text stringlengths 9 94.9k |
|---|
This webinar presents the results of a pilot feasibility study and follow-up trial from Kisumu, Western Kenya, testing the value of providing menstrual cups to school girls. It outlines the effects and the costs of menstrual-specific intervetions versus broader initiatives have on adolescent girls’ sexual and reproductive health; school enrolment, retention, and attainment. |
The webinar highlights the new tools are under development to assess the outcomes of menstrual health programming on girls' related self-efficacy, stress, and school participation. |
Oral diseases are among the most common diseases worldwide, particularly for school-age children and adolescents. They pose significant public health problems for all countries and entail substantial health, social, and economic impacts. |
Caroline Hilari, Margarita Franco: What is Needed to Improve Food Sales in Schools? Food Vendors’ Opinion from El Salvador, Frontiers in Public Health. 2015; 3: 168. |
World Health Organization, 2011. Intermittent iron supplementation in school and school-age children. |
World Health Organization, 2010. Set of recommendations on the marketing of foods and non-alcoholic beverages to children. |
World Food Programme Website on School meals. |
How do you ensure different sources of food and nutrition in schools? |
This webinar focuses on how mental health programmes and teacher training can be delivered and sustained in low resource countries. |
Dr Kutcher's presented recent findings of a review of relevant research, reports and resources on school mental health in low resource countries. The webinar touched on how mental health programmes and teacher training can be delivered in low resource settings. |
The positive and negative aspects of mental health relevant to low resource settings. |
Accessing the skills, information and resources to provide basic adolescent mental health services. |
The School Heath Integrated Programming (SHIP) initiative is a global programme that tsupports governments to mainstream school health and nutrition interventions into national education sector plans. The initiative is focused on two cornerstones of school health and nutrition: deworming and vision screening. These two simple interventions can be used as a platform for other interventions. |
As part of the programme the initiative worked with governments in Cambodia, Ethiopia, Ghana and Senegal, to distribute treatments for intestinal worms and screen the eyes of 40,000 school children, giving glasses to those who need them. |
Health Promoting School: an effective approach for early action on NCD risk factors. Geneva: World Health Organization; 2017. |
Following up on the recent publication of a UNODC-UNESCO-WHO guidance document, this session will review and discuss the research and practice on programs preventing substance abuse, including alcohol and tobacco. |
This webinar will be interactive, with remarks from several experts and practitioners, leading into a discussion among all attendees. Different aspects, effective strategies and challenges will be discussed. |
A series of findings from a recent review of research, reports and resources relevant to low resource countries, presented in the form of a mini-Delphi consultation, will be circulated and discussed as a backdrop and eventual product of the session and follow-up. |
Stefan Witek-McManus, London Applied & Spatial Epidemiology Research Group, LSHTM. |
Stefan Witek-McManus, highlights the results of study into the impact of Learner Treatment Kit (LTK)in schools in Malawi. This innovative study looked at the effectiveness of training teachers to use LTKs - simple first-aid kits containing malaria rapid diagnostic tests and artemisinin-based combination therapy, to manage uncomplicated malaria and other basic health problems experienced by primary school children. |
To mark this year's International School Meals Day the FRESH webinar will be focusing on the impact that the McGovern–Dole International Food for Education Projects is having on the education, child development and food security of low-income, food-deficit communities of Guatemala. |
Jenelle Babb, UNESCO; Julie Hanson Swanson, USAID; & Hassan Muluusi, Raising Voices, Uganda. |
This webinar will explore tools and approaches for preventing, measuring, monitoring and responding to school-related gender-based violence (SRGBV), based on evidence and country experiences. |
SRGBV affects millions of children and young people, cutting across cultures, economies, peoples and practices. It constitutes a major barrier to children’s ability to learn and develop, and is correlated with lower academic achievement. |
Ending school-related gender-based violence is a priority for countries wishing to achieve ambitious global goals on inclusive and quality education for all, good health and well-being and gender equality. |
