{"content": "Platonic Solids and Sacred Geometry\n\nPlatonic Solids and Sacred Geometry explained. Platonic Solids represent the sacred geometry that exists in all of nature. Platonic solids are the builders of form and their individual, unique vibrational frequencies bring balance, wholeness and a “oneness”, therefore can be used to remind the cells of one’s physical vehicle of their perfect form by the re-alignment and polarization of energy.\n\nWhen the energetic vibrations within the cells of one’s physical vehicle are out of alignment with the etheric (energetic) blueprint of the perfected form, life force energy is not able to flow unhindered and thus becomes distorted, resulting in disturbances within one’s energetic fields which can cause physical, emotional and mental issues.\n\nThere are five main three-dimensional shapes that make up the geometric-shaped Platonic solids. Each has specific (mathematical) structural qualities, an associated element, and a corresponding state which represents specific “forms”.\n\n\nThe tetrahedron has four triangular faces, its element is fire and its state is heat which represents the “Divine spark”. The form of creativity, original ideas, and inspiration. Fire also represents heat to warm and nurture or heat to destroy and transmute.\n\nWhen not aligned the disturbance can cause one to lack motivation, feel despondent, dull, unbalanced, or have no joy or happiness in life. Physical issues include hot flashes, fevers, thyroid problems (regulation), and blood pressure. When polarized one becomes balanced, motivated, joyful, happy, and has a zest for life.\n\n\nThe hexahedron has six square faces, its element is earth and its state is solid which represents foundations and structure. The form is organized, structured ideas, supported, security, and strength of conviction.\n\nWhen not aligned the disturbance can cause one to feel ungrounded, unsupported, insecure, fearful, and alone and one’s life has no meaning or structure. Physical issues include skeletal, back, and kidney problems. When polarized one feels grounded, secure, strong in mind and body, and has the courage and a positive attitude to life.\n\n\nThe octahedron has eight equilateral triangular faces, its element is air and its state is gas which represents mental processes. The form is mental focus, positive thoughts, ideas, and outlook.\n\nWhen not aligned the disturbance can cause one to be unfocussed, confused, uncertain, or not clear as to one’s life’s experiences, and negative in one’s thoughts. Mental health issues include depression, obsessive and control disorders, and behavioural problems. When polarized one is focused, positive in thought and action, and has clarity as to one’s life’s purpose allowing for intuition to flow.\n\n\nThe icosahedron has 20 triangular faces, its element is water and its state is fluid/liquid which represents emotions. The form is emotional balance and the ability to “go with the flow” of life’s experiences.\n\nWhen not aligned the disturbance causes one to be emotionally unbalanced/unstable, consumed and overcome by emotional issues, and feels that one is the victim in life’s experiences. Physical issues include water retention and fluid imbalances, and bladder problems. When polarized one is emotionally balanced and stable, able to flow and adapt to life’s experiences.\n\n\nThe dodecahedron has 12 regular pentagonal faces, its element is the ether and its state is the spirit which represents the Universe and connection to all that is (wholeness). The form is the balance between spirit and matter, “as above so below”, “Heaven on Earth”.\n\nWhen not aligned the disturbance causes there to be no connection to one’s soul (spirit), lack of faith, disillusioned with life and looking outward not inward for guidance. Physical issues include heart and nervous system problems. When polarized one is connected to one’s soul and “all that is”, acceptance on all levels, has a “oneness” with all things, an inner knowing, and at peace with oneself and others.\n\nEmoche ᛜ Gemstones & Jewelry", "pred_label": "__label__1", "pred_score_pos": 0.9105479121208191} {"content": "Pride and Prejudice is the most well-known work of Jane Austen and is certainly one of the most essential novels in the wonderful world of literature. Austen’s writing talent was praised by Walter Scott, Virginia Woolf, Richard Arlington and many more. Her language is smart and beautiful, the rural England of the XVIII century that hosts the events of this novel is marvelously depicted, and the relationships of the characters develop like an intriguing and graceful dance. The love story of Mr. Darcy and Miss Elizabeth Bennet, who managed to over come their pride and prejudice, is the story with a happy ending so many people crave.