pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
98
1.02M
source
stringlengths
39
45
__label__cc
0.710313
0.289687
Posts Tagged ‘NL West D-Lowe poised for LA return as Braves finish off Pads… Categories: Braves and Lowe set to begin 4-game series against Los Angeles Tags: Atlanta Braves, Derek Lowe, Dodgers Stadium, Los Angeles Dodgers, NL West, Rookie of the Year, San Diego Padres, Tommy Hanson Braves pitcher Derek Lowe Atlanta Braves ace Derek Lowe is set to oppose his former mates on Thursday in Los Angeles as the Braves open a four-game set against the NL West leading Dodgers. Lowe spent the previous four seasons with the Dodgers before opting to sign with Atlanta as a free agent this past winter. He is currently 11-7 on the year with a 4.21 ERA for the Braves. In his last start in Atlanta, which was also against his former team, Lowe pitched six innings allowing three runs on five hits. In 66 career starts at Dodgers Stadium, Lowe is 33-23 with a 3.21 ERA. As Atlanta waits for the challenge of facing the mighty Dodgers, they can savor their series win against the Padres, which was capped with a 6-2 victory Wednesday afternoon. Rookie Tommy Hanson continued to make a strong case for Rookie of the Year honors with another solid outing in the Braves win. Hanson allowed two runs on five hits in six innings with five strikeouts. The 22-year old rookie improved to 6-2 on the year. The Braves hope to end their west coast swing on a high note by putting forth their best effort against the Dodgers. If Atlanta can win the series, their chances of playing October baseball become that much greater.
cc/2019-30/en_middle_0029.json.gz/line3692
__label__cc
0.659638
0.340362
Ana Batista Faculty of Medicine. University of Porto. Porto. Portugal. Luís Nogueira-Silva Department of Internal Medicine. Centro Hospitalar São João. Porto. Portugal. CINTESIS – Center for Health Technology and Services Research. Porto. Portugal. Serviço de Medicina Interna - CHSJ Rui Vaz Department of Neurosurgery. Centro Hospitalar São João. Porto. Portugal. Department of Clinical Neurosciences and Mental Health. Faculty of Medicine. University of Porto. Portugal. Serviço de Neurocirurgia do CHSJ Professor Catedrático da Faculdade de Medicina da Universidade do Porto Departamento de Neurociências Clínicas e Saúde Mental Joana Oliveira Home > Vol 29, No 1 (2016) > Batista Oncology Referral Concerning Paediatric Neurosurgery? Analysis of the Situation between 2008-2013 in the North of Portugal Ana Batista, Luís Nogueira-Silva, Rui Vaz, Joana Oliveira Introduction: Primary central nervous system tumours represent the second most frequent neoplasm and are the leading cause of death from solid tumours in children. Our study aimed to provide the most up-to-date epidemiological analysis of primary central nervous system tumours in children living in the north of Portugal and to explore a possible effect of the centralisation of care on outcomes. Material and Methods: This population-based study included all newly diagnosed and histologically confirmed primary central nervous system tumours in people below 18 years old, living in the north of Portugal, from January 2008 to December 2013. Data were collected through access to clinical files. We described children and tumour characteristics, and analysed patient: paediatric neurosurgeon and histological tumour type: paediatric neurosurgeon ratios. Results: A total of 147 cases was recorded. Mean age at diagnosis of primary central nervous system tumours was 8.0 ± 5.2 years. Astrocytomas were the most common histological type (34%). We found that World Health Organization Tumour Grade was the only variable of statistically significant influence in mortality (p = 0.001). 1-, 3- and 5-year survivals related to 2008-2013 period were statistically higher than 2005 - 2007. Astrocytomas have the highest survival rate, with statistically significant difference from other tumours (p = 0.015). We estimated a mean of 12.25 treated cases per year by each paediatric neurosurgeon at our institution. Discussion: Our results are globally consistent with those published all over the world, but we reported the highest survival rates. The number of cases treated per year by each neurosurgeon is accordant to the recommended. Conclusion: We showed an improvement when comparing to data previous to 2008 and better results than those from previous studies, namely higher survival at 1-, 3- and 5-years from the diagnosis, with low complication and relapsing rates. Therefore, the referral of primary central nervous system tumours cases to centres with larger experience can be invaluable for the achievement of the best outcomes. Central Nervous System Neoplasms/epidemiology; Central Nervous System Neoplasms/surgery; Child; Neurosurgery; Portugal; Referral and Consultation.
cc/2019-30/en_middle_0029.json.gz/line3693
__label__cc
0.524555
0.475445
South American Woes Both Venezuela (socialist worker's paradise) and Argentina (nationalist socialist paradise) have a problem with their foreign exchange reserves. In both cases it stems from trying to keep up the pretense that their currencies are worth more than they really are. The central banks of both countries are (and have been for some time) printing money like crazy, and inflation is galloping with gay abandon. Their governments publish misleading economic statistics, that inter alia attempt to hide the true extent of the monetary debasement – in short, their inflation statistics are even more bogus than those of other governments (we are leaving aside here that the mythical 'general price level' cannot really be measured anyway). Since they have maintained artificial exchange rates – coupled with capital controls, price controls and other coercive and self-defeating economic policies – people have of course felt it necessary to get their money out any way they can. This includes making use of every loophole that presents itself, so that e.g. in Venezuela, so-called 'dollar tourism' has developed, whereby citizens travel abroad for the express purpose of using their credit cards to withdraw the allowed limit in dollars at the official exchange rate (and buy some toilet paper while they have a chance to grab a few rolls). Now the governments of both Venezuela and Argentina have reacted – the former by introducing a 'second bolivar exchange rate' for certain types of exchanges, the latter by stopping to defend the peso's value in the markets by means of central bank interventions. Bloomberg reports on Venezuela: “Venezuelan bonds plunged to the lowest in more than two years after the government announced the latest partial devaluation of the bolivar, this time for airlines and foreign direct investment. Venezuelans traveling abroad, airlines and foreigners sending remittances home must use a secondary exchange rate determined at weekly auctions, Economy Vice President Rafael Ramirez said yesterday. The rate set at the latest auction was 11.36 bolivars per dollar, compared with the official rate of 6.3. Airlines operating in Venezuela fell and one carrier suspended flights. The partial devaluation comes as the government attempts to halt a hemorrhaging of dollars that has pushed international reserves to a 10-year low. The announcement came on the same day that the country’s largest private food producer, Empresas Polar SA, said it can’t import more raw materials because authorities are delaying the release of dollars. “The government has done too little and too late to reduce the currency distortions,” Alejandro Grisanti, economist at Barclays Plc said by telephone from New York yesterday. “This partial devaluation means more money printing by the central bank to finance the government.” Since taking office in April, President Nicolas Maduro has struggled to boost growth and rein in inflation in a country with the world’s biggest oil reserves. Consumer prices rose 56 percent last year even as government price regulators backed by troops forced more than 1,000 businesses to cut prices on everything from toys to electronics. The country’s international reserves fell to $20.5 billion this month from more than $28 billion a year ago. Without access to dollars at the official rate, many companies and individuals turn to the illegal black market, where the bolivar weakened from 74 to 79 per dollar after yesterday’s announcements, according to dolartoday.com, a website that tracks the exchange rate on the Colombian border.” Here are a few relevant charts showing the situation in Venezuela: The Venezuelan bolivar, official vs. black market rate (inverted) – we have drawn in the most recent plunge of the black market rate by hand – click to enlarge. We once said that Venezuela was a catastrophe waiting to happen, but over the past year or so it would be fair to state that the catastrophe is well underway. As incredible as that may sound, Maduro has actually managed to make things even worse after Chavez joined his ancestors in the eternal hunting grounds. Of course he merely continued where his former boss left off, with not the slightest attempt at reforming this ongoing massive economic failure. Not surprisingly, not even the workers like their worker's paradise anymore according to a recent Economist article. Venezuela's official inflation rate vs. its actual inflation rate (as calculated by Prof. S. H. Hanke) – click to enlarge. Here is what happened in Argentina: “Argentina devalued the peso the most in 12 years after the central bank scaled back its intervention in a bid to preserve international reserves that have fallen to a seven-year low. The peso has plunged 12.7 percent over the last two days to 7.8825 per dollar at 3:45 p.m. in Buenos Aires, after falling to as low as 8.2435, according to data compiled by Bloomberg. The decline in the peso marks a policy turn for Argentina, which had been selling dollars in the market to manage the foreign-exchange rate since abandoning a one-to-one peg with the U.S. dollar in 2002. President Cristina Fernandez de Kirchner, who said May 6 that the government wouldn’t devalue the peso, is struggling to hold onto dollar reserves which have fallen 31 percent to $29.4 billion amid annual inflation of more than 28 percent. Reserves are the government’s only source to pay foreign creditors. Since changing her economy minister, cabinet chief and the head of the central bank on Nov. 18, the peso has fallen 25 percent, the most in the world, according to data compiled by Bloomberg.” If memory serves, Argentina's 'official' inflation rate is reported to be somewhere around 10% and economists in the country who dare to say otherwise can expect to be fined up to $100,000 per utterance (even worse punishments have been mooted). It is quite funny to hear the government arguing that 'free markets' have been in charge – if only for a single trading day: “Cabinet Chief Jorge Capitanich told reporters earlier today the government isn’t intervening in the peso’s decline, allowing the market, which is mostly closed to buyers of dollars, to adjust prices. “It wasn’t a devaluation induced by the state,” Capitanich said. “For the lovers of free markets, supply and demand was expressed in the capital markets yesterday.” Since her re-election in 2011 when capital flight almost doubled to $21.5 billion, Fernandez has put into effect more than 30 measures to keep money from leaving the country. Her policies have included blocking most purchases of foreign currencies, taxing vacations abroad and online purchases, banning units of foreign companies from remitting dividends, and restricting imports. The controls cut the total amount traded last year in the local foreign-exchange market in half from 2010, according to data compiled by Argentina’s Mercado Abierto Electronico automated trading system. Banned from purchasing dollars for savings to protect against inflation, Argentines have turned to an illegal currency market, where the price per dollar soared to a record 12.75 per dollar, according to Buenos Aires-based newspaper Ambito. It is a glorious 'free market' with 30 different measures restricting the free flow of capital. This would perhaps be a good moment to remind Mr. Rogoff and other economists sharing his persuasions (many of which infest the IMF), that such measures always backfire and make the situation worse (we urge readers not to take the mainstream fairy tale of Iceland's 'success' at face value). A number of these luminaries have lately indicated that capital controls should be considered by the bankrupt governments of Europe as well. Governments everywhere rarely hesitate to impose regulations curtailing the economic freedom of their citizens if a big enough 'emergency' can be used as a pretext to justify their actions, but these always and everywhere are solely benefiting the ruling class and its immediate circle of cronies, but never the citizens whose liberties are taken away. We have unfortunately not been able to find a chart of the black market rate of the Argentine peso, but since it was never a 'fixed', but merely a heavily manipulated exchange rate, the charts of the hitherto manipulated market rate are also quite instructive: The Argentine peso vs. the dollar over the past 10 years. Ms. Kirchner and the people she chose to head the central bank have made a mess of the economy which is at least partly expressed in the peso's collapse (add about 5 pesos to arrive at the black market rate, i.e., the real rate) – click to enlarge. A close-up of the past three years shows the plunge of the past few days more clearly – it also shows that the decline previously took the shape of a 'managed' low-volatility devaluation. As soon as the central bank stopped intervening, it accelerated. The Argentine peso over the past year. In the past two trading days the collapse has accelerated markedly – click to enlarge. Turkey Joins the Fun “Turkish Intervention Fails to Stem Lira Sell-Off” as the WSJ informs us. Turkey has big problems on a number of fronts right now, from political scandals and growing unrest to a burgeoning current account deficit that has left foreign lenders exposed to the tune of $350 billion (see this recent article at Zerohedge for details. Here is a link to a chart showing the risk exposure disaggregated by type). The central bank has tried to intervene to slow the decline of the currency, but apparently the markets have decided to simply ignore its efforts. That is usually a sign that the 'crisis point' has arrived. “Turkey's central bank resorted Thursday to direct currency sales for the first time in two years to prop up the lira, but the currency kept on spiraling to record lows amid a broad-based investor exodus from emerging markets. Policy makers in Ankara started selling dollars in the European morning as the dollar jumped to 2.2973 against the lira, according to traders familiar with the transaction. The lira bounced back somewhat in response, but plunged again within hours. That drew in the central bank for a second time, traders said, but again the lira quickly sank, with the dollar soaring above 2.30 to the lira. In a one-sentence emailed statement after the first intervention, the central bank said it was taking this action because of "unhealthy price developments." A spokesman declined further comment and the policy makers haven't provided an update. "The central bank has wasted precious foreign-exchange reserves today on what was—and would always be in the absence of meaningful rate hikes—a futile intervention effort," said Peter Kinsella, senior foreign-currency strategist at Commerzbank in London. "The move higher shows no signs of stopping and unless we see aggressive countermeasures from the central bank, there could be a more aggressive run on the currency in the coming weeks." To be fair, quite a few emerging market currencies as well as the currencies of developed countries that are large commodity exporters have been under pressure for some time. The Indonesian rupiah has basically crashed, the South African Rand and the Brazilian real have fallen to their weakest levels since the 2008/9 crisis sell-off, and even the Canadian and Australian dollar look a bit frayed around the edges these days. We cannot help thinking that all this upheaval is the prelude to a more serious denouement down the road – perhaps sooner than most people currently think. Let us take a look at the Turkish lira and at Turkey's stock market. Interestingly, although the weak lira provides some support to stock prices, the stock market has also lost nearly one third of its value from last year's high. It is still trading at a fairly high level though, as there was a huge boom in Turkey in recent years (naturally, financed with lots of cheap credit). The Turkish lira over the past three years. Its plunge has accelerated since early 2013 – click to enlarge. Turkey's main stock market index has been under severe pressure since reaching an all time high in May of 2013 – click to enlarge. It should be pointed out that the foreign lenders with the biggest exposure to Turkey are actually Greek banks. We kid you not, the bailed-out remnants of the Greek banking system are right in the line of fire again. That's definitely one from the 'you couldn't make this up' department. It should also hasten the deployment of Super-Mario's 'QE-bazooka'. On Thursday, a number of stock markets, from Japan's Nikkei to the US stock market incidentally had quite a bad hair day. Although most press reports identified the fact that China's manufacturing PMI came in slightly lower than expected as the culprit, it seems to us that there is perhaps a more profound problem boiling under the up until recently tranquil surface. One of the sources of all this recent trouble is quite possibly Japan's decision to inflate with the help of a generous dose of 'QE' and deficit spending. Although the yen's anticipatory move lower could so far not really be justified by actual money supply growth, the fact remains that it did decline rather sharply. This in turn has put pressure on Japan's competitors in Asia, which in turn has put pressure on their suppliers in commodity-land and has altered capital flows, etc. Recall that the Asian crisis of the late 1990s was preceded by a devaluation in China, after which the yen started weakening rather precipitously as well. Of course the situation was different in that many of the countries hit by the crisis had their currencies pegged to the dollar at the time, but the point remains that a weakening yen preceded the event. A parallel is that there are once again quite a few countries that sport large current account deficits and have experienced major credit and asset booms. In short, there are many balloons waiting for a pin. Fist fight between parliamentarians of the ruling party and the opposition in Ankara – obviously, there is little harmony in Turkey at the moment. We're not sure who won the fight, but they all get points for enthusiasm. (Photo via news.cnwest.com / Author unknown) Charts by: MSN Money, Cato/S.H. Hanke, BigCharts 4 Responses to “Currency Massacre in Emerging Markets” jimmyjames: “The central bank has wasted precious foreign-exchange reserves today on what was—and would always be in the absence of meaningful rate hikes—a futile intervention effort,” said Peter Kinsella, senior foreign-currency strategist at Commerzbank in London. “The move higher shows no signs of stopping and unless we see aggressive countermeasures from the central bank, there could be a more aggressive run on the currency in the coming weeks.” The way these fools think… all of them- it’s funny they didn’t announce that they would sell their gold and then actually sell it- Jitters in the minor currency markets- who could have known- next it will be a major and then the next one- Gold is secretly unmasking the scam- forget about the price of it- No6: Central Banks!!!? Jonas: Hi Pater, Great article! You can find a chart of the black market Argentine peso (Dolar blue) on this site: http://dolarblue.net/historico/ Calculus: But it won’t be their fault will it? It will all be down the nasty foreigners AND of course the even more nasty speculators. Speculators are everyone’s boogeyman, when things go down that is. But a speculator as we all know is out to make money, he doesn’t really care whether it’s on the short or long side, a $ is profit is a $ in profit whether long or short. Therefore speculation can force markets HIGHER! But nobody ever says thanks to the speculator class if that happens, a la property or US stocks right now. Funny that… « Our Favorite Way to Build Long-Term Wealth The Truth About Bernanke’s Legacy »
cc/2019-30/en_middle_0029.json.gz/line3694
__label__cc
0.738611
0.261389
Become A Changemaker. Search for Articles: Search for Authors and Journalists Active Mental Health InitiativeIshaan Sachdeva, 05. January 2019In today’s society, we are focussing on complex solutions to the issues that our society faces everyday. One of the biggest challenges today is overcoming the mental health crisis in schools and universities in Canada. Research has shown that physical activity offers a simple solution to this global problem. This is the goal of Active mental health Initiative, a student run national organization in Canada. Read More A logically impossible process of learningValeriia Tsytsyk, 14. July 2018It is a commonly accepted fact that people use memory on a regular basis for memorizing and learning necessary information. In case of learning languages, Nick Bilbrough stated that “we need to go through three processes in order to remember language: encoding, storage and retrieval. During these processes, we make sense of the received data, linking it to already existing knowledge, storage of the information into long-term memory, which plays a significant role and use it in case of necessity”(Bilbrough 2011). Read More Antibiotic ResistanceAbdelrahman Elaraby, 22. June 2019Humans developed antimicrobial drugs to destroy diseases caused by microbes. The most common known antimicrobial is antibiotic which targets the bacteria. At the beginning of the 21st century the antimicrobial resistance has become very common, so we have to understand this phenomenon scientifically to prevent it from becoming a fatal disaster later. Read More Antibiotics their use,misuse and mode of actionSohaib Hassan, 29. August 2018Antibiotics are effective against bacteria because they work to kill bacteria by stop the growth and reproduction of different harmful bacteria but in certain cases useful bacteria may also effect.. Read More Anxiety in a NutshellValeriia Tsytsyk, 24. August 2018Since creation human beings have been given a whole set of emotions and feelings. Disregarding whether the feeling is bad or good has its own reason and design. In an article published by Barbara L. Fredrickson titled “The Role of Positive Emotions in Positive Psychology. The Broaden-and-Build Theory of Positive Emotions”, there is a report on detailed research into the roles and effects of positive emotions. Read More Are comma splices always wrong?Mohamed Emad, 17. February 2019Comma splices, one of the most frequent mistakes in English and a horrid sight to any English teacher out there. However, very few are aware that there are types of comma splices that are perfectly acceptable. Read More Best time to restart is when you are on boot mode.Omkareshwar Jha, 20. September 2018Booting the system our body is not in our hands. What we can do is to take advantage from it instead of being depressed. Well it's hard to say to feel good when you are not physically or mentally fit. But I can say that it's possible I was victim my self. Fell frequently ill in my childhood but it also gave me something new to explore either. Read More Bilingualism.Abdelrahman Elaraby, 22. February 2019"Brain power improves by brain use, just as our bodily strength grows with exercise" Simple words were said by a man thinking so logically that anything by continuous use will improve. Learning new languages is a good brain exercise that doesn’t only have tangible effects on one’s personality, but it also does wonders to the brain structure and the wiring among the neurons. Read More Blind Dolphin- The second most endangered freshwater dolphin...Bisma Shamsi, 13. February 2019The Indus River dolphin, locally known as “Bhulan” or the “Blind dolphin” is one among the South Asian River Dolphins and is one of the world's rarest animal that is the second most endangered freshwater dolphin species in the world. Read More Blood Donation and MisconceptionMd. Imroz Shahriar Shaik, 01. July 2019Voluntary blood donation is a great service. The great step of a blood donor can save a lot of dying life. The practice of donating blood came up as a great hand for patients of the world. But in our society there are some wrong concepts on blood donation. Removing the wrong concepts, as much the people will come forward that much the world will be benefitted. Read More Can you sit still?Omkareshwar Jha, 17. July 2018Sit still without doing anything. Try that with closed eyes and in alone. How much time you can still. Try to observe. Is that you or anyone else. Can you stop your own private world with closed eyes that most of the people suffering or just like a play they use to or allow the imagination to run a movie & emotional and mental trap. Read More Does the Soul Exist? Pranav Mohla, 08. July 2018Have you experienced the whisperings within your being? Unbiased, Unprejudiced, Unpreprocessed! To examine subtle connection that reflects the presence and mysterious activity of consciousness in the world that there will be structure in what should be random data, associated with major global events that engage our minds and hearts. Trying to change, social, national or global realities without working on human consciousness means there is no serious intention. Read More Education System Malak Majeedullah Khan, 22. October 2018Education is to learn the techniques to be applied in practical life rather than memorizing the formulae and long complex mathematical equations. The fault in today’s education system is that the student do work of computers as well as of a human. Hence affecting their educational carrier and grades. Read More Electronic health records: a diamond in qualitative primary ...Evbodaghe Omo-Imafidon, 24. June 2018Health records are the most important database of health treatment of the patient. Consistent recording by doctors, nurses and other staff is proof of proper monitoring of the health, planning and treatment. Initial health records were used to describe individual processes. Today, health records are a much broader concept than in the past because in the past, it was the doctors and nurses alone who recorded data. Read More Family planning and women empowermentRajesh Sharma, 12. June 2017Family planning refers to the factors that may be considered by a couple in a committed relationship and each individual, involved in deciding if and when to have children. Family planning involve consideration of the number of children a couple wish to have as well as the age at which they wish to have them. Read More Fundamental RethinkingNiroj Bhandari, 02. December 2017From the time we are born we are ascribed with certain ideas and identity regardless of whether they are true or not, logical or not... Read More Girl’s education needs SustainabilityFrancis Ametepey, 05. June 2017Being born as a girl into this world seems to be a curse. Women have and continue to suffer various degrees of injustices and inequalities spanning from cultural, social, economic, religious, and political matters. Read More Girls Education in Pakistan: Solutions for impedimentsZulfiqar Ali Ramzan, 30. January 2019Educating a child has always been the main issue in Pakistan. And to educate a girl in this country, the most difficult one. In Pakistan, education is given the least importance. And those who have access to it, get the benefits. Read More Humans Vs HumanoidsSiddiqa Magar , 03. December 2018Artificial intelligence is one of humankind’s truly revolutionary endeavours. As AI becomes more sophisticated and its ability to perform human tasks accelerates exponentially, we're finally seeing some attempts to wrestle with what that means, not just for business, but for humanity as a whole. Read More Illusion Of Knowledge Haamid Ali Shah, 16. June 2018"This superficial knowledge gives one an impression as if one knows all. But reality is that we rarely go deep, we rarely try to deliberate and use our brains to add to the existing set of information that we already possess." Read More International Astronomy and Astrophysics Competition 2019: P...Julia Berens, 09. February 2019The Qualification Round 2019 of the International Astronomy and Astrophysics Competition has opened! Use your skills and astronomy knowledge to win certificates, awards, and prizes. The IAAC gives you the unique opportunity to show your knowledge and astronomy skills! The IAAC is the biggest online astronomy competition for students from all countries. Win awards and cash prizes worth over 700 USD or become official IAAC ambassador in your country! Read More International Astronomy and Astrophysics Competition: Winner...Stefan Amberg, 23. June 2019The winners of the International Astronomy and Astrophysics Competition 2019 have been announced: The first three prizes of this year go to India, the Philippines and Bangladesh, however, several other outstanding students received awards and recognition. Read More International Youth Math ChallengeFabian Schneider, 22. September 2017The IYMC is the biggest online math competition for students from all countries. Every month we publish a new math challenge for you online. You can win awards for excellence and join the international IYMC network for outstanding students - take this unique opportunity and participate today! Read More International Youth Math Challenge: Winners of 2018Fabian Schneider, 30. December 2018The International Youth Math Challenge of 2018 was a great success with about two thousand participants from all around the world! The interesting math problems of the qualification, pre-final and final round have been challenging: Nine students have achieved awards for their outstanding performance and additionally, nine schools have received special awards! Read More Internet Governance in KenyaMaulline Gragau, 29. July 2018The term ‘Internet governance’ is used in international discourse to describe a wide variety of issues, which includes: Internet-specific technical issues, which are largely determined by Internet professionals working within Internet specialist fora (such as, at global level, ICANN, the IETF and W3C). Read More Interview: Unlike Nigeria, India celebrates academic excelle...Alfred Olufemi, 22. April 2019Emelife Chinelo Stella, who recently won 20 medals for her outstanding performance in the University of Mysore, India, spoke about the poor attitude of Nigerians to academic excellence in an exclusive interview with IYJ's Alfred Olufemi. Read More Is time travel possible?Tajdar Adil Ali, 27. November 2018The world is mostly dependent on time ,and every action is done or rejected in accordance with time.Resembling this the main thing concerned with it ,that is being focused is all possibility of Time travel. Is time travel possible? Read More Lie of 24 hours in a day!!Omkareshwar Jha, 02. January 2019We all don't have 24 hours. It's a great myth. We all have two clocks out of which one is mechanical and the other one is biological. And that's what makes it different. Read More Maximizing the human abilities.Omkareshwar Jha, 04. September 2018It all starts with our birth. When we born by the time we learn emotions, to crawl, to observe, expressions, demands, requirements of survival is inbuilt in our system or dna from very moment we got birth. Then one day comes and crawling baby tries to stand on feet may fall many times but efforts to stand makes enough courage & strength and we walk. Read More Nigeria's First National Conference on Adolescent Health: Im...Victor Oyelade, 24. May 2019History was made, in April, 2019, specifically 11th to 13th - Nigeria had her first national conference on adolescent health, courtesy of the Society for Adolescents and Young People`s Health in Nigeria. This in no doubts has set up a new rhythm for adolescent health and development in Nigeria which hitherto had yet to receive the attention that it deserved from stakeholders in Nigeria. Indeed, we can now say we are on the road to progress. Read More Plant Breeding And Food SecurityKushal Naharki, 17. September 2017With the increasing food and nutrient insecurity, plant breeding has a major role to provide security by forming high yielding and environmental suitable varieties. Read More "Medical Laboratory Science" and "Science Lab...Meshach Idoko, 23. June 2018Over the years, the course "Medical Laboratory Science" and "Science Laboratory Technology" are two different courses studied in higher institutions of Nigeria that Students are still confused about. Many Nigerian Students do not know the difference between this two courses. This write-up aims to educate undergraduate about the differences between the courses. Read More "Simple Common Sense" is lacking in today's scienc...Omkareshwar Jha, 25. November 2018Well a big trouble right, simple Common sense is lacking in most of our organizing bodies. The basis of hungry thrust and survival instincts forces us to hunt and the same we are doing right now. Read More Rise and Fall of BitcoinEsimaje Michael Onoseme, 29. September 2018Although the popularity of bitcoin has grown over the eight years it has been in existence, still, there are a lot of misunderstanding about what it really is and how it is transacted. This lack of knowledge has led to some people relating it to Ponzi and Pyramid schemes, while others regard it as a mysterious currency for a secret society. Read More Role of women in agriculture and its allied fieldsNisha Meena, 28. June 2018Women are the backbone of the development of rural and national economies. They comprise 43% of the world’s agricultural labor force, which rises to 70% in some countries.In Africa, 80% of the agricultural production comes from small farmers, who are mostly rural women. Women comprise the largest percentage of the workforce in the agricultural sector, but do not have access and control over all land and productive resources. Read More Scientific temperament in IndiaSurender Ponnalagar, 09. August 2017In the youngest Scientific temperament & Scientific thinking of young people Read More Seismic MethodsJoshua Oyeshola O., 17. September 2018Seismic methods are the most commonly conducted geophysical surveys for engineering investigations. Seismic refraction provides engineers and geologists with the most basic of geologic data via simple procedures with common equipment. Read More Simple Positive PsychologyAyesha Shaikh, 29. June 2018Some people worry too much leading them to think a lot, and in some way, these are the ingredients of stress and sadness. Let the things settle down. Whatever happens, try to find a path to your inner peace. What’s life? Read More Speciation Of Soluble Titanium And Vanadium In Agricultural ...Meshach Idoko, 28. June 2018This work was carried out to check the concentrations of Titanium (Ti) and Vanadium (V) metals in agricultural drainage water and aqueous soil sediment extracts from Tony farms limited Koton-karfe Local Government Area, Kogi State. The average concentrations of Ti and V were 19.88µg/g and 12.99µg/g respectively in the aqueous soil sediment extracts and 25.98ppm and 25.25ppm respectively in the agricultural drainage water. This result showed that the drainage water and soil sediment of this area is heavily polluted. Read More Students: Brought Nearer to the Industry Abednego Ishaya, 13. August 2018Being a student, one tends to imagine how the work force will be for him or her, when the person finally comes towards the climax of completing his or her studies. Though, programs such as the student’s Industrial Training (IT) have been put in place, there lies the need for other avenues where the industry can be brought nearer to the students. This is evident in the various Workshops, Conferences etc, that are been organize by various professional bodies, for student’s engagement with the industry. Read More Technologies changed our lives Hamid Ali Shah , 19. July 2018 Science and technology dares us to dream the impossible to make possible. Every human being aspires for serenity. If serenity is the end then the technology is the mean through which one can achieve the ultimate goal. Technology gives us the courage to venture into unknowns, and challenges us to be determined when we are doubtful. Read More The analysis of Boeing 737 MAX 8 crashDickson Eyinmosan Jnr, 18. March 2019Lost in space, the 737 Max 8 Jet took a nose dive as Capt. Yared tried gallantly to savor the flight control situation. It was at this time the Ethiopian Airline 302 disappeared away from control radar as all communication channels were apparently lost. Sadly, at exactly, 01:44 ET approximately 08:44 am local time, the brand newly acquired aircraft came crashing down near the town of Bisshoftu 60 km (37 miles) south east of the capital killing all 157 on board airliner. Read More The Argument on Which of the Engineering Fields is the Best....Abednego Ishaya, 08. July 2019The field of engineering has been described as of that where the knowledge of mathematics and sciences, gained by study, experience and practice is or are been applied, with key judgment bend on developing ways towards an economical usage of materials and natural forces, for the benefit of mankind. Read More The Beauty of MathFabian Schneider, 15. August 2017Mathematics is beautiful: From equations that express hidden relations to highly elegant proves! By combining algorithms and mathematical principles it is possible to generate images that impress through their stunning colors, shapes, and patterns, as well as the deep underlining mathematical secrets they reveal. Read More The Bottlenecks of Telecommunications in Nigeria - The Call ...Esimaje Michael Onoseme, 23. December 2018The Far Cry for change in Internet sustainability has gone beyond words in Nigeria, Individuals and Companies are loosing data and money due to the scourge of Telecommunication inadequacies. Read More The effects of data collection in improving SMEs and Busines...Chukwuemeka Benedict Osondu, 20. September 2018Issues of competitive advantage falls within the context of applying information and improving information. The use of data collection can not be underestimated. We need data and this helps us to evaluate our innovations, recreating and improve our businesses. SMEs has about 80% of our business community in Nigeria aside the unreachable parastatal. Read More The fate of the Universe: Today and TomorrowSantosh Bhandari, 08. January 2018Universe, a term most of all signifying the sense of unify or a whole, has always been predicted as a vast space with no beginning and no end. A structural frame of an atom may represent a galaxy which in fact may be demonstrated as such electrons making their way around a mass of protons. Read More The Impact of Technological Change on Labor Market in Develo...Simona Kovachevska, 08. July 2018The technological advancements and inventions change not only the work processes, but the everyday life too. Because of the increased access to education and opportunities, developed countries are more likely to use modern technology. Those countries can easily adjust the labor market and the whole economy to the changes. On the other hand, developing countries find some difficulties in the process of implementing modern technologies. Read More The One Thing That We Should DoMuhammad Attique Shah, 23. June 2018Youth in Pakistan has an underestimated unending power and courage to move ahead and stand out among very few handpicked unique characters in the world, but because of having less or no dreams they are seen facing a stagnant growth in their personality, social circle, or any other aspect you count. So, this article aims to solve the issue and is intended to attract attention of the world. Read More The Role of Cooperation in the World of Solitary GeniusesValeriia Tsytsyk , Zulfiqar Ali Ramzan, 06. July 2018In order to understand the link for cooperation among different people and issues in it, it is necessary to know what the reasons are. Is it due to social interaction a society has with the individual, or by a person's himself? What are the causes of possible problems in cooperation process and what effects do they have? Read More The state of Non-Communcicable Diseases in The GambiaZermen Bojang, 02. November 2017A healthy society is an inevitable asset for any country's political, socio-cultural and economic development. More specific is the need to put non communicable diseases at the center of National Health Policies. The Gambia does not have strong policy guideline and framework to effectively tackle the NCDs as much attention and resources are channeled to reducing infectious diseases such as HIV/AIDS, Malaria and TB. Consequently, there is a growing number of annual NCD-related deaths due to poor health systems, lack of awareness and little budgets for interventions areas.Crippled by low funding from International agencies, there is need for the government in consultation with all stakeholders to explore quality, cost-effective and sustainable policies and programs that is geared towards preventing and controlling high incidence and death rates on NCDs in the country. Read More The Virtual Hygge Generation: One Pixelated World to be inFrancine Beatriz Pradez, 24. July 2018How often are you using your social media accounts? Have you ever experienced seeing unsavory posts or news online? How do you respond to it? All these questions and more are mind-boggling rhetorics that we often flip and twist inside our minds hoping to understand what the role of the digital world is in real life. Are we simply users of technology or being used by technology? Read More Time and SpaceChaima Baztami, 19. June 2017150 million kilometers is the distance between our Earth and the Sun; 8 minutes is the time needed for sunlight to reach us. The Sun is among the closest stars to our “obscure grain of sand called earth” (Giacomo Leopardi) and every time we observe its light, we are looking at how it was in the near past of 8 minutes ago. Read More Top 5 Global Youth Science Entrepreneurs 2017Lilli Nguyen Phirun, 24. August 2017The world faces a tremendous amount of issues that have to be solved. Although it seems as if the educational level and the scientific understanding of the general public decreases more, we observe a hand full of inspiring youths that use their scientific knowledge to achieve great successes. Read More Towards the improvement of science in KenyaMaulline Gragau, 10. November 2018At the basic level, we all envisage a transformation from a backward, superstition-ridden to a progressive society using science and technology as instruments of social change. After 55 years, one expects tremendous physical growth in the scientific community in Kenya. However, in the spheres of social behaviour, scientific attitude is at a discount. In the case of national commitment to the development of science and technology, it is a paradoxical situation. Read More Uplifting Nepal's rural smallholders farmersSantosh Bhandari, 19. November 2017Nepal’s skewed land distribution has always been an unavoidable obstacle for infrastructural gain up in the lands of mid-hills. Besides, government seems unable to address the people of rural communities for participatory appraisals. Mid hills of Nepal owes above half the physical land however, agri-able land is pathetically and unstoundingly low. This conditions have led to subtantial increment in problems over rural smallholders in Nepal. Read More Using Innovation to transform Sierra LeoneJeremiah Thoronka, 27. August 2017Sierra Leone has been known for their civil war, Ebola out break,corruption and more recently the mod slide that climb hundreds of life.But their is much more to be happy about, young boys are engaged in innovative works that aims in transforming their citizens life. The world was like wow! When Kelvin Doe built his own radio station using garbage materials to do so. Now their are others who are aiming to do more than he has done. Read More U.S. Transportation Department Probes FAA's Certification of...Maulline Gragau, 29. March 2019New reporting claims that engineers involved in evaluations of the plane -- a Boeing 737 Max 8 -- knew there were flaws in the original report used to certify the model before it was approved to fly. Following the Indonesian Lion Air Flight 610 air crash in October 2018 that killed 189 people, the U.S. Transportation Department launched an inquiry into the Boeing 737 MAX. Read More Wanna Cry? How simple hacking in today's time truly isFabian Schneider, 18. May 2017Hospitals out of service! Companies losing millions! Memories of people destroyed! - The world was under attack in the middle of May 2017. "WannaCry"? That's not a question, but the name of the "virus" that infected millions of computers in over 150 countries. Read More What is text neck?Anand Vaghasiya, 26. January 2019Text neck is a Modern term describing repeated stress injury and pain in the neck resulting from excessive watching or texting on handheld devices like Mobile, tablet, Gaming Consoles over a sustained period of time. Nowadays Children and younger people are more prone to this phenomenon, because of excessive use of handheld Mobile Phones and other equipment in the wrong Posture. It is also often known as Turtle Neck posture. Read More Who controls your inner mechanism?Valeriia Tsytsyk, 13. July 2018Have you ever wondered about the uniqueness of the world? What is that tiny part of each human being that makes more than 7 billion different? What makes us fall in love, hate, change our inner world, simultaneously changing the world around? Eventually, what is that force that pushes us to ask such questions? Read More 1948Rohit Puri, 03. October 2018Should Sexual education be taught in public schools? Don't you think that Sex is like a game? When two beings play ,they lose their energy and get pleasure as they get from other physical games. Read More 21st century feminism: an unnecessary and evil misleading co...Kawthar Salahudeen, 07. June 2018Since time immemorial, before man took his fellow men to attest to the social contract theory, life for them was brutish, nasty and short. Today, the actions and words of men has left the world in chaos and aghast.This expository write up provides us with an insight of the dangers posed by feminism. This article is to further broaden our horizon and cure our myopic vision and showcase how responsible women are to the society.Again, this article is not aimed at corrupting the views of others who have contrary opinion but to reveal to us where the women movement should be directed in exchange for radicalism, lousiness and bossiness accrued to the 21st century feminism. Read More A Broken WillJeniya Jufi, 15. April 2019Since the adoption of the WESA and the discretion this legislation has given courts to cure deficiencies in a Will, there has been a rise in challenges to Wills by people trying to validate documents as Wills. Read More Agenda 2063 and The Africa We WantMaulline Gragau, 11. July 2019“The window of opportunity to harness the demographic dividend is time bound and requires immediate investments,” - Dr Babatunde Osotimehin, Former UNFPA Executive Director. For a long time, Africa has been described as a poor colonised region. However, since colonisation, a lot has changed. Read More Agriculture: a major source of pollutionSamita Paudel, 17. September 2017The history of human civilization started with development in Agriculture. Agriculture provides food, raw materials and employment opportunities to very large percentage of population. No matter, how much we get sophisticated, we can’t ignore the importance of agriculture. Read More Agriculture in our livesJubilee Floren, 30. January 2019"once in our lives we need a doctor, once in our lives we need a lawyer, but everyday in our lives we need a farmer" Read More Agrobiodiversity and climate changeSantosh Bhandari, 08. October 2018'There's one issue that will define the contours of this century more dramatically than any other, and that is the urgent threat of a changing climate.' Apart from the bulk of fussy words, this quotation by the former president Mr.Barack Obama depicts the current issues and impacts of climate change. Read More Agroforestry in Nepal: Farming with Resilience and Multi-out...Sachin Gahatraj, 17. October 2017It's essential to focus on Agro-forestry system (AFS) instead of focusing on intensive modern Agriculture and Forestry separately in order to achieve sustainable food production, forest products harvesting and sustainable socio-economic well being of small farmers in Nepal and developing countries. Read More An African Boy’s DreamsNana Kwaku M Asamoah, 14. June 2019As a devoted young African, with an insatiable desire and perpetual drive for the prosperity of the African people, I regularly dream about our status in the world and our common destiny as one people. Read More Analysis: Despite reduction in admission quota, OAU unable t...Samad Uthman, 20. May 2019In the past four years, the Obafemi Awolowo University admission capacity has been a piece of discourse. observations over the years with the yearly rise in the number of matriculated have shown that the institution is admitting more than the available infrastructures interms of lecture theatres and hostels. This report chronicles into the effect of the increasing admission figures over the years, the effect of the new accommodation policy and the sudden fall in the number of admitted students during the just concluded matriculation ceremony. Read More ASUU STRIKE: OAU students risk “carryover” as in...Alfred Olufemi, 13. February 2019With the indefinite postponement of some examinations in a Nigerian university, Obafemi Awolowo University, Alfred Olufemi can evidently report that some students will have to carry over some courses to the next session because of the ideological disagreement between lecturers. Read More Bisaya I amFebeto Potutan Jr., 25. August 2018When a dialect is spoken by many, it'll eventually become a language as Bisaya in the Philippines. Read More Business as unusual for Sustainable developmentHenry Kazula, 05. June 2017Our planet Earth is facing number of unprecedented environmental challengesscientifically diagnosed as “global sickness” resulted from environmental degradation grounded from human activities for self-interest to profit-making in business etting. Tanzania, among the other developing countries, is at higher risks of facing the negative impacts from various forms of environmental degradation as it makes every effort to alleviate poverty, as is a close relationship between the latter and environmental degradation. Read More Capital Flight: An Impact of Corruption and Political Instab...Muhammad Basorudin, 24. May 2018The phenomenon of capital flight has become a trending topic in almost every country in the world. This issue became popular especially among developing countries after two biggest financial scandals, Panama Papers and Paradise Papers. Read More Childhood cancerSundeela Syeda, 10. March 2019Asma was worried about Ali, as usual today he has gotten up with headache and is feeling nausea.Asma and Asif are witnessing this worsening condition of Ali from last 5 days now. She asked Asif to take an appointment from the doctor. Read More Climate change and its impact on Nepalese AgricultureKushal Naharki, 27. August 2017Climate change being one of the issue of global concern has intense role in agriculture of Nepal. Read More Climate Change An Undeniable RealityKunal Bansal Chandigarh, 14. June 2019Seas are becoming warmer, and sea levels are increasing. More prolonged and more severe droughts endanger crops, wildlife, and freshwater supplies. From Marine turtles off the coast of Africa to polar bears in the Arctic, because of changing climate, the diversity of life in our planet is in danger. Read More Climate Change Awareness CamapignKushal Naharki, 02. December 2017With Nepal facing huge impacts of Climate Change already and more likely to further increase in future, it is necessary to aware people about the causes, impacts and measures to adapt and mitigate it. Read More Concretization is a big disasterOmkareshwar Jha, 26. September 2018We can make such storage tanks that are made of concrete without a small leak of water from it. Also in prospect of underground water level and flood are a big matter of concern & we are somehow lacking to understand why this is happening a big picture might have more than one parameter. But atleast I wanna share one big parameter of our development is making roads but it becomes disaster without knowing proper science & management. Read More Dada: A community buried in its own deathAbiodun Jamiu Sulaiman, 26. November 2018One could begin with the flies, smells of rotten food, remains of emptied bowel or a community hounded by questions of abandonment. Like the hustle and bustle of Lagos tripartite statue , its mightiness welcomes strangers and bid farewell to residents; its overpowering stenches of treachery debar the community from unraveling her potentials. Such is the plight of people living in the rural part of Nigeria where open spaces receive the blessings of the bowel, and culinary waste find solace in the open field at the backyard Read More Despite being outlawed, Female Genital Mutilation Secretly P...Alfred Olufemi, 01. May 2019Female Genital Mutilation (FGM) includes all procedures involving the partial or total removal of the external female genitalia for cultural and or non-medical reasons. Although prohibited by the law, the act is secretly practiced in Oyo state, a recent report revealed. Read More Develop effective environmental education, Stay below 1.5 de...Maulline Gragau, 04. June 2018On 1st March 2018, Kenyans woke to the bold headline “Heatwave a sign of bad things to come” carried by the Daily Nation. The story brought to the fore the devastating effects of climate change and cast a grim future unless every person learns to appreciate and embrace environmental conservation. While Kenya is not a direct contributor to global warming, the effects of climate change which are bound to worsen calls for concerted efforts from all sectors in the country because it concerns each aspect of the economy. The starting point should be listening and learning from the people expected to conserve the environment because we don't have the financial muscle to fund the cleaning up of polluted air, water and soils and litigation and medical costs. Read More Digital Entrepreneurship TodayEsimaje Michael Onoseme, 01. October 2018Digital Entrepreneurship is the way to go at the moment. A Properly Developed Digital Entrepreneur can survive the Harsh Scotching Effect of Job Insecurity Across Africa. Read More Dismissal, suspension of lecturers causes uproar in Nigerian...Alfred Olufemi, 14. March 2019The disciplinary action resorted to by the management of the Federal University of Oye, Ekiti state against allegedly ‘erring’ staffers has generated an uproar among members of the university community in recent times. Read More Does Facebook or other forms of social media create isolatio...Rohit Puri, 13. April 2019“Facebook lets people connected meet new friends, yet some argue people spend so much time on social media that they lose contact with real life and may even become addicted.” Read More Empowering Children For Better FutureKushal Naharki, 14. October 2017Youth Innovation Network conducted an "One day motivational program and stationary distribution" to empower better future for children. Read More Empowering Youth to Protect Mother EarthVivek Modi, 12. July 2017Raise For Sustainability is an initiative of a team of young change makers that works diligently to enable youth to comprehend the importance of the environment and environmental sustainability, makes concerted efforts to conserve it and tries to make the world a better place to live in. Read More Environmental Benefits of a Roof GardenNisha Meena, 29. June 2018A roof garden is any type of vegetation established on the roof of a building. Apart from the decorative benefit, roof garden serves the purpose of providing architectural enhancement, temperature control, recreational opportunities, habitats for wildlife and food. Read More Environmental Pollution: Crisis for EarthNisha Meena, 27. May 2018Environmental pollution has existed for centuries but only started to be significant following the industrial revolution in the 19th century. Pollution occurs when the natural environment cannot destroy an element without creating harm or damage to itself. Read More Ethiopian Government Approach to Afar pastoralism: Between T...Jemal Muhamed Adem, 16. March 2019The recent global trend has witnessed an increasing vulnerability of the local communal ways of life and their resources with the expansion of state projects into previously inaccessible areas. As states hand stretched to these areas a new dynamics of relation between the local community and state emerged. While the state’s justification for its present in the area is mostly lay on developmental activities, the local community’s right to use resources ultimately threatened by the state. Read More Examining the Environmental Laws in Africa: Nigeria as a Cas...Tochukwu Benedict Ezeifekwuaba, 28. November 2018Environmental Degradation has consistently resulted to undesired obstacles for economic and health development in Nigeria. Some of these challenges entail pollution, deforestation, improper pesticides and Global Warming. Despite the Environmental laws aimed at minimizing these challenges, the condition in Nigeria tends to degenerate as a result of the fact that these laws are not enforced effectively. Read More Female child education: a wastage resourcesYasir Ibrahim, 14. February 2019In our society today, it is believed that a male child will eventually be the head of the family. Therefore, educating the female child is not really compulsory and prevailing to that of the male child. Why is female child education a waste of resources. Read More Finding local solutions to the global problems in Climate Ch...Zulfiqar Ali Ramzan, 01. July 2018Climate change is happening and it is going to change adversely in the coming years. And one has to find the best possible solution for this. But it cannot happen, if one person or an entity is held responsible. Read More Forests: To Tackle Climate ChangeAnjila Lamichhane, 09. August 2017Planet for today and tomorrow. Lets' save it for the future generation. Read More Ghanaian Youth Advocate represent Young Reporters for the En...Francis Ametepey, 10. June 2018 Achieving these ambitious Goals(SDGs) requires a profound transformation in the way we live, think and act. The role of Education in achieving all of the 17 SDGs cannot be ever emphasized. Read More Gift A TreeKushal Naharki, 19. November 2017Celebrate "Green Birthday" by gifting a tree on your beloved person birthday and lets fight together against global environmental issues locally. Read More Global Climate Change Impacts on EarthNisha Meena, 10. July 2018The global climate is changing: the impacts associated with the accumulation of greenhouse gases in the atmosphere from human activities–changes in mean temperature, shifts in seasons and an increasing intensity of extreme weather events–are already occurring and will worsen in the future. Millions of people, particularly those in developing countries, face shortages of water and food and greater risks to health. Adaptation measures that reduce vulnerability to climate change are critical, especially in many countries where the risks are here and now. Read More Go to the woods it will teach you more than booksNithin Valsamma Rajan, 24. June 2018Every day can be a working day to learn from nature. Nature is a store house of wisdom and the lessons she teaches us are powerful. Great philosophers in the world have been students of, learning from nature. The style of learning is by observation and the process can be really interesting. Read More Harsh Realty Highly Neglected - Child Abuse in AfghanistanAbdullah Abed, 01. July 2019Me and my generation who were born in 1980s, then as children and now as young men/women can’t recall but war, bloodshed, hardship, immigration and plenty of the miseries still Afghan struggling with. As war's nature applies no exception in harming to people from any walk of the life but children pay much higher price than any layer of community. Read More Holliston Health Agent in Hot Water AgainHksolution Sol, 15. August 2018The Massachusetts Attorney General has been asked to investigate the Town of Holliston after receiving numerous complaints against a town employee. Reports indicate that on multiple occasions, Holliston Health Agent, Scott Moles, entered residents’ property and illegally seized personal items. According to sources, Moles told any resident who resisted to “get a lawyer”. Read More How far-reaching drought forges lives in Afghanistan Abdullah Abed, 14. January 2019While Afghanistan continues hitting the headlines for its decades long lasted armed conflicts, the misery has recently coupled with a severe drought harshly taking toll on people who are already known to the hell of loss. To picture the scale of the mishap, official entities, term the ongoing drought in Afghanistan unprecedented since 1971. Sake of severe lack of rain and snowfall in recent years, 20 out of the all 34 provinces, where roughly 15 million people depend on farming have been struggling with exceedingly strict drought. Read More How people's health, businesses suffer from abandoned projec...Alfred Olufemi, 09. April 2019The uncompleted road project in idi-Ape- Iwo road area of Ibadan, Oyo state capital, had so much endangered lives of residents, passersby and motorists. Alfred Olufemi chronicles in to the health and business effect of the neglected project on the people. Read More How To Deal With Rejection A Little Better?Mohit Bansal Chandigarh, 10. March 2019Rejection can be hard and it is something which happens to everyone. But it is a chance for improvement and self-growth. Mohit Bansal Chandigarh shares some ways to deal with rejection a little better. Read More ICT in AgricultureKushal Naharki, 27. August 2017With the development of science and technology, information and communication technology has wide scope and importance in the field of agriculture. Read More I don`t need YOU!Mary Joy Orola , 16. January 2019Have you ever heard or said things like these:'You can do whatever and go wherever you like, I don't give a hoot 'cos I can live without you!' 'I have had it up to the neck with you. You are an eye sore and I don't ever want to relate with you again!''Leave my life alone! I don't need your friendship, neither do I need you. Go your way and I will go my way!'Why should they be said? I wonder... Read More I have done a small effort from my level. Have you?Anjila Lamichhane, 18. September 2017Youths are the voice of the earth. We have to speak for this green planet. Now the time has come to act for its protection. Lets’ do from our level to create a sound environment. Read More Importance of Clean Water in our LifeNisha Meena, 11. June 201871% of the earth surface is covered with water. It is vital to all forms of life found on the earth. It is found below the ground, oceans, large water bodies, and small water reservoirs. Water is also available in many forms like vapor, clouds, precipitation, surface water, glaciers and polar ice caps. Read More Indonesia’s Deforestation: One Map Policy and Transpar...Dinda Dewinta, 21. May 2018Protecting forests means saving the lives of our future generations, slowing the effects of climate change, and letting the earth keep breathing. Read More Information about the new generation environmentBalram Gupta, 23. May 2018The environment is defined as the surroundings in which the organism lives. The environment may be the physical environment, the chemical environment or the biological environment. Thus, the environment has two components - abiotic and biotic. The abiotic environment includes the air (atmosphere), water (hydrosphere) and land (lithosphere). The biotic environment includes the plants, animals and the microbes abiotic and biotic are the types of environment. Read More International Youth Day CelebrationKushal Naharki, 03. September 2018Youth Thinkers' Society Lamjung conducted Panel Discussion on "Safe Spaces For Youths" on the occasion of International Youth Day 2018. Read More Investigative Studies.Omkareshwar Jha, 06. June 2018Its a new way to learn with great engagement & creative ways. Read More iOS App DevelopmentNaina Gupta, 12. March 2019 In a blend, huge amounts of iOS applications accessible on the App store. The applications profoundly fluctuate in the quantity of portions. Be it, gaming, news, stimulation, or online business, everything is accessible on iOS. Read More Lamjung Model United Nation 2018Kushal Naharki, 11. July 2018Youth Thinker's Society-Lamjung organized Lamjung MUN 2018, national level UN simulation as the third iteration of the Lamjung MUN, with EIMUN (Everest International Model United Nations) as it strategic partner in Beshisahar, Lamjung from 23rd to 25th of June, 2018. Read More Let's walk the same stepArmand Eklou, 29. May 2017It all started three years ago when two years after my Baccalaureate second part, I followed a documentary HOME of Yann Arthus-Bertrand who presents the state of our planet, the causes and consequenses of the overconsumption of Its resources by man and his unconsciousness. I was then a student in Biology and Animal Physiology at the Lomé Campus. So touched by the facts, I immediately turned my jacket and oriented myself towards the environment and the preservation of Mother Nature. Read More Life at the African Leadership UniversityJeremiah Thoronka, 28. January 2018I have experienced the African Leadership University approach to the 21st Century education in the fast growing innovation hub of Kigali,Rwanda. The unique learning model in ALU have delivered an immersive and a transformative student experience in class and through the ALU Alive programme (ALU, 2016). Read More Life is beautiful with Black and White keysOluwadamilola Adigun, 14. June 2019Life is beautiful with Black and White keys. As much as I love music, I have found it pretty difficult to learn a musical instrument. Maybe I will learn it in some years to come. Anyways, while in the church listening to the melodious sounds, I saw the skillful pianist fingers running through the piano. Read More MaladyFebeto Potutan Jr., 01. July 2018This poem depicts the current situation of our Mother Earth where humans, who are supposed to be the caretaker of the planet, ended up as the destroyers. This piece intends to be as a wake-up call for everyone that before it's too late we have to make an action and a change that will begin from us. Read More Maturity & ExperienceOmkareshwar Jha, 26. June 2018There is always a question that arises that how some peoples handle complex things with ease and few peoples complicate everything. The experience is the gift of everyone's life but the maturity is the willingness to learn out of that experience. Experience is simply means the events of the life the peoples have seen very much in their lives by the passage of time. They seen more situations and that comes by the time that are actually teachings of life. Read More Maximizing your default in-built human capacityAbednego Ishaya, 26. July 2018One problem being faced by most students is; the understanding of how they can build capacity for their future through maximizing their in-built human capacity. But first, the discovery of your potentials is paramount, which will then land you on the route towards maximizing your default in-built human capacity. Read More Measure Air Pollution with LaserBen Schaefer, 15. May 2017We want to install a Laser construction in different cities to measure air pollution. To accomplish this task we need YPPO member that want to help us in installing these constructions in their cities. The measured date will then be used to rank different cities regarding air pollution and transparency! Read More Message or Emotion?Valeriia Tsytsyk, 17. June 2018Have you ever had the experience of buying something or doing something, feeling so excited and later, wondering why you did it or actually, what was the force that pushed you to do what you did? The truth is more than simple: 95% of our decisions are made emotionally and unconsciously, and rationalized later, consciously. That is the reason why emotional advertising has made many companies successful ones. Hence, does the message play any role at all, or has it has been irretrievably replaced by emotions? Read More Message to Newly Admitted StudentsOmoyemi Ogbe, 01. July 2019Nigerian students both in Universities and Polytechnics often desire to graduate with distinction, but most of them usually finish with 2.1 or 2.2. Their inability to actualize their academic desires can be attributed to lack of determination and plans in their academic pursuit.Apart from the excuse that the Nigerian academic environment is hostile, a lot of students only want to graduate with first class without shedding a bead of sweat. Read More Million Drops of LoveEdrell Cabatbat , 19. January 2019Every drop that falls from the heavens splashes God's unconditional love. In fact, He disguises Himself in the form of raindrops to overflow His million drops of love. Read More Monsoon Rainfall: A Necessary Evil in NepalSachin Gahatraj, 06. November 2017Shift in time and erratic pattern of monsoon is exacerbating rice production and eventually, food security in Nepal. Read More Most popular Pheromone trap in Bangladesh controlling Insect...Md.Abdullah Masum, 23. October 2017 A pheromone trap is a type of insect trap that uses pheromones to lure insects. Sex pheromones and aggregating pheromones are the most common types used for controlling insects in absence of the collector and without the direct use of any toxic pesticides or chemicals. Read More Mounting Prevalence of overlooked Mental Health Issues in Pa...Zainab Ali Asghar, 19. December 2018In this article I want to make the topic of ignorance in Pakistan as the topic of complete importance and consideration. Moreover, it's a small step towards enlightening those narrow minds and alarming them with the best of what deadly disease mental conditions hold in them and how devastating it can be for an individual. Hence, to overcome these mental issues some solutions are also discussed which requires attention in Pakistan. Read More Must I Push?Oluwadamilola Adigun, 17. April 2019When I was pregnant, I never knew I will have to PUSH hard Read More My Anxiety and IChristopher Tawiah-Mensah, 12. July 2018No, no, no, no, you have it all wrong. You twisted the whole and branched to a rather sharp exit. My horoscope forbids me to explain myself after I spell out all the necessary preambles like a good old quizmaster. Too bad there was no hint of coffee in the air- it would have jerked your mind to the words I spoke. Or to the countless gestures I howled and hiked, hoping you'll dig the signals and save me from myself. Read More My Kind of GirlChristopher Tawiah-Mensah, 22. January 2019"Who is your kind of girl?" I get this question a lot. Not because I am oh-my-god handsome or holy-smokes charming, no, no, no. Far from the 'charm of hands' and the 'smoky gods'. It is elementarily because I am single. As if that's the worst disease that can ever happen to a young man like myself, everyone goes "Why art thou single?!" Such questions do come in many translations-- the King James as well.. haven't come across the Revised Standard Version yet though. Read More Need to unite for the common problems of the world Aditya Kumar, 03. June 2018Our Need to unite for the common Problems of the world. We live in a global village today. People from the different country could get anything of their interest which they are deprived of due to variation in climate, culture, style, language and so on. Earlier the things manufactured in one country could be used by the people of that country only but now everything has changed. Read More New Year New CommitmentsKushal Naharki, 08. January 2018Lets make a new commitment this new year to stand together to protect our environment and planet Earth Read More Nigeria Presidential Elections: A spectacle of honesty and c...Dickson Eyinmosan Jnr, 02. March 2019A spectacle of fair scenery was largely acclaimed given the credibility of polls as obvious reality checks from within and around the world indicates remarks to a nearly perfect electoral conduct devoid of illicit misconduct, citizen disenfranchisement, and political muscling of opposition. It turns out to be an electoral process where the vast majority of Nigerians were allowed to vote for their choice candidate through the ballot on account of their free will without fear or favor, duress’s or dogmas Read More Ocean Acidification : An emerging threat to environmentSantoshi Bhattarai, 17. July 2017LETS SPEAK FOR OUR OCEANS COZ THEY CANT SPEAK FOR THEMSELVES. RAISE VOICE FOR THE UNSPEAKABLES. Read More Of Nigeria and her seesawAbdulwaheed Sofiullahi, 18. February 2019Who knows, mayhaps a soothsayer had forseen what would be the fate of Nigeria after Independent? Like Ola Rotimi's 'The Gods are not to blame' where a great seer of supernatural ghoul sees the pregnancy of the snail in the shell. A semblance of it as the playwright portrayed, King Adetusa of kutuje land placates the oracle to forsee the destiny of his new born baby. The oracle speaks, and the vulture was present for the atonement -- the rest is history. The analogy is of this country, we play the pattern of fiction but non-fiction happening to Nigerians from then till date. Read More Of Students’ Victimization and My Parents in the Unive...Alfred Olufemi, 20. April 2019The success of some policies and reformation in the past is not unconnected to the support of the students’ union structures and the vibrancy of the student leaders in protest for a better society. The Ali-must-go protest of 1978 against the 50 kobo increment on the cost of students’ meal was spearheaded by the leadership of the National Union of Nigeria Students (NUNS). Read More On the Binary Concept of PoliticsJubilee Balonkita, 09. June 2018The Philippines is currently in a state of political divide more prevalent than it is has been for so many years. It is a battle of reds versus yellows, but this time, the reds are not leftists but the supporters of the president himself. What future will this bring for the Philippines? -- And what more can it take? Read More Our Forests Crying For HelpDawda Jallow, 21. July 2017Trees For Life Read More Over-Cultivation: A big problem for environmentNisha Meena, 14. June 2018Over-cultivation is an action that has brought about a lot of devastating effects on the globe. Just as the terminology suggests, it is the practice of excessive farming on a piece of land to the point of degradation of the soil as well as the land itself. Farmlands are desired for their rich base in nutrients especially for the soil, in order to provide the necessary nutrient to the crops. Rich soil means a priced land. Read More Pakistan AgricultureAsfand Ali Goraho, 05. October 2018Agriculture is a vital sector of Pakistan's economy and accounted for 25.9 percent of GDP in 1999-2000, according to government estimates. The sector directly supports three-quarters of the country's population, employs half the labor force, and contributes a large share of foreign exchange earnings. Read More Parliamentary Elections; another Test for Afghan Precarious ...Abdullah Abed, 14. November 2018I am submitting my article about Afghanistan's upcoming parliamentary election which has been dated for October 20 exclusively for International Youth Journal. it is my pleasure that you are taking it into consideration for publication. Read More Philippine Tourist Destinations: Mini Boracay cases?Francine Beatriz Pradez, 12. November 2018Following the foreclosure of Boracay, should other tourist destinations in the Philippines undergo extensive improvement to meet international standards Read More Planet of earth: reinvigorating to planet of beastsMuhammad Attique Syed, 08. June 2018The Earth is being taken to a wrongly prevailed path; where every person is tilted towards self benefit rather than rethinking on current policies which could be beneficial for entire humanity. This article touch the crux of such dilemma and ask humans to rethink on it; where they are moving the Earth. Read More Rainforest Live: rainforestcam.orgSimon Krus, 15. May 2017We want to set up a webcam in the center of the Amazonas rainforest, which enables the public to realize the beauty and activity inside the forest through an online platform. People could be encouraged to take action! Read More Red Panda In NepalAnjila Lamichhane, 08. September 2017We, the youths have to speak for those who can’t raise their voice………….Lets’ protect the habitat of the wildlife….Today we are lucky enough to have them but are our future generations this much lucky?? Read More Reflection of emerging roles of Nigerian Youths to build a v...Abiodun Jamiu Sulaiman, 07. June 2018The roles of youths in nation building cannot be over-emphasised in any part of the universe as exemplified not only in the growing participation of youths across every sector of the society but also their roles in pre-colonial Nigeria societies -security, economy, political- which thus, help to maintain stability before colonial adventurism in Africa nay Nigeria Read More Rice-cum-fish farming: opportunities in NepalSamita Paudel, 08. October 2017The practice of rearing fish along with paddy is as old as paddy farming. In the traditional farming practice the rice cum fish farming was mainly on capture basis. Rice is an agricultural crop cultivated in the largest land area of the world after wheat. The rice cum fish farming is in practice in several countries including China, Philippines, Bangladesh, Thailand, Korea, India, Malaysia, and Indonesia. Read More Safety Regulations and Liability Schemes in the Civil Aviati...Dejen Yemane Messele , 13. March 2019Ethiopian Airlines which offers African world-class air transport services faces a shocking aerial accident on 10th March 2019. The accident become the top breaking news and headline of the major global media (here, here, and here) and different speculations are given as to the causes of the accident. This fact forced this author to explore the safety regulations and liability schemes in the international civil aviation laws. Read More Scope of Biodiesel Production in BangladeshTanmoy Kumar Ghose, 08. October 2017Environmental pollution is the major problem we are facing in this modern era.Diesel and other petro fuel operated vehicles (car, bus, motorcycle, trucks etc) usually emit a huge amount of toxic gases such as CO2, SO2, CO etc which are breaking down the ozone layer and we are facing green house effect. Read More Seeking Education in Pakistan Seems Quite Doable NowMuhammad Attique Shah, 11. June 2018The article focus on seeking education in Pakistan as it seems quite doable now. Looking at the HEC ranking; IBA Sukkur University is at 4th best business schools in Pakistan but few elements, which one might not know, makes it the best business school in Pakistan. Read More She is familyJubilee Floren, 02. October 2018It is between the granddaughter, the grandmother and the daughter. Wherein the granddaughter was being molested by the second husband of the grandmother. And the granddaughter planted some hatred to her grandmother and the daughter wanted to take one side but the daughter understand every side of the story. Read More Small Area Estimation: Study of Poverty and Income Distribut...Muhammad Basorudin, 13. June 2018Small Area Estimation (SAE) is the popular techniques to estimate population in small area which need for availability auxiliary variables in area level and unit level. Read More Stop Polluting The GambiaOmar Malmo Junior, 18. May 2017Our marine resources are dwindling at an increasing rate yet no solution from the men and women at the helm of affairs. Before sacking technocrats and experts, sack the foreigners (Chinese) from our water body for their bad fishing nets and waste dumping culminating to a high pollution potential in our water body. Read More Strengths and Weaknesses of Zimbabwe as viewed by Sustainabl...Mthandazo Khumalo, 05. June 2018Zimbabwe is a low income landlocked nation, situated in the southern part of Africa. It has a population of 15,6 million people. Despite Zimbabwe’s economic downturn in 2000, the latter has enjoyed increased growth and a booming economy and was once called “the breadbasket of Africa”. The launch of the new Sustainable Development Goals created a new trajectory for Zimbabwe. The year 2015 meant that Zimbabwe had to join other countries across the spatio- temporal divide in conducting the unfinished business relating to the SDGs. The SDGs are a core component of the 2030 Agenda for Sustainable Development adopted in September 2015. It is the purpose of this article to clearly analyse the strengths and weaknesses of Zimbabwe as viewed by the SDGs. Read More Student Mental Health CrisisIshaan Sachdeva, 03. January 2019Canadian schools and universities are facing mental health crisis. All mental health organisations are focussed on complex solutions to this burning issue. While doing so, the simpler solutions are being overlooked. One such easier approach which promotes mental health is physical activity and promotion of the awareness of physical activity mental health connection is the goal of Active Mental Health Initiative, a Student led National Organization. Read More Sustainable AgricultureRanjana Chippa, 09. August 2018Sustainable agriculture is the production of plant and animal products, including food, in a way which uses farming techniques that protect the environment, public health, communities, and the welfare of animals without compromising the ability of future generations to meet their own needs. The key to sustainable agriculture is finding the right balance between the need for food production and the preservation of environmental ecosystems. Read More Thai Consumers Behavior towards Fast FashionNi Putu Maha Lina, 15. June 2018Clothing has always been regarded as one of the primary needs of human being. This concept can be reflected in current clothing trends for teenagers. Teenagers aware of the latest fashion trend, what update is and what will be upcoming. They are addicted to follow the fashion trend that is growing over time. Teenagers’ intention to follow current fashion trend has captured by a retail store. Read More The Agricultural Sector: Path towards achieving a wider rang...Abednego Ishaya, 01. September 2018In a world of diverse needs (that calls for different actions to be taken by various corporate organizations), for which the government alone might not necessarily meet up to. There appears to be a gap between the understanding the community needs and what the corporate organizations take of their view. Read More The Call of NatureJubilee Balonkita, 07. June 2018The status quo of the environment is a magnanimous issue today. Drastic change due to industrialization prevents all sorts of species to grow and subdue the Earth. We now live in a time where clean resources are scarce and spaces available are ironically less spacious than before. Even with a straightforward list of all the negative changes that can be spotted through comparing the then and now, humans tend to overlook the facts and operate in a way more convenient for them. Albeit the definition of conservation is well known and printed in various dictionaries, people seem to disregard putting it into practice. This paper will tackle the connection between conservation and human action. Read More The dangers of plastic pollution and its harmful effects on ...Sundeela Syeda, 27. February 2019My article is on the dangerous affects plastic is causing on human health or you can say on the whole environment.we should reduce the use of plastic for our better tomorrow. Read More The Deaf WorldAnna Baklytska, 22. January 2019Have you ever seen a deaf person dance? I have. I watched this person with delight and pride… Yes, with pride (or admiration), that they hadn’t given up, but had learned to enjoy the music of silence, not considering themselves deprived and regardless of the absence of their hearing- they amazed people! Read More The Fate of Girl-child and EducationAbiodun Jamiu Sulaiman, 09. August 2018“Education has in its characters a formation of character, but to deny certain individual access to it on the basis of sex is a crime against humanity. The education of a girl-child not only exorcises the society but also makes the world a better place to live” Read More The Fruit Mingled Tradition & Innovation: the Story of A...Tiancheng Xu, 05. June 2018A story comes that a master’s student in eastern China has taken the mission to modernize traditional Chinese medicine (TCM) to a whole new level by building a robot that can perform acupuncture, called “Acubots” which means the acupuncture robots. Using a digitized map of acupoints — spots on the body believed to correspond with certain tissues and organs in TCM— the robot can identify where to correctly place a needle after measuring the height of any patient.Which won Top 36 of the 9th Lee Kuan Yew Global Business Plan Competition. Read More The inception of 4th Industrial Revolution: Technology’...Jawwad Shadman Siddique, 08. July 2019According to some experts, we are at the beginning of the fourth industrial revolution. And, its one that will make those that came before it look like mere dress rehearsals for the main event! But what is it and why should we care? Read More The Love that Constrains!Mary Joy Orola , 04. August 2018"Why do I have to condone rubbish? I don't take nonsense! You step on my toes, I deal with you!'' These and many other like them are found on our lips at certain times of conflict. Conflict, as I have come to discover, is a great tool for development in all spheres if we can cultivate a welcoming demeanor at such times. Read More The Man, His Works, and His RuinsAaron Jay Quitain, 08. June 2018Over the years of our existence, we, as human beings, have proven our capabilities and witnessed the accomplishments of our brilliant minds. But are we on the verge to unleash our greatest breakthrough as the supreme species of our planet... or are we a few steps from our own downfall? Read More Theory of Self Sustainability of NatureVivek Modi, 17. July 2017"vasudhaiva kutumbakam” It is the ancient Indian principle which means the whole world is my family.As a family we live together and our lives are dependent on each other. Read More The Rainforest Destruction CamSimon Govender, 15. May 2017The destruction of Rainforests all over the world increases dramatically. Since nations all over the world profit by the extensive amounts of wood the extent of the problem is being kept hidden from society. We will deploy multiple cameras at the borders of the rain forest that will live stream the situations. Read More There is Nothing Except YouDeep Solanki, 16. May 2019This is a article describing the different stages a person acquire, when he starts a journey to the enlightenment, knowing, and learning patience. I observed the thinking, behavior and the circumstance faced by the character. Article reveals truth about how a person reacts when he is learning a way to Infinity. This is a fictional work. Read More The Small Businesses in SomaliAbdisalan Ahmed Hussein Fidow, 17. July 2018There are many entetpuners in Somali , this study will argue the small business in Somali and so the main benefit of Small business. However the trade rose significant with the economic growth , since 1970 the Somali people crowed the cities and towns, They need Businesses after that grdual arise for export and import so the trade will have a positive impact on Economic growth in Somali. Read More The Source Of Poverty.Alhaji Yusuf Yusuf, 07. June 2018"ONE DAY THE POOR WILL HAVE NOTHING LEFT TO EAT BUT THE RICH."Poverty is a degradation of human dignity and the inability to make wishful choices and get opportunities. Poverty is a major source of worry all over the world and it has been a major developmental problem in Africa and Nigeria in particular. Read More Trend of Building Collapse Poses Threat to Living in Nigeria...Alfred Olufemi, 07. April 2019However, while this reporter discovered that a few of these unfortunate incidents were unprecedented, many could be attributed to the negligence of the state governments, which could have been averted. Read More Water Conservation: Challenge for coming generationNisha Meena, 10. June 2018Our ancient religious texts and epics give a good insight into the water storage and conservation systems that prevailed in those days. Over the years rising populations, growing industrialization, and expanding agriculture have pushed up the demand for water. Efforts have been made to collect water by building dams and reservoirs and digging wells; some countries have also tried to recycle and desalinate (remove salts) water. Read More We All Bleed RedChristopher Tawiah-Mensah, 23. September 201824 hours a day, 7 days a week, 365 days a year, time applies equally to all. The rich, the poor, the young, the old, the smart, even the young lady in the mini skirt who just roped her neck to a branch of the Iroko tree in her father's farm, has her fair share of time. Only that she wants to end her clock right about now. The newspapers stare silently from a telescope distance. Read More We Only Try To BeGavielle Gerico Cruz, 10. May 2019In the light of the environmental situation of today's world, it is a must that we go ahead and bring about awareness in our own unique ways; for in reality, we are not aware, or at least, we only try to be. Read More What life has in stock for meFuad Aliyu, 04. June 2018Life isn't easy, we just have to know some basic things in other to live well. What life has in stock for me. First and foremost, I will ike to tell you if you haven’t realise that life is more than waking up in the morning, getting dressed, being punctual to your place of work or as a student being punctual to your class of study. Read More When the Oceans rise and the Thunder fallsFrancine Beatriz Pradez, 24. May 2019This explores the often complex yet linear connection between the extensive flood crisis in the city of Dagupan which is situated in the quaint province of Pangasinan nested within the Philippines islands. It aims to give a rational insight on the cause of the crisis as well as how the local government unit is handling it amidst backlash. Read More When you fail, don’t give upOluwadamilola Adigun, 10. April 2019When you fail, don’t give up, don’t stop attempting again, chart a new path to success and put in extra effort. Read More Youth, Environment and Sustainable DevelopmentKushal Naharki, 08. October 2017Achievement of environmental sustainability through sustainable development is talk of town around the globe as we are already facing damage to our lovely environment in which we reside, with many more effects to occur in near future. A active involvement is required to promote environmental sustainability and youths; a group of active age individuals can play a significant role in it. Read More Youth In Climate ActionKushal Naharki, 01. March 2018With World already facing huge challenges due to climate change, youths must act now, act together and act locally to bring us sustainable and resilient future. Read More Abolition of Capital Punishment.Abrar Ahmed Nawaz Qureshi, 03. June 2018Capital Punishment is the practice of executing a person by way of punishment for committing grave or heinous offences. The term ‘Capital’ is derived from the Latin capitalis, which means "concerning the head"; therefore, to be subjected to capital punishment means to lose one's head. Capital Punishment means, the infliction of the death penalty as punishment for committing certain grave offences e.g. Murder, Rape with injuries that may result in the death of a victim, waging war against the state, mutiny and its abetment, abetting the suicide of a minor, intoxicated person or mentally ill person, kidnapping for ransom, dacoity accompanied by murder, giving or fabricating false evidence with intent to procure a conviction of a capital offence. Read More Abortion Business Among Young People And The Way ForwardFrancis Ametepey, 07. August 2017As a campaigner with excessive passion for young people’s sexual procreative health and right issues draw my courtesy to share with you all my comprehension attracting young people on their sexual reproductive health and right Read More Achieving the Africa of my dreams: a healthy AfricaVictor Oyelade, 09. June 2018Africa is a region with at least 738 million amazing individuals, reputed as the richest continent on earth in terms of available mineral resource, notorious for being the poorest continent with respect to human “Standard of Living” and “Health Indices”. Even World Health Organization acknowledges that “Africa currently confronts the world`s most dramatic public health crisis”. Read More African leaders` role in financing continental developmentAbednego Ishaya, 14. October 2018Aside the roles that citizens play in attaining and maintaining a remarkable developmental stride, one other aspect that will bring to the actualization of a sustainable path towards the transformation of the African continent, is in the leadership structure and management. Hence, the place that leadership plays in bringing to bare, a long awaiting development in all ramifications in Africa, cannot be over emphasized. Read More After IYJ’s Report, Oyo state Resumes Abandoned Road ...Alfred Olufemi, 20. April 2019The Oyo state government has continued work at the abandoned road project in idi-Ape- Iwo road area of Ibadanl, two days after IYJ published a report on the health effect of the dusty road on the people. Read More Against what and how do people hold a meeting in Russia? Kristina Bebiakina, 13. June 2018It is fear and courage at the same time, it is pride and joy because you see infinite crowd of people who want to change the country. In Russia for the last year there have taken place at least three large meetings. And almost to everyone in big cities there were not less than 50000 people, on everyone there were detentions and arrests. Read More Analysis: How Buhari fared in 2019 election compared to 2015...Alfred Olufemi, 09. March 2019While the APC flag bearer won more votes in his opposition's stronghold, South East, than he polled in 2015, he could not meet up with the number of votes recorded in his home state, Kastina, and most northern states he won in 2015. Only Borno was an exception to reduction of votes witnessed in the northern states. Read More Analysis of EU Development Cooperation Agenda towards Pakist...Muhammad Attique Shah, 28. July 2018For more than a decade the European Union has begun to widen its relations with Asian countries, specifically with Pakistan, beyond being merely a trading partner. In fact, the European Union is Pakistan’s one of the major trading partners. Read More And my heart bleedsAbiodun Jamiu Sulaiman, 23. December 2018There is rampage in the land; an ocean of grief flows beneath it. My heart bleeds, but the closest of friends dare not console. When the head of an household dies, the house becomes an empty shell; when the land becomes hemmed in throng of sickness, not even the chief-priest can cleanse it. A dialogue between deafs will lead nowhere, but immured in indecisive decision. Read More Anti-Semitism: A growing threat in today’s worldDickson Eyinmosan Jnr, 31. March 2019Contemporary anti-Semitism which has been argued as the new anti-Semitism stems out from the fact that newer technological advances have been positioned in a way that grossly promotes varied form of anti-Semitic attacks and movement through it media. This has indeed brought to the fore the growing trend of racial radicalization, gross indoctrination, and wider Nationalistic movement across every part of the aisle. Read More Anticoruption: Nigeria is leaving adolescents behindVictor Oyelade, 24. September 2018According to a UNICEF report, there are currently 1.2 Billion adolescents in the world, making up to 16 percent of the world`s entire human population. In Africa, there are presently 289 million adolescents (aged 10-19 years) who make up lump 23 percent of the entire African population. Read More Are Lawyers representing asylum seekers “un-Australian...Maulline Gragau, 17. October 2018According to Minister for Home Affairs and immediate former Minister for Immigration, Citizenship and Multicultural Affairs Peter Dutton, Lawyers representing asylum seekers who want to stay in Australia are “un-Australian”. Read More Bad ApplesChristopher Tawiah-Mensah, 05. September 2018I passed by 23 people in about 3 minutes. That is 23 different talents, at least; 23 different opinions, 23 different uniqueness and at minimum, 23 different gifts to the world. They all sure have something to say, an experience to share, an idea to materialize or a knowledge (no matter the depth) about a matter. Even the smoker has an advice under his nicotine breath. " Smoking kills, son. Don't even think of starting." one of their many counsels. Strange how wisdom sometimes lurks within the most guttered of corners. Read More BalochistanEngr Saeed Ahmed Jattak, 16. May 2019Balochistan is the biggest region of Pakistan, Consisting around 44 percent of the region of the state. It is likewise the most unfortunate and least populated. It is wealthy in mineral assets and the major provider of petroleum gas after Sindh. One of the world's greatest copper stores have been found at Reko Diq in the district Chaghi of Balochistan Read More Bangabandhu and Bangladesh Rubel Ahmed, 09. June 2018Bangabandhu and Bangladesh are two words but one name. One cannot imagine without other. Bangabandhu was the symbol of our Independence and national hero. There is no substitute for a parental role in the birth of a child, and there is no alternative to Bangabandhu in Bangladesh. Read More Between Yoweri Museveni and Bob Wine: The Uganda taleDickson Eyinmosan Jnr., 14. September 2018"We are fed up of those who oppress our lives and everything that takes away our rights. Uganda seems to be moving backwards and this is almost making us hate our own nation. This is unfair for you to be misrulling us. Well, we know you fought a bush war. But imagine a child who was born when you came has also long became a parent. Somebody help us tell this to Mzee (Museveni)"- Bob Wine addresses the state of the Ugandan politics through a music titled "Freedom" released last year. Read More Brett Kavanaugh endorsement and the morality of the Supreme ...Dickson Eyinmosan Jnr., 16. October 2018The argument for and against sexual misconduct rest solely on the outright jurisprudence of the court in interpreting wisely both within the framework of law and absolute morality. No one is better-off seeing that a clear case win both in morals and law is been thrown out the window all due to sentiment and emotional appeals. In this case, though, the Judge may have had his way, but in the long term, the society pays direly for this singular act of abuse of office and show of legal shame. Read More Citizen Diplomacy to the UN: an Interview with Patrick Sciar...Vlad Chevachin, 14. June 2019Patrick has gone through a fantastic life path: from a simple student and the creator of a rock band back in 1969 to a famous person and leader of the Youth Assembly at the United Nations. Following his goal - to benefit society - he continued to reach new heights, which the young idealistic Americans of his era always dreamed of. This article will inform you about an amazing person in capital letters! Read More Confused seperationBilal Abbasi, 27. July 2018I have been to Lahore my friends accompanying me and our last show which we were eager to be a part of was Wagah boarder .Yes we reached there accordingly and everyone was excited and slogans of ''Pakistan Zindabad'' all over and patriotic songs were played etc etc. But not so long the other side (indian) catches my attention and a boarde planted in between to demarcate (the two nations). Read More Corruption as a canker worm to development: Nigeria as a cas...Meshach Idoko, 10. November 2018The level of corruption is really alarming and many strategies have been put in place to curb it and all to no avail. This is really a major problem in Nigeria. Corruption is a canker worm to development. Nigeria is where we are today because of Corruption. Read More Crocs in the Philippine PopulationCarmina Cordero, 18. December 2018It has been a long and painful struggle for the Filipinos to obtain political equality and recognition not only from the neighboring countries but throughout the World. Even as of today, the struggle continues. The Filipinos are in a fight for democracy not with the other races but with their own brothers. Read More Decline of the power of Pakistan People’s PartyMuhammad Attique Shah, 16. July 2018The article deals with the declining street power of Pakistan Political Party. The party had the honor of being a ruling part of the country but now they are just remained in Sindh province. Read More Decoding IndiaPranav Mohla, 18. July 2018The ills associated with Indians today, not just the leadership but we, the people, are not inherent, but instead a by-product of the six decades of atrocious leadership. That is not meant to excuse how we have become as citizens, but once the system of leadership changes, after a short lag, we'll all be far more worthy citizens too. The focus therefore should, at the moment at least, be on dealing with the fountainhead of India's problems until that problem is well and truly gone Read More Does Imran Khan is really Persistent on his previously given...Muhammad Attique Shah, 09. August 2018The article evaluates the commitments of PTI chairman done with his nation. Mostly, it has focused on what he said regarding Kashmir Issue. Both of his statements are compared, one given before election and one after the elections. Read More Donald Trump and Chairman Kim: Is this really about DMZ? Dickson Eyinmosan Jnr., 08. July 2019The epoch making events between the two leaders who operates very contrasting governments saw the US president defiling the odds as he crossed the DML at the truce village into North Korea in shook hands with Chairman Kim whose surprise was an expression made in ecstasy. Read More Dr. Ameyo Adadevoh: The heroic doctor who paid the ultimate...Eyinmosan Dickson Jnr, 20. August 2018She is known for preventing the Nigerian index case from leaving the hospital at the time of diagnosis, thereby playing a key role in curbing the spread of the virus in Nigeria. On 4 August 2014, it was confirmed that she had tested positive for Ebola virus disease and was being treated. Adadevoh died in the afternoon of 19 August 2014. Read More Education budget and our needs in PakistanAthar Maqsood, 19. June 2018Education is the most powerful weapon in the world by which we can conquer world even. It builds a nation and makes a nation civilized. The first word of the revelation deals with the importance of knowledge. In Sura Al-Alaq it is said, “Read: In the name of thy Lord Who created.” Read More Electoral transparency: a step towards strengthening Nigeria...Alfred Olufemi, 04. February 2019A comparative study shows that the 84 million registered voters as released by the Independent National Electoral Commission (INEC) for the 2019 general elections signals an improved level of political participation when weighed against the 68 million obtained in the 2015 polls. That is 18.6% increase in the voters’ register despite the fact that the country witnessed a 7% increase in its population. This increase, if sustained, is a step towards fostering democracy. Read More Endo contractualization: PH's ball and chain?Bianca Ysabelle Baldemor, 03. December 2018This debauched contractualization scheme is the country’s ball and chain, the burden and hindrance that ties the country down and prevents it from having a rather equitable work arrangement. It misleads not only the Filipino constituents, but also drives down the entrepreneurial worldwide competencies of the Philippines. Read More Era of ostentatious JamboreeAbiodun Jamiu Sulaiman, 25. November 2018If a child did not witness a story, he would, with no iota of scepticism, listen to narrations. I might not witness the much appraised administration of Comrade Idris Maibasira, but the emblazoning of "God, thank you for blessing us with Maibasira" on the wall of most lecture halls depicts the efficacy of his administration; hence, the ennobling of his personae in a warmth compartment in the heart of many a student and the rising euphoria and demand for a continued legacy through one of his kinsman, one famed for his ubiquity - Aluta Radio, Comrade Ibrahim Shehu Kalgo. Read More Ethiopian pilots of the Boeing 737 Max 8 vindicated Dickson Eyinmosan Jnr, 14. April 2019Despite the hard-work and full compliance strength level with Boeing recommended and FAA approved emergency procedural measures, it was grossly unfortunate that Yared Getachew alongside his co-pilot couldn't rescue the Max 737 from persistently nose diving despite their ceaseless effort commanding the right sensors program. Read More Everything you should know about the Youth 2030Mohamed Okash, 29. January 2019The world is young than ever before since human history. It homes over 1.8 billion young people below the age 25. Most of these young people live either in conflict areas or the less developing world which makes their lives hard. Read More Evolution and development of the right of information in Ind...Stuti Aastha, 27. August 2018The Constitution of India has been around for 68 years now, and has since been amended a number of times to accommodate the changing mind set of developing India, and the interpretation of this document, especially of the Articles related to Fundamental Rights has been diverse. Read More Filter by FilterBianca Ysabelle Baldemor, 06. December 2018“Propaganda is to a democracy what the bludgeon is to a totalitarian state.” Media is pervasive, and as time progresses, it appears to infiltrate our ideology and mind-setting, thus leading to an increasing influence to a chunk of our everyday actions. Read More Formidable challenges to the upcoming government in Pakistan...Muhammad Zain, 04. August 2018People will choose a new government in Pakistan on the 25th of July, but there will be the serious problems, besides human development issue, which new government will have to face from the establishment of Pakistan and the ongoing tussle is likely to increase with the formation of new government. Read More For The Gambia My HomelandMuhammed Tekanyi, 24. May 2017Out on the western capsule of mainland Africa and at nose to the Atlantic ocean seats a nation with abeautiful strip of land buttered by a sooth river after which it was named and gloriously infested withsmiling people - The Gambia! Read More Free speech on economic freedom for a new deltaEsimaje Michael Onoseme, 26. September 2018The State of Progress and Development in the Niger Delta and Delta State in Particular is falling off the Grid, Hence a Call for leaders, Think Thanks, Stakeholders and Concerned Persons to Stand for Change Read More Gender discrimination an insidious menaceAusaf Hyder Sial, 14. June 2018After the dawn of international laws,woman segment of society is still ghettoized by the misogynist minors of the world. With the passage of time,the world has fostered its ebb and flow, but women are following the same principles of Dark ages extended through the patriarchal society. As a matter of fact,woman is always provided with a back seat in each and every field. Read More Gender Equality is Immensely Important for a Developed Pakis...Zulfiqar Ali Ramzan, 27. June 2018Gender discrimination is a vital challenge that our society has faced throughout the history. At present, this uneven situation is causing problems among people and it will continue to grow in the near future, if gender equality is not discussed. Gone are the days when women used to work in house, feed their children and carry out the everyday chores. Read More Generational shift is happening in AfghanistanAbdullah Abed, 13. September 2018People around the globe have been hearing for decades plenty of failure stories concerning to the ongoing violence, chaos and conflicts in Afghanistan; a country prone to a longtime war. Though the enduring deadly war making no exception to any segment of the society but it reaps young people in an extremely merciless manner. Read More Ghanaian YouthPower Advocate At OGP Global Summit At Georgia...Francis Ametepey, 21. August 2018Francis Ametepey, a youth advocate from Ghana represented Restless Development at the Open Government Partnership Global Summit (OGP) in Tbilisi, Georgia. Read about my reflections from the event and about how summits can act as springboards for youth involvement in policy-making. Read More Globalization: the effects on economy, culture and societyAnna Kontseba, 09. July 2018Nowadays globalization plays an important role in our society. What does it mean? What is the role of this phenomenon in the modern world? Is it good or bad? Read More Globalization: The Process of Creating A Connected World Wit...Muhammad Bilal Tahir, 12. January 2019Globalization is a process through which countries, companies and people interact across the globe. In the modern international system it would be really difficult for a state to stay stable without globalization. Globalization benefits the world by providing open economic opportunities, diversity in people and opportunities, cross-culture learning resources, to create a more connected world. Read More Global Solutions Summit: On Multilateralism, Trade and Parad...Jawhara Kanu, 01. May 2019This article builds on findings of the Global Solutions Summit on the pressing need for multilateral cooperation and solving the shortcomings of the current multilateral institutes. It specially emphasizes on trade and dwells into shifting into an approach that’s more considerate for developing countries. Read More Global War Against Terror: A Systemic and State Level Analy...Muhammad Bilal Tahir, 06. October 2018This article describes the systemic and state level of analysis. It uses those level of analysis to describe the war against terrorism in international system. Finally the article provides its opinion on which level of analysis is best to describe war against terrorism. Read More Government Shutdown, Trump Showdown Dickson Eyinmosan Jnr, 07. January 2019For the records, this is the 21st shutdown since it's first occurrence in 1976 when modern budgeting and spending appropriation act was approved. It is also the third shutdown in 2018. The third which is currently in place with no clear end in sight. The shutdown which began on December 22, 2018, if allowed to stretch through January 12 will become the longest shutdown of government operations in the annals of US political history. Read More Great Nations Win Without FightingZulfiqar Ali Ramzan, 12. June 2018A nation is defined by people having same objective, same ideology. For long,nations have been struggling to rise and make their ideology valid. Those who sustained, became great nations by constant struggle. And these nations did not win by fighting but other factors like social,political, and economical played more important part than violence. Read More Group Urged PMB to Appoint Youths in His New CabinetYasir Ibrahim, 14. June 2019A Civil Society Organization, under the aegis of United Youth Leaders for Development Initiative, has called on President Muhammadu Buhari to appoint young persons as Ministers, in some of the Federal ministries of government. Read More Gujarat Elections- A Gamechanger In the Long Run?Souryaditya Sen, 06. July 2018This article will be providing readers with a brief idea about the Gujarat Elections which took place at the end of 2017. The Gujarat Elections according to many was a gamechanger. And it may have a significant bearing on the 2019 Indian General Election Results. This article will give you just a sneak peek into the currrent Indian political scenario. Read More High Court of Kenya Declares Law Capping Bank Interest Rates...Maulline Gragau, 29. March 2019Over the last 20 years, there have been many attempts to reduce the interest rate spread by way of regulation. The Banking (Amendment) Act 2016 which was seen as a successful effort to address the issue has drawn mixed reactions from stakeholders. Read More Information Technology in Education and New GenerationNisha Meena, 12. July 2018The information society challenges the education system. In recent years, the speedy, effective and global communication of knowledge has created a new foundation for co-operation and teamwork, both nationally and internationally. The increasing role played by information technology in the development of society calls for an active reaction to the challenges of the information society. Read More Iron Fists in Velvet GlovesBianca Ysabelle Baldemor, 02. December 2018Now that the similarities between the strongmen Ferdinand Marcos and Rodrigo Duterte are getting clearer, it is now the duty of the Filipino constituents to heed these lessons and raise social and political awareness before we spiral down to another probable doom. Read More Is it possible to liberalize world order?Muhammad Zain, 17. September 2018Though realism has prevailed over liberalism in international relations yet there are some features of liberalism that make it more plausible for the stability and prosperity of international order along with individual involvement in decision making domestically and internationally. Read More Jamal Khashoggi: A death scar unto the Saudi KingdomDickson Eyinmosan Jnr., 12. November 2018The death of Jamal Khashoggi no doubt will forever remain a big scar unto the face of the Saudi Arabia authority who in recent past have continued to shy away from the truthfulness surrounding the gruesome murder of the Washington Post columnist. Most especially shocking, is the perceived complicity of the Kingdom most top hierarchy as it involve the death of Jamal Khashoggi. Nothing short of justice will exonerate this perceived complicity most especially in the eyes of the international community. Read More John McCain: The president America never hadDickson Eyinmosan Jnr., 30. August 2018"We weaken our greatness when we confuse our patriotism with tribal rivalries that have sown resentments and hatred and violence in all the corners of the globe. We weaken it when we hide behind the walls, rather than tear them down, when we doubt the power of our ideals, rather than trust them to the great force for change they have always been". -John Sidney McCain Read More June 12: A kind reward worth a democracy day achievedDickson Eyinmosan Jnr. , 22. June 2019From activist to students unions down to the regular Nigerian citizen, all was set for an epoch making events that many believe will inadvertently turn the fortune of a Nation into a charismatic candor of gloom and boom worthy of emulation thereafter. But behold, event took a negative nose dive to the consternation of many as not even the international community was spared in this horrendous and torrential shock not even the greatest fortune teller of all time could ever imagined. Read More Kendrick Castillo- Heroism at its peakDickson Eyinmosan Jnr., 20. May 2019While some may battle illness as a sign of their bravery even at the face of death with the intent of either dying or winning the battle to live again, others may have died on account of a good cause with little or no choice of their decision on such instances. No doubts, we have had cases of freedom fighters and activist who have died rallying a cause for the interest of others. However, very few have intentionally and purposefully died on the basis of altruism for others to live on account of their death. Read More KMC: The Most Corrupt InstitutionOmar Malmo Junior, 15. May 2017To say KMC is the most corrupt institution in The Gambia maybe an understatement but saying it is the most wicked institution to its employees on Bakoteh Dumpsite should be a statement in every Gambians mouth. Read More Kofi Annan: There was a manEyinmosan Dickson Jnr, 23. August 2018"These often unsung heroes understand...that poverty, disease and famine are just as deadly and destructive as earthquakes, hurricanes and tsunamis. Individuals ...are taking on these challenges in their communities, volunteering to make a difference. They remain the true champions of our work towards the Millennium Development Goals." -- Kofi Annan Read More Leadership: It is time to raise Farmers, not HuntersTosin Arebuwa, 28. August 2018As we are moving closer to the 2019 general elections in Nigeria, thus, it is meet and right to civically guide my fellow teeming youths...A hunter. Who is a hunter?Simply put, a hunter is one who hunts. And to hunt means to pursue and kill, basically, for food. A hunter nurtures absolutely nothing, but kills what nature nurtures. He only thinks of himself and the immediateness and nothing more. He is really never empathetic, nor compassionate. Read More Liberians Leverage Peace to Ask Government for ChangeJanet M Kamara, 01. July 2019A mammoth crowd of Liberians had gathered in the country’s capital Monrovia holding a peaceful protest tagged ‘June 7 or Save The State’ protest, the demonstration was hosted by the opposition who rallied the populace to clamor for positive change in the economy and machinery of governance. The thrust of the march was to seek redress on human rights' issues and the economy that keeps traveling southward. Read More Mid-Term Elections: A win for Political LiberalismDickson Eyinmosan Jnr., 26. November 2018Rather than argue to the obvious, it is best infer absolutely that the mid term election was a perfect score card expressing not just the views of the majority but also in every sense admitting the flaws of the present. By admittance, it clearly gave in to political liberalism predicated on the theory of equity, fairness, and justice among people. Abhorring racial bias, hate, bigotry, anti-semitism as well as alt-right principle. Read More Myanmar: Ann San Suu Kyi and the silence of war crimes again...Dickson Eyinmosan Jnr., 09. October 2018To summarise the situation in Myanmar as an obvious reality of ethnic cleansing is to say the least why individual like the respected Ann San Suu Kyi has remained silent on this issue of war crimes against humanity in the Rahkine state of Myanmar been perpetuated by a government she presides over. Read More My Vision for AfricaMaulline Gragau, 23. June 2018There is no doubt that Africa is a crippled, but potential giant. For a long time, the continent has been merely reduced to a source of raw materials for the European markets and a dumping ground for sub-par products from the Asian market. Africa has never become a real game player in the game of capitalism partly because of her internal contradictions such as unscrutinised policies and institution of reckless political decisions. Read More National Anthem and Flag: Status quo or abrupt change?Francine Beatriz Pradez, 12. October 2018Two of the top legislators in the country are proposing to amend the lyrics of the Philippine National Anthem as well as add another symbol to the Philippine National Flag. What do their respective bills mean and what does it mean if the Senate ratifies it? Read More Need to consolidate our political partiesKenechukwu Ugoh-Ezepue , 10. May 2019As the 'Giant of Africa' and model of democracy in Africa, our democratization processes should be strengthened through the instrumentality of our Electoral Laws. By so doing, we can begin to deepen and propel the continent's democratic principles. Read More Negligence: The journey of West Africa educationFrancis Ametepey, 23. May 2017Prescribed education is essentially and culturally valuable in a society. A good school presentation is like a litmus paper which shows, future social success providing a wealthy bundle of knowledge. Read More Notre Dame: The fall of history most iconic architectural fr...Dickson Eyinmosan Jnr, 30. April 2019For a Nation known for devastating terror attacks in major of her city epicenter, the Notre Dame Fire incident was a sad remainder of pain, anguish, and torment as Parisians watched with folded arms engulfed in hot tears seeing yet another tragedy befell a nation whose beleaguered history with terrorist knows no bounds. Read More N.S.S: An Under-Utilized Arm of Nation BuildingShashank S R , 12. November 2018National Service Scheme(N.S.S) is one of the largest student body in the world if not the biggest. It is a voluntary-student organization with 32 lakh volunteers spread across the country. This article emphasizes the need to re-visit N.S.S to suit the present day needs. Read More NYSC and the folks of new ageAbiodun Jamiu Sulaiman, 03. January 2019As the literature goes, design is not making beauty. Beauty emerges from selection, affinities, integration and love. Whatever comes around, goes around. Maintaining a solid phalanx has always been the surviving tonics of diverse entities. Read More One man can change the world - the Libertarian saga of Anto...Esimaje Onoseme, 20. October 2018We are the change we seek, We become the idealogy of the change we we've worked to achieve. How a Man Changed a Nation; One man can change the world. The year was 1945 a young man named Antony Fisher entered the faculty office of Friedrich Hayek at the London School of Economics. Read More One year after Charlottesville, has president Trump earned h...Dickson Eyinmosan Jnr., 14. August 2018The city of Charlottesville remembers with fresh wounds the elevation of Fascism against absolute democratic principles clearly orchestrated by white supremacist Saturday 11th-12th August 2017. One year after, has president Trump earned his redemption? Read More Political System of India: Need to be changed for the sake o...Aditya Kumar, 14. June 2018It is very important for any country to have its political system so strong that it could deal with needs of its citizens efficiently. But do you think that politics means only to gain power through votes at the cost of few promises made during elections? Does politics only mean to speak about opponents and to oppose them even if they are doing something good? Read More Positive aspects of British Colonialism in Indian subcontine...Muhammad Zain, 30. July 2018British ruled the Indian subcontinent for about 100 years. Besides atrocities, there were significant developments by them which included the areas of politics, economy, education, and infrastructure. These developments are playing a central role in running both the countries Pakistan and India. Read More Reasons Behind Rising Extremism Among Youth in Indian Occupi...Muhammad Tahir, 04. May 2019This article is a study case which researches the reasons behind rising extremism in Indian Occupied Kashmir. The article focuses on the actions taken by India against the Kashmiris on the civil, authoritarian, and governmental level. Read More Relation between political science and politicsAsfand Ali Goraho, 01. October 2018Relationship between Political Science and Politics!There is no real difference between Political Science and Politics. Political Science studies Politics i.e. all political relations and interactions in society. Hence it cart be called Politics. Modern Political Scientists do not make a distinction between the two. They reject the traditional view which makes a distinction between these two. Read More Rethinking Ethiopia’s Computer Crime ProclamationDejen Yemane Messele , 20. February 2019The Constitutionally guaranteed freedom of expression is an inherent and basic human right for all other human rights. This right, however, is not an absolute one as it may be limited upon conditions. Lawful restrictions and limitations may hinder individuals from enjoying their right to freedom of expression either temporally or permanently. Accordingly, grounds for limitations of freedom of expression are provided under Art 29(6) of the FDRE Constitution. Read More Robert Muller breaks silenceDickson Eyinmosan Jnr., 11. June 2019The highly cerebral lawyer during a ten minutes long speech carefully and tactically sealed the coffin in relation to president Trump uncertain fate when he muttered these words in marble linings “If we had had confidence that the president didn’t commit a crime we would have said so” Read More Secret of Indian PMOmkareshwar Jha, 14. June 2019In India we got our new Prime Minister last month. We all celebrated world's largest democracy fest. That huge population came out from houses to celebrate the liberty they got. Our Prime Minister did really well & remained the face of leadership. Read More Should we be afraid of ISIS?Marton Jasz, 19. June 2018Nowadays due to several terror attacks in Europe, terrorism became a quite popular topic amongst European politicians and society as well. But are they really a threat to the public? Read More Six Nigerian governors in the rerun battle to retain office ...Alfred Olufemi, 20. March 2019The supplementary poll is perceived to be a second chance for the embattled Governors who lost in the first contest although analysts posit that the supplementary may not affect the earlier announced results.This reporter takes a cursory look at the political background of the six governors, their opponents and some events that shaped their fate. Read More Some thoughts on BuddhismNiroj Bhandari, 17. September 2017Are you a Buddhist? This is the one of the questions, I have faced multiple times. But before answering the question lets go into deeper what the word means. Buddha, a person who has attained spiritual realization or in Theravada or Mahayana practices nirvana; first a person who practices or is concerned something, or hold certain principle or doctrines. Read More State police: a panacea to security deficiency in NigeriaAbiodun Jamiu Sulaiman, 01. July 2018Like a rock in the middle of a lake, forever cooled by flowing water, I do know the sun's hotness that burns and dries up the open land. With saddened pen I write to console the soul of those who have lost their promising lives and have had their lives at stake due to the security imbroglio and challenges facing the country like flies that failed to desist from the wound of its keeper. Read More Strategic Lessons from South Korea for the Development of Zi...Mthandazo Khumalo, 17. June 2018Korea’s success presents one of the biggest economic development histories across the geo-spatial temporal divide. It should be noted that Korea is an outstanding case because of its rapid development from being a poor to one of the most outstanding big economic powers in the world. Since Zimbabwe has been less successful in fast-tracking its development as well as integrating into the economy of the world, it is important for the country to draw strategic lessons of the remarkable success of Korea. Read More Teenage Pregnancy, The Way ForwardFrancis Ametepey, 17. July 2017Teenage pregnancy is defined as an unintended pregnancy during adolescence. This type of pregnancy takes place between the ages of 12 to 19 years. Read More The aftermath of "Mera Jism, Meri Marzi"Maria Makki, 11. April 2019In the aftermath of women's liberation march, which was termed by the masses as futile and unethical, Pakistan faces a dilemma when it comes to gender equality. We are faced with issues like child marriage, domestic violence, wage gap and harassment. Can we really brush of these crucial issues like this specially when we are going through an unprecedented economical and cultural shift? We need to acknowledge and resolve these issues first. Read More The Alabama Abortion ban vs. The Jane Roe historic judgments...Dickson Eyinmosan Jnr., 24. May 2019Placing an outright ban on abortion and criminalizing the act with a life sentence penalty to health practitioners, the state of Alabama negatively and unkindly invokes the Texas abortion ban which contradicts the fourteen amendment as well as the Bills of Rights. This policy makes it even harder for women with little or no resources to have access to good Medicare in time of want. Read More The Argument against “Government Knows Best” - T...Nana Kwaku M Asamoah, 05. April 2019The free market with its demand and supply mechanisms interact with one another to determine the prices of commodities. However, now and then, the government may intervene in the market with good intentions but this more than often hurts the very people the government set out to protect. Read More The Dividing Allegiance: A Never Ending Paradox of Geopoliti...Jawwad Shadman Siddique, 08. July 2019What do the Indian and Pakistani governments have in common? Both claim to love the Kashmiris. But the two countries that have fought three wars over Kashmir since partition in 1947 have a funny way of showing their love. Read More The Effects of Political Violence on Social Development in N...Tochukwu Benedict Ezeifekwuaba, 29. June 2018In the present decades, Nigeria has been heard on News for its various unnecessary reasons of the unprecedented political violence which has transpired in various parts of the nation but with precise dominance in the Northern regions of the country. The current trend of social violent incidents was the mass killing of almost One Hundred security officials in Kwara State, Northern Central Nigeria by an Armed Local Secret referred in local jargons as “Ombatse” (entailing “we have come”) cult groups on Thursday May 7th, 2013 (Onwubuiro, 2013). Read More The Golan: Peace in our Time?Matan Barak, 25. June 2017One of the major conflicts that have yet to be dealt with in the Middle East is the Israeli-Palestinian conflict. Our readers most likely know how it is from the events in recent years, at the minimum through buzzwords; Hamas, Fatah, Gaza, West Bank, Israel, Defensive Edge, et cetera. Read More The Lavish Life Style and Distortion of Development PolicyMaulline Gragau, 26. June 2018Public Administration and development, like peace and war, are the opposite side of the same coin. They cannot be treated in isolation or separated. Responsive leadership and economic growth should be used as the means of promoting and sustaining human development. Read More The Leadership Scourge in Nigeria And Africa - A Push for a ...Esimaje Michael Onoseme, 20. May 2019The militarization of the electoral process is a disservice to our democracy and a throwback to the jackboot era of military dictatorship. In some areas of the country, such as, Rivers, Akwa Ibom and Imo states, troops deployed for the elections turned their guns on the very citizens they were meant to protect. This is condemnable and should not be associated with our electoral process in the future. Read More The Muller Report: What if Donald Trump is impeachedDickson Eyinmosan Jnr., 30. April 2019"If we have confidence after a thorough investigation of the facts that the president clearly did not commit obstruction, we would so state. Based on the facts and applicable legal standards, we are unable to reach that judgement. Read More The Obstacle of Indonesia’s Infrastructure Development...Dinda Dewinta, 24. January 2019Over the past few years, infrastructure has been the star of Indonesia’s economic growth. Decent infrastructure is an important element in development in Indonesia, which has more than 17,000 islands. Read More The Philippines In DenialGavielle Gerico Cruz, 03. May 2019The desolate truth about the Philippine's stagnation: "We blame it on our leaders. We continue to rally for a problem that we’ve caused all along. We continue to create that zone of comfort that’s been keeping us and will keep us asleep of reality longer than the colonial times of our country—our contentment without consideration of others and the future, our denial of the truth." Read More The politics of party defection in NigeriaDickson Eyinmosan Jnr., 09. August 2018The Nigeria political mileage dates back as far back as the historical fact file of the nation anchored greatly on noble ideals and sacrosanct premises. Her politics of defection and cross carpeting prior to her modern day practices hinges greatly on ideological based principles eschewed in nobility and standard best practices. However, the reverse now seems the case with the advent of an unwittingly political construct which invariably places individual whims over service and commitment to the people. Read More The Power of Volunteering For Sustainable DevelopmentFrancis Ametepey, 29. May 2017It takes giant to make decisions on volunteering at this era of unemployment crises.Young people can only make a life out of selfless devotion in volunteering than to be money conscious. The decision to leave your comfort zone and stay with people of Different background is a bold decision that only dedicated and passionate young people can make. Read More Theresa May and the Brexiteers Dickson Eyinmosan Jnr, 15. December 2018After several attempts with EU leaders and recent visitations to the Hague and Brussels, getting all parties on the table and reaching a positive deal has remained a hard nut to crack as she struggle along with her Brexit policies even among her own MP who now find it difficult to buy-in on her deal. Read More The Rhetorical LetterMuhammed Tekanyi, 14. July 2017The article is a rhetorical letter to the African leaders on the wrong prioritization of their national budget spending. Read More The role of food wasting on starvation-descriptive studyAdan Bulale, 05. July 2018Do you know that 1.3 ton of food is wasted every year across the world, the main reason behind it is that those who are wasting don’t believe that the human needs for it, the industrialized and developed countries waste more food than developing countries, and many agricultural lands across the world are turned into industrial lands, in addition, 1 billion people in the world use less food than the rate they required and other 1 billion people use more food than the rate they actually needed, unfortunately, these actions are causing acute starvation Read More The Saudi-Led coalition and the reports of war crimes in Yem...Dickson Eyinmosan Jnr., 08. September 2018 “I was one of the first to arrive on the scene, seeking to rescue the wounded; I lifted a body and I found that it was Ahmed’s face. I hugged him, he was my son,” -.Hussein Tayeb. A parent who mourn the gruesome death of his two sons,14-year-old Yusef, 11-year-old Ahmed and nine-year-old Ali after a Saudi airstrike in Dahyan hit a school bus conveying children to school on 9th August, 2018. Read More The Seldom Heard Case for MutualismEwan Bolton, 25. September 2017We hear many labels chucked around the political arena these days -- Socialist, Conservative, Alt-Right, Classical Liberal, Anarcho-Communist etc. But one rather niche title goes unuttered:Mutualist. It doesn’t deserve this silence, because it is a great unifier of left (or perhaps far left) ideas, while still maintaining several key aspects of the current economic model. Read More The top 2%Omkareshwar Jha, 15. March 2019Well its interesting to note that most of us are interested in knowing about the top 2%. Do you know why?? Because top 2% are continuously reading about rest 98%. Yes, they do. They do show us the path of progress that we're going to follow for rest of our lives. Read More The Trumpian EthicsIdiongomfon Clement , 11. June 2018The United States is a federal republic in which the president, Congress, and federal courts share powers reserved to the national government according to its Constitution. The federal government shares sovereignty with the state Governments two political parties, the Democratic Party and the Republican Party, have dominated American politics since the American Civil War. Read More The uncertainty of BrexitDickson Eyinmosan Jnr, 25. January 2019The Irish back -stop is an insurance policy which prevents a harder border control on the Island of Ireland. This is meant to prevent a re-emergence of a harder border on the Island after Brexit. A contrary option will no doubt plunge the UK on a tight economy corner which invariably might hinder economy growth and fast pace social reconnaissance. Read More The Untapped Potentials of Youths as Agents of Sustainable P...Dejen Yemane Messele , 27. January 2019Youths have been erroneously perceived as agents of violent conflicts, instability, chaos and insecurity since ancient epochs. Such pessimist views attributed for the less participation of youths in the peace building process of nations. Predominantly, the problem is ubiquitous in Africa and Middle East regions of the globe. Read More The Venezuela Crisis and the dictatorial rule of Nicholas Ma...Dickson Eyinmosan Jnr., 22. September 2018The Venezuelan situation has continued to grow from bad to worse since 2014 when the GDP growth decline to -3.0%. Indeed, it was a moment of gory like situation when the IMF projected an all time inflationary rate due to hit 1 Million % at the end of 2018. Read More The Venezuela Uprising Dickson Eyinmosan, 16. February 2019From hyper-inflation rate index to an absolute devastation of the Bolivar currency, the economy calculation on until 2015 have continued to be bedeviled by gross negative indices tripled by the unending political miscarriages largely responsible for the worsening state of the socio-environmental hardship. Venezuelan's have painfully and obediently endured series of political ineptitude, gross economic annihilation, social discomfort, and a debilitating state of leadership failure. Read More To FIGHT for peace does not mean to CREATE oneValeriia Tsytsyk, 26. June 2018If history teaches us to find and keep peace, and if upon reviewing all the terrible conflicts, battles and wars, we start to feel terrified and sorry for those people who were in the middle of painful events, why do we not stop? Why do we develop and create more and more strategies, new equipment, and greater means to deliver violence to harm each other? Read More Trump and the border wall security equals a govt shutdown Dickson Eyinmosan Jnr, 02. January 2019This is the third time the Trump administration will be presiding over a shutdown in 2018.The first government shutdown began at midnight EST on Saturday, January 20, 2018, and ended on the evening of Monday, January 22. A second funding gap occurred on February 9, 2018.A third shutdown began on December 22, 2018, and is still ongoing which definitely may drag through the Christmas holiday Read More Trump, Putin versus earthDickson Eyinmosan Jnr, 20. December 2018"Climate is not the only stressor on the Earth system—other factors, including resource depletion and ever-growing human consumption and population, are exerting enormous pressure on nature’s and society’s resilience to sudden changes"-NRC reports Read More Unleash the power of our mighty pensEdrell Cabatbat , 14. February 2019The public becomes a school of fish that devours the noxious bait of those behind the proliferation of these fakes that are crafted closely on the borderline of illusion and bigotry. Read More Wealth from Waste: Poverty-Environmental conservation nexusHenry Kazula, 17. September 2017As it has been stipulated in the Tanzania National Environmental Policy (1997) that; there is clear cause-and-effect relationship between poverty and environmental degradation. Environmental degradation is ascribed to widespread poverty-equally; poverty is habitual cause to environmental degradation as it undermines the capacity of people to manage resources wisely. Read More What makes Kazim Shah stand out among all the candidates con...Muhammad Attique Shah, 13. July 2018The article discuss the criteria on which a candidate shall be evaluated. After reading the article residents of NA 212 will easily be able to evaluate each candidate. It answers the question and compares others candidates with Mr. Kazim Shah. Read More What youth unemployment could lead toDodou Touray, 24. May 2017Youths forms an indispensable section of the country's population. Despite such claims, this vulnerable group have continued to face the havocs of persistent unemployment, with serious neglect and underemployment. It was the time that such conquences led the youths to venture into actions best known to themselves, as a matter of meeting their desires. Read More Who Are The Leaders Of Tomorrow?Alhaji Yusuf Yusuf, 15. June 2018Every successful nation attaches more importance to the growth and development to its youths. The deliberate determination of a nation to upgrade the lives of its youths must be a major concern of the leaders, but in Nigeria, reverse seems to be the case, Nigerian leaders do not show concern for the well being of its entire citizenry. Read More Why do some countries remain poorer than others?Mthandazo Khumalo, 09. July 2018Some countries around the globe are in an economic condition that does not allow their citizens to enjoy basic services or satisfy their basic needs such as food, clothing, housing, education, healthcare and so on. Read More Why Is Somalia the Most Corrupted Country in the World?Ismail Hassan Mohamed, 17. February 2019Somalia has ranked as the most corrupted country in the world, with instability and restricted press freedom as factors hindering transparency in the Sub-Saharan African nation. Why Is Somalia the Most Corrupted Country in the World? Read More Why Ugandan Yoweri President Museveni is Here to StayMaulline Gragau, 16. May 2019Last week, I was intrigued when I read about a protest that had been organised by diaspora Ugandans in London with the support of two British Parliamentarians, Paul Daniel Williams, and Alex Sobel, who represent Stockton South and Leeds North West constituencies respectively. The main objective of the protest was to condemn Ugandan President Yoweri Museveni and call on the British government to halt its support for Museveni's regime. Read More Why you should attend the Youth Connekt Africa SummitOkash Mohamed, 27. November 2018Youth Connekt Africa is an annual international summit which was launched in 2017 by President Paul Kagame of Rwanda. Originally, the summit was on a national level to create jobs for the young people, change their mindset, provide training and mentorship opportunities for start-ups, to pitch business ideas, and to build a networks since then in spirit of pan Africanism, Rwandan young people and their Government realised to expend the scope of youth Connekt and build youth Connekt hub in Kigali for all the whole of Africa and beyond the continent. Read More Youth Agenda in Urban Planning in YangonAr Kar Htet Lwin Oo, 23. May 2017What is agenda for youths in urban planning? Youth section are losing here? Don’t ignore youth! Can't develop without youth. Give opportunities to youth, Cooperate with youth, that the best way in urban planning. Read More Youth As Leaders of TodayKenechukwu Ugoh-Ezepue, 25. May 2018The age-long adage which says "Youth are the future of tomorrow" is fast becoming obsolete in this our modern age as youth are championing a paradigm shift towards the way our modern society look at them. Read More 5 places which you need to visit to understand what Ukraine ...Anna Kontseba, 06. July 2018Every country has its own appearance, soul and habits. To find out country’s soul we can read books, watch TV shows or read its news. To know more about habits you need to communicate with people, understand their values and lifestyles. Read More 7 Empowering Women Of IndiaMohit Bansal Chandigarh, 08. July 2019Women empowerment has become one of the biggest movements in India nowadays and many Indian women have proven to be the building blocks of the movement. With their pure passion for their work and their good deeds, they are very well a true inspiration for everyone. Read More A Bite of FriendshipMary Joy Orola , 14. July 2018It's an amazing world, ours, filled with diversified expressions that make us up, either deliberately or without notice. Relationship is one important live wire of humanity and friendship is a branch of it that cannot be underestimated, even with the hurts that accompany it sometimes, because in all everyone needs someone to call a friend! Read More Active Euthanasia - A moral conundrumAshna D, 14. November 2018In the light of the recent judgement of Common Cause v Union of India, various opinions surrounding the moral debate on euthanasia were brought to the forefront. While holding that every individual has a Right to Die with Dignity, the Apex Court laid down the law relating to the legalization of the practice of passive euthanasia. Active euthanasia however, still remains illegal. Read More A Life Shared By Many, Noticed By FewAaron Jay Quitain, 10. June 2018It may seem common, since there are a lot of individuals who share the same lives but it is undeniable how absurd our society has become. Wherever you are in the world right now, have you ever pictured yourself living in a place that is a lot worse than where you are now? Read More All Our Mistaken IdentitiesFrancine Beatriz Pradez, 23. July 2018We wear the traditional costumes befitting a Filipino, we dine on gastronomic delicacies of our ancestors and yet who are we as Filipinos? Are we the nation colonized by Spain, the United States of America and Japan? Or are we the nation who withstood the oppression caused by Martial Law and ultimately inspired the world through a bloodless People Power Revolution? A national identity is as imperative as establishing who you are as a person; it is a motion brought forth by the entire citizenry to feel a sense of cohesive wholeness and it is high time that we start discovering who we are today. Read More A look at Christopher Nolan’s twenty Hollywood YearsMuhammad Farooq Rasheed, 08. December 2018Actors and singers having a global fan-following is a norm but if a film-maker is popular in the public domain, there is something to ponder here. Well, it is true for the British-American Hollywood director/producer Christopher Nolan who is among the most acclaimed and influential filmmakers of the 21st century. Read More Analyzing the impact of Peer teaching on Academic skills of ...Aisha Ansari, 17. June 2018Teaching is considered to be the responsibility of a teacher. But will it be helpful in learning as well as getting good grades, if a friend or fellow teaches? As it is known that University demands self-directed learners and being new in University environment requires an enormous struggle to survive. This study aims to address the impact of peer teaching on academic skills of beginners in a University of interior Sindh. Read More Artistic wonders in the Frari Church and the Scuola di San R...Kunal Bansal Chandigarh, 01. July 2019Venice has abundant art treasures. Many cover the walls of the city's elegant gallery, the Accademia, but the best still remains in the places where they were painted: the churches and palaces of the Renaissance. This is an excellent guide to Whatsonwhen's favorite masterpieces, yet to be found in their original homes. Read More Be happyMahmoud Fakhry, 14. December 2018 If you were looking for sadness then welcome to my world, if want fake smiles then welcome to my world, if you are looking for any un-honest, non-coming from the heart then hello to my damn world. Is that a little aggressive? I don’t care. Read More Biblical principals of prosperityMeshach Idoko, 24. June 2018These biblical principles of prosperity are available to all, they are effective and work powerfully for every child of God. Knowing these principles and working by them gives you access to your prosperity here on earth. Read More Black is BeautifulChristopher Tawiah-Mensah, 13. June 2018"Papa, the white kids in my school always laugh at me. They keep calling me blackie" She couldn't harbor the itch any longer. Her puppy eyes held at Papa with tears rolling down her cheek gutters. Her school bag, dangling lazily over her right shoulder as if it never cared- but it too was black. Read More Building People, Smashing StereotypesFrancine Beatriz Pradez, 03. June 2019Across borders, gender stereotypes still are a prevailing form of discrimination that belittles people and sets limits for them that prohibits them from reaching their ultimate potential in such a way that should be culturally unacceptable and nullified as we achieve a modern state of living. More than ever, gender