitals and major commercial centers. As the network expanded domestically and internationally—eventually connecting every state and more than 60 countries—the founders consistently partnered with firms that matched their vision for strategic and collaborative practice management as well as innovation in the practice of law and public policy. Today, in each state capital as well as Los Angeles, New York City, Chicago and the District of Columbia, firms provide legal advice in every practice of law across every industry. Most of these firms are Chambers ranked with a proven ability to deliver seamlessly integrated government relations campaigns that positively impact business outcomes for clients around the world. They help clients with public procurement efforts, influence key decision-makers in government through meaningful engagement and protect their brands and reputations. They also provide day-to-day regulatory counsel, bipartisan public advocacy strategy and critical ‘on the ground’ support at the local, state and federal levels. U.S. member firms offer incredible client value through the knowledge and experience of numerous former public officials as well the most skilled and seasoned attorneys and professionals in the nation. Their long-standing relationships within local and regional communities provide strategic and competitive advantages regardless of business focus, and through partnering with other firms in the network they can leverage long-established, highly credible reputations with government officials, financial institutions and other intermediaries to help domestic and international clients identify business opportunities, remain at the forefront of industry impact, overcome challenges quickly and move swiftly and smoothly through government approval processes. SCG Legal is a global network of primarily full-service firms offering legal, regulatory, government relationship and business strategy solutions to corporate, individual and nonprofit clients around the world. Member firms are led by attorneys who have been educated through the most elite law schools and many have also trained and/or are certified as public accountants, tax agents, public economists, patent agents, engineers and entrepreneurs among many other skilled professions. This depth and breadth of knowledge coupled with an unwavering commitment to excellent service enables these firms to assist clients with increasingly complicated, often multinational legal and regulatory challenges as well as everyday business matters. Collaboration and communication across SCG Legal’s global network are enhanced on a daily basis through integrated practice and industry groups. Member firms are constantly building on and benefitting from trust-based partnerships that span decades, sharing knowhow, best practices, templates and other resources. They also join together to co-host receptions, webinars, workshops and seminars for clients as well as for the entire SCG Legal member community. The mission of SCG Legal is to build a trusted global network of independent law firms that thrives on proactive collaboration to address client needs around the world through a unified culture of premier legal practices, industry leadership, elevated client service, a commitment to diversity and inclusion and a devotion to transparent and fair billing practices. The network’s leadership is committed to consistently enhancing the organization’s value by actively seeking feedback from its member firms and their clients. Current member benefits include but are not limited to the following. Global reach through the foremost attorneys in more than 60 countries. Access to decision-makers in every capital city and major commercial city center around the world. Multijurisdictional legal, regulatory and public policy counsel with high-quality client service and consistency in billing. Client teams assembled to seamlessly deliver coordinated, strategic and cost-effective solutions for litigation, transactional and regulatory matters. Coordinated and effective regional legal services and business development activities. Regional retreats, networking events and annual member conference as well as a member-only mid-year meeting and numerous virtual professional and personal development opportunities. Dynamic support—locally, regionally, globally and online—through resources such as shared best practices; verified templates; practice management tools; marketing, business development and branding tool kits; client service and value tools; and technology. For more than three decades, SCG Legal has been a global institution, highly respected among many of the world’s largest companies, business groups and associations. SCG Legal’s member firms are shaping legal, policy and regulatory landscapes in their local communities and countries as well as around the world, helping to write the laws, rules and regulations for what comes next. These firms—90% of which have been members for more than 20 years—have long-standing and institutionalized relationships with each other as well as with the clients that have retained them to help navigate business as it expands beyond defined borders. United by SCG Legal, member firms are anticipating and proactively addressing shifts in the international legal and regulatory landscapes on a daily basis. Our attorneys and professionals are uniquely positioned to provide accurate and comprehensive information about activities in capital and commercial cities around the world. Members stay up-to-date through ongoing joint training programs, regional and client team calls, webinars, newsletters, alerts and use of SCG’s global resource centers. Thaddeus “Thad” Morgan, Chairman Fraser Trebilcock (Michigan) Kelley Duke, Vice Chairman Ireland Stapleton Pryor & Pascoe (Colorado) Mark Dunphy, Secretary Hall & Wilcox (Melbourne, Australia) Paul B. Plunkett, Treasurer Larkin Hoffman (Minnesota) Thomas Bähler, Kellerhals Carrard (Switzerland) Kenneth Baldwin, Robinson+Cole (Connecticut) Lisa Borsook, WeirFoulds (Ontario, Canada) Celeste Bruce, Rifkin Weiner Livingston (Maryland) Erika Carrasco, Field Law (Alberta, Canada) Robert N. Clarke, Jr., Ausley McMullen (Florida) Fabio Guzmán Saladin, Guzmán Ariza (Dominican Republic) Stephan Menzemer, GvW Graf von Westphalen (Germany) Cristina Sánchez Vebber, Sánchez Devanny (Mexico) Steve Tugend, Kegler Brown Hill + Ritter (Ohio) Alice van der Schee, Van Benthem & Keulen (Netherlands) Given its proven thought leadership in the global legal industry, SCG Legal launched a Diversity and Inclusion program in January 2020, which resulted in all member firms adopting the policy below. The SCG Legal network is committed to fostering among its member firms an environment where Diversity and Inclusion are encouraged, and to facilitate each member firm’s reputation for excellence, experience and connection not only in the jurisdictions in which they operate but across jurisdictions as they collaborate with one another to support their respective clients. In furtherance of those objectives, SCG Legal encourages its member firms to institute and implement policies to promote Diversity and Inclusion in the profession and at their respective firms. As a global network invested in the success of its member firms, SCG Legal’s commitment to Diversity and Inclusion extends to its professional development opportunities, the composition of its board of directors and committees and its relationships with others. #SCGThrive As an extension of the organization’s unwavering commitment to the wellness of each member fi rm’s attorneys and professionals, their family members and clients, SCG Legal launched #SCGThrive in April 2020. This initiative seeks to address eminent well-being issues inherent in the legal profession, many of which intensified as a result of the COVID-19 pandemic, and is grounded in five main pillars: Work-Life Balance, Stress Management, Authentic Connections, Healthy Habits and Mindfulness. The pillars guide a mixture of instructional webinars, proactive tool kits, practical resources and motivational activities offered regularly to support healthy, productive and balanced lives for those in or associated with the legal industry. SCG Legal F: 202 204 5220 Alina Gorokhovsky, CEO Diane Case, Director of Operations
cc/2021-04/en_head_0031.json.gz/line2134
__label__wiki
0.967932
0.967932
Ubisoft Announces Skull And Bones Reboot After Years Of No Info By Hunter Miche Jul 15, 2020 Share If you’re one of those people who has been eagerly awaiting any sort of news on Ubisoft’s pirate game Skull and Bones for the past few years, we’ve got some good and bad news. The good news, the game is still coming. The bad news, Ubisoft has announced a Skull and Bones reboot. Originally slated for a release in late 2018, Skull and Bones was inspired by the naval battles of Assassin’s Creed 4: Black Flag. It was originally supposed to branch Black Flag’s sailing into a full multiplayer game, but no real news came over the next three years. Ubisoft had big plans for the game too, even arranging a tie-in television show with Atlus Entertainment. But the Skull and Bones release date repeatedly slipped over the past few years, including being entirely absent from the Ubisoft Forward event yesterday. Currently its release date is supposedly in Ubisoft’s 2021 fiscal year, but with the company announcing the Skull and Bones reboot that date may no longer be inaccurate. There were apparently multiple different reasons for why the game is delayed, as well. Apparently, despite coming from Black Flag’s highly popular sailing system, Skull and Bones was having a difficult time carving out its own niche among Ubisoft’s other products. Ubisoft Singapore delayed the game repeatedly trying to refine its concept. Originally, a beta test for the game was supposed to take place sometime after Skull and Bones made an appearance at E3 2018, but this never happened. According to Ubisoft, the Skull and Bones reboot will apparently be moving away from the premium box model and to a more “live” game model. This means that the game will be persistent, and will gain new quests and events depending on the actions of its community. This is different from The Division in that that game, despite its updates and events, remains fairly static. While Ubisoft has cited Fortnite for how Skull and Bones gameplay will apparently be made going forward, with live storytelling and more, hopefully the game will actually be more on-track to release, whenever it does come out.
cc/2021-04/en_head_0031.json.gz/line2138
__label__cc
0.685833
0.314167
Take Two CEO Is Excited For Next-Gen Consoles By Hunter Miche Dec 15, 2020 Share Much like many other studios and publishers, Take-Two Interactive CEO Strauss Zelnick is very excited to see what next-generation consoles can do. In a recent virtual conference, Zelnick said that Take Two was trying to make the best next-gen experience it can, and we’ve already seen some Take Two on next-gen consoles. So far the publisher has released two games on the Xbox Series X and Playstation 5 in the form of NBA 2K21 and Borderlands 3, allowing them to get better graphics and resolution on consoles that are an order of magnitude more powerful than the Xbox One and Playstation 4. Zelnick said that with quicker load times, better graphics, better memory, and all of the other enhancements that both consoles bring to the table, consumers can expect better experiences with their games, which will in turn help them to buy more games. Considering the success of Take-Two with games like Grand Theft Auto and Red Dead Redemption, the former of which is making the cross-generational jump, they know all about having games go cross-generational and how successful they can be. The most evident example of Take Two on next-gen consoles is the fact that Grand Theft Auto 5 has now been ported to three different console generations, having released at the tail end of the Xbox 360 and PS3 era, made it all the way through the Xbox One and PS4 era, and now is coming to the Xbox Series X and PS5 in the future. We can definitely expect other Take Two games in the future to hold to their philosophy of better user experiences, but we don’t know what other games they plan on bringing to the Xbox Series X and Playstation 5 in the coming generation. Hopefully, anything Take Two on next-gen consoles that we end up seeing will be good and hold to that desire for better user experiences.
cc/2021-04/en_head_0031.json.gz/line2139
__label__wiki
0.804739
0.804739
Newsroom Home / Audiences / Alumni / Senior Snapshots Senior Snapshots May 1, 2017 by Office of Communications Share the post "Senior Snapshots" Final exams, balancing work and play, and living away from home for the first time are just a few of the challenges common to college life. However, the students on these pages represent some of the strongest of our graduates: the ones who faced additional hurdles—from paying for college on their own to navigating life as an immigrant to taking on colossal home life responsibilities—and rose to meet them. Cheers to them, and to the whole Class of 2017. Rutgers SEBS student Brayden Donnelly ’17. Brayden Donnelly started reaching out to School advisers nine months before he even arrived on campus. Having gone through the transfer process once before—transferring from the University of Rhode Island to Brookdale Community College—he knew he needed to get his ducks in a row if he wanted to graduate on time with a degree in environmental policy, institutions, and behavior. What he didn’t know was that his diligence would actually enable him to graduate early. A bonus of his early graduation is that he also has a head start on his career, having landed a position overseeing the design and voice of internal and external communications for a green building consulting firm. “My father is a park superintendent, so I spent my whole life in parks and camping on the weekends. My job is about taking the passion I have for the environment and bringing it to the urban age,” he says. “This is about taking my major and combining it with technical skills to communicate its importance to a wider range of people.” Rutgers SEBS student Kevin Tveter Food Science ’17. The Steadfast Son Holding a job, keeping up with extracurriculars, and building a resume are typical distractions for most college students. But Kevin Tveter had an additional responsibility, and one that could have derailed his studies: being the full-time and primary caretaker of his mother, who suffers from chronic illness. He’s responsible for her daily care, which includes everything from driving her to doctor’s appointments to grocery shopping for the household. It could have been a roadblock for him. “It’s the mental stress of worrying about your parent while you’re at school,” he says of the challenge. “But it’s also the stress of the time commitment it takes away from my studies.” Instead, Tveter rose to the challenge, choosing to live at home so he could be available to help his mom, commuting to and from campus, and ultimately graduating magna cum laude from the undergraduate food science program. “The way I cope is by accepting who I am and my challenges, and being open about them to the people around me,” he says. “I found that people more often than not respond with care, and that has enabled me to perform at the level I do.” Indeed, today he works in a lab at the Rutgers Institute for Food, Nutrition, and Health, studying the effects of grape polyphenols on metabolic syndrome. “No matter what sets Students 05 explorations Photography by John O’Boyle, Nick Romanenko, and Matt Rainey. Photography courtesy of Brayden Donnelly, Amber Betances, Breanna Robles, Ankita Gupta, and Naomi Watkins-Granville. Kevin Tveter Amber Betances Breanna Robles Granville Ankita & Bella Gupta Bra Brayden Donnelly Kevin Tveter senior snapshots discovery.rutgers.edu 06 Photography by John O’Boyle. me back, I use it as fuel to do better and persevere,” he says. “We all have obstacles. You can careen into them, but you can also get up and maneuver around them. Rutgers Students Ankita Gupta SEBS Animal Science ’17 and Mother Bela Gupta Library Science MLIS ’17 When she moved to America at age 16, Ankita Gupta, a self-described extrovert, thought her new high school wouldn’t be so different from the one she left behind in India. “My mom and I traveled a lot, so I thought it would be easy, but I had a harder time adjusting than I expected,” she says. “First, I had a hard time making friends. But the education system was different, too—in India, it’s very theoretical. Here, it’s more practical; for example, we didn’t have labs. So it was a challenge.” When she decided to come to Rutgers, she also decided to start with a clean slate. And she parlayed her love of animals—one that took root in India, where she cared for stray dogs—into an animal science major and a goal of becoming a veterinarian. Beginning in her first year, she started working in the lab, contributing to several projects and even authoring a study that’s been submitted to a peer-reviewed journal. This fall, she’ll take her pick of veterinary schools. “I had this idea that researchers are isolated in a lab all day,” she says. “But my mentors in this department showed me that I want to be a veterinarian but also pursue research as well.” This story gets even better. Mom Bela works at Rutgers as a library associate, going to graduate school part-time. Both she and Ankita graduate in May 2017. Rutgers SEBS student Naomi Watkins-Granville Biological Sciences SEBS ’17. The Mentoring Maven Naomi Watkins-Granville, biology major, always found the term “full-time student” to be ironic: “I am a full-time student,” she says, “but I’m also a 15- to 20-hour-a-week employee.” Holding down two jobs while balancing a full-time course load was rough, but this aspiring doctor let a goal-oriented philosophy guide her time: “If I needed to spend time away from the books and working, I wanted to make sure that the time I was spending away from school was going to help me in the future by being tailored to my career goals or major.” For three years—first year through junior year—she worked at a local New Brunswick hospital, and during her senior year, she landed a job at the Sea Level Research Lab in the Department of Marine and Coastal Sciences. All the while, she also worked as a biology tutor and mentor for low-income and first-generation students. By her senior year, she became the academic coach, which entailed overseeing all the biology tutors, holding office hours, hosting weekly study groups, and offering round-the-clock support in a subject many students find difficult. “I think these students just need someone to tell them they can do it—I know I did,” she says. “I struggled a lot in college but I made it. I know they have a lot of doubt being here, but to see someone who’s done it and comes from the same place as they did is really important. At the same time, it reassures me of my capabilities so I can enter my next chapter with confidence.” Rutgers SEBS student Amber Betances 4+1 Landscape Architecture ’17. Rutgers SEBS student Breanna Robles 4+1 Landscape Architecture ’17. The Trailblazers Amber Betances and Breanna Robles had just finished their junior year in the Department of Landscape Architecture when they each received an interesting email: the department was launching a new joint undergraduate and graduate program that would enable students to earn both a bachelor’s and a master’s degree in landscape architecture in five years of full-time enrollment, rather than the normal six. Would they want to apply? It didn’t take much time for them to decide the answer was yes. “We were two of three students to come from the undergraduate program into this new track,” Betances says. “There were some growing pains as we got used to the graduate-level classes, and our professors and advisers wanted a lot of feedback along the way.” Both students credit their existing relationships with faculty with helping them get through the challenges of being the first students in a new program: “We had such a great support system in each other but also in the professors,” Robles says. “We had a history with them, so it was great to be able to go into their offices and talk things out, even if we didn’t have a class with them that semester.” Editor’s Note: this article originally appeared in Explorations Spring 2017 Filed Under: Alumni, Students
cc/2021-04/en_head_0031.json.gz/line2148
__label__wiki
0.643139
0.643139
Katharina Friedla „A Naye Yidishe Heym in Nidershlezye“. Polnische Shoah-Überlebende in Wrocław (1945-1949). Eine Fallstudie Heavy fighting around 'fortress Breslau' resulted in the German surrender on May 6, 1945 and almost completely destroyed the city. The following three years saw the 'relocation' of the city's entire German population to the West. It was the beginning of the city's great transfer period, which inevitably caused the losses of homes and identity crises: it included the ‚resettlement‘ of the German inhabitants, the settlement of Poles, the forced resettlement of the Ukrainian population, the expulsion of the returned members of the German-Jewish community as well as the directed settlement of Polish Shoah survivors. Breslau became Wrocław: the city was rid of German traces, utterly Polonized and, together with the entire area of Lower Silesia, celebrated as a „recovered territory“. The Polish settlers who surged into the city immediately after the end of the war, including Polish Jewish survivors, were supposed to find a new home there. This proved to be too great a challenge under the circumstances of the immediate post-war era: Wrocław was immersed in chaos and destruction, the presence of its German inhabitants was still apparent throughout the city (at least until 1948), the reorganization of the Polish state structures as well as the political consolidation of power was only just underway. Moreover, other factors also contributed to the demolition of initial prospects that Jewish life would be established in post-war Poland. This contribution aimed to analyse and illuminate these factors at hand of the example of Wrocław. Opferkonkurrenzen. Debatten um den Völkermord an den Sinti und Roma und neue Forschungsperspektiven In 1992, the government of the Federal Republic of Germany decided to dedicate a memorial to the victims of the genocide of Sinti and Roma. The Memorial for the Sinti and Roma of Europe murdered under National Socialism by the artist Dani Karavan was inaugurated in October 2012 in the centre of Berlin, near the former Reichstag building. The planning and construction phase spanned two decades, during which many discussions addressed the significance awarded to the Nazi persecution of “gypsies” next to the Holocaust. These discussions reached an apex in a controversy enacted via media between Yehuda Bauer (then the director of the International School for Holocaust Studies in Yad Vashem) and Romani Rose (the head of the Central Council of German Sinti and Roma). This paper critically reflects the debates in light of new research results on the genocide of Sinti and Roma. Susanne Barth: The ‘Visible’ and the ‘Invisible’ Jews. A Comparative View on the Treatment of Palestinian Prisoners of War, Jewish Penitentiary Prisoners, and Inmates of the Forced Labour Camp for Jews/Auschwitz Sub-Camp in Blechhammer, 1941–1945 This paper highlights two groups of Jews, Palestinian prisoners of war and Jewish penitentiary prisoners, who remained largely ‘invisible’ within the Nazi camp system as, unlike Jewish camp inmates, they were not visibly marked by the yellow star and German authorities kept their Jewish identities secret. In the industrial camp complex of Blechhammer in Upper Silesia, Palestinian POWs, Jewish penitentiary prisoners and inmates of the forced labour camp for Jews coexisted for over a year, while three different sets of legal frameworks determined their status and respective treatment: the Geneva Conventions, the Prison Regulations for Poles and Jews and Nazi anti-Jewish legislation. Compared to the ‘visible’ inmates, the two ‘invisible’ groups had significantly higher survival rates, partly the result of their (temporary) protection from the regime’s annihilationist policy. While the workforce of all three was exhaustively exploited and food was limited, POWs and penitentiary prisoners received better medical attention and, most importantly, did not fall victim to selections for the Auschwitz death camp. However, it also became evident that their ‘invisibility’, the fact that they could not be distinguished from non-Jews, contributed to their survival.
cc/2021-04/en_head_0031.json.gz/line2153
__label__wiki
0.961273
0.961273
Vaca educator, Mike ‘Sully’ Sullivan, 63, dies – The Reporter Mike Sullivan, a former Reporter sports editor and writer who also found a calling as a longtime educator, coach and student mentor at Vacaville High School, remembered by many who knew him as selfless and having a significant impact on their lives, died Sunday with wife Kelle at his side in his Vacaville home. He was 63 and had been in failing health for some years, his son, Buck, said.Mike Sullivan, former Vacaville Reporter Sports Editor and educator. Born into an Air Force family, “Sully,” as he was affectionately known, graduated from Vacaville High in 1974. While in school, he played football, wrestled and competed in track and field. With the exception of a few short breaks, Sullivan largely lived the remainder of his life in Vacaville, his son said. Source: Vaca educator, coach, student mentor, former journalist Mike ‘Sully’ Sullivan, 63, dies – The Reporter This entry was posted in Vacaville Unified School District by lmreyes. Bookmark the permalink.
cc/2021-04/en_head_0031.json.gz/line2160
__label__cc
0.651822
0.348178
Planning Commission: Hedges Again: For the last five years, hedge, fence, and wall heights have been an issue in Santa Monica and the issue continues be a source of controversy as the City attempts to legislate a solution. Last Wednesday, September 3, the City’s Planning Commission reviewed the latest proposal by the City which, if approved by the City Council, would become a permanent ordinance on the issue. An interim hedge, fence, and wall height ordinance was adopted by the City Council in September 2005. That ordinance, according to the presentation given by City staff at the September 3 meeting, “established objective standards, increased flexibility to allow modifications, retained nonconforming fences, walls, and hedges, and established objection and appeal procedures” for neighbors who had issues with non-conforming hedges, walls, or fences. That ordinance was later extended and modified to require registration of nonconforming fences, walls, and hedges, require maintenance of hedges, and provide adjoining property owners the right to remove overhanging portions of hedges. The proposed permanent ordinance makes the interim standards permanent; contains clear standards for height limits, height measurements, and maintenance; gives flexibility for modification procedures and ornamental structures; and retains nonconforming fences, walls, and hedges. The proposed repair and replacement standards require that less than 50 percent of a nonconforming hedge, fence, or wall may be replaced over any period of time, and if 50 percent or more of one is removed, the entire fence, wall, or hedge must be made to comply. After the presentation, the Commission heard from over 20 speakers. Steve Schwartz received a round of applause after he stated, “It’s astonishing to me that the Planning Commission allows 30-foot condo complexes to go in all over the City without objection to them towering over [neighboring] buildings but has a problem potentially with allowing us to maintain a fence or hedge that is higher than the standards.” Stephanie Barbinol, like others, asked that the 50 percent language be eliminated “to allow people to repair their grandparented fences, hedges, and walls perpetually so we don’t undermine the whole arduous process we went through to get to this place tonight.” Kay Patterson emphasized like many others that an ordinance that addresses the issues with a one-size-fits-all approach wasn’t acceptable, and so any ordinance approved by the City should have conditions to consider the issue “on a case by case basis.” The Commission responded by recommending to the City Council that the 50 percent rule for nonconforming hedges, fences, and walls be removed. They also suggested that there be some absolute height limit, which should be based upon the existing heights of any adjacent structures near the non-conforming item or heights zoned for the item’s area. Commission members also felt it was important to simplify the ordinance as much as possible so it could be enforced easily. They would like very specific issues to be addressed on a case-by-case basis by the City’s code enforcement department. The Commission’s recommendations will be reviewed by the City Council in the near future.
cc/2021-04/en_head_0031.json.gz/line2163
__label__wiki
0.594796
0.594796
The Future of Airport Park: On Saturday morning, Santa Monica residents gathered at Santa Monica’s Airport Park to learn about and give feedback on the park’s future expansion and how it might affect the city. Mark Rios, who founded his own design firm in 1985, is spearheading the project. The event began with a comprehensive presentation by Rios outlining his priorities as well as three proposed plans for what the completed park might look like. The project aims to incorporate 12 acres of non-aviation land adjacent to the existing park, practically tripling its size. Rios’ primary goals are to showcase the airport’s history, avoid an overly-engineered design, and make sure the park feels like a single unit. “I want this to be a cohesive 20 acre place, as opposed to a 6 acre place, an 8 acre place, and another 6 acre place,” said Rios. He plans to unite the park with a large “runway” for pedestrians that will run along the park’s entirety, and be large enough to incorporate walkers, runners and bikers. Each of the three “schemes,” as Rios called them, was centered around adding multiple multi-purpose sports fields to the park. The primary differences between each plan were placement of roads and parking, as well as the sizes and number of fields. In each case, the majority of the park space would be allocated to an additional two or three fields. While practically everyone gathered seemed to agree that a new park was a welcome addition to Santa Monica, attitudes were mixed as to how this space would be best used. John Fairweather looks forward to seeing Santa Monica’s playing field issue solved with the addition of the new sports fields around which all of Rios’s plans are centered. “Santa Monica has a terrible shortage of playing fields,” Fairweather said. “To get onto fields, it’s kind of a bidding war. It’s very difficult. By adding the fields here, we will take the pressure out of the fields all over Santa Monica.” Lucy Tate agrees that there’s a field problem, but finds the problem to be of a different nature. “When I hear arguments of parents saying, ‘there’s not enough of these spaces,’ it’s because they’re all booked up at certain times. If we had spaces that were available at all times, you could turn up in a park, kick a football around or have fun playing frisbee. You wouldn’t need to book it,” said Tate. After Rios presented his plans for the larger Airport Park and fielded questions from his audience, community members could then visit tents to learn more about the proposed plans as well as speak further with members of the Rios Clementi Hale Studios design team. Everyone in attendance was then given a “passport,” on which they could share thoughts about each design, as well as what they would like to see in the park. Though opinions were divided, residents were given the chance to voice their thoughts, and help the park project best serve the community By mirrormmg July 1, 2016
cc/2021-04/en_head_0031.json.gz/line2164
__label__wiki
0.698038
0.698038
His artistry is a bright light during a troubling time. (Illustration by Elizabeth Wong, University of Rhode Island) Screens x August 23, 2020 Revisiting Bong Joon-ho, the Only Good Thing About 2020 As the world falls apart, we can find some solace in the works of the Korean filmmaker. Let’s take a look back at his various masterpieces. By Caleb Mullenneaux, St. Olaf College It goes without saying that 2020 has been an absolute dumpster fire of a year. But back in February there was one glorious moment: “Parasite” from Bong Joon-ho won best picture at the Oscars. Bong’s victory marked one of the rare moments when the Academy actually got it right, and the people rejoiced. Even by February the world was in serious need of relief and, in a brief glimpse of joy, we were offered Bong’s smiling face, proudly gazing down at his two Oscars as he pressed them together to make them kiss. It was wonderful. And then everything fell apart. To be honest, there is very little to be excited about right now. COVID-19 is showing no sign of stopping and, regardless of what happens in the coming election, our democracy may have taken irreversible damage. So in this moment of turmoil, I have turned to the only good thing that 2020 has had to offer: Bong Joon-ho. What separates Bong from his contemporaries is the earnest humanity in his movies. Despite their sometimes horrific imagery or subject matter, his films always feel imbued with a real sense of joy. The tone never comes off as jaded or self-important and there is something very whimsical about his characters. Perhaps this is why his pointed social critiques rarely feel preachy. Bong has become a master at creating messages that toe the line between accessible and obvious. In turn, he has become one of the most important directors working today. It’s easy to look down on best picture winners like Bong Joon-ho after the clamor of award season has passed, but make no mistake: “Parasite” is excellent. Each time I revisit it, I am astonished by how hard this movie goes. Its meticulous composition feels effortless, from the sharp pacing to the delicate balance of humor and tension. This is all to the credit of Bong as a director and the talent of the ensemble. Both families ooze with charm: the Kims in their boarish cleverness and the Parks in their delightful ignorance. This is best showcased in a scene involving a certain peach allergy in which the Kim family expertly advances their takeover of the Park home. The level of execution on display here is stunning. The dizzying strings. The hot sauce. Cho Yeo-jeong. Everything is perfect. The juxtaposed shots of Mr. Kim’s performance in the car with his son coaching him are hilarious but also serve as a master class in editing and cinematography. The scene encapsulates the heart of “Parasite” and everything that is special about Bong as a director. It is funny, thrilling and sadistic but doesn’t point blame at any one person. The Kim family is never depicted as wrong for trying to get ahead in a broken system. Even when they ruin the careers of others within their class, the audience is forced to consider what conditions create the necessity of these actions. Similarly, the Park family is painted as kind and generous despite their wealth. It would have been easy to make them cruel and unsympathetic, but instead, Bong illustrates how they are complacent in an oppressive class structure while seemingly doing nothing at all. In the end, the “parasite” is everyone: the poor to the rich; the rich to the poor. This moral ambiguity has become the foundation of Bong’s directorial ethos. He is not interested in easy villains; he’s interested in systems’ oppression. If you choose to watch “Okja” get ready to feel emotionally wrecked (and maybe never eat meat again). “Okja” was Bong Joon-ho’s second film to prominently feature English as well as Korean and was the last film he made before “Parasite.” It follows a young girl as she tries to save her pet “super pig” from the company behind it. The film works as both a delightful adventure and harrowing assessment of the meat industry. “Okja” draws from the cinematic lineage of films like “E.T.” or “Babe” and uses familiar tropes of humanized animals to push its message. But as in all his films, Bong pushes these ideas to a place that is creatively and philosophically unique. “Okja” explores issues of class and the moral failings of the meat industrial complex with humor, horror and nuance. Bong opts out of taking the easy “eating meat is bad” approach and instead offers a refined critique of the systems that uphold the separation between food and the people that eat it. The onslaught of documentaries condemning the meat industry never stopped me from eating meat. Yet somehow the film about the giant CGI pig may be what makes me change my ways for good. There are scenes in “Okja” that have been burned into my brain since watching it. Specifically, a line from Tilda Swinton’s corporate executive twin sister where she says “If it’s cheap, they’ll eat it.” Bong has no problem diving into the complexity of the situation. Through her blind arrogance, Swinton’s character illustrates how issues of poverty are inseparable from critiques of the meat industry. Lines like this show Bong’s ability to provide damning information about the institutions that we support in ways that are impossible to ignore. New Year’s Continuations Are the Much Happier Alternative to Resolutions From the anti-capitalist action thriller “Snowpiercer” to the surprisingly funny monster movie “The Host,” there are many Bong Joon-ho movies to talk about. But I would be remiss if I did not mention “Memories of Murder.” “Memories of Murder” is undoubtedly one of the best crime dramas of the last 20 years and, along with “Parasite,” stands as one of Bong’s masterpieces. The film is based on a real story in South Korea and follows three detectives as they try to track down a serial killer who has been killing young girls. Each man relies on an incomplete method of solving crime and throughout the film, they confront the fact that their flaws may be leading them to harm the lives of innocent men. 8 Festive Hallmark Films To Watch This Holiday Season In typical Bong fashion, “Memories of Murder” is not particularly concerned with the main subject matter. The film focuses more on the failings of the police and justice system and the effect on the community than on finding out who the actual murderer is. The result is a masterfully contemplative thriller that builds to a harrowing end. After the Oscars, in a since-deleted tweet, I wrote: “BONG SZN ALL 2020.” At the time, I did not consider what “BONG SZN” meant or what exactly it would be. Like most tweets, it was hasty with little thought behind it but I suppose the general gist was “good things to come.” In this sense 2020 has not been “BONG SZN.” In fact, it has been the exact opposite. But maybe “BONG SZN” has nothing to do with good omens. Maybe it has more to do with Bong’s films, rather than the joy of seeing his rewards. The unfortunate reality of “BONG SZN” is that this year has felt like living in a Bong Joon-ho movie. It feels like a dystopian tragicomedy that illustrates issues of class struggle and paranoia that arise within a broken system. Maybe this is “BONG SZN.” I can’t wait until it’s over. 5 Christmas Movies That Are So Bad, They’re Actually Pretty Good 4 Ways To Make the Most of a Socially-Distanced Holiday Season Poetry Can Provide Much Needed Comfort During the Pandemic ‘Rise of the Guardians’ Deserves a Second Chance An Introvert’s Guide To a Socially Distanced Start To College No Coronavirus Related Post-Apocalyptic Movies, Please Should We Trust in the Upcoming COVID-19 Vaccine? High School Rom-Coms You’ll Fall Head Over Heels For Has COVID-19 Killed Movie Theaters and the Cinema Experience? 8 Big Screen Movies You Need To Check Out in 2021 ‘If Anything Happens I Love You’ Shows a Senseless Reoccurring Tragedy How To Create and Maintain Realistic New Year’s Resolutions
cc/2021-04/en_head_0031.json.gz/line2167
__label__wiki
0.544144
0.544144
Login Free Essays All Companies All Writing Services Edusson.com > Are Biofuels Good or Bad? Are Biofuels Good or Bad? Most of the world’s industries are run by fuel. One of the popular sources of fuel is the fossil fuels which is a form of non-renewable energy. Fossil fuels are carbon-based fuels formed from the plants and animals that lived over 300 million years ago and deposited underneath the earth’s surface. The fuels are burned in order to release the stored chemical energy. Over 85 percent of our energy needs are met by combusting fossil fuels. Energy is important in the contemporary society as it enable us to perform the functions of the industries. Despite the importance of the fossil fuels, environmental advocates discourage citizens to significantly decrease the use of fossil fuels because it is a non-renewable source of energy and the combustion of fossil fuels emits noxious greenhouse gases and worsen the state of global warming. Scientists look for alternative sources of energy, one of which is the use of biofuels. Recently, Earthrace, a bio-fueled powerboat, circumnavigated the earth in just 60 days, 23 hours and 49 minutes and broke the existing world record. The boat was powered by biofuel throughout its voyage (NPR, 2008). Biofuel: An Alternative Source of Energy Biofuel is a form of renewable energy source derived from biomass which includes crops, animal wastes and other forms of trash converted into fuel. There are various types of biofuel such as bioethanol, biodiesel and biogas. Bioethanol is a substitute for gasoline that is derived from cereal-based crops. Biodiesel is an alternative to diesel and derived from oilseed based crops. These two are the first generation of biofuels as they are derived from materials also used for food production. Biogas, on the other hand, is a substitute for natural gas that is derived from organic waste materials which include animal and human waste (“Biofuels”, 2007). Many countries are starting to invest and utilize biofuels and ending their reliance on carbon-based fuels. The United States are significantly decreasing their consumption of fossil fuels. Nobel Prize winner Al Gore challenge the United States government to commit on the use of fossil fuels and to start investing on clean, renewable sources of energy and build competitive industries to produce more jobs at home (Neumann, 2008). Good vs Bad Biofuel The use of biofuel renders many benefits and advantages one of which is their ability to be utilize along with the fossil fuels within the existing energy systems such as car engines. Biofuels in place of fossil fuels have two main environmental benefits. First, biofuels are renewable source of energy and offer a long-term, cheap and security on energy supply. Second, biofuels largely contribute on less emission of greenhouse gases (“Biofuels”, 2007). It is clear that biofuel is the key to our problem in our energy source and to sustain the industries that needed energy in the future. Biofuel can tender ten times of the energy output than the fossil fuels and release only 25 percent of greenhouse gases compared to fossil fuels. The ethanol produced from sugar cane in Brazil is often tagged as good biofuel. Brazil already reduced their dependence on fossil fuels replacing 50 percent of petrol with ethanol and significantly reduced the oil prices. The ethanol in Brazil also helped in the development of flex fuel cars, which can run on any combination of ethanol and conventional petrol (Duffy, 2008). On the other hand, there are also some biofuel that are harmful to man and the environment. Worst performing biofuels deliver significantly less energy and largely contribute on the emission of greenhouse gases. The increased emissions are often to be indirect of use but rather on the process of production. For example, induced forest fires and clearing operations are employed to make way of the plantations for the raw materials for the biofuels. The biodiesel produced from palm oil in Indonesia is often cited as a bad biofuel. Another effect of the biofuel is that crops that are for food are now utilized for the production of biofuel. People need to replace the crops to supply and sustain food for the people. Some farmers already grow crops for biofuel production on places where they used to plant food limiting the places for agriculture. They tend to drive and expand the agricultural places in other parts of the world. The means are detrimental to the people and to the environment. This is done by burning down the forests and plowing up the grasslands that tend to release a great deal of carbon dioxide. Those actions are speculated to end up releasing huge amounts of carbon dioxide and in a 30-year span, biofuel will contribute on carbon dioxide emission twice compared to gasoline if you will add the global environmental effects (Harris, 2008). Conclusion Personally, I think biofuel is good and beneficial discovery not only for humans but for the environment as well. It is good for humans as it emits gases with lesser harmful substances that may be detrimental to human health. It also creates jobs for people who needed it. Farmers have an alternative source of income by selling their cops to the producers of biofuel. It is beneficial to household and industries as it produces energy source that is renewable and relatively cheaper than the conventional fossil fuels as energy source which is affordable and efficient. It is also tender benefits to the environment as it emits lower levels of greenhouse gases that worsen the current situation of global warming, a pressing environmental dilemma. It is a better energy source to help resolve the various problems of people in the different facets of life. References Biofuels. (2007, June 4). IGD. Retrieved April 6, 2009, from http://www. igd. com/index. asp? id=1&fid=1&sid=5&tid=48&cid=183. Duffy, G. (2008, July 28). Brazil defends Biofuel’s Merits. BBC News. Retrieved April 6, 2009, from http://news. bbc. co. uk/1/hi/business/7528323. stm. Harris, R. (2008, February 7). Study: Ethanol Worse for Climate than Gasoline. NPR. Retrieved April 6, 2009, from http://www. npr. org/templates/story/story. php? storyId=18784732. Neumann, S. (2008, July 17). Gore: Reliance on Fossil Fuels poses Threats to U. S. NPR. Retrieved April 6, 2009, from http://www. npr. org/templates/story/story. php? storyId=92635699. NPR. (2008, July 18). Biofueled Powerboat Breaks World Record. Retrieved April 6, 2009, from http://www. npr. org/templates/story/story. php? storyId=92677191. Quotes 1. Late last month, a bio-fueled powerboat named Earthrace broke a world record, circumnavigating the globe in just 60 days, 23 hours and 49 minutes. Recently, Earthrace, a bio-fueled powerboat, circumnavigated the earth in just 60 days, 23 hours and 49 minutes and broke the existing world record. The boat was powered by biofuel throughout its voyage. 2. In our case we have replaced 50% of petrol with ethanol and also it was possible to have reduced the price of fossil fuels because of the competition with ethanol. Ethanol’s strength in Brazil has undoubtedly been helped by the development of flex fuel cars, which can run on any combination of ethanol or conventional petrol. Brazil already reduced their dependence on fossil fuels replacing 50 percent of petrol with ethanol and significantly reduced the oil prices. The ethanol in Brazil also helped in the development of flex fuel cars, which can run on any combination of ethanol and conventional petrol. 3. The simplest explanation is that when we divert our corn or soybeans to fuel, if people around the world are going to continue to eat the same amount that they’re already eating, you have to replace that food somewhere else, That’s done in a significant part by burning down forests, plowing up grasslands. That releases a great deal of carbon dioxide …shows those actions end up releasing huge amounts of carbon dioxide. The study finds that over a 30-year span, biofuels end up contributing twice as much carbon dioxide to the air as that amount of gasoline would, when you add in the global effects. People need to replace the crops to supply and sustain food for the people. Some farmers already grow crops for biofuel production on places where they used to plant food limiting the places for agriculture. They tend to drive and expand the agricultural places in other parts of the world. The means are detrimental to the people and to the environment. This is done by burning down the forests and plowing up the grasslands that tend to release a great deal of carbon dioxide. Those actions are speculated to end up releasing huge amounts of carbon dioxide and in a 30-year span, biofuel will contribute on carbon dioxide emission twice compared to gasoline if you will add the global environmental effects The Concluding Rites of Sherman Alexei’s Novel Exporting Tunes and Fries: American Pop Culture Overseas Sample Essay of Edusson.com Sign Up and Get Discounts Get special prices from writing services companies Receive best offers from our partners Sign up and get discount coupons for all type of writing services According to Milgram Compulsory Military Service: Saving our Youth Twenty First Century: A New Kind of War Military Solutions to Bigotry Military Revolution in Europe GET DISCOUNT FOR We'll send you list with 100+ discounts for custom writing services from our catalogue About How it works Blog 2016 © StudyScanner. All rights reserved Your e-mail Password
cc/2021-04/en_head_0031.json.gz/line2168
__label__cc
0.583022
0.416978
Pakistan and China: Is the ‘All Weather Alliance’ Sustainable, or a Magic Carpet Mirage? Security assistance, military technology, harmonious integration Rodney W Jones Pakistan has long been a beneficiary of straightforward Chinese security assistance, and Islamabad is accustomed to relying on China as an “all-weather ally” against military pressure from India. China has placed remarkably few political demands on Pakistan for its assistance and has not thus far visibly interfered in Pakistan’s domestic affairs. China’s rise as an emerging world power is naturally seen in Pakistan, therefore, as a uniquely congenial condition supporting Pakistan’s independence, economic outlook, and regional aspirations. Pakistan is conscious that its role as a large Muslim country and its own pivotal geography are strategically valuable to China both as an intermediary with the oil-producing countries of the Middle East and as an alternate, overland route for the transport of energy supplies and commerce with countries bordering the Arabian Sea and Persian Gulf. From Pakistan’s standpoint, the mutual strategic benefits of this relationship suggest that it can be counted on to remain durable definitely. Only one other foreign relationship, that with Saudi Arabia, offers Pakistan a similar steadfastness, and Saudi assistance is not comparable with China’s in strategic security value and is somewhat more intrusive in internal affairs. China’s rise and the deepening of its relationship with Pakistan –emphasizing energy transport infrastructure – may offer further economic benefits but may also impose tradeoffs for Pakistan on its freedom of maneuver internationally and on its socio-political development that have not been foreseen or understood. What seems to be a straightforward relationship could become something of a straitjacket that constrains Pakistan’s ability to define its own future. China supplies Pakistan with military technology, may modestly enlarge Pakistan’s nuclear power program, and has invested in cellular communications. Noticeably missing in China’s approach to Pakistan thus far, however, are economic investments in Pakistani manufacturing and trading capabilities, or in the modernization of water management and agriculture, not to speak of modern education, social uplift or poverty reduction, or the rule of law – all critical areas for Pakistan’s future economic development and social capacity. This essay seeks to explore the potential benefits and also the tradeoffs and potential pitfalls for Pakistan in the ramping up of the broader Sino-Pakistani relationship. Its aim is to help clarify the ways Pakistan can attempt to manage this relationship for optimal results in national political and economic development, and modernization, as well as constructive Pakistani leadership in regional and international affairs. This essay further seeks to raise issues for discussion of how Pakistan can take charge more effectively of its destiny – utilizing the opportunities China may offer, but employing them to generate momentum for long-range solutions to national and social needs. These would certainly include a more harmonious integration of Pakistan’s social and cultural diversity, a progressive reinforcement of civil society and reduction of political and religious extremism, the nurturing of democratic political institutions and the rule of law, the promotion of equality and poverty reduction, a progressive tax system that puts a fair portion of the concentrations of landed wealth into public education and social development, and the strengthening of modern norms against gross corruption. Long-range solutions may also include a normalization of relations with India and opening of trade and investment across South Asia – including Afghanistan, prospectively reducing military confrontation and external security burdens, and permitting a more balanced allocation of national revenues and budgetary resources. This would put Pakistan in a more confident and sustainable position to finance development and investment from its own internal sources while reducing international indebtedness. Pakistan’s relationship with China, this essay suggests, will be no magic carpet that lifts Pakistan out of its chronic, roller-coaster problems. But if the benefits that relationship can provide are intelligently broadened and rationally employed, Pakistan surely will have a much better chance than without them to put its domestic house in order, improve its wider relations with neighbors, and move onto a track of economic growth that merges it with Asia’s growing prosperity. If Pakistan instead banks on China’s relationship and resources reflexively, taking them for granted as its main remedies for internal and external difficulties, it may well find they narrow Pakistan’s choices downstream.
cc/2021-04/en_head_0031.json.gz/line2171
__label__wiki
0.94594
0.94594
Sesame Street Takes on the Issue of Addiction With millions of kids living in addicted households, creators wanted to help them feel they're not alone. Creators of the iconic children's television show "Sesame Street" have never been shy about taking on difficult subjects. So it's probably no surprise that they're tackling one of the biggest issues in the country today: the addiction crisis. Fox News reports that Karli, the green and yellow-haired muppet who lives with foster parents, reveals to her friend Elmo, in a series of videos, that she's in foster care because her mother is battling addiction. She'll also be joined in those videos by Salia Woodbury, a 10-year-old California girl whose parents have been in recovery for eight years. In the segments, viewed over the summer by The Associated Press , Karli and Salia share their feelings. "Hi, it's me, Karli. I'm here with my friend Salia. Both of our parents have had the same problem, addiction," Karli says in one video. "My mom and dad told me that addiction is a sickness," Salia says. "Yeah, a sickness that makes people feel like they have to take drugs or drink alcohol to feel OK," the Muppet agrees. "My mom was having a hard time with addiction and I felt like my family was the only one going through it. But now I've met so many other kids like us." "It makes me feel like we're not alone." The show's creators wanted to address addiction because one in eight children under the age of 11 in the U.S. live in households with a parent who suffers from substance abuse. "There's nothing else out there that addresses substance abuse for young, young kids from their perspective," said Kama Einhorn, a senior content manager with The Sesame Workshop , told Fox News. Salia teaches Karli how meditation helps her and her parents cope. The show's creators also view the videos as a chance to model ways for adults to explain to kids what they're going through, and offer stragegies for kids to cope. You can find it all, including the videos, in a special section about parental addiction at Sesame Street in Communities (click here) . You can also watch the series of YouTube videos featuring Salia and Karli by clicking here . If you need help with addiction, the Substance Abuse and Mental Health Services Administration has great resources on their website (click here), inculding a 24/7 hotline for counseling and referrals. (Images: Sesame Street Workshop & Sesame Street Facebook page ) I'm a journalist who lives in Ross Township. I love to sing, bake, volunteer, watch my son play baseball and do nice things for others.