\n\nPride and Prejudice Setting: Cultural and Historical Background of the Story\n\nMcdougal doesn’t specifically divulge the full time at which the novel happens. Historically, it’s a known fact that Jane Austen had written the book between 1796-1797, however it was only published in 1813. The writer edited the novel before it absolutely was published, meaning that the book reflects the customs and traditions of the 1790s up until the 1810s. The events begin in September and unfold during one calendar year.\n\nFor the readers, it’s crucial that you keep in mind the cultural back ground of those times: this was the time scale when wealth was measured in estate, status was both a privilege and a duty to upkeep, and women enjoyed not as freedom than they do today. Female children were considered to be a burden, unless they could marry someone who could take care of them—and preferably their family aswell. The vicious cycle was manifested in the fact that, unless a girl comes into the world into a rich family, her chances of locating a rich husband were more or less nonexistent. Men often took advantage of their position and made nearly all of women’s decisions for them.\n\nOrder an Essay Now & Get These\nFeatures For Free:\n\nTurnitin Report\nTitle page\nPlace an Order\n\nPride and Prejudice Book Characters\n\nThe story develops around the five Bennet daughters and their friends, who've several candidates for their husbands, but not them all play a significant role in the text.\n\nKey Characters\n\nDespite his wealth, Mr. Bingley is just a quite simple man, who doesn’t like to brag about his status. He's described in the beginning of chapter 3 to be “good-looking and gentlemanlike; he had a pleasing countenance, and easy, unaffected manners. ” Bingley is definitely an open-minded and positive man who enjoys talking to and meeting interesting people. He's sincere and follows his feelings. His friend is very the opposite of him; Mr. Darcy has a lot of pride and is convinced of his uniqueness and importance. He keeps to himself and wants to be across the chosen circles. The nature of the relationships of the 2 young men reflect their personalities. Jane Bennet and Bingley are both simple and trusting; they like each other from the beginning and are clear about their feelings. Jane is the eldest of her five sisters, and is just about the most trusting and naïve. She is beautiful and sweet.\n\nMrs. Bennet and Bennet sisters\n\nDarcy and Elizabeth’s relationship differs. They both have extraordinary personalities and chose to have a love/hate relationship. Elizabeth Bennet is really a bright young woman; she actually is independent, smart, quick-witted and true to herself. She actually is stubborn and persisted:\n\nChapter 20 “Though her manner varied, nevertheless , her determination never did”\n\nHer elegance and tenderness appear, even when included in her pride. Darcy’s prejudice repels her and turns sympathy in to dislike. Their dialogues, initiated through mutual interest towards each other, quickly turn into a verbal duel between their two strong personalities. The couple will have to work-out their differences to finally be together in the end.\n\nBut character isn't the only thing that gets in the form of the couples reuniting. Mr. Collins takes advantage of the problem in which he'll inherit the Bennet's home, and really wants to marry Elizabeth to “save” her. William Collins is really a “tall, heavy-looking young man of five-and-twenty. His air was grave and stately, and his manners were very formal” (end of Chapter 13). He's a shallow and uninteresting man, who knows how exactly to please, but doesn’t learn how to be pleasant. Despite his downsides, that he gets to marry Elizabeth’s companion, Charlotte Lucas. Charlotte was “a sensible, intelligent young woman, about twenty-seven” (Chapter 5), and being single at that age put a lot of pressure on her. Mrs. Bennet even used to state that “Lucases are a very good type of girls... This is a pity they're not handsome! ” (Chapter 9).\n\nDon’t Have Time to Finish Reading All of This But still need that essay?\n\nUse our \"write my essay online\" service and get your paper in no time!\n\nGet Writing Help\n\nSecondary Characters\n\nThe head of the family, Mr. Bennet, is recognized as to be a man of noble origins. He's solid, apathetic, tends to have a notably fatalistic perception of life, and is sarcastic towards himself and people around him. He is specially sarcastic towards his wife, Mrs. Bennet, who really can’t boast of either high intelligence, nor family orientation or looks. Mom of five daughters is silly, blatantly tactless, and overly self-centered.\n\nLooking at older Mrs. Bennet, it’s no wonder Miss Caroline Bingley strongly protested her brother’s marriage with Jane; she only cared about her status and didn’t want to be of a family of such poor manners and origins. Another selfish personage in the story is lady Catherine de Bourgh. She's Darcy’s aunt and Mr. Collins’ boss— she “has very lately given him (Collins) a living” (Chapter 16). This woman doesn’t care about people’s feelings and only sees things at the surface value.