This webinar discusses the role of education sector in contributing to the prevention of drug use and other risky behaviours, and introduce the types of school based approaches found effective for preventing later substance use. |
Dr Aurino discusses the initial findings of a large scale impact evaluation of the Ghana School Feeding Programme on the health and educational outcomes of children and the incomes of local small holder farmers. |
Rachel Pullan discusses the importance of mapping worm prevalence as a means to design and target effective school based deworming programmes. |
Laura's webinar presents initial research findings from the Enhanced School Health Initiative, an innovative collaboration with the Government of Ethiopia to assess the effectiveness of integrating multiple school health and nutrition programmes in Southern Ethiopia. |
Selections from the installation The Prepaid Piano, recorded 21–24 February 2013 during the Unmenschliche Musik/Inhuman Music exhibition at Haus Der Kulturen Der Welt, Berlin. |
Inside a grand piano, five mobile telephones rest directly on the strings in five different areas of the piano soundboard. Calling any one of the telephones activates its vibration alarm, thereby directly ‘playing’ the strings on which the phone happens to be lying. |
Audience members choose which parts of the piano are ‘played’ by calling any of the five telephones’ numbers — either from their own mobile phones or from the provided stationary telephones. |
Contact microphones attached to the piano’s soundboard pick up the sounds of the mobile phones vibrating the piano strings and pass them on to a voltage-controlled modular synthesizer. |
Incoming signals above a pre-determined amplitude threshold at the synthesizer’s input trigger its recording and modulation functions. The incoming audio is looped and modulated by the synthesizer and played back through stereo loudspeakers. |
Subsequent calls to the phones produce new incoming signals that gradually displace the previously recorded audio. Additional layers of sounds are added by intermittently tapping and knocking on the piano, manipulating its strings directly, repositioning the mobile phones, etc. |
Co-published by Entr'acte and Senufo Editions, 2014. |
A few years ago I wrote an essay about how experimental music can be really funny, even when – sometimes especially when – it’s serious. Andrew Pekler’s work is proof. He investigates some heavy sonic concepts, but there’s always a sense of play and absurdity running though his music. Follow his winding lines closely and they become a series of set-ups and punch lines, or a collage of wordless puns. |
The title of his latest project, The Prepaid Piano, is a literal pun, playing off the serious concept of Prepared Piano (i.e. piano altered by placing objects inside it). But it’s not just a funny line. It reflects Pekler’s process of placing prepaid cell phones inside a piano, which vibrate the strings when the audience calls them. The result is bubbling, cartoon-ish music that’s also eerie, dramatic, and evocative. There are echoes of electronic music’s original prankster, Raymond Scott. But Pekler has a unique brand of sonic alchemy, which plays even better on side B, Replayed, where he ultra-MIDI’s the sounds from side A. He sees humor where others might see seriousness and vice versa, and that uncanny vision makes The Prepaid Piano & Replayed one of the best albums of the year. |
The final visit day before my Big Birthday Bash was to Project BR-458 to visit Jessica, Cristian and Ana Cristina. |
I previously sponsored all three of these kids and visited twice but my friends Cathy Ward (Cristina) and Amanda and Bruce Newton (Jessica and Christian) took over the sponsorships when I moved to the Philippines in 2014.. |
I have written a lot about my connection with Ana Cristina. She was my first sponsored child from Brazil, God used her tragic family situation to move my heart and I ended up sponsoring and visiting 12 kids from the same area over the next few years. My visit to her family home in 2013 was among the hardest days of my life. Seeing the reality of their lives crushed me, and reminded me that poverty is a beast and Compassion is not some sort of magical instant quick fix, but a long term process. |
I was looking forward to seeing Cristina again and I remember thinking it couldn’t possibly be a harder day than last time. How wrong I was. |
The day started off so well. We were welcomed by lots of joyful noise and a confetti shower by a group of curious kids. |
I met 12-year-old Jessica and her sister Gizelle. |
I learned that Christian was at school and I would meet him in the afternoon. They also mentioned that 16-year-old Cristina was away having tests for a potentially serious medical issue. Wow. So much for an easier day. |