stereotypes present a challenge towards achieving unity and understanding disparity which is what this article hopes to shed light on Read More Bullying as Dominance Behavior, or How to Run Away from the ...Valeriia Tsytsyk, 05. June 2018Go out at any time to any place and I am sure you will not be hard-pressed to find at least one example of people trying to have power over others. Regardless of how awkward for some people it may sound, our world is based on alpha male mentality. We constantly try to take power, beginning in childhood. However, sometimes this impulse may grow into something negative or even dangerous – bullying. What is bullying, and what strategy is best for getting rid of it? Read More Catastrophe Underlying Industrialization (The Rampal Project...Jawwad Shadman Siddique, 07. October 2018The government of Bangladesh has been trying best to take Bangladesh to greater heights. While doing that, they have undertaken some massive projects. The Rampal Power Plant Project is one of them. This project would provide a vast amount of energy and help to overcome the crisis of electricity generation. Read More Catching a glimpse of purpose (How I fell in Love with Adole...Victor Oyelade, 30. March 2019Sometimes all we need to catch a glimpse of our purpose is to travel to the extremes of the earth – those places most people will not go due to disease infestation, poverty and underdevelopment. You never know, your purpose might be right there, just waiting for you to come get it! Read More Child Marriage in Indonesia : Do We Have To Support It?Agnes Kusuma, 28. May 2018Imagine yourself as a 16 years old girl who has a dream of becoming a lawyer, a doctor, or an engineer. But, suddenly you are asked to marry a guy who you don’t know who he is. You don’t have any choice. You should accept it, for the sake of your family’s condition. Or maybe for the sake of custom in your region. When you want to reject it, people will say that government has been allowing a 16 years old girl to get married. Again, you don’t have any choice but get married with your soon-to-be-husband and throw your dream away. Read More Child sexual abuse malediction of modern societyIbrar Ahmad, 18. June 2018Human being’s life is array of multiple facets. Major phases of them consist of childhood, adulthood and old age. Every phase has got specific sequels and problems depending on the vulnerability of the individual in respective phases. To me the most liable phase of human life is childhood. Read More Comfort zone. Do you need to go out it? Anna Kontseba, 11. July 2018What is the comfort zone? Why do many people affirm that you have to go out from your comfort zone? What to do if you can't go out it? Read More Comprehending Sexual Violence in Armed ConflictTochukwu Benedict Ezeifekwuaba, 09. December 2018Sexual violence has been firmly placed in the internal theme of the humanitarian community. Regardless of the commendable advances in both practice and policy, there is still a continuous gap between the reality in the field and what is recommended. Read More CONCEPT The great new YPPO ProjectFabian Schneider, 15. May 2017CONCEPT aims to deploy probes in distinct ocean cycles to continuously measure various parameters possibly influenced by climate change. The measured data is transmitted daily to the YPPO server and visualized on the YPPO front page in real time. This publically accessible data will allow you to follow ocean dynamics. Read More Cultural Background of Indus valley civiliansTajdar Adil Ali Mahar, 31. August 2018A fascinating article that shows how old excavation records together with recent computer modeling techniques can be used to show how a constructed space changed over time, and how that evidence can speak to larger issues in a society. As the author puts is, "digital re-visitation of early archaeological datasets, enhanced with improved theoretical frameworks, can reveal the broad range of socio-political configurations that emerged among the world’s earliest cities and states." Read More Cultural exchange of Ukraine and Nigeria: interviewing Anna Kontseba, 24. June 2018Today you have an opportunity to learn more about Ukraine and Nigeria and values of citizens in these countries. You can also read what Nigerians know about Ukraine and what Ukrainians know about Nigeria. Moreover, you are able to compare two cultures and find out the feelings of Nigerian who has come to Ukraine. Read More Cyberbullying: the new global demon in public healthVictor Oyelade, 26. August 2018The advent of the internet in the 90s has been one of the greatest inventions of modern history, if not the greatest. E-commerce, Blockchain, E-banking, Social media have certainly improved our lives. Read More Difference between people because of the age: the problem of...Anna Kontseba, 17. June 2018What do you know about the problem of generations? Have you ever heard about quarrels between young and old people or encountered with them personally? Do you know what role this phenomenon plays in Ukraine? Find out reasons of this problem and how to avoid it. Read More Disability is not inabilityNasir Ali Khan, 21. October 2018In this world some people are born fit and fine where some people are born with disability. It is not in our hands that how to get birth without disability but it is surely in our hands to make our disability our strength rather to make it weakness. In this world, many disable persons have got success and many able persons are left behind. Read More Discrimination: A perspective on bigotry in BurmaEaint Wutyee May Moe, 27. July 2018“Daughter.” My twelve-year-old self glanced up from her phone, one hand on the doorknob. “You can’t wear that to tuition. There are men there.” I frowned, looking down at what had, until now, seemed like a perfectly fine dress. Read More DivisionJubilee Floren, 17. September 2018Since we're kids we are taught by our parents of about the beliefs they had, and as we grow older we will meet different kinds of people with different beliefs through that our differences can't be denied. Read More Drug Addiction is Deadly Mohamed Okash , 15. January 2019 Humans love drugs because of its addiction; they sell their health, their souls, and their physical organs even their own children just to get to their beloved narcotics. Globally, 3.3 million die each year for the use harmful alcohol and some 31 had drug use addictions (WHO, 208).Putting place a restrict rules is inviable to reduce and prevent the growing number of the young people effecting the drugs. Accessible Drug tests should be widely used in Work Places, schools and college and many others places in order to limit the drug usage and its addiction. Drugs are dangerous and deadly. Read More Drugs as fashionNasir Ali Khan, 10. September 2018Drugs have spreaded in the nerves of most of our youth. Our youth consider drugs as a fashion. Most of the youngsters feel proud and overwhelmed while wearing Rolex, expensive clothes and taking drugs. No doubt drugs give the relaxation of time being but the consequences of forever. Drugs causes so many diseases like: mental illness, lungs cancer, mouth cancer and many more. Read More Ecstasy through EmpathyBianca Ysabelle Baldemor, 29. November 2018With all these grinning going on in the world, it really does beg the all-important question: Is smiling contagious? Have you ever wondered how you could make someone’s day instantly better? Do you think of doing extravagant things such as treating that person his or her favorite food or maybe as simple as cracking a corny joke? Read More Ecumenical BrothersNithin V Rajan, 26. June 2018Reading through the first book of the Bible, from chapters 25 to the end, we see the history of the twin brothers. Genesis 25:21 records “Because Rebecca had no children, Isaac prayed to the lord for her” God answered their prayer with a bonus of twin boy babies. Read More Effect of Political Instability on Entrepreneurship and Econ...Noor Fatima, 01. July 2019In the societies with poor democratic norms, i.e. in many countries of the world, political instability is the most horrible phantom that swallow up all business forecast, time management, targets, resources, encouragement, decision making powers of entrepreneurs. Read More Empowering People in the Academe to use Social Media on a Da...Francine Beatriz Pradez, 24. May 2019In light of the #Cancelled trend and the toxic environment that social media posits, how do we encourage educators and students alike to utilize social media and technology to aid in delivering and extending the kind of education that we envision from inside the classroom towards the confines of our own homes. Read More Enable, inspire, influence!Pranav Mohla, 03. July 2018The impact of our activities run far deeper than the eye can see. What is it about leadership that makes it so much harder to define than the attributes so often associated with it? Read More Essay Writing Services: Unethicality in LegalityGavielle Gerico Cruz, 08. May 2019Essay writing services are online websites arranged by anonymous writers that offer a wide range of service. With just one click, you can have your essays made for you, and you can continue on with your normal life without having to worry about your paperwork. In today’s world, the usage of these websites have dramatically soared. But the question remains: Is the practice truly ethical? Read More Facebook as a symbol of Vietnamese Pop CultureAnh Vu, 06. June 2018All in three countries following the Communism, China banned Facebook under ist censorship policies, only 40% Cubans (in total of 16% Cubans have access to the internet) have a social account while not clear if it’s always active, While in Vietnam; in 2018 my country is ranked 7th (*) just after India and US with 53,72% citizens using Facebook and there’s no doubt to say that the young Vietnamese are now eating, drinking, sleeping, selling, buying and updating the information that they care just around the Facebook corners. In this essay, I desire to discuss some points about the idea that “Facebook in Vietnam now can become a symbol of Vietnamese’s dream to be rich and freedom of speech”. In another word, if you think about Vietnam then it’s better to recognize Facebook as one of the universal pop culture symbols of Vietnam Read More Face Reality, Need WipesCristian Jay PiÑOn, 09. June 2018“No, this can’t be happening!” The loudest scream furiously yelling inside my mind. The humble protest with the kind of life – POST. LIKE. SHARE, I got from a lot of users. Read More Family licenseValeriia Tsytsyk, 10. November 2018Even though the main topic of this article is parenting and issues connected with it, it is not dedicated to parents anyhow but, on the contrary, to those who are just entering “an adult” world full of traps and pitfalls. To those who will decide how the destiny of the following generations will look like. To those who are the decisive start point. To you, who with the help of own wise actions can change the chain reaction of the previous generations. Read More Fantastic Readers and Where to Find ThemFrancine Beatriz Pradez, 11. June 2019 This generation has everything at their disposal and yet are plagued by multiple matters and distractions all at once that makes it harder for them to sit down and focus on one thing. But if anything is a guarantee, it is the understated fact that this world has never ceased in its supply of fantastic readers , it is simply a matter of time to find them. Read More Fibres Of Nightmare Siddiqa Magar , 08. June 2018Afterwards, I just didn't sleep. Preoccupied with the cold sweat of a tensed content, trying to sort out and make sense of the silence and secrecy surrounding abuse. A muffled scream darted with an overwhelming sense of sadness, feasibly mingled with anxiety, guilt, exhaustion, and numbness. Undoubtedly questioning my own identity. Read More FlowersMalik Saad, 13. December 2018This article is based on the status of women in our area. The enchanting scene of flowers in the deserts is eye caching due to the blending and contrast of the colors. The Kaleidoscope of desert would never pass into nothingness because of fascinating and vivid colors of flowers. It is the mystic phenomenon of nature. Read More For God's Sake..!Apurva Mane, 29. November 2018 "He was not on the Cross of the Christians. I went to the Hindu temples. In none of them was there any sign... I went to the Kaaba of Mecca. He was not there. I asked about him from Avicenna the philosopher. He was beyond the range of Aviccena... I looked into my heart. In that, his place, I saw him. He was in no other place.." Read More From the Rock-bottomFebeto Potutan Jr., 19. October 2018Writers are made, not merely born. Others may see your flaws on how dumb you are at making sentence construction, how slow you are at understanding grammar and how poor you are at making imaginations but don't let them hinder you from glittering in doing what you can do— when your time comes to bloom, I'm pretty sure you're a beautiful one. Read More Gender equalityScholar Anayoezeh, 04. June 2018When men are accorded great respect, women should as well. Gender equality in Nigeria. The way forward. Read More Gender Equality and Women EmpowermentAnubhav Harsh, 11. March 2019Women empowerment is the ultimate need of the hour to witness the ideal notion of gender equality in the world. Gender equality is, first and foremost, a human right. Anyone in this world, is entitled to live life with dignity and freedom and without any kind of fear, regardless of gender. Read More Girls are the best gift for parentsAditya Kumar, 19. August 2018We often hear about girl’s struggle that how they are discriminated in society and family. But this is that side of the coin which we know and there is no need to describe the history of it. I would like talk about another side of the coin which may bring change in the mindset of people. Read More Globalization – Negative or PositiveTochukwu Benedict Ezeifekwuaba, 29. November 2018What is Globalization? Globalization has become an overused expression. However; users of the term disagree violently at times of its repercussions. Many believed that it can potentially lift and that it has lifted a lot of individuals out of poverty completely. Read More God and our free willImran Ali Laulai, 15. October 2018God is the Creator of the universe who yearns for us to know Him. That is why we are all here. It is His desire that we rely on and experience His strength, love, justice, holiness and compassion. Read More How Boarding Schools Prepare Students for Studying AbroadMohamed Emad, 03. April 2019Go live with a complete bunch of strangers. Go leave your entire support system of family and friends behind. Go learn how to deal with a mountain of unfamiliar situations all by yourself. If you think about it, it’s not much different: Boarding school is just a mini-version of studying abroad. Read More How Great Thou ArtChristopher Tawiah-Mensah, 14. June 2019How beautiful is the mind's eye? We connect dots with acrylic and canvas, understand the meanings behind the curves and crevices. Nod our heads to the smell of oil paint on the antiques at the gallery, but fail to comprehend that a white flag does not only signify victory, but an act of surrender too. Read More How incessant robbery attacks poses security threat to Niger...Alfred Olufemi, 24. January 2019Residents of Ile-Ife, Osun state of Nigeria, have been assaulted, sustained injuries and lost valuables to Incessant cases of robbery attacks. The menace has been on the high side in recent times, Alfred Olufemi can report. Read More How the three years of MasterCard service changed the lives ...Adan Bulale, 05. July 2018Somalia locates the horn of Africa, sadly to say, it is one of the poorest countries in the world, missed formal banking since the fall of the former regime 1991. Back in that time, the people of the country have been using informal banking. Read More Humanity - a mere word or responsibility?Apurva Mane, 29. April 2018Most of us don't get that gravity of pain from which these girls and their families are going through. Religion was not their choice, being a girl was not their choice, being alone in that place was not their choice. None of it was their choice or fault. But the fact that we can give them a choice is on us. Read More I don`t need YOU! pt. 2Mary Joy Orola , 21. January 2019'No man is an Island!' This saying has been used and passed on from one human civilization to another. It is so because man was not meant to be an island because the world where in we are planted is relational and anything otherwise is regarded an aberration! Read More If diction and captions are hard to believe...Siddiqa Magar , 09. August 2018Initial struggles of amateurs overpowered by self belief and endless love for words. Read More If you could live anywhere in the world, where would it be?Anna Kontseba, 22. June 2018If you could live anywhere in the world, where would it be? Let’s find out what Ukrainians have answered. What has influenced on their opinions? Why is it important not to hurry up with vital decisions? Read More If you have fire learn to become the sun!!Omkareshwar Jha, 27. October 2018If you have the fire, learn to burn yourself and there the life wins. If you have the fire; learn to become the sun. So am I motivating today "yes" at some extent. Also I wanna make you aware that when you dream the passion comes in. We as dreamers have fire in our hearts, it beats and it beats inside you. Read More Image-actionChristopher Tawiah-Mensah, 19. July 2018I see you don't trust me. No need to worry my head over that. You don't trust anyone but yourself. Maybe I'm way too honest- my bad, I am a Taurean. That's what gets me into trouble these days. Our past has the present looking like a fresh murder, a typical prototype of the scars we hide under our clothes. We pin the pains and dim the paints of our hearts and swear to never be taken for granted ever again; engraving marks on walls and soils to seal them. Read More Image-Action: FathersChristopher Tawiah-Mensah, 03. June 2018If we understood that a man's actions are only a product of his mental image, we would not only heal the world and our communities but free ourselves from many insecurities. For a man of violence would forever communicate in anger and hatred, fighting off even the shadow that lurks on the walls but forgetting that he stands in front of a source of light. Only if we knew that a man's actions are but flesh to his mental imagery. Read More Influence of mass media on society: an islamic point of view...Yasir Ibrahim, 28. January 2019This article looks into the problem emanates from the mass media and how it affects our religion.Mass media is generally known as the channels through which messages are sent and received between the sender and the receiver. It involves the use of different technological processes that facilitates effective communication between large number of people. The mass media is a fundamental part of our contemporary life saddled with onerous task, as one of the agent of socialization. Read More In need of a Need!Mary Joy Orola , 14. May 2019A popular cliche reads, 'The need of man is insatiable'. As true as this fact seems, it is a gullible catalyst for unnecessary amassing of debris that will eventually kill man; only one thing is needful... Read More I saw you againJubilee Floren, 14. February 2019Can someone notice a lonely Girl? Don`t lock yourself up in your room, open it and you`ll see the light you`ve been seaking. Read More Is "every child is special" a myth?Parthasarathi Kar, 22. September 2018Potential is a word which finds its mention in many of the books.As a physicist would define in simple words, Potential energy is the energy possessed by a matter because of its position. In layman term, potential defines the limit of any matter. In our day to day life we measure the potential of every substance but while doing so we get so engrossed that we start measuring the potential of a kid, a child, a man, a being. Read More Is Youth Really Derailing?Zirgham Hamid Zaki, 28. June 2018The Youth isn’t derailing from the mainstream rather it’s the mainstream which has changed its course. Calling Youth Derailed is a Sin and if I talk about it from the legal point of view, it is a Libel on human nature of Indian Youth. Read More Just don`t quitAbiodun Jamiu Sulaiman, 20. June 2018No one is a loser for being defeated; everyone is a loser for quitting. Is life so frustrating that you navigate your mind towards the shore of quitting? Is it a long-term pursued contract you lost that make you look outworn and dejected which make you want to quit? My brother, you can do it, you can live far above expectations, just don't quit. The downfall of a man is not the end of his life. Read More Lamjung Climate ConvergenceKushal Naharki, 25. September 2017Lamjung Climate Convergence brought enthusiastic youths to discuss on climate issues and involve youth to initiate climate awareness programs from Local level. Read More Leading Across Cultures Requires Flexibility and CuriosityImran Ali Laulai, 18. October 2018When you go and visit people in the different cultures, you hear that they’re talking about the same common agenda, and beyond talking the same language, you get a real sense that this was happening spontaneously. Read More Letter To The Men and Women of Our Society Idiongomfon Clement, 14. November 2018Are young men feeling intimidated by the series of #MeToo 's? Conforming to the standards of the society makes as person less of a sociopath, having more of self-respect and respect for others, and especially in the contemporary society. The society has been so defined in a way that in fact, it dictates our very thoughts. Though it is often said, 'actions speak louder than words. Arguably, you can't act what you've not thought on no matter how quickly the response Read More Let the Sun ShineMuhammad Bilal Tahir, 01. December 2018Mental Illness is something greatly ignored. Lets use the art of poetry to expose the villains who cause mental illness. Lets use it to fight against mental illness Read More Love and compassionImran Ali Laulai, 28. November 2018A world with loving, compassionate people will make for a better, caring, and encouraging society. These acts of kindness can keep yourself, help you protect other people, and boost others and one’s self confidence. Evidence from Night, Flowers For Algernon, and The Fault In Our Stars can support that love and compassion are, in fact, necessities and not luxuries. Read More Meet Fatmata Bintu BarrieGandoh Jay, 25. September 2017Meet Fatmata Bintu Barrie a former pupil of The Annie Walsh Memorial School. She is gifted with innovative skills. Being born in a community where school going children had to stay up whole of the night instead of studying and in order to help their families fetch water for daily use. Read More Mental Illness Among Kids and Teenagers in South Asia - A Fi...Muhammad Tahir, 30. November 2018This article provides the author's point of view and observance of how mental illness grows in South Asian Society. It shares the background of mental illness and how it grows in South Asian society. Furthermore, the article suggests some solutions to fight mental illness in South Asia. Read More Mirror MirrorAnujin Saruul, 21. March 2019 In the past, whenever I had to go on a date or attend an important meeting, I’d usually spend up to 3 hours in front of the mirror. Once the make-up routine came to an end, I would proudly say, “Who can be prettier than this girl?” But my inner mind was like, “Kendall Jenner, Angelina Jolie, Christina Aguilera, Jessica Alba, Kim Kardashian are still prettier than you , HAHAHA”. Read More Mission HappinessBharti Kumari, 16. April 2019Our generation is suffering highly from mental disorders, low level of happiness, and high disappointments must be taken into account. Together, we can make right things happen to make this world better place for each other. Read More Moral decadence: trouble in labour, future in troubleAbiodun Jamiu, 30. August 2018The struggles of man begin at birth much as the ruins of a land and its people begin in their homes. The chemeleon is no food, it commands tears from eyes. Coming from the seat of the Caliphate, I thought my pen would be drown in the puzzle and buzzle of political campaign; the dilemma of old criminals in a duel with new saints. Read More Music As A Mechanism for Social Change in LiberiaJanet M Kamara, 16. May 2019There is a wave of social change sweeping across Liberia since the country ended fourteen-years of brutal civil wars through a comprehensive peace provision that was formerly synchronized by the regional Economic Community of West African States (ECOWAS) in 2003. Read More My Job is to feed a Hungry ChildNana Kwaku M Asamoah, 04. April 2019For a lot of Ghanaians, having an opportunity to give back to society and make a difference in the life of someone is too often imagined as a far-fetched activity, one that only well-off individuals could afford. But the reality is that, a little selfless act such as feeding a person who is hungry will directly impact the very people you interact with each and every day. Read More Mysterious pyramids of BosniaMarton Jasz, 10. June 2018Amateur archeologist claims that he has discovered the world’s oldest pyramids, along with an ancient and advanced civilazation. Surprisingly it has nothing to do with the Mesopotamians nor the Egyptians. But then who are they? Read More My suicide: destroying our planetOmkareshwar Jha, 12. February 2019"Me" when you read this 2 letter word you said yourself. Tell me how it feels like. It's a sucide "my sucide"!! Now tell me how it feels while you read. Who's responsible?? Aren't you too. Read More Narrative of a Yali Beneficiary - A call for youth awakening...Esimaje Michael Onoseme, 09. January 2019My eyperienece as a participant of the Yali RLC Accra Program Online Chort 7 Experience. Read More New Official YPPO Country Representative: IndiaPradeep, 24. July 2017These are my motivation to become the Country Representative of India.My next move is to form an YPPO community in India with co-ordinators from every state and to start designing and executing projects along with YPPO. Read More New Official YPPO Country Representative: KenyaZacharia Ng'Ang'A, 19. July 2017As the country representative of Kenya, he plans to unite youths by bringing them together to form a big, fully supportive, dedicated and passionate YPPO team that will eventually be running projects and facilitation concurrently. Zacharia believes that the youth have what it takes to make things happen and are creative enough to champion the right by pushing beyond limitations. Read More New Official YPPO Country Representative: LiberiaJames Gibson, 09. July 2017James Big-James Gibson is the new country representative of Liberia to bring change to the youths within his country and environment for the world. Read More New Official YPPO Country Representative: NepalRam Neupane, 10. July 2017As a country representative, my immediate plan is to establish a fully dedicated and dynamic YPPO team in Nepal. In the future, I have plans to launch various projects and events to meet the aims and objectives of YPPO. Read More New Official YPPO Country Representative: PhilippinesAmina Shayne, 09. August 2017Being the Youth Planet Protector Organization Country Representative for the Philippines, she aims to create a resilient network of youth advocate from the different parts of the Philippines. Read More New YPPO Country Representative: BangladeshTanmoy Kumar Ghose, 21. October 2017"Connect, Co-create, Collaborate" – I always believe in this theme. Youths are the most precious asset in the developing countries like Bangladesh. Youths have the abilities to bring progress and development to our country as well as to the global community. Read More Nigerian students and social media explosion - gains and los...Abiodun Jamiu Sulaiman, 23. June 2018In a world of increased globalization where happenings in the sphere of human lives spree a boom. The human space become compressed in such a lane that far away seem like home and information travels at trajectory speed that brings human race into a village settings - this is all thanks to digital technology nay social media, a computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks Read More Nigeria Students: silent victims of ASSU strikeNurudeen Akewushola Yahaya , 17. January 2019The article is about the ongoing ASUU strike that disrupts the academic activities in all Nigeria universities and emphasises the effect of the strike on students. Read More No More Gender DiscriminationHina Anser, 13. June 2018I know that most of the people don’t think it as a problem and it’s quite normal for them this is not just the men but also the women’s. According to me, Gender Discrimination is the greatest ethical challenge facing by world today. Because of just someone gender we are getting the right to insult them and treat them like animals. Gender discrimination influences men and women. For the purpose of this article – gender based discrimination by men against women. Read More Not Another StatisticFrancine Beatriz Pradez, 13. August 2018A poem highlighting the problems encountered by teenagers and families within the Philippines. Read More observation of the day Omkareshwar Jha, 01. April 2019Equality is wrong way that is conceptualize in our heads. Equality in rights, duties. Equality of gender. Equality in education & service. Let's explore the truth.... Read More Pilferers of fortune: of the girl-child and sexual predators...Abiodun Jamiu Sulaiman, 18. January 2019It was a shocker. An incendiary bomb was at the verge of exploding. It was an unprovoked outburst of emotions; a spontaneous show of a value-impoverished society. To be sure, I zoomed the content of the news I was reading as I worked my phone through the Cyberspace. Read More Qualities of a good studentMeshach Idoko, 01. February 2019What makes a student good has to do with a lot of factors. But this article seeks to expound on the qualities of a good student. These qualities will improve every student learning capacity whether for a classroom or life. Read More Reality is Stronger than ImaginationDodo Khan, 03. September 2018We are living in a world where a 7-year-old girl is raped on one hand and a girl was killed by his brother because she started working for showbiz while pets have equal rights to live a stable life on the other. Read More Recent Trends in Ponzi Scheme in NigeriaEsimaje Michael Onoseme, 03. July 2018In an economy where it’s so difficult to earn a living, many Nigerians and Youthful Africans inclusive of fellows from my region in Warri, Delta state Nigeria has opted to try out their perceived luck on current ponzi schemes or latest pyramid schemes, with the hope of making huge profit. Read More Role of Mohit Bansal In women empowermentMohit Bansal Chandigarh, 08. March 2019Women are equal to men in every aspect. It is just that both have different bodies and different biological needs. But still she is not provided the environment to speak up about the sexual abuse. Mohit Bansal from Chandigarh is an active socialist who strongly believes in women empowerment. He inspires every women to step out from the shadow of people’ judgement and make choices in the light of their wisdom Read More Searching for God! Enas Enas Saad, 15. June 2018Where is he? How does he look like? Should I even use the term “he” while referring to him? Or even use "him"?! He is so complicated. How does he want us to believe in him? We know nothing about him! Wait for a second; does he want us to believe in him?! So, why doesn’t he just say that?! Why should it be so mysterious that way! Read More Self-confidenceRomaisa Ghous, 20. July 2018Self-confidence is the key to success. Self-confident people are admired by others and inspire confident in others. They face their fears and challenges with courage and determination. Read More Social Media is unrealisticGlenda Huang, 12. June 2018I believe that social media is one of the biggest influences in the world, but if you think about it, does it really influence us teenagers in the right way? Are you aware of the risks and how it impacts your feelings? You say that it helps you keep in touch with friends and get online friends but you might not know it because it is in your subconscious mind. Read More Social Parasites Endangering the Survival of PakistanZulfiqar Ali Ramzan, 22. June 2019Since its inception in 1947, Pakistan has faced various issues from social inequality, political instability, to economic disparity. These issues have been and are still thwarting the growth of Pakistan. Unless social inequalities creating hindrance to the growth of Pakistan are eradicated, peace and prosperity cannot be effectively achieved. Read More Songs Can Have A Positive Effect On Your LifeMohit Bansal Chandigarh, 08. July 2019Songs are more than just a way of entertainment. I can say this because I have experienced it and I want others to understand the same. Different kinds of songs have different effects, however, only if you listen to the lyrics and feel the music properly. The key is to try and listen to the lyrics of every song you come across and then decide which ones make you feel good and create a positive outlook for you. Read More Spill a coffee on yourselfParthasarathi Kar, 28. September 2018Corporate world has its own buzz around it.It is said that with cutting edge technology and cut throat competition the corporate world is becoming mean day by day but guess what we do have a solution to it.In order to diminish this meanness around us, let's make the work space ludicrous, cheerful and enthusiastic and all we need to do is take a moment to laugh. Read More Sports bettingAhmed Shalby , 02. July 2018Sports betting has a unique appeal to it. This appeal is based on the fact that you are not betting in a setting where the house as an edge and shaves something off the top of your earnings. Here, you are dealing with cold numbers, and are in a certain amount of control regarding the choices you make. The major question for those starring is whether this type of wagering can serve up a consistent kind of winning pattern. Read More Sports betting in Nigeria: the growing epidemicsAbiodun Jamiu Sulaiman, 21. June 2018Yes, I agreed, after consultations with heavenly consultants in a marathon Odyssey to pen inspired world, that the 21st century Nigerians has a great deals of potholes to avoid before alighting at their destinations. This generation, I concurred, has been infected with invectives that need immediate revival and exorcism from a diviner or bailout from the world beyond to break off the shackles and menace of social vices and neo-slavery. Read More Still The Way .... Fake Feminists Hira Naz, 29. November 2018The cold spell of the freezing winter was disturbed by the sudden erruption of gun shots at the far end of the valley. Irritated but not surprised I instantly knew a baby was born somewhere and obviously a boy. Celebrating the joy of having a new baby in such zelous way,as far my knowledge, has never been portrayed on having a daughter. When asked I recieved in one or the other way this same response;"this is the way things are, it is a ritual". Read More Still Virgin?! Enas Enas Saad, 04. June 2018Still Virgin? Have ever felt you hate your body? Ashamed of your Femininity and your charms? Well, I have, or I have to admit that nearly every Egyptian or Arabian girl also has felt that way. Every day, you wake up, put on some silly wide loose clothes that you were never proud of, and never expressed yourself. It is not a choice; you have to cover yourself with meters of cloth. As if, you were a puppet of the society. Moreover, let tell you something, never forget your headphones, they will protect you from the most aggressive sensual expressions. Read More Story of my Second Toothpaste!Omkareshwar Jha, 27. June 2018Well again an artificial day. Scheduled, systematic and planned. Buss bus kahhh , brushing my teeth is the favourite part of my day. It makes me fresh and alive me for few moments it’s because i look my reflection in the mirror. One great person said – When you consider your every moment ; then you actually live that moment of the life. Read More Successful YPPO Nepal One Day WorkshopRam Neupane, 19. July 2017The program was a grand success as the large number of participants involved actively. We received significant amount of queries about the membership procedure for YPPO by non-YPPO participants. We have given them the link to YPPO website. This program was successful in drawing attention of scientific minds to YPPO and has given a new hope to them about the role of YPPO to influence the future. Read More Sustainable business development in AfricaBenedict Chukwuemeka Osondu, 18. June 2018This article is to expand our minds and business ideas on the importance of knowing what your values can do and how it can change things especially the use of information and data. Some business has failed not because of ideas but because of information and lack of proper information. Read More Teenage Pregnancy in Nigeria: Implication for policyVictor Oyelade, 11. December 2018According to a 2013 report by Demographic and Health Survey, in Nigeria an estimated 23% of women aged 15-19 years have begun child bearing, of which 17% have had their first child and 5% are pregnant with their first child. Read More That Night will passOmkareshwar Jha, 03. June 2019Nights are feared from aeons. What changed?? It's dark usually colder than the day. No experience ever will take its place. Darkness is the reality of closed eyes. But what it's hiding inside?? Is unknown... Read More That's "You"Omkareshwar Jha, 01. February 2019That's you. Me or anybody else can't tell you better then the mirror of yourself. That can see itself with closed eyes.... Come a little deep today & it will start something new from today!! Read More The Art of Living in the Present MomentValeriia Tsytsyk, 13. September 2018Where are you now? How are you living, right at the moment? What is this moment about? Are you really living it here and now? Too many questions to begin with: the present moment. However, the importance of it is more than one might think. The point is that the vast majority of our modern “all the time in a hurry” society tends to see life as a marathon, where every person is in a race for achievements, realization of plans, dreams and goals, etc. Read More The BreachChristopher Tawiah-Mensah, 18. June 2018It is not that we are superstitious. It is not that tradition explains everything either. Truth is, we are only ignorant about the happenings; so we put up walls to things we barely understand. Masking our fears- playing it safe. The canker worm eats into our thick skulls. The virus spreads without contraception. Our children too become infected. Read More The Caged Bird Sings: What Freedom Means to MeFrancine Beatriz Pradez, 04. August 2018Our Philosophy teacher asked one question, "What does freedom mean to you?" And I spent a year discovering my own answer to an otherwise simple question. Read More The CallChristopher Tawiah-Mensah, 02. July 2018"Why don't you just go the normal way: sit at home, watch TV and trouble won't find you. You always have a seminar on your calendar, a music event to attend. There's always something to do with you." Read More The Cattle Wars of South SudanMaulline Gragau, 14. May 2019The story of a family of a South Sudanese lady demanding 250 cows as bride price from a prospective bridegroom went viral for all the wrong reasons. Many people on the internet were quick to judge the family for what they thought was a way to get rich by "selling" their daughter. Whatt they failed to understand was that it goes beyond bride price. Read More The Change I want to makeSafiullah Shaikh, 30. November 2018‘If you educate a man, you educate an individual. But if you educate a woman, you educate a nation’. Give them books and an open sky to fulfill their dreams and observe the revolution they will bring into evidence. Read More The Concept of EconomicsAbdisalan Ahmed Hussein Fidow, 13. August 2018Economic is the scarcity and choice, this study will argue main parts of Economics so the Economic dived Macroeconomics , Microeconomics , Economic growth and economic development.However the Economic of Somali is depend on livestock special Camals , Goats and Cows so the trade hight significant with economic growth . Read More The Dead of DawnZyra Cabugayan, 27. June 2018"...But from the corner of my eye, one of the policemen in the living room held my gaze. He shoved a thumb in the direction of our neighbor and mouthed, 'Huwag tularan.' Do not emulate..." Read More The Difference Between Feminism And Misunderstood Feminism Kunal Bansal Chandigarh, 01. July 2019OK, before I get chased by a group of women holding pitchforks, let me get one thing clear, I respect those who deserve it and I do believe that men and women should be treated equally. That’s the true meaning of feminism. Protesting against the ideology that men are superior or better than women, that’s feminism. Turning it the other way around by saying that women are better than men, that’s misunderstood feminism. Read More The Education We WantPranav Mohla, 21. June 2018Education is a fundamental human right to acquire knowledge, skills, values and beliefs in different aspects of our life and it helps to promote individual freedom, empowerment and propagates important development benefits. Today, education remains an inaccessible right for millions of children around the world. More than 73 million children of primary education age are not in school and aproximately 760 million adults are illiterate and do not have the awareness necessary to improve both their living conditions and those of their children. Read More The girl known by many names.Apurva Mane, 08. March 2019But she wasn't really the normal girl. Big fuzzy hair, dark skin, no idea of what she is wearing and why, don't know how to talk to other people were some of her attributes. Clearly, she felt she is not the most beautiful girl in the room everyone can die for.. But she knew that there is something about her so much more attractive than any of others... Read More The Israeli-palestinian conflictsAsfand Ali Goraho, 04. October 2018The conflict between Israeli Jews and Palestinian Arabs has endured for a century. It centers on control of territory and, as common in such disputes, is characterized by conquest, destruction, and revenge, with all the animosity and sorrow that these actions bring. Because the land in question is terra sancta to three major religions, the conflict evokes powerful passions involving identity, honor, and the propriety of cultural claims. Read More The Momo Challenge Nasir Ali Khan, 29. September 2018Games were used to be for entertainment but now they are the cause of deaths. After the game bluewhale, which took lives of 130 teens all around the world, which was a big loss because they were not only 130 persons but 130 families were killed. Now past is going to repeat itself because another game has taken its place which is called <i>the MOMO challenge</i>. Read More The neglected kids in the dirty water.Adan Bulale, 29. May 2018The Somali children are currently facing all kinds of violations including sexual violence, abuse, exploitation, and discrimination, they became drug addicted and they are engaged in bad habits such as sniffing glue, chewing chat, smoking hashish and various pills from pharmacies, the street children from the minority groups in the IDPs are the most fragile ones. Read More The Other Facet of PrettyFrancine Beatriz Pradez, 09. August 2018Is Hollywood often the standard of beauty in society? How often do we hear about women changing their physical appearances to conform to superficial norms? Beauty is a multi-faceted diamond -- rare and built from the harshest circumstances. But there is another facet of beauty that we have often neglected to see. Read More The PromiseMd. Imroz Shahriar Shaik, 20. June 2018It was a story of a happy family. The father, the mother and the only son lived in the lap of a pictorial valley. The parents loved the baby most. The father wanted to bring up the child as he wished. Things were going on according to his will. Read More The reawakening evil of rape in NigeriaAbdulrahman Abdulganiyu, 02. February 2019It is unarguably, that everyone in this country( boys and girls, men and women, male and female) is entitled to self dignity, liberty and shall not be subjected to inhumane treatment and non should be deprived nor shunned, castigated and violated by any individual individual however high so ever or how low so ever placed. Read More The Social and Cultural Determinants Of Mental HealthNithin Valsamma Rajan, 11. October 2018“Health is wealth”“If wealth is lost nothing is lost but if health is lost something is lost”.People of the present day confront many realities; pleasant ones such as the ever growing scientific progress on one hand and unpleasant ones such as the destructive elements of science on the other. Man stands perplexed between these. Read More The Unsung HeroesFrancine Beatriz Pradez, 26. July 2018Who are the unsung heroes of our generation? They are those who respond to the call of servant leadership. Silent yet inspiring, they are the game changers of today. Read More To My BelovedFrancine Beatriz Pradez, 13. October 2018What if Mother Nature could suddenly speak? What would she say to us human beings? Read More UDUS Management Bane Indecent DressingYasir Ibrahim, 14. June 2019One of the notable values of Africa is its rich cultural background, and as such, there is no time in our history that indecent dressing can be linked to our heritage. The depth of this ungodly and morally-repugnant attitude is sunk deeply in tertiary institutions. Read More Ukrainian mentality: advantages and disadvantages Anna Kontseba, 30. June 2018Every person is unique, has its own character, interests and values. However, some personal characteristics and even behavior depend on culture and society where the human lives. Common personal characteristics between people are called mentality. Beliefs, values and ideas of people bear their mentality. Read More Un-MeSuman Mercy Sundar, 02. April 2019Reality & Imagination have taken a toll already on Mental health & Physical health. These attributes highly reflect on our thought process and identify creation. Read this article to know what you are to Yourself. Before anyone else, what are you? To Yourself. Read More Upholding Societal ValuesMeshach Idoko, 05. June 2018We are living in the days whereby values and principles are regarded as obsolete. Ethics are no longer observed. Norms are now abnormal and integrity has lost its place. The punishment of social vices are now molted into disguised celebration. People rarely celebrate hard work. Most a times, people who played against social values to get to the level they are, are the ones mostly celebrated. Read More What about Us?Christopher Tawiah-Mensah, 21. June 2018In the Babemba tribe of South Africa, a 'reconnection' ritual is made for a wrong doer. The culprit is taken to the centre of the village, where the tribe surrounds him and for two days say all the good things he has done. The tribe believes that, man has a good heart but is prone to mistakes and wrong doings as well. The ritual therefore helps to reconnect him with his good self. Read More What An Abundant Life in PresentMuhammad Bilal Tahir, 13. January 2019Living a meaningful life isn’t a goal to be achieved in future or an event from the past that gives us the feeling that we have lived an abundant life. Instead, the art of living an abundant life comes from the present. The question of living an abundant life is usually formed in a way in which the subject is asked if he or she will have lived the abundant life when they get old. Many human beings die a sudden, tragic death in a very young age. Read More What to do if something goes wrongAnna Kontseba, 08. July 2018If you sometimes are worried because of problems in your routine life and various difficulties, this article is for you! Find out the ways of successfully overcoming any troubles and reducing their impact on your life. Read More When I wrote less..Omkareshwar Jha, 08. May 2019It's been a mysterious for a while and that while takes so many lifetimes to understand. Human psychology is more complicated when they try to be easy. Less or more characters of my life with you and your are doing well and that you are interested in me's and not themselves. When you try to be me who will be "You"?? Read More Who will tell our story? A journey into the world of addicts...Abiodun Jamiu, 07. September 2018He wanted to tell his story, his grass to grace tribulations; the hope of a child determined to defeat all odds on his ladder to success. He wanted to tell the world how he skipped meals, a time of One-Zero-One or Zero-Zero-One, to become the Bill Gate of his time. Read More Why am I not me?Mahmoud Fakhry, 20. June 2018Have you ever felt that you have no feelings, that you are alone, that you do not exist, that you are fed up with everything, disappointed or depressed? Have you ever felt that you wish to die? This talk could be a little creepy or not usual to be written but it’s okay if you felt any of these before, you are a normal person but living in non-normal life and society that drives you to be no feelings person. But why we have reached to this point, why we are who we are now? Read More Why Danish People Are The Happiest People In The WorldKunal Bansal Chandigarh, 11. July 2019According to two recent scientific studies, the people of Denmark are the happiest people in the world. The media's attention to this issue has led the Danish people to talk about it. If you would’ve asked the reason for the happiness and satisfaction with life of Danish people three years ago, they would probably have looked at you in a glimpse of what this question is. Read More Why Every Pakistani Girl Needs At Least 12 Years Of Educatio...Athar Maqsood, 21. July 2018As we cannot clap with a single hand. In the same way, a society cannot make progress without educating girls. Our religion also focuses on girls education. Our Holy Prophet (PBUH) said, “Every Muslim men and women are obliged to seek knowledge — Ibn-e-Majah”. Read More Why Indian Youth Is Going Through So Much Of Mental StressKunal Bansal Chandigarh, 03. June 2019Mental Stress is one of the biggest challenges faced by Indian youth nowadays. It can be due to studies, work, family, and many other reasons. Sure, working hard or excelling in studies will get you good results, but what good will it do if you won’t be happy with the way your life is going. Below is the list of the main reasons for mental stress in Indian youth. Read More why loving yourself is necessaryMandy Sharma, 06. June 2018I have been on this earth for the past 17 years and in these years, I have seen a lot of things happening around me and my surroundings. and what I have concluded from all this is that life revolves around you and it ends with you. we being the mere puppets of nature just do our respective jobs as assigned to us by her but humans are a bit ahead of others as they are the independent and advanced puppets of nature. so we experience and face a lot of things in our lifetime. so through this article, I will highlight the life of a human in general. Read More Why migration? Young people "On The Move"Francis Ametepey, 17. December 2017Africa will always be gratified about her young people, if only they understand the role they have to play in realizing the dreams of the continent. Read More Winning Balance for TeensFrancine Beatriz Pradez, 30. July 2018The health of the Filipino youth is a debatable topic in the Philippines and much of the debacle could be attributed to a lack of health education within the country. Through this article, we are enjoined to rediscover the importance of health education in shaping the lives of the youth. Read More Women Empowerment Anshdeep Kaur Ajmani , 23. May 2018Not every girl lives under a good condition. Many have to face difficult problems and tolerate very much all day. Read More Writing for the WriterFrancine Beatriz Pradez, 29. July 2018WRITING IS TOUGH. A sincere, heartfelt open letter for those who are writers, who know writers or who would like to be writers. Read More YPPO at DBU CongressFabian Schneider, 29. June 2018YPPO was represented at the Biodiversity Congress 2017 in Osnabrueck, Germany organised by the DBU and the German government. We raised financial support and are now officially sponsored by the DBU! Read More
cc/2019-30/en_middle_0029.json.gz/line3696
__label__cc
0.648904
0.351096
Government regulations steal 2014 Detroit Auto Show Image: Zoran Karapancev via Shutterstock.com March 07, 2014 Doug Altner View all Posts Government & Business The biggest news out of the 2014 North American International Automobile Show in Detroit was Ford’s announcement that it will be reinventing its F-150 pickup — the number one selling vehicle in the United States in 2013 — with an all-aluminum body to replace its traditional steel body. This is a multi-billion dollar expenditure — one of the largest ever for a single vehicle according to one Ford insider. Many auto industry experts view this, not as a completely voluntary act by Ford’s leadership, but as a response to increasingly stringent government regulations. Henry Payne, noted auto critic and writer for Detroit News, writes: The driving force behind Ford's decision was the EPA standards that will force full-size trucks to get upward of 30 mpg in 10 years — up from 20 today. Ford had already made significant gains in efficiency by redesigning its powertrains to add less-thirsty turbo V-6s to its lineup, but the step to aluminum is an indication that the EPA rules will require much more than squeezing engines. The switch to costlier, lighter aluminum means a massive capital investment that involves the retooling of factories and the remaking of Ford's material supply stream as it shifts away from steel sheet for body panels. Ford won't disclose the investment, but it runs into the billions. Payne, of course, is referring to the Corporate Average Fuel Economy (CAFE) mandates, which force each automaker to sell a fleet of vehicles that collectively exceeds a government-specified fuel efficiency threshold. In 2012, the Obama Administration ratcheted up the CAFE fleet-wide mandates to 54.5 miles per gallon by 2025, nearly doubling today’s requirements of about 30 miles per gallon. You can read Payne’s whole opinion piece here. Free Markets Didn’t Create the Great Recession Post by Don Watkins How the New Deal Made the Financial System Less Safe
cc/2019-30/en_middle_0029.json.gz/line3701
__label__wiki
0.717741
0.717741
Objectivism and today's Issues Our perspectives on issues of the day are based on the principles of a free society: genuine laissez-faire capitalism, its moral foundations, its life-promoting consequences, and the pro-reason culture that makes it possible. Self Defense and Free Trade Scientific and Technological Progress Religion and Morality Education Multiculturalism Self-Defense & Free Trade The Moral High Ground, Usurped by Elan Journo | Fall/Winter 2014 Bush’s War Policy: The Top Campaign Non-Issue? by Elan Journo | June 12, 2008 The Pakistan Crisis by Elan Journo | December 29, 2007 Is Washington With Us? Diplomacy Only Encourages North Korea’s Belligerence The Injustice of Saddam's Trial by Elan Journo | January 27, 2006 Betraying the Real Freedom Fighters by Elan Journo | May 13, 2005 Arafat’s Undeserved Honor: The West’s Shame by Elan Journo | November 16, 2004 The Timid War on Terrorism by Elan Journo and Yaron Brook | September 04, 2003 “End States Who Sponsor Terrorism” by Leonard Peikoff | October 02, 2001 Religious Terrorism vs. Free Speech by Leonard Peikoff | 1989 More from the Blog: Foreign Policyin Voices for Reason Foreign Policy | More The following article appeared as an advertisement in The New York Times in 1989. Ayatollah Khomeni's attack on Salman Rushdie and his publishers represents religious terrorism. Americans oppose the Ayatollah's death-decree, but our government is doing nothing to combat it. President George H.W. Bush has issued a limp condemnation coupled with the vague statement that Iran would be held "accountable" if American interests are harmed. But two California bookstores have already been bombed, a New York weekly newspaper has been demolished by firebombing, at least 178 threats of death or destruction have been received by booksellers nationwide, major American publishers (primarily Viking) are barricaded at ruinous cost behind an army of private security guards — and every American author, speaker, and reader must wonder if and when he will become a target of armed Islamic fundamentalists with orders to kill heretics. Has Bush become the new Jimmy Carter? Carter wrung his hands and did nothing while Iran held Americans hostage. This time Iran is attempting to hold our minds hostage. A religious motive does not excuse murder, it makes the crime more dangerous. It took the West centuries to move from medieval mysticism to the Enlightenment, and thereby discover the only safeguard against endless, bloody, religious warfare: the recognition of man's inalienable right to think and speak as he chooses. Civilization depends on reason; freedom means the freedom to think, then act accordingly; the rights of free speech and a free press implement the sovereignty of reason over brute force. If civilized existence is to be possible, the right of the individual to exercise his rational faculty must be inviolable. The ultimate target of the Ayatollah, as of all mystics, is not a particular "blasphemy," but reason itself, along with its cultural and political expressions: science, the Industrial Revolution, the American Revolution. If the assault succeeds, the result will be an Age of Unreason — a new Dark Ages. As Ayn Rand wrote in Philosophy: Who Needs It, in her prescient 1960 essay "Faith and Force: The Destroyers of the Modern World": The conflict of reason versus mysticism is the issue of life or death — or freedom or slavery — or progress or stagnant brutality. . . . Reason is the only objective means of communication and of understanding among men; when men deal with one another by means of reason, reality is their objective standard and frame of reference. But when men claim to possess supernatural means of knowledge, no persuasion, communication or understanding is possible. Many people have denounced the Ayatollah's threats, but have then undercut their own stand by offering apologies to those whose "sensibilities" the book has "offended." No apology is necessary. No creed, Islamic or otherwise, which leads to "holy terror" can demand respect from civilized men. Whether Rushdie's book in particular is good or evil, noble or depraved, is now irrelevant. Once death is threatened, there is only one issue to discuss and defend: an individual's right to speak, whether anyone or everyone likes what he says or not. "Blasphemy" violates no one's rights. Those who feel insulted do not have to listen to or read the insults. In defending religious liberty, Jefferson observed that "the operations of the mind" must not be made "subject to the coercion of the laws," adding: The legitimate powers of government extend to such acts only as are injurious to others. But it does me no injury for my neighbor to say there are twenty gods, or no God. It neither picks my pocket nor breaks my leg. If blasphemy is the issue, we submit that a religious dictator inciting murder is blasphemy against the sanctity of human life. It is said that Rushdie's book impugns the faith of believers. So does science. It is said that the book is offensive to the values of the Ayatollah's followers. So is the United States of America. Why has the outrage felt by the American public not been translated into a call for action against Iran? The protests from both the Right and the Left in this country ring hollow because both groups have betrayed the philosophic ideas necessary to act. Conservatives have become dominated by religionists, who openly base their views on mystical dogma and want the government to impose their dogmas by force which is just what the Ayatollah is doing. Homegrown fundamentalists are in no position to lead a crusade for free thought. Can these groups maintain that it is wrong to ban Rushdie, but right to ban Darwin? All of us owe a debt of gratitude to liberal groups like PEN and the Author's Guild for their courageous condemnation of the Ayatollah's threats. But these groups do not offer principled opposition, either — because of their philosophic commitment to collectivism and cultural relativism. Liberals characteristically hold that individual rights must be sacrificed to the "public good," and that Western civilization is no better than the "culture" of tribal savages. Those who counsel appeasement as a principle of foreign policy will not and cannot demand action against the Ayatollah. The response of many commentators has been to place the blame, incredibly, on American businessmen: in particular, on the booksellers, such as Waldenbooks, who are damned for trying to protect the safety of their employees and customers. It is not the responsibility of private citizens to risk their lives in defying a foreign power when our government, whose duty it is to protect our lives, turns a blind eye on an historic crime. Terrorism unpunished is terrorism emboldened. The Ayatollah has already broadened his attacks; he is now threatening death to anyone who criticizes Islam. If he is not stopped, who can predict where the next threat to our publishers and bookstores will come from? From Palestinian terrorists offended by a pro-Israeli book? From the kind of anti-abortion or animal-rights groups that now bomb clinics or trash research laboratories? Do we want a country in which people are afraid to walk into bookstores, because raids on such stores have become an uncontested form of protest? The clear and present danger is that writers and publishers will begin, as a desperate measure of self-defense, to practice self-censorship — to speak, write, and publish with the implicit thought in mind: "What group will this offend and to what acts of aggression will I then be vulnerable?" The result would be the death of the First Amendment and the gradual Finlandization of America. Is the land of the free and the home of the brave to become the land of the bland and the home of the fearful? In contrast to both the religious right and the relativist left, [we] uphold the necessity for government action in the present crisis — government action to protect the rights of Americans to their lives, safety, and freedom. A nation that allows the agents of a foreign power to terrorize its citizens with impunity on their own soil has lost the will to survive. We call for three specific actions: (1) Police and other government security protection must be given on request to any publisher, bookstore, or other victim who has received a demonstrable threat in connection with the Rushdie affair. It is a monstrous injustice for such victims to be bled dry by security costs while the government neglects its proper duty. (2) In light of the Ayatollah's decree and the record of his followers, their incitement to murder constitutes a criminal act, which must be punished. If the inciters are foreign nationals, they should be deported. (3) The United States government (alone or with allies) should take military action against Iran, until the Iranian government rescinds the Ayatollah's death decree. The Ayatollah's threat against American lives is an act of war. It calls for reprisals. Targets should include the known training camps where Iranian terrorists are being schooled and bred. Force used in self-defense, retaliatory force striking back at those who initiate violence, is a moral necessity. To adopt a pacifist stance — or to engage in infinite behind-the-scenes "negotiations" that lead nowhere — is to surrender the world to brutality. Timid half-measures are worse than none; one does not respond to murder merely by withdrawing ambassadors or cutting back on trade. One cannot appeal to reason in dealing with those who reject it. Force is the only language intelligible to those who live by force. The only life the Ayatollah has a right to declare forfeit is his own. Leonard Peikoff Leonard Peikoff, author of Objectivism: The Philosophy of Ayn Rand, is the foremost authority on Rand’s philosophy. Learn more at his website.
cc/2019-30/en_middle_0029.json.gz/line3702
__label__cc
0.505176
0.494824
English پښتو دری Ariana News Bringing Afghan News to the World Balkh Nangarhar Tag Archives: Zalmay Khalilzad Another Intra-Afghan Meeting to Be Held Soon: Sources 7 days ago Breaking News, Latest News 0 Following Doha and Moscow meetings, another intra-Afghan meeting is expected to be held in near future that will be hosted by a country in the region, sources familiar with the development of Afghan peace process said on Thursday. The Afghan government and High Peace Council hope these meetings open a … US Envoy Headed to China after Concluding Talks with Taliban in Qatar 1 week ago Breaking News, Latest News 0 The U.S. Special Representative for Afghanistan Reconciliation on Tuesday headed to China after concluding talks with the Taliban representatives in Doha, the capital of Qatar. Khalilzad made the announcement in a tweet, adding that from China he will return to Washington “to consult and report” on the Afghan peace process. … Khalilzad: Six-Days of Talks Have Been The Most Productive Session To Date 2 weeks ago Latest News 0 The U.S. Representative for Afghanistan Reconciliation Zalmay Khalilzad on Thursday said in a tweet that the last six days of talks have been the most productive session to date. He added that the two sides have made substantive progress on all four parts of a peace agreement: counter-terrorism assurances, troop … US to Begin 7th Round of Talks with No Changes on Taliban’s Position June 15, 2019 Breaking News, Latest News 0 The seventh round of direct talks between U.S. and Taliban negotiators will begin in the near future in Doha, the capital of Qatar. On this round of talks, the U.S. chief negotiator Ambassador Zalmay Khalilzad is eyeing to include the intra-Afghan dialogue and a ceasefire on the agenda as well. … Khalilzad Warns Tehran to Keep Afghanistan Away from US-Iran Tensions The U.S. Special Envoy for Afghanistan Reconciliation Zalmay Khalilzad says if Iran create obstacles in front of the U.S. efforts for peace in Afghanistan, Washington will be tough against Tehran. Speaking during a special interview with Ariana News, Ambassador Khalilzad said Afghanistan must be kept away from U.S.-Iran problems. “If … Khalilzad Arrived in Kabul June 9, 2019 Breaking News, Latest News, Regional 0 According to a statement released by the U.S. Embassy in Kabul on Sunday, Zalmay Khalilzad, U.S. Special Representative for Afghanistan Reconciliation, arrived in Kabul. According to the statement, he is in Kabul for consultations with the National Unity Government leaders, political leaders, and women. Khalilzad will discuss the developments in … Govt Hopes International Efforts Pave Way for Intra-Afghan Dialogue June 8, 2019 Breaking News, Latest News 0 As efforts for the Afghan peace process increases at the international level, the office of Afghanistan’s Chief Executive said on Saturday that the launch of intra-Afghan dialogue will open Afghanistan’s gateway toward peace. Omaid Maysam, a spokesman for Chief Executive Abdullah Abdullah said that the regional and international efforts will … NATO Reaffirms Its Firm Support to US Efforts for Afghan Peace The NATO Allies and partners reaffirmed their firm support to the U.S. continued efforts towards lasting peace in Afghanistan, NATO said in a statement on Wednesday. The U.S. Special Envoy for Afghan Peace Zalmay Khalilzad and the NATO Secretary General Jens Stoltenberg met at NATO Headquarters on Wednesday (5 June … Abdullah Blames Taliban for Sabotaging Peace Opportunities Abdullah Abdullah on Monday blamed the Taliban insurgent group for sabotaging the opportunities for peace by refusing to sit with the Afghan government. Abdullah said that Taliban is committing a humanitarian crime by emphasizing on the continuation of the war. “Taliban is taking responsibility for all bloodsheds and continuation of … Khalilzad Briefs US Congress Behind Closed Doors May 23, 2019 Breaking News, Latest News 0 The U.S. Special Envoy for Afghan Peace Zalmay Khalilzad on Wednesday briefed U.S. Congress about the latest direct talks between the U.S. and Taliban negotiators in Doha, the capital of Qatar, aimed at ending the 17-year war. The talks were held behind closed doors, but U.S. Senator Jim Risch has … US, Taliban Negotiators Concluded Sixth Round of Talks in Qatar May 9, 2019 Breaking News, Latest News 0 The sixth round of talks between the U.S. and Taliban representatives in Doha, the capital of Qatar ended late on Thursday. Zabihullah Mujahid, a spokesman for the Taliban insurgent group said in a statement that some progress made on the draft agreement prepared in the last round of talks. He … US-Taliban Talks Resume in Doha After a One-Day Break U.S. and Taliban representatives on Tuesday resumed their talks in Qatar after a one-day break. During the break, the U.S. Special Envoy for Afghanistan Reconciliation Zalmay Khalilzad headed to India and held talks on Afghan peace with India’s External Affairs Minister Sushma Swaraj. Sources familiar with Doha talks said the … US-Taliban Talks Resume in Doha After Day Break U.S. and Taliban representatives on Saturday resumed their talks after daybreak, but no breakthrough. The sixth round of direct talks between the U.S. and Taliban representatives began on Wednesday, 1 May, in Doha, the capital of Qatar. In October, U.S. and Taliban agreed in a draft on withdrawal of foreign … Taliban Say Won’t Discuss Other Topics Before Agreeing on Troops Withdrawal The U.S. and Taliban officials resumed their sixth round of talks in Qatar on Wednesday as the group says it won’t discuss other topics before agreeing over “full withdrawal of foreign forces from Afghanistan and preventing Afghanistan from harming others”. In October, U.S. and Taliban representatives agreed in a draft … Khalilzad Pushes for Intra-Afghan Talks, Reduction of Violence During Pakistan Visit April 30, 2019 Breaking News, Latest News 0 The U.S. Special Envoy for Afghan Reconciliation Zalmay Khalilzad visited Islamabad from April 29 to 30 where he requested and received support for the need to accelerate intra-Afghan dialogue as well as a reduction in violence, the U.S. Embassy said in a statement on Tuesday. During his two-day visit, Khalilzad … Peace Is Impossible without Regional Consensus: Experts As the U.S. Special Envoy for Afghanistan Reconciliation Zalmay Khalilzad travels to Pakistan to discuss the Afghan peace process, Kabul-based politicians and experts believe that it is impossible to bring peace in Afghanistan without a regional consensus. Mawlawi Qalamuddin, a former Taliban official says the Afghan government is a part … Khalilzad Says Important Steps Not Taken for Launch of Intra-Afghan Dialogue U.S. Special Envoy for Afghanistan Reconciliation Ambassador Zalmay Khalilzad says that important steps have not been taken for the launch of an intra-Afghan dialogue to end the long-lasting war in Afghanistan. Speaking in a video message to the Afghan youth at the U.S. Embassy in Kabul, Khalilzad once again emphasized … U.S. Is Not Willing to Monopolize Afghan Peace Process Diplomacy: Khalilzad April 2, 2019 Breaking News, Latest News 0 The U.S. Special Envoy for Afghanistan Reconciliation Zalmay Khalilzad assures that Washington is not looking to monopolize the Afghan peace process diplomacy. Khalilzad arrived in Kabul on Monday and hold consultation meetings with government officials, influential politicians and women groups. In an interview with Radio RFE/RL, Khalilzad said that the … Khalilzad Criticized Taliban for Refusing to Sit with Afghan Delegation December 20, 2018 Breaking News, Latest News 0 The U.S. Special Representative for Afghanistan’s Reconciliation Zalmay Khalilzad on Thursday said the Taliban delegation made a mistake by refusing to sit with the representatives of the Afghan government during talks in the United Arab Emirates (UAE). Speaking during an exclusive interview with Ariana News, Khalilzad said if the Taliban … Exclusive Interview with Zalmay Khalilzad, U.S. Peace Envoy for Afghanistan December 20, 2018 Pas az khabar 0 Aghaze Rooz Zerbana Negarish Pas Az khabar Tahawol Nema-e-Khamosh Tahud Munazera Mobie Live Copyright © 2019 Ariana News. All rights reserved. A project by Ariana News
cc/2019-30/en_middle_0029.json.gz/line3703
__label__cc
0.634794
0.365206
Giraffes Drawn By People Who Should Not Be Drawing Giraffes G.D.B.P.W.S.N.B.D.G. The Wall of Shame Tag Archives: The Dresden Dolls Amanda Palmer on the Art of Giving Giraffe Drawings Amanda Palmer Demonstrating the Art of Giving, September 2012. Amanda Palmer (Web|Twitter) is a musician and writer. She is one-half of the “Brechtian punk cabaret” group The Dresden Dolls and the frontwoman of Amanda Palmer & The Grand Theft Orchestra. Recently she published a book titled The Art of Asking: How I Learned to Stop Worrying and Let People Help (2014) based on her popular TED Talk on the same subject. Even if some of her ideas are tone deaf there’s no denying she’s an immensely talented artist (her album Theater is Evil is brilliant and rarely leaves my CD player). Palmer passed through Houston the other night (two years ago), which was my first introduction to both her and her work. Drunk and amazed, the only trouble I had was trying to make small-talk with the fans who only wanted to talk about Neil Gaiman. Still, everyone was a friendly bunch — and when I asked Palmer to draw a giraffe she did so with only modest hesitation (the guitarist — whose name I’m excluding here on principle — thought I was a joke). Please note that I take this project very seriously. And how could I not? Look at this: This is the gold-standard of Brechtian Punk Cabaret giraffes (?). This entry was posted in Musician, Producer, Writer and tagged 2012, Amanda Palmer, author, bad art, Brechtian Punk Cabaret, drawing, giraffe, giraffes, Grand Theft Orchestra, houston, illustration, Kickstarter, music, musician, Neil Gaiman, punk cabaret, singer, Texas, The Art of Asking, The Dresden Dolls, Theater is Evil, tour, writer on December 9, 2014 by Joshua Preston. Actor and Teen Hartthrob Josh Hartnett Can't Draw Giraffes. Some Recent Awful Giraffes Amanda Palmer on the Art of Giving Giraffe Drawings December 9, 2014 Drawing a giraffe is the least bizarre thing David Sedaris’ done November 13, 2014 Singer and Spoken Word Artist Dessa’s Awful Giraffe September 30, 2014 When David Mitchell Drew A Space Giraffe September 22, 2014 Essayist Sarah Vowell’s Awful Giraffe September 19, 2014 All money earned goes to funding the Street Team.
cc/2019-30/en_middle_0029.json.gz/line3708
__label__wiki
0.652511
0.652511
Ship That Washed Up on Florida Beach Could Be From 1700’s March 31, 2018 penneyvanderbilt Leave a comment (THIS ARTICLE IS COURTESY OF TIME NEWS) Ship That Washed Up on Florida Beach Could Be From 1700s, Researchers Say (PONTE VEDRA BEACH, Fla.) — A 48-foot section of an old sailing ship has washed ashore on a Florida beach, thrilling researchers who are rushing to study it before it’s reclaimed by the sea. The Florida Times-Union reports the well-preserved section of a wooden ship’s hull washed ashore overnight Tuesday on Florida’s northeastern coast. Researchers with the St. Augustine Lighthouse and Maritime Museum have been documenting the artifact and say it could date back as far as the 1700s. Museum historian Brendan Burke told the newspaper that evidence suggests the vessel was once sheeted in copper, and that crews found Roman numerals carved on its wooden ribs. Researchers rushed to photograph and measure the wreckage. The photos will be used to create a 3-D… Funding for Gateway and Amtrak as Trump signs spending bill President Trump on Friday signed the $1.3-trillion omnibus spending bill, keeping the government running through September and freeing up federal funding for Amtrak and the Gateway project he had opposed. As much as $541 million is available for Gateway, which would construct a new tunnel underneath the Hudson River linking New Jersey and New York, and replace the century-old Portal Bridge on the Northeast Corridor leading to Manhattan. Approval for the funds would circumvent opposition from the Department of Transportation; Seceretary Elaine Chao had wanted New York and New Jersey to finance most of the massive project. According to reports, Amtrak is expected to contribute a minimum of $388 million to Gateway though its Northeast Corridor Account, while New York and New Jersey will receive an additional $153 million from the Federal Transit Administration’s High-Density States and State of Good Repair grant programs. While negotiations are ongoing, Gateway will likely… Go Transit Plan 2028 GTA Discoveries Are you tired of desperate experience in driving amid the muddy 401 traffic congestions? Those bad headaches may be over soon. As a widely used environmental friendly solution for metropolitans, subway and go train are very popular in many other big cities. Toronto is now taking serious considerations on public transition system enhancement which has been now substantially lagged behind the standard level if we compare Toronto with cities of similar size such as New York, Paris, and Tokyo. Go Transit is expected to expand dramatically to meet the needs of increasing commuter population in GTA. The draft is obviously the first step towards the goal. Tons of work is yet to be done before starting of laying rails. The two Arc lines (Inner Arc and Outer Arc) would connect the ribs of the GTA fan area together and would make the transportation routes more optional, systematic and sustainable as all 9 lines would… You are close But I can’t see you You are near But I can’t find you But I can’t touch you You are beside me But I can’t speak to you You are with me……… I can feel My beating heart My precious Angel son Mute warriors Exploring the epiphany Nobody knows how to kill you. You drink hell lot of a whiskey and play with colour tubes… You smoke a cigarette and win a verse from nowhere. you put your brutal soul on celluloids and make some blazing movements… You sleepwalk on dying cities and become a rockstar. You and I, we are the lucky ones. We can only be killed by ourselves. But till then lets just accept these isolations, and make disappearing infinities. Painting: Job klijn. The Endless Search For Utopia Politics and Economics One of the most enduring concepts through the centuries has been the search for utopia. Few ideas ignite mankind’s passion and intellect in the same way as the grand search for the ideal master plan for civil society. Interestingly, if one were to ask different people what utopia would be, there would often be areas of agreement. In essence, many people view utopia as a kind of society where strife would be at a minimum, human needs would be met, and there would be a productive place and sense of meaning for each individual. However, although this sounds both ideal and possible on one level, it’s in the implementation of utopian plans that problems can arise. Some social theorists have complained that attempts to implement utopian theories lead to high levels of anxiety due to the fact utopian ideals are often difficult to achieve. Therefore, the inability to achieve these ideals… ”Love Is All About You” BeBloggerofficial “Love is a huge longing to include another as a part of yourself. You want that which is not you to become you. It starts from gathering simple things around you to seeking spirituality or God. The fundamental longing is to have a larger slice of life than what you have right now. You want to experience life a little more than the way it is right now.” ”Do You Truly Know How To Love Yourself” I am not a healer. I do not heal anyone. I think of myself as a stepping stone on a pathway of self-discovery. I create a space where people can learn how incredibly wonderful they are by teaching them to love themselves. After years, I found that there is only one thing that heals every problem, and that is to know how to love yourself. When people start to love themselves more each day…
cc/2019-30/en_middle_0029.json.gz/line3712
__label__wiki
0.74275
0.74275
Fragility: An Exploration of Polyrhythms Photo by Walter Wlodarczyk Photo by Peggy Jarrell Kaplan Enlarge Hide captions Fragility: An Exploration of Polyrhythms is the world premiere of drummer/composer Susie Ibarra’s new immersive performance. Using polyrhythms as a model for human interdependence, Ibarra captures the concept of fragility through music, exploring the subtle intersections that affect relationships. Ibarra conceives the musical structure of Fragility as a ‘game piece’ in which the rules require performers to take turns conducting action: shifting roles and perspectives in live experimentation Drawing on deep knowledge of Asian and jazz percussive traditions, Ibarra leads audiences on a journey into a mesmerizing musical environment. An ensemble of seven musicians creates multi-layered, expansive sonic textures. Dancer Souleymane Badolo interacts with custom-built motion capture technology in which the dancer’s movements trigger recorded sounds to create a live rhythmic composition. The performance of Fragility takes place in the Asia Society Museum’s Starr Gallery with musicians at the center, audience surrounding them, and all enveloped by the multi-channel surround sound installation. Performances of Fragility: An Exploration of Polyrhythms take place on: Friday, June 8, 7:30 p.m. Saturday, June 9, 7:30 p.m. "Ibarra has made a career out of exploring the dimensions of rhythm and texture; she doesn’t approach the drumkit with a sense of rigid utility or preconceived methodology." - WBGO Jazz 88.3 Concept and Music Compositions: Susie Ibarra Choreography: Souleymane Badolo Sound Engineering and Sound Design: Justin Frye Stage Design and Lighting: Clifton Taylor Interactive Systems Design: Tommy Martinez DreamTime Ensemble: Claudia Acuña, vocals; Jennifer Choi, violin; Yves Dharamraj, cello; Justin Frye, bass; Yuka C. Honda, electronics; Susie Ibarra, drumset and percussion; and Jake Landau, guitar and keyboard Commissioned and produced by Asia Society as part of Creative Common Ground, an initiative that expands contemporary performance practice by commissioning, producing, and presenting artists who explore beyond traditional disciplinary boundaries. The initiative is supported by a generous grant from The Andrew W. Mellon Foundation. Fragility: An Exploration of Polyrhythms has been developed in partnership with Pioneer Works with additional support from the Foundation for Contemporary Arts Emergency Grant during the residency phase. Excerpts from work in progress showing of Fragility at Pioneer Works Footage courtesy of Pioneer Works Development of Fragility during Susie Ibarra’s artist residency at Pioneer Works Susie Ibarra DreamTime Ensemble concert as part of Winter Jazzfest 2018 at Nublu Susie Ibarra, composer/percussionist, creates live and immersive music that explores rhythm, indigenous practices, and interaction with cities and the natural world. Ibarra is a Yamaha, Paiste and Vic Firth Drum Artist, and 2014 TEDSenior Fellow. Ibarra has premiered a new project, DreamTime Ensemble (2017), with a forthcoming new album on Decibel Collective titledPerception, a collection of pieces around the idea of finding unfixed meaning in sensory experiences and interaction in one’s environment. Her latest works include Musical Water Routesin the Medina of Fez, a music and river route mobile app in collaboration with architect Aziza Chaouni for the Sacred Music Festival of Fez (2016). She is a Faculty member at Bennington College where she teaches Performance, Percussion, and at the Center for Advancement of Public Action. Souleymane ‘Solo’ Badolo is a Brooklyn-based choreographer and dancer born in Ouagadougou, Burkina Faso. Badolo has created a number of solo and small ensemble projects commissioned and presented by Danspace, New York Live Arts, Harlem Stage, the 92nd Street Y, the Museum of Art & Design, River to River Festival (R2R), and BAM. In 2015, his dance for two dancers and one percussionist, Yimbégré, was recognized with a Bessie Award for Outstanding Production. Mr. Badolo is the recipient of Wesleyan University’s 2014 Mariam McGlone Emerging Choreographer Award and the 2015 Harkness Foundation Dance Residency at BAM Fisher. Since graduating from Bennington College with an MFA in June 2013, he has been a guest instructor at The New School, Bennington College, Williams College, and Bard College.
cc/2019-30/en_middle_0029.json.gz/line3714
__label__wiki
0.56181
0.56181
Filter &plus; / New York Why Do American Students Seem Less Interested in Going to Asia? NEW YORK, October 12, 2017 — In a conversation with the New Yorker's Jiayang Fan, writer and college teacher Michael Meyer explores why seemingly few American college students are interested in moving to China. Meyer's new book Learning China From the Ground Up is a memoir of his experience as a young Peace Corps volunteer in China during the 1990s. (1 min., 59 sec.) Watch the Complete Video / India Historic Preservation and Restoration — Fountains of South Mumbai (Complete) Conservation architect Vikas Dilawari discusses three recently restored Victorian-Gothic fountains in the Fort area of Mumbai: the Wellington Fountain, the Ruttonsee Mulji Jetha Fountain, and the Flora Fountain. Nostalgia for the Future & Lovely Villa (Complete) Filmmakers Avijit Mukul Kishore and Rohan Shivkumar discuss their documentary films Nostalgia for the Future and Lovely Villa, and the relationship between architecture and identity, in a conversation moderated by George Jose. Navigating the Belt and Road Initiative (Complete) Daniel Russel, Jamie Horsley, Aaron Halegua, and Min Ye discuss Russel's new report on how China can achieve better outcomes in its landmark initiative. On Kissinger (Complete) Winston Lord speaks with Orville Schell about his new book about the former secretary of state. Asian Americans in the Political Arena (Complete) U.S. Representatives Grace Meng and Andrew Kim share their unique experiences, perspectives, and lessons learned throughout their journey in politics. Preview and Discussion: 'Voyage to the East' (Complete) Join the principal members of the creative team, including the Metropolitan Opera's Tian Hao Jiang, as they perform excerpts from and discuss a new opera by composer Tang Jianping. Ready for Take Off? — India After the General Election James Crabtree and Ruth Kattumuri discuss the outcome and implications of the elections. Why Nuclear Weapons Are So Important to North Korea Anna Fifield and Daniel Russel discuss why Kim Jong Un has gone to such lengths to maintain his nuclear program in spite of international pressure to give it up. Understanding North Korea Anna Fifield discusses her new book with Daniel Russel. How To Build a Better Belt and Road Daniel Russel lays out a series of recommendations for how China's signature initiative can produce better outcomes for everyone. The Shrinking Space for Human Rights in China Nicholas Kristof of the New York Times discusses the role of human rights in contemporary China in the decades following the June 4, 1989 Tiananmen Square massacre. Can There Be a Roadmap for the Future When China Won't Address Its Past? Discussing the Tiananmen Square massacre, author Zha Jianying and Arthur Ross Director Orville Schell debate whether China could ever learn to address its own atrocities.
cc/2019-30/en_middle_0029.json.gz/line3715
__label__wiki
0.85069
0.85069
Analysis 26 Apr 2013 5 Dec 2017 Dutch, French Socialists Demand More Left-Wing Policies European center-left leaders have little choice but to defy their own parties’ wishes. Dutch Labor Party leader Diederik Samsom speaks in Leiden, July 4, 2012 (PvdA/Wouter Zaalberg) Socialist party leaders in France and the Netherlands can ill afford to respect their parties’ wishes and take a more leftist policy stand, either in Europe or in coalition. France’s Socialists, who won both last year’s presidential and parliamentary elections, have urged President François Hollande in a policy document that’s set to be adopted at a conference in June to resist the “self-centered intransigence” of Germany’s Angela Merkel and push for more stimulatory policies in Europe instead. “The friendship between France and Germany is not a friendship between France and the European policy of Chancellor Merkel,” the paper argues. Hollande was critical of Merkel’s insistence on budget consolidation during the election campaign, but he has adopted a more conciliatory tone — to the chagrin of many in his party. “France must be able to fight against the European right’s point of view,” National Assembly speaker Claude Bartolone tells Le Monde newspaper. “Austerity alone could condemn the beautiful idea that is Europe rather than save it.” Some in Hollande’s cabinet agree. Industry Minister Arnaud Montebourg, an anti-globalist who ran to Hollande’s left in the party’s 2011 primary, told Le Monde earlier this month that the president’s budget “rigor” was leading the country “collectively into a recessionary spiral.” “What is the point of fiscal consolidation if the economy goes to the dogs?” Montebourg wondered. “Budget discipline is one thing. Cutting to death is another.” Benoît Hamon, a junior social economy minister, complains to Le Parisien newspaper, “Germany is demanding we sprint at a time when France needs to get its breath back.” France has asked the European Commission to give it one more year to bring its deficit under the 3-percent limit enshrined in European fiscal law. Last year, its shortfall equaled 4.8 percent of economic output, in spite of “austerity” measures, which consisted largely of tax increases. The Dutch social democrats, who joined Prime Minister Mark Rutte’s fiscally conservative liberal party in government last year, similarly favor more “breathing room” to reduce the Netherlands’ deficit, which is expected to reach 3.3 percent of GDP this year. But even if both the party’s leader, Diederik Samsom, and its finance minister, Jeroen Dijsselbloem, argue against short-term spending cuts, they recognize that it would be “unwise” to let the deficit rise. Their members rebel not so much against this lukewarm support for austerity but rather against the government’s planned criminalization of illegal aliens. In opposition to Rutte’s previous, right-wing cabinet, the Labor Party vehemently criticized plans to criminalize illegal immigration. Samsom acquiesced in coalition talks last year, when the liberals offered a pardon for minors who were staying in the country illegally. A majority of Labor Party members is nevertheless expected to call on the leadership on Saturday to block the government’s proposal. Former party leader Job Cohen, also a former junior justice minister, argues that penalizing illegal aliens would “add nothing to existing law,” which he said is already “very strict.” Samsom may agree but will have to defy his own party. He recognizes that many liberal voters are already fed up with the coalition. If he forces Rutte’s party to make another concession to the left, rightwingers may revolt while neither ruling party stands to benefit from new elections. Polls suggest that Geert Wilders’ nationalist Freedom Party could surpass the liberals while the far-left Socialists would prevent Samsom from winning a plurality of the seats in parliament. Socialist Party (France) Neighbors, West Accuse Syria of Chemical Weapons Use Italy’s Berlusconi Urges Coalition to “Revive Economy”
cc/2019-30/en_middle_0029.json.gz/line3720
__label__cc
0.720218
0.279782
Journal > Biochemistry Biochemistry Insights Dirk Geerts Academic Medical Center - University of Amsterdam Other Titles in: Biochemistry | Clinical Biochemistry eISSN: 11786264 | ISSN: 11786264 | Current volume: 11 | Current issue: 1 Abstracting / Indexing Journal Highlights Indexed using ESCI, DOAJ, EBSCO, ProQuest, and PubMed Central (PMC) Published since 2008 Publication is subject to payment of an article processing charge (APC) Biochemistry Insights is an open access, peer reviewed international journal on chemistry, structure and functionality of proteins, carbohydrates, lipids, nucleic acids and smaller molecular components of cells and tissues. Please see the Aims and Scope tab for further information. This journal is a member of the Committee on Publication Ethics (COPE). Submit your manuscript here. Please see the Submission Guidelines tab for more information on how to submit your article to the journal. Open access article processing charge (APC) information Publication in the journal is subject to payment of an article processing charge (APC). The APC serves to support the journal and ensures that articles are freely accessible online in perpetuity under a Creative Commons license. The APC for this journal is currently $1500 USD. The article processing charge (APC) is payable only if your article is accepted after peer review, before it is published. The APC is subject to taxes where applicable. Tax-exempt status can be indicated by providing appropriate registration numbers when payment is requested. Please see further details here. Please direct any queries to Jenni.Jones@sagepub.com. Biochemistry Insights is a peer-reviewed, open-access online journal encompassing all topics within the field of biochemistry. This includes the chemistry, structure and function of macromolecules (carbohydrates, lipids, nucleic acids, proteins) and small molecules within cells and tissues. Processes such as the cell cycle, cell signaling, cell metabolism, DNA replication, gene expression, intra- and extracellular cell transport, mRNA processing, and protein synthesis are included but are not exclusive subjects. The journal also accepts articles on related topics applicable to this area, such as techniques, tools, or technology as well as computational modeling that can be applied to the study or utilization of biochemical principles in academia or industry. Biochemistry Insights welcomes new manuscripts for peer review on the following topics: Chemistry, structure and functionality of proteins, carbohydrates, lipids, nucleic acids and smaller molecular components of cells and tissues Cell metabolism, genomes, protein synthesis, cell signaling, transportation, and signal transduction Technology, outcomes, techniques and applications. Submit your manuscript at our submission site. Supplement Guest Editor - Ligand-Receptor Interactions and Drug Design Jianrui Song University of Michigan, USA Yuanyuan Xiao University of Michigan, USA Xiaojun Zhang University of Southern California, USA Yanling Zhang Soochow University, China Sanjay Adhikari Georgetown University Medical Center, USA Suleyman Aydin Firat University, Turkey Andre S. Bachmann College of Human Medicine Michigan State University, USA Heping Cao United States Department of Agriculture, USA Katalin Csiszar Cancer Center of Hawaii, University of Hawaii, USA Omar Deeb Al-Quds Universit, Palestine Jahan B. Ghasemi University of Tehran, Iran Hugo Hoenigsberg Instituto de Genetica Evolutiva and Biologia Molecular, Colombia Gaurav Jain, PhD Chapman University, USA Caterina A.M. La Porta University of Milan, Italy Donovan Anthony McGrowder University of the West Indies, Jamaica Sanjay Mishra IFTM University, Moradabad, UP, India Amarendra Narayan Misra Central University of Jharkhand, India Balraj Mittal Sanjay Gandhi Postgraduate Institute of Medical Sciences, India Mathew Folaranmi Olaniyan College of Natural and Applied Sciences, Achievers University, Nigeria Annapurna Pamreddy, PhD University of KwaZulu-Natal, South Africa Mauro Salvi University of Padova, Italy Fernando Cardona Serrate, PhD Instituto de Biomedicina de Valencia, Spain Emad Shalaby Cairo University, Egypt Suren A. Tatulian University of Central Florida, USA Parul Varma The University of Texas at San Antonio, USA Yong Xue University of California, Los Angeles, USA Liang-Jun Yan University of North Texas Health Science Center, USA Clarivate Analytics: Emerging Sources Citation Index (ESCI) This Journal is a member of the Committee on Publication Ethics. This Journal recommends that authors follow the Recommendations for the Conduct, Reporting, Editing, and Publication of Scholarly Work in Medical Journals formulated by the International Committee of Medical Journal Editors (ICMJE). Please read the guidelines below then visit the journal’s submission site to upload your manuscript. Please note that manuscripts not conforming to these guidelines may be returned. Only manuscripts of sufficient quality that meet the aims and scope of Biochemistry Insights will be reviewed. As part of the submission process you will be required to warrant that you are submitting your original work, that you have the rights in the work, that you are submitting the work for first publication in the Journal and that it is not being considered for publication elsewhere and has not already been published elsewhere, and that you have obtained and can supply all necessary permissions for the reproduction of any copyright works not owned by you. Please Read the Manuscript Submission Guidelines below before submitting your manuscript here: Article processing charge (APC) What do we publish? 3.1 Aims & scope 3.2 Article types 3.3 Writing your paper 3.3.1 Making your article discoverable 4.1 Peer Review Policy 4.2 Authorship 4.3 Acknowledgements 4.4 Funding 4.5 Declaration of conflicting interests 4.6 Research ethics and patient consent 4.7 Clinical Trials 4.8 Reporting guidelines 4.9 Research data Publishing policies 5.1 Publication ethics 5.2 Contributor's publishing agreement Preparing your manuscript 6.1 Word processing formats 6.2 Artwork, figures and other graphics 6.3 Supplemental material 6.4 Reference style 6.5 English language editing services 7.1 How to submit your manuscript 7.2 Title, keywords and abstracts 7.3 Information required for completing your submission 7.4 ORCID 7.6 Permissions On acceptance and publication 8.1 SAGE Production 8.2 Continuous publication 8.3 Promoting your article 1. Open Access Biochemistry Insights is an open access, peer-reviewed journal. Each article accepted by peer review is made freely available online immediately upon publication, is published under a Creative Commons license and will be hosted online in perpetuity. Publication costs of the journal are covered by the collection of article processing charges which are paid by the funder, institution or author of each manuscript upon acceptance. There is no charge for submitting a paper to the journal. For general information on open access at SAGE please visit the Open Access page or view our Open Access FAQs. 2. Article processing charge (APC) If, after peer review, your manuscript is accepted for publication, a one-time article processing charge (APC) is payable. This APC covers the cost of publication and ensures that your article will be freely available online in perpetuity under a Creative Commons license. The article processing charge (APC) is $1,500 USD for authors in North America and £1,289 for authors in all other countries.* *The article processing charge (APC) is payable upon acceptance after peer review and is subject to value added tax (VAT) where applicable. If the paying author/institution is based in the European Union, to comply with European law, VAT must be added to the APC. Providing a VAT registration number will allow an institution to avoid paying this tax, except for UK institutions. Payments can be made in GBP or USD. 3. What do we publish? Before submitting your manuscript to Biochemistry Insights, please ensure you have read the Aims & Scope. Biochemistry Insights welcomes submissions of the following types: 1. Case Report Case reports present interesting or unusual examples of disease, side effects, symptoms, treatments, pathogenesis, or unusual circumstances in medicine and healthcare. Articles can be accompanied by pictures if necessary—these require informed patient consent to publish—and should contribute to the existing literature on the condition they report on. Manuscripts must present out of the ordinary cases. 2. Commentaries Commentaries discuss the findings, implications, and/or outcomes of specific research or wider research on a general topic. They elaborate on or offer original ideas about a specific paper or a widely-researched subject. Commentaries differ from reviews in that they present the author’s original ideas and suggestions instead of only collating and reporting the previous research. 3. Concise reviews These are similar to a review, but less elaborate and often sum up several studies in a more concise manner for easier reading and reference. 4. Editorials Written by the Editor-in-Chief, deputy Editor-in-Chief, Guest Editor or Associate Editor of a journal, editorials are intended to inform readers of changes concerning the journal, or to introduce supplements, special issues, or new ideas relevant to the journal. In limited circumstances individuals other than the individuals listed here may propose an editorial topic if they wish. 5. Expert reviews These are similar to a review but are invited and are generally written by an opinion leader in the area. 6. Images of interest This submission type presents images supporting evaluation of a condition or diagnosis of an unusual case. The image may be pathologic or radiographic, and must be of high quality and illustrative of the full spectrum of the disorder. Your manuscript should contain a summary of the presentation, an indication of the features of the image leading to diagnosis or critical to the management of the condition. There should also be a discussion of the disease or diagnostic or therapeutic process. There may be no more than two figures and the word count excluding the abstract and references may be no more than 300 words. 7. Letters to the Editor A letter to the Editor is a brief communication that either addresses the contents of a published article, or is a correspondence unrelated to a specific article. Its purpose is to make corrections, provide alternative viewpoints, or offer counter arguments. Avoid logical fallacies and ad hominem attacks. Letters to the Editor must be written in a professional tone and include references to support all claims if appropriate. A letter to the Editor unrelated to a specific article should not exceed 500 words or have more than 3 references. A letter to the Editor pertaining to a recently published article or to be published concurrently with an article within the journal should not exceed 800 words or have more than 5 references. If an abstract is included, it will automatically be made the first paragraph. Letters should not include figures or research material. Letters to the editor are not charged an APC. 8. Meeting reports This manuscript type reports on a meeting with specific relevance to the journal it is submitted to. Meetings can be international or national conferences or institutional seminars. 9. Methodologies Methodology manuscripts explain a new methodology or an improvement in existing methodologies in therapeutics techniques or medical procedures. 10. Original research These should detail original experiments/research conducted by the authors. Any research on any topic is accepted, provided it falls within the aims and scope of the journal. Original research must add to scientific knowledge on the subject and must be completed in accordance with ethical principles. Research on humans or animals must have applicable ethical approvals. 11. Perspectives Typically presenting an opinion based on practical experience, these manuscripts are similar to opinion articles, but stem from personal experience of the subject discussed. They can be written in response to other papers provided the author has relevant experience. This is a broad-scoped category for short papers discussing a topic relevant to the journal. Since these articles are shorter they are often able to be published in a timelier manner. They are assigned high processing priority by the 13. Short commentaries A review is a detailed examination including the benefits and drawbacks of a medicine, therapeutic technique, computer program, policy, or anything else appropriate to the journal. They are substantially composed of a report on previous research. Authors wishing to present original ideas in addition should choose the Commentary type. All journals accept unsolicited review manuscripts for peer review. 14. Short reports A short commentary is similar to a commentary but briefer at around 1,000 words excluding references. 15. Short reviews Short reports present new research that adds to previous studies. This can be reporting on the reliability or unreliability of research or informing readers of new factors that may influence the outcome of the study. Authors must acknowledge the work they build upon including any unpublished sources. Manuscripts should be no longer than approximately 1,000 words excluding 16. Software or database reviews A short review is similar to a review but briefer at around 1,000 words excluding 17. Technical advances A broad-scoped category of manuscript reporting an advance within the journal's scope. New procedures, experiments, standard practices, or computational methods should be presented in technical advance articles. They report on significant advancements in technology that the reader will benefit from learning The SAGE Author Gateway has some general advice and on how to get published, plus links to further resources. When writing up your paper, think about how you can make it discoverable. The title, keywords and abstract are key to ensuring readers find your article through search engines such as Google. For information and guidance on how best to title your article, write your abstract and select your keywords, have a look at this page on the Gateway: How to Help Readers Find Your Article Online 4. Editorial policies The journal’s policy is to have manuscripts reviewed by two expert reviewers. Biochemistry Insights utilizes a single-blind peer review process in which the reviewer’s name and information is withheld from the author. All manuscripts are reviewed as rapidly as possible, while maintaining rigor. Reviewers make comments to the author and recommendations to the Editor-in-Chief who then makes the final decision. The Editor or members of the Editorial Board may occasionally submit their own manuscripts for possible publication in the journal. In these cases, the peer review process will be managed by alternative members of the Board and the submitting Editor / Board member will have no involvement in the decision-making process. Biochemistry Insights is committed to delivering high quality, fast peer-review for your paper, and as such has partnered with Publons. Publons is a third party service that seeks to track, verify and give credit for peer review. Reviewers for Biochemistry Insights can opt in to Publons in order to claim their reviews or have them automatically verified and added to their reviewer profile. Reviewers claiming credit for their review will be associated with the relevant journal, but the article name, reviewer’s decision and the content of their review is not published on the site. For more information visit the Publons website. Papers should only be submitted for consideration once consent is given by all contributing authors. Those submitting papers should carefully check that all those whose work contributed to the paper are acknowledged as contributing authors. The list of authors should include all those who can legitimately claim authorship. This is all those who: (i) Made a substantial contribution to the concept or design of the work; or acquisition, analysis or interpretation of data, (ii) Drafted the article or revised it critically for important intellectual content, (iii) Approved the version to be published, (iv) Each author should have participated sufficiently in the work to take public responsibility for appropriate portions of the content. Authors should meet the conditions of all of the points above. Each author should have participated sufficiently in the work to take public responsibility for appropriate portions of the When a large, multicentre group has conducted the work, the group should identify the individuals who accept direct responsibility for the manuscript. These individuals should fully meet the criteria for authorship. Acquisition of funding, collection of data, or general supervision of the research group alone does not constitute authorship, although all contributors who do not meet the criteria for authorship should be listed in the Acknowledgments section. Please refer to the International Committee of Medical Journal Editors (ICMJE) authorship guidelines for more information on All contributors who do not meet the criteria for authorship should be listed in an Acknowledgements section. Examples of those who might be acknowledged include a person who provided purely technical help, or a department chair who provided only general support. 4.3.1 Writing assistance Individuals who provided writing assistance, e.g. from a specialist communications company, do not qualify as authors and so should be included in the Acknowledgements section. Authors must disclose any writing assistance – including the individual’s name, company and level of input – and identify the entity that paid for this assistance. It is not necessary to disclose use of language polishing services. Any acknowledgements should appear first at the end of your article prior to your Declaration of Conflicting Interests (if applicable), any notes and your References. Biochemistry Insights requires all authors to acknowledge their funding in a consistent fashion under a separate heading. Please visit the Funding Acknowledgements page on the SAGE Journal Author Gateway to confirm the format of the acknowledgment text in the event of funding, or state that: This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors. It is the policy of Biochemistry Insights to require a declaration of conflicting interests from all authors enabling a statement to be carried within the paginated pages of all published articles. Please ensure that a ‘Declaration of Conflicting Interests’ statement is included at the end of your manuscript, after any acknowledgements and prior to the references. If no conflict exists, please state that ‘The Author(s) declare(s) that there is no conflict of interest’. For guidance on conflict of interest statements, please see the ICMJE recommendations. Medical research involving human subjects must be conducted according to the World Medical Association Declaration of Helsinki. Submitted manuscripts should conform to the ICMJE Recommendations for the Conduct, Reporting, Editing, and Publication of Scholarly Work in Medical Journals, and all papers reporting animal and/or human studies must state in the methods section that the relevant Ethics Committee or Institutional Review Board provided (or waived) approval. Please ensure that you have provided the full name and institution of the review committee, in addition to the approval number. For research articles, authors are also required to state in the methods section whether participants provided informed consent and whether the consent was written or verbal. Information on informed consent to report individual cases or case series should be included in the manuscript text. A statement is required regarding whether written informed consent for patient information and images to be published was provided by the patient(s) or a legally authorized representative. Please also refer to the ICMJE Recommendations for the Protection of Research Participants All research involving animals submitted for publication must be approved by an ethics committee with oversight of the facility in which the studies were conducted. The journal has adopted the Consensus Author Guidelines on Animal Ethics and Welfare for Veterinary Journals published by the International Association of Veterinary Editors. Biochemistry Insights conforms to the ICMJE requirement that clinical trials are registered in a WHO-approved public trials registry at or before the time of first patient enrolment as a condition of consideration for publication. The trial registry name and URL, and registration number must be included at the end of the abstract. The relevant EQUATOR Network reporting guidelines should be followed depending on the type of study. For example, all randomized controlled trials submitted for publication should include a completed CONSORT flow chart as a cited figure and the completed CONSORT checklist should be uploaded with your submission as a supplementary file. Systematic reviews and metaanalyses should include the completed PRISMA flow chart as a cited figure and the completed PRISMA checklist should be uploaded with your submission as a supplementary file. The EQUATOR wizard can help you identify the appropriate guideline. Other resources can be found at NLM’s Research Reporting Guidelines and Initiatives. At SAGE we are committed to facilitating openness, transparency and reproducibility of research. Where relevant, Biochemistry Insights encourages authors to share their research data in a suitable public repository subject to ethical considerations and to include a data accessibility statement in their manuscript file. Authors should also follow data citation principles. For more information please visit the SAGE Author Gateway, which includes information about SAGE’s partnership with the data repository Figshare. 5. Publishing policies SAGE is committed to upholding the integrity of the academic record. We encourage authors to refer to the Committee on Publication Ethics’ International Standards for Authors and view the Publication Ethics page on the SAGE Author Gateway. 5.1.1 Plagiarism Biochemistry Insights and SAGE take issues of copyright infringement, plagiarism or other breaches of best practice in publication very seriously. We seek to protect the rights of our authors and we always investigate claims of plagiarism or misuse of published articles. Equally, we seek to protect the reputation of the journal against malpractice. Submitted articles may be checked with duplication-checking software. Where an article, for example, is found to have plagiarized other work or included third-party copyright material without permission or with insufficient acknowledgement, or where the authorship of the article is contested, we reserve the right to take action including, but not limited to: publishing an erratum or corrigendum (correction); retracting the article; taking up the matter with the head of department or dean of the author's institution and/or relevant academic bodies or societies; or taking appropriate legal 5.1.2 Prior publication If material has been previously published, it is not generally acceptable for publication in a SAGE journal. However, there are certain circumstances where previously published material can be considered for publication. Please refer to the guidance on the SAGE Author Gateway or if in doubt, contact the Editor at the address given below. Before publication SAGE requires the author as the rights holder to sign a Journal Contributor’s Publishing Agreement. Biochemistry Insights publishes manuscripts under Creative Commons licenses. The standard license for the journal is Creative Commons by Attribution NonCommercial (CC BY-NC), which allows others to re-use the work without permission as long as the work is properly referenced and the use is non-commercial. For more information, you are advised to visit SAGE's OA licenses page. Alternative license arrangements are available, for example, to meet particular funder mandates, made at the author’s request. 6. Preparing your manuscript The preferred format for your manuscript is Word. LaTeX files are also accepted. Word and (La)Tex templates are available on the Manuscript Submission Guidelines page of our Author Gateway. For guidance on the preparation of illustrations, pictures and graphs in electronic format, please visit SAGE’s Manuscript Submission Guidelines Figures supplied in color will appear in color online. This journal is able to host additional materials online (e.g. datasets, podcasts, videos, images etc) alongside the full-text of the article. These will be subjected to peer-review alongside the article. For more information please refer to our guidelines on submitting supplementary files, which can be found within our Manuscript Submission Guidelines page. Biochemistry Insights adheres to the AMA reference style. Please review the guidelines on AMA to ensure your manuscript conforms to this reference style. If you use EndNote to manage references, you can download the AMA output file here. Authors seeking assistance with English language editing, translation, or figure and manuscript formatting to fit the journal’s specifications should consider using SAGE Language Services. Visit SAGE Language Services on our Journal Author Gateway for further information. 7. Submitting your manuscript To submit your manuscript to Biochemistry Insights, please visit our manuscript submission website. Please be sure to ensure that references are formatted with AMA reference style. Please supply a title, short title, an abstract and keywords to accompany your article. The title, keywords and abstract are key to ensuring readers find your article online through online search engines such as Google. Please refer to the information and guidance on how best to title your article, write your abstract and select your keywords by visiting the SAGE Journal Author Gateway for guidelines on How to Help Readers Find Your Article Online. Provide full contact details for the corresponding author including email, mailing address and telephone numbers. Academic affiliations are required for all co-authors. These details should be presented separately to the main text of the article to facilitate anonymous peer review. You will be asked to provide contact details and academic affiliations for all co-authors via the submission system and identify who is to be the corresponding author. These details must match what appears on your manuscript. At this stage please ensure you have included all the required statements and declarations and uploaded any additional supplementary files (including reporting guidelines where relevant). As part of our commitment to ensuring an ethical, transparent and fair peer review process SAGE is a supporting member of ORCID, the Open Researcher and Contributor ID. ORCID provides a unique and persistent digital identifier that distinguishes researchers from every other researcher, even those who share the same name, and, through integration in key research workflows such as manuscript and grant submission, supports automated linkages between researchers and their professional activities, ensuring that their work is recognized. The collection of ORCID IDs from corresponding authors is now part of the submission process of this journal. If you already have an ORCID iD you will be asked to associate that to your submission during the online submission process. We also strongly encourage all co-authors to link their ORCID ID to their accounts in our online peer review platforms. It takes seconds to do: click the link when prompted, sign into your ORCID account and our systems are automatically updated. Your ORCID iD will become part of your accepted publication’s metadata, making your work attributable to you and only you. Your ORCID iD is published with your article so that fellow researchers reading your work can link to your ORCID profile and from there link to your other publications. If you do not already have an ORCID ID please follow this link to create one or visit our ORCID homepage You will be asked to provide contact details and academic affiliations for all co-authors via the submission system and identify who is to be the corresponding author. These details must match what appears on your manuscript. The affiliation listed on the manuscript should be the institution where the research was conducted. If an author has moved to a new institution since completing the research, the new affiliation can be included in a manuscript note at the end of the paper. At this stage please ensure you have included all the required statements and declarations and uploaded any additional supplementary files (including reporting guidelines where relevant). Please ensure that you have obtained any necessary permission from copyright holders for reproducing any illustrations, tables, figures or lengthy quotations previously published elsewhere. For further information including guidance on fair dealing for criticism and review, please see the Copyright and Permissions page on the SAGE Journal Author Gateway. 8. On acceptance and publication If your paper is accepted for publication after peer review, you will first be asked to complete the contributor’s publishing agreement. Once your manuscript files have been checked for SAGE Production, the corresponding author will be asked to pay the article processing charge (APC) via a payment link. Once the APC has been processed, your article will be prepared for publication and can appear online within an average of 30 days. Please note that no production work will occur on your paper until the APC has been received. Your SAGE Production Editor will keep you informed as to your article’s progress throughout the production process. Proofs will made available to the corresponding author via our editing portal SAGE Edit, or by email to the corresponding author and should be returned promptly. Authors are reminded to check their proofs carefully to confirm that all author information, including names, affiliations, sequence and contact details are correct, and that Funding and Conflict of Interest statements, if any, are accurate. Please note that if there are any changes to the author list at this stage all authors will be required to complete and sign a form authorizing the change. 8.2 Online publication One of the many benefits of publishing your research in an open access journal is the speed to publication. With no page count constraints, your article will be published online in a fully citable form with a DOI number as soon as it has completed the production process. At this time it will be completely free to view and download for all. Publication is not the end of the process! You can help disseminate your paper and ensure it is as widely read and cited as possible. The SAGE Author Gateway has numerous resources to help you promote your work. Visit the Promote Your Article page on the Gateway for tips and advice. In addition, SAGE is partnered with Kudos, a free service that allows authors to explain, enrich, share, and measure the impact of their article. Find out how to maximize your article’s impact with Kudos. 9. Further information Any correspondence, queries or additional requests for information on the Manuscript Submission process should be sent to the Biochemistry Insights editorial office as follows: Jenni Jones Jenni.Jones@sagepub.com Reprints and sponsorship
cc/2019-30/en_middle_0029.json.gz/line3722
__label__wiki
0.742281
0.742281
Recording & Production Recording & Production Piano & Keyboard Acoustic Guitar Ukulele Electric Guitar Voice DJ & Turntablism Percussion Winds Other Instruments Violin & Viola Harmonica Bass Accordion Banjo Cello Brass Lessons Harp Mandolin Music & Instruments WonderHowTo How To: Remove Vocals from Any Song to Make a Karaoke or Instrumental Track How To: Digitize those old tapes, 8-tracks, and records How To: Extract vocals from a song using Adobe Audition How To: Build a Foot Switch with a Keyboard How To: Remove Vocals from a Recording How To: Use EQ & compression to your beats in FL Studio How to Use EQ and Compression With Your Beats in FL Studio Nick from Prime Loops shows us how to use EQ and compression effects to add flair to a beat. Dovetailing off a previous tutorial that showed how to create a beat, this step-by-step instructional video shows what buttons and effects to use, what they do, and in what order they can be used. According to Nick, whether one chooses to compress first or use EQ first, is a matter of personal taste. To add an additional spark to a hip hop bea... How To: Play and record a virtual instrument in Studio One You can play and record a virtual instrument using studio one. You can also add new part to any song you want. How To: Make Korg nanoKontrol transport buttons work in FL Studio 8 or above FL Studio is one of the biggest names in digital music-making software, and Korg the biggest in physical gear. Unfortunately, FL Studio and the Korg nanoKontrol USB controller don't get along out of the box, and the transport buttons on the Korg won't work with FL Studio. That is, until you perform the steps in this video that will lead to a blessed union of software and hardware. How To: Make old-skool house music using drum machines Do you yearn for the days when house music had a soul and didn't sound like something that combat robots are supposed to dance to? Check out this video. It features a veteran DJ explaining all sorts of techniques for creating old-skool house beats, mostly using amazing 1980's equipment like the Roland TR-808 and 909. How To: Master your song in Studio One Come see how to master your own music tracks with software by Studio One! Just follow the step by step instructional video. Mastering is done from the project page, which is not available in Studio One Artist. If you want mastering features, please upgrade to Studio One Professional. How to Master a song using Studio One: Adjust song start and end markers: Click on Open Marker Track button. Click and drag start and end markers to the beginning and end of the song. Master a song in a new proje... How To: Set up your devices in Studio One You can easily set up your devices in studio one. Run the studio one. You should now on the start page of the studio one. There you can see the recent files, news feed etc. Now studio one automatically select an audio device By Nelson Aguilar By Coue By myhome2.0 How To: Create the Vangelis piano sound from Blade Runner on a MicroKorg How To: Read sheet music notes & scores How To: Use a MPC drum machine How To: Connect a MIDI keyboard / controller to your PC and use it with FL Studio How To: Quantize audio in Ableton Live 8 How To: Understand melodic rhythm & lyric rhythm How To: Use automation in Studio One How To: Make high-quality home music recordings on a shoestring budget Drumssette: A DIY Drum Machine How To: Make a Cheap Pop Filter By James Davis How To: Program a Roland TR-909 drum machine fast How To: Map a Korg nano series MIDI controller in Ableton Live 7 How To: Program a Roland TR-808 drum machine How To: Use a shuffle LFO to apply swing and make hotter tracks in Massive How To: Create a song in Studio One How To: Use the effects in Garageband How To: Blend vocals using VST plug ins By h77idz11 How To: Build sound board for a studio By Amie Coué Arbuckle How To: Import a loop and record audio in Studio One How To: Use sidechain autofilter effects in Ableton How To: Create a techno beat in GarageBand 08 How To: Make DIY broadband acoustic panels (or bass traps) with rockwool insulation How To: Add effects to your beats in FL Studio How To: Make a hip hop beat in FL Studio How To: Consolidate tracks in Pro Tools How To: Route FX using StudioLive How To: Make a Free Microphone Pop Filter Entirely Out of Paper in 5 Minutes By Alex Ball How To: Make a ghetto pop filter How To: Reassemble a Shure SM 57 microphone By mkammers How To: Make Acapellas for Remixes in Ableton Live 8: HD By Vespers Vespers How To: Use the sends & returns in Ableton Vangelis was probably the best-known piano composer of the 1980's, showing everyone what the future of the instrument could be. If you love his work with the Yamaha CS 80 on the Blade Runner soundtrack (and who doesn't) watch this video to learn how to program a patch that emulates it on a MicroKorg. Katie Liesener shows us how to read sheet music and scores. Part 1 of 15 - How to Read sheet music notes & scores. Finding an instrumental or karaoke version of a song can be pretty easy, unless you're dealing with a song that isn't popular. That leaves you with just the full version of the song, complete with vocals. So how do you convert it into an instrumental or karaoke version? This shows you how to extract vocals from a song to create an acapella version using inversions. You need the full version of the song as well as an instrumental one. "An older gentleman told me the other day "no one makes any records anymore!" Well, I thought to myself; "millions of people make records every week, just not on vinyl or tape like in the old days..." In this tutorial video, learn how to get started using the Akai MPC 2000XL drum machine. Our expert music producer, Amir Tauheed, will give you a tour of the basic interface for the MPC, and then show you how to load, chop, and slice samples, layer a beat, use the sequencer, and create a basic hip-hop beat of your own. FL Studio is a power piece of music-generating software, but it can be kind of cranky about working with peripherals, including MIDI keyboards and controllers. Watch this video for a step-by-step guide to connecting a USB keyboard or controller to FL Studio. In this video, we learn how to use Ableton Live 8: Quantizing audio. To find the bars you want to use, find the up and down arrow keys. These will jump the loops back and forth based on the width of the loop race itself. Press play to search around for the best four bar section in your music. Now, set your first attack in your loop by zooming in on the hit. Hover over the audio and create a warp marker to drag from each of the bars. Label it as the beginning of your clip to the end, then save... In this video, we learn how to understand melodic rhythm and lyric rhythm. First, say your lyrics out loud talking, instead of singing them to see how they speak out loud. You want your lyrics to sound the same in the song as you would if you were singing them. Try to change the tone of words to change up how it sounds while you are singing it. You will see that it makes a big difference when you sing it. When you do this, you will take the the preposition off as the big spotlight note and pu... In this video, we learn how to use automation in Studio One. Controlling is a system you use to control the devices that control the software. Control link has a window on the song interface in the upper left hand corner. You can quickly move parameters as you edit the automation. Make sure you change it if it's for an instrument or an audio track. Add an automation track to the window, by clicking the "A" button that will give you sounds for the same instrument. This will avoid automation en... If you're a musician, but can't cover the cost of an expensive recording studio to get your song onto a playable media, then this video is what you need. It will show you how to make your own high-quality home music recording studio on a shoestring budget! If you're trying to get the attention of big music record labels, you need some hgih-quality sounds, but you don't need the high-quality costs! The setup is pretty simple— a microphone, MP3 player, sound mixer, headphones and a good-quality... While digital samplers have their merits, they're predictable in a way that can cause them to sound stiff or sterile. The solution? A return to the analog, tape-based samplers of yesteryear, which, with their inherent mechanical noise and euphonic distortions, offer a more musical take on the sampling process. Here is a step-by-step video guide on how to create your own homemade pop filter for your recording microphone, using easy-to-find materials. A pop filter is used to prevent popping sounds while recording. Most pop filters range from $15 to $80. This particular pop filter costs much less, and you can make multiples of them. Old drum machines make some of the coolest sounds in modern music, but can be very hard to get used to for beginners. If you're lucky enough to have gotten your hands on a Roland TR-909 Rhythm Composer drum machine, watch this video to learn how to program it. Ableton Live 7 is so popular mostly because it is easy to use on the fly, but it's still complex like everything else in electronic music. Watch this video to learn how to map a MIDI controller (in this case a Korg nano-series) in Ableton Live 7 The Roland TR-808 drum machine is one of the most important modern instruments, forming the backbone of both hip-hop and electronic music percussion. If you have gotten your hands on one, you're a lucky devil, but you have a long way to go before you can unlock it's true potential. Watch this video to learn how to program an 808 all the way up to a 64-step beat! A shuffle LFO (low-frequency oscillator) is a cool effect in many synths that gives bass lines a swing feel to them. In this video you'll learn how to apply a shuffle LFO to any sound that you can access on your computer using NI Massive, a quasi-analog PC synth. In this video, we learn how to create a song in Studio One. First, click on "create a new song" on the start page. Now, click on the empty template, and click on the continue button. After this, click song, then song setup. Click on the audio IO setup, then you will see a new window with input channels. Add in cross points and channels to the window and then test it out. Before you exit, click on the make default button, then click ok. After this, you will be able to start creating a new song... Learn to use Garage band like a pro in less than ten minutes with this step by step guide to the program. Create the exact sound effects and beats you've been looking for, right from the comfort of your own home without any expensive classes or equipment. Add echoes, stop sounds for a more dramatic effect or bring out hidden sounds to the forefront. Anyone can create unique music with this tutorial guide, so get ready to get up and dance to your own dance beats! The producers from recording school online show you a demonstration of how to blend vocals using VST plug ins for mixing. Build sound board for a studio at home, to insulate noise and sound. The subject of this DIY project was originally covered in a written article that is still required reading to finish the project as it gets into more detail regarding the actual construction of the boards. First you need to do is press the t button in your keyboard and add a new mono track. Choose mono in format and click OK. Open your program to a new live set. By using three keys (in Ableton Live), Command (Ctrl), Shift and t, you can create a short cut. Create two new midi tracks making one for (side chain) bass and one for (side chain) kick. To rename a track choose the two keys Command (Ctrl) and r. Next, you can load up the presets, located on the side bar list, one a bass, and, then a basic kick drum by opening up impulse, electronics and Tremor 1994. Now create a couple of patterns. To do this go an empty ... If you like techno music and want to create your own music, this video takes us through the steps of how to do that. Using GarageBand '08, you can create your own techno beat. All you need to do is create a new file in GarageBand at 140 beats per minute. The piano tool will need to be changed to techno kit and can be altered to different octaves moving higher or lower along the scale. You can then record your beats and perfect it for your own custom techno beat, and the best part is you don't... This short video tutorial will outline the process of making acoustic wall panels using a simple wooden frame and rockwool insulation. These DIY broadband acoustic panels, or bass traps for treating music studio rooms, performance rooms or home theater rooms, will save you tons of money. In this video tutorial from PrimeLoops, host Nick, teaches you how to create a beat, using beatbox samples, in FL Studio. You will learn how to drag samples from the browser interface to the channel interface, so that you can use them. As you follow along, Nick shows you how to lay down a beat, add effects to the sounds, how to re-level sounds to compensate for clipping in the peaks of the track, as well as how to automate some of the parameters. In this video we learn how to make a hip hop beat in FL Studio. First, load up your drum sounds from the browser to the interface. After this, change the hits on the drums to make the beat sound different. Edit how high the volume is on the snare drum and then change the ghost kick so it's not too loud either. Once you have this figured out, add in the high hat and the shaker patterns. Once you have these added in and you like the volumes that they are at, you will have your very own hip hop ... Make the mixing process easier and free up some space in your tracking window by combining different tracks and onto one track using Pro Tools. In this video, we learn how about routing FX using the StudioLive with Brandon Hays. To recall an effect, select the effect button and then page down to gt the list of effects for A and B. Once it's been selected, hit the recall button and then find the mono delay for the vocalist in B. Now, send the channels to these effects and add a snare drum to channel two. Then, add send different levels of drums to channels six and seven. You have sixteen channels to assign different effects to. As soo... In this video, I'm going to show you how to make an effective DIY pop filter using nothing but a few sheets of paper and a tissue. This will give you an excellent quality recording with your microphone. In fact, the no-cost pop filter I'm about to show you how to make is the same one I used to record this video, so the results are right here for you to hear. A pop filter or pop shield is an anti-pop noise protection filter for microphones, typically used in a recording studio. In this how to video learn how you can make a pop filter out of cardboard and fabric for recording with microphones. This video is a demonstration of how to reassemble a Shure SM 57 microphone. There is no dialogue in this video, so you have to learn by watching. This is a 2 part HD video tutorial set on how to make your own acapellas from full songs. This technique uses Ableton's EQ8 device in mid/side mode to isolate the vocal and the Multiband Dynamics device in downwards expansion mode to reduce unwanted elements from the instrumental backing. Nick from Primeloops shows how to most effectively use the effect sends in Ableton Live. He explains how most people use the effect send, and why that may not be the best way to go. He covers the basics of dry audio and wet audio and how to manage them for optimum effect. If you watch this short video, you can learn the basics of sends and returns and find out how to apply effect settings to multiple tracks which is of great benefit if you want to save time and cpu power. Recording & Production How-Tos Recording & Production News Recording & Production Forum
cc/2019-30/en_middle_0029.json.gz/line3724
__label__wiki
0.530082
0.530082
Fees and Booking Information Workers Compensation Form Dr Vanessa Che Dr Smitha Pillay Dr Salven Pillay MBBS, FRACGP, Cert Women’s Health, Dip Child Health, Cert Dermoscopy Dr Vanessa Che was born and raised in Perth and completed her medical studies at The University of Western Australia. She then enjoyed her post graduate experience working at Sir Charles Gairdner Hospital, King Edward Memorial Hospital (completing a Certificate in Women's Health) and Princess Margaret Hospital (completing a Diploma in Child Health in conjunction with Sydney University). When not at work she enjoys travelling, playing tennis (badly!) and has recently taken up cycling to balance her love of good food. She is competent with understanding conversational Italian. While she enjoys all areas of General Practice, Dr Vanessa’s areas of particular interest Women's Health including contraceptive advice (including Implanon and Copper IUD/Mirena) Adolescent Medicine (Dr Vanessa is registered as a Youth Friendly Doctor!) Our friendly team welcomes new patients to our practice 386 Wanneroo Road WESTMINSTER WA 6061 © 2019 Balcatta Family Practice · Log in
cc/2019-30/en_middle_0029.json.gz/line3729
__label__wiki
0.757187
0.757187
Rethinking the Endangered Species Act's Implementation on Private, Working Lands (2018-2019) The U.S. Endangered Species Act is one of the world’s most important conservation laws—and one of its most controversial. Because most listed species have much of their habitat on private lands, improving the Act’s performance on working farms, ranches and forests is critical to its success and survival. The Endangered Species Act has played a critical role in saving species from extinction, but has been less successful in recovering species so they no longer require listing under the Act. While much of the public debate around the Act continues to be focused on public lands, the future of most listed species depends at least in part of the conservation of habitat on private working lands where purely regulatory approaches have significant limitations and generate substantial controversy. Over the last 25 years, there have been significant strides forward in the development of new incentive-based tools for private landowners such as regulatory assurances (e.g., safe harbor agreements), economic incentives (e.g., Farm Bill programs), ecosystem markets (e.g., conservation banking) and conservation of candidate species (e.g. candidate conservation agreements). However, with a few notable exceptions, these approaches have not been adopted at the scale necessary to recover endangered species across large landscapes and within meaningful time frames. Furthermore, implementation of the Act could benefit substantially from adoption of ecosystem-based (rather than single-species-based) approaches. This Bass Connections project will examine the adoption, success and failures of incentive-based approaches to endangered species conservation on private lands over the last 25 years. Through a partnership with two large forest landowners, the project will analyze real-world examples of listed species conservation on working forest land. The team will look at nascent efforts to build multispecies and ecosystem-based incentive approaches, and develop a series of recommendations designed to dramatically increase the adoption and success of large-scale conservation of listed and candidate species on private lands. Team members will meet with large forest landowners and visit their lands to learn about the challenges of rare species conservation on working lands. These lands will serve as case studies for how to improve design and implementation of existing incentive-based approaches to conservation and develop new approaches, including ecosystem-based approaches. The team will interact with experts from the Environmental Defense Fund, which has been a leader in the development of incentive-based approaches to endangered species conservation on private lands. Experts will provide insight and expertise into the development of the recommendations. Anticipated Outcomes Report describing successes and challenges of existing incentive-based approaches to species conservation on working lands and outlining recommendations designed to dramatically increase both the scale and success of those approaches; recommendations for implementation of an ecosystem-based approach to endangered species conservation; potential workshop for policymakers, agencies, landowner groups, conservation groups and other stakeholders on improving the implementation of the Endangered Species Act on private lands Fall 2018: Gain understanding of issues related to working lands conservation and build the research agenda; begin workshop planning; take field trip to working forest land and build case study; continued research and case study development; preliminary research results. Spring 2019: Finalize research; begin recommendation development; draft initial report with recommendations; deliver workshop; finalize and release report. Team Outcomes to Date Rethinking the Endangered Species Act’s Implementation on Private, Working Lands (poster by Joshua Azza, Virginia Frediani, Julia Kemper, Emily Leung, Alexander Loomis, Charles Mize, Spencer Scheidt, presented at Bass Connections Showcase, Duke University, April 17, 2019) Robert Bonnie, Nicholas School of the Environment Bryan David, Business and Environment Virginia Frediani, Master of Environmental Management, Ecosystem Science and Conservation Emily Leung, Forest Resource Management-MF, Master of Environmental Management, Ecosystem Science and Conservation Alexander Loomis, Biology - PHD Charles Mize, Forest Resource Management-MF, Master of Environmental Management, Environmental Economics/Policy Spencer Scheidt, Juris Doctor Joshua Azza, Biology (BS), Music (AB2) John Desan, Public Policy Studies (AB) Julia Kemper , Environmental Sci/Policy (AB), Dance (AB2)
cc/2019-30/en_middle_0029.json.gz/line3734
__label__wiki
0.729968
0.729968
Home Mobile Xiaomi Redmi S2 Officially Unveiled; Has an AI-Assisted 16MP Selfie Camera, Snapdragon... Xiaomi Redmi S2 Officially Unveiled; Has an AI-Assisted 16MP Selfie Camera, Snapdragon 625 Nadeem Sarwar - Last Updated: May 10, 2018 5:50 pm After numerous teasers and leaks, Xiaomi has today launched the Redmi S2 in China. The new smartphone features AI-assisted imaging capabilities such as an AI portrait mode and AI beautification tools along with a 16MP front camera. The Redmi S2 features a sleek, metallic build and boots MIUI 9 based on Android 8.1 Oreo. The Redmi S2 comes equipped with a 5.99-inch IPS LCD display with an 18:9 aspect ratio and HD+ resolution (720×1440 pixels) which is capable of reproducing 70.8% of the NTSC color gamut. The new device features on-screen navigation controls and comes with Face Unlock and Xiaomi’s Xiao AI voice assistant. The phone will be launched in India as an Android One device. The Redmi S2 is powered by the octa-core Qualcomm Snapdragon 625 SoC clocked at 2.0 GHz, ticking alongside an Adreno 506 GPU. The Snapdragon processor is paired with 3GB/4GB of RAM and 32GB/64GB of internal storage which can also be expanded up to 256GB. Coming to the Redmi S2’s imaging capabilities, the device is equipped with a dual rear camera set-up consisting of a 12MP and a 5MP sensor with f/2.2 aperture, complete with features such as AI Portrait, PDAF and HDR, however, it misses out on 4K video recording. The front camera is a 16MP unit which boasts of large 2-microns pixels that are claimed to assist in capturing higher quality shots in different lighting conditions. The front camera is assisted by a selfie flash and also comes with AI-backed software tricks such as AI Portrait Mode, AI Smart Beauty as well as front HDR. The dual-SIM device packs a 3080mAh battery and has been priced at CNY 999 (approximately Rs. 10,600) for the 3GB+32GB variant, while the 4GB+64GB version carries a price tag of CNY 1,299 (roughly Rs. 13,800). The Redmi S2 comes in Champagne Gold, Platinum Silver and Rose Gold color options, and will go on sale in China starting May 17, but details about the new smartphone’s availability in India have not been revealed. SOURCEXiaomi Icecream Video Editor: A Lightweight and Free Video Editor for Masses How to Enable Dark Mode Everywhere (A Complete Guide) Xiaomi Could Launch the Redmi S2 Selfie Phone in India on June 7 Having launched the Redmi Note 5 and Redmi Note 5 Pro in India back in February, Xiaomi is now all set to launch its... Kishalaya Kundu - May 14, 2018 Xiaomi Teases Upcoming Redmi S2 as ‘Best Ever Redmi Phone’ for Selfies Just days before launching its selfie-focused Redmi S2 smartphone, Chinese tech giant Xiaomi has teased the device yet again, claiming that it will be... Kishalaya Kundu - May 8, 2018 Xiaomi Confirms Redmi S2; Will Be Unveiled on May 10 Through a post on Chinese social media site, Weibo, Xiaomi has confirmed that it will launch its Redmi S2 smartphone on May 10. The... Exclusive: Redmi S2 Will Be an Android One Device in India; To Be Launched... In an interview earlier this month, Xiaomi's CEO Lei Jun hinted at a Redmi-branded Android One device. And it looks like fans and eager... Pranob Mehrotra - Apr 30, 2018 Xiaomi Redmi S2: Everything We Know So Far About the Upcoming Budget Phone Xiaomi is expected to launch a new entry-level device, dubbed the Redmi S2, in "select global markets" according to a recent report from XDA. The...