\n\nAunt and Uncle Gardiner are relatives of the Bennet girls privately of their father. They are successful and well-educated. Jane and Elizabeth discover the support and advice they couldn’t find from their mother in Mrs. Gardiner. The sisters spend some time traveling around England with them — which allows girls to reflect more on the relationships in their lives.\n\nMary Bennet could be the middle sister of Jane and Elizabeth. She frequently likes to speak about morality, and lives mostly in her books. Younger Bennet sisters are given not as attention in the book and are portrayed as rather frivolous trouble-makers; Lydia Bennet and Kitty Bennet quickly fall for the uniform and arms of the officers, and Lydia even runs away with one of these — George Wickham. Mr. Wickham holds a grudge against Darcy and tells lies to shame her — when in fact that he was usually the one who tried to make a proceed Darcy’s shy underage sister, Georgiana Darcy. From Elizabeth’s example, Georgiana learns how to voice her mind and realizes that a woman can allow herself to speak with her husband in a way that no little sister can.\n\nFull Summary of How the Love Story in Pride and Prejudice Unfolds\n\nThe story begins with Mr. Bingley getting into the most luxurious Netherfield Park mansion in your community — regarding his sisters and their friend Darcy. Bingley is young, rich and single. It looks like a perfect solution for the Bennet family, who have five single daughters and are preoccupied with getting them married to secure the financial wellbeing of these family. 1 day, Jane Bennet is invited over for supper, but she becomes ill once she arrives. Elizabeth comes to Netherfield to take care of her sister. That’s how the two couples – Jane and Mr. Bingley, and Elizabeth and Darcy – meet and develop an interest in each other. Later, Mr. Bingley and his sisters visit Bennet’s mansion to invite them to the ball they are hosting.\n\nMr. Bingley and Mr. Darcy\n\nAt precisely the same time Mr. Collins (Mr. Bennet’s cousin, and sole successor to your family estate—as you will find no male heirs to the Bennet family) concerns visit the family. He wrote a letter sometime before announcing his visit with the intention to choose one of many Bennet girls as his wife. That he selfishly expects that all of these will want to marry him to make it to keep their family mansion and is surprised when Elizabeth turns down his proposal at the ball. After that, determined to find himself a wife, William Collins proposes to Charlotte Lucas, who agrees, simply out from the social pressure, to get married.\n\nThe Bingley sisters realized that their brother might disgrace the whole family by marrying Jane, who is maybe not of their class. They do everything they are able to to separate the couple, and finally make him move away to London. After some time, Jane and Elizabeth Bennet also arrive in London. While visiting her friend Charlotte, Elizabeth meets Darcy again. They re-engage in sharp dialogues. Darcy confesses that he loves Elizabeth and proposes to her, but does it in such a snobbish manner that Elizabeth turns him down. However , his act did change just how she considers him, and the dislike she had for him changes in to something more technical and deep.\n\nA day later Darcy writes a long letter to Elizabeth in which that he comes clean, sincerely explains why that he interfered in the relationship between Jane and Mr. Bingley (which that he sincerely regrets), and explains that the stories Mr. Wickham tells about him are lies. Elizabeth changes her attitude towards Darcy, but doesn’t initiate to tell him. The next time the lovebirds see each other is when Lizzy travels with her aunt and uncle to visit the Pemberley estate that belongs to Darcy. She hears people saying good reasons for him, and Darcy himself behaves quite gallantly around people. 1 day, Darcy sees Elizabeth in tears after she discovers that her younger sister Lydia had run away with officer Wickham. Luckily for many, uncle Gardiner was quickly able to get the lovers in London, and pretty easily managed to convince the child to marry the girl he'd seduced. Only later Elizabeth would understand that Wickham consented to marry Lydia because Darcy had reduced all his debts.\n\nThe story finishes with a happy ending when Mr. Bingley, combined with sisters and Darcy, arrive at Netherfield Park again. Darcy proposes to Elizabeth for the second time and she agrees, and so they move into the pompous Pemberley House. Mr. Bingley marries Jane and the two live happily ever after.\n\nElizabeth and Darcy\n\nPride and Prejudice Themes\n\n\nPride is the key theme that keeps the protagonists of the story from developing intimate connections. When Darcy proposes to Elizabeth for the first time, he's not shy to throw in several comments to show his superiority, compared to Elizabeth’s family. The girl’s pride wasn’t in a position to handle it, despite the connection the two had. Anyhow, the story also demonstrates that it’s possible to over come one’s pride. It took Elizabeth some time to start seeing the positive traits of Darcy’s character, but, sooner or later, she saw his true heart.