Fair to say this played on my mind all day but I was aware of the need to stay present and engaged for the other two visits. I re-introduced myself to Jessica and Gizelle and went through some photos. I got out the Uno and elastics and we had a play before the home visit. |
Jessica and Gizelle live with their mum and five-year-old younger brother. We also met their 10-year-old uncle (Mama’s little brother). We teased him in a friendly way about whether his (older and taller) nieces obeyed him. There is no father at home. Their mother has her own sewing machine and has a job sewing lace onto bras and underwear. It is not stable or consistent. Both girls were very shy and I struggled to get much out of them. Jessica was unsure when I asked her about her future, what she wanted to be etc. My guess is that the people in her community just see what’s in front of them. I encouraged Jessica that God has given her gifts and abilities, even if she was unsure about what they were at this stage. |
Little bro didn't want to be in a photo, so I had to take this sneaky shot. |
We went back to the Project for lunch, where I was met with more bad news. Cristina had to go to another medical facility for different tests and I would not be meeting her on this day. There was also a possibility that she would not be attending my birthday the following day. This left me shattered and I pleaded with Renato to do everything he could to ensure that I was able to see her. |
Despite Cristina’s absence we still went to visit her mother. |
She was there by herself, as her husband and four daughters were out and about. Last time I visited they were living in their grandmother’s house, now they were living next door. I did my best to rustle up some conversation, and she was more open and honest than on my previous visit. As it was election time they were employed as one of the thousands of people waving flags and handing out pamphlets for the election candidates. It’s only temporary and they have nothing else. I found out her oldest son was in jail for riding a stolen motor bike. She was convinced he did not steal it himself. We had a look at a couple of Cristina’s ultrasound results and prayed for the family. |
After this it was time for the third home visit of the day, to the house of Christian and his parents. We were told that normally after school he goes straight to his grandparents house, as it’s closer, but when we arrived there we found out that he had already headed home. His grandfather came with us to direct us to the house. |
I visited Christian back in 2012 and 2013. His parents have had a rocky relationship but that changed about four years ago when his father genuinely gave his life to Jesus. Now their whole existence revolves around church activities and sharing the gospel. His father was a smiley, friendly chap who is the resident “fix-it guy” and has a workshop next door to their house. I had a chat with Christian, the highlight of which was when he got out his guitar and strummed a few chords. |
Time was running out so we headed back to the Project for a final play. I entertained a group of kids with pictures of my family and some Australian animals, then we got out the footy which was once again a big hit. |
Despite the news about Cristina, which had the potential to overshadow the whole day, my visit to BR-458 was a positive experience this time around. I was thankful to God that he enabled me to be present and engaged for the remainder of the day. |
I can't imagine how hard it was to focus on your visits after hearing about Ana Cristina!! But I'm so glad your other two visits went well and that God opened the way for you to see Ana Cristina. |
I think i’ve been doing the liquid stage all wrong!!!!! |
Can you drink watermelon juice post op gastric sleeve? |
When can I try some skinless meat? |
What stage can I eat chopped meat? |
Let's Play Another Round of "How Much Am I Eating Now?" |
Is Watermelon ok to eat? |
Adding Fruits into Your Shakes? |
Let's Play A Round Of: How I Get My Protein Post WLS! |
Diet - Are you having a hard time getting all of your liquids, protein, etc.? |
Coffee after weight loss surgery? |
USENIX assembled an impressive speaker lineup of security researchers and practitioners to help introduce the Enigma brand. Together, those presenters provided some unique perspectives on challenges in the digital space, including cybercrime, debugging, and security usability. |
To wrap up the conference and to drive home the central theme of protecting against attacks, the event’s program committee selected Rob Joyce to deliver the closing session. |
As chief of the Office of Tailored Access Operations (TAO), a division of the National Security Agency which actively engages in “computer network exploitation” against systems used by entities foreign to the United States, Joyce works with a team of hackers to produce foreign intelligence for a wide array of mission types. He knows firsthand why and how nation-state hackers succeed, and he knows what types of activities frustrate his team’s offensive campaigns. That is why he chose to speak at Enigma about what nation-state defenders and corporate organizations can do to protect themselves against advanced persistent threats (APTs). |