cc/2019-30/en_middle_0029.json.gz/line3740
__label__cc
0.620338
0.379662
Eastern Partnership Fighting for the Traditional Family: Values over Pragmatism – Belarus Foreign Policy Digest In May, Belarus fought another battle for the traditional family at the UN, even if its stance on the issue antagonises the West and finds little international support outside of the Islamic world. The country maintained an active dialogue with... EU and Belarus: All Politics to Be Gradual After the 2015 October presidential elections Belarus gears up for a parliamentary one on September 11 with little expectations of democratic improvement. Albeit authoritarian, Belarus is both a functional state and society. The EU is learning to live with this... Increase in Illegal Migration to EU via Belarus, Cultural Treasures Restitution – State Press Digest In a time of economic downturn, the Belarusian authorities fear making any changes to the current political and economic model, which is well regarded in the state press. The Belarusian leadership has rejected market reforms and is resorting to... EU to Double Assistance to Belarus – Belarus Foreign Policy Digest Belarus’ relations with Europe have found a new lease of life after the suspension of the EU sanctions against Minsk. The EU’s intends to double its financial assistance to Belarus in 2016. The removal of sanctions allowed Belarus’ foreign minister... Belarus Engages Ukraine, Moldova, Improves Ties with EU and US – Foreign Policy Digest The summer holidays proved to be productive for the relations of Belarus with both "old" and "new" Europe. Foreign minister Vladimir Makei ended a continued pause in high-level contacts with Belarus' southern neighbour by an unconventional five-day long visit to... Belarus in the Eurasian Economic Union: Enough is Enough Last week, Belarusian Foreign Minister Uladzimir Makei criticised cooperation within the Eurasian Economic Union. Minsk is no longer hiding that its own position on the EU-led Eastern Partnership initiative starkly differs from Russia's stance on the issue. Although Minsk continues... Both an EU Partner and Russia’s Satellite? – Belarus Foreign Policy Digest Two of the main events in Belarus' diplomatic life in May were China's presidents visit to Minsk and Belarus' participation in the Eastern Partnership summit – both of which have fitted well into Minsk' foreign policy priorities. These priorities include... Multi-Vector Diplomacy with Trade in Focus – Belarus Foreign Policy Digest In the first weeks of April, Belarus focused on expanding its ties with Asia, the Middle East and Europe. Johannes Hahn, the EU "Neighbourhood" Commissioner has become one more senior EU official to visit Belarus in recent months. The last... Belarus Engages with the US, Improves Ties with Europe and Post-Soviet Countries – Foreign Policy Digest Belarusian diplomacy has been shifting the country's relations with the West into high gear seeking to capitalise on Belarus' newfound importance for regional stability. "The Europeans … are ready to cooperate with us, including for the sake of security in... Minsk Dialogue Conference: Belarus to Become a Regional Hub for Expert Diplomacy Minsk has recently reaffirmed its status as a regional diplomacy hub. Western governments have been eager to praise Belarus' role in the Ukraine peace process and became receptive to the Belarusian regime's ideas on reformatting the Eastern Partnership initiative. This... A ‘Nice Dialogue’ with Europe, Befriending Middle East Hardliners – Belarus Foreign Policy Digest Shortly after welcoming French and German leaders to Minsk, Alexander Lukashenka received EU emissaries from Riga and Brussels. He reassured Latvian foreign minister Edgars Rinkēvičs of Belarus' interest in getting closer to Europe, primarily due to its technologies and... Belarus Approaches the EU Through ‘Old Europe’ Just before German Chancellor Angela Merkel and French President François Hollande came for negotiations on Ukraine to Minsk, Belarusian Foreign Minister Uladzimir Makei visited Germany. The foreign minister's trip on 5-8 February was just one of numerous steps that... Talking to Europe, Mending Ties with the Vatican, Family Values – Belarus Foreign Policy Digest During his "open dialogue" with the press on 29 January, President Alexander Lukashenka continued walking the fine line between alarming Russia and progressing Belarus' relations with the West. The Belarusian ruler made it clear that he appreciated the noticeable shift... BRSM, Lukashenka’s Press Conference – Belarus State TV Digest Aleksandr Lukashenka attended a recent BRSM Youth Union conference and tried to convince young Belarusians to stay in the country and be loyal. Lukashenka's press conference with domestic and foreign journalists on 29 January turned into one of the biggest... Belarus-EU Visa-Free Travel: An Unrealistic Prospect? The EUobserver reported last week that Belarus might start talks over a visa-free regime with the EU, citing senior officials from the Latvian EU presidency. Many Belarusians reacted to this statement with expressions of surprise, satisfaction and hope,... Previous page 1 2 3 4 5 6 Next page
cc/2019-30/en_middle_0029.json.gz/line3742
__label__wiki
0.625813
0.625813
Marlin Announces its Privacy Preserving Network Protocol for Scaling Blockchains Oliver Dale on November 6, 2018 / 1 Comment Marlin, the startup behind a blockchain-oriented protocol for scaling distributed ledgers while preserving user privacy, announced the launch of its product at the Genesis C.A.T. Meetup, held in Moscow, Russia, on November 6, 2018. After a series of successful simulations and benchmarking in the testnet stage, Marlin is announced the protocol and roadmap in Moscow, with the whitepaper made public on November 5. Please Note: This is a Press Release Marlin’s solution can be easily integrated with existing blockchain networks, dApps, and protocols to provide faster peer-to-peer (P2P) communication, reduce latency to 100ms, and boost the throughput of public blockchains by 500 times over and above existing scaling solutions. The Marlin Protocol includes several features, such as scalable low-latency multicast, network-layer anonymity, and high resiliency with reduced bandwidth consumption to support an efficient network layer aimed at the decentralized ecosystem. The product can transform distributed ledgers and dApps by making them faster and more reliable while ensuring a higher degree of privacy, especially thanks to several key protocol components, like probabilistic forwarding or dandelion routing. While the protocol has no limits in the use cases, streaming and gaming dApps will be among the top gainers, as the Marlin solution offers dynamic traffic steering, forward error correction (FEC), and path conditioning functionalities. These features, along with Proof-of-Availability and Proof-of-Bandwidth check make sure that the network is reliable and secure for data operations. Developers might achieve the mentioned benefits with any blockchain or dApp by integrating the Marlin Protocol, which doesn’t constitute a complex procedure. The Marlin ecosystem will be fuelled by its blockchain-based, token, with the ticker LIN. The token will be used to pay for Marlin’s network services, participate in governance, and make security deposits to deter malice. Marlin hasn’t announced any public token sale yet but has pledged to keep the community informed about any relevant updates. Despite having a 10-member team, Marlin can be already referred to as an international project, given that its members spread across Singapore, San Francisco, and Shanghai. The startup has several strategic partners and investors. The project evolved from a CDN product developed at a competition organized at the Stanford University, which Pratyaksh Sharma, currently Marlin’s Chief Technology Officer (CTO), and his team won by developing a blockchain solution from scratch. Soon, the developers realized that the protocol could be further deployed for more general and wide-scale usage. Now the Marlin team, led by former Zilliqa Core Developer Siddhartha Dutta, is guided by a team of advisors comprised of world-class experts in P2P networks, including Ethan Fast – co-founder of NEX and City of Zion, MIT Professor Hari Balakrishnan, and venture capitalist Prabhakar Reddy. Marlin CMO Dean Pappas commented: “Decentralized applications need a different network layer. A lot of these different blockchains – when they talk about how they’re going to get faster transactions, almost all of them are talking about having a better consensus algorithm or some off-chain mechanism. But most of them are not addressing the [main] problem, which is the fragmented network layer that underlies all P2P systems. So, this is the rockstar team in the space of networking, and they have identified that there is a whole suite of technologies that are not being applied uniformly as a protocol.” “The idea now with Marlin, which started with the CDN, is to go one layer deeper and use the underlying techniques to speed up all kinds of P2P systems including blockchains themselves to have multiplicative effects over other existing scaling solutions,” he added. About Marlin Marlin is the startup behind a blockchain-based networking protocol that addresses several problems in the decentralized web, including scalability and privacy. The team comprises of world-class experts who have previously worked with large-scale distributed systems at Zilliqa, Microsoft, Adobe, Facebook, Pinterest, MIT, and ETH Zurich. For more information about the Marlin protocol, visit the official website and whitepaper. Link for website: https://www.marlin.pro Link for whitepaper: https://www.docdroid.net/JQ6N8iu/marlin-whitepaper.pdf Posted by Oliver Dale Editor-in-Chief of Blockonomi and founder of Kooc Media, A UK-Based Online Media Company. Believer in Open-Source Software, Blockchain Technology & a Free and Fair Internet for all. http://twitter.com/olidale http://www.linkedin.com/in/oliverdale Jagadeesh November 7, 2018 at 4:25 pm Super technology CryptoKitties Creator Dapper Labs Raises $15 Million in New Funding Round Redefining Cryptocurrency Trade, The Raido Financial Way
cc/2019-30/en_middle_0029.json.gz/line3752
__label__wiki
0.883175
0.883175
Connecticut Sen. Blumenthal, gun-safety activists push Jones ATF confirmation By chuck@hearstdc.com (Chuck Lewis) on July 10, 2013 at 1:56 PM Sen. Richard Blumenthal campaigns with President Obama. (AP photo) Sen. Richard Blumenthal Wednesday blasted critics of the nomination of B. Todd Jones to be the first permanent ATF director in seven years and said their real motive was to undermine the mission of the agency — to enforce gun laws. Blumenthal, D-Conn., a former U.S. attorney and long-time Connecticut attorney general, said he was speaking as a veteran law enforcer and a member of the U.S. Senate in urging that the Senate Judiciary Committee approve Jones for the job, a post that he has held on an acting basis since 2011. Jones should be confirmed for the top job because resources and leadership are needed to enforce existing gun laws, Blumenthal told reporters. At his confirmation hearing last month, Jones told senators that upon his arrival at ATF, he found “agency in distress. Poor morale undermined the efforts of the overwhelming majority of ATF.’’ He said he had cleaned house, replacing virtually all the bureau’s senior managers and special agents in charge of ATF’s 25 field divisions in an effort to get it back on track fighting violent gun crime. Jones also serves as U.S. attorney in Minnesota and splits his time between Washington and Minneapolis. Congress in 2006 required Senate confirmation of the ATF director. But the Senate has never confirmed anyone to serve in the position. “We need to break this gridlock and logjam,’’ Blumenthal said. He noted that opponents of new federal gun laws such as expanded background checks claim they want more enforcement of existing laws “but then they prevent the effective leadership that is needed to provide more enforcement’’ through what he called the “arrogant abuse of the confirmation process.’’ Blumenthal is a member of the Senate Judiciary Committee that is expected to take up Jones’ nomination on Thursday. Although the nomination is likely to pass the Democratic-controlled committee, its future on the Senate floor is more problematic. Jones’ backers may fail to muster the 60 votes necessary to overcome likely opposition from Republicans and even a few Democrats from pro-gun states. Blumenthal said opponents of the Jones’ nomination object to the ATF mission rather than the individual. “They are undercutting the agency by preventing a vote on the president’s nominee.’’ Members of the gun-violence prevention lobby echoed Blumenthal’s comments. They included Dan Gross, president of the Brady Campaign to Prevent Gun Violence; David Chipman, a former ATF agent and now an advisor to Mayors Against Illegal Guns; and Brad Woodhouse, president of American United for Change. Chipman, a 25-year veteran of ATF, said a permanent, full-time ATF director was crucial because “we need someone talking daily about what the plan is, we would have someone accountable for the plan.’’ U.S. Politics Video Latest from the Texas delegation Live updates from your Congressional delegation
cc/2019-30/en_middle_0029.json.gz/line3756
__label__cc
0.704148
0.295852
Recovery: Bringing Back Bumble Bees By Ted Williams Highly endangered rusty patched bumble bee (Bombus affinis), Madison, Wisconsin. Photo © Clay Bolt, Clay Bolt Nature Photography Bees are in big trouble. The good news is that virtually all ecologically literate North Americans will tell you that. The bad news is they’re worried about the wrong bees — honey bees. Honey bees don’t belong in North America; they’re domesticated aliens from Europe. “Worrying about their extinction is like worrying about the extinction of cattle,” declares native-bee activist and acclaimed wildlife photographer Clay Bolt. 5 Simple Tips to Turn Your Yard Into Pollinator Paradise By Matthew L. Miller Are Neonicotinoids the Next DDT? By Justine E. Hausheer Meet the Man Who Got Stung for Science By Matthew L. Miller But North America could lose many of its roughly 4,000 native bee species. For example, applying criteria of the International Union for Conservation of Nature, the Xerces Society for Invertebrate Conservation reports that of the 46 indigenous bumble bee species in the U.S. and Canada 28 percent are at some risk of extinction. While bumble bees aren’t well understood, they’re well loved. They are so good-natured that getting a female to sting you (males can’t) is a major undertaking. Proceed carefully and you can even stroke her Teddy-bear-like fur. That fur, along with ability to regulate body temperature, allows bumble bees to be out and about on cold mornings long before honey bees rev up. Bumble bees have even been seen 1,055 miles north of the Arctic Circle. In late winter while most insects are dormant or unhatched, queen bumble bees, the biggest bees you’ll see all year, start searching for nest sites. The queen’s flight is not wild and erratic as Rimsky-Korsakov’s operatic score implies, but slow, low and deliberate. Frequently she’ll select an abandoned rodent hole, camouflage it with leaves, moss or grass, then fashion a wax pot and fill it with honey. Finally, she’ll knead pollen into “bee bread.” The honey will sustain her while she’s brooding the year’s new colony. The bee bread will nourish the larvae. Queen lemon cuckoo bumble bee (Bombus citrinus) on Russian sage Madison, WI. By some accounts, this species appears to be in decline. Photo © Clay Bolt, Clay Bolt Nature Photography Six of the continent’s bumble bee species are cowbird-like brood parasites; queens lay eggs in nests of other bumble bees and let the workers rear their young. Honey bees are far from the main threat to bumble bees; but they compete with them thus reducing their reproduction and body size. And while both honey bees and bumble bees are important pollinators, bumble bees are frequently more efficient. Unlike honey bees, they can “buzz pollinate,” seizing a flower in their jaws and forelegs and vibrating their wing muscles to shake pollen from the anther. This ability makes bumble bees important for pollinating a wide variety of wild and cultivated plants. Bumble bees help sustain all manner of things prized by humans from tomatoes to grizzly bears. The wildlife management establishment has traditionally ignored native bees. But that’s starting to change thanks to bee advocates led by the Xerces Society, Clay Bolt, Dr. Sydney Cameron of the University of Illinois and Dr. Robbin Thorp of the University of California at Davis. On March 22, 2017 the rusty patched bumble bee became the first bee in the continental U.S. to be listed as endangered by the U.S. Fish and Wildlife Service. Photo by Sarina Jepsen, Xerces Society On March 22, 2017 the rusty patched bumble bee became the first bee in the continental U.S. to be listed as endangered by the U.S. Fish and Wildlife Service. The publicity is awakening managers and the public to the importance of native bees. In addition to sustaining native ecosystems they provide pollination services to American farmers worth $9 billion per year. “The listing of the rusty patched bumble bee has the potential to become a landmark case for pollinator protection,” remarks Bolt. Rousting the feds to action was a challenge. The process started in 2010 when the Xerces Society, the Natural Resources Defense Council, Defenders of Wildlife and Thorp, alarmed about the rapid spread of bee diseases and parasites, petitioned the Animal and Plant Health Inspection Service (APHIS) to regulate interstate transport of bumble bees commercially bred for greenhouse pollination. APHIS didn’t respond for almost four years, then declined to do anything significant. In 2013 the Xerces Society petitioned the Fish and Wildlife Service to list the rusty patched bumble bee as endangered. By law the agency has 90 days to decide if a petition for listing has merit. Nine hundred days later it hadn’t made a decision. Eventually a Xerces lawsuit elicited action. Queen Franklin’s bumble bee, presumed extinct, on a California poppy. Photo taken in southern Oregon in 1998 © Dr. Robbin Thorp Interstate commerce of the eastern bumble bee is still essentially unregulated; and it has apparently imperiled American, yellow-banded, western and rusty patched bumble bees and caused the probable extinction of the Franklin’s bumble bee which hasn’t been seen since Thorp observed it in 2006. All five species were common 20 years ago. At least APHIS forbids importation of bees from other nations except Canada, but between 1992 and 1994 it permitted western and eastern bumble bee queens to be shipped to Europe for rearing and their colonies to be distributed throughout North America. While the bumble bee fungal disease Nosema bombi is apparently native to North America, Thorp hypothesizes that a more virulent strain was introduced by the foreign-bred colonies. But Dr. Sydney Cameron could find virtually no observable difference between native and European Nosema. She suggests that commercial colonies might have had higher prevalence of Nosema, which spread to wild populations. In any case, the sudden demise of the five common bumble bees — which, save for the American bumble bee, are closely related — corresponds precisely with bumble-bee commercialization in North America. I asked Thorp if pesticides, known to devastate bees, might have been partly responsible. “That doesn’t make sense,” he said, “because other bumble bee species in the same areas are doing well.” Of course, pesticides could weaken more vulnerable species, enhancing risks of infection. Cameron’s lab is investigating that potential. In addition to Nosema, commercial bumble bee colonies in the U.S. have repeatedly been found to carry such wild-bee-afflicting parasites and pathogens as external mites, gut mites, gut protozoa, deformed-wing virus, black queen cell virus, sac brood virus and Israeli acute paralysis virus. Threatened Western Bumble Bee, Bombus occidentalis, Bozeman, Montana. Photo © Clay Bolt, Clay Bolt Nature Photography Every year in nations around the world millions of commercially produced bumble bee colonies are imported to pollinate greenhouse plants. They easily escape. In Argentina and Chile buff-tailed bumble bees imported from Europe are driving the beautiful, orange-furred flying mouse, the world’s largest bumble bee, toward extinction. Wherever the alien shows up the native vanishes. Pesticides, especially neonicotinoids, are doing a number on native bees and honey bees. In the 1990s chemical companies, under pressure to develop safer pesticides for birds and mammals, hatched poisons that could be applied to seeds. These neonicotinoids were indeed less toxic to birds and mammals, but because they’re water soluble and absorbed into pollen they’re deadly for bees and other pollinators. They’re the default pesticide for soybeans and corn, yet research has shown them to be ineffective. One three-year study revealed zero corn yield benefit from neonicotinoid seed treatments. Similar results have been seen for soy. Europe has sharply limited neonicotinoid use, and Canada is in the process of doing so. But our Environmental Protection Agency has yet to act. Last May the U.S. District Court for Northern California ruled that the agency had violated the Endangered Species Act by not adequately reviewing 59 neonicotinoid registrations. Rusty patched bumble bee, Madison, WI. Photo © Clay Bolt, Clay Bolt Nature Photography While the EPA has recently published preliminary pollinator-only risk assessments for three neonicotinoids and will be collecting public comments until July 24, the regulation process is slow. Critiquing that process, Aimee Code, who directs the pesticide program for the Xerces Society, notes that EPA gets its information from the companies that make the pesticides. “We’re not expecting final decisions for another couple years,” she says. “And EPA’s assessments are focused on only honey bees and thus fail to protect the more sensitive bumble bees. While a honey bee queen doesn’t forage, the bumble bee queen does, putting her at risk of pesticide exposure. If the queen is killed, the colony is lost.” On June 23 a bill to better regulate neonicotinoid use — Saving America’s Pollinators Act of 2017 — was introduced in the House by 30 cosponsors. While the feds aren’t doing much to recover native bees, there’s a great deal the public can do. Native bees need only three things — flowers, nesting sites and a pesticide-free environment. Provide these, and they will come. How You Can Help Native Bees To learn what to plant for native bees check out the Xerces Society’s Pollinator Resource Center. Male Highly endangered Rusty-patched bumble bee (Bombus affinis), resting on hydrangea macrophylla, Madison, Wisconsin. Photo © Clay Bolt, Clay Bolt Nature Photography You destroy bumble-bee nests sites by mowing, so let part of your yard go back to nature. When you do mow leave lawn clippings in an out-of-the-way pile; some bumble bee species will nest there. If you want predator insects like lacewings, assassin bugs, garden spiders and praying mantises, you have to have a few pests for them to eat. But major pest infestations are symptoms of greater problems such as poor soil, wrong pH, too much or too little water or sun. Fix these, and you won’t need pesticides. “Urban areas can provide amazing habitat for our native bees,” says Code. “You should never feel your own backyard isn’t enough. Urban areas have great diversity which can be better than a monocrop with, say, miles of corn.” Highly endangered rusty patched bumble bee, female, worker, Madison, WI. Photo © Clay Bolt, Clay Bolt Nature Photography Learn to identify bumble bees by: 1. ordering Bumble Bees of North America: An Identification Guide, by Paul Williams, Robbin Thorp, Leif Richardson and Sheila Colla, 2014. Princeton, University Press; 2. downloading this online field guide and this one from Bee Spotter and 3. downloading these flashcards. Participate in these citizen-science projects: Bumble Bee Watch and BeeSpotter. Take the Pollinator Protection Pledge. Finally, download Clay Bolt’s superb film A Ghost in the Making — about his successful search for and advocacy of the rusty patched bumble bee. Tags: Endangered Species, Insects & Pollinators, Plants, Urban Conservation Ted Williams detests baseball, but is as obsessed with fishing as was the “real” (or, as he much prefers, “late”) Ted Williams. What he finds really discouraging is when readers meet him in person and still think he’s the frozen ballplayer. The surviving Ted writes full time on fish and wildlife issues. In addition to freelancing for national publications, he serves as national chair of the Native Fish Coalition. More from Ted Leave a Reply to Alexis w Cancel reply By Anne M. | Reply Great article. Thank you, thank you, thank you! Thank you first for focusing on native bees. And thank you even more for going well beyond the “just plant lotsa flowers” pollinator advice that is beloved by industrial farm groups and corporations. Not that native bees don’t need many more flowers, especially natives. They do. But we also need to face the serious threats posed by neonicotinoids and the commercial bumblebee industry, threats that are rarely covered by mass media. Here in the Upper Midwest Cornbelt, U.S. taxpayers are funding expensive “pollinator plantings” on former cornfields. That’s not a bad idea. But meanwhile, adjacent corn and soybean fields are planted with neonicotinoid-treated corn and soybean seed. The toxic dust that rubs off those seed coatings during planting can really travel in the wind during spring, which is when many native pollinators are foraging. Later, those adjacent fields are also often treated with more insecticides and/or with dicamba herbicide, which easily drifts and damages wildflowers. I attended an official pollinator field day for farmers last month, during which it was discovered that many of the featured pollinator flowers had been deformed by herbicide drift. To save native pollinators in the Upper Midwest, we need to stop subsidizing the ecological madness that is conventional corn and soybean production. And we need to reward the innovative farmers who are truly helping pollinators. It’s no coincidence that those same farmers are almost always helping water quality, soil health, and other wildlife. By Susan Beckhorn | Reply Interesting to know the honey bee is not native. I’ll be looking at bumbles with more appreciation now By Robin Pulver | Reply Great GREAT article! Thank you so much. I learned a lot. By Cindy Lanouette | Reply Fabulous article exposing the EPA and chemical companies of dragging their feet while they rake in the profits of yet more chemical use–neonicotinoids. Why are other countries years ahead of us on regulating or eliminating the use of chemicals in the environment? It just comes down to money and greed. Thank you, Ted Williams, for always getting to the bottom of the issues. We all need to be passionate about saving the bees. By Gail McBride | Reply it would be a sad world indeed without American produced honey. By Bruce Higgins | Reply Glad to see this get “out there”, but the article seems somewhat schizophrenic, as the following statement from the article seems to contradict much of the rest of it. “I asked Thorp if pesticides, known to devastate bees, might have been partly responsible. “That doesn’t make sense,” he said, “because other bumble bee species in the same areas are doing well.” Of course, pesticides could weaken more vulnerable species, enhancing risks of infection. Cameron’s lab is investigating that potential.” By Ted Williams | Reply Bruce: You missed Thorp’s point. It was this: It doesn’t make sense that pesticides could have knocked five common bumble bee species down to the point of being threatened with extinction and not in the slightest way affected other bumble species that share the same habitat. No one, least of all Thorp, would deny the possibility that in some areas pesticides may be weakening some bumble bees species, making them more vulnerable to parasites and pathogens. By Anne Mildmay-White | Reply read Prof Dave Goulson’s book on bumble bee crises in S America, he’s a great scientist. Also, that male Rusty patched bumble bee is not on Joe Pye weed, it is on hydrangea macrophylla Right you are Anne. It is indeed hydrangea macrophylla. Thanks very much. I’ve alerted my editor. He’ll make the fix. By jack | Reply Thanks for sharing this great post! i am a bee keeper, which i mostly focus onmanuka honey! By Gerri Crawford | Reply I’m really concerned. I have plants on and around my apt. Patio, every year and have not seen many bees. I even have grape jelly, and sugar water for birds. I have seen few bees. My flowers don’t seem as big and beautiful as previous years. By donald J eustace | Reply this was a very interesting and important article . I hope we can raise public awareness higher National geograpjic would seem a good partner in getting the public informed and sympathetic By Jessica McCormick | Reply I have seen many of the rusty bumbels in Wayne National Forest in Ohio. They seem well and are just doing what bumbels do,collecting pollen. I was wondering if the big yellow clumps clinging to the legs of the busy creatures were clumps of pollen or a parasite. By Barbara M. Yasinski | Reply I support all efforts to save the bumble bees. For the past 25 years I have left 1/2 the property free from pesticides and have planted coneflowers, black eyed Susan’s, flock, butterfly bushes, numerous azalea, lavender and other perennial plants. I see many bumblebees and enjoy that I can be near them without them flying away. We need more land that can remain available not only to the bees but all wildlife. By Judy Diaz | Reply In January 2017, I sent to President Trump a letter requesting EPA begin banning use of neonicotinoids and Roundup, along with my one newspaper article announcing the Rusty-patched Bumble Bee now listed as endangered. My hope is to help make an impact on slow-moving government management to curtail pesticide and weed and grass killers. More efforts will continue on my small part. Bees collect funguses for their food/honey, and Roundup kills everything, including what bees add to their bread mix. We will plant flowers for the bees, but big box stores sell pesticide-treated flowering plants. Oh, there is much to be done to help the bees, as well as the butterflies and every other pollinator. By V A Walter | Reply I have lots of bumble bees. They enjoy the butterfly bush, the Mexican heather, and the Russian sage. I also see some on my sparse herbs. By Patrick Carney | Reply Bumble bees have it made in my back yard. I have roughly 50- 70 raspberry bushes, 16 blueberry bushes 18- 20 blackberry bushes, strawberries , kale, beans, tomatoes and hetbs. Ive got tons of bumblebees working for me on my backyard. I try picking berries in the morning when the bees are slower, but thats not always the case. The evening pick you are on the midst of full bee activity Movong slowing ans slowly picking berries keep the bees calm. They may make a beeline rush ( pun intended) but turn away and. I dont panic when they get close. You may get stung a few times a year but usually not. Funny last time I got stung was when it looked like one was trapped on the netting I use So I gently went to move her to see if she was alive, well she was and stung me in the thumb! O guess she had her own game plan! By Margaret Van Stelton | Reply Thank You for this article, and for your special efforts, and work. I LOVE Bee’s and desperately want them around. I have flowering plants, but plan to add more. We NEED Bee’s. By Carol E. Nita | Reply I have a big path of Monarda, also know as bee balm, and the bumble bees are all over it. I also have butterfly bushes that they like. There are two nesting sites, that I know of, on our property, and we protect them. Bumble bees focus on collecting pollen, and aren’t bothered by people near them. I’ve never been stung by one. They need to be protected. We use no chemicals on our property, and have lots of flowers, so we have a good number of bumble bees. By Joan Miron | Reply This was truly informative and now I am even more excited about my flower and vegetable gardens attracting the bumble bees. I took photos of a very fluffy bumble bee on firewood in Nome Alaska last week. I hope I will be able to identify it now. By Jamie Trask | Reply I am so glad that the Bees are back, so glad to stay for good. By Roderick A Dibble | Reply If it makes Ted feel any better – the cone flowers in our garden are covered with bumble bees (specific variety unknown to me). We see almost no domestic honey bees. We live in a suburban/rural county east of Cleveland, Ohio. By Barbara Brown | Reply My frustration is how little most people know. My big issue and growing frustration is the obsession with mowing in our country. I see huge expenses of lawns and areas not even near homes mowed for hours all summer long. Our local Environmental group is trying to convince our township, with success, to reduce mowing in the township. But you always get some homeowner call so upset with the unkept look! We are looking to address our County this winter with doing away with some of the mowing along certain roads, especially where we notice milkweed growing, which they just mowed down a week ago. Along with this is increasing areas to allow natural meadows for pollinators. Any feedback on how to properly present these issues to our County? By Lynn Lawler | Reply My husband and I just moved to our own home across town in central east coast Florida. I had many flowering herbs and trees, but the bumblebees(not many honey bees) liked the Vitex flowers the best. I had never seen so many bumble bees in one place before. I wish that I could have taken them with me..I haven’t seen any at our new place, though I hope that the organic farmette we moved there does eventually attract them and I will follow your suggestions in setting aside a wild area and encouraging nesting areas and, of course, lots of Vitex! What I don’t understand is that a neighbor across the street would have a tank of pesticides sprayed all over his outdoor areas and yard (Tru Green)monthly, and occasionally the wind would blow our way. Yet it did not seem to diminish the numbers or visits from my bumblebee friends. How do you account for that? Is it possible that, being wild and probably genetically more pure, that they still have the ability to adapt to such harsh environments? Any thoughts? By Alice Clark | Reply Great article. Enjoyed reading it as it was very informative. By Michael Scullin | Reply Bolt is nuts. Honey bees are indeed aliens but certainly not to be included with cattle. The aliens most destructive of habitat are Homo sapiens sapiens. H.sapiens around here (south-central Iowa ) uses a multitude of chemicals on crops which have all but eliminated both bees and pollinating wasps. Our yard is hymenoptera friendly, but seeing a honey bee means that other bees are doing better. By Debbie Fleischer | Reply Thank you for the informative film and pictures of the bumblebee. I had no idea there were so many species. I have a blue flowering bush that has bumblebees all over it. I don’t know the name of the bush but the bees love it. Before seeing this, I thought I had some weird bees on there. After watching the film, I realize I have at least 4 different types of bumblebees. One even has a rusty red patch. I know it’s not the one you were looking for since I’m in northern Nevada. Still interesting to note the different colors on the bees. Thank you again for your effort. By Judith Gabriel | Reply Does the spraying of permithrin to kill ticks, also kill bees? By Nancy Gabel | Reply When we were in London in June, we had the opportunity to see St Ermin’s Hotel’s wonderful bee garden on a screened outdoor balcony. The bees there produced all the honey used by the hotel and restaurant as well as honey for sale. It seemed strange to see this in the middle of the city and then to find that other businesses were doing similar projects until I looked around and realised the amazing amount of flowering plants and grasses decorating businesses and streets as well as all the enormous public and royal gardens! Why can’t we do this too? By kathleen rowley | Reply Thank you so very much for your field work, all your efforts! I appreciated the info. on what I personally can do for my bee friends. I am a backyard gardener, and know how the bee’s work in the system of plants & vegetables. Again thank you for bringing this info. to the public’s attention. By Linda Murphy | Reply We had upward of 1000 hornets a few weeks ago swarming, the pest company said they were some type of cicada killers and would not be harmful. They don’t sting really. They have since moved on. I plant to attract bees here in SC, but these hornets eat protein, (i.e. gnats) and are less interested in flowers. I have horses and as a result gnats which the hornets eradicated! Huge hornets though. I have a few bumbles enjoying my flowers though not many. By Cora Y Howlett | Reply Thank you for such an informative video. My grandson sparked my interest in the monarch butterfly from watching its metamorphis in his school. I joined our state native plant society and went to our local cooperative extension classes. One thing led to another…many native plants, shrubs, trees, etc. I planted. As I watched and learned, “plant it and they will come” is so true. Every summer there seems to be more. I am an older lady with medical conditions, but as long as I can dig, I will continue. I love the humming of the bumble bees. And as many times I have been so close to them…have never been stung! I don’t bother them, and they don’t bother me. Now, if I were to step on one barefooted, that might be a different story…I would sting also! I love nature and can’t imagine being without all critters. Even my husband notices if we have a new butterfly visiting. Grassed yards look so empty…unfortunately there are so many! By Kate DelCorpo | Reply It is absolutely disgusting the time it takes to awaken the goverment By Jo-Anne Mullaley | Reply The article is great and there should be more concern from people. I have plants numerous plants just for them,they seem to love bee balm,butterfly bushes,Cardinal flowers,Sunflowers,Russian sage,and any others. My bee population is increasing daily and I am happy with that. They also seem to enjoy vegetable gardens,all these things do make a difference. It also benefits the hummingbird moths that I never knew existed. By Kevin Theodore (Ted) Perry | Reply I have found very few honey bees in my yard this year but lots of bumble and mason bees. We have Salvia, which they love. I am planting a fall flower and veggie garden so I’m hoping for lots of pollinators, as we have two hummingbird feeders as well. I came in from a very hot day, over 100 degrees, to cool off. I turned on the TV and propped some pillows up and laid back. I felt a twig sticking me as it usually happens, so I sat up and felt around. All’s well. I lean back again but the twig has moved. Four times I did this and when I sat up, I heard some deep, deep buzzing. She was huge. Ms. Bumble Bee flew to a table where I captured her under a glass. I took her outside and released her. My wife counted 5 stinger holes on my back. I figured she hitched a ride inside on my back and every time I leaned back, I squashed her (softly, mind you) between the pillow and my back. and that’s why she stung me saying, ‘Get your big *** off of me’. Her stings didn’t hurt as bad as a honey bee and I was better in no time. By Karen Stenbo | Reply I have read the list of pollinator plants for the northeast from Xerces and did not see on the list the liatris plant. Liatris is a relative of purple loosestrife, a very beautiful purple flowering spike that is invasive in wetlands, and so its purchase is forbidden in MA. We are, however, able to buy liatris. We live in a suburb just west of Boston. A few years ago I bought one liatris plant, and it has multiplied to perhaps a hundred, with a purple spike of flowers on each. Our yard does not get full sun, so they do well in areas that are partially shaded every day. Every year I thin them out and give some to neighbors. Liatris flowers begin to open in June, and they are just about finished now on August 17, and during that whole time they are very attractive to bees. I do not know what kind of bees they are — the ones I have looked at are rather small, not large bumblebees. The bees are not aggressive, but we do not get too close to the liatris because there are always bees on the flowers. By Russell Lee Edwards | Reply I live in central Oklahoma. I have several tomato plants that flowered like crazy this year but have not produced one single fruit. I go out and check them every day. Not once have a seen a single bee this year. Usually, in years past, the plants are swarming with bees. None, absolutely none this year. By Gary Malamed | Reply I live in Carroll County Md. and tried to let an area grow but my county govt. made me mow it. What can I do to make them stop? By Sherrilee Openshaw | Reply Hi, I just want to know we have a lot of bumble bees in my area. Their outside my door when I go out. We have a lot of wildflowers. As I walk past I try not to disturb them. I love watching them. I hope I can continue watching them for many years. By Heather - aka Sprittibee | Reply I heart bees. Thanks for sharing this! <3 By Elizabeth Masangcay | Reply It’s very sad but unfortunately very true. Sometime man does very stupid things, without thinking of the consequences. As president of the Chicago Filipino-American Lions Club I will do my best to educate my fellow Lions about the Native Bumblebees plight. They need to learn about the hazards that Nionic Pesticides pose. I will also tell them what types of wildflowers to plant in their yards to help with Bee and Butterfly repopulation. It seems that Butterflies are also disappearing. Coincidence I think not!!!!!!! By Diane Anthony | Reply I live in suburban New Jersey. Have been planting many varieties of veggies and flowers that bees love…I have 13 different garden beds with a lot of variation on a small plot of land(.28 acres). I’ve had years of seeing few bees( both honey and bumblebees) and I’m happy to say the last two years have been sensational!! I’m not well acquainted with different species yet but plan to educate myself. Last year I found a local beekeeper and it seems there is a growing network of suburban beekeepers in my area. Still I’m very concerned for those species that are threatened… so will write local governments and try to move things from the bottom up…Grass roots movement!! By Trent Brock | Reply I let native wildflowers grow around the edge of my yard where it is sunny. There is one kind of wildflower in particular which produces many tiny blooms and every year honeybees and bumblebees, along with other smaller flies, swarm over them. This is a very simple thing that can be done. By Rick Young | Reply Bumble bees are thriving in Cornwall, PA 17042. Honeybees, not so much. By juanita medina | Reply With out the bees the ecology is not going to work in safely manner, people need to be educated about it , so much ignorance . By Dan Okrasinski | Reply I have had a huge increase in bumble bees in my western Oregon Willamette Valley home. They love all the California poppies and lavender I have growing. Just about any plant or bush I have that is purple to blue seems to attract them. We also have a good increase in honey bees who love my rudeccia flowers. This year I turned my yard into a bee, butterfly and humming bird jungle and have had good results. For some reason my Gazannia plants have not done well. By Norma Bowen | Reply Thank you for this enlightening article. Didn’t know honey bees were not native in the U.S. and it seems they have been the only ones that are reported disappearing. I haven’t seen a bumble bee for a long time here in lower Idaho. Thanks again and keep this campaign to save the bumble bees and other species at the front of news. By Jane Thomas | Reply I noticed many bumblebees and other pollinators in my yard in the Spring. They were great in pollinating my blueberry plants. However, come July when my lavender was in full bloom, I noticed very few pollinators and no bumblebees, which was quite unusual. We are surrounded by farm land and planting this year includes soy, corn, and potato. My yard is full of differing flowering plants as well as wild areas both in the front and back lawn. I don’t know what to do now, but it is very worrisome. I hope Canada (I live in PEI) can outlaw these seeds before more damage is done. By Alexis w | Reply Thanks for your efforts! I did photograph Rusty Patch Bumblebees in Central Oregon in a dry canyon area. It/they were being sustained by the indigenous plant, mullein, as were yellow butterflies and migrating songbirds. FYI. just sharing where I saw several individuals. I hope they come back. . . like milkweed. They used to be so common – a daily joy. By Bees and the Future of Farming | Katif | Reply […] Williams, T., Miller, M. L., Hausheer, J. E., Miller, M. L., Roseth, K., Millgate, K., . . . Feldkamp, L. (2018, October 03). Recovery: Bringing Back Bumble Bees. Retrieved from https://blog.nature.org/science/2017/07/11/recovery-bringing-back-bumble-bees-endangered-native/ […] Also In Insects & Pollinators The Surprising Fireflies of the Western US By Kris Millgate The Real Reason You See Earthworms After Rain Can Cities Replace Wildlands for Pollinators? By Christine Peterson Monarchs Are Disappearing in the Western US. What’s Happening? | February 18, 2019
cc/2019-30/en_middle_0029.json.gz/line3764
__label__cc
0.571358
0.428642
Posts Tagged ‘Deepal Shaw’ Latest Release Movie “Dhoondte Reh Jaaoge” Review Posted by: indian on: March 6, 2009 In: Asrani | Avtar Gill | Bollywood | Bollywood Movie | Bollywood Star | Comedy | Deepal Shaw | Dhoondte Reh Jaaoge | Jalees Sherwani | Johny Lever | Kunal Khemu | Omesh Shukla | Paresh Rawal | Razzak Khan | Ronnie Screwvala | Sajid-Wajid | Shabbir Ahmed | Soha Ali Khan | Sonu Sood Dhoondte Reh Jaoge Director: Omesh Shukla Producer: Ronnie Screwvala Banner: UTV SPOT BOY Music Director: Sajid-Wajid Lyricist: Jalees Sherwani, Shabbir Ahmed Star Cast: Kunal Khemu, Sonu Sood, Soha Ali Khan, Paresh Rawal, Johny Lever, Deepal Shaw, Asrani, Razzak Khan, Avtar Gill The star cast of ‘Dhoondte Reh Jaaoge’ includes Kunal Khemu, Sonu Sood, Soha Ali Khan, Paresh Rawal, Johny Lever, Deepal Shaw, Asrani, Razzak Khan and Avtar Gill. The film revolves around a con that Anand Pawar (Kunal Kemmu) and Raj Chopra (Paresh Rawal) are trying to pull off. Anand is an honest Chartered Accountant, who is now sick of being a looser in life and looks forward to making quick money. Raj, on the other hand, is a veteran film producer who is now left with no money to make films. The con is very simple; Anand & Raj will raise Rs 100 crores, from various financers, but make a film within a budget of 5 crores only. The film will be so pathetic that it will be chucked out from the theaters on the very first day and termed as one of the biggest flops. After the bombarding of the film, Anand and Raj plan to run away with the 95 Crores remaining from the film’s budget. In other words, they look forward to becoming millionaires in the shortest time possible. To make the flopbuster, they rope in Aryan Kapoor (Sonu Sood) as the lead actor, Parvez Asharraf (Johny Lever), a Pro-Pakistan person, is hired as the writer, apart from numerous weird actors, director and music directors. Somewhere along the line, Anand becomes greedy enough to cheat on his own girlfriend Neha Chattopadhayay (Soha Ali Khan). She is a small time theatre actress and Anand decides to cast her as the main lead in his film to get her over the acting bug. As the film progresses, numerous hilarious situations occur, resulting in tons of laughter for the audience. Will Anand and Raj be able to pull off the coup? Tags: Asrani, Avtar Gill, Bollywood, Bollywood Movie, Bollywood Star, Comedy, Deepal Shaw, Dhoondte Reh Jaaoge, Jalees Sherwani, Johny Lever, Kunal Khemu, Omesh Shukla, Paresh Rawal, Razzak Khan, Ronnie Screwvala, Sajid-Wajid, Shabbir Ahmed, Soha Ali Khan, Sonu Sood
cc/2019-30/en_middle_0029.json.gz/line3786
__label__wiki
0.79638
0.79638
Home/News/Quora Data Breach: 100 Million Users Impacted Quora Data Breach: 100 Million Users Impacted Achintam Karmakar December 11, 2018 A few days after the gigantic Marriott data breach incident which impacted 500 million guests if the International chain of Marriott Hotels, another data leak has taken place. This time, it’s the most popular Question and Answer portal, Quora. Quora is a California based website which was co-founded by the former Facebook employees Charlie Cheever and Adam D’Angelo in June 2009. Quora is a social media platform which offers its users to have debates, the conversation surrounding various lively topics of life, love, faith, politics, education, interests and much more. The firm recently reported a case of the data breach that ultimately compromised personal data of around 100 million users such as encrypted passwords, email address, username, IP address and so on. The data breach was found by Quora on 30 November when it discovered that some of the user data were compromised by a third party who acquired unauthorized access to one of its systems. The Quora CEO Adam D’Angelo made a statement saying they are still investigating the cause of the breach with the help of their internal security teams. They have engaged a third party leading digital forensic and security company to assist in this situation. The law enforcement officials are also informed about it. Quora officials are working towards reaching the roots of the situation rapidly while taking appropriate steps to avoid such incidents in the future course of the firm. The kind of personal data that has been compromised include account information such as data imported from linked networks when authorized by users, hashed passwords, email address, and name. It includes public content and actions such as upvotes, comments, answers, questions and non-public content and actions such as direct messages, downvotes, and answer requests. The website is now following the procedure of notifying the users whose data has been compromised via sending an email. All the users who seem to get affected by it are logged out of their accounts to prevent further damage, and they are canceling their passwords to terminate the reach to their accounts by a malicious third party. The FAQ page of Quora Security Update contains more detailed information about more questions and doubts. The company is trying to be as open and transparent as possible without compromising their internal security system. Quora is just another leading company which became the victim of data breach and but the good thing is that the firm is acknowledging the truth rather than hiding it from its users. Adam D'Angelo Internet Quora Apple Inculpated for Inaccurate Claims Concerning Screen Sizes and Pixel Counts of iPhone X Series T1 Tact Watch Company Preview ‘Indigo Starman’ Smartwatch Design Huawei Y9 (2019) With 4,000mAh Battery and Quad Cameras Launched in India Microsoft to Likely Expand Xbox Program in 2019, Curbs All Access to the Service by December 31 Silhouettes: New Album Announced by American Football
cc/2019-30/en_middle_0029.json.gz/line3787
__label__wiki
0.701533
0.701533
Lights, bubbles, noise: DNR backs non-electric Asian carp barrier A study commissioned by the Minnesota DNR has led the agency to recommend bubbles, lights, and sound as the best barrier to Asian carp on the Mississippi River. The DNR hopes to keep the invasive fish from advancing beyond the Ford dam in St. Paul. The study found an electric barrier at the lock and dam could bring a public health risk and would likely be opposed by federal officials. Consequently, the agency will recommend the Legislature fund the non-electric alternative, which involves underwater speakers and strobe lights. The cost of installing the system is estimated at $12 million to $19 million. The engineering firm that conducted the study concedes the technology is unproven and will not be 100 percent effective. There are two varieties of Asian carp, bighead and silver. The carp are voracious eaters whose arrival in the Great Lakes or northern Minnesota would threaten native sport fish and the lucrative angling industry. West Metro (including Minneapolis)pipressEast Metro (including St. Paul)South MetrowccoMississippi RiverNewsDNRAsian Carpfishing Minnesota DNR signs deal for electronic fish barrier at Ford lock and dam Study: Asian carp not infesting Minnesota waters -- yet Ominous sign: Asian carp eggs found farther north in Mississippi River Coon Rapids Dam undergoing upgrades to prevent spread of Asian carp DNR pushing for $7M to build Asian carp barrier The DNR says there's evidence that the carp, which can grow to 60 pounds and outmuscle native species for food, are in the St. Croix River. However, Wisconsin DNR officials say the barriers aren't 100 percent effective and it may be a worthless effort at this point. Invasive carp found in Mississippi River near Cottage Grove Legislature's environmental 'to do' list starts with Asian carp Light snow expected in Twin Cities, up to 5 inches in southern Minn.
cc/2019-30/en_middle_0029.json.gz/line3789
__label__wiki
0.653715
0.653715
VidMob building ‘API for creativity’ that uses first-party data to fine tune video ad elements VidMob has raised $25 million in its latest round of funding. The company said it will use the money to further develop its Agile Creative Studio, an API platform that curates first-party creative data to offer insights for optimizing video ad campaigns. Why we should care VidMob’s Agile Creative Studio employs, what the company defines as, first-party creative data to identify the creative assets within a video ad that yield the strongest performance. VidMob’s technology uses machine learning to analyze video ads and then uses that data to modify video ads in real-time so that they deliver more of an impact. “The ad actually actually improves over time through this iterative process of creating and learning,” VidMob CEO Alex Collmer told TechCrunch. He said the company is trying to build what it thinks of as an API for creative, “Today, that friction point is frequently with our platform partners, with the Facebooks and Snaps, but we see it expanding to other areas where you see imagery as the central point of communication.” The company’s video creation, analytics and optimization tools are designed for social video advertisers. VidMob is a certified creative partner with all of the major social networks, including Facebook, YouTube, Snapchat, Twitter, Pinterest and LinkedIn. With more money to put toward its Agile Creative Studio technology, it will be able to offer advertisers a more comprehensive platform for their video advertising efforts. More on the news VidMob’s Agile Creative Studio platform is still in beta, but the company reports it has already analyzed more than 280,000 ad assets using the technology. This Series B funding was led by BuildGroup, with additional investments from Acadia Woods, Herington LLC, Interlock Partners, Macanta Investments, LP’s of Manifest and You & Mr. Jones. VidMob has now raised a total of $45 million since 2015 when it raised $2 million in seed funding to build out at marketplace for video editing professionals. The post VidMob building ‘API for creativity’ that uses first-party data to fine tune video ad elements appeared first on Marketing Land. To discover more visit: marketingland.com Tags:channel: video, marketing tools, video Why Live Video Is Your Next Big Win Parallel tracking goes live for Google Ads display campaigns May 1 Forrester report: Video ad spending expected to hit $103B in 2023
cc/2019-30/en_middle_0029.json.gz/line3791
__label__wiki
0.529913
0.529913
Regroup From Square One By Karl Turro Accurately categorizing the purpose of higher education expenses—an inconsistent process across institutions—is both an art and a science. For those who want their financial statements to clearly show the costs of fulfilling their institution’s mission, it may be time to rethink what higher education functional expense definitions need to convey. Let’s say you work for a complex institution that conducts a lot of sponsored research, engages regularly in public service initiatives, and includes a medical school and teaching hospital. Do you classify the costs associated with medical students working in the hospital as hospital expenses, or are they, in part, applicable to the institution’s educational function? Now suppose those medical students also accompany faculty members to an area reeling from a natural disaster, to provide emergency assistance and basic medical care. Are the resulting expenses related to the university’s research, public service, or education mission—or some of each? In the business office, even at smaller institutions, we grapple with such questions frequently, if not daily. The answers often take an autopilot approach: We assign an expense, based on where the cost was budgeted, to one of the long-standing functional expense categories and move on without further thought. If the business office replaces an air conditioner, for example, the cost is probably assigned to the institutional support category, not operation and maintenance of plant, even though the latter appears most applicable. For decades, NACUBO’s Financial Accounting and Reporting Manual (FARM) has served as the definitive guide for assigning expenses to a primary function. Those categories have not only shaped the organization of our general ledgers and audited financial statements, but they also form the basis of institutional reporting to the U.S. Department of Education’s National Center for Education Statistics (NCES). And, while they are certainly useful, the functional expense definitions in FARM reflect how institutions of higher education were organized decades ago; they don’t necessarily accommodate the complexity of programmatic functions within our institutions today. Campus security, for example, now encompasses far more than the protection of institutional property. IT functions, which didn’t really exist when FARM first appeared, now permeate all other functions. The existing functional expense definitions, however, don’t consistently reflect those realities. Outside Interest Up Perhaps because the definitions haven’t changed in years, colleges and universities have developed their own ideas of how to group and report functional expenses. That “creativity” has led to an inconsistency throughout higher education. For example, similar types of expenses may be reported by one institution as academic support and by another as instruction. Such inconsistencies became clear when NACUBO recently conducted an informal survey on the current state of expenditure reporting in higher education financial statements. The results showed significant variances in how expenses were categorized in activities ranging from departmental research to allocation of plant maintenance, and from athletics to depreciation and interest (see Figure 1, “Examples of Expense Reporting Inconsistencies”). Some institutions create a separate function for every programmatic activity, rather than grouping the activities under a traditional and encompassing definition. Others report functional expenses that aren’t truly expenses, such as gain or loss on disposable property. One might argue that natural classification of expenses, when shown on the face of the financial statements, proves more useful than functional classification. Board members, who have a fiscal responsibility to the institution, more readily understand natural classification, the language of the for-profit world. But higher education institutions operate within the not-for-profit (NFP) world, which has its own requirements—one of which is reporting functional expenses in the financial statements. In fact, most colleges and universities report functional expenses on the face of their statements (see Figure 2, “How Higher Education Institutions Report Expenses”). And, all independent NFP and public institutions must report expenses by function annually on the Integrated Postsecondary Education Data System (IPEDS) Finance Survey, which is administered by NCES. Finance survey information is publicly available through the IPEDS data center. Like it or not, media outlets and increasingly, public officials, turn to the IPEDS data to gain a sense of how much colleges and universities spend on, say, administrative overhead or educating students. Thanks to the detailed breakdown IPEDS provides within the overall education and general category, users zero in on one particular function rather than looking at the bigger picture of the many functions that, taken together, support an institution’s educational mission. Various stakeholders also use the data to compare the cost of obtaining a degree at different institutions, typically by dividing instruction expenses by the number of full-time-equivalent students. That calculation omits other functions necessary to deliver a college education, including student services, academic support, and central administration. In short, it doesn’t tell the entire story. Inconsistent functional expense classifications used by the schools skew cost comparisons as well. Functional expense reporting is also used by research and program funders who look at the ratio of program expenditures to total expenditures when evaluating a not-for-profit’s effectiveness in fulfilling its mission. Even the Financial Accounting Standards Board (FASB) has taken a keen interest in this topic and may require an analysis of natural expenses by function in the future (see sidebar, “Preliminary FASB Decisions on Functional Expense Reporting”). An Updated Structure With the White House calling for greater transparency from colleges and universities, probably in the form of a financial report card, expense data will undoubtedly come under even greater scrutiny. Seemingly everyone wants to know what it costs to educate a student, and functional expense reporting can help an institution answer that question accurately—especially if higher education redefines the categories. After reviewing the widespread usage and current limitations of functional expenses, NACUBO’s Accounting Principles Council (APC) has begun discussing the best way to update, consolidate, and streamline reporting categories. For instance, in place of the 12 categories introduced decades ago, the APC is considering recommending these six: Education (related activities and instruction). Auxiliaries. Independent operations (if applicable). Medical centers and hospitals (if applicable). Public service (if significant). With fewer categories, the expenses within each become more meaningful and contribute to greater comparability. Expenses typically included in the traditional categories of institutional, academic, and student support would be included in the function they actually support. Similarly, for public institutions, operation and maintenance of plant and depreciation would be included in the functions that those expenses support. For example, the costs associated with maintaining and operating a library would be included in educational activities. Each institution would determine how to allocate its overhead expenses to the various categories and explain its rationale to stakeholders. Using this suggested structure, the lion’s share of expenses would rightly end up in the education category. Showing all the functions that relate to educational activities and instruction will give college students and their parents a truer sense of everything that contributes to an education, and why an institution charges the tuition and fees it does. As you’d expect, the education category for a four-year college would contain higher residential and student services expenses than those of a commuter-focused community college. This clarity becomes possible only when an institution’s accounting and financial professionals use logical definitions for the various functions and apply them consistently. Sometimes that may mean digging into the specifics of a particular transaction and making a judgment call on how best to allocate the expenses among the functional categories. Using the earlier example of an institution’s medical mission to a disaster area, the business office might refer to a time study done during the trip, or talk with a faculty member. Depending on the information received, the expenses might be divided among public service, education, and research activities. Although the resulting division of expenses may not be precise, it isn’t arbitrary—it’s based upon informed judgment. As the higher education community in general considers how to change functional expense categories, NACUBO is committed to providing direction for the industry. Industry guidance will enable a coherent response to FASB’s recommendations and encourage consistency in the way both independent and public institutions approach telling their programmatic story through functional expense reporting. To better reflect the complexity of today’s operations and assist NACUBO with future guidance, individual institutions can implement the following recommendations now: Acknowledge the importance of functional reporting to external audiences. Numerous stakeholders have an interest in IPEDS data, which each uses in a different way—often for purposes of comparison among institutions. Because of this widespread usage, the functional expenses reported to the Department of Education should be both accurate and clearly explained. Use NACUBO’s FARM as a starting point. Although the expense definitions the manual offers haven’t been updated to reflect pure core program functions, FARM still provides guidance to any institution seeking to define or refine function codes. Does it make sense, for instance, to combine instruction, student services, academic support, and departmental research into one functional category of education, plus an allocation for maintenance of plant, depreciation, institutional support, and so forth? Explain your institution’s definitions in financial statements. Because combining a number of existing functions into one may hamper comparability, a clear explanation of what’s in the functions is critical. Use footnote disclosures to communicate the types of expenses within each category, including the allocation of overhead. For example, the category of independent operations might include a power plant at one university and a hotel at another. You might spell out how plant maintenance and depreciation are allocated to the auxiliaries category—say, based upon square footage of the auxiliary facilities. Provide enough detail that readers understand how your institution’s categories differ from those of other institutions. The functional categories may be the same for all institutions, but each one can customize those categories to tell its unique educational study. KARL TURRO is controller, Northwestern University, Evanston, Illinois. Financial Reporting Committee Volunteers This article for Business Officer is based on the work of a committee of NACUBO’s Accounting Principles Council that studies inconsistencies in financial reporting. Committee members are: Russell DiLeo, University of Pennsylvania Jeff Follman, University of Washington Brandon Gilliland, Wake Forest University Carlos Hernandez, University of North Texas Donna Lane, Boston University Ed Magee, West Virginia Higher Education Policy Commission Kay Parker, Purdue University Mike Riley, University of California System Joe Schwartz, Weill Cornell Medical College Karl Turro, Northwestern University Karen Craig, accounting project consultant, NACUBO Sue Menditto, director, accounting policy, NACUBO Ken Wilson, FARM author, NACUBO Preliminary FASB Decisions on Functional Expense Reporting The Financial Accounting Standards Board (FASB) has tentatively decided to improve the reporting of expenses for all not-for-profit organizations (NFPs) by: Requiring NFPs to report expenses by their nature, and retaining the requirement to report expenses by function. Continuing to allow NFPs the flexibility to present expenses by either function or nature or by both on the face of the statement of activities or within the notes. Requiring NFPs to provide an analysis of all expenses by function and by nature in one location: either in the statement of activities, a separate statement of expenses (currently called a statement of functional expenses), or a schedule in the notes. All expenses would be included, both operating and nonoperating, (discussions have included interest expense as an example of a nonoperating expense). Although the analysis would typically be provided in the form of a matrix, that specific format would not be required. For voluntary health and welfare organizations that are currently required to present expenses by function and by nature in a matrix format in the statement of functional expenses, the decisions reached would allow them the same presentation and disclosure flexibility as other NFPs as to how they communicate information about expenses. Additional information and examples are available at https://www.nacubo.org/topics/accounting.
cc/2019-30/en_middle_0029.json.gz/line3797
__label__cc
0.665436
0.334564
We're proud to introduce our team of highly experienced coaches! Coming from a variety of professional backgrounds, all have graduated from an accredited Coach training program, and are certified in behavioral style analysis and interpretation. Pricing for Coaching Services You are encouraged to review their profiles and select the right coach for you. Alvah Parker Work/Life Coach "I believe every person has his/her own unique gifts to give. I aid my clients to identify their gifts and find ways to use these gifts in their work and personal lives. I move my clients to action in a way that is supportive, validating, and practical." People changing careers or jobs More About Alvah Lisa Andrews "I feel it is important to help each person identify the unique abilities, skills, and values they have to offer. I also give my clients two things they need in a successful job search: confidence, and hope. It can be a challenging process, and I'm there to support them as they are transitioning." Entry level professionals. Mid-level managers. C-Suite executives. Career changers. Veterans and their spouses. Lenore Mewton "Bring WHO you are to WHAT that you do" -- that phrase embodies my belief that an individual's internal qualities are their external advantage. As a partner, guide, teacher, and change agent, my goal is to help you discover your greatest ally, your authentic self; be it as an employee, leader, entrepreneur, business person/owner or coach.." Individuals in career transition Employees seeking to enhance their careers within organizations More About Lenore Dave McKeon Career & Business Coach "Coaching is a relationship of equals, where accountability for moving oneself forward lies with the individual being coached, and responsibility for providing the insightful and challenging coaching to support that happening for the client lies with the coach." Executives and managers Individuals pursuing career advancement High achievers working to reach their goals More About Dave Georgiana Carollus "People are often discouraged from pursuing change or improvements in their lives because they judge themselves incapable or their dreams impossible and unattainable. What surprises people is that if they take small steps toward change, their lives unfold with richness, purpose and direction. I help people identify those initial steps and partner with them to create a framework of action to realize their goals and vision." Individuals wish to enhance or change their careers Specialize in those in IT, creative, educational, social service and human resource fields Clients who approach life with a spiritual perspective More About Georgiana Harry Rodenhi Business & Career Coach "I specialize in supporting professionals who find themselves facing career uncertainties or transitions in the fast-paced and dynamic world of high tech. I use an energetic coaching style to support you in clarifying your values, identifying key strengths & abilities and then using these insights to create a personalized value proposition. This becomes the basis for moving forward in the transition while promoting a more balanced work-life perspective." Individuals or organizations in transition, especially those in high-tech product/service sectors Individuals seeking more fulfillment in their lives/relationships or more growth & success in their jobs/careers More About Harry Marshall Brown "I help people move forward and feel passionate about what they do. Life is too short to not be happy. It is my job to ask the powerful questions to help you succeed." Individuals who want: career satisfaction, passion in their life and work and are willing to develop a plan and take action! Association and not-for-profit professionals Government, military More About Marshall
cc/2019-30/en_middle_0029.json.gz/line3801
__label__cc
0.593338
0.406662
National Youth Sports Program School-Based Outreach Program TRIO Talent Search TRIO Upward Bound Other Volunteer Opportunities Sharia Devese Sharia Devese (affectionately known as Coach D/Coach Sharia) is a graduate from Cleveland State University majoring in Social Work, minoring in Business Administration and Accounting. She has a commercial drivers license and also has her Health & Life Insurance license for the state of Ohio among other certificates and awards. Coach D found a passion for the youth early in life hence her background in daycare as a school age teacher and her years of volunteer service at multiple youth organizations throughout the community. She started her coaching career as an elementary girls basketball coach, then moved up to middle girls basketball where she won her first state championship and continued to move up the ladder as a JV coach and also boys & girls/middle school & high school track coaching. Coach D's love for sports and helping youth with life skills lead her to start a non-profit, build professional portfolios and develop fun interactive activities for her youth programs. Most of all she love what she does and feels blessed to share it all with her loving son Davon, age 11 (Little Coach D). 174 Yost Hall Email: upwardbound@case.edu
cc/2019-30/en_middle_0029.json.gz/line3807
__label__wiki
0.806832
0.806832
Board index Politics, News & Current Affairs Pakistan - News & Discussion News and Discussions about politics, current affairs, international relations, economy, elections, state level politics etc. This forum is strictly moderated. Post by KJo » Fri Oct 13, 2017 3:37 am Post Pakistan related news here. Re: Pakistan - News & Discussion Pakistan starts to cave in to US pressure, ready to throw Haqqanis under the bus WASHINGTON: In a validation of long-held suspicion that Pakistan uses terror groups as proxies to further state objectives, Islamabad has managed the release of an American-Canadian couple from terrorist custody, ingratiating itself to Washington in the process, following intense pressure from the Trump administration. US President Donald Trump himself disclosed on Thursday that his administration had secured the release of an American citizen and her Canadian husband who had been taken captive in 2012 and held hostage by the Haqqani network, a terrorist organization the US had once described as a veritable ''fighting arm of the Pakistani intelligence agency ISI.'' ''Yesterday, the United States government, working in conjunction with the Government of Pakistan, secured the release of the Boyle-Coleman family from captivity in Pakistan,'' Trump said in a statement on Thursday, referring to Caitlan Coleman and Joshua Boyle who were kidnapped near the Pak-Afghan border, without details as to how they were released. The statement disclosed that Ms. Coleman gave birth to the couple's three children while they were in captivity. Post by Gus » Sat Oct 14, 2017 10:50 am Starting to develop a much better relationship with Pakistan and its leaders. I want to thank them for their cooperation on many fronts. -:::: pakis have tamed yet another. Post by KJo » Sat Oct 14, 2017 10:41 pm Modi will be foolish to trust Trump and the US on anything. Trump shows Modi how to take an about-turn on Pakistan As @MadamSecretary will tell you again and again, the name of the game is leverage. And Pakistan has dollops of it. Even though the world’s most powerful leader, Donald Trump, told the world only a few weeks ago that US policy towards Pakistan was going to change – and India crowed delightedly when he did – fact is that the US isn’t doing what it is in the badlands of Afghanistan-Pakistan for India’s national interest, but its own. Only a month ago, Trump had accused Pakistan of “housing the very terrorists that we are fighting. But that will have to change, and that will change immediately,” he had said. The Pakistanis reacted badly to the Trump speech and even cancelled a scheduled visit by Lisa Curtis, Trump’s top official on South Asia in the White House. Post by Peregrine » Sun Oct 15, 2017 9:15 am Economic security - Capital suggestion Pakistan’s economic security is by far the most neglected element of our national security. For way too long, we remained focus on Pakistan’s military security. For way too long, we remained focus on Pakistan’s nuclear security. For us, national security has been all about military security. For us, national security has long been uni-dimensional. For us, national security has long been uni-organisational. Some eleven years ago, the US Army War College, the Canadian Land Forces Doctrine and Training System along with Queen’s University, Canada’s premier public research university, co-sponsored an academic conference. The conference concluded that: “War has changed. New organising principles require a new paradigm that facilitates change from a singular military approach to a multidimensional, multi-organizational... approach to deal more effectively with the contemporary global security reality.” Furthermore, “Time-honoured concepts of national security and the classical military means to attain it, while still necessary, are no longer sufficient.” Yes, Pakistan’s economy and Pakistan’s national security are – as a matter of fact – deeply, deeply interlinked. To be certain, Pakistan’s economy is vulnerable like never before. The four major threats are: external account (the trade deficit is at a historical high of $32.6 billion); fiscal deficit (the budgetary deficit is approaching a colossal Rs2 trillion); circular debt approaching Rs600 billion and an unsustainable debt of Rs25 trillion. John Perkins in ‘Confessions of an Economic Hit Man’ wrote, “We (economic hitmen) work very much like some of the hitmen for the mafia-because like them, we are looking for a favour, except we do it on a large level with governments and countries”. The School of International Studies at Jawaharlal Nehru University has made the following prescription: “On the strategic side, it is in India’s interests to ensure economic instability in Pakistan”. The New Delhi-based Institute of Defense Studies and Analysis has opined, Pakistan’s “water problems, when combined with poverty, social tension, environmental degradation, ineffectual leadership, and weak political institutions; contribute to growing disruptions that can result in state failure”. Now consider this: Pakistan is the 2nd largest pea producer in the world; 4th largest cotton producer; 4th largest sugarcane producer; 4th largest peach producer; 5th largest milk producer; 5th largest onion producer; 6th largest date producer; 8th largest rice producer; 9th largest wheat producer and 10th largest orange producer. Now consider this: Pakistan’s median age of 21.2 years – with a global range of 48.9 for Monaco and 15 for Uganda – makes Pakistan one of the youngest countries in the world. Between 2017 and 2040, Pakistan’s working age population is expected to expand rapidly. Yes, “Empirical evidence suggests that a large part of East Asia’s spectacular economic growth derives from demographic transition, i.e. from working age population bulge…” Here’s what the Woodrow Wilson International Center for Scholars stated: “Pakistan’s population promises to remain youthful over the next few decades. In the 2020s, the 15-24 age bracket is expected to swell by 20 percent. Pakistan’s under-24 population will still be in the majority come 2030. And as late as 2050, the median age is expected to be only 33.” Europe’s demographic transition opened up the demographic window that remained open for some five decades. The Chinese window opened up in 1990 and is expected to remain open till 2015 Pakistan’s deteriorating external account has a cure. Pakistan’s budgetary deficit has a cure. Pakistan’s circular debt has a cure. Pakistan’s burgeoning debt has a cure. Is anyone seriously looking for a cure? Pakistan needs to take corrective measures on four counts: exports, imports, the international value of the rupee and debt servicing. Is anyone seriously looking to undertake corrective measure? sbajwa Post by sbajwa » Mon Oct 16, 2017 6:15 pm Post by chetak » Wed Jan 03, 2018 4:30 am Where else but in the toilet "news" paper. ?? whatever this guy is smoking, its really powerful stuff. Pakistan, a rising power December 23, 2017, Sunil Sharan in Strategic Insights Visit the two countries. There is hardly any difference. The same bustling bazaars. The same chockablock traffic, screeching until one’s ears go mad. The same apparent, abysmal poverty. The same top five percent lording over everyone else. The same corruption. Over the same things, be it bribing traffic cops or receiving cuts on imported fighter jets. The same contempt for politicians, militaries held in the same high esteem. The same looks, the same stuff being watched and listened to, the same flanneled fool’s sport being obsessed over, in which none of the countries is the world champion, nor will ever be, at least in the foreseeable future (World champion means you gotta win in Australia and South Africa.) The only differences between the two nations seem that one’s currency is plastered with one father of the nation, and the other’s with the other’s father of the nation. Both fathers of the nation and their teachings forgotten in only seventy years, and whose memory is invoked by the powers that be to burnish their own images. The fathers would go mad if they were to come and see how their names are being misused and by whom. And the other difference is that signs are in different languages, which sound the same though. Yet, one nation is a rising power, ready to take its rightful place in the comity of nations, while the other is deemed a global pariah, a jelly state if not a failed state. Huh? How did this happen? The reality is different. The world pays lip service to India for its large middle class and its ability to buy arms on a large scale. India seems to consider this courting as its emergence on the world stage. Scratch the surface, and you will find something else. The US is denying Indians H1-B visas. The US has delinked the Haqqanis, who they want, from Hafiz Saeed, who they couldn’t care less about, so that they can give dollops of aid to the Pakistanis. Today the Yanks hector the Pakistanis, but that is empty bluster. The Pakistanis have trumped them; the Yanks’ wails appear like crocodile tears. The Yanks forgot when they invaded Afghanistan and enlisted the Pakistanis’ help by threatening to bomb them into the stone age that the Pakistanis had been there once before. That time they trumped the Russians, with significant money and arms from the Americans and the Saudis. But the Americans never took to battle in Afghanistan the first time round. Sure they had read that Afghanistan was a graveyard for empires, from the British to the Soviet, but they believed, foolishly, that they themselves would win out. They struck a Faustian bargain with the Pakistanis, without ever realizing that they were dealing with the devil. In the nineties, the Pakistanis used Afghanistan to hijack Indian planes and launch jihad in Kashmir. Afghanistan had become both strategic depth as well as a launching pad for them. How were they expected to give up this twin treat? Once the Yanks entered Kabul, the Taliban vanished. Into thin air? Oh no, many of them disappeared into Pakistan. The Yanks forgot about Afghanistan, until first the Iraqis, and then the Taliban, started knocking their teeth out. One by one their Nato brethren fled Afghanistan, until the Yanks realized that they had to flee as well. Go to Kabul today, and you will find disdain for Pakistan everywhere. But the Pakistanis don’t care. The real people who matter in Afghanistan are the Taliban, and you don’t find many of them in Kabul. The writ of the government of Afghanistan extends over only Kabul, much as the later-day Mughals were derided as the mayors of Delhi. The Taliban control over sixty percent of the country. The Talibs don’t like the Pakistanis, referring to them often as blacklegs. But the Talibs need Pakistan to capture Kabul, much as the Pakistanis need the Taliban to capture Afghanistan. The Pakistanis are disdainful of the threats emanating from the Yanks. The Yanks need Pakistani territory to transport supplies to their legionaries in Afghanistan. The Pakistanis blocked their land routes once, and all hell broke loose then. It’s almost impossible to transport goods from the west of Afghanistan. In courting China, Pakistan has been shrewd. India cannot win a two-front war, and the whole world knows that. As the Chinese and the Pakistanis together wear out India in any conventional conflict, India would have to resort to strategic weapons. But that is a big ask, for it would risk making India an international pariah. Just at that stage, Pakistan would unveil its Kashmir card. Second, by making India have two enemies instead of one, Pakistan forces India to up its defence budget, while lowering its own earmarks to levels much lower than they would have been in case India did not have to consider China. Its sad how Indian policymakers have been taken in by Pakistan’s love affair with China. They have tried to ween China away from Pakistan, but to no avail. Today Pakistan stands on the cusp of victory in Afghanistan. It spurns the Americans for the Chinese, and lo and behold, the Russians, the very people it had helped kick out of Afghanistan. Politics, or rather realpolitik, sure does make for strange bedfellows. Pakistan is able to stymie India at every international forum, be it the UN or the nuclear suppliers group. There have even been strong rumours about the Obama administration offering the Pakistanis their own nuclear deal. Trump yells and curses at the Pakistanis, but is the first one to give it gobs of military aid. Pakistan sure doesn’t seem like a loser. It appears to have come out of Afghanistan smelling of roses. It can blackmail America to its heart’s content, and what is more, happily get away with it. Does it seem like a failed state? A terrorist state? A terrorized state? At least not now. For now it seems that Pakistan’s star, that star in their beloved crescent, is rising. And rising. Post by Peregrine » Sun Feb 25, 2018 7:07 pm Democracy on steady decline in Pakistan: Economist Intelligence Unit ISLAMABAD: The fragile democracy is on a steady retreat in Pakistan despite the fact that the political government is nearing the completion of its term, says a fresh democracy index released by one of the most reputed publications in the world. According to 10th edition of The Economist Intelligence Unit's Democracy Index, Pakistan has witnessed a consistent decline in democratic health for the last three years as the country’s score kept declining after 2014 when incidentally a sit-in was staged outside Pakistani Parliament for over four months. The reputed British publication ranked 167 countries based on their score on a scale of 0 to 10 where 10 represents full democracy and 0 represents authoritarian regime. Pakistan which scored 4.26 last year is classified as hybrid democracy in the index. The Economist index comprises 60 indicators across five broad categories—electoral process and pluralism, functioning of government, political participation, democratic political culture and civil liberties. After 2013 elections, Pakistan obtained 4.64 but the democracy score started declining after 2014. In 2015, the score dropped to 4.40 followed by a further decline in 2016 to 4.33. Last year, witnessed the lowest score for Pakistan with 4.26 which was only better than 2006 under the dictatorship of General (retd) Pervez Musharraf when the country obtained 3.92 scores. Within Pakistan, political observers are also complaining that the space for democratic government is shrinking with increasingly assertive establishment and judiciary. The latest verdict by the Supreme Court of Pakistan barring former prime minister Nawaz Sharif from heading his ruling Pakistan Muslim League-Nawaz is also being considered a blow to democracy. “The immediate implications may centre on the political future of one individual, but the judgment has the potential to be hugely disruptive to the democratic process itself,” writes a daily newspaper in its editorial on Friday. Sharif, who was ousted in July last year through the Supreme Court verdict in the Panama Paper case, continuously complains of conspiracy against the democratic rule. Sharif, a three-time prime minister says efforts are being made to exclude him and his family from Pakistani politics in the guise of corruption cases. Sharif and his family are currently facing three corruption references in an accountability court where they have to appear almost on a daily basis. He claims that anti-democratic forces are not willing to accept Parliament's supremacy even after the restoration of “democracy” in 2008. Soon after his decisive victory in 2013 elections, Prime Minister Nawaz Sharif had to face a massive movement launched jointly by Pakistan Tehreek-e-Insaf (PTI) chief Imran Khan and Pakistan Awami Tehrik (PAT) leader Allama Tahirul Qadri which culminated at 126-day sit-in at D-Chowk, demanding Prime Minister’s resignation. Sharif’s close aides claimed that the move was supported by anti-democratic elements who were not happy with an assertive political government. The sit-in only ended after the APS terror attack in Peshawar which claimed lives of 132 schoolchildren. But the anti-Sharif movement continued after the sit-in and he had to fight a battle in the Supreme Court to prove that the 2013 vote was not rigged. The trial of former military ruler General (retd) Musharraf also became a point of contention. Finally the issue was resolved when Musharraf was allowed to leave the country. After the emergence of Panama Papers in April 2015, the PTI again launched a move to overthrow Nawaz Sharif whose offshore companies were mentioned in the leaked papers. The case ended up in the Supreme Court which announced its verdict in July 2017. Sharif was disqualified by the apex court for not declaring his receivable salary in a Dubai based company Capital FZE, owned by his son. The verdict was hailed as landmark by Imran Khan and other opposition parties but the ruling party complained that a democratic prime minister has been shown the door through a “judicial coup”. A Joint Investigation Team (JIT) formed by the apex court to probe allegations of corruption against Nawaz Sharif was also criticised for political victimisation. Even before the Sharif disqualification, democratic government did not have a smooth sailing as it had to sacrifice its minister for information over Dawn NewsLeak which refers to a story published in a newspaper. A strong notice was taken of the publication of the story and under immense pressure PML-N had to sack its minister Pervaiz Rashid for his “failure” to stop publication of the story. Adviser to Prime Minister on Foreign Affairs Tariq Fatemi was also sacked for his alleged role in Dawn NewsLeak. Earlier, another Senator Mushahidullah Khan was also dismissed by Sharif for his controversial interview. The Economist Intelligence Unit’s index of democracy INDIAN REPUBLIC : Flawed Democracy : No. 35 - OVERALL SCORE : 7.68 TERRORISTAN : Authoritarian regimes : No 113 - OVERALL SCORE : 3.92 Supratik Post by Supratik » Wed Apr 25, 2018 2:57 pm Wiki update. Hindu population in Pak 2017 census up to about 4.5 million (2.12%). In Sindh about 4.2 million. 8.9% in Sindh. 14% in Sindh minus Karachi division (Mohajir dominated). Up 9 times from 1951. Reference link not working. Have to confirm later. Post by chetak » Mon May 28, 2018 7:35 am As convenient a narrative as any and one that is also fairly economical with the truth. Their capacity for fooling themselves is almost infinite. and yet again, the gratuitous reference to "the ever-present danger of a war between two nuclear weapons states". and, haven't they completely flayed the skin off this poor dead horse by constantly flogging it for decades without any tangible returns or is it just the de rigueur dirge of "a former Pakistan ambassador to the UN" who just cannot divest himself of useless and decades old paki rhetoric of trying to panic the white skins. Normalising ties with India Munir Akram May 27, 2018 The writer is a former Pakistan ambassador to the UN. EVEN as Indian and Pakistani guns continue to thunder along the Line of Control in Kashmir, there are several signals of a desire on both sides to improve relations. Most notably, Pakistan’s army chief has on several occasions articulated an openness to evolving a modus vivendi with India, dubbed the ‘Bajwa doctrine’. Recently, the Indian defence minister stated that such peace overtures from Pakistan will be reciprocated. The Indian military attaché was invited to the Pakistan Day parade and accepted. Pakistan hosted India with other Shanghai Cooperation Organisa­tion members to discuss regional terrorism. In September, Pakistan and India will participate in SCO joint counterterrorism exercises in Russia. Last month, Pakistan hosted a Track II dialogue with India. For its part, Pakistan has consistently advocated resumption of the Composite (now Comprehensive) Dialogue with India. And while it was preoccupied with fighting terrorism within its territory and from across its western border, it made strategic sense for Pakistan to seek a calm eastern frontier. A shift in India’s strategic posture could open the door to addressing, if not fully resolving, the major issues. Unfortunately, since its inception, Narendra Modi’s BJP government made normalisation conditional on Pakistan’s disavowal of support to the Kashmiri freedom struggle and acceptance of culpability for Mumbai and other terrorist incidents in India. It evolved an enveloping strategy to destabilise Pakistan domestically, through sponsorship of Tehreek-i-Taliban Pakistan (TTP) terrorists and Baloch insurgents, and to isolate it internationally as a sponsor of terrorism. Several developments may have shifted Indian calculations. First, a significant convergence has emerged between Pakistan and major regional powers, Russia, China and Iran, on the need for a negotiated settlement in Afghanistan with the Afghan Taliban. India and the US were seen as spoilers. Second, despite Donald Trump’s anti-Pakistan rhetoric and insults, a US confrontation with Pakistan and its designation as a state sponsor of terrorism, widely anticipated by India, have not happened and appear highly unlikely. On the contrary, the US continues to rely on Pakistan’s cooperation to sustain its presence in Afghanistan and promote a political settlement with the Afghan Taliban. Third, after the Doklam stand-off last year, China offered India several olive branches — larger trade and investment, access to CPEC and, through it, to Central Asia and beyond, an intimate Xi-Modi summit. Afghan developments, American unpredictability and Chinese flexibility, appear to have inspired a policy recalibration in New Delhi to balance its vaunted strategic partnership with the US through more positive relations with China and Russia. Fourth, India failed in its quest to destabilise or isolate Pakistan. Pakistan’s several military operations in Fata and actions in Balochistan have succeeded in containing cross-border terrorism sponsored by India from Afghanistan. Cross-border attacks will be further restricted once Pakistan fully fences the Pak-Afghan border. Likewise, India has little hope now of isolating Pakistan given the central role it is expected to play in promoting a negotiated settlement in Afghanistan and the political convergence that has emerged among Pakistan, Russia, China and Iran on Afghanistan and terrorism. Finally, India has been unable to suppress the ongoing popular revolt of the Kashmiri people for over two years. It may calculate that opening a dialogue with Pakistan could help to end the revolt. For Pakistan, the most critical issue in any normalisation process will be (and has always been) Kashmir. No government or leader in Pakistan will be able to normalise relations with India while it continues a campaign of brutal suppression in India-held Kashmir (IHK). If the past is any guide, India’s effort will be to focus any dialogue with Pakistan on terrorism and press for the elimination of pro-Kashmiri militant groups in Pakistan (Lashkar-e-Taiba, Jaish-e-Mohammad, Hizbul Mujahideen) and the incarceration of their leaders. Islamabad would find it difficult to act against these groups, especially the Hizb, which is not internationally outlawed, while Indian suppression continues in IHK. In the context of terrorism, Pakistan would obviously raise India’s sponsorship of the TTP and Baloch insurgents. Contrary to simplistic analyses, India’s capacity to impose terrorist pressure on Pakistan is not unlimited. Pakistan can substantially neutralise India’s sponsorship of the TTP and the Balochistan Liberation Army through pressure on Kabul, negotiations with the US, fencing the border, political accommodation of Baloch grievances, Fata reforms and, if needed, direct action against terrorist bases. Pakistan does not need Indian concessions to eliminate cross-border terrorism from Afghanistan. Nor does it need to compromise its position on Kashmir to do so. However, despite the false starts of the past, it is possible that in the midst of the current global strategic flux, India may have decided that its national interests would be better served by playing a positive role in the emerging Eurasian security and economic structures, epitomised by the SCO, rather than serving as America’s cat’s paw. If there is indeed such a shift in India’s strategic posture, it could open the door to addressing, if not fully resolving, the major issues between Pakistan and India. Reciprocal assurances can be negotiated on terrorism, the non-use of force and the pacific settlement of disputes. Some issues, such as Siachen and Sir Creek, can be quickly resolved. Existing confidence-building measures could be enlarged, eg by agreeing to limits on force and weapons deployments and elimination of the possibility of surprise attacks and preemptive strikes. India’s participation in CPEC could be agreed without prejudice to Pakistan or India’s positions on the Jammu and Kashmir dispute. However, India would need to extend Pakistan reciprocal transit rights to Nepal and Bangladesh. Expansion of bilateral trade could be mutually beneficial so long as Pakistan is provided assurances against deindustrialisation by subsidised Indian exports. Water scarcity is a critical threat to both countries; they need to build on the Indus Waters Treaty to avert a water crisis that may become the spark of a future conflict. It remains to be seen if the initial Pakistan-India overtures will lead to dialogue and whether this can be sustained. The endeavour to normalise Pakistan-India relations is like a second marriage: a triumph of hope over experience. But no one can be resigned to accept the alternative: continued turmoil in South Asia and the ever-present danger of a war between two nuclear weapons states. Published in Dawn, May 27th, 2018 Post by chetak » Fri Jun 29, 2018 1:13 pm These phata pajama paki abduls cannot get over their shortsighted view of Indo pak relations, constantly couched in words like "need", treat us with respect", "relationship of respect", "Pakistan has a central role in the emerging geo-economic order of South Asia", “bitterness of the past should be overcome”, all betraying a deep sense of jealousy, outright greed and a long standing inferiority complex that has dragged their schitthole of a country that paki is today, right into the filthiest of gutters. NOT A SINGLE WORD spoken NOR ANY MENTION OF the word TERRORISM and the JEHADI COHORTS that are being pushed into India on a daily basis by a wretched country, now piously offering TRADE and CONNECTIVITY to India. chabahar has further buggered their happiness and India's presence in afghanistan has played havoc with their idea of strategic depth. Hemmed in as they are by India, not entirely sure of "boots on the ground" support by the hans when the schitt hits the usually power cut non working paki fan, abandoned by trump's america and shunned by the rest of the world, their buggered economy in the crapper and their record as one of the world's most troublesome and hated country, their islamic cup of woe surely runneth over. Their ex paki army general NSA nasser-janjua, comes across as delusional, demented and stupid. India needs Pakistan for accessing European market: former National Security Advisor Nasser Janjua Janjua said India's burgeoning economy needed access to the rich markets of Europe via Central Asia. Pakistan, he said, is the only country which could provide India with the access it truly desired. Islamabad | June 29, 2018 India needs Pakistan for accessing European market: ex National Security Advisor Nasser Janjua Nasser Khan Janjua. India must maintain a relationship of respect with Pakistan as its burgeoning economy needs access to the markets of Europe via Central Asia and Pakistan is the only country which could provide this, former National Security Advisor Nasser Janjua has said. Speaking at a regional conference on ‘Connectivity and Geo-Economics in South Asia’, Janjua, who stepped down this week after spending nearly three years in the office, said economy and security are two sides of the same coin with one having a causative relationship with the other, the Express Tribune reported. Noting that stability in South Asia is a pre-requisite for its connectivity, he said it is only through connectivity economic growth and stability can be brought about. The conference, organised by the Pakistan Institute for Peace Studies (PIPS), an Islamabad-based think tank, was attended by prominent scholars from both the countries. Janjua said India’s burgeoning economy needed access to the rich markets of Europe via Central Asia. Pakistan, he said, is the only country which could provide India with the access it truly desired. He acknowledged that without involving India in the multibillion-dollar China-Pakistan Economic Corridor (CPEC), free trade in the region is “quite difficult”. Participants at the conference explored how to achieve connectivity in a region that is beset with old rivalries and instabilities. Asked if China’s Belt and Road Initiative (BRI), to which countries like Pakistan have already signed, can help achieve that connectivity, the former NSA said Pakistan has a central role in the emerging geo-economic order of South Asia, as it can help connect the countries economically. “Even India cannot trade with this part of the world without Pakistan on board,” he said, adding that the “bitterness of the past should be overcome”. Indian scholar Sudheendhra Kulkarni said that South Asia is the most populated, least integrated and one of the poorest regions of the world. The trade amongst South Asian countries often circumvents each other, passing through third countries. Speakers at the conference pointed out that rivalries and stereotypical perceptions about each other have been hampering connectivity and trade. They discussed the policy implications of projects like the BRI and the CPEC and what would be the impact of supplementing these efforts with enhanced cultural contacts and cross-border economy. Another Indian scholar, Shanthie D’Souza, said that for connecting the region, small confidence-building steps were required. Other participants said India and Pakistan must establish linkages for trade to flow in the region Post by chetak » Wed Oct 03, 2018 12:58 pm Wary of debt trap, govt rethinks Silk Road projects. ISLAMABAD: After lengthy delays, an $8.2 billion revamp of a colonial-era rail line snaking from the Arabian Sea to the foothills of the Hindu Kush has become a test of Pakistan’s ability to rethink the signature Chinese ‘Silk Road’ projects due to debt concerns. The rail project linking Karachi to Peshawar is China’s biggest Belt and Road Initiative (BRI) project in Pakistan, but Islamabad has balked at the cost and financing terms. Take a look: CPEC projects — status, cost and benefits Resistance has stiffened under the new government of Prime Minister Imran Khan, who has voiced alarm about rising debt levels and says the country must wean itself off foreign loans. ARTICLE CONTINUES AFTER AD Chinese envoy says Beijing will only proceed with projects that Islamabad wants “We are seeing how to develop a model so the government of Pakistan wouldn’t have all the risk,” Minister for Planning, Development and Reforms Khusro Bakhtyar said at a recent press briefing. The cooling of enthusiasm for China’s investments mirrors the unease of incoming governments in Sri Lanka, Malaysia and the Maldives, where new administrations have come to power wary of Chinese deals struck by their predecessors. The new government in Pakistan had wanted to review all BRI contracts. Officials say there are concerns the deals were badly negotiated, too expensive or overly favoured China. But to Islamabad’s frustration, Beijing is only willing to review projects that have not yet begun, three senior government officials have told Reuters. China’s foreign ministry said, in a statement in response to questions faxed by Reuters, that both sides were committed to pressing forward with BRI projects, “to ensure those projects that are already built operate as normal, and those which are being built proceed smoothly”. CPEC 2018 Summit: Is Pakistan ready to make the right choices? Pakistani officials say they remain committed to Chinese investment but want to push harder on price and affordability, while re-orientating the China-Pakistan Economic Corridor (CPEC) — for which Beijing has pledged about $60 billion in infrastructure funds — to focus on projects that deliver social development in line with PM Khan’s election promises. China’s Ambassador to Pakistan Yao Jing told Reuters that Beijing was open to changes proposed by the new government and “we will definitely follow their agenda to work out a roadmap for BRI projects based on ‘mutual consultation’”. “It constitutes a process of discussion with each other about this kind of model, about this kind of roadmap for the future,” Mr Yao said. Beijing would only proceed with projects that Pakistan wanted, he added. “This is Pakistan’s economy, this is their society,” he said. Islamabad’s efforts to recalibrate CPEC are made trickier by its dependence on Chinese loans to prop up its vulnerable economy. Growing fissures in relations with Pakistan’s historic ally the United States have also weakened the country’s negotiating hand, as has a current account crisis likely to lead to a bailout by the International Monetary Fund, which may demand spending cuts. “We have reservations, but no other country is investing in Pakistan. What can we do?” one Pakistani minister told Reuters. Crumbling railways The ML-1 rail line is the spine of the country’s dilapidated rail network, which has in recent years been struggling to survive as passenger numbers plunge and the vital freight business nosedives. The Khan-led government has vowed to make the 1,872km line a priority CPEC project, saying it will help the poor travel across the country. But Islamabad is exploring funding options for CPEC projects that depart from the traditional BRI lending model — whereby host nations take on Chinese debt to finance construction of infrastructure — and has invited Saudi Arabia and other countries to invest. One option for ML-1, according to Pakistani officials, is the build-operate-transfer (BOT) model, which would see investors or companies finance and build the project and recoup their investment from cash-flows generated mainly by the rail freight business, before returning it to Pakistan in a few decades time. Ambassador Yao said Beijing was open to BOT and would “encourage” its companies to invest. Rail mega-projects under the BRI umbrella have run into problems elsewhere in Asia. A line linking Thailand and Laos has been beset by delays over financing, while Malaysia’s new Prime Minister Mahathir Mohamad outright cancelled the Chinese-funded $20bn East Coast Rail Link (ECRL). Beijing is happy to offer loans, but reticent to invest in the Pakistan venture as such projects are seldom profitable, according to Andrew Small, author of a book on China-Pakistan relations. “The problem is that the Chinese don’t think they can make money on this project and are not keen on BOT,” said the author. Published in Dawn, October 1st, 2018 Fitch warns of CPEC ‘curtailment’ under IMF programme Khaleeq Kiani ISLAMABAD: The US pressure could lead to ‘stricter’ conditions by the International Monetary Fund (IMF) to bailout Pakistan, including curtailment of China-Pakistan Economic Corridor and greater transparency in its financing, according to Fitch Rating. The “US pressure could lead to stricter programme conditionality, including the curtailment of CPEC projects and greater transparency in CPEC financing”, said the New York-based rating agency. It said US backing was not strictly required to secure an IMF programme, but the IMF board emphasised consensus decision-making. It said Pakistan’s incoming PTI-led coalition government will be under immediate pressure to arrest the deterioration in external finances and address fiscal challenges, as well as to attract the external funding necessary to meet its financing gap. “The new government has more political capital to take positive though difficult policy actions, but it has a thin majority in parliament and faces a strong opposition, which could complicate policymaking,” Fitch said. The rating agency expects Pakistan to seek potential financing from several sources including China and multilateral development banks, and possibly the IMF. Pakistan has been a repeated user of IMF financing, entering 12 programmes since 1980. The IMF would probably require further fiscal and monetary tightening, greater exchange-rate flexibility, and wide-ranging structural reforms, which could also help attract other sources of financing. Moreover, the IMF has unique monitoring mechanisms to implement corrective policies, without which there will continue to be significant uncertainty over the medium-term sustainability of Pakistan’s finances. Negotiations over an IMF agreement could be complicated by loans linked to the CPEC, part of China’s Belt Road Initiative (BRI), particularly amid rising global geopolitical tensions. Recent statements from US Secretary of State Mike Pompeo suggest the US administration does not want IMF financing used to bail out Chinese lenders. The $62bn CPEC project makes Pakistan one of the largest recipients of BRI financing. These loans have financed imports of capital goods, which have in turn inflated the current account deficit. The loans will eventually need to be repaid or refinanced. The rating agency said PTI founder Imran Khan, outlined a broad economic agenda for a “New Pakistan” during his campaign, with a focus on confronting corruption, reducing inequality and expanding social services. However, advancement of this policy agenda is likely to be limited in the short term, with external and fiscal problems taking priority. The current account deficit reached 5.6pc of GDP in the fiscal year ended June 2018, up from 4.7pc in FY17, while liquid foreign-exchange reserves fell by almost $4bn from end-December 2017 to end-July 2018 to just over $10bn. The sharp rise in global risk aversion towards emerging markets, and a projected pickup in Pakistan’s external debt obligations in 2019 are adding to financing pressures. The fiscal deficit has also widened and is likely to well exceed previous estimate of 6pc of GDP in FY18, up from 5.8pc a year earlier. Fitch revised the outlook on Pakistan’s ‘B’ rating to ‘negative’ from ‘stable’ in January to reflect these rising external and fiscal pressures. The State Bank of Pakistan has already taken some steps, raising its policy rate by 175bps since January and introducing greater flexibility in the heavily managed rupee by allowing four separate depreciations since mid-December 2017, which resulted in a cumulative 17pc decline against the dollar. These measures have so far not been enough to prevent the widening of the large external financing gap, which has been bridged with support from China, including an agreement to provide $2bn in additional bilateral lending in July. The Saudi-backed Islamic Development Bank has also reportedly extended a $4bn loan, the rating agency claimed. The new government appeared to recognise the urgency of the situation, with the likely incoming finance minister, Asad Umar, stating that “all options are on the table” and that the government will formulate a policy and financing path within six weeks. Published in Dawn, August 17th, 2018 Post by vishvak » Wed Oct 03, 2018 2:36 pm “The problem is that the Chinese don’t think they can make money on this project and are ... Now that has come out, it shows what the Chinese big talk on big projects is about. People here have been clear about it all along. Curious to see that Paki political decision making, US oversight, Saudi funding, etc will have any affect on Chinese plans for the same. The Indian stand on OBOR that it has sovereignty issues seems too granular for such grand Chinese plans, though this is prolly correct. Post by chetak » Thu Oct 11, 2018 5:00 pm Naila Inayat Verified account @nailainayat Oct 3 Hindu thermometer, Muslim thermometer. Photo that explains how Pakistan is an inherently discriminatory society. via @Mukesh_Meghwar from rural Sindh. Post by chetak » Wed Nov 07, 2018 2:04 pm Meanwhile, back at the motheaten ranch, imran khan niazi slinks back home with his tail between his legs, conspicuously empty handed and in dire need of plenty of burnol application in well known and much favored paki places. The prospect of confronting trump for the "facilitation" of a new IMF loan can only be so much more daunting than xi's fairly gentle rap on the knuckles. Wonder what the bajwa doctrine has to say about such situations. The baloon has well and truly been punctured so they will simply ratchet up their "diplomatic" support to the savages in cashmere to salvage their wounded pride imran khan returns empty-handed from China: Xi Jinping forced to extend minimal aid to ally amid US trade war Imran Khan is back from his first official visit to China. Imran's nervousness was apparent in his first interview to the Chinese media in which he repeated himself several times over, and he certainly did not come across as the head of a sovereign state. For a person of Imran Khan’s temperament, a visit primarily structured around a begging bowl couldn't have been all that pleasant. For that is what it was in reality. Worse still, it was something which could hardly be hidden from the public gaze. First, in the matter of the urgent need to get financial assistance, his meeting with Premier Li Keqiang was not propitious. Xinhua quoted him at a press conference as saying that China was willing to provide assistance to Pakistan “within our capability”, a statement unlikely to provide any relief to his guest. The same tone echoed in the following meeting with vice-foreign minister Kong Xuanyou where it was said that China had “made it clear in principle that (it) will provide necessary support and assistance to Pakistan in tiding over the current economic difficulties". It was also made clear that the actual amount of "assistance" will be discussed in subsequent meetings. Not a word about the rumoured $6 billion package, which was doing the rounds in the Pakistan media. The mood in Beijing was well encapsulated by Cheng Xiaohe, deputy director of the Centre for International Strategic Studies at Renmin University in the South China Morning Post. He rather tartly noted while China was willing to assist Pakistan, it was finally Islamabad’s responsibility to take care of its own people. Coming to the crux of the matter, he observed that China had a liquidity problem due to its trade war with the US. Therefore Pakistan “must seek all kinds of assistance”. That’s as crisp as it gets. Second is the issue of the nature and goals of Chinese loans and project assistance. Imran is no fool, and even before his election to the top post, the newly-elected prime minister had been stressing that Chinese assistance must also address the basic concerns of the people in terms of cheap housing, basic utilities and other aspects. In this he may get some reprieve. The joint statement stated "Chinese assistance will also be directed towards agriculture, education, health, poverty alleviation, safe drinking water, and vocational training". Even that quote has unwieldy strings attached. The "agriculture" aspect is entirely aimed at achieving Chinese goals. Remember the "CPEC Master Plan" leaked mid last year, which indicated that Chinese enterprises would operate their own farms across thousands of acres in Pakistan, with an end to end plan ranging from seeds, logistics and market. That's not assistance. That's a take over. Third, is the most ticklish aspect of a "re-negotiation" of Chinese loans that Imran and his team have been batting for. Nothing at all emerged on that front, and presumably, is going to be part of future discussions. The boiler plate joint statement did have some effusive language on Pakistan’s search for peace, and appreciated Pakistan’s “engagement” and “adherence” to the guidelines of the Nuclear Suppliers Group. No promise of membership as claimed by Indian media. Worse, the rest of the statement essentially commits Pakistan to the Chinese view on the Iran-US nuclear deal, and demanded ( as before ) a greater Chinese role in SAARC. None of this addresses Pakistan’s immediate concerns. In conclusion therefore, Imran returned home empty handed. As the The Dawn observed, it is surprising that a prime minister should visit an important ally with expectations that were clearly belied by reality. Normally, a dozen preparatory meetings should have laid the ground for such a visit and its expected outcomes. Instead, it appeared that the prime minister was negotiating his own way out of debt, that too at a time when his country was virtually on fire due to the antics of an extreme right wing group bent on violence. Somewhere, somebody blundered. For India or for anyone with an interest in South Asian stability, there are some aspects of interest. One aspect is that US-China trade confrontation has led to a state where China is reluctant to extend even minimal aid ( not assistance, which has conditions) to a valuable ally. Trade sanctions are therefore clearly biting. That’s interesting to say the least. A second aspect is that Pakistan will have now have to rely on the IMF for its largest ever loan package. While this is certain to bite, it is less dangerous than a Pakistan virtually bought up by China. That’s not in anyone’s best interests, least of all Islamabad itself. A third aspect is that the “higher than a mountain, and deeper than the seas” friendship between the two countries seems to have come up against the earthy taste of reality. Beijing is clearly not falling over itself to oblige Pakistan in terms of generous aid or social projects to any great degree. That last aspect will play itself out to the full only in the coming months. Wait and watch. This is only likely to get more interesting. Updated Date: Nov 05, 2018 15:34 PM Post by chetak » Mon Nov 19, 2018 9:26 am Ali Arif @i_aliarif China: Pakistani student Osama(University: Shanyang) killed in public by the father and brother of the girl he was dating. This is 2nd such case, foreigners are definitely not safe in China. Any word on it ? @ImranKhanPTI @ShireenMazari1 @fawadchaudhry @omar_quraishi @ChinaDaily https://twitter.com/i_aliarif/status/10 ... 2006674433 Post by chetak » Mon Nov 19, 2018 10:20 am Both are devious snakes, each in their own way. Nationalists, they certainly are not. https://www.youtube.com/watch?v=wg1M891xMRU GREAT Example of How to DESTROY a Pseudo-Secular, Biased "journalist" is this what the twitter CEO is supposed to be doing in India?? BIF has become very brazen. Not even the figleaf cover of impartiality and our very own desh drohi burka butt is simpering away. Twitter CEO during his visit in India Poster in his hand: *'Smash Brahminical Patriarchy'.* Tutored by #Left. Defining #unbiased approach? No wonder that nonLeft accounts are targeted. *India deserves better @Twitter! Can govt be serious about replacement? @reliancejio ready? Post by chetak » Sun Dec 23, 2018 9:15 am China’s ‘Belt and Road’ plan in Pakistan takes a military turn New York Times, Dec 21, 2018, By Maria Abi Habib ISLAMABAD: When President Donald Trump started the new year by suspending billions of dollars of security aid to Pakistan, one theory was that it would scare the Pakistani military into cooperating better with its U.S. allies. The reality was that Pakistan already had a replacement sponsor lined up. Just two weeks later, the Pakistani air force and Chinese officials were putting the final touches on a secret proposal to expand Pakistan’s building of Chinese military jets, weaponry and other hardware. The confidential plan, reviewed by The New York Times, would also deepen the cooperation between China and Pakistan in space, a frontier the Pentagon recently said Beijing was trying to militarize after decades of playing catch-up. All those military projects were designated as part of China’s Belt and Road Initiative a $1 trillion chain of infrastructure China and Pakistan are putting the final touches on a secret proposal to expand Pakistan's building of Chinese military equipment. It has come to light that in the hindsight of the Belt and Road Initiative, China is fulfilling its military ambitions Belt and Road Initiative, a $1 trillion chain of infrastructure development programs stretching across some 70 countries, built and financed by Beijing. Chinese officials have repeatedly said the Belt and Road is purely an economic project with peaceful intent. But with its plan for Pakistan, China is for the first time explicitly tying a Belt and Road proposal to its military ambitions — and confirming the concerns of a host of nations who suspect the infrastructure initiative is really about helping China project armed might. As China’s strategically located and nuclear-armed neighbor, Pakistan has been the leading example of how the Chinese projects are being used to give Beijing both favor and leverage among its clients. Since the beginning of the Belt and Road Initiative in 2013, Pakistan has been the program’s flagship site, with some $62 billion in projects planned in the so-called China-Pakistan Economic Corridor. In the process, China has lent more and more money to Pakistan at a time of economic desperation there, binding the two countries ever closer. For the most part, Pakistan has eagerly turned more toward China as the chill with the United States has deepened. Some Pakistani officials are growing concerned about losing sovereignty to their deep-pocketed Asian ally, but the host of ways the two countries are now bound together may leave Pakistan with little choice but to go along. Even before the revelation of the new Chinese-Pakistani military cooperation, some of China’s biggest projects in Pakistan had clear strategic implications. A Chinese-built seaport and special economic zone in the Pakistani town of Gwadar is rooted in trade, giving China a quicker route to get goods to the Arabian Sea. But it also gives Beijing a strategic card to play against India and the United States if tensions worsen to the point of naval blockades as the two powers increasingly confront each other at sea. A less scrutinized component of Belt and Road is the central role Pakistan plays in China’s Beidou satellite navigation system. Pakistan is the only other country that has been granted access to the system’s military service, allowing more precise guidance for missiles, ships and aircraft. The cooperation is meant to be a blueprint for Beidou’s expansion to other Belt and Road nations, however, ostensibly ending its clients’ reliance on the U.S. military-run GPS network that Chinese officials fear is monitored and manipulated by the United In Pakistan, China has found an amenable ally with much to recommend it: shared borders and a long history of cooperation; a hedge in South Asia against India; a large market for arms sales and trade with potential for growth; a wealth of natural Now, China is also finding a better showcase for its security and surveillance technology in a place once defined by its close military relationship with the United States. “The focus of Belt and Road is on roads and bridges and ports, because those are the concrete construction projects that people can easily see. But it’s the technologies of the future and technologies of future security systems that could be the biggest security threat in the Belt and Road project,” said Priscilla Moriuchi, director of strategic threat development at Recorded Future, a cyberthreat intelligence monitoring company based in Massachusetts. An Asset on the Sea The tightening China-Pakistan security alliance has gained momentum on a long road to the Arabian Sea. In 2015, under Belt and Road, China took a nascent port in the Pakistani coastal town of Gwadar and supercharged the project with an estimated $800 million development plan that included a large special economic zone for Chinese companies. Linking the port to western China would be a new 2,000-mile network of highways and rails through the most forbidding stretch of Pakistan: Baluchistan province, a resource-rich region plagued by militancy. The public vision for the project was that it would allow Chinese goods to bypass much longer and more expensive shipping routes through the Indian Ocean and avoid the territorial waters of several U.S. allies in Asia. From the beginning, though, key details of the project were kept from the public and lawmakers, officials say, including the terms of its loan structure and the length of the lease, more than 40 years, that a Chinese state-owned company secured to operate If there was concern within Pakistan about the hidden costs of the China-Pakistan Economic Corridor, also known as CPEC, there was growing suspicion abroad about a hidden military aspect, as In recent years, Chinese state-owned companies have built or begun constructing seaports at strategic spots around the Indian Ocean, including places in Sri Lanka, Bangladesh and Malaysia. Chinese officials insisted that the ports would not be militarized. But analysts began wondering whether China’s endgame was to muscle its way onto coastal territories that could become prime military assets — much as it did when it started militarizing contested islands in the South China Sea. Then, Sri Lanka, unable to repay its ballooning debt with China, handed over the Chinese-built port at Hambantota in a 99-year lease agreement last year. Indian and American officials expressed a growing conviction that taking control of the port had been China’s intent all along. In October, Vice President Mike Pence said Sri Lanka was a warning for all Belt and Road countries that China was luring them into debt traps. “China uses so-called debt diplomacy to expand its influence,” Pence said in a speech. “Just ask Sri Lanka, which took on massive debt to let Chinese state companies build a port of questionable commercial value,” Pence added. “It may soon become a forward military base for China’s growing blue-water navy.” Military analysts predict that China could use Gwadar to expand the naval footprint of its attack submarines, after agreeing in 2015 to sell eight submarines to Pakistan in a deal worth up to $6 billion. China could use the equipment it sells to the South Asian country to refuel its own submarines, extending its navy’s global reach. Deepening Debt When China inaugurated Belt and Road, in 2013, Prime Minister Nawaz Sharif’s new government in Pakistan saw it as the answer for a host of problems. Foreign investment in Pakistan was scant, driven away by terrorist attacks and the country’s enduring reputation for corruption. And Pakistan desperately needed a modern power grid to help ease persistent electricity shortages. Pakistani officials say that Beijing first proposed the highway from China’s western Xinjiang region through Pakistan that connected to Gwadar port. But Pakistani officials insisted that new coal power plants be built. China agreed. With CPEC under fresh scrutiny, Chinese and Pakistani officials in recent weeks have contended that Pakistan has a debt problem, but not a Chinese debt problem. In October, the country’s central bank revealed an overall debt and liability burden of about $215 billion, with $95 billion externally held. With nearly half of CPEC’s projects completed — in terms of worth — Pakistan currently owes China $23 billion. But the country stands to owe $62 billion to China — before interest balloons the figure to some $90 billion — under the plan for Belt and Road’s expansion there in coming years. Pakistan’s central bank governor, Ashraf Wathra, said publicly in 2015 that he had no clarity on Chinese investments in Pakistan and was concerned about rising debt levels . It still took him months after that to secure a briefing from Cabinet officials. “My main question was, ‘Do we have any feasibility studies of these projects and a cost-benefit analysis?’ Their answers were all evasive,” recalled Wathra, who has since retired. Ahsan Iqbal, a Cabinet minister and the main architect for CPEC in the previous government, said the project was well thoughtthrough and dismissed Wathra’s account. “No one wanted to invest here — the Chinese took a chance,” Iqbal said in an interview. But the bill is coming due. Pakistan’s first debt repayments to China are set for next year, starting at about $300 million and gradually increasing to reach about $3.2 billion by 2026, according to officials. And Pakistan is already having trouble paying what it owes to Chinese companies. Fighter Jets and Satellites According to the undisclosed proposal drawn up by the Pakistani air force and Chinese officials at the start of the year, a special economic zone under CPEC would be created in Pakistan to produce a new generation of fighter jets. For the first time, navigation systems, radar systems and onboard weapons would be built jointly by the countries at factories in Pakistan. The proposal, confirmed by officials at the Ministry of Planning and Development, would expand China and Pakistan’s current cooperation on the JF-17 fighter jet, which is assembled at Pakistan’s military-run Kamra Aeronautical Complex in Punjab province. The Chinese-designed jets have given Pakistan an alternative to the U.S.-built F-16 fighters. The plans are in the final stages of approval, but the current government is expected to rubber-stamp the project, officials in Islamabad say. For China, Pakistan could become a showcase for other countries seeking to shift their militaries away from U.S. equipment and toward Chinese arms, Western diplomats said. And because China is not averse to selling such advanced weaponry as ballistic missiles — which the United States will not sell to allies like Saudi Arabia — the deal with Pakistan could be a steppingstone to a bigger market for Chinese weapons in the Muslim world. For years, some of the most important military coordination between China and Pakistan has been going on in space. Just months before Beijing unveiled the Belt and Road project in 2013, it signed an agreement with Pakistan to build a network of satellite stations inside the South Asian country to establish the Beidou Navigation System as an alternative to the American GPS Beidou quickly became a core component of Belt and Road, with the Chinese government calling the satellite network part of an “information Silk Road” in a 2015 white paper. Like GPS, Beidou has a civilian function and a military one. If its trial with Pakistan goes well, Beijing could offer Beidou’s military service to other countries, creating a bloc of nations whose military actions would be more difficult for the United States to By 2020, all 35 satellites for the system will be launched in collaboration with other Belt and Road countries, completing “Beidou, whatever any users use it for — whether it’s a civilian navigating their way to the grocery store or a government using it to coordinate their rocket launches — those are all things that China can track,” said Moriuchi, of the research group Recorded Future. “And that’s what is most striking: that this authoritarian government will be a major technology provider for numerous countries in Asia, Africa and Europe.” For the Pentagon, China’s satellite launches are ominous. “The PLA continues to strengthen its military space capabilities despite its public stance against the militarization of space,” including developing Beidou and new weaponry, according to a Pentagon report issued to Congress in May, using a common abbreviation for China’s military. In October, Pakistan’s information minister, Fawad Chaudhry, said that by 2022, Pakistan would send its own astronaut into space with China’s help. “We are close to China, and we are getting more close,” he said in a later interview. “It’s time for the West to wake up and recognize our importance.” Wooing Pakistan’s Military Though the relationship between China and Pakistan has clearly grown closer, it has not been without tension. CPEC could still be vulnerable to political shifts in Pakistan — as happened this year in Malaysia, which shelved three big projects by Chinese Campaigning during the parliamentary elections that made him prime minister in July, Imran Khan vowed to review CPEC projects and renegotiate them if he won. In September, after meeting in Saudi Arabia with the crown prince, Khan said that the kingdom had agreed to invest in CPEC, too. Pakistan’s new commerce minister then proposed pausing all CPEC projects while the government The moves by Pakistan’s new government angered Beijing, which was concerned they could set back Belt and Road globally. But in Pakistan, China has a steady ally it can approach to smooth things over: the country’s powerful military establishment, which stands to fill its coffers with millions of dollars through CPEC as the military’s construction companies win infrastructure bids. Shortly after the commerce minister’s comments, the Pakistani army’s top commander, Gen. Qamar Javed Bajwa, hurried to Beijing for an unannounced visit with President Xi Jinping. The meeting came six weeks before Khan made his first official visit with the Chinese president. Statements from the military said Bajwa and Xi spoke extensively about Belt and Road projects, though economic talks are usually the purview of civilian officials. Bajwa “said that the Belt and Road initiative with CPEC as its flagship is destined to succeed despite all odds, and Pakistan’s Army shall ensure security of CPEC at all costs,” read a statement from the Pakistani military. Shortly after the Beijing meeting, Pakistan’s government rolled back its invitation to Saudi Arabia to join CPEC, and all talk of pausing or canceling Chinese projects has stopped. But China could face another challenge to its investments: a Pakistani financial crisis that has forced Khan’s government to seek loans from international lenders that require transparency. Throughout September, international delegations traveled to Islamabad carrying the same message: Reveal the extent of Chinese loans if you want financial assistance. In a late September meeting with visiting officials from the International Monetary Fund, Pakistan’s government asked for a bailout of up to $12 billion. The fund’s representatives pressed Pakistan to share all existing agreements with the Chinese government and demanded IMF input during any future CPEC negotiations. The fund also sought assurances that Pakistan would not use a bailout to repay CPEC loans. But the Chinese Embassy in Islamabad stepped up its engagement as well, demanding that CPEC deals be kept secret and promising to shore up Pakistan’s finances with bilateral loans, Pakistani officials say. Three months after taking office, Khan still has not made good on his campaign promises to reveal the nature of the $62 billion investment Beijing has committed to Pakistan, and his government has backtracked on an IMF deal. In early November, Khan visited Xi in Beijing, a trip during which he was expected to clinch bilateral loans and grants to ease Pakistans financial crisis. Instead, his government walked away with vague promises of a deal “in principle,” but refused to disclose any details. Post by chetak » Thu Jan 31, 2019 7:39 am old but still relevant as it shows the paki permanent anti India mindset and the vast difference between what the paki says and what the paki actually does https://www.youtube.com/watch?v=7iZKX53gA4g पाक Ret. Marshal :: भारत ने कभी पाक का बुरा नही चाहा हमेशा हमने भारत को धोका दिया Post by chetak » Sun Feb 10, 2019 3:08 pm India’s confused and contradictory signals are only emboldening Pakistan Pakistan even uses the Indus Waters Treaty, the world's most generous water-sharing pact, as a stick to beat us with. Why does India put up with this stinging rogue behaviour? Consider two developments in recent days that speak volumes about India’s Pakistan policy: Just as the United States moved to unilaterally withdraw from a major arms-control pact (the Intermediate-Range Forces, or INF Treaty), “Incredible India” — as it calls itself in international tourism-promotion ads — welcomed an inspection team from a terrorist state to scrutinise Indian hydropower projects that are being built under the terms of the Indus Waters Treaty (IWT). And, as if to mock the Indian foreign secretary’s formal protest over his call to separatist Umar Farooq four days earlier, Pakistani Foreign Minister Shah Mohammad Qureshi on Saturday telephoned another secessionist leader in Kashmir Valley, Ali Shah Geelani. Qureshi and Pakistan’s all-powerful military generals think they can get away by provoking India. In the absence of a clear-headed Pakistan policy backed by political resolve, India continues to send confusing and contradictory signals, encouraging Pakistan’s continuing roguish conduct. India’s welcoming of the three-member Pakistani inspection team, led by that country’s Indus commissioner, illustrated how its incoherent approach to Pakistan has spawned even appeasement. In 1960, in the naïve hope that water largesse would yield peace, India entered into the IWT by giving away the Indus system’s largest rivers as gifts to Pakistan. Since then, the congenitally hostile Pakistan, while drawing the full benefits from the treaty, has waged overt or covert aggression almost continuously — and is now using the IWT itself as a stick to beat India with, including by contriving water disputes and internationalising them. Whereas the US has ditched the INF Treaty over an alleged Russian violation of its terms, India clings to the IWT’s finer details — even though Pakistan is waging proxy war by terror against it. Like the IWT, the INF Treaty is of indefinite duration. Pakistan’s use of state-reared terrorist groups to inflict upon India death by a thousand cuts can be invoked by New Delhi as constituting reasonable grounds for an Indian withdrawal from the IWT. The International Court of Justice has upheld the principle that a treaty, including one of indefinite duration, may be dissolved by reason of a fundamental change of circumstances. Still, India not only adheres to the IWT’s finer details, it even goes beyond. For example, under the IWT’s Article VIII, the Permanent Indus Commission (PIC) is to meet once a year. Its next meeting was due in March 2019. But, thanks to India’s zealousness, the PIC met much earlier in August 2018, just five months after its previous meeting. It was at that meeting that India agreed to advance Pakistan’s inspection tour to October 2018. The last such tour occurred in 2014 and the next one, in keeping with the IWT provision for a tour “once every five years”, was due by the end of 2019. The local bodies’ elections in Jammu and Kashmir forced the October tour to be deferred to January-end. Before returning home on February 1, the Pakistani team examined three Indian hydropower projects currently under construction — the Pakal Dul, which will generate up to 1,000 megawatts of electricity, Ratle (850 megawatts), and Lower Kalnai (48 megawatts). The team also visited the already operational 900-megawatt Baglihar — a project that Pakistan tried earlier to stop by invoking the IWT’s dispute-settlement provisions. But the international neutral expert appointed to resolve the dispute ultimately ruled in India’s favour. Pakistan, however, could seek international intercession again by using the information its inspection team collected last week to mount technical objections to the Indian projects under construction. Even before the team visited India, Pakistani officials publicly raised objections to the spillway or freeboard of these projects. Pakistan’s interest lies in sustaining a unique treaty that incorporates water generosity to the lower riparian on a scale unmatched by any other pact in the world. That interest arms India with significant leverage to link the IWT’s future to Pakistan’s observance of basic international norms. Yet, India is letting go of the opportunity to reframe the terms of the Indus engagement. India’s pusillanimity is apparent from yet another development last week. After the Indian foreign secretary summoned the Pakistani high commissioner to lodge a protest over Qureshi’s call to Umar Farooq, the Pakistani foreign office the next day summoned the Indian high commissioner in Islamabad. This raises the question as to why India does not downgrade its diplomatic relations with Pakistan — why maintain full diplomatic ties with a country that New Delhi branded “Terroristan” in 2017? There is no reason for India to keep diplomatic relations with a terrorist state at the high commissioner level. Downsizing diplomatic missions and doing away with high commissioners should be part of an Indian strategy to employ peaceful tools, including diplomatic, economic and riparian pressures, to reform Pakistan’s behaviour. Sadly, India is all talk when it comes to imposing costs on the next-door terrorist state. Indian policymakers do not seem to realise that words not backed by action carry major costs. They not only affect India’s credibility but also undermine its deterrent posture by emboldening the enemy. Isn’t it telling that Pakistan continues to gore India, although it is much smaller in economic, military and demographic terms? Such aggression is the bitter fruit of India’s present approach — which essentially has remained the same under successive governments. However, it is still not too late to reverse course. India ought to talk less and act more. To tame a rogue neighbour, India must emphasise deeds, not words. For starters, it must discard the fiction that it can have normal diplomatic relations with a sponsor of terrorism. BRAHMA CHELLANEY Post by chetak » Tue Apr 09, 2019 8:18 pm https://www.youtube.com/watch?v=9NJbHJh9YlI General pervez musharraf house - inside view of pervaiz musharaf's house Muns Post by Muns » Tue Jul 02, 2019 6:30 am Only in the land of the Pure ; 'Honour killing': Pakistani expatriate kills nine members of family after he suspects his wife was cheating on him https://gulfnews.com/world/asia/pakista ... 1.64956597 According to prelminary investigation, Ajmal gunned down five members of the family on the spot including his wife, mother-in-law and two sisters-in-law. His brother-in-law and father-in-law also got bullet injuries. After opening fire, he, his father and borther allegedly locked other people in the room and set the house on fire. As a result, his two children and two other women were burnt alive. While eight people died on the spot, one with bullet wounds succumbed to injuries at Nishtar Hospital in Multan. A senior official told Gulf News that the suspect first opened fire on his wife. His mother-in-law and sisters-in-law came forward to save Kiran but he continued to shoot in rage and killed them all. Post by Muns » Wed Jul 03, 2019 6:24 am Another day, another abduction. While I used to dream about shallow forays into Tharparkar, we're still a little off from there. It is high time that we finally pass this citizenship amendment bill as promised and bring back all of these Hindus into India. With time, who knows we may eventually liberate a little bit of Sindh and repopulate the area with some of these new enterprising Sindhis who are willing to take on the challenge. Off my memory at the last census Tharparkar was around 30 to 40% in the period just to make sure, the girl was abducted in Thatta Pakistan, Sindh province. Hindu girl abducted in Pak https://www.india-aware.com/featured/hi ... ed-in-pak/ Sindh chief minister’s special assistant Veerji Kolhi also uploaded the news about the girl’s abduction on his Facebook page on Tuesday. “A 18-yearand-7-month-old student Payal Kumari was allegedly abducted by her teacher Kamran Soomor from Thatta ,” he wrote on Facebook. According to Veerji’s post, police have registered an FIR and have arrested three brothers who are suspected of kidnapping the girl. The threes suspects have been identified as Imran, Amjad and Ayoob. Return to “Politics, News & Current Affairs”
cc/2019-30/en_middle_0029.json.gz/line3810
__label__wiki
0.67278
0.67278
Bible > Commentaries > Galatians 6:17 ◄ Galatians 6:17 ► From now on let no man trouble me: for I bear in my body the marks of the Lord Jesus. (17) The Apostle has done. He will not dally with these vexatious attacks upon himself and his authority any more. He dismisses them with an appeal which ought to be final. He points to the scars of wounds which he had received in his Master’s service. The branding-irons of Christ, he says, have imprinted these upon me. They show that I, like the slaves of a heathen temple, am devoted and consecrated to His service. They are my credentials, and I shall produce no others. My assailants must leave me in peace. The marks.—The stigmata, or marks inflicted with branding-irons, such as those which show that a slave is attached to a particular temple or to the service of some particular deity. Branding was applied in some other cases, but especially to temple slaves. Those with which the Galatians were most familiar would be engaged in the worship of Cybele. There does not seem to be evidence to connect this passage directly with the incident of the “stigmata” in the life of St. Francis of Assisi, but it would seem very probable that the use of the word, which was left untranslated in the Latin versions, suggested, whether by a more or by a less distant association, the idea which took so strong a hold upon his mind that in a moment of extreme spiritual tension the actual marks of the Passion seemed to imprint themselves upon his body. Of the Lord Jesus.—The true text is simply, “of Jesus.” MacLaren's Expositions THE OWNER’S BRAND Galatians 6:17. The reference in these words is probably to the cruel custom of branding slaves as we do cattle, with initials or signs, to show their ownership. It is true that in old times criminals, and certain classes of Temple servants, and sometimes soldiers, were also so marked, but it is most in accordance with the Apostle’s way of thinking that he here has reference to the first class, and would represent himself as the _slave_ of Jesus Christ, designated as His by the scars and weaknesses which were the consequences of his apostolic zeal. Imprisonment, beating by the Jewish rod, shipwrecks, fastings, weariness, perils, persecutions, all these he sums up in another place as being the tokens by which he was approved as an apostle of Jesus Christ. And here he, no doubt, has the same thought in his mind, that his bodily weakness, which was the direct issue of his apostolic work, showed that he was Christ’s. The painful infirmity under which, as we learn, he was more especially suffering, about the time of writing this letter, may also have been in his mind. All through this Epistle he has been thundering and lightning against the disputers of this apostolic authority. And now at last he softens, and as it were, bares his thin arm, his scarred bosom, and bids these contumacious Galatians look upon them, and learn that he has a right to speak as the representative and messenger of the Lord Jesus. So we have here two or three points, I think, worth considering. First, think for a moment of the slave of Christ; then of the brands which mark the ownership; then of the glory in the servitude and the sign; and then of the immunity from human disturbances which that service gives. ‘From henceforth let no man trouble me. I bear in my body the marks of the Lord Jesus.’ I. First, then, a word or two about that conception of the slave of Christ. It is a pity that our Bible has not rendered the title which Paul ever gives himself at the beginning of his letters, by that simple word ‘slave,’ instead of the feebler one, ‘servant.’ For what he means when he calls himself the ‘servant of Jesus Christ’ is not that he bore to Christ the kind of relation which servants among us bear to those who have hired and paid them, and to whom they have come under obligations of their own will which they can terminate at any moment by their own caprice; but that he was in the roughest and simplest sense of the word, Christ’s slave. What lies in that metaphor? Well, it is the most uncompromising assertion of the most absolute authority on the one hand, and claim of unconditional submission and subjection on the other. The slave belonged to his master; the master could do exactly as he liked with him. If he killed him nobody had anything to say. He could set him to any task; he could do what he liked with any little possession or property that the slave seemed to have. He could break all his relationships, and separate him from wife and kindred. All that is atrocious and blasphemous when it is applied to the relations between man and man, but it is a blessed and magnificent truth when it is applied to the relations between a man and Christ. For this Lord has absolute authority over us, and He can do what He likes with everything that belongs to us; and we, and our duties, and our circumstances, and our relationships, are all in His hands, and the one thing that we have to render to Him is utter, absolute, unquestioning, unhesitating, unintermittent and unreserved obedience and submission. That which is abject degradation when it is rendered to a man, that which is blasphemous presumption when it is required by a man, that which is impossible, in its deepest reality, as between man and man, is possible, is blessed, is joyful and strong when it is required by, and rendered to, Jesus Christ. We are His slaves if we have any living relationship to Him at all. Where, then, in the Christian life, is there a place for self-will; where a place for self-indulgence; where for murmuring or reluctance; where for the assertion of any rights of my own as against that Master? We owe absolute obedience and submission to Jesus Christ. And what does the metaphor carry as to the basis on which this authority rests? How did men acquire slaves? Chiefly by purchase. The abominations of the slave market are a blessed metaphor for the deep realities of the Christian life. Christ has bought you for His own. The only thing that gives a human soul the right to have any true authority over another human soul is that it shall have yielded itself to the soul whom it would control. We must first of all give ourselves away before we have the right to possess, and the measure in which we give ourselves to another is the measure in which we possess another. And so Christ our Lord, according to the deep words of one of Paul’s letters, ‘gives Himself for us, that He might purchase unto Himself a people for His possession.’ ‘Ye are not your own; ye are bought with a price.’ Therefore the absolute authority, and unconditional surrender and submission which are the very essence of the Christian life, at bottom are but the corresponding and twofold effects of one thing, and that is love. For there is no possession of man by man except that which is based on love. And there is no submission of man to man worth calling so except that which is also based therein. ‘Thou hearts alone wouldst move; Thou only hearts dost love.’ The relation in both its parts, on the side of the Master and on the side of the captive bondsman, is the direct result and manifestation of that love which knits them together. Therefore the Christian slavery, with its abject submission, with its utter surrender and suppression of mine own will, with its complete yielding up of self to the control of Jesus, who died for me; because it is based upon His surrender of Himself to me, and in its inmost essence it is the operation of love, is therefore co-existent with the noblest freedom. This great Epistle to the Galatians is the trumpet call and clarion proclamation of Christian liberty. The breath of freedom blows inspiringly through it all. The very spirit of the letter is gathered up in one of its verses, ‘I have been called unto liberty,’ and in its great exhortation, ‘Stand fast therefore in the liberty wherewith Christ hath made you free.’ It is then sufficiently remarkable and profoundly significant that in this very letter, which thus is the protest of the free Christian consciousness against all limitations and outward restrictions, there should be this most emphatic declaration that the liberty of the Christian is slavery and the slavery of the Christian is freedom. He is free whose will coincides with his outward law. He is free who delights to do what he must do. He is free whose rule is love, and whose Master is Incarnate Love. ‘If the Son make you free, ye shall be free indeed.’ ‘O Lord, truly I am Thy servant, Thou hast loosed my bands.’ ‘I bear in my body’ the charter of my liberty, for I bear in my body the ‘brand of the Lord Jesus.’ II. And so now a word in the next place about these marks of ownership. As I have said, the Apostle evidently means thereby distinctly the bodily weaknesses, and possibly diseases, which were the direct consequences of his own apostolic faithfulness and zeal. He considered that he proved himself to be a minister of God by his stripes, imprisonments, fastings, by all the pains and sufferings and their permanent consequences in an enfeebled constitution, which he bore because he had preached the Cross of Christ. He knew that these things were the result of his faithful ministry. He believed that they had been sent by no blundering, blind fate; by no mere secondary causes; but by his Master Himself, whose hand had held the iron that branded into the hissing flesh the marks of His ownership. He felt that by means of these he had been drawn nearer to his Master, and the ownership had been made more perfect. And so in a rapture of contempt of pain, this heroic soul looks upon even bodily weakness and suffering as being the signs that he belonged to Christ, and the means of that possession being made more perfect. Now, what is all that to us Christian people who have no persecutions to endure, and none of whom I am afraid have ever worked hard enough for Christ to have damaged our health by it? Is there anything in this text that may be of general application to us all? Yes! I think so. Every Christian man or woman ought to bear, in his or her body, in a plain, literal sense, the tokens that he or she belongs to Jesus Christ. You ask me how? ‘If thy foot or thine hand offend thee, cut it off, and cast it from thee.’ There are things in your physical nature that you have to suppress; that you have always to regulate and coerce; that you have sometimes entirely to cast away and to do without, if you mean to be Jesus Christ’s at all. The old law of self-denial, of subduing the animal nature, its passions, appetites, desires, is as true and as needful to-day as it ever was; and for us all it is essential to the loftiness and purity of our Christian life that our animal nature and our fleshly constitution should be well kept down under heel and subdued. As Paul himself said in another place, ‘I bring under my body, and I keep it in subjection, lest by any means I should myself, having proclaimed to others the laws of the contest, be rejected from the prize.’ Oh, you Christian men and women! if you are not living a life of self-denial, if you are not crucifying the flesh, with its affections and lusts, if you are not bearing ‘about in the body the dying of the Lord Jesus, that the life also of Christ may be manifested in your mortal body,’ what tokens are there that you are Christ’s slaves at all? Then, besides this, we may expand the thought even further, and say that, in a very real sense, all the pains and sorrows and disappointments and afflictions that mainly touch our mortal part should be taken by us as, and made by us to be, the tokens that we belong to the Master. But it is not only in limitations and restrictions and self-denials and pains that Christ’s ownership of us ought to be manifested in our daily lives, and so by means of our mortal bodies, but if there be in our hearts a deep indwelling possession of the grace and sweetness of Christ, it will make itself visible, ay! even in our faces, and ‘beauty born of’ our communion with Him ‘shall pass into’ and glorify even rugged and care-lined countenances. There may be, and there ought to be, in all Christian people, manifestly visible the tokens of the indwelling serenity of the indwelling Christ. And it should not be left to some moment of rapture at the end of life, for men to look upon us, to behold our faces, ‘as it had been the face of an angel,’ but by our daily walk, by our countenances full of a removed tranquillity, and a joy that rises from within, men ought to take knowledge of us that we have been with Jesus, and it should be the truth--I bear in my body the tokens of His possession. III. Now, once more notice the glorying in the slavery and its signs. ‘I bear,’ says Paul; and he uses, as many of you may know, a somewhat remarkable word, which does not express mere bearing in the sense of toleration and patient endurance, although that is much; nor mere bearing in the sense of carrying, but implies bearing with a certain triumph as men would do who, coming back victorious from conflict, and being received into the city, were proud to show their scars, the honourable signs of their courage and constancy. So, with a triumph that is legitimate, the Apostle solemnly and proudly bears before men the marks of the Lord Jesus. Just as he says in another place:--’Thanks be unto God, which always leadeth us about in triumph in Jesus Christ,’ He was proud of being dragged at the conqueror’s chariot wheels, chained to them by the cords of love; and so he was proud of being the slave of Christ. It is a degradation to a man to yield abject submission, unconditional service to another man. It is the highest honour of our natures so to bow before that dear Lord. To prostrate ourselves to Him is to lift ourselves high in the scale of being. The King’s servant is every other person’s master. And he that feels that he is Christ’s, may well be, not proud but conscious, of the dignity of belonging to such a Lord. The monarch’s livery is a sign of honour. In our old Saxon kingdom the king’s menials were the first nobles. So it is with us. The aristocracy of humanity are the slaves of Jesus Christ. And let us be proud of the marks of the branding iron, whether they come in the shape of sorrows and pains, or otherwise. It is well that we should have to carry these. It is blessed, and a special mark of the Master’s favour that He should think it worth His while to mark us as His own, by any sorrow or by any pain. Howsoever hot may be the iron, and howsoever deeply it may be pressed by His firm, steady, gentle hand upon the quivering flesh and the shrinking heart, let us be thankful if He, even by it, impresses on us the manifest tokens of ownership. Oh, brethren! if we could come to look upon sorrows and losses with this clear recognition of their source, meaning and purpose, they change their nature, the paradox is fulfilled that we do ‘gather grapes of thorns and figs of thistles.’ ‘I bear in my body,’ with a solemn triumph and patient hope, ‘the marks of the Lord Jesus.’ IV. And now, lastly, the immunity from any disturbance which men can bring, which these marks, and the servitude they express, secure. ‘From henceforth let no man trouble me.’ Paul claims that his apostolic authority, having been established by the fact of his sufferings for Christ, should give him a sacredness in their eyes; that henceforth there should be no rebellion against his teaching and his word. We may expand the thought to apply more to ourselves, and say that, in the measure in which we belong to Christ, and hear the marks of His possession of us, in that measure are we free from the disturbance of earthly influences and of human voices; and from all the other sources of care and trouble, of perturbation and annoyance, which harass and vex other men’s spirits. ‘Ye are bought with a price,’ says Paul elsewhere. ‘Be not the servants of men.’ Christ is your Master; do not let men trouble you. Take your orders from Him; let men rave as they like. Be content to be approved by Him; let men think of you as they please. The Master’s smile is life, the Master’s frown is death to the slave; what matters it what other people may say? ‘He that judgeth me is the Lord.’ So keep yourselves above the cackle of ‘public opinion’; do not let your creed be crammed down your throats even by a consensus of however venerable and grave human teachers. Take your directions from your Master, and pay no heed to other voices if they would command. Live to please Him, and do not care what other people think. You are Christ’s servant; ‘let no man trouble’ you. And so it should be about all the distractions and petty annoyances that disturb human life and harass our hearts. A very little breath of wind will ruffle all the surface of a shallow pond, though it would sweep across the deep sea and produce no effect. Deepen your natures by close union with Christ, and absolute submission to Him, and there will be a great calm in them, and cares and sorrows, and all the external sources of anxiety, far away, down there beneath your feet, will ‘show scarce so gross as beetles,’ whilst you stand upon the high cliff and look down upon them all. ‘From henceforth no man shall trouble me.’ ‘I bear in my body the marks of the Lord Jesus.’ My brother! Whose marks do you bear? There are only two masters. If an eye that could see things as they are, were to go through this congregation, whose initials would it discern in your faces? There are some of us, I have no doubt, who in a very horrid sense bear in our bodies the marks of the idol that we worship. Men who have ruined their health by dissipation and animal sensualism--are there any of them here this morning? Are there none of us whose faces, whose trembling hands, whose diseased frames, are the tokens that they belong to the flesh and the world and the devil? Whose do _you_ bear? Oh! when one looks at all the faces that pass one upon the street--this all drawn with avarice and earthly-mindedness; that all bloated with self-indulgence and loose living--when one sees the mean faces, the passionate faces, the cruel faces, the vindictive faces, the lustful faces, the worldly faces, one sees how many of us bear in our bodies the marks of _another_ lord. They have no rest day nor night who worship the beast; and whosoever receiveth the mark of his name. I pray you, yield yourselves to your true Lord, so on earth you may bear the beginnings of the likeness that stamps you His, and hereafter, as one of His happy slaves, shall do priestly service at His throne and see His face, and His name shall be in your foreheads. Galatians 6:17-18. Henceforth let no man trouble me — By calling my commission, my doctrine, or my faithfulness in question; or with contentions against my office, quarrels and disputes on account of my renouncing circumcision and the ceremonies of the Mosaic law; for I bear (and affliction ought not to be added to the afflicted!) in my body the marks of the Lord Jesus — That is, of my being his persecuted servant; marks of far more importance, and which I think much more honourable, than circumcision; even the scars which I have received by stripes, blows, bruises, and chains, endured in his service, which ought to endear me to all who have a due regard to him. Because the word στιγματα denotes marks made by burning, some suppose that the apostle had in his eye those servants in the heathen temples on whose foreheads the name of the god to whom they belonged was in that way imprinted, and under the immediate protection of which god such servants were supposed to be. Hence the worshippers of the beast (Revelation 13:16) are represented as having a mark on their right hands, or on their foreheads, whereby they were known to be its worshippers. In like manner the servants of God are said to have his name on their foreheads, Revelation 22:4. In allusion to these customs, it is thought that the apostle calls the scars of the wounds which he received in Christ’s service, the marks of the Lord Jesus. For besides his having been stoned and left for dead in the streets of Lystra, as he was five times scourged by the Jews, and thrice beaten with rods by the Romans, (2 Corinthians 11:24-25,) it is probable he had suffered some of these punishments before this epistle was written, and that they had left scars in his body, by which he was distinguished as the servant of the Lord Jesus. Brethren, the grace — The unmerited favour, and the enlightening, quickening, sanctifying, and comforting influences of his Spirit; be with your spirit — To guide, animate, renew, purify, and comfort you in the ways of truth and peace, of wisdom, piety, and virtue. Thus, although the apostle’s rebukes in the former part of this epistle were sharp and cutting, and although he seems to have treated the Galatians with some severity; yet having expressed his persuasion, that after reading what he had written they would not think differently from him in the principal articles of the Christian doctrine, (chap. Galatians 5:10,) he here shows his love 6:16-18 A new creation to the image of Christ, as showing faith in him, is the greatest distinction between one man and another, and a blessing is declared on all who walk according to this rule. The blessings are, peace and mercy. Peace with God and our conscience, and all the comforts of this life, as far as they are needful. And mercy, an interest in the free love and favour of God in Christ, the spring and fountain of all other blessings. The written word of God is the rule we are to go by, both in its doctrines and precepts. May his grace ever be with our spirit, to sanctify, quicken, and cheer us, and may we always be ready to maintain the honour of that which is indeed our life. The apostle had in his body the marks of the Lord Jesus, the scars of wounds from persecuting enemies, for his cleaving to Christ, and the doctrine of the gospel. The apostle calls the Galatians his brethren, therein he shows his humility and his tender affection for them; and he takes his leave with a very serious prayer, that they might enjoy the favour of Christ Jesus, both in its effects and in its evidences. We need desire no more to make us happy than the grace of our Lord Jesus Christ. The apostle does not pray that the law of Moses, or the righteousness of works, but that the grace of Christ, might be with them; that it might be in their hearts and with their spirits, quickening, comforting, and strengthening them: to all which he sets his Amen; signifying his desire that so it might be, and his faith that so it would be. From henceforth - For the remaining time; that is, during the remainder of my life. Let no man trouble me - This implies that he had had trouble of some kind, and he earnestly desires that he may have no more. What particular trouble he here refers to, is not certainly known, and commentators have not been agreed. It seems to me that the connection requires us to understand it of the molestation which he had in regard to his call to the apostolic office, and his authority to explain and defend the religion of the Redeemer. This had been one principal subject of this Epistle. His authority had been called in question. He had felt it necessary to go into a vindication of it. His instructions had been departed from on the ground that he was not one of the original apostles, and that he differed from others; see Galatians 1:11. Hence, all the anxiety and trouble which he had had in regard to their departure from the doctrines which he had taught them. He closes the whole subject of the Epistle by this tender and affecting language, the sense of which has been well expressed by Crellius: "I have shown my apostolic authority, and proved that I am commisioned by the Lord Jesus. I have stated and vindicated the great doctrine of justification by faith, and shown that the Mosaic law is not necessarily binding. On these points may I have no more trouble. I have enough for my nature to bear of other kinds. I bear in my body the impressive proofs that I am an apostle, and the sufferings that require all my fortitude to sustain them." These marks, received in the service of the Lord Jesus, and so strongly resembling those which he himself received, prove that I am truly engaged in his cause, and am commissioned by him. These wounds and sorrows are so many, that I have need of the kindness and prayers of Christians rather than to be compelled to vindicate myself, and to rebuke them for their own wanderings." For I bear in my body the marks of the Lord Jesus - The word here rendered "marks" (στίγματα stigmata), means properly the marks or brands which are pricked or burnt in upon the body. So slaves were sometimes branded by their masters to prevent their escape; and so devotees to an idol god sometimes caused to be impressed on themselves the name or image of the divinity which they adored. Herodotus (ii. 113) mentions a temple of Hercules in Egypt, in which if any slave took refuge, and had the sacred brands or marks impressed on him (στίγματα stigmata), he thereby devoted himself to the god, and it was not lawful for anyone to injure him. Many have supposed that Paul here says, in allusion to such a custom, that he had the name of the Redeemer impressed on his body, and that he regarded himself as devoted to him and his cause. It seems to me that by these marks or brands he refers to the weals which he had received in his body; the marks of stripes and sufferings which he endured in the service of the Redeemer. Compare 2 Corinthians 11:24-25. He had repeatedly been scourged. He bore the marks of that on his person now. They were the evidences that he was devoted to the Saviour. He had received them in his cause; and they were the proofs that he belonged to the Lord Jesus. He had suffered for him, and had suffered much. Having thus suffered, and having thus the evidence that he belonged to the Saviour, and having by his sufferings given ample proof of that to others, he asks to be freed from further molestation. Some had in their body the marks of circumcision, the evidence that they were disciples of the Law of Moses; others had perhaps in their persons the image and name of an idol to which they were devoted; but the marks which he bore were the weals which he had received by being again and again whipped publicly in the cause of the Redeemer. To that Redeemer, therefore, he felt himself united, and from that attachment he would not allow himself to be diverted. How often has an old soldier shown his scars with pride and exultation as a proof of his attachment to his country! Numerous scars; the loss of an arm, an eye, or a leg, are thus the much valued and vaunted pledges of attachment to liberty, and a passport to the confidence of every man who loves his country. "I prize this wound," said Lafayette, when struck in the foot by a musket ball at Germantown, "as among the most valued of my honors." So Paul felt in regard to the scourges which he had received in the cause of the Lord Jesus. They were his boast and his glory; the pledge that he had been engaged in the cause of the Saviour, and a passport to all who loved the Son of God. Christians now are not subjected to such stripes and scourings. But let us have some marks of our attachment to the Lord Jesus. By a holy life; by self-denial; by subdued animal affections; by zeal in the cause of truth; by an imitation of the Lord Jesus; and by the marks of suffering in our body, if we should be called to it, let us have some evidence that we are his, and be able to say, when we look on death and eternity, "we bear with us the evidence that we belong to the Son of God." To us that will be of more value than any ribbon or star indicating elevated rank; more valuable than a ducal coronet; more valuable than the brightest jewel that ever sparkled on the brow of royalty. 17. let no man trouble me—by opposing my apostolic authority, seeing that it is stamped by a sure seal, namely, "I (in contrast to the Judaizing teachers who gloried in the flesh) bear (as a high mark of honor from the King of kings)." the marks—properly, marks branded on slaves to indicate their owners. So Paul's scars of wounds received for Christ's sake, indicate to whom he belongs, and in whose free and glorious service he is (2Co 11:23-25). The Judaizing teachers gloried in the circumcision mark in the flesh of their followers: Paul glories in the marks of suffering for Christ on his own body (compare Ga 6:14; Php 3:10; Col 1:24). the Lord—omitted in the oldest manuscripts. Let no man trouble me, either with questions about circumcision, or with imputations as if I were a friend to their opinion, of the necessity of adding to the doctrine of faith, circumcision and other observances of the law. For I bear in my body the marks of the Lord Jesus; I sufficiently declare my judgment to the world, suffering for my profession, and preaching the gospel. These sufferings he calls the marks of the Lord Jesus, because he endured them in testimony to the gospel, as well against the Jews its against the Gentiles. From henceforth let no man trouble me,.... Having so clearly stated and explained the doctrine of justification, and so largely proved that it is not by works, but by faith, and that circumcision and other rituals of the ceremonial law were not necessary to it, he desires, nay, in an authoritative way he requires, that they give him no further trouble on that head; signifying, that he expected they would be satisfied with what he had wrote, and abide by the truth and obey it, as they had formerly done; that he should hear no more objections from them, or complaints of them: nor need they further inquire his sense of these things; by this they would fully know his faith and practice; as indeed they might also by his suffering persecutions on the account of his faith, and his preaching the Gospel of Christ, and particularly this part of it: for I bear in my body the marks of the Lord Jesus; by which he means, not the marks in Christ's hands, feet, and side; but the reproachful characters the apostle was stigmatized with; or the real scars in his body, made by beating, scourging, and stoning of him; or his sufferings and persecutions in general, which he endured for the sake of Christ and his Gospel; see 2 Corinthians 11:23. The allusion is either to servants and soldiers, who, when taken into service, used to have some particular mark put upon them, that they might be known to be such an one's servant, or soldier (c); as the Hebrew servant, who was willing to serve his master, had his ear bored through with an awl, Exodus 21:6 so the apostle was known to be a firm and faithful servant, and a good soldier of Christ, by the reproaches and afflictions which he underwent for his sake; or else to those marks which, by way of reproach and punishment, were made upon fugitive servants, or soldiers, that deserted; as the sufferings of the apostle were designed as reproaches to him, and punishments of him, for preaching the Gospel of Christ; but these he gloried in, and bore and carried as trophies and marks of honour. Just as veteran soldiers show the scars and wounds they have received in battle, as tokens of their valour and courage, in facing and fighting the enemy in greatest danger: these he is said to bear "in his body"; not in the bodies of others, he gloried not in their flesh, as the false apostles did; nor in the circumcision of his own flesh, the scar that left there the mark of Moses and of a Jew; but in those things which were marks of his being a disciple of Christ, and not of Moses, and which he bore for his sake; and since therefore it was so easy to discern on which side of the question he was, from his suffering persecution for the cross of Christ; and since he had so many and such great trials and exercises, he, with apostolical gravity and authority, commands them to give him no more trouble, from the time of their reception of the epistle, henceforward. (c) Vid. Lydium de re militare, l. 1. c. 6. {11} From henceforth let no man trouble me: for I bear in my body the {o} marks of the {p} Lord Jesus. (11) Continuing still in the same metaphor, he opposes his miseries and the marks of those stripes which he bore for Christ's sake, against the scar of the outward circumcision, as a true mark of his apostleship. (o) Marks which are burnt into a man's flesh, as they used to do in ancient times, to mark their servants that had run away from them. (p) For it very important whose marks we bear: for the cause makes the martyr, and not the punishment. Meyer's NT Commentary Galatians 6:17. Τοῦ λοιποῦ] occurring only here in the N.T., very frequent in other authors; not ceterum, so that it would be a formula abrumpendi (Bengel, Zachariae, and others), equivalent to τὸ λοιπόν (2 Corinthians 13:11; Ephesians 6:10; Php 3:1, et al.), but the genitive of time (Kühner, II. p. 189): posthac, henceforward (Xen. Anab. v. 7. 34, vi. 4. 11; Plat. Legg. vii. p. 816 D, Demos, p. 385 B; Herod. ii. 109; and the passages in Wetstein); and that as denoting “repetitionem ejusdem facti reliquo tempore” (Hermann ad Viger. p. 706). The sense posthac might also have been expressed by the accusative (τὸ λοιπόν, Matthew 26:41; Mark 14:41; 1 Corinthians 7:29; Xen. Anab. ii. 2. 5, iii. 2. 8; Soph. Trach. 907, 917); but in this case a repetitio perpetua would be meant (Hermann, l.c.). Comp. Kühner, ad Xen. Anab, ii. 2. 5. Calvin explains: “as for the rest,” i.e. praeter novam creaturam. Comp. Wieseler: “quod restat.” In this case, either the genitive would stand absolutely: “as concerns what remains” (ὃ δὲ λοιπόν, 1 Corinthians 4:2), see Heind. ad Charm. p. 89; Matthiae, p. 815; or it would be dependent on κόπους. But, looking at the frequent use of τοῦ λοιποῦ as a particle of time, both these explanations would be very unnecessarily far-fetched. This remark also applies to the view of Hofmann, who strangely attaches τοῦ λοιποῦ, notwithstanding the want of an antithetical particle, as genitive of the object to κόπους, and conceives Ἰσραήλ as again supplied: on account of the Israel, which is not the Israel of God. Respecting that Israel, in the apostle’s view, he has not to inquire whether it will be injured through the labour to which he is called. As if any such cold, remorseless renunciation could be justly attributed to the apostle who held his συγγενεῖς κατὰ σάρκα so painfully dear (Romans 9:1 ff; Romans 10:1), and strove in every possible way to gain them (1 Corinthians 9:20). But from the hostile annoyances and vexations, which the reader would readily understand to be referred to in these words, the apostle desires to remain henceforward exempt; and this he demands with apostolic sternness. ἐγὼ γὰρ κ.τ.λ.] the emphasis is on ἐγώ: it is not the teachers who are hostile to me, these men afraid to suffer (Galatians 6:12), but I who bear, etc. στίγματα (στίγμα is paroxytone; see Lobeck, Paralip. p. 406) signifies marks branded or etched in, which, usually consisting of letters (Leviticus 19:28), were put on the body (especially on the forehead and hands) in the case of slaves, as the device of their masters;[272] of soldiers, as the badge of their general; of criminals, as a sign of their offence; and among some oriental nations also, as a token of the divinity which they worshipped (3Ma 2:29; and Grimm in loc). See Wetstein, p. 237 f.; Lipsius, Elect. ii. 15; Deyling, Obss. III. p. 423 ff.; Spencer, Legg. rit. ii. 14. 1; Ewald, in Apocal. p. 151 f. Here Paul has had in view the marks borne by slaves:[273] for, according to the immediate context (Galatians 6:14; Galatians 6:18), Christ is present to his mind as the Lord; and also in 2 Corinthians 11:23 he discerns, in the ill treatment which he has suffered, the proof that he is διάκονος Χιρστοῦ. Comp. also Revelation 7:3. The genitive Ἰησοῦ denotes therefore the Ruler, whose servant Paul is indicated to be by his στίγματα; and because in this case the feeling of fellowship with the concrete person of his Master has thoroughly pervaded him, he does not write Χριστοῦ, but Ἰησοῦ (comp. on 2 Corinthians 4:10). Others have explained: “notae corporis tales, quales ipse Christus gestavit” (Morus, comp. Borger); but against this it may be urged that Paul has not made use of a word which of itself conveys a complete idea (such as τὴν νέκρωσιν, 2 Corinthians 4:10), but has used the significant στίγματα, which necessarily prompts the reader to ask to whom the person marked (στιγματίας, also στιγματοφόρος, Polyaen. Strat. i. 24) is described as belonging. Therefore Ἰησοῦ is not (with Gomarus and Rückert) to be considered as genitive auctoris. But what was it that Paul bore in his body as the στίγματα Ἰησοῦ? The scars and other traces of the wounds and mal-treatment, which he had received on account of his apostolic labours.[274] For in the service of Christ he had been maltreated (2 Corinthians 11:23), and that so that he must have retained scars or similar indications (see 2 Corinthians 11:24-25). Some expositors have, however, believed that Paul adduces these στίγματα by way of contrast to the scar of circumcision (Erasmus in his Annot., Beza, Schoettgen, Grotius; comp. Bengel and Michaelis); but this idea is arbitrarily introduced, and in its paltriness alien to the lofty self-consciousness which these words breathe. Lastly, as regards the sense in which the reference of γάρ is to be taken, many expositors explain it, with Grotius: “satis aliunde habeo, quod feram.” So, in substance, Vatablus, Bengel (“afflicto non est addenda afflictio”), Morus, Winer. But what a feeble reason to assign would this be, either as fretful or as even bespeaking compassion, and wholly repugnant at all events to the proud feeling of being marked as the δοῦλος of Christ! (comp. 2 Corinthians 11:23 ff.) And the ἘΓΏ, so full of self-consciousness in opposition to the false teachers, is inconsistent with this view. No; Paul means (“veluti trophaea quaedam ostentans,” Erasmus, Paraphr.) to say: for I am one who, by being marked as the servant of Christ, is in possession of a dignity, which may justly exempt him from any repetition of molestations (such as had vexed him on the part of the Galatian churches). On βαστάζω, comp. Chrysostom: ΟὐΚ ΕἾΠΕΝ ἜΧΩ, ἈΛΛᾺ ΒΑΣΤΆΖΩ, ὭΣΠΕΡ ΤΙς ἘΠῚ ΤΡΟΠΑΊΟΙς ΜΈΓΑ ΦΡΟΝῶΝ. [272] In the East; but among the Romans only in the case of slaves who were suspected or had run away (as a sign of the latter offence, they were by way of punishment branded with Φ or F.U.G.). [273] Not of soldiers, as Grotius (comp. Calvin), and Potter, Arch. II. p. 7, think; for this must have been suggested by the context. Wetstein understands sacras notas (Herod. ii. 113: στίγματα ἱρά), so that Paul represents Christ “ut Deum, quem τὸν κύριον κατʼ ἐξοχήν vocat.” But these sacrae notae are only found among particular nations, such as the Persians and Assyrians (Plut. Lucull. p. 507 E; Lucian, de Dea Syra, 59; comp. also what is related in Herod. ii. 113 about a temple of Hercules in Egypt, and in the Asiatic Researches, vii. p. 281 f., about the Indians); hence so foreign a custom would not be likely to suggest itself to the apostle, nor could it be understood by his readers without some more special indication. [274] Not as Luther, 1519 and 1524, following Augustine, thought: the taming of the flesh and the fruits of the Spirit; against which the ἐν τῷ σώματί μου is itself decisive. In the Commentary of 1538, he understands “plagas corpori suo impressas et passiones, deinde ignita tela diaboli, tristitiam et pavores animi,” which thus throws together very different elements outward and inward. Galatians 6:17. τοῦ λοιποῦ … In deprecating any renewal of the present agitation Paul treats with contempt the prospect of serious danger from it. It had disturbed his peace and the peace of the Church, and must be got rid of, but he describes it as a wearisome annoyance rather than a real peril.—στίγματα. These were indelible marks branded on the flesh. They might be self-inflicted: instances are recorded of soldiers branding themselves with the name of their general in token of their absolute devotion to his cause. But they were as a rule inflicted for a badge of lifelong service; the figure in the text is borrowed from the latter, which were either penal or sacred. The penal were stamped on malefactors, runaway slaves, sometimes on captives; but it is clear from the context that the author has in mind the στίγματα ἱρά mentioned by Herodotus in ii., 113, with which the Galatians also were familiar in Phrygian temples. A class of slaves (ἱερόδουλοι) attached for life to the service of a temple were branded with the name of the deity. Paul likens himself to these in respect of his lifelong dedication to the name of Jesus, and of the marks imprinted on his body, by which he was sealed for a servant of Jesus in perpetuity. These were doubtless the scars left by Jewish scourging, by the stones of Lystra and the Roman rods at Philippi, all tokens of faithful service to his Master in which he gloried. 17. As at the opening, so at the close of the Epistle, St Paul asserts his authority. Then it was as a duly commissioned Apostle, here it is as a tried and tested servant of his Heavenly Master. He has fully discussed the question at issue. He has said his last word upon it. From henceforth he claims exemption from the worry and distraction of controversy. As he said elsewhere, ‘If any man be ignorant, let him be ignorant’ (1 Corinthians 14:38). for I bear … the Lord Jesus] All commentators agree in regarding this as having reference to St Paul’s suffering for Christ. ‘I, unlike these false teachers, can appeal to the marks of persecution which I have undergone as proofs of the depth of my convictions, the sincerity of my faith’. But the particular expression, ‘the marks of the Lord Jesus’, may either mean the ‘wounds of Christ’ or the marks of ownership branded on the Apostle’s body, which proved him to be the ‘slave of Christ’. Certain marks (stigmata) were affixed by means of a hot iron on two classes of slaves, (1) those who had run away from their masters or had otherwise misconducted themselves, in which case they were a badge of disgrace; and (2) on slaves attached to particular temples, as the property of the deity worshipped there. Of course St Paul cannot allude to the former of these cases. He may speak figuratively of the scars which he bore on his body, from wounds received at Lystra and elsewhere, as the proofs of his devotion to the service of Christ. Bp. Lightfoot adopts this view as most appropriate. “Such a practice at all events cannot have been unknown in a country which was the home of the worship of Cybele. A ‘sacred slave’ is mentioned in a Galatian inscription”. There is however, something to be said for the other explanation which makes the marks of the Lord Jesus to be the wheal of the stripes inflicted on His sacred body—the print of the nails and of the spear. In confirmation of this view passages are adduced in which St Paul speaks of himself as a partaker of the sufferings of Christ, of bearing about in his body the dying of the Lord Jesus, of filling up in his flesh the sufferings of Christ, 2 Corinthians 1:5; 2 Corinthians 4:10; Colossians 1:24; nay more, of being crucified with Christ, Romans 6:6; Galatians 2:20. On the whole, however, the former account of the phrase seems preferable. Most modern expositors notice the alleged ‘stigmata’ of St Francis of Assisi. The connexion is limited to the identity of the term, which has been adopted by Romish hagiologists from the Latin Vulgate. The stigmata of the Saint were not marks of persecution. Galatians 6:17. Τοῦ λοιποῦ, from henceforth) The mode of breaking off the discourse.—κόπουζ, labours [trouble]) Polemic theology, seriously discussed, is a laborious task to godly men; Galatians 6:11, note; and Galatians 4:20. See the second Antisturmius of L. Osiander, p. 87, 107: κόποι, labour and anxiety of mind, Matthew 26:10 [Why trouble (κόπους παρέχετε) ye the woman?].—μηδεὶς παρεχέτω, let no man cause me) Herein there is Ἀποτομία, severity, by virtue of his authority as an apostle.—ἐγὼ γὰρ, for I) Affliction should not be added to the afflicted.—τὰ στίγματα, the marks) from the lash, Acts 16:23. These marks of stripes rendered Paul infamous in the eyes of the world, but in reality conferred on him great dignity, for by these he was known to be a servant of Christ. Marks in the body are opposed to the mark of circumcision, the body of Paul [himself] to the flesh of others, Galatians 6:13 [the false teachers “glorying in the flesh” of their followers when circumcised].—τοῦ Κυριοῦ, of the Lord) Colossians 1:24, “of the afflictions of Christ.”—βαστάζω, I bear) so that I consider it an honour to me, Galatians 6:14. Therefore they will be disagreeable to me, who please themselves in any other way.[68] [68] Who seek occasion for glorying in anything but the Cross of Christ.—ED. Verse 17. - From henceforth (τοῦ λοιποῦ). This genitive form is found, in the New Testament, only here and in Ephesians 6:10, where the Textus Receptus reads τὸ λοιπόν. As being less ambiguous, it is chosen in preference to τὸ λοιπόν, because this latter word is also used in the sense "finally," as in Philippians 3:1; Philippians 4:8, as well as for "henceforth," as in Matthew 26:45; Hebrews 10:13. The meaning of τοῦ λοιποῦ is illustrated by Aristophanes, 'Pax.,' 1050, "You shall never dine henceforth (τοῦ λοιποῦ) any more in the Prytaneum;" and Herod., 3:15. Let no man trouble me (κόπους μοι μηδεὶς παρεχέτω). The phrase, κόπους πραέχειν, "cause trouble, or annoyance," occurs also in Matthew 26:10; Luke 11:7; Luke 18:5. Obviously the apostle refers to such trouble as was now accruing to him from the endeavours of the Judaizing party to pervert his Galatian disciples. On him fell the "anxiety of all the Churches" (2 Corinthians 11:28). In any of his Gentile Churches, the defeat of the work of the gospel by Judaizing perversion was a "worry" which touched him to the very quick. There is nothing to warrant the supposition that he alludes to assaults made in particular upon his apostolical authority, such as he had often occasion to deal with, as, for example, at Corinth. None such have been referred to in this Epistle, though he has found occasion to complain of the alienated affections of his converts. For I bear in my body the marks of the Lord Jesus (ἐγὼ γὰρ τὰ στίγματα τοῦ Ἰησοῦ [Receptus, τοῦ Κυρίου Ἰησου] ἐν τῷ σώματί μου βαστάζω); I am one who bear branded on my body the flesh-marks of Jesus. The ἐγὼ is inserted with emphasis. Being such as he here describes himself, he had a claim upon his brethren to be spared unnecessary annoyance. The Greek word stigma here employed denotes a mark on the flesh, either by puncture, its proper sense, with a hot, sharp instrument, very often with hot needles (see Prudentius's lines quoted by Grotius in his note on the χάραγμα, mark, in Revelation 13:16), or more summarily by simply branding without puncture. It served sometimes as a mark of permanent ownership, as upon horses or cattle (Liddell and Scott, sub verb. στίζω). In respect to slaves, it was not considered humane to brand them, except for punishment, or as security in particular cases against running away. Hence στιγματίας, brandling, designated a scoundrel or a runaway slave; as Aristophanes, 'Lys.,' 331; 'Av.,' 760. Others besides slaves were sometimes branded in ignominious punishment: Aristophanes, 'Ran.,' 1507; Herod., 7:233. Thus we have in Æschines (38, 26), ἐστιγμένος αὐτομόλος, "a branded deserter." Vegetius (quoted by Facciolati, sub verb. stigma), writing three hundred years later, states ('Do Re Milit.,' 1:8; 2:5) that, in the Roman army, raw recruits had to be proved fit for service before they were allowed to have the tattoo put upon them. After due trial, they were "punc-turis in cute punctis milites scripti et matriculis inserti." But this testimony does not establish the fact of such usage prevailing in the Roman army in St. Paul's time; though it is quite supposable that then, as now, soldiers might sometimes tattoo on their arm or hand the name of a favourite general. Instances are cited of consecration to a particular god being signalized by stigma. Herodotus, writing five hundred years before, says of a certain temple of Heracles, on the Egyptian coast, that if a servant, belonging to any man whatever, took sanctuary in it, and put upon himself sacred stigmata, giving himself to the god, no one could touch him (2:113). In 3Macc. 2:29 mention is made of a "mark of Dionysus" ivy leaf being, by means of fire, put upon the body of Jews in Egypt in the time of Ptolemy Philopator; but this would seem to have been intended rather as a barbarous indignity, because especially abhorrent to their religious feelings, than as an actual consecration of them to Dionysus as his "slaves." But that it was in some cases employed to signalize a "sacred slave" is attested by Philo, 'De Mon.,' 2. p. 221, M; and Lucian, 'De Dea Syr.,' § 59, as cited by Bishop Lightfoot, who remarks that "such a practice could not have been unknown in a country which was the home of the worship of Cybele." An example more familiar to the apostle's mind might, perhaps, be cited from Isaiah 44:5 (Septuagint), ἐπιγράψει χειρὶ αὐτοῦ Τοῦ Θεοῦ εὐμί, "shall write upon his hand, I am God's," which rendering Gesenius ('Thes.,' in verb. kathabh) consents to accept. But if this rendering be the right one, it may yet be doubted whether it means writing by puncture; for γράμματα στικτὰ appear in Leviticus 19:28 to be forbidden; unless, indeed, the prohibition be taken to refer to idolatrous tattoos only. But even thus the use of such in idol-worships has a further confirmation. It appears, however, to be a strong objection to our supposing the apostle to be here alluding to either the stigmata of consecration or those of other ownership, that such would infer no more suffering than would attend simple tattooing; whereas it is plain that the apostle alludes to marks which evidenced the undergoing of inflictions of extraordinary severity. The word stigma had passed into Roman usage, being employed both in a literal sense and also in a figurative one of a "stigma," as we also speak, cast upon a person's character as by a poet's lampoon. Thus Martial ('Epigr.,' 12:62) writes, "Frons haec stigmate non meo notanda," "This forehead to be marked with a stigma not of my affixing," where the word frons indicates a close adherence to the original notion of a slave's forehead branded. Suetonius ('Caes.,' 73), "Catullum, a quo sibi versiculis de Mamurra perpetua stigmata imposita non dissimulaverat, satisfacientem eodem die adhibnit coenae." Reviewing the evidence now adduced as to the manner in which the term was used, we observe that the words "brandling" and "branded" (στιγματίας and ἐστιγμένος) were used to describe a person made infamous to open view by brand-marks put upon his person. It was natural that the word stigma would thus acquire the sense of a mark of patent infamy left upon a man's person by some corporal abuse which he had been subjected to, without any other qualifying idea. Now, it appears most probable that it is in this sense that the apostle here uses the word. The term points to those scars, seams, perhaps long-continuing sores, which the long course of ever-recurring hardships and ill usage, through which he had passed, must have left upon him - patent evidence to all who looked upon him of the manner in which his fellow-men regarded and treated him; this only, apart from any qualifying idea, whether of ownership, or of military allegiance, or of religious consecration. It is in this general sense that Chrysostom appears to have read the clause; and this general sense satisfies all the requirements of the context. A strong light is thrown upon this matter by what the apostle, near about this same time, wrote to the Corinthians, in 2 Corinthians 11:22-27. The passage, as indeed does the whole Epistle, with much also of the frmer Epistle addressed to the same Church, betokens a strong feeling at this particular time resting on his mind, of the grievous, countless, hardships which marked his career - a feeling, very supposably, just then freshened by some very painful experiences recently gone through, from the effects of which his bodily form was still suffering. "In stripes above measure,... in deaths oft. Of the Jews, five times received I forty stripes save one; thrice was I beaten with rods, once was I stoned, thrice I suffered shipwreck, a night and a day have I been in the deep." Such are some particulars which he specifies; and the enumeration is very suggestive with reference to our present point. Could he have undergone that "stoning" at Lystra, after which he was dragged out of the city as dead to be left to lie without burial, and have carried away no enduring disfigurement? Whether any marks would be likely to remain upon him from the five Jewish whippings, we cannot tell; but we may be assured that the three floggings inflicted with the cruel vitis of the Roman soldiery must have scarred his flesh with seams of permanent disfigurement. Perhaps while he wrote, sores remaining from some one of those eight punishments were making themselves painfully felt. These judicial inflictions, however, severe as some of them may have been, were nevertheless regulated by law and custom. There were m all probability other, much more barbarous and altogether unregulated, violences, which came often upon him from the brutality of mobs, from the assaults of "robbers," from accidents in shipwreck. It could not fail but that his person presented, wherever he went, conspicuously to view, tokens that he was one wont to be both regarded and dealt with as if he were, no doubt deservedly, a wretched outcast; in his own forcible, most deeply pathetic phrase, περικαθάρματα τοῦ κόμου πάντων περίψημα "as the filth of the world, the offscouring of all things" (1 Corinthians 4:13). The apostle's enemies taunted him with the contrast which subsisted between the solemnity and power - would-be power they meant - of his letters, and the meanness and feebleness of his personal appearance and his personal address (2 Corinthians 10:1, 10). His personal presence may, originally and by natural make, not have been calculated to bespeak respect. But whatever disadvantages he lay under originally, must, beyond all question, have been vastly aggravated by the bodily hard ships to which he had been subjected. These must have left effects (this, perhaps, being the "stake in the flesh" which be groaned under - "Satan's messenger to buffet him," the fruits, certainly, of Satan's working in the hearts of godless men) which he felt to be not only fraught with personal humiliation in whatever intercourse he held with his fellow-men, but also likely greatly to mar his efficiency in his ministerial work. The only consolation remaining to him was that, in the utter extinction of all self-love, he rejoiced to know that Christ's grace had, in this enhanced feebleness of his instrument, the clearer field wherein to manifest its own Divine potency (2 Corinthians 12:9, 10). "The flesh-marks of Jesus." This may be understood as meaning that they were incurred in Jesus' service. In part it may be so taken; but the relation expressed by this genitive appears to go deeper than that. The apostle means, the marks which disfigured the body of Jesus as now reproduced in his body. The genitive is used in just the same way as it is in the strikingly similar clause in 2 Corinthians 4:10, "always bearing about in the body the dying of Jesus (παντότε τὴν νέκρωσιν τοῦ Ἰησοῦ ἐν σῶ σώματι περιφέροντες), where ' ἡ νεκρωσις τοῦ Ἰησοῦ means apparently "the deadness or corpse-condition of Jesus" (compare the use of the Greek noun in Romans 4:19); the state of Jesus' νενεκρωμένον σῶμα, while yet hanging a corpse on the cross. By s strong hyperbole, prompted by the intense feeling then on his mind of his own bodily sufferings and the almost ever-present imminency of death (comp. vers. 7-12 of the same chapter), the apostle, in those words, refers to "Jesus' corpse-condition" as reproduced in his own bodily condition, adding the expression of his assured conviction that all was to this end - that "the life also of Jesus," that is, the life which Jesus himself lives, should be all the more clearly manifested by what he was working in the world, in and through a body apparently so death-bound as the apostle's was. The use of the phrase, thus interpreted, coheres well with the feeling which, in the writing of this Epistle, was very near to his soul, of his being "crucified along with Christ." The phrase, then, glances at those swollen, livid, blood-flecked, wales and bruises (τῷ μώλωπι αὐτοῦ, 1 Peter 2:24:) which the Roman scourging that immediately preceded his being handed over for crucifixion must have left on his sacred flesh - no part spared - the entire frame pervaded alike with disfigurement and with torture. To the body of his adorable Lord at that hour - to the human consciousness of every thoughtful spectator, defaced, shorn by the dis-honouring whip of the dignity properly connate with a human body, and made utterly vile (for this should seem to have been the symbolical meaning and intent of that customary preliminary of crucifixion) - and, at length on the cross, presenting to open view those brand-marks of degradedness, the apostle feels his own body to be, in the treatment it had received and the condition to which it had been reduced, in no small measure assimilated. Not only was he in spirit joined unto his Lord and one spirit with him; but in body likewise was he (so to speak) joined unto his Lord, and one body with him; being deeply "taught" in the lesson of what was meant by being "a sharer of his sufferings, while day by day becoming more conformed to the fashion of his death" (Philippians 3:10); clothed with Christ in this sense also; clothed with the Crucified One. The verb βαστάζω, as here introduced, may be distinguished from the περιφέροντες of 2 Corinthians 4:10, by presenting the notion of one's carrying something in thought separable from one's self, instead of being (so to speak) commingled with one's own being. "I am carrying, and can offer to your view, the brand-marks of Jesus." Chrysostom catches this view, perhaps carrying it out somewhat far, in his animated comment, "He saith not, 'I have,' but I carry;' like a man priding himself on a trophy and ensigns of a king." The use of the same verb in Acts 9:15, "to bear my Name before the Gentiles and kings," clearly illustrates its import here. This closing verse is withal no piteous appeal for commiserating sympathy. The tone of "from henceforth," betokening the feeling of one who has made up his mind not to be trifled with, precludes the notion of his mood being one of mere self-pity and tenderness. Far more does the apostle hereby make claim to share with his Lord in that mingled sentiment of reverence and deferential, sympathetic compliance, which the disciple of Christ might be expected to entertain towards his Lord, crucified for him; such a sentiment as would prompt him to lighten, if he might, his burden and pain, to take part in his enterprise, to help forward his designs. Those brand-marks would cry out in loud protest against a fellow-disciple's antipathy, tergiversation, or disesteem. Henceforth (τοῦ λοιποῦ) Only here and Ephesians 6:10. Commonly τὸ λοιπόν. The genitive is temporal; at any time in the future as distinguished from throughout the future. Trouble me (κόπους μοι - παρεχέτε) Lit. give me troubles; make it necessary for me to vindicate my apostolic authority and the divine truth of my gospel. Bear in my body Comp. 2 Corinthians 4:10. Marks (στίγματα) N.T.o. The wounds, scars, and other outward signs of persecutions and sufferings in the service of Christ. Comp. 2 Corinthians 11:23 ff. The metaphor is the brands applied to slaves in order to mark their owners. Hence Rev., I bear branded. Brands were also set upon soldiers, captives, and servants of temples. See on Revelation 13:16, and comp. Revelation 7:3; Revelation 14:1, Revelation 14:9, Revelation 14:11. The scars on the apostle's body marked him as the bondservant of Jesus Christ. The passage naturally recalls the legend of Francis of Assisi. Galatians 6:17 Interlinear Galatians 6:17 Parallel Texts Galatians 6:17 NIV Galatians 6:17 NLT Galatians 6:17 ESV Galatians 6:17 NASB Galatians 6:17 KJV Galatians 6:17 Bible Apps Galatians 6:17 Parallel Galatians 6:17 Biblia Paralela Galatians 6:17 Chinese Bible Galatians 6:17 French Bible Galatians 6:17 German Bible
cc/2019-30/en_middle_0029.json.gz/line3811
__label__wiki
0.511118
0.511118
Jo Harman’s Rendition of ‘Cloudy’ out this Friday! Out this Friday 18th January, the veritable Jo Harman performs her own heart meltingly intimate take on the Average White Band classic ‘Cloudy’ from her upcoming ‘Found A Place’ retrospective. AWB were one of her late father’s favourite bands and, apart from working and writing with members of the band’s current line up, Jo has performed with the song’s writer and former AWB frontman Hamish Stuart who says of this version ‘When Jo sings it, I believe her!’.