\n\n\nPrejudice is yet another obstacle in building loving relationships in the story. At that time, it had been more vital that you marry some body within your status than to marry some body you love. That’s why Miss Bingley insists that her brother shouldn’t marry Jane, despite the fact that both really like one another. That’s also why Darcy keeps demonstrating his superiority to the girl he loves. The right and honourable Lady Catherine de Bourgh may be the absolute depiction of the contrary of prejudice in her willingness to understand people because of their hearts.\n\n\nThe story centers upon the theme of family. To begin with, the Bennet girls come in desperate have to make groups of their own (at least so their mother thinks). Secondly, the characters are often connected by relatives, like Mr. Collin’s boss being the aunt of Mr. Darcy. At the same time, we see how much society undervalues the unity of family: British law at that time didn't allow females to inherit property, hence, the wife and daughters of Mr. Bennet face homelessness—as only their father’s closest male relative can inherit their house.\n\n\nThe role of women in society and family in this story deserves special attention. At that time it had been difficult to be always a woman, whether you were rich or poor. You could be from the noble family, but you weren’t protected in one day hearing that “my cousin, Mr. Collins, who, when I'm dead, risk turning you all out of this house as soon as that he pleases. ” (Chapter 13). Women also had little power over their future. It was more of an exception for Elisabeth’s father to support her decision never to marry Mr. Collins:\n\nChapter 20 “From this day you need to be a stranger to one of one's parents. Your mother won't see you again if you don't marry Mr. Collins, and I will never see you again should you choose. ”\n\nIt didn’t matter that the caretaker wanted the marriage to take place. Only if the daddy insisted, would Elizabeth need to spend the remainder of her life with the man she neither respected nor liked.\n\nLove and Marriage\n\nWhile Pride and Prejudice is frequently called a love story, and there's a great deal of love in it, there is little love in marriages in the 18th century. For example , Charlotte marries Mr. Collins because she is 27 years old and at that time it had been considered to be too old to hope for any better options. Lydia must marry the wicked Wickham to save her family’s reputation, despite the fact that Wickham only marries Lydia because Darcy repaid his debts (they consider Darcy to be always a hero as he coerces the drunk, lying man to marry Elizabeth’s sister! ). Marriage was essential, but it wasn’t a must to be cheerfully married. As Charlotte rightfully mentioned:\n\nChapter 6 “Happiness in marriage is entirely a matter of chance. If the dispositions of the parties are extremely well known to one another or extremely similar beforehand, it does not advance their felicity in the least. They always continue steadily to grow sufficiently unlike a short while later to have their share of vexation; which is better to know as little as possible of the defects of the person with whom you're to pass your life”\n\n\nClass was at the core of every thing people did and said around the time this book was written. The two sisters, Darcy and Bingley, resisted the possibility of tying their names to the Bennet family, specifically due to class issues: Elizabeth and Jane had no rich estate or inheritance to offer their potential husbands. Families did everything they are able to to be around individuals of high status and origin, or at the least not to destroy their existing reputation money for hard times. The fact that Lydia ran away with some officer might have put irreparable damage on Bennet’s family name. The troubled sister could have ruined the lives of all her unmarried siblings: such shame meant that Elizabeth would not have been in a position to marry Darcy, or any decent man, because their family name would have become tarnished.\n\nAdditional Writing Help\n\nIf you want someone to write your paper or want to buy checked, our best essay writing service, and we’ll offer you writing help for an increased grade you deserve.\n\nGet Started", "pred_label": "__label__1", "pred_score_pos": 0.7366008162498474} {"content": "How To Use Donald Trump’s Hume’s Formula And Other Math Homework Tips\n\nWhen I was in high school, my English teacher assigned us to do an assignment called “Kinematics.” For those who don’t know, kinematics is the study of motion, i.e., how things move. To explain motion, kinematics students study the different accelerations, shapes and other geometrical objects, and their relationship to their spatial derivatives. Kinematics is also used in astronomy to define the movement of heavenly bodies and other large-scale systems; in engineering to define the motion of a machine or system; and in physics to explain the behaviour of real physical objects.