In the first stage of an intrusion, a nation-state attacker takes the time out to understand their target. That begins with scanning, researching important people and email addresses associated with the target, looking up open-source information regarding the organization or government, and documenting everything they find on the network. Joyce explains that while defenders might know what technologies they intended to use on a network, attackers know what’s actually in use on that network. They also spend the time learning the security functionalities of those devices and finding vulnerabilities they can exploit. |
Defenders can stop an intrusion at the reconnaissance phase if they are willing to invest the time and energy necessary to understand what devices are installed on a network and to familiarize themselves with those products’ security functionalities. As part of that process, they should lock down and disable whatever devices aren’t in use, conduct (and then act upon the results of) penetration tests, and shore up the network trust boundary so that they can concentrate primarily on protecting the “crown jewels” of the organization. |
If defenders are unable to stop nation-state hackers after they’ve conducted reconnaissance, those hackers then look for an initial exploitation vector by which they can gain access to their target’s network. This phase usually takes the form of spear-phishing, water-holing attacks, exploiting a known CVE vulnerability, or conducting SQL injection. Many people think nation-state attackers primarily use zero-day vulnerabilities to compromise a target. But that’s not generally the case. According to Joyce, attackers can achieve exploitation in most corporate networks using easier and less-risky exploits than zero-days by being patient and focused. |
Attackers won’t be able to get past the initial exploitation phase if defenders continually update their space using CVE information and make sure their networks aren’t relying on users to always make the right decisions. That effort involves developing policies and technical enforcement that incorporate anti-exploitation features (such as Microsoft EMET) as well as guidance from NSA Information Assurance Directives and other respected sources. To further foil the plans of nation-state hackers, defenders can develop a baseline for “normal” behavior, make use of network logs, and follow best security practices, such as by setting the least amount of privileges for accounts, segmenting off parts of the network, and whitelisting applications. |
Attackers who achieve initial exploitation ultimately seek to establish persistence in the network. They commonly do so via privilege escalation, finding the Run Keys, or getting into scripts. |
To prevent advanced hackers from doing anything else, organizations and governments can use application whitelisting. Most organizations have assets that should be protected and segmented off from the rest of the network. Whitelisting applications help prevent attackers from running malware or something unusual on those business-critical assets. |
Once nation-state hackers are sure they can hang around in a network and not get caught, they can initiate their malicious activity by installing tools. Attackers usually begin with small tools that can eventually bring down heavier, more advanced scripts and programs–the ones that do the “real” work. |
Anti-virus software can only do so much when it comes to preventing malicious tools from running on a computer. The same cannot be said, however, for reputation services. Everything that wants to run is hashed and sent to the cloud via the reputation service. That service then sends back a report. If something has been run only once or twice before on the public web, it’s a good idea for defenders to prevent that item from running. Additionally, reputation services can also help block attackers from communicating not only with known malicious domains but also suspect domains that don’t have a good reputation. |
With the help of some tools, attackers can then begin to move laterally around the network to find what they’re really after. |
Defenders can stop attackers in their tracks by practicing network segmentation and monitoring, restricting privileges, enabling two-factor authentication on all accounts, and creating processes that can help ensure the security of a remote connection. |
At this point, the defenders completely own their target. All they need to do is get what they need, get out, and leave undetected. |