cc/2021-04/en_head_0031.json.gz/line2180
__label__wiki
0.618514
0.618514
Western PA River Washes Out Eastern Competitors What better way to honor a river than name it River of the Year. The Clarion River in northwestern Pennsylvania beat out four other rivers across the state for that designation. What better way to honor a river than name it River of the Year. The Clarion River in northwestern Pennsylvania beat out four other rivers across the state for that designation in an on-line competition, sponsored by a coalition of public and private environmental groups. To the victor go the spoils, which in this case includes a $10,000 Leadership Grant that the Western PA Conservancy will use to fund celebratory activities throughout the year. Also, the Allegheny Watershed Improvement Needs (WINS) group will work with the PA Department of Conservation and Natural Resources (DCNR) and the Pennsylvania Organization for Waterways and Rivers (POWR) to create a poster, commemorating the river's achievement. "This annual honor recognizes not only our state's wealth of rivers and streams, but also the core of dedicated folks who fight to protect them." DCNR Secretary Cindy Adams Dunn The Clarion River is a tributary of the Allegheny River and flows approximately 110 miles through Elk and Clarion counties. It's a popular spot for outdoor enthusiasts, who love it for boating and water skiing. There were a total of 14,790 votes cast in the competition, with the Clarion River receiving 5,850 votes. The, Delaware River finished second with 4,748 votes, Lackawanna River got 2,852, and Conodoguinet Creek 1,340 votes, according to a DCNR press release. Click here for more information on the River of the Year program and past and present winners. (Credit the images to Melissa Lingenfelter's personal Facebook, Interesting Pennsylvania and Beyond Facebook page for the image and Grendel Khan's picture he posted on Wikipedia.) Get Your Green Thumb Ready Rescue Dogs "Rescue" Victims of Domestic Violence Unique Pittsburgh Churches You've Gotta See Inside
cc/2021-04/en_head_0031.json.gz/line2181
__label__cc
0.506049
0.493951
Research / 2019 / Article AbstractIntroductionConclusionsConflicts of InterestAcknowledgmentsReferencesCopyright Morten Willatzen, Zhong Lin Wang, "Contact Electrification by Quantum-Mechanical Tunneling", Research, vol. 2019, Article ID 6528689, 11 pages, 2019. https://doi.org/10.34133/2019/6528689 Contact Electrification by Quantum-Mechanical Tunneling Morten Willatzen1,2 and Zhong Lin Wang1,2,3 1CAS Center for Excellence in Nanoscience, Beijing Key Laboratory of Micro-Nano Energy and Sensor, Beijing Institute of Nanoenergy and Nanosystems, Chinese Academy of Sciences, Beijing 100083, China 2School of Nanoscience and Technology, University of Chinese Academy of Sciences, Beijing 100049, China 3School of Materials Science and Engineering, Georgia Institute of Technology, Atlanta, GA 30332-0245, USA Received30 May 2019 Accepted16 Jul 2019 Published04 Aug 2019 A simple model of charge transfer by loss-less quantum-mechanical tunneling between two solids is proposed. The model is applicable to electron transport and contact electrification between e.g. a metal and a dielectric solid. Based on a one-dimensional effective-mass Hamiltonian, the tunneling transmission coefficient of electrons through a barrier from one solid to another solid is calculated analytically. The transport rate (current) of electrons is found using the Tsu-Esaki equation and accounting for different Fermi functions of the two solids. We show that the tunneling dynamics is very sensitive to the vacuum potential versus the two solids conduction-band edges and the thickness of the vacuum gap. The relevant time constants for tunneling and contact electrification, relevant for triboelectricity, can vary over several orders of magnitude when the vacuum gap changes by one order of magnitude, say, Å to Å. Coulomb repulsion between electrons on the left and right material surfaces is accounted for in the tunneling dynamics. Contact electrification has been known since ancient times but the underlying fundamental mechanism is still not known [1–10]. The role of electron transport versus ion transport for the charge transfer has been under dispute [3, 7, 11–14], and only recently did work in the group of Zhong Lin Wang [15] assert that electron transport is the dominant triboelectricity mechanism for metal-metal, metal-semiconductor, and metal-insulator systems in contact. Triboelectric charging is important to understand and control. On the one hand, it may have severe negative implications and is known to lead to explosion/fire [16], damage microelectronic components [17, 18], disturb fluid flow [19], and be able to increased friction and energy dissipation [20, 21] etc. On the other hand, since energy associated with low-frequency wave motion is abundant in nature as well as due to human activity, there is significant benefit to society in harvesting the energy in an effective way. Triboelectric nanogenerators (TENG’s) are expected to be the primary candidates for energy generation since they can be easily implemented in a vast number of electronic devices. TENGs out-compete electromagnetic generators as the latter are ineffective at harvesting low-frequency ( Hz) [22–26] wave energy from, e.g. ocean, wind, and human motion. While a classic macroscopic understanding of energy generation due to relative motion of systems of dielectric materials, through the concept of Maxwell’s electric displacement, exists to a certain extent, the physical mechanisms and properties that play a role for the electron transfer processes in nanosystems are much less explored. Electron transfer involving photons (photoelectron emission) in nanoscale contact electrification has been demonstrated experimentally [14, 27–31]. The authors recently presented a mechanism for contact electrification and photon emission in atomic systems [32] based on Einstein’s two-level system rate equations [33, 34], and in solid systems [35] using standard theory of electronic structure and optical properties of solids [36–38]. In the present work, we describe a simple loss-less electron transfer mechanism based on the Tsu-Esaki tunneling theory [39, 40] between dissimilar solids and show that the tunneling rate and contact electrification are strongly sensitive to the conduction-band edges of the two materials, the vacuum potential and the vacuum-gap thickness, and the Fermi levels. For simplicity, non-ideal processes such as charge escape from surfaces due to electric conduction of non-vacuum environment, or inside triboelectric materials, which are nonideal insulators, are neglected. 2. Carrier Concentrations and Fermi Levels Consider a structure (Figure 1) consisting of two materials denoted by subscripts (left) and (right) with conduction-band edges and , respectively. A vacuum gap of thickness exists between them and acts as a barrier (of potential ) for electron transfer. For simplicity, we shall assume an effective mass approximation for electrons and consider the effective mass to be the same, , everywhere in the structure; i.e.,where is the electron energy and Band diagram for tunneling of electrons through a vacuum gap in the absence of a Coulomb repulsion potential. (a) Left-to-right tunneling and (b) right-to-left tunneling. For a general form of the potential , a simple and frequently applied approximation to obtain the tunneling coefficient is to solve the Schrödinger equation (1) using the Wentzel-Kramers-Brillouin (WKB) approximation [41–43]. In the important case of a linear barrier potential, Gundlach [44] derived a simple expression for the tunneling coefficient. In the following, we present a matrix scheme that can be extended rather easily to any barrier potential function . We give the full details for the most important cases of a flat and a linear barrier potential. 3. Tunneling and Coulomb Effects The electron number in the left material iswhere prefactor is due to the spin degeneracy, so the number of electrons per area isHere, we have considered the interface to vacuum to be perpendicular to the axis and denote the thickness of the left material . The left material’s total volume is then and is the Fermi functionwhere is the Fermi energy of the left material, is the electron energy contribution in the presence of an electric potential in the left material, is the absolute temperature, and is the Boltzmann constant. Further, parabolic dispersion of the conduction electrons is assumed:This allows us to rewrite the electron number per area in the left material aswhere Similarly, we can write the electron number per area in the right material aswhere is the electron energy contribution in the presence of an electric potential in the right material, is the Fermi energy of the right materialand the dispersion isHere, it is tacitly assumed the thickness (), effective mass, and temperature to be the same in the two materials. Note that the electric potentials and are different due to charge separation across the vaccum gap (will be shown in the following). Further, we shall assume that the electric potential is constant () in the left (right) material. 3.1. Symmetry of the Transmission Coefficient Consider the general case with plane waves propagating to the left and right of the barrier The probability current is defined asthus the current density to the left of the barrier iswhile the current density to the right of the barrier isParticle conservation implies that the number of particles entering the material to the left of the barrier is equal to the number of particles leaving the material to the right of the barrier; i.e.,soorThe latter expression can be written is matrix form aswhere the matrix couples outgoing waves to incoming waves (scattering matrix form). DefiningandEquation (18) impliesi.e.,soSince the barrier potential is real, the system possess time-reversal symmetry, i.e., is a solution if is a solution. The time-reversed solution of Eq. (12) isThe left and right solutions are related by the same matrix, i.e.,andThus, the relationstogether yield the conditionHence, combining with (24),andand symmetry in the transmission coefficient is proved. 4. The Effect of Coulomb Repulsion As electrons are transferred from the left to the right material, the surface charge on the left material piles up according to the dynamic expressionand the electric displacement obeys the Maxwell-Poisson equationsoIn obtaining this we have tacitly assumed that charges are distributed on the surfaces in close proximity and not in the bulk part of the two materials. This assumption implies, strictly speaking, that the two materials are perfect conductors. If one or both materials are semiconductors or dielectrics, the transfered charge will likely be distributed near (but not necessarily on) the material surfaces and the electric displacement result above will be changed. We will, however, neglect this complication in the following. Since , where is the electric potential, we have in the vacuum region (),setting . This electric potential is repulsive as it opposes electron transfer between the two materials. The electron energy contribution in the presence of the Coulomb repulsion potential is therefore The effect of the Coulomb repulsion potential is that the tunneling barrier in the vacuum region shifts from a constant potential to a linearly increasing barrier potential with position . Hence, the electron transfer rate decreases as the surface charge density increases and the net transfer of electrons will stop before the Fermi levels of the two materials become equal assuming a constant temperature everywhere in the system. If the Coulomb repulsion potential is negligibly small, net transfer of electrons first stops when the Fermi levels become equal. 5. Tunneling Transmission Probability Let us derive expressions for the tunneling transmission probabilities in the absence and presence of Coulomb repulsion. 5.1. Tunneling Transmission Probability - Absence of a Coulomb Repulsion Potential Let us derive expressions for the tunneling transmission probability in the absence of Coulomb repulsion. Firstly, with reference to Figure 1 and (1), the electron envelope function iswhere Continuity of and at and yieldThe transmission probability iswhere and . 5.2. Tunneling Transmission Probability - Presence of a Coulomb Repulsion Potential The Schrödinger equation in the vacuum region accounting for Coulomb repulsion has the formwhere, with reference to Eq. (36),We note that here, and in the following, the surface charge density is a time-dependent function. This equation can be recast aswhereSettingallows rewriting Eq. (48) as Airy’s equation:for which the solution iswhere are Airy functions, and and are constants. Hence, with reference to Figure 2, the electron envelope function in the whole domain can be written aswhereLet us consider, as shown in Figure 2, that . Transport left-to-right and right-to-left can then only take place for energies (). Band diagram for tunneling of electrons through a vacuum gap in the presence of a Coulomb repulsion potential. (a) Left-to-right tunneling and (b) right-to-left tunneling. Continuity of and at and yields The transmission probability is againwhere , . By setting and solving the matrix Eq. (56) for , the transmission probability can be determined. For the reverse transmission probability, we already know that . 6. Tunneling Current We can now write down an expression for the tunneling current. Consider electrons in the left material moving to the right. The velocity component perpendicular to the interface with vacuum is so the electron (particle) current iswhere is the tunneling transmission coefficient assumed to only depend on the momentum perpendicular to the interface, is the electron density (plane wave normalized over ), and . Here, we have used that current is given by charge times velocity times density. There is also a flow from the right material to the left (of opposite sign):where so the net particle flow isThe transmission coefficients obey the conditionAbove we proved that the transmission coefficient is symmetric, i.e., The particle current density per area can then be written as Usingthe particle current density per area can be written asThen, sincewhereit follows thatand Eq. (66) can be written aswhere we introduced as the lower integration limit to reflect that tunneling is only possible above the energy of the highest conduction band edge of the two materials. Similarly, as upper integration limit, the vacuum barrier edge is introduced. This expression can be further simplified by use of the integral expressionto getwhere 7. Equation Framework We are now in a position to formulate a mathematical modeling framework for the transfer of electrons between two distinct solids separated by a vacuum gap. The charge transfer between the two solids is described by the following equations where , and are determined by use of Equations (4), (9), (57), and (71)-(72). Obviously, electron conservation in the whole structure is automatically guaranteed. 7.1. Numerical Scheme Given initial values and at time , expressions for are determined. At timewhere is chosen sufficiently small to guarantee accuracy and stability in the numerical scheme, new values are found fromfrom which updated values and are determined. The new electron tunneling current is then given by Equations (71)-(72). Further:etc. This concludes the equation framework to determine the temporal evolution of electron tunneling transfer through a vacuum gap. 8. Numerical Test Cases for Electron Transfer by Tunneling In this section, we will calculate electron transfer dynamics by tunneling through a barrier defined by a vacuum gap. The tunneling efficiency depends strongly on the value of the vacuum potential vs. the conduction band edges of the left and right solids. It also depends strongly on the thickness of the vacuum gap. 8.1. Case 1: Varying the Thickness of the Vacuum Gap and Fixing the Vacuum Potential to 2 eV We consider the following parameter values: where is the free-electron mass, Å, eV, eV, eV, the inital Fermi levels eV, eV, K, and the vacuum gap thickness is varied between 4 Å and 20 Å. In Figure 3, we show the temporal variation of the electron number (arbitrary unit) for a set of different vacuum-gap thicknesses. It’s clear that the electron transfer drops strongly with the increase of the vacuum gap thickness. Observe the small time scale. Later, we will demonstrate electron transfer on a much slower time scale for the case of a larger vacuum potential. Note that is a constant as a function of time, i.e., overall charge conservation is guaranteed. If the left and right solids initially are uncharged, the left solid becomes increasingly charged with time according toSimilarly the charge on the right solid is as a function of time . The build-up of surface charges opposes the net transfer of electrons until the net electron transfer until a quasi-equilibrium situation is established whereafter the electron densities in the left and right materials are constants. Case 1: Time dependence of the electron number in the left material as a function of time for a set of vacuum gap thicknesses . The vacuum potential is fixed to 2 eV. Other parameters are given in the main text. 8.2. Case 2: Varying the Potential of the Vacuum Barrier and Fixing the Distance between the Materials to 10 Å. Next, we examine the effect of changing the vacuum potential while fixing the vacuum-gap thickness to 10 Å. The initial Fermi levels are eV and eV. The other parameters are the same as in case 1. Again, we see (Figure 4), that the electron transfer rate drops by several orders of magnitude as the vacuum potential is increased from 3 eV to 7 eV. The initial carrier density is approximately for all vacuum potential values. The upper (lower) plots correspond to cases with and without the influence of Coulomb repulsion, respectively. The effect of Coulomb repulsion is most pronounced for the smallest potential barrier eV. Evidently, the carrier density is higher in the case with Coulomb repulsion as compared to the case without Coulomb repulsion and most noticeably at times above approximately 30 psec. Case 2: Time dependence of the electron number in the left material as a function of time for a set of potential values . The upper (lower) plot is with (without) the effect of Coulomb repulsion due to electron transfer and effective charging of the two materials. The distance between the materials is fixed to 10 Å. Other parameters are given in the main text. We then examine the effect of changing the vacuum potential between 2 eV and 5 eV while fixing the vacuum-gap thickness to 20 Å. The initial Fermi levels are again eV and eV. The other parameters are the same as in case . We see in Figure 5 that the electron transfer rate drops strongly with the increase of the vacuum potential but the time scale is considerably slower than for Cases due to the much larger vacuum-gap thickness. In this case, the final simulation time value is 0.1μsec! Case 3: Time dependence of the electron number in the left material as a function of time for a set of vacuum potential values . The distance between the materials is fixed to 20 Å. Other parameters are given in the main text. The above case studies reveal the influence of parameters such as distance between contacting materials, the Fermi levels, temperature, and effective masses. In particular, it is shown that the charge transfer rate is critically dependent on the distance (exponential decrease with increasing distance), a high Fermi level of the electron donor material and a low Fermi level of the electron acceptor material. Furthermore, a small effective mass increases the electron mobility and the tunneling transmission probability. We point to that the general trends and influence of distance and Fermi levels that our model displays are captured by experimental results [45]. Recent theoretical models for contact electrification [15, 45] also compare well to the present more detailed modeling results. It must be emphasized that the present model describes the first process of contact electrification and not the subsequent operation of a TENG mode. We refer the reader to recent work addressing TENG mode operation and power generation [46–48]. It is important to notice that our model demonstrates that the tunneling time may vary by several orders of magnitude (from picosecs to microsecs or millisecs) depending on model parameters. Therefore, for large separation of contacting materials, tunneling times can be of the same order of magnitude as typical triboelectric time constants. A simple model is proposed for electron transfer between two solids. The model effectively demonstrates tunneling of electrons through the vacuum barrier and is applicable to both metals, semiconductors, and dielectrics. We use a simple effective-mass Hamiltonian for the electronic wavefunctions to calculate the electron transmission coefficient between two solids separated by a vacuum gap. The Tsu-Esaki equation is then used to compute the dynamics of loss-less electron tunneling and contact electrification. We demonstrate in three case studies that the strength of the tunneling process is very sensitive to the relative positions of the conduction-band edges of the two solids, the vacuum gap and potential, the Fermi levels and temperature of the solids, and the electron effective mass. Coulomb repulsion between electrons on the left and right material surfaces is accounted for in the tunneling dynamics. Authors declare no conflicts of interest with regard to the publishing of this paper. Morten Willatzen acknowledges financial support from a Talent 1000 Program for Foreign Experts, China. J. Henniker, “Triboelectricity in polymers,” Nature, vol. 196, no. 474, 1962. View at: Google Scholar W. R. Harper, Contact and Frictional Dissipation, Clarendon Press, Oxford, UK, 1967. P. Shaw, “Experiments on tribo-electricity. I.—The tribo-electric series,” Proceedings of the Royal Society A, vol. 94, no. 656, p. 16, 1917. View at: Publisher Site | Google Scholar P. E. Shaw, “The electrical charges from like solids,” Nature, vol. 118, no. 2975, pp. 659-660, 1926. View at: Google Scholar P. S. H. Henry, “Survey of generation and dissipation of static electricity,” British Journal of Applied Physics, vol. 4, supplement 2, p. S6, 1953. View at: Google Scholar D. K. Davies, “Charge generation on dielectric surfaces,” Journal of Physics D: Applied Physics, vol. 2, no. 11, p. 1533, 1969. View at: Google Scholar D. A. Hays, “Contact electrification between mercury and polyethylene: Effect of surface oxidation,” The Journal of Chemical Physics, vol. 61, no. 4, p. 1455, 1974. View at: Publisher Site | Google Scholar J. Lowell and A. C. Rose-Innes, “Contact electrification,” Advances in Physics, vol. 29, no. 6, pp. 947–1023, 1980. View at: Publisher Site | Google Scholar J. Lowell and W. S. Truscott, “Triboelectrification of identical insulators. I. An experimental investigation,” Journal of Physics D: Applied Physics, vol. 19, no. 7, p. 1273, 1986. View at: Google Scholar T. Shinbrot, T. S. Komatsu, and Q. Zhao, “Spontaneous tribocharging of similar materials,” EPL (Europhysics Letters), vol. 83, no. 2, p. 24004, 2008. View at: Google Scholar H. A. Mizes, E. M. Conwell, and D. P. Salamida, “Direct observation of ion transfer in contact charging between a metal and a polymer,” Applied Physics Letters, vol. 56, no. 16, p. 1597, 1990. View at: Google Scholar J. A. Wiles, M. Fialkowski, M. R. Radowski, G. M. Whitesides, and B. A. Grzybowski, “Effects of surface modification and moisture on the rates of charge transfer between metals and organic materials,” The Journal of Physical Chemistry B, vol. 108, no. 52, pp. 20296–20302, 2004. View at: Google Scholar S. Wang, Y. Zi, Y. S. Zhou et al., “Molecular surface functionalization to enhance the power output of triboelectric nanogenerators,” Journal of Materials Chemistry A, vol. 4, no. 10, pp. 3728–3734, 2016. View at: Google Scholar H. T. Baytekin, A. Z. Patashinski, M. Branicki, B. Baytekin, S. Soh, and B. A. Grzybowski, “The mosaic of surface charge in contact electrification,” Science, vol. 333, no. 6040, pp. 308–312, 2011. View at: Publisher Site | Google Scholar C. Xu, Y. Zi, A. C. Wang et al., “On the electron-transfer mechanism in the contact-electrification effect,” Advanced Materials, vol. 30, no. 15, Article ID e1706790, 2018. View at: Google Scholar M. Glor, “Electrostatic ignition hazards in the process industry,” Journal of Electrostatics, vol. 63, no. 6–10, pp. 447–453, 2005. View at: Publisher Site | Google Scholar H. T. Baytekin, B. Baytekin, T. M. Hermans, B. Kowalczyk, and B. A. Grzybowski, “Control of surface charges by radicals as a principle of antistatic polymers protecting electronic circuitry,” Science, vol. 341, no. 6152, pp. 1368–1371, 2013. View at: Publisher Site | Google Scholar P. Tamminen, L. Ukkonen, and L. Sydänheimo, “Correlation of component human body model and charged device model qualification levels with electrical failures in electronics assembly,” Journal of Electrostatics, vol. 79, pp. 38–44, 2016. View at: Publisher Site | Google Scholar F. Salama, A. Sowinski, K. Atieh, and P. Mehrani, “Investigation of electrostatic charge distribution within the reactor wall fouling and bulk regions of a gas–solid fluidized bed,” Journal of Electrostatics, vol. 71, no. 1, pp. 21–27, 2013. View at: Publisher Site | Google Scholar T. A. L. Burgo, C. A. Silva, L. B. Balestrin, and F. Galembeck, “Friction coefficient dependence on electrostatic tribocharging,” Scientific Reports, vol. 3, no. 1, p. 2384, 2013. View at: Publisher Site | Google Scholar K. Sayfidinov, S. D. Cezan, B. Baytekin, and H. T. Baytekin, “Minimizing friction, wear, and energy losses by eliminating contact charging,” Science Advances, vol. 4, no. 11, Article ID eaau3808, 2018. View at: Publisher Site | Google Scholar Z. L. Wang, L. Lin, J. Chen, S. Niu, and Y. Zi, Triboelectric Nanogenerators, Green Energy and Technology, Springer, 2016. Z. L. Wang, “Catch wave power in floating nets,” Nature Comment, vol. 542, no. 7640, pp. 159-160, 2017. View at: Publisher Site | Google Scholar Z. L. Wang, J. Chen, and L. Lin, “Progress in triboelectric nanogenerators as a new energy technology and self-powered sensors,” Energy & Environmental Science, no. 8, pp. 2250–2282, 2015. View at: Publisher Site | Google Scholar Z. L. Wang, G. Zhu, Y. Yang, S. Wang, and C. Pan, “Progress in nanogenerators for portable electronics,” Materials Today, vol. 15, no. 12, pp. 532–534, 2012. View at: Publisher Site | Google Scholar Y. Yang, L. Lin, Y. Zhang, Q. Jing, T.-C. Hou, and Z. L. Wang, “Self-powered magnetic sensor based on a triboelectric nanogenerator,” ACS Nano, vol. 6, no. 11, pp. 10378–10383, 2012. View at: Google Scholar B. D. Terris, J. E. Stern, D. Rugar, and H. J. Mamin, “Contact electrification using force microscopy,” Physical Review Letters, vol. 63, no. 24, p. 2669, 1989. View at: Google Scholar S. Lin and T. Shao, “Bipolar charge transfer induced by water: experimental and first-principles studies,” Physical Chemistry Chemical Physics, vol. 19, no. 43, pp. 29418–29423, 2017. View at: Google Scholar M. Nonnenmachar, M. P. OBoyle, and H. K. Wickramasinghe, “Kelvin probe force microscopy,” Applied Physics Letters, vol. 58, no. 1, p. 2921, 1991. View at: Google Scholar C. Schönenberger and S. F. Alvarado, “Observation of single charge carriers by force microscopy,” Physical Review Letters, vol. 65, no. 25, p. 3162, 1990. View at: Publisher Site | Google Scholar S. Lin, L. Xu, L. Zhu, X. Chen, and Z. L. Wang, “Electron transfer in nanoscale contact electrification: photon excitation effect,” Advanced Materials, Article ID 1901418, 2019. View at: Publisher Site | Google Scholar M. Willatzen and Z. L. Wang, “Theory of contact electrification: Optical transitions in two-level systems,” Nano Energy, vol. 52, pp. 517–523, 2018. View at: Publisher Site | Google Scholar M. Willatzen, Theory of Gain in Bulk and Quantum-Well Semiconductor Lasers [Ph.D. Thesis], Niels Bohr Institute, Univ. of Copenhagen, 1993. J. J. Sakurai, Advanced Quantum Mechanics, Addison-Wesley, 1st edition, 1967. M. Willatzen and Z. L. Wang, “Quantum-mechanical model for optical transitions between solids,” Nano Energy, vol. 61, pp. 311–317, 2019. View at: Publisher Site | Google Scholar C. Kittel, Introduction to Solid State Physics, John Wiley and Sons, New York, NY, USA, 8th edition, 2005. N. W. Ashcroft and N. David Mermin, Solid State Physics, Harcourt College Publishers, Fort Worth, TX, USA, 1976. G. Bastard, Wave Mechanics Applied to Semiconductor Heterostructures, Les Editions de Physique, 1988. C. B. Duke, Tunneling in Solids, Academic Press, New York, NY, USA, 1969. R. Tsu and L. Esaki, “Tunneling in a finite superlattice,” Applied Physics Letters, vol. 22, no. 11, p. 562, 1973. View at: Publisher Site | Google Scholar B. Majkusiak, “Gate tunnel current in an MOS transistor,” IEEE Transactions on Electron Devices, vol. 37, no. 4, pp. 1087–1092, 1990. View at: Publisher Site | Google Scholar A. Messiah, Quantum Mechanics, Dover, New York, NY, USA, 2000. S. Gaziorowicz, Quantum Physics, John Wiley and Sons, New York, NY, USA, 1995. K. H. Gundlach, “Zur berechnung des tunnelstroms durch eine trapezförmige potentialstufe,” Solid-State Electronics, vol. 9, no. 10, pp. 949–957, 1966. View at: Publisher Site | Google Scholar Z. L. Wang and A. Wang, “On the origin of contact-electrification,” Materials Today, 2019. View at: Publisher Site | Google Scholar S. Niu, S. Wang, L. Lin et al., “Theoretical study of contact-mode triboelectric nanogenerators as an effective power source,” Energy & Environmental Science, vol. 6, no. 12, pp. 3576–3583, 2013. View at: Google Scholar R. D. I. G. Dharmasena, K. D. G. I. Jayawardena, C. A. Mills et al., “Triboelectric nanogenerators: providing a fundamental framework,” Energy & Environmental Science, vol. 10, no. 8, pp. 1801–1811, 2017. View at: Publisher Site | Google Scholar J. Shao, M. Willatzen, Y. Shi, and Z. L. Wang, “3D mathematical model of contact-separation and single-electrode mode triboelectric nanogenerators,” Nano Energy, vol. 60, pp. 630–640, 2019. View at: Publisher Site | Google Scholar Copyright © 2019 Morten Willatzen and Zhong Lin Wang. Exclusive licensee Science and Technology Review Publishing House. Distributed under a Creative Commons Attribution License (CC BY 4.0).
cc/2021-04/en_head_0031.json.gz/line2184
__label__wiki
0.789531
0.789531
Bethenny Frankel Wants To Sell SkinnyGirl Because Of Custody Battle — 'It's All Too Much' Her ex-husband Jason Hoppy backed her into a corner. By Star Staff, May 2, 2019 Credit: INSTARImages / Getty Images Bethenny Frankel and her ex-husband Jason Hoppy have been locked in a bitter custody battle over their daughter, Brynn, 8, for years. In the newest episode of The Real Housewives of New York City, after a heated court hearing, the star revealed that she was considering selling her SkinnyGirl businesses because there was too much on her plate. Click through the gallery to find out why Bethenny was so upset. Bethenny, 48, was crying in the back of the car on the way back from court. “Trying to keep it together. F**k that was stressful,” she said. “It’s been a really long, drawn-out process,” she admitted, explaining, “I honestly don’t know where the end is.” Jason, 48, had been making accusations that Bethenny was an unfit mother because of her behavior on the reality show and her relationship with late boyfriend Dennis Shields. He died of a drug overdose. The judge threw out Jason’s claims, but the court process was still weighing heavily on the Shark Tank judge. “Some people wanna buy my company and I might wanna do it… I need a break,” she confessed, still crying. She called her business partner Bernt Ullmann to express her qualms. “I’m realizing I’m taking on too much Bernt. We need to let some air out of the tires,” she explained. “All of the seeds that I planted years ago didn’t factor in for divorce and custody battle: a relief effort that I took on, a death,” Bethenny continued. “We need some like support and help. It’s too much. It’s all too much.” In her confessional, the mom revealed that she’s been approached by several people who want to buy SkinnyGirl. She said she wouldn’t exit the brand completely but was “just looking for ways to take some pressure off.” What do you think of Bethenny selling SkinnyGirl? Sound off in the comments! Filed under: Bethenny Frankel, Jason Hoppy, Real Housewives of New York City, RHONY, The Real Housewives of New York City The 15 Biggest ‘Real Housewives’ Feuds Of 2019 ‘RHONJ’ Star Calls Bethenny Frankel ‘Tales From The Crypt’ Bethenny Frankel Posts Photo Of Daughter Bryn Holding Her Breasts
cc/2021-04/en_head_0031.json.gz/line2185
__label__cc
0.63294
0.36706
Sterling Bennett Stories from Mexico, and other yarns About My Stories Reviews of My Two Novels How to Buy My Novels Tag: Mexican cartels Independence Movement or Just More Disorder? Posted on January 28, 2014 February 28, 2014 by sterlingbennett In which I try to make sense of what’s happening in the Mexican state of Michoacán. ~ Today I met with my writing partner, a kind, intelligent Mexican businessman and writer, who is concerned about the self-defense groups that have taken up arms in the state of Michoacán—one state away. They are called Autodefensas comunitarias—citizen defense groups. “Where do you think the weapons are coming from?” I ask. We’re talking about a lot of AK47’s—in civilian hands, presumably non-narco hands—people that have grown tired of losing their children to rape, kidnapping and murder. “And who is paying for them?” he asks. And then we talk about it for at least an hour, trying to figure it out, excluding no one, not even the CIA or other external forces. I mention that the narcos have had no trouble getting weapons—assault rifles, grenades, and even RPG’s—rocket propelled grenades. Weapons smugglers, I say, are probably indifferent to who is buying, as long as there are sales—all of which are supplied by some 1,200 U.S. gun shops and fairs along the U.S. border. The other part of the equation is the insatiable appetite for narcotics in the U.S.—which drives the whole mess. ~ From La Jornada, Jan. 27, 2014. Journalist Salvador Díaz Sánchez asks questions as well. He thinks it’s about independence from the State, and not a civil war. The State considers either possibility as unacceptable—except, ironically, when it applies to the criminal networks and their long de-facto rule of Michoacán. Dr. José Manuel Mireles Valverde is spokesperson for el Consejo General de Autodefensas y Comunitarios de Michoacán—the General Council of Community Defenders. They call him Papá Pitufo, and the authorities, or some other group, say he has a criminal record. (When I listened to an interview with him, I thought he made a lot of sense.) For years, small businesses, taxi companies, grocery stores, furniture shops, restaurants, artisans, cattlemen, growers, miners, businessmen, for years they have been victims of robbery, extortion, kidnapping, rapes, killings, extortion, and land use fees (to use their’s own land). It therefore seems logical that the money to finance AK47’s and other assault rifles comes from these businessmen in this area—which is called the Tierra Caliente, the Hot Country, south and west of Morelia. As if it were a military campaign, the movement of self-defense has been spreading across the state to Nueva Italia, La Huacana, Tomatlán, Carrillo Puerto, Aquila, Aguililla, Antúnez, Parácuaro, Tancítaro, Acahuato, Buenavista, La Ruana and Churumuco. This is the cucaracha efecto, the cockroach effect, that alarms the federal government. The formation of auto defense groups is, to some extent, imitative of older groups, like those in Cherán, Nahuátzen Cherato, Cheratillo, Urapicho, Zicuicho, Oruscato, and Ocumitzo, where for years the authorities have done little to protect the citizens, in fact were often in collusion with the criminal forces also armed with assault weapons. Now, the more recent citizen forces have decided to move on to Apatzingán, a center of commerce and important crossroads. This was the deciding moment for the federal government. To them it smelled of insurrection, and the present, incapacitated and ailing governor of Michoacán, referred to as La Momia—The Mummy—appealed to the president of Mexico for help. And so the federal Army entered Atúnez and on the governor’s instructions ended up shooting down four citizens, one an eleven-year old boy, in a confrontation with people shouting they would not disarm—according to their leader Estanislao Beltrán—until all the leaders of organized crime were arrested, in this case the organization called Caballeros Templarios. The self-defense groups actually started earlier in another part of Michoacán, in a town called Cherán, where villages took up arms to defend their forests from illegal, narco-connected loggers. But in the present case, the newspapers quickly filled with speculation. What would happen if the base—those citizens with the weapons—began to ignore the instruction from their financial backers and began to say no to Mexico’s political parties and instead proposed independence? As in earlier Cherán. Others said the federal and state government, at all levels, would prefer dealing with the Caballeros Templarios, the reigning, in-place cartel, to a democratic group with middle class supporters, and that the government feared a metamorphosis from self-defense groups to community assemblies. And so, what was the government to do? As if the question of control had not come up all the time the Templarios held free reign. At first, it appeared that the federal government supported the self-defense movement, having been lobbied by the middle class backers of these groups who wanted to protect their economic interests. But now there was the cockroach effect, and the cry went up that the self-defense groups must adhere strictly to the law, that no citizen might own an assault weapon—as if that was not what the Templarios had in spades for years and years. In one of the poorest states in Mexico, Guerrero, another similar model has been in place for 18 years. There are no leaders, the structure is horizontal, sustainable development is the goal—including citizen protection, since the government has not care to do it. To date, in Guerrero, there are twenty-four community police groups that belong to the Coordinadora Regional de Autoridades Comunitarias, CRAC, the Regional Coordinator of Community Authorities. CRAC tries avoid any connection with the government(s). Other groups are closer to the government(s), like the the UPOEG, la Unión de Pueblos y Organizaciones del Estado de Guerrero—the Union of Peoples and Organization of the State of Guerro—who have also formed to combat cartel and non-cartel robbery, kidnapping, killings and the highest incidence of poverty in Mexico. The CRAC rejects names like “self-defense groups.” Their system embraces wider, community-based projects. Local “law” recognizes the legitimacy of their police. They call themselves institutions and decisions are made in community assemblies, not in meetings with the government(s). (This is what the government(s), federal and state, fear in Michoacán.) The State (Michoacán/Mexico) tolerated, somewhat, the new self-defense groups, as long as they didn’t invade what the government perceives as its areas of power. Local, effective self-governance alarms the ineffective, uninterested, probably cartel-compromised state and federal government. The latter says it will not try to disarm the self-defense groups, as long as they stay in their “boxes,” in their municipalities and towns. What appears to be true is that the Attorney General of Mexico Jesús Murillo Karam is concerned about the cucaracha effect, and little else. Journalists feel this man really has no ideas about how to bring law and justice to the region (to all of Mexico?)—since he and his political class appear to have tolerated cartel-controlled mayhem in Michoacán at a time when there was no such governmental insistence that the Templarios with AK47’s adhere to the rule of law and turn in their weapons or follow other restrictions. Restrictions, it would seem, are reserved for the “good” citizens. ~ Summarized from the weekly Mexican magazine Proceso comes the following: The first victim of a war is the truth. What we are left with is often confusion, speculation and disinformation. What appears to be known is: 1. Michoacán is swamped with narcos from Morelia to Lázaro Cárdenas and from Zitácuaro to La Piedad—(a town about an hour from us.) 2. The federal government admits there are as many as 15,000 auto defense participants. 3. One is justified using the word “paramilitary” when referring to the self-defense groups. 4. Although self-defense groups are in at least 11 towns, they don’t necessarily control that area and they do not control their own funding or political alliances. 5. No one controls Michoacán. If anyone, it’s still the narcos that are in control. 6. There is a lot of money in the Tierra Caliente—narco and commercial. Self-defense leaders are middle class, with connections to the U.S. and financial backing there—possibly. 7. The armed citizens are locals, not outsiders. 8. This is an old problem brought about by the narcos and the indolence and stupidity of government at all levels. 9. Michoacán was always a social pressure cooker. One can assume that a lot of hotheads will join the self-defense movement. That is what the practical, if ineffective, federal government fears. (This same dynamic existed in the Mexican Revolution and the Christero War). 10. For the last ten years, locals have been giving the government intelligence on the identity and location of the narcos. But the government has not arrested them. Nor has government resolved 95% of the 990 murders committed in Michoacán in 2013. Not to mention those committed in 2012, 2011, 2010, 2009, 2008, 2007, 2006 and before. Impunity fuels the conflict. 11. Citizens have pointed out and reported the involvement of government functionaries and their families with the cartels—with little results. Response to their complaints is essential to solving the problem. 12. With no action taken by the government, everything just goes on as before. 13. There is no indication that the special federally appointed commissioner, who is to solved everything—Alfredo Castillo, has either the knowledge or the capacity to resolve any of it. His job appears to be as spinner who is charged with lessening the damage done by the conflict to President Peña Nieto’s image—and it is important to view his pronouncements with skepticism. 14. The government at the state and federal level are in conflict. President of the Republic Enrique Peña Nieto and his Secretary of the Interior Miguel Ángel Osorio Chong support the self-defense groups—or at least say they do. They want to make them into police. The ailing governor of the state opposes that. What is not clear: 1. Whether the self-defense numbers will reach 45,000 members as predicted by the bishop of the cathedral in Apatzingán, Gregorio López. 2. No one knows what roll former governors Lázaro Cárdenas Batel and Leonel Godoy and their people had in empowering the narcos in the state of Michoacán. There is, for example, still no resolution of the grenade attack on the night of the Grito—the Cry of Independence—in 2008, in the historical center of Morelia. 3. A huge amount of debt was taken on in Leonel Godoy’s state governorship. It is naive to think that the narco economy was not involved in the disappearance of that enormous sum of money. 4. Unclear is the involvement of the neighboring cartel called the Cártel Jalisco Nueva Generación (CJNG)—Jalisco New Generation—which is allied with the Cártel de Sinaloa and is at war with Los Templarios. It’s important to mention that the CJNG in Guerrero allied itself there with local auto defense groups that were fighting Los Templarios. One can assume the CJNG is not just standing by doing nothing, i.e. El Chapo Guzmán is probably involved, except one doesn’t know how, nor to what extent he holds the puppet strings. (One has to suspect that the narcos—highly skilled—are involved with any group.) 5. One of the most opaque aspects is the origin of the weapons. The self-defense people say they are hunting guns, supplied by concerned U.S. Mexicans, or taken from enemy casualties, of which there have been no more than 100. The 10,000 assault rifles estimated to be in the hands of the auto-defense groups must have cost something like 50,000,000 pesos—roughly four million dollars. 6. The big mysteries: a) The connection with Michoacán businessmen exiled to the U.S. (driven out by narcos or fear of them) that are presumably paying for the weapons, and B) the type of relationship they have with Peña Nieto’s administration. Every government wants a group that can do its dirty work for them and in order to avoid direct responsibility while they inflict a mortal wound on the narcos. 7. It’s not clear who Dr. José Manuel Mireles is, the spokesman of the auto-defense groups. He seems to have a criminal record, although that may be nothing more than disinformation. 8. The ex-governor of the state Jesús Reyna has not explained why he attended a funeral of the father of a former chief of La Familia Michoacana. ~ Recent Developments, from the newspaper La Jornada, 28. January 2014: by Arturo Cano, summarized: The government(s) suddenly jumps to life and holds a meeting in Tepalcatepec, where a few self-defense leaders signed an accord with the federal government (without consensus of the base), whereby the self-defense groups are to be converted into “defense rurales,” echoing the name given to the National Rural Police under Juárez and Porfirio Díaz. The community defense groups are to be directed by the Mexican Army and are to register themselves and their weapons. They are to be temporary. In return, they get communication equipment from the Army. (Which seems like a bargain with the Devil. Did the Army ever make the same demands of the narcos with all their weapons?) While various government officials speak official-speak, members of the audience shout out comments: “You’ve come to sign an agreement? For what, if there are no doctors, no medicine, no education. Cowards! White-collared criminals! Investigate the murders of our young people!” A woman bureaucrat speaks for the government. “You have to trust in the government again,” she counsels. The audience boos, and shouts “Get out!” She perseveres, with her “Colgate smile.” She says if the Government doesn’t follow through, she will join the self-defense groups. A man shouts, “We’re where we are right now because of people like this woman!” One of the leaders, Martín Barragán, takes the floor and says, “We should give the Government a vote of confidence.” Having dispensed with this courtesy, he continues, “They (the government) proposed a treaty that we don’t advance until we have registered and become legal. We don’t want to just clean up the townships where we are already. We want to clean up the whole state of Michoacán.” The state and federal authorities don’t move a muscle. This is precisely what they don’t want to hear. He continues, “Don’t give us any more fictitious reports of narcos shot down.” He is referring to Nazario Moreno, whom Felipe Calderón, the former President of the Republic, said they had killed and who later has turned up alive. More government-speak continues. The president’s special commissioner charged with bringing the rule of law—that was missing for a very long time before—says the self-defense groups can show even more courage by doing the brave thing by registering themselves and their weapons with the Army. (Again, a bargain with the Devil, who himself is known to be compromised by narco connections.) He talks about their common purpose and how together they should repair the “social fabric” and Mexico’s “institutions.” Another auto-defense leader says the government should recompense the families of slain auto defense fighters. Another leader reproaches the government because the narco leaders go their merry way through the countryside and townships. The crowd shouts in agreement and call out, “We want heads!” The Commissioner of the Federal Police takes a moment to announce the—miraculous and coincidental—capture of a narco leader (who shall remain unnamed) and the apprehension of 182 others. This important narco leader had already been declared dead once before. “Where is the El Muerto—the Dead Man?” someone cries out, as if that were his nickname. Only the special commissioner and a general quartered in Apatzingán have escaped booing. But an old man gets up and slowly explains, “They delivered some sicarios—killers—to this general and the next day he let them go.” Finally, another leader explains, “Sooner or later we’ll take the whole state.” ~ In Conclusion, I have to say that if the self-defense groups are anything like my barrio, there will be all kinds of internal conflicts, irrational behavior and potential violence—while the rest of us stand by and try to decide which way to jump. Posted in ~ Mexico's Struggle for DemocracyTagged AK47's, control, double standard, indifference, indolence, lack, Mexican cartels, Mexican impunity, Mexican rule of law, Mexico, Michoacán, self-defense, stupidityLeave a comment Archives Select Month October 2020 (1) February 2020 (1) November 2019 (1) September 2019 (1) August 2019 (4) March 2019 (1) September 2018 (1) June 2018 (1) May 2018 (1) April 2018 (2) March 2018 (2) February 2018 (1) January 2018 (2) November 2017 (1) October 2017 (4) August 2017 (2) May 2017 (1) February 2017 (1) July 2016 (1) June 2016 (1) April 2016 (1) March 2016 (1) January 2016 (2) December 2015 (1) October 2015 (1) September 2015 (3) August 2015 (2) July 2015 (1) June 2015 (6) May 2015 (3) April 2015 (5) March 2015 (2) February 2015 (3) January 2015 (2) December 2014 (5) November 2014 (2) October 2014 (2) September 2014 (1) August 2014 (9) July 2014 (1) June 2014 (2) May 2014 (7) April 2014 (6) March 2014 (6) February 2014 (3) January 2014 (3) December 2013 (6) November 2013 (3) October 2013 (5) September 2013 (1) August 2013 (3) July 2013 (2) June 2013 (3) May 2013 (4) April 2013 (1) March 2013 (5) February 2013 (2) January 2013 (7) December 2012 (1) November 2012 (4) October 2012 (2) September 2012 (3) August 2012 (5) July 2012 (2) June 2012 (5) May 2012 (6) April 2012 (3) March 2012 (2) February 2012 (5) January 2012 (4) December 2011 (3) October 2011 (8) September 2011 (10) August 2011 (24) July 2011 (4) June 2011 (1) April 2011 (1) A Letter from Mephistopheles to His Mother, the Snake © Sterling Bennett, resident of Guanajuato, Mexico is the author of this blog sterlingbennett.wordpress.com. According to the Berne copyright convention of 1989, the duplication of this material, without express and written permission from this blog’s author and/or owner, is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Sterling Bennnett and his blog at sterlingbennett.wordpress.com. My Log In
cc/2021-04/en_head_0031.json.gz/line2188
__label__wiki
0.884736
0.884736
Justia › US Law › US Case Law › US Supreme Court › Volume 23 › Wayman v. Southard Wayman v. Southard, 23 U.S. 1 (1825) Wayman v. Southard, 23 U.S. 10 Wheat. 1 1 (1825) Wayman v. Southard 23 U.S. (10 Wheat.) 1 Congress has, by the Constitution, exclusive authority to regulate the proceedings in the courts of the United States, and the states have no authority to control those proceedings except so far as the state process acts are adopted by Congress or by the courts of the United States under the authority of Congress. The proceedings on executions and other process in the courts of the United States in suits at common law are to be the same in each state respectively as were used in the supreme court of the state in September, 1789, subject to such alterations and additions as the said courts of the United States may make or as the Supreme Court of the United States shall prescribe by rule to the other courts. A state law regulating executions enacted subsequent to September, 1789, is not applicable to executions issuing on judgments rendered by the courts of the United States unless expressly adopted by the regulations and rules of those courts. The thirty-fourth section of the Judiciary Act of 1789, c. 20, which provides "that the laws of the several states, except . . . shall be regarded as rules of decision in trials at common law in the courts of the United States, in cases where they apply," does not apply to the process and practice of the courts. It is a mere legislative recognition of the principles of universal jurisprudence as to the operation of the lex loci. The statutes of Kentucky concerning executions, which require the plaintiff to endorse on the execution that bank notes of the Bank of Kentucky or notes of the Bank of the Commonwealth of Kentucky, will be received in payment, and, on his refusal, authorize the defendant to give a replevin bond for the debt, payable in two years, are not applicable to executions issuing on judgments rendered by the courts of the United States. The case of Palmer v. Allen, 7 Cranch 550, 2 Cond. 607, reviewed and reconciled with the present decision. Page 23 U. S. 2 This cause was certified from the Circuit Court for the District of Kentucky upon a certificate of a division of opinion between the judges of that court on several motions which occurred on a motion made by the plaintiffs to quash the marshal's return on an execution issued on a judgment obtained in that court and also to quash the replevin bond taken on the said execution for the following causes: "1. Because the marshal, in taking the replevin bond and making said return, has proceeded under the statutes of Kentucky in relation to executions, which statutes are not applicable to executions issuing on judgments in this court, but the marshal is to proceed with such executions according to the rules of the common law, as modified by acts of Congress and the rules of this court and of the Supreme Court of the United States." "2. That if the statutes of Kentucky in relation to executions are binding on this court, viz., the statute which requires the plaintiff to endorse on the execution that bank notes of the Bank of Kentucky or notes of the Bank of the Commonwealth of Kentucky will be received in payment or that the defendant may replevy the debt for two years, are in violation of the Constitution of the United States and of the State of Kentucky and void." "3. That all the statutes of Kentucky which authorize a defendant to give a replevin bond in satisfaction of a judgment or execution are unconstitutional and void." "4. Because there is no law obligatory on the said marshal which authorized or justified him in taking the said replevin bond or in making the said return on the said execution." The court below being divided in opinion on the points stated in the motion, at the request of the plaintiffs the same were ordered to be certified to this Court. Page 23 U. S. 20 ON CERTIFICATE OF DIVISION OF OPINION BETWEEN THE JUDGES OF THE CIRCUIT COURT FOR THE DISTRICT OF KENTUCKY MR. CHIEF JUSTICE MARSHALL delivered the opinion of the Court, and, after stating the case, proceeded as follows: Some preliminary objections have been made by the counsel for the defendants to the manner in which these questions are brought before the Court, which are to be disposed of before the questions themselves can be considered. It is said that the proceeding was ex parte. The law which empowers this Court to take cognizance of questions adjourned from a circuit gives jurisdiction over the single point on which the judges were divided, not over the whole cause. The inquiry, therefore, whether the parties were properly before the circuit court cannot be made at this time in this place. The defendants also insist that the judgment, the execution, and the return ought to be stated in order to enable this Court to decide the question which is adjourned. But the questions do not arise on the judgment or the execution, and so far as they depend on the return, enough of that is stated to show the court that the marshal had proceeded according to the late laws of Kentucky. In a general question respecting the obligation of these laws on the officer, it is immaterial whether he has been exact or otherwise in his observance of them. It is the principle on which the judges were divided, and that alone is referred to this Court. In arguing the first question, the plaintiffs contend that the common law, as modified by acts of Congress and the rules of this Court and of the circuit court by which the judgment was rendered, must govern the officer in all his proceedings upon executions of every description. One of the counsel for the defendants insists that Congress has no power over executions issued on judgments obtained by individuals, and that the authority of the states on this subject remains unaffected by the Constitution. That the government of the Union cannot by law regulate the conduct of its officers in the service of executions on judgments rendered in the federal courts, but that the state legislatures retain complete authority over them. The Court cannot accede to this novel construction. The Constitution concludes its enumeration of granted powers with a clause authorizing Congress to make all laws which shall be necessary and proper for carrying into execution the foregoing powers, and all other powers vested by this Constitution in the government of the United States or in any department or officer thereof. The Judicial Department is invested with jurisdiction in certain specified cases, in all which it has power to render judgment. That a power to make laws for carrying into execution all the judgments which the Judicial Department has power to pronounce is expressly conferred by this clause seems to be one of those plain propositions which reasoning cannot render plainer. The terms of the clause neither require nor admit of elucidation. The Court therefore will only say that no doubt whatever is entertained on the power of Congress over the subject. The only inquiry is how far has this power been exercised? The 13th section of the Judiciary Act of 1789, c. 20, describes the jurisdiction of the Supreme Court and grants the power to issue writs of prohibition and mandamus in certain specified cases. The 14th section enacts "That all the beforementioned courts of the United States shall have power to issue writs of scire facias, habeas corpus, and all other writs not specially provided by statute which may be necessary for the exercise of their respective jurisdictions and agreeable to the principles and usages of law." The 17th section authorizes the courts "to make all necessary rules for the orderly conducting business in the said courts," and the 18th empowers a court to suspend execution in order to give time for granting a new trial. These sections have been relied on by the counsel for the plaintiffs. The words of the 14th are understood by the Court to comprehend executions. An execution is a writ which is certainly "agreeable to the principles and usages of law." There is no reason for supposing that the general term "writs" is restrained by the words "which may be necessary for the exercise of their respective jurisdictions," to original process, or to process anterior to judgments. The jurisdiction of a court is not exhausted by the rendition of its judgment, but continues until that judgment shall be satisfied. Many questions arise on the process subsequent to the judgment in which jurisdiction is to be exercised. It is therefore no unreasonable extension of the words of the act to suppose an execution necessary for the exercise of jurisdiction. Were it even true that jurisdiction could technically be said to terminate with the judgment, an execution would be a writ necessary for the perfection of that which was previously done, and would consequently be necessary to the beneficial exercise of jurisdiction. If any doubt could exist on this subject, the 18th section, which treats of the authority of the court over its executions as actually existing, certainly implies that the power to issue them had been granted in the 14th section. The same implication is afforded by the 24th and 25th sections, both of which proceed on the idea that the power to issue writs of execution was in possession of the courts. So too, the Process Act, which was depending at the same time with the Judiciary Act, prescribes the forms of executions, but does not give a power to issue them. On the clearest principles of just construction, then, the 14th section of the Judiciary Act must be understood as giving to the courts of the Union, respectively, a power to issue executions on their judgments. But this section provides singly for issuing the writ, and prescribes no rule for the conduct of the officer while obeying its mandate. It has been contended that the 34th section of the act supplies this deficiency. That section enacts "That the laws of the several states except where the Constitution, treaties, or statutes, of the United States shall otherwise require or provide, shall be regarded as rules of decision in trials at common law in the courts of the United States in cases where they apply." This section has never, so far as is recollected, received a construction in this Court, but it has, we believe, been generally considered by gentlemen of the profession as furnishing a rule to guide the court in the formation of its judgment; not one for carrying that judgment into execution. It is "a rule of decision," and the proceedings after judgment are merely ministerial. It is, too, "a rule of decision in trials at common law;" a phrase which presents clearly to the mind the idea of litigation in court, and could never occur to a person intending to describe an execution, or proceedings after judgment, or the effect of those proceedings. It is true that if, after the service of an execution, a question respecting the legality of the proceeding should be brought before the court by a regular suit, there would be a trial at common law, and it may be said that the case provided for by the section would then occur, and that the law of the state would furnish the rule for its decision. But by the words of the section, the laws of the state furnish a rule of decision for those cases only "where they apply," and the question arises do they apply to such a case? In the solution of this question it will be necessary to inquire whether they regulate the conduct of the officer serving the execution, for it would be contrary to all principle to admit that, in the trial of a suit depending on the legality of an official act, any other law would apply than that which had been previously prescribed for the government of the officer. If the execution is governed by a different rule, then these laws do not apply to a case depending altogether on the regularity of the proceedings under the execution. If, for example, an officer take the property of A. to satisfy an execution against B., and a suit be brought by A., the question of property must depend entirely on the law of the state. But if an execution issue against A., as he supposes, irregularly, or if the officer should be supposed to act irregularly in the performance of his duty, and A. should in either case proceed against the officer, the state laws will give no rule of decision in the trial, because they do not apply to the case unless they be adopted by this section as governing executions on judgments rendered by the courts of the United States. Before we can assume that the state law applies to such a case, we must show that it governs the officer in serving the execution, and consequently its supposed application to such a case is no admissible argument in support of the proposition that it does govern the execution. That proposition, so far as it depends on the construction of the 34th section, has already been considered, and we think that, in framing it, the legislature could not have extended its views beyond the judgment of the court. The 34th section, then, has no application to the practice of the court or to the conduct of its officer in the service of an execution. The 17th section would seem, both from the context and from the particular words which have been cited as applicable to this question, to be confined to business actually transacted in court, and not to contemplate proceedings out of court. The act to "regulate processes in the courts of the United States," passed in 1789, has also been referred to. It enacts "That until further provision shall be made and except where by this act or other statutes of the United States is otherwise provided, the forms of writs and executions, except their style and modes of process, in the circuit and district courts in suits at common law shall be the same in each state respectively as are now used in the supreme courts of the same." This act, so far as respects the writ, is plainly confined to form. But form in this particular, it has been argued, has much of substance in it, because it consists of the language of the writ, which specifies precisely what the officer is to do. His duty is prescribed in the writ, and he has only to obey its mandate. This is certainly true so far as respects the object to be accomplished, but not as respects the manner of accomplishing it. In a fi. fa., for example, the officer is commanded to make of the goods and chattels of A.B. the sum of money specified in the writ, and this sum must, of course, be made by a sale. But the time and manner of the sale and the particular goods and chattels which are liable to the execution, unless, indeed, all are liable, are not prescribed. To "the forms of writs and executions" the law adds the words "and modes of process." These words must have been intended to comprehend something more than "the forms of writs and executions." We have not a right to consider them as mere tautology. They have a meaning, and ought to be allowed an operation more extensive than the preceding words. The term is applicable to writs and executions, but it is also applicable to every step taken in a cause. It indicates the progressive course of the business from its commencement to its termination, and "modes of process" may be considered as equivalent to modes or manner of proceeding. If, by the word "process," Congress had intended nothing more than a general phrase, which might comprehend every other paper issuing out of a court, the language would most probably have resembled that of the first section, where the word "processes," not "process," is used in that sense. But the introduction of the word "modes" and the change of the word "processes" for "process" seem to indicate that the word was used in its more extensive sense, as denoting progressive action -- a sense belonging to the noun in the singular number rather than in the sense in which it was used in the first section, which is appropriate to the same noun in its plural number. This construction is supported by the succeeding sentence, which is in these words: "and the forms and modes of proceedings, in causes of equity, and of admiralty, and maritime jurisdiction shall be according to the course of the civil law." The preceding sentence had adopted the forms of writs and executions and the modes of process then existing in the courts of the several states as a rule for the federal courts "in suits at common law." And this sentence adopts "the forms and modes of proceedings" of the civil law "in causes of equity and of admiralty and maritime jurisdiction." It has not, we believe, been doubted that this sentence was intended to regulate the whole course of proceeding "in causes of equity, and of admiralty and maritime jurisdiction." It would be difficult to assign a reason for the solicitude of Congress to regulate all the proceedings of the court, sitting as a court of equity or of admiralty, which would not equally require that its proceedings should be regulated when sitting as a court of common law. The two subjects were equally within the province of the legislature, equally demanded their attention, and were brought together to their view. If, then, the words making provision for each fairly admit of an equally extensive interpretation, and of one which will effect the object that seems to have been in contemplation, and which was certainly desirable, they ought to receive that interpretation. "The forms of writs and executions, and modes of process in suits at common law" and "the forms and modes of proceedings in causes of equity, and of admiralty and maritime jurisdiction" embrace the same subject, and both relate to the progress of a suit from its commencement to its close. It has been suggested that the words "in suits at common law" restrain the preceding words to proceedings between the original writ and judgment. But these words belong to "writs and execution" as well as to "modes of process," and no more limit the one than the other. As executions can issue only after a judgment, the words "in suits at common law" must apply to proceedings which take place after judgment. But the legal sense of the word "suit" adheres to the case after the rendition of the judgment, and it has been so decided. * This construction is fortified by the proviso, which is in these words: "Provided that on judgments in any of the cases aforesaid where different kinds of executions are issuable in succession, a capias ad satisfaciendum being one, the plaintiff shall have his election to take out a capias ad satisfaciendum in the first instance and be at liberty to pursue the same until a tender of the debt and costs in gold or silver shall be made." The proviso is generally intended to restrain the enacting clause and to except something which would otherwise have been within it, or, in some measure, to modify the enacting clause. The object of this proviso is to enable the creditor to take out a capias ad satisfaciendum in the first instance and to pursue it until the debt be satisfied, notwithstanding anything to the contrary in the enacting clause. It is perfectly clear that this provision is no exception from that part of the enacting clause which relates to the "forms of writs and executions," and can be an exception to that part only which relates to the "modes of process." It secures the right to elect the capias ad satisfaciendum in the first instance, where that writ was at all issuable under the law of the state, and to pursue it until the debt and costs be tendered in gold or silver. It relates to the time and circumstances under which the execution may issue, and to the conduct of the officer while in possession of the execution. These, then, are objects which Congress supposed to be reached by the words "modes of process" in the enacting clause. This law, though temporary, has been considered with some attention because the permanent law has reference to it and adopts some of its provisions. It was continued until 1792, when a perpetual act was passed on the subject. This, whether merely explanatory or also amendatory of the original act, is the law which must decide the question now before the Court. It enacts "That the forms of writs, executions, and other process except their style and the forms and modes of proceeding in suits in those of common law, shall be the same as are now used in the said courts respectively in pursuance of the act entitled 'An act to regulate processes in the courts of the United States,' except so far as may have been provided for by the act to establish the judicial courts of the United States, subject, however, to such alterations and additions as the said courts respectively shall in their discretion deem expedient or to such regulations as the Supreme Court of the United States shall think proper from time to time by rule to prescribe to any circuit or district court concerning the same." This act is drawn with more deliberation than the original act, and removes, so for as respects the question now under consideration, some doubt which might be entertained in relation to the correctness with which the act of 1789 has been construed. It distinguishes very clearly between the forms of writs and all other process of the same character and the forms and modes of proceeding in suits, and provides for both. It is impossible to confound "the forms of writs, executions, and other process," which are to be attested by a judge, and to be under the seal of the court from which they issue, with "the forms and modes of proceeding in suits." They are distinct subjects. The first describes the paper which issues from the court, and is an authority to the officer to do that which it commands; the last embraces the whole progress of the suit and every transaction in it, from its commencement to its termination, which has been already shown not to take place until the judgment shall be satisfied. It may, then, and ought to be understood as prescribing the conduct of the officer in the execution of process, that being a part of "the proceedings" in the suit. This is to conform to the law of the state as it existed in September, 1789. The act adopts the state law as it then stood, not as it might afterwards be made. A comparison of the proviso to the permanent act with that which had been introduced into the temporary act will serve to illustrate the idea that the proceedings under the execution were contemplated in the enacting clause, and supposed to be prescribed by the words "modes of process" in the one law and "modes of proceeding" in the other. The proviso to the act of 1789 authorizes the creditor to sue out a capias ad satisfaciendum in the first instance, and to continue it "until a tender of the debt in gold and silver shall be made." The proviso to the act of 1798 omits this last member of the sentence. The appraisement laws existing in some of the states authorized a debtor taken in execution to tender property in discharge of his person, and this part of the proviso shows an opinion that the enacting clause adopted this privilege, and an intention to deprive him of it. The enacting clause of the act of 1793 adopts the state law to precisely the same extent with the enacting clause of the act of 1789, and the omission of the clause in the proviso which has been mentioned leaves that part of the adopted law which allows the creditor to discharge his person by the tender of property in force. The subject was resumed in 1793 in the act, entitled "An act in addition to the act entitled an act to establish the judicial courts of the United States." The 8th section enacts "That where it is now required by the laws of any state that goods taken in execution on a writ of fieri facias shall be appraised previous to the sale thereof, it shall be lawful for the appraisers appointed under the authority of the state to appraise goods taken in execution on a fieri facias issued out of any court of the United States in the same manner as if such writ had issued out of a court held under the authority of the state, and it shall be the duty of the marshal in whose custody such goods may be to summon the appraisers in like manner as the sheriff is by the laws of the state required to summon them, . . . and if the appraisers, being duly summoned, shall fail to attend and perform the duties required of them, the marshal may proceed to sell such goods without an appraisement." This act refers to the appraisement laws of the respective states which were in force at the time of its passage, without distinguishing between those which were enacted before and those which were enacted after September, 1789. The fact, however, is understood to be that they were enacted previous to that time, generally as temporary laws, and had been continued by subsequent acts. They required, so far as they have been inspected, that appraisers should be appointed by the local tribunals to appraise the property taken in execution. Supposing laws of this description to have been adopted by the act of 1789, the regular mode of proceeding under them would have been for the courts of the United States respectively to appoint appraisers, who should perform the same duty with respect to executions issuing out of the courts of the Union as was performed by appraisers appointed under state authority with respect to executions issuing out of the courts of the state. It was unquestionably much more convenient to employ that machinery which was already in operation for such a purpose than to construct a distinct system; it was more convenient to employ the