\n\nKinematics takes on a special importance in Astrodynamics, since it is the force of gravity acting upon any two objects. For instance, when a rocket is launched off the launchpad, it has a certain initial momentum which it acquires as it travels through the atmosphere. This momentum may be referred to as the first kinematic equation. This equation becomes important as the time interval over which the rocket travels increases.\n\nThe first kinematic equation, relating the initial momentum to the per unit time interval, is called the degenerate equations of motion. The second equation, relating the final velocity to the final time interval, is called the derivative equations. In any set of differential equations, the initial condition can be written as a function of time t and the derivative is written as a function of time. Thus, the second derivative equation for a set of differential equations will always be a closed curve. This is true for all accelerated systems. The first and second derivatives, on the other hand, are not such a closed curve, and the equations become more complicated as the speed of the system changes.\n\nThe concepts of kinematics have many applications in the scientific, engineering and aerospace industries. It helps us to predict and control numerous processes, including flight, nuclear weapons programs, spacecraft positions, space exploration, planetary exploration, and much more. These equations will also help us to design better and faster vehicles, better ways to protect our astronauts, and explore space more effectively. Thus, to learn more about kinematics, it is helpful to learn a bit about its applied use.\n\nA short definition of kinematics is the study of motion that involves both time and acceleration. It includes a range of subtopics, such as transfer functions, wave diagrams, integral transformations, numerical calculations and theorems. In particular, you should know the definition of impulse, the pdf of a body, and how to calculate the mean value of a function. You can take help from the glossary below to explain some of the key terms used in this topic.\n\nTo begin learning about kinematics, you should learn the definition of velocity. It describes the speed of an object at any given location. The magnitude of the velocity can be positive or negative, and the direction of motion can be straight forward or curved. For example, when the rocket launch, it rises because the velocity of the fuel rocket engine increases, while the air pressure on the fuel rocket decreases, causing the rocket to accelerate upward. Similarly, when a spacecraft accelerating on a launch trajectory leaves the launch pad, the spacecraft velocity is zero, while the wind velocity and the air density change with the distance from the center of the earth, causing the spacecraft to speed up as it flies away from the planet.\n\nThe study of kinematics has many applications in aerospace and astronautical engineering. Engineers need to study this subject in order to design and fine tune the various systems that make up an airplane, a space ship, a vehicle on the ground, and even a lunar colony. A good example of a spacecraft is the International Space Station. When astronauts are designing the various systems of the ISS, they use the kinematics mathematics to determine how various systems will work together. Students who study this subject often find it very interesting and apply this knowledge when they go into college to major in either mathematics or engineering.\n\nDonald Trump’s adviser and close advisor, Larry Crabb, also happen to be a very good mathematician. So, you can see why this little known equation has such promise as an educational tool. If you have problems in your homework and you cannot figure out a mathematical formula to solve them, you may want to consider trying out this problem with this calculator. You simply click on the “Solution” tab, enter the time interval you want the solution for, click “OK”, and then you can check your answer on the LCD screen. Not only does the “Hume’s Formula” solve the equation, it also proves that it is indeed possible to calculate the final velocity of objects in motion at different time intervals within any system of equations.\n\nRelated Post", "pred_label": "__label__1", "pred_score_pos": 0.9996490478515625} {"content": "The five set series of children’s books: “Do You Know?”, “Did You Know?”, “Don’t You Know?”, “Didn’t You Know?”, “Should You Know?”, were written as an attempt to assist children in a specific area of reading - fluency.  They provide the reader the opportunity to read new sight words multiple times.  Research shows that the ability to read words by sight automatically is the key to skilled reading (Ehri, 1998).  None of the sentences are intended to make any sense whatsoever, and hopefully will be enjoyable to read and make children laugh.  All five books in the series use sight words from various words list. \n\nTeachers and parents can use the word lists that are included in the books to practice word recognition and fluency daily with the child.  