No organization wants to follow the example set by Sony Pictures Entertainment and learn about a breach after attackers have already posted sensitive information online. Defenders should therefore have processes in place that monitor for unusual data transfers or corruption. They should also have a backup plan in place in the event hackers steal or erase a target’s data. |
Organizations can’t protect themselves from every type of hacker or every form of intrusion. But by getting to know the devices and applications installed on their network, they will be better equipped to detect an intrusion and prevent attackers from stealing valuable information. |
Keeping an inventory of all network devices is one of the most important steps when it comes to endpoint detection and response (EDR). To learn about some of the other components of an effective EDR strategy, please click here or download Tripwire’s free eBook Endpoint Detection and Response for Dummies here. |
business law services | | The Law Office of Wesley Scott Jones, P.C. |
Forming a Corporation to start or operate a business in North Carolina can be beneficial to the business owners in two important ways: 1) it can help prevent the business owner from paying too much in federal and state income taxes and 2) it can help protect the business owners from incurring Personal Liability for acts carried out by the business. |
So what are the main steps in forming a North Carolina Corporation? |
You must select a Business Name and make sure that name is available for use in North Carolina. |
You must file proper and complete Articles of Incorporation with the North Carolina Secretary of State. |
Before filing the Articles of Incorporation, you must determine the number of shares the corporation will be authorized to issue (Issued Shares), the class of shares to be issued, who will serve as the Registered Agent, what will be the Registered Agent Address, and who will serve as the Incorporator. |
After the Articles of Incorporation have been filed, must must hold an Organizational Meeting. |
At the Organizational Meeting, you must elect Directors, appoint Officers, adopt a set of Bylaws, adopt a Corporate Seal, and issue Stock Certificates to the business owners (called Shareholders). |
Before operating the business, you will want to apply for a Federal Identification Number (EIN Number) and State Identification Number for banking and tax purposes. |
If you qualify and wish to be treated as an S-Corporation for tax purposes, you must complete and file IRS Form 2553. |
Other Considerations: Should you file an Assumed Name Certificate? Do you need a Privilege License to operate your business? Do the business owners need a Shareholders Agreement? When should you file your first Annual Report with the North Carolina Secretary of State’s office? What Corporate Formalities should I follow to keep my corporation valid as a legal entity? |
If you are planning to form a North Carolina Corporation, the foregoing topics are just a few that a business owner must successfully navigate through to begin operating a business. If you need help or advice, call an experienced Business Attorney. Call Wesley Scott Jones now at 910-256-5800 for a free telephone consultation. |
Wesley Jones is a Business Lawyer serving in Wilmington, North Carolina serving all of Southeastern North Carolina including New Hanover County (e.g. Wilmington, Kure Beach, Wrightsville Beach, Carolina Beach and the areas of Ogden, Masonboro, Myrtle Grove, Landfall, and Mayfair), all of Pender County (e.g. Burgaw, Surf City, Hampstead and Topsail Beach) and all of Brunswick County (e.g. Bald Head Island, Bolivia, Calabash, Leland, Shallotte, Southport, Saint James, Ocean Isle, and Oak Island). |
The following are just a few of the Business Services that Wesley Scott Jones provides to clients: Forming new Corporations and Limited Liability Companies, drafting Articles of Incorporation, Articles of Organization, Shareholders Agreements, Organizational Minutes, Operating Agreements, Annual Meeting Minutes, Bylaws, Annual Reports, Assignments, Board of Director’s Meeting Minutes, Business Entity Startup and Formation, Representing clients who are Buying or Selling a Business, Business Dissolution and Liquidation, Contract Review and Drafting (including Non-Compete or Noncompetition Agreements, Confidentiality Agreements, and Nondisclosure Agreements), Due Diligence Research, Leases, Licensing, Non-Profit Corporations, Non-Solicitation Agreements, Professional Malpractice, Promissory Notes, and Regulatory Compliance. |
The Parties will need a Bill of Sale and Assignment of Property. |
The Buyer should determine if it needs to form a new Business Entity with which to buy the Seller’s assets. |
The Buyer should consider whether it wants or need a Noncompetion Agreement with the Seller and/or the Seller’s Shareholders/Members, and/or Key Employees. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.