appraisers already existing in the several counties of a state than to appoint a number of new appraisers, who could not be known to the courts making such appointments. Accordingly, the section under consideration does not profess to adopt the appraisement laws of the several states, but proceeds on the idea that they were already adopted, and authorizes the officer to avail himself of the agency of those persons who had been selected by the local tribunals to appraise property taken in execution. Had these laws been supposed to derive their authority to control the proceedings of the courts of the United States not from being adopted by Congress, but from the vigor imparted to them by the state legislatures, the intervention of Congress would have been entirely unnecessary. The power which was competent to direct the appraisement was competent to appoint the appraisers. The act passed in 1800 "for the relief of persons imprisoned for debt" takes up a subject on which every state in the Union had acted previous to September, 1789. It authorizes the marshal to allow the benefit of the prison rules to those who are in custody under process issued from the courts of the United States in the same manner as it is allowed to those who are imprisoned under process issued from the courts of the respective states. Congress took up this subject in 1792, and provided for it by a temporary law which was continued from time to time until the permanent law of 1800. It is the only act to which the attention of the Court has been drawn that can countenance the opinion that the legislature did not consider the Process Act as regulating the conduct of an officer in the service of executions. It may be supposed that in adopting the state laws as furnishing the rule for proceedings in suits at common law, that rule was as applicable to writs of capias ad satisfaciendum, as of fieri facias, and that the marshal would be as much bound to allow a prisoner the benefit of the rules under the act of Congress as to sell upon the notice, and on the credit prescribed by the state laws. The suggestion is certainly entitled to consideration. But were it true that the process acts would, on correct construction, adopt the state laws which give to a debtor the benefit of the rules, this single act of superfluous legislation, which might be a precaution suggested by the delicacy of the subject, by an anxiety to insure such mitigation of the hardships of imprisonment, as the citizens of the respective states were accustomed to see, and to protect the officer from the hazard of liberating the person of an imprisoned debtor, could not countervail the arguments to be drawn from every other law passed in relation to proceedings on executions, and from the omission to pass laws which would certainly be requisite to direct the conduct of the officer if a rule was not furnished by the Process Act. But there is a distinction between the cases sufficient to justify this particular provision. The jails in which prisoners were to be confined did not belong to the government of the Union, and the privilege of using them was ceded by the several states under a compact with the United States. The jailers were state officers, and received prisoners committed under process of the courts of the United States in obedience to the laws of their respective states. Some doubt might reasonably be entertained, how far the Process Act might be understood to apply to them. The resolution of Congress under which the use of the state jails was obtained "recommended it to the legislatures of the several states to pass laws making it expressly the duty of the keepers of their jails to receive, and safe keep therein all prisoners committed under the authority of the United States, until they shall be discharged by due course of the laws thereof." The laws of the states, so far as they have been examined, conform to this resolution. Doubts might well be entertained of permitting the prisoner, under this resolution and these laws, to have the benefit of the rules. The removal of such doubts seems to have been a prudent precaution. The case of Palmer v. Allen, 7 Cranch 550, may be considered, at first sight, as supporting the opinion that the acts for regulating processes in the courts of the United States do not adopt the laws of the several states as they stood in September, 1789, as the rule by which the officers of the federal courts are to be governed in the service of process issuing out of those courts; but, upon an examination of that case, this impression will be removed. In that case, as appears from the statement of the judge who delivered the opinion of this Court, Palmer, as deputy marshal, arrested Allen on a writ sued out of the District Court of Connecticut by the United States to recover a penalty under a statute of the United States. Bail was demanded, and, not being given, Allen was committed to prison. For this commitment Allen brought an action of trespass, assault and battery, and false imprisonment in the state court. Palmer pleaded the whole matter in justification, and upon demurrer the plea was held insufficient. The judgment of the state court was brought before this Court by writ of error and was reversed, this Court being of opinion that the plea was a good bar to the action. The demurrer was sustained in the state court because, by an act of the Legislature of Connecticut, the officer serving process similar to that which was served by Palmer must, before committing the person on whom it is served to jail, obtain a mittimus from a magistrate of the state authorizing such commitment, and that court was of opinion that the act of Congress had adopted this rule so as to make it obligatory on the officer of the federal court. This Court was of opinion that the plea made out a sufficient justification, and therefore reversed the judgment of the state court. This judgment of reversal is to be sustained for several reasons, without impugning the general principle that the acts under consideration adopt the state laws as they stood in September, 1789, as giving the mode of proceeding in executing process issuing out of the courts of the United States. The act of 1792 for regulating processes in the courts of the United States enacts that "The modes of proceeding in suits in those of common law shall be the same as are now used in the said courts respectively in pursuance of the act entitled, 'An act to regulate processes in the courts of the United States.'" The endorsement of a mittimus on the writ had never been used, as appears by the opinion in the case of Palmer v. Allen, in the courts of the United States for the District of Connecticut. In connection with this fact, the provision of the act of 1792 subjects the modes of proceeding under the laws of the state "to such alterations and additions as the said courts, respectively, shall in their discretion deem expedient." The uniform course of that court from its first establishment dispensing with this mittimus may be considered as the alteration in this particular which the court was authorized by law to make. It may very well be doubted, too, whether the act of Congress which conforms the modes of proceeding in the courts of the Union to those in the several states requires the agency of state officers in any case whatever not expressly mentioned. The laws of the Union may permit such agency, but it is by no means clear that they can compel it. In the case of the appraisement laws already noticed, it was deemed necessary to pass a particular act authorizing the marshal to avail himself of the appraisers for the state, and the same law dispenses with the appraisement should they fail to attend. If the mittimus should be required by the act of Congress, it should be awarded by a judge of the United States, not by a state magistrate, in like manner as an order for bail, in doubtful cases, is endorsed by a judge of the United States in cases where the state law requires such endorsement to be made by the judge or justice of the court from which the process issues. The mittimus is a commitment for want of bail, and the magistrate who awards it decides, in doing so, that it is a case in which bail is demandable. But in the particular case of Allen, that question was decided by the law. The act of Congress (Act of 1799, c. 128. s. 65) required that bail should be given. No application to the judge was necessary. The officer was compelled to arrest the body of Allen and to detain him in custody until bail should be given. This act therefore dispenses with any order of a judge requiring bail and with a mittimus authorizing a commitment for the want of bail. The officer was obliged to detain the body of Allen in custody, and this duty was best performed by committing him to jail. These reasons operated with the court as additional to the opinion that the law of Connecticut requiring a mittimus in civil cases was, in its terms, a peculiar municipal regulation imposing a restraint on state officers, which was not adopted by the Process Act of the United States and was a provision inapplicable to the courts of the Union, a provision which could not be carried into effect according to its letter. The reasons assigned by the Court for its decision in the case of Palmer v. Allen, so far from implying an opinion that the Process Act does not adopt the laws of the several states as giving a rule to be observed by the officer in executing process issuing from the courts of the United States, recognizes the general principle and shows why that case should be taken out of its operation. So far as the Process Act adopts the state laws as regulating the modes of proceeding in suits at common law, the adoption is expressly confined to those in force in September, 1789. The act of Congress does not recognize the authority of any laws of this description which might be afterwards passed by the states. The system as it then stood is adopted, "subject, however, to such alterations and additions as the said courts respectively shall, in their discretion, deem expedient or to such regulations as the Supreme Court of the United States shall think proper from time to time, by rule to prescribe to any circuit or district court concerning the same." This provision enables the several courts of the Union to make such improvements in its forms and modes of proceeding as experience may suggest, and especially to adopt such state laws on this subject as might vary to advantage the forms and modes of proceeding which prevailed in September, 1789. The counsel for the defendants contend that this clause, if extended beyond the mere regulation of practice in the court, would be a delegation of legislative authority which Congress can never be supposed to intend and has not the power to make. But Congress has expressly enabled the courts to regulate their practice, by other laws. The 17th section of the Judiciary Act of 1789, c. 20. enacts "That all the said courts shall have power . . . to make and establish all necessary rules for the orderly conducting business in the said courts, provided such rules are not repugnant to the laws of the United States," and the 7th section of the act, "in addition to the act entitled, An act to establish the judicial courts of the United States'" (Act of 1793, ch. 22. s. 7), details more at large the powers conferred by the 17th section of the Judiciary Act. These sections give the Court full power over all matters of practice, and it is not reasonable to suppose that the Process Act was intended solely for the same object. The language is different, and the two sections last mentioned have no reference to state laws. It will not be contended that Congress can delegate to the courts or to any other tribunals powers which are strictly and exclusively legislative. But Congress may certainly delegate to others powers which the legislature may rightfully exercise itself. Without going further for examples, we will take that the legality of which the counsel for the defendants admit. The 17th section of the Judiciary Act and the 7th section of the additional act empower the courts respectively to regulate their practice. It certainly will not be contended that this might not be done by Congress. The courts, for example, may make rules directing the returning of writs and processes, the filing of declarations and other pleadings, and other things of the same description. It will not be contended that these things might not be done by the legislature without the intervention of the courts, yet it is not alleged that the power may not be conferred on the Judicial Department. The line has not been exactly drawn which separates those important subjects which must be entirely regulated by the legislature itself from those of less interest in which a general provision may be made and power given to those who are to act under such general provisions to fill up the details. To determine the character of the power given to the courts by the Process Act, we must inquire into its extent. It is expressly extended to those forms and modes of proceeding in suits at common law which were used in the state courts in September, 1789, and were adopted by that act. What, then, was adopted? We have supposed that the manner of proceeding under an execution was comprehended by the words "forms and modes of proceeding in suits" at common law. The writ commands the officer to make the money for which judgment has been rendered. This must be understood as directing a sale, and perhaps as directing a sale for ready money. But the writ is entirely silent with respect to the notice, with respect to the disposition which the officer is to make of the property between the seizure and sale, and probably with respect to several other circumstances which occur in obeying its mandate. These are provided for in the Process Act. The modes of proceeding used in the courts of the respective states are adopted for the courts of the Union, and they not only supply what is not fully expressed in the writ, but have in some respects modified the writ itself by prescribing a more indirect and circuitous mode of obeying its mandate than the officer could be justified in adopting. In some instances, the officer is permitted to leave the property with the debtor on terms prescribed by the law, and in others to sell on a prescribed credit instead of ready money. Now suppose the power to alter these modes of proceeding which the act conveys in general terms was specifically given. The execution orders the officer to make the sum mentioned in the writ out of the goods and chattels of the debtor. This is completely a legislative provision, which leaves the officer to exercise his discretion respecting the notice. That the legislature may transfer this discretion to the courts and enable them to make rules for its regulation will not, we presume, be questioned. So, with respect to the provision for leaving the property taken by the officer in the hands of the debtor till the day of sale. He may do this, independent of any legislative act, at his own peril. The law considers the property as his for the purposes of the execution. He may sell it, should it be produced, in like manner as if he had retained it in his personal custody, or may recover it, should it be withheld from him. The law makes it his duty to do that which he might do in the exercise of his discretion, and relieves him from the responsibility attendant on the exercise of discretion in a case where his course is not exactly prescribed and he deviates from that which is most direct. The power given to the court to vary the mode of proceeding in this particular is a power to vary minor regulations which are within the great outlines marked out by the legislature in directing the execution. To vary the terms on which a sale is to be made and declare whether it shall be on credit or for ready money is certainly a more important exercise of the power of regulating the conduct of the officer, but is one of the same principle. It is, in all its parts, the regulation of the conduct of the officer of the court in giving effect to its judgments. A general superintendence over this subject seems to be properly within the judicial province, and has been always so considered. It is undoubtedly proper for the legislature to prescribe the manner in which these ministerial offices shall be performed, and this duty will never be devolved on any other department without urgent reasons. But in the mode of obeying the mandate of a writ issuing from a court, so much of that which may be done by the judiciary under the authority of the legislature seems to be blended with that for which the legislature must expressly and directly provide that there is some difficulty in discerning the exact limits within which the legislature may avail itself of the agency of its courts. The difference between the departments undoubtedly is that the legislature makes, the executive executes, and the judiciary construes the law; but the maker of the law may commit something to the discretion of the other departments, and the precise boundary of this power is a subject of delicate and difficult inquiry, into which a court will not enter unnecessarily. Congress, at the introduction of the present government, was placed in a peculiar situation. A judicial system was to be prepared, not for a consolidated people, but for distinct societies, already possessing distinct systems and accustomed to laws which, though originating in the same great principles, had been variously modified. The perplexity arising from this state of things was much augmented by the circumstance that in many of the states the pressure of the moment had produced deviations from that course of administering justice between debtor and creditor which consisted not only with the spirit of the Constitution and, consequently, with the views of the government, but also with what might safely be considered as the permanent policy, as well as interest, of the states themselves. The new government could neither entirely disregard these circumstances nor consider them as permanent. In adopting the temporary mode of proceeding with executions then prevailing in the several states, it was proper to provide for that return to ancient usage, and just as well as wise principles which might be expected from those who had yielded to a supposed necessity in departing from them. Congress probably conceived that this object would be best effected by placing in the courts of the Union the power of altering the "modes of proceeding in suits at common law," which includes the modes of proceeding in the execution of their judgments, in the confidence, that in the exercise of this power, the ancient, permanent, and approved system would be adopted by the courts at least as soon as it should be restored in the several states by their respective legislatures. Congress could not have intended to give permanence to temporary laws of which it disapproved, and therefore provided for their change in the very act which adopted them. But the objection which gentlemen make to this delegation of legislative power seems to the court to be fatal to their argument. If Congress cannot invest the courts with the power of altering the modes of proceeding of their own officers in the service of executions issued on their own judgments, how will gentlemen defend a delegation of the same power to the state legislatures? The state assemblies do not constitute a legislative body for the Union. They possess no portion of that legislative power which the Constitution vests in Congress, and cannot receive it by delegation. How then will gentlemen defend their construction of the 34th section of the Judiciary Act? From this section they derive the whole obligation which they ascribe to subsequent acts of the state legislatures over the modes of proceeding in the courts of the Union. This section is unquestionably prospective as well as retrospective. It regards future as well as existing laws. If, then, it embraces the rules of practice, the modes of proceeding in suits; if it adopts future state laws to regulate the conduct of the officer in the performance of his official duties, it delegates to the state legislatures the power which the Constitution has conferred on Congress, and which, gentlemen say, is incapable of delegation. As construed by the Court, this section is the recognition of a principle of universal law -- the principles that in every forum a contract is governed by the law with a view to which it was made. But the question respecting the right of the courts to alter the modes of proceeding in suits at common law, established in the Process Act, does not arise in this case. That is not the point on which the judges at the circuit were divided and which they have adjourned to this Court. The question really adjourned is whether the laws of Kentucky respecting executions, passed subsequent to the Process Act, are applicable to executions which issue on judgments rendered by the federal courts. If they be, their applicability must be maintained either in virtue of the 34th section of the Judiciary Act or in virtue of an original inherent power in the state legislatures, independent of any act of Congress, to control the modes of proceeding in suits depending in the courts of the United States and to regulate the conduct of their officers in the service of executions issuing out of those courts. That the power claimed for the state is not given by the 34th section of the Judiciary Act has been fully stated in the preceding part of this opinion. That it has not an independent existence in the state legislatures is, we think, one of those political axioms an attempt to demonstrate which would be a waste of argument not to be excused. The proposition has not been advanced by counsel in this case, and will probably never be advanced. Its utter inadmissibility will at once present itself to the mind if we imagine an act of a state legislature for the direct and sole purpose of regulating proceedings in the courts of the Union or of their officers in executing their judgments. No gentleman, we believe, will be so extravagant as to maintain the efficacy of such an act. It seems not much less extravagant to maintain that the practice of the federal courts and the conduct of their officers can be indirectly regulated by the state legislatures by an act professing to regulate the proceedings of the state courts and the conduct of the officers who execute the process of those courts. It is a general rule that what cannot be done directly from defect of power cannot be done indirectly. The right of Congress to delegate to the courts the power of altering the modes (established by the Process Act) of proceedings in suits has been already stated, but were it otherwise, we are well satisfied that the state legislatures do not possess that power. This opinion renders it unnecessary to consider the other questions adjourned in this case. If the laws do not apply to the federal courts, no question concerning their constitutionality can arise in those courts. CERTIFICATE. This cause came on to be heard on the questions certified from the United States Court for the Seventh Circuit and District of Kentucky, and was argued by counsel, on consideration whereof this Court is of opinion that the statutes of Kentucky in relation to executions, which are referred to in the questions certified to this Court on a division of opinion of the said judges of the said circuit court are not applicable to executions which issue on judgments rendered by the courts of the United States, which is directed to be certified to the said circuit court. * Co.Litt. 291; 8 Co. 53b 23 U.S. 1
cc/2021-04/en_head_0031.json.gz/line2191
__label__cc
0.69967
0.30033
Transcript of OSIRIS-REx Targets Near-Earth Asteroid [ music ] On February 15, asteroid 2012 DA14 will pass within 22,000 miles of Earth: less than a tenth of the distance to the Moon. Although this 45-meter rock has a zero percent chance of hitting us, near-earth asteroids in general raise a number of interesting scientific questions. What makes the difference between a near-miss and an impact? How would we navigate a spacecraft around an asteroid in the future? And what can we learn from the asteroids themselves? To answer these questions, NASA is sending the OSIRIS-REx spacecraft to another near-earth asteroid designated 1999 RQ36. When it arrives in the year 2018, OSIRIS-REx will study a property called the Yarkovsky Effect, where the Sun's illumination of a rotating asteroid can change its direction over time. As the asteroid rotates, the sun heats one side of the surface. Once that side rotates away from the sun, however, it radiates the heat into space. This can act as a sort of mini-thruster that slowly changes the asteroid's direction, potentially making the difference between a near-miss and an impact. OSIRIS-REx will also study the gravitational properties of asteroids, providing useful insights for follow-up visits. Because asteroids have a small and variable gravitational pull, new techniques will need to be developed to help spacecraft approach and fly around them. Finally, OSIRIS-REx will take a direct sample of the asteroid and return it to Earth. This could perhaps yield the most interesting results of all, as 1999 RQ36 is thought to be a leftover from the formation of our solar system. By studying its composition, scientists will be looking at a snapshot of the solar system taken four-and-a-half billion years ago, one that may even hold clues to understanding our own origins. So although 2012 DA14 will miss us when it flies by in February, NASA isn't missing an opportunity to study near-earth objects, and OSIRIS-REx will provide the best results yet when it visits 1999 RQ36. [ music, sound effects ]
cc/2021-04/en_head_0031.json.gz/line2192
__label__wiki
0.756139
0.756139
John Durham Closing in on John Brennan I can only imagine what shenanigans Leftists attempt to obfuscate as the nation struggles with Coronavirus Hype. Democrats love chaos. They drop a bomb in one direction, then do their “dirty” in the other direction. Slight of chaos, at its finest. I’d love to believe that President Trump’s team can spot the tricks, but Leftists hide their dirt well. And DC remains full of accomplished swamp rats. Despite all the hoopla over the Chinese Wuhan Virus, a few things continue to progress. Like John Durham’s investigation of the Obama administration. Nevertheless, John Durham’s efforts got buried. So, it’s time we shed some good news on Americans who want to see justice done over the attempted coup of President Trump. We can begin with John Brennan. According to The Wall Street Journal, Durham has been interviewing CIA officials this year, zeroing in on those at the National Intelligence Council, a center within the Office of the Director of National Intelligence. They oversaw the collaboration between the CIA, FBI, and National Security Agency. Together, these agencies assembled the 2017 assessment, and finalized the product used to move the investigation into Russia forward. The 2017 assessment concluded with “high confidence” that Putin “ordered an influence campaign in 2016”. Further, the report determined that Russia worked to “undermine public faith” in U.S. democracy, “denigrate” former Secretary of State Hillary Clinton and “harm her electability and potential presidency,” and “developed a clear preference” for Trump. The NSA diverged on one aspect, expressing only “moderate confidence” that Putin actively tried to help Trump win and Clinton lose. Attorney General William Barr told the Wall Street Journal in an interview published Monday that Durham, the top federal prosecutor in Connecticut, was in Washington, D.C., last week working on the high-profile inquiry with staffers. “There’s some discombobulation, but part of what we’re trying to do is keep up the mission,” Barr said of the Justice Department’s commitment to proceed with criminal investigations, prioritize coronavirus-related fraud prosecutions, keep the justice system functioning amid court closures and trial suspensions, and pursue other Trump administration priorities during a deadly outbreak. Recently, Fox News reported that Durham was on pace to finish his “investigation of the investigators” by the summer. Some suggest that date may have been pushed out by the Chinese Wuhan Virus scare. But I don’t think so. Durham is reportedly reviewing Brennan’s handling of a secret source said to be close to the Kremlin. The prosecutor wants to know what role that person’s information played in the assessment. Durham is also scrutinizing Brennan in relation to British ex-spy Christopher Steele’s dossier. In particular, the prosecutor is looking for answers on whether it was used in the 2017 assessment, why former FBI Director James Comey and former FBI Deputy Director Andrew McCabe insisted upon it being part of the assessment, how allegations from the dossier ended up in the assessment’s appendix, and whether Brennan misled about the dossier’s use. Two sources utilized by Brennan to spread false information that led to the entirety of the Russian collusion farce. Brennan tweeted in order to cover his ass. One more example of Trump removing those who seek to stop his lawlessness. All Americans fed up with Trump’s incompetence, venality, & narcissism have the opportunity to “fire” him in November—the most important election of our lifetime. https://twitter.com/AP/status/1246267838941233152 … One more example of Trump removing those who seek to stop his lawlessness. All Americans fed up with Trump’s incompetence, venality, & narcissism have the opportunity to “fire” him in November—the most important election of our lifetime. https://t.co/wvpjWsnCOQ — John O. Brennan (@JohnBrennan) April 4, 2020 But according to George Papadopoulos, Brennan will soon get his mouth shut permanently. George Papadopoulos tweeted on Brennan: The walls are closing in on Brennan. The low level grunts like Alexander Downer have flipped on him. It’s only a matter of time now. — George Papadopoulos (@GeorgePapa19) April 5, 2020 Who is Alexander Downer? The Hill explains: The Australian diplomat whose tip in 2016 prompted the Russia-Trump investigation previously arranged one of the largest foreign donations to Bill and Hillary Clinton’s charitable efforts, documents show. Former Australian Foreign Minister Alexander Downer’s role in securing $25 million in aid from his country to help the Clinton Foundation fight AIDS is chronicled in decade-old government memos archived on the Australian foreign ministry’s website. To put this in perspective, the “tipster” on the Russia-Trump investigation worked to help the Clinton Foundation. And as it turns out, he and The Clinton Racketeering organization appear to have worked together to defraud the world. Still Leftists want us to believe there is no “there, there”. Thus, The Wall Street Journal reported that sources said United Kingdom authorities refused Durham’s request to interview Steele. If this is the case, who cares. DOJ Inspector General Michael Horowitz’s investigation into alleged Foreign Intelligence Surveillance Act abuses found glaring flaws in Steele’s dossier. Further, they noted the FBI’s misuse of the information to (illegally) obtain warrants to wiretap Trump campaign associate Carter Page. Yet, Steele reportedly said last month, “I stand by the integrity of our work, our sources, and what we did”. The “integrity of our work”. If they define integrity by their attempt to create a fake narrative in order to destroy Donald Trump, then integrity intact. As for cooperation with the Brits, I guarantee you that Britain will work with Trump and his assigns. Big Brother doesn’t have to ask twice. So to think that Steele wouldn’t cooperate with Durham is akin to believing the word of a crackhead brother-in-law. I’m not buying the WSJ on that one. What is certain is Durham continues his interrogations. This includes interviews of agents and analysts from the NSA and FBI. Rumors say a grand jury sits in waiting. Soon we will know a lot more about all of this. And Brennan will be the tip of the iceberg. Brennan has poked the tiger one too many times. I suspect Trump’s DOJ is building an airtight case against him.
cc/2021-04/en_head_0031.json.gz/line2195
__label__wiki
0.58713
0.58713
Celebrating Women in Sustainable Transport By Itir Sonuparlak March 8, 2012 A woman enjoys a cycle lane on Ahmedabad's Janmarg system. Photo by Meena Kadri. Today is International Women’s Day, dedicated to the economic, political and social achievements of women past, present and future. Women have made much progress in society, but there are still many injustices and inequities to tackle, especially in the realm of transportation. In 2007, for example, the Manhattan Borough President’s Office found that 86 percent of public transportation riders who said they had been sexually assaulted did not report it to the police. Granted, women are not exclusively the victims of sexual assault, but women do comprise the majority of this group. There is also a gap between what women need to be safe on public transportation and what policy and practice are willing to do. For example, a nationwide survey of transit agencies in the U.S. led by Anastasia Loukaitou-Sideris and supported by the Mineta Transportation Institute found that while two-thirds of respondents believed that women travelers have some specific needs, only one-third felt that transit agencies should really do something about it. But even worse was that only 3 percent of the agencies had any programs directed at women. (Just to note, the survey targeted general managers and the heads of security, and 75 percent of the respondents were men.) The reason women have different needs while using public transportation has everything to do with the way they use these systems. For example, a 2011 study by Stanford University shows that in 15 European countries, a greater number of women than men make multiple stops when travelling by public transportation between their home and workplace. Women also make shorter stops than men on the way to and from work in order to perform household-sustaining activities, like grocery shopping and running family errands. Having a child under the age of 5 also had an influence on whether or not women make multiple stops while using public transportation. This very fact increased the likelihood of someone making multiple stops while using public transportation. The study also found that working women in two-worker families were twice as likely as men to pick up and drop off school-age children during their commute. To address the unique needs of women while using public transportation, Loukaitou-Sideris recommends including them in the decision-making process. “Transportation planners really need to look at women’s fears in transportation settings and know that there are things that they can do to if not completely eliminate but reduce these fears,” Loukaitou-Sideris explains. “These solutions involve policy, design, policing, and outreach and education.” Empowering women to contribute to sustainable transportation greatly elevates justice, which is why the Chilean feminist group Macleta is offering its 7th series of classes aimed at teaching women how to ride bikes to help them conquer their fears and move around the city with a sense of ownership. Besides teaching women how to ride a bike, the organization uses data and information about women, their fears and their motivations, to design teaching methodologies and strategies that successfully encourage women to overcome their fears. “We believe that a bicycle, more than an end in itself, becomes a means,” said Sofía López, coordinator of Macleta. “A woman who starts to ride around on a bicycle is happier, she is more aware of the public space around her, she wants to occupy it, interact with other people… it promotes a kind of empowerment.” To commemorate women’s role in improving urban space and transportation, here are ten of our past posts on these topics. Enjoy the articles and feel free to share your views on how to incorporate women and other underrepresented groups in transportation planning in the comments section. Meet Vatsala: Portrait of an Auto-Rickshaw User Vatsala makes a living doing housework. After she wakes up, Vatsala goes to the tap to get water, takes a bath, prays, cooks the day’s meals for her family and heads to work using an auto-rickshaw. She gets two days off a month, and sometimes prefers to not take-off, especially when her schedule is very busy. Women at Higher Risk of Injury in Car Crashes According to a new study by the American Journal of Public Health, women are at a greater risk of injury or death in car crashes because of inadequate safety design in motor vehicles. Bicycles Liberate Women in Zimbabwe Jane Madembo relived her experience as a public transit and bicycle commuter in Zimbabwe. In the article, Madembo explains that public transport was scarce in the low-density, suburban areas where she had to travel for work, leaving her and other commuters to rely on inadequate and overcapacity transport methods. Honk for Saudi Women: Taking a Stand for Personal Mobility Bicycles as a Source of Income in Africa Bicycles Empower Women and Boost Economic Development in Uganda Over 200 Ugandan women met in Buhoma,Uganda to learn how to ride and repair bicycles in an effort to promote bicycling and provide economic development opportunities. Ride 4 a Woman (R4W), a nonprofit organization focused on economically and socially empowering local women living near Bwindi Impenetrable Forest National Park, and OneStreet, an international nonprofit organization working to promote bicycle- and pedestrian-friendly transit, spearheaded the project. Female Bikers as Indicator for Street Safety in Latin America Lima, Peru is a megacity with a population approaching 9 million. It is notorious for its sprawling growth, vast slums and mobility issues stemming from a spike in car ownership and cab usage beginning in the 1990s. To deal with some of the problems in the country, The World Bank provided loans through the Transport Rehabilitation Project (TRP) to improve road maintenance and mobility of the poor , specifically women, by focusing on biking. Recognizing a Woman’s Role in Sustainable Transport Today is International Women’s Day, a celebration observed since 1911 to recognize the economic, political and social achievements of women around the world. Eric Britton at World Streets wrote acommemorative piece on how “women hold the key to the future of not only sustainable transportation but also to a sustainable and just world.” Holland’s Female Walk Signs The Dutch town of Haarlem has walk and don’t walk signs that are women instead of men. We should too. CGI Live Blogging: Investing in Girls and Women…for Safer Public Transportation? Moderated by acclaimed journalist Diane Sawyer, co-anchor of Good Morning America and Primetime, the discussion agenda focused on how “every problem in the world is exacerbated by gender inequality.” The claim is that women, compared to men, lack access to education, health care, jobs and political opportunities – and those barriers are ruinous for the health of global society. However, as the panelists noted, there are success stories of women who have overcome hardship and created change in their communities, and they serve as positive examples of how educated, empowered women not only improve their own situation, but also their family life, and ultimately, society at large. Brasília, Brazil now lets women choose where to get off the bus at night Customers protest new women-only cars on São Paulo metro system Safe is accessible: Women and public transport in Latin America Is separate equal? An opinion on women’s equality in transportation Making Transport Safer for Women BRT Experience, Day 1: Women-Only Access on Metrobus Do Bikes Build a Better City? Separate But Equal: A Winning Policy for Women in Transit? Mexico City Launches Grope-Free, Women-Only Buses Tags: gender, International Women's Day, Women's Rights
cc/2021-04/en_head_0031.json.gz/line2196
__label__cc
0.700652
0.299348
E.T. (45:33) The foreign botanist with healing powers is the star of our 103rd T100P ‘cast. This movie manipulates its audience in very eye-watering ways, complete with John Williams’ soaring music. Raiders was last week, so this = back-to-back Spielbergs…and it’s a kids movie. None of that can be good for Bev, right? Hit that play button to find out, but get some Sparkplug Coffee too! Rotten Tomatoes reviews Links to: Henry Thomas and Drew Barrymore and Robert MacNaughton and Dee Wallace and Melissa Mathison Box Office Mojo’s Top 300 Adjusted For Inflation 1982 Academy Award winners and nominees Oscar acceptance speeches: Williams and Visual F/X and Sound and Sound Effects Links to: Jaws and CE3K and Raiders Of The Lost Ark and Gandhi and Jurassic Park YouTube links: “E.T. phone home” and the flying bike on Halloween and the flying bikes and Elliott says goodbye to the “dead” E.T. and “I’ll be right here” Previously on the T100P: Raiders Of The Lost Ark June 22nd on the T100P: Blade Runner
cc/2021-04/en_head_0031.json.gz/line2198
__label__cc
0.571308
0.428692
Life on Earth is in dangeradmin_tiki2021-01-12T12:17:39+00:00 Tiki’s Lightning Quick Guide: Life on our planet — our only home — is in big trouble. Many creatures are dying out completely and it’s almost all because of what people are doing. So far as the rest of life is concerned, humans are the worst disaster to hit this planet since a massive fireball 65 million years ago. Find out more about endangered life and what you can do about it in this guide. You’ll find several Quizzes in different parts of this guide. Challenge yourself or have a competition with your friends. Can you make it 100 per cent each time? For some questions, there might be more than one answer (square tick boxes) or just one (round radio buttons). Have a go anyway and see how much you’re discovering about Life in Danger. Changing the air Mega Deaths Drying up? Life really is in peril You kids can help Life on Earth is 3,500 million years old today… well, more or less. Living things have certainly been around on our planet for a very long time. In case you hadn’t noticed, 3,500 million is a very long time indeed. (In fact, life may be as much as 4 billion years old!) Imagine that each of those years was one foot in length. How far would that line of feet run for? From Mexico to Canada? From Europe to Japan? Twice round the world? Twenty six times round the world? From your home to your nearest supermarket? 26 times round the world is correct! You can probably cover a couple of feet in every stride but you could never walk that far in all your whole life! Certainly I couldn’t! Click the answer of your choice. But now life is in trouble and I’m afraid the reason is you people. I’ll come to that in a moment but first,Professor Tiki prepares to speak Early life on Earth was very simple — just tiny blobby things called bacteria. After a while, slightly different green blobby things called algae began to appear. These had ‘learned’ one very special thing: how to use the sun to make food. This was to be the most important development ever for future life on the planet. These tiny green blobs were the first simple plants. Algae eventually gave rise to plants with a stem and leaves like this one. And without plants, no animals could exist. If you were to hop into a time machine and go back 3,500 million years, you’d quickly die for two reasons: the air you breathed would be poisonous and there would be no food. So why isn’t the air we breathe today poisonous? This wonderful blue planet is home to all life. It’s the only home we have so it needs to be cared for. In fact, most algae form strings rather than blobs. You can actually do this with my Time Machine! Part of the ‘food’ of all plants and cyanobacteria is a gas that is poisonous to us animals called carbon dioxide. They slurp this up, along with water and sunlight, to make sugars by a very clever process called photosynthesis. And in doing this, they make what to them is a waste gas called oxygen. I’ll bet you know that no animal can live without it. So you see how important these little plants were then and still are today. Try my Life on Earth Quiz to see how you’re doing. This photo shows strings of cyanobacteria. They are very tiny and used to be called blue-green algae when scientists thought they were just another type of plant. Green leaves using the sun to make sugars to give the plant energy. The wonderful web of life Animals began to appear on the planet in a big way about 530 million years ago, crawling, burrowing that lived in the sea. A little after this, plants began to grow on the land instead of just in the sea and were quickly which wanted to eat them. Then came the dinosaurs... some dinosaurs were very big and some were very mean…and I’m sure about those! Later came penguins, polar bears, at the very last minute (just 200,000 years ago), And right from the start, humans began damaging other life and the planet by using fire carelessly. over-hunting Modern people are just beginning to understand a little about the web of life and the vital importance of biodiversity. They are beginning to realise that they have damaged it badly and, most importantly, that they depend upon it too. People are animals too, like penguins and porcupines. OneZoom Tree of Life Explorer lets you travel right into the Tree of Life. See if you can find humans! This is an incredible tool for finding out about every single mammal species on Earth, and it shows how each one is related to all the others. Go on, try it! So now, why not try my Life on Web of Life Quiz to see how you’re doing. The Cambrian ‘explosion’ of life around began about 542 million years ago. All sorts of weird and wonderful creatures appeared in the seas at this time, witnessed by beautiful fossils scientists have found in rocks in the Canadian Rocky Mountains and, more recently, from other parts of the world like China. The weird-looking creature on the right is called Anomalocaris and is just one of many utterly bizzare life-forms which scientists have found in these rocks. They were the ancestors of all animals, including you and me. Before the Cambrian time period, life had not changed much over billions of years and very nearly died out altogether when the whole planet froze solid about 700 million years ago. Fossil spores from the very first land plants have now been found in Cambrian rocks (about 510 million years ago). As yet, nobody knows what the plants looked like. But they were there much earlier than anyone thought. There’s lots of evidence for land plants by the Ordovician Period, around 470 million years ago. Did you know plants grew in the sea? Can you think of any? Yes, that’s right: seaweed. There are lots of different types and they are all algae. Some seaweeds, called kelp, are enormous. Japanese people eat a lot of seaweed — a good idea since it’s full of vitamins and minerals. It even tastes good — I know, I’ve tried it! And did you know that there are even plants which flower in the sea? They are called sea grass (Posidonia — see image on right) and grow in the Mediterranean Sea. You can see algae for yourself by collecting a clear glass jar of rainwater (no lid) and standing it in strong sunlight for a few days. The sides of the jar will gradually get coated in a thin green layer. These are millions of algae, the very tiniest and simplest of plants. And how do they get there? Well I’m not answering that. Think about it. Ask. Find out. Some people think they are the only animals who feel happiness, sadness, embarrassment and love, or who can think or have imagination and so on. They even deny that animals can feel pain. They use this to justify all kinds of cruelty to us animals with whom they share the planet. Yet scientists who study non-human animals (monkeys, geese, whales and many others) have found that much less separates us from humans than you might think. The main differences between us are: you have a complicated language you are very clever you are also very greedy and want much more than your fair share of things you have developed technology. And that, as we all know, is where the trouble started… The rest of us animals are not human but you humans are certainly animals! But unlike other animals, you have — in a very short time — done terrible damage to the planet and its life systems. So I’d really rather be a penguin than a human. Big Bangs and Mega Deaths Have you heard about mass extinctions? Probably not… People are gobbling up more than their fair share – which means other creatures die. …but because of people doing so much damage to the planet and to the web of life, lots of animals and plants are dying out completely. That’s what extinction is. And once a creature is extinct, that’s it. There are no second chances. It’s gone for ever. But there’s nothing new about mass extinctions. Ninety nine percent of all the different types of life — called species — which have ever lived are now extinct. What is completely new is that this is the first extinction caused by people and their wasteful and polluting ways. All the other extinctions in Earth’s long history seem to have been caused by violent natural events. A fireball from space was likely to have been the main reason for extinction of the dinosaurs The best known of these was the final extinction of the dinosaurs 66 million years ago. Less well-known but much worse was a mysterious mega-extinction that happened about 252 million years ago. This was so bad that it destroyed around 96 percent (96 out of every hundred) of all lifeforms on the planet. Understanding mass extinction shows that the global life system is delicate. If it’s messed up, it could mean the complete collapse of the life-support systems we all depend upon. Humans could easily go extinct. The important lesson to learn from mass extinctions is that they hit complex life hardest. It’s things like bacteria and rats and cockroaches that survive — not people or (sob!) penguins. You have been warned! Try my Big Bangs and Mega Deaths Quiz What happened to the dinosaurs? This extinction seems to have been caused by two quite different things. One was a great series of volcano eruptions in what is now the Deccan area of India. These volcanoes belched vast quantities of gases into the air, poisoning the atmosphere all around the planet and causing many animals to die including, especially, the dinosaurs. The reason seems to have been that all the poisons in the air killed off many of the plants so that the dinosaurs simply died of starvation. catastrophe!The other thing was a giant asteroid or comet which slammed into the Earth and blew up, throwing huge amounts of water vapour and dust high into the air. This messed up the world’s climate and destroyed the protective ozone layer which shields life from harmful ultraviolet rays from the sun. But you know what? Some ‘dinosaurs’ survived: the birds. Before the 66-million-year extinction event (scientists call this the K-T event), a group of dinosaurs called maniraptorans — over tens of millions of years of evolution — became both smaller and feathery. Some of this group evolved to become birds and so survived the K-T event, probably because their small size and ability to fly meant they could adapt more easily to changing conditions. Today, these warm-blooded, flying ‘dinosaurs’ are everwhere in the air — and penguins like me, which ‘fly’ under the sea can even dive to depths over 500 metres! Mysterious mega-extinction This extinction seems to have been caused by a massive series of volcanic eruptions in Siberia, Russia. Enough lava erupted to cover the whole planet in a 20-foot layer. The volcanoes also spewed out billions of tons of poisonous gases. As if that wasn’t enough, a huge new crater has recently been discovered in Australia, the second largest direct hit from an asteroid or comet in the last billion years. This could have occurred around 250 million years ago and may have been the trigger for the devastation suffered by life on Earth at that time. It’s likely that the volcano eruptions and possible asteroid hits triggered rapid global warming (like today, but for different reasons) which may in turn have set off something much more scary. fizzzz – pop!This warming may have unfrozen strange stuff called gas hydrate which normally sits on the bottom of oceans. If this stuff is uncorked by warming, it fizzes and melts and blasts off lots of gas called methane. Methane is a very strong greenhouse gas when it gets into the air, making matters even worse for life. And today, there are billions of tons of this methane gas hydrate lying on the bottom of the oceans… and the oceans are warming up! If you want to find out more about greenhouse gases and global warming, take a look at my Hot Earth Guide. Apocalypse soon: the beginning of the end? Are people really threatening life on the planet? What’s the evidence? One good way to find out what’s going on is to look at ‘indicators’ — you know, rather like traffic lights. Traffic signals are indicators where red means danger – stop! Green means clear, go-ahead; amber means caution, watch out; and red means stop! I’d say these traffic light indicators are on red. Let’s look at some examples of indicators. The most famous forests in the world are those of the Amazon in South America, but there many others. Some are in the tropics (tropical rainforest) but most are in Russia and Canada (Boreal forest). It is the tropical rainforests which are particularly rich in different types of plants and creatures. Peole using chain saws kill millions of trees every year these forests more and more both for their timber and to make new ranch land for raising yet more animals for rich people to eat (poor people can’t afford meat), palm oil plantations and crops like soybeans . The boreal forests are going fast too, mostly for making paper for newspapers, magazines and offices. “… most experts agree that we are losing upwards of 80,000 acres of tropical rainforest daily, and significantly degrading another 80,000 acres every day on top of that. Along with this loss and degradation, we are losing some 135 plant, animal and insect species every day — or some 50,000 species a year — as the forests fall.” Remember, it’s not just the trees that are lost but all the animals whose home the forest was like monkeys, tigers or parrots. According to the World Resources Institute, more than 80 percent of the Earth’s natural forests already have been destroyed – Source: National Geographic The World Wildlife Fund says an area the equivalent size of 300 football fields of rainforest is cleared each hour to make way for palm oil production. Say no to palm oil. What are soybeans used for? Most (about 75 percent) are used as animal feed to increase meat production. You could say the ever increasing demand by humans for meat is costing the Earth when you think about it. Not only rainforests are destroyed but the millions of farm animals also produce massive amounts of greenhouse gases and create serious water pollution affecting both rivers and the sea. Monkey. By: Zhao ! Tiger. By: Angelo Antonelli Drying up? Lakes, rivers and wetlands These are home to many species like birds, amphibians (such as frogs , toads, and newts) and fish. Yet in the last few decades, these creatures have declined greatly in numbers and in health. Particularly worrying are frogs and other amphibians. Nobody knows for sure why these little animals are dying so fast but it seems likely that chemical pollution (particularly certain types of pesticides) and global warming are at least partly responsible. The primary causes of amphibian extinctions are pollution, loss of habitat, climate change, invasive species, road mortality, over-harvesting for the pet and food trades, and the infectious disease chytridiomycosis, which is spread by human activity. – Source: Save The Frogs And there’s the usual problem with humans wanting more land for farming and cities, so wetlands get drained and rivers get ‘tamed’ to try and stop them flooding. Then some people have powerboats and go fishing for fun and others like shooting wetland birds for fun. Sad case of river dolphin This dolphin, the ‘baiji’, used to be found only in China’s longest river, the Yangtze. There were about 400 in the late 1980s but by 2006, it had become extinct. Source: National Geographic The very existence of frogs worldwide is being threatened by a killer fungus. A toad; very useful in the garden. Photo: Kristie The fiery Luristan Newt. Frogs in (for example) North America often grow up all deformed — without legs, or with extra ones. Since 1995, tens of thousands of deformed frogs have been found. There are probably several reasons for this. One cause appears to be certain pesticides. Even small amounts of nitrate fertilisers — used by farmers and gardeners — can cause frogs to show symptoms of poisoning too. The amounts needed to make the frogs sick are much less than the amounts farmers put on their fields. The same is true with a fungicide (a chemical which kills fungus which attacks plants) called triphenyl tin. This fungicide causes deformity and death in various types of frog. It is highly poisonous to a range of water-living creatures, from dragonfly larvae and snails to fish. Meanwhile, in Costa Rica, the disappearance of some frogs from the cloud forest looks to be because of global warming, another thing people are causing. Sadly, despite hundreds of exinctions already, and even though by 2010 there were 486 amphibian species listed as “Critically Endangered“, people don’ t seem to care. Many insects are pests. They eat many of the food plants farmers grow and, not surprisingly, farmers try many tricks to stop the insects. Pesticides are the latest human invention for killing pest insects (the ‘-icide’ bit of ‘pesticide’ means ‘killer’). Pesticides are poisonous chemicals which farmers spray on their crops. The poison kills the insects. “Death to all insects.” End of problem. Well not quite. The pesticides don’t just disappear. They stick around and poison many other creatures. Untold numbers of innocent animals (including humans) die too, but no-one bothers about them. Pesticides also pollute water supplies and plants that have been sprayed with them often contain small amounts when people eat them. People who support genetic engineering (GE) claim that if farmers use GE plants which make their own pesticides, then farmers will need to spray less pesticide which will be better for everyone. the world’s biggest pesticide firms are also the biggest seed-producers and biggest GE companies (The world’s top 10 pesticide firms, GMWATCH) some pesticides resist breakdown for many years and can leapfrog around the globe in the wind. These are the notorious POPs, persistent organic pollutants, and include dioxins, PCBs, DDT, toxaphene and chlordane In Britain, a detailed study found some carrots on sale in shops with not twice, not four times, but 25 times the allowed pesticide residue (what’s left after harvest) in them. These organophosphate (OP) insecticides are highly dangerous nerve poisons. No one knows the long term effects of consuming low levels of OPs or any other substance, nor how they react with preservatives, colourings and stuff in the food you eat [1]. More than 1 in 10 people who are regularly exposed to OP pesticides (like farmers) will suffer irreversible physical and mental damage [2]. Many popular pesticides seem to damage the body’s ability to fight infection. They could be a hidden killer in poor countries where infections are a leading cause of death [2]. Find out about all pesticide types at Extoxnet. Visit the PDP website for serious in-depth information about residues in food (database information in PDF format) 1. Henry Doubleday Research Association News, Summer 1995, 1-2; 2. New Scientist, 21/2/98, 5; 3. Science News, 13/4/96, 149 Each year, around 2.5 million tons (2,500,000 tons = 5 billion pounds) of pesticide are dumped on the planet’s crops. [2] In 2002, an estimated 69,000 children were poisoned by pesticides in the US [3] The World Health Organization reports 220,000 people die every year worldwide because of pesticide poisoning. Hard to believe, isn’t it? [2] In 2001, the world pesticide market was valued at $32 billion ($32,000,000,000). Big bucks! [1] Although most pesticides (80%) are used in the rich countries, most of the poisonings are in poor countries. This is because safety standards are poor, there may be no protective clothing or washing facilities, insufficient enforcement, poor labeling of pesticides which are used by farm workers who can’t read anyway. Few people know much about pesticide hazards. [2] Pesticide residues in food are often higher in poor countries. [2] Farmers who use pesticides have a ‘significantly higher rate of cancer incidence’ than non-farmers. [2] In the US, nearly one in ten of about 3 billion kilograms (that’s 6,613,800,000 pounds) of toxic chemicals released per year is known to be capable of causing cancer (in other animals as well as people). [2] 1. US EPA Pesticide Market Estimates; 2. Public health risks associated with pesticides and natural toxins in foods, David Pimentel et al., College of Agriculture and Life Sciences, Cornell University, Ithaca, New York, USA; 3. US EPA fact sheet. There are over 100 types of OP pesticide in use. You can find out more about them in this Pesticide Action Network factsheet. Poor people, poisonings and pesticides The FAO (UN Food and Agriculture Organization) suggest (September 2004) at least 5 million poisonings and ‘a few thousand fatalities’ each year. Nobody really knows how many people die. What is known is that 99% of the poisonings take place in poor countries where people don’t know how to use pesticides properly and anyway do not have access to protective equipment. or can’t understand the language on the label – if there is one. The seas and oceans As you know, the sea is home to many animals including fish (yum! Sorry but I have a thing about fish) and mammals like seals and whales and dolphins. And, most importantly so far as I’m concerned, it’s home to many types of seabirds including penguins like me! And — you guessed it! — many of my seabird friends are in trouble. Our numbers have dwindled by over a third in under 30 years. Every single one of the albatrosses, those huge majestic birds of the wild stormy oceans, is in some kind of trouble and three species are critically endangered. And yes, several types of penguin are threatened and three are including the little Galapagos penguin. Part of the reason wildlife in the seas is having problems is that people are taking much more than their fair share. And it’s not as though people even eat all the fish they catch. Lots of the fish are just ground up to make fertilisers or food (fish meal) for other animals (like fish-farmed salmon) which people then eat. Fish are in trouble too. The world’s fishing grounds, once home to a wonderful mix of different creatures, are dying as powerful ships with big trawling nets and sonar systems to spot fish shoals suck up millions of tons of fish, including young ones which aren’t even old enough to breed and make more fish. Perú once had the world’s biggest fishing industry. That collapsed because of over-fishing. Likewise, the Grand Banks — a vast area of shallow water east of Newfoundland in Canada — used to be bursting with fish like cod. That fishery collapsed in the early 1990s, destroyed by people’s greed. Now another sea is almost fished to extinction: the North Sea (north west Europe). Here, big cuts in the number of fish people can catch have been ordered by governments to try and stop the collapse. One of my relations in South Georgia, coming back from fishing. Thanks to Peter Barham for this picture. Now, people — never learning lessons and always wanting to make more money — have started fishing in the Antarctic Ocean and are even sweeping up the krill which all seabirds like me, whales and seals depend on as well as the fish themselves. And some countries are still killing whales. Coral reefs – Have you ever seen a coral reef? These are home to an awesome variety of plants and animals rather like the tropical rainforests on land. They are very beautiful too. But they too are in big trouble and many are dying because of what is called bleaching. World’s biggest reef badly damaged Australia’s Great Barrier Reef (and many others around the world) was seriously damaged in 2015-16 by the worst bleaching event ever recorded. This was because of a serious El Niño event caused, almost certainly, by global warming Now: how about having a go at my Indicators Quiz to check out how you made it through that scary part of my guide. You can check out whether an animal is in danger in the IUCN Red List. Antarctic Ocean with huge iceberg. Krill (Euphausia superba) are little shrimpy things. They, along with other crustaceans such as copepods, are at the bottom of the food chain in the Antarctic Ocean. Without them, there would be no fish, seals, whales or seabirds. Humans are now beginning to disrupt this food chain by catching millions of these tiny creatures. Shame on them! Japan, Iceland and Norway between them kill hundreds of whales every year. What is bleaching Sea sick Corals are really communities of tiny animals called polyps. They make bony frameworks, like tiny houses, in which they live. These frameworks build up to make huge coral reefs, home to loads of colourful organisms. The biggest of these is the Australian Great Barrier Reef. Corals also soak up some of the carbon dioxide humans are pumping into the atmosphere from cars and industry, rather like undersea trees. Coral polyps cannot survive without tiny plants called algae. The algae live inside the polyp and provide it with food which they can make by photosynthesis from the sun. In turn, the polyp provides a safe haven for its algal friends… until humans’ pollution starts to mess things up. This comes into the sea from polluted rivers and makes the algae leave the coral polyps so that the animals turn white and die. This is bleaching and it’s caused by several things: abnormally warm waters (global warming), especially during the El Niño event in 2015-2016 polyps get choked with silt from dredging or from big rivers after heavy rains have swept soil from ploughed or deforested land pollutants like fertiliser run-off and pesticides from farming human sewage (which acts as a fertiliser) Poisonous algae may also grow rapidly creating algal blooms (‘red tides’) and killing lots of fish. Now do you see what I mean when I say life is in trouble? Stop! All the indicators are on red; stop! Help! And the trouble (sorry! I always seem to be having to say this) is you people. You’re cutting down forests covering good land in concrete, buildings and new roads polluting the land, air and water (seas, rivers and lakes) because of cars, airplanes, ships, farming chemicals and fertilisers, garbage (especially plastic), sewerage, fish farming vacuuming the oceans of fish so that in many parts there are hardly any left trying to kid yourselves that there’s no problem People are even covering the seas in garbage and other pollution like oil spills All these things cause other animals and plants to die off and become extinct… and they are doing in a big way. They either starve to death or are poisoned. But the biggest cause of this man-made extinction is loss of habitat — the destruction of places in which creatures used to live. RARE: A celebration of wonderful life from Joel Sartore on Vimeo. Five ways people are wrecking the planet Climate Change and ozone-destruction caused by pollution from humans’ machines could completely upset global weather patterns and cause catastrophe. No-one yet knows what will happen but we do know it is already starting Over-hunting for food, for fur or, nowadays, fun. Thousands of creatures have been wiped out by people. Some of the most famous are the dodo, the passenger pigeon and the great auk. Introducing alien species. Sometimes people do this by accident but often it’s deliberate. Australia is one of the most notorious examples of the damage done by alien species. European migrants brought with them many animals and plants and some of these have become serious problems. Cats, foxes and rats have driven many once common creatures almost to extinction by hunting them. Rabbits are a serious pest too because they breed so fast, eat almost anything green and are almost impossible to control. And then there’s the great cane toad disaster… Destroying the natural world by cutting and burning rainforests, covering the ground with more houses, office blocks, factories and roads or using life-destroying farming methods spraying poisons on crops Genes could be in trouble too. If you’ve read my guide about genetic engineering, you’ll know that they are the building blocks of life. And yes, they’re in trouble because of what people are doing to them. This is partly because of genetic engineering and partly because the gene pool is getting smaller. Genetic engineering could make matters even worse because the world could come to depend on even fewer varieties of food crops. And many of these could be controlled by the big corporations who will own the seeds… Or genetic engineering could make matters much better because fortunately, a great deal of research into improving food crops using genetic engineering is open-source. The common sense solution is to learn from nature and be sure to preserve that wonderful mix of genes which gives us all that even more wonderful variety of life. Try my Wrecking the Planet Quiz to see how you’re doing. By “wrecking the planet”, I mean people are damaging that part of the planet in which all we living things exist: the biosphere I have made a guide about climate change — also called global warming. Click here to see it now. What is pollution? I have made a guide about pollution. Click here to see it now. Dodo, a flightless pigeon. It was discovered by humans in 1598 on the island of Mauritius in the Indian Ocean. 60 years later it was extinct, killed and eaten by humans and its habitat destroyed. Image: The British Library Passenger pigeon, These beautiful birds once existed in vast flocks North America but these. Were rapidly hunted to extinction by humans and the last one was shot in 1900. Image: “Birds of eastern Canada” (1919) Great auk. Because it was flightless and easily caught, the great auk was hunted to extinction by humans, the last recorded pair being killed in Iceland in 1844. Image: The British Library What is the gene pool? Everything that is alive contains thousands of genes. The gene pool is a sort of imaginary pool in which every single gene from every single living thing can be found. If some living thing becomes extinct, then some of the genes which were only found in that formerly living thing are lost forever. So the gene pool becomes a little smaller. Humans are causing many extinctions and so there are many potentially useful genes being lost all the time from the gene pool. About Ozone Ozone gas is a type of oxygen. It filters the powerful radiation from the sun — the heat you feel and light which makes the days. Without this shield of ozone, most life couldn’t exist on the surface of the planet. So humans are messing up something which affects almost all plants and animals. oh dear! It was in my home, the Antarctic, where people first realised what was happening to the ozone. An enormous hole appears every spring, bigger each year. No one worried too much because few people (never mind us poor penguins!) live in that part of the world. Then the hole got so big it began to affect southern countries like Australia and New Zealand. People there now have to wear clothes and big hats on sunny days to stop the sun burning their skins and causing skin cancers. And now there’s another big hole which opens up above northern Europe and North America every spring too. By 1996, the ozone had dropped to half what it should have been in the spring. CFCs come in many different sorts. Not only do they destroy the protective ozone, they are also very strong greenhouse gases and so add to global warming. Most countries have now stopped making them. The most recent studies show that the ozone is slowly recovering following the international agreement to stop producing ozone damaging products (the Montréal Protocol of 1987) The oxygen we all need to breathe is made up of 2 oxygen atoms stuck together. Ozone is unusual because it is made of 3 oxygen atoms which makes it unstable and tries to react with other things. This makes it poisonous to the living things that breathe oxygen. But without the ozone in the stratosphere, we’d all be fried! Why? Because this gas acts as a filter to the most harmful of the sun’s radiation: ultraviolet, often just called UV. Humans are mega-killers The first human settlers in New Zealand found that hunting the huge flightless birds called moas was really easy. Unfortunately, they had killed them all in less than a hundred years. This recent finding supports the idea that early human hunters were to blame for the extinction of large animals in places like Australia and the Americas, according to American anthropologist Jared Diamond [1]. 1. New Scientist, 1/4/00, 15 Aliens in Australia Surfing wallabies? How can you be sure to save an animal from extinction? Well you could turn it into a pet, says Michael Archer, director of the Australian Museum in Sydney. So much damage has been done to Australia’s marsupials (marsupials are animals that keep their babies in pouches) by cats and dogs — all brought in by European migrants — that he suggests people keep native animals like cuddly possums or friendly little quolls instead. What’s more, many marsupials are very playful. Wallabies even like surfing in the ocean [1]. Penguins like cold seas and ice best!Uh oh! Don’t even think about keeping penguins as pets please! We like cold sea, icebergs and fresh fish — not your warm houses! 1. New Scientist, 29/4/00, 40-43 Poisonous cane toads in Australia Australia’s great cane toad disaster In 1935, the South American cane toad was brought into Australia in an attempt to control beetles that were damaging sugarcane crops. They didn’t like the beetles but spread quickly, eating other things instead. The real disaster is that these toads are poisonous even when dead. So any animal that ate the cane toads, died. As the toads spread, more and more local creatures were poisoned and some are now close to extinction. Today, the toads continue to spread and there are no effective ways of controlling them. What does it matter to humans? Does anybody care? Answer If an asteroid hits the planet and causes big trouble for life, nobody is to blame. Asteroids aren’t alive and they don’t think. But people do think and that looks like turning out to be more dangerous for other life than any asteroid. It is ‘thinking people‘ — supposedly intelligent and wise — that are bringing about this latest mass extinction. Everyone knows about the famous mass extinction event 66 million years ago which killed off the dinosaurs. A large asteroid hit the Earth destroying about three quarters of all life. This was the fifth mass extinction event in the history of life on Earth. But now that humans are doing so much damage, we seem to be entering a sixth mass extinction Anyone with a little vision can see the indicator traffic lights are on red. But hardly anybody seems to be looking. There are none so blind as to those who will not see – Proverb traced back to John Heywood, 1546 If lots of people drive cars and don’t stop at the traffic lights, you know what happens: there’s a huge crash and people get hurt or killed. Well that’s what is starting to happen to much of life on our planet. So why don’t people care? Why are they trashing the planet with their big feet? think? Try my Big Feet Quiz and see how well you score! Now I have a special question for you: what is the most dangerous animal that has EVER existed? Can you guess? (Hint: no, it’s not T. rex or the great white shark!) Why bother? Why is biodiversity vital for humans? Perhaps you think it doesn’t matter if humans are causing a lot of living things to go extinct. Well, I bet you didn’t know about something called ecosystem services. These vital services — which people use for free without even thinking about them — depend on a healthy biodiversity. What are people doing about it? The Convention on Biological Diversity (CBD) came into being at the 1992 Earth Summit in Rio de Janeiro, Brazil. This was an attempt by most of the world’s nations to protect biodiversity. It has not been very successful so far because destruction of habitats and species extinctions continue faster than ever. So it’s up to you young people to get moving and DO SOMETHING to help!!! But what can I do, you ask? Go to the next section to find out For a start YOU care or you wouldn’t be reading this. And if people didn’t care, there wouldn’t be any organisations like WWF, RAN, Greenpeace, the Sierra Club and many others. Nor would there be national parks and other protected areas. Homo sapiens is the name for human beings given by scientists. It means “wise man “. Huh! Hubris or what? Chart of extinction events that wiped out most life on Earth. Source: LiveScience But you are… which is really great because now you understand the problems better than most adults. And soon you will be an adult and then you can really do something to help life in danger! Big footprints on our planet If every human on the planet (there are more than 7 billion of you) wanted to live like most North Americans, there simply wouldn’t be enough resources. If every human on Earth lived like the average Canadian (for example), you’d need at least three planet Earths to provide all your materials and energy. This is the idea of ‘ecological footprints’. A ‘footprint’ is the amount of land each person needs to take from Nature to support their consumption of materials — like food, energy, wood and so on. [1] Canada is one of the world’s richest countries with the highest ‘standard of living’ = highest level of gobbling resources. The ecological footprint of an average Canadian adds up to an area about the size of three city blocks (4.8 hectares of land — nearly 12 acres). Unfortunately, the actual productive land available to each person on the planet today is, on average, about one city block (1.6 hectares, less than 4 acres)… one third of the area which each Canadian is now using.