I hope that these books will also encourage children to never give up no matter what challenges faces them – especially when faced with “really big words”.\n\nDO YOU KNOW? - (Sample Pages)\n\nDID YOU KNOW? - (Sample Pages)", "pred_label": "__label__1", "pred_score_pos": 0.9999987483024597} {"content": "Only for geniuses: Can you find the boy hiding among the girls?\n\nSolving different puzzles is a big part of my life. I think it’s a perfect way to relax and pass the time! It may sound strange that you relax by concentrating on something, but afterward, my head feels lighter and my thoughts seem clearer.\n\nThen, of course, it doesn’t hurt that I get to satisfy my competitive instinct. The emotions and feelings of overcoming a challenge are something else!\n\nThe puzzles can vary, anything from crosswords to sudoku seems fun to try. Lately, I’ve been exploring other types of tests, like the one below, for example.\n\nBrain exercise, just as physical training, is very important to live a long and happy life. Especially when you get a little older, it’s important to keep the mind active. One way to move those neurons is to solve different types of puzzles.\n\nCan you find the hidden boy among all the girls?\n\n\nOkay, here comes the challenge.\n\nBelow you can see a picture with a bunch of girls, but somewhere in there, a boy is hiding. Can you find him?\n\nThat said, this one is hard but take your time and try to find the boy.\n\nHere’s the answer\nDid you solve this puzzle? If yes, well done!\n\nIf you didn’t, check the answer below.\n\nThere he is! Hiding in the left corner close to the bottom, hard to find among all the girls!\n\nDid you manage to find the hidden boy? Then press that SHARE button and see if your friends can find him as fast as you!", "pred_label": "__label__1", "pred_score_pos": 0.9883324503898621} {"content": "Why Europe needs to 'lift its game'\n\nWhy Europe needs to 'lift its game'\n\nWhy Europe needs to 'lift its game'\n\nThe first of its kind, a multi-country study has found that more than 75% of European adults don’t do any muscle-strengthening exercise at all, not even weekly.\n\nThe World Health Organization 'suggests activities like lifting weights in a gym, push-ups, sit-ups and squats should be carried out at least two days a week to maintain good health and reduce the risk of chronic diseases'.\n\nNevertheless, data from more than 280,000 adults from 28 European countries showed that only 17.3 per cent follow the guidelines – 19.8 per cent of men and 15 per cent of women.\n\nThe study, led by the University of Southern Queensland in Australia, is the most comprehensive look at how much muscle-strengthening exercise adults across Europe are getting.\n\nThe researchers said the findings, published on the 25th of November in The Public Library of Science ONE journal, has stated that it 'requires immediate action from public health officials'.\n\nThe lead investigator of the study, Dr Jason Bennie, who is a physical activity epidemiologist at the University of Southern Queensland had this to say about the findings of the report:\n\n“While the health benefits of muscle-strengthening exercise are clear, the reality is a large majority of European adults either don’t do it or don’t do enough of it.\"\n\n“Particularly concerning was our data showed that in some southern European countries, more than 95 per cent of adults reported doing no muscle‐strengthening exercise.”\n\nThe research team used data from the second wave of the European Health Interview Survey, which was conducted in 2013 and 2014.\n\nWhy Europe needs to 'lift its game'\n\nThe way the study was conducted is fairly straightforward: participants were questioned how many days in a week they would potentially engage in physical activities specifically designed to strengthen muscles, such as doing resistance training, strength exercises such as lifting weights or even boxing.\n\nMost interestingly, South-eastern European countries Romania, Malta and Cyprus were among the lowest-ranked countries with less than eight per cent of adults meeting the recommended two days a week of muscle-strengthening exercise, while Nordic countries Iceland, Sweden and Denmark recorded the best results. Maybe the cold weather forces people to move, get the blood moving and stay warm.\n\nThe study team of researchers have suggested that 'wealth inequality across European countries was likely the main cause of the geographical pattern of participation in muscle-strengthening exercise'. Other factors associated with low participation rate include old age, lower education standards, being female and being overweight or obese.\n\nDr Bennie continued: “Chronic diseases such as diabetes, cardiovascular disease, cancer, chronic respiratory disease and mental disorders contribute to 86 per cent of deaths in Europe, yet the message around physical activity and its importance to health and wellbeing has generally focused on just aerobic exercise.