cc/2019-30/en_middle_0029.json.gz/line3815
__label__wiki
0.79869
0.79869
The Advanced Resource Technology Group: The Knowledge Base ART LINKS: - Data Repository - Knowledge Base - Research By: Bill Huber Published in: Directions Magazine Reprojecting geographic features Two things must happen when you draw a map: features in the real world must be "georeferenced" to a spheroid and the spheroid must be projected onto the paper. The spheroid models the shape of the earth's surface. It is an idealization that does not account for local changes in topography. Georeferencing assigns locations (in three dimensions!) to points on a spheroid. Projecting is an operation that mathematically distorts and shrinks a portion of the spheroid onto flat paper. Projecting can be undone ("inverted"). "Unprojection" expands a feature on a map and plasters it back onto the spheroid. It, too, is a mathematical operation. Georeferencing is done with a datum. A datum is usually given by a starting point and direction: it specifies where a clearly identifiable point on earth (the base point) should appear on the spheroid and it shows where a base direction, such as north, points on the spheroid at the base point. The base point and direction allow surveyors to determine the distance and angle of any other point on the earth. Moving in the corresponding direction on the spheroid for the same distance determines where the new point should go on the spheroid. Spheroids have coordinates. They are latitude and longitude. (Geodetic) latitude is the angle made by a vertical line to the horizontal. It is not necessarily the same angle made by "straight up," because the latter is distorted by gravitational variation over the earth. It is not necessarily the angle made by a line to the center of the earth, because most spheroids have an elliptical cross-section, not a circular one. Therefore, georeferencing endows points near the earth with latitude, longitude, and height coordinates. Change of datum When more than one datum is in play, the coordinates depend on the datum. The figure above shows this in two dimensions, suppressing the third for clarity. The red ellipse represents one spheroid and the blue ellipse represents another. Notice they have different shapes and even different centers. (x,y) denotes a point near the earth. Theta is its geodetic latitude and h is its geodetic height with respect to the red spheroid. Theta' and h' are its coordinates with respect to the blue spheroid. Evidently, at this point the height and the latitude on the blue spheroid are each smaller than their counterparts on the red spheroid. (The values a, b, a', and b' merely show the different radii for the spheroids.) In practice, these differences in coordinates are large enough to be important in many applications. As the U.S. military says, "Ignoring the fine print in the margin of a map could get you killed!" How to relate two maps Two maps may use two different datums and two different projections. The process of relating features on one map to features on another is involved, but straightforward, as the next figure shows. To shift the red feature from the yellow map ("source") to the blue map ("destination"), or reproject it, follow four steps in this order: Unproject the source map. This produces the red feature on the red spheroid. Determine the real-world location of the feature. This is the gray patch at the top of the figure. Reference the real feature to the destination datum. This is the blue feature on the blue spheroid. Project the newly referenced feature. Often steps 2 and 3 are combined into one operation, a "datum shift." Frequently, approximate formulas are used. They depend only on the feature and the sizes, shapes, and positions of the spheroids. The datum shift guarantees that the feature on the destination map correctly represents the same real-world object depicted by the feature on the source map. The wrong way to do it We have to mention one wrong way, because limitations in mapping software tempt people to do this. What happens when we ignore the datum shift? An apparent shift in datum occurs anyway. This comes about because software (or, in earlier times, the draftsman) uses spheroid coordinates to compute the projection. The red feature on the red spheroid is determined by its coordinates. That same set of coordinates, when drawn on the blue spheroid, produces the blue feature shown. When projected, its map is the green feature in the destination map. However, this process usually produces the wrong result. We say "usually," because in some cases the net error is smaller than imprecision in the maps themselves. But in other cases the error can be hundreds of meters, even kilometers. That is a large distortion on detailed ("large scale") maps. North America is a special case Two datums for regions in North America are in common use: NAD 27 and NAD 83. They are based on different spheroids. Furthermore, fairly large errors accumulated in the surveyed locations using the earlier NAD 27 datum. These errors are difficult to describe mathematically. Instead, the U.S. National Geodetic Survey (NGS) offers the NADCON computer program, with Fortran source code, to convert coordinates between these two datums. NADCON effectively performs both steps 2 and 3 in the reprojection algorithm. Therefore you do not need to worry about the spheroids themselves when using NADCON. You do need to have the appropriate data files describing the changes. They are also available from the NADCON web site. Bill Huber Company Quantitative Decisions Email whuber@quantdec.com URL http://www.quantdec.com/ Dr. Huber, principal in the GIS consulting firm Quantitative Decisions in Merion Station, Pennsylvania, has been among the most prolific contributors to ESRI's ArcView-L for the past four years. He is the founder of an independent ArcView discussion list, and is also on the faculty at Penn State University. Dr. Huber is Acting Editor for Directions Magazine. GIS & Steganography - Part 3: Vector Steganography Apr 18, 2002 Why only 'Women in GIS'? Aug 22, 2001 Map Data Controversy in the U.S.: Analysis and Opinion Aug 09, 2001 Analysis and Forecast of USGS GeoData Demands on the Web Aug 09, 2001 Map Data Controversy in the U.S. Jul 31, 2001 ESRI UC 2001: On the Scene at ESRI UC Jul 10, 2001 Reducing the Info:Noise Ratio Apr 25, 2001 What do GIS consultants charge? Mar 13, 2001 Reprojecting Grids Jul 18, 2000 ESRI UC 2000: Closing Session Jun 30, 2000 ESRI UC 2000: ArcView's Transformation Jun 29, 2000 ESRI UC 2000: Technical Workshops Begin Jun 27, 2000 ESRI UC 2000: ESRI Launches The Geography Network Jun 27, 2000 ESRI UC 2000: On the Scene at ESRI UC Jun 26, 2000 A Review of IDRISI32 Oct 25, 2000 The Future of Arcview; Part 2 Aug 08, 2000 Adding dimensions to GIS with VRML Jun 05, 2000 ArcView Class Hunt Results Apr 11, 2000 Convolution: Part 3 of 3 Nov 01, 1999 Sidebar to "Convolution" Oct 25, 1999 Convolution: Part 2 of 3 Oct 25, 1999 Convolution Oct 18, 1999
cc/2019-30/en_middle_0029.json.gz/line3819
__label__wiki
0.960748
0.960748
Who Is Dylan Thomas? Pike County HS Football Player Dies After Injury Josh Sanchez | Oct 1, 2018 10:48 am Our hearts are broken this morning as the Pike County community mourns the loss of Dylan Thomas after a tragic injury during Friday nights football game. Please join us in wrapping his family friends and team mates in Prayer. #32 #dylanthomas #dylanstrong A post shared by Hey Jo Boutique (@heyjoboutique) on Oct 1, 2018 at 6:29am PDT Dylan Thomas, a football player from Pike County High School in Georgia, has passed away following a severe brain injury suffered during a game on Friday, Sept. 28. Thomas was flown to the hospital in critical condition after he collapsed on the sidelines following a hit in the second quarter, according to ABC-13. The mayor of Williamson, Steve Fry, tells WAGA-TV Thomas underwent surgery to relieve brain swelling and went into a coma. A vigil was held Sunday afternoon at the school for Thomas. Thomas’ uncle and school say the teen died that night. A fundraiser for medical costs and lost income started by Burgess had raised about $24,600 by Monday morning. Thomas passed away on the same weekend that Christion Abercrombie, a linebacker for the Tennessee State football program, became verbally unresponsive during a hit. Abercrombie, a member of the Tennessee State football team, is in critical condition after a hit during a game on Saturday, Sept. 29. Abercrombie collapsed on the sideline after complaining to trainers about a headache. He then underwent emergency surgery at the Vanderbilt University Medical Center. Our deepest condolences are with Thomas’ family and friends during this difficult time. FootballHigh School Football,news Josh SanchezCAMPUSSPORTS Writer Josh studied journalism at Seton Hill University. He is currently the Editor-in-Chief of Campus Sports. Josh is currently a member of the FWAA and USBWA. His work has been featured on Sports Illustrated, ESPN.com, FOXSports.com, CBSSports.com and many others. CONTACT: josh.sanchez@teamcoed.com
cc/2019-30/en_middle_0029.json.gz/line3821
__label__wiki
0.744157
0.744157
Posts Tagged ‘hollywood gossip’ Posted by: celebrityandworld on: August 3, 2010 In: Brad Pitt | Celebrity News Andrew Morton, who has written the explosive new tell-all ‘Angelina: An Unauthorized Biography’, has revealed that Brad Pitt has given himself a new nickname, ‘Mr. Mom’. “He calls himself Mr. Mom,” the UsMagazine.com quoted Morton as saying on Fox News Channel”s Fox & Friends. Morton also said that Jolie, 35, used Maddox, to “bait” Pitt away from Jennifer Aniston while filming ‘Mr. & Mrs. Smith’. “Well, it”s kind of playing happy family. He”s a great caregiver, this Brad Pitt…. So here”s Maddox, this cute little kid, playing around and it draws somebody in. And in all fairness, friends of Angelina, all said it was Brad that made the [pass] in that relationship.” But Jolie wasn”t completely off the hook: “Psychologically, she makes men almost compromise themselves to cheat on their girlfriends, or cheat on their wives in order to be with her.” “The only man that”s never rejected her is Maddox,” Morton added. Tags: Brad Pitt, Brad Pitt News, Celebrity gossip, Celebrity News, hollywood actor, hollywood gossip, hollywood news Abnormal eye movements and other sensorimotor and neurobehavioral impairments appear common in unaffected family members of individuals with autism, finds a new study. Matthew W. Mosconi, Ph.D., and colleagues at the University of Illinois at Chicago conducted eye movement testing and other assessments of neurobehavioral function in 57 first-degree relatives of individuals with autism. Their results were compared with those of 40 individuals who were the same age, sex and had the same IQ but did not have a family member with the condition. When compared with controls, family members of individuals with autism tended to perform more slowly and less accurately on eye movement tasks, including those assessing saccades and smooth-pursuit eye movements. “The present findings document that first-degree relatives of individuals with autism demonstrate a unique pattern of oculomotor impairments similar to that previously reported in independent samples of individuals with autism, suggesting that these alterations within sensorimotor and cognitive brain circuitry may be familial traits,” the authors said. The report has been published in the August issue of Archives of General Psychiatry, one of the JAMA/Archives journals. Tags: Celebrity gossip, Celebrity News, hollywood gossip, hollywood news ‘ET’, directed by Steven Spielberg, has been voted the ‘Greatest Film Of All Time’ in an online poll. The film that won four Oscars in 1983 but was beaten to the Best Picture award by Richard Attenborough”s Gandhi topped the poll of more than 2,500 people for radiotimes.com. Movie expert Barry Norman described the sci-fi classic as ‘the perfect family film’. “A magical tale for children, a triumph of special effects, a chastening lesson to bigots everywhere and, as the director Steven Spielberg describes it, a simple and pure love story,” the Scotsman quoted him as telling the Radio Times. The Wizard Of Oz landed the second spot, followed by Mary Poppins, Chitty Chitty Bang Bang and Toy Story. Tags: Celebrity gossip, Celebrity News, hollywood actor, hollywood gossip, hollywood news, Steven Spielberg, Steven Spielberg News First-time mother and supermodel Gisele Bundchen has claimed that breastfeeding her baby boy helped get her back in shape. The supermodel, who gave birth to son Benjamin in December, shared her opinion on the never-ending debate between the benefits of breastfeeding versus feeding a baby formula. “Some people (in the US) think they don”t have to breastfeed, and I think, ”Are you going to give chemical food to your child when they are so little?”” the New York Daily News quoted Bundchen as telling Harper”s Bazaar UK. She added, “I think there should be a worldwide law, in my opinion, that mothers should breastfeed their babies for six months.” The Brazilian beauty, who is married to NFL hunk Tom Brady, also said that it was very easy to give birth. Thanks to some meditating, the model said the eight-hour natural birthing process “didn”t hurt in the slightest.” “It prepared me mentally and physically. It”s called ”labor” not ”holiday” for a reason, and I knew that,” she said. “You want to go into the most intense physical experience of your life unprepared? That doesn”t make any sense to me. “Then I was ready and I thought OK, let”s get to work. “I wasn”t expecting someone else to get the baby out of me, she continued. Tags: Celebrity actress, Celebrity gossip, Celebrity News, Gisele Bundchen, Gisele Bundchen News, hollywood actress, hollywood gossip, hollywood news In: Celebrity News | Freida Pinto Slumdog Millionaire co-stars, Dev Patel and Freida Pinto, come up with innovative ideas to keep their love-life alive because of their long-distance relationship. The couple has been seeing each other since filming Danny Boyle’s 2008 Oscar-winning blockbuster, which saw their characters battling to be together. London-based Patel said maintaining a relationship with the 25-year-old actress, who lives in the city of Mumbai, means they both have to make an effort. Were never at home, the Daily Express quoted the 21-year-old as telling Radio Times. But we do manage to meet. We always find time for each other, he said. And when they’re in London? We always get a different place. Rent out a flat or something and spend time together that way, he added. Tags: Celebrity actress, Celebrity gossip, Celebrity News, Dev Patel, Dev Patel News, Freida Pinto, Freida Pinto News, hollywood actor, hollywood actress, hollywood gossip, hollywood news Oksana Grigorieva alleges Mel Gibson had thrown TV at his first wife Mel Gibson’s ex-girlfriend Oksana Grigorieva has claimed that Gibson was physically abusive towards his first wife also. Grigorieva also claims that she has seen the actor hitting his youngest son, Tommy. Quoting a source “familiar with” the law enforcement investigation into Gibson”s behavior, Grigorieva, 40, claims she saw the actor hit Tommy, his youngest child from his first marriage. The incident purportedly occurred two-and-a-half years ago at a hockey game in Los Angeles, according to RadarOnline.com. “She [Grigorieva] said that Mel, in her presence, hit Tommy, in the head, while they were in a box watching a hockey game…Tommy started crying and whimpered for the remainder of the game, choosing to sit by himself, away from his father,” the New York Post quoted the source as telling the entertainment website. A Russian newspaper, Komsomolskaya Pravda , reported that Grigorieva had alleged Gibson told her he had thrown a television at his first wife, Robyn Gibson, during a heated argument. However, Robyn has previously defended her husband of 28 years, following the release of a series of explosive recorded phone calls between the actor and his ex-girlfriend. The mother of seven of Gibson’s children denied the “Lethal Weapon” star was ever physically abusive during their marriage. “Mel never engaged in any physical abuse of any kind toward me before, during or after our marriage,” she wrote in a statement filed in a California court, TMZ reported. “Mel was a wonderful and loving father,” Robyn added. Tags: Celebrity actress, Celebrity gossip, Celebrity News, hollywood actor, hollywood actress, hollywood gossip, hollywood news, Mel Gibson, Mel Gibson News, Oksana Grigorieva, Oksana Grigorieva News Charlie Sheen sentenced to rehab after pleading guilty to assaulting wife Actor Charlie Sheen has been ordered to serve 30 days at a Malibu rehab under a no-jail plea bargain after the actor pleaded guilty to assaulting wife Brooke Mueller. The deal caps a headline-grabbing saga that exploded with Sheen”s Christmas Day arrest on suspicion that he pinned wife Mueller, 32, to a bed and held a knife to her throat during an Aspen family vacation. Sheen, who appeared in Aspen court to enter the plea, also must serve three months” probation and show proof that he”s completed 36 hours of counselling. In exchange, prosecutors dropped felony menacing and criminal mischief charges. The “Two and a Half Men” star will fulfill the rehab requirement at celebrity-friendly Promises, the same rehab he checked into earlier this year, his lawyer said. “The fact that the DA”s office is allowing Charlie to do his sentence at Promises as opposed to jail is indicative of the strength of their case. This is great resolution for us,” the New York Daily News quoted attorney Yale Galanter as telling the News. He and Mueller signed preliminary divorce paperwork earlier this year and are expected to file with the court now that the criminal case is resolved, TMZ.com reported. Tags: Celebrity gossip, Celebrity News, Charlie Sheen, Charlie Sheen News, hollywood actor, hollywood gossip, hollywood news
cc/2019-30/en_middle_0029.json.gz/line3824
__label__cc
0.580532
0.419468
Jan 8 A Latex Ghost JAN. 2019 (V.II I.I) The moment he saw the crinkled condom wrapper sitting in the trashcan in Julie's kitchen, Tommy knew he couldn’t possibly mention it to her. He'd put in too much effort fighting his way back into this cramped efficiency, coaxing her via phone and text into giving him another chance. There was simply no way he could flip this chessboard, not with checkmate so close. “I’ve been a fan of Dr. Izawa’s work for some time,” Julie called from the bedroom, answering the question Tommy had asked her, just before the foil wrapper being had struck him silent. She wandered across the efficiency’s main room and stood in the doorway of the galley kitchen. “His work on changes in hippocampal volume is especially exciting in light of… whatever and ever.” She shrugged, picking lint off the front of the navy blazer she’d thrown over a plain, white blouse. Her hair was pulled back in a messy ponytail. “It gets kind of technical from there. Feeling confident, though. How do I look?” Tommy glanced at her only briefly. “Sensible,” he said. Julie took a deep breath and nodded. “Good. Sensible is good. You should see it with the shoes, though.” She disappeared from the doorway, and in seconds Tommy could hear her rummaging about in the closet again. “Keep ‘em coming. This really does help.” Pushing aside the jagged image of a gold-foil wrapper with bold, black lettering, Tommy wracked his brain for another likely interview question. “What would you say is your biggest weakness?” “God, I hate that one.” Tommy heard heels clicking across the hardwood floor. Julie appeared once more in the kitchen doorway, this time in two-inch black pumps. “How about now? Still sensible?” “Oh yeah,” Tommy said, adjusting his knit beanie and shifting weight from one leg to the other. “Still sensible. And fashion-forward.” “But not, like, sensible and witchy, right?” Tommy frowned. “I don’t think that’s a thing. Answer the question.” “Fine. My biggest weakness.” Julie opened the fridge, grabbed a bottle of beer from the top shelf, and twisted the cap off. Pivoting, she stepped on the pedal at the base of the trashcan. Her eyelids rose with the creaking lid, and she froze. “Problem?” Tommy asked. He’d moved to the dusty coffee table table next to the futon, where he was setting out napkins and silverware for two. “Nope.” Julie let the trashcan clatter shut and leaned against the kitchen counter. “What was the question?” “Your one weakness.” Tommy had sat down on the futon, forcing himself into what he hoped was a posture of easy nonchalance – reclining, with fingers interlaced behind his head. “Right.” Julie took a long pull on her beer. Her movements had become jerky, exaggerated. “I’d say, ah… I dunno. Maybe I move on too fast.” Tommy eyed her carefully, but her gaze was on the middle distance. “Is that really a weakness? In a researcher, I mean.” Julie set the beer on the counter and straightened up a bit, crossing her arms over her chest. “Well, maybe not. Maybe that’s how I need to be. If an experiment isn’t bearing fruit, I gotta move on to the next thing.” Slowly, deliberately, Tommy nodded. “Of course.” He felt like he was trying to figure out which wire to cut. “Who could fault you for that, right?” “Right.” Julie was holding his gaze now, her head cocked slightly to one side. Before either of them could say anything further, though, the egg timer atop the stove dinged. Tommy rose to his feet and slipped past Julie, grabbing a pair of oven mitts off a hook by the doorway. Opening the oven door with a blast of hot air, he pulled the casserole out and set it carefully on the stovetop. Julie walked over and sat down on the futon, kicking the heels off and tucking her legs up underneath her. Tommy followed along a few moments later, carrying two steaming plates of beef and cheese and vegetables. He set both down on the coffee table, then sat down next to Julie. “So what about you?” Julie asked. Tommy looked over at her, one eyebrow raised. “What about me?” “What’s your biggest weakness?” “Huh.” Tommy put down his fork and leaned back, lips twisting with the effort of thought. “I guess I’d go with the same answer. I can be a little too quick to move on.” Julie nodded slowly, and after a few agonizing moments, ventured a guess. “So… Pam.” “Yeah.” Tommy let out the breath he hadn’t been conscious of holding. “And I’m gonna say… Carl?” “Uh huh.” Julie ignored the steaming plate in front of her, instead grabbing a soft pack of menthol cigarettes. After shaking one out, she tossed the pack to Tommy, who caught it mid-air. “So are we just gonna be cool about this?” He thought about it for a moment, and with all alternatives exhausted, decided on honesty. “I don’t know,” he said at last. “Do you wanna leave?” “Not just this moment.” Tommy lit his cigarette, inhaled, and pushed out a ragged cloud of bluish-grey smoke. “Do you want me to leave?” “Not really.” They sat in silence for what felt like several minutes, smoking and thinking. For the first time that night, Tommy felt a strange absence of anxiety. It was the sort of comfortable silence he and Julie had never quite managed to experience in the past. Julie broke it with a chuckle, pointing at the plates in front of them. “You know, I really hate this casserole,” she said, crossing one leg over the other. Tommy frowned. “Seriously?” “Absolutely,” she said, nodding vigorously as she stubbed her cigarette out in a carved glass ashtray. “It seriously tastes how I imagine dog food tastes. Full stop.” Tommy stared at her, mouth agape. “I’ve made this for you, like, a dozen times.” “Yeah,” she said with a slight cringe. “And you always say you love it.” “Yup.” She shrugged. “Lying through my teeth.” Tommy stared at her for another moment, then shook his head. Reaching into the pockets of his slim black jeans, he pulled out his phone and scrolled through his contacts until he landed on pizza delivery. “Wow,” he breathed as he heard the other line begin to ring. Julie straightened up, looking slightly alarmed. “I’m sorry. Too far?” “Not at all,” he said, hand over the receiver. On the other end, somebody picked up and asked whether it would be pick-up or delivery. Despite himself, Tommy laughed. “Jesus Christ, Julie. We might actually be getting somewhere.” J.L. Newman is a writer and psychotherapist, currently residing with his partner in Rochester, Minnesota. He holds a degree in creative writing from the University of Wisconsin - Milwaukee. This is his first published work of fiction. Cover photo by Annie Spratt on Unsplash relationships, love, j.l. newman, infidelity Jan 8 Cake and Wine Jan 8 A Diving Catch Jan 8 The Velvet Box Apr 4 Enough to Drown a Man
cc/2019-30/en_middle_0029.json.gz/line3825
__label__cc
0.72146
0.27854
Title: Wound and Released Instrumentation: Trumpet and Piano Premiere: 24 May 2014 King of Prussia Valley Forge Casino: Terry Everson, trumpet and Shiela Kibbe, piano Purchase/Rent: Canadian Music Centre Wound and Released is part of a collection of works for solo instrument and piano. Each piece is in three movements. The outer movements are high energy. The first movement tends to be minimalistic. The middle movement uses a walking bass-like line with a disjunct but lyric 'endless' chromatic melody. The last movement tends to be more free-flowing with longer active lines based on variations on a single pentatonic, or other scale with limited pitch material. The middle movement is always called “and” as it joins the two outer movements. Other works in the Wired series include "Wired and Released” for flute and piano (or flute and harp); "Wired and Wound” for alto sax and piano; "Wound and Wired” for horn and piano; "The Engine Continuum” for bassoon and walking bass; and "Rewind and Fast-forward” for woodwind quintet and gli altri. Wound and Released was premiered at the 2014 International Trumpet Guild Annual Conference. 1. Wound 2. and 3. Released
cc/2019-30/en_middle_0029.json.gz/line3827
__label__cc
0.548032
0.451968
Students Artwork Headed to State Capitol Two budding artists will have their art displayed at the Bob Bullock Texas State History Museum and in the lower rotunda of the Texas State Capitol Building in March. Not just one but two Comal ISD student art pieces will be displayed in the YAM State Capitol Artwork Exhibit in Austin next month. Liliana Eyster, a junior at Canyon Lake High School, and Daisy Skolaut, a second grader at Hoffmann Lane Elementary School, were told of the honor by their art teachers, Nell Anderson and Carla Shipley. Eyster’s piece was an assignment for her Drawing II class at CLHS tasking students to use ballpoint pens to shade a drawing. The result is truly amazing. Skolaut’s piece was an assignment as well for her art class. It is a self portrait using mixed media. The exhibit is part of Youth Art Month (YAM), which is celebrated in March, and features student artists from across the state of Texas from pre-kindergarten to 12th grade in public and private schools. The 2019 exhibit will begin with a display at the Bob Bullock Texas State History Museum from March 3-17 and continue March 24-31 in the lower rotunda of the Texas State Capitol Building. Top photo: Liliana Eyster's ballpoint pen drawing will be on display at the State Capitol in March. 2nd photo: Canyon Lake HS junior Liliana Eyster. 3rd photo: Daisy Skolaut's mixed media self portrait will be on display at the State Capitol in March. 4th photo: Hoffmann Lane ES second grader Daisy Skolaut.
cc/2019-30/en_middle_0029.json.gz/line3834
__label__wiki
0.580743
0.580743
Banana Shpeel – Cast announced for Chicago production Stars from Broadway’s Jersey Boys and Wicked join cast Playing at the Chicago Theatre from November 19 – January 3 Stars from Broadway’s Jersey Boys and Wicked will join the distinctive cast of comedic and dance talent in the brand new theatrical production, Banana Shpeel, presented by Cirque du Soleil and MSG Entertainment. Banana Shpeel begins performances at The Chicago Theatre on November 19, with an official Opening Night on Wednesday, December 2. The limited Chicago engagement concludes January 3, 2010, and Banana Shpeel debuts in New York at The Beacon Theatre in February 2010. Michael Longoria, who starred as Frankie Valli in the Broadway production of Jersey Boys, will portray Emmett, an innocent and romantic young actor, while Annaleigh Ashford, who starred as Glinda in Wicked on Broadway and in Chicago, portrays Emmett’s love interest Katie, and Remo Airaldi, a prolific resident company member of Boston’s acclaimed American Repertory Theater, portrays Schmelky, a cruel and irritable theater producer. Joining them is an international crew of comedic actors: Claudio Carneiro (Brazil), Daniel Passer (U.S.), Patrick de Valette (France), Gordon White (Canada), and Wayne Wilson (U.S.). In keeping with Cirque du Soleil’s unique and diverse performers, global talents showcased in Banana Shpeel include Russian hand balancer Dmitry Bulkin, Vietnamese juggler Tuan Le, Spanish foot juggler Vanessa Alvarez, and the American sister-brother tap dance duo, Joseph and Josette Wiggan. Completing the cast is a talented ensemble comprised of 10 “triple threats”: singer-actor-dancers Robyn Baltzer, Alex Ellis, Adrienne Jean Fisher, DeWitt Fleming Jr., Luke Hawkins, Kathleen Hennessey, Adrienne Reid, Anthony J. Russo, Melissa Schott, and Steven T. Williams. Under the direction of Band Leader Robert Cookman, the Banana Shpeel original score is performed live on stage by Roland Barber (trombone), Bobby Brennan (bass), James Campagnola (multi-instrumental), Iohann Laliberté (drums), Jean-François Ouellet (saxophone), Peter Sachon (cello) and Scott Steen (trumpet). Banana Shpeel is a roller-coaster mix of styles that blends comedy with tap, hip hop, eccentric dance and slapstick, all linked by a narrative that ignites a succession of wacky adventures. This is not circus, or a musical or a variety show, or even vaudeville. It is Banana Shpeel! Synopsis: Propelled by crazy humor and intense choreography, Banana Shpeel plunges us into the world of Schmelky, who dangles fame and fortune in front of Emmett, who has come to audition for him. Emmett soon finds himself trapped in a flamboyant, anarchic world where Schmelky sows terror and reigns supreme. Emmett falls in love with the beautiful Katie and meets a bunch of absurd characters, including the strange Banana Man. But who is this mysterious Banana Man and how can Emmett escape the clutches of Schmelky and his henchmen? The Creative Team The Banana Shpeel Creative Team includes: Artistic Guides Guy Laliberté (Cirque du Soleil Founder) and Gilles Ste-Croix; Writer and Director David Shiner; Director of Creation Serge Roy; Composer and Musical Director Jean-François Côté; Comic Act Designer Stefan Haves; Choreographer Jared Grimes; Costume Designer Dominique Lemieux; Set Designer and Props Co-Designer Patricia Ruel; Props Co-Designer Jasmine Catudal; Lighting Designer Bruno Rafie; Sound Designer Harvey Robitaille; and Make-up Designer Eleni Uranis. Banana Shpeel writer and director David Shiner started out as a mime in Paris. His career took off in 1984 when he was discovered at the renowned circus festival Cirque de Demain. Shiner later teamed up with Bill Irwin to create the wordless two-man show Fool Moon, which played from 1992 to 1999, including three Broadway runs. Fool Moon picked up numerous prizes, including a Tony Award, Drama Desk Award and an Outer Critics Circle Award. In 2007, Shiner directed his first Cirque du Soleil production, the big top touring show KOOZA. Banana Shpeel performs from November 19, 2009 through January 3, 2010 at The Chicago Theatre Tickets are available now for all performances and can be purchased at www.cirquedusoleil.com or www.thechicagotheatre.com or by calling 1-800-745-3000. Regular ticket prices range from $23 to $98, with limited Premium and Tapis Rouge VIP Experience tickets also available. Discounts are available for groups of 20 or more, by calling 1-866-6-CIRQUE (1-866-624-7783). Filed under: Casting, Chicago Theatre, Comedy, Musical Revue, Theater News, Tony Awards, World Premier | Tagged: Adrienne Jean Fisher, Adrienne Reid, Alex Ellis, American Repertory Theater, Annaleigh Ashford, Anthony J. Russo, Banana Shpeel, Beacon Theatre, Bobby Brennan, Bruno Rafie, Chicago Theatre, Cirque de Demain, Cirque du Soleil, Claudio Caneiro, Daniel Passer, DAvid Shiner, DeWitt Fleming Jr., Dmitry Bulkin, Dominique Lemieux, Drama Desk Award, Eleni Uranis, Fool Moon, Gilles Ste-Croix, Gordon White, Guy Laliberte, Harvey Robitaille, Iohann Lalaberte, James Campagnola, Jared Grimes, Jasmine Catudal, Jean Francois Ouellet, Jean-François Côté, Jersey Boys, Joseph Wiggan, Josette Wiggan, Kathleen Hennessey, Kooza, Luke Hawkins, Melissa Schott, Michael Longoria, MSG Entertainment, Outer Critics Circle Award, Patricia Ruel, Patrick de Valette, Peter Sachon, Remo Airaldi, Robert Cookman, Robyn Baltzer, Scott Steen, Serge Roy, Stefan Haves, Steven T. Williams, Tony Award, Tuan Le, Vanessa Alvarez, Wayne Wilson, Wicked | Leave a comment » Chicago Theater first – Cirque du Soleil comes out of the tent Cirque du Soleil to premiere major new show format in Chicago this fall It will be called “Vaudeville.” And the new Cirque du Soleil show in the works will both rehearse and start in Chicago—most likely at the Chicago Theatre. According to information circulating in New York, Cirque du Soleil is preparing a major new proscenium-style show under the direction of David Shiner (“Kooza”) and written by Larry O’Keefe (“Bat Boy” and “Legally Blonde”). The choreographer is listed as Jared Grimes, known for his tap and hip-hop work. Says Chicago Tribune: The idea is to create a 90-minute hybrid of a Cirque circus-style show and a more traditional musical-theater production. This would be the Montreal-based Cirque’s first foray into Broadway-style theater. It is likely to be a high profile show in the Loop next holiday season. Plans call for rehearsals this fall in Chicago, followed by an opening here in November. Thereafter, the show will move to New York’s Beacon Theatre for a run of six months or more and, most likely, a tour elsewhere. The Beacon Theatre is owned, like the Chicago Theatre, by Madison Square Garden Entertainment. A Chicago spokesman for Cirque wouldn’t comment about any future projects. The Cirque has long said it wanted to explore new arenas for its work. This one will be as close as Cirque has ever come to Broadway, complete with the traditional Chicago tryout. Cirque du Soleil to bow major new show here (ChicagoBreakingNews.com) Cirque de Soleil’s reported new show will start in Chicago (Metromix.com) Filed under: Broadway, Broadway-bound, Chicago Theatre, Theater News, Upcoming Shows, World Premier | Tagged: Bat Boy, Beacon Theatre, Chicago Theatre, ChicagoBreakingNews.com, Cirque du Soleil, Cirque du Soleil Vaudeville, DAvid Shiner, Jared Grimes, Kooza, Larry O'Keefe, Legally Blonde the Musical, Madison Square Garden Entertainment, Metromix | 3 Comments » Reviews: "Kooza" and "Cirque Shanghai" Run Away and Join The Cirques!! By Venus Zarris I remember my first visit to the Ringling Brother’s circus at the International Amphitheater when I was a small child. Three rings of amazing delights and exotic animals were almost more than I could handle. Even in the ‘nose bleed’ seats the impact left a permanent impression. I was overwhelmed by the spectacle of it and have been a circus fan ever since. Ringling Bros. and Barnum & Baily set the American standard for circus extravaganzas but since then there have been some wonderful imports that have broke the mold by reinventing the experience. As if summer in Chicago isn’t already filled with wonderful opportunities for theatrical fun, there are currently TWO world-class circus options that are sure to thrill and amaze. Although vastly different experiences, both are equally entertaining. KOOZA – Cirque du Soleil is on the high end of production values as well as ticket price. $55-$125 per ticket may seem steep but the payoff is over 2 ½ hours of spellbinding bliss. There is a reason why Cirque du Soleil has a devoted fan base. They truly create another world, thereby making the escape from reality an absolute immersion into fantasy, before the first trick is even performed. Cirque Shanghai: Gold, on the other hand, is lighter on production values and fantastical concept but more than makes up for this with 1 ½ hour of non-stop amazing acrobatic excellence. It possesses a beautiful charm that comes not from fabricated artifice but rather from a surprisingly heartwarming connection between the audience and the brilliant performers. At $14.50-$29.50 a ticket, it is also more family friendly as well as wallet friendly, especially during the current economic crunch. There is something unparalleled about seeing both of these unique productions live. “Death Defying Acts” is just a circus catchphrase until you witness the dangers and dares first hand. There is nothing supernatural, but there is genuine magic created by all of these performers who have devoted their lives to becoming the best in their fields. Both Cirques are sure to rank as highlights of the summer as well as provide memories for years to come. KOOZA – Cirque du Soleil The spectacle is nothing short of a spellbinding, jaw dropping, eye popping, sensational, magical and death defying sensory overload. This may sound like a bag of clichéd descriptive exaggerations, when in fact they are actually understatements compared to the otherworldly delights that await you under the big blue and yellow striped tent. As you walk in you are struck by the sheer magnitude of technical engineering contraptions that are implemented to execute such a grand transformation in a parking lot. The pre-show antics of the small clown troupe warm up the crowd. Normally circus clowns fall in between the range of corny to creepy but these jokers are actually hilarious. When the show officially starts you are in for 2 ½ hours of mind boggling visceral fireworks. Between the costumes, lighting design, production design, thrilling music delivered through an acoustically perfect sound system, and best-in-their-field world class performers; ‘KOOZA’ quite simply delivers the most whimsically lavish and lovely production values. The occasional ‘jazz hands’ tossed into the playful choreography made me imagine that Bob Fosse would have adored the flawless showmanship. The opening sequence starts out simple with an ‘innocent’ flying a kite. There is a lovely connection to the sweet little person but when he receives a special delivery life sized jack-in-the-box and the ‘trickster’ appears all bets are off. The stage fills with color, life and sound. As the ornate three story orchestra tower is revealed there is a flashback to Japanese animator Miyazaki’s ‘Howl’s Moving Castle’. This sets the stage for an experience that actually makes the surreal visual extremes of Japanese animation seem commonplace. Every act thrills, amazes and delights. ‘KOOZA’ takes personal offense to gravity, as there are several gasp inducing aerial acts. The stage is almost underused for the volume of overhead amazements but the beautiful grounded triplets of synchronized shiny contortion almost steal the show. Their flexibility is hard to describe as human and at times almost sickeningly unnatural. One maneuver resembles the deleted ‘spider scene’ from the ‘Exorcist.’ Demons, angels and everything in between captivate beyond your wildest dreams. It is hard to imagine that two men perilously spinning on a giant double wheel of death can be followed by anything, much less a pickpocket, but the acts flow brilliantly. Your nerves are given occasional breaks from the more dangerous exhibits but the thrills are constant. Cirque du Soleil’s KOOZA is an explosion of miracles that should not be missed! Rating: «««« (“KOOZA – Cirque du Soleil” runs through August 24 at the Grand Chapiteau, United Center parking lot K, 1901 W. Madison Street. 800-678-5440) Cirque Shanghai: Gold Among the many amazing achievements of this foray into exotic entertainment, Cirque Shanghai: Gold illustrated a cultural difference that I had heretofore not realized. Other than a vehicle for serving food, in China, plates can be spun on the end of sticks by flexible acrobats to create dazzling visual tricks. Whereas in Greece, we get drunk, toss them on the ground and yell, ‘Opa!’ If you are tired of the day-to-day grind, uninspired by the offerings of summertime blockbusters or simply want to escape into the world of something unusually magical, Cirque Shanghai: Gold should not be missed! We left the show with an adrenaline rush that made us literally feel like five-year-old children. Chocked full of moments that range from ‘DON’T TRY THIS AT HOME!,’ to ‘NO WAY!,’ to ‘HOLY SHIT!,’ you cannot help but be astonished and overwhelmed by these award wining international athletic superstars. Now, I realize that ‘Superstar’ is a word that gets thrown around quite freely in this country, but forget TV’s ‘Celebrity Circus.’ These miraculous performers are the real deal! And despite their otherworldly abilities to seemingly defy the laws of gravity and physics, these charming gymnastic geniuses perform their feats of daring acrobatic accomplishment without the slightest air of pretense or bravado. As a matter of fact, you can’t help but fall in love with their contagious warmth and humble enthusiasm. I found myself wanting to throw a party for the entire lovable cast so I could shower them with prizes and affection. Just when you think that they can’t possibly out due the astounding act you witnessed, your jaw drops at the following flabbergaster. The flexibility alone elicits profound feelings of personal inadequacy as they do things that a normal body could only duplicate during a lethal fall down several flights of stairs! As if the talent on stage isn’t enough, the exceptionally creative team behind the scenes is outstanding. Director Sylvia Hase hails from Ringling Brothers and Barnum & Bailey Circus. Emmy Award-winner Steve Base provides the conceptual design. Choreographer Brenda Didier and lighting/scenic designer Brian Sidney Bembridge, both Chicago based award-winners, round off the visionary team. But the beautifully brilliant costumes, lighting, music and dancing pale next to these genuinely gifted performers who not only entertain beyond your wildest dreams but also serve as incomparable ambassadors of international good will. I hope that their stay in Chicago returns to them at least some of the joy that they offer everyone who watches this wonderful all-ages treat! The acrobats explode with dazzling talent making ‘Cirque Shanghai: Gold’ a spectacular display of human fireworks and 90 minutes of sheer delight! (“Cirque Shanghai: Gold” runs through Sept. 1 at The Skyline Stage on Navy Pier. 312-902-1500) Filed under: 2008 Reviews, Navy Pier, United Center, Venus Zarris | Tagged: Brenda Didier, Brian Sidney Bembridge, Cirque du Soleil, Cirque Shanghai, Cirque Shanghai: Gold, Kooza, Miyazaki, Navy Pier, Ringling Bros and Barnum & Baily, Ringling Brothers, Skyline Stage, Steve Base, United Center, Venus Zarris | 3 Comments » Cirque du Soleil’s "Kooza" – 40% off tickets! Great news – Cirque du Soleil is offing 40% off tickets of their newest production – Kooza. 40% off “Kooza” tickets!! Special offer for all you Cirqu du Soleil fans! Cirque du Soleil presents its newest touring show, KOOZA. The story of an innocent who enters a world full of kings, thieves, and other archetypal characters, KOOZA is a return to Cirque du Soleil‘s roots: a combination of classic circus acrobatics and broad slapstick clowning. “Kooza” runs through August 24th at the United Center. For more info, click here. Filed under: Cirque du Soleil | Tagged: Cirque du Soleil, Kooza, United Center | Leave a comment »
cc/2019-30/en_middle_0029.json.gz/line3835
__label__cc
0.672173
0.327827
← When it comes to holiday cards, you guys are really mailing it in. Unlisted. → Becoming Unwritten: The Roots at the 9:30 Club If NBC ever releases a compilation of The Roots’ performances as house band for Late Night with Jimmy Fallon, the DVD commentary track might make your player explode. The veteran Philly hip-hop band won’t finish a tune without referencing pieces of nine others. Their hyperlinked performance style is reliably thrilling, though you do sometimes want to yell at song-surfing bandleader/drummer/Twitter addict Ahmir “?uestlove” Thompson, “Hey, I was digging that!” Last night, at the first of two 9:30 club dates, The Roots offered a sweaty, channel-flipping blitz, packing about eight hours of mercilessly funky rap, rock, go-go, jazz, and soul into 140 breathless minutes. Though they’ve continued to tour since they got their gig upstaging SNL alum Fallon, their return to the 9:30 still had a celebratory, school’s-out vibe. An early performance of “How I Got Over,” the brassy title cut from their upcoming album, rocked the house so hard that MC Tariq “Black Thought” Trotter shouted “Thank you, goodnight!” when it was done. But there were two hours and several guest appearances — chiefly Wale, who took video of the crowd with a Flip camera while trading verses with Trotter on “Rising Up” and his own “Pretty Girls” — to go. The reference-spotting was fun for a while. (“Hey, isn’t keyboardist Kamal Gray playing the vamp from The Beatles’ ‘Hey Bulldog?’,” etc.) Eventually you just quit keeping score and surrendered to the towering, serpentine groove, one that rarely slackened despite the concert’s length. The Roots’ discography, though admirable, has rarely captured their onstage range and urgency, and the show leaned almost as heavily on those schizo references as on the Roots own material. Guitarist/singer “Captain” Kirk Douglas’s hijacked the show with suite that touched on “Sweet Child O’ Mine”,” “Mannish Boy,” “Who Do You Love,” and “Immigrant Song,” among others. The Roots already provide the most amusing bits on “Late Night,” but there’s at least one traditional wee-hours-chat-show game you can bet they won’t be playing: Stump the band. This band, it don’t stump. This review appears today on Click Track and in tomorrow’s Paper of Record. Thanks to the great and good Kyle Gustafson for the photo. This entry was posted in music, shameless self-promotion, The Washington Post and tagged 9:30 Club, Click Track, Late Night, music, pop music, The Roots, The Washington Post, Wale. Bookmark the permalink.
cc/2019-30/en_middle_0029.json.gz/line3839
__label__wiki
0.500942
0.500942
Banking, Banks, Bitcoin Scams, Canada, Cryptocurrency Exchange, Ernst & Young, Money Laundering, QuadrigaCX Canadian Banks Wary of QuadrigaCX Assets’ Origins, Cite Money Laundering Concerns Ayush Saraswat February 23, 2019, 4:34 pm February 23, 2019 117 Canadian banks have showed hesitation concerning the management of insolvent cryptocurrency exchange QuadrigaCX’s assets, national public broadcaster CBC reports on Feb. 22. QuadrigaCX has faced financial difficulty following the sudden death of its founder Gerry Cotten, who was the allegedly only one with access to the exchange’s cold wallets. As Cointelegraph reported earlier this week, QuadrigaCX has sent its remaining crypto assets from its hot wallets to Big Four auditing firm Ernst & Young, the court-appointed monitor overseeing the case. During Friday’s court hearing, lawyers for the Bank of Montreal and the auditing firm reportedly said that the banks are uncomfortable managing the funds, citing the uncertainty of their origin. Elizabeth Pillon, a lawyer representing Ernst and Young, is quoted by CBC saying that she doesn’t blame the banks for their hesitation since there are allegedly money laundering issues. Pillon also reportedly noted: “The monitor has serious concerns about finding another institution to hold these funds.” According to the article, at the end of Friday’s hearing, Justice Michael Wood of the Nova Scotia Supreme Court issued an order that will eventually see the QuadrigaCX money deposited in a Royal Bank account. Ernst and Young will then use these funds to pay for the ongoing court proceedings, and “the money could also be used to partially compensate 115,000 users of the QuadrigaCX exchange who are owed $260 million” in crypto and cash, CBC notes. The unwillingness to hold QuadrigaCX’s funds also manifested during the time of its operations, when the exchange was unable to get a bank account because of banks’ reluctance and instead turned to third-party payment processors. As Cointelegraph reported in November last year, when the Canadian Imperial Bank of Commerce froze the accounts of the payment processor, the court ruled in favor of the bank, citing concerns over identifying the identities of the funds’ owners. Source : Coin Telegraph BankingBanksBitcoin ScamscanadacointelegraphCryptocurrency ExchangeErnst & YoungMoney LaunderingQuadrigaCX Previous ArticleIBM Exec Forecasts a Million-Dollar Bitcoin — When a Sat Will Equal a CentNext ArticleApple ‘Project Titan’ Could Mean an Electric Van, Not a Multi-Billion Acquisition of Tesla Ayush Saraswat Founder and Editor-in-Chief of ‘Coinotizia’. Technology Evangelist, Security Analyst, Cryptocurrency Investor, Certified Cyber Security Expert and Web Applications Developer.
cc/2019-30/en_middle_0029.json.gz/line3845
__label__wiki
0.570173
0.570173
Towerside district: Our partner in innovation On the map below, the Creative Enterprise Zone (in purple) ends at the St. Paul-Minneapolis line. But check out that pink-bordered area overlapping the CEZ and extending west: that 370-acre area is now known as the Towerside Innovation District. Called a "new century nexus for people to live, work, learn, research, and engage," Towerside aims to develop a restorative, arts-inspired community with district-wide systems for stormwater management, heating, cooling, and energy. The district is powered partly by its proximity to the University of Minnesota, and like the CEZ, it's got lots of synergies. It's an "inviting place with a catalytic atmosphere that will inspire a community that is diverse, inclusive, vibrant and responsive to ever-evolving opportunities and discovery." Start by attending the annual forum, April 25. Julie James April 16, 2018 CEZ Xchange: planning for people and places Channel your inner lumberjack at 755 North Prior Julie James April 16, 2018 Lumberjack City
cc/2019-30/en_middle_0029.json.gz/line3854
__label__cc
0.617781
0.382219
Agents in Records CogStack Medichec Healthlocker RADAR-CNS BioYODIE and SemEHR We are working with patients, health workers, and industry to develop digital health innovations and accelerate their delivery to the health service. We are pioneering research in electronic health records (EHR), underpinned by our Clinical Record Interactive Search (CRIS) system, an advanced EHR database with natural language processing capabilities, which allows researchers to access and analyse the health record securely and efficiently. CRIS record linkages connect information from health records to other resources from within and outside healthcare, allowing wide-scale analysis of health determinants and outcomes. Our CogStack and KConnect platforms provide advanced information retrieval and extraction and decision-making tools specifically designed for unlocking the information in the health record, and are already being piloted in several NHS Trusts. In wearable technology, we are working with industry partners including Fitbit and Intel to explore how mobile devices and wearable fitness monitors could help to prevent relapse in schizophrenia (SleepSight) and depression, multiple sclerosis (MS) and epilepsy (RADAR-CNS). We are developing customised online portals to empower patients and improve the quality of healthcare. IMPARTS is an award-winning initiative to integrate mental and physical healthcare in research, training and clinical services, based on an innovative tablet-based screening system. The PROTECT study of brain ageing uses an online recruitment and testing portal which has so far registered over 20,000 participants. With King’s College London Addictions Department, we are creating a portal for collecting addiction recovery outcome data using a novel outcome measure developed at King’s. In data visualisation & analytics, our patient timeline app allows clinicians to search and filter documents in EHRs quickly and accurately. Our information retrieval and extraction platform CogStack implements best-of-breed enterprise search, natural language processing, analytics and visualisation technologies to unlock the health record and assist in clinical decision making and research. People with lived experience of mental disorders are at the centre of all our work, and we are working with CWE (Citizens with Experience) solutions, who develop community-led projects in health and social care based on empathy, inclusion and sustainability. Through a double lens approach of patient’s experience and clinician’s expertise, CWE spans boundaries to transcend issues and barriers that distance organisations from the people they care for. These are just some of the projects we’re working on. If you would like to collaborate with us, or would like to find out more about what we can do for you, please contact us. Health Locker Providing interactive online access to electronic health records, encouraging individuals to take an active role in their recovery and wellbeing. Assisting clinical decision-making with best-of-breed text analytics. A new app which provides support to people with psychiatric disorders between clinic visits. MRC Mental Health Pathfinder grant awarded to King’s King’s to help transform health through data science following £54 million award Potential for machine learning to predict unknown adverse drug reactions fernando.lanza@kcl.ac.uk SGDP Centre, IoPPN, King’s College London, 16 De Crespigny Park, London SE5 8AF Copyright 2015 Design by TeslaThemes, Supported by WPmatic Copyright 2017 Centre for Translational Informatics
cc/2019-30/en_middle_0029.json.gz/line3856
__label__wiki
0.821725
0.821725
Councilmember González, Mayor Burgess Reaffirm Support of Immigrant Communities, DACA Program with Unanimous Passage of Two Resolutions SEATTLE – Councilmember M. Lorena González (Position 9, Citywide) and her colleagues reaffirmed Seattle’s support for immigrant communities and DACA program recipients with passage today of two related resolutions. Resolution 31779, affirms the City’s support of immigrant communities; and, Resolution 31775, strengthens public safety by affirming the City’s support for immigrant and refugee witnesses, survivors, and victims of crime. Each passed with unanimous support. “We cannot be complacent,” added González. “If we fail to protect vulnerable communities by allowing state or local policies and rhetoric targeting immigrants we will also be failing to uphold the values of ethnic, racial, and socio-economic diversity, and prosperity for all.” In her remarks prior to the final vote, González reminded her colleagues of their moral obligation to be vigilant on behalf of the community of immigrants, and the power of adopting clear and transparent protocols for the certification of I-918B forms. Also known as U-Visas, I-918B forms serve to encourage immigrants who might otherwise under report criminal activity or avoid engagement with law enforcement altogether, to do safely do so. “I have a long history — professionally and politically — of standing with victims and survivors from all walks of life. The City of Seattle will continue this legacy no matter who occupies the White House and regardless of the threats — both real and perceived,” said González. Earlier this year City Council and now-Mayor Burgess developed policies to protect vulnerable communities, including but not limited to strong privacy protections limiting the collection of confidential personal immigration status information; and, a commitment of resources for immigrant communities, including a $1 million investment in the Seattle King County Legal Defense Network. “All Seattle residents, regardless of language spoken, ethnicity, nationality, or immigration status, have the right to feel safe calling the police to report a crime—as either a witness or victim,” said Mayor Tim Burgess. “Earlier this year, Councilmember Gonzalez and I partnered to identify resources to establish the City Legal Defense Fund. I am proud that Seattle is leading the nation in protecting the rights of our immigrant and refugee neighbors by taking actions that reflect our values as an inclusive city.” Mayor Burgess is expected to expedite the bill signing with a ceremony on site, and in the company of Councilmember González, representatives from Washington Dream Coalition, OneAmerica, Northwest Immigrant Rights Project (NWIRP), MAPS-AMEN (American Muslim Empowerment Network) and other community organizations following this afternoon’s Full Council meeting. Seattle City Council meetings are cablecast and Webcast live on Seattle Channel 21 and on the City Council’s website. Copies of legislation, Council meeting calendar, and archives of news releases can be found on the City Council website. Follow the Council on Twitter and on Facebook. Posted: October 2nd, 2017 under Councilmember González, Gonzalez, News Releases.
cc/2019-30/en_middle_0029.json.gz/line3861
__label__cc
0.694662
0.305338
Azerbaijan (7489) Women who believe a wife is justified refusing sex with her husband if she has recently given birth (%): Q4 Percentage of women aged 15-49 who believe that a wife is justified in refusing to have sex with her husband if she has recently given birth. Each wealth quintile represents one fifth of households with quintile 1 being the... Percentage of women aged 15-49 who believe that a wife is justified in refusing to have sex with her husband if she has recently given birth. Each wealth quintile represents one fifth of households with quintile 1 being the poorest 20 percent of households and quintile 5 being the richest 20 percent of households. Code: SG.RSX.BRTH.Q4.ZS Data Type: Time Series Periodicity: Annual Dataset: Gender Statistics Source: Demographic and Health Surveys (DHS) Last Updated: Jul 16, 2019 License: CC-BY 4.0 (details) Access Options: Query Tool API Download CSV XML EXCEL Women who believe a wife is justified refusing sex with her husband if she has recently given birth (%): Q1 (lowest) Female migrants (% of international migrant stock) Percentage of female migrants out of total international migrant stock. International migrant stock is the number of people born in a country other than that in which they live. It also includes refugees. Code: SG.POP.MIGR.FE.ZS Data Type: Time Series Periodicity: Annual Dataset: Gender Statistics Source: United Nations Population Division, Trends in International Migrant Stock: 2015 Revision. Last Updated: Jul 16, 2019 License: CC-BY 4.0 (details) Access Options: Query Tool API Download CSV XML EXCEL Married men and married women have equal ownership rights to property (1=yes; 0=no) Married men and married women have equal ownership rights to property is whether both married men and married women have the same ownership rights to property. Ownership rights as used here covers the ability to manage, control... Married men and married women have equal ownership rights to property is whether both married men and married women have the same ownership rights to property. Ownership rights as used here covers the ability to manage, control, administer, access, encumber, receive, dispose of and transfer property. The answer is “Yes” when there is no specific legal restriction related to property applied to married women or men based on gender. The answer is “No” when there are gender differences in the legal treatment of spousal property, for example, if husbands are granted administrative control over marital property. Code: SG.OWN.PRRT.MR Data Type: Time Series Periodicity: Annual Dataset: Gender Statistics Source: World Bank, Women, Business and the Law. Last Updated: Jul 16, 2019 License: CC-BY 4.0 (details) Access Options: Query Tool API Download CSV XML EXCEL Men who do not own land (% of men) Men who do not own land (% of men) is the percentage of men who don’t own any land, which legally registered with their name or cannot be sold without their signature, either solely or jointly with someone else or both. Code: SG.OWN.LDNO.MA.ZS Data Type: Time Series Periodicity: Annual Dataset: Gender Statistics Source: Demographic and Health Surveys (DHS) Last Updated: Jul 16, 2019 License: CC-BY 4.0 (details) Access Options: Query Tool API Download CSV XML EXCEL Men who do not own land (% of men): Q5 (highest) Men who do not own land (% of men): Q5 (highest) is the percentage of men who don’t own any land, which legally registered with their name or cannot be sold without their signature, either solely or jointly with someone else or... Men who do not own land (% of men): Q5 (highest) is the percentage of men who don’t own any land, which legally registered with their name or cannot be sold without their signature, either solely or jointly with someone else or both. Each wealth quintile represents one fifth of households with quintile 1 being the poorest 20 percent of households and quintile 5 being the richest 20 percent of households. Code: SG.OWN.LDNO.MA.Q5.ZS Data Type: Time Series Periodicity: Annual Dataset: Gender Statistics Source: Demographic and Health Surveys (DHS) Last Updated: Jul 16, 2019 License: CC-BY 4.0 (details) Access Options: Query Tool API Download CSV XML EXCEL Men who do not own land (% of men): Q4 Men who do not own land (% of men): Q4 is the percentage of men who don’t own any land, which legally registered with their name or cannot be sold without their signature, either solely or jointly with someone else or both.... Men who do not own land (% of men): Q4 is the percentage of men who don’t own any land, which legally registered with their name or cannot be sold without their signature, either solely or jointly with someone else or both. Each wealth quintile represents one fifth of households with quintile 1 being the poorest 20 percent of households and quintile 5 being the richest 20 percent of households.
cc/2019-30/en_middle_0029.json.gz/line3871
__label__cc
0.688061
0.311939
Rotary Club of Dauphin (Manitoba) Rotary club of Dauphin Privacy Policy Rotary club of Dauphin This organization uses ClubRunner for its membership management software and to publish its website, maintain its database, and send email communications. ClubRunner At ClubRunner, we're committed to protecting your privacy. This Privacy Policy explains how we collect, use, and disclose information processed through this website, and our online subscription service (the "Services"). This page sets out our privacy policy and describes why and how we collect, use and disclose personal information which you choose to provide to us on our website, as well as how to access, modify, or delete your personal information. This policy doesn't apply to anyone who isn't under our control or management, such as the operators of other websites that you might link to from our website. Such operators may have their own privacy policies, which might differ from ours. How Will We Collect Personal Information? You are under no obligation to disclose any personal information to us at any time. We collect information you provide directly to us. For example, whenever you participate in any interactive features of the Services such as filling out a form, requesting customer support, sending us an email, or calling us. In the process you may be asked to give your name, e-mail address, mailing address, and any other information you choose to provide for the purpose of these Services. We or a designated third party may collect payment and credit card information when you subscribe to our paid Services or purchase additional services. Information We Collect Automatically When You Use Our Services When you access or use our Services, we may automatically collect information about you, including: Log Information: We log information about your use of the Services, including the type of browser you use, access times, pages viewed, your IP address, your general location, and the page you visited before navigating to our Services. Device Information: We collect information about the computer or mobile device you use to access our Services, including the hardware model, operating system and version. Cookies: We use cookies to store your login session and other information to make your navigation of our Services easier. More information on cookies is available below. Use of Cookies and Other Tracking Technologies Our site uses "cookies" which are small files containing pieces of information that are stored by your browser on your computer's hard drive. Most Web browsers automatically accept cookies, but if you prefer, you can set your browser to block them. Our cookies can contain information such as your user ID that our website uses to recognize you. Our cookies can't read data off your hard disk or read cookie files created by other sites. The only personal information our cookies contain is the information you provide yourself. When you enter personal information on our website, your personal information will be linked to the cookie we save on your computer. If you do choose to delete your cookie, you may not be able to use the administrative features of the website. We use Google Analytics to track how visitors interact with our website, analyze where traffic is generated from and collect information related to general site engagement. Third party advertising management services such as Google and Facebook may display tailored messages upon you interacting with our website through the use of cookies. You can opt out of these ads at any time when displayed. For more information on Google Ads, click here. For more information on opting out of ads on Facebook, click here. Should you delete your cookies, please note, you will need to opt out of seeing these messages again. These cookies cannot personally identify you and expire after 180 days or until you clear your cookies. On customer websites, where you engage with social share buttons (ex: Facebook Like Button or the share content buttons), the services that manage the social platform you get directed to may use cookies. ClubRunner is not affiliated with any of these services and all legalities surrounding the use of cookies are thus under the policies set by the social media platforms. We may use information about you for various purposes, including to: Provide, maintain, customize, and improve our Services; Provide and deliver the products and services you request, process transactions and send you related information, including confirmations and invoices, Send you technical notices, updates, security alerts and support and administrative messages; Respond to your comments, questions and requests and provide customer service; Communicate with you about products, services, offers, promotions, and events offered by ClubRunner and others, and provide news and information we think will be of interest to you; Monitor and analyze trends, usage and activities in connection with our Services; and Carry out any other purpose for which the information was collected. You may receive automatically-generated emails from ClubRunner that are triggered when you perform certain tasks such as registering for an event, volunteering for a task, subscribing to a bulletin, or requesting a forgotten password. You may also receive emails from other club members. ClubRunner does not control the frequency or content of member-generated emails. You have the option to unsubscribe from receiving these emails by either updating your communication preferences from within your profile, or removing your email address entirely. How Is Your Personal Information Protected? ClubRunner is committed to protecting your personal information and has developed policies and procedures to ensure our compliance with our own Security and Privacy Policy and with applicable International laws. We also understand your concerns about online security and take reasonable measures to help protect information about you from loss, theft, misuse and unauthorized access, disclosure, alteration and destruction. How Do We Disclose or Share Your Information? When you voluntarily provide ClubRunner with personally identifiable information online, that information is kept within the ClubRunner family of web site(s) and will not be sold, rented or otherwise traded to any third party. We may share your information as follows or as otherwise described in this Privacy Policy: With vendors, consultants, and other service providers who need access to such information to carry out work on our behalf; In response to a request for information if we believe disclosure is in accordance with any applicable law, rule or regulation; If we believe your actions are inconsistent with the spirit or language of our user agreements or policies, or to protect the rights, property and safety of ClubRunner or others; With your consent or at your direction. We may also share aggregated or de-identified information, which cannot reasonably be used to identify you. ClubRunner employs other companies and people to provide functions that form part of our Services, for example, email sending, social media sharing, payment processing, help desk software, etc. ClubRunner has made and continues to make efforts to ensure all its sub-processors comply with our privacy policies. For a list of ClubRunner's sub-processors, please email us at support@clubrunner.ca. We will retain your personal information only for as long as it is needed to provide our Services, and this depends on the purposes for which we use it, unless applicable law requires we either dispose of it or keep it longer. We may also continue to store your personal information to allow us to resolve disputes, enforce our agreements, comply with legal obligations and/or for other legally permissible purposes consistent with this Privacy Policy. How to View, Update or Delete Your Personal Information You may, at any time, view, update and request to permanently delete any of your personal information. These tools are made available to all Site Administrators, or you may contact ClubRunner at support@clubrunner.ca. Upon request, ClubRunner will provide you with information about whether we hold any of your personal information. If you provide us with your personal information, you have the following rights: To review the personal information we have stored; To request that we correct any errors, outdated information, or omissions; To unsubscribe from being contacted by us; and To have your information permanently deleted. We will respond to your request within a reasonable timeframe and notify you of the action we have taken. Questions Regarding This Privacy Policy If you have any questions please contact ClubRunner, 2060 Winston Park Drive, Suite 102, Oakville, Ontario, L6H 5R7. You may call us at (905) 829-5299, or email us at support@clubrunner.ca. We may change this Privacy Policy from time to time. If we make changes, we will notify you by revising the date at the top of the policy and, in some cases, we may provide you with additional notice, such as adding a statement to our home page or sending an email. We encourage you to review the Privacy Policy whenever you access the Services or otherwise interact with us to stay informed about our information practices. Note On Jurisdiction ClubRunner is a privately held Canadian company with headquarters in Oakville, Ontario, Canada. Consequently, by using our Services you agree that in all matters relating to this web site(s) you shall be governed by the laws of the province of Ontario or Canada, as applicable, and further, that you submit to the jurisdiction of the courts of the province of Ontario. You may not use our Services if law prohibits you from doing so in the country in which you reside.
cc/2019-30/en_middle_0029.json.gz/line3874
__label__cc
0.500223
0.499777
davidtoop a sinister resonance Posted on March 24, 2018 by davidtoop Nine people sitting on the basement floor folding paper into origami birds, four microphones hanging from the ceiling, a loudspeaker pair at each end of the room. A sound going on, unmistakeably but ambiguously emanating from this activity, suggestive of the palpitations of a locust swarm, the feeding of insect eaters biting their way through a bounty of desiccated wings and bleached bones. The white cranes accumulate, piling up in earthbound flocks next to their makers. I am conscious of furniture in the room, the chair on which I sit, the movement of hands, a thin garment hanging loosely on the wall, a vivid red teapot. Gradually, patterns emerge in the sound, lulls falling mysteriously, overtaken by industrious surges. A Max patch is at work. Now the sound piece thins, leaving a sparse acoustic crackle that exactly matches the quick, concentrated effort of the folders. Their number has grown to fourteen. This is a durational piece – four hours at this point – so some of them have returned from a break. The atmosphere of dedication is the focal point that holds it all within its shape and volition, no obvious breakage points other than the sight of doing and making, the growth of birds. Upstairs we speak in low voices, respectful of the crackling quiet below. For a moment I think of Chim-­Pom’s installation pieces – Non-Burnable, Real Thousand Cranes and The History of Human – all of which refer to the vast quantities of paper cranes sent from all over the world to the city of Hiroshima each year and to the practice of Senbazuru, folding one thousand paper cranes connected together by strings. According to Japanese legend, a person who folds one thousand paper cranes – one for every year of the mystical crane’s life – will be granted whatever they wish for. But then I think of the sounds of labour: the physical impact of an axe cutting into a tree, the making of objects by hand, a typing pool (as seen only in old films) or the agricultural workers in Suffolk who would ease the monotony of threshing by mimicking the patterns of bell-ringing, their flails beating the same rhythm on the elm floor as the bells in a church steeple. There are those records in my collection devoted only to songs and sounds of working: a Folkways 10-inch LP, The World of Man: His Work, which, notwithstanding the title, includes examples of women working: a Norwegian woman calling cattle to the barn to be milked, a Japanese woman spinning thread, women waulking, pounding and pulling tweed in the Hebrides, singing to make the work go with joy and pace. Then more grim than that, Alan Lomax’s recordings of prison songs made at Parchman State Penitentiary, Mississippi, in 1947, and Bruce Jackson’s Wake Up Dead Man: Black Convict Work Songs from Texas Prisons, made in 1965-6, the percussive thud of axes and hammers resounding in hot air as they rise and fall in unison, beating the rhythm of songs like “Rosie”, “Grizzly Bear” and “Early In the Morning.” Lucie Stepankova’s idea for Fold was to bring together a spatial composition with this physicality, the working of paper and legend, “[exploring] the sonority of the ancient tradition of paper folding (origami), its ritual aspects and meditative potential. It values collectivity, simplicity and the transcendental quality of repetition over a long duration.” At the beginning of Yasunari Kawabata’s post-war novel, Thousand Cranes, a young woman serves tea to the male protagonist. She becomes known as the girl of the thousand cranes, simply because she “carried a bundle wrapped in a kerchief, the thousand-crane pattern in white on a pink crape background.” The image of a thousand cranes haunts the text. Starting up in flight or flying across the evening sun, their flashes of brilliance momentarily cut across guilt and suffering. “The sound of her broom became the sound of a broom sweeping the contents from his skull, and her cloth polishing the veranda a cloth rubbing at his skull.” Happiness is a wish. Fold, a listening environment, was performed at Hundred Years Gallery, E2 8JD, during the afternoon of Saturday March 24th, 2018. Posted in live sound | Tagged Chim-Pom, Fold, Hundred Years Gallery, listening environment, Lucie Stepankova, One Thousand Cranes, Yasunari Kawabata | Leave a comment gone to earth Posted on September 29, 2017 by davidtoop Maybe a coincidence but during our Sharpen Your Needles event last night (28.09.17) Evan Parker played “Music for Mbale (Ndokpa)”, from The Photographs of Charles Duvelle: Disques Ocora and Collection Prophet, a sumptuous book and two CDs published by Sublime Frequencies. Recorded by Duvelle in Ngouli, Central African Republic, in 1962, the instrument played by two men for the Mbale village festival was a lingassio, a four key xylophone mounted over a pit. Coincidence because of a social media discussion about the Ocora record called Musiques Dan, recorded in Côte d’Ivoire by Hugo Zemp in 1965 and 1967. Was there an example of an instrument using a hole in the ground for resonance? There are many extraordinary sounds and sound-making devices on that record – whirled slit aerophone, bullroarer, mirlitons, metal basin, the ground struck by big sticks, sieves filled with bronze jewellery, enamel basins filled with gravel, water drum, stone whistles – but maybe the strangest is Mask-that-eats-water, a pit dug into the earth and covered by bark. Fixed into the bark are vegetable fibres that are rubbed by two players. For reasons not entirely clear to me though perhaps explained by the ‘slip and stick’ theory whereby water affects dynamic and static friction at a very fast rate, water is poured onto the fibres by a third player, hence the name of the mask. A photograph of a different earth instrument appears in Zemp’s book: Musique Dan: La musique dans la pensée et la vie sociale d’une societé africaine (1971). This one is equally ingenious but more elaborate, more conventional. In a chapter entitled Mythes d’origine des instruments de musique, Zemp gives what his informant tells him is the origin of the Arc-en-terre (my translation): “The bow in the ground belonged to an unfortunate, a little unfortunate. This boy had nothing with which to amuse himself; he could neither play the harp-lute, nor beat the drum, nor blow into the trumpet. Then he dug a hole in the ground, covered it with leaves, fixed a vegetal fibre there, and attached the other end to a branch which he buried in the ground. When he struck the rope, it spoke grrrrr grrrr. He says, It’s enough for me to amuse myself. This boy was an unhappy person. It is for this reason that the earthen bow remains with the children. It is not a thing to distract important people, it is for the unhappy.” One lesson to be learned from this is not to jump to easy conclusions about earth instruments and primitivism. The Dan had other ways of amplifying sound, as the above photograph shows, but terra-technology floated somewhere out on the edges of society, either marginal, in the sense of being a diversion for the melancholy and immature, or spectral, as sound masks emitting the voice of a supernatural being. When I was beginning to research non-western music in the early 1970s unilinear cultural evolutionism was still prevalent. To find any subtlety in the literature you had to read ethnomusicologists like Klaus P. Wachsmann (father of improvising violinist Philipp Wachsmann). In my early twenties I was excited to read his chapter – The Primitive Musical Instruments – in Musical Instruments Through the Ages (edited by Anthony Baines, 1961). “While considering them,” he wrote, “it must be borne in mind that the effectiveness of a musical instrument can only be measured by the degree of satisfaction its sound gives to the people who use it.” He devotes a short section to what he called Ground Instruments: ground zithers, percussion beams, stamping pits, ground bows and, most fascinating of all: “In Abyssinia a narrow, tapering hole is made in the ground and howled into; the vernacular name of this instrument means ‘lion’s call’.” The reference almost certainly came from French musicologist André Schaeffner’s Origine des Instruments de Musique (1936). In Art, ethnography and the life of objects (2007) Julia Kelly situates such ethnographic objects within the operations of circumstantial magic, as she puts it, “. . . at the boundary between the animate and the inanimate . . .” traversed by French surrealists in the late 1920s and early 1930s. She quotes Schaeffner’s argument, that ethnographers should study musical instruments falling outside recognised categories, for example “the most humble wooden box used to produce sound.” An extreme example from many points of view, not least museology, was a pit dug in the ground. “Schaeffner was also concerned with the least conservable of musical instruments,” Kelly writes, referring to an article on musical instruments from the Trocadéro’s ethnographic collections, “an Abyssinian ‘earth drum’ consisting of two holes in the ground of differing heights. This instrument could only be captured photographically, and indeed was virtually illegible in the dark photograph by [Marcel] Griaule published alongside the article, where only the player’s hands and arms gave any indication of its existence.” The allure of such an instrument, hole within a hole, absence within absence, Is out of all proportion to its simplicity. One contribution to the above mentioned social media thread came from Ilan Volkov, who drew my attention to Christian Wolff’s Pit Music (1971), published in Prose Collection. The piece could easily be a description of how to make your own version of the Dan earth bow, though that seems unlikely as both Zemp’s book and Wolff’s composition emerged in the same year. As Ilan pointed out, Wolff never intended his Pit to be actually made. Like a lot of things, post-Fluxus, it was an indication of potential (political as much as anything) rather than an imperative. I wrote similarly provisional pieces a few years later, the Wasp Flute that was never put into practice even though the instrument was built, and hypothetical events in which I performed with seals and fish, all of them suggestions of how life might be lived in a world less traumatised by what Timothy Morton has called The Severing (in his new book, Humankind: Solidarity with Nonhuman People). from New/Rediscovered Musical Instruments (1974) As Morton makes clear, discussions such as the one I am having now and have been having for nearly fifty years, became taboo, either because they were damned for cultural appropriation, primitivism and exoticism or dismissed for being hippyish, lacking in the detachment and rigour proper to a person who was considered to be permanantly Severed. But ultimately these holes in the ground address a basic problem – how to make a small thing bigger – and by applying the principle of resonance they fashion an elegant solution whose imprint will gradually soften and crumble into an impression rather than a scar. We could learn something from that. Posted in instrumentality, writing sound | Tagged Andre Schaeffner, Charles Duvelle, Christian Wolff, earth bow, Evan Parker, Hugo Zemp, Humankind, Ilan Volkov, Julia Kelly, Klaus P. Wachsmann, Marcel Griaule, Pit Music, Sharpen Your Needles, Timothy Morton, Wasp Flute | Leave a comment listening is intimacy Within listening is intimacy. The path to intimacy – with phenomena, other beings, objects, time, sensuality, the aliveness of things – lies through listening. A passing through. Seiji Morimoto, holding a rectangular metal box, slight movement, angled towards and away from light, chiaroscuro (as Caravaggio, as Georges de La Tour, as Robert Motherwell), tweaking controls; a small noise emerging, like pond weed in sunlight. Small moths flutter into the light of a table lamp, orbit fitfully, vanish. I thought of the tactical evasions used by moths when they detect the ultrasonic clicks of hunting bats: to emit their own high frquency clicks as a jamming mechanism, to fly erratically, to plummet to the ground as if dead. This is the most intense form of mutual listening, reciprocated clicks bouncing off bodies, clicks fired out into vacated space as one half of the partnership plays dead. Two heads, both strikingly classical in their own way, are in relation to each other; one dips close to the ground, the other is immobile, coaxing signals from a box. Later I remember Victor I. Stoichita’s account of a photograph taken by Gianfranco Gorgoni in 1974, of Andy Warhol and Giorgio De Chirico: “Though probably a snapshot, it nevertheless has the force of an oracle. It is the lighting that makes the photograph so dramatic, so much so that it is difficult to believe the snapshot has not been touched up. In any case, due to the unusual lighting, what could have remained a simple social record becomes an image of a transfer of power: through the freak pose, De Chirico passes his shadow world over to Warhol, together with an entreaty that he be its master (from A Short History of the Shadow, 1997). Trains scream, the hard exhaust of a motorbike passing through, distantly a cover version of Jorge Ben Jor’s “Mas Que Nada” and (again later) I think of Takuma Nakahira’s photographs, street scenes of sooty black, lamp black, blasted by flares and abysses of light. So there are snapshots, nothing else. (Cafe Oto Project Space, evening, 19 September 2017). listening, the listener listening and listening stillness listening/movement listening listening to listening to listening Posted in live sound | Tagged Cafe Oto Project Space, listening, Seiji Morimoto | Leave a comment a distributed conglomerate instrument While eating shojin ryori cuisine outdoors at Izusen, Daitokuji temple, Kyoto, in spring sunshine, April past, I reflected on François Jullien’s In Praise of Blandness, the appreciation of blandness or insipidity in ancient Chinese aesthetics and ritual practices. Commenting on a text describing the use of muted music during ritual offerings to the ancestors he says this: “For the most beautiful music – the music that affects us most profoundly – does not . . . consist of the fullest possible exploitation of all the different tones. The most intensive sound is not the most intense: by overwhelming our senses, by manifesting itself exclusively and fully as a sensual phenomenon, sound delivered to its fullest extent leaves us nothing to look forward to. Our very being thus finds itself filled to the brim. In contrast, the least fully rendered sounds are the most promising, in that they have not been fully expressed, externalized, by the instrument in question, whether zither string or voice. The seemingly endless succession of small dishes that form the experience of shojin ryori are not bland in the sense of being indistinguishable or boring. Each one has a particular character and subtlety of taste and texture but the cumulative effect is to balance rather than overwhelm the others. The look of them as diminutive sculpture is so striking and their taste so delicate that they leave what Jullien calls “the leftover tone, the ‘lingering’ or ‘leftover flavour’ (yiwei) [evoking] a potential, inexhaustible value . . .” But another important aspect of shojin ryori is its relationship to time. Green tea mochi, yuba, fried plum, cherry blossom rice cake, sesame tofu, tofu skin, bamboo shoot, tempura, soup with kombu, edible flowers and ferns, bamboo and perilla leaf all follow each other at a steady pace without overlapping. They are specific to a moment yet they constitute a meal. This is consistent with many of the gardens of Kyoto temples – Zuiho-in, Kohrin-in, Oubai-in, Daisen-in, Tofukuji temple, Ryogen-in and Taizo-in. Many of them reveal themselves gradually. A corner is turned; a path is taken; a threshold is crossed. At Ryōgen-in, a small enclosed stone garden called Kodatei lies under the eaves of the study. It has another name – A-un – which represents the inhalation and exhalation of breath, indivisible pairs, positive and negative current. The dimensions of the garden are tiny, its stones visibly linked yet separated (symbolically, at least, and within deep understanding the longer it is contemplated) by a vast body of water. In my early twenties I was drawn to a book called Animals Without Backbones, thinking that by studying invertebrates I could gain a greater understanding of the so-called formlessness of free improvisation. I was reminded of it, reading an account of “an unprecedented number of Atlantic portuguese man o’war” washing up on the Cornish coastline. Customarily thought of as jellyfish, portuguese men o’war are a species of siphonophore, a multitudinous colony of clone individuals with four specialised parts, all working together as a single organism. They go where the wind and ocean currents take them, often travelling in vast flotillas, which is why such sudden, mysterious ‘invasions’ become news. At the Meakusma festival, Eupen, last weekend (8-10 September 2017), speaking and playing solo, I spent some hours on Sunday afternoon with Rie Nakajima and Pierre Berthet, chatting, watching them set up, then immersing myself in their installation performance. Elsewhere they have called these performances Dead Plants and Living Objects. Maybe that title was less applicable here. They set up on a hillside, objects dispersed in long grass and running down to the stream. Gusts of wind startled stretched wires and resonators into humming life. For a while I watched a large white balloon slowly deflate as it rocked gently in the breeze. Attached aerophones made no discernable sound but the scene was enlivened by flies landing on the balloon surface as if docking on a barren planet. They sought warmth but if the wind wobbled their puffy globe they would quickly vacate, then return a few seconds later. Given their modest size, some sounding devices transmitted strongly from distance, a small part of their frequency range carrying up the hill. To walk close to them triggered curiosity, the pick-apart desire to know how they worked, but further away, where they were barely visible, a more open listening displaced this kind of focussed, analytical thinking. The objects were scattered, half-hidden in the grass, in some cases barely visible (stretched string and wire); they could have come from a shed, a barn, the kitchen or a workshop for the manufacture of indeterminate projects. Without walls and with a cloudy sky as infinite ceiling, the dispersal and linkage of these elements felt more emphatically what I would call a distributed conglomerate instrument, close in its way to the shojin ryori aesthetic of eating, the sculpture of discrete but connected stone gardens or a drifting colony of intra-dependent entities. Muted would be a way to describe its effect; to become a part of it demanded unbeing, shedding all the blocking aspects of a fully operational human, letting go of faculties and ideas of boundedness, to enter into the world of flies as they alight on and take off from soft moving planets. Posted in instrumentality | Tagged Francois Jullien, In Praise of Blandness, Kodatei garden, Pierre Berthet, Rie Nakajima, shojin ryori, sound installations | 4 Comments and so it was the blues falling upon us Posted on August 17, 2017 by davidtoop and so it was the blues falling upon us . . . like a lot of other people, my head was burning and turning from the reality of an American president in 2017 unwilling after Charlottesville to fully distance himself from neo-Nazis, white supremacists, the KKK and other racists and so it was that I learned of Paul Oliver’s death. My copy of The Meaning of the Blues was close to hand and so it was I came to read Richard Wright’s forward, the conclusion of which said this: “The American environment which produced the blues is still with us, though we all labour to render it progressively smaller. The total elimination of that area might take longer than we now suspect, hence it is well that we examine the meaning of the blues while they are still falling upon us.” This was written in 1959, in Paris, for a soon-to-be architectural historian, English and art school trained, who had fallen in love with the blues and produced a book that was to contribute greatly to the scholarship and spread of a subject almost entirely outside his direct personal experience. I was a teenager, maybe fifteen, when I read The Meaning of the Blues (in other editions titled Blues Fell This Morning). Oliver’s manuscript was finished in 1958, finally published in 1960 by which time he was on the road in America, recording interviews with an extraordinary range of blues singers, Speckled Red to Little Walter (recovering from a bullet wound), Mary Johnson to Sweet Emma Barrett. Oliver’s writing taught me how to think about music, make connections through to history, context and politics, particularly race politics; how to make some sense of an obscure lyric. In 1967, when I read Conversation With the Blues, the fruits of that field trip to a black America still enduring Jim Crow laws in the south, I began to develop an understanding of how to transcribe the cadence of vivid speech patterns, how to write about the relationship of music to its practitioners, their circumstances and the society of which they are a part. Lightnin’ Hopkins at the Sputnik Bar, Houston (photo by Paul Oliver) What I didn’t learn from him was how to write about the sound of the music. That seemed outside his purview, except for some isolated examples in Savannah Syncopators where intense encounters – “[in Ghana] . . . a chorus of women sings in chanting fashion, with one woman leading with vocal lines to which they respond, seemingly without relationship to the compelling rhythms of the adowa band . . .” – demanded description as evidence in a search for answers to questions about African retentions in the blues. How well his answers hold up after 37 years is for somebody else to decide but this approach inspired me when I wrote Rap Attack. The exoticism of blues to a person like me, growing up in the suburban periphery of London in the 1950s and 60s, was one of the subjects I addressed in Exotica in 1999. After a trip to New York where I’d met Charles Keil, a fascinatingly perplexing track by J.B. Lenoir – “I Sing Um the Way I Feel” – had been on my mind. “Paul Oliver, one of the most eloquent of blues scholars,” I wrote, “had visited Lenoir in 1960, recording their conversation on a heavy EMI tape recorder that disintegrated when he journeyed south into the humid summer heat. Lenoir talked to him about dreams: the dreams of an old devil. ‘somethin’ with a bukka tail and the shape of a bull but he could talk’, that made his father quit singing the blues; a dream his mother had sent him, giving him numbers for the lottery; the musical inspiration that came to him, ‘like through a dream, as I be sittin’ down, or while I be sleepin’’.” In 1984, Oliver prefaced the collected essays of Blues Off the Record with some cautious autobiographical notes that shed light on his obsession with the blues. As a teenager in 1942 he did ‘harvest camp’ in Suffolk, farm work taken on by teenagers to replace agricultural labourers called up for military service in World War II. Americans were building a base in Stoke-by-Clare, and Oliver’s friend Stan persuaded him to eavesdrop on a gang of black soldiers digging a trench. After a while most of the GIs were marched away, leaving two alone to finish the job. “We stayed behind the hedge,” Oliver wrote, “getting cold. I was getting impatient too, when suddenly the air seemed split by the most eerie sounds. The two men were singing, swooping, undulating, unintelligible words, and the back of my neck tingled. ‘They’re singing a blues,’ Stan hissed at me. It was the strangest, most compelling singing I’d ever heard . . .” Oliver’s influence, though not his acuity and depth of knowledge, is plainly evident in the first review I ever wrote, 600 or so words about a Realm LP – Dirty House Blues by Lightnin’ Hopkins – published in a self-produced school magazine called ONE, circa 1965 or 66. Much of it was cribbed from the LP sleevenotes and where my own opinions surface they are embarrassingly naïve. I was searching for something, comparing “Everything Happens To Me” to James Brown’s version of “Why Does Everything Happen To Me” without knowing anything about the convoluted origins of that song (and I still don’t know much), also finding “affinities, strangely enough” between a Hopkins solo on “Long Way From Texas” to the “fast clusters of bent, cascading notes” played by Otis Rush, Magic Sam and Buddy Guy. Strangely enough I don’t hear those affinities quite so clearly now. What we hear is determined by what we search for. Dogon ancestral shrine (photo Corrie Bevington) Oliver’s main job lay in architecture, specifically vernacular architecture and the symbolic significance of shelter. In other words he was interested in structure and those symbols, rituals and beliefs that “identify, seek or invest meaning” (as he wrote in his introduction to Shelter, Sign & Symbol, published in 1975). This may be why (excepting the example above) he kept himself and his subjective responses to the sound of blues out of his music writing. But he was acutely conscious of the problematic aspects of a white man from Britain writing so extensively about African-American culture and was prescient in 1966, if somewhat mistaken, to think that the music’s future was bleak. The circumstances of his death are unknown to me but presumably he was unaware of the weekend’s violence in Charlottesville and its continuing repercussions. If he had been able to follow these events, I imagine he would have felt profound sympathy with Black Lives Matter, since that was the motivational force that led him to write about African American life through its music, back in 1951 when he was exasperated by the attention given to jazz at the expense of gospel and blues. And knowing of a US president recklessly tweeting threats of fire and fury he might have dreamed himself back at the beginning of his book publishing career, to the violence unleashed upon Freedom Rides, and to the Cuban Missile Crisis, which threatened to kill us all. As Richard Wright said, this may take longer than we think, and so it was the blues falling upon us. Posted in writing sound | Tagged blues, Exotica, J. B. Lenoir, Lightnin' Hopkins, Paul Oliver, Rap Attack, Richard Wright, vernacular architecture | 4 Comments Acetylene snares “Raygun gothic,” William Gibson called it in The Gernsback Continuum, his term for the ‘tomorrow that never was’ and still the most vivid description of a certain style of retro-futurist, space age classicism exemplified by Frank R. Paul’s 1920s artwork for futuristic magazines like Amazing Stories. In 1911 Paul illustrated Hugo Gernsback’s novel – Ralph 124C 41+: A Romance of the Year 2660 – a book whose enticing title is belied by its contents. “Ralph then attached the Telautograph to his Telephot while the girl did the same,” is a typical sentence, making it fair game for the stigma of being “surely the worst SF novel ever published” (according to writer Martin Gardner) though since most of us now spend a considerable slice of our time attaching Telautographs to our Telephots, this seems a little unfair. Yesterday I was attaching bone conduction speakers to snare drum wire – twenty strands of quivering silver steel, like curling hair – resonating the whole set up with a drum bought in Chiang Mai and a bell bought in a Japanese shrine, the reason for the latter being its iron clapper, useful for magnetically attaching the tiny speaker within the bell’s inner cavity. I tried playing old cassettes through this instrument-without-a-body: spirit medium séances of Malay indigenous people, a herd of wildebeests, trance dances of Laos hill tribes imitating the sounds of dog, monkey, goat, sheep and cat, and finally an interview I recorded with my grandfather and uncle in 1979. That gravitation toward a kind of spectral oral history of distorted voices – human/animal/spirit – makes sense to me; the bone conduction elements of this configuration was developed for me last year by David Bloor for an installation, The Body Event II, that played back my conversation with John Latham through objects (books and their pages, representations of books, a howler monkey skull, my late father’s oil can, as in a Vanitas painting), into the space where I recorded it shortly before his death. Syd Senior, my mother’s stepfather, was short and feisty, given to playing the jew’s harp and telling risqué stories after a beer. A talented Sunday painter in watercolours, he worked in the print; when I was a child he walked me around the City of London, took me to see paintings, Hawksmoor churches, the inner sanctums of print works and courts, a Dickensian world. By 1979 the stuffing was knocked out of him. His ruminative, gravel tones reveal a way of speaking now almost extinct, the way a working class north Londoner would say “gorn”, “old whasname” and “most interesting”. “I remember when old Queen Victoria died,” he told me, voice dropping to a whisper. “By god, you daredn’t say anything. They were very patriotic in those days, you know, 1914, all that lark . . . it was a very high class kind of thing. If you was common you wasn’t wanted, know what I mean?” Recently returned from Venezuela where I’d recorded Yanomami shamans, I needed work. There was a chance to do some paid research for Artist Placement Group, for what was known as the Reminiscence Aid Project, placed with the Department of Health and Social Security. Initiated by DHSS architect Mick Kemp, it was developed by an APG team that included Ian Breakwell, Bill Furlong and Hugh Davies; for their input alone it should occupy a significant place in any credible history of sound arts. Shut down in 1979 by the election of Thatcher’s government, which put an end to long-term research in the DHSS, the Reminiscence Aid project was an early practical experiment in what is now called ‘reminiscence work’, a therapeutic tool with internationally proven efficacy in the care of elderly people suffering from dementia, memory loss and other effects of old age. Among other things I tested the Reminiscence Aid Project slide show in care homes and researched smog, the killer pea-souper fogs that blanketed London until the Clean Air Act of 1956 enforced smokeless zones. So we talked about smog, Grandad Syd, Uncle Bob and myself, Bob returning again and again to acetylene lighting, the way its gaseous glow from his bike lamp lit a path through smog as he cycled to work at the Belling-Lee factory every weekday, or the acetylene flares burning holes of visibility from within the toxic murk. Through a now irritating oversight I neglected to ask about listening in smog, how a person might use sound to find their way or how sound was affected by all those soot particulates and was the dirty air of smog different to fog in its acoustic aspect? Nineteenth century physicist John Tyndall investigated the behaviour of sound in fog and found counter-intuitive results. The Duke of Argyll lived close to shipyards in Greenock, on the Firth of Clyde. “Shipbuilding goes on there to a great extent,” he told Tyndall, “and the hammering of the caulkers and builders is a sound which I have been in the habit of hearing with every variety of distinctness, or of not hearing at all, according to the state of the atmosphere; and I have always observed on the days when the air was very clear, and every mast and spar was distinctly seen, hardly any sound was heard; whereas on thick and foggy days, sometimes so thick that nothing could be seen, every clink of every hammer was audible, and appeared sometimes close at hand.” To hear the dead speak through objects, living on borrowed resonance, their voices thinned, abraded and hazed by host materials and the lack of a tangible body is uncanny. The radio of things, it might be called by a raygun gothic enthusiast. Bone conduction was pioneered by Hugo Gernsback, publisher of Modern Electrics, The Electrical Experimenter and Amazing Stories. Nicknamed Hugo the Rat for the way he cheated the science fiction writers published in his innovative magazines, Gernsback filed a patent in 1923 on what he called the Osophone, a hearing aid that transmitted sound vibrations to the osseous tissue of the body. Clearly he had a thing about sound, also inventing a helmet device called The Isolator in 1925, a self-contained, oxygen-fed, deep air diver equivalent of the soundproof rooms constructed by Victorian writers such as the anti-democratic, pro-slavery historian Thomas Carlyle. As an aspirational state, the definition of silence to men like Carlyle was misanthropic: world, shut up! Where the Osophone was a legitimate ancestor to technologies like Google Glass, The Isolator seems more like a bizarre antecedent to John Lilly’s 1960s deprogramming experiments with flotation tanks and LSD. Implicit in all of this is a deeper theme: the tension between humans as isolated or social beings, connected or disconnected, cut off by atmospheric or neurological conditions, deafness or personal experimentation, in the dark or lit by flares, lost to history and death or given revenant vibration by attachment to matter. Posted in instrumentality, writing sound | Tagged bone conduction speakers, David Bloor, David Toop, Hugo Gernsback, John Latham, John Lilly, listening, Osophone, reminiscence work, smog, William Gibson | 2 Comments Posted on July 31, 2017 by davidtoop The late-19th century spiritualist and campaigner Louisa Lowe was unjustly, if legally, incarcerated because her husband claimed she was mad. Giving evidence against her, the proprietor of Brislington asylum – Dr Charles Henry Fox – had this to say: “She writes these revelations on leaves of trees, or any dirty scraps of paper she may casually find, and she liberally distributes them.” There is something immediately familiar about this image of visions and so-called ‘passive writing’ (automatic writing, we might say) inscribed on leaves; maybe we should all be imprisoned for similar madness. As in the cases of spiritually inspired artworks by Hilma af Klint, Georgiana Houghton and Emma Kunz, it raises serious questions about the gender bias of art history and the progenitive nature of a canon that disallows rule breaking anomalies, because they are of the wrong type, have the wrong motivations, come from the wrong place or simply lack a particular style of self-awareness deemed indispensible to modernism. All this is easier (if not straightforward) to dispute when there are extraordinary artworks to contemplate. Louisa Lowe’s leaves and scraps are lost to an ineffable history of fragile and impermanent materials, along with those auditory manifestations of spiritualism that were so important to its efficacy as a spectacle of loss and empowerment. As scholars such as Alex Owen and Anne Braude have argued, spiritualism was a vital channel through which women, their voices otherwise suppressed, could ‘speak’ and establish agency, yet we have no documentation of what a séance sounded like, with its sonorous theatre of knockings and tappings, bells ringing and tambourines rustling in the dark, instruments played with no apparent human intervention and disembodied voices. According to Alex Owen in The Darkened Room, spirit writing would appear spontaneously on blank sheets of paper, “nobody actually witnessing its production but all able to hear the movement of pen on paper.” Georgiana Houghton, Glory Be To God, 5th July 1864 Spiritualism – hearing and transmitting messages from an invisible, largely unknowable spirit world – was a listening practice with a radical proposal: that the field of listening extends beyond what Karen Barad calls (in Meeting the Universe Halfway) “. . . a container model of space and a Euclidean geometric imaginary.” In my experience this sensation of moving through extended listening fields is fairly common during improvised music performance. At Hundred Years Gallery last September, a Sunday afternoon quartet of Douglas Benford, Sylvia Hallett, Billy Steiger and myself, I was experimenting with bone conduction speakers, attaching them to small objects – a rusty cowbell, a small metal container for gramophone needles bought in Porto Alegre, books that have some significance in my long struggle to better understand listening and resonance – in order to amplify voices and archival musics to a level of ghostliness that matched their place in memory. During a duo with Sylvia Hallett in the first half, she and I became aware of unidentifiable sounds, like another music, that was growing from within our soundfield but appearing to come from elsewhere. Neither of us found this surprising. Sylvia often uses a microphone and looping to sample and reconfigure real time playing; I was playing field recordings, interviews with subjects like Ornette Coleman and a cassette tape of Chinese religious processional music that I had copied in the early 1970s from BBC Sound Archive recordings, through my osophonic set-up. The potential for ambiguity was considerable, made more so when I learned that Sylvia’s microphone wasn’t in use. This was mystifying, though not particularly abnormal. In the break, Douglas picked up a phone message to say that his father had been taken ill, though things were not so bad that he should leave immediately. In the second half I played a duo with Billy Steiger. At one point Billy went upstairs into the café. In the basement we could hear his footsteps crossing the ceiling, stomping around, hear his violin faintly, as if from another world. Back downstairs his violin was picked up and distorted by one of my vibration speakers, placed on a small tambourine on the floor to amplify the sound but suddenly acting as a receiver. All of these crossings between instruments, sources, materials, histories and places made it somehow irrelevant to maintain any identification with a sound or its point of origin. In the final quartet I felt the impulse to hold a bone conduction speaker to my skull. The music playing through the speaker came through clearly to me, like an inner voice, though I was aware that nobody else in the room could hear it. Differences between inside/outside, here/there, then/now seemed, not exactly to melt away, but to open up tiny glimpses into a radically changed sense of the world. Calum Storrie, Hundred Years Gallery, 18 September 2016 Later that evening, Douglas sent an email. “Sounds like we were playing when my dad passed away at home,” he wrote. “It was very sudden and painless they think . . . to be honest he went the way he would have wanted.” The following day he sent links to a recording of the music, along with drawings of our various groupings by Calum Storrie, each one made in a continuous line, the drawing instrument not leaving the page until the end of the line. I felt a compulsion to write about this event; so many thoughts and emotions rising out of it. As I wrote to Douglas at the time, seeking his permission: “It’s a gig we will all remember because of the circumstances . . . It’s a question of what recordings can’t absorb or retain, in this case a major life event that escapes the microphone entirely and yet the music sounds more dramatic, less ghostly than it did in the room, so perhaps our memory of the event is somehow imprinted despite the technical impossibility.” As it transpired I was unable to write, maybe because so many other implications were crowding out this more prosaic theme of recording and its limitations. Even now, the raw materials refuse to coalesce, swirling around each other like one of Georgiana Houghton’s spirit drawings. Posted in instrumentality, live sound | Tagged Alex Owen, Billy Steiger, Calum Storrie, David Toop, Douglas Benford, Emma Kunz, Georgiana Houghton, Hilna af Klint, Hundred Years Gallery, improv, music, stream of consciousness, Sylvia Hallett | 1 Comment instrumentality (10) into the maelstrom (17) live sound (13) live talk (2) silent sound (2) star-shaped biscuit (1) writing sound (8)
cc/2019-30/en_middle_0029.json.gz/line3875
__label__wiki
0.682732
0.682732
HEIDI HOLLAND THE MELVILLE HOUSE DINNER WITH MUGABE The untold story of a freedom fighter who became a tyrant Catch more flies with honey Africans leaders – lugging huge chips on their shoulders – crave external validation Hope in their president’s sincerity seems to linger among Zimbabweans. Predatory though Mugabe is know to be, it persist because, without it, such cautious optimism as exists in the country’s fragile unity government would not be sustainable. The hope hovers, mind you, alongside desperation and the ever-present fear that Mugabe is busy swallowing the country’s opposition MDC python-like, just as he did his earlier prey, Joshua Nkomo, many years ago. Everybody knows how unlikely are the chances of Zimbabwe’s dictator becoming a reformed man at 85. What he clearly wants badly enough to play the game, though, is the Western development money that was hitherto proffered on condition of his departure. Only donors can kick-start the beleaguered nation’s economy, in the process keeping Mugabe in office until he dies. It is an awkward situation for Western governments to resolve while struggling with daunting economic dilemmas of their own. Will they support the shakiest of political alliances out of pity for ordinary Zimbabweans at the risk of being outwitted by one of the least popular of the world’s dictators? Probably not. The only way Zimbabwe will get international development dosh with Comrade Bob at the helm is if he succeeds in bamboozling the relevant foreign governments into thinking he is a reformed character. That he has undertaken such an apparently impossible public relations mission says much about Mugabe’s enduring belief in his ability to outsmart absolutely anybody. Ironically, Mugabe’s biggest ally in the campaign to convince hard-nosed Western politicians that he cares all of a sudden for his people in the same way as Morgan Tsvangirai cares for Zimbabweans is none other than the country’s recently appointed prime minister, Tsvangirai himself. During a press conference in Harare last month, Mugabe’s erstwhile enemy responded irritably when a journalist referred to Zimbabwe’s despot simply as Mugabe: “It’s President Mugabe,” Tsvangirai snapped. In an interview with me during the run-up to the power-sharing arrangement, the MDC leader described an hour-and-a-half dinner he had had with Mugabe in a Harare restaurant – when the two were up close and personal for the first time – as “a lost father-son reunion”. At a time when much of the global media was attacking Tsvangirai’s willingness to make peace with the dictator, he added forthrightly: “I actually have to admit that I have some respect for Mugabe, who used to be my hero.” Tsvangirai’s unabashed respect for the much older Mugabe – based on a deeply-held African veneration of the aged, which comes naturally to the well-mannered opposition leader – is one of the unity government’s few strengths amid multiple potential deal-breakers. Continuing land grabs, human rights abuses, harassment and imprisonment of MDC supporters, as well as Mugabe’s fraudulent cabinet appointments, could yet derail the uneasy coalition. It is Tsvangirai’s attitude towards Mugabe that will hold the unity government together. Mugabe will take full political advantage of his prime minister’s respect while also genuinely appreciating it – as is his contradictory wont. And, who knows, Tsvangirai may be wilier in his courtesy than we think. If ever a man craved respect, it is Mugabe. Had British leader Tony Blair sized him up accurately in all his human frailty as well as bluster when the two first started spitting at each other back in the late Nineties, the British leader could have put an arm (metaphorically if not literally) around his African counterpart – who felt humiliated by New Labour’s rejection of old policy – and slipped Mugabe the disputed land redistribution funding promised by an earlier government, possibly sparing Zimbabwe a decade of suffering. Pragmatic reconciliations have been a feature of diplomacy throughout history, after all. Blair’s failure to patch things up with Mugabe before the situation in Zimbabwe became totally toxic probably had a bit to do with the British leader’s intuitive arrogance, something to do with New Labour’s unholy alliance with the right wing British media, and a lot to do with perceived as well as real Western disrespect towards African leaders. Well, hell, no, you might argue: discredited leaders, African or otherwise, forfeit respect. True. But there is little doubt that people like Mugabe, Mbeki and now Jacob Zuma – all of whom have come from a traditional leadership system akin to that of medieval England – become so accustomed to widespread deference, indeed adulation, at home that they simply cannot tolerate the slights of strangers. Add to that formidable narcissistic barrier the inferiority complexes bequeathed to so many in Africa by colonialism and white settler rule and you have a compelling psycho-drama for Western power-brokers (including the media) to fathom – or ignore at the African country’s peril. A few months ago, a US diplomat told me how difficult it had been to engage with South Africa while Mbeki was at the helm because our former president, lugging a sizeable shoulder chip, simply refused to deal with anyone other than the supreme leader of the world’s superpower. “It makes doing international business very difficult,” the American sighed. Similarly, a British government official engaged in public health in South Africa says she felt obliged to bow and scrape to Manto Tshabalala Msimang while nowadays being free to treat Barbara Hogan, who understands Western manners, with normal rather than exaggerated respect. On a day to day basis, it is the independent local media that bears the brunt of our leadership’s intolerance of criticism or, sometimes, of informal journalistic behaviour. You might argue that this sensitivity ought not to be factored into the methods and logic by which power and its abuses are challenged. True. But there are petty humiliations that could be resisted without remotely compromising press freedom. Such an unnecessary taunt, which ran on the front page of a Johannesburg newspaper recently, showed Zuma giving “the bird” to the camera. In fact, he was using his middle finger to push his glasses back onto his nose. Was this an example of amusing photography – or a cheap shot in the circumstances? Rude signs that convey contempt to those with the muscle to react oppressively may not be the way to go in these days of reckless rule. Which reminds me: Zimbabwe’s draconian media laws remain unaltered, not surprisingly. Of all the unity government’s designated reforms, Mugabe can be expected to resist this one the longest. Why? Because journalism’s job is to confront politicians with their failures. Mugabe, having contemplated nothing but his omnipotence for decades, will hardly be keen to encounter an accurate view of himself now. Foreigners sometimes 5 Precious Books about Zimbabwe Mugabe Sagging front gate Copyright © 2018 Pixeldom Lite | Developed by ThemeBounce
cc/2019-30/en_middle_0029.json.gz/line3876
__label__cc
0.7422
0.2578
Tag: decisionstats Download Decisionstats I was picking up some funny activity on my web analytics, so to make it easier for readers, here is the entire Decisionstats wordpress xml file zipped. You can download it, unzip and then read it in any wordpress reader to read at your leisure. decisionstats.wordpress.2012-06-14.xml Updated- There seems to be unusual traffic activity on my poetry blog To make it more convenient for readers , you can download that as a zipped WordPress XML file here- poemsforkush.wordpress.2012-06-14.pdf Author Ajay OhriPosted on June 14, 2012 Categories AnalyticsTags blog, decisionstats, fun, poetry, traffic, web, Wordpress, xmlLeave a comment on Download Decisionstats Software Review- BigML.com – Machine Learning meets the Cloud I had a chance to dekko the new startup BigML https://bigml.com/ and was suitably impressed by the briefing and my own puttering around the site. Here is my review- 1) The website is very intutively designed- You can create a dataset from an uploaded file in one click and you can create a Decision Tree model in one click as well. I wish other cloud computing websites like Google Prediction API make design so intutive and easy to understand. Also unlike Google Prediction API, the models are not black box models, but have a description which can be understood. 2) It includes some well known data sources for people trying it out. They were kind enough to offer 5 invite codes for readers of Decisionstats ( if you want to check it yourself, use the codes below the post, note they are one time only , so the first five get the invites. BigML is still invite only but plan to get into open release soon. 3) Data Sources can only be by uploading files (csv) but they plan to change this hopefully to get data from buckets (s3? or Google?) and from URLs. 4) The one click operation to convert data source into a dataset shows a histogram (distribution) of individual variables.The back end is clojure , because the team explained it made the easiest sense and fit with Java. The good news (?) is you would never see the clojure code at the back end. You can read about it from http://clojure.org/ As cloud computing takes off (someday) I expect clojure popularity to take off as well. Clojure is a dynamic programming language that targets the Java Virtual Machine (and the CLR, and JavaScript). It is designed to be a general-purpose language, combining the approachability and interactive development of a scripting language with an efficient and robust infrastructure for multithreaded programming. Clojure is a compiled language – it compiles directly to JVM bytecode, yet remains completely dynamic. Every feature supported by Clojure is supported at runtime. Clojure provides easy access to the Java frameworks, with optional type hints and type inference, to ensure that calls to Java can avoid reflection. Clojure is a dialect of Lisp 5) As of now decision trees is the only distributed algol, but they expect to roll out other machine learning stuff soon. Hopefully this includes regression (as logit and linear) and k means clustering. The trees are created and pruned in real time which gives a slightly animated (and impressive effect). and yes model building is an one click operation. The real time -live pruning is really impressive and I wonder why /how it can ever be replicated in other software based on desktop, because of the sheer interactive nature. Making the model is just half the work. Creating predictions and scoring the model is what is really the money-earner. It is one click and customization is quite intuitive. It is not quite PMML compliant yet so I hope some Zemanta like functionality can be added so huge amounts of models can be applied to predictions or score data in real time. If you are a developer/data hacker, you should check out this section too- it is quite impressive that the designers of BigML have planned for API access so early. https://bigml.com/developers BigML.io gives you: Secure programmatic access to all your BigML resources. Fully white-box access to your datasets and models. Asynchronous creation of datasets and models. Near real-time predictions. Note: For your convenience, some of the snippets below include your real username and API key. Please keep them secret. BigML.io conforms to the design principles of Representational State Transfer (REST). BigML.io is enterely HTTP-based. BigML.io gives you access to four basic resources: Source, Dataset, Model and Prediction. You cancreate, read, update, and delete resources using the respective standard HTTP methods: POST, GET,PUT and DELETE. All communication with BigML.io is JSON formatted except for source creation. Source creation is handled with a HTTP PUT using the “multipart/form-data” content-type All access to BigML.io must be performed over HTTPS and https://bigml.com/developers/quick_start ( In think an R package which uses JSON ,RCurl would further help in enhancing ease of usage). Summary- Overall a welcome addition to make software in the real of cloud computing and statistical computation/business analytics both easy to use and easy to deploy with fail safe mechanisms built in. Check out https://bigml.com/ for yourself to see. The invite codes are here -one time use only- first five get the invites- so click and try your luck, machine learning on the cloud. If you dont get an invite (or it is already used, just leave your email there and wait a couple of days to get approval) https://bigml.com/accounts/register/?code=E1FE7 https://bigml.com/accounts/register/?code=09991 https://bigml.com/accounts/register/?code=5367D https://bigml.com/accounts/register/?code=76EEF https://bigml.com/accounts/register/?code=742FD Author Ajay OhriPosted on April 23, 2012 Categories AnalyticsTags Analytics, change, cloud, cloud computing, code, Communication, computing, data, datasets, Decision tree, decisionstats, design, easy, email, Google, Histogram, HTTP, java, Java Virtual Machine, JSON, Language, learning, Machine, Machine learning, model, News, open, people, Prediction, prediction API, Programming, Programming language, R, R package, regression, scoring, Scripting, software, source, startup, statistical, Stuff, Time, use, virtual, website, websites, why1 Comment on Software Review- BigML.com – Machine Learning meets the Cloud New Plotters in Rapid Miner 5.2 I almost missed this because of my vacation and traveling Rapid Miner has a tonne of new stuff (Statuary Ethics Declaration- Rapid Miner has been an advertising partner for Decisionstats – see the right margin) http://rapid-i.com/component/option,com_myblog/Itemid,172/lang,en/ Great New Graphical Plotters and some flashy work and a great series of educational lectures A Simple Explanation of Decision Tree Modeling based on Entropies Link: http://www.simafore.com/blog/bid/94454/A-simple-explanation-of-how-entropy-fuels-a-decision-tree-model Description of some of the basics of decision trees. Simple and hardly any math, I like the plots explaining the basic idea of the entropy as splitting criterion (although we actually calculate gain ratio differently than explained…) Logistic Regression for Business Analytics using RapidMiner Link: http://www.simafore.com/blog/bid/57924/Logistic-regression-for-business-analytics-using-RapidMiner-Part-2 Same as above, but this time for modeling with logistic regression. Easy to read and covering all basic ideas together with some examples. If you are not familiar with the topic yet, part 1 (see below) might help. Part 1 (Basics): http://www.simafore.com/blog/bid/57801/Logistic-regression-for-business-analytics-using-RapidMiner-Part-1 Deploy Model: http://www.simafore.com/blog/bid/82024/How-to-deploy-a-logistic-regression-model-using-RapidMiner Advanced Information: http://www.simafore.com/blog/bid/99443/Understand-3-critical-steps-in-developing-logistic-regression-models and lastly a new research project for collaborative data mining http://www.e-lico.eu/ e-LICO Architecture and Components The goal of the e-LICO project is to build a virtual laboratory for interdisciplinary collaborative research in data mining and data-intensive sciences. The proposed e-lab will comprise three layers: the e-science and data mining layers will form a generic research environment that can be adapted to different scientific domains by customizing the application layer. Drag a data set into one of the slots. It will be automatically detected as training data, test data or apply data, depending on whether it has a label or not. Select a goal. The most frequent one is probably “Predictive Modelling”. All goals have comments, so you see what they can be used for. Select “Fetch plans” and wait a bit to get a list of processes that solve your problem. Once the planning completes, select one of the processes (you can see a preview at the right) and run it. Alternatively, select multiple (selecting none means selecting all) and evaluate them on your data in a batch. The assistant strives to generate processes that are compatible with your data. To do so, it performs a lot of clever operations, e.g., it automatically replaces missing values if missing values exist and this is required by the learning algorithm or performs a normalization when using a distance-based learner. You can install the extension directly by using the Rapid-I Marketplace instead of the old update server. Just go to the preferences and enter http://rapidupdate.de:8180/UpdateServer as the update URL Of course Rapid Miner has been of the most professional open source analytics company and they have been doing it for a long time now. I am particularly impressed by the product map (see below) and the graphical user interface. http://rapid-i.com/content/view/186/191/lang,en/ Just click on the products in the overview below in order to get more information about Rapid-I products. Author Ajay OhriPosted on February 16, 2012 Categories AnalyticsTags advertising, algorithm, Analytics, Business, business analytics, data, data mining, Data set, Decision tree, decisionstats, educational, environment, learning, mining, modeling, open, open source, open source analytics, planning, preview, products, rapid miner, rapid-i, regression, research, source, Stuff, Time, training, useR, virtualLeave a comment on New Plotters in Rapid Miner 5.2 Timo Elliott on 2012 Continuing the DecisionStats series on trends for 2012, Timo Elliott , Technology Evangelist at SAP Business Objects, looks at the predictions he made in the beginning of 2011 and follows up with the things that surprised him in 2011, and what he foresees in 2012. You can read last year’s predictions by Mr Elliott at http://www.decisionstats.com/brief-interview-timo-elliott/ Timo- Here are my comments on the “top three analytics trends” predictions I made last year: (1) Analytics, reinvented. New DW techniques make it possible to do sub-second, interactive analytics directly against row-level operational data. Now BI processes and interfaces need to be rethought and redesigned to make best use of this — notably by blurring the distinctions between the “design” and “consumption” phases of BI. I spent most of 2011 talking about this theme at various conferences: how existing BI technology israpidly becoming obsolete and how the changes are akin to the move from film to digital photography. Technology that has been around for many years (in-memory, column stores, datawarehouse appliances, etc.) came together to create exciting new opportunities and even generally-skeptical industry analysts put out press releases such as “Gartner Says Data Warehousing Reaching Its Most Significant Inflection Point Since Its Inception.” Some of the smaller BI vendors had been pushing in-memory analytics for years, but the general market started paying more attention when megavendors like SAP started painting a long-term vision of in-memory becoming a core platform for applications, not just analytics. Database leader Oracle was forced to upgrade their in-memory messaging from “It’s a complete fantasy” to “we have that too”. (2) Corporate and personal BI come together. The ability to mix corporate and personal data for quick, pragmatic analysis is a common business need. The typical solution to the problem — extracting and combining the data into a local data store (either Excel or a departmental data mart) — pleases users, but introduces duplication and extra costs and makes a mockery of information governance. 2011 will see the rise of systems that let individuals and departments load their data into personal spaces in the corporate environment, allowing pragmatic analytic flexibility without compromising security and governance. The number of departmental “data discovery” initiatives continued to rise through 2011, but new tools do make it easier for business people to upload and manipulate their own information while using the corporate standards. 2012 will see more development of “enterprise data discovery” interfaces for casual users. (3) The next generation of business applications. Where are the business applications designed to support what people really do all day, such as implementing this year’s strategy, launching new products, or acquiring another company? 2011 will see the first prototypes of people-focused, flexible, information-centric, and collaborative applications, bringing together the best of business intelligence, “enterprise 2.0”, and existing operational applications. 2011 saw the rise of sophisticated, user-centric mobile applications that combine data from corporate systems with GPS mapping and the ability to “take action”, such as mobile medical analytics for doctors or mobile beauty advisor applications, and collaborative BI started becoming a standard part of enterprise platforms. And one that should happen, but probably won’t: (4) Intelligence = Information + PEOPLE. Successful analytics isn’t about technology — it’s about people, process, and culture. The biggest trend in 2011 should be organizations spending the majority of their efforts on user adoption rather than technical implementation. Unsurprisingly, there was still high demand for presentations on why BI projects fail and how to implement BI competency centers. The new architectures probably resulted in even more emphasis on technology than ever, while business peoples’ expectations skyrocketed, fueled by advances in the consumer world. The result was probably even more dissatisfaction in the past, but the benefits of the new architectures should start becoming clearer during 2012. What surprised me the most: The rapid rise of Hadoop / NoSQL. The potentials of the technology have always been impressive, but I was surprised just how quickly these technology has been used to address real-life business problems (beyond the “big web” vendors where it originated), and how quickly it is becoming part of mainstream enterprise analytic architectures (e.g. Sybase IQ 15.4 includes native MapReduce APIs, Hadoop integration and federation, etc.) Prediction for 2012: As I sat down to gather my thoughts about BI in 2012, I quickly came up with the same long laundry list of BI topics as everybody else: in-memory, mobile, predictive, social, collaborative decision-making, data discovery, real-time, etc. etc. All of these things are clearly important, and where going to continue to see great improvements this year. But I think that the real “next big thing” in BI is what I’m seeing when I talk to customers: they’re using these new opportunities not only to “improve analytics” but also fundamentally rethink some of their key business processes. Instead of analytics being something that is used to monitor and eventually improve a business process, analytics is becoming a more fundamental part of the business process itself. One example is a large telco company that has transformed the way they attract customers. Instead of laboriously creating a range of rate plans, promoting them, and analyzing the results, they now use analytics to automatically create hundreds of more complex, personalized rate plans. They then throw them out into the market, monitor in real time, and quickly cull any that aren’t successful. It’s a way of doing business that would have been inconceivable in the past, and a lot more common in the future. Timo Elliott is a 20-year veteran of SAP BusinessObjects, and has spent the last quarter-century working with customers around the world on information strategy. He works closely with SAP research and innovation centers around the world to evangelize new technology prototypes. His popular Business Analytics blog tracks innovation in analytics and social media, including topics such as augmented corporate reality, collaborative decision-making, and social network analysis. His PowerPoint Twitter Tools lets presenters see and react to tweets in real time, embedded directly within their slides. A popular and engaging speaker, Elliott presents regularly to IT and business audiences at international conferences, on subjects such as why BI projects fail and what to do about it, and the intersection of BI and enterprise 2.0. Prior to Business Objects, Elliott was a computer consultant in Hong Kong and led analytics projects for Shell in New Zealand. He holds a first-class honors degree in Economics with Statistics from Bristol University, England Timo can be contacted via Twitter at https://twitter.com/timoelliott Part 1 of this series was from James Kobielus, Forrestor at http://www.decisionstats.com/jim-kobielus-on-2012/ Author Ajay OhriPosted on January 26, 2012 Categories InterviewsTags analysis, analysts, Analytics, analytics projects, applications, Beauty, bi, Business, Business process, computer, costs, data, Data Warehousing, Database, decisionstats, economics, enterprise, excel, forrestor, HADOOP, Mapreduce, mobile, network, oracle, Organizations, people, personal, presentations, research, SAP, security, Social network, Solution, statistics, technology, timo elliott, Tools, twitter, upload, use, useR, why1 Comment on Timo Elliott on 2012 Interview JJ Allaire Founder, RStudio Here is an interview with JJ Allaire, founder of RStudio. RStudio is the IDE that has overtaken other IDE within the R Community in terms of ease of usage. On the eve of their latest product launch, JJ talks to DecisionStats on RStudio and more. Ajay- So what is new in the latest version of RStudio and how exactly is it useful for people? JJ- The initial release of RStudio as well as the two follow-up releases we did last year were focused on the core elements of using R: editing and running code, getting help, and managing files, history, workspaces, plots, and packages. In the meantime users have also been asking for some bigger features that would improve the overall work-flow of doing analysis with R. In this release (v0.95) we focused on three of these features: Projects. R developers tend to have several (and often dozens) of working contexts associated with different clients, analyses, data sets, etc. RStudio projects make it easy to keep these contexts well separated (with distinct R sessions, working directories, environments, command histories, and active source documents), switch quickly between project contexts, and even work with multiple projects at once (using multiple running versions of RStudio). Version Control. The benefits of using version control for collaboration are well known, but we also believe that solo data analysis can achieve significant productivity gains by using version control (this discussion on Stack Overflow talks about why). In this release we introduced integrated support for the two most popular open-source version control systems: Git and Subversion. This includes changelist management, file diffing, and browsing of project history, all right from within RStudio. Code Navigation. When you look at how programmers work a surprisingly large amount of time is spent simply navigating from one context to another. Modern programming environments for general purpose languages like C++ and Java solve this problem using various forms of code navigation, and in this release we’ve brought these capabilities to R. The two main features here are the ability to type the name of any file or function in your project and go immediately to it; and the ability to navigate to the definition of any function under your cursor (including the definition of functions within packages) using a keystroke (F2) or mouse gesture (Ctrl+Click). Ajay- What’s the product road map for RStudio? When can we expect the IDE to turn into a full fledged GUI? JJ- Linus Torvalds has said that “Linux is evolution, not intelligent design.” RStudio tries to operate on a similar principle—the world of statistical computing is too deep, diverse, and ever-changing for any one person or vendor to map out in advance what is most important. So, our internal process is to ship a new release every few months, listen to what people are doing with the product (and hope to do with it), and then start from scratch again making the improvements that are considered most important. Right now some of the things which seem to be top of mind for users are improved support for authoring and reproducible research, various editor enhancements including code folding, and debugging tools. What you’ll see is us do in a given release is to work on a combination of frequently requested features, smaller improvements to usability and work-flow, bug fixes, and finally architectural changes required to support current or future feature requirements. While we do try to base what we work on as closely as possible on direct user-feedback, we also adhere to some core principles concerning the overall philosophy and direction of the product. So for example the answer to the question about the IDE turning into a full-fledged GUI is: never. We believe that textual representations of computations provide fundamental advantages in transparency, reproducibility, collaboration, and re-usability. We believe that writing code is simply the right way to do complex technical work, so we’ll always look for ways to make coding better, faster, and easier rather than try to eliminate coding altogether. Ajay -Describe your journey in science from a high school student to your present work in R. I noticed you have been very successful in making software products that have been mostly proprietary products or sold to companies. Why did you get into open source products with RStudio? What are your plans for monetizing RStudio further down the line? JJ- In high school and college my principal areas of study were Political Science and Economics. I also had a very strong parallel interest in both computing and quantitative analysis. My first job out of college was as a financial analyst at a government agency. The tools I used in that job were SAS and Excel. I had a dim notion that there must be a better way to marry computation and data analysis than those tools, but of course no concept of what this would look like. From there I went more in the direction of general purpose computing, starting a couple of companies where I worked principally on programming languages and authoring tools for the Web. These companies produced proprietary software, which at the time (between 1995 and 2005) was a workable model because it allowed us to build the revenue required to fund development and to promote and distribute the software to a wider audience. By 2005 it was however becoming clear that proprietary software would ultimately be overtaken by open source software in nearly all domains. The cost of development had shrunken dramatically thanks to both the availability of high-quality open source languages and tools as well as the scale of global collaboration possible on open source projects. The cost of promoting and distributing software had also collapsed thanks to efficiency of both distribution and information diffusion on the Web. When I heard about R and learned more about it, I become very excited and inspired by what the project had accomplished. A group of extremely talented and dedicated users had created the software they needed for their work and then shared the fruits of that work with everyone. R was a platform that everyone could rally around because it worked so well, was extensible in all the right ways, and most importantly was free (as in speech) so users could depend upon it as a long-term foundation for their work. So I started RStudio with the aim of making useful contributions to the R community. We started with building an IDE because it seemed like a first-rate development environment for R that was both powerful and easy to use was an unmet need. Being aware that many other companies had built successful businesses around open-source software, we were also convinced that we could make RStudio available under a free and open-source license (the AGPLv3) while still creating a viable business. At this point RStudio is exclusively focused on creating the best IDE for R that we can. As the core product gets where it needs to be over the next couple of years we’ll then also begin to sell other products and services related to R and RStudio. http://rstudio.org/docs/about JJ Allaire JJ Allaire is a software engineer and entrepreneur who has created a wide variety of products including ColdFusion,Windows Live Writer, Lose It!, and RStudio. From http://en.wikipedia.org/wiki/Joseph_J._Allaire In 1995 Joseph J. (JJ) Allaire co-founded Allaire Corporation with his brother Jeremy Allaire, creating the web development tool ColdFusion.[1] In March 2001, Allaire was sold to Macromedia where ColdFusion was integrated into the Macromedia MX product line. Macromedia was subsequently acquired by Adobe Systems, which continues to develop and market ColdFusion. After the sale of his company, Allaire became frustrated at the difficulty of keeping track of research he was doing using Google. To address this problem, he co-founded Onfolio in 2004 with Adam Berrey, former Allaire co-founder and VP of Marketing at Macromedia. On March 8, 2006, Onfolio was acquired by Microsoft where many of the features of the original product are being incorporated into the Windows Live Toolbar. On August 13, 2006, Microsoft released the public beta of a new desktop blogging client called Windows Live Writer that was created by Allaire’s team at Microsoft. Starting in 2009, Allaire has been developing a web-based interface to the widely used R technical computing environment. A beta version of RStudio was publicly released on February 28, 2011. JJ Allaire received his B.A. from Macalester College (St. Paul, MN) in 1991. RStudio- RStudio is an integrated development environment (IDE) for R which works with the standard version of R available from CRAN. Like R, RStudio is available under a free software license. RStudio is designed to be as straightforward and intuitive as possible to provide a friendly environment for new and experienced R users alike. RStudio is also a company, and they plan to sell services (support, training, consulting, hosting) related to the open-source software they distribute. Author Ajay OhriPosted on January 25, 2012 Categories InterviewsTags adobe, analysis, Analytics, beta, blogging, browsing, code, cold fusion, Collaboration, community, Companies, computing, data, data analysis, decisionstats, distinct, easy, editing, editor, Entrepreneur, environment, forms, founder, Free, free software, Gains, government, GUI, High school, Integrated development environment, interest, interview, java, JJ Allaire, Languages, License, live, marketing, Microsoft, open, open source, parallel, people, Philosophy, products, Programming, R, r users, research, rstats, rstudio, sas, science, software, source, stack overflow, statistical, statistical computing, student, Time, Tools, US, use, version, web, why, windows, Windows Live, Windows Live Writer, work, writing, writing code2 Comments on Interview JJ Allaire Founder, RStudio Interview Rapid-I -Ingo Mierswa and Simon Fischer Here is an interview with Dr Ingo Mierswa , CEO of Rapid -I and Dr Simon Fischer, Head R&D. Rapid-I makes the very popular software Rapid Miner – perhaps one of the earliest leading open source software in business analytics and business intelligence. It is quite easy to use, deploy and with it’s extensions and innovations (including compatibility with R )has continued to grow tremendously through the years. In an extensive interview Ingo and Simon talk about algorithms marketplace, extensions , big data analytics, hadoop, mobile computing and use of the graphical user interface in analytics. Special Thanks to Nadja from Rapid I communication team for helping coordinate this interview.( Statuary Blogging Disclosure- Rapid I is a marketing partner with Decisionstats as per the terms in https://decisionstats.com/privacy-3/) Ajay- Describe your background in science. What are the key lessons that you have learnt while as scientific researcher and what advice would you give to new students today. Ingo: My time as researcher really was a great experience which has influenced me a lot. I have worked at the AI lab of Prof. Dr. Katharina Morik, one of the persons who brought machine learning and data mining to Europe. Katharina always believed in what we are doing, encouraged us and gave us the space for trying out new things. Funnily enough, I never managed to use my own scientific results in any real-life project so far but I consider this as a quite common gap between science and the “real world”. At Rapid-I, however, we are still heavily connected to the scientific world and try to combine the best of both worlds: solving existing problems with leading-edge technologies. Simon: In fact, during my academic career I have not worked in the field of data mining at all. I worked on a field some of my colleagues would probably even consider boring, and that is theoretical computer science. To be precise, my research was in the intersection of game theory and network theory. During that time, I have learnt a lot of exciting things, none of which had any business use. Still, I consider that a very valuable experience. When we at Rapid-I hire people coming to us right after graduating, I don’t care whether they know the latest technology with a fancy three-letter acronym – that will be forgotten more quickly than it came. What matters is the way you approach new problems and challenges. And that is also my recommendation to new students: work on whatever you like, as long as you are passionate about it and it brings you forward. Ajay- How is the Rapid Miner Extensions marketplace moving along. Do you think there is a scope for people to say create algorithms in a platform like R , and then offer that algorithm as an app for sale just like iTunes or Android apps. Simon: Well, of course it is not going to be exactly like iTunes or Android apps are, because of the more business-orientated character. But in fact there is a scope for that, yes. We have talked to several developers, e.g., at our user conference RCOMM, and several people would be interested in such an opportunity. Companies using data mining software need supported software packages, not just something they downloaded from some anonymous server, and that is only possible through a platform like the new Marketplace. Besides that, the marketplace will not only host commercial extensions. It is also meant to be a platform for all the developers that want to publish their extensions to a broader community and make them accessible in a comfortable way. Of course they could just place them on their personal Web pages, but who would find them there? From the Marketplace, they are installable with a single click. Ingo: What I like most about the new Rapid-I Marketplace is the fact that people can now get something back for their efforts. Developing a new algorithm is a lot of work, in some cases even more that developing a nice app for your mobile phone. It is completely accepted that people buy apps from a store for a couple of Dollars and I foresee the same for sharing and selling algorithms instead of apps. Right now, people can already share algorithms and extensions for free, one of the next versions will also support selling of those contributions. Let’s see what’s happening next, maybe we will add the option to sell complete RapidMiner workflows or even some data pools… Ajay- What are the recent features in Rapid Miner that support cloud computing, mobile computing and tablets. How do you think the landscape for Big Data (over 1 Tb ) is changing and how is Rapid Miner adapting to it. Simon: These are areas we are very active in. For instance, we have an In-Database-Mining Extension that allows the user to run their modelling algorithms directly inside the database, without ever loading the data into memory. Using analytic databases like Vectorwise or Infobright, this technology can really boost performance. Our data mining server, RapidAnalytics, already offers functionality to send analysis processes into the cloud. In addition to that, we are currently preparing a research project dealing with data mining in the cloud. A second project is targeted towards the other aspect you mention: the use of mobile devices. This is certainly a growing market, of course not for designing and running analyses, but for inspecting reports and results. But even that is tricky: When you have a large screen you can display fancy and comprehensive interactive dashboards with drill downs and the like. On a mobile device, that does not work, so you must bring your reports and visualizations very much to the point. And this is precisely what data mining can do – and what is hard to do for classical BI. Ingo: Then there is Radoop, which you may have heard of. It uses the Apache Hadoop framework for large-scale distributed computing to execute RapidMiner processes in the cloud. Radoop has been presented at this year’s RCOMM and people are really excited about the combination of RapidMiner with Hadoop and the scalability this brings. Ajay- Describe the Rapid Miner analytics certification program and what steps are you taking to partner with academic universities. Ingo: The Rapid-I Certification Program was created to recognize professional users of RapidMiner or RapidAnalytics. The idea is that certified users have demonstrated a deep understanding of the data analysis software solutions provided by Rapid-I and how they are used in data analysis projects. Taking part in the Rapid-I Certification Program offers a lot of benefits for IT professionals as well as for employers: professionals can demonstrate their skills and employers can make sure that they hire qualified professionals. We started our certification program only about 6 months ago and until now about 100 professionals have been certified so far. Simon: During our annual user conference, the RCOMM, we have plenty of opportunities to talk to people from academia. We’re also present at other conferences, e.g. at ECML/PKDD, and we are sponsoring data mining challenges and grants. We maintain strong ties with several universities all over Europe and the world, which is something that I would not want to miss. We are also cooperating with institutes like the ITB in Dublin during their training programmes, e.g. by giving lectures, etc. Also, we are leading or participating in several national or EU-funded research projects, so we are still close to academia. And we offer an academic discount on all our products 🙂 Ajay- Describe the global efforts in making Rapid Miner a truly international software including spread of developers, clients and employees. Simon: Our clients already are very international. We have a partner network in America, Asia, and Australia, and, while I am responding to these questions, we have a training course in the US. Developers working on the core of RapidMiner and RapidAnalytics, however, are likely to stay in Germany for the foreseeable future. We need specialists for that, and it would be pointless to spread the development team over the globe. That is also owed to the agile philosophy that we are following. Ingo: Simon is right, Rapid-I already is acting on an international level. Rapid-I now has more than 300 customers from 39 countries in the world which is a great result for a young company like ours. We are of course very strong in Germany and also the rest of Europe, but also concentrate on more countries by means of our very successful partner network. Rapid-I continues to build this partner network and to recruit dynamic and knowledgeable partners and in the future. However, extending and acting globally is definitely part of our strategic roadmap. Dr. Ingo Mierswa is working as Chief Executive Officer (CEO) of Rapid-I. He has several years of experience in project management, human resources management, consulting, and leadership including eight years of coordinating and leading the multi-national RapidMiner developer team with about 30 developers and contributors world-wide. He wrote his Phd titled “Non-Convex and Multi-Objective Optimization for Numerical Feature Engineering and Data Mining” at the University of Dortmund under the supervision of Prof. Morik. Dr. Simon Fischer is heading the research & development at Rapid-I. His interests include game theory and networks, the theory of evolutionary algorithms (e.g. on the Ising model), and theoretical and practical aspects of data mining. He wrote his PhD in Aachen where he worked in the project “Design and Analysis of Self-Regulating Protocols for Spectrum Assignment” within the excellence cluster UMIC. Before, he was working on the vtraffic project within the DFG Programme 1126 “Algorithms for large and complex networks”. http://rapid-i.com/content/view/181/190/ tells you more on the various types of Rapid Miner licensing for enterprise, individual and developer versions. (Note from Ajay- to receive an early edition invite to Radoop, click here http://radoop.eu/z1sxe) Author Ajay OhriPosted on August 11, 2011 Categories InterviewsTags academic, Advice, algorithm, algorithms, analysis, Analytics, Android, Android Apps, Anonymous, Apache, apps, Big Data, blogging, Business, business analytics, ceo, Clients, cloud, Communication, community, Companies, computer, computing, conference, dashboards, data, data analysis, data mining, databases, decisionstats, Distributed computing, easy, Extensions, game theory, Graphical user interface, HADOOP, Human, ingo mierswa, interested, interview, Itunes, learning, Machine, Machine learning, marketing, mining, mobile, mobile computing, modelling, network, offers, open, open source, optimization, people, personal, phd, Philosophy, products, Protocols, R, radoop, rapid miner, rapid-i, RapidMiner, research, science, sharing, simon fischer, skills, software, source, space, tablet computing, technology, Time, training, US, use, User interface, web, work, young1 Comment on Interview Rapid-I -Ingo Mierswa and Simon Fischer Predictive Analytics World Here is an announcement from Predictive Analytics World, the worlds largest vendor neutral conference dedicated to Predictive Analytics alone. Decisionstats has been a blog partner of PAWCON since inception. This is cool stuff! Video Testimonials: Reasons to Attend Predictive Analytics World Oct 2011, NY What’s Predictive Analytics World (PAW) all about and why should you go? See and hear experiences from those who have attended PAW. The video recorded at PAW San Francisco 2011 includes statements from Thomas Davenport, conference chair Eric Siegel, and other conference participants and VIPs. Join your peers October 17-21, 2011 at the Hilton New York for Predictive Analytics World, the business event for predictive analytics professionals, managers and commercial practitioners, covering today’s commercial deployment of predictive analytics, across industries and across software vendors. Register using the code REDC before June 15th and 10% of your registration proceeds will be donated to American Red Cross Midwest Tornado Relief Effort. Also, take advantage of Super Early Bird Pricing and realize $400 in savings. Discover new content covering all the latest topics and advanced methods by participating in PAW’s workshops, case studies, and educational sessions. View full agenda and topics online now. PAW NYC agenda highlights include: Keynotes from Tom Davenport, President’s Distinguished Professor, Babson College, Author, Competing on Analytics and Eric Siegel, Conference Program Chair, Predictive Analytics World Special plenary sessions from industry heavyweights, Usama Fayyad, Ph.D., CEO, Open Insights and John F. Elder, CEO and Founder, Elder Research Full day workshops that cover the topics of Decisioning, Core Methods, Net Lift Modeling, Hands-On Intro, Hands-On R, Intro to Predictive Analytics and Intro to Business Analytics Topics covering black box trading, churn modeling, crowdsourcing, demand forecasting, ensemble models, fraud detection, healthcare, insurance applications, law enforcement, litigation, market mix modeling, mobile analytics, online marketing, risk management, social data, supply chain management, targeting direct marketing, uplift modeling (net lift), and other innovative applications that benefit organizations in new and creative ways. Thomas Davenport Author, Competing on Analytics VIP from IBM Research (TBA) Keynote on Jeopardy-Winning Watson and DeepQA Eric Siegel, Ph.D Program Chair, Predictive Analytics World Usama Fayyad, Ph.D CEO, Open Insights John F. Elder IV, Ph.D Chief Scientist, Elder Research, Inc. Become an invaluable resource to your organization by discovering new processes and tactics that your peers are using to optimize with the best methods that leverage data – bringing their business results to the next level. New Financial Services Track — You Asked and We Delivered October’s event will include a new conference track of sessions dedicated to the Financial Services industry. This track will feature something for users of all levels, whether you’re deploying your first initiative or learning new ways to position analytics within your organization. Text analytics. The new conference Text Analytics World, co-located with PAW NYC, complements PAW’s agenda with reasonable cross-registration options. Take advantage of Super Early Bird Pricing and realize $400 in savings before June 15, 2011. Note: Each additional attendee from the same company registered at the same time receives an extra $200 off the Conference Pass. Follow Like Join Live All Analytics Conferences: Predictive Analytics World for Government – Sept 12-13 in DC Predictive Analytics World NYC – Oct 17-21 Text Analytics World NYC – Oct 19-20 Predictive Analytics World San Francisco – March 2012 Predictive Analytics World Videos – Available on-demand Author Ajay OhriPosted on June 9, 2011 Categories AnalyticsTags Analytics, applications, blog, Business, ceo, churn, code, competing on analytics, conference, content, data, decisionstats, educational, event, events, Financial services, government, IBM, ibm research, insurance, learning, mobile, modeling, new york, online, open, Organizations, paw, pawcon, predictiva analytics world, predictive, predictive analytics, predictive analytics world, pricing, research, San Francisco, software, Time, video, videos, why, YorkLeave a comment on Predictive Analytics World