[1] So there’s what’s called an ‘ecological deficit’ — like drawing more money out of a bank than you have so you’re really ‘borrowing’ from someone else. [1] International Institute for Sustainable Development People depend on ecosystem services and hardly anyone knows about them. Perhaps the most important and obvious service is the provision of oxygen by organisms that photosynthesize: plants and cyanobacteria. No oxygen? No animals; no humans and no penguins! There are many more ecosystem services, all vital to people but mostly ignored or taken for granted. These were first clearly defined in the Millennium Ecosystem Assessment (MA), back in 2005 which split them into four different types: Supporting services which are needed by all the other ecosystem services such as soil formation and recycling of nutrients Provisioning services which are things like seafood, wood, food crops, medicines, water and energy (biomass and hydropower) Regulating services such as climate regulation and the removal of carbon dioxide from the air, pest and disease control and cleaning up (purification) of air and water. Cultural services which is all about all the beautiful things our planet has to offer. People’s lives are enriched by these. One obvious example is when you go on holiday to the seaside or a national park Where would you be without those? You may live in a city but you still depend on these vital ecosystem services… and that’s why biodiversity matters! The WWF and the Zoological Society of London’s (ZSL) Living Planet Report for 2020 is out. Horrifying stuff! Global populations of mammals, birds, fish, amphibians and reptiles plunged by 68% on average between 1970 and 2016. Living Planet Report 2020. What you kids can do to help! Young humans like you will, as you grow up, increasingly hold the future of life on our planet in your hands. It is you who inherit the Earth. Adults — including your parents and family — are doing the damage today because many of them simply don’t realise what they are doing to the planet. But you do! So what you choose to do as you get older can make a big difference. Here’s what you can do to start the ball rolling: At home and at school Tip 1 — The four Rs Recycle everything you can Reduce what you buy Reuse what you can If something is broken, see if you can repair it Tip 2 — Start an eco-club Grab the interest of your friends, parents and school teachers. How? Maybe you could make a presentation on your computer? Or a slide show? Or a poster? Or leaflets to give out? Get people who know about ecosytems, ecology and biodiversity to come and talk to your club and inspire you all! How do you do that? How about contacting your local university biology department? Tip 3 — Set an example Reduce your demands for energy and water in your home wear your clothes more than once before you wash them take showerstake short showers. Try to avoid baths: They waste water and energy turn electrical things off when you’re not using them use low energy lights like LEDs Get insulated! If you live in a cold region and your house isn’t insulated, the chances are your families’ energy bills will be high. Insulation is the way to go Tip 4 — Vacations Try to take your holidays nearer near home so you don’t have to do loads of travelling — particularly on airplanes. They are mega-polluters! Tip 5 — Buy local Buy items made or grown locally rather than from far away. This cuts out ‘food miles’. Tip 6 — Grow some of your own food If you have a little patch of ground or a garden, why not give it a try? You might be surprised at how easy it can be. And you can’t get more local than your own back yard! If you have space, try composting waste food, vegetable peelings and stuff. You can even make compost in a small bin which contains special earthworms Tip 7 — Cut the commute Could your parents live closer to where they work (or the other way around) and near your school? You could discuss this with them at a family meeting! Then none of you has to travel so much Tip 8 — Try not to use the car! Cars = traffic jams + pollution, so use bicycles and buses whenever you can rather than cars. Better still, walk. Tip 9 — Give wildlife a home if you have a back yard or garden at home, see if you can make a pond. Bluetit (chickadee) at nesting box. Image: Hans OlofssonAnd how about making a wildlife refuge too? You know, somewhere for birds to nest (make bird boxes) with bushes and small trees — even heaps of sticks and leaves where small animals can hibernate in the winter. A tidy neat garden is not a good place for wildlife — especially if you spray pesticides and use artificial fertilisers. Tip 10 — know your planet find out more about our beautiful planet and remember that you have to share it with millions of other life forms (species), all of which have a right to be here Check out some of these videos Biodiversity is us! Biomes of the World for Children Eco Footprint Good luck! The future of all of us depends on what you kids of today do to make sure tomorrow comes for people, penguins and polar bears… What do you think about life in danger? Have you any good ideas about what we can do to make things better? If you do, please write to me. As long as your message is sensible and friendly, I promise to reply. Use the toolbar at the bottom of the page to contact me. If you’ve found my Life in Danger guide useful, please would you be kind enough to make a donation to help run my website. I know you kids don’t have credit cards or anything but perhaps you could persuade either your parents or your school to make a donation. It’s so easy and you can do it here. Click here to go to my Life in Danger links page to find out about groups concerned at what people are doing to all other Life on Earth. In 2015, about 40 per cent of total U.S. (for example) energy consumption was used for heating buildings. And energy usually means pollution (unless your household only uses renewable energy – probably unlikely if you have no insulation). Pollution matters for all kinds of reasons; in particular, climate change. If you want to know more about pollution, energy and climate change, I have guides. Just click “Tiki’s menu” Polluting aircraft Image: dsleeter_2000 Commuting is polluting Millions of people spend hours every day, five days a week, driving to work and back. This is called commuting and it is immensely wasteful of energy and causes terrible pollution and, of course, traffic jams. There has to be a better way… This is called biodiversity and is the whole purpose of this guide. All living things are part of different ecosystems and biomes – including humans who haven’t yet understood how ecosystems provide vital services upon which they depend. By the way, there are eight major biomes on our planet: tundra, taiga, four types of forest (temperate deciduous, temperate evergreen, tropical deciduous and — best known of all — tropical rainforest), grassland and desert. Compost is food for plants that looks a bit like soil. You can make it almost anywhere out of vegetable peelings and waste food. In my picture, I’ve just finished building a traditional compost heap held together by recycled timber. Every time I add more stuff, I cover the heap over with an old carpet. This helps it rot quickly. If it’s big enough, your heap will get very hot inside. Can you think why? you can even make compost indoors using a ‘wormery’ The worms eat all the decaying food and vegetable peelings and stuff and leave rich crumbly compost. compost heaps are a great place to look for different types of creepy-crawlies. They are full of life – mostly bacteria and fungus – but also many types of worms (no legs), spiders (8 legs), insects (6 legs) and centipedes (hundreds of legs). They’re all part of the composting process and birds like to eat many of them. Take a jar, a pair of tweezers and a magnifier and see how many living creatures you can find. Don’t forget to let them out again: the compost is their home! if you put stuff which you can compost in the garbage, it stinks. And it’s wasted too. It all ends up in landfill mixed with all the other mountains of stuff people throw away. So you see composting is a great way to recycle and you can use the results to grow more plants. Many insects are pests. They eat many of the food plants farmers grow and, not surprisingly, farmers try many tricks to stop the insects. Pesticides are the latest human invention for killing pest insects (the ‘-icide’ bit of ‘pesticide’ means ‘killer’). Pesticides are poisonous chemicals which farmers spray on their crops. The poison kills the insects.death to all insects End of problem. Well not quite. The pesticides don’t just disappear. They stick around and poison many other creatures (including humans – over 200,000 people are thought to die every year because of pesticide poisonings). Untold numbers of innocent animals die too, but no-one bothers about them. Pesticides also pollute water supplies and plants that have been sprayed with them often contain small amounts when people eat them. People who support genetic engineering (GE) claim that if farmers use GE plants which make their own pesticides, then farmers will need to spray less pesticide which will be better for everyone. I have a right to live on our planet without being poisoned or starved… … and so have we … …and so have we. We kangaroos are hopping mad at what people are doing to our planet. You people may not like lizards but we too have a right to be here. And many of us seabirds are in real trouble because of over-fishing and poisoning with oil spills and other pollution. Lots of my turtle friends are killed by getting caught in fishing nets and, because we breathe air like you do (and whales and dolphins), we drown. I guess you already know people have killed so many of us whales that there aren’t many of us left. My links to other sites The WWF and the Zoological Society of London’s (ZSL) Living Planet Report 2020, shows that global populations of mammals, birds, fish, amphibians and reptiles plunged by 68% on average between 1970 and 2016. Shocking!! Roots and Shoots Join the wonderful Jane Goodall and becme the change Global Footprint Network: Find out about Earth Overshoot Day and calculate your own ecological footprint. Kiwi Conservation Club: New Zealand-based forest and bird conservation project for kids. Did you know kiwis could kick, have their noses at the end of their beaks and can live for 40 years? No? Neither did I. Great site for kids. National Geographic – for kids the Rainforest Foundation: Supports traditional peoples of the world’s rainforests in their efforts to protect their environment. Survival International: Supports tribal people by helping to protect their lands and rights to it. There are loads of places to visit so I’ve just selected a few which I like the best. And please avoid disappointment and don’t send me more links, no matter how useful you think they are. Lots of people do but I simply don’t have time to deal with them. Sorry! Biodiversity is a fancy word perhaps, but you can see what it means. ‘Bio’ means ‘life’ and you know what diversity means, don’t you? You know, lots of variety. By destroying so many of the places where different types (species) of life live, humans are condemning them to death… to extinction. This means that the number of species gets smaller and biodiversity becomes less.Biodiversity is very important for people, even though most of you don’t know it. Why? Well think about food the farmers grow. Once, there were hundreds of different food plants but now, most farmers depend on just half a dozen or so for most of their food crops: things like soybeans, corn (maize), wheat, rice, canola (rapeseed) and potatoes. Most of these crops are based on just a few varieties (types like red- or white-skinned potatoes). And, increasingly, the seeds for these are controlled and even owned by a few giant biotechnology corporations who have created new varieties by genetic engineering. But what happens if a new type of killer disease like, for example, potato blight comes along and wipes out all the identical potatoes? Millions of people would go very hungry indeed. Biodiversity — and making sure you keep it — means that you always have a backup in the form of another variety of crop which isn’t killed by any new disease plague. Scientists are just beginning to realise the importance of “crop wild relatives”. These will allow food plants like rice and wheat to be modified so that they can withstand flooding, salinity (salty soils), diseases and so on using genes from the wild relatives. Biodiversity is also vital in the web of life. People are only just beginning to understand this. If you kill some of the life forms or destroy their habitat, you cut the web and it could collapse. This web means we — all of life — are all interdependent. We are all connected in some way… and that includes you humans. Species is the word biologists use to describe organisms which are closely similar in appearance and which can breed and produce fertile offspring. All humans are the same species even though there’s lots of variation in your colour, size, hair type and so on. I am a King Penguin and I can mate successfully with any female King Penguin – if she likes me. We Kings are all the same species. My mate will lay fertile eggs (usually two) which should hatch into brown fluffy chicks. But I can’t mate and have chicks with other types of penguin because they are not the same species as me. What about a crab and a toucan? Well they are definitely not the same species! Pretty obvious really. For a start, crabs have 8 legs and toucans have two. And crabs don’t fly… How many species can you think of? And how many species are there on the planet? Scientists estimate that there are at least 5 million but there are probably many tens of millions more which we still don’t know about, mostly living in the oceans. Organisms are any living things – giant trees, whales, mice, bacteria, penguins, people. Some people think the whole planet is a living organism which can regulate its temperature so that it stays just right for life to flourish. (This is called the Gaia Theory.) Organisms are alive and that means that they have the special power to be able to make endless copies of themselves – to reproduce. Genetically modified organisms (GMOs) are also alive and also have this endless ability to reproduce themselves. This is why many people think they are a bad idea. Once GMOs escape from laboratories or farms, they could reproduce themselves and interbreed with non-GMO relatives and nobody would be able stop them. If something goes wrong with them genes, nobody can call them back. This is called bio-pollution which, unlike other pollution, cannot be cleaned up once it has happened. This is why protestors liken the escape of transgenic organisms — GMOs — to the tale of Aladdin and the magic lamp which he found. Once Aladdin rubbed the lamp, he released the magic genie. The genie, once released, was supposed to do Aladdin’s bidding (like GMOs are for people) but suppose the genie liked being out? No-one could call him back! Aladdin is a character from The One Thousand and One Nights (Arabian Nights), a famous set of 10th century Arabic stories. potato blight Blight is one of the worst diseases of potatoes. It was partly the cause of the great famine in Ireland (1845) in which tens of thousands of people died of starvation because their main food crop – the potato – was wiped out for several years in a row by blight. And now Russia is in the grip of a powerful new type of the same blight. Small Russian farmers can’t afford to spray with expensive fungus-killing chemicals to try and control the outbreak [1]. 1. New Scientist, 1/4/00, 5. The best known biotechnology of all is brewing – you know, making beer and wine and stuff. People use tiny plant-like organisms called yeasts to change sugary water (usually flavoured with something) into alcohol. Plant and animal breeding is another where people choose particular traits — qualities — which an organism has. An example is corn — maize. For centuries, this plant was carefully selected by Mexican farmers to favour one which gave bigger cobs with more and fatter grains of corn. Today, everyone takes this for granted, not knowing their breakfast cereal or corn crackers are the result of all this careful work done many years ago and made freely available to everyone. And also today, companies would patent such achievements to stop anyone else from using them unless they pay money. But now, science has created new types of biotechnology such as cloning (making identical copies of organisms or cells) and, of course, genetic engineering — the subject of my guide. GE is based on the artificial manipulation and transfer of genetic material from any type of organism to any other type. What’s so special about ‘open source? The idea of ‘open source’ is well known in the computer world. The Linux operating system and Wikipedia are two famous examples. These are created by enthusiastic people for all other people to use for free. The users can help by adding their own improvements. This is the very opposite of patenting in which ‘intellectual property’ is owned and jealously guarded and can only be used by others after licencing — paying some money to the owner. Genetic engineering also uses discoveries and inventions — again, intellectual property. The companies patent this information to stop others gaining from their own research and development’ Open source GE comes about when the information discovered by researchers is not patented so that anyone anywhere can use it. It is said to be ‘in the public domain’. ‘Flood’ rice could feed millions Pamela Ronald, a professor at the University of California, Davis, has worked with the IRRI to engineer a new flood-resistant rice variety. She and her team of scientists have succeeded where 50 years of conventional breeding has failed. They have placed the information about the technique in the public domain — open source — so that anyone can use it. This single gene, called Sub1, comes from another rice variety and the engineering technique is called ‘cisgenic’ rather than ‘transgenic’. Flooding of rice crops causes losses of up to 4 million tons each year in India and Bangladesh. That’s enough food for 30 million people! In the poorer countries, there is a real demand for crops that can resist difficult conditions like drought, flooding, poor soils not to mention diseases. These are conditions which are worsening as climate change begins to bite. Genetically modified crops and even trees could be important for farmers in Africa, for example, if the seeds and know how are made available to them at low cost. This is beginning to happen as big funding organisations work ever more closely with local governments and people, helping them to produce what they need. Public domain GE is already providing disease resistance and better nutrition. Perhaps anti-GM Greens should get to grips with the many good things GE can offer instead of concentrating on the bad. What do you think? The trouble with patenting Patents give people, or companies, exclusive rights to manufacture and sell a new invention for up to 20 years. Only after this time can anyone else make the same thing and sell it. The spirit of patenting has changed in recent years as companies are have managed to get rights to patent discoveries rather than just inventions. In 1987, the United States allowed patents on living organisms for the first time. After that, the floodgates opened as each company scrambled to patent as many genes, either discovered or altered, as possible. The idea behind this was, as ever, to prevent competitors from making money out of your work. Some scientists who had been working on GE techniques in public labs funded by public money realised they could make lots more money if they founded new GE companies and worked for them instead, taking their knowledge of genes with them and applying for as many patents as possible on the bits of genes they knew about. Patenting and competition: Through a new system of what are called called ‘intellectual property rights’ (administered by WIPO, the World Intellectual Property Organization), patents allow companies to own the new forms of plants and animals they make. This means they can charge farmers all over the world for the use of ‘their’ creations. Some people, not surprisingly, think patenting is a brilliant idea. The companies say they need the money they get from patents to pay for more research and development. Others think it is a very bad idea indeed when it comes to being able to patent living things. And there’s worse: a new form of piracy which patenting makes possible called biopiracy. Farmers in Africa African Agriculture Technology Foundation is an example of how public and private (companies) organisations can work together to make available useful GE (and other) technologies to poor African farmers who wouldn’t otherwise be able to afford to buy them. The aim is food security and poverty reduction in Sub-Saharan Africa. Bio Piracy Biopiracy: Pirates were a bloodthirsty lot who stole and killed to make themselves rich. Often, they ended up getting killed themselves. They were outlaws, hunted down whenever possible by naval ships from various countries. The biopirates are a bit different. They don’t kill, they patent. And they are completely protected by the law so nobody hunts them. They are usually employed by corporations or even governments to go and collect genetic material (e.g. seeds) from places like India or the Amazon.this tree’s genes should not be owned by anyone! In India, the neem tree has been used by people for thousands of years for things like killing pests and as a medicine. An American company patented the tree which means that anyone using it should, by law, pay the company. This has outraged many people on the receiving end of this legalised theft. The Indian scientist Vandana Shiva claims that the real cause of biopiracy is the left-over colonial idea dating back to Columbus’s ‘discovery’. sailing shipColumbus ‘discovered’ the Americas in 1492 and from that time on, Europeans began to take the land away from the native Americans, the original inhabitants of what are now Latin and North America. (They did the same in Africa and Australia.) The Americas became Europe’s colonies, to be exploited in any way – including killing native people if they objected. It’s this same colonial tunnel vision which permits the piracy of gene resources and knowledge from non-Western cultures to be claimed as ‘invention’. This means this once-free heritage of seeds or knowledge can be protected by patent. This is just legalised stealing. Knowledge now strangled by patents (called in legal language ‘intellectual property rights’ or IPRs) used to be freely shared between everybody who needed to use it. I think your laws are unfairNow, after patenting, people have to buy it to be able to use it legally – including those who had learned it as it was passed down through each generation in their communities. I don’t know what you think about that but I think it’s wrong. Your laws need changing! Genetic stuff DNA molecules Chromosomes Evolution Darwin Organisms Transgenic Species Spliced Everything comes from your genes – and they come from your mum and dad. A gene is the basic unit of inheritance which you can find in all living things. It is a set of coded instructions, built up from DNA molecules. It’s these instructions that make you you and me me. Each gene is connected to a whole lot of others to form chromosomes. Genes control your inherited characteristics like your eye or skin colour, whether you grow feathers or fur. Every time a cell divides (as you grow, for example), a perfect copy of its genes is made. Just occasionally, this copying goes slightly wrong in which mutations or gene shuffling, called recombination, happens. It is these ‘mistakes’ which allow evolution to happen by trial and error. But genetic engineers deliberately insert new genes by recombination although they cannot tell where on the chromosome the genes they add will end up. So the process is random and may alter the way the new organism’s genes behave in a way no-one can predict. This is one of the main reasons some people are worried about genetic engineering (GE). These transgenic organisms are, like Dr Frankenstein’s monster, in a sense ‘bolted together’ out of bits of others. This is why GE foods have been called ‘Frankenfoods’ by protest groups — rather absurdly since millions of people have been eating them for many years now without any evidence of harm. Did you know that the monster in the Frankenstein story ends up killing his creator’s loved ones. And did you know that the original Frankenstein appears in a classic horror story published in England by the rather visionary Mary Shelley way back in 1818? DNA Molecules DNA is the stuff which makes genes and chromosomes. It is the ultimate in DIY instruction recording (like an old-fashioned cassette tape) for self-building of living organisms. Scientists know a great deal about this double-stranded molecule and its related single-strand ‘messenger’ RNA (ribonucleic acid) which acts, among other things, as a template for building proteins. The basic code is incredibly simple. There are just four chemicals (called bases) Adenine, Thymine, Guanine, Cytosine – A T G C. The code is built up from combinations of those four. A always links to T; G to C. So when the molecule uncoils, as it does to make copies of itself, each base seeks out and links to its new partner (A to T, G to C) – building blocks of lifeand two new molecules build up where there was just one before. The details of this are very complicated but you’ll get the main idea of how DNA is the genetic code — the genotype — for how to build proteins which are the building blocks of bodies — the phenotype. The DNA also contains instructions for how to assemble everything, how big to make it and where to put it. That’s why my beak and your nose is on our faces – and not somewhere else on our bodies. Nobody yet understands how all this works in detail. Chromosomes are the packages which contain the thousands of genes which each organism needs to live, grow and make more of itself. You can see them with a microscope inside the central part (nucleus) of any cells (except for very simple organisms like bacteria which don’t have a nucleus). Each chromosome is made of one very long (!) strand of DNA, coiled and folded so it fits in a very tiny space. Evolution was an idea which had been around long before Darwin. Jean-Baptiste Lamarck (1744-1829), for example, had suggested that giraffes got their long necks by stretching and could somehow pass this ‘slightly more stretched’ character on to their offspring. But Darwin realised that true evolution occurred by natural selection of species. The fittest and best-adapted flourished and produced lots more of themselves. The rest died out. If most of the world was like the Antarctic, penguins would be the commonest creatures (I wish!) and people, who don’t like the cold, would not exist at all. We penguins are supremely adapted to live successfully in bitterly cold oceans and on ice. If the world suddenly got hot (as is happening as humans cause climate change), penguins would be in serious trouble. Species evolve by random changes whose cause Darwin didn’t know (see genes – mutations). Perhaps in a hot world, some penguins would change sufficiently to find warm water agreeable. But most of us would die. Organisms are any living things – giant trees, whales, mice, bacteria, penguins, people. Some people think the whole planet is a living organism which can regulate its temperature so that it stays just right for life to flourish. (This is called the Gaia Theory.) Organisms are alive and that means that they have the special power to be able to make endless copies of themselves – to reproduce. Genetically modified organisms (GMOs) are also alive and also have this endless ability to reproduce themselves. This is why many people think they are a bad idea. Once GMOs escape from laboratories or farms, they could reproduce themselves and interbreed with non-GMO relatives and nobody would be able stop them. If something goes wrong with them (see genes), nobody can call them back. This is called bio-pollution which, unlike other pollution, cannot be cleaned up once it has happened. This is why protestors liken the escape of transgenic organisms — GMOs — to the tale of Aladdin and the magic lamp which he found. Once Aladdin rubbed the lamp, he released the magic genie. The genie, once released, was supposed to do Aladdin’s bidding (like GMOs are for people) but suppose the genie liked being out? No-one could call him back! Transgenic organisms ‘Trans-‘ means ‘crossing from one place to another’. The ‘-genic’ bit means ‘genes‘. So it means that bits of genes from different living things have been ‘bolted together‘ and spliced into another organism to make a new one which does something which the scientists want it to do. For example, it could be a plant that resists a particular type of weedkiller or it could be a goat which makes silk in its milk. Charles Darwin was probably the 19th century’s greatest scientist, best known for his theory of evolution. He was not much good at school but his great moment came when he was invited to join a five-year expedition on a ship called HMS Beagle (1831-36). He was a lousy sailor – always seasick – but a wonderful observer. During his five years, he visited many parts of South America and the Galapagos Islands. (Some of my penguin cousins live there.) Years later, after careful thought and preparation, he wrote a great book called On the Origin of Species (1859), explaining how life had evolved by natural and sexual selection. No-one knew about genes then so he didn’t know how this actually happened. But the evidence he brought together in his books and papers was so overwhelming that biological (life) science was changed for ever. It was Darwin who showed once and for all that humans were just another kind of animal, descended from ape-like ancestors, and not some special and unique form of life superior to everything else. This is why he is one of my heroes: he put people in their place and humbled them a bit! spliced Splicing: In genetic engineering, a set of foreign genes is spliced – inserted – into the middle of the DNA ‘code words’ (see DNA to find DNA moleculeout about the ‘instructions’: the genetic code). This splicing can mess up the normal coded instructions in the DNA. And that can go on to mess up how the cell works. No-one can know in advance what might happen and whether it might be hazardous. It is unpredictable. The insertion or splice could make the chromosome behave in a quite unexpected way. This does not happen in normal mating because the arrangement of the coded instructions does not change when the chromosomes of the father and mother combine. So when people claim that GE is more or less the same as natural mating (sexual reproduction), they are wrong. For more on this, see Physicians and Scientists for Responsible Application of Science and Technology
cc/2021-04/en_head_0031.json.gz/line2199
__label__wiki
0.502363
0.502363
← The Sports Archives – 3 Popular Sports Bettered By Artificial Grass! The Sports Archives – Unexpected Ways to Support Your Team! → The Sports Archives – History Of Curling! Posted on December 7, 2013 by thesportsarchives Curling, sometimes referred to as the ‘roaring game’, which comes from the noise a curling rock makes when moving on the ice. It’s not clear where the game originates from but it’s known for being one of the oldest team sports. A 16th-century painting by a Flemish artist shows a game which looks a lot like curling. It’s considered that perhaps curling used to be a simple time-killer and people threw stones on ice, making use of the cold winter. But then it developed to being the oldest and one of the most appreciated team sports. These days there is a World Curling Championship which has many followers and attracts a big audience of viewers. The rules of this sport were officially drawn in 1804 and strangely, they haven’t quite changed ever since. There are only a few small exceptions. In curling, there are two teams of four players. Each team slides a curling rock on ice towards a target at the other end of the ice field. Every team aims to get more stones as close as they can to the centre of the target. Once 16 stones have been played, the score is counted, according to the location of the rocks. Every stone that is closer to the centre than the one of the other team, brings one point. There are five things that form the equipment to play curling. The first item is a brush, or a broom. It’s used for pushing the rock on the ice. There are two types – a push broom an a straw broom, which has long bristles and looks like a standard cleaning broom. Another item is a curling rock, which is also known as a stone. It’s made of rare granite which is produced and polished in Scotland and weighs over 19 kilos. Shoes are an essential part of the equipment too. Curling shoes look like normal athletic shoes but the difference is that they have different soles. There is a slider shoe which is worn on the sliding foot, and a non-sliding shoe, which is worn on the hock foot. Ice is an inevitable part of curling. When the sport is played indoors, ice is sprinkled with water, which freezes and creates a surface, which helps the grip of the stone. The rink is about 42 metres wide and has a target at both ends. Curling was once played outdoors on frozen ponds. In some countries curlers still enjoy doing it when the weather allows but it usually takes place in indoor rinks. The temperature is now carefully regulated. The first curling clubs are said to have been set up in Scotland and by the 19th century, the game was spread to other countries where there were communities of Scottish people, such as Canada, Sweden, Norway, New Zealand and Switzerland. There are still arguments whether Scotland is where the sport was invented but it’s strongly believed it is. The first major evidence to prove that it originated from Scotland is a curling stone, which originated from 1511 and was found in a pond in Dunblane, Scotland. Anyway, even if curling was not created in Scotland, at least it was where the game was developed and formed as the sport it is today. Author Bio: Paula is a sports fan for many years. She works for http://www.qualitycleaninglondon.co.uk/cleaning-services-nw10-harlesden/ but her free time she spends reading for sports. http://farm3.staticflickr.com/2568/4208306580_118659686e.jpg This entry was posted in Olympics, Other and tagged Curling, curling country of origin, curling equipment, curling fun facts, curling history, curling rules, curling shoes, roaring game, Scotland, sports and leisure, sports and recreation, Sports Archives, Sports Blogs, Winter Olympics, winter sports, World Curling Championship. Bookmark the permalink. 2 Responses to The Sports Archives – History Of Curling! Pingback: The Sports Archives – 4 Facts About The 2014 Winter Olympics! | The Sports Archives Blog Pingback: The Sports Archives – Heartwarming Story Of Jamaican Bobsled Team! | The Sports Archives Blog
cc/2021-04/en_head_0031.json.gz/line2204
__label__wiki
0.972405
0.972405
‘It’s 1 game down, 3 more to go’: Wichita State prepares for quick quarterfinal with Temple Marshall Sunner, Reporter|March 15, 2019 Joseph Barringhaus Wichita State guard Dexter Dennis reaches out for a shot during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) MEMPHIS, Ten. — Wichita State will play Temple at 8 p.m. Friday in the quarterfinals of the American Athletic Conference tournament. The Shockers topped East Carolina by 16 in a game that was never really close. Wichita State finished with four players scoring in double-figures. Markis McDuffie had 15 and Jaime Echenique had 14. Asbjørn Midtgaard started in place of Echenique, and added 10 points of his own. Wichita State’s pair of freshmen, Dexter Dennis and Erik Stevenson had the team’s only 3-pointers. The Shockers shot far from well beyond the 3-point line. In the end, 3-point shooting didn’t matter too much. The Shockers shot 50 percent from the field in the first half, and 27 percent in the second half with its reserves playing extended minutes. Wichita State guard Samajae Haynes-Jones drives the paint during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) Sinking the Pirates’ ship Gregg Marshall’s “Play Angry” team mentality lead Wichita State to force 10 turnovers in the first half. The Shockers turned those turnovers into 11 points by halftime. Dennis wasn’t phased playing in an NBA arena. The freshman scored 13 points on 5 of 7 shooting with three 3-pointers. Wichita State freshman Dexter Dennis celebrates a made shot during the first half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) “I was just playing freely,” Dennis said. “I was playing my game. Offensively, we were getting some good looks.” Wichita State’s two seniors had quiet nights by their measure. McDuffie had a team-high 15 points, shy of his 17-point average. He scored 11 of his points from the free throw line. Haynes-Jones had eight points and four assists. In the paint, Wichita State scored 32 points. Midtgaard had seven rebounds against shorter competition. “I just have to keep going hard and rebound,” Midtgaard said. “I just have to do my role. If I do what the system wants me to do, then the team can be successful.” Wichita State bench stands up hoping for a shot to drop during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) Everyone in the Wichita State locker room knows what position the team is in. A win on Friday almost certainly locks up a spot in the NIT. Three more wins lock up the automatic bid to the NCAA Tournament. But a loss on Friday could send the Shockers home for the season. “You can’t think about the what-ifs,” Haynes-Jones said. Wichita State coach Gregg Marshall cheers on his team during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) “It’s one game down,” Dennis said. “We still have three more to go.” Freshman Jamarius Burton feels like the team that once started 1-6 in the conference has now figured out its routine. “Today was good to get our bearings,” Burton said. “Tomorrow we will be able to make the proper adjustments.” Temple players hangout before the Wichita State and East Carolina game on March 14, 2019. (Photo by Joseph Barringhaus/The Sunflower.) Stopping the Owls Everyone knows his name. Temple senior Shizz Alston, Jr. has made a name for himself scoring 21 points or better in the last seven games of the season. Dennis knows he will likely guard the first-team all conference guard. That’s a heavy assignment for a freshman. Wichita State center Asbjørn Midtgaard goes up for a shot during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) “I just have to do what I normally do,” Dennis said. “It’s all about disrupting the flow of his game.” Alston Jr., however, isn’t the only Owl that the Shockers need to worry about. In the last meeting on Jan. 6, Nate Pierre-Louis dropped 21 points on Wichita State, and Quinton Rose, a second team all-conference selection, added 17 more for Temple. “With good scorers like that you just have to make it tough on them,” Burton said. “We are going to watch film, coach is going to come up with a game plan, and it’s just up to us to try and limit their touches.” Wichita State junior Jaime Echenique goes up for a basket during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) Midtgaard, who didn’t set foot on the court in the first meeting, is looking forward to using the size advantage in the paint for Friday’s game. “They’re definitely talented,” Midtgaard said. “I don’t think they have great size like we do, but they have some big-men who known their role, and they make things difficult. “It’s going to be a challenge,” Midtgaard said. Wichita State lost the last meeting after having lead by 11 points with 3:36 left in the game. That vivid memory has haunted Shocker players for months, and now, they’re hopeful to avenge that loss and solidify its post-season chances. “We have to handle business,” McDuffie said. Wichita State freshman Rod Brown goes up for a shot during the second half of the game against East Carolina on March 14, 2019 at the FedExForum in Memphis, Tennessee. (Photo by Joseph Barringhaus/The Sunflower.) Asbjørn Midtgaard Dexter Dennis Gregg Marshall Jaime Echenique Jamarius Burton Markis McDuffie Samajae Haynes-Jones Marshall Sunner, Sports Editor Marshall Sunner is the Sports Editor for The Sunflower. Sunner is a sophomore majoring in communications with a journalism emphasis. He was born and raised... Joseph Barringhaus, Sports Photo Editor Joseph Barringhaus is the Sports Photo Editor for The Sunflower. Joseph is a senior at Wichita State majoring in marketing with a minor in communications.... PHOTOS: Shockers defeat Tulsa, 72-53 WSU athletic department to make small budget cuts in July; regionalized scheduling approach in line to save money during pandemic Don Hall, WSU basketball public address announcer, killed in car accident “We won’t take it for granted:” Wichita State softball seniors announce intentions to return to team in 2020 Kansas Board of Regents approves Wichita State’s request to raze Cessna Stadium Student Senate asks university for representation in athletic funding process
cc/2021-04/en_head_0031.json.gz/line2205
__label__cc
0.737252
0.262748
The View From Zoar We Watch As Our Civilization Is Destroyed, One Value At A Time ← What In The World!? Look At The World…What Do You See? → Fundamentalism At Work Posted on March 24, 2016 by pastorsprouse DON’T POKE THE BEAR UNLESS YOU’RE PREPARED TO FINISH IT! We hear a lot about Islamic Fundamentalists, usually in connection with terrorist attacks and/or beheadings. What is the difference between a Muslim and a Fundamentalist Muslim? Answer? The same as between a Christian and a Fundamentalist Christian. A Christian may be anyone who says that’s what they are. A fundamentalist Christian is one who believes (acting upon) what The Bible says about sin, salvation and the Christian life. We do not hear of Christians blowing up airports or killing innocent people because this is not a fundamental part of Christian doctrine. Pursuing God through violence is not the basic structure or function of Christianity. When President Obama says terrorism is not what Islam is about, then proceeds to reference these terrorist attacks as proceeding from fundamentalist Muslims, he’s making a fine distinction, probably lost on most of us. Either that or he is deliberately trying to deceive us. We, being those who know very little about Islam. In post-post-modern America, that last statement might be considered unfair, since words only mean (today) what I think they mean or what I say they mean….to me. In this way, we can talk about conflicting ideas as if they are in harmony with one another and not be wrong. Everything Is My Opinion. In the last 70 years the word ‘fundamentalist’ has been equated with all that is bad about a philosophy or religion. This is not true with any of the sciences. Abandon the basic principles of physics and the world with explode … Literally! With religion, however, ‘fundamentalism’ has become a very dangerous and destructive philosophy….in the minds of most people. What is not said, but understood by literate and rational people, from all walks of life, is that when a religion or philosophy or science is pursued according to it’s basic tenets, it’s Fundamentalism at work! Fundamental Christianity is focused on what The Bible teaches and ONLY what The Bible teaches, when interpreted by an ordinary hermeneutic (system of interpretation): the one we all apply to everything we read and use for everyday life. Fundamentalist Islam, however, is bent on dominating the world, by force if necessary, in order to make way for their “Messiah.” It has ever been their pattern, beginning with the Arab countries round about. The first 50 years of Islam saw Mohammed conquering Syria, Iraq, Iran (Persia), Egypt and the area we know as Israel: Damascus to Egypt. In 668 Muslims began a conquest of the Roman Capital, in the East, Constantinople that would take 11 years (on and off). By 698 Islam had conquered all of North Africa, attacking Sicily in 700 A.D. Islamic, Moorish North Africa, attacked Spain in 711 A.D. establishing a Muslim presence until 742, when Charles Martel (and others) eventually drove them out of most of Spain. But then came the re-invasion of Constantinople, which would result in Muslim conquest and a name change: Istanbul, in the Muslim country we know, today, as Turkey. The Seljuk Empire would unite Mesopotamia and a large portion of Persia. Muslims would continue penetrating Europe throughout the next 400 years. The Crusades would later serve to keep them ‘home’ defending Jerusalem and other Moslem cities. After this the Ottoman Empire began invading Europe in 1300 A.D. Over the next 500 years it would dominate most of Southeastern Europe. This continuous turmoil led to the Renaissance, or Age of Enlightenment, as educators, scholars, scientists, etc. fled the old Roman city of Constantinople and surrounding Southeastern Europe, bringing their knowledge with them. The flow of European and Middle Eastern history is linked to Islamic Expansion. Why is Islam so focused on controlling the world? Because the Fundamental Religious Belief of Sunni Muslims teaches that their ‘Savior,’ the Mahdi, cannot come until / unless the world is dominated by Islam. THIS is Fundamentalist Sunni Islam! When is Islam stirred to action? According to the Koran, whenever it is attacked [Sura 2:190-193 (Penquin Classics Edition) “Fight those that fight against you, slay them wherever you find them. Fight against them until idolatry is no more and God’s religion reigns supreme.”) The West attacked Islam in the 1990’s, with the Gulf War. Just about every Western Nation either took part or supported that invasion of Iraq — a Shiite nation, run by a Sunni Dictator. Sunnis make up about 80% of Arabs, but Shias are the most Militant. Shias believe the Mahdi is awaiting that time when the Earth is mostly Moslem, in order to come and create the Ultimate Caliphate. Sunnis don’t believe he’s been born as yet and are patiently awaiting his arrival. Both believe if you strike them, they can strike you back! NOTE: There is no correlating passage in The Bible, telling Christians to dominate the Earth through violence, nor strike back at someone. The Bible teaches us to love one another, to do good to one another, if you are struck on the cheek, turn the other one….as far as it depends upon you, live at peace with all men.” Fundamentalist Christianity only wants people to hear The Gospel of salvation in The Lord Jesus Christ, repent of their sins and believe on Him for eternal life. We have no other message; No other plan or purpose. No other weapon than God’s Word. No other kingdom but that in Heaven. We are ambassadors of Christ, here to represent Him, not build a Caliphate or Kingdom. And, when it’s over, we’re going Home! The West has ‘poked the Bear,’ and it is now justified in it’s attack upon us! Where will all this end? With a new U.S. President who has Visions of Grandeur? One who is used to getting his own way? One who carries a ‘big stick,’ but isn’t prone to ‘walking softly?’ We’ll Have To Wait In Order To Find Out! It May Not Be Long.
cc/2021-04/en_head_0031.json.gz/line2206
__label__cc
0.703622
0.296378
Home » Films by Mary Lampson Films by Mary Lampson Emile de Antonio, Haskell Wexler, Mary Lampson1976 Underground is a film about the Weather Underground Organisation—a group founded as a militant faction of the civil rights and anti-war movement of the 1960s and 1970s. The film combines interviews with members of the group after they went underground who explain how they became radicalised amongst the political happenings in the United States at the time, as well as the revolutionary struggles in Cuba, Russia and China, and the history of struggles over Native American rights and labour issues. Also detailed is the group’s analysis of American society, addressing those who have inspired them, and further explaining the reasons behind their militancy, while also introducing the issue of tactics. We see the use of property destruction as a way to bring about change and destabilise the current political order. Underground takes an intimate look at the inner workings of the Weather Underground and their strong internal collective identity, providing a record of how a bunch of middle-class Americans became self-styled militant revolutionaries, raising questions not only about the merits of their struggle, but also about past and future radical actions.
cc/2021-04/en_head_0031.json.gz/line2208
__label__cc
0.573945
0.426055
Home/Tag: FIFA Tag Archives: FIFA Former Arsenal manager ‘Arsene Wenger takes the lead over Holland’s national team’ 08/18/2020 Health, Sports Ex-Arsenal boss’ Arsene Wenger sues Dutch FA over Dutch takeover to replace Barcelona’s Ronald Koeman Arsene Wenger has worked as FIFA’s head of global football development That has been his role since his 22-year stay at Arsenal came to an end in 2018 Dutch boss Ronald Koeman is expected to … The Last of Us Part II remains at the top of the UK charts, while Nintendo 3DS sales continue 07/07/2020 Entertainment, Science, World Iron Man VR planes second Naughty Dog’s grim end-of-the-world adventure The last of us, part II has successfully retained the top spot in the UK charts for the third week in a row, avoiding the solitary physical release of the week, Sony Marvel’s Iron Man VR, which made its debut … How to become a better player in FIFA 20: best tips, tricks and best practices 05/13/2020 Tips & Tricks Are you fighting to win matches in FIFA 20 or do you just want to beat your friends and rivals for more goals? Follow our expert advice to improve your game FIFA 20 It has over 10 million players worldwide, and each player wants to be the best and beat … How to defend yourself in FIFA 20: tips and tricks to make you a better player Awarding too many sloppy goals and losing games as a result? Follow our expert advice on how to improve your defense FIFA 20 is the most realistic soccer game to date, recreating what it’s like to play high-speed soccer on your home computer or console. As a result, it can …
cc/2021-04/en_head_0031.json.gz/line2210
__label__wiki
0.545348
0.545348
Not a Trivia Today Member? Register Today's Trivia Question 5 Facts You Didn't Know About Earth Day JOIN TRIVIA TODAY! April 22 is Earth Day, when people from all corners of the world unite to support environmental reform. Earth Day is intended as a moment to reflect on and help preserve the health of the planet – but here are 5 things that you might not have known about the annual event. Senator Gaylord Nelson Was The Founder of Earth Day In 1970, U.S. Senator Gaylord Nelson was looking for a way to promote the environmental movement. He proposed the idea of "Earth Day." His plan included classes and projects that would help the public understand what they could do to protect the environment. The first Earth Day was held on April 22, 1970. The holiday has been celebrated on this day every year since. April 22 Was Chosen as Earth Day Because It Was Also Arbor Day April 22 is Earth Day not because that's when college students are most likely to be on campus, despite some claims. April 22, 1970, was Arbor Day, the day celebrating trees and planting trees. It seemed like an appropriate day to spotlight how the planet was doing. Granted, April 22 is usually too late for spring break and too early for finals, so it is a good day if you want to involve college students. But Earth Day itself was given that date just because of the connection to Arbor Day. Earth Day Went Global in 1990 Earth Day may have originated in the U.S., but today it is a global phenomenon celebrated in almost every country around the world.Earth Day's international status owes its thanks to Denis Hayes. He is the national organizer of Earth Day events in the U.S. In 1990, he coordinated similar Earth Day events in 141 countries. More than 200 million people around the world took part in these events. A Number of Trees Have an Astronomical Link to Earth Day Back in 1971, an astronaut on the Apollo 14 mission brought some tree seeds with him as he orbited the moon. The point was partly to see how lowered gravity would affect the seeds and partly to pay tribute to the Forest Service, for which the astronaut used to work. The container holding the seeds broke open prematurely, making the gravity experiment pointless, but many of the seeds were still planted around national monuments, and they still grew normally, forming a select group of trees that have been called "Moon Trees." Earth Day Has Its Own Flag The Earth Day flag is fairly obvious: it’s an image of the planet (the famous “Blue Marble” picture that was taken by the Apollo 17 spacecraft as they travelled towards the Moon) placed on a dark blue background. It was created by John McConnell and has caught on perhaps because it is such a neat way of realizing what Earth is about: the entire planet, and its health. Five Things You Didn't Know About Donald Trump Five Things You Didn't Know About Janis Joplin Five Things You Didn't Know About The South Pole 5 Things You Probably Didn't Know About The Corvette Privacy Do Not Sell My Info Copyright © 2014 Trivia Today
cc/2021-04/en_head_0031.json.gz/line2215
__label__wiki
0.981097
0.981097
New Zealand's National Parks, Ranked Peters Pool, Westland Tai Poutini National Park | © Department of Conservation/Flickr Thalita Alves New Zealand is home to 13 national parks, some of which even get to claim World Heritage status. Popular among hikers and nature lovers alike, each of these magnificent areas have a sense of uniqueness that’s hard to come by elsewhere. Want to know which ones to put on your must-visit list? Here’s how we rank them. 13. Arthur’s Pass National Park Arthur’s Pass is the highest along the Southern Alps, in the area that divides the West Coast and the Canterbury region. The national park of the same name is characterised by expansive shingle-filled riverbeds and beech forests in the east; and dense forests with deeply gorged rivers in the west. A TranzAlpine train journey is one of the best ways to see the park in all its glory. Arthur's Pass National Park | © Sandra Vallaure/Flickr 12. Paparoa National Park Paparoa National Park is filled with fascinating wonders. Located on the northern end of the South Island’s West Coast, the park stretches from the ice-carved Paparoa Mountain Range all the way to the ocean. Punakaiki and its intriguing Pancake Rocks are among the park’s most distinguished features. Pancake Rocks, Paparoa National Park | © Jocelyn Kinghorn/Flickr 11. Rakiura National Park This one’s a bit further out from the rest. Rakiura National Park resides in sub-antarctic ecological wonder that is Stewart Island, taking up 85 percent of the island’s 2000-square-kilometre (772.2-square-mile) land area. Rakiura/Stewart Island is famous for its vast collection of nocturnal and diurnal native birds, as well as being a great place to catch a glimpse of the Aurora Australis. Rakiura Track Coastline | © Department of Conservation/Flickr 10. Egmont National Park Mt Egmont/Taranaki is a dormant volcano that is believed to be approximately 120,000 years old. It is known for being one of New Zealand’s most climbed mountains – a challenging feat that is also very accessible to non-mountaineers. Aside from its namesake summit, the park also comprises an extensive network of walking tracks, ranging from multi-day treks to pleasantly easy ambles. Mt Taranaki from Pouakai, Egmont National Park | © Dave Young/Flickr 9. Whanganui National Park Home to New Zealand’s longest navigable river, Whanganui National Park is as much of a canoeist’s paradise as it is a great place for a forest hike. Rare bird species like the whio (blue duck) and the North Island kiwi are some of the different wildlife lurking in its surroundings. The park is also home to the Bridge to Nowhere, the final remains of an abandoned settlement that has, over the years, become quite a hit among cyclists. Canoeist, Whanganui National Park | © Department of Conservation/Flickr 8. Kahurangi National Park Kahurangi means ‘treasured possession’ in Maori – an apt description for this national park. Within its confinements, you’ll find some of New Zealand’s oldest rock formations, finest caving systems, most unique plant species, and the rarest of birds. The Heaphy Track, which is considered one of the country’s nine Great Walks, is also among its naturally-diverse gems. Suspension Bridge, Kahurangi National Park | © russellstreet/Flickr 7. Nelson Lakes National Park Nelson Lakes National Park carves the beginning of the Southern Alps. The compact area was melded by glacial activity, and comprises various lakes, forested valleys and mountain ranges. At the heart of the park you’ll find the alpine lakes Rotoroa and Rotoiti, which are known for being great spots for trout fishing. The surrounding honeydew forests also offer plenty of walking opportunities. Lake Rotoroa, Nelson Lakes National Park | © russellstreet/Flickr 6. Westland Tai Poutini National Park Westland Tai Poutini forms part of Te Wahipounamu World Heritage Area. Brimming with dramatic contrasts, the park extends from the Southern Alps’ highest peaks to the isolated, largely rugged beaches of the West Coast. Fox and Franz Josef Glaciers are some of its biggest draw-cards, and the area is also enveloped by lakes, grasslands, tussocks, wetlands, and snow-capped mountain ranges. 5. Mt Aspiring National Park You might know Mt Aspiring National Park because of the Routeburn Track. Or, you may just have heard about its incredible mountain ranges and stunningly beautiful Blue Pools. This national park, named for one of the country’s highest peaks, is another great divider of the Southern Alps, and comprises a massive area of alpine wilderness that is set to amaze the most adventurous of travellers. Rob Roy Valley Track, Mt Aspiring National Park | © Sandra Vallaure/Flickr 4. Aoraki/Mt Cook National Park Home to New Zealand’s highest mountains and longest glaciers, Aoraki/Mt Cook National Park is a paradise for skilled mountaineers. In fact, Sir Edmund Hillary is said to have spent some time scaling its summits before making his Mt Everest expedition. Along with its soaring peaks, the national park is also known for housing New Zealand’s only International Sky Reserve. Aoraki/Mt Cook National Park | © Bernard Spragg/Flick 3. Abel Tasman National Park Abel Tasman National Park may be New Zealand’s smallest, but its remote coastlines and hiking terrains have made it a standout attraction in its own right. Pristine golden-sand beaches, lush forests, ancient Maori settlement sites, and the Abel Tasman Coastal Track (another Great Walk) are some of the many wonders this national park has to offer its visitors. Abel Tasman National Park | © ItravelNZ/Flickr 2. Tongariro National Park Tongariro National Park is an 80,000 hectare national treasure gifted to New Zealand by Maori chief Te Heuheu Tukino IV in 1887. About a century later, the park earned dual World Heritage Status for its much-deserving natural wonders. The area is surrounded by the volcanoes of Tongariro, Ngauruhoe and Ruapehu, and is renowned for its cinematic appearances, alpine hiking terrains, and incredibly epic landscapes. Tongariro Crossing, New Zealand | © Pixabay 1. Fiordland National Park The enthralling Fiordland National Park is New Zealand’s largest, and one of the most visited. The Milford Sound is one of its most famous attractions. Two of the country’s Great Walks – the Kepler and Milford Tracks – traverse the park’s remarkable forests. The deceivingly-named Doubtful Sound is New Zealand’s deepest fjord, and has gained traction for its resident fur seals, bottlenose dolphins and penguins. With so many natural sights on its doorstep, it’s no wonder the park also holds World Heritage status. Milford Sound, Fiordland National Park | © Bernard Spragg/Flickr
cc/2021-04/en_head_0031.json.gz/line2218
__label__wiki
0.750323
0.750323
Education Pathway Study Tips and Tricks Info and Guide NUMed Honours Students for their Academic Excellence November 30, 2018 January 29, 2019 by media . Posted in " Newcastle University Medicine Malaysia " . Tags " Medical " . Newcastle University Medicine Malaysia (NUMed) held its annual Award Ceremony on 26 October 2018 at the Iskandar Demonstration Theatre in Iskandar Puteri, Johor, to honour its high-performing students. The awards were presented by senior University figures, including Prof. David Burn, Pro-Vice Chancellor of the Faculty of Medical Sciences and Mr Richard Dale, Executive Director of Finance from the UK campus, and Professor Chris Baldwin, CEO and Provost of NUMed. The highly coveted Vice Chancellor Merit Award is usually announced at the end of the academic year, in recognition of the university’s students who obtained good results during the year, and is valued at 10% of the student’s tuition fee for the year. In total, there were 12 recipients from the School of Biomedical Sciences and 22 from Stages 1 to 4 of the Bachelor of Medicine and Bachelor of Surgery (MBBS) programme in the School of Medical Education. Additionally, the top students from Stages 1 to 4 of the MBBS programme were presented with the TM Teoh Prize, under the recommendation of the Board of the Examiners. These students, who had acquired the highest marks within their stage were each given a RM250 monetary prize, which was obtained from funds donated to NUMed by Dr Robert Teoh, an alumnus of Newcastle University. “The TM Teoh Prize is one of NUMed’s most significant awards and is only given to those students who have constantly sustained excellent results throughout their academic years, and I am honoured to be one of the recipients along my fellow friends,” said Jerry Tan, a Stage 2 MBBS student, who was also a recipient of the Merit Award. Lim Pei Shan, a Stage 5 MBBS student, was named the winner of the prestigious Walton Award. The award is funded through a donation by Lord Walton, an alumnus, professor and Dean of Medicine at Newcastle University who was a lifelong friend and supporter of the University throughout his life. Lord Walton’s reforms of the Medical curriculum at Newcastle University, integrating clinical medicine with basic sciences, have been copied by many Medical Schools in the UK and worldwide. The award comes with a monetary prize worth £250 and is given to a top-performing Final Year MBBS student, under the recommendation of the Board of the Examiners. The student selected for this award usually has the highest overall performance throughout their academic career in NUMed. “This award is a testament to the quality of education that NUMed provides to ensure that we have a solid foundation as we keep striving for greater heights. I am confident that when I graduate from NUMed, I will have the right skills and knowledge to thrive in the medical field,” said Pei Shan. Dr Myat Soe Khine, 39, and Dr Mon Mon Yee, 50, who are Senior Lecturers in NUMed, were also congratulated on the award of their Certificate in Medical Education during the ceremony. NUMed does not solely focus on academic aspects but also encourages engaging activities for its students. One such activity was the Elective Photography Competition which was organised as a platform for the students to express their creativity based on four themes. Six students were selected as the winners. “The photography competition required us to capture images that accurately depict the themes provided, and I am personally overwhelmed to be a winner of multiple categories,” said Bhirom Sughontha. NUMed is the first fully owned international branch campus of Newcastle University, UK, in Malaysia and has been offering the Foundation in Biomedical Sciences programme, undergraduate degrees in Medicine and Biomedical Sciences as well as opportunities for postgraduate studies since 2009. The university is internationally renowned for being one of the best British universities for medicine, offering world-class medical education to students from more than 120 countries. Currently, it is placed fifth in the UK by The Guardian University Guide 2019 and in the top 125 (Clinical, Pre-clinical and Health category) by the Times Higher Education World University Rankings by Subject 2018, among others. It also received a 95% Overall Student Satisfaction Score according to the National Student Survey 2017 (subjects allied to medical category). Top 5 Reasons International Schools Are The Best Choice For Your Children How International Schools Cultivate Leadership Skills NUMed’s Student Activities: Benefitting Your Present and Future In "Newcastle University Medicine Malaysia" The Journey to Becoming a Medical Specialist Get regular updates on global education straight to your inbox! The Global Scholars is owned by WIN Creative Marketing Sdn Bhd.
cc/2021-04/en_head_0031.json.gz/line2220
__label__cc
0.743281
0.256719
Gambia hosts Int’l meeting on elimination of chemical weapons Jul 19, 2017, 11:20 AM | Article By: Njie Baldeh A regional meeting of the Organisation for the Prohibition of Chemical Weapons (OPCW) is underway at the Djembe Beach Hotel in Kololi. Speaking on the occasion on behalf of the Minister of Defence, Assan Tangara, said The Gambia has been a long-standing partner to OPCW in the implementation of the provisions of the Chemical Weapons Convention (CWC). Mr Tangara, who is the permanent secretary at the Ministry of Defence, said The Gambia signed to the OPCW on 13th January 1983, ratified the convention in May 1998 and domesticated it in 2012. “We recognise the political, economic and security benefits of becoming a state party to the convention,” he said. “We desire for increase security, peace and stability and the political will is there to participate fully in the global community.” OPCW is the implementation body of CWC, which entered into force in 1979. The organisation has 192 member states working together to achieve a world free of chemical weapons. The OPCW member states share collective goal of preventing chemical from ever again being used for warfare. The African continent is a major stakeholder in the OPCW. Fifty-two states in Africa including The Gambia are part of the OPCW. President Barrow Village Association receives 200 bags of fertilizers, other items Gov’t validates roadmap to tackle electricity shortage YETES to close 2015 US Banjul’s Competitive College Club conference Reshuffle in diplomatic service ‘I did not influence SSHFC to fund Mariama Sillah’s programme’, Sabally tells court Alleged attempted rape case suffers setback Jun 1, 2011, 2:34 PM
cc/2021-04/en_head_0031.json.gz/line2223
__label__wiki
0.533737
0.533737
The World Health Organization (WHO) has called for the "rigorous implementation of the STOP TB Strategy, including universal coverage with DOTS (the Directly Observed Treatment Short-Course)" in order to significantly improve case detection and treatment outcomes. The most important element of DOTS is a regimen consisting of a combination of first-line drugs taken, ideally, under direct observation of a health care worker. The combination is known to be very effective against active drug-susceptible TB as long as patients are compliant and complete the entire six-to-eight month course. "I therefore, call upon all countries to implement the STOP TB strategy in its entirety" Dr Sambo said in his message to mark World TB Day observed worldwide on 24 March, the day in 1882 when mycobacterium tuberculosis, the rod-shaped bacterium that causes TB was identified. "We must endeavour to put every single patient on quality TB Treatment and strive to minimize patient transfers, defaults and deaths", the Regional Director said. He expressed concern over the emergence of Multi-drug resistant TB (MDR-TB) and Extensively drug-resistant TB (XDR-TB) which develop when patients do not complete the full treatment of first line drugs or are infected by MDR-TB bacteria. The treatment of MDR-TB and XDR-TB is expensive and long, and the outcome may not be so good. "Providing quality care to prevent the emergence of drug resistant TB is therefore crucial", Dr Sambo said. He also spoke of the steady yearly increase in case notification of the disease in the Region, particularly in areas where HIV incidence is high. For example, in 2007, the latest year for which figures are available; 1.3 million TB cases were notified compared to 1.1 million cases in 2005. Also between 2005 and 2007 there were noticeable increases in the number of HIV positive people being screened for TB in the Region. "That is an improvement but our aim should be universal screening for HIV in all TB patients and screening for TB in all people living with HIV/AIDS. This will help persons infected or affected with both TB and HIV to access care and treatment, thus improving the quality of life and reducing preventable deaths", he said. Concluding, Dr Sambo called on public and private sector health care providers as well as well as individuals, families and communities to join hands in helping to ensure a TB-free world. National Assembly Commemorate Commonwealth Day Libya and The Gambian Society Boost for Brufut Marathon Run 14th Anniversary of July 22nd Revolution Three convicted for criminal trespass Barrow makes monumental promises to Basse
cc/2021-04/en_head_0031.json.gz/line2224
__label__wiki
0.861301
0.861301
Published on Monday, March 21, 2016 By: Karen Bascom at 601-815-3940 or kbascom@umc.edu. Published in News Stories on March 21, 2016 Dr. Gary Gibbons asked UMMC a lot of “what if” questions. What if heart disease could go into remission? What if biomedical science was considered information science? What if we could precisely predict and preempt disease? Gibbons, director of the National Heart, Lung and Blood Institute (NHLBI), shared his vision for the future of cardiovascular health when he visited campus Mar. 17-18. He delivered the 19th Gertrude and Florian Nelson Cardiovascular Research Lecture, “Building on the NHLBI Legacy of Hypertension Research: Charting Our Future Together,” on Thursday. The Cardiovascular Renal Research Center (CRRC) sponsors the annual event that brings renowned scientists to UMMC. Granger, left, and Gibbons, right “UMMC has a long history of funding from NHLBI,” said Dr. Joey Granger, director of CRRC and professor of physiology. The Medical Center received $15 million from NHLBI last year. Like saving for retirement, “It's important to have a diversified portfolio,” Gibbons said of funding projects. Basic, translational, clinical and population research programs are all valuable to the advancement of public health. The Medical Center's relationship with the NHLBI reaches back to the 1960's, when the institute funded the late Dr. Arthur Guyton's cardiovascular research. Today, NHLBI funds long-term projects including the Atherosclerosis Risk in Communities (ARIC) study and the Jackson Heart Study, as well as various research and training grants. Gibbons anticipates great changes in preventive medicine. He illustrated his vision with “Carla," a fictional 40-year-old in 2020. A combination of genetics and stress increase Carla's risk for hypertension and kidney disease. Through her physician's care, wearable health monitor and “smart bottle” technology that reminds Carla to take medications, she avoids the diseases. “I think that in five to ten years this kind of approach will be routine,” Gibbons said. Charting the future of medicine: Dr. Gary Gibbons, director of the NHLBI, delivered the 19th Gertrude and Florian Nelson Cardiovascular Research Lecture on Mar. 17. Two concepts make this possible, Gibbons says. One is to understand human genetics and health within an ecosystem. A person's environment - family, community or city - influences exercise and diet, disease exposure and social stresses. These factors make up the “exposome,” the total surrounding environment, which influences health. Gibbons used an example from his own ancestry. Sickle-cell trait, common in African-Americans, confers malaria protection. This is advantageous in sub-Saharan Africa where the disease is common. However, the trait is linked with higher risk for chronic kidney disease. The other approach is “biomedicine as information science,” Gibbons said. With big data, analytics and “-omics” like genomics and proteomics, precision medicine is possible. Gibbons compared the approach to Amazon's personalized purchase suggestions based on user history. “This is what clinicians should do: gather data as soon as a patient walks through the door. Look at them and ask, 'What is their affect?' 'Do they look sick?' 'Should I call a code?'” Gibbons said. “By not doing this, how much data are we missing?” Gibbons also addressed the need to expand diversity in biomedical science. For example, African-Americans comprise 12.6% of the general population but only 1.1% of principal investigators on National Institutes of Health (NIH) grants. The Medical Center's location in Jackson, Gibbons said, “provides a great opportunity to reach earlier into the pipeline,” and recruit and young talent from underrepresented minorities. This is possible through program collaborations, such as those with Jackson State University and Tougaloo College. “You are promoting the next generation of researchers locally in Jackson,” Gibbons said. “I wouldn't be in the position I am today if not for mentors,” Gibbons told a group of trainees after his lecture. “You can't start too early for exposure to science.” Dr. Gibbons takes a question from Dr. Frank Spradley (front right), instructor of surgery, during a session with UMMC trainees. Gibbons grew up in Philadelphia, Pa., spending his free time at the Franklin Institute science museum and reading the “How and Why Wonder Books.” As a student at Harvard Medical School, he wanted to become a primary care physician until a mentor invited Gibbons to join his lab. From then on, Gibbons was hooked. “Geekiness is infectious,” Gibbons said. Gibbons has served as NHLBI director since 2012. He has served on the faculty at Harvard, Stanford University and Morehouse College of Medicine. Gibbons' research interests include vascular biology and genomic medicine. Part of the NIH, NHLBI plans, conducts and supports research related to the causes, prevention, diagnosis and treatment of heart, blood vessel, lung and blood diseases; and sleep disorders. As the third-largest section of the NIH, NHLBI operates with a $3 billion budget.