\"\n\n“Given the established health benefits of muscle-stretching exercise, coupled with its low participation levels, there is an urgent need for governments and health authorities across Europe to start supporting the uptake of this type of exercise at the population level.”\n\nWhy Europe needs to 'lift its game'\n\nDr Bennie also stated that 'several strategies could help boost muscle-strengthening exercise levels, including access to affordable health facilities, equipment and fitness trainers, physical activity campaigns endorsing muscle-strengthening exercise as essential for optimal health and promotion in schools'.\n\n“While muscle-strengthening exercise is typically performed at gyms or fitness centres, one thing the COVID-19 lockdown has shown us is how easily it can be done at home,” he said.\n\n“Even a little bit of muscle-strengthening exercise can have immediate health benefits, especially if you are currently doing none.”\n\nSo what can we take away from this?\n\nThis study highlights how important strength training is for overall health and wellbeing.\n\nWeight-lifting isn't just for bodybuilders and gym junkies. Invest in a good personal trainer and see those muscles grow and your stamina improve.\n\nThe study, which is called ‘The epidemiology of muscle‐strengthening exercise in Europe: a 28-country comparison including 280,605 adults’ is available here to read.", "pred_label": "__label__1", "pred_score_pos": 0.6708528399467468} {"content": "What is a noun that describes another noun?\n\nAdjectives are those useful words that describe nouns and pronouns. Words like high and slow and sweet. An attributive noun is a noun which modifies another noun—like ‘singles’ in the phrase ‘singles bar’. They’re called “attributive nouns.” Attributive here means “joined directly to a noun in order to describe it.”\n\nWhat are descriptive nouns?\n\nDescriptive nouns are nouns that are used to describe other words in the sentence, i.e. nouns that are used as adjectives. Examples- i) Riya did very well in her Science test. (The noun “science” used as a description for the noun “test”)\n\nWhen the noun refers to more than one it is called?\n\nNouns which only ever refer to one thing are called singular nouns: “Saturn is the sixth planet from the sun,” “We heard a terrible din in the alley.” And a plural noun refers to more than one person or thing, or sometimes to something that has two main parts.\n\nWhat is a noun also called?\n\nA noun is a kind of word (see part of speech) that is usually the name of something such as a person, place, thing, animal, or idea. In English, nouns can be singular or plural. Nouns often need a word called an article or determiner (like the or that). (For example, people do not also describe nouns).\n\nWhat is a noun appositive?\n\nAn appositive is a noun or pronoun — often with modifiers — set beside another noun or pronoun to explain or identify it. An appositive phrase usually follows the word it explains or identifies, but it may also precede it.\n\nCan you describe someone with a noun?\n\nThe term concrete is used because you can actually experience concrete nouns directly via one or more of your five senses. people – A person’s name is a noun, as are other words that can be used to name a person, such as mother, father, sister, brother, student, or teacher.\n\nWhich is a singular noun?\n\nTo recap, a singular noun refers to one person, place, or thing. The type of noun that refers to more than one person, place, or thing is known as a plural noun. Always remember the rule that a singular noun is a noun that only refers to one person, place, or thing.\n\nHow many types of noun are there?\n\nComplete answer: Let us discuss the different kinds of nouns and explain them briefly. Broadly nouns are classified as common nouns, proper nouns, concrete nouns, abstract nouns, countable, uncountable and collective nouns. We will briefly discuss the nouns with example sentences.\n\nWhat are nouns give 10 examples?\n\nList of Nouns\n\nNoun Type Examples\n\nWhat are 10 nouns?", "pred_label": "__label__1", "pred_score_pos": 0.9998969435691833} {"content": "Politics and Friendship Together\n\nMany people believe that friendship and politics cannot always be paired together. Mixing politics and friendship can be just as difficult as making new friends. We learn quickly that discussing politics is not a good idea when we meet a new friend. Talking about politics is not a good idea. Small conversations are fine as long as you don’t discuss politics. Religion and sexuality are also taboo topics.\n\nThese topics can ignite passionate debate that can lead to heated arguments between the sides if they cannot agree on their points. However, if politics is a topic in the initial stages of friendship, it could be a problem that can endanger a blossoming friendship. Does this rule apply everywhere? Is it always best to avoid discussing politics with someone you just met? Is it acceptable to discuss politics with someone you plan to have a great friendship and romantic relationship? If you don’t agree with another person’s political views, can friendship still develop between you? To be a true friend, do you always need to share the same political views?