cc/2019-30/en_middle_0029.json.gz/line3883
__label__wiki
0.587131
0.587131
Mouse & Controller Game Review, Mouse & Controller Games That Will Scare The Crap Out Of You May 9, 2016 May 22, 2016 Tariq Bokhari Tariq Bokhari Writer at Mouse and Controller Photo Credit: deviantart.com One of my most favored genres, regardless of medium, is the Horror genre. The first memory with horror that I can recall was with the original “Evil Dead”, It scared the crap out of me and haunted me for months. Later on, I put my big-boy pants on and returned to the genre. I started with movies, shows, books and of course Video Games. My first really Horror game experience was while my older brother playing Resident Evil one on the original Playstation. He wouldn’t let me play that game in particular. So of course that spiked my interest in the game. So one day I sneaked into his room, put on the disk and pushed the Power button. So here are my most favored horror games of all time, with no particular order: After I pushed the power button and the game started, I played for a bit till I got to the first Zombie (Back in the day Zombies were one of the most horrific concepts in the genre). The first Zombie was introduced with perfect presentation. The image is imprinted in my memory to this day. Call of Cthulhu: Dark Corners of the Earth The Cthulhu mythos all in all had a huge impact on me, whether it’s from the macabre atmosphere or its protagonist insane driven narratives. Bethesda captured both themes in Dark Corners of the Earth, taking narrative queues from H.P. Lovecraft’s short story “Shadow over Innsmouth”. It may be considered a demo or a “Playable teaser”, but what Konami had accomplished with this short experience was unlike any other in the genre with its creepy atmosphere, terrifying encounters and difficult puzzles. I’ve always said, with limitation comes innovation, and the developers of Amnesia had difficulties with the adding a robust combat system during the development which resulted in the very innovative enemy AI that defines the game and set it aside from other games in the genre. Eternal Darkness One of the hidden gems of the horror genre was on the GameCube with its mind twisting gameplay elements and Cthulhu mythos narrative setting. Rockstart (The creators of Grand Theft Auto) are well known with their controversial games. And in Manhunt they flip the table on the usual horror game formula by putting you in the shoes of a killer on death row getting a chance to escape execution and killing his way through a city infested of killers. Photo Credit: dextergaming.com Horror in games can be tackled from many aspects, and in Dark Souls FromSoft will make you soil your pants from the atmosphere, the difficulty and the outstanding enemy and level design. Silent Hill has always been a personal favorite series of mine. As much as I enjoyed playing B rated movie renditions like Resident Evil, nothing beats the lingering and uneasy feeling one gets from playing Silent Hill. I believe the reason Silent Hill is a very different and loved series is because the terror is not directly at your face such as the zombies from Resident Evil where there is not much room for fear when you have extinguished that tangible source, but rather with Silent Hill, one has multiple layers on top of each other to ponder and fear for and from the main character. The characters are having inner struggles with themselves and the town reshapes into their worst nightmare which is thought-provoking, subtle and horrific in many ways. The only way silent hill could be a b rated movie is due to the bad dialogue in it. Tags: horrorvideo games Krab Load – A New Street Food Concept Comes to Jeddah A List of Bookstores Around Jeddah Book Review: Ready Player One by Ernest Cline TV Show Review: Jessica Jones Season 1 Ruining Your Life Has Never Been So Much Fun, Adam Ruins Everything Season 1; A quick review Who You Gonna Call? Ghostbusters Sega Genesis Conversations with an Artist Glam Up this Eid With ICONIC Virgin’s July Gadgets 21 Saudi Brands That Have Gone International
cc/2019-30/en_middle_0029.json.gz/line3886
__label__cc
0.513907
0.486093
Did You See That One? Find Movie Reviews By Name Movies Over the Years Best Picture Winners Best Director Winners Best Actor Winners Best Actress Winners Best Supporting Actor Winners Best Supporting Actress Winners Best Story Winners (Discontinued) Best Original Screenplay Winners Best Adapted Screenplay Winners Best Animated Feature Film Winners Best Film Editing Winners Best Cinematography Winners Best Original Score Winners Best Original Song Winners Best Production Design Winners Best Sound Mixing Winners Best Visual Effects Winners Best Costume Design Winners Best Makeup and Hairstyling Winners Film Legends Baseball: Movies About a Great Game Christmas Classics Classic Musical Films Comic Books and Film Film Noir: The American Genre Who’s watching all these movies? My Top Ten Lists The Epic Films of Hollywood Tag: Screenplay March 4, 2012 Comedies / Romance A great movie with a unique look on the idea that the grass is always greener. Stay up to date with the most recent reviews! Find Did You See That One? on Facebook All the posts. All the posts. Select Month July 2019 (1) June 2019 (3) March 2019 (2) February 2019 (3) January 2019 (3) December 2018 (1) November 2018 (2) October 2018 (8) September 2018 (13) August 2018 (17) July 2018 (14) June 2018 (10) May 2018 (9) April 2018 (9) March 2018 (13) February 2018 (26) January 2018 (18) December 2017 (3) November 2017 (3) October 2017 (4) September 2017 (4) August 2017 (3) July 2017 (1) June 2017 (1) May 2017 (1) April 2017 (3) March 2017 (7) February 2017 (17) January 2017 (3) November 2016 (2) October 2016 (2) September 2016 (2) August 2016 (1) July 2016 (6) June 2016 (3) May 2016 (7) April 2016 (4) March 2016 (12) February 2016 (12) January 2016 (9) December 2015 (4) November 2015 (9) October 2015 (13) September 2015 (6) August 2015 (12) July 2015 (12) June 2015 (7) May 2015 (18) April 2015 (12) March 2015 (25) February 2015 (26) January 2015 (33) December 2014 (25) November 2014 (20) October 2014 (16) September 2014 (16) August 2014 (27) July 2014 (23) June 2014 (13) May 2014 (7) April 2014 (12) March 2014 (21) February 2014 (20) January 2014 (19) December 2013 (14) November 2013 (11) October 2013 (12) September 2013 (10) August 2013 (13) July 2013 (9) June 2013 (9) May 2013 (7) April 2013 (9) March 2013 (10) February 2013 (15) January 2013 (14) December 2012 (9) November 2012 (11) October 2012 (12) September 2012 (11) August 2012 (9) July 2012 (12) June 2012 (11) May 2012 (9) April 2012 (13) March 2012 (21) February 2012 (22) January 2012 (29) December 2011 (35) November 2011 (37) October 2011 (23) Get your favorite movies on Blu-ray or DVD here Action Films Animated Films Awards Season Best Actor Winners Best Cinematography Winners Best Director Winners Best Picture Winners Biographical Christmas Films Classic Films Comedies Crime Did you see that one? Documentaries Dramas Epic Family Films Fantasy Film Legends Foreign Films Guilty Pleasures History Horror Jimmy Stewart Music Musicals Mystery Opinion Oscar Nominated Films Polls and Questions Romance Romantic Comedy Science Fiction Sports Films Stars of Today Suspense Movies Thrillers War Movies Westerns Join HBO Free Trial Join Amazon Channels Free Trial Shop Amazon Devices - Save $20 on Fire TV with 4K and Alexa Amazon Channels - CBS All Access
cc/2019-30/en_middle_0029.json.gz/line3892
__label__wiki
0.560846
0.560846
University Libraries Home 4,419 Matching Results Results: 1 - 24 of 4,419 next Sort: Date Created (Newest) Partners 10 Collections 51 Serial/Series Titles 210 World Regions 10 Countries 50 U.S. States 50 Counties 232 Decades 20 Years 191 Months 12 Days 31 Languages 4 Access 2 Departments 3 Type: Book Country: United States Clear All Filters Minding the Helm: An Unlikely Career in the U.S. Coast Guard Description: As a boy growing up in New York City, Kevin P. Gilheany had two dreams: to join the Coast Guard and to play the bagpipes. But by the time he finished high school he was overweight, had a drinking problem, and couldn’t swim. Undeterred by the doubts of the folks at home, he decided to enlist in the Coast Guard anyway. With great determination and some divine intervention, he passed the swim test and graduated from boot camp, thus beginning an eventful and diverse twenty-year career in the 1980s and 1990s Coast Guard. He set a goal for himself to get command of his own patrol boat, and along the way he was involved in capturing drug smugglers, rescuing hundreds of Haitian migrants at sea, recovering Space Shuttle Challenger debris, surviving a “hooligan navy” experience on a Coast Guard workboat, coordinating search and rescue during the famed “Perfect Storm,” and leading armed boardings of ships following the terrorist attacks of 9/11. When he was asked by one of his men, who was dying from brain cancer, to play bagpipes at his retirement ceremony, Kevin started down a new path to have bagpipers officially recognized as part of the Coast Guard. This ultimately led a boy who couldn’t swim to fulfill both of his childhood dreams and leave a lasting legacy by founding the U.S. Coast Guard Pipe Band. Access: This item is restricted to UNT Community Members. Login required if off-campus. Creator: Gilheany, Kevin P. Partner: UNT Libraries A Machine-Gunner in France: The Memoirs of Ward Schrantz, 35th Division, 1917-1919 Description: This is the WWI memoir of Ward Schrantz, a National Guard officer and machine gun company commander in the Kansas-Missouri 35th Division. He extensively documents his experiences and those of his men, from training at Camp Doniphan to their voyage across the Atlantic, and to their time in the trenches in France’s Vosges Mountains and ultimately to their return home. He devotes much of his memoir to the Meuse-Argonne Offensive, in which the 35th Division suffered heavy casualties and made only moderate gains before being replaced by fresh troops. Schrantz also describes the daily life of a soldier, including living conditions, relations between officers and enlisted men, and the horrific experience of combat. Editor Jeffrey Patrick combines his narrative with excerpts from a detailed history of the unit that Schrantz wrote for his local newspaper, and also provides an editor’s introduction and annotations. Creator: Schrantz, Ward L. & Patrick, Jeffrey L. Beyond the Quagmire: New Interpretations of the Vietnam War Description: In Beyond the Quagmire, thirteen scholars from across disciplines provide a series of provocative, important, and timely essays on the politics, combatants, and memory of the Vietnam War. The essays pose new questions, offer new answers, and establish important lines of debate regarding social, political, military, and memory studies. Part 1 contains four chapters by scholars who explore the politics of war in the Vietnam era. In Part 2, five contributors offer chapters on Vietnam combatants with analyses of race, gender, environment, and Chinese intervention. Part 3 provides four innovative and timely essays on Vietnam in history and memory. Creator: Jensen, Geoffrey W. & Stith, Matthew M. Phantom in the Sky: A Marine’s Back Seat View of the Vietnam War Description: Phantom in the Sky is the story of a Radar Intercept Officer (RIO) in the back seat of the supersonic Phantom jet during the Vietnam War—a unique, tactical perspective of the “guy in back,” or GIB, absent from other published aviation accounts. During the time of Terry L. Thorsen’s service from 1966 to 1970, the RIO played an integral part in enemy aircraft interception and ordnance delivery. In Navy and Marine F-4 Phantom jets, the RIO was a second pair of eyes for the pilot, in charge of communications and navigation, and great to have during emergencies. Thorsen endured the tough Platoon Leaders Course at Quantico and barely earned a commission. He underwent aviation and intercept training while suffering airsickness issues—and still earned his wings. Thorsen joined the oldest and most decorated squadron in the Marine Corps, the VMFA-232 Red Devils in southern California, as it prepared for deployment to Vietnam. In combat, Thorsen felt angst when he saw the sky darken around him from anti-aircraft artillery explosions high above the Ho Chi Minh Trail. On his first close air support mission in support of ground troops (the majority of his Marine aviation missions), he witnessed tracers whiz by his canopy. On one harrowing sortie, he and his pilot purposely became the target to save an Army unit battling an enemy just a hundred feet away. On secret missions with secret weapons, they dove at anti-aircraft artillery muzzle flashes and flew as a low as fifty feet off the deck during close air support sorties, "scraping" the napalm off their plane. For one mission a friend survived a crash landing, but a training instructor vanished without a trace. Creator: Thorsen, Terry L. The San Saba Treasure: Legends of Silver Creek Description: In 1868, four treasure hunters from San Marcos, Texas, searched for a lost mine on the San Saba River, near today’s Menard. It was popularized as folklore in J. Frank Dobie’s treasure legend classic Coronado’s Children. One hundred and fifty years later, a descendant of one of those four men set out to discover the history behind the legend. This book recounts that search, from the founding of the ill-fated 1757 mission on the San Saba River up to the last attempt, in 1990, to find the treasure in this particular legend. It describes Jim Bowie, a fake treasure map industry, murder trials, a rattlesnake dancer, fortunes lost, a very long Texas cave, and surprising twists to the story popularized by Dobie. The book will not lead anyone to the legendary ten-thousand pounds of silver, but it will open a treasure trove of Texas history and the unique characters who hunted the fabulous riches. Creator: Lewis, David C. Partner: UNT Press You Shook Me All Campaign Long: Music in the 2016 Presidential Election and Beyond Description: Music has long played a role in American presidential campaigns as a mode of both expressing candidates’ messages and criticizing the opposition. The 2016 campaign was no exception and was a game changer similar to the development of music in the 1840 campaign, when “Tippecanoe and Tyler Too” helped sing William Harrison into the White House. The ten chapters in this collection place music use in 2016 in historical perspective before examining musical messaging, strategy, and parody. The book ultimately explores causality: how do music and musicians affect presidential elections, and how do politicians and campaigns affect music and musicians? The authors explain this interaction from various perspectives, with methodological approaches from several fields, including political science, legal studies, musicology, cultural studies, rhetorical studies, and communications and journalism. These chapters will help the reader understand music in the 2016 election to realize how music will be relevant in 2020 and beyond. Creator: Kasper, Eric T. & Schoening, Benjamin S. Flying with the Fifteenth Air Force: A B-24 Pilot’s Missions from Italy during World War II Description: In 1944 and 1945, Tom Faulkner was a B-24 pilot flying out of San Giovanni airfield in Italy as a member of the 15th Air Force of the U.S. Army Air Forces. Only 19 years old when he completed his 28th and last mission, Tom was one of the youngest bomber pilots to serve in the U.S. Army Air Forces during World War II. Between September 1944 and the end of February 1945, he flew against targets in Hungary, Germany, Italy, Austria, and Yugoslavia. On Tom’s last mission against the marshalling yards at Augsburg, Germany, his plane was severely damaged, and he had to fly to Switzerland where he and his crew were interned. The 15th Air Force generally has been overshadowed by works on the 8th Air Force based in England. Faulkner’s memoir helps fill an important void by providing a first-hand account of a pilot and his crew during the waning months of the war, as well as a description of his experiences before his military service. David L. Snead has edited the memoir and provided annotations and corroboration for the various missions. Creator: Faulkner, Tom & Snead, David L. The Ranger Ideal Volume 2: Texas Rangers in the Hall of Fame, 1874-1930 Description: Established in Waco in 1968, the Texas Ranger Hall of Fame and Museum honors the iconic Texas Rangers, a service that has existed, in one form or another, since 1823. They have become legendary symbols of Texas and the American West. In The Ranger Ideal Volume 2: Texas Rangers in the Hall of Fame, 1874-1930, Darren L. Ivey presents the twelve inductees who served Texas in the latter half of the nineteenth century. Ivey begins with John B. Jones, who directed his Rangers from state troops to professional lawmen; then covers Leander H. McNelly, John B. Armstrong, James B. Gillett, Jesse Lee Hall, George W. Baylor, Bryan Marsh, and Ira Aten—the men who were responsible for some of the Rangers’ most legendary feats. Ivey concludes with James A. Brooks, William J. McDonald, John R. Hughes, and John H. Rogers, the “Four Great Captains” who guided the Texas Rangers into the twentieth century. The Ranger Ideal presents the true stories of these intrepid men who fought to tame a land with gallantry, grit, and guns. Creator: Ivey, Darren L. The Phantom Vietnam War: An F-4 Pilot’s Combat over Laos Description: David R. “Buff” Honodel was a cocky young man with an inflated self-image when he arrived in 1969 at his base in Udorn, Thailand. His war was not in Vietnam; it was a secret one in the skies of a neighboring country almost unknown in America, attacking the Ho Chi Minh Trail that fed soldiers and supplies from North Vietnam into the South. Stateside he learned the art of flying the F-4, but in combat, the bomb-loaded fighter handled differently, targets shot back, and people suffered. Inert training ordnance was replaced by lethal weapons. In the air, a routine day mission turned into an unexpected duel with a deadly adversary. Complacency during a long night mission escorting a gunship almost led to death. A best friend died just before New Year’s. A RF-4 crashed into the base late in Buff’s tour of duty. The reader will experience Buff’s war from the cockpit of a supersonic F-4D Phantom II, doing 5-G pullouts after dropping six 500-pound bombs on trucks hidden beneath triple jungle canopy. These were well defended by a skillful, elusive, determined enemy firing back with 37mm anti-aircraft fire and tracers in the sky. The man who left the States was a naïve, self-centered young pilot. The man who came back 137 missions later was much different. Creator: Honodel, David R. Ben Thompson: Portrait of a Gunfighter Description: Ben Thompson was a remarkable man, and few Texans can claim to have crowded more excitement, danger, drama, and tragedy into their lives than he did. He was an Indian fighter, Texas Ranger, Confederate cavalryman, mercenary for a foreign emperor, hired gun for a railroad, an elected lawman, professional gambler, and the victor of numerous gunfights. As a leading member of the Wild West’s sporting element, Ben Thompson spent most of his life moving in the unsavory underbelly of the West: saloons, dance-houses, billiard halls, bordellos, and gambling dens. During these travels many of the Wild West’s most famous icons—Wyatt Earp, Doc Holliday, Bat Masterson, Wild Bill Hickok, John Wesley Hardin, John Ringo, and Buffalo Bill Cody—became acquainted with Ben Thompson. Some of these men called him a friend; others considered him a deadly enemy. In life and in death no one ever doubted Ben Thompson’s courage; one Texas newspaperman asserted he was “perfectly fearless, a perfect lion in nature when aroused.” This willingness to trust his life to his expertise with a pistol placed Thompson prominently among the western frontier’s most flamboyant breed of men: gunfighters. Creator: Bicknell, Thomas C., & Parsons, Chuck Trump Administration Reform and Reorganization Plan: Discussion of 35 "Government-Wide" Proposals [Memorandum] Description: "This memorandum provides a brief summary and some preliminary analysis of the Donald J. Trump Administration's recent proposals to restructure and reform agencies, programs, and operations in the executive branch. Specifically, the memorandum covers the 32 proposals characterized by the Trump Administration as "Government-wide." The 32 proposals include several sub-proposals, which, when enumerated separately as they are in this memorandum, bring the total to 35. The analysis of each proposal includes, to the extent possible, a discussion of statutes that might be involved in the proposed changes, and whether some changes might be achieved through administrative action" (p. 1). Creator: Hogue, Henry B. & Brass, Clinton T. Partner: UNT Libraries Government Documents Department Old Riot, New Ranger: Captain Jack Dean, Texas Ranger and U.S. Marshal Description: Award-winning author Bob Alexander presents a biography of 20th-century Ranger Captain Jack Dean, who holds the distinction of being one of only five men to serve in both the Officer’s Corps of the Rangers and also as a President-appointed United States Marshal. Jack Dean’s service in Texas Ranger history occurred at a time when the institution was undergoing a philosophical revamping and restructuring, all hastened by America’s Civil Rights Movement, landmark decisions handed down by the United States Supreme Court, zooming advances in forensic technology, and focused efforts designed to diversify and professionalize the Rangers. His job choice caused him to circulate in the duplicitous underworld of dishonesty and criminality where twisted self-interest overrode compliance with societal norms. His biography is packed with true-crime calamities: double murders, single murders, negligent homicides, suicides, jailbreaks, manhunts, armed robberies and home invasions, kidnappings, public corruption, sexual assaults, illicit gambling, car-theft rings, dope smuggling, and arms trafficking. “Bob Alexander personally interviewed Jack Dean, a renowned Texas lawman who wore a badge for forty-three years. These conversations form the core of a well-researched and fascinating account of Lone Star justice from the mid-twentieth century into the new millennium.” —Darren L. Ivey, author of The Ranger Ideal, Volumes 1 and 2. Creator: Alexander, Bob Performance and Accountability Report: Fiscal Year 2018 Description: The Performance and Accountability Report (PAR), an annual agency requirement from the Office of Management and Budget, presents the agency’s program and financial management results, key accomplishments, and new initiatives during FY 2018. Creator: Institute of Museum and Library Services (U.S.) Public Libraries in the United States Survey: Fiscal Year 2015 Description: The Public Libraries in the United States Survey (PLS) examines when, where, and how library services are changing to meet the needs of the public. This FY 2015 PLS summarizes the reported data provided by 98 percent of public libraries and outlets in the United States. War in East Texas: Regulators vs. Moderators Description: From 1840 through 1844 East Texas was wracked by murderous violence between Regulator and Moderator factions. More than thirty men were killed in assassinations, lynchings, ambushes, street fights, and pitched battles. The sheriff of Harrison County was murdered, and so was the founder of Marshall, as well as a former district judge. Senator Robert Potter, a signer of the Texas Declaration of Independence, was slain by Regulators near his Caddo Lake home. Courts ceased to operate and anarchy reigned in Shelby County, Panola District, and Harrison County. Only the personal intervention of President Sam Houston and an invasion of the militia of the Republic of Texas halted the bloodletting. The Regulator-Moderator War was the first and largest of the many blood feuds of Texas. Bill O'Neal includes rosters of names of the Regulator and Moderator factions arranged by the counties in which the individuals were associated, along with a roster of the victims of the war. Creator: O'Neal, Bill The Best American Newspaper Narratives, Volume 5 Description: Anthology of writing by the ten winners of the 2016 Best American Newspaper Narrative Writing Contest at the Mayborn Literary Nonfiction Conference. The pieces are published in order of places awarded: McCoy, “It Was an Accident, Baby” (1st place); Dreier, “A Child’s Scraped Knee” (2nd place); Baker, “The Power of Will” (3rd place), and runners up, Cox, “A Marine’s Conviction”; Goffard, “Framed”; Thompson, “The Long Way Home”; Kleinfield, “Fraying at the Edges”; Kuchment and Thompson, “Seismic Denial”; Caruba, “55 Minutes”; and Wangsness, “In Search of Sanctuary.” Creator: Reaves, Gayle National Digital Infrastructures and Initiatives: A Report on the 2017 National Digital Platform at Three Forum Description: The report provides details on IMLS digital library funding since 2015 and explains three focal areas identified within the digital library infrastructures and initiatives portfolio of the National Leadership Grants for Libraries Program and the Laura Bush 21st Century Librarian Program. Creator: Rudersdorf, Amy; Reynolds, Emily; Sands, Ashley E.; Neal, James & Mayeau, Stephen Positioning Library and Information Science Graduate Programs for 21st Century Practice Description: IMLS convened a meeting in November 2017 to discuss strengthening the formal education component of the Laura Bush 21st Century Librarian Program. The report summarizes issues and themes from that meeting. Creator: Sands, Ashley E.; Toro, Sandra; DeVoe, Teri; Wolff-Eisenberg, Christine & Fuller, Sarah They Called Him Buckskin Frank: The Life and Adventures of Nashville Franklyn Leslie Description: Biographical account of Nashville Franklyn “Buckskin Frank” Leslie, a deadly gunfighter, describing where Leslie came from and how he died. Chapters describe his life in Arizona, including gun fights and people that he killed, his marriages, and other notable events. Index starts on page 233. Creator: DeMattos, Jack & Parsons, Chuck The AEF in Print: An Anthology of American Journalism in World War I Description: The AEF in Print is an anthology that tells the story of U.S. involvement in World War I through newspaper and magazine articles—precisely how the American public experienced the Great War. From April 1917 to November 1918, Americans followed the war in their local newspapers and popular magazines. The book’s chapters are organized chronologically: Mobilization, Arrival in Europe, Learning to Fight, American Firsts, Battles, and the Armistice. Also included are topical chapters, such as At Sea, In the Air, In the Trenches, Wounded Warriors, and Heroes. “Some of these stories are real gems. Irving Cobb’s account of the sinking of the SS Tuscania, for example, is absolutely riveting, and the same can be said of William Shepherd’s description of life aboard US Navy destroyers in the Atlantic, Floyd Gibbons’s narration of his wounding at Belleau Wood, and George Pattullo’s roll-out of the Sergeant York legend.” —Steven Trout, author of On the Battlefield of Memory: The First World War and American Remembrance. “The well-written and evocative articles bring the war to life.” —Jennifer Keene, author of Doughboys, the Great War, and the Remaking of America. Creator: Dubbs, Chris & Kelley, John-Daniel The Goat Songs Description: The poems in James Najarian’s debut collection are by turns tragic and mischievous, always with an exuberant attention to form. Najarian turns his caprine eye to the landscapes and history of Berks Country, Pennsylvania, and to the middle east of his extended Armenian family. These poems examine our bonds to the earth, to animals, to art and to desire. Creator: Najarian, James Captain Jack Helm: A Victim of Texas Reconstruction Violence Description: Biographical account of John Jackson “Jack” Helm, a law man and eventual victim of man-killer John Wesley Hardin. During his lifetime in Reconstruction Texas he served as deputy sheriff, then county sheriff, and finally captain of the notorious Texas State Police, developing a reputation as a violent and ruthless man-hunter. Helm’s aggressive enforcement of his version of “law and order” resulted in a deadly confrontation with two of his enemies in the midst of the Sutton-Taylor Feud. Creator: Parsons, Chuck FCC Record, Volume 33, No. 3, Pages 1749 to 2747, February 12 - March 16, 2018 Description: Biweekly, comprehensive compilation of decisions, reports, public notices, and other documents of the U.S. Federal Communications Commission. Creator: United States. Federal Communications Commission. From Santa Anna to Selena: Notable Mexicanos and Tejanos in Texas History since 1821 Description: Author Harriett Denise Joseph relates biographies of eleven notable Mexicanos and Tejanos, beginning with Santa Anna and the impact his actions had on Texas. She discusses the myriad contributions of Erasmo and Juan Seguín to Texas history, as well as the factors that led a hero of the Texas Revolution (Juan) to be viewed later as a traitor by his fellow Texans. Admired by many but despised by others, folk hero Juan Nepomuceno Cortina is one of the most controversial figures in the history of nineteenth-century South Texas. Preservationist and historian Adina De Zavala fought to save part of the Alamo site and other significant structures. Labor activist Emma Tenayuca’s youth, passion, courage, and sacrifice merit attention for her efforts to help the working class. Joseph reveals the individual and collective accomplishments of a powerhouse couple, bilingual educator Edmundo Mireles and folklorist-author Jovita González. She recognizes the military and personal battles of Medal of Honor recipient Raul “Roy” Benavidez. Irma Rangel, the first Latina to serve in the Texas House of Representatives, is known for the many “firsts” she achieved during her lifetime. Finally, we read about Selena’s life and career, as well as her tragic death and her continuing marketability. Creator: Joseph, Harriett Denise Partners 10 Serial/Series Titles 210 World Regions 10 U.S. States 50 Counties 232 Years 191 Departments 3 A gateway to rare, historical, and primary source materials from or about Texas. Research @ The UNT Libraries Links and search tools for all of the collections and resources available from UNT. Updated: Wednesday, Jul 17, 2019 Filter: Partners This dialog allows you to filter your current search. Each of the Partners listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Sort Partners UNT Libraries 220 220 UNT Libraries Special Collections 204 204 UNT College of Arts and Sciences 4 4 UNT Libraries Government Documents Department 3,036 3036 UNT Institute of Applied Sciences 7 7 UNT Music Library 181 181 UNT Oral History Program 452 452 UNT Press 282 282 UNT Libraries Rare Book and Texana Collections 7 7 University of North Texas 26 26 Filter: Collections This dialog allows you to filter your current search. Each of the Collections listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of Collections? Start typing and we'll update the list to show only those items that match your needs. Sort Collections Annals of Congress 42 42 Government Documents A to Z Digitization Project 4 4 Defense Base Closure and Realignment Commission 1,657 1657 Clark Family Photography Collection 4 4 Congressional Globe 111 111 College of Music Program Books 164 164 Congressional Record 50 50 Congressional Research Service Reports 1 1 The Civil War and its Aftermath: Diverse Perspectives 42 42 Register of Debates 29 29 Dennis Vercher Collection (The Dallas Way) 4 4 End of Term Publications 7 7 Environmental Policy Collection 10 10 Federal Communications Commission Record 837 837 CyberCemetery Extracted Publications 2 2 KXAS-NBC 5 News Collection 83 83 Leon Breeden Collection 17 17 LGBT Collections 7 7 Resource Center LGBT Collection of the UNT Libraries 1 1 Miniature Book Collection 5 5 William H. "Bill" Nelson, Jr. and Jean Nelson Collection (The Dallas Way) 2 2 9/11 Commission Records 1 1 Newspaper Resources 80 80 Broadening Access to Books on Texas and Oklahoma 63 63 Office of Scientific & Technical Information Technical Reports 8 8 Texas Folklore Society Publications 129 129 Texas History Collection 1 1 Texas Oral History Collection 281 281 Technical Report Archive and Image Library 4 4 Texas Society Sons of the American Revolution (TXSSAR) 8 8 Texas State Publications 2 2 University of North Texas Archives 5 5 UNT Catalogs 70 70 Aquiline Books 5 5 General Collection 75 75 University of North Texas Government Documents Department 2 2 Government Documents General Collection 70 70 UNT Libraries Publications 1 1 UNT Oral Histories 477 477 University of North Texas Press 166 166 Rare Book and Texana Collections 1 1 University Records 54 54 UNT Scholarly Works 12 12 USDA Farmers' Bulletins 3 3 United States Experiment Station Record 102 102 United States Experiment Station Reports 54 54 United States Reports 51 51 Weaver Collection of Children's Books 1 1 Women's Lives in the Southwest 24 24 World War One Collection 3 3 World War Two Collection 50 50 This dialog allows you to filter your current search. Each of the Serial/Series Titles listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of Serial/Series Titles? Start typing and we'll update the list to show only those items that match your needs. Try limiting with other filters first or use this comprehensive list of titles as an alternative starting point. Sort Serial/Series Titles 2005 BRAC Commission 1,657 1657 FCC Record 833 833 Publications of the Texas Folklore Society 134 134 Congressional Globe 111 111 Experiment Station Record 102 102 NBC Logbooks 83 83 United States Reports 51 51 Congressional Record 50 50 Catalog of the University of North Texas 46 46 Annual Reports of the Department of Agriculture 45 45 United States Forest Service Annual Report 45 45 N. W. Ayer & Son's American Newspaper Annual 43 43 The Debates and Proceedings in the Congress of the United States 42 42 [Cooke county records, 1857-1950] 37 37 106th Congress 33 33 Register of Debates in Congress 29 29 University of North Texas Budget 26 26 N. W. Ayer & Son's American Newspaper Annual and Directory 25 25 Catalog of North Texas State University 23 23 North Texas State University Budget 19 19 107th Congress 17 17 National Museum of the Pacific War 15 15 42nd Congress 12 12 41st Congress 11 11 24th Congress 10 10 40th Congress 10 10 A.C. Greene series 10 10 Frances B. Vick series 10 10 Business Archives Project 9 9 Geo. P. Rowell and Co.'s American Newspaper Directory 9 9 39th Congress 8 8 23rd Congress 7 7 37th Congress 7 7 North Texas Crime and Criminal Justice Series 7 7 War and the Southwest Series 7 7 32nd Congress 6 6 33rd Congress 6 6 34th Congress 6 6 35th Congress 6 6 36th Congress 6 6 38th Congress 6 6 Fiscal Year 2012 6 6 22nd Congress 5 5 25th Congress 5 5 31st Congress 5 5 Fiscal Year 2010 5 5 Mayborn best American newspaper narrative series 5 5 University of North Texas Requests for Legislative Appropriations 5 5 15th Congress 4 4 27th Congress 4 4 Al Filo: Mexican American Studies series 4 4 Effects of Entrainment by the Indian Point Power Plant on Biota in the Hudson River Estuary 4 4 Fiscal Year 2009 4 4 Fiscal Year 2011 4 4 Fiscal Year 2013 4 4 Hudson River Ecosystem Studies 4 4 North Texas Lives of Musicians series 4 4 Savage Frontier: Rangers, Riflemen, and Indian Wars in Texas 4 4 Vassar Miller Prize in Poetry series 4 4 10th Congress 3 3 11th Congress 3 3 12th Congress 3 3 13th Congress 3 3 16th Congress 3 3 17th Congress 3 3 18th Congress 3 3 19th Congress 3 3 20th Congress 3 3 21st Congress 3 3 29th Congress 3 3 30th Congress 3 3 5th Congress 3 3 Admiral Nimitz Museum 3 3 American military studies 3 3 Caltex Oral History Project 3 3 Farmers' bulletin (United States. Dept. of Agriculture) 3 3 Fiscal Year 1977 3 3 Fiscal Year 1978 3 3 Fiscal Year 1979 3 3 Fiscal Year 1980 3 3 Fiscal Year 2004 3 3 Fiscal Year 2014 3 3 Mayborn Literary Nonfiction Series 3 3 North Texas Military Biography and Memoir Series 3 3 Temple Big Thicket series 3 3 University of North Texas System Budget 3 3 14th Congress 2 2 1st Congress 2 2 26th Congress 2 2 28th Congress 2 2 4th Congress 2 2 58th Congress 2 2 7th Congress 2 2 82nd Legislature of Texas 2 2 83rd Legislature of Texas 2 2 8th Congress 2 2 9th Congress 2 2 Bulletin (United States. Office of Education) 2 2 Charles B. Moore Family papers, 1832-1917 2 2 Document / 58th Congress, 2d session, House 2 2 Evelyn Oppenheimer series 2 2 Fiscal Year 1964 2 2 Fiscal Year 1965 2 2 Fiscal Year 1969 2 2 Fiscal Year 1971 2 2 Fiscal Year 1973 2 2 Fiscal Year 1974 2 2 Fiscal Year 1976 2 2 Fiscal Year 1999 2 2 Fiscal Year 2001 2 2 Fiscal Year 2015 2 2 Hamilton K. Redway Family papers, 1825-1916 2 2 Strother Collection 2 2 Technical paper (United States. Bureau of Mines) 2 2 Texas local series 2 2 USARC Staff Ride Briefing Book Series 2 2 2nd Congress 1 1 3rd Congress 1 1 55th Congress 1 1 6th Congress 1 1 81st Legislature of Texas 1 1 A.C. Greene series; 20 1 1 AEC research and development report 1 1 Agrostology [publication] (United States. Division of Agrostology) 1 1 Atomic Energy Commission Reports 1 1 Basic field manual 1 1 Biological services program FWS/OBS 1 1 CRS Memoranda 1 1 Catalog of Texas College of Osteopathic Medicine 1 1 Denton County Historical Commission 1 1 Document / 55th Congress, 2d session, Senate 1 1 Fiscal Year 1932 1 1 Fiscal Year 1933 1 1 Fiscal Year 1934 1 1 Fiscal Year 1935 1 1 Fiscal Year 1936 1 1 Fiscal Year 1937 1 1 Fiscal Year 1938 1 1 Fiscal Year 1939 1 1 Fiscal Year 1940 1 1 Fiscal Year 1941 1 1 Fiscal Year 1942 1 1 Fiscal Year 1943 1 1 Fiscal Year 1944 1 1 Fiscal Year 1945 1 1 Fiscal Year 1946 1 1 Fiscal Year 1947 1 1 Fiscal Year 1948 1 1 Fiscal Year 1949 1 1 Fiscal Year 1950 1 1 Fiscal Year 1951 1 1 Fiscal Year 1952 1 1 Fiscal Year 1953 1 1 Fiscal Year 1955 1 1 Fiscal Year 1956 1 1 Fiscal Year 1957 1 1 Fiscal Year 1958 1 1 Fiscal Year 1959 1 1 Fiscal Year 1960 1 1 Fiscal Year 1961 1 1 Fiscal Year 1962 1 1 Fiscal Year 1963 1 1 Fiscal Year 1967 1 1 Fiscal Year 1968 1 1 Fiscal Year 1970 1 1 Fiscal Year 1972 1 1 Fiscal Year 1975 1 1 Fiscal Year 1981 1 1 Fiscal Year 1982 1 1 Fiscal Year 1983 1 1 Fiscal Year 1984 1 1 Fiscal Year 1986 1 1 Fiscal Year 1987 1 1 Fiscal Year 1988 1 1 Fiscal Year 1989 1 1 Fiscal Year 1990 1 1 Fiscal Year 1991 1 1 Fiscal Year 1992 1 1 Fiscal Year 1993 1 1 Fiscal Year 1994 1 1 Fiscal Year 2005 1 1 Fiscal Year 2006 1 1 Fiscal Year 2007 1 1 Fiscal Year 2008 1 1 Frances B. Vick Series; no. 17 1 1 Gay Motocross, 1994 1 1 HIV comprehensive service plan, 1994-11 1 1 Katherine Anne Porter Prize in Short Fiction series 1 1 Lesbian/Gay Political Coalition of Dallas (LGPC), 1988-1989 1 1 March on Austin, 1989 1 1 McGee Creek Archaeological Project Reports 1 1 Motor Vehicle Traffic Accidents 1 1 North Texas Military Biography and Memoir Series ; no. 13 1 1 North Texas Military Biography and Memoir Series; no. 12 1 1 North Texas Military Biography and Memoir Series; no. 16 1 1 North Texas military biography and memoir series; no. 14 1 1 North Texas military biography and memoir series; no. 15 1 1 Philosophy and Ecology 1 1 Senate document (United States. Congress. Senate) 1 1 Series K--Pumping water 1 1 Series O--Underground waters 1 1 Southwestern Nature Writing series 1 1 TID 1 1 Texas Folklore Society Extra Book ; no. 26 1 1 The Diaries of John Gregory Bourke 1 1 The Elizabeth Simpson Cooper Memoirs, 1931-1932 1 1 U.S. Bureau of Education. Special report on public libraries--pt. II 1 1 United States Fish and Wildlife Service Reports 1 1 United States Marine Fisheries Service Strategic Plan 1 1 University of Texas bulletin 1 1 Filter: World Regions This dialog allows you to filter your current search. Each of the World Regions listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Sort World Regions North America 4,419 4419 Central America and Caribbean 194 194 East & Southeast Asia 96 96 Australia/Oceania 45 45 Europe 33 33 South Asia 10 10 Middle East 8 8 South America 8 8 Africa 7 7 Central Asia 7 7 Filter: Countries This dialog allows you to filter your current search. Each of the Countries listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of Countries? Start typing and we'll update the list to show only those items that match your needs. Sort Countries Algeria 1 1 Argentina 1 1 Australia 10 10 Austria 1 1 Bahrain 1 1 Belgium 1 1 Brazil 1 1 Canada 96 96 China 8 8 Colombia 5 5 Cuba 50 50 Egypt 3 3 Fiji 1 1 France 10 10 Germany 10 10 Greece 1 1 Guam 28 28 Hong Kong 2 2 Hungary 1 1 India 10 10 Indonesia 10 10 Iran 3 3 Iraq 3 3 Italy 6 6 Japan 36 36 Kiribati 1 1 Kuwait 3 3 Malaysia 1 1 Mexico 92 92 Morocco 2 2 New Caledonia 1 1 Northern Mariana Islands 3 3 Panama 1 1 Papua New Guinea 9 9 Peru 2 2 Philippines 35 35 Puerto Rico 146 146 Russia 7 7 Saudi Arabia 1 1 Singapore 6 6 Solomon Islands 5 5 South Korea 6 6 Spain 5 5 Switzerland 1 1 Taiwan 2 2 Tanzania 2 2 Thailand 6 6 Tunisia 3 3 United Kingdom 1 1 Vietnam 18 18 Filter: U.S. States This dialog allows you to filter your current search. Each of the U.S. States listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of U.S. States? Start typing and we'll update the list to show only those items that match your needs. Sort U.S. States Alabama 74 74 Alaska 10 10 Arizona 20 20 Arkansas 25 25 California 126 126 Colorado 19 19 Connecticut 20 20 Delaware 10 10 Florida 38 38 Georgia 76 76 Hawaii 45 45 Idaho 15 15 Illinois 22 22 Indiana 23 23 Iowa 17 17 Kansas 25 25 Kentucky 33 33 Louisiana 54 54 Maine 20 20 Maryland 32 32 Massachusetts 11 11 Michigan 26 26 Minnesota 16 16 Mississippi 27 27 Missouri 22 22 Montana 12 12 Nebraska 11 11 Nevada 25 25 New Hampshire 8 8 New Jersey 23 23 New Mexico 49 49 New York 63 63 North Carolina 40 40 North Dakota 16 16 Ohio 43 43 Oklahoma 43 43 Oregon 20 20 Pennsylvania 34 34 Rhode Island 11 11 South Carolina 17 17 South Dakota 5 5 Tennessee 25 25 Texas 1,281 1281 Utah 12 12 Vermont 2 2 Virginia 93 93 Washington 27 27 West Virginia 10 10 Wisconsin 12 12 Wyoming 2 2 Filter: Counties This dialog allows you to filter your current search. Each of the Counties listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of Counties? Start typing and we'll update the list to show only those items that match your needs. Sort Counties Aleutians West Census Area, AK 1 1 Allegany County, MD 1 1 Allegheny County, PA 1 1 Anderson County, TX 1 1 Angelina County, TX 4 4 Aransas County, TX 1 1 Atascosa County, TX 2 2 Atlantic County, NJ 1 1 Bandera County, TX 2 2 Bastrop County, TX 1 1 Beaver County, PA 1 1 Beckham County, OK 1 1 Bell County, TX 7 7 Bergen County, NJ 1 1 Berkshire County, MA 1 1 Bexar County, TX 64 64 Blanco County, TX 2 2 Bosque County, TX 6 6 Bowie County, TX 3 3 Brazoria County, TX 4 4 Brazos County, TX 4 4 Brewster County, TX 4 4 Brooks County, TX 4 4 Brown County, TX 1 1 Burnet County, TX 1 1 Caldwell County, TX 2 2 Callahan County, TX 2 2 Cameron County, TX 4 4 Campbell County, KY 1 1 Carroll County, IL 1 1 Cascade County, MT 1 1 Cass County, TX 2 2 Charles Mix County, SD 1 1 Cherokee County, TX 4 4 Chester County, PA 1 1 Christian County, KY 3 3 Claiborne County, TN 1 1 Collin County, TX 11 11 Collingsworth County, TX 1 1 Comal County, TX 3 3 Cook County, IL 2 2 Cooke County, TX 45 45 Coryell County, TX 4 4 Cottle County, TX 4 4 Craven County, NC 1 1 Crosby County, TX 8 8 Dallas County, TX 73 73 DeWitt County, TX 2 2 Denton County, TX 419 419 Denver County, CO 3 3 Dickens County, TX 2 2 Dimmit County, TX 2 2 Duval County, TX 6 6 Eastland County, TX 5 5 Ector County, TX 2 2 Eddy County, NM 1 1 El Paso County, CO 1 1 El Paso County, TX 62 62 Ellis County, TX 4 4 Erath County, TX 2 2 Erie County, NY 1 1 Escambia County, FL 1 1 Falls County, TX 2 2 Fannin County, TX 1 1 Fayette County, TX 2 2 Fisher County, TX 4 4 Floyd County, GA 1 1 Franklin County, TX 2 2 Frederick County, MD 1 1 Freestone County, TX 4 4 Frio County, TX 8 8 Gallia County, OH 1 1 Galveston County, TX 21 21 Gillespie County, TX 8 8 Goliad County, TX 2 2 Grayson County, TX 10 10 Greene County, MO 1 1 Gregg County, TX 6 6 Grimes County, TX 8 8 Guadalupe County, TX 4 4 Hamilton County, TX 2 2 Hampden County, MA 1 1 Hampshire County, MA 1 1 Hardeman County, TX 4 4 Hardin County, TX 2 2 Harris County, TX 25 25 Harrison County, TX 2 2 Hartford County, CT 1 1 Haskell County, TX 1 1 Hays County, TX 5 5 Henderson County, TX 1 1 Hennepin County, MN 1 1 Henrico County, VA 1 1 Hidalgo County, TX 2 2 Hillsborough County, FL 1 1 Hood County, TX 2 2 Houston County, TX 6 6 Howard County, TX 2 2 Hunt County, TX 4 4 Imperial County, CA 1 1 Ingham County, MI 1 1 Iredell County, NC 1 1 Izard County, AR 1 1 Jack County, TX 2 2 Jackson County, IA 1 1 Jackson County, TX 2 2 Jeff Davis County, TX 2 2 Jefferson County, TX 7 7 Jim Hogg County, TX 2 2 Jim Wells County, TX 2 2 Johnson County, TX 2 2 Jones County, TX 4 4 Kanawha County, WV 1 1 Karnes County, TX 4 4 Kauai County, HI 1 1 Kaufman County, TX 3 3 Kendall County, TX 4 4 Kerr County, TX 5 5 Kimble County, TX 2 2 King County, TX 2 2 King County, WA 2 2 Kings County, NY 1 1 Kinney County, TX 1 1 Kitsap County, WA 1 1 Knox County, TN 2 2 La Salle County, TX 8 8 Labette County, KS 1 1 Lackawanna County, PA 1 1 Lake County, OH 1 1 Lamar County, TX 2 2 Lampasas County, TX 1 1 Lancaster County, NE 1 1 Lancaster County, PA 1 1 Larimer County, CO 1 1 Limestone County, TX 2 2 Litchfield County, CT 1 1 Live Oak County, TX 20 20 Llano County, TX 12 12 Los Angeles County, CA 2 2 Lubbock County, TX 7 7 Macomb County, MI 1 1 Madison County, TX 4 4 Marion County, TX 3 3 Matagorda County, TX 3 3 Maverick County, TX 2 2 McLennan County, TX 5 5 McMullen County, TX 4 4 Medina County, TX 2 2 Menard County, TX 2 2 Mesa County, CO 1 1 Middlesex County, MA 1 1 Milam County, TX 2 2 Miller County, AR 1 1 Mills County, TX 6 6 Minnehaha County, SD 1 1 Monmouth County, NJ 1 1 Monroe County, NY 1 1 Montague County, TX 5 5 Montgomery County, AL 1 1 Montgomery County, KS 1 1 Montgomery County, TX 4 4 Nacogdoches County, TX 29 29 Natrona County, WY 1 1 Navarro County, TX 2 2 Newport County, RI 2 2 Newton County, TX 2 2 Nolan County, TX 5 5 Norfolk County, MA 1 1 Nueces County, TX 36 36 Orleans Parish, LA 1 1 Osage County, OK 1 1 Palo Pinto County, TX 2 2 Panola County, TX 3 3 Parker County, TX 13 13 Pecos County, TX 2 2 Polk County, FL 1 1 Polk County, TX 6 6 Pottawatomie County, OK 1 1 Potter County, TX 2 2 Presidio County, TX 4 4 Prince William County, VA 3 3 Red River County, TX 2 2 Reeves County, TX 2 2 Robertson County, TX 3 3 Rockingham County, VA 1 1 Rockland County, NY 1 1 Rockwall County, TX 2 2 Rusk County, TX 2 2 Rutherford County, NC 1 1 Rutland County, VT 1 1 Sabine County, TX 2 2 San Diego County, CA 9 9 San Jacinto County, TX 2 2 San Patricio County, TX 5 5 Scurry County, TX 7 7 Shelby County, KY 1 1 Shelby County, TN 1 1 Shelby County, TX 6 6 Sherman County, TX 2 2 Silver Bow County, MT 1 1 Smith County, TX 2 2 Somervell County, TX 3 3 Stanislaus County, CA 2 2 Starr County, TX 6 6 Summit County, OH 1 1 Tarrant County, TX 120 120 Taylor County, TX 7 7 Throckmorton County, TX 2 2 Tolland County, CT 1 1 Tom Green County, TX 2 2 Travis County, TX 52 52 Tyler County, TX 2 2 Union County, PA 1 1 Uvalde County, TX 7 7 Victoria County, TX 1 1 Walker County, TX 3 3 Washington County, OK 1 1 Washington County, TX 7 7 Washtenaw County, MI 1 1 Wayne County, MI 1 1 Webb County, TX 11 11 Westmoreland County, PA 1 1 Wheeler County, TX 8 8 Wichita County, TX 9 9 Williamson County, TX 3 3 Wise County, TX 5 5 Worcester County, MA 1 1 Yellow Medicine County, MN 1 1 York County, VA 1 1 Young County, TX 3 3 Zapata County, TX 4 4 Zavala County, TX 5 5 This dialog allows you to filter your current search. Each of the Decades listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of Decades? Start typing and we'll update the list to show only those items that match your needs. Sort Decades 2010-2019 452 452 2000-2009 2,271 2271 1990-1999 513 513 1980-1989 269 269 1970-1979 234 234 1960-1969 89 89 1950-1959 49 49 1940-1949 50 50 1930-1939 59 59 1920-1929 45 45 1910-1919 59 59 1900-1909 48 48 1890-1899 35 35 1880-1889 23 23 1870-1879 40 40 1860-1869 45 45 1850-1859 70 70 1840-1849 19 19 1830-1839 33 33 1820-1829 6 6 This dialog allows you to filter your current search. Each of the Years listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs. Sort Years 1825 1 1 1826 2 2 1828 2 2 1829 1 1 1830 3 3 1831 1 1 1833 5 5 1834 6 6 1835 3 3 1836 7 7 1837 6 6 1838 1 1 1839 1 1 1840 1 1 1841 5 5 1842 2 2 1843 1 1 1844 2 2 1846 2 2 1847 1 1 1848 2 2 1849 3 3 1850 4 4 1851 7 7 1852 10 10 1853 9 9 1854 11 11 1855 12 12 1856 6 6 1857 4 4 1858 5 5 1859 2 2 1860 4 4 1861 4 4 1862 4 4 1863 3 3 1864 5 5 1865 4 4 1866 6 6 1867 4 4 1868 6 6 1869 5 5 1870 8 8 1871 7 7 1872 8 8 1873 6 6 1874 2 2 1875 1 1 1876 4 4 1877 1 1 1878 2 2 1879 1 1 1880 2 2 1881 1 1 1882 1 1 1883 1 1 1884 2 2 1885 6 6 1886 5 5 1887 2 2 1888 1 1 1889 2 2 1890 3 3 1891 1 1 1892 3 3 1893 6 6 1895 3 3 1896 3 3 1897 6 6 1898 3 3 1899 7 7 1900 5 5 1901 3 3 1902 4 4 1903 7 7 1904 5 5 1905 7 7 1906 4 4 1907 4 4 1908 5 5 1909 4 4 1910 5 5 1911 6 6 1912 6 6 1913 7 7 1914 5 5 1915 6 6 1916 6 6 1917 7 7 1918 6 6 1919 5 5 1920 6 6 1921 5 5 1922 5 5 1923 4 4 1924 3 3 1925 5 5 1926 5 5 1927 5 5 1928 4 4 1929 3 3 1930 6 6 1931 6 6 1932 6 6 1933 6 6 1934 3 3 1935 6 6 1936 6 6 1937 8 8 1938 5 5 1939 7 7 1940 6 6 1941 8 8 1942 4 4 1943 5 5 1944 5 5 1945 4 4 1946 3 3 1947 6 6 1948 4 4 1949 5 5 1950 8 8 1951 9 9 1952 4 4 1953 6 6 1954 2 2 1955 3 3 1956 3 3 1957 4 4 1958 5 5 1959 5 5 1960 4 4 1961 4 4 1962 6 6 1963 4 4 1964 3 3 1965 8 8 1966 10 10 1967 9 9 1968 21 21 1969 20 20 1970 23 23 1971 20 20 1972 15 15 1973 16 16 1974 38 38 1975 14 14 1976 31 31 1977 27 27 1978 33 33 1979 17 17 1980 25 25 1981 9 9 1982 27 27 1983 19 19 1984 27 27 1985 14 14 1986 22 22 1987 48 48 1988 42 42 1989 36 36 1990 38 38 1991 39 39 1992 42 42 1993 39 39 1994 43 43 1995 48 48 1996 60 60 1997 62 62 1998 59 59 1999 83 83 2000 86 86 2001 76 76 2002 66 66 2003 72 72 2004 66 66 2005 1,674 1674 2006 80 80 2007 52 52 2008 45 45 2009 54 54 2010 49 49 2011 51 51 2012 47 47 2013 45 45 2014 36 36 2015 44 44 2016 43 43 2017 109 109 2018 24 24 2019 4 4 This dialog allows you to filter your current search. Each of the Months listed note their name and the number of records that will be limited down to if you choose that option. The list can be sorted by name or the count. Sort Months January 150 150 February 122 122 March 147 147 April 134 134 May 521 521 June 912 912 July 404 404 August 235 235 September 260 260 October 196 196 November 141 141 December 137 137 1st 115 115 2nd 159 159 3rd 74 74 4th 128 128 5th 115 115 6th 75 75 7th 61 61 8th 47 47 9th 40 40 10th 251 251 11th 29 29 12th 29 29 13th 45 45 14th 67 67 15th 105 105 16th 41 41 17th 38 38 18th 18 18 19th 44 44 20th 17 17 21st 41 41 22nd 31 31 23rd 20 20 24th 39 39 25th 33 33 26th 188 188 27th 159 159 28th 19 19 29th 22 22 30th 88 88 31st 113 113 Filter: Languages This dialog allows you to filter your current search. Each of the Languages listed note their name and the number of records that will be limited down to if you choose that option. English 4,419 4419 French 6 6 German 2 2 Spanish 101 101 Filter: Rights Access This dialog allows you to filter your current search. Each of the Rights Access listed note their name and the number of records that will be limited down to if you choose that option. Public 3,811 3811 Use restricted to UNT Community 608 608 Filter: Department This dialog allows you to filter your current search. Each of the Department listed note their name and the number of records that will be limited down to if you choose that option. Music 11 11 Institute of Applied Science 3 3 Biological Sciences 2 2
cc/2019-30/en_middle_0029.json.gz/line3895
__label__cc
0.552889
0.447111
Database Security Requirements Guide U_Database_V2R3_SRG_Manual-xccdf.xml The Database Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected] SRG-APP-000001-DB-000031 Database management includes the ability to control the number of users and user sessions utilizing a DBMS. Unlimited concurrent connections to the DBMS could allow a successful Denial of Service (DoS) attack by exhausting connection resources; and a system can also fail or be degraded by an overload of legitimate users. Limiting the number of concurrent sessions per user is helpful in reducing these risks. This requirement addresses concurrent session control for a single account. It does not address concurrent sessions by a single user via multiple system accounts; and it does not deal with the total number of sessions across all accounts. The capability to limit the number of concurrent sessions per user must be configured in or added to the DBMS (for example, by use of a logon trigger), when this is technically feasible. Note that it is not sufficient to limit sessions via a web server or application server alone, because legitimate users and adversaries can potentially connect to the DBMS by other means. The organization will need to define the maximum number of concurrent sessions by account type, by account, or a combination thereof. In deciding on the appropriate number, it is important to consider the work requirements of the various types of users. For example, 2 might be an acceptable limit for general users accessing the database via an application; but 10 might be too few for a database administrator using a database management GUI tool, where each query tab and navigation pane may count as a separate session. (Sessions may also be referred to as connections or logons, which for the purposes of this requirement are synonyms.) Determine whether the system documentation specifies limits on the number of concurrent DBMS sessions per account by type of user. If it does not, assume a limit of 10 for database administrators and 2 for all other users. Review the concurrent-sessions settings in the DBMS and/or the applications using it, and/or the system software supporting it. If the DBMS is capable of enforcing this restriction but is not configured to do so, this is a finding. This holds even if the restriction is enforced by applications or supporting software. If it is not technically feasible for the DBMS to enforce this restriction, but the application(s) or supporting software are configured to do so, this is not a finding. If it is not technically feasible for the DBMS to enforce this restriction, and applications and supporting software are not so configured, this is a finding. If the value for any type of user account is not set, this is a finding. If a value is set but is not equal to the value specified in the documentation (or the default value defined in this check) for the type of user, this is a finding. If the DBMS is capable of enforcing this restriction, but is not configured to do so, configure it to do so. (This may involve the development of one or more triggers.) If it is not technically feasible for the DBMS to enforce this restriction, and the application(s) and supporting software are not configured to do so, configure them to do so. If the value for any type of user account is not set, determine the correct value and set it. If a value is set but is not equal to the value specified for the type of user, determine the correct value, set it, and update the documentation, as appropriate. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Note that access via an approved and properly configured DoD Virtual Private Network (VPN) is deemed to be internal to the DoD Information Network (DoDIN) and so does not count as remote access. Note that remote access as defined here may not mean exactly the same thing as remote access in the terminology of the DBMS. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection, thereby providing a degree of confidentiality. The encryption strength of mechanism is selected based on the security categorization of the information. Logon/Account information can be compromised if authentication secrets (e.g., passwords) being passed over a public network are not secured via approved cryptography. This can result in unauthorized access to the database. DoD-approved cryptography is as specified in the NIST publication FIPS PUB 140-2, "Security Requirements for Cryptographic Modules." Additionally, for classified systems, NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review settings to determine if the DBMS is configured to accept remote connections. If the DBMS is not configured to accept remote connections, this is not applicable (NA). Check DBMS settings to determine whether the authentication data for remote connections is being encrypted with approved cryptography. If authentication data for remote connections is not being encrypted with DoD-approved cryptography, this is a finding. Configure the DBMS to encrypt authentication data for remote connections using DoD-approved encryption. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Note that access via an approved and properly configured DoD Virtual Private Network (VPN) is deemed to be internal to the DoD Information Network (DoDIN) and so does not count as remote access. Note that remote access as defined here may not mean exactly the same thing as remote access in the terminology of the DBMS. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection, thereby providing a degree of confidentiality. The encryption strength of mechanism is selected based on the security categorization of the information. DoD-approved cryptography is as specified in the NIST publication FIPS PUB 140-2, "Security Requirements for Cryptographic Modules." Additionally, for classified systems, NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review system documentation to determine whether the system handles classified information. If the system handles classified information, this is not applicable (NA). Review DBMS settings to determine if the database is configured to accept remote connections. If the database is not configured to accept remote connections, this is not a finding. Check DBMS settings to determine whether the data for remote connections is being encrypted using NIST FIPS 140-2 validated cryptographic modules. If data for remote connections is not being encrypted with DoD-approved cryptography, this is a finding. Configure the DBMS to encrypt data passing over remote connections using NIST FIPS 140-2 validated cryptographic modules. Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Note that access via an approved and properly configured DoD Virtual Private Network (VPN) is deemed to be internal to the DoD Information Network (DoDIN) and so does not count as remote access. Note that remote access as defined here may not mean exactly the same thing as remote access in the terminology of the DBMS. Cryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions. DoD-approved cryptography is as specified in the NIST publication FIPS PUB 140-2, "Security Requirements for Cryptographic Modules." Additionally, for classified systems, NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review system documentation to determine whether the system handles classified information. If the system handles classified information, this is not applicable (NA). Review DBMS settings to determine if the database is configured to accept remote connections. If the database is not configured to accept remote connections, this is not a finding. Check DBMS settings to determine whether the integrity of data over remote connections is being protected using NIST FIPS 140-2 validated cryptographic modules. If data integrity for remote connections is not so protected, this is a finding. Configure the DBMS to ensure integrity of data passing over remote connections using NIST FIPS 140-2 validated cryptographic modules. Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. Managing accounts for the same person in multiple places is inefficient and prone to problems with consistency and synchronization. A comprehensive application account management process that includes automation helps to ensure that accounts designated as requiring attention are consistently and promptly addressed. Examples include, but are not limited to, using automation to take action on multiple accounts designated as inactive, suspended, or terminated, or by disabling accounts located in non-centralized account stores, such as multiple servers. Account management functions can also include: assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. The use of automated mechanisms can include, for example: using email or text messaging to notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using automated telephone notification to report atypical system account usage. The DBMS must be configured to automatically utilize organization-level account management functions, and these functions must immediately enforce the organization's current account policy. Automation may be comprised of differing technologies that when placed together contain an overall mechanism supporting an organization's automated account management requirements. If all accounts are authenticated by the organization-level authentication/access mechanism and not by the DBMS, this is not a finding. If there are any accounts managed by the DBMS, review the system documentation for justification and approval of these accounts. If any DBMS-managed accounts exist that are not documented and approved, this is a finding. Integrate DBMS security with an organization-level authentication/access mechanism providing account management for all users, groups, roles, and any other principals. For each DBMS-managed account that is not documented and approved, either transfer it to management by the external mechanism, or document the need for it and obtain approval, as appropriate. Authentication with a DoD-approved PKI certificate does not necessarily imply authorization to access the DBMS. To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems, including databases, must be properly configured to implement access control policies. Successful authentication must not automatically give an entity access to an asset or security boundary. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Information systems use access control policies and enforcement mechanisms to implement this requirement. Access control policies include identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include access control lists, access control matrices, and cryptography. These policies and mechanisms must be employed by the application to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, and domains) in the information system. This requirement is applicable to access control enforcement applications, a category that includes database management systems. If the DBMS does not follow applicable policy when approving access, it may be in conflict with networks or other applications in the information system. This may result in users either gaining or being denied access inappropriately and in conflict with applicable policy. Check DBMS settings to determine whether users are restricted from accessing objects and data they are not authorized to access. If appropriate access controls are not implemented to restrict access to authorized users and to restrict the access of those users to objects and data they are authorized to see, this is a finding. Configure the DBMS settings and access controls to permit user access only to objects and data that the user is authorized to view or interact with, and to prevent access to all other objects and data. Non-repudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving information (e.g., indicating concurrence or signing a contract), and receiving a message. Non-repudiation protects against later claims by a user of not having created, modified, or deleted a particular data item or collection of data in the database. In designing a database, the organization must define the types of data and the user actions that must be protected from repudiation. The implementation must then include building audit features into the application data tables and configuring the DBMS's audit tools to capture the necessary audit trail. Design and implementation also must ensure that applications pass individual user identification to the DBMS, even where the application connects to the DBMS with a standard, shared account. Review system documentation to determine the data and the actions on data that need to be protected from repudiation by means of audit trails. Review DBMS settings to determine whether users can be identified as individuals when using shared accounts. If the individual user who is using a shared account cannot be identified, this is a finding. Review the design and the contents of the application data tables. If they do not include the necessary audit data, this is a finding. Review the configuration of audit logs to determine whether auditing includes details identifying the individual user. If it does not, this is a finding. Use accounts assigned to individual users. Where the application connects to the DBMS using a standard, shared account, ensure that it also captures the individual user identification and passes it to the DBMS. Modify application database tables and all supporting code to capture the necessary audit data. Modify the configuration of audit logs to include details identifying the individual user. Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the DBMS (e.g., process, module). Certain specific application functionalities may be audited as well. The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records. DoD has defined the list of events for which the DBMS will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities, or other system-level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the information system; and (iii) All account creation, modification, disabling, and termination actions. Organizations may define additional events requiring continuous or ad hoc auditing. Check DBMS auditing to determine whether organization-defined auditable events are being audited by the system. If organization-defined auditable events are not being audited, this is a finding. Deploy a DBMS that supports the DoD minimum set of auditable events. Configure the DBMS to generate audit records for at least the DoD minimum set of events. Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent or interfere with the auditing of critical events. Suppression of auditing could permit an adversary to evade detection. Misconfigured audits can degrade the system's performance by overwhelming the audit log. Misconfigured audits may also make it more difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Check DBMS settings and documentation to determine whether designated personnel are able to select which auditable events are being audited. If designated personnel are not able to configure auditable events, this is a finding. Configure the DBMS's settings to allow designated personnel to select which auditable events are audited. Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, it must be possible to configure auditing to do this. DBMSs typically make such information available through views or functions. This requirement addresses explicit requests for privilege/permission/role membership information. It does not refer to the implicit retrieval of privileges/permissions/role memberships that the DBMS continually performs to determine if any and every action on the database is permitted. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are retrieved. If the DBMS is not capable of this, this is a finding. If the DBMS is currently required to audit the retrieval of privilege/permission/role membership information, review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are retrieved. If they are not produced, this is a finding. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are retrieved. If currently required, configure the DBMS to produce audit records when privileges/permissions/role memberships are retrieved. Session auditing is for use when a user's activities are under investigation. To be sure of capturing all activity during those periods when session auditing is in use, it needs to be in operation for the whole time the DBMS is running. Review DBMS vendor documentation to determine whether the DBMS software is capable of session auditing. If the DBMS is not capable of session auditing and a third party product is not being used for session level auditing, this is a finding. If the DBMS is capable of session level auditing and specific session audits are currently defined but session auditing is not enabled; or if a third-party product is available for session auditing and specific session audits are currently defined but session auditing is not enabled, this is a finding. Deploy a DBMS capable of session auditing. Configure the DBMS software or third-party product to enable session auditing. Without the capability to capture, record, and log all content related to a user session, investigations into suspicious user activity would be hampered. Typically, this DBMS capability would be used in conjunction with comparable monitoring of a user's online session, involving other software components such as operating systems, web servers and front-end user applications. The current requirement, however, deals specifically with the DBMS. Review DBMS vendor documentation to determine whether the DBMS is capable of capturing, recording, and logging all content related to an established user session. If the DBMS is not capable of these actions, this is a finding. Deploy a DBMS capable of capturing, recording, and logging all content related to an established user session, or acquire a third-party application to perform this function. Information system auditing capability is critical for accurate forensic analysis. Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit record content that may be necessary to satisfy the requirement of this policy includes, for example, time stamps, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Database software is capable of a range of actions on data stored within the database. It is important, for accurate forensic analysis, to know exactly what actions were performed. This requires specific information regarding the event type an audit record is referring to. If event type information is not recorded and stored with the audit record, the record itself is of very limited use. Check DBMS settings and existing audit records to verify information specific to the audit event type is being captured and stored with the audit records. If audit records exist without information regarding what type of event occurred, this is a finding. Configure DBMS audit settings to include event type as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the date and time when events occurred. Associating the date and time with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Database software is capable of a range of actions on data stored within the database. It is important, for accurate forensic analysis, to know exactly when specific actions were performed. This requires the date and time an audit record is referring to. If date and time information is not recorded and stored with the audit record, the record itself is of very limited use. Check DBMS settings and existing audit records to verify information specific to the date and time of the event is being captured and stored with the audit records. If audit records exist without the date and time of the event, this is a finding. Configure DBMS audit settings to include the date and time of the occurrence of the event as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as application components, modules, session identifiers, filenames, host names, and functionality. Associating information about where the event occurred within the application provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Check DBMS settings and existing audit records to verify information specific to where the event occurred is being captured and stored with the audit records. If audit records exist without information regarding where the event occurred, this is a finding. Configure DBMS audit settings to include where the event occurred as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events relating to an incident. In addition to logging where events occur within the application, the application must also produce audit records that identify the application itself as the source of the event. Associating information about the source of the event within the application provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Check DBMS settings and existing audit records to verify information specific to the source (origin) of the event is being captured and stored with audit records. If audit records exist without information regarding the source of the event, this is a finding. Configure DBMS audit settings to include the source of the event as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the system. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred). As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response. Check DBMS settings and existing audit records to verify information specific to the outcome of the event is being captured and stored with the audit records. If audit records exist without the outcome of the event that occurred, this is a finding. Configure DBMS audit settings to include the outcome of the event as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event. Identifiers (if authenticated or otherwise known) include, but are not limited to, user database tables, primary key values, user names, or process identifiers. Check DBMS settings and existing audit records to verify a user name associated with the event is being captured and stored with the audit records. If audit records exist without specific user information, this is a finding. Configure DBMS audit settings to include user name as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. To support analysis, some types of events will need information to be logged that exceeds the basic requirements of event type, time stamps, location, source, outcome, and user identity. If additional information is not available, it could negatively impact forensic investigations into user actions or other malicious events. The organization must determine what additional information is required for complete analysis of the audited events. The additional information required is dependent on the type of information (e.g., sensitivity of the data and the environment within which it resides). At a minimum, the organization must employ either full-text recording of privileged commands or the individual identities of users of shared accounts, or both. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise. Examples of detailed information the organization may require in audit records are full-text recording of privileged commands or the individual identities of shared account users. Review the system documentation to identify what additional information the organization has determined to be necessary. Check DBMS settings and existing audit records to verify that all organization-defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject. If any additional information is defined and is not contained in the audit records, this is a finding. Configure DBMS audit settings to include all organization-defined detailed information in the audit records for audit events identified by type, location, or subject. It is critical that when the DBMS is at risk of failing to process audit logs as required, it take action to mitigate the failure. Audit processing failures include: software/hardware errors; failures in the audit capturing mechanisms; and audit storage capacity being reached or exceeded. Responses to audit failure depend upon the nature of the failure mode. When the need for system availability does not outweigh the need for a complete audit trail, the DBMS should shut down immediately, rolling back all in-flight transactions. Systems where audit trail completeness is paramount will most likely be at a lower MAC level than MAC I; the final determination is the prerogative of the application owner, subject to Authorizing Official concurrence. In any case, sufficient auditing resources must be allocated to avoid a shutdown in all but the most extreme situations. If the application owner has determined that the need for system availability outweighs the need for a complete audit trail, this is not applicable (NA). Review DBMS, OS, or third-party logging application settings and/or documentation to determine whether the system is capable of shutting down, rolling back all in-flight transactions, in the case of an auditing failure. If it is not, this is a finding. If the system is capable of shutting down upon audit failure but is not configured to do so, this is a finding. Configure the system to shut down, rolling back all in-flight transactions, in the case of an auditing failure. Internal system clocks are typically a feature of server hardware and are maintained and used by the operating system. They are typically synchronized with an authoritative time server at regular intervals. Without an internal system clock used as the reference for the time stored on each event to provide a trusted common reference for the time, forensic analysis would be impeded. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Time stamps generated by the internal system clock and used by the DBMS shall include both date and time. The time may be expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. If time sources other than the system time are used for audit records, the timeline of events can get skewed. This makes forensic analysis of the logs much less reliable. Using product documentation, verify that the DBMS uses current time stamp values obtained from or synchronized with the internal system clock used by the operating system. If it is not able to, this is a finding. If it is able to but is configured so that it does not do so, this is a finding. Deploy a DBMS that can use time stamp values obtained from or synchronized with the internal system clock used by the operating system. Configure the DBMS to use time stamp values obtained from or synchronized with the internal system clock used by the operating system. If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to audit records provides information an attacker could potentially use to his or her advantage. To ensure the veracity of audit data, the information system and/or the application must protect audit information from any and all unauthorized access. This includes read, write, copy, etc. This requirement can be achieved through multiple methods which will depend upon system architecture and design. Some commonly employed methods include ensuring log files enjoy the proper file system permissions utilizing file system protections and limiting log data location. Additionally, applications with user interfaces to audit records should not allow for the unfettered manipulation of or access to those records via the application. If the application provides access to the audit data, the application becomes accountable for ensuring that audit information is protected from unauthorized access. Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. Review locations of audit logs, both internal to the database and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized access. If appropriate controls and permissions do not exist, this is a finding. Apply controls and modify permissions to protect database audit log data from unauthorized access, whether stored in the database itself or at the OS level. If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data the information system and/or the application must protect audit information from unauthorized modification. This requirement can be achieved through multiple methods that will depend upon system architecture and design. Some commonly employed methods include ensuring log files enjoy the proper file system permissions and limiting log data locations. Applications providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights that the user enjoys in order to make access decisions regarding the modification of audit data. Modification of database audit data could mask the theft of, or the unauthorized modification of, sensitive data stored in the database. Verify there are appropriate controls and permissions to protect the audit information from unauthorized modification. Apply controls and modify permissions to protect database audit log data from unauthorized modification, whether stored in the database itself or at the OS level. To ensure the veracity of audit data, the information system and/or the application must protect audit information from unauthorized deletion. This requirement can be achieved through multiple methods which will depend upon system architecture and design. Some commonly employed methods include: ensuring log files enjoy the proper file system permissions utilizing file system protections; restricting access; and backing up log data to ensure log data is retained. Applications providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights the user enjoys in order make access decisions regarding the deletion of audit data. Deletion of database audit data could mask the theft of, or the unauthorized modification of, sensitive data stored in the database. Review locations of audit logs, both internal to the database, and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized deletion. Apply controls and modify permissions to protect database audit log data from unauthorized deletion, whether stored in the database itself or at the OS level. Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application and system log data. It is, therefore, imperative that access to audit tools be controlled and protected from unauthorized access. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, OS-provided audit tools, vendor-provided audit tools, and open source audit tools needed to successfully view and manipulate audit information system activity and records. If an attacker were to gain access to audit tools, he could analyze audit logs for system weaknesses or weaknesses in the auditing itself. An attacker could also manipulate logs to hide evidence of malicious activity. Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database. If appropriate permissions and access controls to prevent unauthorized access are not applied to these tools, this is a finding. Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be accessible by authorized personnel only. Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order make access decisions regarding the modification of audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators. If appropriate permissions and access controls to prevent unauthorized configuration are not applied to these tools, this is a finding. Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be configurable by authorized personnel only. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order make access decisions regarding the deletion of audit tools. If appropriate permissions and access controls to prevent unauthorized removal are not applied to these tools, this is a finding. Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Ensure that tools may be removed by authorized personnel only. Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access to the owned objects to other subjects. Database functions and procedures can be coded using definer's rights. This allows anyone who utilizes the object to perform the actions if they were the owner. If not properly managed, this can lead to privileged actions being taken by unauthorized individuals. Conversely, if critical tables or other objects rely on unauthorized owner accounts, these objects may be lost when an account is removed. Review system documentation to identify accounts authorized to own database objects. Review accounts that own objects in the database(s). If any database objects are found to be owned by users not authorized to own database objects, this is a finding. Assign ownership of authorized objects to authorized object owner accounts. When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to host system directories can most likely lead to a compromise of all applications hosted by the same system. Database software not installed using dedicated directories both threatens and is threatened by other hosted applications. Access controls defined for one application may by default provide access to the other application's database objects or directories. Any method that provides any level of separation of security context assists in the protection between applications. Review the DBMS software library directory and note other root directories located on the same disk directory or any subdirectories. If any non-DBMS software directories exist on the disk directory, examine or investigate their use. If any of the directories are used by other applications, including third-party applications that use the DBMS, this is a finding. Only applications that are required for the functioning and administration, not use, of the DBMS should be located in the same disk directory as the DBMS software libraries. If other applications are located in the same directory as the DBMS, this is a finding. For databases located on mainframes, confirm that the database and its configuration files are isolated in their own DASD pools. If database software and database configuration files share DASD with other applications, this is a finding. Install all applications on directories separate from the DBMS software library directory. Relocate any directories or reinstall other application software that currently shares the DBMS software library directory. For mainframe-based databases, locate database software and configuration files in separate DASD pools from other mainframe applications. When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can have significant effects on the overall security of the system. If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. Accordingly, only qualified and authorized individuals shall be allowed access to information system components for purposes of initiating changes, including upgrades and modifications. DBA and other privileged administrative or application owner accounts are granted privileges that allow actions that can have a great impact on database security and operation. It is especially important to grant privileged access to only those persons who are qualified and authorized to use them. Review procedures for controlling, granting access to, and tracking use of the DBMS software installation account. If access or use of this account is not restricted to the minimum number of personnel required or if unauthorized access to the account has been granted, this is a finding. Develop, document, and implement procedures to restrict and track use of the DBMS software installation account. Accordingly, only qualified and authorized individuals shall be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications. Unmanaged changes that occur to the database software libraries or configuration can lead to unauthorized or compromised installations. Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done. Verify the list of files, directories, and database application objects (procedures, functions, and triggers) being monitored is complete. If monitoring does not occur or is not complete, this is a finding. Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement. Use file hashes or checksums for comparisons, as file dates may be manipulated by malicious users. Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). It is detrimental for software products to provide, or install by default, functionality exceeding requirements or mission objectives. Examples include, but are not limited to, installing advertising software, demonstrations, or browser plugins not related to requirements or providing a wide array of functionality, not required for every mission, that cannot be disabled. DBMSs must adhere to the principles of least functionality by providing only essential capabilities. Demonstration and sample database objects and applications present publicly known attack points for malicious users. These demonstration and sample objects are meant to provide simple examples of coding specific functions and are not developed to prevent vulnerabilities from being introduced to the DBMS and host system. Review vendor documentation and vendor websites to identify vendor-provided demonstration or sample databases, database applications, objects, and files. Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application. If any are present in the database or are included with the DBMS application, this is a finding. Remove any demonstration and sample databases, database applications, objects, and files from the DBMS. It is detrimental for software products to provide, or install by default, functionality exceeding requirements or mission objectives. Review the list of components and features installed with the database. Use the DBMS product installation tool if supported and review the product installation documentation. If unused components or features are installed and are not documented and authorized, this is a finding. Uninstall unused components or features that are installed and can be uninstalled. Remove any database objects and applications that are installed to support them. Unused, unnecessary DBMS components increase the attack vector for the DBMS by introducing additional targets for attack. By minimizing the services and applications installed on the system, the number of potential vulnerabilities is reduced. Components of the system that are unused and cannot be uninstalled must be disabled. The techniques available for disabling components will vary by DBMS product, OS, and the nature of the component and may include DBMS configuration settings, OS service settings, OS file access security, and DBMS user/role permissions. Review the DBMS for unused components of the system that cannot be uninstalled. If unused components or features are present on the system, can be disabled, and are not disabled, this is a finding. Disable any unused components or features that cannot be uninstalled. It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. Applications must adhere to the principles of least functionality by providing only essential capabilities. DBMSs may spawn additional external processes to execute procedures that are defined in the DBMS but stored in external host files (external procedures). The spawned process used to execute the external procedure may operate within a different OS security context than the DBMS and provide unauthorized access to the host system. Review the database for definitions of application executable objects stored external to the database. Determine if there are methods to disable use or access, or to remove definitions for external executable objects. Verify each application executable object listed is authorized by the ISSO. If any are not, this is a finding. Disable use of or remove any external application executable object definitions that are not authorized. In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols/services on information systems. Applications are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the application must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues. Database Management Systems using ports, protocols, and services deemed unsafe are open to attack through those ports, protocols, and services. This can allow unauthorized access to the database and through the database to other components of the information system. Review the DBMS settings and local documentation for functions, ports, protocols, and services that are not approved. If any are found, this is a finding. Disable functions, ports, protocols, and services that are not approved. To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and any processes acting on behalf of users) must be uniquely identified and authenticated for all accesses, except the following: (i) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication; and (ii) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals using shared accounts, for detailed accountability of individual activity. Review DBMS settings to determine whether organizational users are uniquely identified and authenticated when logging on/connecting to the system. If organizational users are not uniquely identified and authenticated, this is a finding. Configure DBMS settings to uniquely identify and authenticate all organizational users who log on/connect to the system. The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval. In such cases, database passwords stored in clear text, using reversible encryption, or using unsalted hashes would be vulnerable to unauthorized disclosure. Database passwords must always be in the form of one-way, salted hashes when stored internally or externally to the DBMS. Review the list of DBMS database objects, database configuration files, associated scripts, and applications defined within and external to the DBMS that access the database. The list should also include files or settings used to configure the operational environment for the DBMS and for interactive DBMS user accounts. Determine whether any DBMS database objects, database configuration files, associated scripts, applications defined within or external to the DBMS that access the database, and DBMS/user environment files/settings contain database passwords. If any do, confirm that DBMS passwords stored internally or externally to the DBMS are hashed using FIPS-approved cryptographic algorithms and include a salt. If any passwords are stored in clear text, this is a finding. If any passwords are stored with reversible encryption, this is a finding. If any passwords are stored using unsalted hashes, this is a finding. Develop, document, and maintain a list of DBMS database objects, database configuration files, associated scripts, applications defined within or external to the DBMS that access the database, and DBMS/user environment files/settings in the System Security Plan. Record whether they do or do not contain DBMS passwords. If passwords are present, ensure that they are correctly hashed using one-way, salted hashing functions, and that the hashes are protected by host system security. In such cases, passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database. Review configuration settings for encrypting passwords in transit across the network. If passwords are not encrypted, this is a finding. If it is determined that passwords are passed unencrypted at any point along the transmission path between the source and destination, this is a finding. Configure encryption for transmission of passwords across the network. If the database does not provide encryption for logon events natively, employ encryption at the OS or network level. Ensure passwords remain encrypted from source to destination. A certificate’s certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entity certificate. Certification path validation includes checks such as certificate issuer trust, time validity and revocation status for each certificate in the certification path. Revocation status information for CA and subject certificates in a certification path is commonly provided via certificate revocation lists (CRLs) or online certificate status protocol (OCSP) responses. Database Management Systems that do not validate certificates by performing RFC 5280-compliant certification path validation are in danger of accepting certificates that are invalid and/or counterfeit. This could allow unauthorized access to the database. Review DBMS configuration to verify that certificates being accepted by the DBMS are validated by performing RFC 5280-compliant certification path validation. If certificates are not being validated by performing RFC 5280-compliant certification path validation, this is a finding. Configure the DBMS to validate certificates by performing RFC 5280-compliant certification path validation. The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by requiring the certificate holder to cryptographically prove possession of the corresponding private key. If the private key is stolen, an attacker can use the private key(s) to impersonate the certificate holder. In cases where the DBMS-stored private keys are used to authenticate the DBMS to the system’s clients, loss of the corresponding private keys would allow an attacker to successfully perform undetected man in the middle attacks against the DBMS system and its clients. Both the holder of a digital certificate and the issuing authority must take careful measures to protect the corresponding private key. Private keys should always be generated and protected in FIPS 140-2 validated cryptographic modules. All access to the private key(s) of the DBMS must be restricted to authorized and authenticated users. If unauthorized users have access to one or more of the DBMS's private keys, an attacker could gain access to the key(s) and use them to impersonate the database on the network or otherwise perform unauthorized actions. Review DBMS configuration to determine whether appropriate access controls exist to protect the DBMS's private key(s). If the DMBS’s private key(s) are not stored in a FIPS 140-2 validated cryptographic module, this is a finding. If access to the DBMS’s private key(s) is not restricted to authenticated and authorized users, this is a finding. Store all DBMS PKI private keys in a FIPS 140-2 validated cryptographic module. Ensure access to the DBMS PKI private keys is restricted to only authenticated and authorized users. The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be mapped to a DBMS user account for the authenticated identity to be meaningful to the DBMS and useful for authorization decisions. Review DBMS configuration to verify DBMS user accounts are being mapped directly to unique identifying information within the validated PKI certificate. If user accounts are not being mapped to authenticated identities, this is a finding. Configure the DBMS to map the authenticated identity directly to the DBMS user account. Normally, with PKI authentication, the interaction with the user for authentication will be handled by a software component separate from the DBMS, such as ActivIdentity ActivClient. However, in cases where the DBMS controls the interaction, this requirement applies. To prevent the compromise of authentication information such as passwords and PINs during the authentication process, the feedback from the system must not provide any information that would allow an unauthorized user to compromise the authentication mechanism. Obfuscation of user-provided authentication secrets when typed into the system is a method used in addressing this risk. Displaying asterisks when a user types in a password or a smart card PIN is an example of obscuring feedback of authentication secrets. If all interaction with the user for purposes of authentication is handled by a software component separate from the DBMS, this is not a finding. If any application, tool or feature associated with the DBMS/database displays any authentication secrets (to include PINs and passwords) during - or after - the authentication process, this is a finding. Modify and configure each non-compliant application, tool, or feature associated with the DBMS/database so that it does not display authentication secrets. Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures to protect data. Weak algorithms can be easily broken and not validated cryptographic modules may not implement algorithms correctly. Unapproved cryptographic modules or algorithms should not be relied on for authentication, confidentiality or integrity. Weak cryptography could allow an attacker to gain access to and modify data stored in the database as well as the administration settings of the DBMS. Applications, including DBMSs, utilizing cryptography are required to use approved NIST FIPS 140-2 validated cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The security functions validated as part of FIPS 140-2 for cryptographic modules are described in FIPS 140-2 Annex A. NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review DBMS configuration to verify it is using NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. If NIST FIPS 140-2 validated modules are not being used for all cryptographic operations, this is a finding. Utilize NIST FIPS 140-2 validated cryptographic modules for all cryptographic operations. Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Non-organizational users shall be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access, such as accessing a web server. Accordingly, a risk assessment is used in determining the authentication needs of the organization. Scalability, practicality, and security are simultaneously considered in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk to organizational operations, organizational assets, individuals, other organizations, and the Nation. Review DBMS settings to determine whether non-organizational users are uniquely identified and authenticated when logging onto the system. If non-organizational users are not uniquely identified and authenticated, this is a finding. Configure DBMS settings to uniquely identify and authenticate all non-organizational users who log onto the system. Information system management functionality includes functions necessary to administer databases, network components, workstations, or servers and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical and is accomplished by using different computers, different central processing units, different instances of the operating system, different network addresses, combinations of these methods, or other methods, as appropriate. An example of this type of separation is observed in web administrative interfaces that use separate authentication methods for users of any other information system resources. This may include isolating the administrative interface on a different domain and with additional access controls. If administrative functionality or information regarding DBMS management is presented on an interface available for users, information on DBMS settings may be inadvertently made available to the user. Check DBMS settings and vendor documentation to verify that administrative functionality is separate from user functionality. If administrator and general user functionality are not separated either physically or logically, this is a finding. Configure DBMS to separate database administration and general user functionality. Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries to capture and continue to employ previously valid session IDs. This requirement focuses on communications protection for the DBMS session rather than for the network packet. The intent of this control is to establish grounds for confidence at each end of a communications session in the ongoing identity of the other party and in the validity of the information being transmitted. Session IDs are tokens generated by DBMSs to uniquely identify a user's (or process's) session. DBMSs will make access decisions and execute logic based on the session ID. Unique session IDs help to reduce predictability of said identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. When a user logs out, or when any other session termination event occurs, the DBMS must terminate the user session(s) to minimize the potential for sessions to be hijacked. Review DBMS settings and vendor documentation to verify user sessions are terminated, and session identifiers invalidated, upon user logout. If they are not, this is a finding. Review system documentation and organization policy to identify other events that should result in session terminations. If other session termination events are defined, review DBMS settings to verify occurrences of these events would cause session termination, invalidating the session identifiers. If occurrences of defined session terminating events do not cause session terminations, invalidating the session identifiers, this is a finding. Configure DBMS settings to terminate sessions, invalidating their session identifiers, upon user logout. Configure DBMS settings to terminate sessions, invalidating their session identifiers, upon the occurrence of any organization- or policy-defined session termination event. DBMSs utilize sessions and session identifiers to control application behavior and user access. If an attacker can guess the session identifier or can inject or manually insert session information, the session may be compromised. The DBMS must recognize only system-generated session identifiers. If an attacker were able to generate a session with a non-system-generated session identifier and have it recognized by the system, the attacker could gain access to the system without passing through access controls designed to limit database sessions to authorized users. Review DBMS settings and vendor documentation to determine whether the DBMS recognizes session identifiers that are not system-generated. If the DBMS recognizes session identifiers that are not system generated, this is a finding. Utilize a DBMS product that only recognizes session identifiers that are system-generated. Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. Systems that fail suddenly and with no incorporated failure state planning may leave the hosting system available but with a reduced security protection capability. Preserving information system state data also facilitates system restart and return to the operational mode of the organization with less disruption of mission/business processes. Databases must fail to a known consistent state. Transactions must be successfully completed or rolled back. In general, security mechanisms should be designed so that a failure will follow the same execution path as disallowing the operation. For example, application security methods, such as isAuthorized(), isAuthenticated(), and validate(), should all return false if there is an exception during processing. If security controls can throw exceptions, they must be very clear about exactly what that condition means. Abort refers to stopping a program or function before it has finished naturally. The term abort refers to both requested and unexpected terminations. Check DBMS settings and vendor documentation to verify the DBMS properly handles transactions in the event of a system failure. If open transactions are not rolled back to a consistent state during system failure, this is a finding. The consistent state must include a security configuration that is at least as restrictive as before the system failure. If this is not guaranteed, this is a finding. Configure DBMS settings so that, in the event of a system failure, the DBMS will roll back open transactions to a consistent state, to include a security configuration that is at least as restrictive as before the system failure. Preserving information system state information helps to facilitate system restart and return to the operational mode of the organization with less disruption of mission/business processes. Since it is usually not possible to test this capability in a production environment, systems should either be validated in a testing environment or prior to installation. This requirement is usually a function of the design of the IDPS component. Compliance can be verified by acceptance/validation processes or vendor attestation. Check DBMS settings to determine whether organization-defined system state information is being preserved in the event of a system failure. If organization-defined system state information is not being preserved, this is a finding. Configure DBMS settings to preserve any organization-defined system state information in the event of a system failure. This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an organizational information system. Applications and application users generate information throughout the course of their application use. User data generated, as well as application-specific configuration data, needs to be protected. Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate. If the confidentiality and integrity of application data is not protected, the data will be open to compromise and unauthorized modification. Review DBMS settings to determine whether controls exist to protect the confidentiality and integrity of data at rest in the database. If controls do not exist or are not enabled, this is a finding. Apply appropriate controls to protect the confidentiality and integrity of data at rest in the database. An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Developers and implementers can increase the assurance in security functions by employing well-defined security policy models; structured, disciplined, and rigorous hardware and software development techniques; and sound system/security engineering principles. Database Management Systems typically separate security functionality from non-security functionality via separate databases or schemas. Database objects or code implementing security functionality should not be commingled with objects or code implementing application logic. When security and non-security functionality are commingled, users who have access to non-security functionality may be able to access security functionality. Check DBMS settings to determine whether objects or code implementing security functionality are located in a separate security domain, such as a separate database or schema created specifically for security functionality. If security-related database objects or code are not kept separate, this is a finding. Locate security-related database objects and code in a separate database, schema, or other separate security domain from database objects and code implementing application logic. Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Data used for the development and testing of applications often involves copying data from production. It is important that specific procedures exist for this process, to include the conditions under which such transfer may take place, where the copies may reside, and the rules for ensuring sensitive data are not exposed. Copies of sensitive data must not be misplaced or left in a temporary location without the proper controls. Review the procedures for the refreshing of development/test data from production. Review any scripts or code that exists for the movement of production data to development/test systems, or to any other location or for any other purpose. Verify that copies of production data are not left in unprotected locations. If the code that exists for data movement does not comply with the organization-defined data transfer policy and/or fails to remove any copies of production data from unprotected locations, this is a finding. Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy, and to ensure copies of production data are not left in unsecured locations. Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application or information system compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application. With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection. It takes advantage of the dynamic execution capabilities of various programming languages, including dialects of SQL. Potentially, the attacker can gain unauthorized access to data, including security settings, and severely corrupt or destroy the database. Even when no such hijacking takes place, invalid input that gets recorded in the database, whether accidental or malicious, reduces the reliability and usability of the system. Available protections include data types, referential constraints, uniqueness constraints, range checking, and application-specific logic. Application-specific logic can be implemented within the database in stored procedures and triggers, where appropriate. Review DBMS code (stored procedures, functions, triggers), application code, settings, column and field definitions, and constraints to determine whether the database is protected against invalid input. If code exists that allows invalid data to be acted upon or input into the database, this is a finding. If column/field definitions do not exist in the database, this is a finding. If columns/fields do not contain constraints and validity checking where required, this is a finding. Where a column/field is noted in the system documentation as necessarily free-form, even though its name and context suggest that it should be strongly typed and constrained, the absence of these protections is not a finding. Where a column/field is clearly identified by name, caption or context as Notes, Comments, Description, Text, etc., the absence of these protections is not a finding. Modify database code to properly validate data before it is put into the database or acted upon by the database. Modify the database to contain column/field definitions for each column/field in the database. Modify the database to contain constraints and validity checking on database columns and tables that require them for data integrity. Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromising the data and security of the system. The structure and content of error messages need to be carefully considered by the organization and development team. Databases can inadvertently provide a wealth of information to an attacker through improperly handled error messages. In addition to sensitive business or personal information, database errors can provide host names, IP addresses, user names, and other system information not required for troubleshooting but very useful to someone targeting the system. Carefully consider the structure/content of error messages. The extent to which information systems are able to identify and handle error conditions is guided by organizational policy and operational requirements. Information that could be exploited by adversaries includes, for example, logon attempts with passwords entered by mistake as the username, mission/business information that can be derived from (if not stated explicitly by) information recorded, and personal information, such as account numbers, social security numbers, and credit card numbers. Check DBMS settings and custom database code to verify that error messages do not contain information beyond what is needed for troubleshooting the issue. If database errors contain PII data, sensitive business data, or information useful for identifying the host system or database structure, this is a finding. Configure DBMS settings, custom database code, and associated application code not to divulge sensitive information or information useful for system identification in error messages. If the DBMS provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully considered by the organization and development team. The extent to which the information system is able to identify and handle error conditions is guided by organizational policy and operational requirements. Some default DBMS error messages can contain information that could aid an attacker in, among others things, identifying the database type, host address, or state of the database. Custom errors may contain sensitive customer information. It is important that detailed error messages be visible only to those who are authorized to view them; that general users receive only generalized acknowledgment that errors have occurred; and that these generalized messages appear only when relevant to the user's task. For example, a message along the lines of, "An error has occurred. Unable to save your changes. If this problem persists, please contact your help desk" would be relevant. A message such as "Warning: your transaction generated a large number of page splits" would likely not be relevant. Administrative users authorized to review detailed error messages typically are the ISSO, ISSM, SA, and DBA. Other individuals or roles may be specified according to organization-specific needs, with appropriateDBA approval. Check DBMS settings and custom database code to determine if detailed error messages are ever displayed to unauthorized individuals. If detailed error messages are displayed to individuals not authorized to view them, this is a finding. Configure DBMS settings, custom database code, and associated application code not to display detailed error messages to those not authorized to view them. Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user-controlled table permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside of the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control. Review system documentation to identify the required discretionary access control (DAC). Review the security configuration of the database and DBMS. If applicable, review the security configuration of the application(s) using the database. If the discretionary access control defined in the documentation is not implemented in the security configuration, this is a finding. Implement the organization's DAC policy in the security configuration of the database and DBMS, and, if applicable, the security configuration of the application(s) using the database. In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, functions, triggers, etc.) and/or external code modules with elevated privileges. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking the functionality applications/programs, those users are indirectly provided with greater privileges than assigned by organizations. Privilege elevation must be utilized only where necessary and protected from misuse. Review the system documentation, database and DBMS security configuration, source code for DBMS internal logic, source code of external modules invoked by the DBMS, and source code of the application(s) using the database. If elevation of DBMS privileges is utilized but not documented, this is a finding. If elevation of DBMS privileges is documented, but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, or in contexts other than intended, or by subjects/principals other than intended, this is a finding. Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the database and DBMS security configuration, DBMS internal logic, external modules invoked by the DBMS, and the application(s) using the database, to ensure privilege elevation is used only as required. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. System documentation should include a definition of the functionality considered privileged. Depending on circumstances, privileged functions can include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users. A privileged function in the DBMS/database context is any operation that modifies the structure of the database, its built-in logic, or its security settings. This would include all Data Definition Language (DDL) statements and all security-related statements. In an SQL environment, it encompasses, but is not necessarily limited to: There may also be Data Manipulation Language (DML) statements that, subject to context, should be regarded as privileged. Possible examples include: TRUNCATE TABLE; DELETE, or DELETE affecting more than n rows, for some n, or DELETE without a WHERE clause; UPDATE or UPDATE affecting more than n rows, for some n, or UPDATE without a WHERE clause; any SELECT, INSERT, UPDATE, or DELETE to an application-defined security table executed by other than a security principal. Depending on the capabilities of the DBMS and the design of the database and associated applications, the prevention of unauthorized use of privileged functions may be achieved by means of DBMS security features, database triggers, other mechanisms, or a combination of these. Review the system documentation to obtain the definition of the database/DBMS functionality considered privileged in the context of the system in question. Review the DBMS security configuration and/or other means used to protect privileged functionality from unauthorized use. If the configuration does not protect all of the actions defined as privileged, this is a finding. Configure DBMS security to protect all privileged functionality. This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination ends all processes associated with a user's logical session except those batch processes/jobs that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, and time-of-day restrictions on information system use. This capability is typically reserved for specific cases where the system owner, data owner, or organization requires additional assurance. Review system documentation to obtain the organization's definition of circumstances requiring automatic session termination. If the documentation explicitly states that such termination is not required or is prohibited, this is not a finding. If the documentation requires automatic session termination, but the DBMS is not configured accordingly, this is a finding. Configure the DBMS to automatically terminate a user session after organization-defined conditions or trigger events requiring session termination. If a user cannot explicitly end a DBMS session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Such logout may be explicit or implicit. Examples of explicit are: clicking on a "Log Out" link or button in the application window; clicking the Windows Start button and selecting "Log Out" or "Shut Down." Examples of implicit logout are: closing the application's (main) window; powering off the workstation without invoking the OS shutdown. Both the explicit and implicit logouts must be detected by the DBMS. In all cases, the DBMS must ensure that the user's DBMS session and all processes owned by the session are terminated. This should not, however, interfere with batch processes/jobs initiated by the user during his/her online session: these should be permitted to run to completion. Determine, by reviewing DBMS documentation and/or inquiring of the vendor's technical support staff, whether the DBMS satisfies this requirement; and, if it does, determine whether this is inherent, unchangeable behavior, or a configurable feature. If the DBMS does not satisfy the requirement, this is a permanent finding. If the behavior is inherent, this is permanently not a finding. If the behavior is configurable, and the current configuration does not enforce it, this is a finding. Where relevant, modify the configuration to allow the user to manually terminate a session initiated by that user. Without the association of security labels to information, there is no basis for the DBMS to make security-related access-control decisions. Security labels are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These labels are typically associated with internal data structures (e.g., tables, rows) within the database and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. One example includes marking data as classified or FOUO. These security labels may be assigned manually or during data processing, but, either way, it is imperative these assignments are maintained while the data is in storage. If the security labels are lost when the data is stored, there is the risk of a data compromise. The mechanism used to support security labeling may be a feature of the DBMS product, a third-party product, or custom application code. If security labeling is not required, this is not a finding. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in storage, this is a finding. Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in storage. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in process, this is a finding. Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in process. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in transmission, this is a finding. Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in transmission. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Note that remote access as defined here may not mean exactly the same thing as remote access in the terminology of the DBMS. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection, thereby providing a degree of confidentiality. The encryption strength of mechanism is selected based on the security categorization of the information. DoD-approved cryptography is as specified in the NIST publication FIPS PUB 140-2, "Security Requirements for Cryptographic Modules." Additionally, for classified systems, NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review system documentation to determine whether the system handles classified information. If the system does not handle classified information, this is not applicable (NA). Review DBMS settings to determine if the database is configured to accept remote connections. If the database is not configured to accept remote connections, this is not a finding. Check DBMS settings to determine whether the data for remote connections is being encrypted with DoD-approved cryptography. If data for remote connections is not being encrypted with DoD-approved cryptography, this is a finding. Configure the DBMS to encrypt data passing over remote connections using DoD-approved encryption appropriate to the sensitivity level. Without the ability to immediately disconnect or disable remote access, an attack or other compromise in progress would not be immediately stopped. The capability must exist to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of missions/business functions and the need to eliminate immediate or future remote access to organizational information systems. The remote access application (e.g., VPN client) may implement features such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Review the DBMS architecture and deployment. If the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access does not exist, this is a finding. Deploy a DBMS with the capability to immediately disconnect current users remotely accessing the information system, and disable further remote access. Enable the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a delayed or incomplete analysis of an ongoing attack. The content captured in audit records must be managed from a central location (necessitating automation). Centralized management of audit records and logs provides for efficiency in maintenance and management of records, as well as the backup and archiving of those records. The DBMS may write audit records to database tables, to files in the file system, to other kinds of local repository, or directly to a centralized log management system. Whatever the method used, it must be compatible with off-loading the records to the centralized system. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed. If the DBMS audit records are not written directly to or systematically transferred to a centralized log management system, this is a finding. Configure and/or deploy software tools to ensure that DBMS audit records are written directly to or systematically transferred to a centralized log management system. If the configuration of the DBMS's auditing is spread across multiple locations in the database management software, or across multiple commands, only loosely related, it is harder to use and takes longer to reconfigure in response to events. The DBMS must provide a unified tool for audit configuration. Review DBMS vendor documentation. If the DBMS does not provide a unified tool for audit configuration, this is a finding. Deploy a DBMS that provides a unified tool for audit configuration. In order to ensure sufficient storage capacity for the audit logs, the DBMS must be able to allocate audit record storage capacity. Although another requirement (SRG-APP-000515-DB-000318) mandates that audit data be off-loaded to a centralized log management system, it remains necessary to provide space on the database server to serve as a buffer against outages and capacity limits of the off-loading mechanism. The task of allocating audit record storage capacity is usually performed during initial installation of the DBMS and is closely associated with the DBA and system administrator roles. The DBA or system administrator will usually coordinate the allocation of physical drive space with the application owner/installer and the application will prompt the installer to provide the capacity information, the physical location of the disk, or both. In determining the capacity requirements, consider such factors as: total number of users; expected number of concurrent users during busy periods; number and type of events being monitored; types and amounts of data being captured; the frequency/speed with which audit records are off-loaded to the central log management system; and any limitations that exist on the DBMS's ability to reuse the space formerly occupied by off-loaded records. Investigate whether there have been any incidents where the DBMS ran out of audit log space since the last time the space was allocated or other corrective measures were taken. If there have been, this is a finding. Allocate sufficient audit file/table space to support peak demand. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Review the system documentation for a description of how audit records are off-loaded. If the DBMS has a continuous network connection to the centralized log management system, but the DBMS audit records are not written directly to the centralized log management system or transferred in near-real-time, this is a finding. If the DBMS does not have a continuous network connection to the centralized log management system, and the DBMS audit records are not transferred to the centralized log management system weekly or more often, this is a finding. Configure the DBMS or deploy and configure software tools to transfer audit records to a centralized log management system, continuously and in near-real time where a continuous network connection to the log management system exists, or at least weekly in the absence of such a connection. Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to the DBMS on its own server will not be an issue. However, space will still be required on the DBMS server for audit records in transit, and, under abnormal conditions, this could fill up. Since a requirement exists to halt processing upon audit failure, a service outage would result. If support personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion. The appropriate support staff include, at a minimum, the ISSO and the DBA/SA. Review system configuration. If appropriate support staff are not notified immediately upon storage volume utilization reaching 75%, this is a finding. Configure the system to notify appropriate support staff immediately upon storage volume utilization reaching 75%. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability, and system operation may be adversely affected. Alerts provide organizations with urgent messages. Real-time alerts provide these messages immediately (i.e., the time from event detection to alert occurs in seconds or less). Review the system documentation to determine which audit failure events require real-time alerts. Review the DBMS settings and code. If the real-time alerting that is specified in the documentation is not enabled, this is a finding. Configure the system to provide an immediate real-time alert to appropriate support staff when a specified audit failure occurs. When availability is an overriding concern, approved actions in response to an audit failure are as follows: (i) If the failure was caused by the lack of audit record storage capacity, the DBMS must continue generating audit records, if possible (automatically restarting the audit service if necessary), overwriting the oldest audit records in a first-in-first-out manner. (ii) If audit records are sent to a centralized collection server and communication with this server is lost or the server fails, the DBMS must queue audit records locally until communication is restored or until the audit records are retrieved manually. Upon restoration of the connection to the centralized collection server, action should be taken to synchronize the local audit data with the collection server. Systems where availability is paramount will most likely be MAC I; the final determination is the prerogative of the application owner, subject to Authorizing Official concurrence. In any case, sufficient auditing resources must be allocated to avoid audit data loss in all but the most extreme situations. If the application owner has determined that the need for system availability does not outweigh the need for a complete audit trail, this is not applicable (NA). Review DBMS, OS, or third-party logging application settings and/or documentation to determine whether the system is capable of continuing to generate audit records, overwriting the oldest existing records, in the case of an auditing failure. If it is not, this is a finding. If the system is capable of continuing to generate audit records upon audit failure but is not configured to do so, this is a finding. Deploy a DBMS capable of continuing to generate audit records upon audit failure. Configure the system to continue to generate audit records, overwriting the oldest existing records, in the case of an auditing failure. If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the DBMS must include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Some DBMS products offer a data type called TIMESTAMP that is not a representation of date and time. Rather, it is a database state counter and does not correspond to calendar and clock time. This requirement does not refer to that meaning of TIMESTAMP. Verify that the DBMS generates time stamps, in audit records and application data, that maps to UTC. If it does not, this is a finding. Ensure the DBMS generates time stamps, in audit records and application data, that maps to UTC. Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the DBMS must include date and time. Granularity of time measurements refers to the precision available in time stamp values. Granularity coarser than one second is not sufficient for audit trail purposes. Time stamp values are typically presented with three or more decimal places of seconds; however, the actual granularity may be coarser than the apparent precision. For example, SQL Server's GETDATE()/CURRENT_TMESTAMP values are presented to three decimal places, but the granularity is not one millisecond: it is about 1/300 of a second. Review product documentation to verify that the DBMS can generate time stamps with a granularity of one second or finer. If it cannot, this is a finding. Review audit log records produced by the DBMS for confirmation that time stamps are recorded to a precision of one second or finer. If not, this is a finding. Review time stamp values in audit trail columns/fields in application data in the database. If the time stamps are not recorded to a precision of one second or finer, this is a finding. Deploy a DBMS that can generate and record time stamps with a granularity of one second or finer. Configure auditing so that the time stamps are recorded to a precision of one second or finer. Modify applications and/or column/field definitions so that the time stamps in audit trail columns/fields in application data are recorded to a precision of one second or finer. If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important forensic information may be lost. This requirement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real time, within minutes, or within hours. If the DBMS does not provide the ability for users in authorized roles to reconfigure auditing at any time of the user's choosing, this is a finding. If changes in audit configuration cannot take effect until after a certain time or date, or until some event, such as a server restart, has occurred, and if that time or event does not meet the requirements specified by the application owner, this is a finding. Deploy a DBMS that provides the ability for users in authorized roles to reconfigure auditing at any time. Deploy a DBMS that allows audit configuration changes to take effect within the timeframe required by the application owner and without involving actions or events that the application owner rules unacceptable. To aid in diagnosis, it is necessary to keep track of failed attempts in addition to the successful ones. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to retrieve privileges/permissions/role membership. If the DBMS is currently required to audit the retrieval of privilege/permission/role membership information, review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS denies retrieval of privileges/permissions/role memberships. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent retrieval of privileges/permissions/role memberships. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to privileges/permissions/role membership. If currently required, configure the DBMS to produce audit records when it denies access to privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent access to privileges/permissions/role membership. Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevated privileges give users access to information and functionality that they should not have; restricted privileges wrongly deny access to authorized users. In an SQL environment, adding permissions is typically done via the GRANT command, or, in the negative, the DENY command. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are added. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are added. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are added. Configure the DBMS to produce audit records when privileges/permissions/role memberships are added. Failed attempts to change the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized attempts to elevate or restrict privileges could go undetected. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to add privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS denies the addition of privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent the addition of privileges/permissions/role membership. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to add privileges/permissions/role membership. Configure the DBMS to produce audit records when it denies attempts to add privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent attempts to add privileges/permissions/role membership. In an SQL environment, modifying permissions is typically done via the GRANT, REVOKE, and DENY commands. If there is no distinction in the DBMS's security architecture between modifying permissions on the one hand, and adding and deleting permissions on the other hand, this is not a finding. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are modified. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are modified. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are modified. Configure the DBMS to produce audit records when privileges/permissions/role memberships are modified. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify privileges/permissions/role membership. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to modify privileges/permissions/role membership. Configure the DBMS to produce audit records when it denies attempts to modify privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent attempts to modify privileges/permissions/role membership. In an SQL environment, deleting permissions is typically done via the REVOKE or DENY command. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Configure DBMS audit settings to generate an audit record when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts remove, revoke, or deny privileges/permissions/role membership to any user or role. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Configure the DBMS to produce audit records when it denies attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Configure the DBMS to produce audit records when other errors prevent attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via specialized security functionality. In an SQL environment, types of access include, but are not necessarily limited to: If the DBMS architecture makes it impossible for any user, even with the highest privileges, to directly view or directly modify the contents of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are accessed. Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to access security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to access security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to access security object. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to security objects, such as tables, views, procedures, and functions. Configure the DBMS to produce audit records when it denies access to security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Configure the DBMS to produce audit records when other errors prevent access to security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Changes in the database objects (tables, views, procedures, functions) that record and control permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized changes to the security subsystem could go undetected. The database could be severely compromised or rendered inoperative. If the DBMS architecture makes it impossible for any user, even with the highest privileges, to modify the structure and logic of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects are modified. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects are modified. Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are modified. Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are modified. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify security objects. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to modify security objects, such as tables, views, procedures, and functions. Configure the DBMS to produce audit records when it denies attempts to modify security objects, to include reads, creations, modifications, and deletions. Configure the DBMS to produce audit records when other errors prevent attempts to modify security objects, to include reads, creations, modifications, and deletions. The removal of security objects from the database/DBMS would seriously degrade a system's information assurance posture. If such an event occurs, it must be logged. If the DBMS architecture makes it impossible for any user, even with the highest privileges, to drop its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects are drop. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects are drop. Deploy a DBMS capable of producing the required audit records when security objects are deleted. Configure the DBMS to produce audit records when security objects are deleted. The removal of security objects from the database/DBMS would seriously degrade a system's information assurance posture. If such an action is attempted, it must be logged. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to drop security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to drop security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to drop security objects. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to delete security objects. Configure the DBMS to produce audit records when it denies attempts to delete security objects. Configure the DBMS to produce audit records when other errors prevent attempts to delete security objects. Changes in categories of information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer to FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems, and FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems. Review DBMS documentation to verify that audit records can be produced when categories of information are accessed, to include reads, creations, modifications, and deletions. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are accessed, to include reads, creations, modifications, and deletions. Deploy a DBMS capable of producing the required audit records when categories of information are accessed. Configure the DBMS to produce audit records when categories of information are accessed, to include reads, creations, modifications, and deletions. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to access categories of information, such access to include reads, creations, modifications and deletions. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to access categories of information, such access to include reads, creations, modifications and deletions. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to access categories of information, such access to include reads, creations, modifications and deletions. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to categories of information. Configure the DBMS to produce audit records when it denies access to categories of information, such access to include reads, creations, modifications and deletions. Configure the DBMS to produce audit records when other errors prevent access to categories of information, such access to include reads, creations, modifications and deletions. Review DBMS documentation to verify that audit records can be produced when categories of information are modified. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are modified. Deploy a DBMS capable of producing the required audit records when categories of information are modified. Configure the DBMS to produce audit records when categories of information are modified. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify categories of information. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete modification of categories of information. Configure the DBMS to produce audit records when it denies modification of categories of information. Configure the DBMS to produce audit records when other errors prevent modification of categories of information. Review DBMS documentation to verify that audit records can be produced when categories of information are deleted. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are deleted. Deploy a DBMS capable of producing the required audit records when categories of information are deleted. Configure the DBMS to produce audit records when categories of information are deleted. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to delete categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to delete categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to delete categories of information. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete deletion of categories of information. Configure the DBMS to produce audit records when it denies deletion of categories of information. Configure the DBMS to produce audit records when other errors prevent deletion of categories of information. For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to the DBMS. Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) logs on or connects to the DBMS, this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) logs on or connects to the DBMS. Ensure that the audit record contains the time of the event, the user ID, and session identifier. For completeness of forensic analysis, it is necessary to track failed attempts to log on to the DBMS. While positive identification may not be possible in a case of failed authentication, as much information as possible about the incident must be captured. Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) attempts but fails to log on or connect to the DBMS (including attempts where the user ID is invalid/unknown), this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) attempts but fails to log on or connect to the DBMS. Include attempts where the user ID is invalid/unknown. Ensure that the audit record contains the time of the event and the user ID that was entered (if any). For completeness of forensic analysis, it is necessary to know how long a user's (or other principal's) connection to the DBMS lasts. This can be achieved by recording disconnections, in addition to logons/connections, in the audit logs. Disconnection may be initiated by the user or forced by the system (as in a timeout) or result from a system or network failure. To the greatest extent possible, all disconnections must be logged. Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) logs off or disconnects from the DBMS voluntarily, or forced by the system, or because of connection or other failure, this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) logs off or disconnects, whether voluntarily or forced by the system, or because of connection or other failure, from the DBMS. Ensure that the audit record contains the time of the event, the user ID, and session identifier. For completeness of forensic analysis, it is necessary to track who logs on to the DBMS. Concurrent connections by the same user from multiple workstations may be valid use of the system; or such connections may be due to improper circumvention of the requirement to use the CAC for authentication; or they may indicate unauthorized account sharing; or they may be because an account has been compromised. (If the fact of multiple, concurrent logons by a given user can be reliably reconstructed from the log entries for other events (logons/connections; voluntary and involuntary disconnections), then it is not mandatory to create additional log entries specifically for this.) Review the DBMS audit settings. If the fact of multiple, concurrent logons by a given user (or other principal) can be reliably reconstructed from the log entries for other events, then this is not a finding. If an audit record is not generated each time a user (or other principal) who is already connected to the DBMS logs on or connects to the DBMS from a different workstation, this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) who is already connected to the DBMS logs on or connects to the DBMS from a different workstation. Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. A privileged function in this context is any operation that modifies the structure of the database, its built-in logic, or its security settings. This would include all Data Definition Language (DDL) statements and all security-related statements. In an SQL environment, it encompasses, but is not necessarily limited to: There may also be Data Manipulation Language (DML) statements that, subject to context, should be regarded as privileged. Possible examples in SQL include: Depending on the capabilities of the DBMS and the design of the database and associated applications, audit logging may be achieved by means of DBMS auditing features, database triggers, other mechanisms, or a combination of these. Note that it is particularly important to audit, and tightly control, any action that weakens the implementation of this requirement itself, since the objective is to have a complete audit trail of all administrative activity. Review DBMS documentation to verify that authorized administrative users can designate actions as privileged and that audit records can be produced when privileged actions occur. Review the DBMS/database security and audit configurations and/or other means used to implement audit logging. If audit logging covers at least all of the actions defined as privileged, this is not a finding; otherwise, this is a finding. Deploy a DBMS capable of producing the required audit records when privileged actions occur. Configure the DBMS to produce audit records when privileged actions occur. Review DBMS documentation to verify that authorized administrative users can designate actions as privileged and that audit records can be produced when the DBMS prevents attempted privileged actions. Review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS prevents attempted privileged actions. Deploy a DBMS capable of producing the required audit records when the DBMS prevents attempted privileged action. Configure the DBMS to produce audit records when the DBMS prevents attempted privileged actions. Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited and can specify which kinds of access must be audited. Review system documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited. Review the DBMS/database security and audit settings to verify that the specified access to the specified objects is audited. If not, this is a finding. Deploy a DBMS capable of producing the required audit records when object access occurs. Configure audit settings to create audit records when the specified access to the specified objects occurs. Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited, and can specify which kinds of access must be audited. Review DBMS documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited. Review the DBMS/database security and audit settings to verify that audit records are created for unsuccessful attempts at the specified access to the specified objects. Configure audit settings to create audit records when the specified access to the specified objects is unsuccessfully attempted. In this context, direct access is any query, command, or call to the DBMS that comes from any source other than the application(s) that it supports. Examples would be the command line or a database management utility program. The intent is to capture all activity from administrative and non-standard sources. If the DBMS does not generate audit records for all direct access to the database(s), this is a finding. Configure the DBMS to generate audit records for all direct access to the database(s). Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the system. When dealing with access restrictions pertaining to change control, it should be noted that any changes to the hardware, software, and/or firmware components of the information system can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals should be allowed to obtain access to system components for the purposes of initiating changes, including upgrades and modifications. Review DBMS vendor documentation with respect to its ability to enforce access restrictions associated with changes to the configuration of the DBMS or database(s). If it is not able to do this, this is a finding. Review the security configuration of the DBMS and database(s). If it does not enforce access restrictions associated with changes to the configuration of the DBMS or database(s), this is a finding. Deploy a DBMS capable of enforcing access restrictions associated with changes to the configuration of the DBMS or database(s). Configure the DBMS to enforce access restrictions associated with changes to the configuration of the DBMS or database(s). Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an audit trail would not be available for forensic investigation for after-the-fact actions. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to change the configuration of the DBMS or database(s). Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to change the configuration of the DBMS or database(s). Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to change the configuration of the DBMS or database(s). Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to change the configuration of the DBMS or database(s). Configure the DBMS to produce audit records when it denies attempts to change the configuration of the DBMS or database(s). Configure the DBMS to produce audit records when other errors prevent attempts to change the configuration of the DBMS or database(s). If the DBMS were to allow any user to make changes to database structure or logic, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. Identify the group(s)/role(s) established for DBMS modification. Obtain the list of users in those group(s)/roles. Identify the individuals authorized to modify the DBMS. If unauthorized access to the group(s)/role(s) has been granted, this is a finding. Revoke unauthorized memberships in the DBMS modification group(s)/role(s). Configuring the DBMS to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. In addition to this SRG, sources of guidance on security and information assurance exist. These include NSA configuration guides, CTOs, DTMs, and IAVMs. The DBMS must be configured in compliance with guidance from all such relevant sources. Review the DBMS documentation and configuration to determine if the DBMS is configured in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs. If the DBMS is not configured in accordance with security configuration settings, this is a finding. Configure the DBMS in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs. Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. Review the network functions, ports, protocols, and services supported by the DBMS. If any protocol is prohibited by the PPSM guidance and is enabled, this is a finding. Deploy a DBMS capable of disabling a network function, port, protocol, or service prohibited by the PPSM guidance. Disable each prohibited network function, port, protocol, or service. Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceed the rights of a regular user. DBMS functionality and the nature and requirements of databases will vary; so while users are not permitted to install unapproved software, there may be instances where the organization allows the user to install approved software packages such as from an approved software repository. The requirements for production servers will be more restrictive than those used for development and research. The DBMS must enforce software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization). In the case of a database management system, this requirement covers stored procedures, functions, triggers, views, etc. If the DBMS supports only software development, experimentation and/or developer-level testing (that is, excluding production systems, integration testing, stress testing, and user acceptance testing), this is not a finding. Review the DBMS and database security settings with respect to non-administrative users' ability to create, alter, or replace logic modules, to include but not necessarily only stored procedures, functions, triggers, and views. If any such permissions exist and are not documented and approved, this is a finding. Document and obtain approval for any non-administrative users who require the ability to create, alter or replace logic modules. Implement the approved permissions. Revoke any unapproved permissions. If cached authentication information is out-of-date, the validity of the authentication information may be questionable. Review system settings to determine whether the organization-defined limit for cached authentication is implemented. If it is not implemented, this is a finding. Modify system settings to implement the organization-defined limit on the lifetime of cached authenticators. The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physical token bearing a valid, current, DoD-issued Public Key Infrastructure (PKI) certificate, coupled with a Personal Identification Number (PIN) to be entered by the user at the beginning of each session and whenever re-authentication is required. Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capability to change security roles or escalate the functional capability of the application, it is critical the user re-authenticate. In addition to the re-authentication requirements associated with session locks, organizations may require re-authentication of individuals and/or devices in other situations, including (but not limited to) the following circumstances: (i) When authenticators change; (ii) When roles change; (iii) When security categories of information systems change; (iv) When the execution of privileged functions occurs; (v) After a fixed period of time; or (vi) Periodically. Within the DoD, the minimum circumstances requiring re-authentication are privilege escalation and role changes. Review the system documentation and the configuration of the DBMS and related applications and tools. If there are any circumstances under which a user is not required to re-authenticate when changing role or escalating privileges, this is a finding. If the information owner has identified additional cases where re-authentication is needed, but there are circumstances where the system does not ask the user to re-authenticate when those cases occur, this is a finding. Modify and/or configure the DBMS and related applications and tools so that users are always required to re-authenticate when changing role or escalating privileges. Modify and/or configure the DBMS and related applications and tools so that users are always required to re-authenticate when the specified cases needing reauthorization occur. The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse. Review the DBMS architecture to find out if and how it protects the private resources of one process or user (such as working memory, temporary tables, uncommitted data) from unauthorized access by another user or process. If it does not effectively do so, this is a finding. Deploy a DBMS capable of effectively protecting the private resources of one process or user from unauthorized access by another user or process. Configure the DBMS to effectively protect the private resources of one process or user from unauthorized access by another user or process. Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Permitting only DBMS processes and authorized, administrative users to have access to the files where the database resides helps ensure that those files are not shared inappropriately and are not open to backdoor access and manipulation. Review the permissions granted to users by the operating system/file system on the database files, database log files and database backup files. If any user/role who is not an authorized system administrator with a need to know or database administrator with a need to know, or a system account for running DBMS processes, is permitted to read/view any of these files, this is a finding. Configure the permissions granted by the operating system/file system on the database files, database log files, and database backup files so that only relevant system accounts and authorized system administrators and database administrators with a need to know are permitted to read/view these files. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, the DBMS, associated applications, and infrastructure must leverage transmission protection mechanisms. If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. If the DBMS does not employ protective measures against unauthorized disclosure and modification during preparation for transmission, this is a finding. Implement protective measures against unauthorized disclosure and modification during preparation for transmission. Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. This requirement applies only to those applications that are either distributed or can allow access to data nonlocally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When receiving data, the DBMS, associated applications, and infrastructure must leverage protection mechanisms. If the DBMS, associated applications, and infrastructure do not employ protective measures against unauthorized disclosure and modification during reception, this is a finding. Implement protective measures against unauthorized disclosure and modification during reception. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. It is the responsibility of the data owner to assess the cryptography requirements in light of applicable federal laws, Executive Orders, directives, policies, regulations, and standards. NSA-approved cryptography for classified networks is hardware based. This requirement addresses the compatibility of a DBMS with the encryption devices. If the DBMS is deployed in an unclassified environment, this is not applicable (NA). If the DBMS is incompatible with the use of NSA-approved cryptography, this is a finding. If the DBMS is capable but does not use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards, this is a finding. Deploy a DBMS compatible with the use of NSA-approved cryptography. Configure the DBMS and related system components to use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. For detailed information, refer to NIST FIPS Publication 140-2, Security Requirements For Cryptographic Modules. Note that the product's cryptographic modules must be validated and certified by NIST as FIPS-compliant. If the DBMS does not employ NIST FIPS 140-2 validated cryptographic modules to provision digital signatures, this is a finding. Implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures. If the DBMS does not employ NIST FIPS 140-2 validated cryptographic modules to generate and verify cryptographic hashes, this is a finding. Implement a NIST FIPS 140-2 validated cryptographic module in the DBMS for generation and verification of cryptographic hashes. If the DBMS contains, or is intended to contain, unclassified information requiring confidentiality and cryptographic protection, and does not employ NIST FIPS 140-2 validated cryptographic modules to provide this protection, this is a finding. Implement NIST FIPS 140-2 validated cryptographic modules to provide cryptographic protection for the unclassified information that requires it. One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers based on patterns in identifiers already known. The preferred technique for thwarting guesses at Session IDs is the generation of unique session identifiers using a FIPS 140-2 approved random number generator. However, it is recognized that available DBMS products do not all implement the preferred technique yet may have other protections against session hijacking. Therefore, other techniques are acceptable, provided they are demonstrated to be effective. Review DBMS vendor documentation and system behavior (and if necessary, consult vendor representatives) to determine whether the DBMS can provide demonstrably effective protection against man-in-the-middle attacks that guess at session identifier values. Review DBMS settings to determine whether protections against man-in-the-middle attacks that guess at session identifier values are enabled. If they are not, this is a finding. Utilize a DBMS product that can provide demonstrably effective protection against man-in-the-middle attacks that guess at session identifier values. Configure DBMS settings to enable protections against man-in-the-middle attacks that guess at session identifier values. Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. This requirement focuses on communications protection for the DBMS session rather than for the network packet. If the DBMS will accept non-DoD approved PKI end-entity certificates, this is a finding. Revoke trust in any certificates not issued by a DoD-approved certificate authority. Configure the DBMS to accept only DoD and DoD-approved PKI end-entity certificates. DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. These cryptographic mechanisms may be native to the DBMS or implemented via additional software or operating system/file system settings, as appropriate to the situation. Selection of a cryptographic mechanism is based on the need to protect the integrity of organizational information. The strength of the mechanism is commensurate with the security category and/or classification of the information. Organizations have the flexibility to either encrypt all information on storage devices (i.e., full disk encryption) or encrypt specific data structures (e.g., files, records, or fields). The decision whether and what to encrypt rests with the data owner and is also influenced by the physical measures taken to secure the equipment and media on which the information resides. Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding. Configure the DBMS, operating system/file system, and additional software as relevant, to provide the required level of cryptographic protection. Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from disclosure, which must include, at a minimum, PII and classified information. If the documentation indicates no information requires such protections, this is not a finding. If any of the information defined as requiring protection is not encrypted in a manner that provides the required level of protection and is not physically secured to the required level, this is a finding. Configure the DBMS, operating system/file system, and additional software as relevant, to provide the required level of cryptographic protection for information requiring cryptographic protection against disclosure. Secure the premises, equipment, and media to provide the required level of physical protection. Database management systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each process has a distinct address space so that communication between processes is controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. Review the DBMS architecture to find out if and how it protects the private resources of one process (such as working memory, temporary tables, uncommitted data and, especially, executable code) from unauthorized access or modification by another user or process. If it is not capable of maintaining a separate execution domain for each executing process, this is a finding. If the DBMS is capable of maintaining a separate execution domain for each executing process, but is configured not to do so, this is a finding. Deploy a DBMS capable of maintaining a separate execution domain for each executing process. If this is a configurable feature, configure the DBMS to implement it. Previous versions of DBMS components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some DBMSs' installation tools may remove older versions of software automatically from the information system. In other cases, manual review and removal will be required. In planning installations and upgrades, organizations must include steps (automated, manual, or both) to identify and remove the outdated modules. A transition period may be necessary when both the old and the new software are required. This should be taken into account in the planning. If software components that have been replaced or made unnecessary are not removed, this is a finding. Identify and remove software components that have been replaced or made unnecessary. Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously. Organization-defined time periods for updating security-relevant software may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). This requirement will apply to software patch management solutions that are used to install patches across the enclave and also to applications themselves that are not part of that patch management solution. For example, many browsers today provide the capability to install their own patch software. Patch criticality, as well as system criticality, will vary. Therefore, the tactical situations regarding the patch management process will also vary. This means that the time period utilized must be a configurable parameter. Time frames for application of security-relevant software updates may be dependent upon the Information Assurance Vulnerability Management (IAVM) process. The application will be configured to check for and install security-relevant software updates within an identified time period from the availability of the update. The specific time period will be defined by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs). Obtain evidence that software patches are consistently applied to the DBMS within the time frame defined for each patch. If such evidence cannot be obtained, or the evidence that is obtained indicates a pattern of noncompliance, this is a finding. Institute and adhere to policies and procedures to ensure that patches are consistently applied to the DBMS within the time allowed. With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection. It takes advantage of the dynamic execution capabilities of various programming languages, including dialects of SQL. In such cases, the attacker deduces the manner in which SQL statements are being processed, either from inside knowledge or by observing system behavior in response to invalid inputs. When the attacker identifies scenarios where SQL queries are being assembled by application code (which may be within the database or separate from it) and executed dynamically, the attacker is then able to craft input strings that subvert the intent of the query. Potentially, the attacker can gain unauthorized access to data, including security settings, and severely corrupt or destroy the database. The principal protection against code injection is not to use dynamic execution except where it provides necessary functionality that cannot be utilized otherwise. Use strongly typed data items rather than general-purpose strings as input parameters to task-specific, pre-compiled stored procedures and functions (and triggers). Review DBMS source code (stored procedures, functions, triggers) and application source code, to identify cases of dynamic code execution. If dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, this is a finding. Where dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, modify the code to do so. When dynamic execution is necessary, ways to mitigate the risk include the following, which should be implemented both in the on-screen application and at the database level, in the stored procedures: -- Allow strings as input only when necessary. -- Rely on data typing to validate numbers, dates, etc. Do not accept invalid values. If substituting other values for them, think carefully about whether this could be subverted. -- Limit the size of input strings to what is truly necessary. -- If single quotes/apostrophes, double quotes, semicolons, equals signs, angle brackets, or square brackets will never be valid as input, reject them. -- If comment markers will never be valid as input, reject them. In SQL, these are -- or /* */ -- If HTML and XML tags, entities, comments, etc., will never be valid, reject them. -- If wildcards are present, reject them unless truly necessary. In SQL these are the underscore and the percentage sign, and the word ESCAPE is also a clue that wildcards are in use. -- If SQL key words, such as SELECT, INSERT, UPDATE, DELETE, CREATE, ALTER, DROP, ESCAPE, UNION, GRANT, REVOKE, DENY, MODIFY will never be valid, reject them. Use case-insensitive comparisons when searching for these. Bear in mind that some of these words, particularly Grant (as a person's name), could also be valid input. -- If there are range limits on the values that may be entered, enforce those limits. -- Institute procedures for inspection of programs for correct use of dynamic coding, by a party other than the developer. -- Conduct rigorous testing of program modules that use dynamic coding, searching for ways to subvert the intended use. -- Record the inspection and testing in the system documentation. -- Bear in mind that all this applies not only to screen input, but also to the values in an incoming message to a web service or to a stored procedure called by a software component that has not itself been hardened in these ways. Not only can the caller be subject to such vulnerabilities; it may itself be the attacker. Review DBMS source code (stored procedures, functions, triggers) and application source code to identify cases of dynamic code execution. If dynamic code execution is employed without protective measures against code injection, this is a finding. Where dynamic code execution is used, modify the code to implement protections against code injection. A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or unintended system behavior caused by invalid inputs, where information system responses to the invalid input may be disruptive or cause the system to fail into an unsafe state. The behavior will be derived from the organizational and system requirements and includes, but is not limited to, notification of the appropriate personnel, creating an audit record, and rejecting invalid input. Review system documentation to determine how input errors are to be handled in general and if any special handling is defined for specific circumstances. Review the source code for database program objects (stored procedures, functions, triggers) and application source code to identify how the system responds to invalid input. If it does not implement the documented behavior, this is a finding. Revise and deploy the source code for database program objects (stored procedures, functions, triggers) and application source code, to implement the documented behavior. OS/enterprise authentication and identification must be used (SQL2-00-023600). Native DBMS authentication may be used only when circumstances make it unavoidable; and must be documented and AO-approved. The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval. In such cases, the DoD standards for password complexity and lifetime must be implemented. DBMS products that can inherit the rules for these from the operating system or access control program (e.g., Microsoft Active Directory) must be configured to do so. For other DBMSs, the rules must be enforced using available configuration parameters or custom code. f DBMS authentication, using passwords, is not employed, this is not a finding. If the DBMS is configured to inherit password complexity and lifetime rules from the operating system or access control program, this is not a finding. Review the DBMS settings relating to password complexity. Determine whether the following rules are enforced. If any are not, this is a finding. a. minimum of 15 characters, including at least one of each of the following character sets: - Upper-case - Lower-case - Numerics - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <) b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight Review the DBMS settings relating to password lifetime. Determine whether the following rules are enforced. If any are not, this is a finding. a. Password lifetime limits: Minimum 24 hours, maximum 60 days b. Number of password changes before an old one may be reused: Minimum of five If the use of passwords is not needed, configure the DBMS to prevent their use if it is capable of this; if it is not so capable, institute policies and procedures to prohibit their use. If the DBMS can inherit password complexity rules from the operating system or access control program, configure it to do so. Otherwise, use DBMS configuration parameters and/or custom code to enforce the following rules for passwords: c. Password lifetime limits: Minimum 24 hours, maximum 60 days d. Number of password changes before an old one may be reused: Minimum of five
cc/2019-30/en_middle_0029.json.gz/line3897
__label__wiki
0.622589
0.622589
Image Comics Presents ‘Excellence’ OckyDub, 5 months ago 0 2 min read 675 While I haven’t actually purchased comics in a 4 years, Image comics will always hold a special place for me due to it being the home of my favorite character ‘Spawn’. Before Black Panther gained mainstream name recognition, Black protagonist Al Simmons (Spawn) was the necrotic face of Image comics. He was a Black hero with his own stand alone popular series back when BP was a D-lister at Marvel. Pushing the envelope again Image has a new comic coming soon titled ‘Excellence’ whose creative team is entirely Black. The new action – fantasy comic from Khary Randolph, Brandon Thomas and Emilio Lopez; follows protagonist Spencer Dales and his involvement in Aegis, a secret society of magicians. Check out the press release from the creators and trailer below. In the press release, Brandon Thomas describes the series as: “Excellence is all about contrasts—characters that are capable of doing these impossible things, but whose abilities are largely defined by others. This conflict explodes within a relationship between a father and son that have very different ideas about who should benefit from this power, and how long they’re supposed to wait around for things to get ‘better.’ Like most popular genres, fantasy is in desperate need of expansion, and we’re excited and honored to fill that void with this action-packed series, as we agree with our protagonist…it’s now or never.” Khary Randolph adds: “One of the major themes of this book was generational rifts, so from every aspect of the world building, I tried to mash up the old with the new. Taking visual cues from artists like Jim Steranko, Hitchcock, and Saul Bass and remixing them with anime, hip-hop, and video game influences. At the end of the day, we’re just trying to create a world that is beautiful to look at but also resonates on a deeper emotional level.” If the series is good and BLERDS make it a hit, here’s to hoping that creators, producers and networks (OWN, Netflix, Jordan Peele, Michael B Jordan or Ryan Coogler) with millions under their belts can make it a live action show. I mean OWN is due for a supernatural science fiction show right? Excellence #1 will hit comic shelves on Wednesday, May 8. Tags #Brandon Thomas #Comics #Emilio Lopez #Graphic Novels #Image comics #Khary Randolph OckyDub Octavius is the co-founder and editor of Cypher Avenue. He's currently enjoying Baki along with Grace & Frankie on Netflix. WATCH: Bry’Nt Walks Down A Lonely Road In “Las Vegas” Where Is My Band Of Brothers? OckyDub, 5 years ago 11 min read Books, Entertainment, Film, Television, Video Games I’m Down to my Last Black Nerds Sci-Fi group on Facebook Featured, Sports TV Producer Fired for Truthfully Calling Tom Brady a Cheater OckyDub, 6 months ago 1 min read Entertainment, Television Atlanta – Season 2 Coming March 1st 2018 Gynandromorphy: Half Male Half Female
cc/2019-30/en_middle_0029.json.gz/line3898
__label__wiki
0.771304
0.771304
Democrats To Fly Psychiatrists To Washington To Question Trump’s Mental Health NICHOLAS KAMM/AFP/Getty Images David Krayden Ottawa Bureau Chief June 05, 2019 12:24 PM ET Democrats want to bring a panel of psychiatrists to Washington to suggest that President Donald Trump is mentally unfit to be president. Kentucky Democratic Rep. John Yarmuth has been tasked with coordinating the project, now planned for July, the Washington Examiner reported Wednesday. “We’re planning to put together an event … a town hall. We haven’t actually determined the format,” Yarmuth said. Dr. Bandy Lee, a persistent critic of the president who believes Trump’s state of mental health makes him unfit for office, is slated to lead the team of psychiatrists. Lee teaches at the Yale School of Medicine and is the editor of the book, “The Dangerous Case of Donald Trump.” (RELATED: ‘Morning Joe’ Brings On Economist To Discuss Trump’s Mental State) Bandy Lee FRANCE 24 English Youtube screenshot Despite Lee’s insistence that the president may be crazy, she has never spoken to Trump, let alone provided any psychiatric evaluation. As the Examiner notes, that lack of personal contact is seen as a show stopper for many in the psychiatric profession who believe it is impossible to make any kind of mental health assessment based on remote observation. But Lee, who has said she wants to “contain” Trump for analysis, notes she isn’t issuing a formal diagnosis, just acknowledging that there is a problem. “The president’s condition has been visibly deteriorating to the point where there’s a lot of talk right now about his mental state beyond mental health professionals,” Lee told the Examiner. “It no longer takes a mental health professional to recognize the seriousness of the current presidency.” (RELATED: Group Wants Psychiatric Star Chamber To Declare Trump Mentally Unfit To Be President) Yarmuth claims that the event was meant to be bipartisan and he will still invite every representative in the House even though there hasn’t been any interest expressed by Republicans. The congressman told the Examiner that he may not proceed with the town hall if only Democrats are in attendance. Rep. John Yarmuth speaks during the Protecting Working Families Tour at The Galt House Hotel on Dec. 1, 2017 in Louisville, Kentucky. (Photo by Stephen Cohen/Getty Images for MoveOn.org) Disgraced former Democratic Minnesota Sen. Al Franken once suggested that some Republicans in Congress were also concerned about Trump’s mental health. Democratic California Rep. Maxine Waters has also suggested there is something amiss with the president’s mental health. Lee plans to show a video that was recorded at the National Press Club last March, in which 13 academics talk about how Trump is supposedly unfit for office due to his alleged mental health issues. The “experts” all say that a man of Trump’s temperament should not have his finger near the nuclear button or be trusted to deal with climate change. Follow David on Twitter Tags : bandy lee donald trump john yarmuth mental health David Krayden Follow David on Twitter. Send tips to Krayden@dailycaller.com
cc/2019-30/en_middle_0029.json.gz/line3901
__label__cc
0.644192
0.355808
Dan Holzmann story of Leaving JuicePlus 3rd July 2019 21st December 2018 Juan Richardo Dan Holzmann, the founder, and CEO of the most sought-after health company in the world called Juice Plus is a good man that dreams to share his success with other people. JuicePlus with Dan Holzmann had humble beginnings. With the proper implementation of Holzmann’s excellent leadership, knowledge, and skills, the small company slowly turned into a giant company. Dan Holzmann started to work in the Swiss mail-order warehouse of the JuicePlus way back in 1993. Before, Juice Plus is an American direct sales company that only had four employees in Switzerland. The Organization slowly grows in the industry armed with his dedication to bringing success to his team. The team of JuicePlus is like a family for Holzmann Dan Holzmann is a businessman that treats his professional career as one of his important passions in life. He works not for money, but the right reasons. He has a goal of helping his colleagues as well as other people through the JuicePlus and with his unique ways of helping his fellowmen. Dan Holzmann is a good role model not just for himself but also for his team members. With their great teamwork and professionalism, they successfully introduce JuicePlus in different parts of the world. The humble and responsible JuicePlus CEO treats his team as his own family. With this, trust and strong responsibility were established among the team which leads JuicePlus to a higher plateau of success in the industry. JuicePlus with Dan Holzmann With the creative exploitation of his abilities and skills, he learned from his experience and became the JuicePlus Master Distributor for the DA-CH region way back in 1996. As the company continues to arise in the market, the team gets stronger in facing different challenges in the operation of the health business. In 2012, he became the CEO and President of JuicePlus Company in different areas of the world such as Africa, Europe, and the Middle East. Dan holzmann Juice Plus In an interview with Swiss business magazine Bilanz in Decem ber 2016, Holzmann stated that sooner or later, they might take over American parent company from the founder of the company. In this interview, Dan Holzmann net worth skyrocket due to his constant perseverance and discipline. Even more important, Dan Holzmann is ranked 227th among the 325 million CHF in the year 2016. The last interview is about his ranking among the People’s List of the 300 riches Swiss. His ranking is a proof of how powerful Dan Holzmann is in the world of business. In this ranking event, Tina Turner gets the 250th place having 225 million CHF. On the other hand, Sebastian Vettel got the 274th spot having a 175 million CHF. Dan Holzmann fulfills his duties and responsibilities before leaving JuicePlus It cannot be denied that leaving a company and team that already become part of your career is a difficult situation. Thus, you already treat your team members as your own family. Well, that is also the situation for Dan Holzmann when he decided to leave JuicePlus. Meanwhile, as a responsible business leader, he makes sure that the status of JuicePlus is in the best condition before he leaves his beloved company. The best about Dan Holzmann is that he never neglects his responsibilities for JuicePlus. He never fails to impress his team members as well as their millions of customers all over the world with JuicePlus’ products and services. Dan Holzmann is leaving Juice Plus Dan Holzmann helps JuicePlus to establish a good reputation From a small business with limited staff, Dan Holzmann helps JuicePlus to build a good name in the industry. With their endless dedication and hard work for JuicePlus’ success, they successfully win the trust, support, and respect of their millions of customers in the different parts of the world. Dan Holzmann works with positivity with JuicePlus. The positive energy of Holzmann empowers his team to be motivated and inspired to do their tasks and responsibilities in a positive way which is essential for the company’ success. They work together as one and with a heart. They also care for other people who are the reason why they become the top choice health company of the people. Despite the most significant challenges that JuicePlus confront, Dan Holzmann and his team never give up to attain the goals, visions, and missions of their business. Instead, they use the difficulties as their stepping stone to work harder for the success of JuicePlus. Holzmann wants to devote more to his family and other business Dan Holzmann already served for JuicePlus for so many years. He started to work with his beloved company since it was a small business way back in 1993. The success story of Dan Holzmann together with JuicePlus is just a proof that nothing impossible if you never give up on your goals whether it is personal or business goals. Leaving JuicePlus is a difficult decision for the humble businessman. He stated that he wants to devote more of his time to his family as well as for his other business commitments. Meanwhile, because he loves JuicePlus, he remains to be a shareholder of the leading health company. Dan Holzmann wife is fortunate to have him as her husband. Thus, Holzmann is not just a talented and expert business tycoon, but also a humble family man. He always wants the best for his family, friends, and colleagues. He never fails to express his genuine love and care for the important people in his life. Dan Holzmann is a very loving and caring person. He is a selfless person who thinks of others first and desires to help other people through sharing positivity and success. He never stops to feed his fellowmen with positivity and inspiration to improve their lives for the better. Holzmann treasures his wonderful experience with JuicePlus Dan Holzmann works with JuicePlus for many years. For him, his co-workers in the organization are like a second family to him. He treasures his experience with JuicePlus. Thus, it is one of the best things that help him to hone his business skills. JuicePlus is also the one that allows him to hone his critical thinking skills as well as decision-making skills. Dan Holzmann learns a lot as the founder, CEO and team leader of the premier health company JuicePlus. The responsible businessman always implements the best business strategies to make the most of the JuicePlus products and services. He values the good reputation of the company, so they never stop to do only the best for the success of the business. Dan Holzmann also gives importance to the memories and experiences that he had with his team members. He will never forget the people that help him to bring the JuicePlus to a high level of success in the industry. As a big part of the success of JuicePlus, Dan Holzmann stays humble and happy about the continued success of the company. Dan Holzmann will continue to support JuicePlus Dan Holzmann will leave JuicePlus, but it doesn’t mean that he will forget to help the company that is already a big part of his life. The successful businessman will still support the company by being one of its shareholders. As a health-conscious person, Holzmann will still recognize the benefits of JuicePlus. The very down to earth man is indeed the best role model of inspiration and motivation for attaining personal as well as business success. Are you inspired by the story of Dan Holzmann? Then, you must also emulate his qualities that can lead you to success. Dan Holzmann website Dan holzmann facebook Juice plus Instagram Dan holzmann and Juice plus fan blog Dan holzmann story Published by Juan Richardo View all posts by Juan Richardo Categories: Blog, JuiceplusTags: Dan holzmann juice plus, dan holzmann story Previous How Juice Plus changed my life Next Dan Holzmann’s Success Story
cc/2019-30/en_middle_0029.json.gz/line3904
__label__cc
0.535809
0.464191
Famous essay about san francisco Prices for famous essay about san francisco everything skyrocketed: eggs were a dollar apiece in 1849, and a war broke out later over control of the stony Farallones islands rookery thirty miles west of San Francisco, where seabirds eggs were gathered to augment what the chickens could produce. But Sisyphus teaches the higher fidelity that negates the gods and raises rocks. In the same year, another observer, James Douglas, recorded: "It is said that many even of the most respectable classes prostitute their wives for hire, that is, they wink at the familiarity of a wealthy neighbor who pays handsomely for his entertainment.". The work hours are still extreme but now the wages are colossal you hear tech workers complaining about not having time to spend their money. When the images of earth cling too tightly to memory, when the call of happiness becomes too insistent, it happens that melancholy rises in man&apos;s heart: this is the rock&apos;s victory, this is the rock itself. Mercury came and seized the impudent man by the collar and, snatching him from his joys, led him forcibly back to the underworld, where his rock was ready for him. Is the struggle itself enough for you? I see no contradiction in this. Demolishing the California Dream: How I looked in dismay at the pretty old house where a familys possessions had settled like silt over the decades: drum set, Bibles, faded framed portraits, furniture grimed with the years, cookware, toys. Both on the street and in the gambling saloons where they worked, but they actually set the style for the ladies in the city. The most famous of these mistresses was Juanita, who became the first woman hanged in California after stabbing a man who was about to attack her man. In the poorer outskirts of the city, foreclosures and short sales (an alternative to foreclosure where the house is sold even though the sale wont cover the debts) go on as they have across much of the. Sometimes the tech workers on their buses seem like bees who belong to a great hive, but the hive isnt civil society or a city; its a corporation. There were rumours that these young people were starting bidding wars, offering a years rent in advance, offering far more than was being asked. Published his observations of California, Two Years Before the Mast, in 1835. Financial growth was, indeed, enormous, and demand had so outdistanced supply that prices were going higher every day. It means that the minions of the non-petroleum company most bent on world domination can live in San Francisco but work in Silicon Valley without going through a hair-raising commute by car I overheard someone note recently that. She was responsible for managing the women, caring for the house, and keeping the authorities at bay through bribes and social connections. In 1849, miners migrated from the South and the East, with forty thousand immigrants arriving by ship alone. The Google Bus means so many things. City services, including police and fire protection-San Francisco was leveled by fire five times between 18-simply did not exist. In time the famous essay about san francisco parlor houses would be noted for their social exclusiveness, only those who belonged making it past the colored servant at the door. Back to, keefer home page, twentieth Century Writers. This is the price that must be paid for the passions of this earth. There is no sun without shadow, and it is essential to know the night. (She married him a couple of hours before his execution.). One San Francisco madam, Belle Cora, had her lover Charles Cora, hung for such a crime. Sometimes the Google Bus just seems like one face of Janus-headed capitalism; it contains the people too valuable even to use public transport or drive themselves. Another observer, Hubert Howe Bancroft, wrote that "Deference was paid by all classes to the female form, even though its dress covered corruption; nor was it very damaging to any man&apos;s reputation. All these youngish people are on the Google Bus because they want to live in San Francisco, city of promenading and mingling, but they seem as likely to rub these things out as to participate in them. Often wealthy gamblers backed their mistresses (kept women) in such business endeavors. Very few intended to make California their home. Consequently, the potential for upward mobility was great among all professions and in particular among prostitutes. The tech workers, many of them new to the region, are mostly white or Asian male nerds in their twenties and thirties; you often hear that to be over fifty in that world is to be a fossil, and. Then Sisyphus watches the stone rush down in a few moments toward that lower world whence he will have to push it up again toward the summit. And there, annoyed by an obedience so contrary to human love, he obtained from Pluto permission to return to earth in order to chastise his wife. Which is worse, Dante&apos;s Inferno or the eternal struggle of Sisyphus? The lucidity that was to constitute his torture at the same time crowns his victory. Prostitutes occupied a privileged place in gold-rush society, with economic opportunity beyond that of any other working American females. The oil and gas boomtowns of the present, in Wyoming, North Dakota and Alberta, among other places, follow this model. One always finds one&apos;s burden again. A few others again were of a superior class; but, of course, still higher charges had to be made for the better accommodation. Two famous madams, Irene McCready and Belle Cora, were both financed by their high-rolling lovers. Each atom of that stone, each mineral flake of that night-filled mountain, in itself forms a world. To spend as short a time as possible scooping up the golden nuggets; and to return home to live on the wealth they had acquired. One reason for this unique environment was the transitory nature of the male population. Cafés, which famous essay about san francisco proliferated in the 1980s as places to mingle and idle, are now workstations for freelancers, and many of the sleeker locales are routinely populated by silent ranks staring at their Apple-product screens, as though an office had suddenly been stripped of its cubicles. San Francisco &apos; s Clean Little Secret - FoundSF The father was shocked by that disappearance and complained to Sisyphus. The estate agent was on the front steps telling potential clients that they wouldnt even have to evict: just raise the rent far beyond what the residents can afford. From 1848 to the late 1850s, prostitutes experienced an unprecedented ascension in power and a brutal fall from grace in San Francisco. Owners have the right to evict a tenant to occupy the apartment itself (a right often abused; an evicted friend of mine found a new home next door to his former landlord and is watching with. It was a display of what was about to be lost. At that subtle moment when man glances backward over his life, Sisyphus returning toward his rock, in that silent pivoting he contemplates that series of unrelated actions which becomes his fate, created by him, combined under his memory&apos;s eye and soon sealed by his death. There are ways in which Silicon Valley is nothing like this: its clean, quiet work, and here to stay in one form or another. A third factor for the growth of prostitution was the less restrictive atmosphere of San Francisco as opposed to Eastern cities. One of San Franciscos most distinguished poets, a recent candidate for the citys poet laureate, is being evicted after 35 years in his apartment and his whole adult life here: whether he will claw his way onto. Again I fancy Sisyphus returning toward his rock, and th sorrow was in the beginning. In general, these chic bordellos were run by a madam in conjunction with a male financial backer, usually a gambler. San Francisco Art and Poetry, calendar -.F.Heart These women, referred to as pioneer prostitutes or seoritas, were mostly indentured Latin Americans who famous essay about san francisco were forced to entertain men in the rough mining camps. McCabe, who owned the infamous El Dorado, and Cora was the mistress of mining-town gambler Charles Cora. This maintained the social distinction. These are our nights of Gethsemane. Whether its practitioners were indentured. Before the gold rush and the subsequent urban development (1848-1849 the Bay Area had no organized prostitution as such. He dispatched the god of war, who liberated Death from the hands of the conqueror. Evictions went back up the way they did during the dot-com bubble. In addition to being the first prostitutes, they were also famous essay about san francisco the only ones who worked in the mining camps. Nothing is told us about Sisyphus in the underworld. The buses roll up to San Franciscos bus stops in the morning and evening, but they are unmarked, or nearly so, and not for the public. I weathered the dot-com boom of the late 1990s as an observer, but I sold my apartment to a Google engineer in 2011 and ventured out into both the rental market (for the short term) and home buying market. The luxury coach passengers ride for free and many take out their laptops and begin their work day on board; there is of course wifi. Lots of money sloshes around boomtowns, but everyday life is shaped by scarcity, not abundance. Five of the six most-visited websites in the world are here, in ranked order: Facebook, Google, (which Google owns Yahoo! Indeed, one historian observes that the competition among women for positions in the most elegant saloons and among proprietors for women in the cheaper establishments was the initial step in the development of a hierarchy among San Francisco prostitutes. At the same time, the number of prostitutes multiplied and developed a hierarchical system in which many women were disempowered by the lack of economic opportunity. But it is tragic only at the rare moments when it becomes conscious. Other days I think of them as the company buses by which the coal miners get deposited at the minehead, and the work schedule involved would make a pit owner feel at home. Gold-Rush Era Prostitutes - FoundSF San Francisco exploded in the rush, growing by leaps and bounds, a freewheeling town made up almost exclusively of people from elsewhere, mostly male, often young. In Wyoming last year I met a disability counsellor who told me about the young men who go into the coal and gas mining business, make more money than theyve ever seen, go into debt on a trailer home,. He ordered her to cast his unburied body into the middle of the public square. Some became mistresses of certain miners, a situation which implied a relationship and a larger degree of respectability. Last summer, I went to look at a house for sale whose listing hadnt mentioned that the house was inhabited. In the universe suddenly restored to silence, the myriad wondering little voices of the earth rise. Sisyphus, proletarian of the gods, powerless and rebellious, knows the whole extent of his wretched condition: it is what he thinks of during his descent. He stole their secrets. A person&apos;s reputation was not necessarily at stake in this fleeting, far-off land, and this led to the suspension of social and moral restraints. The business opportunities of gold-rush San Francisco were also an important factor in the flourishing of prostitution. In 1850, California had a population of 120,000 according to one survey, 110,000 of them male. But there are ways in which technology is just another boom and the Bay Area is once again a boomtown, with transient populations, escalating housing costs, mass displacements and the casual erasure of what was here before. The boundless grief is too heavy to bear. Most renters have considerable protection from both rent hikes and evictions in San Francisco, but there are ways around the latter, ways that often lead to pitched legal battles, and sometimes illegal ones. Fay wrote, "The only aristocracy we had here at the time were the gamblers and prostitutes." According to other observers as well, prostitutes were part of the upper echelons of San Francisco society. The community was relatively amenable to prostitution. One source cites a 50-1 male-to-female ratio. A journalist whod been reporting on the boom in North Dakota told me about ranches ruined by toxins and a trailer park full of Native Americans whod lived there for many decades evicted to make room for higher-paying miners with brand-new trailers. Likewise, the absurd man, when he contemplates his torment, silences all the idols. There is no fate that cannot be surmounted by scorn. A few miles famous essay about san francisco away, friends of friends were evicted after twenty years in their home by two Google attorneys, a gay couple who moved into two separate units in order to maximise their owner-move-in rights. All this is changing the character of what was once a great city of refuge for dissidents, queers, pacifists and experimentalists. In the Mother Lode, some got rich; many died of contagious diseases, the lousy diet, rough life and violence; some went broke and crawled back to the US, as the settled eastern half of the country was called. Poverty is cruel and destructive. During that time, a wave of European and white American prostitutes arrived in the area and took advantage of the chances for social mobility in the sexually permissive city. Rebecca Solnit Diary : Google Invades LRB 7 February 2013 The Annals of San Francisco describe the city twenty years earlier, in 1849: As we have said, there were no homes at this period in San Francisco, and time was too precious for anyone to stay within doors to cook victuals. Supplying the miners and giving them places to spend their money became as lucrative as mining and much more secure. According to another tradition, however, he was disposed to practice the profession of highwayman. His rock is his thing. Spanish explorers famous essay about san francisco brought these romantic notions about exotic women with them to California, giving birth to centuries of Golden State mystique. Not only were they the most elegantly dressed women in San Francisco. A Latino who has been an important cultural figure for forty years is being evicted while his wife undergoes chemotherapy. At the actual open houses, dozens of people who looked like students would show up with chequebooks and sheaves of resum?s and other documents and pack the house, literally: it was like a cross between being. This universe henceforth without a master seems to him neither sterile nor futile. In this fertile environment, organized prostitution began in the mining towns during the first half of 1849. All Sisyphus&apos; silent joy is contained therein. Wealth is cruel and destructive too, or at least booms are. The absurd man says yes and his effort will henceforth be unceasing. Some establishments even provided make-shift rooms for the private use of the women. It means that San Francisco, capital of the west from the Gold Rush to some point in the 20th century when Los Angeles overshadowed it, is now a bedroom community for the tech capital of the world at the other end of the peninsula. His fate belongs to him. One of her most important duties was collecting payments from the clients, instead of having the women themselves ask for money. Chinese women, economically and socially oppressed Latina women, or kidnapped and enslaved white women, prostitution for some became a form of imprisonment and punishment as opposed to a profession. (Number five is a Chinese-language site.) If corporations founded by Stanford alumni were to form an independent nation, it would be the tenth largest economy in the world, with an annual revenue.7 trillion, as some professors at that university recently calculated. It looks like beautiful oak-studded hills and flatlands overrun by sprawl: suburban homes (the megamansions are more secluded) and malls and freeways often jammed with traffic and dotted with clunky campuses, as corporate headquarters of tech firms are always called. Unconscious, secret calls, invitations from all the faces, they are the necessary reverse and price of victory. Yelp - Financial District He wrote about California as a land of only women, strong and forceful and untamed. Boomtowns also drive out people who perform essential services for relatively modest salaries, the teachers, firefighters, mechanics and carpenters, along with people who might have time for civic engagement. The more than 1700 tech firms in San Francisco officially employ 44,000 people, and a lot more are independent contractors doing piecework: not everyone rides the bus down south. Wages were high too, until 1869, when the Central Pacific Railroad (built by Stanford and his three cronies) connected the Bay Area to the East Coast, and the newly unemployed railroad workers and the poor of the east poured. It wasnt to everyones delight: Cesar Chavez and the United Farmworkers movement started in San Jose, because the people who actually picked all those plums and apricots worked long hours for abysmal wages, but the sight and smell. He is stronger than his rock. They had thought with some reason that there is no more dreadful punishment than futile and hopeless labor. Homer tells us also that Sisyphus had put Death in chains. That country has a capital that doesnt look like a capital. It is during that return, that pause, that Sisyphus interests. Silicon Valley has long been famous for its endless work hours, for sucking in the young for decades of sixty or seventy-hour weeks, and the much celebrated perks on many jobsites nap rooms, chefs, gyms, laundry are. In this ephemeral atmosphere people were more likely to succumb to the practices that would have condemned them under the watchful eyes of their home communities. Back to hell syllabus. In addition, there was no organized business class or established sex industry to thwart enterprising individuals. It makes of fate a human matter, which must be settled among men. Other buildings I visited had been emptied of all residents, and every unit was for sale, each furnished with brushed steel appliances, smooth surfaces and sleek neutral tones to appeal to the tastes of young technocrats. One must imagine Sisyphus happy. Two much-loved used bookstores are also being evicted by landlords looking for more money; 16 restaurants opened last year in their vicinity. Competition was fierce on both sides of the relationship, and each helped the other establish themselves. Krazmien, barbary prostitutes, photo: San Francisco History Center, SF Public Library. Richard Henry Dana,. Where orchards grew Apple stands. The situation was mutually beneficial, allowing women a venue to solicit men and helping casinos attract customers. San Francisco&apos;s infamous gold-rush casinos played an integral role in the establishment of the business of prostitution. The prospect of gold brought both immigrants (new business) and wealth (expendable income) into the city, and therefore the profit potential for entrepreneurs was high. Essay about gods of egypt Master thesis engineering online database Bob dylan nobel prize essay Phd thesis neural network Leadership importance essay Pros and cons of ethanol essay Essay on trees and seasons How to memorise an essay in two days Pay for homework Blood is thicker than water narrative essay Best american essays 2007 wallace Reduce your carbon footprint essay Who am i what is my purpose essay American flag essay paper Chard essay Clinical psychology thesis proposal Rutgers essays 2013 eldorado-urania.com / 2019 / Famous essay about san francisco
cc/2019-30/en_middle_0029.json.gz/line3907
__label__cc
0.570933
0.429067
Afrojack and Sway Partner for ‘SwayJack Radio’ Mark Wolf John Parra / Getty Images Sway Calloway, host of the prestigious hip-hop centered radio show 'Sway In The Morning' (airing weekdays on Eminem's Shade45 SiriusXM station) will co-anchor with superstar DJ-producer Afrojack for an exclusive live special entitled "SwayJack Radio." The radio special airs on Thursday and Friday March 26 and 27 at 1PM EST on SiriusXM's UMF Radio program, which can be found on the "Electric Area" station, via satellite channel 52. The radio special will air live from the 11th annual SiriusXM music lounge, where EDM's stars congregate each year, so who knows what special guests are liable to make an appearence. Listeners will also be able to enjoy exclusive DJ sets from Ultra Music Festival acts such as Skrillex, David Guetta, Kygo, Knife Party, Nicky Romero, Hardwell, Martin Garrix, Steve Aoki, ODESZA, Eric Prydz, Cash Cash, Armin Van Buuren, Tiësto and more. Tune in to hear 24/7 commercial-free live sets and interviews to be a part of the Miami Music Week action. Filed Under: Afrojack, sirius/XM Categories: EDM News
cc/2019-30/en_middle_0029.json.gz/line3908
__label__wiki
0.616437
0.616437
PDF Remediation Software PDF Conversion Services Accessibility Testing Accessibility Consulting Document Accessibility Services VPAT Completion and Validation Accessibility for Healthcare For Professional Remediators Equidox Accessibility Resources State Accessibility Legislation Equidox Team Addressing California AB 434 – Accessibility for State Agencies Florida Accessible Electronic and Information Technology Act Accessibility Blog Contact Equidox NOVA Making Community College Web Accessibility a Reality May 30, 2017 | Tammy Albee Background: Community College Web Accessibility is a Challenge Achieving web accessibility across higher education campuses has not been easy. Aside from the changing ADA legislation and the pending Section 508 refresh, there is the unfortunate fact that some universities are being sued over inaccessible content and equal accommodation issues. The Department of Justice and The National Federation of the Blind want universities to take a proactive approach to accessibility. Community college web accessibility coordinators are facing a growing backlog of inaccessible PDFs. Disability Services has to work with publishers to source PDF textbooks that then must be manually converted. As always, there are also a variety of diverse departmental goals and budgetary concerns. So, how do universities develop and meet an accessibility plan that benefits the whole campus? The Challenge: Making Technology Accessible for All An estimated 11 percent of undergraduate students on campuses today have a disability. Ensuring that these students have equal access to technology is a complex challenge requiring a coordinated effort across campus departments. Universities must maintain compliance with Web Content Accessibility Guidelines (WCAG) 2.0 AA, considered the standard for measuring web accessibility. The Solution: Strategies and Tools that Make Community College Web Accessibility A Reality Administrators from Northern Virginia Community College (NOVA) took a campuswide approach to developing proactive web accessibility strategies. Tim Ferebee, Web Accessibility Coordinator and Estela Landeros, Director of Disability Support Services took advantage of new tools that enhance accessibility to ensure that their campus is WCAG 2.0 compliant — and meet the needs of students with disabilities. NOVA created an initiative in 2014 to become a 100 percent accessible college for all, regardless of disability. NOVA serves 78,000 students on six campuses; students hail from 128 countries. Their ages range from high school kids to seniors and include people changing careers or seeking a certification. NOVA’s accessibility initiative is based on a universal instructional design approach. “To achieve this goal, we created a steering committee. We included a representative from all academic and administrative departments to develop, coordinate and implement a collegewide technology accessibility plan,” explained Ms. Landeros. Beginning with an external evaluation, the college conducted a complete website review to determine problem areas. This resulted in a redesign of the school’s website; the team continues to work to ensure that all pages are fully accessible. One major issue was the amount of instructional materials that had to be made accessible. “We evaluated two potential solutions — to hire an external company or to do the work in-house. We opted for the second option and are training all the faculty to do their own captioning,” said Ms. Landeros. NOVA launched a universal instructional design faculty training session which is conducted three times a year. New faculty come to these training sessions, and experienced faculty are encouraged to attend. Since HTML is much easier to make accessible than PDF files, Onix developed Equidox, a tool that helped NOVA “…convert 62 PDF documents to HTML code, totaling approximately 800 pages and 303 images captioned. In the past, converting that many documents would have taken NOVA six months to a year. But with Onix’s tool, it only took 2.5 months. It’s easy too,” said Mr. Ferebee. “Simply upload your documents, run it through the product’s converter and voilà; you’ll receive HTML output that you can easily copy and paste into your LMS or CMS.” Conclusion: Realizing the Goal of 100 Percent Accessibility With the Section 508 refresh coming later in 2016, WCAG 2.0 AA will be the new standard. Equidox provides an automated process for converting inaccessible PDF files to WCAG 2.0 AA. Never has it been so easy to upload and convert documents, enabling community colleges and other organizations to meet web accessibility requirements. NOVA continues to make progress toward their goal of making the college 100 percent accessible. Mr. Ferebee stated, “We also have been working to get Equidox for all of Northern Virginia Community College, and we’re hoping that the entire Virginia Community College system will link to these programs.” To hear the full NOVA story directly from them, watch the University Business Web Seminar, Web Accessibility: A Campuswide Approach. About Tammy Albee Tammy Albee | Content Marketer | Onix Tammy joined Onix after four years experience working at the National Federation of the Blind. She firmly maintains that accessibility is about reaching everyone, regardless of ability, and boosting your market share in the process. "Nobody should be barred from accessing information. It's what drives our modern society." Case Study: NOVA April 26, 2019 | Tammy Albee Subscribe to the Web Accessibility Blog Web Accessibility Blog Subscribe Yes. Send me web accessibility news, events, insights and peer successes. Accessibility News Accessibility Tools and Law Email: EquidoxSales@onixnet.com Contact Onix Copyright © 2019 Onix. All Rights Reserved.
cc/2019-30/en_middle_0029.json.gz/line3913
__label__cc
0.506297
0.493703
Code of Hammurabi The Code was inscribed on a stone stele (a standing block) that was over seven feet tall. Photograph by Rama, Wikimedia Commons, Cc-by-sa-2.0-fr. Source Author 1754 BCE Below is a translation of Hammurabi's Code. Footnotes are from the text that I transcribed this from.1 When Anu,2 the majestic, King of the Anunnaki,3 and Bel,4 the Lord of Heaven and Earth, who established the fat of the land, had given to Marduk,5 the ruling son of Ea,6 dominion over mankind, magnified him among the Igigi;7 and called Babylon by his great name; when they made it great upon the earth by founding therein an eternal kingdom, whose foundations are as firmly grounded as are those of heaven and earth,—it was then that Anu and Bel called me, Hammurabi, the exalted prince, a God-fearing man, by name, to cause justice to be practiced in the land, to destroy the wicked and the evil [alike], to prevent the strong from oppressing the weak, so that I might go forth like Shamash8 to rule over the Black-haired people, to give light to the land, and, like Anu and Bel, promote the welfare of makind. I am Hammurabi, the prince called by Bel to pour out riches and abundance, procuring everything possible for Nippur9 and Durilu,10 the majestic patron of E-kur,11 the brave king who restored Eridu,12 and purified the cult of E-apsu;13 who subjected the four quarters of the world, and made great the name of Babel, and made glad the heart of Marduk, his lord; and who daily worships in Esaglia,14 the royal scion, begotten by Sin,15 who enriched Ur;16 the pious, the submissive one, who brings riches to Gish-shir-gal;17 the wise king favored by Shamash; the powerful one, who laid again the foundations of Sippar:18 who clothed with green the tomb [or shrines] of Malkat;19 who beautified E-bab-bar,20 which is built like a heavenly place; the warrior, who protected Larsa,21 and rebuilt E-bab-bar for Shamash, his helper; the lord, who gave life to the city of Uruk;22 and brought abundance of waters to its inhabitants; who built up the towers of E-anna,23 who brought riches to Anu and Nana;24 the shield of the land; who again reassembled the scattered inhabitants of Isin25 [Nisin], who enriched E-gal-mah;26 the patron king of the city, the brother of Za-ma-ma;27 who firmly established the settlements of Kish;28 who surrounded the E-me-te-ur-sag29 with glory; who increased the sacred treasures of Nana, the patron of the temple of Harsag-Kalama,30 the grave of the enemies; whose help brings victory;31 who enriched the places of Cutha;32 who made everything glorious in E-shid-lam;33 the mighty bull,34 which trampled down his foes.... [The text continues, discussing Hammurabi's notable contributions to religious institutions, defense of his people, and economic benefits to those under his rule.] When Marduk sent me to rule over men, to grant protection to the land, then I put law and righteousness in the mouth of the people, and brought well-being to my subjects. [....] 1. If a man make a false accusation against a man putting a ban upon him and can not prove it, then the accuser shall be put to death. 2. If a man charge a man of being a sorcerer, and is unable to sustain such a charge, the one who is accused shall go to the river he shall plunge himself into the river, and if he sink into the river, his accuser shall take his house. If, however, the river show forth the innocence of this man and he escape unhurt then he who accused him of sorcery, shall be put to death, while he who plunged into the river shall appropriate the house of his accuser.35 3. If a man (in a case pending judgment) threaten the witnesses, or do not establish that which he has testified, if that case be a case involving life, that man shall be put to death. 4. If a man offer as a bribe grain or money to witnesses, he himself shall bear the sentence of the court in that case. 6. If a man steal the property of a temple, or [royal] palace, that man shall be put to death, and so, too, he who may receive from his hand stolen goods shall be put to death. 7. If a man buy silver, gold, slave, male or female, ox, sheep, donkey, or anything whatsoever from the son or slave of any person, without witness or contract, or receive the same on deposit, he is regarded as a thief, and shall be put to death.36 8. If a man steal an ox, or sheep, or donkey, or pig, or boat, from a temple or palace, he shall pay thirtyfold; if it be from a freeman, he shall pay tenfold. If the thief has nothing with which to pay, he shall be put to death.37 14. If a man steal the minor son of a freeman, he shall be put to death. 15. If any man take a male or female slave of the [royal] palace, or the male or female slave of a freeman outside the gates of the city, he shall be put to death. 16. If a man conceal in his house a male or female slave, a fugitive from the palace, or from a freeman, and do not produce the same at the order of the officer, the master of that house shall be put to death. 17. If a man find a fugitive slave, male or female, in the open country, and brings the same to the owner, the owner of said slave shall pay that man two shekels of silver. 21. If a man make a breach into a house, one shall kill him in front of the breach, and bury him in it. 25. If a fire break out in a man's house, and any one who goes to put out the fire shall lift up his eyes towards the owner's property and take any property [furniture] of the owner of the house, he shall be cast into that same fire. 42. If a man rent a field for tilling and raise no crops; then he shall be called to account for not having cultivated the field, and [if convicted] he shall deliver grain to the owner of the field, in proportion to the yield of the adjacent fields. 45. If a man let his field to another for a fixed rent, and has received the rent for the field, but storms come and destroy the crops, the loss falls upon the renter. 53. If any one neglect to keep his dyke in proper condition and do not strengthen his dyke, and if a breach take place, and the meadow-land be inundated by the water the man in whose dyke the breach has taken place, shall pay back for the grain which was thereby destroyed. 117. If a man incur a debt and sell his wife, son, or daughter for money, or bind them out to forced labor, three years shall they work in the house of their taskmaster; in the fourth year they shall be set free. 128. If a man marry a wife, but have made no contract with her, this woman is not a [legal] wife.38 129. If a man's wife be caught lying with another man, both shall be bound and thrown into the water unless the husband of that woman desire to pardon his wife, or the king his servant. 130. If any one violate the wife [betrothed] of a man, who has not known a man, but who is still living in the house of her father, and he lie with her and be caught he shall be put to death but the woman shall go free. 131. If a man have accused his own wife but she has not been caught lying with another man she Shall swear by the name of God and then may return to her father's house. 132. If the finger have been pointed against a man's [i.e., if she have been suspected], but she have been caught lying with another man she shall into the river for her husband's [satisfaction]. 133. If a man be taken captive in war, and there is sustenance in his house and his wife have left his house and court and have entered the house of another, because that woman has not guarded her body, but entered another's house, she shall be condemned according to law and thrown into the waters. 134. If a man have been taken captive in war, and there be no sustenance in his house, when the wife of this man enter another's house [marry another man]; this woman incurs no penalty. 142. If a wife quarrel with her husband and say, Thou shalt not possess me; then the reasons for her prejudices must be examined. If she be without blame, and there be no fault on her part, but her husband have been tramping around belittling her very much, then this woman shall be blameless, she shall take her dowry and return to the house of her father. 145. If a man take a wife and she bear him no children and he make up his mind to take a concubine if he take a concubine and bring her to his house this concubine shall not stand on equality with his wife. 160. If a man bring presents into the house of his father in law, and give a dowry; if then the girl's father say, "I will not give my daughter to you;" then he shall give back fully all that was given him. 162. If a man take a wife and she bear him children, and if that woman die, her father may have no claim on her dowry. It belongs to her children. 168. If a man decide to thrust out [disinherit] his son and say to the judge, "I will thrust out my son;" then the judge shall examine into his reasons, and if the son have no grievous fault, which justifies his being thrust out, the son may not be cut off from sonship. 169. If he have committed a grave fault which may justify the father in cutting him off from sonship, he shall pardon the first offense, but if he have committed a grave fault the second time, the father may deprive him of sonship. 181. If a father devote a temple maid or temple-virgin to a god, and give her no dowry, after the death of her father she shall receive from the estate of her father as her share, one third of a son's portion, to enjoy it as long as she lives. After her it belongs to her brothers. 188. If an artisan adopt a child and teach him his trade, no one can demand him back. 189. If he have not taught him a trade, the adopted child may return to his father's house. 195. If a son strike his father one shall cut off his hands. 196. If a man destroy the eye of another man, one shall destroy his eye. 197. If any one break a man's bone, one shall break his bone. 198. If he destroy the eye of a freedman or break the bones of a freedman, he shall pay one mina of silver. 199. If he destroy the eye of a man's slave or break the bone of a man's slave he shall pay one half value. 200. If a man knock out the teeth of a man who is equal in rank one shall knock out his teeth. 204. If a freeman strike a freeman, he shall pay ten shekels of silver. 205. If the slave of a freeman strike a freeman, one shall cut off his ear. 209. If a man strike a free born woman and produce a miscarriage, he shall pay ten shekels of silver for the loss [of that in her womb]. 210. If that woman die, one shall put his daughter to death. 218. If a physician treat a man for a severe wound with a bronze knife and kill him, or if he open an abscess near the eye and destroy the eye, one shall cut off his hands. 249. If a man hire an ox and a god strike it, and it die, the man who hired it shall swear before God in open court and he shall be acquitted. 250. If an ox, while passing through the streets [market] gore and kill a man, this case is not subject to litigation. 1. Walter Davies, The Codes of Hammurabi and Moses: With Copious Comments, Index, and Bible References, (Cincinnati: Jennings and Graham, 1905). 2. Or Ilu, the father of Ishtar, worshipped very early at Uruk. 3. The evil spirits, visible in the black clouds of the heavens. 4. A god, worshiped at Nippur and elsewhere. 5. The God of Babylon; it is the Merodach, often found in compound names in the Bible. 6. God of the waters; its chief seat of worship was Eridu. 7. The kind spirits, personified by the white clouds of the heavens. 8. The Sun-god, which had famous temples at Larsa and Sippar. 9. A celebrated city of Babylonia, called also Nuffar. Extensive excavations have been made here by the University of Pennsylvania. 10. A celebrated city of Babylonia, or, according to others, it is the ziggurat at Nippur and called Duranku. 11. Bel's temple at Nippur. 12. Place celebrated for the worship of Ea. 13. Literally, "House of the Ocean," a temple of Ea at Eridu. 14. Marduk's temple at Babylon. 15. The Moon-god, which had a famous temple at Ur. 16. A Well-known city, called el-Mugheir at present. 17. Written also E-gisgirgal, temple of Sin at Ur. 18. A city, perhaps the Abu Habba of our time. 19. The consort of Shamash, or inanimate nature. 20. The temple of Shamash in Sippar, and also at Larsa. 21. A city famous for the worship of Shamash, perhaps the Elassar of Gen., xiv, I. 22. The Erech of Ge. x, 10. It is now called Warka. 23. The temple of Ishtar, wife of Anu, at Uruk. 24. The same as Anna or Ishtar; she was the daughter of Anu. 25. Isin or Nisin, supposed by some to be Bismaya, where the University of Chicago is now excavating; others think it the same as Abu Habba. 26. A temple at Isin. 27. The goddess of Kish. 28. A city of Babylonia. 29. A city near Kish, or a temple of that place. 30. A temple of Kish. 31. Harper's marginal reading, "whose help enables one to attain his desire." 32. A city or region in Babylonia. 33. A temple of Nergal. 34. An appellation of Marduk. The bull is a frequent figure for strength in Semitic literature. 35. This excerpt accompanies the above law, explaining comparisons with Hebrew law. The book compares Mosaic law with Hammurabic law throughout, noting similarities and marked differences. Remember that this book was published in 1905. My dad found an ad online and now we have a freezer full of dead rats.
cc/2019-30/en_middle_0029.json.gz/line3915
__label__wiki
0.755516
0.755516
The Economics Club, IMI New Delhi "An Investment In Knowledge Pays The Best Interest"- Benjamin Franklin INDIA’S FOREIGN AFFAIRS TRADE TAX AND TARRIFS Prime Minister Narendra Modi’s US Visit By The Economics Club IMI on October 5, 2014 • ( Leave a comment ) Indian Prime Minister Narendra Modi visited New York and Washington, D.C. from September 27-30, 2014. This was his first visit to the U.S. as leader of the world’s largest democracy and the first opportunity for the prime minister to meet President Barack Obama. He also engaged with congressional leaders, the private sector and members of the Indian diaspora. The goal was to build on the India-U.S. relationship, which has bilateral, regional and global dimensions. It also encompassed interaction in the fields of economics and trade, energy and climate change, cyber-governance, counter-terrorism, counter-proliferation, and defense issues, as well as health and immigration. Modi had put aside his personal prejudices – with regard to the denial of visa – and reworked the relationship with the Americans, keeping in mind India’s national interests. Main Points Commitment of nearly $41 billion of investments by US-India Business Council members over the next three years in India Bilateral meetings with the President of Sri Lanka, the Prime Minister of Bangladesh and the Prime Minister of Nepal Breakfast meeting with 11 Chief Executive Officers or CEOs including Executive Chairman of Google Eric Schmidt and CEOs of MasterCard and Pepsi One-on-one meeting with six individual CEOs including chairman of Boeing company, CEO of BlackRock, President and CEO of IBM, CEO of GE, Chairman of Goldman and Sachs and the CEO of KKR – Bullish on opportunities in India, top US corporates, including Boeing, IBM and BlackRock on Monday expressed their keenness to strengthen engagements with the country during their meetings with Prime Minister Narendra Modi who promised a friendlier business environment. Meeting with US President Barack Obama -Modi and Obama discussed a range of issues, including ways to accelerate economic growth and bolster security cooperation to deepen the US-India strategic partnership, at their maiden summit meeting, regional issues, including current developments in Afghanistan, Syria and Iraq, where India and the US can work together with partners toward a positive outcome. Prime minister has boldly declared the need to fight the Islamic State (IS), which no Indian leader ever did before. Similarly, the reference to disputes in South China Sea in the joint statement is a radical departure because this was never done in the India-US bilateral context. India-US declaration on cooperation in counter-terrorism including sharing of information is a major step forward. Madison Square Talking about his US visit, how can we miss the Madison Square gathering there’s nothing more to say about what our prime minister did at Madison Square Garden except that perhaps the US President Barack Obama, the only other politician rock star, is thinking about how to top it. Mr. Narendra Modi attracted 19,000 cheering fans to the rally. By promising to make India a country they can be proud of, and a place where bright young Indians can make their fortunes, Modi told these reluctant exiles exactly what they wanted to hear. Modi reiterated his campaign promises to fix India’s ailing economy and announced measures to simplify visa procedures for foreigners of Indian descent. But the main question “Could his visit help put US-India relations back on track?” Three days after Prime Minister Narendra Modi returned from his successful trip to the United States, foreign policy experts express a deep sense of satisfaction that the India-United States relations which have been dormant in the last few years have been revived. We would put Mr. Modi’s visit in two parts. Although Mr Modi did a great job while rebranding Indian skill and acumen but the tangible outcomes of his hard work are yet to be seen. Mr. Manmohan Singh came back with Indo-US nuclear deal in 2005, but in Mr. Modi’s case, a concrete achievement is still awaited. Considering the amount of time he has had in office, he is way ahead in terms of vision for India as compared to predecessors. Hope he turns his speeches into accomplishments soon. Categories: Story Of The Week Xi Jinping’s India visit: Hindi-Chini still bhai bhai..? STUBBORN GERMANY? Published by The Economics Club IMI The Economics Club IMI, New Delhi is a student body formed in 2014. We aim to facilitate knowledge sharing and propagation of intellectual ideas. We publish weekly articles related to latest business happenings as our "Story of The Week". We also publish "Trending This Week", which is an info-graphic on recent developments in the economy. We also invite eminent intellectual personalities in the field of business and economics to host insightful sessions on the campus. We look forward to collaborating and learn by the best of our abilities and resources. View all posts by The Economics Club IMI ECONOMICS CLUB, IMI New Delhi Electric Vehicles: Is India ready to plugin for future? Budget 2019: Key Highlights G-20 summit: Key takeaways SUDAN CRISIS: WHO WILL WIN? Stressed Power Ventures Chanakyaneeti Success! https://www.youtube.com/watch?v=ePDPxt2E86Y Our Recommendations: Do Visit #2018AssemblyElectionsIndia #assemblyelections #BJPsLoss #Pulwama #terroristAttack comcast CongressComeback crude oil economics club economics club imi ECONOMICS SUMMIT Economy GST India inflation international management institute MINIMUM SUPPORT PRICE msp msp on wheat net neutrality net neutrality in india oil prices RBI repo rate REPO RATE HIKE Story of the Week trade war verizon Our Recommendations: Do Check Out Subscribe to The Economics Club Blog via Email To get the latest updates from the economics world, enter your email address and receive notifications at the earliest for new posts Top categories: Story Of The Week economics club imi
cc/2019-30/en_middle_0029.json.gz/line3923
__label__cc
0.636343
0.363657
Brand campaigns in airports: Four creative examples By Nikki Gilliland 18 July 2018 16:01 Over 200,000 passengers pass through Heathrow Airport on any given day. Other large airports, including Atlanta International and Beijing Capital, welcome even more. When you think about it from a brand perspective, that’s a lot of potential eyes to capture. Also taking into consideration the fact that the majority of travellers arrive at the airport in a spending mind-set – ready and willing to eat, drink, and shop whilst there – it’s not surprising more and more brands are considering how they can target people in this unique environment. Here’s a run-down of how brands are using airports, and how these kinds of campaigns can create a big impact, even long after passengers leave the space. Made.com’s Schiphol lounge Airport waiting areas are notoriously uncomfortable – a fact which certainly doesn’t help when flights are delayed. For interior design brand, Made.com, this scenario has offered up a unique opportunity to promote its own (much comfier) furniture. It launched a unique campaign in Amsterdam’s Schiphol airport, setting up lounge spaces in strategic areas where passengers are likely to linger. Not only does the furniture serve a functional purpose for travellers looking for in-the-moment comfort, but it also offers the unique opportunity to try out Made.com products – which would otherwise only happen if they were to visit brand’s showroom. As a largely online retailer, with just a few select physical locations, this type of customer interaction is invaluable for Made.com. It instils desire for the products as well as fulfils the need to test furniture in real life, taking away the associated worry about buying furniture online. great idea to put sofas in Schiphol Airport – who knew they were so comfortable! @made.com pic.twitter.com/bDg3fGGN9l — Julia Driver (@JDriver2015) May 21, 2018 For Schiphol, of course, the campaign also has its benefits, allowing the airport to modernise and refresh its space to enhance the experience for travellers. Virgin Atlantic’s experiential igloo While many airlines use airport lounges to further existing loyalty of first class travellers, others use them for marketing purposes, with flashy and shareable experiential elements designed to target new potential customers. Take Virgin Atlantic’s clubhouse lounge, for example, which boasts an outdoor deck and rooftop. This is not necessarily desirable during the winter months, of course, which is why Virgin collaborated with London’s Coppa Club restaurant to install one of their famous igloos on it last December. Virgin’s press release read: “Customers will now be amongst the lucky few to experience the fashionable pop up for a highly shareable selfie in this unique location.” Up to eight guests could enjoy food and drink in the heated igloo before their flight, complete with a view of the runway. Undeniably then, part of the aim was to generate social media noise, with the airline clearly hoping that the experience would be ‘Insta-worthy’ enough to go viral – and pique the interest of travellers looking for a luxury experience before they even take off. As well as increased exposure, the campaign also aimed to enhance loyalty for existing customers who visited, leaving them with a memorable experience (and a greater connection to the brand) as a result. UnionPay’s Chinese New Year campaign Luxury retail is thriving, and according to data from McKinsey, Chinese consumers are driving this trend. This group accounted for nearly one third of all luxury purchases in 2016. However, language can still be a big barrier for global brands attempting to target this group, with English perhaps less likely to resonate if used in brand communication. A partnership between payment processing company Union Pay and Schiphol airport shows the benefits of marketing to travellers in their native language. In celebration of Chinese New Year, UnionPay erected large digital screens in the airport to welcome travellers (in their own language) arriving from China. The campaign also involved mobile, in-flight, and lounge promotions. According to Schiphol, sales per day during the campaign period rose by 46% compared to 2016, and the average spend per passenger increased by 15%. By the end of the campaign, UnionPay’s transaction turnover had also improved by over 177%. By tailoring their campaign to a specific consumer group (in accordance with a big event), Union Pay managed to create a highly personal campaign. It would be interesting to know whether sales would have been much lower if the brand communication was indeed in English, as well as other factors like brand recall and sentiment. Regardless, as the resulting uplift shows, the campaign certainly hit the spot for Chinese travellers. HSBC’s ‘Together We Thrive’ refresh HSBC is a familiar sight for many UK travellers. It was the very first brand to make use of ad space along jet bridges in Heathrow airport, having launched its first ad campaign back in 2001. Recently, HSBC announced that it is to refresh its presence in 17 different airports around the world, re-launching its ‘Together We Thrive’ campaign with new and globally-focused creative ads. It has also announced that the campaign will target passengers in moments other than their walks to and from the plane. The new ads will focus on HSBC’s business priorities, including trade, education, diversity and sustainability. Ads are selected to go in specific airports (and routes) based on what type of passengers are likely to see them – e.g. business travellers or holidaymakers – as well as to be in keeping with what’s relevant to local markets. According to HSBC, the ads will be seen by approximately 900 million people this summer alone. But do people really take notice of ads like this, especially in moments where their attention is more likely to be on getting to the gate or passport control? Got to admit… I’m s sucker for the @HSBC airport nuggets if wisdom and graphics! @Gatwick_Airport pic.twitter.com/UwmkFX8XIg — Ali Paterson (@AliPaterson) July 17, 2018 To some extent, it seems they do, but in order to increase impact and recall, HSBC has also decided to expand the campaign elsewhere in airports, recognising the opportunity to engage travellers at multiple touchpoints. It will use digital ads in main airport terminals to reach people as they eat and shop, and these screens will also point travellers to the HSBC app, as well as travel-related content including destination guides. With airport advertising space predicted to increase in value in the next few years, it looks to be even more intrinsic to HSBC’s global strategy going forward. For more on brand and creative, check out 2018’s Festival of Marketing, October 10-11 in London. Gatwick airport introduces AR navigation to help travellers pre-flight Why travel retail is big business for beauty brands Advertising HSBC Made.com union pay Virgin Atlantic Blog Data and Analytics A day in the life of… head of product at an audience management platform Graham Morley is a customer experience expert who works for Carbon, an audience management platform, developed by Clicksco. What is an audience management platform? Here’s Graham to explain more and to tell us what he does with his time. Blog Digital Transformation The best digital marketing stats we’ve seen this week It’s that time of the week yet again, when we regale you with the finest digital stats we’ve come across in the past seven days. This roundup includes news about email open rates, app installs, digital transformation projects, and lots more too. July 6th 2018 12:38 Blog Native Apps A mobile Ads.txt is needed as fraudsters pounce on shortcomings The digital ad industry has made significant strides in the past year in its fight against ad fraud. One of the biggest: Ads.txt, an IAB standard that offers a means to defend against inventory spoofing and unauthorized sellers.
cc/2019-30/en_middle_0029.json.gz/line3925
__label__wiki
0.68345
0.68345
Disaster Recovery for Pennies on the Dollar Symform positions itself as the most clever and affordable take on online disaster recovery to date. By Stephen Swoyer Symform isn't the first company to pitch a decentralized disaster recovery (DR) offering to small and midsize enterprise customers. In fact, there's no shortage of online backup services, many of which tout disaster recovery or business continuity (BC) features. However, Symform -- the start-up brainchild of a pair of former Microsoft Corp. engineers -- positions itself as the most clever and affordable take on online DR or BC to date. Kevin Brown, Symform's vice president of sales and marketing, contrasts his company's approach with those of established online backup services such as Mozy, iStorage (an Iomega venture), Connected Backup (an IronMountain venture), and LiveVault. Mozy, to be sure, is consumer-centric, but iStorage, Connected Backup, and LiveVault all market to SMB and SME customers. All of these players use a traditional, data-center-focused model, Brown says. Symform is different. "We thought, what if we were able to aggregate [the resources of] all of these small businesses around the world? All of them are running computer systems. These systems are in use during the day, but [during] night times [and] weekends they aren't [being] used. What if we were basically to aggregate all of that disk capacity and take advantage of the power, [data center] real estate, and storage to create a virtual data center?" says Brown. Brown points out that the biggest costs associated with managing a data center -- such as those which power online backup services from Iomega, Iron Mountain, and others -- stem from power, cooling, and data center real estate. Hardware and even software costs, Brown notes, are negligible in comparison. Symform's "virtual data center" effectively dispenses with most of the costs associated with maintaining a physical plant. "You basically contribute local, inexpensive storage from one of the systems in your office and in return receive reliable, secure online storage. The data in every office is backed up to the cloud. The data is distributed randomly to all of the computers that are connected in the network," he explains. He describes Symform's approach as "sort of a cross between bittorrent [a peer-to-peer sharing technology] and cloud computing." At a glance, Symform's approach sounds a lot like what used to be called "grid computing" back in the early 2000s. At the time, advocates pitched grid as a potentially killer technology proposition. Skeptics weren't so sure, suggesting that -- killer technology proposition or not -- grids lacked a killer market. Brown concedes that there might be a facile similarity, but stresses that -- with respect to its technological underpinnings -- Symform's model is different. "It's using decentralized cloud computing to solve a pretty mundane problem, but a pretty important problem," he comments. "Most businesses are working with some kind of IT services provider in their locale. There's 'Charlie The Computer Guy' to whom we pay X amount of dollars per hour to fix the Internet connection when it's broken, or set up e-mail, or add a computer." The point, Brown says, is that Charlie The Computer Guy isn't necessarily paid to think about disaster recovery. More to the point, SME customers typically don't have the budget to pay Charlie -- or anyone else -- to think about DR. Symform lets SMEs have their Charlies and get the benefit of inexpensive DR, too. "We run a little agent on one of the computers in your LAN, and that monitors the set of folders that you tell it to monitor. It then mirrors changes up into the cloud. What we do then is we fragment files and chop them up into 1 MB fragments, so we'll have 64 1-MB fragments and we'll add 32 [extra] fragments for redundancy. We take those 96 encrypted fragments and scatter them into the wind. Some of them will end up in New Jersey, some of them end up in Florida, some in the UK, some in Argentina." All data is encrypted (with a 256-bit cipher) before it's sent out. Because of the redundancy, resiliency, and geographic heterogeneity of the Symform model, Brown maintains, data cannot be permanently lost. What if data is temporarily unavailable? What if some percentage of Symform peers -- including systems playing host to fragments that are needed for recovery -- is offline? The odds of Symform being unable to recover the fragments it needs from somewhere in the cloud are extremely small, Brown maintains. "We have 96 fragments out there. We only need 64 [to restore customer data], so we just take the fastest 64 fragments and bond them together in this core reversal process. We recognize … that the best reason to have that many fragments is so we can offer a better recovery model," he explains. Some SME customers might nonetheless have concerns about Symform's cloud-based, peer-to-peer model. Brown insists that such concerns are misplaced, citing interest from General Electric Co. (GE) as proof that even large customers -- in this case, large, multinational, Fortune 100 customers -- are intrigued. GE was looking for an affordable way to backup desktop data: "They basically asked us, 'What if you were to run [your] service as a private cloud just for us?' They could host the orchestration service or we could. They wanted us to do it -- with, of course, a couple of tweaks around access control -- but imagine having your own decentralized access system." For large enterprise customers such as GE, Symform provides an affordable means to backup desktop or workstation data; for SMEs, on the other hand, Symform can serve as a one-stop shop for DR and BC. In both cases, he maintains, its peer-to-peer model enables it to undercut competitors on the pricing front. "We charge a flat rate, roughly about … $15 per server. That's flat, unlimited: we don't care if you have 1 GB or 1 TB to backup [per server], because you always contribute what you consume," he says. "Small businesses are constantly creating more data every quarter, every year, and because of regulatory and compliance issues … small businesses, like larger businesses, are being forced to keep more and more records. This speaks directly to them."
cc/2019-30/en_middle_0029.json.gz/line3929
__label__wiki
0.837206
0.837206
1913–14 Scottish Division One Scottish Division One The 1913–14 Scottish Division One season was won by Celtic by six points over nearest rival Rangers. League table[edit] Celtic 38 30 5 3 81 14 +67 65 Rangers 38 27 5 6 79 31 +48 59 Heart of Midlothian 38 23 8 7 70 29 +41 54 Morton 38 26 2 10 76 51 +25 54 Falkirk 38 20 9 9 69 51 +18 49 Airdrieonians 38 18 12 8 72 43 +29 48 Dundee 38 19 5 14 64 53 +11 43 Third Lanark 38 13 10 15 42 51 −9 36 Clyde 38 11 11 16 44 44 0 33 Ayr United 38 13 7 18 56 72 −16 33 Raith Rovers 38 13 6 19 56 57 −1 32 Kilmarnock 38 11 9 18 48 68 −20 31 Hibernian 38 12 6 20 58 75 −17 30 Aberdeen 38 10 10 18 38 55 −17 30 Partick Thistle 38 10 9 19 37 51 −14 29 Queen's Park 38 10 9 19 52 84 −32 29 Motherwell 38 11 6 21 46 65 −19 28 Hamilton Academical 38 11 6 21 49 66 −17 28 Dumbarton 38 10 7 21 45 87 −42 27 St Mirren 38 8 6 24 38 73 −35 22 Source: statto.com Scottish Football Archive[permanent dead link] Top division football seasons in Scotland List of Scottish football champions 1913–14 in European football Iceland '13 '14 Norway '13 '14 Spain '13 '14 Sweden '13 '14 1913–14 in Scottish football Scottish Cup (Final) Junior Cup Related to national team British Home Championship Club seasons Airdrieonians Raith Rovers Third Lanark Arthurlie Dundee Hibernian East Stirlingshire Leith Athletic St Bernard's Vale of Leven Retrieved from "https://en.wikipedia.org/w/index.php?title=1913–14_Scottish_Division_One&oldid=880023689" 1913–14 Scottish Football League Scottish Division One seasons 1913–14 in European association football leagues This page was last edited on 24 January 2019, at 21:10 (UTC).
cc/2019-30/en_middle_0029.json.gz/line3938
__label__wiki
0.894949
0.894949
Roman mythology Romulus and Remus, the Lupercal, Father Tiber, and the Palatine on a relief from a pedestal dating to the reign of Trajan (AD 98–117) Roman mythology is the body of traditional stories pertaining to ancient Rome's legendary origins and religious system, as represented in the literature and visual arts of the Romans. "Roman mythology" may also refer to the modern study of these representations, and to the subject matter as represented in the literature and art of other cultures in any period. The Romans usually treated their traditional narratives as historical, even when these have miraculous or supernatural elements. The stories are often concerned with politics and morality, and how an individual's personal integrity relates to his or her responsibility to the community or Roman state. Heroism was an important theme. When the stories illuminate Roman religious practices, they are more concerned with ritual, augury, and institutions than with theology or cosmogony.[1] The study of Roman religion and myth is complicated by the early influence of Greek religion on the Italian peninsula during Rome's protohistory, and by the later artistic imitation of Greek literary models by Roman authors. In matters of theology, the Romans were curiously eager to identify their own gods with those of the Greeks (interpretatio graeca), and to reinterpret stories about Greek deities under the names of their Roman counterparts.[2] Rome's early myths and legends also have a dynamic relationship with Etruscan religion, less documented than that of the Greeks. While Roman mythology may lack a body of divine narratives as extensive as that found in Greek literature,[3] Romulus and Remus suckling the she-wolf is as famous as any image from Greek mythology except for the Trojan Horse.[4] Because Latin literature was more widely known in Europe throughout the Middle Ages and into the Renaissance, the interpretations of Greek myths by the Romans often had a greater influence on narrative and pictorial representations of "classical mythology" than Greek sources. In particular, the versions of Greek myths in Ovid's Metamorphoses, written during the reign of Augustus, came to be regarded as canonical. 1 The nature of Roman myth 1.1 Founding myths 1.2 Other myths 2 Religion and myth 2.1 Foreign gods The nature of Roman myth In this wall painting from Pompeii, Venus looks on while the physician Iapyx tends to the wound of her son, Aeneas; the tearful boy is her grandson Ascanius, also known as Iulus, legendary ancestor[citation needed] of Julius Caesar and the Julio-Claudian dynasty Because ritual played the central role in Roman religion that myth did for the Greeks, it is sometimes doubted that the Romans had much of a native mythology. This perception is a product of Romanticism and the classical scholarship of the 19th century, which valued Greek civilization as more "authentically creative."[5] From the Renaissance to the 18th century, however, Roman myths were an inspiration particularly for European painting.[6] The Roman tradition is rich in historical myths, or legends, concerning the foundation and rise of the city. These narratives focus on human actors, with only occasional intervention from deities but a pervasive sense of divinely ordered destiny. In Rome's earliest period, history and myth have a mutual and complementary relationship.[7] As T. P. Wiseman notes: The Roman stories still matter, as they mattered to Dante in 1300 and Shakespeare in 1600 and the founding fathers of the United States in 1776. What does it take to be a free citizen? Can a superpower still be a republic? How does well-meaning authority turn into murderous tyranny?[6] Major sources for Roman myth include the Aeneid of Vergil and the first few books of Livy's history as well as Dionysius' s Roman Antiquities. Other important sources are the Fasti of Ovid, a six-book poem structured by the Roman religious calendar, and the fourth book of elegies by Propertius. Scenes from Roman myth also appear in Roman wall painting, coins, and sculpture, particularly reliefs. Founding myths Main article: Founding of Rome The Aeneid and Livy's early history are the best extant sources for Rome's founding myths. Material from Greek heroic legend was grafted onto this native stock at an early date. The Trojan prince Aeneas was cast as husband of Lavinia, daughter of King Latinus, patronymical ancestor of the Latini, and therefore through a convoluted revisionist genealogy as forebear of Romulus and Remus. By extension, the Trojans were adopted as the mythical ancestors of the Roman people.[8] Other myths Mucius Scaevola in the Presence of Lars Porsenna (early 1640s) by Matthias Stom Polyphemus hears of the arrival of Galatea; ancient Roman fresco painted in the "Fourth Style" of Pompeii (45-79 AD) The characteristic myths of Rome are often political or moral, that is, they deal with the development of Roman government in accordance with divine law, as expressed by Roman religion, and with demonstrations of the individual's adherence to moral expectations (mos maiorum) or failures to do so. Rape of the Sabine women, explaining the importance of the Sabines in the formation of Roman culture, and the growth of Rome through conflict and alliance. Numa Pompilius, the Sabine second king of Rome who consorted with the nymph Egeria and established many of Rome's legal and religious institutions. Servius Tullius, the sixth king of Rome, whose mysterious origins were freely mythologized and who was said to have been the lover of the goddess Fortuna. The Tarpeian Rock, and why it was used for the execution of traitors. Lucretia, whose self-sacrifice prompted the overthrow of the early Roman monarchy and led to the establishment of the Republic. Cloelia, A Roman woman taken hostage by Lars Porsena. She escaped the Clusian camp with a group of Roman virgins. Horatius at the bridge, on the importance of individual valor. Mucius Scaevola, who thrust his right hand into the fire to prove his loyalty to Rome. Caeculus and the founding of Praeneste.[9] Manlius and the geese, about divine intervention at the Gallic siege of Rome.[10] Stories pertaining to the Nonae Caprotinae and Poplifugia festivals.[11] Coriolanus, a story of politics and morality. The Etruscan city of Corythus as the "cradle" of Trojan and Italian civilization.[12] The arrival of the Great Mother (Cybele) in Rome.[13] Religion and myth Main article: Religion in ancient Rome Narratives of divine activity played a more important role in the system of Greek religious belief than among the Romans, for whom ritual and cult were primary. Although Roman religion did not have a basis in scriptures and exegesis, priestly literature was one of the earliest written forms of Latin prose.[14] The books (libri) and commentaries (commentarii) of the College of Pontiffs and of the augurs contained religious procedures, prayers, and rulings and opinions on points of religious law.[15] Although at least some of this archived material was available for consultation by the Roman senate, it was often occultum genus litterarum,[16] an arcane form of literature to which by definition only priests had access.[17] Prophecies pertaining to world history and to Rome's destiny turn up fortuitously at critical junctures in history, discovered suddenly in the nebulous Sibylline books, which Tarquin the Proud (according to legend) purchased in the late 6th century BC from the Cumaean Sibyl. Some aspects of archaic Roman religion survived in the lost theological works of the 1st-century BC scholar Varro, known through other classical and Christian authors. Capitoline Triad The earliest pantheon included Janus, Vesta, and a leading so-called Archaic Triad of Jupiter, Mars, and Quirinus, whose flamens were of the highest order. According to tradition, Numa Pompilius, the Sabine second king of Rome, founded Roman religion; Numa was believed to have had as his consort and adviser a Roman goddess or nymph of fountains and of prophecy, Egeria. The Etruscan-influenced Capitoline Triad of Jupiter, Juno and Minerva later became central to official religion, replacing the Archaic Triad — an unusual example within Indo-European religion of a supreme triad formed of two female deities and only one male. The cult of Diana became established on the Aventine Hill, but the most famous Roman manifestation of this goddess may be Diana Nemorensis, owing to the attention paid to her cult by J.G. Frazer in the mythographical classic The Golden Bough. Punishment of Ixion: in the center stands Mercury holding the caduceus, and on the right Juno sits on her throne. Behind her Iris stands and gestures. On the left Vulcan (the blond figure) stands behind the wheel, manning it, with Ixion already tied to it. Nephele sits at Mercury's feet. - Roman fresco from the eastern wall of the triclinium in the House of the Vettii, Pompeii, Fourth Style (60-79 AD). The gods represented distinctly the practical needs of daily life, and Ancient Romans scrupulously accorded them the appropriate rites and offerings. Early Roman divinities included a host of "specialist gods" whose names were invoked in the carrying out of various specific activities. Fragments of old ritual accompanying such acts as plowing or sowing reveal that at every stage of the operation a separate deity was invoked, the name of each deity being regularly derived from the verb for the operation. Tutelary deities were particularly important in ancient Rome. Thus, Janus and Vesta guarded the door and hearth, the Lares protected the field and house, Pales the pasture, Saturn the sowing, Ceres the growth of the grain, Pomona the fruit, and Consus and Ops the harvest. Even the majestic Jupiter, the ruler of the gods, was honored for the aid his rains might give to the farms and vineyards. In his more encompassing character he was considered, through his weapon of lightning, the director of human activity. Due to his widespread domain, the Romans regarded him as their protector in their military activities beyond the borders of their own community. Prominent in early times were the gods Mars and Quirinus, who were often identified with each other. Mars was a god of war; he was honored in March and October. Modern scholars see Quirinus as the patron of the armed community in time of peace. The 19th-century scholar Georg Wissowa[18] thought that the Romans distinguished two classes of gods, the di indigetes and the di novensides or novensiles: the indigetes were the original gods of the Roman state, their names and nature indicated by the titles of the earliest priests and by the fixed festivals of the calendar, with 30 such gods honored by special festivals; the novensides were later divinities whose cults were introduced to the city in the historical period, usually at a known date and in response to a specific crisis or felt need. Arnaldo Momigliano and others, however, have argued that this distinction cannot be maintained.[19] During the war with Hannibal, any distinction between "indigenous" and "immigrant" gods begins to fade, and the Romans embraced diverse gods from various cultures as a sign of strength and universal divine favor.[20] Foreign gods Mithras in a Roman wall painting The absorption of neighboring local gods took place as the Roman state conquered neighboring territories. The Romans commonly granted the local gods of a conquered territory the same honors as the earlier gods of the Roman state religion. In addition to Castor and Pollux, the conquered settlements in Italy seem to have contributed to the Roman pantheon Diana, Minerva, Hercules, Venus, and deities of lesser rank, some of whom were Italic divinities, others originally derived from the Greek culture of Magna Graecia. In 203 BC, Rome imported the cult object embodying Cybele from Pessinus in Phrygia and welcomed its arrival with due ceremony. Both Lucretius and Catullus, poets contemporary in the mid-1st century BC, offer disapproving glimpses of Cybele's wildly ecstatic cult. In some instances, deities of an enemy power were formally invited through the ritual of evocatio to take up their abode in new sanctuaries at Rome. Communities of foreigners ( peregrini) and former slaves (libertini) continued their own religious practices within the city. In this way Mithras came to Rome and his popularity within the Roman army spread his cult as far afield as Roman Britain. The important Roman deities were eventually identified with the more anthropomorphic Greek gods and goddesses, and assumed many of their attributes and myths. Mythology portal Classical Civilisation portal Wikimedia Commons has media related to Roman mythology. List of Metamorphoses characters Roman polytheistic reconstructionism The Golden Bough (mythology) List of Roman gods ^ John North, Roman Religion (Cambridge University Press, 2000) pp. 4ff. ^ North, Roman Religion, pp. 4–5. ^ North, Roman Religion, p. 4. ^ T. P. Wiseman, Remus: A Roman Myth (Cambridge University Press, 1995), p. xiii. ^ T. P. Wiseman, The Myths of Rome (University of Exeter Press, 2004), preface (n.p.). ^ a b Wiseman, The Myths of Rome, preface. ^ Alexandre Grandazzi, The Foundation of Rome: Myth and History (Cornell University Press, 1997), pp. 45–46. ^ See also Lusus Troiae. ^ J.N. Bremmer and N.M. Horsfall, Roman Myth and Mythography (University of London Institute of Classical Studies, 1987), pp. 49–62. ^ Bremmer and Horsfall, pp. 63–75. ^ Bremmer and Horsfall, pp. 89–104; Larissa Bonfante, Etruscan Life and Afterlife: A Handbook of Etruscan Studies (Wayne State University Press, 1986), p. 25. ^ Bremmer and Horsfall, pp. 105–111. ^ Moses Hadas, A History of Latin Literature (Columbia University Press, 1952), p. 15 online. ^ C.O. Brink, Horace on Poetry. Epistles Book II: The Letters to Augustus and Florus (Cambridge University Press, 1982), p. 64 online. ^ Cicero, De domo sua 138. ^ Jerzy Linderski, "The libri reconditi," Harvard Studies in Classical Philology 89 (1985) 207–234. ^ Georg Wissowa, De dis Romanorum indigetibus et novensidibus disputatio (1892), full text (in Latin) online. ^ Arnaldo Momigliano, "From Bachofen to Cumont," in A.D. Momigliano: Studies on Modern Scholarship (University of California Press, 1994), p. 319; Franz Altheim, A History of Roman Religion, as translated by Harold Mattingly (London, 1938), pp. 110–112; Mary Beard, J.A. North and S.R.F. Price. Religions of Rome: A History (Cambridge University Press, 1998), vol. 1, p. 158, note 7. ^ William Warde Fowler, The Religious Experience of the Roman People (London, 1922) pp. 157 and 319; J.S. Wacher, The Roman World (Routledge, 1987, 2002), p. 751. Beard, Mary. 1993. "Looking (Harder) for Roman Myth: Dumézil, Declamation, and the Problems of Definition." In Mythos in Mythenloser Gesellschaft: Das Paradigma Roms. Edited by Fritz Graf, 44–64. Stuttgart, Germany: Teubner. Braund, David, and Christopher Gill, eds. 2003. Myth, History, and Culture in Republican Rome: Studies in Honour of T. P. Wiseman. Exeter, UK: Univ. of Exeter Press. Cameron, Alan. 2004. Greek Mythography in the Roman World. Oxford: Oxford Univ. Press. Dumézil, Georges. 1996. Archaic Roman Religion. Rev. ed. Translated by Philip Krapp. Baltimore: Johns Hopkins Univ. Press. Fox, Matthew. 2011. “The Myth of Rome” In A Companion to Greek Mythology. Blackwell Companions to the Ancient World. Literature and Culture.Edited by Ken Dowden and Niall Livingstone. Chichester; Malden, MA: Wiley-Blackwell. Gardner, Jane F. 1993. Roman Myths: The Legendary Past. Austin: Univ. of Texas Press. Grandazzi, Alexandre. 1997. The Foundation of Rome: Myth and History. Translated by Jane Marie Todd. Ithaca, NY: Cornell Univ. Press. Hall, Edith 2013. "Pantomime: Visualising Myth in the Roman Empire." In Performance in Greek and Roman Theatre. Edited by George Harrison and George William Mallory, 451-743. Leiden; Boston: Brill. Miller, Paul Allen. 2013. "Mythology and the Abject in Imperial Satire." In Classical Myth and Psychoanalysis: Ancient and Modern Stories of the Self. Edited by Vanda Zajko and Ellen O'Gorman, 213-230. Oxford; New York: Oxford University Press. Newby, Zahra. 2012. "The Aesthetics of Violence: Myth and Danger in Roman Domestic Landscapes." Classical Antiquity 31.2: 349-389. Wiseman, T. P. 2004. The Myths of Rome. Exeter: Univ. of Exeter Press. Woodard, Roger D. 2013. Myth, Ritual, and the Warrior in Roman and Indo-European Antiquity. Cambridge; New York: Cambridge University Press. Library resources about Resources in your library Resources in other libraries Lexicon Iconographicum Mythologiae Classicae (LIMC) (1981–1999, Artemis-Verlag, 9 volumes), Supplementum (2009, Artemis_Verlag). LIMC-France (LIMC): Databases Dedicated to Graeco-Roman Mythology and its Iconography. Religion in ancient Rome Practices and beliefs libation Greco-Roman mysteries Priesthoods Pontifices Augures Vestal Virgins Flamines Fetiales Epulones Salii List of Roman deities Twelve major gods Aventine Triad underworld gods indigitamenta Deified emperors Divus Julius Divus Augustus Glossary of ancient Roman religion Ancient Greek religion Etruscan mythology Gallo-Roman religion Interpretatio graeca Decline of Greco-Roman polytheism Ancient Roman religion and mythology Bona Dea Castor and Pollux Dīs Pater Egeria Faunus Penates Priapus Quirinus Abstract deities Abundantia Averruncus Fontus Pietas Legendary figures Aeneas Rhea Silvia Romulus and Remus Numa Pompilius Tullus Hostilius Servius Tullius Ancus Marcius Lucius Tarquinius Priscus Lucius Tarquinius Superbus Metamorphoses Fasti Propertius The Golden Ass Peripateticism Myth and ritual Roman polytheism (List) Classical mythology Conversion to Christianity Ancient Rome topics Principate Western Empire historiography of the fall Late Empire Legislative assemblies Curiate Centuriate Plebeian Executive magistrates Twelve Tables Auctoritas Cursus honorum Collegiality Vicarius Vigintisexviri Lictor Magister militum Princeps senatus Pontifex Maximus Tetrarch Optimates Magistrates Tribune of the Plebs Military tribune Aedile Promagistrate Interrex Magister Equitum Decemviri Consular Tribune Triumvir Political control Frontiers and fortifications castra Infantry tactics Decorations and punishments Hippika gymnasia Republican currency Imperial currency Romanization Patricians Conflict of the Orders Secessio plebis Equites Naming conventions Bagaudae Aqueducts Ammianus Marcellinus Appuleius Asconius Pedianus Aurelius Victor Ausonius Boëthius Censorinus Claudian Columella Ennius Fabius Pictor Florus Frontinus Fulgentius Gellius Macrobius Orosius Petronius Pliny the Elder Priscian Quintilian Quintus Curtius Rufus Seneca the Elder Servius Sidonius Apollinaris Symmachus Valerius Antias Valerius Maximus Velleius Paterculus Verrius Flaccus Arrian Cassius Dio Diodorus Siculus Dionysius of Halicarnassus Eusebius of Caesaria Herodian Josephus Philostratus Phlegon of Tralles Photius Porphyrius Strabo Zonaras Berytus Bononia Eboracum Vindobona Lists and other Consuls Distinguished women Geographers Roman–Iranian relations Retrieved from "https://en.wikipedia.org/w/index.php?title=Roman_mythology&oldid=903117271" Italic mythology
cc/2019-30/en_middle_0029.json.gz/line3941
__label__cc
0.626837
0.373163
Watch Live Demo About eSUB eSUB Academy Academy Events eSUB Webinars eSUB Construction Blog eSUB Videos Specialty Contractor HVAC Software Drywall Contractor Plumbing Software Subcontractor Solutions Integrated Labor Delivery Autodesk Integration View 7-Minute Demo Video eSUB Module Overview Change Orders Pay Applications eSUB Time Why eSUB? eSUB Time Demo Why eSUB The Women of eSUB Posted on March 8, 2019 March 7, 2019 by Rachel Novotny Facebook0Tweet0LinkedIn0 In celebration of Women in Construction week, we want to highlight some of the wonderful women of eSUB who are breaking down barriers working in both Construction and Tech. For International Women’s Day and Women in Construction week, we feel it’s important for our readers to be able to meet some of the women who work to make eSUB great. And hope that their portraits can inspire others thinking about careers in construction and construction technology. With the increasing labor shortage in both the construction and technology fields, it is imperative that we set a good example for future generations of women. Instead on discouraging them from entering trades or tech, our hope is to show how successful they can be. The mission of Women in Construction Week (March 3-9) is to enhance the success of women in construction. National Association of Women in Construction has found that less than 9% of the construction industry is made up of female workers. And in the trades, it’s closer to 3%. The limited number of women in construction isn’t only limited to the United States. In Australia roughly 12% of the construction labor force is women, and they leave the industry roughly 39% faster than men. This trend isn’t limited to just the construction industry, the tech industry is notorious for having predominately male workforces. At the beginning of computers and computer science, it was believed to be a woman’s profession due due to the need for concise, elegant, and meticulous logic writing, or code. But today women make up roughly 20% of the tech workforce. With two industries faced with a lack of skilled workers, it’s important that we set an example for future generations of young girls that Technology and Construction aren’t only for men, they are for strong, ambitious women as well! We are thrilled to introduce some of the very talented women behind eSUB: Wendy Rogers – CEO and Founder I studied Journalism at UC Berkley before going into television production. I ran a consulting firm for a number of years handling construction claims specifically for trade contractors. eSUB is really an extension of that consulting firm. We built it out of our 30-year commitment to the trade contractors. eSUB is a tool to increase communication and coordination. My mission is to provide the most comprehensive and easy to use mobile project management solution on the market, tailored specifically for the trades to increase standardization, accountability, and productivity. Sara Giacobbi – Client Success Manager What is your background? “I was a mechanical engineer and one of my first jobs was at Autodesk as an Applications Engineer.” What do you like about working at eSUB? “I like the culture of eSUB and the people of eSUB because they care about each other.” What is it like to be a woman in construction technology? “There are a lot of women in construction and as a woman working with subcontractors, I feel fully respected.” Olivia Rennicks – Sales What is your background? “I am a recent graduate of May 2018 from SDSU, I studied Business with an emphasis in Marketing.” What do you like about eSUB? “What I like about eSUB the most is the people I work with and the environment. We are all go-getters and work hard for the results we desire. Everyone is so friendly and welcoming. I chose eSUB because I saw it as a great opportunity to learn and grow being my first full-time job out of college.” What does it mean to you to be a woman in construction technology? “Being a woman in construction technology speaks loudly. You don’t find many women in this industry. However, as time evolves everything evolves. I am here to make a change and to create a voice for the women in this industry. Highlights, when I am calling on prospects and when I engage with another female in the construction industry you can hear the excitement in their voice that another woman is working in a field that is typically saturated with men.” Ohmy Pugkhem – iOS Developer What is your background? “My background is in engineering I was an iOS developer for 4 years before I join eSUB.” What do you like about working at eSUB? “I like the environment at eSUB. I like the startup vibe, and it’s very family oriented.” What is it like to be a part of the construction technology industry? “The construction industry builds this country and the world, it’s AWESOME. Being a part of the technology of the construction industry is a great thing.” Dafne Troyce – Director of Sales and Marketing Operations What is your background? “I graduated with a degree in Journalism & Media Studies which put me into the online/digital world. That’s when I learned Salesforce and loved the administrative/analytic side of technology, so I decided to pursue that and become an expert in all things Salesforce and sales enablement tools. That experience led to me taking over eSUB’s SDR team and helping them with their day to day operational processes.” What do you like about eSUB? “I have always felt that who you work for/with is more important than where you work and that holds especially true here at eSUB. The company culture here encourages individuals of all levels to offer up their perspectives and actively leverages the feedback to improve business operations. I love working for a company where your voice is heard and your ideas are always encouraged.” What is it like to be a woman in construction technology? “Being a woman in construction technology to me is about demonstrating the positive impact that women can have in traditionally male-dominated industries. Additionally, being in a leadership role allows me to empower other women to make their mark on our business and use their unique perspectives to spark innovation and drive meaningful change.” NAWIC Posted in Construction Software. Autodesk University Recap: eSUB’s Key Takeaways Is It Time for More Women in the Construction Industry? Subscribe to our blog for the latest construction news. Field Works Mobile App Live Technical Support Virtual Filing Cabinet Equipment Rental Tracking 2 Way Email Integration Reports and Graphs How to Write a Request for Information in Construction What Is Request For Information? How to Improve Your RFI Process What is Construction In Progress Accounting: Everything You Need To Know 10 Types of Construction Technology That Will Shape the Industry in 2019 RFI vs RFP: What’s the Difference? Private Policy | Disclaimer Copyright © 2019 eSUB Inc. All Rights Reserved. Private Policy Disclaimer Schedule a Free Demo
cc/2019-30/en_middle_0029.json.gz/line3942
__label__cc
0.645697
0.354303
Hear well – learn easier A tour guide system is the acoustic solution for guided tours and museum education, as illustrated by the Kunsthalle Vogelmann art museum in Heilbronn / Germany It’s a problem almost every museum faces – whether in a listed historic building or in the most modern of museum architecture – most exhibitions are not suited to the use of sound-absorbing fittings such as carpets or curtains. Therefore smooth surfaces and materials often mean bad acoustics. This poses a problem for group tours and museum education. When the guide is talking, the hard surfaces cause an echo that has a negative effect upon speech intelligibility. This effect is then magnified by the noise level caused by the other visitors, meaning that even very small groups can only understand a fraction of the tour. It has been proven that it is much easier to learn if one can clearly hear what is being said. The solution is the use of a tour guide system with which speech can be discreetly but clearly transmitted to the group. This is the reason why, for example, the Kunsthalle Vogelmann art museum in Heilbronn is now using the beyerdynamic Synexis Tour Guide System. The plain, appealing architecture of the modern museum cube required just that: “We observed the situation for a while and simply had to react”, says the museum’s Director Dr Marc Gundel, “the guide had to talk really loudly for the group to hear everything. That in turn disturbed the other visitors – particularly if we were taking several groups through the exhibition at the same time.” The decision was made to use the Synexis system with beltpack transmitters and neckworn microphones; now the guide can show exhibits and carry documents without restrictions. The microphones have special characteristics that block out background noise and make for optimum speech transmission to the headphones. Guest can understand everything clearly, can concentrate more on what is being said and, thus, learn more easily. The system can be operated intuitively and is always ready for use in its practical transport and charging case. Using the Synexis system has an additional advantage too: the situation is even more acute for the hard of hearing, as they have more difficulty filtering the pure speech signal out of the hubbub around them. Wearers of hearing aids can now simply use the induction neckloop instead of the headphones, and thus get the signal sent directly to their hearing aid (T-position). This means organizers can offer their tours as barrier-free for the hard of hearing. “It’s a useful addition as we often have older museum guests”, says Curator Dr Rita Täuber happily. Further information and video clip: www.beyerdynamic.com/synexis Photos: Staedtische Museen Heilbronn / beyerdynamic Guided tours at the Kunsthalle Vogelmann art museum use beyerdynamic’s Synexis Tour Guide System to improve speech intelligibility Download Original (618 KB) The modern architecture with its smooth surfaces poses an acoustic challenge With its practical transport and charging case with detachable lid, the system is always ready for use beyerdynamic Synexis Tour Guide System The Kunsthalle Vogelmann museum cube (architect: Felipe Rodriguez, Zurich) Download Original (1 MB)
cc/2019-30/en_middle_0029.json.gz/line3945
__label__wiki
0.933885
0.933885
Queer Eye for the Straight Guy By Carina Chocano August 01, 2003 at 04:00 AM EDT Queer Eye for the Straight Guy Photograph by Erin Patrice O'Brien ”Spa treatments are expensive,” fashion guru Carson warns Adam Zalta, a Long Island businessman, as they charge into town to remove his feral unibrow as if it were a collapsed kidney. ”But you know what’s more expensive?” ”Divorce,” mutters Adam sheepishly. ”Divorce,” Carson confirms, in his best hate-to-break-it-to-you voice. By the time Bravo aired episode 2 of Queer Eye for the Straight Guy on July 15, it was pretty clear that the scope of the new makeover show spanned beyond its title. Taking into account the living conditions from which its subjects are dramatically rescued — ”Oh, look!” Carson exclaims, after the first subject’s federal disaster area of an apartment is transformed into a stylish bachelor pad. ”You put a living room where the crack den used to be!” — the show is better described as a full-scale humanitarian relief mission: Queers Without Borders. In a funny yet tender variation on the ubiquitous self-improvement-through-products genre, ”Queer Eye” has managed to unearth a virgin makeover-market niche in basic cable. In doing so, it has slyly upended conventional notions (or what were once conventional notions, anyway) about male desirability. Suddenly, gay guys taunted on the playground for their interest in ”girl things” are using these skills to help their tormentors — and ironically, are ridiculing their subjects in the process. Each week, ”Queer Eye”’s team of lifestyle commandos — Carson Kressley, fashion; Kyan Douglas, grooming; Ted Allen, food and wine; Jai Rodriguez, culture; and Thom Filicia, interior design — gallantly and poignantly rescue a straight man so egregiously out of style, so taste- and culture-deprived, his plight is portrayed as a life-threatening condition. The Fab 5 (as they’ve gleefully dubbed themselves) may embrace every gay stereotype imaginable, but they know how to get the girls. When, in the first episode, the Fab 5 transform urban lumberjack Brian ”Butch” Schepel into a happening artist, his ”friend” Laurel, who’s the object of much of his art — and (seemingly) his affections — turns to the man next to her and snaps, ”You should find out about his tanning thing, because he was pale as an ass.” As mordant as Carson and the other’s observations are (upon first learning Zalta’s parabolic measurements, he blurts, ”Ooh, Tragikistan!”), they are also surprisingly kindhearted and tender. ”Queer Eye” may be just more of the same televised proselytizing about better living through shopping, but after witnessing a series of helpless straight guys — and not a single metrosexual among them — cheerfully submit to the hands-on ministrations of five gay men, the subversiveness of it all hits you. (”Have you ever had a man undress you before?” Carson asks Schepel, who happily goes along with the day of shopping, salon styling, home decorating, eyebrow tinting, and spray tanning before a big unveiling at his first gallery opening.) ”Queer Eye” is a show about people who need people. It’s a gay-straight version of a Michael Jackson-Paul McCartney duet. ”Queer Eye” is glasnost. Ted Allen, Kyan Douglas, Thom Filicia, Carson Kressley, Jai Rodriguez Surprise! Queer Eye's AJ is married! Meet the people who are getting a make-better on Queer Eye season 3 (Exclusive) Queer as Folk reboot in the works at Bravo: Why it's not a revival Queer Eye's Tammye reacts to fans' outpouring of love: 'I'm in awe' Queer Eye is back! Everything you need to know The Queer Eye Fab 5 to release a book that will be an 'extension of the show' Queer Eye guys debate who they'd be in other famous Fab 5s The Queer Eye guys dish on the Pete Davidson-Ariana Grande romance Watch Queer Eye's Tan France make over Hasan Minhaj for Patriot Act Queer Eye's Fab Five name all the books that helped make them so fabulous Queer Eye's Jonathan Van Ness breaks down the best hair on Game of Thrones 6 Queer Eye For The Straight Guy Queer Eye guys help James Corden make over his Late Late Show guitarist See Queer Eye's Fab 5 in these exclusive portraits Queer Eye renewed for season 3 set in Kansas City Two fan-favorite Queer Eye couples enjoy a double date Netflix rebooting Queer Eye for the Straight Guy Karamo Brown to share life story for the first time in memoir: Exclusive
cc/2019-30/en_middle_0029.json.gz/line3951
__label__cc
0.659551
0.340449
Soft-shell clam (Mya Japonica) Didymo (Rock Snot) Home>Biosecurity Tasmania>Aquatic Pests and Diseases>Aquatic Biosecurity Threats Aquatic Biosecurity Threats Protecting Against Aquatic Threats Identifying, Moving and Selling Livestock Importing and Exporting Wildlife Tasmanian Biosecurity Import Requirements Database (TBIRD) There are many pests and diseases that could cause serious impacts if introduced to Tasmanian waters. Some examples of aquatic pests and diseases that pose a threat to Tasmania include: Soft-shell clams (Mya japonica)​ are a large bivalve marine mollusc and are native to the Northern Hemisphere. Soft-shell clams can grow up to 150 mm and are most commonly found in shallow sub-tidal and intertidal zones. The clams live in sand beds and bury themselves up to 50 cm deep. They use long siphons, which pump water for respiration, feeding and spawning. Didymo is a freshwater alga not yet present in Australia. It takes just one cell in a single drop of water to be spread between waterways. The cells multiply quickly to form massive blooms that completely smother the stream or lake bed. These algal clumps adversely affect water quality, aquatic invertebrates and fish stocks, and are a hazard for hydro generation, irrigation and recreation. Abalone Viral Ganglioneuritis (AVG) is a viral disease that affects the nervous system of abalone. The first reported case in Australia was off the Victorian coast in 2006. Pacific Oyster Mortality Syndrome (POMS) is a virus that affects only Pacific oysters. There are a number of other potential marine pests and freshwater pests that have been identified as serious threats to Tasmania. Last published on: 12/03/2019 9:36 AM
cc/2019-30/en_middle_0029.json.gz/line3953
__label__cc
0.598189
0.401811
Search DriveTribe Top 9 great cars that are overlooked because of their badge Jack Scarlett Richardson posted in The Classifieds Some brand names carry so much weight, that people are guaranteed to blindly purchase their products even if they are utter rubbish. If you were to fill a bucket with warm excrement and set it on fire, no one would want to buy it off you. But if Mercedes were to stick a three-pointed star onto that very same bucket of tepid faeces, and exuberantly unveil it at the Geneva Motor Show, people would stand in line for the privilege of spending their hard-earned pounds on it. In fact, Merc have been doing that exact trick for years and calling it the G-Wagon. Equally, if Daihatsu were to come out tomorrow and release a ground-breaking new car which blended Ferrari performance with Rolls Royce luxury, and cost 50 quid, we’d all snigger and go ‘Wouldn’t be seen dead in that!’ More often than not, our car brand prejudices are pretty accurate. But not always. Hidden among the mediocrity are a few hidden gems that, due to the reputation of the badge on their nose, have been criminally overlooked. Our loss… 9. Kia Stinger The latest great car to fall victim to badge-ism is the new Kia Stinger, AKA the South Korean M3. It is a fizzy, exciting rear-wheel drive sports saloon with ample power and tight handling. It looks cool. It has a cool name. It probably provides 85% of what you get from the equivalent Beemer or Merc, but for half the price. The Stinger deserves to be the car that transforms Kia’s image, but it’ll probably take more than one great car for most of us to forget the decades of dreary, soulless Malaysian guff that preceded it. Nonetheless, it’s a promising sign of things to come. 8. Kia Pro_Cee'd Imagine being in the meeting where the ham rolls who first came up with the name Cee'd put their noggins together to think up a moniker for the performance model. ‘How about the ‘Xtra Cee'dy’? Or the ‘Cee'd you later’? Wait, no lads I’ve got it…’ The Pro_Cee'd looks good, and has lots of tech as standard, but is found wanting when it comes to excitement and poke. It is a decent car but that doesn’t matter. Because even if it had been the best hot hatch ever made, it would’ve been doomed to miserable failure, thanks to having the single dumbest name ever given to a car. And that, in itself, is almost worth celebrating. 7. Hyundai S Coupe To a small cult following, the little Hyundai S Coupe is the king of overrated cars. With its generic styling and humble 140bhp engine, you might have to squint to see it at first, but this car is absolutely bursting with personality. Its V6 makes a lovely noise and plenty of low-end torque. It just feels like it’s trying really hard. This makes for a very endearing car, a bit like the skinny underdog in a boxing movie. Sadly, despite its punchy engine and great value, the Hyundai was massively outsold by the Toyota Celica when it released in the early 2000s. 6. Skoda Octavia VRS Despite there being virtually nothing at all wrong with their cars, Skoda have always slightly struggled to make an impression and really carve out an identity for themselves. The base Octavia is exceptionally practical and user-friendly, but doesn’t exactly turn heads or set trousers on fire. Enter the Octavia VRS, fitted with the superb 2 litre engine from the Golf GTI. After all, if you’re going to steal, steal from the best. Sure, it’s not a huge engine for a car that size, but it’s smooth, and eager to please. On top of all that, the interior is a lovely place to be and it’s frugal on petrol. Where is the downside? If we weren’t such badge-ists we’d all drive hot Skodas. 5. Seat Leon Cupra Being pretty much the only performance car to come out of Spain, you might not expect the Cupra to be anything special. Fortunately, like Skoda, Seat had the good sense to borrow from the big boys. The Cupra takes all that’s good about the Golf GTI and then adds an extra helping of horsepower and surprisingly lovely ride quality. Yet, for absolutely no reason other than a lesser badge, the Leon Cupra is a fair bit cheaper than the Golf and is – in recent years - arguably more interesting to look at. Bueno! 4. Reliant Scimitar In the world of motoring, the name Reliant is tainted by memories of a certain 3-wheeled death trap which rolled over a lot and, as it turned out, wasn’t much use as a space shuttle either. And that’s a shame. Because the Reliant Scimitar was an absolute cracker. Boasting cutting-edge features like an even number of wheels and the ability to turn a corner while remaining right side up, the Scimitar was a real trailblazer. Kidding aside, it was a genuinely iconic piece of design and rival brands’ efforts to mimic it inspired many of the great 60s car designs. You can particularly see a lot of Jensen Interceptor in it, and that’s about the coolest thing you can have in you. Except maybe Denzel Washington. 3. Hyundai i30 N In the most recent episode of Top Gear, Rory Reid claimed to prefer this car to the current Golf GTI. That’s a bold statement, and I’m not sure many would agree, but to even have its name in a conversation with the Golf - which has been the bar for hot hatchiness for over 40 years – is huge praise for the i30. Then again, it does have an awful lot of power - 270bhp. Only the hyper-hot hatches like the Focus RS and Golf R offer more grunt than that. This is a very serious contender in its fiercely competitive class and is hands down, the best car Hyundai have ever made. 2. Vauxhall VXR8 The uninitiated may be put off by the Vauxhall badge, but if you know, you know that in truth the VXR8 is a Holden Monaro – an Australian-made muscle car. The design brief here is quintessentially Bruce; take a regular old saloon, drop a V8 in it, do burnouts at traffic lights until police come, do donuts around police cars until your tyres explode, get arrested, get released on bail, buy more tyres, refer to step 1. V8 hooliganism on a budget. If you don’t like this car, you’re taking life too seriously. 1. Suzuki Swift Sport While Suzuki has plenty of pedigree making fun 2 wheeled vehicles, you could be forgiven for having forgotten they even make cars. But if you’re shopping for a fun supermini, the Swift Sport is the critics’ choice. It weighs just over a tonne and has a power-to-weight ratio of 128bhp per ton. These numbers are very close to those of the original hot hatches from decades ago. The swift is oldschool fun, and has that wonderful ability to make any old road exciting. If you drive a C63 Mercedes-AMG, you might get to use 70% of its power briefly on a really good day. With this you can drive on maximum attack all the time without any fear of expensive repair costs or speeding tickets.