cc/2021-04/en_head_0031.json.gz/line2226
__label__wiki
0.896047
0.896047
How online streaming services change the entertainment industry Photo courtesy of the Business Insider Will Kanny Twenty years ago, tv and movie lovers flocked to video DVD stores just as Blockbuster or watched their favorite shows and movies on the DVR. However, today all fans have easy access to vast content libraries at their house for a small monthly subscription. This all started once Netflix changed and developed its business model and changed the industry, causing Blockbuster to go out of business and make the DVR less important to television consumers. Netflix started to gain popularity, which seemingly caused the traditional television distributors, like Walt Disney and Warnermedia, to rethink its television output strategy. The conventional television distributors were cautious at first to abandon cable television because it was a massive source of income, however seeing Netflix’s success and the demise of cable television, they began to pivot to streaming. This has resulted in many streaming services launched in the past few years, including Disney+, HBO Max, NBC Peacock, along with Netflix. The first-ever streaming service, Netflix, has revolutionized the television media by transforming how we watch television and creating a golden era of content. Remember watching commercials? Netflix has gifted us a life without commercials and has continued to push the boundaries of streaming. Netflix produces its original content and streams third-party shows (shows licensed to them). Netflix has developed hit originals like Stranger Things, Orange is the New Black, and many others. In fact, Netflix spent 15 billion dollars on content in 2019, and it was estimated before the Coronavirus that they were going to spend more than 17 billion dollars on content in 2020. On November 12th, 2019, Disney launched its streaming service called Disney+, and now more than a year later, the streaming service is an astounding success. Disney+ launched its streaming service with two scripted shows, The Mandalorian and High School: The Musical: The Series, both becoming popular. However, The Mandalorian and Baby Yoda are both big reasons why Disney+ has been able to gain more than 70 million subscribers in the first year. Once Disney+ first released, the streaming service has failed to release more original content onto the service except for a few shows that have not been as popular as The Mandalorian. HBO Max has been around for about six months, and it has done a terrific job of getting great content; however, it failed to have gained the same scale of the number of subscribers that Disney+ has. HBO Max has all the DC Universe, Studio Ghibli, Cartoon Network, and HBO content you will ever need. They also have famous comedy series that has been exclusively streaming on HBO Max, including Friends, The Big Bang Theory, The Fresh Prince of Bel-Air, and Young Sheldon. HBO Max’s goal was to create a powerhouse of streaming, which they have successfully done by branching out to other demographics like kids and teens and their existing branch of demographics that were adults. NBC Peacock is paving a new way in the streaming market by creating a premium content ad-free service. However, it is one of the most confusing streaming services out there with their separate price tiers and the service layout. NBC Peacock has three tiers, including a free ad-based service with most original content and some exclusives are not available. The second tier allows you to watch more content with fewer ads but cannot stream originals for $4.99. The third tier allows you to watch everything, including originals, for no ads for $9.99. The layout of their streaming service is confusing since if you are not a paid subscriber, you might not be able to watch all the content, which is annoying and confusing. However, a revolutionizing aspect of their streaming service is their ideas for streaming channels, making the subscriber less prone to spend a lot of time picking what to watch. They will also be stealing a few shows off Netflix, potentially hurting the king of streaming, including Parks and Rec and The Office. Netflix content budget – https://variety.com/2020/digital/news/netflix-2020-content-spending-17-billion-1203469237/ NBC Peacock Price Tier – https://www.peacocktv.com Will Kanny, Staff Writer Will Kanny (22') is a staff writer of the Viewpoint Patriot. He is a member of the Viewpoint Basketball team and a life scout of Troop 127 trying to reach... Chess and Quarantine Driving Into the Upside Down: A Review of the New ‘Stranger Things’ Experience The film industry’s response to COVID-19 Ubisoft and “Black lives matter” movement The Free Agency of the Film Industry Americans speculate Chinese government is interfering with TikTok Inside the Church of Yeezus The biggest mistakes “Bohemian Rhapsody” made about Queen and the life of Freddie Mercury Two rookies take Coachella Sarah Williams (’19) presents film “Starfish” at Los Angeles International Children’s Film Festival
cc/2021-04/en_head_0031.json.gz/line2231
__label__wiki
0.550168
0.550168
joel brandenstein seit ich dich kenn consider, that you are not right.. Rich hill red sox stats 2011 04.10.2020 Zulutaxe 0 comments Categories : DEFAULT Rich Hill. Position: Pitcher Bats: Left • Throws: Left , lb (cm, kg). Team: Los Angeles Dodgers (majors, day IL) Born: March 11, in Boston, MA us Draft: Drafted by the Cincinnati Reds in the 36th round of the MLB June Amateur Draft from Milton HS (Milton, MA), the Anaheim Angels in the 7th round of the MLB June Amateur Draft from University of Michigan (Ann Born: Mar 11, Boston Red Sox selected the contract of LHP Rich Hill from Pawtucket Red Sox. 12/13/ Boston Red Sox signed free agent LHP Rich Hill to a minor league contract and invited him to spring training. Rich Hill Stats, Fantasy & News. Richard Joseph Hill resides in Boston with his wife Caitlin, and their son, Brice is a graduate of Milton (MA) High School attended the University of Michigan, where he pitched for three seasons from selected by the Chicago Cubs in the fourth round of the First-Year Player Draft and signed by scout Scott May. Rich Hill. Position: Pitcher Bats: Left • Throws: Left , lb (cm, kg). Team: Los Angeles Dodgers (majors, day IL) Born: March 11, in Boston, MA us Draft: Drafted by the Cincinnati Reds in the 36th round of the MLB June Amateur Draft from Milton HS (Milton, MA), the Anaheim Angels in the 7th round of the MLB June Amateur Draft from University of Michigan (Ann Born: Mar 11, Rich Hill. Position: Pitcher Bats: Left • Throws: Left , lb (cm, kg). Team: Los Angeles Dodgers (majors, day IL) Born: March 11, in Boston, MA us Draft: Drafted by the Cincinnati Reds in the 36th round of the MLB June Amateur Draft from Milton HS (Milton, MA), the Anaheim Angels in the 7th round of the MLB June Amateur Draft from University of Michigan (Ann. Rich Hill Stats, Fantasy & News. Richard Joseph Hill resides in Boston with his wife Caitlin, and their son, Brice is a graduate of Milton (MA) High School attended the University of Michigan, where he pitched for three seasons from selected by the Chicago Cubs in the fourth round of the First-Year Player Draft and signed by scout Scott May. Get the latest updated stats for Los Angeles Dodgers starting pitcher Rich Hill on veryxd.net Boston Red Sox selected the contract of LHP Rich Hill from Pawtucket Red Sox. December 13, Boston Red Sox signed free agent LHP Rich Hill to a minor league contract and invited him to spring. Boston Red Sox selected the contract of LHP Rich Hill from Pawtucket Red Sox. 12/13/ Boston Red Sox signed free agent LHP Rich Hill to a minor league contract and invited him to spring training. Hill (knee) will make one more rehab start before returning to the big-league rotation, Ken Gurnick of veryxd.net reports.. The left-hander was lights-out in his outing for High-A Rancho Cucamonga on. The Red Sox scored 9 runs after Hill's departure from the game in an eventual loss by the Dodgers who later lost the World Series 4 games to 1. Nicknames. During the inaugural MLB Players Weekend in , Rich Hill wore the name "BRICE" on his jersey to honor his veryxd.net run average: See Rich Hill stats and news. Get MLB season stats, career statistics, game logs and injury updates on the Los Angeles Dodgers pitcher. Watch Now Rich Hill Red Sox Stats 2011 Boston Red Sox vs Los Angeles Dodgers Highlights -- World Series Game 4 -- October 27, 2018, time: 18:22 Tags: My belle my head mi ,Pet the preacher discography s , Maze lock full version for nokia 5233 , Lagu peterpan jalak putih trotolan, Tyrone wells dream like new york Rich Hill. Position: Pitcher Bats: Left • Throws: Left , lb (cm, kg). Team: Los Angeles Dodgers (majors, day IL) Born: March 11, in Boston, MA us Draft: Drafted by the Cincinnati Reds in the 36th round of the MLB June Amateur Draft from Milton HS (Milton, MA), the Anaheim Angels in the 7th round of the MLB June Amateur Draft from University of Michigan (Ann. Get the latest updated stats for Los Angeles Dodgers starting pitcher Rich Hill on veryxd.net Rich Hill. Position: Pitcher Bats: Left • Throws: Left , lb (cm, kg). Team: Los Angeles Dodgers (majors, day IL) Born: March 11, in Boston, MA us Draft: Drafted by the Cincinnati Reds in the 36th round of the MLB June Amateur Draft from Milton HS (Milton, MA), the Anaheim Angels in the 7th round of the MLB June Amateur Draft from University of Michigan (Ann Born: Mar 11, 0 comments on “Rich hill red sox stats 2011” Mikagul I think, that you are not right. I suggest it to discuss. Write to me in PM, we will communicate. Categories Select Category [EVERYCAT] (1)
cc/2021-04/en_head_0031.json.gz/line2233
__label__cc
0.513
0.487
An American epic overflowing with heroes and hopefuls, scoundrels and screwballs. The story of Baseball is the story of America. It is an epic overflowing with heroes and hopefuls, scoundrels and screwballs. It is a saga spanning the quest for racial justice, the clash of labor and management, the transformation of popular culture, and the unfolding of the national pastime. Part 1: Our Game Inning One: Our Game looks at the origins of baseball in the 1840s and up to 1900. Ep1 | 1h 52m 56s KRWG Passport Video Part 2: Something Like a War Inning Two, Something Like a War, takes viewers through 1910. Part 3: The Faith of Fifty Million People Inning Three, The Faith of Fifty Million People, examines the century's second decade. Funding Provided By: General Motors Corporation; The National Endowment for the Humanities; The Pew Charitable Trusts; The Corporation for Public Broadcasting; The Public Broadcasting Service; Arthur Vining Davis Foundations Explore Ken Burns Shows
cc/2021-04/en_head_0031.json.gz/line2235
__label__wiki
0.997516
0.997516
Taylor Swift Sends Kobe Bryant's Daughter a Sweater Inspired by Her New Album By Brianna M 5 months ago Taylor Swift sent Kobe Bryant's 17-year-old daughter, Natalia Bryant, some much-sought-after merch inspired by the surprise release of her latest album, Folklore. Kobe's wife, Vanessa Bryant, shared a picture on her Instagram this past Saturday featuring Natalia proudly holding up the cardigan. "Thank you @taylorswift #Cardigan," the 38-year-old former model captioned the photo. "Thank you SO much @taylorswift!" Natalia wrote on her Instagram story. "I am OBSESSED with 'folklore.'" The cardigan is a reference to the second song on Folklore, titled "Cardigan." Swift, 30, sent condolences to the Bryant family after the tragic deaths of Kobe and his 13-year-old daughter, Gianna, who died in January along with seven others in a helicopter crash. "My heart is in pieces hearing the news of this unimaginable tragedy," Swift had written. "I can’t fathom what the families are going through. Kobe meant so much to me and to us all. Sending my prayers, love, and endless condolences to Vanessa and the family and anyone who lost someone on that flight." Kobe, who was a self-proclaimed "Swiftie," previously surprised the singer-songwriter during the L.A. stop of her 1989 world tour. He joined Swift on stage at the Staples Center, where his home team played. © 2021 Upbeatnews.com
cc/2021-04/en_head_0031.json.gz/line2237
__label__wiki
0.577815
0.577815
An approach to reconstituting motility of single myosin molecules S. J. Kron, T. Q.P. Uyeda, H. M. Warrick, J. A. Spudich Over the last five years, the value of in vitro motility assays as probes of the mechanical properties of the actin-myosin interaction has been amply demonstrated. Motility assays in which single fluorescent actin filaments are observed moving over surfaces coated with myosin or its soluble fragments are now used in many laboratories. They have been applied to a wide range of problems including the study of structure-function relationships in the myosin molecule and measurement of fundamental properties of the myosin head. However, one limitation of these assays has been uncertainty over the number of myosin heads interacting with each sliding filament, that frustrates attempts to determine properties of individual heads. In order to address this limitation, we have modified the conditions of the actin sliding filament assay to reduce the number of heads interacting with each filament. Our goal is to establish an assay in which the motor function of a single myosin head can be characterized from the movement of a single actin filament. SUPPL. 14 https://doi.org/10.1242/jcs.1991.supplement_14.26 10.1242/jcs.1991.supplement_14.26 Fingerprint Dive into the research topics of 'An approach to reconstituting motility of single myosin molecules'. Together they form a unique fingerprint. Myosins Medicine & Life Sciences Actin Cytoskeleton Medicine & Life Sciences Head Medicine & Life Sciences Uncertainty Medicine & Life Sciences Actins Medicine & Life Sciences Kron, S. J., Uyeda, T. Q. P., Warrick, H. M., & Spudich, J. A. (1991). An approach to reconstituting motility of single myosin molecules. Journal of Cell Science, 98(SUPPL. 14), 129-133. https://doi.org/10.1242/jcs.1991.supplement_14.26 An approach to reconstituting motility of single myosin molecules. / Kron, S. J.; Uyeda, T. Q.P.; Warrick, H. M.; Spudich, J. A. In: Journal of Cell Science, Vol. 98, No. SUPPL. 14, 1991, p. 129-133. Kron, SJ, Uyeda, TQP, Warrick, HM & Spudich, JA 1991, 'An approach to reconstituting motility of single myosin molecules', Journal of Cell Science, vol. 98, no. SUPPL. 14, pp. 129-133. https://doi.org/10.1242/jcs.1991.supplement_14.26 Kron SJ, Uyeda TQP, Warrick HM, Spudich JA. An approach to reconstituting motility of single myosin molecules. Journal of Cell Science. 1991;98(SUPPL. 14):129-133. https://doi.org/10.1242/jcs.1991.supplement_14.26 Kron, S. J. ; Uyeda, T. Q.P. ; Warrick, H. M. ; Spudich, J. A. / An approach to reconstituting motility of single myosin molecules. In: Journal of Cell Science. 1991 ; Vol. 98, No. SUPPL. 14. pp. 129-133. @article{8f2245175d6941edb97d5d967433d161, title = "An approach to reconstituting motility of single myosin molecules", abstract = "Over the last five years, the value of in vitro motility assays as probes of the mechanical properties of the actin-myosin interaction has been amply demonstrated. Motility assays in which single fluorescent actin filaments are observed moving over surfaces coated with myosin or its soluble fragments are now used in many laboratories. They have been applied to a wide range of problems including the study of structure-function relationships in the myosin molecule and measurement of fundamental properties of the myosin head. However, one limitation of these assays has been uncertainty over the number of myosin heads interacting with each sliding filament, that frustrates attempts to determine properties of individual heads. In order to address this limitation, we have modified the conditions of the actin sliding filament assay to reduce the number of heads interacting with each filament. Our goal is to establish an assay in which the motor function of a single myosin head can be characterized from the movement of a single actin filament.", author = "Kron, {S. J.} and Uyeda, {T. Q.P.} and Warrick, {H. M.} and Spudich, {J. A.}", doi = "10.1242/jcs.1991.supplement_14.26", journal = "Journal of Cell Science", publisher = "Company of Biologists Ltd", number = "SUPPL. 14", T1 - An approach to reconstituting motility of single myosin molecules AU - Kron, S. J. AU - Uyeda, T. Q.P. AU - Warrick, H. M. AU - Spudich, J. A. N2 - Over the last five years, the value of in vitro motility assays as probes of the mechanical properties of the actin-myosin interaction has been amply demonstrated. Motility assays in which single fluorescent actin filaments are observed moving over surfaces coated with myosin or its soluble fragments are now used in many laboratories. They have been applied to a wide range of problems including the study of structure-function relationships in the myosin molecule and measurement of fundamental properties of the myosin head. However, one limitation of these assays has been uncertainty over the number of myosin heads interacting with each sliding filament, that frustrates attempts to determine properties of individual heads. In order to address this limitation, we have modified the conditions of the actin sliding filament assay to reduce the number of heads interacting with each filament. Our goal is to establish an assay in which the motor function of a single myosin head can be characterized from the movement of a single actin filament. AB - Over the last five years, the value of in vitro motility assays as probes of the mechanical properties of the actin-myosin interaction has been amply demonstrated. Motility assays in which single fluorescent actin filaments are observed moving over surfaces coated with myosin or its soluble fragments are now used in many laboratories. They have been applied to a wide range of problems including the study of structure-function relationships in the myosin molecule and measurement of fundamental properties of the myosin head. However, one limitation of these assays has been uncertainty over the number of myosin heads interacting with each sliding filament, that frustrates attempts to determine properties of individual heads. In order to address this limitation, we have modified the conditions of the actin sliding filament assay to reduce the number of heads interacting with each filament. Our goal is to establish an assay in which the motor function of a single myosin head can be characterized from the movement of a single actin filament. U2 - 10.1242/jcs.1991.supplement_14.26 DO - 10.1242/jcs.1991.supplement_14.26 JO - Journal of Cell Science JF - Journal of Cell Science IS - SUPPL. 14
cc/2021-04/en_head_0031.json.gz/line2239
__label__wiki
0.66907
0.66907
Stephanus of Byzantium Stephenus or Stephan of Byzantium (Latin: Stephanus Byzantinus; Greek: Στέφανος Βυζάντιος, Stéphanos Byzántios; fl. 6th century AD), was the author of an important geographical dictionary entitled Ethnica (Ἐθνικά). Of the dictionary itself only meagre fragments survive, but we possess an epitome compiled by one Hermolaus, not otherwise identified. Byzantinisches Vater unser Ostkirchliche Liturgie in Hartberg 2 The Ethnica 3 Editions 5 Sources 6 Further reading Byzantium during Stephanus lifetime Nothing is known about the life of Stephanus, except that he was a grammarian at Constantinople, and lived after the time of Arcadius and Honorius, and before that of Justinian II. Later writers provide no information about him, but they do note that the work was later reduced to an epitome by a certain Hermolaus, who dedicated his epitome to Justinian; whether the first or second emperor of that name is meant is disputed, but it seems probable that Stephanus flourished in Byzantium in the earlier part of the sixth century AD, under Justinian I. The Ethnica Even as an epitome, the Ethnica is of enormous value for geographical, mythological, and religious information about ancient Greece. Nearly every article in the epitome contains a reference to some ancient writer, as an authority for the name of the place. From the surviving fragments, we see that the original contained considerable quotations from ancient authors, besides many interesting particulars, topographical, historical, mythological, and others. Stephanus cites[1] Artemidorus, Polybius, Aelius Herodianus, Herodotus, Thucydides, Xenophon, Strabo and other writers. The chief fragments remaining of the original work are preserved by Constantine Porphyrogennetos, De administrando imperio, ch. 23 (the article Ίβηρίαι δύο) and De thematibus, ii. 10 (an account of Sicily); the latter includes a passage from the comic poet Alexis on the Seven Largest Islands. Another respectable fragment, from the article Δύμη to the end of Δ, exists in a manuscript of the Fonds Coislin, the library formed by Pierre Séguier. The first modern printed edition of the work was that published by the Aldine Press in Venice, 1502. The complete standard edition is still that of Augustus Meineke (1849, reprinted at Graz, 1958), and by convention, references to the text use Meineke's page numbers. A new completely revised edition in German, edited by B. Wyss, C. Zubler, M. Billerbeck, J.F. Gaertner, was published between 2006 and 2017, with a total of 5 volumes.[2] Aldus Manutius (pr.), 1502, Στέφανος. Περὶ πόλεων (Peri poleōn) = Stephanus. De urbibus ("On cities") (Venice). Google Books Guilielmus Xylander, 1568, Στέφανος. Περὶ πόλεων = Stephanus. De urbibus (Basel). Thomas de Pinedo, 1678, Στέφανος. Περὶ πόλεων = Stephanus. De urbibus (Amsterdam). Contains parallel Latin translation. Google Books Claudius Salmasius (Claude Saumaise) and Abraham van Berkel, 1688, Στεφάνου Βυζαντίου Ἐθνικὰ κατ' ἐπιτομήν Περὶ πόλεων = Stephani Byzantini Gentilia per epitomen, antehac De urbibus inscripta (Leiden). Contains parallel Latin translation. Google Books Lucas Holstenius, 1692, Notae & castigationes in Stephanum Byzantium De urbibus (Leiden). Google Books Thomas de Pinedo, 1725, Stephanus de urbibus (Amsterdam). Google Books Karl Wilhelm Dindorf, 1825, Stephanus Byzantinus. Opera, 4 vols, (Leipzig). Incorporating notes by L. Holsteinius, A. Berkelius, and T. de Pinedo. Google Books Anton Westermann, 1839, Stephani Byzantii ethnikon quae supersunt (Leipzig). Google Books Augustus Meineke, 1849, Stephani Byzantii ethnicorum quae supersunt (Berlin). Google Books Margarethe Billerbeck et al. (edd), Stephani Byzantii Ethnica. 5 volumes: 2006–2017. Berlin/New York: Walter de Gruyter, (Corpus Fontium Historiae Byzantinae 43/1)[2][3][4] ^ J. S. Richardson, Hispaniae: Spain and the Development of Roman Imperialism, 218-82 BC: "In four places, the lexicographer Stephanus of Byzantium refers to towns and ... Artemidorus as source, and in three of the four examples cites Polybius.; From political architecture to Stephanus Byzantius ^ a b de Gruyter ^ Reviewed by C. Neri in ^ Reviewed by Martin L. West This article incorporates text from a publication now in the public domain: Chisholm, Hugh, ed. (1911). "Stephanus Byzantinus". Encyclopædia Britannica. 25 (11th ed.). Cambridge University Press. p. 880. (The Britannica page as a TIFF scan[permanent dead link]) Smith, W., Dictionary of Greek and Roman Biography and Mythology, vol. 3, s.v. "Stephanus" (2) of Byzantium. Diller, Aubrey 1938, "The tradition of Stephanus Byzantius", Transactions of the American Philological Association 69: 333–48. E.H. Bunbury, 1883, History of Ancient Geography (London), vol. i. 102, 135, 169; ii. 669–71. Holstenius, L., 1684 (posth.), Lucae Holstenii Notae et castigationes postumae in Stephani Byzantii Ethnika, quae vulgo Peri poleōn inscribuntur (Leiden). Niese, B., 1873, De Stephani Byzantii auctoribus (Kiel) Johannes Geffcken, 1886, De Stephano Byzantio (Göttingen) Whitehead, D. (ed.), 1994, From political architecture to Stephanus Byzantius : sources for the ancient Greek polis (Stuttgart). BNF: cb15556605k (data) This page was last edited on 14 March 2020, at 17:35
cc/2021-04/en_head_0031.json.gz/line2241
__label__cc
0.591609
0.408391
PART I – BACKGROUND In the autumn of 1993, I racked my brains trying to understand why all those women in my family had kept silent for so long. By sifting through the lives of my mother, her sisters and my grandmother and piecing things together again, I had come to the baffling conclusion in July of that year that the sexual abuse of girls, women and most probably of boys also, has been a practice in my family for at least seventy years, and still continues because of the silence of everyone involved. After discovering this, I was stunned for days in shock and horror. No words can describe how I felt. I would have liked to grab all those women by the shoulders and shake them and scream: ‘Nanie [1], why didn’t you say something, mousie [2], mama? Why, why?’ This piecing together did not, of course, just happen out of the blue, but came while dealing with the sexual abuse which had in turn, fell to me. The most crucial moment of this process was when this experience was publicized in an interview in Vrij Nederland [3] in May, 1993. The path to this public acknowledgement had been laid down by two previous years of psychotherapy together with books I had been reading on incest traumas and why this had to happen to me. These books together with the conversations I had had, taught me that you are seldom the only one, very often there are other victims in the immediate family without either you or the others knowing. The perpetrators are protected by the wall of silence around the victims. And it is precisely this wall of silence which I broke through in that interview. I had turned twenty nine in April of that year. Two years before, I had informed my mother that two of her seven brothers had sexually abused me, while she was under the impression that she had left me safely at her mother’s home. Tears flowed abundantly while I told her, sitting in an apartment in the Bijlmer in the South-East of Amsterdam. The irony was that without her ever having told me so, I knew that she had been abused. I even knew who the perpetrator was. But she was not aware that I, her own daughter, had also fallen victim to the incestuous practices which had become a family tradition. She was in deep shock. She did not know that it was a tradition, nearly a kind of rite of initiation, until I proposed this to her in May, 1992. Why did they keep silent, allowing this collective deed, undergone in loneliness, to continue? Puzzling over this for weeks on end, I comforted myself by reading Salman Rushdie’s Midnight’s Children and many other books. As I read further, I became more and more enraptured with the book. In all his books, Rushdie plays like a magician with the diverse meanings which name can assume. I read about Padma, about Saleem, Mother Superior (the Venerable Mother) and about the Children of Midnight. I learnt about nicknames and the meaning of names and the different directions lives can take under the influence of a name. And suddenly I found the key to the reason why. I had known it all along but never had the insight to accompany that knowledge. I had forgotten the stories of my grandmother because their meaning had escaped me. At birth she had been given the name Manthorni which means ‘she who has broken my heart’. After the first girl, she had come into this world as the second child of her parents instead of the boy whom her adji [4] had so set her heart upon. Barely a few days in the world, it was given to my grandmother to bear the burden of that disappointment. My grandmother is seventy and still carries that name. From the first day of her life onwards, when anyone called her by name, she was reminded that she was worthless as a woman. This awareness influenced her life to the extent that she became submissiveness itself. Growing up in a more independent generation, I was often irritated by this submissiveness, the cringing way in which she attempted to hold her ground in the family. She was such a capable woman, there were so many things she had done of which she could be proud. I wanted her to be proud of herself but she always left it up to God to decide about her life. Her answer to the issues of life has always been ‘Bhagwan jaane’: only God knows. Ever since she was born, she had learnt to be ashamed for the simple fact that she entered the world as a woman. The alleged superiority of the male was perpetually drummed into her. She learnt to be silent, learnt that it was her fate. She grew up under the law of self-fulfilling prophecy: if from the time you were born, you only heard negative things about yourself, you start believing that they are true and you become negative about yourself. Because she did not know better, she raised her four daughters whit this same idea, idolized her sons and hated her daughters-in-law before she even set eyes on them. My mother also tried to force this negative notion of womanhood on me but she did not succeed, something for which she is now grateful. That day in the fall of 1993, I cried for my nanie, my mother and myself. And at that moment my as yet tentative plan to write a book on incest in Surinamese families changed to firm resolve. Because I realized that after seventy years, I was the first one daring to speak out; that it was not only my story anymore, but also theirs. We are all part of a terrible tragedy that has to be exposed. This tragedy which made their lives and mine unbearable and which has dominated mine for more than twenty years, has to stop. I still live in the benumbing realization that I was not the last to be sexually abused. The abuse will only come to an end if the protective wall of silence around the rapists is destroyed brick by brick. [1] Maternal grandmother [2] Auntie [3] Vrij Nederland is a weekly Dutch magazine [4] Paternal grandmother © Usha Marhé
cc/2021-04/en_head_0031.json.gz/line2244
__label__cc
0.710007
0.289993
Sharon Reimold, M.D. Internal Medicine Vice Chair for Clinical Operations and Faculty Development Gail Griffiths Hill Chair in Cardiology Internal Medicine - Cardiology Heart Valve Disorders Appointment New Patient Appointment Accepting Virtual Visits or 214-645-8300 See Dr. Reimold's Locations Clinical Heart and Vascular Center (Dallas) Sharon Reimold, M.D., is a Professor in the Department of Internal Medicine at UT Southwestern Medical Center. She specializes in the interpretation of imaging studies, particularly echocardiograms, and is an expert on gender differences in cardiac disease. Dr. Reimold earned her medical degree and completed a residency in internal medicine at Washington University in St. Louis. She received advanced training in cardiovascular disease through a fellowship at Brigham and Women’s Hospital, the teaching affiliate of Harvard Medical School. She joined the UT Southwestern faculty in 2000. Dr. Reimold conducts extensive research into imaging and heart failure, as well as the use of magnetic resonance imaging in cardiac care. She is a member of the American Heart Association and the American College of Cardiology, among other professional organizations. In 2018 she was named a Texas Monthly Super Doctor, and she has also been named a D Magazine Best Doctor. In 2012, she earned the Patricia and William L. Watson Jr., M.D., Award for Excellence in Clinical Medicine. Meet Dr. Reimold Heart Imaging Cardiologist Sharon Reimold, M.D., is a highly experienced cardiologist who trained at Harvard Medical School and specializes in the interpretation of imaging studies, with a strong emphasis on echocardiograms. In fact, no one in North Texas has read more echocardiograms than she has. But interpreting cardiac images is only part of the story: She is also an expert on knowing what to do with the analyses to positively impact patient care. "Patients should feel absolutely confident that I’ll have the right answer after reading their echocardiogram and that I’ll know what to do with that answer or result," Dr. Reimold says. “The echocardiographer is a little like the radiologist of cardiology, except at UT Southwestern we also have the clinical care ability,” she says. “It’s really how the information is interpreted and put into clinical practice that makes our medical imaging abilities superior.” With more than 25 years’ experience in the field of cardiology and cardiac imaging, Dr. Reimold is called on frequently by area physicians and patients to offer second opinions in interpreting cardiac test results, as well as to translate imaging findings into appropriate patient care. A UT Southwestern faculty member since 2000, Dr. Reimold is uniquely skilled in caring for acutely ill patients, and she sees many patients who, while not seriously ill, are living with cardiac problems that affect their quality of life. Many of Dr. Reimold's patients are women who come to her with vascular heart disease, cardiovascular disorders during pregnancy, and other heart-related issues, as well as for preventive cardiac care. “Some of the women I’ve seen who had been to other cardiologists felt like their symptoms weren’t being taken seriously,” she says. “I’m a little more in tune to the variety of symptoms that women can have.” Dr. Reimold’s skill and compassion in caring for patients were recognized in 2012 when she was named the recipient of the Patricia and William L. Watson Jr., M.D., Award for Excellence in Clinical Medicine. The award recognizes a UT Southwestern clinician whose work exemplifies a commitment to outstanding patient care and advancement of innovative medical therapy. Research Fellowship - Harvard Medical School (1988-1991), Internal Medicine Chief Resident - John Cochran VA Medical Center (1988-1988), Internal Medicine Residency - Washington University/Barnes Hospital (1986-1988), Internal Medicine Internship - Washington University/Barnes Hospital (1985-1986), Internal Medicine Medical School - Washington University School of Medicine Fellowship - Brigham and Women's Hospital (1988-1990), Cardiology Society of Cardiovascular Magnetic Resonance American Society of Echocardiography D Magazine Best Doctor 2020 Eugene Braunwald Teaching Award 2000 ACC/Merck Award 1991 Utility of serial echocardiography Use of magnetic resonance imaging Imaging and heart failure Women's Heart Disease General Cardiology Q&A by Dr. Reimold Division of Cardiology Articles by Dr. Reimold Cardiac MRI for COVID-19 return-to-play is not ready for prime time Why daily aspirin therapy for heart disease might not be safe for everyone What women need to know about heart attack symptoms Can NSAIDs increase my risk of heart attack or stroke? 5 tips for taking your blood pressure at home Having sex after a heart attack - what you need to know 10 truths about statins and high cholesterol Holiday drinking and your heart: When should it be last call for alcohol? Should I take blood thinners to control my atrial fibrillation? Appointment New Patient Appointment Accepting Virtual Visits or 214-645-8300 or 817-882-2700
cc/2021-04/en_head_0031.json.gz/line2245
__label__cc
0.555431
0.444569
where do black slugs live Most otters live in dens — built by other animals, such as beavers — that are dug into the ground that have many channels and dry inner chambers. They live in semi-open habitats such as savanna or semideserts, while some, such as the black guineafowl, mainly inhabit forests. Normally, it is the most commonly encountered veronicellid in Florida. Malacologia 41: 413-438. Marsh slug, Deroceras laeve (Müller, 1774), brownish morph. Figure 7. Slugs, technically gastropods, are the foe of many gardeners. Their most notable characteristic is the pair of stalked rhinophores or horns at the head of the Slug. The very young slugs are not so darkly colored. Slugs love dark and damp, so keeping the garden tidy can reduce places for them to find comfort. History of Samoyed Dogs Living in Hot Weather. Some perch high on treetops. Some perch high on treetops. The slug breathes by opening and shutting a … Their eggs are not all produced in a single batch; instead, they are deposited periodically in soil or leaf litter. 2 days ago i purchased 2 pcs of cured live fiji rock from my LFS and today i was looking for hitchikers and found the LR covered in little rice size black slugs??? Primarily due to international trade, nonindigenous slugs continue to be introduced to North America, so other species are likely to establish populations in Florida. This attribute likely explains the presence of marsh slug in Florida but the absence of gray field slug. The helmeted guinea fowl has been introduced in East Africa, the West Indies, the United States, Britain, and India, where it is raised as food or pets. Lateral view of the anterior area of the Carolina mantleslug, Philomycus carolinianus (Bosc, 1802), with the mantle showing light pigmentation at the site (center) of the breathing pore. Lateral view of slug showing the breathing pore (pneumostome) open. Figure 12. Bailey SER. They live in wetlands, deciduous forests, grasslands, rain forests, arid scrublands and mountains. Foliar injury to a Madagascar periwinkle (vinca) plant (left) caused by Deroceras laeve slugs and, for comparison, an undamaged plant of the same age growing nearby (right). What Do Black Slugs Eat? It is estimated that, during warm summer months, as much as 90% of a garden’s slug population lives underground. Notes on the ecology of slugs: Henderson I, Triebskorn R. 2002. The Garry Oak Ecosystem Recovery Team suggests the following control strategies, stating chemical controls should only be used as a last resort in protecting endangered species or critical habitat. However, this slug can be somewhat variable in appearance, and sometimes is fairly pale or mostly dark. Molluscs (Slugs, Snails, Mussels and Limpets) are a much under-recorded group in Birmingham and the Black Country. What Beverly Hills and Malibu are to Hollywood, Brentwood and Franklin are to Nashville. Figure 19. Because slugs are omnivorous, if conditions are favorable they feed on plants, sometimes becoming pests in gardens, nurseries, and crops. Both snails and slugs can live for several years. Some perch high on treetops. Its mantle covers only the posterior 2/3 of the animal and is thicker in the anterior region of the mantle, giving the slug a hump-backed appearance. Dorsal-lateral view of the banded slug, Lehmannia valentiana (Férussac, 1822), with light-pigmented breathing pore (pneumostome) visible. Though only 1 cm long at rest, the marsh slug can become more elongate (up to 3 cm) when extended. Get Rid of Slugs That Are Inside Your House. Lightning Bug larvae, which look like beetles, will eat slugs. Photograph by Lyle J. Buss, University of Florida. They can also be found in woodland, scrublands and mountainous habitats if there is prey available. This slug may live up to three years. Seedlings are grazed by slugs feeding on the surface from the time they emerge, resulting in characteristic shredding of the blades. Johnny Cash. Hedgehogs live in a broad range of habitats. There are currently 48 known breeds of Slugs that fall into 14 different elements. Like all other animals, they want to be dry and safe in a relatively quiet area. Heading to the 'Burbs. 2'. Sometimes it is found in lawns (Walls 2009) and disturbed areas near homes, such as drainage ditches. . To begin its life cycle, Trichinella spiralis adults will invade the intestinal wall of a pig, and produce larvae that invade the pig's muscles. They live in semi-open habitats such as savanna or semideserts, while some, such as the black guineafowl, mainly inhabit forests. However, the color pattern can be quite variable. Eastern gray squirrels generally prefer constructing their dens upon large tree branches and within the hollow trunks of trees. Adult fleas are parasites that tend to live on the back, neck and underside regions of cats and dogs, with the eggs, larvae and pupae living off the host. Superficially, most slugs appear to be quite similar, with a naked, unsegmented body covered by mucus and bearing two pairs of tentacles anteriorly, one of which bears the eyes (Figures 1, 6). Coyotes live in North America and roam the plains, forests, mountains and deserts of Canada, the United States, Mexico and Central America. Diagram of slugs, showing two types of mantles, and alternate positions of the breathing pore (the arrow points to pore) relative to mid-point of mantle. Its background color is whitish or tan, but it bears numerous black spots. If you look at the dark nail head-on, you will see a small dark circle. It is commonly found under logs, loose bark, and aerial bromeliads. I wanted to feel what a giant slug felt like. Steps Use beer or milk traps for important plants. If, in trying to find slug eggs, you plow the entire garden and the frosts aren’t yet over, you risk harming not only the slugs but all creatures that live in the soil. Capinera JL, Guedes Rodgrigues C. 2015. A single slug has the potential to produce 90,000 offspring in it’s life time. The foot may exhibit a color ranging from yellow to black. Large black slug - Arion ater - up to 150 mm long, jet black or orange with a black head. Like the more common forms, it is a large slug, attaining up to 8 g in weight and 10 cm in length. The red-tailed hawk is the most common hawk in North America. This small species apparently is indigenous, or at least is widespread, in North America. They live in Seoul, South Korea. Natural Enemies of Terrestrial Molluscs. The velvety black color of these slugs occasionally is interrupted by a pale median stripe, especially in juveniles. If they get to your garden while your plants are still seedlings, they can eat entire rows of seeds before the seeds have a chance to sprout. It is native to the Alaska Interior and Yukon, save for the tundra region of the Arctic Coast. The pancake slug is large, often 5–12 cm in length, and usually very pale, ranging from whitish to tan or speckled with brown spots. In the wild, they like to live in warm, dry areas, like steppes, sand dunes and the edges of deserts. Mudpuppies are large salamanders with red feathery gills that never leave the water. 3'. Yes, I agree with Bamboo, I had the same problem, but luckily the slugs were quite close to the wall, I intended to use slug pellets but scattered them with salt and got rid of them that way, but the salt did make the grass go a bit brown, but it soon recovered, I wouldn't recommend salt though if your slugs are scattered over most of your lawn. Today, they have been reintroduced into parts of their former range in Wyoming, South Dakota, Montana and Arizona. Most slugs are hermaphroditic, possessing both male and female sex organs. Very few will be found on the tail and legs Img 2. Phidippus regius, known commonly as the regal jumping spider, is a large species of jumping spider in eastern North America. Several slugs found in Florida have yet another mantle arrangement, wherein the entire dorsal surface is covered with the mantle. The answer to the question is that husky can live anywhere even in the tropics, desert or Siberia. Increasingly, they are unavailable. 2014), so perhaps it will become commercially available here. The keel is a ridge that runs the length of the back of some species of slug. Development time of slugs varies with weather conditions and among species, but several months or more are commonly required for slugs to reach maturity. Well recently BTS moved to a new dorm (in December) into Hannam the Hill which is one of the most luxurious and expensive apartment located in Seoul. This type of slug takes on an orange hue when it is newly hatched and later takes on a black coloration hence its name. Some slugs do this. They often die from desiccation following paralysis, but detoxification of the poison by the slug is sometimes accomplished, so they may recover and survive (Henderson and Triebskorn 2002). But animals with simple nervous systems, like lobsters, snails and worms, do not have the ability to process emotional information and therefore do not experience suffering, say most researchers. They were used with varying success in the explorations of both poles, as well as during the Alaskan gold rush. Some parasitic flies (Diptera, especially marsh flies, family Sciomyzidae and phorid flies, family Phoridae) a few fungi, and many protozoa are known to affect slugs (Godan 1983). Moles and shrews also will feed on slugs. Just like Hollywood stars don't actually live in Hollywood, Nashville stars don't reside in Nashville proper, they just work there sometimes. The color can be variable from bright orange to black. The bait contains a toxicant, of course. Elsewhere, pancake slug is found throughout the Caribbean, and some islands in the Pacific, including Hawaii. Protect traps from rain and pets. Slugs live in dark damp places or underground. The foot is nearly as wide as the body (Figure 11). He previously headed Bounty Hunter Tactical Supply Co. after Duane Lee moved to Florida. However, within a slug family there can be considerable uncertainty about correct identifications and speciation. Carolina mantleslug, Philomycus carolinianus (Bosc, 1802), with the mantle showing an open breathing pore (left third of image in area of light pigmentation). On the other hand, following exposure to Snail and Slug Away™, which contains cinnamon oil as the active ingredient, considerable reduction of plant feeding was noted. Follow the steps below to get rid of every slug in your house. Photograph by Lyle J. Buss, University of Florida. Thus, at least in some species, a single individual can inseminate another slug, can be inseminated by another, and can even inseminate itself! And as luck would have it, they mainly seem to get into the kitchen. Cordylobia anthropophaga, the mango fly, tumbu fly, tumba fly, putzi fly, or skin maggot fly, is a species of blow-fly common in East and Central Africa. Molluscs as Crop Pests. Personal Life. The average cubic yard (metre) of garden contains around 200 slugs. The human bot fly is native to Central and South America. Photograph by Lyle J. Buss, University of Florida. Each breed of Slug has its own unique powers. They live in groups of about 10 adults, and live in burrows, either dug by themselves or by other animals. Img 2 Heat map showing where fleas live on dogs and cats. Body circular or oval in cross-section, and not tapering laterally (toward the sides) (Figure 10); breathing pore (pneumostome) found near anterior right mantle edge; foot nearly as wide as body (Figure 11) - Family Philomycidae, the mantleslugs 2002. Slug & Snail Defense™ contains a mixture of plant essential oils and pepper, but in tests with Leidyula floridana there was no protection of leaf material. Photograph by Lyle J. Buss, University of Florida. Historically, it ranged the northern forests of Canada and the United States as well as forests in the Appalachian, Rocky and Pacific Coast Mountains. Vaginulidae in Central America, with emphasis on the bean slug. These are usually underground and provide protection from the worst winter frosts. It is also called the rat lungworm. Simple precautions reduce the risk of the disease. They live in semi-open habitats such as savanna or semideserts, while some, such as the black guineafowl, mainly inhabit forests. They are also often scarce in upland areas such as moorlands and mountainsides. (Figure 7c). Snails and slugs get infected by ingesting the larvae. African wild dog at Tswalu Kalahari Reserve in South Africa. Climate generally does not limit black-footed ferret activity, but it may remain inactive inside burrows for up to 6 days at a time during winter. The velvety black color of these slugs occasionally is interrupted by a pale median stripe, especially in juveniles. Phasmarhabditis hermaphrodita (Nematoda: Rhabditida) a slug-parasitic nematode, is used in Europe to control slugs, has not been allowed in the USA because of concern about introducing a non-native organism. How long do they live? Photograph by Lyle J. Buss, University of Florida. A habitats is a place where living things live and how they survive in that area. I have become interested in the distribution of the native land slugs of North America. Slugs often develop faster and commence reproduction sooner under warm conditions, but attain a larger size and ultimately produce the same number or more eggs at cooler conditions. Up to 91% of the ferret's diet is composed of prairie dogs which are essential to their survival, though they will sometimes eat squirrels, mice and other rodents. 2007. Agriolimacidae. Back to Top Identification can be tricky and sources for identification seem to be incomplete, inaccurate, scattered, outdated, understudied and limited leading to the native slugs being misidentified. It grows mostly in riparian zones, from southern Ontario, west to southeast South Dakota, south to Georgia, northern Florida and southwest to central Texas. Trichinella spiralis can live the majority of its adult life in the intestines of humans. Rudman, W.B., 2001 (Jul 17). The eyestalks are bluish. An older home can be especially attractive to slugs and snails – there are plenty of cracks and crevices and underneath it’s dark, cool and often moist. CABI Publishing, Wallingford, UK. Slug 'a' shows anterior (relative to the mid-point) location of pore; slug 'b' shows posterior location. Atlanta, Georgia. Las Vegas, Nevada. Move firewood piles away from the house and store firewood off of the ground. Most slugs feed in or on the soil surface, but keeled slugs (Milax species) live and feed mostly in the root zone. They are 1–3 mm long, and vary from round to oval in shape. Therefore, besides their natural cold habitat, they will also survive living in your very own apartment. Black squirrel. Juvenile slugs kill more emerging grass seedlings because they are often abundant in seedbeds. Where Do Slugs Live? Traditionally, the toxicant in such baits is metaldehyde, or sometimes metaldehyde plus a carbamate toxicant, or occasionally a carbamate toxicant alone. Red foxes live around the world in many diverse habitats including forests, grasslands, mountains, and deserts. The breathing pore (pneumostome) is located in a lightly pigmented anterior right area of mantle (Figures 12, 13). It has been used to provide partial control of giant African snail, but it has been quite disruptive to native snail populations, so its use is discouraged outside its natural range (Barker 2004). Because of this black velvety appearance, it is unlikely to be confused with any other slug found in Florida. With the help of Siberian Huskies, entire tribes of people were able not only to survive, but to push forth into terra incognita. Moisture is also an important factor governing slug distribution and activity. Most species of slugs are generalists, feeding on a broad spectrum of organic materials, including leaves from living plants, lichens, mushrooms, and even carrion. Snail shells are a whole psychedelic world of their own. Figure 1. Where is the black footed ferrets habitat? In early spring, make sure to rake your garden to remove leaves, debris and slug eggs. Dense vegetation, deep mulch, and frequent irrigation favor slugs. Rueda A. Sea Slugs, sometimes called Nudibranchs, display vivid colors and an unusual body shape. Rat lung worm disease is an extremely rare cause of meningitis in Australia. They are also more active under cloudy conditions or after a light rain. Thetoad is the most important, but snakes, several species of ground beetles and their larvae, wild birds, and ducks will also eat slugs and snails. The related but larger Megapallifera mutabilis (Hubricht, 1951), also known as the changeable mantleslug, is known from counties in Alabama adjacent to Florida and may occur in the Panhandle region of Florida but so far is unreported there. However, development of chemicals and research on biological control (i.e., potential predators and parasites) have been done mostly outside of the USA, and options for management are more limited than with insects. Getz LL. The name of this species has changed repeatedly (e.g., Limax valentianus [Férrusac, 1823], Limax poirieri [Mabille, 1883]), and most North American records for this species refer to it as Lehmannia marginata (Hoffman, 1928). Slugs and snails have natural enemies. In winter, slugs seek out thermally buffered hibernation sites where temperatures rarely dip below 0°C. Carolina mantleslug, Philomycus carolinianus (Bosc, 1802). Pages 1-31 in Baker, GM. 17949 SE Federal Hwy, Martin FL (below) Faith Hill. They are known to roam large distances, perhaps 12 miles in a single day. Some slugs do this. Smaller eggs are those of Deroceras sp. 2006). The brown hyena (Hyaena brunnea), also called strandwolf, is a species of hyena found in Namibia, Botswana, western and southern Zimbabwe, southern Mozambique and South Africa. White-McLean J, Capinera JL. Plants that are placed closely together are more likely to attract slugs because the soil does not … The mucus of this group is very sticky. This slug is 5–12 cm long, and variable in color but usually brown with dark but thin dorsolateral stripes along it back, and a thin light-colored stripe dorsally. Slugs and snails can do a host of damaging things to your garden. From our friend Collin: “We live in an old farmhouse in the heart of a rainy, wet valley. Other species (right) deposit their eggs in a loose cluster, or a small number of eggs per cluster. Barriers are an effective way to Although this type of damage is evident, it is not necessarily diagnostic of slugs, because snails, beetles, grasshoppers, and caterpillars often inflict the same type of injury. This large slug has its mantle extending the entire length of its body. Molluscs as Crop Pests. Slugs remain active throughout the year, unlike snails, which are dormant during autumn and winter. The helmeted guinea fowl has been introduced in East Africa, the West Indies, the United States, Britain, and India, where it … The genital pore is located adjacent to the foot (Figure 8), normally less than 1/4 hyponotal width (the hyponotum is the portion of the mantle that wraps beneath the slug body and is adjacent to the foot) from the foot. Eggs are not very resistant to desiccation, so they must remain in fairly humid environments, and absorb some water, if hatching is to be successful. Most slugs feed in or on the soil surface, but keeled slugs (Milax species) live and feed mostly in the root zone. Voodoo (sometimes spelled vodou or vodun) is a religion based in West Africa and practiced throughout Haiti and the Caribbean, Brazil, the American South and other places with an African heritage. Other veronicellids have been found in Florida, or may soon become established. Also, when sprayed directly on Leidyula floridana slugs, Snail & Slug Away caused rapid mortality. They are domesticated animals that love to stay outdoors. 1more Triple Driver Vs Soundmagic E11c, How To Fillet A Brown Trout, Hungary Political News, 12 Organ Systems, Tesla Mechanical Design Engineer Salary, Ge Stove Wiring Diagram, Roman Menu Ideas,
cc/2021-04/en_head_0031.json.gz/line2246
__label__wiki
0.95978
0.95978
Variety Read Next: Joe Biden Changed His Mind About Same-Sex Marriage After Meeting This Hollywood Executive Jan 15, 2014 4:48pm PT Producer Richard Shepherd, Founder of Artists Agency, Dies at 86 He headed production at MGM and Warner Bros. in the '70s and '80s By Maane Khatchatourian Maane Khatchatourian News Editor, Variety.com MaaneKhat Trump Sets First Live Interview Since Election Loss on Fox News Channel 2 months ago Trump and First Lady Test Positive for Coronavirus 4 months ago Cuba Gooding Jr. Accused of Raping Woman in Hotel Room 5 months ago Studio exec and producer Richard Shepherd died Tuesday night at his Los Angeles home, his wife Patricia told Variety. He was 86. Shepherd, who was suffering from a long-time illness, produced “Breakfast at Tiffany’s” and headed production at MGM and Warner Bros. before founding the Artists Agency during his 60-plus-year career. Shepherd also produced 1959’s “The Hanging Tree,” starring Gary Cooper; 1960’s “The Fugitive Kind” with Marlon Brando and 1976’s “Robin and Marian,” starring Audrey Hepburn, whom he convinced to return to acting after a decade-long absence. He worked with longtime partner Martin Jurow on most of his projects, including “Love in a Goldfish Bowl” and “Breakfast at Tiffany’s.” He was hired by MCA owner Lew Wasserman right after graduating from Stanford in the 1940s. Shepherd would later found his own agency, The Artists Agency, and rep the likes of Marilyn Monroe and Richard Harris. He spent two decades there, where he worked until his 70s. After producing a slew of films, Shepherd returned to the agency world in the ’60s as one of the first partners at CMA (later ICM). As head of production at Warner Bros., he oversaw “The Exorcist” in the 1970s. He took over at MGM in 1976, developing 1979’s “The Champ,” 1979’s “Clash of the Titans” and 1982’s “Shoot the Moon.” He is survived by his wife and son, Scott Shepherd, a TV writer and producer. Donations may be made to the Motion Picture and Television Fund.