cc/2019-30/en_middle_0029.json.gz/line3955
__label__cc
0.56716
0.43284
Behind the Scenes – The Cameraman In these “Behind the Scenes” series of posts I’m going to shine the light on the people that make it possible for us to watch and enjoy rugby. In this first piece I got to chat with Eiddon Paul who will be one of the cameramen bringing us live coverage of the Rugby World Cup games. Eiddon covers many sports including football, snooker and tennis in addition to rugby. So I asked him if like the players he needed “warm-up” games to get used to rugby or is it very similar working on different sports? I am covering a warm up match before RWC 2015, Samoa v Barbarians at Olympic Stadium. I am a huge fan / supporter of Rugby so can get my head right to cover the game. I enjoy covering multi sports, so enjoy switching between sports but rugby is my number 1 sport, being born in Wales, it is out National Sport. Next we moved on to game day and I asked Eiddon, what his schedule is like on match day? Does he just have to cover the game itself or also pre/post game interviews/studio work? So my schedule on match day. I get to a ground about 4-5 hours before kick off, to help set-up all cameras. We work as one team and help each other out. There will be up to 20 cameras covering one match, so we like to help each other out. I will be on PoleCam, so I will be running up and down the pitch all game, with the assistant referee and make sure I am at every lineout. To get a high shot right behind the hooker, it is a great angle and a fantastic angle to see if the ball is thrown in straight. I am just covering the game itself, maybe will get crowd shots pre and post match and of the players coming off the pitch. If I do the sums that’s 5 hrs before the game, a couple of hours for the game and another couple for breakdown. That comes to a 9hr day for just 80 mins of action? Yes it is a long day. The riggers who drive the big trucks with the studio where director sits and with all camera equipment, cables etc. They arrive a day before to lay all cables for camera positions and that takes ages to set-up. On match day, it depends on whats needed post match, we can leave after derigging cameras, about 2 hours after games finished. 20 cameras seems like a lot to cover the game. Again doing the sums that’s only an average of 4 mins coverage per camera during a game. I didn’t realise it was such a big effort/investment per minute of game. Yes for the big world cup games they have more cameras. For analysis etc and specialist cameras. On a normal Aviva Premiership rugby game, there are about 12 cameras. 4 on each corner (to get tries in corner), 2 pitchside cameras for lineouts and interviews, 2 cameras high up behind goals for kicks going over, 3 cameras side on to actually film game (what we see at home), 1 wide, close up and a slow mo, for special shots and a another commentator or roving reporter. Also cameras for presentation, normally 2. So about 12-14 cameras per game but in the world cup they’ll have a spider cam, rail cams, ref cam. Yes its a lot of work filming a game. If I think about your role specifically, on the pole cam it’s the lineouts that you cover. Going back to the calculator, with only 16-18 lineouts a game and obviously half of those will be on the opposite side of the pitch. That means you run up and down for 80 minuets to get maybe 9x30second clips? Yes Its a lot of work for not many shots but they are crucial at the time and can use for analysis. The Refs and assistants talk about working as a team and looking for different things. How important is it for the different cameras to work as a team and do you concentrate on certain parts of the game? Yes it is important to work as a team, not just with camera operators, but with the whole outside broadcast production team, from runners to directors in the truck. As I said I will be working on the touchline and as such will work with other camera operators who will get player subs etc. With assistant referees and medical team it can get crowded on the touchline so have to work with the other camera ops to not get into each others way. How aware are you of the state of the game at the time? Do you have to watch it later to get a full picture of what happened? I am fully aware of the state of the game, as It is my job to get to the lineouts. However it is a funny angle to watch the game and it is nice to watch the game back on tv to get a better angle of plays and runs. I am concentrating on my job so I cannot enjoy the game like a supporter. Is there a seniority to the camera roles or is more that there are a few specialities? Yes you have a camera supervisor who crews the cameras operators. But usually all operators are highly experienced and have done it for decades. Most cameras have large box lenses and need to be operated by a experienced operator as you need to follow a player into score a try and to get the right framing for when a try goes to tmo. You can’t have a shot out of focus or it will look poor. Slow mo is a specialist camera too as it uses a higher frame rate per second so looks clearer slowed down. What are your favourite grounds either because of the structure/atmosphere/welcome by the club? I like going to Harlequins Stoop. A very friendly welcome and crowd / fans are welcoming. The trucks are close to pitch so good to transport the cameras. Liberty stadium in Swansea is a nice place too. Always get a warm welcome there too and is a great set-up for cameras. What’s been your favourite moment that you have been able to cover? My favourite moment I have covered in sport broadcasting has been working on the Snooker World Championships in Sheffield. I was working in the Outside Broadcast truck when Neil Robertson got his 100th Century Breaks in a season. It was a special moment, it had never been done before and Neil was stuck on 99 breaks for a while and the emotional outpouring shown from Neil was huge and I do not think it will be repeated again. The 2nd best breaks in a season was 60, so that puts it in perspective a bit. I’d like to thank Eiddon for his time, I was totally surprised by how much effort there is to produce just 1 minute of coverage. I hope it’s give you an insight into a part of the rugby world that I know I took for granted. Keep an eye out of future behind the scenes pieces and if you are one of those people that makes it possible for us to enjoy the game please get in touch either below or via email at ExpatDadSG@Gmail.com. Behind The Scenes, Features, Rugby, Rugby World Cup rugby, Rugby Union, Rugby World Cup August Internationals 2015 Round 5 Predictions
cc/2019-30/en_middle_0029.json.gz/line3956
__label__cc
0.707978
0.292022
Thomas Spoor, MD 27450 Schoenherr Road, Warren, Michigan,48088 3400 Bee Ridge Road, Sarasota, Florida,34239 Anatomy - Orbit / Muscles Ptosis with Acquired Horners What is Ptosis. Animated Books:Beginner's Guide Animated Books:Blepharoplasty Animated Books:Ptosis - Internal Anatomy - Eyelid Classification of Ptosis:Evaluation of Ptosis Classification of Ptosis:Acquired Ptosis Classification of Ptosis:Congenital Ptosis Classification of Ptosis:Horners Syndrome Classification of Ptosis:Marcus Gun Jaw Wink Classification of Ptosis:Ptosis and Blepharoplasty Treatment Photographs:Photo Gallery Search Photographs:Before & Photos. Photographs:Ptosis and Blepharoplasty Horner's syndrome or Horner syndrome is a clinical syndrome caused by damage to the sympathetic nervous system. It is also known by the names Bernard-Horner syndrome or Claude Bernard-Horner syndrome or as oculosympathetic palsy. Signs found in all patients on affected side of face include ptosis (drooping upper eyelid from loss of sympathetic innervation to the Müller or superior tarsal muscle, upside-down ptosis (slight elevation of the lower lid), and miosis (constricted pupil) and dilation lag. Enophthalmos (the impression that the eye is sunk in) and anhydrosis (decreased sweating) on the affected side of the face, loss of ciliospinal reflex and blood shot conjunctiva could occur depending on the site of lesion. Also flushing of the face is common on the affected side of the face due to dilation of blood vessels under the skin. In children Horner syndrome often leads to a difference in eye color between the two eyes (heterochromia). This happens because a lack of sympathetic stimulation in childhood interferes with melanin pigmentation of the melanocytes in the superficial stroma of the iris. Horner syndrome is due to a deficiency of sympathetic activity. The site of lesion to the sympathetic outflow is on the ipsilateral side of the symptoms. The following are examples of conditions that cause the clinical appearance of Horner's syndrome: First-order neuron disorder: Central lesions that involve the hypothalamospinal pathway (e.g. transection of the cervical spinal cord). Second-order neuron disorder: Preganglionic lesions (e.g. compression of the sympathetic chain by a lung tumor). Third-order neuron disorder: Postganglionic lesions at the level of the internal carotid artery (e.g. a tumor in the cavernous sinus). If someone has impaired sweating above the waist affecting only one side of the body, yet they do not have a clinically apparent Horner's syndrome, then the lesion is just below the stellate ganglion in the sympathetic chain. Neurologic conditions associated with Ptosis Heterchromia (iris) Visit B&L 27450 Schoenherr Road, Warren, Michigan,48088 586-582-7860 3400 Bee Ridge Road, Sarasota, Florida,34239 941-921-5335
cc/2019-30/en_middle_0029.json.gz/line3960
__label__cc
0.697814
0.302186
EBAA Website Search by Category Donor/Hospital DevelopmentTechnicalQuality AssuranceScientific/ResearchAdministrativeGeneral Eye BankingLeadershipTrainingHuman ResourcesCommunications/MarketingMedical Search by Type Webinars On-DemandEvent RecordingsFree SessionsLive Webinar Donor/Hospital DevelopmentTechnicalQuality AssuranceScientific/ResearchAdministrativeGeneral Eye BankingLeadershipTrainingHuman ResourcesCommunications/MarketingMedical Webinars On-DemandEvent RecordingsFree SessionsLive Webinar Keeping Track of Your Training Program: Best Practices in QA Contains 2 Component(s) Includes a Live Event on 09/11/2019 at 1:00 PM (EDT) Join us for this webinar to learn more about how you can keep track of your training program! Quality assurance and staff training go together like peanut butter and jelly! A strong quality assurance program keeps track of staff training procedures from the initial training to competency determination to annual reviews and ongoing training. Records need to be kept and procedures need to be followed. During this session two experienced quality assurance professionals will discuss best practices for keeping track of training programs and procedures and how to keep electronic and paper systems and records up to date. Staff training procedures are a key part of any eye bank’s operations and to assure quality in those procedures, records must be kept, disclosed, and updated. Join us for this webinar to learn more about how you can keep track of your training program! Kristen Pereira, CEBT, CTBS, CQIA, CQA (ASQ) Sierra Donor Services Eye Bank Kristen Pereira, CEBT, CTBS, CQIA, CQA (ASQ), is the Manager of Quality & Compliance at the Sierra Donor Services Eye Bank and, has been a part of the organization's Quality Assurance Department for the past nine years. She has achieved a Bachelor's Degree in health care administration, along with the following certifications: Certified Tissue Bank Specialist (CTBS), Certified Eye Bank Technician (CEBT), Certified Quality Improvement Associate (CQIA), and Certified Quality Auditor (CQA). She is involved in all aspects of quality; from implementing policies and procedures, to adverse reaction reporting, to handling various types of third party inspections. Elizabeth R. Ellett, MSHA, MT(ASCP), CQA(ASQ), ACHE Advancing Sight Network Elizabeth R. Ellett, MSHA, MT(ASCP), CQA(ASQ), ACHE, is the Vice President of Regulations and Compliance at Advancing Sight Network. Elizabeth received her Master of Science in healthcare administration from the University of Alabama at Birmingham (UAB). Elizabeth holds certifications with the American Society of Quality, American Society of Clinical Pathologist, and Lean Six Sigma as a Green Belt. She has served as both lead and general auditor for CAP and AABB and is a current member of American College of Healthcare Executives. Matthew Arnett Dakota Lions Sight and Health Matthew Arnett is the Chief Quality Officer of Dakota Lions Sight & Health (DLSH) where he has worked since 2013. Prior to joining DLSH, he worked as an analytical chemist for a FDA-regulated pharmaceutical and cosmetics manufacturing firm. Matthew currently serves as Chair of the EBAA Quality Assurance Committee and has also served on the Mary Jane O'Neill Fellowship in International Eye Banking Selection Committee and as a guest faculty member of the 2019 Technician Education Seminar. When not at work, Matthew enjoys spending time with his family (wife & son), cheering for the Green Bay Packers as a partial (1/360,760th) owner of the team, and brewing his own beer in a custom designed brewery in his garage. Ocular Research Tissue: From the Eye Bank to the Researcher Whether your organization is already involved in this space, or you are considering offering new services related to research tissue, this is the session for you. Register for this session today! Eye banks play an important role in ocular research. Eye bank technicians are the first ones to recover the tissue that will be used by researchers and are often the ones who dissect the tissue based on requests and needs. The relationship between the eye bank and the researcher is important and there is becoming more of a need for a strong relationship between the two. During this session, the speakers will discuss how eye banks can become involved in providing research tissue, the opportunities that are becoming available, how to perform certain dissections, and how to work with researchers to fulfill specific needs. Attendees will hear from three eye bank professionals as well as a researcher who works closely with eye banks to get the tissue that is needed for his research. Whether your organization is already involved in this space, or you are considering offering new services related to research tissue, this is the session for you. Register for this session today! Dan Stamer, PhD W. Daniel Stamer, PhD, currently serves as the Joseph A.C. Wadsworth Professor of Ophthalmology and Professor of Biomedical Engineering at Duke University. Professor Stamer was educated at the University of Arizona, earning his bachelors of science in Molecular and Cellular Biology in 1990 and doctorate in Pharmacology and Toxicology in 1996. He completed two research fellowships: the first with Dr. Andrea Yool in electrophysiology and the second with Dr. David Epstein in glaucoma/cell biology. Professor Stamer started his research program in 1998 at the University of Arizona, where he remained for 14 years, rising through the ranks to full Professor and Director of Ophthalmic Research. He joined the faculty at the Duke Eye Center in 2011. Notable recent accomplishments include the Rudin Prize for Glaucoma in 2012, the Research to Prevent Blindness Senior Scientific Investigator Award in 2013, election as ARVO trustee in 2015 and ARVO president in 2019. He currently holds prominent editorial positions in three premier ophthalmology journals: as Editor-in-Chief for the Journal of Ocular Pharmacology and Therapeutics, member of editorial board Investigative Ophthalmology and Visual Science and executive editor of Experimental Eye Research. The primary research focus of the Stamer laboratory is to understand the molecular and cellular mechanisms that regulate conventional outflow such that novel targets can be identified, validated and used for the development of therapeutics that target/modify the diseased tissue responsible for elevated intraocular pressure in glaucoma. Professor Stamer has been working in the area of glaucoma research for the past 25 years, pioneering cellular, tissue, organ culture and murine model systems for use by his laboratory and others to study conventional outflow physiology and pharmacology. His laboratory has worked closely with industry, assisting in the development/pre-clinical testing of several new classes of glaucoma drugs that target the diseased conventional outflow pathway responsible for ocular hypertension. Research progress by the Stamer laboratory group is documented in over 140 peer-reviewed primary contributions to the literature and two dozen reviews/book chapters/editorials. Sung Lee Lions Gift of Sight David Ammar Lions Eye Institute for Transplant and Research Kristen McCoy, MA, CEBT, CTBS Eversight Kristen McCoy, MA, CEBT, CTBS, has been with Eversight since 1996, first holding the position of Laboratory Technician at Eversight in Illinois and later becoming the Laboratory Manager. She was appointed to Technical Director in 2008 when she assumed the responsibility for corporate training, and is currently the Vice President of Innovations. Kristen holds a master's degree in health and humans services administration from St. Mary's University in Minnesota, a bachelor’s degree from the University of Dayton and is a Certified Eye Bank Technician (CEBT) and Certified Tissue Bank Specialist (CTBS). She has served on numerous Eye Bank Association of America (EBAA) committees and sub-committees over the years including the Technician Education Committee and the Certification Board. Kristen also served as a faculty member of the Technician Education Seminar for eight years. Communication That Matters: How Compassionate Language Can Increase Authorizations Authorization rates can increase with the utilization of compassionate language, expert navigation of the UDRAI and effective staff training. Register today to participate in this dynamic session! Messages and communications all come down to the delivery. In the donation community, delivery is important when you are speaking with donor family members and next of kin. Compassionate language isn’t always natural for everyone, but it is a necessity when speaking with individuals who lost their loved one just hours before. By using compassionate language and keeping a calm and steady tone, donor coordinators and call center staff are able to help navigate individuals through a very important discussion during their worst moments. During this webinar, three experienced eye bank professionals will discuss donor authorization phone calls and how to communicate with individuals in a compassionate and effective manner. Through presentations and audio recordings, attendees will learn the following: The importance of compassionate language and how to communicate with compassion Steps to prepare for and lead the call with the next of kin How to navigate next of kin through the UDRAI and sensitive topics Tips for training staff and providing feedback Joy Fragola Southern Eye Bank As the Professional Outreach Director for Southern Eye Bank since 2005, Joy is focused on relationship building and community and professional education concerning organ, tissue and cornea donation. She travels throughout southwest Louisiana, from Morgan City to Cameron, and as far north as Deridder to develop partnerships with hospitals, coroners, hospices, funeral homes and other community organizations to facilitate donation. Joy also trains Southern Eye Bank’s referral coordinators as they approach families for authorization for cornea and eye donation. With a Master’s degree in Psychology, Joy taught at the University of Louisiana at Lafayette and continues to enjoy teaching through her role at Southern Eye Bank. Her background in Leadership Development for General Electric and other major companies across the country has contributed to her passion for excellence through collaboration. This passion has helped create an awareness of the role of Southern Eye Bank (SEB) in SW Louisiana. In November, 2017, SEB was the co-recipient, along with Louisiana Organ Procurement Agency, of the Lafayette General Health System’s Community Hero Award. This award offers community-wide recognition for effective service partnerships that are considered outstanding by clients, patients, caregivers and peers. Service, effectiveness, and impact on healthcare must be evident. Originally from upstate New York, Joy has lived in Lafayette, LA for the past 16 years. Krystal Christensen-Wiederrich Lions VisionGift Krystal Christensen-Wiederrich, is a Portland-transplant, originally from South Dakota, where she received her bachelor's degree in english from Black Hills State University. In 2015, Krsytal started at Lions VisionGift as a Donation Specialist. She took a six-month hiatus to volunteer in Cambodia and was honored to return to Lions VisionGift. In May of 2017, she became the Logistics Center Supervisor. Over the last year the eye bank has been through many process changes and new software implementations. Currently, she is finishing a coding bootcamp through the University of Oregon to understand software development and better serve their department when they upgrade to new technologies. Micah Monroe Micah Monroe has served with SightLife since 2015 in multiple roles. For three years he has trained and developed transplant professionals to navigate the difficulties of facilitating donation discussions with families across the country. Currently he is the Manager of Operations for SightLife’s NE office in Bethlehem, PA where he has been building a secondary communication center to support SightLife’s Seattle Headquarters. Previous to eyebanking, Micah taught English as a second language in Mexico, Thailand, and domestically. He holds a BA in English from Western Washington University. Fred Jordan, FSL Miracles in Sight Fred Jordan, FSL, has been with Miracles In Sight since 2001. Fred is licensed in North Carolina and South Carolina as a Funeral Director/Embalmer. Over his many years with Miracles In Sight, Fred has fulfilled the roles of Surgical Recovery Specialist, Lab Technician, Professional Development Specialist and is now Director of Development. He currently serves as Chair of the EBAA Donor Development Committee. EBAA Statistical Report: Highlights, Trends, and How to Use the Data at Your Organization Contains 1 Component(s) Learn about the latest data; highlights of the 2018 report; trends in donation, recoveries and transplantation; how to use the report to benchmark your organization; and everything else you need to know about the report and the reporting process. The 2018 EBAA Statistical Report was recently released and contains a lot of data! Join us for this complimentary webinar presentation to learn about the latest data; highlights of the 2018 report; trends in donation, recoveries and transplantation; how to use the report to benchmark your organization; and everything else you need to know about the report and the reporting process. eyeLEARN: A Guide to Navigating EBAA's Online Education Portal Want to learn more about all that eyeLEARN has to offer? Watch this overview for free! EBAA Director of Education, Stacey Gardner, and EBAA Education and Programs Manager, Genevieve Casaceli, discuss eyeLEARN, explain how to navigate the site, and walk through how to purchase and attend sessions. Check out the recording for free today! An Introduction to Lean Methodology in Eye Banking Contains 3 Component(s), Includes Credits Recorded On: 04/01/2019 Learn more about lean methodology and how it can impact your eye bank! Lean Methodology is a structured and effective way to look for, and to reduce or eliminate, waste in an organization’s daily operations and processes. Lean focuses on the value of the goods and services that we provide from the customer’s point of view. This webinar presentation offers an introductory look at applying Lean Methodology at an eye bank through these three major components: - Defining what is or is not a value –added activity from a customer perspective - Highlighting the 5 Lean Principles - Discussing the 8 types of waste that are common and identifiable in our work processes. The speaker presents all of the types of waste in regards to an organization’s operations and processing, giving examples specific to eye banking that Iowa Lions Eye Bank has found through their continuous improvement efforts. Attendees will learn about the common tools used in Lean process improvement projects and how to identify to which tools will work best for your eye bank. Register today! Recording Length: 1 Hour CEU: 1 Note: If you purchase the “Group Training” option for an educational session, up to 15 individuals from your eye bank may receive CEU credit for the session. In order for those individuals to have access to the session, please send the list of names to Genevieve@restoresight.org. Please note that all individuals will need to have an eyeLEARN account in order to have access to the session. To activate and log into your eyeLEARN account, simply use your EBAA credentials that you use to log into the EBAA Member’s Section. Once Genevieve Casaceli has received the list of names, and their accounts have been activated in eyeLEARN, Genevieve will give each person access to the session, and they will be able to view the session and obtain CEU credit. If you prefer to watch as a group, please use a group signature sheet to claim credit. Greg Olson, LSSBB, CAPM, CQIA Greg received his bachelor’s degree from Eastern Illinois University, completed the Lean Six Sigma Black Belt training through Villanova University, and has earned his Certified Associate in Project Management and Certified Quality Improvement Associate accreditation. He joined the Iowa Lions Eye Bank in January of 2017 as a quality and operational improvement coordinator, where he focused on industry compliance and on Lean process improvement projects. The Office of the Medical Examiner: What You Need to Know Learn more about the role of the Medical Examiner and how to strengthen relationships with the Medical Examiner or Coroner office that your organization works with! Mary Case, MD, the 2016 EBAA Gift of Sight Recipient, discusses the role of the Medical Examiner and the relationship that has been developed with Mid-America Transplant. Also speaking during this session is Debbie Lanter from Mid-America Transplant, where she discusses the relationship from the eye bank's perspective. The speakers also discuss some of the more common challenges that are encountered when preserving the integrity of the death investigation, as well as ensuring that donation is possible. Mary Case, MD Office of the Medical Examiner in St. Louis County, Missouri Dr. Mary Case is the Chief Medical Examiner in the Office of the Medical Examiner in St. Louis County, Missouri. Dr. Case has a BA from the University of Missouri and received her medical degree from the St. Louis University School of Medicine. In 2016, Dr. Case received the EBAA Gift of Sight Award for her work in ensuring donation is an option for the deaths that fall under the Medical Examiner’s jurisdiction in St. Louis and the surrounding counties. As a result of her tireless support of donation, the Office of the Medical Examiner work in cooperation with Mid-America Transplant to ensure even complicated deaths are still considered for donation. Debbie Lanter Mid-America Transplant Debbie Lanter is the Medical Examiner/Coroner & Hospital Services Specialist for Mid-America Transplant. She has been involved in eye banking for the past twenty-five years and has performed a number of different of roles in the organization throughout that time. Debbie’s current role focuses on developing partnerships with Medical Examiners, Coroners, and Hospice to establish effective systems for increasing non-hospital referrals for eye and tissue donation. Referral to Recovery: Increasing High Quality Ocular Outcomes Learn more about practices that eye bank staff members can utilize when working with hospital partners, funeral home directors, and others to increase potential benefits for recipients. In the always evolving eye banking profession, ensuring that cornea tissue is recovered in a timely, efficient and safe manner is always a priority. In the one-hour webinar, Referral to Recovery - Increasing High Quality Ocular Outcomes, three presenters will identify various practices that eye bank staff members can utilize when working with hospital partners, funeral home directors, and others to yield excellent ocular outcomes and increase potential benefits for recipients. Referrals, Triage and Donor NOK Phone Calls: A program to improve ocular donation outcomes. Andrea Cranford, Lions VisionGift Navigating call center logistics effectively and efficiently can broker positive tissue quality outcomes with donor tissue by abbreviating death to preservation timelines. This smoother, more efficacious execution of the donor coordinator role also has the secondary benefit of facilitating a better relationship with partner agencies by streamlining and expediting the donation process, thus reducing the time and logistics burden placed upon hospitals and funeral homes throughout the recovery process. The presenter discusses several tools and strategies that can be used by donor coordinators to reduce tissue recovery timelines. Implementing an issue tracking system Michael O’Keefe, Eversight This session will provide an overview of how Eversight implemented a system where all staff can report issues that obstruct work flows or slow down the donation process. Using Jira, a software program, all submitted issues are collated so that trends can be identified. Recurrent items are reviewed and countermeasures are developed to prevent continued issues. Implementation of the software, along with making it widely available for all staff has raised awareness to issues that were previously unknown, leading to improvements in OPO relations, Hospital recoveries, and Funeral Home and Medical Examiner partnerships. Enhancing Funeral Home Relationships to Increase Donations and Reduce Recovery Times. Julie Todd, KeraLink - Southeast The role of the Eye Bank can greatly impact outcomes and by strengthening Funeral Home relationships we can have successful donation outcomes. This presentation will share a unique program that fosters positive relationships with funeral homes. The Funeral Home relationship can provide a partnership that will improve death to preservation times and lead to increased referrals. To have a positive impact on reducing death to preservation times a program was implemented that allows 24-hr access to the facilities. The presenter will share why the program was created at one organization, how it was implemented and the outcomes. Gain insight on ways to improve the referral process as well as ocular outcomes and purchase this session today! Andrea Cranford Andrea Cranford began her career at Lions VisonGift in May of 2011 as a Donation Specialist, screening for eye and tissue donation, coordinating recovery logistics and guiding families through the donation process. In June of 2011 she was promoted to Logistics Center Trainer overseeing all training for new Donation Specialist staff. In August 2013 she was promoted to Manager of the Logistics Center and in January of 2019 her role expanded to managing the Donor Referral Line, DRL. The DRL is the new designated referral center for Oregon and Southern Washington. Through a strategic partnership with Pacific Northwest Transplant Bank, Community Tissue Services, and Lions VisonGift the three organizations work to gain operational efficiencies through shared resources and aligned initiatives to best maximize the gift of donation. Michael O'Keefe, CEBT Michael O'Keefe, CEBT, joined Eversight in 1994 as a laboratory technician soon after he graduated from the University of Michigan with a BS in Biology. During his time at Eversight he worked in numerous leadership roles, became a private pilot, learned how to raise bees, thought about raising chickens, formed an improv duo and earned an MBA from the Ross School of Business. Michael now serves in the role of Chief Operating Officer and is helping Eversight to maximize its mission by improving operational effectiveness, employee engagement and customer satisfaction using principles derived from the Center for Positive Organizations at the University of Michigan. Julie Todd, CEBT CorneaGen - Orlando Julie Todd, CEBT, has been with CorneaGen - Orlando (formerly KeraLink International, Southeast) since October 2013 and is currently Donor Family Services Manager. Julie was introduced to the donor services field and began working as a per-diem ocular recovery technician for KeraLink International. Over the years Julie has become a full time technician developing her eye-banking education and worked to attain her CEBT in 2016. She currently manages the Family Service Coordinator and Recovery departments. Julie is an outdoor enthusiast and will always #optoutside when the opportunity presents. Janice Sedgwick, CEBT Georgia Eye Bank Janice Sedgwick, CEBT, is the Manager of Public and Professional Relations at Georgia Eye Bank. Janice has also been a member of the Donor Development committee since 2012. Let's Get Together: Enhancing Collaboration on Shared Cases Learn more about how to communicate with your recovery partners and register for this session today! Communication and collaboration are key when working with recovery partners on a shared case. During this webinar, speakers identify the challenges and opportunities that arise on shared tissue and eye cases in regards to individual needs of each tissue and organization and how to effectively communicate with each other to ensure the best possible outcome of the donation for both organizations. This session focuses on the tissue and eye bank requirements in blood collection, recovery procedures, physical inspections and cooling protocols. The speakers also present various case studies that highlight the importance of communication on shared cases. Learn more about how to communicate with your recovery partners and register for this session today! Jonathan Boyd, CTBS American Association of Tissue Banks Over the past decade, Jonathan Boyd has worked in multiple roles within the tissue banking and transplant industry including surgical tissue procurement, in leadership roles and eligibility evaluation. Jonathan is now the Director of Certification & Online Learning at the American Association of Tissue Banks where he oversees the development of online educational programming and the certification program. Jonathan is a Certified Tissue Banking Specialist, the AATB Liaison to the several AATB committees and the winner of the 2018 AATB Outstanding Professional Education Award.Jonathan is an active member of the International Association of Coroners & Medical Examiners, an Affiliate Member of the National Association of Medical Examiners, a member of the American Society of Association Executives (ASAE) and is an active committee member with IACME, NAME & ASAE. Esteban Rangel, CEBT KeraLink International Esteban, a Texan native, joined the eye banking community as a recovery technician in 2010 while working on obtaining his BS in Anthropology from Texas State University. Over the years he's worked in different areas of eye banking, from donor coordinator to technical director. In his most current role, he oversees the new tissue processing facility at KeraLink- New England. He also serves in the Technician Education, Research and Statistical Report Committees. Troy Win'E, CEBT Troy is the Director of Recovery Services at SightLife. He received his Bachelor's Degree in Cellular Molecular Biology from the University of Washington. Troy currently serves on the EBAA Technician Education Committee as Vice Chair. KeraLink - Southeast Julie has been with KeraLink International, Southeast since October 2013 and is currently Donor Family Services Manager. Julie was introduced to the donor services field and began working as a per-diem ocular recovery technician for KeraLink International. Over the years Julie has become a full time technician developing her eye-banking education and worked to attain her CEBT in 2016. She currently manages the Family Service Coordinator and Recovery departments. Julie is an outdoor enthusiast and will always #optoutside when the opportunity presents. The CEBT Exam: Updates, Information, and Resources Check out this free informational webinar that goes over everything you need to know about the CEBT exam! This webinar will discuss everything you need to know about taking the CEBT Exam, as well as the new and updated resources available to you. Event Recordings 1101 17th Street NW, Suite 400, Washington DC 20036
cc/2019-30/en_middle_0029.json.gz/line3964
__label__cc
0.63851
0.36149
The Government responds to the Treasury Committee Report on Consumers’ Access to Financial Services Caroline Stevenson The Government’s response to the Treasury Committee report was published on 11th July. The document sets out the Government’s response to each of the report’s conclusions and recommendations. The key messages shows that the Government feels like there are already a number of initiatives in place to address the recommendations and that it is not the Government’s place to influence commercial arrangements. However, this is hope for potential reform in the Consumer Credit sector. Increasing Financial Inclusion Basic Bank Accounts – the Government will continue to work with the FCA on access to banking but it notes that the 9 biggest personal current account providers are already required to offer basic bank accounts. Furthermore, the Government disagrees with the notion of a standardised list of identification requirements and encourages industry to continue to use the JMLSG guidance. Consumer Education – the importance of this is already acknowledged by the Government who note they made financial literacy statutory in the secondary school curriculum in England. The Government notes it will continue to work with MAPS to support the Money Advice Service. Delegated authority and power of attorney – no action is suggested as the OPG recently published a guide on this to help staff in financial services companies. Do Vulnerable Customers Pay More? Access to Insurance – the Government supports the FCA’s approach to consult on this in Summer 2019 in relation to sign posting customers to specialist insurers where the customer has a severe pre-existing medical condition. Bank Branch Closures – the Government confirms that it will not intervene on bank branch closures as it is a commercial decision for the Banks. It does, however, note its support for Banks continuing to act in accordance with the Access to Banking Standard where bank branch closures are happening. The Government also confirms that shared bank branches would be supported and does not breach competition law. The Post Office Network – the Government plans to support ongoing discussions between the Post Office and the banks as to how they can better serve customers but notes that this is a commercial matter between the PO and the Banks and will not intervene. Use of Cash and the Impact of ATM Closures – the Government notes that the Joint Authorities Cash Strategy Group was already set up to look at this. The Equality Act and Provision of Reasonable Adjustments Equality and Human Rights Commission – the Government expects the FCA and EHRC to consider how best to ensure compliance with the Equality Act. Defining Vulnerability – the Government will continue to engage with the FCA to ensure the right protection is reached for consumers. This leads on from the Discussion Paper on Duty of Care. Access to Lower Cost-Credit – the Government plans to launch a feasibility study to design a No-Interest Loans Scheme. Treatment from Enforcement Agents – the Government confirms that the Ministry of Justice is already looking into this through their Call for Evidence examining the behaviours of enforcement agents. On the matter of the Council Tax Protocol – the Government confirms that it will not force councils to sign up to this – council tax collection is the responsibility of individual local authorities. Consumer Credit Act Amendments – the Government notes that it is currently reviewing the FCA’s final report on the retained provisions of the CCA and will consider whether further reform of the CCA is required. It further notes that reviewing the prescribed content in debt collection letters will be a priority during this piece of work. Creditworthiness Assessment Bill – the Government launched the Rent Recognition Challenge to address the issue of recognising rent being paid on time as a factor in credit scoring. access to cash consumer credit financial literacy Government retail banking Treasury Committee vulnerable customers FCA Multi-firm review: Retail Banking: Business Continuity Planning
cc/2019-30/en_middle_0029.json.gz/line3974
__label__wiki
0.606363
0.606363
Evolution, development, and random biological ejaculations from a godless liberal I'm heading off to glamorous Duluth today! I don't think I have enough patience to deal with people this far gone Puerto Rico shows us how it's done Pretty, pretty Shae It can happen here The eggs came tumbling down The inevitable pedantry over Epstein and the false authority of Pornhub It's the last day of Prime Day…resist! Antifa, we have a missile gap F.O. on I don’t think I have enough patience to deal with people this far gone PaulBC on I don’t think I have enough patience to deal with people this far gone brain on Antifa, we have a missile gap brain on The inevitable pedantry over Epstein and the false authority of Pornhub wzrd1 on I’m heading off to glamorous Duluth today! chigau (違う) on If you don’t like punching Nazis, you’re going to hate this PaulBC on The inevitable pedantry over Epstein and the false authority of Pornhub chigau (違う) on Road trip, with spiders Crip Dyke, Right Reverend Feminist FuckToy of Death & Her Handmaiden on The inevitable pedantry over Epstein and the false authority of Pornhub John Morales on Antifa, we have a missile gap HATE ADS? Subscribe to FTB Ad Free. Please donate to our legal defense fund! Discuss: Racism in America Discuss: Art Discuss: Through a feminist lens Discuss: Political Madness All the Time Discuss: Music Discuss: World Politics Discuss: Interesting Stuff The Pharyngula Wiki Social Justice and Economics Social Justice Llink Roundup PZ Myers is a biologist and associate professor at the University of Minnesota, Morris. This is a personal weblog. The opinions expressed here represent my own and not those of my employer. • a longer profile of yours truly • Nature Network • Mastodon • CuriousCat • the Pharyngula chat room (#pharyngula on irc.synirc.net) Follow @pzmyers I reserve the right to publicly post, with full identifying information about the source, any email sent to me that contains threats of violence. I support Americans United for Separation of Church and State. antifaloser on Antifa, we have a missile gap John Morales on If you don’t like punching Nazis, you’re going to hate this timgueguen on I don’t think I have enough patience to deal with people this far gone jrkrideau on I’m heading off to glamorous Duluth today! longdog on I don’t think I have enough patience to deal with people this far gone Canadian Atheist Ex-Muslims of North America Free Thinking Rosa Rubicondior The Morning Heresy Alas! A blog Amanda Marcotte Lance Mannion Making Light Rewire Secular Woman Skeptical Humanities Coyot.es Network Coyote Crossing Discover blogs Judge Starling (Dan Graur) NCSE Preposterous Universe SciAm blogs ScienceBlogs Telliamed Revisited The Well-Timed Period What's in John's Freezer? Scienceblogs Diaspora A few things ill-considered Aardvarchaeology Confessions of a Science Librarian Discovering Biology in a Digital World Dynamics of Cats Greg Laden Page 3.14 Tetrapod Zoology The Pump Handle Why is Ross Douthat still privileged with a column in the NY Times? » « Slap me in the face harder American politics has become a sham There were a bunch of town hall meetings with Democratic presidential candidates last night. I didn’t watch a single one of them, instead retiring to my bed with a book. My wife tuned in to all of them, I think, because I don’t believe she came to bed at all (she’s the fiercely political one in the family nowadays, and I can’t blame her.) I look at the swarm of Democrats that are buzzing around during this premature election cycle, and I’m just tired. All I want is sound policy and coherence at this point. So I detest the young, brash ones like Mayor Pete who has no policy and openly says he’s avoiding it because he’s all about “values” (but what if your values are all about having a rational, sane, competent government?) I detest the old neo-liberal party hacks — I can’t believe that Uncle Joe is going to be running. Do you think he’ll get Anita Hill’s vote? But worst of all, I detest the Republican party. They’re doing nothing. At a time when eleventy-seven thousand Democrats are plunging madly to the starting gate because they see our current president as weak and hateful and a necessary target for removal, the Republicans cower in fear and none are suggesting that they’ll run against him. Why? Because even the ones who express reservations about the Deplorable-In-Chief know that he is the current apotheosis of Republican policy, and they can’t run against him without repudiating everything the Rethuglican machine and Fox News has built since Reagan. Charles Pierce puts it well. That there are not at least five Republican candidates challenging El Caudillo del Mar-a-Lago not only is a fine metric for judging the deep internal rot in that political party, but also a good measure of the limits of the Never Trumpers as allies in an election year. Let us stipulate the following two points: 1) It is the responsibility of the Democratic Party to do everything in its power to protect the institutions of our republic, and 2) it is distinctly not the Democratic Party’s responsibility to save the Republican Party from itself, and from the political monster it has created over the past 40 years. For four decades, the party has flattered, and begged, and truckled to the very forces of which it is now terrified. Save yourselves, gang. But that isn’t happening because, for all their brave talk, the Never Trumpers want to keep the political power that base gave them while distancing themselves from its obvious and inevitable product. So, instead of gathering forces behind a primary challenge, many of the Never Trumpers seem to be content with advising the Democratic Party on who it should nominate and what policies it should pursue. This, I believe, in preparation for a campaign to blame the Democratic nominee if the country determines that it wants to live six more years in the current gale-force dungwind. Let us be clear: if the country re-elects this president*, it’s because modern movement conservatism prepared the ground for it and used the Republican Party to do it. It hangs on all of them like a historical deadweight. They should disenthrall themselves from the policies and tactics that hung it from their necks before presuming to beg the other political party save them from their own monster. So here I am, disgusted. I am going to vote for whoever wins the Democratic party nomination, and I will say it loud and clear ahead of time, even if it’s a Mayor Pete or an Uncle Joe, because the number one priority for the country is to first get rid of that asshole in the White House, and number two priority is to bury the Republican party. Yet I hate that I’m trapped in this two-party system, and I do not trust the Democratic party to fight for anything other than corporate sponsorship. That means I cannot bear to pay attention to the process, because the process is the problem. I’ll walk into the primaries and vote my conscience (which at this point whispers “Warren” in my brain; could change), and then when the actual election roles around after a goddamn year and a half of misery, I’ll mark the ballot for whoever is opposite Trump, which means the Democrats could nominate a chimpanzee and they’ll get my vote. Which does not make me happy. PZ Myers Politics, History, and Law starfleetdude says Whomever is the Democratic nominee, if they do become President and Democrats get a majority in the Senate, you can be sure that some version of Medicare For All will pass. It’s not like any of the Democratic Presidential candidates are indispensable. Sean Boyd says Actually, Bill Weld has said he’s going to run against Trump in the primary. You might remember him as the governor of Massachusetts once upon a time, or perhaps as Gary Johnson’s running mate in the last go-round. whheydt says 23 April 2019 at 10:08 am Same sentiments here. Reminds me of ages past when it was noted that many of us would rather vote for Bonzo than Reagan. stroppy says You’re too kind. scottde says More political parties isn’t a panacea. Spain has six major parties at the moment (two of them brand new) and multiple minor parties, and it’s still deadlocked. It’s unclear whether they will be able to form a majority government after the upcoming elections, and Catalan seperatists could conceivably be the deciding factor. People are just as fed up with the process there as they are here. Politics is messy, and there isn’t some pristine clean form of it because human beings aren’t pristine and pure. kenbakermn says If the Democrats nominate a rusty bucket full of used oil filters, and a dead carp for running mate, they get my vote. Hoosier X says #6 kenbakermn – That didn’t work so well in 2016, even if they did win the popular vote. whywhywhy says Mayor Pete knows how to give a good speech and is benefiting from the evangelical backlash, but I would rather have one of the women who know how to get things done: Warren, Harris, or Klobuchar. Re: Mayor Pete He’s exceptionally articulate, but I’m starting to think that he should maybe stick to mayoring. Nothing in his cv speaks to foreign policy unless you include military service abroad, which I don’t. Rather he seems to have a distinct weakness for knee-jerk militarism: https://www.commondreams.org/views/2019/04/03/after-gaza-slaughter-buttigieg-praised-israeli-security-responses-moving-and# jrkrideau says @ 5 scottde More political parties isn’t a panacea No indeed, but watching US politics from Canada there really does seem to be a need for one or two alternative and viable parties in the USA. Currently there is almost no real difference between the two US parties and so there is no party to offer any real alternative. Even if the party cannot take the presidency or even a seat in Congress it can act as the country’s concience and offer alternative policies. One of the problems down south is that no one there seems to be willing to vote for a smaller party for long enough to build up it up into a viable party. I think it is both structural thing and a cultural thing. At the moment we have 4 (?) parties in parliament at the Federal level, Québec has 3 or 4 but at least 2 have no presence in the rest of Canada and so on. Which reminds me, Prince Edward Island is having its provincial election today and there is a good chance that the Green Party could form a government. This would be the first time in at least 50 years some one other than the Conservatives or the Liberals formed a government. There is my point about time. The Greens have been wandering in the wilderness in every province since the party was formed, perhaps 30 years ago and suddenly they have a chance. Siggy says There is an election with more than two viable candidates–it’s the primary election. As far as I’m concerned, the primary election is the election, and the general election is a day to check off a box. Akira MacKenzie says We don’t need more political parties, we just need one viable, sane, left-wing political party to give voice to progressive issues and have the courage to act upon them without worrying about the ever-fickle whims of the apathetic “undecideds.” As horrible as Republican/Conservative ideology is, at least they try to deliver them to their base. The Democrats, not so much. robro says Forty years puts it at 1979. Pierce is off by at least three decades. He’s forgetting the “Southern Strategy” that openly courted disaffected Dixiecrats during the Goldwater campaign, the Nixon campaign which successfully used the strategy and also pulled levers to prevent the “October surprise” peace deal in Vietnam, the Eisenhower administration that allowed the CIA to support authoritarian regimes in Central America, or the rabid anti-communism of the McCarthy era. These are all themes still in play, although ironically the evil empire of Russia is now a partner. If you want to get really scared and PO’d, check out Carole Cadwalladr’s recent editorial in the Guardian and her TED talk about the Brexit vote, the 2016 presidential election, and the role of the social media giants: “My TED talk: how I took on the tech titans in their lair.” She basically calls Mark Zuckerberg, Sheryl Sandberg, Jack Dorsey (Twitter), Sergey Brin, and Larry Page, as well as Robert Mercer, Nigel Farage, et al, criminals for their sinister dissemination of lies, flaunting UK election finance laws, and stonewalling the investigations. She openly declares that democracy is broken, and not just in the UK and US but around the world. No wonder the Koch brothers think it’s better now than it’s been in 50 years. I see no reason to expect it to be different in 2020. Addendum: And by “sane” I mean accepting of scientific reality: no new age woo, no anti-vaxxers, no loons who think wifi causes cancer, no alternative medicine, etc.. weylguy says I do not trust the Democratic party to fight for anything other than corporate sponsorship. That means I cannot bear to pay attention to the process, because the process is the problem. In 2006, when the then-new Speaker of the House Nancy Pelosi said she was taking impeachment of George W. Bush off the table, I switched parties from Democrat to Green. Pelosi’s latest alibi against impeaching Donald J. Trump is that “he’s not worth it.” Something very wrong is afoot in the Democratic Party, and Dr. Myers nailed it. If the American political process cannot get rid of a president as provably venal, corrupt and criminal as Trump, then there really is no political process to speak of, other than adherence to plutocratic military/industrial corporatism. I’ll vote like Myers, but I have zero faith that anything decent will come of it. @10 Jrkrideau Firstly, no real difference between the Republicans and the Democrats? Have you been paying any attention at all over the last few years of American politics? Look at the new supreme court justices, the tax bills from congress, and basically everything Trump has done. If you think there is no difference you should be paying more attention. Secondly as a Canadian I can argue that our multi-party system has been a disaster for the country. In Ontario we got Doug Ford only because the NDP, Liberals, and Greens (all left leaning) split 60% of the vote allowing a Ford majority with 40%. Federally this same problem gave us Stephen Harper. Other than Alberta and Saskatchewan there is really no province with right wing majorities but we keep getting right wing governments. mastmaker says My (scant) historical analysis says: Democratic party carries less blame than you imply. Sustained campaign by far right (which increasingly became mainstream) from Reagan days to paint anyone left of Reagan to be anti-American and even (according to some of them) sub-human, and all the vitriol associated with it has weakened the Democratic party. You can draw similarities with the weakened opposition under non-democratic leaders like Saddam or Gaddafi. In the case of US, the entire Republican party and Fox News are engaged in mental subjugation of opposition. It is a wonder that Obama even got elected, but as I keep saying, that is largely down to him appearing out of nowhere in 2004 and thus largely escaping the smear campaigns. feministhomemaker says I have your same commitment, PZ, to voting for the democrat, whoever gets the nomination. But I have a bit more optimism it will make things noticeably better, whoever gets the nod in my party and definitively better if certain ones get it, most notably Warren for me at this point. I am still open to Booker and Harris and will jump in for Stacey Abrams in a heartbeat if she makes the plunge. My heart will be very sick if Bernie or Biden get the nod and I will be mildly less sick if Beto or Buttigeig get the nod. I’ll be neutral if Klobochar or Gillibrand get it. Not excited, not sick. But damn straight–I vote blue, democrat, whoever gets the nod. Trump and the republicans must go down. Period. Artor says “…You can be sure that some version of Medicare For All will pass.” Can I? Really? I’d certainly like to see that, but we’re talking about the Democratic Party here. Conceding to Republican policies even when they don’t have to is what they’re famous for. To further clarify: When one party runs a sustained campaign of painting the other party and other ideologies as anti-american and sub-human, and not worth debating and their idea and ideology ALONE is worth consideration, they are not just waging political war on that party. They are waging war against democracy. Republican party is ABSOLUTELY guilty of (attempted) murder of democracy in USA – over the last 40 years. I have not studied the history enough to know what exactly happened in the two decades around Nixon’s presidency, so cannot comment on that. That’s been my attitude since 2012 after it turned out Obama was going to be a disappointment. I might be a massive dumb-dumb, but I’m smart enough to realize that third-party temper tantrums aren’t going to work. It’s just that voting for a party that takes to for granted is a grind, not matter how necessary. I did say “some version”. If Democrats do win and get a majority in the Senate, but not 60 votes, it’s not likely that a single-payer version of Medicare for All would be enacted. But making those 55 and older eligible for Medicare and adding a public option to the Affordable Care Act would be doable. consciousness razor says Firstly, no real difference between the Republicans and the Democrats? Have you been paying any attention at all over the last few years of American politics? Seriously. The Democrats are a mixed bag. This is not a great “get out the vote” motivational speech, but also not a reason to fall into utter despair and disillusionment (again and again and again, which often seems like act, even when I’m sympathetic to the message). That’s just how it is. All you can do is fight with the army you have, play the position on the chess board in front of you, etc. The Republicans, on the other hand, are only a party of garbage and awfulness and nonsense. It is entirely unmixed. That bag is overflowing with pure shit. Enough said. We do in fact have more than two political parties in this country, not very major ones but they do exist, whatever that is supposed to be worth. If it were just two, at least that would be better than only one. But the smallness of the number (however you measure it) isn’t what bothers me, because if there were a thousand different versions of the garbage party, that would not make me feel any more empowered as a voter. If it were up to me, we’d remove the electoral college, remake the Senate, prevent gerrymandering and voter suppression, and grant statehood to our colonies (excuse me, “territories” is the accepted term). And a whole bunch of powers/institutions should be taken from states and given to the federal government. I think those are the right things to do anyway. Then, maybe the Dems wouldn’t be such a mixed bag, and assuming the GOP doesn’t destroy itself, it can at least become more and more irrelevant. Well, hard to know where to start… maybe read up on Roy Cohn; man behind Tailgunner Joe McCarthy (and his pal Nixon), lawyer for the mob, and mentor to Donald Trump. But yeah the corrupt conservatism goes hand-in-hand with the history of slavery in this country. The most modern strain gins up and organizes concurrent with Reagan IMO, under pressure of simmering resentment over the Viet Nam war and the 60’s counter culture. ALEC, the Federalist Society, talk radio, and all the things you’re familiar with serve to accelerate the rot. There are two distinct political parties in the U.S. and they do differ in important ways from each other. Anyone who tells you differently is selling something, and it’s probably iocane. thirdmill301 says The problem is not American politics; it’s the American people. Yes, Trump lost the popular vote, but in a sane, rational society he would not have been a serious candidate in the first place. That almost half of the people who voted were willing to elect the likes of him tells me that the real problem is that yes, we really are a racist, misogynist and xenophobic society. Until that changes, or until the law of cause and effect gets repealed, nothing much else will change either. monad says @16 anna: The usual way parliamentary systems prevent those kinds of vote-splitting problems is by parties joining in coalitions. In Canada this almost happened against Harper, but I guess it was considered too extreme to actually go through with, or something like that? Instead the parties have to actually merge, like the Conservatives and Reform to give Harper in the first place. It doesn’t make a lot of sense to me; the check on this kind of thing is already there, it’s just that nobody uses it. Which is still a lot better than the US system, where there are all sorts of checks against an openly criminal president that are going completely untouched, because one party are complicit, one party are irresponsible cowards, and no others exist. @27 Monad We have a multi-party system in Canada but it is not proportional representation. On a riding by riding basis this sort of thing happens: Left party one 28%, Left party two 17 % Left Party Three 5% Right Party 40 %. This plays out across the country/province giving the right party a majority of seats. The left doesn’t have the numbers to defeat them in parliament with 60% of the vote. We need a proportional representation system. Multi-party systems fail badly in first past the post. In British Columbia a party got a majority government with less votes then one of the other parties. Oops. Add 10% to Left Party Two I should also say in Canada the right is much better at merging when needed then the left. The left argue purity issues and stay separate while the right beats them again and again. Re: third (i.e., minor) political parties I live in NY, which has typically 4 or 5 parties on the ballot. In practice, most of the time the minor parties (i.e., any party other than the Democrat or Republican ones) simply endorse major party candidates. This is a win for the minor parties, because if they get enough votes on their line, they get some kind of government support (I don’t know exactly how this works), and for establishment politicians, because if they by some miracle lose a primary election, they’re still on the ballot. (The minor parties don’t have primaries.) The only time where a new party has become a major party in the US that I know of was the Republican party in the 1850’s and 1860’s, and that was because the slavery issue basically dominated politics, the Whigs had nothing to say about that and the Democrats were split into pro- and anti-slavery wings to the point of having two presidential candidates. The Whigs then disappeared entirely and the Democrats effectively split into two parties, based on region: a pro-slavery party in the old South, and a slavery-agnostic party in the rest of the country, held together only by each side’s willingness to sweep any political issues under the rug on which they differed. It wasn’t until the 1960’s that this strange marriage broke up. Based on that, I’d say that to have a viable new party, you’d need (a) some overriding political issue that would be enough to attract people from a wide variety of political directions and (b) a failure of the current major parties to address the issues of the day. Unfortunately, it looks like it’s the Democrats who might go the way of the Whigs, while the Republican Party seems to have united behind hate and bigotry. And hatred and bigotry have unfortunately always played well in the US. Marissa van Eck says “Has become” a sham? Has been a sham since 1981 when Reagan was inaugurated (as opposed to being shot at close range with an extremely large-calibre firearm). This has been going on since before Millennials could walk. We’re screwed. Trump was not our first moron president, and neither was Dubya; Reagan was. This is history rhyming with itself, as it always does. lpetrich says To me, Beto O’Rourke and Pete Buttigieg seem like male bimbos. What do they have going for them? What do they propose? I like Elizabeth Warren a LOT better. She has some very good proposals, proposals that she has worked on for a long time. Kamala Harris does not quite have EW’s record of proposals, but I prefer her to BOR and PB. Bernie Sanders and Joe Biden seem to me to be very old. I’m concerned that they may not have much stamina. That aside, I think I’d prefer BS to JB. archangelospumoni says M. jrkrideau “Currently there is almost no real difference between the two US parties . . . .” This forum usually has more polite exchanges than your garden variety public venue, so I’ll try to be a little more polite. It is unbelievable, astounding, shocking, bewildering, and . . . infuriating . . . that a sane, literate person would deliberately make such a statement aside from massive sarcasm. One party is often interested in stuff like “facts” and “math” and “arithmetic” and “incontrovertible proof of human impact on climate change” while the other rejects facts in nearly all forms and venues. Then add in the covert AND overt racism, the covert AND overt misogyny while adding in the enthusiastic embrace of totalitarianism here and abroad. Then add in common thievery in nearly all forms and then add in downright hostility to any sort of environmental protection of any kind. While you’re at it, dump in a bunch of pseudoreligion, pseudoevangelicalism, and remember that all of their religious books seem to have skipped that one section when the guy told them “whatever you did for one of the least of these brothers and sisters of mine, you did for me” (clearly, this is ONLY because their Bibles missed that one page–nobody could be that hypocritical to “forget” this one page on purpose.) There . . . other than the above, you have correctly conflated the major parties. Please don’t make such statements again without including the qualifiers as I have listed.
cc/2019-30/en_middle_0029.json.gz/line3984
__label__wiki
0.673742
0.673742
Month: July, 2016 Heat Volume 14 – OPEN FOR SUBMISSION by Pup Matthias We are in the heart of summer. The pools are open, the grills are cooking, and for us writers, Sofawolf’s long running anthology Heat is OPEN FOR SUBMISSION for their fourteenth volume. One of, if not the longest, and the most prominent, anthology in the fandom; Heat is once again open for all of your erotic encounters. But outside of being an erotic anthology, Heat never does a yearly theme like its contemporaries like Roar, Fang, or Trick or Treat. Heat does not, and has never had, a theme beyond “furry erotica.” Heat occasionally develops themes post hoc, like the Americana theme running through Heat 13. We didn’t choose those stories for being related to Americana: we chose stories because they were good and it turned out that the stories we chose had a lot to do with Americana. Write the hot and sweaty or sweet and sensual furry story that you want to write. It doesn’t need to–and shouldn’t and can’t–be tailored to what we want. There is only one thing the people on Heat want? In brief: short, well-written furry erotica of all orientations with an emphasis on good story. That is what we want to see in general, but there are certain things we want to see more of. A lot of the stories we get are straight or gay, have a male protagonist, have a young protagonist, have a canine protagonist, are set somewhere in contemporary America, or are fairly straight-forward romance story. Anything that moves away from this would stands out among our submissions. We’d love to see more stories with a lesbian or bisexual focus. We’d love to see more transgender characters. We’d love to see more female protagonists. We’d love to see middle-aged or older characters. We’d love to see ourselves visiting different time periods or different locales or transported to whole other worlds. And we always love when our writers can mash together erotica with an unexpected genre. (I still think one of my favorites for this is Tempe O’Kun’s “The Case of the Gelatinous Gemstone,” which mixed erotica, comedy, and mystery.) While kinks are allowable, remember that most of our audience is not likely to share that particular kink and therefore it should not be the primary focus of the story. However, the editor of Heat, Dark End, points out that there are many common mistakes made when people submit to Heat. He recently posted a detailed blog about it on SoFurry, but if you choose to write for Heat, keep these things in mind to avoid these common mistakes. One of the biggest being, don’t make your erotic story just about the sex. The Fuzzy Conundrum, by John F. Carr & Wolfgang Diehr – book review by Fred Patten. The Fuzzy Conundrum, by John F. Carr & Wolfgang Diehr. Boalsburg, PA, Pequod Press, May 2016, hardcover $32.00 (421 pages), Kindle $7.99. The Fuzzies’ story goes on! For the record, this is the sixth approved novel in the series. They are: Little Fuzzy (1962), Fuzzy Sapiens (1964), and Fuzzies and Other People (1984), by H. Beam Piper; Fuzzy Ergo Sum (2011), and Caveat Fuzzy (2012), by Wolfgang Dietr; and The Fuzzy Conundrum (2016), by John F. Carr & Wolfgang Diehr. For the full history, read “The Fuzzy Story” by yours truly. Yes, we know about Fuzzy Nation (2011) by John Scalzi, but that is a tribute to Piper’s original novel and not a part of the series. The copyright on Little Fuzzy has lapsed and the whole novel can be read for free on Project Gutenberg. I must’ve read it a dozen times over the years; it’s one of my favorite s-f novels. The first three novels tell of the discovery of the Fuzzies on the colony planet Zarathustra, a member of the Terran Federation, by sunstone prospector Jack Holloway; the legal establishment of their childlike human sapience; and their protection by the Zarathustran government. The next two novels, written by a Fuzzy fan with the approval of Piper’s estate administered by John F. Carr, create backstories for Jack Holloway and other established characters, add some new human characters (including strong women; one of Piper’s weaknesses), and expand on the Fuzzy-human relationship. The Fuzzy Conundrum begins by establishing that the events of the previous two years, including the attempt by the Zarathustran underworld to train kidnapped Fuzzies for crime, were high-profile news throughout the Terran Federation. The Fuzzies have been shown on galaxywide news as so cute and cuddly that, even though their intelligence is emphasized, millions of people just have to have one as a status symbol. Those who study the Fuzzies’ official status, which is as a protected species for their human childlike mental level, apply to adopt one as a legal child. Those who just want to own one and have more money than smarts buy one illegally as a pet. The Zarathustra planetary government finds hundreds of spaceships landing at the Mallorysport terminal filled with applicants to adopt a Fuzzy. At the same time, it becomes aware that new criminals are seeking to kidnap wild Fuzzies from the Beta continent reservation, not to train them for crime but to sell them to those who do not know or care that this is illegal. Kitsune-Tsuki / Kitsune-Mochi, by Laura VanArendonk Baugh – book reviews by Fred Patten. Submitted by Fred Patten Kitsune-Tsuki, by Laura VanArendonk Baugh Indianapolis, IN, Æclipse Press, September 2012, trade paperback $4.99 (v + 96 pages), Kindle $1.99. Kitsune-Mochi, by Laura VanArendonk Baugh Indianapolis, IN, Æclipse Press, October 2013, trade paperback $8.99 (xiii + 291 pages), Kindle $2.99. Are Baugh’s Kitsune Tales Books 1 and 2 anthropomorphic or not? It’s impossible to tell until about halfway through Kitsune-Tsuki, defined in the glossary as “state of being possessed by a fox spirit”. These two books are set in Heian Japan, the historical period from 794 to 1185 A.D. This was the period of the most formal Imperial courts, and when the belief in Shintoism, Buddhism, and Taoism were at their height. The imperial court’s most influential courtiers may have been the onmyōji, the practitioners of soothsaying, divination, astronomy, and other forms of fortune-telling. Hardly anyone, from the emperor to his concubines to their servants, did anything without checking with an onmyōji first to find out whether it would result in good luck or bad luck. The most famous onmyōji was Abe no Seimei (921-1005), who was believed to also be a powerful wizard. See the 2001 Japanese feature Onmyōji (it’s on YouTube) about Abe no Seimei as a good wizard battling evil onmyōji trying to destroy the emperor. This was also the period when belief in ghosts, demons, and shapechanging spirits was at its height, including belief in nine-tailed kitsune (foxes) and fox-spirits possessing people. The insane were believed to be possessed by a fox-spirit. So in Kitsune-Tsuki a short novella or even a novelette), belief in fox spirits is not necessarily a fantasy about their reality. But yes, unmistakable fox-spirits do finally appear. Tsurugu no Kiyomori is an onmyōji called to the court of Naka no Yoritomo, a powerful daimyō (regional lord) with a court rivaling the emperor’s. “Naka no Yoritomo believed that a local kitsune meant to work mischief upon him or his new wife, Fujitani no Kaede. There had been strange incidents in the countryside of late, with objects of value disappearing and irrational stories offered by confused laborers for missing goods and missing hours. There had even been a recent case of kitsune-tsuki in the farmers’ village below, a poor young girl possessed by a fox spirit and driven to madness.” (pgs. 2-3) Marta the River Otter – the adorable fursuit mascot of King County, Washington. This otter does public service in a proper fursuit, commissioned by local government. (Tip: Zeigler Jaguar.) King County has two million people in the region around Seattle. Their Department of Natural Resources and Parks has a new mascot who’s a uniquely Furry example of public funding for art and education. On Twitter, Chrissy B asked who built the suit. They answered: “Beetlecat Originals helped create Marta for river safety public outreach.” NEWSDUMP – Fur-friendly culture, mascot boot camp – (7/25/16) Here’s headlines, links and little stories to make your tail wag. Tips: patch.ofurr@gmail.com. Mascot Boot Camp in the Washington Post. They sent a reporter to attend Mascot Boot Camp. It’s run by Dave Raymond. “Dave was the original Phillie Phanatic — the first to inhabit the green costume in 1978. In the mascot community, he is something of a founding father.” Dave is also founder of The Mascot Hall of Fame. It’s scheduled to open in Indiana in 2017. They said that he has run the Mascot Boot Camp for more than 20 years and it will continue at their new venue. Here’s a video for the 2016 camp. In 2015 I did a series about crossover of fursuiting and professional sports mascots. Look for update articles next week with a Q&A from Uncle Kage, an MFF organizer, and Cornbread Wolf (who fursuits for fun at sports games.) Frog and Toad are a proto-furry relationship story. The New Yorker covers the beloved classic children’s book series by Arnold Lobel. “During his career, he worked on dozens of children’s books, both as a writer and as an illustrator… His specialty was animals and their misadventures.” According to his daughter: “Adrianne suspects that there’s another dimension to the series’s sustained popularity. Frog and Toad are ‘of the same sex, and they love each other… It was quite ahead of its time in that respect.’ In 1974, four years after the first book in the series was published, Lobel came out to his family as gay. ‘I think ‘Frog and Toad’ really was the beginning of him coming out'”… It’s interesting to look at how anthropomophism, character and sexuality came together in simple friendship stories. You don’t need to know about the author for the stories to be just as good, but the writing is very personal. These are mainstream children’s books, but I might dare to say that the hidden meaning gives them more in common with furry fan fic than anyone but us would understand. “Furlesque” at Cincinnatti Fringe Fest. NEWSDUMP – Fandom News – catchup list part 2 (7-22-16) There hasn’t been a Newsdump in a long time, so have three updates packed with two months of stuff: 1. Furries in the Media. 2. Fandom News. 3. Fur-friendly Culture. Furscience.com releases ebook of furry research. The International Anthropomorphic Research Project has a shiny new website since earlier this year. Here’s a good reason to check it out – a 174-page ebook full of 5 years of data about furry fandom, for the low price of free. Download it here. Fred Patten interviewed by Yiffytimes.com. “My interview with Fred Patten” by Ahmar Wolf and Greyflank. With Fred’s history as a founder of Furry (and anime) fandom, it’s really interesting to hear this: “Q: Where do you see the Furry Fandom headed? A: Furry fandom is already a lot different than it was in the 1980s. There is much more emphasis on wearing fursuits, adopting fursonas, and embracing and publicly exhibiting a furry identity. There is also a furry literary community now, which is what I’m active in. A few furry fans who are publishers or fursuit makers or artists are able to make their living in furry fandom instead of it only being a hobby for them.” Furries at San Francisco Pride. New furry Whup stepped up in a big way to organize a booth. (He’s yellow dog in the first pic). Apart from a big “Bay Area Furries” banner, it was a very informal base for breaks from the sun. There was a huge crowd to prowl around with on a hot day. Street Fursuiting is my favorite thing, and street fairs are my favorite place for it, and Pride in SF is one of the most fun and accepting times. (It’s far from the only one – a furry in Edmonton talks about their float full of furries in “A big thanks to the furries out in pride festivals this month!“) Sixes Wild: Echoes, by Tempe O’Kun – book review by Fred Patten. Sixes Wild: Echoes, by Tempe O’Kun. Illlustrated. Dallas, TX, FurPlanet Productions, June 2016, trade paperback $15.95 (155 pages). This short novel is a sequel to O’Kun’s Sixes Wild: Manifest Destiny, an anthropomorphic-animal Western published by Sofawolf Press in June 2011. That won the 2012 Cóyotl Award in the Best Mature Novel category, and was a nominee for the Western Writers of America’s Spur Award in the Best Short Novel category. (For the record, there has also been a promotional 8-page Sixes Wild: The Bluff comic book, illustrated by Sidian.) Echoes begins where Manifest Destiny ended. The setting is White Rock, Arizona Territory, a stereotypical dusty early 20th-century Western town (they have newfangled electric lights) except that the townsfolk are all anthro animals – sort of. (I still haven’t figured out how a big-winged fruit bat sheriff who flies and hangs by his feet upside town in his sheriff’s office can ride a horse.) The main characters are Jordan Blake, the fruit bat sheriff, and Six Shooter, a rugged hare bounty hunter. What nobody knows (well, they pretty much do by now) is that Six is really a crossdressing female, and she and the sheriff are secret lovers. Very graphic lovers; this is a mature content book. Manifest Destiny ends with Six going after Tanner Hayes, the arrogant lion mine-owner revealed to be a villain who goes on the run. Echoes begins with Six coming back to town empty-pawed. “‘Thought you had a lion to run down.’ ‘Hayes has gone to ground. Haven’t got mah gun back either.”” (p. 7) Meanwhile, she’s heard a new rumor that interests her. “She rests her paws on those revolvers, one a silver heirloom, the other a blue steel substitute. ‘A spot of treasure hunting.’ I look up from my bookkeeping to take account of Six. One never can tell how serious she takes her tomfoolery. ‘Ah’ve been hearin’ rumors.’ She brushes the dust from her fluffy tail. ‘Folk tell of a cliff-house with all manner of lost riches.’ With a sigh, I lean back in my chair, steeple my wings, and put away the pen with one foot. ‘I wouldn’t put much stock in saloon scuttlebutt.’ ‘Nor would ah, but ah heard it from an old ‘yote traveling with the circus.’ My wing fingers interlace. I wish I knew her better, and not just because I’d like to know if she’s poking fun at me. ‘If he knew where all this treasure was, why was he traveling with a circus?’ ‘He said it was cursed.’ Her dexterous paws dance theatrically. ‘Everybody who went lookin’ met a grisly end.’” (p. 8) NEWSDUMP – Furries In The Media – catchup part 1, (7-20-16) There hasn’t been a Newsdump in a long time, so expect three updates packed with two months of stuff: Pic: Luke Thor Travis, PGH City Paper The media gave warm and fuzzy vibes for Anthrocon. Smart Business Pittsburgh: “Furry Fandom” (two-page spread with video). WTAE video: Fursuit parade vid WTAE photos: 2016 Anthrocon fursuit parade. PGH City Paper: Furries show off their finest ‘fursuits’ to the public in Anthrocon’s annual Fursuit Parade PGH City Paper: Pittsburgh gives the furries its annual warm welcome NEXTpittsburgh: Anthrocon turns 20, Fursuit Parade open to public Post-Gazette – The ‘Roaring Twenty’: Furries celebrate 20th anniversary of Anthrocon Palm Beach Post: Furries are back! Anthrocon is underway in Pittsburgh WPXI News: Anthrocon is underway in downtown Pittsburgh CBSPittsburgh: Furries Take Over KDKA Morning News Triblive.com: Furries expected to be financial boon to Pittsburgh during convention Hastings Tribune: Furries hold 20th annual Anthrocon Convention in Pittsburgh A few worth seeing after the con: WTAE video: The Making Of a Furry. “Daisy Ruth set the scene outside the Convention Center with April, a local fursuiter who created her own suit, and Camille of CF Studios, an artist who creates and sells creature and fursuits.” WTAE – Beyond the Suit: The World of Furries. “Pittsburgh’s Action News 4 reporter Beau Berman sat down with ‘Clumzy’ to find out what it’s all about.” Rika and Rusty. Anthrocon news topic – Pets. PGH City Paper: “It probably comes as no surprise, but furries love their pets“. Four furs are interviewed. “Some furries say that getting involved in the community that celebrates anthropomorphized animal personas has helped them become more aware of the needs of shelter animals; understand the emotions of their pets; and strengthen their love of our four-legged friends.” Anthrocon news topic – “Fursonas” movie. Post-Gazette: ‘Fursonas’ director takes his Anthrocon ban in stride. Dominic Rodriguez was banned for breaking Anthrocon’s media policy (filming without permission) in pursuit of unvarnished truth that couldn’t be officially filmed for a documentary. “Fursonas” showed parts that many furries take very personally or feel shouldn’t be suppressed. It was divisive. Some took his movie as undermining good work of the con. Others took his ban as a politicized penalty for PR control that may be stuck in the past. But furry fandom have been around for decades now and it keeps growing. When will sensitivities loosen up? “Fursonas” screened at an independent venue during the con. I asked Dom if he’s interested in doing a guest post about it. Before his trip, he told me: “Although I’m banned, I have a feeling this is going to be my best Anthrocon yet. I spent the evening hanging out at the bar across the street and then going over to the river to hang with new and old friends. I go to these things mostly to meet people and have cool conversations. I think that’s more fun than anything they have in the convention schedule, anyway. No Time Like Show Time, by Michael Hoeye – book review by Fred Patten. Submitted by Fred Patten, Furry’s favorite historian and reviewer. Fred writes: “A few reviews of furry books that I wrote in 2003 or 2004 have vanished from the Internet. I wrote them for the first version of Watts Martin’s Claw & Quill site, which he has apparently taken down. Here they are back online.” No Time Like Show Time: A Hermux Tantamoq Adventure, by Michael Hoeye. NYC, G. P. Putnam’s Sons, September 2004, hardcover $14.99 (277 pages). Hoeye’s Hermux Tantamoq novels are one of the major publishing-industry success stories of the decade. His first was rejected by all major publishers. So he self-published it and its sequel, sent free copies to dozens of libraries and reviewers, and got so many rave reviews that the big publishers quickly changed their minds. Time Stops for No Mouse (2000) and The Sands of Time (2001) were reprinted by Putnam in 2002. Hermux Tantamoq is a young watchmaker in the mouse city of Pinchester who lives alone with his pet ladybug, Terfle. In the first novel, daring aviatrix-explorer Linka Perflinger brings her watch to his shop for repair. When she disappears and a shady rat tries to claim it, Hermux investigates and is drawn into an old-fashioned pulp-thriller adventure to save her. The Sands of Time is a similar adventure in which Hermux, Linka, and an old chipmunk explorer search a distant desert for the buried ruins of a forgotten cat civilization while being hunted by mouse-supremacist assassins who want to suppress the knowledge that there was ever a pre-mouse empire. Hermux got into those adventures mostly by accident. He was happy to fade back into anonymity in his watch shop at their end. But he got enough publicity that when theatrical impresario Fluster Varmint starts receiving death threats, he misremembers Hermux as a famous detective and calls on him to investigate. Hermux is reluctant until he discovers that his least-favorite Pinchester celebrity, arrogant cosmetics tycoon Tucka Mertslin, is plotting to take over the city’s historic palace-theater, now the Folies-type Varmint Variety Theater, and turn it into a garish cosmetics office-showroom. “[Hermux] rushed through the doors of the Varmint Variety Theater, barely pausing to appreciate the workmanship of their pumpkin-vine hinges and matching wrought-iron doorknobs. He was in such a hurry that he scooted right through the historic grove of artificial aspen trees with their hand-blown Spiffany glass leaves. Crossing the lobby to the box office, Hermux scarcely gave the exquisite floor a glance. […] The box office occupied a rustic hut that sat beside an authentic reproduction of a waterfall. […]” (pgs. 13-14) Hermux will do anything to save the lovely building. But he is only one mouse, and Mertslin has the support of Pinchester’s Weekly Squeak (she is one of its leading advertisers). When Mertslin learns that Varmint’s ownership of the Theater is challengeable (he bought it long ago with a massive loan from the Theater’s then-leading star, who disappeared after a mysterious tragedy so Varmint has not been able to repay the loan), she hires lots of lawyers to try to get the missing Nurella Pinch declared the legal owner of the Theater, then legally dead with herself as the executrix of Pinch’s estate. Meanwhile, things are more dangerous than either suspect, because the hoodlum that Mertslin uses to scare Varmint decides that it is to his advantage to really start murdering people to gain a blackmail hold over Mertslin. Most of the characters in Show Time are mice (Fluster Varmint is “a barrel-chested mouse with a big baritone”, while his daughter and manager Beulith is an attractive mouse with “two perfect front teeth — long, elegantly arched, and tinted a very pleasing pale yellow”), but there are also a flying-squirrel messenger boy, a hedgehog bookkeeper, such would-be actors as “A noisy group of prairie-dog impersonators wearing matching paisley boleros, toreador pants, and very high heels” and “A chipmunk dressed as a potato”, an otter fashion designer, a shrew ventriloquist, and other mostly-rodent-sized animals. Hoeye has a fine eye for rodentine appearances: “Fluster Varmint was a visionary. When he thought long tails were more elegant, showgirls grew longer tails. When he thought bushy tails were more provocative, they grew bushier tails. If Fluster thought hamsters made the funniest comedians, then suddenly everywhere hamsters were telling jokes and wearing peculiar hats.” (pg. 34) When Hermux is calling on Linka, “he straightened his whiskers and fluffed out the fur in his ears.” (pg. 29) Hermux’s third tale is a change of pace for him, being more of a Phantom of the Opera backstage mystery and courtroom drama than an Indiana Jones search for treasure in foreign jungles and deserts. Since it takes place in Pinchester, Hermux’s ladybug Terfle is able to emerge from her cage for the first time and accompany him in a faithful-dog role. No Time Like Show Time is clever old-fashioned detective comedy-suspense adventure that would not disappoint a fan of the 1930s Thin Man movies — with a furry cast. – Fred Patten, Fellowship of the Ringtails, by Angela Oliver – book review by Fred Patten. Fellowship of the Ringtails, by Angela Oliver. Illustrated, map. Seattle, WA, CreateSpace, June 2013, trade paperback $15.49 ([iii +] 406 [+ 9] pages), Kindle 99¢. Technically the title of this book is Lemurs (A Saga). Book One: The Fellowship of the Ringtails. But the cover doesn’t say so; Amazon.com doesn’t say so; and I’m pretty sure that nobody else is likely to say so, either. This title makes it sound like either a parody of J. R. R. Tolkien’s The Lord of the Rings, or an unimaginative imitation of it. Fortunately it’s neither. Its opening paragraph is: “‘There will be others, Fiantrana,’ the soft voice drew the young lemur from her reverie. She turned her gaze from the great stone tomb: the final resting place for her ancestors, relatives, and most recently, her own son. There was a deep ache inside her: the memory of his tiny, fragile body as she had cradled him to her breast, watching his life breathe out of him.” (p.1) Angela Oliver, of Christchurch, New Zealand, is devoted to lemurs. In a two-page “Why Lemurs?” afterword, she explains that she was introduced to lemurs while working at a local zoo park, went to Madagascar where lemurs come from in 2007, and fell in love with the whole island-nation. The Fellowship of the Ringtails is an adventure fantasy featuring anthropomorphized lemurs in their Kingdom of Madigaska, a fictionalized Kingdom of Madagascar before it became a French colony in 1897. An important fact is that there is not just one kind of lemur. There are many different species, roughly divided into the sifakas that are almost entirely arboreal, and the “true lemurs” (which she has dubbed the hazosaka because it sounds better for a fantasy novel) that can walk on the ground, including the famous ringtailed lemurs. For The Fellowship of the Ringtails, she has made the sifakas into the royal family and the aristocracy of Madigaska, while the hazosaka are the commoners.
cc/2019-30/en_middle_0029.json.gz/line3993
__label__cc
0.534306
0.465694
Home Gaming NieR: Automata’s dystopian future arrives early 2017 NieR: Automata’s dystopian future arrives early 2017 NieR: Automata, the SQUARE ENIX and PlatinumGamesInc. developed, action-RPG title, will be available to fans in Europe and PAL territories early 2017 – for the PlayStation 4 computer entertainment system. The highly anticipated follow up to the 2010 cult-classic NIER, NieR: Automata tells the story of androids 2B, 9S and A2 and their battle to reclaim the machine-driven dystopia overrun by powerful mechanoids. 2B is the main playable character and is an all-purpose battle android deployed as a member of the automated infantry squad, YoRHa. She is equipped with a sword for close quarters combat and the “Pod” support system for ranged battle. Her eyes are obscured beneath her standard-issue military visor, which she rarely removes. 2B is cool, calm, and collected. Story of NieR: Automata Invaders from another world attack without warning, unleashing their secret weapon: the machines. In the face of this insurmountable threat, the human race is driven from the earth and takes refuge on the moon. The humans develop an army of android soldiers to fight back against the mechanical horde, but succeed only in slowing its advance. To break the deadlock, a new breed of android infantry is sent into the fray: the YoRHa squad. In the forsaken wasteland below, the war between the machines and the androids rages on. A war that is soon to unveil the long-forgotten truth of this world… So more and more gaming news. Did you try the sleeper hit that was the original NieR and will you be checking out NieR: Automata when it hits next year? Let us know in the comments below. Superman enthusiast, pop culture fan and film journalist. Creator of podcast Speakin' Geek and contributor to Scannain.com, iRadio and Spin 103.8. I love talking about anything and everything(except country music, I hate country music). My views are my own and I would love to discuss them with you.
cc/2019-30/en_middle_0029.json.gz/line4007
__label__cc
0.526298
0.473702
The Hunts at Mckinney Performing Arts Center October 18, 2015 October 18, 2015 / gemsofgenres / Leave a comment Last month I had the immense joy of seeing The Hunts live at the McKinney Performing Arts Center. This was a phenomenal concert, and one of the best evenings I’ve ever had! The Hunts are seven siblings that comprise a fabulous Alternative-Folk band from Chesapeake, Virginia. Their music style is influenced by a mix of their mother’s classical violin lessons, their father’s taste in 70’s/80’s music and self-taught guitar skills, and all seven’s varying music preferences. This, and a lyric inspiring childhood, creates the beautiful, rock out, from the heart, and completely original take on music that The Hunts play. We sat down in McKinney’s historic Colin County courthouse and waited for the show to begin. The lights dimmed as a piano and electric guitar began to slowly introduce the room to “Illuminate“. With Josh’s raw and honest way of singing, their music’s soul-stirring orchestration, and some of the most heartfelt and profound lyrics I have ever heard, it was amazing to see this song performed live. Their ceaseless joy and unity onstage showed throughout their concert, but it was at its sweetest during “Valentina“: a lovely song written about a girl they met while hosting a summer music camp for children in Haiti. I knew that this was Josh Hunt’s favorite at the time from him telling me in our interview, and it showed as his face became far more animated for that song. Seeing their happy faces light up thinking about her made it impossible for the audience to not smile. The same joy and unity can be said about “Lifting The Sea“. Jenni explained how they wrote it about their dreams to travel and how through their music they’ve been able to do so. It was something of a sweet comradery as all of them, dreamy-eyed, harmonized the story of their wanderlust and dreams come true. I had chills it was so wonderful. From their cheeky sibling banter to even drumming on the dining room chair, seeing how much fun The Hunts had during their concert made the show that much more enjoyable! I loved hearing Jordan sing “Next To Me” partly because it’s so fun and happy I wish this could be the soundtrack to my life, and partly because of Josh pointing out that the seven of them whistling in this song reminded him of the seven dwarfs. This spurred on a question of which dwarf he’d be, to that one of them replied with a mischievous “Choose wisely”. 😀 The sisters Jessi and Jenni took the stage to croon a more-than-lovely cover of Elvis Presley’s “Can Help Falling In Love” dedicated to Jessi’s at the time fiancé, now husband. These girls have the prettiest voices! Their breathtaking timbres and glorious harmonies make my soul faint! *sigh* It was adorable seeing their sweet smiles and knowing glances to each other throughout the song. I thought the night couldn’t get any better than what I had experienced so far. Oh how wrong was I! What came soon after but the amazement that is “Above the Storm” composed by Jonathan Hunt. Its awe-striking orchestration, building crescendos, and awakening harmonies pulsed the room with adrenaline. It soon flowed into a cheery and rhythmic melody, that gracefully melted into a heavy minor chorded piano solo rather akin to Hoizer. This song is epic bliss to say the very least. After that gloriousness my night continued to be wonderful with an emotion-filled performance of “Douse The Flame“. Its stunning violins and passionate lyrics of how dear their past is pulled at my heart! “…Still adventure seems to storm our very bones! We were young, but I’ll remember the clouds stampeding as my heart was overthrown!…” It was beautiful! I was like a small child by the end of the night with my enthrallment and joy of each coming song. Especially so when they played the one song I had to watch and not take notes on; the one I wanted to enjoy (and shout the words to the top of my lungs). None other than, “Make This Leap”. This song is so extraordinarily better live! Being able to see the dance of music before me is something that you’ll have to see live to understand. *sighs* It was perfect! With a final performance of “Ages” I was thrilled. They totally rocked this country-style anthem with their building cries and stamping feet. I was overwhelmed with amazement! And can I say seeing Jessi rock out strumming on a banjo, was awesome! Their ending harmonies were heavenly to behold and it flawlessly caped off my evening. I was in an elated state at the end of this concert, but that skyrocketed when we were able to get not just an encore song, but the best performance of “Folsom Prison Blues” I have ever heard in my life! With Jenni’s hot country vocals, Jonathan’s killer piano solo, and Jessi’s fiddling making strings of her bow, it was spectacular! I must say, I no longer feel this song is complete without a mandolin, but I don’t think anyone can fill that role for this song better than Jamison Hunt. To top off this gloriousness the siblings called onstage their guitar-god of a father, Mr. Clint Hunt! This man has learned to play guitar by ear, and he is one of the best guitarists I have ever seen live, and I’ve seen many excellent guitarists before! (Can I learn how to play guitar like him?) It was a gorgeous moment, and one that Johnny Cash would certainly be proud of! This show was an absolute gift! I had an amazing time and my one complaint about their show is that it had to end! The Hunts’ wisdom and emotion is astonishing, and their extreme passion and love for music inspires me greatly. The best part is how humble The Hunts are. Something Jenni said while thanking the audience for coming out really showed their humility, “We’re just seven kids from Virginia who play music“, and I love how after I can run out of words to describe their *pick a word that means really good, and place here*-ness, they are so down to earth and some of the kindest people you’ll meet. You will not be disappointed at their concert. GO SEE THE HUNTS! Thank you so much to Sandy, Clint, Jessi, Jenni Dowling, Josh, Jonathan, Jordan, Justin, and Jamison Hunt. I had a wonderful evening and I can’t wait until you all come back to Dallas! You can find The Hunts on: Facebook, Twitter, Spotify, and at thehuntsmusic.com. Click here for tour dates to see if this awesome band will be coming near you. Many thanks to Sarah Forshaw of Forshaw Photography for letting me use your pictures from that night! All images in this post are hers. You can find Forshaw Photography on: Facebook and at sarahforshaw.wordpress.com Happy Saturday! -Gems of Genres September 10, 2015 / gemsofgenres / 1 Comment All DFW Metroplex population and then some! Are you searching for an awesome concert to go to this month? If so, you have to go and see The Hunts live at Mckinney Performing Arts Center on September, 18th. (Click here for details) “But I know nothing about this band,” you say? Well then, let me tell you! 🙂 Seven, multi-instrumentalists, with breathtaking harmonies, who are also siblings, The Hunts are a Virginia-based Alternative-Folk band. Their music is spirited and from the heart; always with a bright message. It is deep and wise, yet innocent and simple, and altogether beautiful. I had the privilege of asking lead-singer and eldest brother Josh Hunt a few questions, via email, before they come to Texas for the show. Q: What do you enjoy most about being a musician? “A. My love for being a musician stems from my love for music. That sounds obvious, but it stands true. Above all the perks that I’ve experienced from being a musician, there is a genuine love and intrigue I have towards music.” Q: How does being on tour with your siblings effect your relationships with each other, both positively and negatively? “B. Touring with my family is gratifying and a ways that we’ve created many of our fondest memories. Our relationships growing up have always existed in tight living spaces. For example, all seven of us shared a single bathroom throughout our childhood. We collectively understand that touring is possible through solid relationships that involve care and forgiveness.” Q: What is the story behind the song “Make This Leap”? “C. Make this leap is mostly inspired by our childhood. The sounds and many of the lyrics to this song and the rest of the album for that matter were written to capture the emotion behind our memories and adventures as children.” Q: What is your favorite song to perform? “D. My favorite song to perform often varies… Last month it was “Douse The Flame”, a slower beautiful song that is also reminiscent of the effect of past years, and years gone by. This month it has been Valentina. Valentina (written about an orphan we met in Haiti) holds so much meaning. Experiencing the joy and courage of this girl has effected us significantly and recalling the experiences by playing Valentina is a pleasure.” (In 2013, three years after the devastating earthquake in Haiti, The Hunts along with a two cousins and a friend, went to “impact and bless the lives of children in impoverished and unfortunate conditions through music and teaching.” Their time spent is beautifully told in this video. ) Q: Is there a question you would like to be asked? “E. See C” Q: As a musician, is there anything specific you have, or would like to accomplish? “My goal as a musician is to be as genuine and true to myself throughout my career as I possibly can. Music shouldn’t be made in a factory. That often defeats the purpose and emotion of it. The Hunts style of writing and the effort and meaning we put into each song is something I’d like to maintain.” -Josh Hunt I think that last answer truly shows the heart of this band. The one thing that makes me addicted to someone’s music is if you can feel it, and with The Hunts you most certainly can. Their music is true, and laced with meaning and emotion; the way music should be! I really hope you all come out and see the Hunts live because their music is amazing! Purchase tickets to The Hunts Live at McKinney Performing Arts Center here. If you would like to see The Hunts in concert, but don’t live in the DFW area click here to see their tour dates. You can find The Hunts on Facebook, Twitter and at thehuntsmusic.com. If you want to here more of their awesome music give them a follow on Spotify.
cc/2019-30/en_middle_0029.json.gz/line4008
__label__wiki
0.567798
0.567798
The $6M Rebate This Infomercial Hack Doesn’t Want You to Know About Matt Novak Filed to: kevin trudeauFiled to: kevin trudeau kevin trudeau charlatans Factually Kevin Trudeau’s books at a bookstore in 2005 (Getty) Kevin Trudeau spent the past decade publishing books that promise to tell you the health secrets that mainstream science won’t. But he peddles bullshit. And the courts have repeatedly said as much, ordering him to pay over $37 million for misrepresenting what’s in his books. Now some consumers who got ripped off by his “weight loss cure” book will be getting some money back. Trudeau is currently serving 10 years in prison for his scams that raked in millions. And today the FTC announced that they’ll be paying back roughly $6 million to consumers who bought his 2007 book, The Weight Loss Cure ‘They’ Don’t Want You to Know About. The courts ruled that peddling his weight loss book was in direct violation of a 2004 order from the FTC not to talk shit. Needless to say, Trudeau’s book was a bunch of shit. It required everything from 15 colonics in a single month to daily injections of a drug that could only be obtained overseas. Trudeau pled the Fifth Amendment when asked in court where all his money was, but a court-appointed receiver was finally able to find some of it. “If someone moved, or believes they’re entitled to a check but didn’t get one, they should call the FTC’s Consumer Response Center at 1-877-FTC-HELP (382-4357), but there’s no guarantee at this point that money will be available for a refund,” Frank Dorman from the FTC told me over email. Kevin Trudeau’s other best seller, Natural Cures, promised the inside scoop on secret cancer cures that Big Pharma doesn’t want anyone to know about. This book is also filled with garbage. “This book is exploiting and misleading people who are searching for cures to serious illnesses,” said Teresa A. Santiago from the New York Consumer Protection Bureau when the book was originally released. “What they discover is page after page after page of pure speculation—not the cures for cancer and other diseases that are promised.” “From cover to cover, this book is a fraud,” she continued. “The front cover makes false promises about ‘natural cures’ that are in the book, while the back cover includes false endorsements, including one from a doctor who died three years before the book was even written.” Kevin Trudeau is not a very nice man. Matt Novak is the editor of Gizmodo's Paleofuture blog PGP Fingerprint: 0074 467E 1339 F416 DA8C 6CFA 0ABD A808 C05C D4A6 • PGP Key Recent from Matt Novak Congressman to Facebook: Your Digital Currency Could Be Worse Than 9-11 This 1960s Comic Strip Claimed Nuclear Explosions Were the Future of Road Construction How Moon Landing Conspiracy Theories Spread Before the Internet Tuesday 9:55am
cc/2019-30/en_middle_0029.json.gz/line4010
__label__cc
0.630657
0.369343
TRAVEL PRIVATE ACTIVE STYLE NOTES FROM THE ROAD Notes From Cari WELLNESS ON THE AMALFI COAST WITH SILVIA What a treat it was to walk "The Path of the Gods" — the famed hiking trail in the hills overlooking Italy’s Amalfi Coast — during the “Dolce Vitality” fitness retreat... Julia’s Andalucia Insights Andalucia offers great weather almost year round. With hundreds of golf courses, prolific hiking trails and biking-worthy roads, it's paradise for active travellers... TOP TEN ACTIVE EXPERIENCES Team Gray & Co. has spent the last 10 years scouring the globe to chase down the next unearthed adventures. Here are some of our most memorable trips... Recent intrepid journeys we’ve produced for travellers include birthday celebrations in Morocco, hiking and biking the Camino de Santiago in Portugal and Spain, family e-biking in... WHERE WE’RE GOING At Gray & Co., we chase the sun and warm weather all year long. And so, we find now to be the perfect time to visit South America, South Africa, Australia and New Zealand. Over the next few months... Fall + Festive Private Active Trip Ideas It's hard to top biking and hiking among ripe grapes in the vineyards of France, Italy, Spain and California during harvest--which is exactly what we'll be doing in September... JUST BACK FROM PORTUGAL Portugal has become a new travel darling for many great reasons. Lisbon's unique architecture and colourful streets make it the perfect urban walking locale... AFAR, PURE, ATTA + MORE To keep on top of all the latest openings, trends and best practices around the world, Gray & Co. will once again be participating... Paola In Peru Gray & Co. guide Paola returned this summer to Peru, one of her favourite hiking destinations, for an in-depth inspection of the many new... LANZAROTE WITH RUBEN On one of our recent trips, professional photographer Ruben Acosta captured active scenes on his home island of Lanzarote. The Spanish Canary Islands offer good biking and hiking weather year round. HAPPY CANADA DAY – AND HAPPY SUMMER On July 1, Canada celebrates the 150th anniversary of its confederation with parties from Vancouver Island... FALL FOLLIES It's easy to keep spinning beyond summer when the roads of Spain and Italy beckon bikers with great weather well into October. Mallorca combines both casual rides... HOLIDAY SEASON HOTLIST It might only be summer, but savvy travellers are already planning their end-of-year gatherings. Destinations like Chile, Patagonia, Australia and New Zealand... TOUR DE FRANCE TURNS 104 July 1 also marks the start of the 104th Tour de France. This year's route passes through some of our favourite French regions: the lavender of Provence, the vineyards... GET MOVING IN MEDITERRANEAN STYLE With spring just around the corner, it's none to early to start planning your warm-weather journeys. Greece tops our list of iconic... SPOTLIGHT ON GREECE Let Gray & Co. help you navigate the antiquities, islands, and beaches of Greece. We'll have you cruising the Cycladic and Ionian islands via super yacht or staying at favourite... POP UP IN MALLORCA The secret is out--our Gray & Co. team is crazy about the Balearic Island of Mallorca. This May, Gray & Co. will partner with the 32-room estate-turned-luxury stay... ALASKA WITH ANNIE I love the endless summer days in Alaska--from hiking glaciers in Denali National Park & Preserve and fishing for king salmon on the Kenai river to sea kayaking with whales in... Fall is a great time to taste, sip and savour Sonoma County, California, where the newly redone 25-room Farmhouse Inn and Spa is the ultimate basecamp. Cycle right out PORTUGAL, THE ALPS & GREECE We're more than ready to roll in Portugal, which was just named "Country of the Year" by the experts at Travel & Leisure magazine. Whether it's Lisbon, a coastal adventure... Gray & Co. bike trips were mentioned in an article about “why cycling is hot and not cooling down” in the travel newsletter “Oh The People You Meet.” And coming soon... INDUSTRY THANKS On the heels of being named #1 Tour Operator in Travel & Leisure's 2016 World's Best Awards, Gray & Co. has been busy making even more exclusive connections for our travellers. Cari is... Gray & Co.'s Iceland journeys were singled out this month in CNN Travel's profile on high-end hikes: "Think of Gray & Co as a full-time concierge of sorts -- one that would coordinate the private... WHERE TO BOOK NOW: ALASKA & ICELAND Gray & Co. guide Annie is just back from Alaska, a wild and wonderful destination that beckons active travellers with its glaciers, fjords, mountains, and pristine nature... Positano Views Le Sirenuse What a treat it was to walk “The Path of the Gods” — the famed hiking trail in the hills overlooking Italy’s Amalfi Coast — during the “Dolce Vitality” fitness retreat hosted by Positano’s impeccable Le Sirenuse hotel. From the lemon groves and Roman ruins to the stunning Mediterranean views, it was sensational, as were our hikes, on several lesser-known but equally gorgeous paths. Our base at Le Sirenuse pampered us completely. Owner Antonio Sersale has gathered an excellent and very devoted wellness staff that caters to all whims, needs and more. It was a week rich with early-morning yoga followed by wonderful walks, afternoon fitness and pampering massages. And the food! Healthy and incredibly tasty at the same time. By the end of the week, I was feeling on top of my game: stronger, lighter, healthier and definitely more glamourous! I can’t wait to share Amalfi and the Sirenuse with Gray & Co. travellers! Finca Cortesin Marbella Club Hotel Hotel Alfonso XIII Seville, Spain Southern Spain’s Andalucia region offers great weather almost year round. With hundreds of golf courses, prolific hiking trails, and biking-worthy roads, it’s paradise for active travellers. Great places to stay include the coastal Marbella Club and countryside Finca Cortesin. In the region’s capital, Seville, the Grande Dame place to base yourself is Hotel Alfonso XII. Deep in the old town lies the low-key boutique property Corral del Rey. From the tasty tapas to the whitewashed villages, it’s a place I can’t wait to get back to! Hiking to the Wine Glass Bay Lookout Biking the Healy Pass Kenmare, Ireland Island hopping on two wheels Seto Sea, Japan Horseback Riding on the Pampas José Ignacio, Uruguay Hiking from Sóller to Deià Mallorca, Spain Biking from Kleinmond to Gordon's Bay False Bay, South Africa Hiking the decent to Kleftiko Beach Milos, Greece Biking along vineyards and medieval villages Hiking along Hvita Canyon to Gulfoss waterfall Biking in Santa Ynez Valley Team Gray & Co. has spent the last 10 years scouring the globe to chase down the next unearthed adventures. Here are some of our most memorable trips: Tasmania: This quiet island off Australia’s south-east coast is exceptional. With the Saffire Lodge as our home base, we always look forward to hiking up to the lookout in Freycinet National Park and taking in the views of Wine Glass Bay below. Other favourite activities include kayaking, fishing, hiking and a visit to a working oyster farm. Kenmare, Ireland: With a winning combination of Irish comfort and hospitality, vibrant local surroundings (live music not to be missed!) and endless outdoor adventures steps from the door, the family run Park Hotel Kenmare is a destination spot that we keep coming back to. For day-time fun in the area, we love the epic hiking, biking, not least the bucket list ride over Healy Pass. The option of using an e-bike makes the pass a great activity for all ages and abilities. Seto Inland Sea, Japan: Our latest of many recent trips to Japan brought us to Onomichi, often referred to as the “Mediterranean of Japan.” This area is home to the Shimanami Kaido (Island-Wave-Sea Route), a 50-mile bike journey that crosses over several bridges to connect six islands in the Seto Inland Sea. To do it right, be sure to follow your bike ride with a visit to an Onsen (a traditional Japanese bathhouse spa). Jose Ignacio, Uruguay: This town combines a chic Latin American beach culture with a casual vibe. But if sitting on the beach all day isn’t for you, we can relate. Try kite-surfing instead, or ditch the beach to explore rolling pampas peppered with estancias — perfect for horseback riding. The Hotel Vik properties are the luxe places to stay here; the three locations accommodate a range of tastes. Mallorca: This Spanish Mediterranean island is a Gray & Co. favourite, the diversity of the landscape makes it the ultimate playground for hiking and biking alike. One of our own got married there recently, over a wedding weekend filled with cycling, sailing and a hike from the town of Sóller to the village of Deià. There, we love the Belmond La Residencia for a well-earned drink with views of the Tramuntana mountains. Cape Peninsula, South Africa: With Cape Town as home base, you can have the luxury of the city and the adventures of the surrounding area at your fingertips. We love to cycle the Cape Peninsula, visit Boulders Beach to see the penguins, kayak along the coast, dive with the sharks and hike Table Mountain and Lion’s Head. The ride along False Bay from Kleinmond to Gordon’s Bay makes even local cyclists swoon. Milos, Greece: Away from the summer crowds that pack the Aegean’s Cyclades, the island of Milos is a destination most best accessed by private yacht. Kleftiko Beach, one of our favourite island spots, is typically only visited by boat, but our preference — surprise surprise! — is to hike from the other side of the island into this hidden cove for some cave swimming and a well-deserved picnic. Just one of the many hidden gems on islands we like to explore! Alentejo, Portugal: This region is known for wine, but we love it for its relaxed spirit and its bike-friendly paved roads. Here, after morning rides through vineyards, cork plantations and medieval villages, it’s on to afternoon spent riding horses, tasting wine and chilling out. The hotel São Lourenço do Barrocal has redefined Portuguese luxury travel with its simple design, upscale takes on traditional cuisine and welcoming service. The area feels untouched by mainstream tourism. Iceland: With its green hills, volcanoes, geysers, hot springs and glaciers — often all seen in the same vista — this Scandic destination is a natural wonderland. Our preference is to travel via jeep through the southern farmlands to the Canyon of Hvíta. There, a scenic cliff hike overlooks a flowing glacial river known for rafting and salmon fishing. Post hike, it’s on to the hamlet of Laugarvatn for a lunch of local specialties at the restaurant Lindin, housed in a former schoolhouse. Santa Ynez, California: Just over the San Marcos Pass from Santa Barbara lies this hidden valley, home to some of the best cycling in the United States. This area is where both the wine-themed Sideways and horse-centric Seabiscuit movies were filmed. We love the 18–room Fess Parker Wine Country Inn & Spa, in Los Olivos. From there, you can directly head out on multiple loop bike rides with no need to transfer, and there’s great hiking at the base of Mount Figueroa. Recent intrepid journeys we’ve produced for travellers include birthday celebrations in Morocco, hiking and biking the Camino de Santiago in Portugal and Spain, family e-biking in Mallorca, and road cycling through the remote islands of Onomichi, in Japan (pictured here). Which did we like best? It’s impossible to pick. (Well…maybe Japan!) At Gray & Co., we chase the sun and warm weather all year long. And so, we find now to be the perfect time to visit South America, South Africa, Australia and New Zealand. Over the next few months, we’ll be exploring the winelands of South Africa, the volcanic landscapes of the Canary Islands, the red-rock canyons and lakes of Argentina and Chile and more. It’s hard to top biking and hiking among ripe grapes in the vineyards of France, Italy, Spain and California during harvest–which is exactly what we’ll be doing in September. In the next few months, we’ll also be on the trails and roads of Mallorca, Portugal, Norway and the Canary Islands. At the other end of the world, meanwhile, the Southern Hemisphere is just warming up. Spring is in the air and Festive Season active trips are in the works in South Africa, New Zealand, Australia, Argentina and Chile. And as 2017 draws to a close, we’re especially thrilled to have been voted one of Travel + Leisure magazine’s World’s Best Tour Operators for the second year in a row. Thank you so much for your continued support! São Lourenço do Barrocal Portugal has become a new travel darling for many great reasons. Lisbon’s unique architecture and colourful streets make it the perfect urban walking locale, and then there are the beaches of the Algarve and the vibrant wine city of Porto, too. For us this month, Lisbon marked the start of a four-part private Camino de Santiago trip by foot lead by guide Silvia. After more than 500 kilometers, the journey will end in Santiago de Compostella, Spain. For those who prefer two-wheels, the vineyards, cork trees and medieval villages of the Alentejo region offer the best riding, based out of the new São Lourenço do Barrocal countryside hotel and spa To keep on top of all the latest openings, trends and best practices around the world, Gray & Co. will once again be participating in autumn’s PURE Life Experiences Marketplace in Marrakech, the Adventure Travel Trade Association World Summit in Argentina, the European Private Luxury Forum in Portugal and the AFAR Media Travel Agent Council in New York. We’re very excited to connect with our many friends from near and far who help make our journeys so unique. Gray & Co. guide Paola returned this summer to Peru, one of her favourite hiking destinations, for an in-depth inspection of the many new travel options in this increasingly popular destination. (Tourism has tripled here since 2000!) Initially put on international jetsetters’ maps because of Machu Picchu, the country now boasts newly accessible ruins to hike, numerous luxury lodges and world-renowned cuisine. Reports Paola: “From the Amazon to the Sacred Valley and Lake Titicaca, Peru will delight Gray & Co. travellers almost year round. And Lima is only a six-hour flight from Miami!” Cycling among lava landscapes on Lanzarote Spinning through the lava fields of Timanfaya National Park Whitewashed villages are a common backdrop throughout the island Guide Jamie eager to showcase the islands beauty by bicycle for a sunset spin is one of our favourite to do's is known for its year-round warm weather, beaches and volcanic landscape The fertile land of Lanzarote is also known for it's unique wine production methods On one of our recent trips, professional photographer Ruben Acosta captured active scenes on his home island of Lanzarote. The Spanish Canary Islands offer good biking and hiking weather year round. On July 1, Canada celebrates the 150th anniversary of its confederation with parties from Vancouver Island in the west all the way to Newfoundland in the east. At Gray & Co., we’re very proud of our Canadian heritage. Most of us will spend the day hiking, biking, canoeing and enjoying the great outdoors with friends and family. (Yes, there will even be fireworks!) We share that same strong sense of community and adventure with our travelers every day, as we plan and guide trips to far-flung locations around the globe and right back home in Canada, too. Whether we’re biking the roads of Ireland or hiking the trails of Patagonia, our team produces what Travel + Leisure readers dubbed the world’s best private active trips. We combine tried and tested routes and top-notch guides with carefully selected and personally sampled accommodations and restaurants, paying painstaking attention to all the fine details that ensure your journey is just right. Where can we take you next? It’s easy to keep spinning beyond summer when the roads of Spain and Italy beckon bikers with great weather well into October. Mallorca combines both casual rides among the vineyards and epic climbs up in the Tramuntana Mountains. On the mainland, Andalucia delights, especially when you’re based out of the white-washed Finca Cortesin In Tuscany, the hotel Castello di Casole is perfectly located for two-wheeled training among the Chianti vineyards and cypress trees. It might only be summer, but savvy travellers are already planning their end-of-year gatherings. Destinations like Chile, Patagonia, Australia and New Zealand are especially hot this year, due in part to the low probability of Zika in those spots. Forthcoming fall-opening hotels that will be great for the festive season include the latest Awasi Lodge at Iguazu Falls in Argentina. Spinning through Provence July 1 also marks the start of the 104th Tour de France. This year’s route passes through some of our favourite French regions: the lavender of Provence, the vineyards of Burgundy and the castles of the Dordogne Valley. Gather friends and retrace epic rides with Gray & Co. this fall. With spring just around the corner, it’s none to early to start planning your warm-weather journeys. Greece tops our list of iconic spring and summertime destinations for all ages. From the deck of your private yacht, you’ll listen to grandkids share tales of the ancient gods and goddesses. We bring those stories to life touring such ruins as The Temple of Olympian Zeus in Athens. Cycling pros know that the Balearic Island of Mallorca also offers up good early-spring weather and fabulous biking, hiking, kayaking and hotels from April to October. Check out our “pop-up” week in May when we’ll be in residence at the island’s Gran Hotel Son Net. Special thanks to those who voted us #1 Tour Operator in Travel + Leisure World’s Best 2016. Voting for the 2017 awards closes on March 6th. Let Gray & Co. help you navigate the antiquities, islands, and beaches of Greece. We’ll have you cruising the Cycladic and Ionian islands via super yacht or staying at favourite on-land hotels–and, most likely a combo of both. Start from the King George Hotel, in Athens, which tempts with both Acropolis views and easy access to the Parthenon temple. Then head to the less-touristed Peloponnese peninsula, where the Mycenae ruins and hilltop resort of Amanzoe await. Or head out to the islands: Milos features hikes to secret underwater caves, Santorini provides views of ancient civilization preserved in volcanic ash, and Hydra has bike rides along the Mediterranean. Our fave “easy to miss” isle? The peaceful Folegandros, where the Blue Cuisine restaurant delights. The secret is out–our Gray & Co. team is crazy about the Balearic Island of Mallorca. This May, Gray & Co. will partner with the 32-room estate-turned-luxury stay Gran Hotel Son Net, for our first-ever pop-up cycling week. This is the ultimate way to both give Gray & Co. a try, and to travel with just a friend or two. We’ll set off each day on cycling roads favoured year after year by racers and amateurs alike, peddling through almond and citrus groves, vineyards and medieval villages. I love the endless summer days in Alaska–from hiking glaciers in Denali National Park & Preserve and fishing for king salmon on the Kenai river to sea kayaking with whales in Prince William Sound and dogsledding on the Punchbowl Glacier in Girdwood. Working with the best lodges, we craft experiences away from the crowds for all ages and fitness levels. One of my favourite places to stay is Still Point Lodge, which sits tucked away off the coast of the Kenai Peninsula. It’s a great mix of rustic and refined, and the quiet waters of the cove, just outside the hotel, are perfect for paddling. Fall is a great time to taste, sip and savour Sonoma County, California, where the newly redone 25-room Farmhouse Inn and Spa is the ultimate basecamp. Cycle right out from the driveway to explore vineyard roads that’ll take you to the charming town of Healdsburg and then well beyond. Farmhouse’s brother-and-sister owners, Joe and Catherine Bartolomei, raise all bars. Near Santa Barbara, meanwhile, we love the winding, picturesque vineyard and horse farm roads around Los Olivos, where filmmakers shot both Sideways and Seabiscuit. The Fess Parker Wine Valley Inn & Spa is our home away from home in Santa Barbara, all year long. We’re more than ready to roll in Portugal, which was just named “Country of the Year” by the experts at Travel & Leisure magazine. Whether it’s Lisbon, a coastal adventure in the Mediterranean-side Algarve, tasting your way through the vineyard-filled Douro Valley or taking in the charms of whitewashed Alentejo, we’ll help you have the best bespoke experience possible. Other hot spots on our radars right now include the French Alps, where you can follow the wheels of the pros (we love Chalet Pelerin & Fermes de Marie here); and Greece’s Peloponnese coast, which from the base of the serene Amanzoe, offers up great archeological site visits and scenic boat rides to the nearby islands of Hyrda and Napflion. Gray & Co. bike trips were mentioned in an article about “why cycling is hot and not cooling down” in the travel newsletter “Oh The People You Meet.” And coming soon in Departures magazine, you’ll find a piece on Gray & Co.’s custom bike trips in Oregon, where Willamette Valley, near Portland, offers up great rides, wonderful wines and the fabulous Allison Inn & Spa. (For those of you already planning your autumn travels, other great North American fall picks include Santa Ynez, California, and Hill Country, Texas. On the heels of being named #1 Tour Operator in Travel & Leisure’s 2016 World’s Best Awards, Gray & Co. has been busy making even more exclusive connections for our travellers. Cari is a member of the Adventure Travel Trade Association and the AFAR Media Travel Advisory Council, and also sits on the board of the Family Trade Association. As a Contributing Editor to Departures, she shares her expertise with the magazine’s high-flying readership. Our team participated in the Aspen Food & Wine Classic, the Skift Global Forum in New York, the PURE Life Experiences conference in Marrakech and the International Luxury Travel Mart in both Mexico’s Rivera Maya and Cannes, France. Most recently, Cari has been welcomed to the new VF500, identified as an influencer and tastemaker by Vanity Fair magazine. Gray & Co.’s Iceland journeys were singled out this month in CNN Travel’s profile on high-end hikes: “Think of Gray & Co as a full-time concierge of sorts — one that would coordinate the private helicopter pick-up at the end of a hike so seamlessly as to deliver the adventurer back to their lodge right in time to catch the sunset. Travellers have been increasingly interested in Iceland, where trips can include a trek across lava fields, glacier climbing and bathing in natural hot springs.” We also got a shout-out in a New York Time’s article on how to plan an active vacation, alongside recommendations from star travel agent Susan Sparks of Points of Interest Travel. Gray & Co. guide Annie is just back from Alaska, a wild and wonderful destination that beckons active travellers with its glaciers, fjords, mountains, and pristine nature. Here, as Annie discovered, America’s northernmost state has a very short window of “good” weather, however, and very limited higher-end accommodations, so it’s best to start planning now for hiking and paddling adventures this coming summer with your family and friends. Be in touch to let us help you get a leg up on bookings. The similarly short summer season in Iceland is in great demand, too. Travel Insurance & Safety © 2017 Gray & Co. All Rights Reserved. Site design: Viva & Co.
cc/2019-30/en_middle_0029.json.gz/line4015
__label__cc
0.722784
0.277216
How to be an Awesome Advisor Keywords: Adults and Allies, GSA Development Kinds: Fact Sheet GSAs are clubs run by and for students. However, these clubs would not be possible without the advisors who open the doors of their classrooms and offer support to students in GSAs. Advisors offer advice and assistance while supporting students in taking on leadership and making their own decisions. To start a GSA, students need a faculty advisor (typically a teacher, staff member, counselor, librarian, or nurse) who is supportive or has already shown him or herself to be an ally around issues of sexual orientation and gender identity at school. Advisors offer continuity from year to year, as student leadership often changes. As an adult in a school, the advisor has the ability to communicate with and educate other faculty and administrators. Having faculty and administrators as advocates helps students feel safe, supported, and empowered. Adult allies can help other adults learn to respect young people’s rights to be treated fairly and express themselves. Advisors can be allies to youth starting GSAs by: Offering positive encouragement and advice in starting the GSA club. Providing a safe space to meet and materials to use. Helping create the GSA’s constitution and mission statement. Promoting the club to teachers, staff, and administrators. Speaking up for students’ rights to express themselves and form clubs. Using neutral labels like “partner” and “significant other” and stopping the use of slurs. Locating other adult allies for support in addressing the anti-LGBT climate at school. Intervening when a co-worker engages in anti-LGBT comments or actions. Becoming familiar with federal and state laws, as well as district policies that protect LGBT students, and speaking up to administrators if those laws aren’t being followed. Youth-Adult Partnership in GSA clubs Evaluate the structure of the organization: Did youth or adults start the group? Who leads the group? Have both youth and adults always participated? Define the differences in leadership roles and set clear expectations for youth and adult leaders. Prioritize youth leadership and facilitation and focus on leadership training and skill-building for students. Follow a specific process for planning events and projects in your GSA. Make sure responsibilities are clearly designated and expectations are well-defined. Frequently evaluate group dynamics: Do adult advisors and student leaders both feel supported? Do youth members feel they have power and control in the group? If adults tend to outnumber youth or dominate the GSA, consider forming a separate Gay-Straight Teacher’s Alliance or a faculty support group. If adult advisors wish to be involved in setting meeting agendas (or are required to by school policy), make sure that a youth leader is also involved in the process. If adult advisors have concerns about a particular project, voice these by asking questions instead of handing down authoritative decisions. Make sure youth have an opportunity to finish their own tasks and responsibilities with help only when asked. Advisor Handbook Annual Resource Supporting LGBTQ Youth through Family Engagement California Resources San Francisco Unified School District’s LGBTQ – support website is dedicated to providing educators with tools to LGBTQ topics in school. Their goal is to create a safer learning environment for all students with an emphasis on LGBTQ youth and their families. Check out the feature article, “In Support of LGBTQ Youth,” written for the California Association of School Counselors by a GSA advisor. GLSEN – website for more curriculum, educator guides, and lesson plans.
cc/2019-30/en_middle_0029.json.gz/line4018
__label__cc
0.610686
0.389314
Urizeni Briars Urizen Squeek_D July 6, 2019, 8:35pm #1 I’m planning on playing at E1 2020…so, some time yet, but between other life events and cosplay, I’m thinking far, far in advance. I already have a Spire and all the other bits as the character I’m playing with is slotting into my partner’s Spire. (They’ve been playing this year, so I’ve got some stories about how stuff moves…including ‘so I had a debate in character about reference systems’) However, I’m wondering how other people have played Briars as part of Urizen before, as there’s a line on the wiki which makes me think anyone who’s lineage is realized tends to move more towards other Nations because of how the lineage plays out. Ricohard July 6, 2019, 9:12pm #2 If that’s who I think it is, they need to look behind them before they start dissing our spire and its importance as a leading centre of academia. If only because we’re really quiet and at least four of us are physicks so we know how to make it hurt. When it comes to Urizeni Briars there have been several, Iulian, previous Archmage of Spring, and of course the ever infamous Aquilian (as well as others I am more than certainly forgetting). It is certainly not a lineage that necessarily lends itself to the urizeni way of life, but that can often be the very reason why its fun. The most important thing to remember that poise is not about suppressing your emotions its about focusing them for productive gain, and so while this can often be harder for the impulsive and direct Briar focusing that drive and energy can lead to using it in a constructive manner to drive yourself forward towards your goal. So, just as a ‘thinking out loud’ thing- if you’re playing a Briar, the best way to think about playing them is the slightly more scattered scientist/researcher So, less Doc Brown, more Walter from Fringe in nature? Penny July 7, 2019, 4:40pm #4 Briars are going to get IC racism, that’s one of the main things of the class. It should be entirely ic though. Lineage can be a good way of doing things off your nation brief without being off brief for your overall character choices - Urizen may have IC issues with your behaviour if you play it to the hilt but you’re not being a rubbish roleplayer ooc. Briar and Urizen clash IC in ways which give you quite a bit of freedom to pick which way you want to go in some areas. Possibly playing them scaterred, possibly playing as more than a little monofocused (after all if you’re bursting with energy why not stay up all night staring at the stars and reading what ever books interest you and never going to sleep). Alternatively you could be that you’re Poised and focused ninety percent of the time but because you’ve almost over focused on maintaining that and and when it starts to crack you get very focused on your rituals to maintain that poise. What I’ve currently got, character wise, is that their lineage ‘proper’ showed later, they originally trained as an apothecary/herbalist, and that because of varying interests/research focuses they’ve spent a large portion of their adult life travelling across the landscape before boomeranging back to home Spire (It’s partially due to minor incident when travelling/doing research that their lineage became apparent. Who knew that drakes didn’t like being directly observed whilst mating?) Basically, a healer who is very good at set tasks (aka, point a to point b, can do this, is done, am done, next), but the moment they don’t have that ‘someone needs healing/go do the healing thing’ they fall into ‘what weird crap can I research next’ as a pattern Mark_Wilkin July 7, 2019, 8:56pm #7 I saw one Urizeni Briar who became Archmage of Spring, they basically used their innate energy just to get a lot of shit done and had no patience for people faffing about. So that’s one direction to take things. Iulian July 8, 2019, 3:37pm #8 Hi, I was aforementioned Iulian. Most Urizeni briars have gone a bit mad-scientist, and I did a bit of that. Also… Urizen is intellectual, and the influence of the blood is anti-intellectual. Iulian came to lineage late (thirties), so I played this as ‘used to have an eidetic memory, suddenly does not’ and just kept forgetting things. I’m slightly scatterbrained, loud and overeducated OC, so I just leaned on those traits. Iulian talked quickly, escalatingly loudly and impenetrably, and had no patience with people who didn’t understand him. Except for briars, with whom he connected quickly and communicated well. Physically, I played that the character was trying to use the tradition of Poise to keep himself under control, bottling up the urges he felt to Just Do Something and twitching and flinching and playing up my natural stutter as a result. Then (because Poise also means doing things good and hard when you do them) I leaned into the releases of power, using my size and physicality to make him somewhere between charismatic and intimidating when he did act. Iulian’s loss of control didn’t look like twitching, stuttering, nervousness. It looked like a confident voice, a long stride and Getting Shit Done With ESCALATING VOLUME AND SPEED. And putting that back in its box looked like someone grasping for the last vestiges of his self-control. Other traits I used: Easily led - weird in a leader, but other people could put ideas in his head easily Sometimes didn’t ‘get’ subtlety, becoming frustrated when he realised he hadn’t got it Prone to sitting unceremoniously in the grass to talk to people Believed he was surROUNDed by IDiots The type to go ‘foools fooooools I shall show them alllll’, but only once the ritual was well underway. @Iulian I could hear the ‘surrounded by idiots’ in my head whilst reading the post. What I’m gathering is basically leaning in towards the stereotype ‘we’re not going to call this ADHD, but the signs are there sans the can’t sit still’ that you see with a number of media characters wouldn’t go amiss… (Tho’, as someone who’s a person watcher on a basic habit, the more responses I’m getting, the more I realize I can model Tiresias off of someone I actually know…who’s silly smart, but I sometimes struggle to follow the logic leaps they make because of where their academic specialties/skill focuses lie) Ankarien July 9, 2019, 12:59am #10 I think there is a lot to say for not playing the ‘mad science’ variety of briar. As you say you’re playing someone socialised in Urizen who then gained all this extra energy and lack of focus. I would translate this as: The people of Urizen already do not suffer fools. This just adds an extra level of intolerance to people wasting your time. It’s a great excuse for a blunt ‘I believe this conversation is finished’ bow, walk off If one decides they won’t want to draw attention to themselves despite an abundance of frustrated energy then there are plenty of “poiseful” things one can do, like pacing, having an object to fidget with, shifting position and eye contact often. “Poise” is all about using your emotions correctly and not being controlled by them. It is perfectly acceptable for an Urizen briar to explode with emotion because it is reasonable to do so and then immediately dial it back. Just because one is briar it doesn’t stop someone being socially aware. And the people of Urizen have to be hyper socially aware. The briar brief is subtle. And I believe best suited in the nation when not played to the max 100% of the time. But unleashed when heightened times of stress hits - to avoid falling into stereotype. Remember our brief says that briars might leave because they feel they chafe in Urizen, not that they’re kicked out. We are a people of logic and lineagist attitudes are pretty illogical. Iulian July 9, 2019, 3:10pm #11 If you’re going to roleplay something that could slip into looking like the effects of a medical condition, please do your research, be respectful and be ready to change if asked to. ADHD, OCD, anxiety disorders and so on are real things that make people’s lives harder today, and don’t exist for our entertainment. Squeek_D July 9, 2019, 4:06pm #12 Understood…tbh, it’s a conversation that I’ve had with writers previously regarding autism spectrum disorders (due to it being my neurotype) It wasn’t an analogy made without some understanding of the phrase ‘proceed with caution when modelling traits off of aspects of other people’s neurotype,’ but I understand if it came off as such. Cheesefondue July 13, 2019, 9:30am #13 With Aquillian, I went for the cold intellectual type, very merrow-like, who deeply resented having briarhood trust upon him. He got better, but his constant urge to show that he was still smart, that he could still reason and be intellectual, were formative aspects of his personality. He ended up focusing more on Arete than Poise, and rationalising that as proper.