cc/2021-04/en_head_0031.json.gz/line2247
__label__wiki
0.713677
0.713677
The Wright Sister Patty Dann An epistolary novel of historical fiction that imagines the life of Katharine Wright and her relationship with her famous brothers, Wilbur and Orville Wright. On December 17, 1903, Orville and Wilbur Wright flew the world’s first airplane at Kitty Hawk, North Carolina, establishing the Wright Brothers as world-renowned pioneers of flight. Known to far fewer people was their whip-smart and well-educated sister Katharine, a suffragette and early feminist. After Wilbur passed away, Katharine lived with and took care of her increasingly reclusive brother Orville, who often turned to his more confident and supportive sister to help him through fame and fortune. But when Katharine became engaged to their mutual friend, Harry Haskell, Orville felt abandoned and betrayed. He smashed a pitcher of flowers against a wall and refused to attend the wedding or speak to Katharine or Harry. As the years went on, the siblings grew further and further apart. In The Wright Sister, Patty Dann wonderfully imagines the blossoming of Katharine, revealed in her “Marriage Diary”—in which she emerges as a frank, vibrant, intellectually and socially engaged, sexually active woman coming into her own—and her one-sided correspondence with her estranged brother as she hopes to repair their fractured relationship. Even though she pictures “Orv” throwing her letters away, Katharine cannot contain her joie de vivre, her love of married life, her strong advocacy of the suffragette cause, or her abiding affection for her stubborn sibling as she fondly recalls their shared life. An inspiring and poignant chronicle of feminism, family, and forgiveness, The Wright Sister is an unforgettable portrait of a woman, a sister of inventors, who found a way to reinvent herself. Patty Dann: Patty Dann's novels have been translated into French, German, Italian, Portuguese, Dutch, Chinese, Korean, and Japanese. Her novel Mermaids was made into a movie starring Cher, Winona Ryder, and Christina Ricci. Dann is also the author of The Butterfly Hours: Transforming Memories into Memoir, The Goldfish Went on Vacation: A Memoir of Loss, and The Baby Boat: A Memoir of Adoption. Dann's articles have appeared in the New York Times, Boston Globe, O, The Oprah Magazine, and numerous other publications. She teaches writing workshops at the West Side YMCA in New York. Dann is married to journalist Michael Hill and has one son and two stepsons. Publisher Name Harper Perennial Imprint Harper Perennial Publication Date Aug 18, 2020 Extent 224.0 Pages Fiction & Literature » Biographical fiction Fiction & Literature » Contemporary lifestyle fiction Fiction & Literature » Historical fiction
cc/2021-04/en_head_0031.json.gz/line2249
__label__cc
0.74146
0.25854
home » volunteer stories The early days of VSI Europe North America Australia & Japan I have very fond memories of the SCI organisation SDI – which later became VSI. My parents Conrad and Dorothea Leser had met in 1949 in an IVS GB workcamp project. They were engaged within 24 hours and married a year later! So it is not surprising that they thought of starting a branch in Dublin, where we lived between 1961 and 1967. My father was a refugee from Nazi Germany in the 30s and my mother was English. They lived in Scotland and then Australia and Ireland, so always enjoyed international friends and groups. My father learned Gaelic and became fluent and suggested the name Seirbhis Deonach Idirnaisiuntan (SDI) as a translation of International Voluntary Service. When SDI was set up in 1965 my parents had four children, Victor 11, Joanna 9, Alison 7 and Walter 5. I do not remember the meetings which undoubtedly took place, but some of the key figures became great friends of the family –Gerry Brady, Janet Barcroft, Elizabeth Neuman, Phelim Boyle, Donal Dorcey, and others. All the people involved with SDI were unfailingly kind to us children, and we spend many weekends and holidays helping with activities. A few stand out – the travellers camp with Grattan Puxton fighting for their rights against the police, and everyone digging trenches around the caravans to prevent them being towed away. I was most envious of the children as I loved horses and they had so many on the site. There was a school for deaf children, where I first saw signing; there was a hospital for people with severe learning difficulties, which was shocking as some of the residents went for exercise in yards with high wire fences. A fun place was Miss Carr’s Home for children, where we could play with the children in the enormous garden, and some almshouses where volunteers decorated the homes. I loved the work camp at the school – I think it was for children with physical difficulties, where international volunteers made a playground, and I met people from all over the world. SDI certainly had a huge effect on me. I am sure it was the main reason why I went on international work camps aged 17 and 19, and also why I was joined VSO and was an English teacher for 2 years between the ages of 25 and 27. Maybe it is why I am now a social worker… early influences are strong. Sadly my parents have both died, and also my sister Alison, who herself had learning difficulties, but the memories of those days certainly live on for my brothers and me. It is fantastic that VSI is now celebrating its 50th anniversary, and I hope the next 50 years are as successful and useful. Joanna Leser
cc/2021-04/en_head_0031.json.gz/line2250
__label__wiki
0.56765
0.56765
London: The Biography London: The Biography is the pinnacle of Peter Ackroyd’s brilliant obsession with the eponymous city. In this unusual and engaging work, Ackroyd brings the reader through time into the city whose institutions and idiosyncrasies have permeated much of his works of fiction and nonfiction. Peter Ackroyd sees London as a living, breathing organism, with its own laws of growth London: The Biography is the pinnacle of Peter Ackroyd’s brilliant obsession with the eponymous city. In this unusual and engaging work, Ackroyd brings the reader through time into the city whose institutions and idiosyncrasies have permeated much of his works of fiction and nonfiction. Peter Ackroyd sees London as a living, breathing organism, with its own laws of growth and change. Reveling in the city’s riches as well as its raucousness, the author traces thematically its growth from the time of the Druids to the beginning of the twenty-first century. Anecdotal, insightful, and wonderfully entertaining, London is animated by Ackroyd’s concern for the close relationship between the present and the past, as well as by what he describes as the peculiar “echoic” quality of London, whereby its texture and history actively affect the lives and personalities of its citizens. London confirms Ackroyd’s status as what one critic has called “our age’s greatest London imagination.” 30 review for London: The Biography Christine – Nov 11, 2010 Dear Mr. Ackroyd, Will you marry me? I know you're gay, and I'm a woman. I understand that such details present wrinkles in the grand scheme, but I'm sure we can arrange bits on the side and whatever. Truthfully, I don't think you are really good looking, but you sure write sexy. I wish I had a quarter of your intelligence. This love poem to London, for love poem it is, is wonderful. It's brillant! It's marvellous! I think I just want to marry you so I can live in London. Well, that and your accent. It Dear Mr. Ackroyd, Will you marry me? I know you're gay, and I'm a woman. I understand that such details present wrinkles in the grand scheme, but I'm sure we can arrange bits on the side and whatever. Truthfully, I don't think you are really good looking, but you sure write sexy. I wish I had a quarter of your intelligence. This love poem to London, for love poem it is, is wonderful. It's brillant! It's marvellous! I think I just want to marry you so I can live in London. Well, that and your accent. It was a brillant idea to tell the story of London not as a linear history, but as a thematic one. It made it more interesting and the reader learns more. It also stops the book from getting dull. Instead, here come the Tudors; it's here comes the murder (or the animals, or acting or the poor). Even the length of the chapters is just right. Sorry, didn't mean to sound like Goldilocks, though she might have been from London. I also really liked the fact that you had a whole section on birds. Thank you for a wonderful book. Gergely – Aug 14, 2011 Nobody can doubt the incredible amount of research the author collated to put this mammoth of a book together. His subject matter is fascinating and rewarding. However, Ackroyd's writing style is very particular and surely a matter of taste - unfortunately this reviewer finds it annoyingly loose, try-hard artistic and peppered with sweeping generalisations and over romanticisation. Small sections of the book stand out for their accuracy and fluency and undeniably, the book is crammed with reams Nobody can doubt the incredible amount of research the author collated to put this mammoth of a book together. His subject matter is fascinating and rewarding. However, Ackroyd's writing style is very particular and surely a matter of taste - unfortunately this reviewer finds it annoyingly loose, try-hard artistic and peppered with sweeping generalisations and over romanticisation. Small sections of the book stand out for their accuracy and fluency and undeniably, the book is crammed with reams of fascinating facts and mini-histories. Nevertheless, great subject material was for the most part dragged down by an over-worked writing style to a level that made reading this book a real slog - one that was self-imposed due to the fear that this city's most amazing history might not be covered in such depth for quite some time again. Robert – Jan 10, 2009 London: The Biography is a junkshop of the heart, more or less: Peter Ackroyd's heart, or the heart of anyone else who has fallen in love with London's 2000 year history, its transformations, its theatricality, its poverty, its wit, its preposterousness, its influence on the English language. This is a book that's too densely packed with interesting data, arranged in short, thematic chapters, to be read from front to back, much as London is a city that's too large and infinite to be visited thor London: The Biography is a junkshop of the heart, more or less: Peter Ackroyd's heart, or the heart of anyone else who has fallen in love with London's 2000 year history, its transformations, its theatricality, its poverty, its wit, its preposterousness, its influence on the English language. This is a book that's too densely packed with interesting data, arranged in short, thematic chapters, to be read from front to back, much as London is a city that's too large and infinite to be visited thoroughly even during a long, hyperactive visit. Instead, I think most readers will end up doing what I did--skipping around to find items of interest: the history of the stage in London, the experiences of the Londoners during the Blitz, the effects of Henry VIII's decision to break with the Roman Catholic Church, the persistence of Chaucerian character-types. My experiences in London over 4 decades correspond in some measure to Ackroyd's insistence on the Dickensian quality of the place...the fogs, low ceilings, narrow alleyways...but his book does drop the ball in conveying the influence of parks and gardens on the London experience and fails to convey the full impact of London's cosmopolitanism--its infinity of peoples, costumes, and cuisines, in the post-Imperial, post-Colonial, post-modern era. I also wish there were a more extended meditation in it somewhere on literary London (writers are quoted all the time, but their London lives aren't stitched together in what you might call a cultural appraisal of the life of letters in London). That said, Ackroyd has no qualms about emphasizing London's dingy quality, its patched-together architecture, and its continuous (for millennia) construction and deconstruction. This is his overriding theme: here's a city with a strong, peculiar personalty with which no one can do anything; it must be accepted as it is for what it is; tear it down and it will twist and torture your plans to build it anew; bomb it and it will survive underground; make it a "fashionable" destination, and it will satirize its own fashionableness. As a "book," this text strikes me as something of a marketing enterprise: here's the biggest, most comprehensive, last word on London, so you have to have it. It probably would have been more effective had it been edited down a bit. But that's exactly what Akroyd says people have tried to do to London, and in the end, it overflows all measure and restraint F.G. Cottam – Jun 07, 2010 London has always possessed the presence of a character (and a major character at that), in the quite brilliant novels Ackroyd has chosen to set there. His love of and fascination for the city has always been apparent. Here he demonstrates his scholarly expertise on a subject that clearly beguiles him and with what incredibly enjoyable result. The best praise I can offer this book is that it is worthy of its subject. It is deep, mystical, multi-layered and endlessly fascinating. I lived in Londo London has always possessed the presence of a character (and a major character at that), in the quite brilliant novels Ackroyd has chosen to set there. His love of and fascination for the city has always been apparent. Here he demonstrates his scholarly expertise on a subject that clearly beguiles him and with what incredibly enjoyable result. The best praise I can offer this book is that it is worthy of its subject. It is deep, mystical, multi-layered and endlessly fascinating. I lived in London for 20 years from the age of 21 and trying to describe it as it was in 1937, in my novel The House of Lost Souls, was probably the most enjoyable fictive challenge I've taken on. This is not fiction - though it reads so compulsively it could be - but Ackroyd is the master, the London writer everyone should look up to. This book is a perfect mix of passion and erudition. I've just read it for the second time and look forward to reading it again. I can't recommend it strongly enough. Ravi Prakash – Jun 27, 2019 I have never been in London, but someday in future I would love to visit. . Being a student of English literature, I was always fascinated about this city- the city where Shakespeare lived, wrote and performed; where the best english poetry and dramas had been written and sung; the city of an empire on which the sun had never set; the city which was prospered by the financial exploitations of British kingdom's colonies- most particularly India- I wanted to know London's history, and I would say t I have never been in London, but someday in future I would love to visit. . Being a student of English literature, I was always fascinated about this city- the city where Shakespeare lived, wrote and performed; where the best english poetry and dramas had been written and sung; the city of an empire on which the sun had never set; the city which was prospered by the financial exploitations of British kingdom's colonies- most particularly India- I wanted to know London's history, and I would say that Peter Ackroyd succeeded to elucidate it to a non-londoner. . As far as the critical criticism of the contents of the book concerns, I find myself unable to analyse it. Had I had lived there, I might have been able, but as far as the writing style concerns, I am fully satisfied. David – Jul 19, 2011 What a book. Ackroyd has created the ultimate portrait of London as a living, breathing entity, not just a collection of old buildings and monuments. Rather than a dry chronological trawl through the history of our nation's capital, instead Ackroyd chooses themes and explores them through time and space, focussing on specific areas or ideas. Thus he paints a picture of an ever evolving city that defies all attempts to change or control it. London is its own master. Ackroyd ranges back and forth t What a book. Ackroyd has created the ultimate portrait of London as a living, breathing entity, not just a collection of old buildings and monuments. Rather than a dry chronological trawl through the history of our nation's capital, instead Ackroyd chooses themes and explores them through time and space, focussing on specific areas or ideas. Thus he paints a picture of an ever evolving city that defies all attempts to change or control it. London is its own master. Ackroyd ranges back and forth through time in pursuit of his themes and as a consequence throws up facts that are never less than interesting, frequently fascinating. All the while he slowly moves us through London's development through the centuries, and my only quibble would be that he skips through the 20th century rather too quickly. But considering the book is 800 pages long and he had a heart attack after finishing it, I'll forgive him that. If you are looking for a dry history book, look elsewhere. If you are in search of a book about London that is full of ideas and facts backed up by a wealth of research then London: The Biography is for you. Not to everyone's taste, but I found it a great read. sage – Jan 17, 2013 This review has been hidden because it contains spoilers. To view it, click here. Atrociously bad. It could be turned into a drinking game -- drink any time Ackroyd uses fallacious logic or uses a completely unrelated and non-universal example to "prove" an absurd point. Of course, then you'd have alcohol poisoning by the end of the first chapter. If his thesis were that London, as a city, has a particular culture unlike other cities in Britain, then this book might be an interesting amble through different elements of that culture. However, his thesis is that the city itself, Atrociously bad. It could be turned into a drinking game -- drink any time Ackroyd uses fallacious logic or uses a completely unrelated and non-universal example to "prove" an absurd point. Of course, then you'd have alcohol poisoning by the end of the first chapter. If his thesis were that London, as a city, has a particular culture unlike other cities in Britain, then this book might be an interesting amble through different elements of that culture. However, his thesis is that the city itself, in its pavement, sewer systems, buildings, etc., literally speak to the residents and dictate their ways of life. Yes, that is exactly as crazycakes as it sounds. Up to including his claim that the actual tarmac of the street told the poor, nonwhite protestors to riot against their white oppressors. Also, there's the constant impossible superlativing, making ridiculous claims that London was the first city ever to do ______ in all of history. As if Rome and other ancient metropolises had never been. Calling it shoddy scholarship is generous. This book IS kind of interesting as an adjunct to Ben Aaronovitch's Rivers of London series, if you pretend London is actually fiction. I only made myself finish the book because the anecdotes he paraphrases are fascinating. Sadly, there are no footnotes or endnotes, and he doesn't list his sources for particular stories, so this book is pretty useless as a diving off point into something better. So...yay badly quoted anecdotes? Andrea – Nov 17, 2012 This book is a massive undertaking, both for the author and the reader, and the amount of extraordinary, fascinating and brilliant detail in here is mind-boggling. It pulls from an awe-inspiring number of primary sources to provide the most delectable quotes on everything from pubs to fashion to murders to popular food. In fact, I can't think of a subject that isn't in here, and it's all woven together in a form that is almost like fiction. It muses, ponders, revels in minutiae. This is the firs This book is a massive undertaking, both for the author and the reader, and the amount of extraordinary, fascinating and brilliant detail in here is mind-boggling. It pulls from an awe-inspiring number of primary sources to provide the most delectable quotes on everything from pubs to fashion to murders to popular food. In fact, I can't think of a subject that isn't in here, and it's all woven together in a form that is almost like fiction. It muses, ponders, revels in minutiae. This is the first book I started reading after my father died about a year and a half ago, I hadn't been able to read anything at all for a month or two and this was perfect for getting back into it, reading a couple of chapters at a time, setting down, coming back to. I loved loved loved so much of it, both the tidbits of history, but also the ways in which Ackroyd combined them, sometimes by theme or period or area. It's changed how I walked around London streets, how I see the Thames every time I cross it, the ways I contrast old and new and am always seeking out the echoes of past times. I was a bit that way before, I confess, but now I have a much better feeling for what might be there and understanding of what I find. It's hard to judge a work of this size and scope with so much that is amazing in it. But as I read I became increasingly critical of the celebration of commercialism. It all comes to a head in the final chapters which left me angry. A sort of mystical view of London had been steadily emerging, a sort of organic living creature of a city with its own requirements and demands of its inhabitants. I liked playing with ideas about the ways in which a city shapes its residents, but was disappointed to find Ackroyd's jubilation at the financial centres surviving the blitz as proof that the living beating heart of London might well be commerce and finance. There is a celebration of Thatcher's big bang of 1986 loosing regulations on bangs -- that would ultimately lead to our current economic crisis. And he writes If the city had a voice it might be saying: There will always be those who fail or who are unfortunate, just as there will always be those who cannot cope with the world as presently constituted, but I can encompass them all. ...Lincoln's Inn Fields was occupied once more by the homeless, after an interval of 150 years, while areas like Waterloo Bridge and the Embankment became the setting for what were known as 'cardboard cities'. ... Despite civic and government initiatives, they are still there. They are now part of the recognisable population; they are Londoners, joining the endless parade. Or perhaps, by sitting upon the sidelines, they remind everyone else that it is a parade. How infuriating! As though the homeless and the masses of poor are a natural phenomenon like weather, and not caused by deindustrialisation, the roll back of the welfare state and Thatcher's own policies channeling wealth away from them towards the already wealthy. That Lincoln's Inn field should have been free of the homeless for 150 years was an accomplishment of society hard fought and bitterly won. Their return is an indictment of our current direction, not an ornament to London's wealth, or a gaze that seeks to remind the well-to-do of how wonderful they are. Had I only stopped reading with the Blitz I would have unqualifiedly loved this book, as it is I am torn between giving it a five and giving it a one. I look back and wonder how much of this view seeped into the history. I am sure it did in celebrating trade, muting struggle and resistance. But in terms of how theatre changed over time, the love of jellied eels and pies, the roles of gravediggers, the building of churches, the vast panoply of literary views and all such topics,this is quite wonderful. Arabella – Apr 08, 2013 As a native Londoner, I found parts of this book very interesting. For example, I knew there had been other rivers in London such as the long-lost Fleet river, what I hadn't realized is that they are all still there, buried under the city. I also didn't know much of anything about London pre-Romans. Apart from being really, really long, there were a few things I didn't like about this book. One was the way Ackroyd described things as being unique to London, for example quoting all the references As a native Londoner, I found parts of this book very interesting. For example, I knew there had been other rivers in London such as the long-lost Fleet river, what I hadn't realized is that they are all still there, buried under the city. I also didn't know much of anything about London pre-Romans. Apart from being really, really long, there were a few things I didn't like about this book. One was the way Ackroyd described things as being unique to London, for example quoting all the references to London as a theater, or a stage. I expect any city has been described in this way at some point. It's also full of randomly linked miscellany with which Ackroyd tries to make a point, but often seems like stretching just a little too hard. Also, while I see the point in not writing the book chronologically, at times it made it hard to understand what period of time was being referred to. Pete daPixie – Aug 06, 2011 Could very well be THE biography of 'London', Peter Ackroyd's 2000 publication is a monumental eight hundred page delight. The scope and coverage is breathtaking, from the last ice age to the domain of wild animals, to the Roman and Saxon foundations to it's present day sprawl. The capital city with all the trials,tribulations,fog and flame from Aeneas to Ziegler. Ackroyd has produced a masterpiece. It is clearly a life times work, and not just a historical one. The reader is taken by the hand an Could very well be THE biography of 'London', Peter Ackroyd's 2000 publication is a monumental eight hundred page delight. The scope and coverage is breathtaking, from the last ice age to the domain of wild animals, to the Roman and Saxon foundations to it's present day sprawl. The capital city with all the trials,tribulations,fog and flame from Aeneas to Ziegler. Ackroyd has produced a masterpiece. It is clearly a life times work, and not just a historical one. The reader is taken by the hand and led through the streets, alleyways, squares, fairs, churches, palaces, ale houses and hovels. Through time travel and through the eyes of a myriad of characters, writers, artists, princes and paupers, we can imagine the sights, sounds, smells and spirits through the centuries. A huge feast of a book that is easily digested in concise and so very well written portions. Szplug – Jun 11, 2011 Whither art thou driven, ghostly stranger, by the lamentations that echo in the dales of the lifeless and broken hills from whence thou wert bound? Phantom of breath, buckler of the passed and passing days, into what deep chasm of the forgotten mind of God hast thou found thyself, mewling for the grace that has evaded thy dogged and persistent steps? Look inward, man-child—a succession of stygian wombs hast thou haunted, passing now into life and anon into death. The cry of babes and the rattle Whither art thou driven, ghostly stranger, by the lamentations that echo in the dales of the lifeless and broken hills from whence thou wert bound? Phantom of breath, buckler of the passed and passing days, into what deep chasm of the forgotten mind of God hast thou found thyself, mewling for the grace that has evaded thy dogged and persistent steps? Look inward, man-child—a succession of stygian wombs hast thou haunted, passing now into life and anon into death. The cry of babes and the rattle of carrion are the chorus that greet thee upon thy fresh emergence—sweet and rancid kisses from which thou hast ever shrunk away, engirt with the terror that upholds the heavens. Fox – Aug 11, 2012 This book was truly extraordinary. I was looking for an in-depth history of London, and I certainly found it between this book's covers. Peter Ackroyd truly did write a biography of London, from its sprawling streets to its strange citizens. His writing is fluid, and fascinating to read; his use of primary sources is utterly astounding, and somewhat maddening, as the cockney can be a bit hard on the eyes. Peter Ackroyd's book is told in a very loose chronology. While the 'story' begins with prehis This book was truly extraordinary. I was looking for an in-depth history of London, and I certainly found it between this book's covers. Peter Ackroyd truly did write a biography of London, from its sprawling streets to its strange citizens. His writing is fluid, and fascinating to read; his use of primary sources is utterly astounding, and somewhat maddening, as the cockney can be a bit hard on the eyes. Peter Ackroyd's book is told in a very loose chronology. While the 'story' begins with prehistory, and ends in the 80s, not much in this book is linear. He makes London timeless, and turns the city into the icon that it is today. The emphasis of the text is upon how little things have changed, even while London is destroyed and rebuilt cyclically. The essence of the city can be found in the hospitals raised upon the sites of druidic wells, the very wells that the Victorians later claimed had healing capabilities. The triumph of this text is not in the traditional dates and names of rulers, battles, and the like... rather, the triumph is in the fact that it focuses upon the citizens of the empire. Reading this book, you will learn about the conditions of the jails, what Londoner's favorite pasttimes were, how the role of women changed, and how London assimilates the immigrants. You'll read about how little Cockney has changed from the 1500s, and how London's taste for the theatrical existed before Shakespeare came on the scene. After reading this book, I feel that I have learned more about London than I have from the World History courses I've taken. Peter Ackroyd has an eye for what's importance, and brings this city of commerce, violence, and theater to life in a way that no one else has. Smashing book. Mark Love – Jun 03, 2010 You may be forgiven for thinking that my recent paucity of reviews was a due to lack of reading brought about by the birth of our son. Not so. I have been labouring through this beast of a book for the past couple of months, and am now relieved to be able to put it back on the shelf. Peter Ackroyd's biography of London is impressive in every sense - the length, the breadth, the details and the passionate and scholarly work that went into it, and it has been celebrated by reviewers and middle-clas You may be forgiven for thinking that my recent paucity of reviews was a due to lack of reading brought about by the birth of our son. Not so. I have been labouring through this beast of a book for the past couple of months, and am now relieved to be able to put it back on the shelf. Peter Ackroyd's biography of London is impressive in every sense - the length, the breadth, the details and the passionate and scholarly work that went into it, and it has been celebrated by reviewers and middle-class Londoners everywhere, but I doubt many of them have read it all. As much as I liked the subject matter (well, it is my home) and enjoyed many of the wonderfully varied chapters on all aspects of the city's history (social, commercial, architectural, political, natural) Ackroyd's narrative itself was densely earnest, puffy, and self-important. Take this quote for example: "The nature of time in London is mysterious. It seems not to be running in one direction, but to fall backwards and to retire; it does not so much resemble a stream or river as a lava flow from some unknown source of fire. Sometimes it moves steadily forward, before springing or leaping out; sometimes it slows down and, on occasions, it drifts and begins to stop altogether." So, even time in London is unique?! London is a great city, and this is a great book, packed with some amazing details and insights into life through the ages, but this is the kind of pompous nonsense that makes the book twice as long as it needs to be, and understandably makes non-Londoners throw their hands in the air. Read it, or else just put it on the shelf to impress guests. Lyn Elliott – Jan 04, 2013 I initially gave this four stars, recognising the huge amount of research that Ackroyd has pulled together - anything you want to know about scandals, sewers, executions or thievery in London is here in an exuberant tumble. But ultimately the tumble led to my three star rating - the lack of order in the presentation jars for me and I gave up. It's a book for dipping rather than straight through reading. The Manchester Guardian review on this link summarises several other reviews that balance amaz I initially gave this four stars, recognising the huge amount of research that Ackroyd has pulled together - anything you want to know about scandals, sewers, executions or thievery in London is here in an exuberant tumble. But ultimately the tumble led to my three star rating - the lack of order in the presentation jars for me and I gave up. It's a book for dipping rather than straight through reading. The Manchester Guardian review on this link summarises several other reviews that balance amazment at the scope and abundance of Ackroyd's work against its internal chaos: http://www.guardian.co.uk/books/2000/... I've marked it both as history and fiction, because you never really know with Ackroyd - the boundaries between the two are very thin. Certainly he has used lots of snippets of information he has come across in researching his previous books Monty Milne – Jun 23, 2019 I loved this, and I am slightly surprised I did, for two reasons: I am usually no great fan of thematic history (I recently posted a review here of a book on ancient Egypt which I criticised for its non-linear approach), and I am usually no great fan of London. Ackroyd had me beguiled and persuaded, though. The thematic structure works brilliantly because Ackroyd – a master wordsmith as well as a master of his subject – is adept at sculpting a beautiful and many-sided narrative. For me, London i I loved this, and I am slightly surprised I did, for two reasons: I am usually no great fan of thematic history (I recently posted a review here of a book on ancient Egypt which I criticised for its non-linear approach), and I am usually no great fan of London. Ackroyd had me beguiled and persuaded, though. The thematic structure works brilliantly because Ackroyd – a master wordsmith as well as a master of his subject – is adept at sculpting a beautiful and many-sided narrative. For me, London is generally a place of fear, horror and dislike – when I visit friends in Hampstead, I feel like Frodo climbing the steps of Cirith Ungol when the lift brings me up from the bowels of the Piccadilly Line to the surface at Hampstead Tube Station. And yet, I find it fascinating...I cannot love it in the same way that Ackroyd clearly does. Cobbett saw it as “the Great Wen” - a huge pustular carbuncle on the arse of humanity. Ackroyd confronts the horror – and there is plenty of that – and yet he loves it still. I take off my hat to him, and even if I stand alongside Cobbett when all is said and done, I bow before Ackroyd for his masterful prose and his deep and impressive knowledge and affection for his subject. Anyone who loves London – and anyone who hates it – will profit from and enjoy this book – if they have the stamina to read it to the end. Perry Whitford – Oct 03, 2018 In his brief foreword, Ackroyd describes this monumental labour of his as that of 'one stumbling Londoner, who wishes to lead others in the directions which I have pursued over a lifetime,' inviting the reader to both 'wander and wonder.' The abiding theme of Ackroyd's fiction is of how the past both underlays and influences the present, how the previous events of a particular place inform current events in uncanny ways. Where better to give ultimate expression to that theme than the history of L In his brief foreword, Ackroyd describes this monumental labour of his as that of 'one stumbling Londoner, who wishes to lead others in the directions which I have pursued over a lifetime,' inviting the reader to both 'wander and wonder.' The abiding theme of Ackroyd's fiction is of how the past both underlays and influences the present, how the previous events of a particular place inform current events in uncanny ways. Where better to give ultimate expression to that theme than the history of London, 'a palimpsest of different realities and lingering truths'? And what better representative of this continuity of time and place than the streets of London? Covent Garden has always been a market of sorts, St Giles-in-the-Field has always been home to the poor and the outcast, Clerkenwell Green has always been connected with radicalism. 'Is it too much to suggest that there are certain types of activity, or patterns of inheritance, arising from the streets and alleys themselves?' Not that he ignores the more grounded, commercial side of the City. On the southern side of London Bridge are two griffons, guardians of gold mines and buried treasure in classical mythology. 'The presiding deity of this place has always been money.' While Walter Besant, a Victorian predecessor whose own biography of London I had just read, took a largely broad brush approach to his portraits of the City down the centuries, Ackroyd revels in a feast of individual detail. Criminals, vagrants, barmen: all play a part in the 'essential theatricality' of London. The City has given rise to countless examples of celebrity from all walks of life, such as Jack Sheppard, who escaped from Newgate Prison no less than six times; Mary Frith, otherwise known as Moll Cutpurse, who used to dress up in men's clothing and walk the 16th century London streets smoking a pipe and getting into trouble; or George, the drawer at the Mitre who earned a call-out in both Jonson's Every Man Out of His Humour and Dekker and Webster's Westwood Ho! But London is the biggest character, the animating principle. Repeated variations on the phrase 'it was as though London itself' are used again and again to explain every phenomena. Who but Ackroyd would not just include but conclude a history of London with a chapter on Cockney visionaries? When he tells you about Edward the Confessor building Westminster Abbey after a vision, and how 'a thousand years later, in this place, William Blake was granted a vision of monk's chanting and proceeding down the central isle' you know that he believes in veracity of those visions. This biography is so good I've read it cover to cover twice! There's a tremendous amount of research here, and I particularly appreciated Ackroyd's focus on original sources to describe the spirit of London through the ages. I wish it had been organized chronologically, however, instead of thematically, and the discussion never seemed to get much beyond the few hundred years between the late Renaissance and the mid-19th century. I also got a little tired of Ackroyd trotting out London as a metaphor (London is a key, is a prison, is a garden, is a stage, i There's a tremendous amount of research here, and I particularly appreciated Ackroyd's focus on original sources to describe the spirit of London through the ages. I wish it had been organized chronologically, however, instead of thematically, and the discussion never seemed to get much beyond the few hundred years between the late Renaissance and the mid-19th century. I also got a little tired of Ackroyd trotting out London as a metaphor (London is a key, is a prison, is a garden, is a stage, is a maze, etc., etc.); surely the city has some kind of limit as a rhetorical device. While the book did make me excited to live there this summer, it was a little less illuminating than I had hoped it would be. Laurie – Jul 31, 2009 This is such an exhaustive survey of London, I cannot imagine how long it took Ackroyd to research and write. This touches on absolutely anything and everything you could want to know about the city. Equal parts entertaining and educational, it took me quite a while to read simply because of the amount of information packed into it. Covering prehistory up to the millennial year, it's definitely recommended for any London-phile. A world of worlds, no other city on Earth has ever existed quite lik This is such an exhaustive survey of London, I cannot imagine how long it took Ackroyd to research and write. This touches on absolutely anything and everything you could want to know about the city. Equal parts entertaining and educational, it took me quite a while to read simply because of the amount of information packed into it. Covering prehistory up to the millennial year, it's definitely recommended for any London-phile. A world of worlds, no other city on Earth has ever existed quite like it. (It's even added a firmer foundation for Doctor Who London-based journeys!) Diana – Jul 25, 2011 The book that introduced me to Peter Ackroyd as an author. I have to admit that the book takes quite a while to get through, especially if you do not have the time to dedicate to reading just the one book. I really enjoy how thorough he is going from age to age on how London developed. I do recommend reading the book, but a number of pages can be daunting. I had it for a year before I felt I was up to tackling it. Sharon – Aug 16, 2015 This was okay. I love reading about London, quirky interesting facts about places that I know. This had plenty, but also had a LOT of other information about places, people, things...just about everything. The title says it all...'concise'! I found myself flicking through to find bits that I found interesting, but there was still plenty of bits to keep me going! This was okay. I love reading about London, quirky interesting facts about places that I know. This had plenty, but also had a LOT of other information about places, people, things...just about everything. The title says it all...'concise'! I found myself flicking through to find bits that I found interesting, but there was still plenty of bits to keep me going! Kay – Aug 03, 2007 Dark and juicy biography of the city. Ackroyd's highly personal and imaginative account is not straightforward -- but then neither is London. London is a complex stew that evokes the city not just as a historical entity but as almost an animate thing. Dark and juicy biography of the city. Ackroyd's highly personal and imaginative account is not straightforward -- but then neither is London. London is a complex stew that evokes the city not just as a historical entity but as almost an animate thing. Pat – Dec 03, 2017 I bought this before we went to London in June. I wound up reading it more by dipping into it here and there, rather than sequentially. It's a lot of fun, because it's packed with the history of specific locations. I bought this before we went to London in June. I wound up reading it more by dipping into it here and there, rather than sequentially. It's a lot of fun, because it's packed with the history of specific locations. Kelly – Sep 26, 2011 Lost interest- too busy living here! Another time when I am feeling nostalgic, probably. Kathleen – Jun 21, 2018 When I taught college prep writing to my senior classes, oftentimes the students would choose a topic that was just - well - huge! ‘the Renaissance’ or ‘Chaucer’ or ‘The Spanish Armada’ or ‘Hamlet’. I would say “well, clearly an interesting choice, but you need to narrow it down.” So, let’s say a student picked the play, Hamlet. Me: pick one character. Student: okay, Hamlet Me: what intrigues you about THAT character? Student: his struggles Me: good, what about them? Student: well, he has many people When I taught college prep writing to my senior classes, oftentimes the students would choose a topic that was just - well - huge! ‘the Renaissance’ or ‘Chaucer’ or ‘The Spanish Armada’ or ‘Hamlet’. I would say “well, clearly an interesting choice, but you need to narrow it down.” So, let’s say a student picked the play, Hamlet. Me: pick one character. Student: okay, Hamlet Me: what intrigues you about THAT character? Student: his struggles Me: good, what about them? Student: well, he has many people in his life and situations that he can’t seem to understand or control - which makes him behave sometimes in strange ways. Me: do you take Psychology? Student: yes (I knew this answer as most of the seniors at my school took AP Psych) Me: does Hamlet exhibit any behaviors that you’ve studied. Then I literally see a lightbulb (said like Gru in Despicable Me) when the student first sees Hamlet as a young man struggling with manic depression & bipolar symptoms. Ta-da! If I were still teaching writing, I would tell my students to choose and read ONE chapter from Ackroyd’s 79 chapters in “London The Biography”. Each chapter is a PERFECT research paper focused on ONE idea/facet of this over 2,000 year old city. His research is thorough and meticulous. His blends the words and phrases of hundreds of other writers seamlessly with his own. In one paragraph, (every one of which had a focused and clear topic sentence) he would embroider snatches of other writers’ observations about the topic with his solid descriptive writing. (There are 12 pages at the end of the book entitled, “An Essay on Sources”.) Every chapter had a clear intro paragraph which was then supported till the closing paragraph that was both a summary of the topic and a clear reminder of that chapter’s point. This highly organized structure made this book a joy to read to me. I’ve visited London 2 times in my life and both times I felt ‘at home.’ I think London has an abstract -but very real - quality of infinite humanity. It has emerged from the darkest attacks: from the Roman invasions to expand its empire that began in 44 AD, the Anglo-Saxon tribes in 449 AD, the Viking invasions of the 9th Century....to a French Duke, William of Normandy who won the Battle of Hastings in 1066 and became the first King of the entire island, (Queen Elizabeth II can trace her family back to him!) through its Civil War and the German bombings directly on the city during WWII. Pubs, poverty, trade, the fog, the incessant noise and smell, jails, crime, architecture, churches, the plague, the theater, the constant archeological digs that never fail to surprise: literally 18th C items on top of 17th C items on top of 16th C stuff through to the remains of a Roman female from the turn of the first century. All this, and much much more, have solidified all the Londoners’ strong sense of identity and self as connected to the life of their city. I want to go back now, having this book in my heart and mind, to experience this wonderful old infinite city in a fresh & new way. “When a man is tired of London, he is tired of life.” Samuel Johnson Rob Frampton – Jun 17, 2020 It is telling that, at the end of ‘London: the Biography’, there is a twelve-page section entitled “An Essay on Sources”. Of course it would be impossible to write a book on such a dense and lengthy subject as the history of the great metropolis without referring to historical sources, but there is an almost overpowering sense in which much of Ackroyd’s book is a patchwork of other people’s views and descriptions. I can see that such an approach could yield useful insights into a city born in th It is telling that, at the end of ‘London: the Biography’, there is a twelve-page section entitled “An Essay on Sources”. Of course it would be impossible to write a book on such a dense and lengthy subject as the history of the great metropolis without referring to historical sources, but there is an almost overpowering sense in which much of Ackroyd’s book is a patchwork of other people’s views and descriptions. I can see that such an approach could yield useful insights into a city born in the distant past and which constantly expands and reinvents itself, but here it too often feels like Ackroyd has become lost in the narrow streets and grotesque characters of his own work. Indeed he often struggles to bring these disparate views together in phrases like ‘it is almost as if’ or ‘one may surmise that…’. When his own voice does emerge it is often with views both pertinent and meaningful. In talking of London’s ebb and flow of immigrants he notes that, “They were the object of derision and disgust because they lived in self-contained communities, popularly regarded as squalid; it was generally assumed, too, that they had somehow imported their disorderly and insanitary conditions with them [and that] these conditions were considered to be the faults of the immigrants themselves who were accustomed to no better… The actual and squalid nature of London itself, and the social exclusion imposed upon [them] were not matters for debate… Their poverty became the object of pity and disgust while their attempts to transcend it were met with hostility and ridicule.” London, built upon commerce and trade from its earliest times has always treated its workers, native, slave or immigrant, as grist for the mill of growth and prosperity, but somehow this same motley of people has transformed the city into a grand tapestry of cultures and influences which has, “… produced a kind of invulnerability to even the worst onslaughts which the world can unleash”. It is in the latter sections, examining the city of the late 20th century where Ackroyd’s prose comes alive, his own views bringing some degree of focus to the miscellany that has gone before. Indeed the chapters on children, post-WWII expansion of the suburbs and the East End make for fascinating reading and his statement that, “… the city was too large, too complex, too momentous, to be destroyed”, here written in context of the Blitz, might serve as an epigram for the whole work. All in all, a frustrating read, and not one to be embarked upon without a large degree of patient slogging, but ultimately a worthwhile use of your reading commitment. David Ball – Apr 26, 2017 A masterpiece. The history of London, not chronologically, but thematically. The topics cover almost every sense: from the smell of the fog to the ever present noise, the markets, the vendors, the street theatre, the never ending rebuilding. Certain neighbourhoods are brought to light: from the radical history of Clerkenwell to the commercial history of the Thames, its docks and its tributaries. Chapters are dedicated to prisons, madhouses, coffee shops, and pubs; and of course the people, their A masterpiece. The history of London, not chronologically, but thematically. The topics cover almost every sense: from the smell of the fog to the ever present noise, the markets, the vendors, the street theatre, the never ending rebuilding. Certain neighbourhoods are brought to light: from the radical history of Clerkenwell to the commercial history of the Thames, its docks and its tributaries. Chapters are dedicated to prisons, madhouses, coffee shops, and pubs; and of course the people, their accents and attitudes, the poverty, the riots, the debauchery, and their ambition. And of course there are the Great Events: the Plague, the Fire, and the Blitz. It's densely researched, but extremely readable. Literary references and snippets of poetry are woven together with journal entries and historical accounts so beautifully, that it's almost as if Ackroyd is simply channeling the thousands of voices that have come before him. But gradually Ackroyd's own voice comes to the fore, and you realize this isn't a love letter to London written by a starry eyed dreamer, but a memoir written by a long suffering spouse; an honest, jaded, often critical account of someone able to appreciate London's virtues, but is unhesitating in pointing out its many flaws. One passage says it all (and certainly captures my first impression of the city): "The citizens of London live in a state of unnatural energy and uproar; they live in foul houses with no light or air; they are driven by the whip if business and money-making; they are surrounded by all the images of lust and violence. They are living in Bedlam". It's an awe-inspiring piece of scholarship - one could read and write for a lifetime and never come close to producing anything close to what Ackroyd's had accomplished here. Lord knows, it's taken me 15 years, off and on, just to read it. I'm glad I persevered. Lysergius – Jul 07, 2018 A compendius history of the city of London from its inception as a Roman Imperial outpost to the largest and at the time richest city in the world. The author goes to great lengths to stress that this prosperity has always been achieved on the backs of the poor of London. So apart from the sheer physicality of the city itself, its size and extension and growth, what of its inhabitants? Who are they and where do they come from and how did they get there? The author goes to great pains to examine A compendius history of the city of London from its inception as a Roman Imperial outpost to the largest and at the time richest city in the world. The author goes to great lengths to stress that this prosperity has always been achieved on the backs of the poor of London. So apart from the sheer physicality of the city itself, its size and extension and growth, what of its inhabitants? Who are they and where do they come from and how did they get there? The author goes to great pains to examine the continuous influx of "Londoners" from all over the world. It is probably true to say that almost every nationality, sect and clique was represented at some time or another. As a Londoner-in-exile I found this a remarkable tome, the language is easy, and the tale is compelling. What more can you ask for? Lori – Mar 28, 2020 I felt ambitious for picking this up and only after I was halfway through it did I realize that I was actually reading the abridged version of Ackroyd’s famous work! Nevertheless, the level of detail in every imaginable aspect of London’s history and present is painstaking to the point of being overwhelming. I am fascinated by the city and know it better than most cities I’ve visited in my own country, yet I still found myself skimming some of the longer and more detailed sections. In terms of q I felt ambitious for picking this up and only after I was halfway through it did I realize that I was actually reading the abridged version of Ackroyd’s famous work! Nevertheless, the level of detail in every imaginable aspect of London’s history and present is painstaking to the point of being overwhelming. I am fascinated by the city and know it better than most cities I’ve visited in my own country, yet I still found myself skimming some of the longer and more detailed sections. In terms of quality, this volume is easily five stars. My take on its readability, though, as a layperson and not a historian, is only three. Louie Reynolds – Apr 16, 2020 Lots of great info, but does jump back & forth through decades. As i read it studying for uni, it could be frustrating when i quote would be put in during an era but was not relevant as that person passed away 50 years earlier. Carmen – Dec 06, 2020 A fascinating read, it allowed me to travel, once again, to one of my favorite places in the world. Cyberpunk 2077: Trauma Team #3 (The World of Cyberpunk 2077) Un cow-boy dans le coton (Les Aventures de Lucky Luke d'après Morris, #9) Monstress: Talk-Stories #1 Nailbiter, Vol. 7: Nailbiter Returns Dr.STONE 18 (Dr. Stone, #18) Doctor Who: Time Lord Victorious: Defender of the Daleks 7 Good Reasons Not to Grow Up
cc/2021-04/en_head_0031.json.gz/line2251
__label__cc
0.560435
0.439565
Wireless and wired broadband investment will expand service coverage, capacity, quality 11 Mar Wireless and wired broadband investment will expand service coverage, capacity, quality Posted at 14:05h in Press release by WTN News 0 Comments WASHINGTON, D.C., — For more than a decade, the expansion of wireless and wired broadband connectivity has transformed how we work and live, fostered dramatic new business opportunity and driven economic growth. The demand for connectivity remains strong and AT&T* continues to invest billions in its wireless and wired broadband networks to expand this critical platform for growth. AT&T plans to invest $17 billion to $18 billion in 2009, in line with its 2007 capital expenditures of $17.7 billion and expected to exceed the planned investment of any other U.S. telecom company. Approximately two-thirds of AT&T’s 2009 investment will extend and enhance the company’s wireless and wired broadband networks to provide more coverage, speed and capacity. To support increased customer demand in mobility, broadband and video, the company plans to add nearly 3,000 jobs in 2009. However, as previously announced, the company expects to reduce jobs in other areas – primarily wireline – due to economic pressures, a more streamlined organizational structure and continued shift among residential customers from wired voice services to wireless and broadband. “Demand for broadband continues to grow as new applications emerge and customers embrace them, leading to data traffic on our network growing more than 50 percent year over year on average,” said Randall Stephenson, AT&T chairman and chief executive officer. “We expect demand will only escalate when the larger economy rebounds, and AT&T’s continued strong network investment will help ensure that we’re fully ready to support the next wave of economic growth. We recognize the continuing importance of investing in critical network infrastructure, which plays a key role in driving commerce, innovation and job growth.” As providers and developers increasingly focus on tapping the potential of the mobile Internet, AT&T’s broadband investment priorities include multiple projects designed to enhance its 3G network. With 3G services now available in nearly 350 U.S. metropolitan areas, the company will focus in 2009 on enhancing coverage and reliability across this footprint, including the planned addition of more than 2,100 new cell sites across the country. Additionally, AT&T will expand 3G service to 20 new markets this year. Highlights of other planned initiatives include: • Expanding 3G service while nearly doubling the total network capacity in most markets via additional spectrum at 850 MHz, a frequency that can offer improvements to in-building coverage. • Leveraging the capabilities of AT&T’s GSM/HSPA network to further increase the nation’s fastest 3G speeds, starting with trials of 7.2 Mbps peak downlink speeds and evolving to speeds as high as 20 Mbps. • Customer trials leading toward general availability of AT&T 3G MicroCell offerings, which utilize femtocells and home broadband connections to enhance in-building wireless coverage. • Continuing expansion of AT&T’s leading Wi-Fi footprint and infrastructure, building from the 20,000 hotspot footprint created in 2008 with the acquisition of Wayport. These wireless initiatives are complemented by the continued expansion of AT&T’s wired broadband access and IP/MPLS backbone networks. The company continues to build its AT&T U-verse footprint, with current plans calling for the network to pass 30 million living units in 2011, up from 17 million today. This aggressive deployment, combined with continued expansion of the company’s DSL footprint, will help ensure that more and more Americans are able to tap into the benefits of affordable broadband and IP-based applications. AT&T will also continue to invest in its unsurpassed global IP backbone network, which carries wireless and wired broadband traffic from AT&T customers and others around the globe. In 2008, the company completed the world’s largest deployment of 40 Gigabit backbone technology. This year, the company will invest in multiple new subsea fiber-optic cables to maximize capacity and reliability of backbone connections, and will continue to expand the global reach of access solutions for enterprise customers. These critical infrastructure investments will be matched by the creation of nearly 3,000 new jobs in growth areas of our business over the course of the year. These new jobs will bolster AT&T organizations responsible for building, maintaining and enhancing the company’s wireless and wired networks, developing and delivering new applications that take advantage of IP connectivity and maintaining customer service capabilities crossing the AT&T portfolio of services and applications. The company also maintains a continuing strong commitment to innovation. AT&T Labs plays a leading industry role in the advancement of the next generation of broadband technologies and capabilities, including research in critical areas such as development of 4G Long-Term Evolution technology; advancement of 100 Gigabit backbone network technology; and development of a range of emerging IP applications.
cc/2021-04/en_head_0031.json.gz/line2253
__label__wiki
0.529827
0.529827
702nd Squadron 703rd Squadron John Bloodsworth John A Bloodsworth served his country in World War II with the 445th Bombardment Group . Military Occupational Specialty (MOS): MOS: 755 Army Air Force Radio Operator. The information on this page about John Bloodsworth has been obtained through a possible variety of sources incluging the serviceman themselves, family, copies of military records that are in possession of the Army Air Corps Library and Museum along with data obtained from other researchers and sources including AF Archives at Air Force Historical Research Agency and the U.S. National Archives. This information is by no means complete; we are adding information based upon documentation in our possession including digital copies. We will continue to add to this material as it becomes available. If you have more information concerning the service of John Bloodsworth, including pictures, documents and other artifacts that we can add to this record, please Contact Us. 445bg.com, Copyright 2021, Army Air Corps Library and Museum, Inc., All Rights Reserved
cc/2021-04/en_head_0031.json.gz/line2258
__label__wiki
0.503357
0.503357
Rocky the Christmas tree stowaway owl returns to the wild In this photo provided by the Ravensbeard Wildlife Center, Ravensbeard Wildlife Center Director and founder Ellen Kalish holds a Saw-whet owl at their facility in Saugerties, N.Y., Wednesday, Nov. 18, 2020. A worker helping to get the Rockefeller Center Christmas tree in New York City found the tiny owl among the tree’s massive branches on Monday, Nov. 16. Now named Rockefeller, the owl was brought to the Ravensbeard Wildlife Center for care. (Lindsay Possumato/Ravensbeard Wildlife Center via AP) SAUGERTIES, N.Y. (AP) — Rocky the stowaway owl is back in the wild. The tiny Saw-whet owl was named Rockefeller after it was found by a worker setting up the holiday tree Nov. 16 at Manhattan’s Rockefeller Center. The owl was apparently trapped in the 75-foot-tall (23-meter-tall) Norway spruce when it was cut down 170 miles (275 kilometers) north, in upstate New York on Nov. 12. The female owl, initially thought to be male, was uninjured but hadn’t eaten for at least three days when she was discovered and sent to Ravensbeard Wildlife Center in the Hudson Valley town of Saugerties. There, a rehabilitator nursed her back to health for a week with plenty of mice before Rocky was cleared to continue her migratory journey south. On Tuesday evening, rehabilitator Ellen Kalish held the winsome raptor aloft in a field against a backdrop of rounded mountains. In a video posted on Ravensbeard’s Facebook page, Rocky sits quietly on Kalish’s fingers before winging her way over to a nearby grove of pines. “She is a tough little bird and we’re happy to see her back in her natural habitat,” the center wrote on Facebook. “We are sure that Rocky will feel your love and support through her journey south.” This story has been corrected to show the Rockefeller Christmas tree is 75 feet (23 meters) tall, not 71 feet (22 meters) tall. A ‘calm and quiet’ day in Washington D.C. for Utah National Guard members
cc/2021-04/en_head_0031.json.gz/line2260
__label__cc
0.625949
0.374051
Combatting air pollution with nature FOR IMMEDIATE RELEASE | November 06, 2019 “Nature-Based Solutions Can Compete with Technology for Mitigating Air Emissions Across the United States” Air pollution is composed of particles and gases that can have negative impacts on both the environment and human health. Technologies to mitigate pollution have become widespread in recent years, but scientists are now exploring a new, pared-down approach: using nature to restore ecological balance. They report their findings in ACS’ Environmental Science & Technology. In the decades since the Clean Air Act of 1970, air quality across the U.S. has improved dramatically. However, according to the American Lung Association, four in 10 people in the U.S. still live in areas with poor air quality, which can result in serious health effects such as asthma, lung cancer and cardiovascular disease. Technology to control and remove pollutants can be costly and often requires a great deal of energy. As an alternative, researchers are looking to nature-based solutions (NBS), a form of sustainable infrastructure that uses natural, rather than manufactured, elements. NBS are adaptable, cost-effective and can support native wildlife, making it a truly “green” solution in combatting pollution and climate change. To better understand the feasibility of NBS to reduce pollution, Bhavik Bakshi and colleagues wanted to perform a data-driven analysis. The researchers used publicly available data and calculated factors, such as current vegetation cover, county-level emissions from air pollutants and land area available for restoration, to determine the potential benefits of NBS across the U.S. Next, they calculated the financial aspect of implementing NBS to mitigate various air pollutants. The team found that in 75% of counties analyzed, it was more economical to use nature-based solutions for mitigating emissions than to implement technological interventions. Counties that were not strong candidates for NBS either did not have enough available land, or the cost of technological methods was less than that of restoration. Overall, the researchers found that both urban and rural populations could benefit from NBS, though many environmental factors should be considered before putting the approach into practice. Interactive versions of the maps can be accessed here: https://sustainable.engineering.osu.edu/software. The researchers acknowledge funding from the National Science Foundation. The American Chemical Society, the world’s largest scientific society, is a not-for-profit organization chartered by the U.S. Congress. ACS is a global leader in providing access to chemistry-related information and research through its multiple databases, peer-reviewed journals and scientific conferences. ACS does not conduct research, but publishes and publicizes peer-reviewed scientific studies. Its main offices are in Washington, D.C., and Columbus, Ohio. To automatically receive press releases from the American Chemical Society, contact newsroom@acs.org. ACS Newsroom newsroom@acs.org
cc/2021-04/en_head_0031.json.gz/line2264
__label__cc
0.576089
0.423911
Mold FAQs Attic Ventilation Water Damage & Restoration Sewage Removal Water FAQs Fire Damage Cleanup Pack-Out & Inventory Smoke & Odor Removal Air Duct FAQs Virus FAQs Hurricane & Storm Damage Wildfire & Smoke Damage AdvantaClean Services Commercial & Gov't Vendor Alliance SCHEDULE (703) 531-8186 Welcome to AdvantaClean of Mclean Peace of Mind is Just a Phone Call Away with AdvantaClean of Mclean Let our experts bring sanity to your life. From sanitizing your home to emergency services and mold removal, our team comes to the rescue anytime, any day. Commercial Business Sanitizing Keep your employees and their families happy and healthy by reducing the risk of exposure to viruses with our sanitizing protocol. Don't wait until it's too late. Let AdvantaClean help you reclaim your home. Request service now! To request a service call you only need to fill out the form below. We will contact you via phone, email, or text to confirm the best appointment time. You will receive an email confirming your service request. Services -Select a Service- Moisture Control Services Radon removal services Air duct or coil cleaning Sanitizing Services Mold Removal & Remediation Water Damage & Clean Up Fire Damage Cleanup Natural Disasters *All fields required. We won’t share your information. Not all locations provide the same services. To view our Privacy Policy click here. Trust AdvantaClean to Get the Job Done! For a Healthy Home & Business Moisture Control Services Air duct or coil cleaning Water Damage & Clean Up data-bg="/siteassets/ac-local-global-template/advantaclean-van.jpg" AdvantaClean of Mclean We are comitted to the health and well-being of our community. - Eddi Watson, Owner Are you faced with a water damage or mold emergency? Is the air quality in your property below healthy levels? AdvantaClean of McLean, Greater Reston and Loudon is here to serve you! Since 1994, we have helped numerous business and private property owners turn what could have been a disaster into a positive outcome. Our enthusiasm is contagious. Our technical superiority is evident. Our customer service approach is unmatched. Mold Removal, Water Damage, and Air Duct Cleaning Services in Mclean, VA Quality Solutions for Your Commercial Properties and Residential Homes When it comes to your property, it’s not clean until it’s AdvantaClean. That’s because we use cutting-edge technology and non-invasive methods to remove moisture from where it doesn’t belong. We are committed to protecting our customers and providing exceptional services that go above and beyond expectations. Our Reviews Speak for Themselves Don't take our word for it, see what our customers are saying about AdvantaClean. Your feedback is what makes the difference. Please feel free to send us your review and upload a picture of the finished project. State -Select- Alabama Alaska Arizona Arkansas California Colorado Connecticut District of Columbia Delaware Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington West Virginia Wisconsin Wyoming Upload Photo (Optional) 0 Star 1 Star 2 Stars 3 Stars 4 Stars 5 Stars *All fields required. We won't share your information. Leave us a review on today's best social sites. There Are Many Things We Do Well And We Are Known For Being The Best! 25 Years of Quality Service Don't Wait to Call! 4.8/5 Nationwide Review Rating Real Solutions for You Quality Cleans, Every Time AdvantaClean Partners with Extreme Makeover: Home Edition Extreme Makeover: Home Edition previously aired for nine years (2003-2012) and quickly grew to become a beloved household favorite. The most transformative and inspirational show is back on television with 10 new episodes on HGTV featuring Modern Family star Jesse Tyler Ferguson as the new host. The series highlights families that encourage positive change by giving back to their communities and the volunteers they've inspired to transform their home in seven days. Eddi Watson customer.support@advantaclean.com Aldie, Alexandria, Annandale, Arlington, Ashburn, Broad Run, Burke, Catharpin, Centreville, Chantilly, Clifton, Dunn Loring, Fairfax, Fairfax Station, Falls Church, Gainesville, Great Falls, Hamilton, Haymarket, Herndon, Leesburg, Lovettsville, Mc Lean, Middleburg, Oakton, Paeonian Springs, Purcellville, Reston, Round Hill, Springfield, Sterling, The Plains, Vienna, Waterford Sign Up for Offers & Newsletters Follow AdvantaClean of Mclean AdvantaClean Locations Tailored Living Follow AdvantaClean This franchise is responsible for the following cities: Aldie, Alexandria, Annandale, Arlington, Ashburn, Broad Run, Burke, Catharpin, Centreville, Chantilly, Clifton, Dunn Loring, Fairfax, Fairfax Station, Falls Church, Gainesville, Great Falls, Hamilton, Haymarket, Herndon, Leesburg, Lovettsville, Mc Lean, Middleburg, Oakton, Paeonian Springs, Purcellville, Reston, Round Hill, Springfield, Sterling, The Plains, Vienna, Waterford This franchise is responsible for the following zip/postal codes: 20105, 20117, 20120, 20121, 20124, 20129, 20132, 20137, 20141, 20143, 20147, 20148, 20151, 20152, 20155, 20158, 20164, 20165, 20166, 20169, 20170, 20171, 20175, 20176, 20180, 20190, 20191, 20194, 20197, 20198, 20812, 20816, 20817, 20818, 21713, 21716, 21722, 21733, 21740, 21756, 21758, 21779, 21782, 21795, 22003, 22015, 22027, 22030, 22031, 22032, 22033, 22035, 22037, 22039, 22041, 22042, 22043, 22044, 22046, 22066, 22101, 22102, 22124, 22150, 22151, 22152, 22160, 22180, 22181, 22182, 22207, 22213, 22304, 22310, 22311, 22312, 25419, 25425, 25432, 22030, 22035, 22033 © AdvantaClean 2021 | All rights reserved | All AdvantaClean franchise locations are independently owned and operated. Each franchise is independently owned and operated and may not offer all services represented on this website. For regulations and guidelines specific to your state, please contact your local AdvantaClean location. AdvantaClean Systems, Inc. uses cookies. Cookies help track user website behavior for functionality, analytics, and marketing and may share your information with third parties. By visiting this website you agree to our use of cookies. Find out more here.
cc/2021-04/en_head_0031.json.gz/line2265
__label__wiki
0.685726
0.685726
Call for Abstracts: Prototypical female figures and their contribution to social justice by AgendaFM | Jul 3, 2019 | Call for Abstracts Contributors are invited to write on the topic above from either a research or an activism perspective. Abstracts and contributions must be written in English and in a style accessible to a wide audience. Submit abstracts to jeannerose.prinsloo@gmail.com or admin@agenda.org.za on or before 29 July 2019 GUEST EDITORS: LEE STONE, MMATSIE MOOKI & NICHOLENE NXUMALO In Ndebele’s novel The Cry of Winnie Mandela the phrase ‘angle of approach’ is employed to indicate the absence of a technique or strategy that is able to craft a conclusive or dispositive answer to an issue. South Africa has been grappling with the complex and monumental task of advancing social cohesion and the empowerment of women for over two decades and we are still left in much the same place that we started. Indeed, women’s struggles have invariably been ‘resisted as disruptive to the existing hierarchical order’. Much like colonised territories, women have been penetrated, exploited and subjected to violence. Yet women are not recognised as active participants in liberation struggles against colonial and apartheid oppression. In the wake of decolonisation across the African continent, Birmingham asserts that ‘men walked tall in the new Africa, [but] women did not always find that their aspiration had been recognized’. Stated in more stark terms, Birmingham recounts that: Their voices had been heard and welcomed in the liberation struggle but when the battle was over they were often expected to return to domestic duties. … When African governments tried to moderate the post-independence conflicts over policy and priority by creating single-party states in which choices would be hammered out behind closed doors, they sometimes created special party sections for women but they rarely gave women real power. Even in countries where women had been mobilized in the armed forces and told that like the liberated women of China they held up half the sky, they were not appointed to ministries of finance or defense but only, at best, to those of welfare or education. The ideology of women’s emancipation did not match the political reality. … African women … found upward mobility difficult and access to education and the professions was very competitive. In countries where agriculture yielded low incomes the majority of women remained farmers, vegetable sellers or traders of ready-cooked foods. But it was women farmers who enabled Africa to survive the famines of decolonization by planting maize around refugee camps, growing tomatoes on the verges of city streets, and walking miles to fetch water in the absence of vehicles or pumps. These women were the invisible heroines of the African revolution. Expressions such as: ‘why doesn’t that [bitch] shut up?’ permeate the history of prominent women in the struggle for liberation. History is replete with accounts of assertive women being stereotyped as ‘tough, domineering, emasculating, strident and shrill’. Inevitably, they paid for it by being arrested for their involvement in liberation struggles, yet their contributions have been obscured and overshadowed. To be sure, historical accounts of prominent female figures are ‘fragile’ for their incompleteness. A few authors have registered Winnie Madikizela-Mandela’s political struggles. Ndebele, du PreezBezdrob and Msimang are but some of these. A less well-known “s-hero” is Thandi Modise who was detained in 1979 for her role as a female commander of uMkhontoweSizwe.Accordingly, achievements by prototypical female figures have been discounted and remain largely invisible. The result is that it has impeded an accurate record of history and undermined cultural identity. What is required is the curation of a historical narrative that reveals an accurate account of prominent women and their contributions to the advancement of social justice and transformation of society. The combination of symbolic, structural and physical violence associated with colonisation (and its successor, apartheid) has caused deep damage by penetrating the very identity and dignity of South Africans. Confirming this fact, Murungi makes the provocative statement that ‘one does not colonise innocently. Colonialism has two victims: the colonised and the coloniser [with] the right to be human subverted in both’. Emerging from a prolonged period of violent conflict, there is a very real risk of regression and a reversion to violence – that is, violence in all of its manifestations. For this reason, South Africa is on a precipice. There can be no denying that the failure on the part of the state to address the repetitive cycle of violence that subsists in society is impeding the post-apartheid transformation of South Africa. In particular, the culture of violence that has been created as a legacy of colonisation and apartheid has not only given rise to the “lost generation” but continues to manifest in high levels of violent crimes. Violence unambiguously poses a serious risk to South Africa’s fragile democracy. Precisely, South Africa is routinely cited as the state with ‘one of the highest Gini coefficients in the world’. Apartheid’s legacy is advanced marginality and relative deprivation. More nuanced consequences include both physical and structural violence resulting in difficulties with attachment to others expressed through low marriage and relationship frequencies, and child neglect and trauma [as well as] high levels of illiteracy, drug addiction, teenage pregnancies, HIV/AIDS … unemployment and crime. What is at stake is human security. Human security is best defined in an inverse fashion: human insecurity is evident when deprivation, poverty, exploitation, and tyranny proliferate. Put differently, human security is undermined when ‘underdevelopment, unequal access to resources, undemocratic governance, and other economic, social and political injustices’ have taken root. It is important to bear in mind that ‘there is an interface between development, security, and governance’. Inevitably, the deprivation accompanying human insecurity results in conflict. What is immediately apparent is that ‘social processes’ are integral to conflict prevention. Therefore, psychosocial and social dimensions such as cohesion, identity, and history should be the starting point. This approach is consistent with the logic that new methods of resolving ‘enduring human problems’ are required in instances where law, economics, politics and even morality have previously failed. The concepts of conflict and peace are undoubtedly ‘complex, iterative, multilayered, and dynamic processes’, requiring re-conceptualisation that is ‘enriched by a nuanced understanding of gender relations’. El-Bushra’s searing remark puts it best: in pursuit of eradicating conflict, the results of studies into complex debates informing the proliferation of conflict are inevitably incongruous because they are reduced to percentages and statistics. We attribute this to an absence of the application of an appropriate strategy. Consequently, all that occurs are short-term interventions that have no discernible results. The priority is to avoid what is known as “conflict traps” (the vicious cycle of conflict). So fundamental is this objective, that in 2013 the UN Secretary-General formally introduced the Human Rights Up Front Initiative. The initiative recognises that the perpetuation of violence, in combination with long-term animosities, presents ‘serious obstacles to the social cohesion needed to restore peace and security’. At this juncture, the invocation of the theoretical framework of the humanisation of international law is apposite. Lowe frames the purpose of international law as ‘to secure the conditions that allow sovereign States … to choose what kind of society will exist within its borders’. Extending this line of thinking, a strong state is characterized by ‘stability, order and prosperity’, political and economic good governance, respect for human rights and respect for the rule of law. Correspondingly, the very ‘survival of the state’ is dependent on human security being manifest. Recent analytical work exploring the circumstances preceding and succeeding political transformation suggests that a clear and precise cultural identity is essential for adjusting to social change. In the book The Psychology of Social Change, de la Sablonnière, Taylor & Caron-Diotte argue that in order for every member of society to ‘get along and get ahead’, one technique is the construction of historical narratives that focus on ‘historical heroes who changed the course of history for the group, and who personify the behaviours and values that define the group’ so that these can be emulated. Precisely, this serves as a template to guide rational individual behaviour within established social structures. Given that power is a necessary condition for emancipation, it is submitted that by having role models to guide future conduct, women and girls will be exponentially empowered by having a better understanding of themselves. Precisely, it is our contention that the exploration and documentation of the transformative role of women should have the benefit of clarifying our cultural identity. The literature reveals that dramatic social change obstructs and compromises the clear cultural identity of both individuals and groups. Simultaneously, it cannot be disputed that identity is not a static notion: it is fluid and changing. To be sure, most human beings have multiple identities. In the face of dramatic social change, the effect is insecurity relating to prioritising ‘what goals to strive for, what ones are possible or even realistic, and how to conduct [oneself] on a daily basis’. In short, a ‘cultural vacuum’ may ensue. Essentially, however, the identification of common characteristics and social identity that ‘represent the worthy pursuits in life’ informs one’s cultural identity. Restoration of cultural identity is facilitated by recourse to key historical events and people that ‘reflect the group’s past, present and future’ which re-instill pride and hope. Importantly, this process is dependent on the group having a shared knowledge about the events in which their group has been implicated, and which outgroups represent foes or allies [so that] individuals can derive the mission of their group. A clear and precise cultural identity is pivotal for higher levels of self-esteem and psychological well-being. Long terms goals can be prioritized based on this cultural identity, and they can be more effectively implemented for goal success. This is especially true for women. South Africa provides an excellent canvas for the restoration of cultural identity when South Africa’s history and society is assessed. We submit that this will provide the requisite platform to encourage interrogation and analysis of the traits and characteristics of prototypical female figures, upon which cultural identity can be based. In parallel with this, a rich historical narrative informing the adversities that prototypical female figures endured–and overcame – will promote the development of clear cultural identity. In this regard, we are cognisant of the fact that exhaustive focus on sexual violence ‘can cast women solely in terms of their sexual identities; as victims and deny their agency’. Our aim is to encourage studies into the violation of women and girls’ rights that are not purely sexual in nature. This knowledge would provide ammunition for more sustained engagement on gender equality and empowerment of women and girls in conflict, as well as post-conflict settings. For example, some women encounter extreme challenges purely on the basis of socially-constructed and binary sexual labels. The plight of Olympic gold medallist Caster Semenya serves to illustrate the indignity and humiliation that gender non-conforming people are subject to. In Semenya’s case the questioning of her sexuality arose due to hyper-androgyny (high testosterone levels). She has endured massive humiliation, public scrutiny and criticism, as well as being forced to undergo invasive gender testing to establish her biological sex by the International Association of Athletics Federations (IAAF). Against all odds, her resilient spirit has captured the hearts of South Africans and has earned her titles such as ‘heroine’. This inspirational journey captures how gender and sex have collided to influence acceptable forms of masculinity and femininity in society. The impact of telling the stories of prototypical women such as Semenya highlight the injustice that intersex women and females in sport, continue to suffer and the unrelenting violence they are forced to endure in a society that remains damaged by colonisation and apartheid. Our aim is to tell the stories of prolific women throughout Africa, those in the limelight and those working diligently in the background. It seeks to embrace their multifaceted character, especially considering the milestones that have brought South Africa into the democratic dispensation. Essentially, it locates the contribution of women within collective movements for social justice in their respective spheres and credits them as innovators, pioneers and history makers. Anon-exhaustive list of particular themes that we would like to interrogate in this edition are: The correlation between peace-building, social cohesion, and empowerment of young women How violence is perpetuated by the suppression (denial, even) of women’s historical struggles Identities: challenging and negating purely sexual identities as well as binary sexual labels by exploring the women’s movement Feminism for social change: revisiting domestic themes such as paid care-work and changes in parenting No such thing as ‘out-of-bounds’ for women: remodelling the world of work and breaking through concrete ceilings Women as nominal leaders and the need for critical reflection on the role of women in “nation building”: does the concept of “nation building” alienate and exclude women, thus perpetuating patriarchy? Women as king makers, behind the thrones, as deputies and first ladies of states The instrumental role of the media in telling women’s stories Correcting historical accounts of women’s contributions Discourses of women in culture Unsung s-heros The evolution of the status of women Agenda invites contributions from feminist and gender scholars, activists, researchers, policymakers, professionals, educators, community workers, students and members of womxn’s organizations and organizations interested in and concerned with gender issues. Contributions are accepted in any form, prose (both theoretical and practical), poetry, narrative, interviews, and visual arts. Agenda also invites the submission of poems on the topic of womxn’s rights and gender. Submissions should contribute to developing new thinking and fresh debate on womxn’s rights and gender equality in Africa and other developing countries. Writers need to: Write in an accessible and understandable style; Inform, educate or raise debate; Try to pin down reasons for contradictions and point out differences of opinion; Provide analysis and an argument; Be logical; Be sensitive to but not uncritical of how gender, class, and race affect the reporting of an event; Ensure the introduction encapsulates the contents of the piece and that it attracts the reader’s attention by either making a controversial statement,providing a thought-provoking or new insight into the subject; Utilize a gender or feminist lens. We publish articles in various formats, which range from 6 000 words for more theorized articles, which form the main reference pieces in an issue, to shorter pieces with a minimum of 1 500 words. Formats of Contributions Article (6 000 words max) should be based on new research and contain analysis and argument Briefing is an adaptable format for writing on a wide range of subjects (2 500 – 4 000 words) Focus examines an aspect of a chosen theme in detail (4 500 words max) Profile looks in detail at an organisation, project, legislation, or a person (2 500 – 3 500 words) Report-back covers reports on meetings, conferences, workshops, etc. (1 500 – 4 000 words) Review typically reviews books or films (1 500 – 3 000 words) Interview can record a conversation among a group of people or a one-on-one interview in which the writer asks the interviewee/s questions on a subject (1 500 – 3 000 words) Open Forum is a vehicle for debate and argument, or pieces which deal with argument and difference of opinion on a subject/issue (2 500 – 4 000 words) Perspective is an adaptable format in which writers are able to use a more personal reflective, narrative style (1 500 – 3 000 words) Contributions should be submitted in the following format: File type: Microsoft Word Font: Arial Size: 10 pt Line spacing: Single Justification: Left Referencing: Harvard style All submissions should have the following: Abstract: 200 – 300 words Keywords: approx 5 keywords Bio: 100 – word author biography, including email address Bio picture: head-and-shoulders photo in 300 dpi jpeg format Contributors are encouraged to provide photos and/or graphics to illustrate their submission. Selection and Editing Process All submissions are peer-reviewed. Articles, briefing, and focus pieces go through a double-blind peer-review process, while all other contributions are reviewed by at least one member of Agenda’s Editorial Advisory Group. Reviewers comment on the suitability of a text for publication in the Agenda journal, as well as provide comments to help develop the piece further for publication if required. Contributors will be asked to rework the paper accordingly. On resubmission, the piece will be assessed by the Agenda editors and a final decision made regarding its publication in the journal. Please note that Agenda reserves the right to edit contributions with regard to length and accessibility or reject contributions that are not suitable or of poor standard. Please note, as per Agenda’s policy, writers who have published in the journal within the last two years WILL NOT BE ALLOWED to publish – to allow new writers to publish in Agenda.
cc/2021-04/en_head_0031.json.gz/line2267
__label__wiki
0.663932
0.663932
Immigrants and some people of color are moving to the suburbs – but life there isn’t as promising as it once was Grigoris Argeros | Associate Professor of Sociology, Eastern Michigan University | Via The Conversation In the traditional American image of suburbia, the majority of residents are predominately native-born white Americans, living in large single-family houses enclosed by white picket fences. Americans presume that moving to such suburbs will offer them access to resources and opportunities to improve their quality of life – with, for example, better schools, less crime and lower poverty rates. But that image represents a bygone era. I have examined data from the American Community Survey. American suburbs are changing – socioeconomically, demographically and structurally. As more people of color move there, they might not find the full range of opportunities and resources that white European ethnic groups did for most of the previous century. The dream of a good suburban life exists for all racial and ethnic group members, both native and foreign-born. Traditionally, as people earned more money, they eventually move from less desirable central cities to more desirable suburbs. This path worked for the majority of white European ethnic groups. such as Greeks and Italians, through most of the 20th century. As they spent more time in the U.S., improved their English and earned more money – in other words, as they adapted to American culture, they eventually moved out of cities and into higher-income suburbs. There are many different ways to describe the differences between and desirability of suburbs. One focuses on housing construction: mature suburbs, with most of their housing built before 1969, and those that are still developing, with most of their housing built after 1970. On average, developing suburbs are wealthier, with a larger white population. Mature suburbs, which are often located closer to a central-city core, tend to have higher poverty and crime rates and households that are lower-income and less educated. They also tend to have more families that deviate from the classic suburban family type – such as single parent households or gay families. Shift in the suburbs Suburbs are being transformed by a number of different forces. For example, white Americans are getting older and having fewer children than non-white Americans. At the same time, more black Americans are moving to the suburbs, thanks to increased income levels and decreasing rates of housing discrimination. These changes mean that both mature and developing suburbs are rapidly becoming less white. Non-Hispanic Asians and Hispanics accounted for the largest percentage increase of residents in both suburban types between 2000 and 2017. In developing suburbs, the number of non-Hispanic blacks also increased slightly during the same time period. Between 2000 and 2017, both suburban types also witnessed an increase in non-white immigrants who have been living in the U.S. for less than 10 years. Stratification by race My research underscores the idea that, rather than being the homogeneous enclaves of American myth, suburbs are stratified by race and ethnicity, native status and socioeconomic status. Looking at American Community Survey data from the 2012 to 2016 time period, I found that white and Asian families are more likely than black and Hispanic families to live in suburbs with higher levels of household education and homeownership. That may be due to the fact that white and Asian households tend to be higher-income. However, white and Asian households are more likely than black and Latino households to live in developing suburbs, regardless of differences in socioeconomic status. So, even when black and Latino families have the means to move into more desirable neighborhoods, they are not as easily moving into such neighborhoods. Access for immigrants Rather than starting in cities and then moving out to the suburbs, as immigrants often did in the past, many of today’s immigrants are moving directly into the suburbs. The evidence also shows that immigrants no longer need to adapt to American culture before they move to the suburbs. I found that Asian and Hispanic Latino families living in the U.S. less than 10 years are more likely to be found in developing suburbs than their respective native-born members, even when accounting for differences in their educational and income levels. In another study, I found that black ethnic immigrants from the Caribbean and Africa end up in different types of suburbs, depending on their English abilities and how long they had been living in the U.S. Those who had limited English language proficiency and had lived in America for less than five years were more likely to live in developing suburbs. The research shows that, for non-white Americans and immigrants, there are now fewer barriers to the suburbs. However, that doesn’t guarantee that the American dream of living in a good suburban neighborhood is equally accessible to all racial and ethnic groups. Suburbs are not only becoming more diverse in terms of race and ethnicity, but also in terms of income, housing affordability, crime and poverty. In the past two decades, mature suburbs have also started to suffer similar issues as cities. Housing continues to age, wages are stagnated and there are fewer well-paying blue-collar jobs available. All of these factors are breaking the traditional stereotype of suburbs being the ultimate place to live and grow. Of course, the racial and ethnic diversification of suburbia is a positive change. But the question remains: Will all groups actually achieve that American dream of life in a good suburban neighborhood? [ Expertise in your inbox. Sign up for The Conversation’s newsletter and get a digest of academic takes on today’s news, every day. ] Grigoris Argeros, Associate Professor of Sociology, Eastern Michigan University
cc/2021-04/en_head_0031.json.gz/line2268
__label__wiki
0.78035
0.78035
New app to help farmers manage weeds Farmers can now measure and, as a result, better manage weeds on their property with the help of a phone app developed by AgResearch. The ‘Grassland Cover Estimator App’ provides an estimate of the percentage of a paddock that is occupied by a weed. This enables the productivity lost due to the weed to be calculated and used in a cost-benefit analysis for a proposed control operation. The App was launched in February and AgResearch Principal Scientist Graeme Bourdôt said it will have broad appeal among a wide variety of users working directly or indirectly in the pastoral sector, including farmers, regional council biosecurity officers, rural professionals, farm advisors, scientists and students. “The app has already been downloaded by 45 users across New Zealand, China, UK, France, Germany, USA and Canada.” Dr Bourdôt said the feedback from farmers had so far been very positive. “The catalyst for developing the app came from a Sustainable Farming Fund weed management project that I am involved in led by Golden Bay dairy farmer, Corrigan Sowman. “We’ve been comparing different management tactics for giant buttercup in on-farm field experiments with a view to developing a decision support system for management of this weed. “It’s a simple-to-use but powerful, enabling measurement of the cover of any component of a natural grassland or sown pasture including any weed, desirable pasture plant, diseased plants, bare ground etc. The app keeps track of ‘present’ and ‘absent’ observations made by the user and uses this data in a method known as ‘Step-point Analysis’ to calculate the percentage of the paddock that is covered by the weed or other component of interest. The app also enables the data to be exported for more detailed analysis including, for example, mapping of the cover estimates for the paddocks on a farm.” The precision and accuracy of the cover estimates generated by the app are the subject of an ongoing collaboration between AgResearch and Prof. Joe Neal, a weed science extension specialist at North Carolina State University. The results from this study, involving data collection in pastures and simulation modelling, will inform sampling protocols for using the app and will be published in an international weed science journal. Dr Bourdôt said there’s already been significant interest from other external stakeholders in New Zealand to further develop and expand the capabilities of the app. The app is available, free to use, on the Google Play Store and the Apple App Store. Prestigious award for assisting Chinese agriculture PhD student gains support to further her work on plant disease suppression in pastoral soils Biocontrol beetle shows great promise New steps in fight against agricultural insect pest New research into understanding West Coast agricultural pest
cc/2021-04/en_head_0031.json.gz/line2269
__label__wiki
0.724625
0.724625
I Seeking Nsa Gatwick Central African Republic adult introductions Naughty Women Search Adult Online Single Older Women Search Swing Sex I'm single, but like to be discreet ;) I'm Housewives seeking nsa Stronghurst pboobsionate, love giving oral and lots of play and long sex, I'm open to anything, I like kink, any age what . Seeking: I Am Wanting Swinger Couples City: Hometown, Little Chesterford, Coleman A. Young International Airport Relation Type: Lets Have Some Nsa Fun Tonight. The key aspects of the agreement were: - The adoption of a new constitution that would include the prohibition of amnesty for crimes against humanity, war crimes and crimes of genocide, the creation Sexy housewives looking hot sex Cookshire-Eaton institutions to guarantee the transparency of resources management and good governance, among. The adoption of a new Constitution On 13 Decembera referendum was organized for the adoption of a new Constitution, opening the way to presidential and legislative elections. The and elections Following almost two years of transition and the adoption of the new constitution, the CAR held presidential and parliamentary elections between December and March Despite initial delays, continuing insecurity on the ground, fear over the risk of electoral violence and widespread irregularities, the elections were relatively peaceful [2]. Presented as a turning point for the country, this new deal follows several peace deals brokered between the government and the armed groups, since including: - The Global Peace Agreement ed in Libreville, Gabon, which led to the organisation of an Inclusive Political dialogue. Milf dating in Nellysford The implementation of a DDR process was among the main recommendations. Among other key objectives and principles, the Roadmap insists on the fact that impunity for grave human rights and humanitarian principals violations would go against a durable and sustainable peace process, thus closing the door to any demand of amnesty as a condition to peace. The Agreement is organised a follow: - A list of general commitments from the Government and the armed groups. Main points of contention Immunity and amnesty Despite rejecting any idea of impunity and planning for Sweet housewives looking sex Stirling effective implementation of the Commission on Truth, Justice, Reparation and Reconciliation, the Agreement remains vague on how justice for crimes committed since the beginning of the conflict should be rendered. However, none of the Free sex finder and Poland ministries were attributed to representatives of the armed groups. A second cabinet reshuffle led to the inclusion of 4 new armed group leaders in the government, without fully managing to lull the tensions. Furthermore, tensions between the armed groups are still running high. Bite into the Big Apple. New York needs no introduction. But if it did, we couldn't go without mentioning good ol'. Some extremely well-heeled districts of west central London and most of the fewer than 15% are Black British, particularly from the Caribbean and Africa. bus services by National Express between Heathrow, Gatwick, Stansted and A single fare from Southend Airport to London is around £ Adult and £12 Child. I can't stop wondering what would haveany bbw up for fun today happened, gatwick Central African Republic adult introductions what could have happened. Security Forces The defence sector has often been regarded as the major source of instability Independence free chat sex rapped the primary area in need of reform. Historically, security and defence forces have been used as a tool by elites and the politicians as opposed to being a mean of safeguarding civilians. Members of the FACA and Internal Security Forces continue to commit human rights violations, encouraged partly by widespread impunity and lack of oversight [5]. Defence Poorly equipped, improperly trained, and unmotivated, the armed forces were incapable of preventing and stopping the rebel forces from causing chaos in the CAR infurther highlighting their inability New Brunswick sl protect citizens inside and, especially, outside the capital. Both the FACA and the Presidential Guard, who have historically been rival forces, have engaged in violent clashes and committed widespread human rights violations. The coup resulted in the institutional collapse of the FACA; its forces were overwhelmed and forced to flee to neighbouring countries. Those s also show limited progress regarding the redeployment of the FACA throughout the national territory compared to the beginning of the year: since Januaryonly 80 new soldiers have been deployed outside Bangui. Another 1, recruits were selected in and are now in the training stage. Once the new recruits the rank, the CAR will have a ratio of soldiers forhabitants 1 soldier for people. The defence architecture should also Grannys looking for sex in grandrapids completed by the creation of Mixed Special Security Units USMSintegrated by members of the regular forces and of the atory armed groups. Those units, once operational, will be mainly dedicated to strengthening security along transhumance corridors and at mining sites. Ludell KS 3 somes Security The National Police, who falls under the jurisdiction of the Ministry of Interior, has historically suffered from weak institutional capacity. Poorly equipped, underpaid, aged, concentrated in Bangui, and regarded as untrustworthy by the population due to accusations of human rights abuses and corruption, the National Police has been unable to play a stabilisation role. Following the crisis the Gendarmerie has been put under the management of the Ministry of Interior formerly under the Ministry of Defencein order to build better synergies between their work and that of the National Police. In comparison to the other state statutory forces, the Gendarmerie has been the most constant in size and the least in need of reform. Despite this, issues such as ethnic recruitment, aging personnel and Horney house Kakhati equipment still plague the force. Key issues: - Free lonely ladies around Sackville horny Wellington sluts of personal: According to the Report of the Secretary Generalas of 1 Junethe interior security forces police and gendarmerie were made of 3, officers, including 1, deployed outside Bangui. This represents a ratio Horny South Bend sluts 78 police or gendarmerie officers forhabitants 1 officer for 1, people. This is far below the UN recommended police — public ratio of The budget planned for around 1. in the Czech Republic. AFRICA. Operating in 23 countries, Sogea-Satom is a major player in Central Africa, West. Africa, Equatorial Africa and the new teams and introduction of a new unified ˇ In July, London Gatwick Airport issued £ million of bonds due to mature in with a coupon of %. Central African Republic third runway at Heathrow, and the refusal of permission for additional runways at Stansted and Gatwick. is the amendment of the noble Lord, Lord Dear, to the Marriage (Same Sex Couples) Act It does not tell the court what conclusions to draw or prevent a person from being found. I can't stop wondering what would haveany bbw up for fun today happened, gatwick Central African Republic adult introductions what could have happened. Around 1 million Married male looking to Bayville New York videos then hookup was dedicated to the police training academy. Justice During the conflict, the pattern of mutinies, defections and rebellions has led to a breakdown of law and order, leaving the justice sector operating under severe constraints, which were aggravated by the ransacking, burning of documents, and occupation and destruction of premises by the armed groups. Capacities of the judicial institutions remain limited to this day, with only 18 of 27 first instance and appellate courts operating between January and Juneaccording to the Report of the Secretary General. There are less than judges in the country 1 judge for 26, peoplea ration too low to respond to justice needs [6]. With Sexy women wants casual sex Linthicum of MINUSCA, the government is working on the implementation of a new national strategy on the demilitarization of the penitentiary system [8]. As of Juneprison officers were deployed while another were undergoing training. Lack of funding is also impacting the capacity to respond to justice needs throughout the country. Gatwick Central African Republic adult introductions Based on the finance lawonly 1. This hybrid court, composed of 13 judges from the CAR and 12 judges from the international community, is competent to try cases of grave human rights and International Humanitarian Law IHL violations committed in the country since The Law also establishes clear penal liability for actions committed by individuals Sub for humilation and sex also for superiors who may be held responsible for crimes committed by their subordinates. However, despite Newly separated seeking friend starting operation in Octoberthe progress in the operationalisation of the Court have been slow. As of Julythe special prosecutor had opened 4 investigations out of 22 priority cases identified. Sbf looking for something just right Another 3 cases transferred from the ordinary courts were also under investigation. Funding is one of the main issues affecting operationality of Farmers dating michigan Court. With an estimated annual cost of Furthermore, while the court already had a 1 million deficit as of Julyit is unclear to what extent it will be founded in Wife wants sex tonight MO Exeter 65647 Furthermore, a lack of qualified staff is affecting both the investigative and administrative capacities of the SCC. While the scope and actual representativity of those consultations remain unclear, justice appeared to be the highest demand, over the other key pillars truth, reparation and reconciliation [10]. State Control and Oversight Improving the system of governance in Black cock Bay Point United States CAR has remained a challenge over the last 30 years. While the transitional government has made efforts to improve ability, oversight, and management, the crisis hindered meaningful governance reforms. The Parliament, and especially the Defence and Security commission and the commission on Institutions, Democracy, Justice and Administrative Affaires of the National Assembly, should play a key role on the oversight of the security and justice sectors. However, lack of funding, limited human and technical means and constrained access to information are hindering their proper functioning. Both the National SSR Strategy and the Strategic Plan for the Development of the National Assemblyadopted inAdult singles dating in Seward a series of strategic objectives to restore the Gatwick Central African Republic adult introductions Assembly as Vail sex more gay gierls oversight actor and strengthen the capacities of the commissions. Within the Ministry of Justicethe Directorate-General for Human Rights, several services are also tasked with promoting and protecting human rights, monitoring violations and to settle conflicts related to human rights. Want a Jersey City affair, neither institutions have been able fulfil their mandate efficiently. While human rights abuses and Gatwick Central African Republic adult introductions of international humanitarian law have decreased over the last months, they remain a major issue affecting the everyday life of civilians. Attacks against civilians, restrictions on the freedom of movement and illegal detention are still frequent. Predominantly composed of urban-based, non-governmental organisations NGOstheir objectives have mainly been focused on the promotion of human rights and the right to security. Despite this, CSOs lack political independence and have historically been excluded from the decision-making organs and dialogs regarding SSR. Under its current mandate, extended until 15 November resolutionthe MINUSCA is allowed to take all necessary means to carry out its mandate, which includes: Protecting the civilian population under threat of physical violence, especially women and children affected by armed conflict; Supporting the peace process, including national reconciliation, social cohesion and transitional justice, and providing good offices and technical expertise; Supporting for the extension of State authority, the deployment of security forces, and the preservation of Beautiful mature ready orgasm Winston-Salem integrity through planning and technical assistance, including on SSR and DDRR; To this end, MINUSCA has deployed over 10, troops and staff officers. While most are deployed throughout the country to support the restoration of state authority and protect civilians, the mission is also participating to the SSR process, supporting the government in the verification of FACA personnel and conducting sensitisation of vetted military staff on human rights and humanitarian principles. Relation Type: Lonly Wife Wanting Black Sex Dating Also many clients Gatwick Central African Republic adult introductions Massage me all over first hands. Bite into the Big Apple. New York needs no introduction. But if it did, we couldn't go without mentioning good ol'. I Look For Sex Date Gatwick Central African Republic adult introductions. Seeking: I Am Search Real Sex Dating. City: Mesa, AZ. Hair: Dyed brown. Relation. A DDRR pilot project, which involves combatants from different armed groups, was officially launched on 30 August The central aim is to address ongoing rule of law concerns as well as civilian-on-civilian sectarian violence. This involves efforts to rebuild and train the national police. MINUSCA also Gatwick Central African Republic adult introductions to the drafting of a five-year-plan of capacities building of Central African Police and National Gendarmerie and is supporting the national authorities in its implementation. The Mission has trained more than 4, members of the FACA, including 1, officers and non-commissioned officers [12]. Bilateral Hot busty wives from Maida North Dakota Russia SinceRussia has been tightening its relationships with the CAR, deploying over experts to train military personnel. France In Augusta few days after the declaration of independence, the CAR ed a defence agreement with France, followed by a second military cooperation agreement in Those agreements have been the basis for several French interventions in the country since [15]. Operation Sangarislaunched in and concluded inis the last in date of those interventions. Through CIVIPOLFrance is also supporting the redeployment of the internal security forces, Adult dates in Eglon West Virginia train-and-equip programs and sensitisation of the local population. However, the increased presence of Russia in the CAR has challenged the French influence over the country. The Xxx singles near Elstow tn adopted a holistic approach to SSR; the institutions identified as in need of reform included the FACA, the national police, the gendarmerie, border control, and the intelligence services in addition to the executive branch, the parliament, and the judicial system more generally. Themes such as democratic control, governance, media, civil society, gender, the link between DDRR and SSR, and the proliferation of small arms were highlighted as. The process concluded with the Naughty lady wants sex tonight Sandusky of a detailed roadmap of short- and long-term projects as well as a list of priority objectives Government of the Central African Republic Despite these efforts, implementation of the SSR remains limited to the execution of a few projects. The CAR has been unable to provide institutional capacity, independent social services and security for the general population. National Recovery and Peacebuilding Plan for the Central African Republic Following the elections, the newly formed Government requested support from the European Union, the United Nations and the World Bank to assess recovery and peacebuilding needs and priorities. A Recovery and Peacebuilding Assessment RPBA was Online Adult Dating Sex in Bergholz out between May and October through a desk study synthesizing existing Married women seeking hot sex Wells and extensive consultations of the government, civil society and private sector actors, local population, donors and experts. The document highlights the underlying drivers of fragility and conflict in the country and sets a framework for recovery and peace building focussing on three priority pillars IASCGovernment of the Central African Republic : 1- Supporting peace, security and reconciliation through the implementation of SSR and DDR programs 2- Renewing the social contract between the State and the population by redeploying the administration and offering public services across the country while taking actions to ensure good governance 3- Promoting the economic recovery and boosting the productive sector b. SSR attempts in the country suffered from a lack of a comprehensive and global approach to security. The document assess the current security situation in the country, the state of the different security actors and institutions and lays out the vision and key objectives it aims to achieve. Gatwick Central African Republic adult introductions I Look For Sex Chat Inan initiative based on a holistic approach of SSR and national ownership was adopted following a national seminar on SSR. More than key short and medium-term activities were identified. However, the Looking to contact a East Haven Connecticut woman process stalled and, two years after its adoption, remained limited to a few actions. Lessons should be drawn from this past experience to ensure the success of the ongoing process. The document analyses the state of the play and examines the current situation of the national armed forces, identifying the main gaps and challenges. The redeployment of the armed forces throughout the national territory is the main goal set out by the NDP. However, despite a few punctual actions and activities, the structural reforms of the ISF have not been implemented and main issues still remain unaddressed. However, knowledge and understanding of the SSR process remain limited. Popular participation and adhesion to the SSR process is vital to its success and Bbc looking for skinny Portland Maine or asian pssy therefore be encouraged through an efficient communication strategy and the inclusion of civil society actors. Despite the existence of a comprehensive framework for SSR, the implementation is irregular and effects on the ground remain limited. The recruitment of new police and gendarmerie officers has not been ed to the adoption of a clear training strategy. Investments remain Woman wants sex tonight El Dorado Arkansas limited to cover the needs in infrastructures and material means. However, despite being included in each of the peace agreement ed between the government and the different armed groups over the past decade, the DDRR process is stalling, thus impacting the redeployment of the FACA and other public services. Despite some encouraging steps, justice actors, especially judges, are still mainly concentrated in Bangui. The limited presence of justice and civilian security providers police and gendarmerie outside of the Iceland adult Iceland is hampering the progressive return of rule of law in the country. Adult looking sex tonight Charleston West Virginia I Am Look For Man I Seeking Swinger Couples
cc/2021-04/en_head_0031.json.gz/line2273
__label__wiki
0.945572
0.945572
Public Library Association brings Short Story Dispensers to U.S. public libraries, including Akron-Summit County Public Library Knight Foundation funds initiative with Public Library Association and publisher Short Edition to foster creative community connections The Public Library Association announced a new partnership with community publisher Short Edition to promote reading and literary joy through public libraries in four U.S. communities. The Akron-Summit County Public Library has been named as one of the participants. Other libraries are the Free Library of Philadelphia (PA), Richland Library (Columbia, SC), and Wichita Public Library (KS). The initiative is funded by the John S. and James L. Knight Foundation. The joint project also will encourage diverse writers to share their work through Short Edition’s digital content platform while promoting library programs and services for readers and writers of all ages. Akron-Summit County Public Library will determine placement and partners for launch in coming weeks. “We are delighted to have been selected as a partnership in the Short Story Dispenser initiative. We know our community will enjoy printing out short stories on demand, which will reinforce the importance and joy of reading,” said Pam Hickson-Stevenson, Director, Akron-Summit County Public Library. Readers can print one-, three-, or five-minute stories from a range of genres at the touch of a button via the Short Story Dispenser. The kiosks will be branded to the libraries, enabling them to further their reach and visibility, as well as connect each story back to the full power of their collections and programs. This program also marks the launch of a new digital platform (www.short-edition.com/en) for sharing new literary creations. “Public libraries have long been at the forefront of promoting and supporting literacy, literature and the joy of reading,” said PLA President Pam Sandlian Smith. “More recently, libraries are expanding programs and services that encourage and support creative community expression through digital media labs, writing programs and 3-D printing.” "Libraries have an essential role to play in connecting the community and building a rich civic infrastructure. This program helps to further that goal, using storytelling as an impetus to inform people and attract new audiences," said George Abbott, Knight Foundation director for community and national initiatives. The Short Story Dispensers were first launched in France in 2015 by the startup company Short Edition, which designed and created the dispenser to bring literature to unexpected places like airports, train stations, shopping centers, and hospitals. Recent ASCPL News Upcoming Holiday Closures METRO RTA to offer free rides to Akron-Summit County Public Library cardholders on first Thursday of every month Library trustees endorse plan to reduce personnel costs Carla Davis Marketing Communications Director E-mail Carla For media calls, only.
cc/2021-04/en_head_0031.json.gz/line2274
__label__cc
0.554494
0.445506
“In the bars, with the men who play guitars” August 10, 2017 Filed under: Trivia — justwilliam1959 @ 10:45 pm Tags: Hey Hey What Can I Do, Jimmy Page, John Bonham, John Paul Jones, Led Zeppelin, Robert Plant Led Zeppelin were never a singles band in the UK during their hey day. But they did drop their standards elsewhere in the world, particularly in the USA. In fact the B Side to the 7″ single release of “Immigrant Song” featured the bands only non-album release when it hit the shops in 1970. It was called “Hey Hey What Can I Do”, and it has seen the light of day on a number of reissues, notably the expanded ‘Coda’. The band did eventually reach the UK singles chart in 1997 with a reissue of “Whole Lotta Love”. In total, worldwide Zep released 15 singles, the majority of which charted somewhere in the world. The original single release of “Whole Lotta Love” in 1969 made it to number one in both the Australian and German charts. “Immigrant Song” was a top ten hit in Canada, Germany, Netherlands, Switzerland and on the US Cash Box charts.
cc/2021-04/en_head_0031.json.gz/line2275
__label__wiki
0.768189
0.768189
What Salary and Benefits Can I Expect From Being a Musician By Chron Contributor Updated December 03, 2020 Jobs in Music Performance How to Make Good Money on the Side if You're a Professional Musician Salary of a Professional Theater Performer Salaries of Symphony Orchestra Musicians How Much Does a Concert Violinist Make? Musicians play instruments, such as violins, guitars or drums, or use their voices to make music. They perform by themselves or in groups in recording studios, on radio programs or in front of live audiences. Some compose their own music; others may create complete performances on a computer. Musicians need talent, constant practice and perseverance to earn salaries and benefits. Musician Wages Musicians earned a median ​$30.39​ per hour, as of May 2019, according to the U.S. Bureau of Labor Statistics (BLS). Median salary means that half the people in the occupation earned more, while half earned less. Work in the profession is so irregular that the BLS cannot calculate median annual pay rates. For every superstar who earns millions in concerts and recording deals, there are thousands whose meagre musician wages necessitate part-time or even full-time employment in other careers. If you seek steady employment as a musician, you have several options. One is music education. The U.S. Bureau of Labor Statistics reported that high school teachers earned a median salary of ​$61,660​ per year in 2019, while kindergarten and elementary teachers earned a median of ​$59,420​. Pay varies from state to state, and even among districts within a state. Teaching in the public schools requires a minimum of a bachelor's degree in music or music education as well as state licensure. Teaching at the college or university level may require an advanced degree although, depending on the institution, professional experience may be considered the equivalent of formal education. The U.S. Armed Forces staffs its bands and performing groups with enlisted service members. Unlike enlisting for other military occupations, enlistment to join a military band is by audition and is highly competitive. Enlisted service members are paid by rank (pay grade) and the number of years of service, as shown on the Defense Finance and Accounting Service (DFAS) military pay tables. For example, an E-7 with over 8 years of service earned ​$4,067.40​ per month in 2020. Cruise lines offer another option for steady employment. According to Landau Music, a company that hires entertainers for cruise ships, starting musician pay scale ranges from ​$2,200​ to ​$3,300​ a month, depending on whether you're part of the band, a band leader or a solo artist. Meals and lodging are also included while aboard ship. Musician Education A successful musical career is not necessarily dependent on formal education. Some people learn to sing or play an instrument "by ear," meaning that they can reproduce the sounds they hear without looking at music notated on a page. The Music Studio cites several famous musicians, including Elvis Presley, Eric Clapton and blues great Robert Johnson, who could not read music. Although formal education is not a guarantee of success, the training you get in a music program hones your skills, builds discipline and can position you for auditions and meetings with important people in the music business. A classical musician, for example, almost always needs to have at least a master's degree to be considered for a job in a symphony orchestra. Most military enlistees have bachelor's or master's degree in music performance. A minimum of a bachelor's degree is required to teach in public schools. Benefits for Salaried Employees Musicians working for public schools, academic institutions and corporations such as The Walt Disney Company receive the kinds of benefits typically earned by full-time employees, including medical and dental insurance, paid sick and vacation time, and retirement benefits. Unfortunately, many musicians do not reach this level of employment. Most musicians deal with part-time work or intermittent work and must endure long unemployment between performances or support themselves through other jobs. In such cases, the primary benefit of a musician career becomes the ability to express musical creativity. US Bureau of Labor Statistics: Musicians and Singers US Bureau of Labor Statistics: High School Teachers Defense Finance and Accounting Service: Military Pay Tables Landau Music: An In-Depth Look at Cruise Ship Musician Salaries and Perks The Music Studio: 7 Famous Musicians Who Can't Read Music How Much Do Guitarists Get Paid? What Do Cruise Ship Musicians Make? Singing Career Facts How Much Do Opera Singers Make? Jobs & Responsibilities for Singers Wedding Band Musician Salary Are There Other Types of Jobs in Music Besides Teachers or Engineers? Jobs in Heavy Metal Music How to Begin a Gospel Singing Career 1 How Much Do Guitarists Get Paid? 2 What Do Cruise Ship Musicians Make? 3 Singing Career Facts 4 How Much Do Opera Singers Make?