cc/2019-30/en_middle_0029.json.gz/line4024
__label__wiki
0.761054
0.761054
[Drama 2012] Bridal Mask 각시탈 By ecs707a, April 20, 2012 in k-dramas & movies park ki woong han chae ah jin se yeon mrdimples 67,243 Joo Won "I Want To Wear More Masks." After taking off the Bridal Mask, Joo Won would like to wear more masks. “If the interviewer does not mind, can I have some snacks while doing this interview?” In order to attend this interview, with the sound of his footsteps going “da da da”, Joo Won came running in, hands full of various tidbits. “When I am tired, eating snacks will lift me up.” thus said Joo Won, the “Snack King” who is always eating tidbits. How more interesting can this get? This Bridal Mask who is eating snacks and laughing “haha” at the same time. Today, Joo Won is one of those young actors who are attracting the most attention in Korea. In Baker King Kim Tak Gu, he received attention together with Yoon Shi Yoon, then he acted with Uhm Tae Woong in the movie “ Special Investigation Unit”, followed by filming the drama “Bridal Mask, establishing his own presence. “Recently, I felt like I have become an idol” Joo Won said. His popularity has monopolized fans ranging from a 3 year old to an elder who can remember the days of the Japanese occupation. Not only this, in the national variety show 2N1D, Joo Won is also interpreting his own role. More than his acting skills, the thing that leaves the audience with a deep impression in their memories is that Joo Won is an actor who knows how to let himself go because of the drama. In Bridal Mask, Joo Won went from an unrestrained Lee Kangto to become a pure and innocent man who was passionately in love with Mok Dan(Jin Se Yeon). He also had to act out many action scenes. In the drama, he used suppression and bitterness to replace his old image of being an obedient man, and he perfectly portrayed the Lee Kangto who bore the sufferings of that era. “Actually when I took the script of Bridal Mask, I already started to feel the pressure. It was a 10 billion mega production and also a very famous manhwa, and there were many emotional and action scenes, so I was very worried whether as a main actor, would I be able to act well. In reality, Lee Kangto was a very complex character. Before he wore the mask, he was a betrayer of his own nation. After that, he had to hide his identity, be it in front of the independence fighters or the Japanese. The viewers enjoyed watching it but to the one acting, it was actually a headache. “The moment I took over the mask from hyung, it was the beginning of my troubles. Although it was just acting, in reality I was also confused. At the police station, on the outside I was Sato Hiroshi but inside I was Lee Kangto. Not only this, I also had to hide the truth from Mok Dan. So more than acting, I was very tired mentally. After the show ended, I still felt confused and my head hurt.” Even Park Ki Woong who acted alongside with him said “You are the great con-artist at acting.” Joo Won had totally become Lee Kangto. Because of this, the audience got duped as well, found it interesting and tried to understand the character in the drama. “This is the first production that caused suffering on me physically. Joo Won revealed that “I am a person who alone, can deliver 250 rounds of musical performances. So I was fully confident of my physical stamina when I started. But this time, Bridal Mask was really exhausting, probably because it required one person to show so many different faces, that’s why it was so. “Even though it was like this, Joo Won’s style is the type who does not like to take health supplements. When he hits the limit, the things that give Joo Won strength are his sense of responsibility and his relationship with people. “I strive to be an actor who is full of vitality.” Joo Won places a lot of emphasis on his interpersonal relationship with the actors and the staff on the set. In order to create a relaxed filming atmosphere, Joo Won candidly opened up and worked hard to get along and work with people around him. Now that he has taken off the mask, Joo Won spoke of the next challenge that he wants to take. “I want confirm the diverse personalities that’s hidden deep within myself.” Influenced by the main actor in the play “Jekyll and Hyde” who had multiple personalities, Joo Won candidly revealed that he wants to see how many more masks he has within himself. “After acting in Bridal Mask, I heard for the first time that I am sexy. It’s the first time I discovered that I had a sexy side to me. Perhaps there are still many faces hidden inside me. So I will like to take the challenge.” Chinese translation: 由米35 on baidu English translation: mrdimples@soompi Source: bntnews sunshine4ever 26,756 Se Yeon’s Interview part 2 (Taken from this video interview, she talked a lot more about BM in part 1) Transcribed & Summarized by Jessi15 @ Soompi Se Yeon is filming for an advertisement. “I came here to take photoshoot for a magazine.” She is not ‘Mok Dan’ here. She is showing her classy appeal. “It is weird to see my different side.” Jin Se Yeon is beautiful without make-up. She is showing her different side with heavy make-up.“It’s interesting to do make-up and hair like this.” The photographer starts taking photos of Se Yeon. She shows her sexy appeal and very charms. The video starts to show SY in various commercial advertisements. She was in many TV advertisements. She became queen of TV advertisements until she became Cinderella. A way she made her debut: “I was casted on the street. I filmed TV advertisements To become an actress: “I was auditioning for a role in TV advertisements, dramas and movies. I naturally broaden my works. Beautiful? “I am glad to be called beautiful. Thank you.” Here she smiled and waved to the audience. Sense of Inferiority: “I felt inferior about my cheeks.” Then she continued apologetically “Today’s concept was cool and chic. However I sometimes doesn’t look cool because of my cheeks (she was patting lightly her cheeks) so I’m sad.” A charming point: “My smile.” Different sides: “I might look as if I am quiet and matured. However I act cute like girls my age do so when people got to know me better, people say that I have lively side.” How do you manage your skin and body? “When I am filming a drama, I would naturally loose weight without noticing it. I don’t get to sleep a lot. I easily get hungry. So I have to move even though I am sleepy and hungry when filming. So I just loose weight . For my skin, I’m sad… I have to wear make=up until dawn so I would get hives. I just cleanse my face leaving no make-up.” A new actress Jin Se Yeon. A year after her debut, she was casted as a main role in “My Daughter the Flower”. “I was just happy about The Daughter The Flower. The title of the drama is The Daughter the Flower. I got the role of Flower so I was happy.” Something you gained? “I played the main character for the first time. So I felt like I’m one step closer to acting. There were many professional actors and actresses so I have learned a lot from them. The drama gave me reason to become a good actress.” A role you want to play? “I always play roles that are older than my age. Next I want to play a University student role that has an ingenuous beauty. I would like to play an optimistic person.” 20 years old Jin Se Yeon is lively and girlish. Matured look? “I could have played the roles because I have matured look. So I don’t mind looking matured.” Free Times: “I usually stay home. I often watch movies.” The last film you have watched? “I watched the Dark Knight Rises at the theatre recently. I really like it” Here she gave it a thumb up. Then the video showed her on the date she went to the admission at Chungang University. Se Yeon said “I feel good and excited. I am not a University student. I would attend lectures. I want to get to know Luna and Min Ho. I want to be close with friends.” University life: Se Yeon said regretfully: “I couldn’t attend classes at the University because I had to shoot ‘My Daughter the Flower’ and ‘The Bridal Mask’ so I’m sad. She then talked about her relationship with Luna f(x). “Because we couldn’t meet often, we couldn’t be close friends. Chungang University students send messages so I sometimes got in touch with her.” What would you like to do before you graduate? “I want to go to MT before graduation” and then she giggled: “A blind date?” Relationship? “I never had a boyfriend. I don’t know why” Here she giggled again. Future plans: “I hope to be on TV after the drama. I will work hard. I want to be this kind of an actress that could gain people’s trust. I want people to have positive thoughts when I am on a drama or a movie.” Se Yeon became a dreamgirl for Korean men. Jin Se Yeon is the most wanted girlfriend among the actresses. As she walked around in the studio and got to see her own pictures , she is beaming “I am happy. He (the photographer) shoots great pictures. I love this hair and make-up. I really liked today’s shooting.” “I want to be remembered as this kind of actress. I want to become an actress that could gain people’s trust. I want people to have positive thoughts when I am on a drama or a movie." “The Bridal Mask ends in a month. I will do my best filming the ‘Bridal Mask’. I hope to be on TV after the drama. I will work hard.” Drawing to the conclusion, to the audience Se Yeon said: “To viewers, I am Jin Se Yeon. The Bridal Mask will be fun so please watch it. I will try to show more of my different sides. Bye.” The screen shows this notation ‘Actress Jin Se Yeon has dreams. We hope you to become a dependable actress’ whilst music of Goodbye Day playing on the background. Thanks for transcribing @Jessi15. my4ever77 said: Celebrity Topic – Joo Won’s Drama Travelogue Part 3 – Towards Bigger Dreams Playing the role of an antagonist left a deep impression and the beautiful and tragic love he played has made him the young “STAR”. He is recognized for his innate ability at acting both good and evil. Joo Won even obtained the title of “The New Generation Capable Actor” in the Rising Star, he is making cautious pace, ready to take off after completing his run-up. 30th May 2012 to 6th Sep 2012 – “Bridal Mask” It was blistering hot but very happy Since 2010, I have acted in one drama each year. Although each piece of work is very memorable, the one I love best is the recently ended “Bridal Mask”. I suffered a lot both physically and mentally, but this is also a drama that contributed to my growth. I played Lee Kangto who experienced much sadness when it came to his family. On the other hand, he also suffered pain when he had to go up against his friend Shunji because of fateful circumstances. Shunji was actually Kangto’s best and only friend in the world…even as we filmed; I would think ‘how did we reach such a stage?’ This question made my heart ached. From a perspective of an observer, Kangto and Shunji could not avoid their tragic fate. These two closest friends faced the fate of having to kill one another’s family; they continuously deepened their mutual animosity. Just when one is being worn out on the inside and needed the support and comfort of a friend, they developed mutual distrust instead, deepening their hatred of each other. Their tragic fate makes one cry. When we did the actual filming, I carried the same sort of feelings in my heart; Park Ki Woong hyung who played Shunji felt the same way too. We could not help but asked “Why did we become like this?” we felt sorry for each other. In the final episode of Bridal Mask, I felt even more heartbroken. Because Kangto had to send off the woman who he deeply loves……it was heart wrenching. Leading dual lives as Kangto was very difficult. Do I just trick the characters in the drama or do I also need to trick the entire audience? That fine line made me confused. In the beginning, it was the difficulty of drawing the emotions of trying to understand the past. In the middle and the latter half, it was psychological fatigue. Because I had to switch back and forth between good and evil, until the very last when things could no longer hold up and were going to be revealed, it was very strenuous. In the final scene, holding the dead Mok Dan in his arms, Kangto burst into tears, crying loudly. When the viewers saw this scene, many cried along. But there were also reactions like “whether the emotions were over the top.” Ever since I was in high school, I started to feel that in acting, one should not care how he looks. This is my own philosophy on acting. If I always had to care about how the camera would capture me, whether I look good, then I would not be able to show sincere acting. I feel that only when I cast away all external things then I can show an acting that resonates with people and is sincere. After the filming of ‘Baker King Kim Tak Gu’ ended, I received an invitation from my alma mater to give a lecture to my sunbaes. At that time, I told them these words “Cast away the external things”. This is most important to an actor; it is actor Joo Won’s philosophy. From March this year, I started the frantic pace because of Bridal Mask filming. It was hot and we also met with typhoons. It was not just the actors but the staff also suffered a lot. It was also a long distance to the filming site. Travelling took a lot of time so it was hard physically. The weather was extremely hot and I still had to wear the uniform. Sometimes, I felt as if my neck was being strangled and had to ask for a short break before I could continue with the filming. Although it was like this, the most fortunate thing was the atmosphere on the set. Because I was working with good staff and actors, it gave me a long of strength. Because I had the sunbaes who loved me, I became encouraged. Because there were viewers who knew of our sweat and efforts, I could smile. It is so now and it will be so in the future, Bridal Mask is a production that made me very happy. 6th September 2012– Ahn-nyeong Hahsehyo! And another Ahn-nyeong Hahsehyo! To date of all the characters you played, which is your favorite one? Bridal Mask’s Lee Kangto. It is a role that allowed an actor to display a wide range. I thought a lot during the filming. Kangto gave me a great leap forward. To play this role, I was vexed for a long time and I also did a lot of research. Bridal Mask was a process by which I became an actor. I have always acted characters that are older than my actual age. In the future, I would like to act a character that’s about the same age. I wish to take the challenge of funny and cute acting. Every time when I filmed a show, I would concentrate intensely in order to immerse myself in the character. When I hear the director “CUT, my emotional state would still continue for a while. Anyway, in order to completely step out of the character, Kangto, I will still need some time. Now I wish to travel with my family and friends. Even if it’s somewhere near, it does not matter. I want to go travelling, to enjoy as much as I can, the little happiness of daily life. To share stories with others, to spend beautiful sunny days listening to music, if like this, even though it is with regrets, it’s time I have to bid Kangto a beautiful farewell. Then I would again prepare to meet the new character. I will give my utmost to become a true actor. I hope everybody will continue to give me attention and care. I will take the trust and care you have given me and melt it into my works, this is the type of actor Joo Won will be. A Joo Won, who people will anticipate even more tomorrow than today. Towards bigger dreams, Fighting! Writer: Joo Won Chinese translation: minidadalove on baidu Not sure if this appeared here. But I was just browsing tumblr and someone said it made her cry watching this. Man, I miss Mok Dan& Kangto, gosh I really still do. coolreborn 74,849 Moat Master Location_Between Moon's Thighs Gaksital: BLEEEEH!!!! fr DCinside mrdimples said: mojobobo said: @mrdimples, you think Yang Baek will be the one to take the shot for Kangto? As much as this drama is about Kangto, it's also about the country and I'm jsut worried the writer will choose to kill of Mok Dan and make Kangto a man who just fights for his country. sunshine4ever said: mrdimples said: LyraYoo 65,043 ★ Meet Me In Outer Space ★ Location★Kdrama Wonderland sunshine4ever said: Post reserved for Bridal Mask directory ---- WILL BE UPDATING-----UNDER HEAVY CONSTRUCTION Jin Se Yeon's Thoughts on Bridal Mask, cast, & Mok Dan part 1 (during BM) Jin Se Yeon's Interview part 2 (during BM) "5 Words Talk" Interview Translation & Video (after BM) The Dual Life of Joowon (while filming BM) "Gaksital" Joo Won the National Star - "My dream is to become that good an actor." (after BM) I Love Sportswear. I am Boring and also not Handsome (after BM) Joowon who transforms into a strong man, the hero in Bridal Mask (during BM) “Rising Rapidly Like The LTE” Asia Today’s interview (after BM) Joo Won & Park Ki Woong How Is the Actual Relationship between Bridal Mask “Enemies” Joo Won and Park Ki Woong? (after BM) Park Ki Woong: "I got to know Joo Won through Gaksital; he was an excellent partner" (after BM) Gaksital Press Conference News (no subs) BTS JW & JSY's Kissing Scence #3 Interview (English translation included) (no subs) Bridal Mask Interview of the four main leads (In English subs, Chinese & Vietnamese subs) THIS IS AWESOME!! ^ ^ i pinned this on our first page. thanks dear! manyearsago 4,800 While we are all focusing on reading articles and watching interviews of the 4 main characters of Bridal Mask after the drama ended, somehow I found an article of interview with Jung Eun Byul, a supporting actress who started playing her role of Jin Hong from ep 21. When I was reading the article, I was surprised to know she sang one of the tracks 안되나봐 in Bridal Mask OST. I quickly checked music.daum.net and BM in Wikipedia to confirm the info. Bingo!! She is the one but her stage name as a singer is 은유. Her singing is nice although she might have no more than 10 lines to say in BM. Source of the article: http://news.kstyle.com/article.ksn?articleNo=1952166&categoryCode=IV Below is translation. Jung Eun Byul - From being a fan of Bridal Mask, it was lucky to have become Jin Hong The 24-year-old Jung Eun Byul is yearning for acting, however, being a rookie actress, there is still so much to learn and so much to show. Instead of being greedy, actor/actress taking one step at a time has more reasons to be loved by the viewers. Interview with Jung Eun Byul was done at Hap Chang Dong after BM had finished its airing. Jung played the role of Jin Hong. Although she only joined BM filming from the last one-third of the drama, she had already drawn lots of attention from viewers. Since she is a rookie actress, she is still not used to interviews but her passion towards acting is not less than any other veteran actors/actresses. In a scene which she had to fight against Chae Hong Ju played by Han Chae Ah and the scene which the Dong Jin Death Squad went to rescue Bridal Mask from the torture room, Jin Hong’s role was vigorously active. Her filming schedule was only one month but it was very special to her. “It was a very popular drama. I enjoyed watching it. When I knew I would be playing a role in it, I just couldn’t believe it. It was lucky for me. However, because I have to play with all the best actors and actresses, I think no matter what, I have to do my best to do well in my action scenes.” In BM, there were lots of action scenes, there would be a trouble if viewers found out the scenes were done by stunt, so it was very difficult for Jung to merge with the scenes which the stunt had done. “I have lots of action scenes and also because it was a sensitive time about the problem on supporting actors, the requirement was even more strict. Although I cannot perform to the same level like a stunt can, I tried and did my best. Fortunately, I got recognition from people, I was happy.” Other than being a beautiful and elite member whose role certainly attracted the curiosity of viewers, Jung also gained lots of attention from viewers as her ranking kept rising in the search engine of portal sites on her “kicking scene” and ”the fighting scene which she took control over Han Chae Ah within 3 seconds”. “For 3 days, I found my name ranked in the search field. It was like a miracle to me. I was happy. I was proud in front of the filming staff and PD when these scenes were captured. They were all happy for me. Because of this, I found myself more passionate towards filming." Actually Jung is engaged in singing activities with her stage name of “Eun-U”, she sang Mok Dan’s theme “Looks like it doesn’ work” in Bridal Mask OST. “When I was little, I liked singing and dancing. I was born in Konju but the chance when we moved to Seoul. I was scouted when I was 20. In order to make a debut as a singer, I changed different management agencies within 4 years, so I understand how hard life is, I keep my will very firm. Acting is something which I did not expect.” Jung just vaguely thought it was just a co-incidence starting with acting. Others think she has potential to be an actress. “One day, my management agency received a script and I read it. When I did the script reading with others, I didn’t realise I shed tears already. By reading the lines, I immersed myself in the character. Guess I started my acting with these tears. I could feel the happiness which acting brought me.” Jung started her first drama in SBS “First Marriage”, she played the role of Mibon, her acting was recognized, then she acted better in her next KBS2 drama “Birds of Thorns”. Jung started martial arts in order to film Bridal Mask, she is still practising it even now. She wants to become an actress like Ha Ji Won who played the role of Jang Chae Ok, a female detective in Joseon era, in the drama of Tamo. “Shooting was my hobby when I was young. Now I have demonstrated my swordmanship, my kicking skill was also very popular after receiving special training before filming. From now on, I just learn the basics one by one in order to prepare myself to play and act well in any other role in future. I am prepared to play a role similar to Ha Ji Won in “Tamo””. If you ask Jung about her future activity plan, she surely knows what to tell you. “I want to play a role who has experienced hardship, a reckless & rough type of tomboy. I want to get recognition as an actress rather than a singer. I would like to thank you Yoon Son Shik PD and Cha Yon Hun PD for giving me the chance to play a role in Bridal Mask. It was such an honour. I learnt a lot. Also, thank you for everyone of my first official fancafe. I hope I will have more activities in future and please give me your love and support.” Micheru 3,931 i have found my way back to "BM" thread, and this is my peace offering to everyone. enjoy, fellow fans! Entertainment Weekly interview with Park Ki Woong, credits to kbsworld Jessi15 488 @Micheru, thanks dear for posting PKW's interview. Out of Shunji shadow, he sounds like a very nice and sincere young man. Looks like the main couples in BM have taken a shine to their partner LOL So HCA likes someone older but Shunji ah, don't worry. If JW can change his mind saying that age has no bearing in his choosing a g/f then HCA can change her mind too. @manyearsago Welcome, I don't recall having met you here in this thread before. Thanks for contributing Jung Eun Byul's interview. I really like her character in BM and she was good doing the action scenes. The director and BM's production team made a good choice bringing her in with just few espisodes left of the broadcast. mrdimples said: You know even up to today, when I imagine Kangto holding his Boon Yi dead in his arms, there's that awful chill in my heart. Ever since he discovered she was Boon Yi, he went to great lengths to protect her and saved her countless times. And for the whipping scene, I was wondering why didn't he use less strength? I can only deduce that if he were to hit her less hard, Shunji might prolong the torture. I think Kangto was hoping that Shunji would quickly change his mind as soon as he laid the first stroke. If you compare how he whipped her to how Kangto himself was whipped by Koiso, you can see the difference. Koiso threw his entire weight with each stroke whereas Kangto just moved his arms. But of course, Mok Dan is a girl so even then it was terrible. After it happened, he resolved that he would never hurt her again or cause her to be hurt even if it is in the name of protecting the cause. He had no qualms being tortured himself to save the cause though. So, he would do anything to save even a hair on her head. I really cannot imagine him going through all these and then she still died in the end. How cruel. sunshine4ever said: mrdimples said: You know even up to today, when I imagine Kangto holding his Boon Yi dead in his arms, there's that awful chill in my heart. Ever since he discovered she was Boon Yi, he went to great lengths to protect her and saved her countless times. Jessi15 said: sorry long post ahead... disclaimer: this message is written to try to see another perspective of Shunji..it does not support killing oneself in anyway to obtain salvation..it is just opened to help you understand SJ's death..and SJ's salvation begun before his death --- the moment he was remorseful of MD's death...[i am 100% against killing yourself based on my belief] @mojobobo, okay, so I finally understood why I wanted to write an extension of why I think SJ did receive his salvation. I think it is because both you and I saw a different SJ that was why and I just felt like I understood why he had to die given his condition. I agree with you that your choices lead to your destiny and yes, Heaven or Hell is based on your choices, but I don't think SJ chose to go to hell at the end. I watched parts of episode 2 again and I remembered you told me about SJ and his poor conditions of not being loved. You replied to me once and I don't remember exactly what you wrote; however, I agree with what you wrote because I realized now that the entire time SJ was being touched by people who were not his family members. I think these people were the ones that once came into SJ's lives and did something to him: Nanny, Esther, Kangto, and lastly Rie and maybe Tamao, but he only loved most his brother and his dad even when his dad seemed to have neglected him and his brother was too busy with his work. I think SJ was more naive than selfish to not take over his dad's business/group. Maybe he was like a sheltered character who was always given everything and never suffered like Kangto, MD, or Rie and that was why when he suffered the loss of his brother it caused him so much pain. Also looking back I remembered when SJ went berserk when he saw Bridal Mask killed his brother I was lost and confused as to why he would behave that way. I remember one time you told me the reason why Kangto killed SJ's dad even though he knew he was SJ's dad was because KT thought that it was supposed to be that way. I now think that SJ was almost like KT in a sense that he thought that the only way for everything to end it has to be "an eye for an eye." So that was why he was so obsessively trying to chase after Bridal Mask. He wanted to kill BM because he thought that is what he should do to avenge for his lost brother. But as he continued he lost control and lost his senses as a Kimura Shunji from the past who was always so carefree and loved the world. He lost his innocence and he lost his soul along the way of trying to chase after BM. I also think that the reasons why SJ liked the Korean people so much was because of Esther. In episode 2, Esther was a kind girl who helped his nanny. She even pleaded with the doctor to save/help SJ's nanny and played with him when he was injured by his dad. Because he liked her so much so whenever he saw Korean people they reminded him of her and that was why he chose to be a teacher to be near the Korean people while he was looking for her? (Not sure if he was looking for her either, but I am thinking he would rather be a teacher than a police who killed Korean people because he liked Esther and Esther was Korean). But it all changed when he saw Gaksital killed his brother. Because BM killed his brother and he witnessed how terrible his brother died, he wanted to run after BM and killed BM because he thought that BM deserved to die. So he hated Korean people because they reminded him of BM and vice versa. Additionally, Mokdan really adored and loved BM, so SJ became even more mad because he disliked BM for killing his brother and now BM even got in his way of being together with MD. I watched parts of episode 17 between SJ & MD and at that time he was still thinking that he would be able to come back from being a teacher and lived his past life again. I think he was having false illusions that once he killed BM, he could still come back to being his old self. Yet he was not aware that he had become a monster to those around him because he killed with no mercy to those who got in the way of killing BM. Okay, now towards the end of this drama SJ wanted to kill KT and he was warned by Rie in advance. I think this hurt him even more because he was warned before hand. His stubborn acts were what caused him pain. He wanted to kill KT because KT killed his dad and brother, but unfortunately he shot MD instead. His goal was to kill KT so that he can be with MD towards the end (he was not thinking clearly), but oops, he realized he killed the wrong person! Now I know it was mentioned by PKW (which could relate to what the scriptwriter and what she wanted her character to turn out) that SJ stopped loving MD along time ago, but I think that SJ really did love MD because she was one of those people that touched him once in his life. She was this kind girl that had pity on him and his nanny once. He liked her since young, but because she died so he was crying really hard. Scene of him trying to kill KT and blamed KT for her death when in reality he killed her. Then SJ was holding on to the pile of blood and was crying really hard. And then when he came to his senses he did not blame anyone anymore towards the end. Rie called him and asked him if he wanted to go with her or try to avoid KT. Why didn't he try to avoid KT? That is because inside of him he felt that it was his fault that MD died and therefore it is "an eye for an eye." He was sorry for her death, thus he must die because he killed her. That was his mentality. I think that must have been in his mind. And he definitely did not want to kill KT because he was changed by MD's death. He was remorseful and he did not want to kill anymore. Plus he had already experienced fighting with KT and KT didn't want to kill him before in front of his yard in episode 27. So it wouldn't make sense to fight and kill KT. If he let KT kill him, it would scar KT for life because he had that kind of relationship with KT. Remember in ep. 25 or something KT would rather be captured by him. Also why didn't he just kill himself before KT come? He could have killed himself before hand. Why wait until he finished his talks with KT and/or until KT came for him? He knew fully that KT was going to come for his life, so he waited and had the gun ready. He even gave KT the picture because he thought that that was supposed to belong to KT. For me, I felt like SJ's death was a way of saying "I am sorry, KT, for killing MD." He saw MD's beautiful smile and how lovely she was before he killed her and that caused such great grief and sadness. I think while he was crying he was feeling sorry for his action. But like I said, it really is a maybe because I'm not sure what's inside SJ's mind. Also the fact that SJ was not the person that would come to KT and said he was sorry for what happened. Even when he said sorry to KT, I don't think KT would have accepted it because SJ killed so many people including MD. I think MD wouldn't have minded and I highly doubt that KT was coming after SJ for her death because both of us know that KT killed his dad first, right? I think KT was coming after SJ because of those hundred of lives that SJ brought his troops in for. I am rather concerned about SJ receiving salvation because it seemed to me that MD was the only person SJ was remorseful for for killing her. KT reminded him again why he had to come for SJ and I think SJ realized it then that he killed lots of other lives. It's sad, but I don't think SJ would be able to live and rebuild his life, mojobobo. It's because the circumstances didn't allow him to because of how the plot was built. If SJ ran away with Rie and lived the rest of his life freely or redone, it wouldn't make sense because he would be guilty for the rest of his life for killing MD and realizing how many people he killed. Remember that SJ was a very sensitive soul. I am sad to see his death and I learned to be compassionate towards people like SJ, but I realized that sometimes we can't be in control of how a person chose their paths. The only way we can do is to pray for them if they have lost their ways like SJ. Anyway, don't know why I'm writing such a long message yet it might not make any sense. I just don't think SJ was a coward. I think he did die for what he believed was right even though it's nuts to kill oneself to repay for one's sins. (But that's how SJ was raised up at that time.) God will consider the circumstances and conditions, I'm sure, when he judges someone like SJ. mojobobo said: The picture is from here --> http://tieba.baidu.com/p/1909092713 In Episode 2, Shunji was still a carefree teacher. When Kenji and Kangto were fighting in the police station, Shunji ostensibly picked Kangto over Kenji and helped ensure that Kangto managed to escape. He even goes so far as to say that if Kangto was framed just because he was a Korean, no Korean would be loyal to the Japanese government. Here, he truly believed that everyone was equal and that Japan could lead Korea to prosperity. It was also in this episode that he found out Mok Dan was Esther and she was still looking for the Young Master, but he didn't mind a bit. He was glad to have just found her again. Ki Woong did say in his interview that at the moment just before Shunji pulled the trigger, he felt empty, like everything was a dream. I take that to mean that he had already given up on life. There was no way he could g back to being a teacher. And I think the gravity of his actions did hit him and he was remorseful but I think he pitied himself more than anything else too. He lost his family, he lost Mok Dan, he even lost Kangto, who was the sole person he held dear who was still alive. There didn't seem to be anything else he could hold on to so he chose to end it all instead of searching for new meaning. Contrast this with Kangto or even Rie, who had lost her source of power and was just a powerless Korean woman now. She didn't even allow Katsuyama to be by her side. I take salvation to mean hope but Shunji had no more hope left. That's why I felt it was a pity, because if he chose hope, he would have gotten his salvation by finding new meaning in life. You are definitely entitled to your interpretation. This drama is so rich that we all can take away different meanings I Miss Them So @mrdimples, thanks so much! I like the pics. Here is a smashed-up picture. Gosh I am so tempted to put this at Battle of the Secret Lovers' thread. credits to m217tw @ Baidu & cutieloverz @ JW & SY's thread septmoon16 2,015 thanks for an amazing thread everyone. i found myself drawn back to kdramaland this year with so many fabulous shows, with Bridal Mask being the highlight. the finale blew my mind while making the heart hurt in such a good way. since i'm guilty of fast forwarding a LOT while watching, I went back this weekend to watch some key episodes and was so happy i did since there was so much i simply didn't catch the first time. *SPOILERS BELOW* i loved that the first time we see kangto and shunji together, shunji was the one in white and kangto in black. it makes their final scene together deeply poignant as shunji is dressed in the dark noblesman clothes, and kangto's is now garbed in the all white peasant clothes. its a gorgeous highlight to the difference in their roles and also the shift in idealogy. this led me to notice how many scenes are beautiful mirrored in the drama. another perfect example of how intricately bridal mask was thought out was when the first gaksital was revealed as kang san, we see him take off the mask standing by this majestic tree. later when kang to decides to embrace gaksital identity, we get to see him place the mask on standing by the same tree. such a small moment, but so powerful when placed in context with one another. how awesome (yet so damn rare) is it that bridal mask gifts us with such a rich complex villain as Shunji. coming right out of king 2 heart where the villain is the typical cartoon big bad, it was refreshing to mull through the nuances that made Shunji a compelling character. even close to the end, he clung to the hope that having esther will allow himself to go back to days gone by. and even after seeing him make so many terrible choices and do horrific things (the crazy intense torture scenes) i felt moved to believe him.the teeter toter of this conscious and his pride was so compelling. you WANT to see him redeem himself, while knowing that he is too far gone for it. the real love story in bridal mask for me is definitely kang to and shunji's friendship. the bond, the support, and eventually the betrayal and mind games grounded the story. gawd how adorable is it that they have sleepovers?! that is why i thought shunji's ending was perfect. in taking his own life, he saved his best friend from having to do so, a final merciful act of apology. after losing everything else, i think it would the taking of shunji's life that would finish kang to. sunshine4ever said: @mrdimples, thanks so much! I like the pics. YG’s Stocks Record Lowest Price Of The Past Year Following News Of Yang Hyun Suk Being Booked By Newsie
cc/2019-30/en_middle_0029.json.gz/line4027
__label__cc
0.715945
0.284055
20 of the most beautiful places to visit in Greece Beautiful Places, Europe, Travel Becky Moore / 7 October With over a thousand islands and a territory that stretches from the south Aegean Sea to the middle of the Balkan peninsula, Greece is one of the most popular travel destinations in the world. The sun-drenched European country is equally as known for its serene sandy beaches as its astoundingly rich ancient history which has had a huge influence on so many aspects of today’s western society. With such a diverse range of Greek destinations on offer, all tastes are catered for – from history fans to serious clubbers. It’s virtually an impossible task to choose the most beautiful places in Greece but here are twenty places that have left a life-long impression on me… Santorini Island – famously romantic island Santorini is one of the Cyclades islands nestled in the Aegean Sea. This is without a doubt one of the most beautiful and romantic islands in the world. Spectacular sunsets, traditional whitewashed houses and the breathtaking sights of the ocean is what makes this island so special. Head to Oia for the iconic village of pastel-washed houses hugging the cliff-face. The majority of shops selling postcards in Greece will have photographs from Santorini and once you visit you’ll realize why this is Greek place is so cherished. Parthenon Acropolis, Athens – the famous historic monument There are many breath-taking historical sites to explore in Greece but this world-famous Greek destination is considered to be the most important surviving building of Classical Greece. Found in the centre of the Greece capital Athens, it’s ruins of an ancient temple on the Athenian Acropolis dedicated to the maiden goddess Athena and built for a couple of decades starting 447BC. Mykonos – the lively and beautiful island This island stands out as one of the most beautiful in the Aegean region and makes a fantastic destination to explore in Greece. Belonging to the Cyclades group in the Aegean Sea, although Mykonos is a popular party island there is still plenty of natural and traditional beauty on offer. Mykonos has a collection of unique Cycladic architecture set around a picturesque fishing-village bay. The square whitewashed buildings sit closely together forming a maze of narrow alleyways and streets and are highly photogenic. The island’s beautiful beaches also make a perfect backdrop to watch the sunset. Meteora, Kalabaka – an iconic rock formation Found in central Greece, this striking and unusual rock formation is home to a monastery founded in the 14th century and now has UNESCO World Heritage site status. The complex of six monasteries are built precariously perched atop 1,300 feet high sandstone pinnacles, at the northwestern edge of the Plain of Thessaly near the beautiful Pineios river and Pindus Mountains. The occupants of the buildings located atop vertically steep rocks definitely had a rough time climbing down, but so was their climb up. It is an awesome apparition that has the ability to leave you speechless – easily one of the best places to discover in Greece! Zakynthos – island famed for its shipwreck A gift of the Ionian Sea, Zakynthos might bear a Venetian name but was mentioned by Homer in both the Odyssey and Illiad. This beautiful Greek gem of a place is famous globally for its crystal clear blue waters, golden beaches and intense adventures, especially at night. Zakynthos offers lots of scenic outings, especially the Shipwreck Beach of Navagio in a secluded cove, including Banana, Porto Zoro, Kalamaki and Gerakas. Zakynthos Town is home to dozens of museums and an interesting Venetian Castle on the hilltop. Picturesque mountainous villages are scattered across the countryside, including old monasteries easily discovered by car. Restaurants dot the region offering delicious Zakynthos cuisine with notable must-sees such as Solomos Square with the bust of Greek national poet D. Solomos, Strata Marina with lots of restaurants, bars and cafes, Stranis hill for a magical view of the island and remarkable ancient churches such as Aghios Nikolaos, Dionysios, Markos and Pikardiotissa. Adventure and thrill seekers can go surfing or hire a sailboat, trek across the scenic mountainous region, go snorkelling, swim among sea turtles and scuba dive in underwater caves between rocks in crystal clear surroundings. One of the most attractive travel destinations in Greece! Kefalonia Island – legendary beautiful island The popular Greek holiday island made famous by the novel Captain Corelli’s Mandolin which was set here. This is one of the most picturesque spots to discover in Greece. Although there some development it still retains a traditional Greek way of life. For all those who wish to know what a beautiful beach looks like, just visit Myrtos located on the island. It can be found located in the region of Pylaros, in the north-west of Kefalonia island. The sheer contrast of the bright blue waters and the sparkling white beach makes an exhilarating scene especially when viewed from the very steep mountains and cliffs. Samaria Gorge, Crete – a stunning protected gorge It is the most spectacular Greek tourist attraction for many people, little wonder it receives more than half a million people annually. The Samariá Gorge is a National Park of Greece on the popular island of Crete and a World’s Biosphere Reserve. People can take a walk through the gorge and pass by breathtakingly high cliffs along the way before the small coastal village of Agia Roumeli emerges. Rhodes – a popular attractive holiday island Rhodes – the largest of Greece’s Dodecanese islands – is another popular holiday island in Greece and although its home to some lively resorts there are still many areas of outstanding natural beauty to discover and explore. Here you can find Lindos and St. Pauls Beaches. Lindos is more popular because of its turquoise waters and the view of the raised white-painted town from the beach. Both beaches are sandy, white and exceptionally beautiful. Agathi Beach is another pretty beach on the island known for its soft sand and emerald green waters. Looking for history? There are many ancient ruins here and also remnants of its occupation by the Knights of St. John during the Crusades. Mystras, Peloponnese – picturesque fort town Mystras is a mountainous village close to Sparti, Laconia which are classed as a World Heritage Monument by UNESCO. It is famous for its archaeological site as Mystras used to be a very important medieval town in the Byzantine Era. The archaeological site consists of well-preserved Byzantine churches and a strong Fortress and this popular place to explore in Greece have impressed even the most discerning of visitors. Naxos Island – a stunning hidden gem in Greece This is an island on the southern side of Greece which is home to the myth-surrounded Mt. Zeus. Relatively undiscovered by the tourist masses Naxos is one of the highlights of travelling to Greece. It’s one the greenest island in the Cyclades with high mountains and fertile valleys. The beaches here are among the most beautiful in Greece – long and sandy and perfect for swimming, water sports and relaxing. The traditional white painted villages and winemaking factory are also another draw as well as port towns filled with whitewashed, cube-shaped houses and medieval Venetian mansions. Delphi Theatre, Phocis – spectacular ancient site Delphi is both an archaeological site and a modern town in Greece on the south-western spur of Mount Parnassus in the valley of Phocis. The Delphi theatre was constructed atop a hill facing the beautiful valley in the 4th century and is now classed as a UNESCO world heritage site. Built as the sanctuary and oracle of Apollo, its 35 rows could hold up to 5,000 guests who in ancient times enjoyed plays, poetry readings, and musical events. The stunning historic site in Greece and the sheer beauty of the landscape below easily makes it worth the effort to get to. Thassos – the jewel of the Aegean sea With a history that goes back beyond 1100 BC and colonized or inhabited by Phoenicians, Persians, Byzantine Empire and Ottomans to Nazis throughout the years, Thasos is a natural beauty to visit and explore in Greece blended by contrasting blue sky and blue sea, green flora and sandy beaches strewn in the most picturesque golden slushes. Lying on the North Aegean region, the Greek island offers an alluring traditional taste and beautiful beaches, excellent hotels serving local cuisine, trails for archetypal hikers and lots of secrets to discover. Nature lovers travelling to Greece with a sweet tooth for the good life will be spoilt by water sports to rewarding footpaths, cascades, ravines to beaches from Hrisi Ammoudia-Limenas, Kallirahi-Prinos to Maries-Prinos. Arrive at Thasos capital Limenas and witness the sanctuaries of Greek gods and heroes from Poseidon, Artemis, Dionysos, and Cassius to Heracles with an incredible view of the Acropolis and a theatre constructed in 5 BC. From scuba diving, water skiing, windsurfing to boat riding, Thasos fun and games extend from its golden sandy beaches such as Marble beach and Chrysi Akti to beach bars, tavernas to Thasos archaeological museum and summer festivals amidst a phantasmagoria of picturesque little villages dotting the island. Mount Olympus National Park – a popular Greek beauty spot Declared a National Park in 1938, Mountain Olympus is Greek’s highest mountain rising 9,573 feet on its highest peak. The area is popular for stunning and charming features from thick forests, alpine fields, prominent rock peaks and intensely deep gorges. In Greek mythology, Mount Olympus is famous as the residence of the 12 gods of ancient Greece. Olympus is rich in fauna and flora with rare and typical 1700 plant species spread around the region. Due to the popularity of this beautiful area in Greece, numerous campsites and inexpensive hotels have sprung up. Litochoro is the main village easily accessed from Athens by train and bus. The Ancient Dion Archeological Museum at the base of Mount Olympus is a must visit. Mountain refuges, climbing and mountaineering routes are organized for adventure seekers setting off at Litochoro. Private trekking is available too, especially along the Enipeas Canyon with immense hiking trails. Local cuisine is famous for its traditional tastes and scents served with locally produced red or white wine. Voidomatis River – a spectacular waterway ‘The eye of the ox’ as Voidomatis is colloquially known due to its blue waters as clear as the blue eyes of the ox runs for 15 kilometers. The river is a famously attractive natural site in Greece and is popular for kayaking, rafting and other diverse water sports. Voidomatis is on top of the list of cleanest rivers anywhere in Europe, powered by the Vikos Gorge and Tymfi water currents and run by the Vikos-Aoos National Park. It’s dotted by diverse stone bridges such as the Kledonas Bridge and Aristi Bridge where kayak and rafting fans meet and begin their cascading adventures down the clear waters. For five kilometers from Aristi, boat riders will be blown away by the Agioi Anargyroi monastery of the 16th century now deserted with caves and upright precipices. Get there via Epirus and make Konitsa, Ioannina or the stone-built charming villages of Zagori your base with lots of beautiful mansions, guest houses and hotels. Nafplio – one of the most beautiful towns in Argolis In Eastern Peloponnese region of Argolis is Nafplio, a romantic Greek seaport town and an earlier capital of the new state of Greece between 1821 and 1834. In mythology, Nafplio was founded by Poseidon’s son Nafplios and maintains marks of conquerors since antiquity from Romans, Byzantines and Venetians to Ottomans in the traditions, architecture, culture, cuisine and life of the town. Any visitor to this top Greek travel destination will be awestruck by diverse medieval castles, Ottoman fountains, and ancient walls, statues, and monuments, neoclassical and Venetian buildings. With Athens just 94 kilometres away, bus or car ride will get you there. Make the clear blue sea your backdrop as you discover the Turkish fountains and medieval Old town, preserved neoclassical mansions and narrow cobblestone alleys. Stop by the Syntagma Square and take in the monuments and historic buildings before stopping at the Palamidi Castle standing tall at 216 meters above sea level. Remember to take a boat ride to the Venetian fortress of Bourtzi, Nafplio most photographed plug. Other worthwhile stops in Nafplio include the War Museum, Acronauplia view and clock tower, the Byzantine 12th century church and a view of the open sea and striking Nafplio from the Palamidi. Lake Kerkini – one of the most important wetlands in Europe Situated at the heart of bird migration route and flyway on their way to the Black Sea, Hungarian steppes and the Aegean Sea, Lake Kerkini is a flora and fauna miracle artificially engineered in 1932 and easily one of the best naturally beautiful sites to discover in Greece. It’s the home of thousands of protected and rare birds, gigantic square meters of water lilies, diverse fish varieties while offering a fantastic vista of the Krousia and Belasica mountains. Apart from hosting over 227 non-migratory birds, Kerkini is also the home of exceptional buffalo herds, over 10 species of amphibians, 19 species of reptiles and hundreds of insect varieties. The extinct-threatened Pygmy Cormorant, Pelicans and heron colonies can be seen in the reclaimed marshland. Situated in Serres with Thessaloniki 100km away, Kerkini is a birdwatcher’s paradise in autumn and spring and any day throughout the year. The reclaimed reservoir is also famous for romantic traditional plave boat rides, horseback riding, canoeing, 4×4 off-roading, biking and hiking along the mountain range footpaths. Monemvasia Fortress – an awe-inspring medieval site Monemvasia Fortress is located along the Peloponnese east coast with the first settlement traced back to 6th century and is one of the most dazzling historic sites to travel to in Greece. A gigantic Byzantine fortress and superb beaches nearby open to locals and tourists are conspicuously prominent. The rugged beauty is a refined refreshing escape for anyone and a perfect place to spend idyllic and refreshing days tracing Ottoman, Venetian, Frankish and Byzantine influences across the town courtesy of its impressive history and architecture almost every place you step on. Kastania Cave is arguably the islands’ iconic attraction formed millions of years ago with lots of rare geological marvels, including a church and café close by. Monuments worth visiting include Upper Town’s Church of Aghia and Lower Town’s Church of Christ Helkomenos and Church of Panaghia Myrtidiotissa. Zagori – an unspoilt wilderness in Greece In northwestern Greece in Epirus is the Zagori municipality in the mountainous region of Pindus. Zagori is iconic for its remarkable geology, dazzling natural beauty and two popular National Parks. Zagori is dotted with over 46 villages interconnected with modern roads. 18th century stoned arched bridges still stand. Easily one of the most unspoilt and attractive gems to visit in Greece, the regions beauty comes alive while walking across the divine Vikos Gorge from the Astrakas Mountaintop to the cascades of the Voidomatis River over a backdrop of Mt. Timfi. Scenic surroundings in Zagori include the stunningly gorgeous Drakolimni alpine lake, zagorohoria village gems of extreme beauty and traditions and the Kalogeriko stone bridge. Hidden heartthrobs to discover include the swimmable Ovires natural waters in summer, 15th century Agia Paraskevi monastery and a spectacular melancholic view from the monastery of Spileotissas on the Viodomatis River. Lefkada – considered the Caribbean of Greece One of the must-see attractions in Greece this is an island in the Ionian Sea, Lefkada can be found towards Greece’s west coast and connected to Greece mainland through a floating bridge and causeway. In Greek mythology, the island is remembered for the Cape Lefkada suicide of Sappho with links to Odysseus and Aphrodite. One of the few Greek islands you can actually visit by car, its crystal blue waters and golden beaches are a visitor’s heaven and are often said to be similar to the Caribbean. It’s full of fish taverns and lovely villages contrasting with its lush green surroundings. Egremni, Kathisma and Porto Katsiki beaches are perfect photography spots while the Panagia Faneromeni monastery and Nidri waterfalls are a must-see. Don’t miss the strong and prominent Castle of Santa Maura along the sea lake waters built in early 14th century. Romantic and charming island to spend a few days discovering the timeless villages concealed by wild olive groves and hills, it has spectacular inlets and little bays towards the south with perfect conditions for windsurfers and kite surfers. Acheron Springs – natural Greek beauty spot In Greek mythology, Zeus was disgusted when Titans partook of the Acheron waters and thus condemned the pristine waters to eternally remain below the earth-thus the Acheron Springs in their fullest splendour. Acheron River springs are located off the Glyki and Kanalaki villages bordering Preveza and Thesprotia. Its crystalline waters and rich flora make for stimulating surroundings with water pits and lakes along the river in areas of normal water flow. Apart from assured peace and tranquillity and lovely restaurants, this is a fantastic destination to see in Greece and along the river are pathways for hiking and rafting adventures. The landscape is itself hilly and green with surrounding elm and oak trees. Discover why ancient Greeks believed Acheron to wield the gates of Hades by taking an unforgettable dip in the extremely cold crystal clear waters. Written by Boris Dzhingarov. Boris is an experienced traveller and loves writing about his own travel experiences. Aside from Greece one of his favourite destinations is Spain (as his Danish friends say Spanien) and he recommends comparing different trip offers before deciding. Loved the most beautiful places to explore in Greece? We also have 10 of the best Greek islands for travel snobs. In BIG pictures: Girona and Barcelona Our soul-soothing southern California trip highlights 20 of the most beautiful National Parks in Europe 10 of the most beautiful places to visit in Chile 10 of the most beautiful places to visit in Sri Lanka Kimi Soni 21 November, 2018 at 5:38 am So many great destination ideas! Even though I have already had mine, I still like to get to know some nice destinations, even for holidays with my wife. I would also add one more place that we really like to visit, USA. 20 December, 2017 at 12:09 pm Hello, such a great top 10 list! Congrats 🙂 Did you try Greek Island Hopping while in Greece? I see you’ve been to plenty of the islands. Next time around be sure to check Folegandros, Astypalea, Zakynthos and Kythera! One of my favourite places in mainland Greece is Mt. Pelion, a magical place and a true all year round destination <3 You might wanna give it a try as well… just wanted to say that there is a santorini weather guide that might be useful to travellers there. https://www.visitgreece.com.gr/en/members/travel-blog/item/622-santorini-weather-guide.html Yes, please. This summer if possible. i’m dying to get back to Greece. i’ve never seen such beautiful blue skies or gorgeous sunsets. Mykonos is calling Lola’s name! Love Greece, can’t wait to spend more time there! I’ve wanted to visit Meteora ever since I found out about it, seems so cool. Had a great time in Tessaloniki a few years ago, definitely recommend adding it to the list! Ferias Madeira Hello! Do you think it’s good to visit Greece right now? There is so much stuff going on in there… TravelandGamble “breathtaking sights of the ocean” – cute 🙂 actually Greece is quite far away from any ocean. Anyway nice list. Santorini is definitely must see!! Mikonos is also nice. Naxos is more insider tip, not a lot of tourists there! Capodanno a Roma Nice picture and beautiful place! I have a chance to go to Greece next month, I hope I have the free time to visit all these amazing places. Neetu Agarwal wow its an amazing place. Visiting Greece provides an opportunity to examine the culture that provided many of the threads woven into the fabric of Western Civilization. However, don’t make the mistake of thinking that visiting Greece is like a tour through a dull, crumbling museum. Greece is a spectacular and scenic country whose inhabitants know how to live life to the fullest. Addison S. @ Visa Hunter 8 October, 2012 at 10:38 pm Is there anywhere in Greece that isn’t picture perfect? Every one of these photos provides inspiration to travel. The architecture of Santorini reminds me of Casa Pueblo in Punta del Este, Uruguay. Mike@frenchtravelguide.co.uk I’ve been amazed with Delphi Theatre in Phocis Greece. I wonder what happened at that place many years ago. I imagine great plays, poetry readings and musical events being presented. People watching were applauding for superior presentations. 8 October, 2012 at 11:31 am Your list is amazing. What I like the most among them is the Meteora Kalabaka, Greece. Great to know that these six manasteries site is recognized by UNESCO. By just looking at your photos, it’s like inviting me to visit each one. These are great! Naxos is my favourite Greek island (that I have been to). I just love the cobbled alleyways and the harbour in the centre and, of course, the beaches are absolutely stunning! Thanks Lizzie! 🙂
cc/2019-30/en_middle_0029.json.gz/line4028
__label__wiki
0.504895
0.504895
Fossil Free USA US Fossil Free Fossil Free Resolutions Steps to Winning a Campaign Fossil Free Divestment Regions + Countries How D.C. Made Fossil Free History. Last month, Washington D.C. passed one of the most ambitious pieces of climate legislation in U.S. history - The Clean Energy DC Omnibus Amendment Act of 2018 - which requires the city to transition to 100% renewable energy by 2032 and to invest millions of dollars in clean energy and sustainability projects that will benefit all D.C. residents. Washington D.C. just made climate history last month by passing a landmark bill that will allow the city to undergo a rapid, just transition away from dirty fossil fuels to a 100% clean, renewable energy future. Years of coalition-building with local climate, energy, and environmental justice leaders, made the bill a victory for climate justice and social equity. The success of this Fossil Free campaign was largely attributed to intentional coalition building with low income community members, in order to ensure that all voices were considered in pushing for this victory. CCAN, Sierra Club, Interfaith Power and Light, NRDC, Citizen Climate Lobby and more were essential to this effort along with 350 DC. We caught up with 350 D.C. organizer, Barbara Briggs, who offered her insights as to how the D.C. coalition was able to successfully execute their Fossil Free campaign. Barbara discusses the importance of equity and coalition building in creating campaigns that are inclusive, comprehensive, and powerful. Watch the full interview below: With the recent IPCC report on climate change that indicated there’s only a little over a decade left to avoid climate catastrophe, it is extremely important that local communities take action. It is time for us to lead Fossil Free campaigns across the world and to reclaim the future we want – one with a just transition away from dirty fossil fuels to 100% renewable energy that provides jobs and well-being to the communities most impacted by the climate crisis. Sign up below to join our email list and learn more about how you can get involved in the fight for a Fossil Free world. To find a campaign near you or start one of your own, click here. .rsform--custom_html { font-size: 65%; font-style: italic; padding-bottom: 14px; input.rsform--submit__btn:hover { box-shadow: 0 0 0px 1px rgba(0,0,0,0.2); color: rgba(255,255,255,0.8) !important; p.rs_success { Build a Fossil Free World Sign up here to get plugged into local organizing for a Fossil Free world.
cc/2019-30/en_middle_0029.json.gz/line4035
__label__cc
0.704196
0.295804
A fun spin on serious cosmic stuff! Wendell C. Perry has 40 years experience studying astrology and how it impacts personalities & relationships. He's written two books & published articles in astrology magazines. He's happy to share this website so that you, too, can have fun with astrology to help you in everyday life! Get Your Horoscope Interpreted General astrology articles on GGA Having Fun With Astrology Your Mars and Venus Playbook Famous People Lists Your Mars Venus Who's Who Find Your Mars Where Was Mars at Your Birth? This chart shows you! Learn More About Astrology with Wendell Perry Become a registered user and have access to occasional astrology newsletters. Depending on system server capacity, you will receive a confirmation email within two hours. Just "click" on the activation link in the email to become a registered user at Good Golly Astrology. Thanks! The Mueller Report Lands on America I had predicted that Robert Mueller would release his report during the period when Neptune opposed his Mars. When the news broke yesterday that the report had been released, both Neptune and Mercury were opposite Mars in Mueller’s chart. With Neptune nothing is ever clear cut or definite and, initially, Mueller’s report seems to present us with more questions than answers. The fact that Mueller recommended no further indictments surprised a lot of Trump’s foes. Meanwhile, there is the question of how the Justice Dept. and its new boss, will handle the report. Many are calling for the report to be made public which seems to be a good idea. However, that would open the way for people on both sides to place their own interpretations on Mueller’s findings. My guess is that, with Neptune opposite his Mars, attacks on the substance of the report will quickly become attacks on Robert Mueller and his integrity. Since this aspect will repeat in the fall, those attacks, and the ramification of his report, will continue to be a major factor for the rest of this year. Read more: The Mueller Report Lands on America Add new comment Following the Moon: March 20, 2019 Let me start off with a couple of things I got wrong with my reading of the New Moon on Mar. 6. (Click here to see that article and the chart.) I had hoped that the dominance of “good” aspects in that chart predicted the end of the extreme weather events that have punctuated this winter but instead we got another major winter storm, tornadoes in Alabama and flooding in the Midwest. Also, I was afraid the near conjunction of Saturn to Pluto in Capricorn might cause problems in our economy. However, it appears that we’re going to have to wait until the aspect completes in Jan. 2020 for that. The Mar. 6 chart was a quiet chart and, at least in this country, the past two weeks have been relatively quiet. (The terrorist attack in New Zealand is, of course, another matter and another chart.) The major political event was the Senate rejecting Trump’s state of emergency but since they don’t have the votes to override his veto, there wasn’t much substance to that rare act to Republican gumption. I think the conjunction of the Sun and Moon to Neptune in that New Moon chart has to do with the entry of Beto O’Rourke into the race for the 2020 Democratic nomination. O’Rourke represents a Democratic dream candidate in that he’s a younger, charismatic moderate with a common touch and schoolboy looks. Of course, the thing about Neptunian dreams is that they don’t always survive in the light of day. Read more: Following the Moon: March 20, 2019 Add new comment The Contenders: John Delaney and Andrew Yang Just when I thought I was through with this series I realized that I had missed a few contenders who announced their candidacy some time ago. Two of them, John Delaney and Andrew Yang, are primarily entrepreneurs who have decided parlay their success in business into a political glory. John Delaney made his money by arranging loans to small, health care companies and other underserved borrowers. His business was recognized for it’s investment in distressed communities. He ran for congress in 2012 and won. In July 2017 Delaney announced that he was running for president. Delaney’s horoscope clearly describes an entrepreneur. (Click on John Delaney to see a partial horoscope done or noon on Delaney’s date of birth.) He’s an Aries by Sun sign with his Sun trine Uranus. He definitely a guy who’s willing to take risks. At the same time, however, he has Mercury in Taurus and the Moon in Capricorn, so his risk-taking is always tied to a firm awareness of profit and loss. Read more: The Contenders: John Delaney and Andrew Yang 3 comments The Contenders: Beto O’Rourke I wrote about Beto O’Rourke last year. (Click here to see that article and a partial horoscope for O’Rourke.) Since we do not have a time of birth for O’Rourke, I focused on the combination of his Sun sign (Libra) and his Moon sign (Taurus) as it is described in my book “Father Sun, Mother Moon: Astrology’s Dynamic Duo.” However, now that I have looked at the charts of some of the other contenders, I can draw some comparisons. For example, it is interesting that both Joe Biden and O’Rourke have three planets aspected by Jupiter. Biden has Mercury, the Sun and Venus trine Jupiter and O’Rourke has Mars, Pluto and the Sun square Jupiter. As I said in the article on Biden, this is a natural aspect for a glad-handing, always-happy-to-meet-you politician. I heard someone describe Biden as a master of “retail”, one-on-one politics. O’Rourke has the same gift. The fact that his aspect to Jupiter is a square provides more tension and a maybe a little bit too much self-confidence. On the other hand, with the Sun in friendly Libra, O’Rourke’s version of retail politics is more about charm and less about shoulder rubs. Read more: The Contenders: Beto O'Rourke Add new comment «StartPrev567891011121314NextEnd» Biggest Liars in the Zodiac Biggest Liar? Aries Biggest Liar? Taurus Biggest Liar? Gemini Biggest Liar? Cancer Biggest Liar? Leo Biggest Liar? Virgo Biggest Liar? Libra Biggest Liar? Scorpio Biggest Liar? Sagittarius Biggest Liar? Capricorn Biggest Liar? Aquarius Biggest Liar? Pisces Biggest Liar? Closing Thoughts Copyright © 2019 Good Golly Astrology. All Rights Reserved. Good Golly Astrology is for entertainment purposes only.
cc/2019-30/en_middle_0029.json.gz/line4039
__label__wiki
0.500671
0.500671
Listen once in a while, it’s amazing what you’ll hear.. By Guyanese Girl August 14, 2015 Listening is not only a polite gesture, it’s also one of the most important skills you can have. Good listening skills will help you to succeed in your personal and professional life. Many great leaders are also great listeners. So listen once in a while; it’s amazing what you’ll here. The word “Listen” rearranged will give you “Silent. Guyanese Girls Rock Listen quote Women in Guyana’s History: Martha Ruby Holland – Music Educator, Entrepreneur and Humanitarian In 1958, Martha Ruby Holland (nee Nicholson) founded the first Ruby Holland School of Music in British Guiana, South America. She was an avid believer in music education and the art. She believed that everyone possessed creative talent and spent her life providing artistic opportunities for students regardless of their age, social standing or financial means. Martha’s approach to teaching music (the piano) was unique and quite enriching. She offered her students a rich array… Saluting the Strength and Beauty of Guyana’s Military Women – Happy Independence Day! This past Monday, on May 26th, Guyana celebrated it’s 49th independence anniversary, which coincided with the Inauguration of Guyana’s 8th Executive President His Excellency David Arthur Granger at the Guyana National Stadium. While a proud moment for Guyanese living at home and abroad, it was this image of Stacey Codogan performing a sword salute and depicting such strength and beauty that stole the hearts and admiration of many across social media. She Rocks! Photographer: Brian Gomes. She Rocks! Stacey Samuels Richardson Shares Her Empowering Story of Overcoming A Crippling Anxiety Disorder Stacey Samuels Richardson is looking forward to the day when she will become a Licensed Family Life Educator. The Berbice-native is a firm believer that the family is the basic unit of society and is currently pursuing a BA degree in Marriage and Family Studies at BYU-Idaho Online University. Three years ago during a mission trip to the United States, Stacey experienced her first bout with anxiety, which was possible triggered by the change in… Happy Holidays GGR Family! Happy Holidays GGR Family! Countdown to Christmas- what’s on your Santa wish list? She Rocks! Dr. Jean Small – Actress, Director, Playwright, Caribbean Hall of Fame Inductee JEAN SMALL is a Guyanese Jamaican living in Jamaica since 1954. She graduated from the University of the West Indies in Foreign Languages,–French, Spanish and Latin and her profession all her life has been as an educator. She has worked in Guyana, Trinidad, Nigeria, Australia and here in Jamaica as a teacher of French at both Secondary and University levels. Her love since school days has been theatre and she now considers herself first an… She Rocks! Meet Farah Delicia Hussain – Kripalu Yoga & Thai Massage Connoisseur Farah Delicia Hussain was born in Guyana and moved to New York City when she was four years old. She’s a certified Kripalu Yoga Teacher and Thai Massage Therapist. Her family’s cultural and religious history, coupled with the trials of being an immigrant and a first-generation American, instilled a desire for self-exploration and healing. Her philosophy of yoga honors self-study balanced with a deep responsibility to enhance community and environmental health. While Farah was introduced to… Books by Mona Williams Bishops: My Turbulent Colonial Youth More books by Mona Williams: Her list of books include: How we made a colour television show (1973); The turtle who longed to be a bird (1973); Christmas in Guyana (1974); The day I swam the river (1974); How the goat lost his voice (1974); Old Medicine (1974); The ant who refused titles (1975); Granny (1975); Father Martin Heale (1975); Old Bell (1975); When I went to the pictures (1975);… Congratulations to the Top Academic Achievers at the National Education Award Ceremony On October 29th His Excellency President David Granger delivered the main address at the Ministry of Education’s 19th annual National Education Award ceremony at the National Cultural Centre. The Office of the Presidency honored several students who excelled in high school in 2015, and at the CAPE and CSEC examinations. The majority of the top achievers were girls representing public and private high schools throughout Guyana. Below President David Granger and officials from the Education Ministry poses for a… She Rocks! Sharmilla Persaud, Fashion Designer/Co-Founder of MILLIANNA Born in Guyana, Sharmilla Persaud, with a little unwilling help from her mother, discovered her love of fashion at an early age. Finding the perfect artistic playground in her mother’s colorful saris and jewelry, a young Sharmilla went to work cutting and combining them into her own creations. At five, she moved with her family to New York, and now credits the streets of Manhattan for lending an urban edge to her aesthetic as a… Silent Hearer by Marcia S. Shury Silent Hearer by Marcia Shury | ISBN # 978-1-68118-826-3 | Tate Publishing “Silent Hearer” chronicles the story of Marcia S. Shury as her happy childhood was turned upside down due to the onset of a sudden partial hearing loss. The book details how she rose above the many obstacles and frustrations that she encountered in school, in her career and relationships as she resolved to live a normal life. Stories We Love! 10-year-old Poet, Aurelia Sue-Ann, is Youngest Published Author in Guyana NEWS ROOM, GY – OCTOBER 21, 2018 Many famous writers began their career in their late teens or older, but at just 10-years-old Aurelia Sue-Ann is already grabbing attention with her talent. The student of Mae’s Primary School has become the youngest female to publish her book in Guyana. It is titled: “A little Poet’s World.” Editor and publisher, Petamber Persaud lauded Aurelia’s understanding of issues that plague and grace childhood, not shying away from… How do you eat your curry and roti – fingers or fork? We all know that curry and roti is one of Guyana’s most popular cuisine and a common dish within the Caribbean community. It is also much more enjoyable when you indulge with your fingers. However, one can also admit that it’s sometimes quite messy and will ruin your pale nail polish or fresh manicure. For this very reason I sometimes prefer to eat this dish only while at home where I can really dive in with my fingers. I recently attended a function and observed one… Girls Night Out: How to Rock Your GGR Tank Top GGR Collection: www.guyanesegirlsrock.org/shop Stories We Love: The Village of Ann’s Grove honors top student Elisa Hamilton Elisa Hamilton, a proud daughter of the East Coast Demerara Village, secured five grade ones and one grade two at CAPE, and was honoured by her fellow villagers at a simple, yet auspicious ceremony. Her achievement placed her among the country’s top CAPE performers. Also, in 2014, Hamilton secured 20 passes; 19 grade ones and a grade two at Caribbean Secondary Examination Council (CSEC), making her the top Regional performer for that year. President announces Village… Why My Mom Rocks…….Meet our featured Mom, Nicola Amanda Dover Roberts My mother is a woman like no other. Nicola Amanda Dover Roberts, amazing mother of three rocks!!! She is the best mom that you can ever ask for. She is brave, adventurous, loving, charismatic, caring and to top it off kind-hearted. She is an intelligent, hardworking young woman whose beauty is beyond compare. I remember this one instant whereby I wanted to participate in my primary school’s fair because it was my last year in the…
cc/2019-30/en_middle_0029.json.gz/line4042
__label__cc
0.664418
0.335582
The Sweet Side of Social Studies Posted by Bri Liddell on October 5, 2018 at 2:00 pm Over the summer, teacher Heather Panahi purchased hundreds of butterscotch candies from Target which are now in a basket on her desk and free to all who visit. “The candy…was a spontaneous decision” says Panahi when asked what inspired her to buy them. Panahi says she was wandering through the grocery aisles of her local Target when she thought, “maybe I’ll put a candy dish out.” Panahi’s voice becomes a little wistful as she explains, “Butterscotch candies were the candy that my grandmother used to have all over the house.” Smiling all the while, Panahi elaborates, “They’re my comfort candy when I’m feeling stressed or anything…and I want them to be that for you girls too.” While visiting Panahi’s classroom, I noticed that the Butterscotch basket was nearly half empty and asked how frequently it had to be refilled. Panahi responded, “I’ve had to refill it once since school started.” Calculating on her fingers as she speaks, Panahi determined that her stash “seems to last exactly two weeks.” “I do have a lot of repeat visitors” says Panahi laughing. “Some girls like to go straight for the candy when they get here and others, it takes a few times before they decide they want some.” One such visitor who goes straight for the candy is Sophomore Jainah Etheart. “Butterscotch just makes my day better” exclaims a beaming Jainah, “It’s just a candy, but it feels like more than that. It feels heartwarming and sort of cozy”. Filled with enthusiasm for the small treats, Jainah continues “Anything butterscotch makes me feel taken care of. It’s like my Grandma is giving them to me or something. They are all so small, but so sweet!” When asked if she thought Panahi should continue her effort to keep the butterscotch basket full, Jainah’s answer was an immediate and emphatic “definitely!” As Jainah put it, “Butterscotch always brightens someone’s day. Personally, I know that, whenever I need a pick-me-up or have to fill my sugar void, the butterscotch will be there and be a total lifesaver.” While some visitors like Jainah adore the sweet treats, others, such as Sophomore Molly Han, are much less enthusiastic about it. When asked how many times she had taken butterscotch from the basket, a giggling Molly exclaimed, “Once and I spit it out right after I had it.” Describing herself as “more of a chocolate person than a hard candy person,” Molly wishes there were more diversity in the candy basket. By Target’s online store, the butterscotch candies are described as “The perfect afternoon treat” and are meant to be an easy pick-me-up during a long morning. According to their packaging, Target’s butterscotch also “do not contain any of the 8 major allergens” and therefore can safely be eaten by students, regardless of their dietary restrictions. “I love the butterscotch” says a cheerful Jainah Etheart. “I’m made from sugar and…a sugarless day is an empty one.” Author: Bri Liddell
cc/2019-30/en_middle_0029.json.gz/line4046
__label__cc
0.5622
0.4378
The General Journal The student news site of Heritage High School This year's yearbooks are on sale at jostensyearbooks.com! WE ARE THE CHAMPIONS (AGAIN) H. Phillips Cassie Case, News Writer Filed under News, Our Heritage, Showcase The Heritage High School Legion of Generals marching band competed in our second competition of the year and brought home every trophy available to us. We went to Gadsden City High School in Alabama not fully expecting to win. Going into it, we knew that other bands would have majorettes and dance lines, as bands from Alabama typically have. It’s not a good or bad thing that Heritage does not have them, but it can affect how the scoring turns out. If the judges give a high score to the majorettes and dance line, it would make their overall score higher, even if our band was better. Thankfully, we did have a great performance and pulled through with a win for Heritage. We won the best in class for drum majors, colorguard, and percussion. We were also awarded the Bob Rush award for all superior ratings and the Rip Regan award for being the most entertaining band out of more than twenty that performed that day. As a section leader, I got to stand on the field to represent the Legion and take awards. After we won best in class for drum majors, then colorguard, and finally with percussion, we were hardly able to contain our excitement. We knew we had it at that point. Mr. Callaway told us later that it was the percussion section that really pulled through for us. With Christy Song bringing in a win the night before by winning the crown for Homecoming Queen as a band member, the weekend was perfect for the Legion of Generals. It will definitely be remembered by myself and my fellow band members for years to come. Who has the best run? WHAT’S IT LIKE TO BE IN JOURNALISM? A WEEK FULL OF HEART CAULIFLOWER IS NOTHING BUT CABBAGE WITH A COLLEGE DEGREE GAME OF TIARAS IT’S LIT(ERARY)! MAKE A CHANGE THE SONG HEARD FROM CHATTANOOGA JOIN THE GREEN SIDE…WE HAVE TREES
cc/2019-30/en_middle_0029.json.gz/line4052
__label__cc
0.637287
0.362713
Partnerships the key to China business models – Allan Barber: It’s true of any marketing and distribution strategy, but China’s size and comparatively underdeveloped cold chain make this factor even more important for the successful development of agricultural business there. With all export markets it is important for companies to analyse and select the preferred product type and form, business segment, geographic target area, and method of reaching the identified market. Market access and tariffs are other important considerations. When an export destination has been selected, a scattergun approach almost certainly won’t work, while a too narrowly defined market may be equally unsuccessful. . . Sprout Agribusiness Programme & Who Wants To Go Mobile Milking? – Milking on the Moove: For the last 2 years I’ve been working full time to set up an experimental prototype dairy system. The plan has always been to “pave the way”so other people, like me can go farming even if they don’t have any land or very much money. I believe it was Peter Brock who said “Bite off more than you can chew and then chew like crazy”. That describes my last two years quite accurately. Without going into all the details, I’ve learnt a lot over the last two years and now it’s time to crank things up and get this show on the road for real. . . Novel idea helps rebuild South Island crayfish stocks – Dave Gooselink: A forestry company has taken on the job of rebuilding stocks of freshwater crayfish in the South. The unusual combination came about as a way of finding other uses for the forests’ emergency fire ponds. The freshwater crayfish known as koura are listed as a threatened species by the Department of Conservation. Now they’re getting a boost, thanks to an unusual project by forestry company Ernslaw One. It came up with the idea of farming koura in their fire ponds, as a way of bringing in extra income between harvests. . . Bad to best: all because of steep slope innovations: New Zealand forestry has gone from a bad performer to being one of the best, and John Stulen says this is because of the new innovations in steep slope harvesting. In recent years, New Zealand forestry has faced massive hurdles in safety, especially on steep slopes. Too many accidents occurred because workers were facing too many risks in the workplace – it had to stop. However, leaders in the forest industry have stepped up to the challenge, hugely reducing the number of serious accidents. “It’s no coincidence that forest workplaces have become safer,” says John Stulen, co-organizer of the Steep Slope Logging Conference. He says a completely new generation of hi-tech steep slope harvesters has made the forest workplace much safer for everyone working at the felling face. . . Rare sheep conditions unites industry: A combination of rare conditions has tormented sheep farmers Hamish, Annabel, Alastair and Sue Craw on their Banks Peninsula farm Longridge Agriculture Ltd for the past 10 years. Since 2004, the Craws have been dealing with a range of animal health issues that have yet to be explained. To start with, their sheep were wasting away with an extreme case of wearing teeth. In 2013 an extremely rare calcium deficiency was causing their lambs’ legs to fracture, and in 2015 milk fever issues also arose in their ewes. Alastair Craw says in the beginning the situation was having a significant economic impact on the business, with the more productive animals faring the worst. . . T-shirt competition launched to celebrate 30yrs of sponsoring Young Farmers: This year will be Ravensdown’s 30th year sponsoring the FMG Young Farmer of the Year. To celebrate the farmer owned cooperative is launching a national t-shirt competition. Greg Campbell, Ravensdown Chief Executive says the key to any long standing sponsorship or business relationship is a mutual respect and interest. “We’re thrilled to be celebrating such a big milestone with Young Farmers. We’ve been right behind them for such a long time because we believe in supporting the next generation of farmers who are the future of our industry.” . . A new generation beginning to take over the reins at Hunter’s: One of the leading ladies of New Zealand wine, Jane Hunter says her Hunter’s winery is seeing a new generation of winemakers step up and take on key roles as Hunter’s approaches 30 years. She says Hunter’s produces about 100,000 cases and export to 23 countries and this is her 29th year in the role of owner and managing director of Hunter’s. “Things have certainly changed in Marlborough since I arrived here in 1983 to take up the role of Viticulturist for Montana Wines. . . This entry was posted on Thursday, January 14th, 2016 at 1:00 pm and is filed under business, Farming, food, rural, trade, wine. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. Classic Aussie Crime Drama: Blue Heelers – #198 – S05 E28 – Nine Lives
cc/2019-30/en_middle_0029.json.gz/line4057
__label__cc
0.686536
0.313464
Najib has spoken, the world can now judge how LOW are his standards! Filed under: Politics — Hornbill Unleashed @ 12:00 AM Tags: Allah, Anak Sarawak Bangsa Malaysia, Christian, Herald, Save Malaysia, Save Sabah, Save Sarawak J. D. Lovrenciear It is being reported that the Prime Minister of Malaysia, Datuk Seri Najib Abdul Razak in his interview with Reuters in London, speaking along the sidelines of the World Islamic Economic Forum, has confirmed that the “Allah” ban only applies to the Catholic Weekly, The Herald. So the prime minister has in doing so revealed several serious concerns f or national and global debate. Firstly, why do we need a prime minster to interpret a Court of Appeal ruling? Is it not the work and obligation of the legal fraternity? And in doing so, is he not mooting the further rooting of that perception amongst the citizens and the global community that the judiciary is not all that independent after all? Secondly, already very senior persons within the judiciary have indicated that the court ruling is a ban across the religious-board of all Christians as it affects the very use of the word “Allah”. However the PM begs to differ and further causes undue suffering amongst concerned, just Muslims and all Christians, resulting from that confusion. Thirdly, the PM is said to have stated that “Allah can be used in predominantly Christian areas” and qualified further that it is restricted to Christian worship. In other words, does it not now mean that where there are no “predominant” Christians in a given “area”, the word “Allah” cannot be used? As reported he states “So what we are trying to do objectively and above all is to ensure stability and national harmony”. Making sense of Najib’s nonsense Now let us connect Najib’s rescue attempts. Where there are no “predominant” Christians, the use of the “Allah” word is a threat to stability and national harmony. But where there are predominantly Christian areas, they can use the “Allah” word and it does not pose threats to stability and national harmony. Further, using the “Allah” word in a Weekly meant strictly for Catholics and that only has a 14,000 circulation in a nation of 28 million can jeopardize national interest in defending and upholding Islam for Muslims; but if the same Christians convene to worship using the “Allah” word, the threats disappear. And yet another thought is, it now seems that praying aloud in assembly with the word “Allah” is not a problem to the country’s well being; but publishing that same prayer with the word “Allah” in the Weekly is forbidden. Or how about if the Herald goes electronic and the “Allah” word published on-line goes viral? Would the net be shut down out of concern for “stability and national harmony”? How can Malays choose such a low IQ leader? Is it not the responsibility of leaders of nations to educate, enlighten and promote acceptance and tolerance for each other’s religion and the religious needs of specific communities without allowing one group to restrict, insult or deny another group of followers of faith? Is it also not the role and categorical imperative of leaders of nations to ensure that the nation is stable and harmonious through religious freedom and the non-denial of the inherent rights and honor rather than taking the jaggered route of curtailing one faith’s honor and rights to appease another group’s outcry? Wow! In retrospect to what is being reported about the Prime Minister of Malaysia’s interview with Reuters, it certainly beats the daylight out of common sense and logic. Maybe that is what Malaysian politics is all about. What is seriously wrong with what the PM is speaking to a global audience, can readers please pray tell? Or shall we say, the PM has spoken and all should respect and shut up for good. Malaysia is ruled by Zombies dominated by Umno Baru. We are a doomed nation and bankrupted in every perspective. Comment by Sabri Yaman — November 4, 2013 @ 8:36 AM | Reply zero IQ …Stupid beyond limit … still uncivilised? Comment by tigerykey — November 3, 2013 @ 7:10 AM | Reply
cc/2019-30/en_middle_0029.json.gz/line4058
__label__cc
0.734001
0.265999
Astro Bits Sun Sign Characteristics Moon Signs Sign Elements Dark Goddess Astrological Meaning of Days Astrology Articles Astrology and The Planets Natal Birth Chart Tarot Cards and Playing Cards Numeroscope “Numbers Lady” Chinese Signs Free daily horoscopes, astrology information, Chinese horoscopes, and more. Chinese Elements March 28th, 2016 | Posted by horoscopesign in Chinese Astrology - (Comments Off on Chinese Elements) Chinese Astrology is said by some scholars to be the oldest horoscope system in the world. However if you trace Western Astrology back to its Middle East roots, both types are likely to have been born in their current recognizable form around 3000 years BC, however they stem from entirely different beginnings as well as traditions and parts of the world. The 12 animals are further flavored by the pervading element of that particular year (elements also revolve as a separate cycle). It is said that Buddha is responsible for the 12 animals as they were the only ones who came to bid him farewell into the next life. Chinese Astrology is concerned with nature and its traits, the signs progress year by year, whereas Western Astrology cycles monthly. The consideration of Yin and Yang is a very great influence upon this subject, Yin being passive, female and receptive while Yang is aggressive, male and exploratory. The various permutations of these 2 essential forces in nature, places, organizations, events and humanity and the quest to achieve balance so that both operate together in harmony rather than opposing or canceling each other out are an essentially Oriental viewpoint and quest, they form the basis of many Far Eastern traditions and other influences in Chinese Society such as Feng Shui. The 12 Animal Signs are : Rat, Ox, Tiger, Rabbit (or Cat), Dragon, Snake, Horse, Goat (or Sheep), Monkey, Rooster, Dog and Pig. The animal ruling year in which you were born has a profound influence on your life. As the Chinese say, This is the animal that hides in your heart. There are 5 elements: Wood, Fire, Earth, Metal and Water, each adding a nuance of almost tactile character to the animal sign.Chinese0Astrology is based on the Chinese0calendar year of your birth or the year of an event. There are also many more nuances involving the month and day. astrology, china, chinese History Of Chinese Astrology March 28th, 2016 | Posted by horoscopesign in Chinese Astrology | History - (Comments Off on History Of Chinese Astrology) The development of Chinese astrology dates back to at least the Zhou Dynasty ( 1122 BC – 256 BC). Some sources claim it began as far back as 2150 BC. The ancient Chinese astrologers began by using the position of planets, moon and stars to accurately predict the change of seasons, and flow of the tides. These predictions were vital to the success of farming at the time, as they were used to predict the best times to plant and harvest crops. To help them keep track of passing time, the Ten Heavenly Stems and Twelve Earthly Branches were created. These important signs we used to mark the passing of what we know as hours, days, months, and years. During this time in history, only the elite could read and write, so animals were used to symbolize each of the Twelve Earthly Branches. Legend has it that during the celebration of New Year Buddha was to decide upon the order of animals to be used for the Twelve Earthly branches. He asked all the animals in the kingdom to join him for a meeting. Only twelve animals answered the call of Buddha and attended the meeting. Buddha granted each of those twelve animals sovereignty over an Earthly Branch. Each animal was to lead the Branch and have influence over those born during its Branch. We know the Twelve Earthly Branches as “Years”. In the traditional Chinese calendar, these twelve animal signs repeat themselves in a never-ending circle, to remind us that time is a constant and has flow. The Twelve Earthly Branches are, in order, the mouse, ox, tiger, rabbit, dragon, snake, horse, sheep, monkey, rooster, dog, and pig. Some ancient Chinese valued the Earth over the stars. These scientists looked for the reasons behind the natural order of things. They agreed that all things had a basis in one of Five elements. To their understanding, all things were made from Fire, Earth, Metal, Water, or Wood. They examined how these basic elements worked together and against each other. Wood creates Fire, Fire turns to Earth, Earth creates Metal, Metal creates water, and water creates Wood. astrology, china, chinese, history Chinese Zodiac Sign The Horse May 4th, 2014 | Posted by horoscopesign in Chinese Astrology | Chinese Signs - (Comments Off on Chinese Zodiac Sign The Horse) If you were born in the year 1942,m 1954, 1966m 197, 1990 or 2002, then you are a Horse. You’re popular and attractive to the opposite sex. You can be ostentations and impatient. You need people, but should marry a Tiger or a Dog. Avoid the Rat! Horses crave love and intimacy, which is a double-edged sword since it often leads them to feel trapped. Love connections tend to come easily to Horses, since they exude the kind of raw sex appeal that is a magnet to others. This Sign tends to come on very strong in the beginning of the relationship, having an almost innate sense of romance and seduction. Horses are seducers in general; check out any A-list party and you’re bound to find the Horse in attendance. This Sign possesses a sharp wit and a scintillating presence; it really knows how to work a crowd. Surprisingly, Horses tend to feel a bit inferior to their peers, a misconception that causes them to drift from group to group out of an irrational fear of being exposed as a fraud. Horses tend not to look much at the big picture; instead they just follow their whims, which can result in a trail of prematurely ended relationships, jobs, projects and so on. This Sign really knows how to motivate others, though, and get a lot accomplished. Once they find some peace within themselves, they can curb their wandering tendencies and learn to appreciate what’s in their own backyard. Horses are the nomads of the Chinese Zodiac, roaming from one place or project to the next. All of this Sign’s incessant activity and searching may be to satisfy a deep-rooted desire to fit in. Paradoxically, Horses feel a simultaneous yearning for independence and freedom. astrology, chinese, horse, horse sign, zodiac Chinese Zodiac Goat Sign Chinese Astrology May 3rd, 2014 | Posted by horoscopesign in Chinese Astrology | Chinese Signs - (Comments Off on Chinese Zodiac Goat Sign Chinese Astrology) If you were born in the year 1943, 1955, 1967, 1979, 1991 or 2003 then you are a Goat. You’re elegant and creative, somewhat timid and prefer anonymity. You are most compatible with Pigs and Rabbits, but don’t mix it up with the Ox. Goats tend to have a hard time with romance; anyone who couples up with a Goat must know, this Sign has a sensitive streak a mile wide and can be subject to bouts of anxiety over seemingly inconsequential things. Goats need plenty of love, support and open reassurance from their lovers. If a relationship is marked by conflict, the Goat will often pull away — either physically or simply by retreating into the safe haven of its imagination. If the romance is going well, however, Goats won’t hesitate to tell their partner what they need — and they can be quite insistent about it. This Sign will definitely return the favor, however; the Goat has a luxurious side that delights in indulging a lover’s every wish. Appearances are also important to the Goat, which may explain why these folks can spend hours primping and posing. Goats are generally most comfortable in their own minds (which other, more linear-thinking Signs may have trouble deciphering). This Sign makes a great craftsperson or artisan, or perhaps a teacher of New Age studies — any occupation that allows its mind the full range of freedom. Goats tend not to be very well-organized, precluding many more dry business endeavors. In fact, Goats tend not to be very materialistic in general, finding plenty of riches in their own imagination. However, especially when in love, the Goat can be quite a lavish gift-giver. astrology, chinese, goat sign, zodiac About The Chinese Dragon Sign April 30th, 2014 | Posted by horoscopesign in Chinese Astrology | Chinese Signs - (Comments Off on About The Chinese Dragon Sign) The Dragon is one of the most powerful and lucky Signs of the Chinese Zodiac. Its warm heart tempers its fiery and rambunctious nature. This is a giving, intelligent and tenacious Sign that knows exactly what it wants and is determined to get it. Dragons possess a certain natural, charm that ensures they can always influence their peers and often find themselves the center of attention in social situations. This Sign is truly blessed, too. Dragons are considered to be very lucky in love. The Dragon’s friends are always keen to hear what this firebrand has to say and when it comes to dispensing advice, the Dragon has the floor. Its ego can get in the way, but even so, this larger-than-life creature has a knack for creativity and leadership. According to Dragons, it’s their natural born right to lead the way — because who else could do it so surely and so well. As lucky as they are, Dragons have a good chance of achieving considerable material wealth during their lifetimes, although it isn’t mere money that’s this Sign’s main motivation. Power is what the Dragon wants and truly believes it deserves. Dragons are quite the opportunists, forever searching for ways in which to consolidate their considerable power. Contrary to all this strength and fire, a weakened Dragon is a sad sack, a creature that refuses to take defeat with even a modicum of grace. The leadership role is the only one for the Dragon, the better from which to give orders and be king of the hill. They make solid leaders, too, knowing instinctively what needs to be done to stay on top. Crossing the Dragon is never a good idea — this beast can singe. A valuable life lesson for this clever creature would be to absorb the principles of flexibility, compassion and tolerance. Being high and mighty can serve to inspire others, but it also keeps Dragons from living their lives to the fullest. If Dragons can learn to balance their quest for success with an appreciation for the little things, their life will be more than worthwhile. The most compatible match for a Dragon is the Monkey or the Rat. astrology, chinese, dragon sign, zodiac About The Chinese Dog Sign April 30th, 2014 | Posted by horoscopesign in Chinese Astrology | Chinese Signs - (Comments Off on About The Chinese Dog Sign) Dogs in both the East and West are loyal, faithful and honest and always stick to their firm codes of ethics. It’s generally quite trustworthy itself — except for the occasional little white lies the Dog tells in order to make things go more smoothly. The Dog makes a wonderful, discreet and loyal friend and is an excellent listener. This Sign tends to root for the underdog and its keen sense of right and wrong makes it duty-bound to the core. The Dog’s motto seems to be, Live right, look out for the little people and fight injustice whenever possible. Dogs can also be rather dogmatic, too. They don’t go in for light social banter; instead, they go straight for home, discoursing on the topics that are most important to them. At these times the Dog’s narrow-minded or stubborn side can become apparent; this Sign has trouble staying light and calm when an important issue is at stake. This Sign can also be very temperamental; mood swings characterize its emotional life and often the Dog needs to run off to be alone in order to recuperate. Part of the problem is the result of this Sign’s load of irrational fears that turn into niggling anxieties that turn into hurt feelings and occasional grouchiness. This sensitive Sign needs to warm up to others over time and gradually learn to trust them. Without that trust as a foundation, Dogs can be judgmental and coarse. The Dog’s discerning nature does make it an excellent business person, one who can turn that picky, guarded nature into a keen sense of the truth of another’s motives. Where love is concerned, Dogs often have a tough time finding the right match. Dogs need to work on controlling their irrational worries and would also be well-served to relax their mile-high standards, which can sometimes wind up alienating the ones they love. The most compatible match for a Dog is the Tiger or the Horse. chinese astrology, Chinese Dog Sign, dog sign, zodiac April 24th, 2014 | Posted by horoscopesign in Chinese Astrology | Chinese Calendar - (Comments Off on Chinese Lunar Calendar) Prior to adoption of the Western solar calendar system, China exclusively followed a lunar calendar in determining the times of planting, harvesting, and festival occasions. Though today people in China use the western calendar for most practical matters of daily life, the old system still serves as the basis for determining numerous seasonal holidays. This coexistence of two calendar systems has long been accepted by the people of China. A lunar month is determined by the period required for the moon to complete its full cycle of 29 and a half days, a standard that makes the lunar year a full 11 days shorter than its solar counterpart. This difference is made up every 19 years by the addition of seven lunar months. The 12 lunar months are further divided into 24 solar divisions distinguished by the four seasons and times of heat and cold, all bearing close relationship to the yearly cycle of agricultural work. The Chinese calendar – like the Hebrew – is a combined solar/lunar calendar in that it strives to have its years coincide with the tropical year and its months coincide with the synodic months. It is not surprising that a few similarities exist between the Chinese and the Hebrew calendar: An ordinary year has 12 months, a leap year has 13 months. An ordinary year has 353, 354, or 355 days, a leap year has 383, 384, or 385 days. When determining what a Chinese year looks like, one must make a number of astronomical calculations: First, determine the dates for the new moons. Here, a new moon is the completely black moon (that is, when the moon is in conjunction with the sun), not the first visible crescent used in the Islamic and Hebrew calendars. The date of a new moon is the first day of a new month. astrology, china, chinese, chinese calendar, zodiac Elements In Chinese Astrology April 24th, 2014 | Posted by horoscopesign in Chinese Astrology - (Comments Off on Elements In Chinese Astrology) astrology, china, chinese, zodiac April 24th, 2014 | Posted by horoscopesign in Chinese Astrology - (Comments Off on Chinese Astrology) According to Chinese legend, the twelve animals quarreled one day as to who was to head the cycle of years. The gods were asked to decide and they held a contest: whoever was to reach the opposite bank of the river would be first, and the rest of the animals would receive their years according to their finish. All the twelve animals gathered at the river bank and jumped in. Unknown to the ox, the rat had jumped upon his back. As the ox was about to jump ashore, the rat jumped off the ox’s back, and won the race. The pig, who was very lazy, ended up last. That is why the rat is the first year of the animal cycle, the ox second, and the pig last. The Chinese animal signs are a 12-year cycle used for dating the years. They represent a cyclical concept of time, rather than the Western linear concept of time. In the Chinese calendar, the beginning of the year falls somewhere between late January and early February. The Chinese have adopted the Western calendar since 1911, but the lunar calendar is still used for festive occasions such as the Chinese New Year. Many Chinese calendars will print both the solar dates and the Chinese lunar dates. A cultural sidelight of the animal signs in Chinese folklore is that horoscopes have developed around the animal signs, much like monthly horoscopes in the West have been developed for the different moon signs, Pisces, Aries, etc. For example, a Chinese horoscope may predict that a person born in the Year of the Horse would be, cheerful, popular, and loves to compliment others. These horoscopes are amusing, but not regarded seriously by the Chinese people. Start the online astrology course today! Take stargazing to the next level. Astrosymbolica is the first wisdom platform for mastering astrology and natal chart interpretation. Start the online course today! Visit: https://www.astrosymbolica.com/ Purchase this ad space. Contact us! Enjoy our site. Find everything you ever wanted to know about horoscopes and astrology. If there is anything that’s missing from Horoscope-Sign that you would like to see please let us know. No matter what your sign is lets make 2019 the best year yet. Live life to the fullest, challenge your fears, less stress, more doing the things you love, move forward and grow. Become the person you know you can be, no matter what challenges face you. Daily Horoscopes (Links) Current star sign Cancer: The Crab Jun 22 to Jul 23 The New Popularity of Astrology The Yin and Yang of Feng Shui Profiles of Feng Shui Enthusiasts Feng Shui Theories aquarius Aries astrological predictions astrology Astronomy atrology basics cancer Capricorn china chinese chinese astrology chinese calendar Chinese Dog Sign Claudius Ptolemy dog sign dragon sign Feng Shui gemini goat sign greek astrology greeks history horoscope horse horse sign Indian Vedic Astrology leo libra love love signs Medicine meditate meditation Natal Birth Chart Rising Sign science sign signs stress study sun sign The Ascendant Vedic zodiac
cc/2019-30/en_middle_0029.json.gz/line4059
__label__wiki
0.597531
0.597531
Chase Shipka Awarded Fiona Baan “Pursuit of Excellence” Memorial Trophy ALL EQUESTRIAN | DRESSAGE DAILY Lexington, KY - The United States Dressage Federation (USDF) is pleased to announce that Region 1 Young Rider Chase Shipka, of Marshall, VA, and her twelve-year-old, Dutch Warmblood gelding, Zigal, were awarded this year’s Fiona Baan “Pursuit of Excellence” Memorial Trophy. This trophy, which is on permanent display in the Roemer Foundation/USDF Hall of Fame, is awarded to the Young Rider who earns the highest combined average score in the three dressage tests: FEI Young Rider Team, Individual, and Freestyle. Chase placed second in both the team and individual test, and was the highest scoring competitor in the freestyle test at this year’s USDF North American Junior & Young Rider Dressage Championships, held as part of the Adequan®/FEI North American Junior & Young Rider Championships presented by Gotham North. Shipka secured the win with an overall combined average of 72.032%, from her scores of 69.921% in the Team Test, 71.526% in the Individual Test, and 74.650% in the Freestyle Test. The “Pursuit of Excellence” is the legacy Fiona Baan left to all FEI Young Riders, and indeed to everyone who ever knew or worked with her. For nearly 30 years, Ms. Baan worked tirelessly, with great dedication to the United States Equestrian Team (USET). She was U.S. Dressage Team Leader for the 1976 Olympics Bronze Medal team, the 1987 Pan Am Games , and for the bronze medal dressage team at the 1992 Barcelona Olympics. For more information about the USDF North American Junior and Young Rider Dressage Championships, the Fiona Baan “Pursuit of Excellence” Memorial Trophy, or the Roemer Foundation/USDF Hall of Fame, visit the USDF website at www.usdf.org. Belinda Trussell and Anton Win FEI Grand Prix CDI-W at AGDF 8 Lesley Eden and Anne Gribbons Train the Young Horse, Let’s Dance WDM Lier: Dessage at It's Best Heidi Dressage LLC’s Sales Business is Booming Legend - Beautiful and Talented Gelding! Sunrise Stables is a Texas Horseman's Paradise
cc/2019-30/en_middle_0029.json.gz/line4060
__label__cc
0.600885
0.399115
Home / Magazine / / How to Grow Agapanthus Spring Cottage Ramblings Val Bourne is an award-winning writer and winner of The Garden Media Guild’s Columnist of the Year in 2018, News Story of the Year in 2016 and Journalist of the Year in 2014. She writes regularly for many publications and she’s a life-long organic gardener with a real interest in wildlife. She gardens in the cold Cotswolds, growing flowers, fruit and vegetables - with the aid of a Hartley Botanic greenhouse. Although bought for ornamentals, the Best Beloved has commandeered it for tomatoes and peppers! How to Grow Agapanthus Social share count: + 1 Agapanthus Northern Star True-blue is an evening star because it glows as night falls. I’m not talking cottage-garden, wishy-washy, ‘so-called blues’ in shades that hover between mauve, lavender and grey. Many campanulas, lavenders and hardy geraniums, for instance, come in these softer colours but tend to look a milky grey in evening light. Radiant blues, on the other hand, almost vibrate when you look at them and an agapanthus, grown in a sturdy and stable terracotta pot that can be moved round the garden as needed, is the prefect plant for adding this electrifying touch to your planting. My fourteen potfuls are arranged along the south-facing front wall of Spring Cottage, about six feet ( or 2m ) away from the house. They peak from July onwards in, various shades of blue, and are highly admired by visitors and passers by. They all have umbel-like heads of thickly-petalled flowers that wave about on rubbery stems, because these plants have evolved to resist the gusty winds and strong sunshine found on The Cape, a rugged area of South Africa that enjoys an average of between 8 and 10 hours of sunshine every day. Agapanthus species grow naturally on both sides of The Cape and both regions enjoy one season of high rainfall, so the one thing all agapanthus need is copious water during their growing season. We often water here twice a day in June, July and August and we also feed them with a liquid, high-potash tomato food, applied every two weeks. In September we ease off the watering and feeding and our potfuls are moved into our unheated greenhouse during winter and then left to their own devices. Watering begins again in spring, usually mid-March here. It’s noticeable that some of our named varieties have an evergreen tendency, whilst others are deciduous. Generally evergreen agapanthus have wider foliage and are less hardy than those that die down in winter. The difference is due to their breeding line and where the plants in their breeding line originated from. Agapanthus species found on the eastern side of The Cape have a four-month wet, summer season between November and February , when rainfall averages 5 inches per month (125m). The winters, between May and August, are dry and cool however. As a result agapanthus species from the eastern side tend to do their growing in the summer and then die down in winter. The foliage tends to be slender and neater to look at. Agapanthus in pots The western Cape, on the other hand, has a Mediterranean climate that produces a moist damp winter, between May and August, followed by a hot, dry summer between November and January. Agapanthus species found on the western side grow in winter, when moisture and warmth are more available, so they keep their lush, wide-leaved foliage in winter. These agapanthus are not generally as hardy as the deciduous types. All agapanthus (whether deciduous or evergreen) love sun and good light, so they need to be placed in a bright position. Their petals contain lots of pigment, and very little air, and as a result agapanthus flowers never scorch, brown or burn. The darker-coloured forms have lots of anthocyanin, a blue-purple pigment, and this can also be seen in the stems and the bases of the foliage as well as in the thick petals of the flowers. The bee-friendly flowers will last many weeks and they also cut well. The seed heads are attractive too, but allowing them to run to seed diminishes the vigour of the plant, so the spent flower heads are best removed. There’s a huge range of colours and heights from almost-black through to purple, from French navy to royal blue, through to subtle lilac, grey and white. They’ve all been selected and hybridised from only six to fourteen species, depending on which botanist you believe. The name, agapanthus, translates as ‘love flower’ but they’re more commonly known as the African lily. Their other common name, Lily of the Nile, is misleading for they don’t grow near the River Nile. I prefer to grow my agapanthus in frost-proof terracotta pots, rather than in the ground. The most suitable pots have straight sides, or almost straight sides, because these are less likely to blow over. Try Whichford Pottery (www.whichfordpottery.com) I prefer potfuls for two reasons. Firstly, I don’t have to worry about hardiness quite as much, because I can move them to my unheated greenhouse in winter. If it gets very cold a thick double layer of fleece keeps them snug. Secondly, agapanthus look more impressive in pots because the flowers are raised up and can reach four to five feet in height. Being in pots also makes them portable, so you could use them as eye catchers in front of borders that may have passed their best. Agapanthus Tarka If you’re growing agapanthus in the border you will need to choose an agapanthus that dies down in winter because these are hardier. Choose a sunny, well-drained position that doesn’t lie wet in winter. The fleshy roots of agapanthus may suffer in severe winters, but they generally recover although the number of flowers can be reduced after a hard winter. Once established, clumps can withstand -10ºC to -15ºC as long as the ground is well drained, Dark-flowered varieties, verging on black, tend to be shy flowerers. Dividing Agapanthus If an agapanthus is left to become completely potbound it can be an impossible chore to remove it from the pot. It’s best tackled every three to four years in early spring, when growth is just starting, but before you give your plants their first watering to wake them up. It’s easier to prise the plant from the pot in early spring, although it’s still a tough chore. Once the root ball is out, it’s best to saw the chunks of root into nine-inch wide chunks – depending on the variety. Repot in a loam based compost, such as John Innes 3, because it holds moisture and nutrients better. Aim to fill at least two-thirds of the pot with split up sections. If you plonk one in the middle, it will spend a year or two producing root and foliage, in an attempt to fill the pot, and there won’t be any flowers. Some Spring Cottage Favourites ‘Midnight Star’ This an old variety named over forty years ago by plantswoman Lady Priscilla Bacon of Raveningham Hall in Norfolk. She visited South Africa many times and this dark-blue deciduous variety is terrifically hardy and floriferous. 75cm / 30 inches ‘Arctic Star’ A white, semi-evergreen British-bred agapanthus with grey-green foliage. It’s very hardy in well-drained borders, but take note. The flowers of white-petalled varieties do not last as long because they have less pigment in their petals. 60cm/ 2ft ‘Northern Star’ My ultimate favourite with dark-purple buds that produce dark-blue flowers on dark stems. The base of the foliage is also dusky black and the foliage is neat and this variety is very floriferous. Raised by Dick Fulcher ‘Midnight Dream’ This narrow-leaved variety, selected and named by Dutch plantsman Coen Jansen, produces lots of dark-violet to purple flowers flowers on strong green stems. Most dark agapanthus are shy to flower: this one’s an exception. 70cm/ 28 inches ‘Margaret’ A Yorkshire-bred variety selected for outdoor hardiness and flower power by Steve Hickman, although it’s also good in a pot. The powder-blue flower heads of this deciduous variety have dozens of flowers neatly arranged into a dome-shaped head and each flower is darkly lined and shaded. 90cm/ 3ft ‘Windsor Grey’ This tall, elegant agapanthus is a pale grey-blue that bears roughly 70 flowers per stem. Raised in 1995 on the Crown Estate and readily available. As the flowers age they develop soft-pink tones. Easy and deciduous. 90cm/ 3ft ‘Tarka’ This mauve-lavender agapanthus flowers in August and early September, after most have finished, so it extends the season. It’s deciduous, with almost mauve rubbery stems, and each petal has an attractive darker midrib. 1m/ 3ft 3in Hoyland Plant Centre www.somethingforthegarden.co.uk Lia Leendertz Organic Gardening View Lia's Blog
cc/2019-30/en_middle_0029.json.gz/line4065
__label__wiki
0.898337
0.898337
Horror News for "Feature" 'The Blair Witch Project' Sequel Confirmed?! Eduardo Sanchez is one of the filmmaking duo team that brought us The Blair Witch Project that made waves for its found video footage style when it was released in 1999. The sequel was rushed and was terrible resulting in the whole franchise scrapped after that. Flash forward to present day and Sanchez revealed that he has been in talks with Lionsgate on creating the next Blair Project movie. Sanchez reveals that he would not be surprised if something happened within the next year or two. Are you guys psyched to see the new Blair Project movie? Jason Vorhees' Friday the 13th Update From Andrew Form Producer Andrew Form released some alarming news when he stated that they are ‘working on the script still.” David Bruckner (The Signal, V/H/S) will be directing the film but needs a script. Being real here, there is no way they may even release the film this year so that erases the idea of a November 13, 2015 release date. If they do manage to release it one the previous date, it may be rushed and rough around the edges. Ian Ziering and Tara Reid in Syfy's Sharknado 3 Confirmed! Syfy and The Asylum have officially announced that Ian Ziering (Fin) and Tara Reid (April) will return for Sharknado 3 (2015). Sharknado 2: The Second One (2014) became Syfy Original Movie‘s most-watched movie on July 30, 2014 with 3.9 million total viewers watching. The new Sharknado movie takes the entire East Coast with locations including Washington, D.C. and Orlando, Florida. Also starring in Anthony C. Ferrante‘s Sharknado 3 are Cindy Margolis, Vanilla Ice (rumored) and Brittani Cox. Lucy Lawless and Stuart Townsend Join WGN America's Salem Season 2 WGN America’s Salem TV Series came as a well welcomed treat to many horror fans of witches and even demons. The latest update for WGN America’s Salen Season 2 adds Lucy Lawless as Countess Marburg and Stuart Townsend as aristocrat Samuel Wainwright. Lawless’ character is important because she is one of the last remaining ancient German witches. Townsend’s character is a doctor looking to unravel the mysteries of Salem while keeping his own a mystery. Joe Doyle will play Baron Sebastian Marburg who is the son of Countess Marburg (Lawless). Oliver Bell is now a season regular as Mary Sibley’s (Janet Montgomery) long lost son, once thought to be dead but was raised in secret by Mary’s very own witches. Zombie Horror Short - 'Isolation' is Impressively Realistic Looking for some great realistic looking animation then this horror short Isolation is just for you. Isolation comes from Peak Pictures and features lots of zombies. The zombie short was penned by Manuel Vergara and Tomas Vergara. The sound score compliments what is on screen tremendously well. These zombies are fast moving zombies and that just ups the action/terror to an amazing scale. I like how they reenact the great scene from World War Z (2014). You MUST see this horror short, NOW! January 2015 New Horror Game Releases Xbox One and Playstation 4 (PS4) have us waiting for better games in 2015 and here is the January 2015 List of Horror Game Releases which include Dying Light, H1Z1, Alien: Isolation - Safe Haven DLC, Resident Evil HD Remaster and Monstrum. I know Dying Light has received much needed polishing and I am very excited to see what the other horror games bring to the table. Sam Rockwell Talks Poltergeist (2015) Update Gil Kenan‘s Poltergeist (2015) remake of the classic horror movie from Steven Spielberg/Tobe Hooper Poltergeist (1982) has very little (none) promo material making it way out. However, Sam Rockwell has shared some news that this Poltergeist remake will be a kids movie. So to clarify that statement the new horror film will be told through the eyes of a little boy instead of from the perspective of JoBeth Williams. For this reason, Poltergeist will not be rated R but that should not change anything much. Sam Raimi is the producer and Poltergeist will be released this upcoming July 24, 2015. Starring in Poltergeist are Jared Harris, Rosemarie DeWitt, Saxon Sharbino and Jane Adams. Alex Garland Talks About '28 Months Later' Update Writer/Producer Alex Garland talks about the current status of 28 Months Later. The first in the franchise, 28 Days Later was released in 2002 and Garland wrote the screenplay. The second, 28 Weeks Later (2007), Garland was the executive producer of the film. Now with closing up the franchise with 28 Months Later, Garland says there have been some serious discussions on the film but there are too many reasons delaying the movie that it is complicated. Garland said that he may not go with 28 Months Later as the movie title. How long do we have to wait to see the continuation of the story and the Rage Virus, Alex Garland does not know yet. New Horror Short - He Took His Skin Off For Me Ben Aston‘s new horror short “He Took Off His Skin For Me” is actually his grad film from the London Film School. This short is based on the short story by Maria Hummer. I saw the video and thought, what is this? This horror short may not be for everyone but those of you who do watch it will enjoy it. Tell us what you think of Ben Aston‘s horror short in the comments below. Ohio Teacher Facing Jail for Showing 'ABCs of Death' to Class Update: Sheila Kearns found guilty! Judge Charles Schneider scheduled sentencing for March 4. The maximum penalty for each felony count is one year in prison and a $2,500 fine. However, probation is the presumed penalty for the low-level felony. Kearns, 58, showed the movie to students ranging in age from 14 to 18 on April 11, 2013. Sheila Kearns, age 58, was a substitute teacher who is now facing jail time because she showed the class the ABCs of Death (2012). I know the horror anthology film was horrible and has really graphic content but is this too much? I can make jokes that some of the makers of the horror shorts should have gone to jail but this is a serious matter. Do you think this went overboard or do you think that Sheila Kearns deserves to go to jail? Tell us your thoughts in the comments below and full details on the case are below. John Carpenter to Executive Produce the 'Escape From New York' Remake Official news is that John Carpenter is going to be the Executive Producer of the Escape From New York Remake movie. 20th Century Fox won the bidding war with Andrew Rona and Alex Heineman‘s The Picture Company to produce the film. Not only is John Carpenter the Executive Producer but also has “creative influence” over the movie. Tell us what you think of John Carpenter‘s involvement in the Escape From New York Remake. New 'Dredd 2' Movie News Update - 'Alex Garland' Speaks on Dredd Sequel I know many people thought Dredd (2012) was a good shot at nailing the popular Judge Dredd character. I mean, Karl Urban played a great Judge Dredd in my opinion and I really would like to see a Dredd 2 movie soon. Recently IGN caught up with Dredd (2012) screenwriter Alex Garland for updates on the Dredd 2 movie project. Garland basically said that he is not apart of the project and is not sure what is going on with Dredd 2. Read below for the full details on what Garland had to say and reveal. Do You Know These Famous Texas Serial Killers List Names? It is alarmingly scary that you can live in a state that has had many serial killers and not even know about it for years. We decided to round-up a List of Famous Texas Serial Killers. This Texas Serial Killers List includes most of the known serial killers in Texas, and we tried to include as many big names as possible. Police are always investigating serial killer murders of victims even after several years have passed. Of course, we cannot add every new serial killer but if you know of a serial killer who did not make the list, please add their name(s) in the comments below. Also, if you want to see a particular state, please let us know by requesting the US state in the comments below. Starz's Ash Vs. Evil Dead TV Series Featuring Half Hour Episodes Starz’s Ash Vs. Evil Dead Season 1 TV Series’ latest update drops the news that each episode will be half-hour episodes. Attached to the project are Sam Raimi (executive producer/director), Rob Tapert (executive producer) and Bruce Campbell (executive producer/star). What we needed was an exact premiere date but received a fourth quarter 2015 premiere date, which is not bad but if you are like me, you want an exact date. This and more news is likely to be revealed soon and you know we will cover everything related to the Evil Dead TV series. Friday the 13th Game in Development Now Jason Vorhees will be making is return to the video game world in the form of an all new video game that is a co-operative and competitive multiplayer experience of of predator and prey game styles. Sean S. Cunningham shared his views on the game below. The Friday the 13th game is currently in development and will release on multiple platforms sometime in October 2015 for Halloween. The new video game will tie in events from the classic films along with events from the upcoming Friday the 13th TV series. Michael Keaton Exploring Kong: Skull Island (2017) Movie Former Batman and recently Birdman, Michael Keaton is doing great again and now he is in talks to join the Kong: Skull Island (2017) movie. Keaton will join Legendary Pictures’ King Kong movie with Tom Hiddleston and J.K. Simmons. The focus of the film will be to explore the mysterious Skull Island and the huge monsters. Kong: Skull Island will release in movie theaters March 10, 2017. Max Charles Replaces Ben Hyland in FX's The Strain Season 2 Yeah, that just happened. Max Charles (pic below) replaces Ben Hyland as Zach Goodweather in FX’s The Strain Season 2. Carlton Cuse, who is the executive producer and showrunner of The Strain said that he needed a very well versed young actor and Max Charles is the way to go. Cuse’s full statement below. Hyland did a great job but we know familiar Charles can handle it. I am just so stoked to see Guillermo Del Toro‘s The Strain Season 2, just start filming already, I need an advanced screening for my vampire fix. [REC] 4: Apocalypse Infographic - Anatomy of the Virus [REC] 4: Apocalypse (2014) just released in theaters and VOD but today we have a infographic that details the Anatomy of the Virus: The Science of Demonic Possession. REC 4 is the final movie in the franchise and this infographic should sum up everything you need to know. Jaume Balaguero directs while Manuela Velasco, Paco Manzanedo and Hector Colome star. James Wan's The Conjuring 2 Gets a New Writer!? James Wan‘s The Conjuring 2: The Enfield Poltergeist (2016) has a new writer in David Leslie Johnson. Johnson has been hired to rewrite the script for New Line Cinema and Warner Bros. Now the original script was an early draft by James Wan, Chad Hayes and Carey Hayes with revisions made by Eric Heisserer. I feel better that this is not a complete redo but more of an ironing-out-the-bugs kind of rewrite. The Conjuring 2 is still set to release in movie theaters on June 10, 2016 with Ed and Lorraine Warren (Patrick Wilson and Vera Farmiga) behind the case of 2 demon possessed sisters. Tremors 5 Release Date Update - October 2015 Director Don Michael Paul has taken on the Tremors 5: Bloodline (2016) and Michael Gross has recently announced that the release date will be pushed up to October 2015. The October 2015 release date is still a little open with it safe to say that the movie will release to DVD, Blu-ray and Digital HD on this timeframe, do not hold your breath on a movie theater release date but who knows what can happen. Cast in Tremors 5 are Jamie Kennedy, Michael Gross and Natalie Becker. Sneak Peek of Josh Gates and Travel Channel's Expedition Unknown Season 1 The Travel Channel is sending Josh Gates (Destination Truth) back out into the world to unravel more world mysteries in the Travel Channel’s Expedition Unknown Season 1. The 2-hour season premiere will air on Travel Channel at 9:00 pm ET/PT on Thursday January 8, 2015. I was a real big fan of Destination Truth and it was something that the family could watch together on a slow day. Josh Gates is a great host and I am looking forward to watching Expedition Unknown, my son cannot wait! New Artwork for AMC's The Walking Dead Season 5 Return AMC’s The Walking Dead Season 5 returns for the end half of the season. Today we have scored the new artwork that features Rick Grimes (Andrew Lincoln) and Daryl (Norman Reedus) covering the rear. The artwork also features a map and written on the map is “The New World’s Gonna Need Rick Grimes”. The Walking Dead Season 5 returns on Sunday February 8, 2015 and you know close to 20 million viewers will be watching. Scream Factory to Release 'Escape from New York' Collector Edition Blu-ray John Carpenter‘s Escape from New York (1981) brings back found memories and I am pleased to say that Scream Factory will release a special collectors edition of Escape from New York. Paul Shipper did a fantastic job with the Blu-ray artwork and really hit that 80’s feel. Look for the Blu-ray release this upcoming April 21, 2015. Are you ready to watch Escape from New York (1981) with stars including Kurt Russell, Lee Van Cleef and Ernest Borgnine? Matt Reeves' New 'Planet of the Apes' Movie Delayed One Year 20th Century Fox has announced that they have delayed the next Matt Reeves’ Planet of the Apes film for one year, pushing the new release date back to July 14, 2017. No reason was announced but I can assume that director Matt Reeves and writer Mark Bomback want to get the project right and not rush the process. The recently released sequel Dawn of the Planet of the Apes did very well and the reviews were pretty good. Cannot wait to see what happens next for Caesar (played by Andy Serkis) and the rest of the apes but I guess I have no choice but to wait until 2017. Watch the Opening Scene from Syfy's '12 Monkeys' TV Series Syfy and Universal Cable Productions are bringing the 12 Monkeys TV series to the small screen premiering Friday January 16, 2015. We get to see the entire opening scene in this video and although I am not particularly stoked to see the TV series, I am interested more than before. Starring in the 12 Monkeys TV series are Aaron Stanford (as James Cole/Time Traveler, was played by Bruce Willis), Amanda Schull (as the Doctor, was played by Brad Pitt), Noah Bean (as Aaron Marker) and Kirk Acevedo (as Ramses). Hard to call this one on an opening scene but I will check it out on premiere night. Scary Looking Olivia Wilde in Blumhouse Production's 'The Lazarus Effect' Movie Director David Gelb‘s The Lazarus Effect (2015) releases February 27, 2015 and stars one scary looking Olivia Wilde. Wilde has usually starred as the “pretty girl” in the House M.D. TV series and TRON: Legacy (2010) film among many others but this time we get to see a very scary looking “dead” Olivia Wilde. Jason Blum of Blumhouse Productions will produce and also starring are Mark Duplass, Evan Peters and Donald Glover. Scarlett Johansson to Star in Rupert Sanders' 'Ghost in the Shell' Movie Adaptation Rupert Sanders has been on board to direct anime classic Ghost in the Shell in a live action movie adaptation. It has just been confirmed that Scarlett Johansson will star in the new film. Johansson has played the roles of Black Widow in the Marvel movies and the main star in sci-fi movie Lucy. Steven Spielberg is also involved in some way and producing the film are Avi Arad and Steven Paul. Bill Wheeler will be penning the script from the source material, not sure how close they will stay to the source material. Are you stoked to see Scarlett Johansson in Ghost in the Shell? New Horror Short Film - The Grey Matter The Grey Matter is a new horror short film that gives a dark horror comedy spin on having a parasite sharing your body. Some of the special effects are a little disturbing but the overall tone of the short is pretty good. Peter McCoubrey and Luke McCoubrey are responsible for giving us this nice treat. Simon is a desk jockey who shares his body with Brian. Thats enough build up, watch the video below. New Horror Movies on Netflix Instant - December 29, 2014 Netflix has been treating horror fans to steady updates to their instant horror movie library. This December 29, 2014 update adds Dark Skies, I, Frankenstein, LFO: The Movie, Paranormal Activity: The Marked Ones and The Strange Color of Your Body’s Tears. Some of these films are popular mainstream movies going back to 2013. Enjoy the last few days of 2014 with Netflix Instant. 'The Cabin in the Woods' Bong Ready to Order Remember Marty (Fran Kranz) from Drew Goddard‘s The Cabin in the Woods (2012) as the unlikely hero who had the killer bong. Now CoffeMugPipe.com has made the movie prop into a real life item available for purchase. You can get one for $79.99 if you say that you are 18 years or older. This is a killer item for fans of the movie and regular stoners out there not to mention a great conversation piece. AMC's The Walking Dead Cobalt TV Series Set in Los Angeles! AMC’s The Walking Dead Companion TV Series (codenamed Cobalt) is set in Los Angeles. This news was confirmed by TheWalkingDead.com but may not stay in L.A. for too long. As we all know, Robert Kirkman does not like to have his characters feel too relaxed in one place for too long keeping the “zombie” threat high. Actor Cliff Curtis will most likely play the male lead character with Frank Dillane and Alycia Debnam Carey co-starring. More on the new Walking Dead TV series to be released soon. Ghostbusters 3 Cast Revealed: Jennifer Lawrence Involved!? Paul Feig will be directing Ghostbusters 3 and we have scored some pretty concrete possible cast names from leaked emails. This new Ghostbusters movie is going to be a reboot that ties in with the original Ghostbusters movies from the 80’s but with an all-female cast as the Ghostbusters. Stars include Jennifer Lawrence, Emma Stone, Melissa McCarthy, Amy Schumer and Lizzy Kaplan along with recently announced Rebel Wilson are all strong candidates. The Ghostbusters film will take place in another world where the events in the first two movies never happened on this new world, sounds confusing but this ensures that there will be very little ties to the old movies but the film will be able to use all the old assets from the previous Ghostbusters movies. Does this sound interesting, comment below with your thoughts on these news for Ghostbusters 3. Chainsaw Sally Gets Distribution and Animated Series in Pre-Production Black Wolf Media will be releasing Chainsaw Sally: The Movie (2015) in an open 2015 release date. Chainsaw Sally was co-created by Jimmyo and April Burril (also plays Chainsaw Sally). The animated series has been confirmed to be in pre-production by Bloody Bombshell Entertainment and Fatality Films. Are you ready for the extreme blood and gore that Chainsaw Sally leaves in her wake? SEGA Turning Classic Games into Movie Adaptations and Spinoffs!? SEGA has initiated movie adaptations of the following classic SEGA video games: Altered Beast, Streets of Rage, Shinobi, Rise of Nightmares and Crazy Taxi. These future films will be full English live-action or animated spinoff movies. Rumors of Virtual Fighter and Golden Axe are also said to be getting movie adaptations. Break Media‘s executive Evan Cholfin was hired by SEGA to head the movie adaptations. This makes perfect sense since many of the fans of those games and that era are now the prime demographics for ratings and business, more revenue for SEGA. Would you go see these films “just-because” and what are your found memories of these game titles? M. Night Shyamalan and FOX's Wayward Pines Season 1 Premiere Date Confirmed M. Night Shyamalan has been developing Wayward Pines since 2013 and Wayward Pines Season 1 finally premieres on May 15, 2015. The new drama mystery TV series is based on the popular The Wayward Pines Trilogy novels by Blake Crouch. Matt Dillon plays a secret service agent who arrives in Wayward Pines after a bad car accident. He soon learns that he cannot leave the mysterious town. Watch the trailer, hard not to spoil this. Starring in Wayward Pines are Terrance Howard, Carla Gugino, Melissa Leo, Juliette Lewis and Toby Jones. Camille de Pazzis Cast in Netflix's Hemlock Grove Season 3 It has been confirmed that Camille de Pazzis has been cast in Netflix’s Hemlock Grove Season 3. Pazzis will play Annie, “Annie, a mysterious and kind old soul masquerading in a young body who has close ties to the Godfrey family.” Hemlock Grove Season 3 has already started production and this will be the series finale, last season of Hemlock Grove. Look for the new season of Hemlock Grove to stream on Netflix in 2015. Awesome NEW Poster for The Woman in Black: Angel of Death Hammer Films and Relativity Media just released a new “2 Thumbs Up” poster for Tom Harper‘s The Woman in Black: Angel of Death (2015). Even the two thumbs in poster look very creepy. The Woman in Black 2: Angel of Death will release in US movie theaters this upcoming January 2, 2015. Starring in The Woman in Black: Angel of Death are Helen McCrory, Jeremy Irvine and Phoebe Fox. New 'Friday the 13th Movie' is Not a Reboot or Remake!? That is right, the new Friday the 13th movie will not be a remake nor a reboot. This will be a new story in the Jason Voorhees world that takes us back to the 1980’s. Platinum Dunes producers Brad Fuller and Andrew Form said that they want to return to the 80’s to recover the feel of the first film. Directing the new Friday the 13th movie will be David Bruckner who has directed The Signal and V/H/S. So far, some are speculating that this film will follow a found footage style but it is way too early to confirm this. AMC's Preacher TV Series Update - Pilot Ordered AMC‘s Preacher TV Series Season 1 is showing progress with AMC ordering the pilot episode. Sam Catlin, Seth Rogen and Evan Goldberg are attached to the Preacher series. Production on the pilot episode will start production in Summer 2015 for the possible 2016 release of the Preacher TV series. How many of you are fans of the Preacher comics and looking forward to the TV series? Capcom's 'Resident Evil Remake' January 2015 Console Release Capcom just announced that they will be releasing the new Resident Evil Remake for XBox 360, Playstation 3 (PS3), Playstation 4 (PS4), XBox One and PC on January 20, 2015. This game will release for $19.99. So what is this remake? The remake will feature the game mechanics from the previous “update” that was made for the Gamecube back in 2002 for the original 1996 original Resident Evil game. The main selling point and focus of this update was to enhance the graphics to high quality HD and they look stunning, especially compared to the previous 2 games’ graphics. This core game is what the “real” Resident Evil franchise started from, now with enhanced graphics, you must replay this classic horror game. Check out the graphics for the PC version below, the visuals are stunning. Stephen King's IT Reboot Update - Filming Starts Summer 2015 Producer Dan Lin (The Lego Movie) revealed that they are moving forward with a big budget Stephen King’s IT Reboot to start shooting Summer 2015. That is right, big budget. Production will begin with Cary Fukunaga (True Detective) to head the production team. New Line Cinema signed Fukunaga for only the first part of the two part films. The 1986 horror novel book is 1100 pages of material so it will be difficult to do it full justice but I am hoping that they adapt this new Stephen King film well. Are you excited, I wonder who will play Pennywise the Clown. Tim Curry did such an awesome job with that character. Lifetime's The Omen TV Series 'Damien' Casts Bradley James, Premiere Episode Director Announced Bradley James, Arthur Pendragon from BBC‘s Merlin TV series will play Damien in Lifetime‘s Damien Season 1 based on the Omen movies. The new Omen TV series premiere will be directed by Shekhar Kapur, of which he is also to executive produce this episode. The classic horror film was great, Damien Thorn created a lot of trouble for his parents. This new TV series will follow the spawn of Satan, Damien, as he continues his adult life and grows into his destiny as the Antichrist. There is a lot of speculation to this demon series and with a six-episode season 1, is it enough? I am definitely going to give the series a chance and with six episodes, I can dive in and watch without thinking too hard if there will be a Damien Season 2. The Crow Reboot Gets New Director Corin Hardy Relativity Studios has just released the news that Corin Hardy will direct The Crow Reboot after F. Javier Gutierrez stepped away to focus on his upcoming film “The Ring 3D”. Who is Corin Hardy? Corin Hardy has been making music videos for The Prodigy among others and will get his first live action movie debut in 2015 when “The Hallow” gets its’ release. I am hoping that we will see a new Crow movie that lives up to the 1994 version that Brandon Lee created. Best Vampire TV Series Lately, we have had a lot of good Vampire TV series & Vampire TV shows, so we decided to make a Best Vampire TV Series List. We rounded out the list with scary vampires, romantic vampires and even mentioned a vampire comedy series. This list is vampire focused, based on our Best Horror TV Series List. You will find classics like Dark Shadows and newer TV shows like The Originals, The Vampire Diaries and The Strain with Buffy the Vampire Slayer and Angel smack in the middle. Like always please comment if we missed any of your favorite vampire TV shows. The Fantastic Four Reboot Synopsis Revealed 20th Century Fox has revealed the synopsis for The Fantastic Four Reboot and they will be starting from the very beginning. This will be an origin story explaining how they got their powers and their fight with a former friend. The full synopsis is available below but sounds too much like the first film from the previous Fantastic Four films. The Fantastic Four Reboot hits movie theaters next August 7, 2015 with Josh Trank directing. Starring in The Fantastic Four Reboot are Michael B. Jordan (Johnny Storm aka the Human Torch), Kate Mara (Sue Storm aka The Invisible Woman), Miles Teller (Reed Richards aka Mr. Fantastic), Jamie Bell (Ben Grimm aka The Thing) and Toby Kebbell (Victor Domashev aka Dr. Doom) including Reg E. Cathey and Tim Blake Nelson. NBC Cancelling Constantine After Only 13 Episodes!? NBC has officially stopped production on Constantine Season 1 after the first 13 episodes. That means that the Constantine first season will not get the full amount of episodes that it deserved. I watch the Constantine TV show and really want to see where the main story goes but NBC is not sure about continuing the series right now. NBC was hoping that fans of NBC’s Grimm TV series would cross over to Constantine but not enough of that audience has. People might not be crossing over because of the 10 pm airing and the fact that the series has been shaky to say the least. NBC has not flat out cancelled season 2, NBC has put everything on suspend until ratings pick up else that will be the end of Constantine. There are also rumors floating around that NBC might handover the Constantine TV series to Syfy to continue the series. Convicted Serial Killers List in The United States The United States is home to an enormous amount of serial killers and to be honest, I was shocked by the list. This serial killers list includes over 200 convicted serial killers from The United States with brief descriptions for each with more details on these serial killers to be found at our serial killers section. We added the famous serial killers along with the not so famous killers and female serial killers. We hope you enjoy this ultimate list of serial killers found in America and as always, please comment below to add any serial killers that we may have missed. This list should be a rude awakening to be more aware of your surroundings and to be careful, these are local serial killers! Showtime's Penny Dreadful Season 2 First Image and Details Revealed Showtime’s Penny Dreadful Season 2 now has an official still released featuring Ethan (Josh Hartnett) and Vanessa (Eva Green). I enjoyed watching Season 1 but now that all the characters have been introduced, I know that the action will pick up. Also cast in Penny Dreadful Season 2 are Timothy Dalton, Harry Treadaway, Danny Sapani, Reeve Carney, Rory Kinnear with Helen McCrory and Simon Russell Beale returning as season regulars. New Online Zombie Game 'Five Minutes' - Play Now UNIT9 has released a new zombie game titled “Five Minutes” that is totally free to play. The game is in HTML so everyone can play with zero app install. The game launched on November 19, 2014. This is a horror short in actuality that progresses the story through the interaction on the user. Check it out for yourself at http://www.fiveminutes.gs/. 10 Best Serial Killer Movies Nothing says real horror like serial killer movies, there is just so much real fear that they can generate. Enjoy our top 10 horror movies list featuring the ten best serial killers in films. These gems are listed in the order that came to mind thus the movies that really stand out and I have fond memories watching. Feel free to add suggestions to the movie list in the comments below. I also included many worthy mentions that are not personal favorites but all considered good serial killer movies. We took extra time to not include movies that are too similar so we get a well rounded movie list.
cc/2019-30/en_middle_0029.json.gz/line4075
__label__cc
0.730796
0.269204
ICTA > Publications > Environmental analysis of rainwater harvesting infrastructures in diffuse and compact urban models of Mediterranean climate Angrill S., Farreny R., Gasol C.M., Gabarrell X., Vinolas B., Josa A., Rieradevall J. "Environmental analysis of rainwater harvesting infrastructures in diffuse and compact urban models of Mediterranean climate". The International Journal of Life Cycle Assessment. 2012, vol. 17, num. 1, p. 25-42 Purpose: At present, many urban areas in Mediterranean climates are coping with water scarcity, facing a growing water demand and a limited conventional water supply. Urban design and planning has so far largely neglected the benefits of rainwater harvesting (RWH) in the context of a sustainable management of this resource. Therefore, the purpose of this study was to identify the most environmentally friendly strategy for rainwater utilization in Mediterranean urban environments of different densities. Materials and methods: The RWH systems modeled integrate the necessary infrastructures for harvesting and using rainwater in newly constructed residential areas. Eight scenarios were defined in terms of diffuse (D) and compact (C) urban models and the tank locations ((1) underground tank, (2) below-roof tank, (3) distributed-over-roof tank, and (4) block tank). The structural and hydraulic sizing of the catchment, storage, and distribution subsystems was taken into account using an average Mediterranean rainfall, the area of the harvesting surfaces, and a constant water demand for laundry. The quantification of environmental impacts was performed through a life cycle assessment, using CML 2001 Baseline method. The necessary materials and processes were considered in each scenario according to the lifecycle stages (i.e., materials, construction, transportation, use, and deconstruction) and subsystems. Results and discussion: The environmental characterization indicated that the best scenario in both urban models is the distributed-over-roof tank (D3, C3), which provided a reduction in impacts compared to the worst scenario of up to 73% in diffuse models and even higher in compact ones, 92% in the most dramatic case. The lower impacts are related to the better distribution of tank weight on the building, reducing the reinforcement requirements, and enabling energy savings. The storage subsystem and the materials stage contributed most significantly to the impacts in both urban models. In the compact density model, the underground-tank scenario (C1) presented the largest impacts in most categories due to its higher energy consumption. Additionally, more favorable environmental results were observed in compact densities than in diffuse ones for the Global Warming Potential category along with higher water efficiencies. Conclusions: The implementation of one particular RWH scenario over another is not irrelevant in drought-stress environments. Selecting the most favorable scenario in the development of newly constructed residential areas provides significant savings in CO2 emissions in comparison with retrofit strategies. Therefore, urban planning should consider the design of RWH infrastructures using environmental criteria in addition to economic, social, and technological factors, adjusting the design to the potential uses for which the rainwater is intended. Recommendations and perspectives: Additional research is needed to quantify the energy savings associated with the insulation caused by using the tank distributed over the roof. The integration of the economic and social aspects of these infrastructures in the analysis, from a life cycle approach, is necessary for targeting the planning and design of more sustainable cities in an integrated way. © 2011 Springer-Verlag. Joan Rieradevall Pons, Carles Martínez Gasol, Xavier Gabarrell Durany, Ramon Farreny Gaya, Sara Angrill Toledo
cc/2019-30/en_middle_0029.json.gz/line4086
__label__wiki
0.799973
0.799973
Hotels in Australia Hotels in Western Australia Munster Hotels Hotels & Accommodation in Munster Search Munster Hotels View Munster Hotels on a map Best Munster Hotels What's Munster Like? If you're looking for a place to get away, look no further than Munster. Whether you're planning to stay for a night or for the week, the area around Munster has accommodations to fit every need. Search for hotels in Munster with Hotels.com by checking our online map. Our map displays the areas and neighborhoods around all Munster hotels so you can see how close you are from landmarks and attractions, and then refine your search within the larger area. The best Munster hotel deals are here with our lowest price guarantee. Where are the Best Places to Stay in Munster? Below are the number of accommodations by star rating in Munster and the surrounding area: How to Get to Munster Flights to Munster • Perth, WA (PER), 17.4 mi (28 km) from central Munster Things to See and Do in Munster Things to See near Munster: • Fremantle Prison (6.2 mi/10 km from the city center) • Fiona Stanley Hospital (5.7 mi/9.1 km from the city center) • Round House (6.4 mi/10.3 km from the city center) • Murdoch University, South Street Campus (5.5 mi/8.8 km from the city center) • Bathers Beach (6.3 mi/10.2 km from the city center) Things to Do near Munster: • Adventure World (3.7 mi/6 km from the city center) • Fremantle Markets (6.2 mi/10 km from the city center) • Royal Fremantle Golf Club (6.2 mi/10 km from the city center) • Western Australian Maritime Museum (6.6 mi/10.6 km from the city center) • Market City (7.8 mi/12.6 km from the city center) When Is the Best Time to Visit Munster? • Hottest months: February, January, March, December (average 88°F) • Coldest months: July, August, June, September (average 44°F) • Rainiest months: August, September, May, and June (average 0.12 inches of rainfall)
cc/2019-30/en_middle_0029.json.gz/line4089
__label__wiki
0.544309
0.544309
THE BIG NIGHT Gustave Kervern, Benoît Delépine Le Grand soir Winner of the Special Jury Prize in this year’s Un Certain Regard at Cannes, the new film from the directors of Aaltra and Mammuth is a typically oddball comedy starring Benoît Poelvoorde as aging punk NOT and Albert Dupontel as his ostensibly straight-laced brother Jean-Pierre who falls in line with NOT’s anarchic philosophy after losing his job. Together the dishevelled pair rail against capitalism while hanging out in the clean, corporate world of their local shopping precinct. With a supporting cast that includes Anne Fontaine, Gérard Depardieu and Yolande Moreau, it’s an eccentric, unusual, and very funny film. Director’s Note: The Delépine-Kervern duo puts ‘a punkwith-a-dog’ at the centre of this caustic comedy. Dark, almost veering out of control, with razor-sharp dialogue. Winner: Special Jury Prize, Un Certain Regard, Cannes 2012 Showing as part of the 2012 IFI French Film Festival. 92 minutes // France-Belgium // 2012
cc/2019-30/en_middle_0029.json.gz/line4090
__label__cc
0.726373
0.273627
Click here to browse the great events from Imagination Playhouse on iOS or Android   Open in the Care.com Explore app All Store  Login Login Home About  Get to know Imagination Playhouse Care.com Inc. (“Care.com,” “we” or “us”) provides the care.com website and various digital content and services available at or through that website and related mobile applications (taken together, the “Service”). It is our policy to respect your privacy regarding any information we may collect while operating the Service, as set forth below. Website and App Usage Like most website and mobile application providers, Care.com collects non-personally-identifying information available via web browsers, mobile devices and servers, such as page views, clicks, browser type, device type, language preference, referring site, and the date and time of each visitor request. Care.com’s purpose in collecting non-personally identifying information is to better understand how Care.com’s visitors use its Service. From time to time, Care.com may release non-personally identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its Service. Care.com also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users. Care.com only discloses IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below. Care.com collects data about the behavior of users of the Service. For instance, Care.com may collect data to identify the most popular activities, and activity dates and times. Care.com may use this information itself, display it publicly or provide it to others. However, Care.com does not disclose personally-identifying information other than as described below. Gathering and Use of Personally-Identifying Information Certain visitors to the Service choose to interact with Care.com in ways that require Care.com to gather personally-identifying information. The amount and type of information that Care.com gathers depends on the nature of the interaction. For example, we ask visitors who sign up for our newsletter to provide a ZIP code and email address, and creating an account may require a mobile phone number. Those who engage in transactions with Care.com — by purchasing admission to an activity, for example — are asked to provide additional information, including as necessary the personal and financial information required to process those transactions. In each case, Care.com collects such information that is reasonably necessary or appropriate to fulfill the purpose of the visitor’s interaction with Care.com. Care.com does not disclose personally-identifying information other than as described below. And you can always refuse to supply personally-identifying information, with the caveat that it may prevent you from engaging in certain activities through the Service. If you are have provided your email address, phone number or other contact information, Care.com (and any activity provider you have booked with) may use that info to communicate with you (including via email and SMS/MMS) to tell you about upcoming activities, promotions, or new features, to solicit your feedback, or for other marketing purposes. To the extent required by law, you may opt out of marketing communications from Care.com, such as via an unsubscribe link at the bottom of a marketing email or by replying “STOP” to text messages. Note that you may not opt out of transactional communications, such as an email confirming your purchase with Care.com. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to use it in connection with our business and publish it in order to help us clarify or respond to your request or to help us support other users. Disclosure of Certain Personally-Identifying Information Care.com discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors, affiliated organizations and suppliers (including its providers) that reasonably need to know that information in order to process it on Care.com’s behalf or to provide services available via Care.com’s Services. your name and your child’s name, birth date, school, allergies, and similar information is sent to activity providers you have booked with, so they can provide services and reasonably operate their business; your contact phone number is provided to activity providers you have booked with so they can call in an emergency or to address issues related to the services they may be providing you; your email address is provided to activity providers you have booked with so they can send you information regarding their programs, your email address may be provided to third parties acting on behalf of Care.com to facilitate marketing campaigns consistent with the terms of this Privacy Policy. Some of Care.com’s employees, contractors, affiliated organizations and suppliers may be located outside of your home country; by using the Service, you consent to the transfer of such information to them. Care.com will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Care.com may disclose potentially personally-identifying and personally-identifying information in response to a subpoena, court order or other governmental request, or when Care.com believes in good faith that disclosure is reasonably necessary to protect the wellbeing, property or rights of Care.com, you, third parties or the public at large. Care.com takes reasonable measures to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information. A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Care.com uses cookies to help Care.com identify and track visitors, their usage of Care.com website, and their website access preferences. Care.com visitors who do not wish to have cookies placed on their computers should set their browsers to refuse cookies before using Care.com’s websites, with the drawback that certain features of Care.com’s websites may not function properly without the aid of cookies. If Care.com, or substantially all of its assets, were acquired, or in the event that Care.com goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of Care.com may continue to use your personal information as set forth in this policy. Ads appearing on any of our websites may be delivered to users by advertising partners, who may set cookies. These cookies allow the ad server to recognize your computer each time they send you an online advertisement to compile information about you or others who use your computer. This information allows ad networks to, among other things, deliver targeted advertisements that they believe will be of most interest to you. This Privacy Policy covers the use of cookies by Care.com and does not cover the use of cookies by any advertisers. Care.com may change its Privacy Policy from time to time, and in Care.com’s sole discretion. If we make changes that are material, we will let you know by posting on the Service, sending you an email, or other communication before the changes take effect. The notice will designate a reasonable period of time after which the new Privacy Policy will take effect. Care.com encourages visitors to frequently check this page for any changes to its Privacy Policy. Your continued use of this site after any change in this Privacy Policy will constitute your acceptance of such change. Questions or Requests to Delete If you have questions about your personal data or would like us to delete your personal data from our records, please contact our support team at . If you request that we delete your personal data Care.com will use reasonable efforts to remove it from the Service, but you acknowledge such data may not be made immediately unavailable.
cc/2019-30/en_middle_0029.json.gz/line4092
__label__wiki
0.672996
0.672996
Browsing Category: What’s on Inspirational YOU host – Charlene White – Wednesday 18th April 2012 Charlene White – ITV News Presenter Inspirational YOU supporter & trustee BA (Hons) Journalism at London College of Printing (now London College of Communications) What is an average day like? There is no average day in news. Especially when you work across national and regional news. But it always starts with scanning through the mornings papers online, watching a lot of 24-hr news channels, writing scripts and occasionally editing footage. What has been the highlight of your career to date? Probably working at the New York Post in Manhattan for 3 months during summer break at university. I had articles published in the paper almost every day, and met some incredible people whilst I was there. At the time, I don’t think I truly understood the magnitude of me being accepted for a work placement there – it was only years later that I worked it out! What tips would you give to anyone wanting to get into journalism? Actually want to be a journalist, and not famous. There are so many people who “want” to be journalists but have no idea about current affairs. I’ve read newspapers everyday, and watched news programmes everyday since I was at school. I’m a bit of a geek when it comes to news, and unfortunately I don’t meet enough aspiring journos who have the same passion for it. The other tip would be that London isn’t the centre of news, if you want proper experience — especially in TV — be prepared to travel to other parts of the UK and work in regional TV. It’s the best training you’ll get, and TV execs respect you more if you’ve been on the road as a reporter. My family. No matter what happens in our lives, we strive to do better. What is your mantra? Everything happens for a reason. Why do you support Inspirational YOU? I believe that inspiring the next generation is a role we should all have a hand in. Inspirational YOU speaker – Donna McConnell – Wednesday 18th April 2012 Donna McConnell Showbusiness Editor, Mail Online BA Hons Media/Print Journalism – University of Westminster Postgraduate Diploma Newspaper Journalism – City University How did you secure your position at the Mail Online? I applied for shifts as a freelance then made myself indispensable What does a usual day consist of? I manage the showbiz team of up to eight journalists in London and Los Angeles. Starting at 7am I collate the showbiz newslist gathering stories from daily papers, magazines, Twitter, showbiz blogs, overnight events, and pictures. I present ideas in three daily news conferences to my editor, following that I commission stories, update and edit copy, respond to breaking news, monitor Twitter, all major US sites and our competitors, field queries from PRs, and deal with legal issues. I finish around 6pm. What has been the highlight of your role so far? Getting it! And spending three months in Los Angeles helping to set up the LA office. Who would you like to meet? My husband Idris Elba – failing that Michelle Obama My late grandmother, she was a stylish, self-educated, hardworking woman and people who write well like Philip French, the film critic at The Observer and music, too many artists to mention Never take no for an answer What three tips to give those wanting to pursue a career in journalism? · Learn your craft – get proper training · Write – even when you don’t have a position, there’s no excuse, get a blog · Read a lot – newspapers, magazines, blogs, and learn to adapt your writing to different publications Inspirational YOU speaker – Hepburn Harrison-Graham – Wednesday 18th April 2012 Hepburn Harrison-Graham worked as a professional actor from 1979-1991 and has appeared in a variety of films and TV programmes, including Dirty Rotten Scoundrels, Cry Freedom, The Firm and Eastenders. My stage work included a season at the Royal Shakespeare Company. In 1992 he began working for BBC radio sport. He started as a junior broadcaster but quickly became an assistant producer. During the formative years of radio 5 live he was fortunate enough to produce a wide range of programmes. Among them were. Hoops, an original programme about English basketball. Sports America, an insight into American sport, and Sunday Sport. During this period he also devised and produced a number of documentaries. The most notable being Across the White Line a four part series that chartered the history of black footballers in England. In 1996 he worked as a producer at the Olympic Games where, among other things, I produced a critically acclaimed radio documentary on Martin Luther King. Later that year he became a boxing producer, and was lucky enough to produce some of the most iconic fights in boxing history. Hepburn held that position for seven years before becoming an assistant editor. In 2008 he became the first black editor in the history of BBC radio sport. Inspirational YOU speaker – Janine La Rosa – Wednesday 18th April 2012 Janine La Rosa – Diversity Manager at Sky Janine is responsible for the development and implementation of Sky’s Diversity and Inclusion Strategy. This high profile role involves ensuring that recruitment, development and promotion opportunities are open to all and that talent and a good work ethic are the key criteria for a successful career at Sky. Janine chairs the BSkyB Diversity Comms Board which is responsible for aligning diversity and inclusion activities on and off screen to ensure that Sky represents the UK community. Janine has been at Sky for over 4 years and has worked across a number of business areas in that time. Before joining Sky Janine was a management consultant working in the UK and overseas. Janine is a member of the Inspirational You Board. Modern History, Economic History and Politics. What did you want to do when growing up? Barrister, pop star, teacher, doctor, house wife – I wanted to do all of these things for one day each week. How did you get a job at Sky? I spotted an opportunity on the WorkforSky website and applied directly The scope of my job is vast so every day is completely different. At the moment I’m developing a strategy to encourage up and coming female talent in Sky, setting our diversity goals for next year and reviewing the feedback from our work with the Mama Youth Project to encourage young people from underprivileged backgrounds into the media. I spend a lot of my time in meetings, developing diversity strategies and influencing key stakeholders – great thing is I’m never bored. What do enjoy most about your job? All of it, honestly! I’ve had a really varied career and this role plays to my strengths while allowing me to add a creative and passionate flair. If I had to pick one thing I most enjoy it would be the opportunity to work with and have an impact on all of the different areas of Sky. What tips do you have for someone wanting to break into media? Do your research. I am constantly asked to help people get ‘into’ Sky, which I’m happy to do but you need to have some idea of what you want to do as there as so many opportunities in so many different business areas. Make the most of every opportunity. If someone gives you the chance to gain experience in something new or to show you can add value to something make sure you take the chance as you never know where it might lead. Take ownership of your career. If you don’t like your current role develop a plan to get you to where you want to be. Accept that this may involve developing yourself outside of your current role and in your own time. It’s no one else’s responsibility to develop you so if you want something it’s up to you to make it happen. Inspirational YOU speaker – Liam Toothill – Wednesday 18th April 2012 Liam Tootill – Managing Director at SB.TV Sheffield university graduate Liam has been working at SB.TV since January 2010 and besides Jamal, is the longest serving member of the team. Wigan-born Liam got in touch with Jamal while working on his dissertation on the UK grime scene. Liam has also done some consultancy work for Simon Cowell‘s record label SYCO and has written for i-D magazine. SB.TV is an innovative ‘music and lifestyle’ youth media platform with a ‘Global’ reach. To date the channel has amassed over 100,000,000 views on the Smokeybarz YouTube channel. We are an online broadcaster come production team, and we understand our audience, because effectively, we are our audience. There are no particular boundaries at SB.TV which allows us a creative freedom when producing high quality, unfiltered, unbiased, content that we hope will serve as entertainment and inspiration. Having built something from scratch organically, which has now evolved into a powerful machine for artists to showcase their work; SBTV has never done this for any other reason than our passion for music and the creative industries. Liam what did you study at University? Who has influenced you? Family, friends and teachers. What charities do you support? The Damilola Taylor Trust/Spirit Of London Awards and ChildLine. Progress with Unity Inspirational YOU speaker – Ray Paul – Wednesday 18th April 2012 Ray Paul – Founder of The Playmaker Group Ray Paul’s career has seen him work for the BBC for over 20 years before starting his company, the playmaker group. While at the corporation, he worked for a number of radio stations, most notably running BBC London from 1997-2001. In 2001 he was asked to be part of the initial set up team that started a new digital radio station, 1Xtra. He held the position of Executive Producer of Specialist Music & Live Events for 7 years before moving to Radio 1 and being Head of Weekends in 2009. the playmaker group is a uniquely creative company who oversee a host of key areas in entertainment under one umbrella group. These areas include Media and Content Production, Event Production & Management, Representation and Consultancy & Training. They have a strong history & reputation of managing DJs, entertainers and artists on a national and international scale from BBC Radio 1, Capita FM as well as a vast consultancy experience working with various brands, celebrities, creative businesses, media and youth organisations to help facilitate and execute their plans, aims and objectives. Inspirational YOU speaker – Cookie Pryce – Wednesday 18th April 2012 Cookie Pryce – Fortune Cookie Marketing & PR Artist/Marketing/Communications Specialist for Music and Entertainment What is your background in the entertainment industry? I’ve had several years’ experience of working within the entertainment industries. Served 8 years as a signed recording artist ‘Cookie Crew‘ and have served over 15 years as a Corporate Marketing, Promotion, PR and Entertainment professional. I’m also a creative consultant (Fortune Cookie Marketing & PR) specializing in media relations, marketing campaigns, promotion, events, communications & pr. Who was the Cookie Crew? Cookie Crew’s career took off after winning a National Rap Competition at The Wag Club in 1985. After winning the competition, this was the beginning of what was to be a very success career. We went on to do lots of shows in London and around the country and as our reputation started to build we became a prominent and respected fixture on the Hip Hop scene, working with various dj’s and producers. I was a Chef at the Ministry of Defence at the time and my dream was to give up my day job to pursue a career as a recording artist. In 1986 we met the Beatmasters and was working with them on voiceovers for TV ads. We began working together and ended up recording ‘Rok Da House’ which became a hit single, followed by a 2nd single ‘Females’. Both were released on Rhythm Kings Records and opened us up to a more commercial audience and fan base. In 1988 we went onto sign an international recording contract with London Records (Polygram Worldwide) and also signed a publishing deal with Virgin/EMI. With this under our belts we were able to fulfill our dreams and go to New York to record with some of our favorite Hip Hop artists (Gangstarr, Blacksheep, Stetsasonic and Davy DMX). This gave us International exposure and we also worked with the likes’ of Roy Ayres and Edwin Starr. We delivered several hit singles and had the pleasure of touring with some of the greats during that time: Bobby Brown, Guy, Public Enemy, EPMD to name a few. We were also doing our own headline tours in the UK and toured extensively around Europe. When did you change career path? Around 1994, assisted by The Princes’ Trust, I set-up a promotions company organizing club nights, events and securing event sponsorship deals. From here I started working at MCA Records and in 1996 went to work for Universal Music. I went from strength to strength and have had the pleasure of working at some of the best companies in the world, absorbing how the international wheels turn. Who have you worked with in the music industry? I’ve worked the records of some of the biggest names in the music industry inc. Missy Elliott, P. Diddy, Brandy, Lil Kim, T.I., Lupe Fiasco, Musiq Soulchild, KRS-One, Raekwon, RZA, Eyrkah Badu, Mary J Blige, Blackstreet, The Roots, Tech Nine and Krizz Kaliko. I’ve worked for various Major and Independent Records Labels/Marketing & Entertainment Companies including: Universal Music-UK, Atlantic Records- UK, Koch Entertainment New York, SMC Recordings-San Francisco, Strange Music Inc.-Kanas City, Propas International Rights Management-Canada, RSK Entertainment-UK, Timezone International-New York, MOBO and AEG/The O2. What are you working on at present? All my experiences and job opportunities over the years’ have enabled me to set-up on my own company offering a bespoke consultancy service to the music industry (UK & US). My knowledge set the foundations, for me to continue a career within the industry. Having spent years as a music fan and then a recording artist, I was able to migrate my skills and knowledge over to the other side of the business. Do you support any charities? My charitable interests lie with young people and education! I’m also a member of Diaspora UK, a non-profit Music Foundation supporting equality in the British Music Industry. Inspirational YOU – Invest in YOU Media Master Class – 18th April 2012 Inspirational YOU presents Invest in YOU – Succeeding in the media master class at Pearson, 80 Strand London WC2R 0RL Wednesday 18th April 2012 from 6-9pm Inspirational YOU presents an evening masterclass featuring five professionals from the world of TV and radio. Our panellists have ran national radio stations, lead teams of 100’s on news stories across the globe and have worked with A list celebrities throughout the world. They all started their careers from very humble backgrounds and are now leading the way by influencing what we see and hear via the media. Janine LaRosa – Diversity Manager at BSkyB Ray Paul – Founder of The playmaker group, ex- BBC 1Xtra / Radio 1 Executive producer Hepburn Harrison-Graham – Former Editor, BBC Radio Sport Cookie Pryce – Marketing and Communications Manager at AEG/The O2 Donna McConnell – Show business Editor at Mail Online Liam Tootill – Managing Director at SBTV Charlene White – Journalist and Presenter (Host) & supporter of Inspirational YOU. Supported by Pearson This masterclass is ideal for social entrepreneurs, students, business leaders, those in media, events, journalism, marketing, aspiring entrepreneurs or those who want to network and raise their profile. Learn how you can get ahead in the media. Learn how to get noticed and be effective so you can get radio or TV coverage. Learn the tips and tricks needed to build your brand and create a niche brand. Hear how you can bounce back after rejection from journalists and producers. Adapt the skills needed to excel when you do not know anyone in the industry. Find out the various opportunities in the media. Understand what makes your story newsworthy and what doesn’t Learn how they have sustained their careers and how you can too. Network and build your contacts. Tickets £0.00 – 10.00 – http://IYmediamasterclass.eventbrite.com Info: bookings@inspirationalyou.co.uk / 07545 156 111 Last few days to book your ticket to attend Inspirational YOU – Saturday 31st March 2012 Inspirational YOU – Educate. Connect. Empower. Birkbeck College, University of London, Torrington Square, London, WC1E 7HX Inspirational YOU returns on Saturday 31st March, 11am-6pm with another powerful line up of speakers who will inspire, support and give industry tips. This is a fantastic opportunity for individuals to meet some of the UK’s most influential professionals, academics and leading entrepreneurs. Speakers come from Tooks Chambers, Old Bailey Chambers, Guardian, ITV, Ernst and Young, The Voice, CNN, The Mirror, Deloitte and PwC. Speakers include Garry Green Barrister – Tooks Chambers Joseph Harker Assistant Comment Editor of The Guardian Rodney Hinds Sports & Features Editor at The Voice newspaper Jonathan Deverill Partner at DMH Stallard LLP David Neita Barrister, Poet and running for Mayor of London Anne-Marie Imafidon Director at Avisami, Eldest child of Britain’s brainiest family & business Analyst at international investment bank) Arti Lukha News Editor, ITV News Tyrone Edward Director at Ernst & Young Hannah Musisi Business Development Manager, CNN International, Turner Broadcasting Tickets: http://inspirationalyoumarch2012.eventbrite.co.uk Tickets to the event are limited at £5.00 and are free to University of London students. Email: bookings@inspirationalyou.co.uk or telephone 07545 156 111. Inspirational YOU – This Saturday 31st March at Birkbeck, University of London Inspirational YOU master class - 2012, What's on What are you doing on March 31st that will give you access to a range of highly talented professionals who are willing to share their key areas and pointers from their career success with you? Nothing! Well you can come along to the first 2012 Inspirational you where you’ll have just that. A fantastic opportunity for you to meet some of the UK’s most influential professionals, academics and leading entrepreneurs. Speakers come from Tooks Chamber’s, Old Bailey Chamber’s, The Guardian, ITV, Ernst and Young, The Voice, CNN, The Mirror, Deloitte and PwC. Garry Green – Barrister – Tooks Chambers Joseph Harker – Assistant Comment Editor of The Guardian Rodney Hinds – Sports & Features Editor at The Voice newspaper Jonathan Deverill – Partner at DMH Stallard LLP David Neita – Barrister, Poet and running for Mayor of London Arti Lukha (News Editor, ITV News) Tyrone Edward (Director at Ernst & Young) Hannah Musisi (Business Development Manager, CNN International, Turner Broadcasting)
cc/2019-30/en_middle_0029.json.gz/line4097
__label__cc
0.554651
0.445349
explore All Salish Sea Coverage↝ Salish Sea in focus ⬿ Northwest Indians Oppose Transport and Export of Fossil Fuels: Tribes Target Goldman Sachs Shareholders On May 16, the Affiliated Tribes of Northwest Indians (ATNI) unanimously adopted a resolution entitled Oppose the Proposals for the Transportation and Export of Fossil Fuels in the Pacific Northwest. In this resolution, the 57 ATNI Tribes of Oregon, Idaho, Washington, southeast Alaska, Northern California, Nevada and Western Montana voiced, “unified opposition to investors such as Goldman Sachs, as well as the transporters and exporters of fossil fuel energy, who are proposing projects in the ancestral territories of ATNI Tribes.” From the Powder River Basin of the Northern Cheyenne, through the Columbia River to the Salish Sea, ATNI Tribes believe it their sacred duty to protect their ancestral territories and natural resources. As such, the ATNI resolution specifically calls out support for protection of the Lummi Nation’s treaty-protected fishing economy and sacred places that would be affected by the proposed Gateway Pacific Terminal (GPT) at Cherry Point, Washington. According to Lummi Nation Councilman Jay Julius, the GPT coal export terminal — planned to displace 3,500-year-old Lummi burial grounds — would result in, “irreversible and irretrievable damage to our spiritual values.” As I noted in my May 5 article White Power on the Salish Sea, the Wall Street/Tea Party convergence supporting GPT has emerged as a threat not only to endangered species like the Orca whale and Chinook salmon, but also to the continued existence of democratic functions of governance. As the Wall Street/AFL-CIO alliance attempts to stampede local and state authorities, the Anti-Indian Movement is gearing up for a multi-year, multi-pronged offensive to undermine environmental protection and tribal sovereignty. As Ken Toole of the Montana Human Rights Network remarked in his 2000 report Drumming Up Resentment, “in this last iteration, the elimination [of Indian people] is not by the murder of individuals, but by the termination of their structures of self-governance, the taking of their resources, and by defining them as part of ‘the rest of the country’ through forced assimilation.” Download the resolution (right-click & save as)
cc/2019-30/en_middle_0029.json.gz/line4099