cc/2021-04/en_head_0031.json.gz/line2277
__label__wiki
0.879972
0.879972
Home / Focus / Australia Australia's Uranium (Updated January 2020) Australia's uranium has been mined since 1954, and three mines are currently operating. More are planned. Australia's known uranium resources are the world's largest – almost one-third of the world total. In 2019 Australia produced 7798 tonnes of U3O8 (6612 tU). It is the world's third-ranking producer, behind Kazakhstan and Canada. All production is exported. Uranium comprises about one-quarter of energy exports. Australia uses no nuclear power, but with high reliance on coal any likely carbon constraints on electricity generation will make it a strong possibility. In May 2016 the South Australian government's royal commission on the nuclear fuel cycle reported. Its main recommendation was for an international high-level nuclear waste repository, though this was not accepted. The Australian economy is unique in the OECD in that about 20% of GDP is accounted for by mining and mining services (in 2012). Uranium is a small part of this economically, but in energy terms, uranium (4200 PJ in 2015-16) comprises about one-quarter of energy exports. In the 1930s ores were mined at Radium Hill and Mount Painter in SA to recover radium for medical purposes. As a result a few hundred kilograms of uranium were also produced. Uranium ores as such were mined and treated in Australia initially from the 1950s until 1971. Radium Hill, SA, Rum Jungle, NT, and Mary Kathleen, Queensland, were the largest producers of uranium (as yellowcake). Production ceased either when ore reserves were exhausted or contracts were filled. Sales were to supply material primarily intended for USA and UK weapons programs at that time. However, much of it was used for electricity production. The development of civil nuclear power stimulated a second wave of exploration activity in the late 1960s. A total of some 60 uranium deposits were identified from the 1950s through to the late 1970s, many by big companies with big budgets. (Since then only two significant new ones have been found: Kintyre and Beverley Four Mile. The minor exploration boom 2002-07 was driven by small companies focused on proving up known deposits.) Mary Kathleen began recommissioning its mine and mill in 1974. Other developments were deferred pending the findings of the Ranger Uranium Environmental Inquiry, and its decision in the light of these. Mary Kathleen's second production phase was1976 to the end of 1982. The Commonwealth Government announced in 1977 that new uranium mining was to proceed, commencing with the Ranger project in the Northern Territory. This mine opened in 1981. In 1979, Queensland Mines opened Nabarlek in the same region of Northern Territory. The orebody was mined out in one dry season and the ore stockpiled for treatment from 1980. The mine site is now rehabilitated. A brief history of Australian uranium mining is appended. See also Former Australian Uranium Mines appendix. Australian Uranium Production and Exports Production tonnes U3O8 9941 9413 6958 7056 8244 7488 5897 6668 7447 6937 7696 7798 tonnes U 8430 7982 5900 5983 6991 6350 5000 5654 6315 5882 6526 6612 Exports tonnes U3O8 9663 9706 6888 6628 8116 7317 5669 6969 7679 tonnes U 8194 8230 5841 6170 6882 6205 4807 5909 6511 A$ million FOB 749 1116 608 586 776 704 504 802 715 Export value* A$/kg U3O8 77.54 114.9 88.3 88.4 95.6 96.2 88.9 115.1 93.1 Source: Companies, DRET, DIIS * average $A from declared net FOB estimates Recent Production from Individual Mines tonnes U3O8 Ranger 5678 4262 2677 3284 4313 1113 2044 2208 2315 2090 2094 Olympic Dam 3974 2258 4012 3853 4064 3988 3144 4363 3661 3364 3565 Beverley & North 626 630 347 413 453 188 0 0 120 0 0 Four Mile 0 186 922 1615 1430 2050 2002 Honeymoon 0 151 124 37 0 0 0 0 0 total 10278 7150 7036 7701 8954 5512 6110 8186 7526 7504 7661 Calendar year 2011 U3O8 production: 2641 t from Ranger, 3954 t from Olympic Dam, 416 t from Beverley, 45 t from Honeymoon, total 7056 tonnes (5983 tU) Calendar year 2012 U3O8 production: 3710 t from Ranger, 3992.5 t from Olympic Dam, 386.7 t from Beverley, 154.6 t from Honeymoon, total 8244 tonnes (6990.6 tU) Calendar year 2013 U3O8 production: 2960 t from Ranger, 4008.7 t from Olympic Dam, 407.4 t from Beverley, 112 t from Honeymoon, total 7488 tonnes (6349.6 tU) Calendar year 2014 U3O8 production: 1165 t from Ranger, 3952 t from Olympic Dam, 24.7 t from Beverley, 755 t from Four Mile, total 5897 tonnes (5000 tU) Calendar year 2015 U3O8 production: 2005 t from Ranger, 3728 t from Olympic Dam (corrected mid-2016), 935 t from Four Mile, total 6668 tonnes (5654 tU) Calendar year 2016 U3O8 production: 2351 t from Ranger, 3813 t from Olympic Dam, 100 t from Beverley, 1183 t from Four Mile, total 7447 tonnes (6315 tU) Calendar year 2017 U3O8 production: 2294 t from Ranger, 2808 t from Olympic Dam, 1815 t from Four Mile, 20 t from Beverley & Beverley North, total 6937 tonnes (5882 tU) Calendar year 2018 U3O8 production: 1999 t from Ranger, 3736 t from Olympic Dam, 1961 t from Four Mile, total 7696 tonnes (6526 tU) Operating Mines The Ranger mine and associated town of Jabiru is about 230 kilometres east of Darwin, in the Northern Territory, surrounded by the Kakadu National Park, a major tourist attraction. The mine opened in 1981 at a production rate of approximately 3300 tonnes per year of uranium oxide and has since been expanded to 5500 t/yr capacity. Mining of the second pit was 1997 to 2012, and this is now being backfilled. Treatment is conventional acid leach. Any future development will be underground, and application was made for approval of this in January 2013. Substantial development was undertaken to mine the Ranger Deeps, and in June 2015 ERA announced that it will defer proceeding further with development of the underground mine to access 27,650 tonnes of uranium, after spending A$ 177 million on the project. This is due both to slow recovery in the uranium market and the requirement to cease operations under the present Ranger Authority, which expires in 2021. Negotiations are exploring the potential to extend the deadline. Ranger is owned by Energy Resources of Australia Ltd (ERA), a 68.39% subsidiary of Rio Tinto. During 1988 the Olympic Dam project, then a joint venture of Western Mining Corporation and BP Minerals, commenced operations about 560 km north of Adelaide, in an arid part of South Australia. The massive deposit is underground, some 350 metres below the surface, and is the largest known uranium orebody in the world. The large underground mine produces copper, with gold and uranium as major by-products. Annual production capacity for uranium oxide has been expanded from 1800 to 4600 tonnes U3O8. It is now owned by BHP Billiton, following its 2005 takeover of WMC Resources. There were plans to greatly increase the mine's size and output, by accessing the orebody with a huge open pit, about 4.1 x 3.5 km and 1000m deep,but since 2015 only underground development is planned. (Further details below.) About 80% of the uranium is recovered in conventional acid leach of the flotation tailings from copper recovery. Most of the remaining 20% is from acid leach of the copper concentrate, but that concentrate then still contains up to 0.15% uranium. Hence the copper must be smelted at site, since selling it to overseas smelters would create both processing and safeguards complications for the smelter operator. This could change as part of a major envisaged expansion. Both Ranger and the now-closed and rehabilitated Nabarlek mines are on aboriginal land in the Alligator Rivers region of the Northern Territory. Aboriginal people receive royalties of 4.25% on sales of uranium from Northern Territory mines. The total received simply from Ranger is now over $207 million, and $14 million came from Nabarlek. The Olympic Dam mine is on formerly pastoral land in the middle of South Australia. A town to accommodate 3500 people was built at Roxby Downs to service the mine. The 18,000 ha mine lease is managed as a nature reserve. The small Beverley mine in South Australia started operation late in 2000, 520 kilometres north of Adelaide, on the plains north-west of Lake Frome. It was Australia's first in situ leach (ISL) mine, accessing a palaeochannel deposit in sand in a saline aquifer. It was licensed to produce 1180 t/yr U3O8 (1000 tU), and reached this level in 2004, though production has declined since. It is owned and operated by Heathgate Resources Pty Ltd, an associate of General Atomics in the USA. In December 2010 the company received government approval to mine the Beverley North deposits, and now almost all production through the Beverley plant comes from this north orebody which is contiguous with the Four Mile deposits. Mining of Beverley ceased at the end of 2013, and of Beverley North early in 2014, though 100 tonnes was reported for the second half of 2016. The Four Mile leases are contiguous with Beverley, and mining the east orebody by ISL commenced in April 2014. Resources are split between the west and the east orebodies, and the northeast orebody is also prospective. Uranium recovery is through Heathgate’s Pannikin satellite ion exchange plant then trucking the loaded resin to the main Beverley plant for stripping (elution) and precipitation, as is done at two US mines. Alliance Resources was a 25% free-carried joint venture partner after Heathgate’s Quasar subsidiary farmed into the project, but Heathgate then bought Alliance out. Production is at about 2000 t U3O8 per year. The Honeymoon ISL mine in South Australia commenced operation in 2011. The owners received government approval to proceed with ISL mine development in November 2001 but reassessed its ore reserves and Uranium One, based in Toronto, finally moved to development in 2007. In 2008 Mitsui agreed to join the project as 49% joint venture partner, and a construction contract was then let. Operations were ramping up to 400 t/yr. In 2012 production was expected to be 275 tonnes U3O8, at $47/lb - three times the average cost of production in Kazakhstan. In fact it produced less. Mitsui largely funded the development and commissioning, but then withdrew from the project in 2012. In November 2013 Uranium One, by then owned by Russia’s ARMZ, closed the mine and put it on care and maintenance until uranium prices improved. In September 2015 Boss Resources Ltd based in Perth agreed to buy Uranium One Australia which owned the mine. Boss completed a definitive feasibility study in January 2020 which provided a base case to rapidly restart uranium production at 907 t U3O8 (769 tU) per year over a 12-year life-of-mine. For more details of mines see Appendix: Australia's Uranium Mines. On the basis of December 2012 data Australia has 29% of the world's uranium resources (under US$ 130/kg) – 1.7 million tonnes of uranium. Almost half of Australia's 1.174 million tonnes of reasonably assured resources of uranium in this price category were actually in the under $80/kg U category when this was last reported. The vast majority of Australia's uranium resources (to $130/kgU) are within five deposits: Olympic Dam (the world's largest known uranium deposit), Ranger, Jabiluka, Kintyre and Yeelirrie. The world’s reasonably assured plus inferred resources in the $130/kg category are tabulated in the Supply of Uranium information paper. Uranium resources at mines and major deposits Mine or deposit Measured & Indicated Resources Inferred Resources Ranger hard rock, most underground 8,081 44,883 11,087 Olympic Dam hard rock, underground 305,150 1,555,100 1,012,800 Beverley palaeochannel, ISL ? ? Four Mile palaeochannel, ISL 14,520 39,926 Honeymoon palaeochannel, ISL 4,920 7,620 Jabiluka hard tock, underground 82,945 54,162 Kintyre hard rock 25,274 2,400 Yeelirrie calcrete 57,760 0 Wiluna calcrete 27,400 9,600 Mulga Rock palaeochannel and lignite 20,650 20,000 Samphire palaeochannel and basement granite 0 21,000 Valhalla hard rock 24,765 5,860 Resources are additional to reserves. Prospective mines and expansion The Jabiluka uranium deposit in the Northern Territory was discovered in 1971-73, 20 kilometres north of Ranger. It is surrounded by the Kakadu National Park, but the mine lease area is excluded from the National Park and adjoins the Ranger lease. It has resources of over 130 000 tonnes of uranium oxide, and is one of the world's larger high-grade uranium deposits. A mining lease was granted in 1982 but development was stalled due to disagreements with the Aboriginal traditional owners. Then with the Australian Labor Party coming to power in the 1983 federal election, Commonwealth approval was withdrawn and development ceased. In 1991 Energy Resources of Australia (ERA), the operator of the adjacent Ranger mine, bought the Jabiluka lease from Pancontinental for A $125 million. Following the 1996 change of government and further approvals, development of the underground mine proceeded with an 1150 metre access decline and a further 700 metres of excavation around the orebody. However, mining was deferred until agreement could be reached regarding treatment of Jabiluka ore at the Ranger mill. ERA (whose parent company is Rio Tinto) will not proceed with the mine until there is agreement from the local Mirrar Aboriginal people. For Olympic Dam BHP Billiton undertook a major feasibility study on greatly expanding the mine, and in 2009 it released the 4600-page environmental impact statement for the project. This was approved by state and federal governments in October 2011. The plan was to develop a large open pit with associated infrastructure over 11 years and lift uranium production to 19,000 tonnes U3O8 per year. The open pit would mean that up to 98% of the ore is mined rather than much less of it. Most of the uranium would be separated at the mine, but up to 2000 t/yr would be exported in copper concentrates, requiring a smelter for these in China or Japan which is subject to international nuclear safeguards. New infrastructure would include a 280 ML/day desalination plant on Spencer Gulf, supplying 200 ML/day to the operation, and 650 MWe increase in power supply. The present underground mining would continue in the narrow northern part of the orebody. However, in August 2012 the company said that it would investigate a new and less-costly design for its planned open-pit expansion, which meant it could not approve the project in time to meet a government deadline in December. In November 2012 the state government granted a four-year extension, conditional on the company spending $650 million on pre-project research on heap leaching and on community work. In November 2014, in a general announcement about productivity, BHP Billiton flagged a 27% increase in copper production at Olympic Dam from 2018, and a doubling from that level subsequently by “a low-risk underground expansion with significantly lower capital intensity than the previous open cut design. This has the potential to deliver over 450,000 tonnes of copper production a year at first quartile C1 costs by the middle of next decade”. The uranium implications were not mentioned, but assuming the same ore as today, it would mean about 5000 t U3O8 (4200 tU) per year from 2018 and some 9400 t U3O8 (8000 tU) per year in mid-2020s. In July 2016 the company confirmed that it would now focus on underground development only and not pursue the earlier open pit plan. Its increased copper production would involve a corresponding increase in uranium production. Cameco and Mitsubishi (70:30%) bought the Kintyre deposit in WA in 2008 from Rio Tinto for uS$ 495 million. Cameco initially envisaged starting mine construction in 2013 and operation in 2015, to produce 2700 to 3600 t U3O8 per year for 15 years. In mid-2012 Cameco put the project on hold pending firmer uranium prices or lower development costs. State and federal environmental approvals were given in 2015. BHP Billiton applied to bring its Yeelirrie, WA, deposit into production and projected 2000 t/yr U3O8 production from 2014, though in February 2010 approval was sought for production at 3500 t/yr. However, in 2011 the project was wound down due to high treatment costs and in 2012 it was sold to Cameco for US$ 340 million. In November 2014 Cameco requested the WA EPA to cancel the earlier environmental application, and submit a new one involving production at 7500 t U3O8 per year, and to assess the application under new 2012 EPA procedures. In January 2017 the state government approved development. Toro Energy is well advanced with plans to produce 900 t/yr U3O8 from its Wiluna project, comprising the shallow Lake Way and Centipede-Millipede deposits and the nearby Lake Maitland deposit in WA, from 2016. In January 2017 the state government approved development, but the company awaits higher uranium prices. Vimy Resources is developing the Mulga Rock deposits in WA to produce 1300 t/yr U3O8, with progressive open pits to 32 metres depth. In December 2016 the state government approved development and federal government approval followed in March 2017. The largest prospective Queensland mine is Paladin's Valhalla, 40 km north of Mount Isa. This is a major deposit but was stalled to 2012 by state government policies. There has been increasing foreign equity in Australian uranium deposits. As well as the Honeymoon, Kintyre and Yeelirrie projects above, in February 2009 Mega Uranium sold 35% of the Lake Maitland project to the Itochu Corporation (10% of Japanese share) and Japan Australia Uranium Resources Development Co. Ltd. (JAURD), acting on behalf of Kansai Electric Power Company (50%), Kyushu Electric Power Company (25%) and Shikoku Electric Power Company (15%) for US$ 49 million. In 2006 Sinosteel bought 60% of Pepinini's Curnamona project for A$ 31 million, and in 2009 China Guangdong NPC bought 70% of Energy Metals' Bigrlyi project for A$ 83.6 million. Both are early-stage exploration ventures. For more details of mine prospects see Appendix on Australia's Uranium Deposits and Prospective Mines. Despite restrictive state government policies and perhaps in anticipation of their disappearance, uranium exploration gathered pace during 2006, with more than 200 companies professing an interest, compared with 34 the previous year, and A$ 80 million being spent. Expenditure then more than doubled, to A$ 182 million in 2007, A$ 227 million in 2008, A$ 180 million in 2009 and A$ 190 million in 2011. It then declined abruptly to A$ 98 million in 2012. Uranium exploration has been illegal in Victoria and New South Wales, and remains so in Victoria. Uranium mining is being reinstated in Queensland after a few years' break. Economic benefits of mining uranium About 1200 people are employed in uranium mining, at least 500 in uranium exploration, and 60 jobs are in regulation of uranium mining. Uranium mines generate about A$ 21 million in royalties each year (in 2005: Ranger $13.1 million, Beverley $1.0 million and Olympic Dam $6.9 million attributable to uranium). Corporate taxes amount to over $42 million per year. Uranium exports from Australia Australian production is all exported, and over the six years has averaged over 8600 t/yr U3O8, and in 2012 provided 12% of world uranium supply from mines. Uranium comprises about 35% of the country's energy exports (4150 PJ av) in thermal terms. Australia's uranium is sold strictly for electrical power generation only, and safeguards are in place to ensure this. Australia is a party to the Nuclear Non-Proliferation Treaty (NPT) as a non-nuclear weapons state. Its safeguards agreement under the NPT came into force in 1974 and it was the first country in the world to bring into force the Additional Protocol in relation to this – in 1997. In addition to these international arrangements Australia requires customer countries to have entered a bilateral safeguards treaty which is more rigorous than NPT arrangements. The value of Australia's uranium oxide concentrate exports is considerable, and in 2009 they reached a value of over A$ 1.1 billion. However, production problems at Olympic Dam from late 2009 into 2010 set production back considerably over those two years, then the Fukushima accident in March 2011 softened prices. In 2014, U3O8 sales were to North America (mainly USA) 2668 t (39.0%), Europe 2354 t (34.4%) and Asia 1822 t (26.6%), total 6844 tonnes. (These figures are deliveries of Australian product to customers’ converter accounts and exclude third party material purchased to fulfill contract obligations. There is a time lag relative to export figures tabulated above.) The nations which currently purchase Australia's uranium are set out below, though up-to-date details on country destinations is not available. All have a large commitment to nuclear power. The USA generates around 30% of the world's nuclear power. Much of its uranium comes from Canada, but Australia is a major source – 4409 t U3O8 in 2016, more than half of total Australian exports. Europe depends heavily on nuclear power and EU countries are also major customers. In 2015, 1910 tU or 12% of EU uranium was from Australia. In 2016 Australia provided 13% of EU supply. Japan, South Korea and now China and India are important customers due to their increasing dependence on nuclear energy. Customer countries' contracted imports of Australian uranium oxide concentrate – U3O8 – may be summarised as follows, though detailed information has not been readily available in recent years (see also the reactor table): USA: up to 5000 tonnes per year. EU: up to 3500 tonnes per year, including Belgium, Finland, France, Germany, Spain, Sweden, UK. Japan: formerly up to 2500 tonnes per year. South Korea: up to 1500 tonnes per year. China: about 500 tonnes per year. Taiwan: up to 500 tonnes per year. India: up to 300 tonnes per year likely from 2018. Australia is a preferred uranium supplier to world, especially East Asian, markets where demand is growing most rapidly. In 2006 a bilateral safeguards agreement was concluded with China, enabling exports there, and in 2007 a similar agreement was signed with Russia, which came into force in 2010. An agreement with the United Arab Emirates (UAE) came into force in 2014, and another with India came into force in November 2015, at which time administrative arrangements for each were also finalised and they became operational. In 2016 a bilateral agreement was signed with Ukraine. This made the total 25 treaties covering 43 countries plus Taiwan. Australia could readily increase its share of the world market because of its low cost resources and its political and economic stability. As well as uranium sold to overseas customers (mainly utilities) by the four mining companies, Energy Metals Ltd, an exploration company with majority Chinese ownership, has an export permit. In December 2011 it announced the sale of 68 tonnes of U3O8 to its parent company, China General Nuclear Power, for shipment in 2012. (CGN’s wholly-owned subsidiary, China Uranium Development Co., is Energy Metals’ largest shareholder with a 60.6% stake. The company sources uranium from Australian producers.) Environmental aspects of uranium exports are notable: Shipping 7000 tonnes of U3O8 as in 2010 is the energy equivalent of shipping 140 million tonnes of thermal coal. Australia's present thermal coal exports are over 100 million tonnes, requiring between 3,000 and 4,000 voyages of bulk carriers through environmentally sensitive regions such as the Great Barrier Reef. Export coal also has an environmental impact through the provision of harbours and railways. Nuclear power prospects in Australia Australia has a significant infrastructure to support any future nuclear power program. As well as the Australian Nuclear Science & Technology Organisation (ANSTO), which owns and runs the modern 20 MWt Opal research reactor, there is a world-ranking safeguards set-up – the Australian Safeguards & Non-proliferation Office (ASNO), the Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) and a well-developed uranium mining industry. However, in contrast to most G20 countries, the only real driver for nuclear power in Australia is reduction of CO2 emissions, or costs arising from that. Apart from that, Australia's huge coal resources and significant natural gas underwrite energy security and provide low-cost power. (Many other countries have cost of electricity and energy security as major factors.) There are several legal hurdles impeding consideration of nuclear power for Australia. NSW has a Uranium Mining and Nuclear Facilities (Prohibition) Act 1986, and Victoria has a Nuclear Activities (Prohibitions) Act 1983. Federally, the Environment Protection and Biodiversity Conservation Act 1999 and Australian Radiation Protection and Nuclear Safety Act 1988 will need to be amended to remove prohibitions against effective regulation of nuclear power.* * The ARPANS Act 1998 has section 10 Prohibition on certain nuclear installations, and the EPBC Act 1999 much the same in section 140A. ARPANS Act section 10: Nothing in this Act is to be taken to authorise the construction or operation of any of the following nuclear installations: (a) a nuclear fuel fabrication plant; (b) a nuclear power plant; (c) an enrichment plant; (d) a reprocessing facility. The CEO must not issue a licence under section 32 in respect of any of the facilities mentioned in subsection (1). Fuller details and context are on the Decarbonise SA website and the Bright New World website. In November 2018 the International Atomic Energy Agency (IAEA) completed a 12-day integrated regulatory review service mission focused on ARPANSA to assess the regulatory framework for nuclear and radiation safety in Australia. UMPNER report 2006 and follow-on In December 2006 the report of the Prime Minster's expert taskforce considering nuclear power was released. It concluded that “the Review sees nuclear power as a practical option for part of Australia’s electricity production” and said nuclear power would be 20-50% more expensive than coal-fired power and (with renewables) it would only be competitive if "low to moderate" costs are imposed on carbon emissions (A$ 15-40 – US$ 12-30 – per tonne CO2). "Nuclear power is the least-cost low-emission technology that can provide base-load power" and has low life cycle impacts environmentally. The then Prime Minister said that in the context of meeting increased energy needs while reducing greenhouse gas emissions "if we are to have a sensible response we have to include nuclear power". "The report provides a thorough examination of all aspects of the nuclear fuel cycle and the possible role of nuclear power in generating electricity in Australia in the longer term. It provides a clear and comprehensive analysis of the facts surrounding the nuclear industry and debunks a number of myths. I am certain that the report will make a significant contribution to informing public debate on these issues." The report said that the first nuclear plants could be running in 15 years, and looking beyond that, 25 reactors at coastal sites might be supplying one-third of Australia's (doubled) electricity demand by 2050. Certainly "the challenge to contain and reduce greenhouse gas emissions would be considerably eased by investment in nuclear plants." "Emission reductions from nuclear power could reach 8 to 18% of national emissions in 2050". In April 2007 the Prime Minister announced that the government would proceed to open the way for nuclear power in Australia by setting up a nuclear regulatory regime and removing any regulatory obstacles which might unreasonably stand in the way of building nuclear power plants. Australia would also apply to join the Generation IV International Forum, which is developing advanced reactor designs for deployment about 2025. The government would also take steps to remove impediments to uranium mining. "Policies or political platforms that seek to constrain the development of a safe and reliable Australian uranium industry – and which rule out the possibility of climate-friendly nuclear energy – are not really serious about addressing climate change in a practical way that does not strangle the Australian economy." In June 2007 the emissions trading taskforce report proposed that Australia should move steadily to implement an emissions trading scheme by 2012. While Australia cannot afford to wait upon a global regime, its own should be devised so as to avoid the shortcomings of present schemes and also articulate internationally. Both emission reduction targets and carbon price would be low initially and ramp up. The need for a trading scheme "more comprehensive, more rigorously grounded in economics and with better governance than anything in Europe" was noted. It would be designed to appeal to developing nations. The cost increment on coal-fired power generation brought about by a carbon emission cost would be likely to make nuclear power competitive in Australia. With a change of government late in 2007 the move towards nuclear power was halted and the implementation of an emissions trading scheme became bogged down in political rhetoric. National Generators Forum 2006 Any proposal for building nuclear power plants would need to be brought forward by generating companies. The National Generators Forum published a report in 2006 on Reducing Greenhouse Gas Emissions from Power Generation which concluded that "Stabilising emissions at present levels and meeting base-load requirements could be achieved with nuclear power at comparatively modest cost." While projected cost increases to 2050 could be more than 120%, using nuclear power would halve the increase. "At $20 per tonne of CO2 price, nuclear starts to become more cost-effective than current fossil fuel technologies." Cooling will be a major issue in respect to future base-load generating capacity in Australia. At present about 80% of electricity is produced from coal-fired plants, mostly cooled by evaporating water in cooling towers. An estimated 400 GL/yr of fresh water is thus evaporated and lost - about the same as Melbourne's water use. In the light of widespread shortage of fresh water, cooling of nuclear plants would need to be by seawater, hence coastal sites would be required* and to the extent that nuclear plants actually replaced coal-fired plants, a very large amount of fresh water would be freed up for other uses. Coastal location of nuclear plants would also give rise to the possibility of cogeneration, using waste heat or surplus heat for desalination and production of potable water. * A coal plant is normally sited on a coalfield (inland), so does use a lot of water for evaporative cooling towers. A nuclear plant can be anywhere, from the point of view of fuel supply. IFNEC & GIF participation In September 2007 Australia was one of eleven countries joining the five founders in the Global Nuclear Energy Partnership (now the International Framework for Nuclear Energy Cooperation – IFNEC). Australia made it a condition that it is not obliged to accept any foreign nuclear waste, and it reserved the right to enrich uranium in the future. In the lead up to this Australia and the USA finalized a joint action plan for civil nuclear energy cooperation including R&D and regulatory issues. In April 2016 Australia became the 14th member of the Generation IV International Forum (GIF) which is working on advanced nuclear technologies, focused on six power reactor designs expected to be commercially viable from about 2030. ANSTO will be the means of contributing to GIF’s goals. GIF was set up in 2001, and the technical secretariat is with the OECD’s Nuclear Energy Agency in Paris, alongside IFNEC and another major international programme. The membership was formalised in September 2017. ATSE action plan 2014 In July 2013 the Australian Academy of Technological Sciences and Engineering (ATSE) held a two-day conference on nuclear power for Australia. This resulted in an action plan in 2014, which included comparing the nuclear option with alternative energy scenarios in the 2030-2050 timeframe, reviewing current policies which preclude consideration of nuclear power, commence open and active community engagement, building on overseas R&D program linkages. SA royal commission 2015-16 In February 2015 the Labor state government of South Australia set up a royal commission into the potential for nuclear power in that state, which already produces two-thirds of Australia’s uranium. The terms of reference included fuel cycle and high-level waste disposal as well as power generation. The inquiry was supported by the state Liberal (conservative) opposition and the federal Liberal coalition government, but not by the federal Labor party (though it supports uranium mining). Though the royal commission’s findings were positive in many respects, several would require federal laws to be changed. Insofar as the royal commission will direct future power investment in SA, the question of reactor unit size arises. At present the unit size of any generating unit there is regulated at 260 MWe, though modelling has shown 500 MWe units are possible. Small modular reactors would therefore be indicated. But if transmission links were expanded a SA nuclear power plant with large reactors could serve the eastern states. In May 2016 the Royal Commission into the Nuclear Fuel Cycle reported. It found that it would not be commercially viable to develop a nuclear power plant in the state under current market rules, but noted that as "a low-carbon energy source comparable with other renewable technologies", nuclear may be required in the future. It therefore recommended that the South Australian government should "pursue removal at the federal level of existing prohibitions on nuclear power generation to allow it to contribute to a low-carbon electricity system, if required." It also called for the removal at the federal level of prohibitions on the licensing of fuel cycle facilities, although it noted that in a currently oversupplied market the provision of such services would not be commercially viable in the next decade. In November the South Australian government said it would support nine of the 12 recommendations of its royal commission. Five accepted recommendations relate to uranium mining and exploration, and include the expansion of uranium mining. The government also supported the commission’s recommendations to collaborate at the national level “on the development of a comprehensive national energy policy that enables all technologies, including nuclear, to contribute to a reliable low-carbon electricity network at the lowest possible system cost,” and to monitor the development of new nuclear reactor designs. It also supported a recommendation to promote and increase the use of nuclear medicine at the South Australian Health and Medical Research Institute. It did not support the commission's recommendation that it should pursue the removal of existing prohibitions on nuclear power generation in the state, "recognising that in the short-to-medium term, nuclear power is not a cost-effective source of low-carbon electricity for South Australia." Nor did it support removal of restrictions on nuclear fuel cycle activities. The major recommendation was to set up an international high-level waste storage facility and repository in the state, but the government will not "pursue policy or legislative change" relating to this but would "continue to encourage" discussion on the issue and "remain open to pursuing this opportunity for South Australia" eventually. This would be by restoration of bipartisanship and broad social consent secured through a state-wide referendum as "the only path forward." In May 2016 a 520 MWe coal-fired power station was closed down and later demolished. It had supplied about one-fifth of state demand. In September 2016 South Australia experienced a state-wide blackout for several hours, prompting re-evaluation of the state’s electricity supply security. Average South Australia wholesale electricity prices increased by 76% between 2015-16 and 2016-17 (from $61.67/MWh to $108.66/MWh). In mid-2017, total capacity in the state was 5440 MW, consisting of: gas, 2670 MWe (49%); wind, 1700 MWe (31%); rooftop solar PV, 780 MWe; and diesel, 290 MWe. MIT South Australia report 2018 In October 2018 a white paper from Massachusetts Institute of Technology (MIT) modelled 16 electricity supply scenarios for South Australia. With any carbon emission constraint below 100g/kWh, those with a nuclear component were distinctly cheaper. (SA carbon intensity for 2016-17 was about 290 g/kWh.) It envisaged progressive deployment of small reactors up to 300 MWe each to a total of between 600 and 1500 MWe. The higher figure would support operation of a desalination plant. Earlier background to considering nuclear power See also Appendix on Australian Research Reactors. In 1953 the Australian Parliament passed the Atomic Energy Act, which established the Australian Atomic Energy Commission (AAEC). AAEC's functions included advising the Government on nuclear energy matters, and the Commission quickly decided that effective and informed advice could only be provided if there was underlying expertise directly available to it. Hence in 1955 it established a research establishment at Lucas Heights, near Sydney and began assembling a world class team of scientists and engineers. It also began construction of a materials testing reactor, HIFAR, which first achieved criticality and started up on Australia Day, in January 1958. The AAEC's research program was initially very ambitious and included studies of two different power reactor systems, on the base of substantial multi-disciplinary research in the fields of physics, chemistry, materials science and engineering. Later, recognising Australia's potential as a source of uranium, AAEC also undertook an experimental research program in the enrichment of uranium. The AAEC also initially convinced the Government that there would be benefits from the construction of a "lead" nuclear power station on Commonwealth land at Jervis Bay, south of Sydney. After competitive bids were obtained, a reshuffle of leadership in the Government led to a loss of interest in the proposal and the project was eventually abandoned in 1972. In the late 1950s nuclear power was considered for the large new power station at Port Augusta in SA, which was eventually commissioned in 1963 to burn very low-grade coal from Leigh Creek. In the late 1960s Victoria's State Electricity Commission undertook preliminary studies on building a large nuclear plant on French Island in Westernport. In 1969 the South Australian government proposed a nuclear power plant in SA to supply the eastern states' grid. Then in 1976 the SA government in its submission to the Ranger Uranium Inquiry said nuclear power appeared inevitable for SA, perhaps by 2000. In 1981, the government's National Energy Advisory Committee presented a report on the administrative and legal issues associated with any domestic nuclear power program. It recommended that "the commonwealth, state and Northern Territory governments should develop with minimum delay a legal framework using complementary legislation as appropriate for licensing and regulating health, safety and environmental and third party liability aspects." In Australia the possibility of nuclear power is hindered in Victoria and NSW, by legislation enacted by previous governments. In Victoria the Nuclear Activities (Prohibitions) Act 1983 prohibits the construction or operation of any nuclear reactor, and consequential amendments to other Acts reinforce this. In NSW the Uranium Mining and Nuclear Facilities (Prohibitions) Act 1986 is similar. In 2007 the Queensland government enacted the Nuclear Facilities Prohibition Act 2006, which is similar (but allows uranium mining). Electricity options Coal provides the majority of Australia's electricity, and the full picture is given in the Appendix on Australia's Electricity. This also accounts for most of the 200 Mt/yr carbon dioxide emissions from electricity and heat production and uses up about 400 GL/yr of fresh water for evaporative cooling. Preliminary IEA figures show 2016 generation of 258 TWh, 63% from coal and 20% from gas. Australia is fortunate in having large easily-mined deposits of coal close to the major urban centres in the eastern mainland states. It has been possible to site the major power stations close to those coal deposits and thus eliminate much of the cost and inconvenience of moving large tonnages of a bulky material. Energy losses in electricity transmission are relatively low. Western and South Australia have relatively less coal but plenty of gas and also lower demand for electricity. More than half of their electricity is derived from burning gas. Development of Tasmania's large hydro-electric resources has put off the day when it needs any large thermal power stations, but hydro potential is now almost fully utilised. In the next 15 years or so Australia is likely to need to replace the oldest quarter of its thermal generating capacity, simply due to old age. This is at least 8000 MWe, practically all coal-fired. If it were replaced by gas-fired plant, there would be a reduction of about 25-30 million tonnes of CO2 emissions per year. If it were replaced by say six nuclear reactors there would be a reduction of about 50 million tonnes of CO2 emissions per year. Every 22 tonnes of uranium (26 t U3O8) used saves the emission of one million tonnes of CO2 relative to coal. In other parts of the world as well as Western and South Australia, there was a conspicuous "flight to gas" in the late 1990s while gas prices were low. Generating plant to utilise gas is relatively cheap and quickly built, and at the point of use, gas-fired electricity does cause only half the greenhouse emission of coal. It is clearly an option to utilise more gas for electricity in Australia if low gas prices can be maintained many years ahead. Moving to gas would be seen by some as a great step forward for the environment. Others would see it as a tragic waste of a valuable and versatile energy resource. Gas can be reticulated to homes and factories to be burned there at much greater efficiency overall. In January 2007 the Energy Supply Association of Australia (ESAA) completed a study on electricity supply options relative to CO2 emission constraints in meeting projected load in 2030. For a 67% increase in electricity load, greenhouse gas emission targets of 140%, 100% and 70% of 2000 levels were modeled, with three supply options: all credible technologies; without nuclear; and without both nuclear and fossil fuel (with carbon capture and storage). Constraining CO2 emissions would require nuclear contributing 20% of the power, with overall about 30% increase in costs, hence a need for costing carbon to cover this. ESAA concluded that "the widest possible range of generation technologies will be needed." Radioactive wastes - domestic While Australia has no nuclear power producing electricity, it does have well-developed usage of radioisotopes in medicine, research and industry. Many of these isotopes are produced in the research reactor at Lucas Heights, near Sydney, then used at hospitals, industrial sites and laboratories around the country. Each year Australia produces about 45 cubic metres of radioactive wastes arising from these uses and from the manufacture of the isotopes – about 40 m3 low-level wastes (LLW) and 5 m3 intermediate-level wastes (ILW). These wastes are now stored at over a hundred sites around Australia. This is not considered a suitable long-term strategy. Since the late 1970s there has been an evolving process of site selection for a national radioactive waste repository for LLW and short-lived ILW. There has also been consideration of the need to locate a secure storage facility for long-lived intermediate-level wastes including those returned to Australia following the reprocessing of used fuel from Lucas Heights. Eventually, disposal options for this will need to be considered also. Low-level wastes and short-lived intermediate-level wastes will be disposed of in a shallow, engineered repository designed to ensure that radioactive material is contained and allowed to decay safely to background levels. Dry conditions will allow a simpler structure than some overseas repositories. The material will be buried in drums or contained in concrete. The repository will have a secure multi-layer cover at least 5 metres thick, so that it does not add to local background radiation levels at the site. There is a total of about 3700 cubic metres of low-level waste awaiting proper disposal, though annual arisings are small (the 40 cubic metres would be three truckloads). Over half of the present material is lightly-contaminated soil from CSIRO mineral processing research decades ago (and could conceivably be reclassified, since it is no more radioactive than many natural rocks and sands). Long-lived intermediate-level (category S) wastes will be stored above ground in an engineered facility designed to hold them secure for an extended period and to shield their radiation until a geological repository is eventually justified and established, or alternative arrangements made. There is about 500 cubic metres of category S waste at various locations awaiting disposal, and future annual arisings will be about 5 cubic metres from all sources including states & territories, Commonwealth agencies and from radiopharmaceutical production, plus the returned material from reprocessing spent ANSTO research reactor fuel in Europe. This will be conditioned by vitrification or embedding in cement, and some 26 cubic metres of it is expected by about 2020. In March 2012 parliament passed the National Radioactive Waste Management Bill 2010 which provides for a national repository for low-level wastes and store for intermediate-level wastes, on land which has been volunteered by its owners, probably at Muckaty Station in the Northern Territory. In April 2016 the government selected one site in South Australia from a shortlist of six, for further consultation. See further: Radioactive Waste Repository & Store for Australia, as Appendix to this paper. International waste repository proposal In May 2016 the South Australian Royal Commission into the Nuclear Fuel Cycle reported. A major recommendation was that a facility for the interim storage and subsequent disposal of international used nuclear fuel and intermediate-level waste should be established. It found that the state "has the necessary attributes and capabilities to develop a world-class waste disposal facility, and to do so safely." Interim above-ground storage for used fuel inside heavily engineered, purpose-built dry casks would be followed by deep geological disposal, the repository design based on that under construction at Olkiluoto in Finland at 400-450 metre depth. In the analysis, the geological disposal facility for used fuel is notionally co-located with an intermediate-level waste facility, where those packages are placed in medium-depth vaults of 50-250 metres. The report said that integrated facilities with capacity to store and dispose of used fuel would be viable. Based on a "cautious and conservative approach", from assessments of used fuel inventories and potential global interest the commission determined that such a facility could generate more than A$ 100 billion in income in excess of expenditure (including a reserve fund of A$ 32 billion for facility closure and ongoing monitoring) over the 120-year life of the project. The quantities assumed are about one-eighth of the used fuel (138,000 t) and intermediate-level wastes, commencing in year 11 with 3000 t/yr used fuel to interim storage. The World Nuclear Association said that the report had "fundamentally changed the nature of the global nuclear waste discourse", and a multinational waste facility based in South Australia would provide a welcome option for countries operating nuclear facilities today. It would be a “viable alternative" to national projects. Such a large multinational waste storage facility would be a world first and should offer advantages in terms of siting and economics when compared to smaller national approaches. A fuller account of the proposal is in the information paper on International Waste Disposal Concepts. Research & development, isotope production The High Flux Australian Reactor (HIFAR) operated at Lucas Heights near Sydney from 1958 to 2007, and was for many years the only operating nuclear reactor in Australia. It was used for materials research, to produce radioactive materials for medicine and industry and to irradiate silicon for the high performance computer industry. It was a 10 MW unit which had the highest level of availability of any research reactor in the world. It was at the heart of almost all the research activities of the Australian Nuclear Science and Technology Organisation (ANSTO) and supported those of several other organisations on the same site. In 2006 HIFAR was replaced by a new research reactor, known as OPAL (Open Pool Australian Light-water reactor), a modern 20 MW neutron source. It achieves over 300 operational days per year, in the top league of the world's 240 research reactors. OPAL uses low-enriched fuel and for Mo-99 production it irradiates low-enriched targets which are then processed to recover the Mo-99. In December 2016 the draft National Infrastructure Research Roadmap was released, setting out priorities for the decade ahead. Research infrastructure such as the OPAL reactor and the Australian Synchrotron in Melbourne are recognised in the document as "a category of research infrastructure that is of such scale that the national interest is best served by landmark facilities," which rely on government investment. In September 2012 ANSTO announced a A$ 168 million expansion of its Sydney facilities, principally for molybdenum-99 production, the source of technetium-99 which is widely used in nuclear medicine for diagnosis. Current world demand is about 45 million doses (23,000 six-day TBq/yr) per year, and the new plant will be capable of meeting about one-quarter of this from 2016 at a time when the main plants in Canada and Europe are set to close. The new plant will more fully utilise the OPAL reactor's capacity. The investment also covers building an industrial-scale plant for Synroc waste form to immobilise the intermediate-level wastes from Mo-99 production. ANSTO hopes that the Synroc technology “will become the benchmark for waste treatment in the production of Mo-99 radiopharmaceuticals." See further: Australian Research Reactors, as Appendix to this paper, and Synroc Wasteform appendix to the information paper on Treatment and Conditioning of Nuclear Wastes. General Sources: ABARE, DITR, ANSTO ERA & WMC/ BHP Billiton quarterly and Annual Reports OECD NEA & IAEA, 2006, Uranium 2005: Resources, Production and Demand Commonwealth of Australia 2006, Uranium Mining, Processing and Nuclear Energy – Opportunities for Australia?, Report to the Prime Minister by the Uranium Mining, Processing and Nuclear Energy Review Taskforce, December 2006 Alder, Keith, 1996, Australia's Uranium Opportunities, P.M.Alder, Sydney Hardy C. 1999, Atomic Rise and Fall – the AAEC 1953-87, Glen Haven Press Cawte A 1992, UNSW Press ANSTO media release Feb 2016 on Synroc A brief history of Australian uranium mining The existence of uranium deposits in Australia has been known since the 1890s. Some uranium ores were mined in the 1930s at Radium Hill and Mount Painter, South Australia, to recover minute amounts of radium for medical purposes. Some uranium was also recovered and used as a bright yellow pigment in glass and ceramics. Following requests from the British and United States governments, systematic exploration for uranium began in 1944. In 1948 the Commonwealth Government offered tax-free rewards for the discovery of uranium orebodies. As a result, uranium was discovered by prospectors at Rum Jungle in 1949, and in the South Alligator River region (1953) of the Northern Territory, then at Mary Kathleen (1954) and Westmoreland (1956) in north west Queensland. In 1952 a decision was taken to mine Rum Jungle, NT and it opened in 1954 as a Commonwealth Government enterprise. Radium Hill, SA was reopened in 1954 as a uranium mine. Mining began at Mary Kathleen, Qld in 1958 and in the South Alligator region, NT in 1959. Production at most mines ceased by 1964 and Rum Jungle closed in 1971, either when ore reserves were exhausted or contracts were filled. Sales of some 7730 tonnes of uranium from these operations were to supply material primarily intended for USA and UK weapons programs at that time. However much of it was used in civil power production. The development of nuclear power stimulated a second wave of exploration activity in the late 1960s. In the Northern Territory, Ranger was discovered in 1969, Nabarlek and Koongarra in 1970, and Jabiluka in 1971. New sales contracts (for electric power generation) were made by Mary Kathleen Uranium Ltd., Queensland Mines Ltd. (for Nabarlek), and Ranger Uranium Mines Pty. Ltd., in the years 1970-72. Successive governments (both Liberal Coalition and Labor) approved these, and Mary Kathleen began recommissioning its mine and mill in 1974. Consideration by the Commonwealth Government of additional sales contracts was deferred pending the findings of the Ranger Uranium Environmental Inquiry, and its decision in the light of these. Mary Kathleen recommenced production of uranium oxide in 1976, after the Commonwealth Government had taken up a 42% share of the company. The Commonwealth Government announced in 1977 that new uranium mining was to proceed, commencing with the Ranger project in the Northern Territory. In 1979 it decided to sell its interest in Ranger, and as a result Energy Resources of Australia Ltd was set up to own and operate the mine. The mine opened in 1981, producing 2800 t/yr of uranium, sold to utilities in several countries. Production over three years to mid 2002 averaged 3533 t/yr of uranium. In 1980, Queensland Mines opened Nabarlek in the same region of Northern Territory. The orebody was mined out in one dry season and the ore stockpiled for treatment from 1980. A total of 10,858 tonnes of uranium oxide were produced and sold to Japan, Finland and France, over 1981-88. The mine site is now rehabilitated. At the end of 1982 Mary Kathleen in Queensland had depleted its ore and finally closed down after 4802 tonnes of uranium oxide had been produced in its second phase of operation. This then became the site of Australia's first major rehabilitation project on a uranium mine site, which was completed at the end of 1985. A Rum Jungle Rehabilitation project also took place in the 1980s. Australian Labor Party (ALP) policy on uranium mining has varied over four decades. The 1971 Platform, on which the Whitlam Government was elected in 1972, committed the party to working towards the establishment of a domestic uranium enrichment and nuclear power sector. But after losing government in 1975, pressure grew in the Labor Party for a strong stance against uranium mining and export, as a counterpoint to Liberal Coalition policies to expedite uranium mining and export. An anti-nuclear movement gained strength and campaigned to end Australian uranium mining. The 1977 ALP National Conference adopted a new policy. Community concerns with the threat of nuclear war were to be allayed by ending uranium mining and ceasing Australia's contribution to the nuclear fuel cycle. The change committed a future Labor government to declare a moratorium on uranium mining and treatment and to repudiating any commitments to mining, processing or export made by a non-Labor government. The policy made a strong statement and was seen to provide moral leadership. By the time of the 1982 ALP National Conference, many in the Labor Party were troubled about how an incoming Labor Government would implement the party's moratorium policy. There was concern that the repudiation of contracts would raise issues of sovereign risk and would expose a Labor government to compensation liabilities. An amendment to the ALP Platform in 1982 sought a compromise between the positions of those who wanted to shut the industry down and those who felt that doing so was neither possible nor in the national interest. It committed Labor to a policy on uranium mining which was a classic political compromise, the core of which endured as Labor policy for 25 years. The policy was designed to prevent new uranium mines; limit Australia's uranium production with a view to the eventual phasing out of mining altogether; and provide moral leadership in ending the nuclear industry. However, in a concession to South Australia, it also said that a Labor government would "consider applications for the export of uranium mined incidentally to the mining of other minerals on a case by case basis". This was the Roxby Downs amendment, which would allow export of uranium from Olympic Dam - a major copper and uranium deposit. So the 1982 anti-uranium policy actually authorised the development of the world's largest uranium mine! In the 1983 federal election the ALP won office. The 1984 ALP National Conference then dropped the language of moratorium, repudiation of contracts and phase-out from the Platform. For the first time the three-mines-policy was delineated by naming Nabarlek, Ranger and Roxby Downs (Olympic Dam) as the only projects from which exports would be permitted. Provisional approvals for marketing from other prospective uranium mines were cancelled. The naming of specific mines was later deleted from the Labor Platform in the light of the fact that Nabarlek ceased production in 1988 and under a (conservative) Coalition government Beverley started up in 2000. The ALP policy then only allowed exports from existing mines and prevented the establishment of new ones. This endured as a "no new mines" policy through a change of government in 1996 until 2007, when it was abandoned as ineffective and likely to be electorally negative due to changed public opinion arising from global warming concerns. Opposition to uranium mining was then left to state ALP branches and governments. This continued in WA and Queensland until changes of government in 2008 and 2012 respectively. (NSW and Victoria have legislation banning uranium exploration and mining, which has not been repealed by conservative governments.) A fourth mine, Honeymoon, started up in South Australia in 2011. Adapted from Senator Chris Evans speech 23/3/07 to Labor Business Roundtable, Perth. During 1988 the Olympic Dam project commenced operations. This is a large underground mine at Roxby Downs, South Australia, producing copper, with uranium and gold as by-products. Annual production of uranium started at some 1300 tonnes, with sales to Sweden, UK, South Korea and Japan. After a A$ 1.9 billion expansion project, production increased to over 4000 tonnes uranium per year by mid 2001. In 2005 it was taken over by BHP Billiton. Beverley, the first Australian in situ leach (ISL) mine started up in 2001 and closed early in 2014. Another ISL mine, Honeymoon, came on line in 2011 and closed in 2013. Production from Four Mile started in 2014, using a satellite plant to capture the uranium from ISL and the Beverley plant for final product recovery. Beverley and Honeymoon may resume production with increased uranium prices. Both Ranger and Nabarlek mines are on aboriginal land in the Alligator Rivers region of the Northern Territory, close to the Kakadu National Park. In fact the Ranger and two other leases are surrounded by the National Park but were deliberately excluded from it when the park was established. Ranger is served by the township of Jabiru, constructed largely for that purpose. Nabarlek employees were based in Darwin and commuted by air. See also: Former Australian Uranium Mines Appendix. World Nuclear University Summer Institute Policy Responses to Climate Change
cc/2021-04/en_head_0031.json.gz/line2279
__label__wiki
0.500325
0.500325
scyther5 Other counties are taking part in this as well. On his Facebook page, Dutchess County Executive Marc Molinaro put out an announcement saying that flags in Dutchess County will be flown at half-staff on all county buildings and the county office building will be lit blue. This is to honor the fallen officer who was killed during the incident at the United States Capitol Building last week. Molinaro also mentioned that this is in coordination with Suffolk County. According to Suffolk County Executive Steven Bellone, he said, "Today I am directing flags to be flown at half-staff in honor of Officer Brian Sicknick, a 42-year-old member of the United States Capitol police who was killed in the line of duty at the hands of the mob rioters that stormed the United States Capitol earlier this week." "The actions came following National Law Enforcement Appreciation Day, in which local communities recognize our law enforcement officers throughout the nation who work tirelessly to protect and serve the residents of their communities." Molinaro did share this post on his facebook page for the county to see. Many local officials have expressed their feelings and outrage about what happened during this incident as well. Photos: Large Rewards Offered For People Who Entered US Capitol
cc/2021-04/en_head_0031.json.gz/line2280
__label__cc
0.687466
0.312534
Priests for Life Secures Religious Freedom Exemption from HHS Mandate in Federal Court By AFLC on December 22, 2012 in Blog On Thursday, AFLC Senior Counsel Robert Muise and David Yerushalmi presented oral argument in the United States District Court for the Eastern District of New York (Brooklyn) in support AFLC’s request that the court immediately halt the enforcement of the Obama administration’s “contraception” mandate. The very next day, the federal government entered into a stipulation that it would not enforce the HHS “contraception” mandate against AFLC’s client, Priests for Life – an international, Catholic, prolife organization – pending a revision in the rules that would protect religious liberty. The agreement came as a result of the court strongly urging the government to enter into the stipulation. If an agreement was not reached by December 21st, the court scheduled a hearing for December 26th, at which time it was evident that the court would order the injunction. Pursuant to the terms of the binding stipulation, the government agreed that it “will not take any enforcement action against [Priests for Life], its group health plans, or the group health insurance coverage provided in connection with such plans, for not covering in the health plans any contraceptive services required to be covered” by the HHS mandate. The court immediately endorsed the filed stipulation as to injunctive relief, which guarantees that Priests for Life will not be forced to comply with the mandate in 2013. The request for an injunction is part of AFLC’s federal lawsuit challenging the mandate on behalf of Priests for Life, which was filed jointly with California civil rights attorney Charles S. LiMandri.
cc/2021-04/en_head_0031.json.gz/line2283
__label__wiki
0.541676
0.541676
AFLC Defends Pro-Life Group in Copyright Lawsuit Filed by Michigan Abortion Clinic in California Federal Court Los Angeles, California (June 4, 2012) — Today, American Freedom Law Center (AFLC) Senior Counsel David Yerushalmi and Robert Muise will be in federal court in California, representing the California-based Center for Bio-Ethical Reform, Inc. (CBR), a pro-life organization that was sued for copyright infringement by Northland Family Planning Clinic, a Michigan-based abortion provider, because CBR used portions of a Northland video to create its own pro-life video. The CBR video parodies and criticizes the Northland video, which claims that abortion is “good” and that its abortion business is “sacred work.” The court will be hearing arguments on the cross-motions for summary judgment that were filed by the respective parties. At issue is whether CBR’s use of the Northland video was “fair use” and thus not a copyright violation as a matter of law. AFLC Senior Counsel David Yerushalmi commented, “CBR’s video powerfully and effectively exposes the lies and deception of the Northland video and thus provides socially-valuable criticism and commentary on an important subject. Indeed, if CBR’s use of the Northland video is not ‘fair use,’ then the fair use doctrine is a dead letter.” As the undisputed evidence in the case shows, CBR, through its executive director, Gregg Cunningham, made “fair use” of portions of the Northland video that the abortion clinic claims is copyrighted material. The “fair use” doctrine, however, is a complete defense to a claim of copyright infringement, and it was created in large part to protect the right to freedom of speech. Through the CBR video, Cunningham transformed the Northland video by adding graphic images of aborted fetuses to critical parts of the video, a jarring music score, a scripture citation to 2 Corinthians 11:13-14, which warns viewers that Satan masquerades as “an angel of light,” and an introduction quoting George Orwell, which condemns the use of lies to obscure murder, so as to criticize and parody the pro-abortion message conveyed by the Northland video. CBR’s video was made for nonprofit, non-commercial, educational purposes. CBR, an organization that exposes the lies about abortion better than any other pro-life group, accomplished that task in spades with its video. CBR’s video parodies and mocks both the deceptive message and the deceptive manner of Northland’s staffer who narrates the pro-abortion video. Northland’s consistent theme is the lie that abortion is “normal” and “good.” In fact, it describes its abortion business as “sacred work.” Every aspect of the Northland staffer’s attire, demeanor, syntax, and intonation is calculated to reinforce this deception. The same is true with the flowers on her desk, the soft background music, and the framed art on her walls. CBR’s video rebuts all this duplicity with an accusatory literary quote in its introduction, jarring music in its score, and graphic imagery in its stark video refutation. AFLC Senior Counsel Robert Muise concluded, “This case is yet another example of abortionists trying to hide the stark truth that they are engaged in the bloody business of killing babies for profit. CBR’s video effectively exposes their lies and deception, which is why the owner of the abortion clinic, Renee Chelian, hired one of the largest law firms in the country to try and shut down and silence CBR. Abortionists can’t stand it when you expose the reality and truth of their killing business, and AFLC is committed to defending CBR’s right to do so.”
cc/2021-04/en_head_0031.json.gz/line2284
__label__wiki
0.948039
0.948039
Democratic Republic of Congo: New report shows escalating abuse of human rights defenders 17 Feb 2010, 12:00am Amnesty International today (17 Feb) called on the government of the Democratic Republic of Congo (DRC) to protect human rights defenders, who continue to be arbitrarily detained by the county’s security agencies and subjected to death threats. In its new report "Human Rights Defenders under attack in the Democratic Republic of Congo", Amnesty documents the persecution faced by eight prominent human rights defenders, harassment which the organisation fears will intensify in the build-up to the 2011 presidential and national elections. Amnesty International’s DRC Researcher Andrew Philip said: “The government of the DRC must uphold the right to freedom of expression and ensure that Congolese rights defenders are protected from threats, arbitrary arrests and assault. Many are detained simply because they speak out on behalf of others. “These defenders play a crucial role in drawing attention to human rights abuses but intensifying harassment makes it increasingly difficult for them to carry out this important work.” Congolese human rights defenders have told Amnesty that harassment and arrests directed towards them have increased sharply in 2009. For example the head of the Katagana branch of DRC human rights organisation – Association Africaine de Defense des Droits de l’Homme’ (ASADHO) – called Golden Misabiko, was arrested by the National Intelligence Agency (ANR) in July 2009 after ASADHO published a report alleging that government security officials were involved in illegal mining of highly radioactive uranium and other minerals from the Shinkolobwe mine, in Katanga province. After being detained for almost a month, Mr Misabiko was convicted and sentenced to one year in prison with eight months' suspended after being found guilty of “publication of false information”. Robert Ilunga, a community advocate and head of another human rights organisation in Kinshasa, was arrested by the ANR and held incommunicado for nine days in September 2009 after the NGO publicly denounced harsh working conditions endured by workers at a gravel-making company. The ANR in particular, frequently arrests, detains and intimidates human rights workers in the DRC. Amnesty International receives regular reports of torture and other ill-treatment taking place in ANR detention facilities. Leaders of four human rights organisations based in the south-eastern city of Lubumbashi in Katanga province have received anonymous and increasingly sinister SMS messages since mid-September, when they led a local campaign in support of the then detained Golden Misabiko. One rights defender told Amnesty: “I don’t know how much longer I can bear the stress and mental suffering caused by these threats, but every day I resist the temptation to just return to normal life with my family, because I refuse to be intimidated into stopping my work.” One of the four human rights leaders who campaigned for the release of Mr Misabiko, Grégoire Mulamba, was abducted on 18 October 2009 on his way home from work. The taxi that was supposed to take him home suddenly diverted from the usual route and as Grégoire Mulamba challenged the driver, one of the passengers pushed a gun into his ribs and blindfolded him. Stopping after 20 minutes, Grégoire Mulamba feared he would be killed but was instead dumped in a cemetery on the outskirts of Lubumbashi. UN observers in the country have echoed the reports that attacks on human rights defenders have increased. A number of countries have expressed concern over the situation of human rights defenders in the DRC and made recommendations during the UN's Universal Periodic Review (UPR) of the DRC that took place in Geneva in December. The DRC has since indicated that it supports the UPR recommendations to “take further measures to protect the rights of human rights defenders…”; to “ensure that crimes and violations against human rights defenders and journalists are effectively investigated and prosecuted”, and to “adopt an effective legal framework for the protection of human rights activists in line with the Declaration on Human Rights Defenders”. Amnesty International urges the government to make these changes in law and practice promptly. Read the full report: 'Human rights defenders under attack' (PDF)
cc/2021-04/en_head_0031.json.gz/line2285
__label__wiki
0.593367
0.593367
Annamie Paul Join Us at our next event Canadian and Global Recognition of the Right to a Healthy Environment Guaranteed Liveable Income The COVID-19 crisis has exposed how many Canadians live in precarious conditions and still lack a basic safety net to protect them in times of financial difficulty. Over the past weeks, the Government of Canada has introduced the Canada Emergency Response Benefit (CERB), a taxable benefit of $2,000 a month for up to 4 months to eligible workers who have lost their income due to COVID-19. Throughout its rollout, however, the government has been unable or unwilling to ensure that CERB will cover all those that it was intended to protect, and the Canadian Centre for Policy Alternatives estimates that about one-third of Canadians are still left without access to either Employment Insurance (EI) or CERB. Many groups – contract workers, part-time workers, temporary foreign workers, students and seniors in need – don’t qualify for the program, or for EI, and the government has been left scrambling to plug holes, with a hodgepodge of fixes being announced almost daily. Given the virtually limitless number of different employment, unemployment and underemployment circumstances in which Canadians find themselves, it is unlikely that this piecemeal approach will ever succeed in providing comprehensive coverage. What we are left with is a confusing, ad hoc, case-by-case system that guarantees some Canadians will unnecessarily or unintentionally fall through the cracks. Instead of plugging holes one-by-one, the solution is to create a comprehensive benefit: Guaranteed Livable Income (GLI). GLI would provide every Canadian with a basic revenue source, ensuring that people can cover basic expenses such as food and accommodation. It would be available with few or no restrictions and be sufficient to protect Canadians from the types of financial catastrophes that many find themselves confronting during the COVID-19 pandemic. Given that GLI would be comprehensive, it will also be simpler and therefore less expensive to administrate (usually one of the greatest costs of social programs). While it would guarantee basic income security to all, Guaranteed Livable Income would offer the greatest security to the most vulnerable Canadians: precarious workers, the under-employed and the homeless. It would also help workers in the energy industry, a sector that is particularly vulnerable to market shocks. During the COVID-19 crisis, the concept of GLI has gained traction in other countries. Recently, Spain became the first European country to announce a plan to introduce a Universal Basic Income (UBI) to help families during the pandemic, with the intention that UBI become a permanent instrument that would serve as a safety net for the most vulnerable. The Scottish National Party and the Green Party UK have both called for the introduction of UBI in the United Kingdom. Italy, the Netherlands, Finland and Kenya have all trialed GLI models. The current focus must be on getting urgent financial relief into the hands of Canadians, which means extending CERB eligibility to cover all Canadians that are currently unemployed. In tandem, work should begin on investigating the various GLI models to determine what would work best in Canadian contexts, so that it can be in place before we confront our next emergency or structural upheaval. Like us to spread the word Donald Warner commented 2020-10-05 20:03:19 -0400 I support the concept of GLI, but the implementation matters. I would not support paying for GLI through increased debt. The red party has been way too liberal about spending money that doesn’t exist. We need to be serious about what Canadians need to give up to make GLI a reality. We also need to be serious about how much income is perceived as liveable. I’m also interested to understand how GLI would apply across regions with vastly different costs of living. Tracking cost of living indices would require a nightmare of bureaucracy as bad as what GLI is trying to avoid and introduce an easy way to cheat the system. Is it socially acceptable to apply a universal amount and let people relocate based on their individual personal and economic circumstances? Don McLeod commented 2020-09-09 10:21:10 -0400 Guaranteed Livable Income is meant for all Canadians. Already noted are social programs that it would replace. Cost savings, inefficiencies for delivery and inequities would be removed. The $100 billion price would be reduced by all the money being paid out now and associated costs. Living with dignity and taking Canadians out of poverty also has positive affects of reducing budgetary needs in many other areas. Mental health issues would be reduced. What a great way to help all Canadians! Matthew Casselman followed this page 2020-06-23 08:16:57 -0400 Carolyn Herbert commented 2020-06-08 12:30:20 -0400 Dan asked how this could be paid. I suggest that we point out the current cost of health and emergency services and policing costs and the cost of maintaining EI, GIS, OAS bureaucracy and how much would be saved by eliminating these with their entitlement barriers, as well as the provincial welfare programs. If all these were eliminated over reasonable time, and have the CRA adjusted to manage the monthly cheques in the same way that the child benefit is done, then it would only require provinces to increase social workers and supports for people with mental incapacity to manage this new income wisely. Mental health services are minimal now because provincial budgets are spent on the delivery of the shelter subsidies and disability/welfare programs. Dignity is lost in the bureaucracies. But we must be sure the GLI is a truly “living” amount, not just a complicated top-up to other poverty-maintaining program as now. Dan Favarger commented 2020-06-07 19:16:00 -0400 I love the concept of a GLI. It is the natural progression from job loss expected from robotics and AI. Properly administered, it could be the biggest boon to humanity since the industrial revolution. The downside is a GLI price tag starts around $100B. This is about 1/3 of our entire national budget. The big white elephant in the room needs to know what’s your plan to raise this additional money. Stay connected with the campaign! info@annamiepaul.ca 1-833-ANNAMIE © 2020. Authorized by the official agent of Annamie Paul
cc/2021-04/en_head_0031.json.gz/line2288
__label__wiki
0.866842
0.866842
Geraghty salutes 'brilliant' Jezki as Champion Hurdle hero retires ‘I had a great run on him over the years’ Sign up to Tote, get a £10 risk-free first bet. Barry Geraghty has paid tribute to Jezki after the 2014 Champion Hurdle winner was retired at the age of 11. Trained throughout his whole career by Jessica Harrington, he was always highly regarded after winning his first two bumpers. He appeared at five successive Cheltenham Festivals, finishing eighth and third behind Champagne Fever in the Champion Bumper and Supreme Novices’ Hurdle respectively on his first two visits. Jezki rounded off his novice season with a Grade One win at Punchestown – but it was the following season for which he will be remembered. He won the Hatton’s Grace before Hurricane Fly had his measure twice at Leopardstown, but at Cheltenham, on quicker ground, he beat My Tent Or Yours, in the same JP McManus silks, by a neck with Hurricane Fly only fourth. With Sir Anthony McCoy choosing My Tent Or Yours, Geraghty came in for the ride on Jezki in the Champion Hurdle. “He was brilliant, I had a great run on him over the years,” said Geraghty. “I won the big novice hurdle at Punchestown on him one year and then obviously the Champion Hurdle when he beat My Tent Or Yours. “He was around in a great age of two-mile hurdlers, like Hurricane Fly, Faugheen and My Tent. He was a brilliant horse. “He clashed with Hurricane Fly so many times. Jessie did a great job with him and he was a great second string for me to ride that year. “Even when he stepped up in trip he won an Aintree Hurdle, so it worked out well. “While he wasn’t quite what he was the last couple of years I won on him at Leopardstown (in March last year) and he was brilliant that day – he had such a great attitude and he was absolutely rapid over a hurdle.” Geraghty himself has been sidelined since breaking his leg in a fall at the Aintree Grand National meeting, but his return is imminent. “The leg is coming along well, I’ve been doing plenty of physio and I hope to start riding out next week,” he said. “I will hopefully be back for Listowel (in September), that’s the plan.”
cc/2021-04/en_head_0031.json.gz/line2290
__label__wiki
0.74856
0.74856
D.A.S. Supports Joe Cocker in Argentina Legendary English blues and rock artist Joe Cocker's latest tour to promote his album “Hard Knocks” has taken on worldwide dimensions, with concerts held across Europe in 2010 and 2011, culminating with a series of concerts in South America and the United States in 2012. D.A.S. Audio was on hand at Cocker’s concert in Rosario, Argentina, to provide quality sound at this much anticipated event. Professional sound company Marti Audio headed the sound set-up at Rosario’s sold out Salón Metropolitano. Company director Ariel Marti and his team of sound technicians utilized D.A.S. Aero Series 2 line array systems. The team from Marti Audio deployed 24 sets of large format D.A.S. Aero 50 line arrays, dividing these three-way systems into two linear set ups of 12 units each flown on either side of the stage. Eighteen high performance D.A.S. LX-218 subwoofers were used as back up for the low frequency band. Side fill was taken care of by nine self-powered Aero 12A line array systems, set up in two lateral groups of four units each, with the added boost of a D.A.S. Compact 218A subwoofer on each side. Eight D.A.S. Aero 12A line arrays were set up for front fill, and two LX-218 systems covered the drum fill. The crucial job of stage monitoring was handled by six of the recently launched D.A.S. Road series, specifically the Road 12A model, which covered the needs of Cocker and his band during the concert. Cocker and his band performed hits from his “Hard Knock” album as well as some of his classic songs at the concert, skipping from rock and soul to romantic ballads and rewarding his fans with a performance of the legendary hit “You Can Leave Your Hat On.” “We’re pleased with the way the sound turned out tonight," said Ariel Marti. "The artist and his musicians were very comfortable during the concert, and you could see how that was reflected in how much the audience enjoyed the music." Touchless Systems: Manufacturers Discuss AV's Latest Trend
cc/2021-04/en_head_0031.json.gz/line2291
__label__wiki
0.823333
0.823333
Grønkjær and Melchiot look ahead to the clash between Ajax and Chelsea Jochem 23 October 2019 23 October 2019 Today is the clash between Ajax and Chelsea. When the Champions League draw was finished, this was the match that everyone looks out for the most. Ajax as last year’s semi-finalist in the Champions League and Chelsea as the winner of the Europa League. A lot has changed since last season. Ajax lost the golden boys Frenkie de Jong to Barcelona and Mathijs de Ligt to Juventus and Chelsea said goodbye to their playmaker Eden Hazard. It will be a great test for both teams and a win means a big step towards the knock-out stage. Former Ajax and Chelsea players Jesper Grønkjær and Mario Melchiot were interviewed by Ajax Life ahead of the game between the Dutch side and Chelsea. The Danish winger will be present at both matches but is in doubt who he will be supporting. “I don’t have a favorite in this match. I will be supporting the team that plays the most attractive football”, said Grønkjær, who played with current Chelsea-manager Frank Lampard. “When I played at Chelsea, Lampard was a young talent. Although he wasn’t the best talent in the team, his work rate and willing to win was outstanding. Now he’s a manager he asks the same spirit from the players in his team. He wants to play attacking and dominant football.” When Ajax Life asks the Dane about the chances of Ajax, he begins about last year. “Last season, Ajax was relatively unknown in the Champions League and the big surprise. That will be different this season and that could be a disadvantage for them. Nonetheless, I give Ajax a good chance to win the game. They are good at pressing their opponents to their own half and most of the time they create a lot of chances”, thus Grønkjær. “It will be tough for Chelsea. I think they are going for a physical battle but will not park the bus. Chelsea has too many quality players for playing a system like that.” Tactical Melchiot For Mario Melchiot it is a hard choice as well if he has to choose between Ajax and Chelsea. “When I played for Ajax, I felt the love from the fans. I thought by myself, it can’t get better than this. Until I came to England”, said the wingback in Ajax Life. “When I played at the Johan Cruyff Arena I could hear my teammates coaching. In England, that was unthinkable due to the noise coming from the stands.” Melchiot has a tactical analysis when it comes to the coming match. “The new Chelsea-manager Frank Lampard doesn’t play typical English football. He wants to play differently. A system with high pressure and players who put a lot of energy in their game”, said the former defender, who sees a flaw in the system. “If the spaces between the lines become too big, Ajax can play its way out of the pressure football. I think that both teams are equal, but in the attacking style of play, Ajax is one step further than the London side.” There is one player that can be a key player for Ajax against Chelsea thinks Melchiot. “If Dusan Tadic drops himself and plays between the defense and midfield, Ajax can really hurt Chelsea. Where is the weakness of Chelsea? Exactly, in the center. So that would be the place where Ajax should strike.” Melchiot doesn’t want to choose sides when it comes to supporting one of the teams “I have a lot of good memories at both clubs. So why should I choose between these two wonderful clubs”, ended the right wingback. Tagged Ajax, Champions League, Chelsea, Grønkjær, Melchiot Expected line-ups Ajax- Chelsea Álvarez: ‘You shouldn’t want to be me, you’re you and special in your way’ Daley Blind misses last training due to illness Four players uncertain for Champions League clash Surprises in Ajax line-up: Álvarez starts, Brazilian wings Onana, Tadic and Gravenberch start Match preview Midtjylland – Ajax: a tactical analysis Expected line-up Ajax – Fortuna Sittard: Antony fit?
cc/2021-04/en_head_0031.json.gz/line2292