\n\nToday, it is common for political topics to become heated and even lead to violence in certain cases. In many cases, it is still a good idea to avoid discussing politics with someone you don’t know. It is not always true, however. Many friendships begin at political conventions where people with different political views attend.\n\nWhile you may be surrounded with thousands of people with extreme views, there are many opportunities to make new friends and have fun discussing other political views. It is not unusual for people to become close friends with strangers and then later discover that they hold opposing views. Many Australians will find themselves immersed in political discussions with the upcoming Australian Federal Election. However, they will have the comfort of knowing that their friends and family will not be affected.\n\nEven though most people don’t feel passionately about their political views, it is possible to break up friendships or even endanger marriages, particularly in the early stages. It is a common belief that it is best to avoid politics when speaking with strangers or people you don’t know well. Sometimes, even close friends may choose not to discuss politics. There are people who aren’t just open to other political views. It is difficult to form genuine friendships and love with someone who holds a different political view than you.\n\nDespite this fact, some people are still able to form successful friendships and marriages despite having different opinions. Are there any secrets to these success stories? Even if they have different political views, it is possible to form strong friendships or marriages. Some people use their differing views to spice up their friendship or marriage by engaging in healthy debates. Respect is so high that they can’t be separated by their political views. In most cases, however, friends who don’t share the same political beliefs simply avoid any political discussion.", "pred_label": "__label__1", "pred_score_pos": 0.9987087845802307} {"content": "A vegan diet focuses on plant-based foods and eliminates all animal products.\n\nMeat-based entrees are generally exchanged for meals containing beans, lentils, tofu, seitan, tempeh, nuts, and seeds.\n\nDairy products are usually replaced with plant milks and eggs can be replaced with flaxseeds or chia seeds in various recipes. Honey can be exchanged for exchanged for plant based sweeteners.\n\nUpon request, we can choose from an ever increasing selection of ready-made vegan products, including vegan meats, fortified plant milks, and vegan cheeses.", "pred_label": "__label__1", "pred_score_pos": 0.9978575706481934} {"content": "Various Artists – Quintessence Vol. 05: Remix Edition [IS069]\n\nInner Symphony presents the Remix Edition of “Quintessence Vol. 5”. Featuring 8 groovy and otherworldly interpretations of the coveted, wistful, and atmospheric original album. Now seasoned labelmates, the artists take you on a mystical journey through the coveted melodic ethereal landscape.\n\nThis anthology includes a diverse, yet intimately linked, palate of airy soundscapes and gentle waves of groove by the original artists providing their own spin of each others work. Soul Button, Deviu, BURCAK, Cayto, Lucio Consolo & Agustín Buaon, Gravity Vibes, Aamish, and IndianSoul all return to the imprint with fresh and mystifying takes on the passionate and bittersweet original album.\n\nInner Symphony’s “Quintessence Vol. 5 (Remix Edition)” will enchant the listener with its dense atmospheres, rich and spectral orchestral pads, and dreamlike leads and sequences. Prepare yourself to be transported to a far removed surreal land and back again. A journey so real in your minds eye, you will think you have transcended and returned your mortal body once more.\n\n\nArtist: Various Artists\nTitle: Quintessence Vol. 05: Remix Edition\nCat. No: IS069\nRelease Date: September 30th, 2022", "pred_label": "__label__1", "pred_score_pos": 0.9999819993972778} {"content": "browse search\n\nWord Explorer\nChildren's Dictionary\nsoftly in a way that makes little sound; quietly.\nsoftware any of the programs that are written to operate a computer.\nsoggy completely wet; heavy with moisture; saturated.\nsoil1 the top layer of the earth's surface. [2 definitions]\nsoil2 to make dirty. [3 definitions]\nsol1 the syllable that indicates the fifth tone of a musical scale.\nsolar of, having to do with, or coming from the sun. [2 definitions]\nsolar energy energy that comes from the sun.\nsolar system our Sun, its eight planets and their moons, and all other bodies that travel around the Sun, or any system that includes a star and all of the matter which orbits that star, including planets and moons.\nsold past tense and past participle of sell.\nsolder any mixture of metals that is melted and used to connect pieces of metal. [2 definitions]\nsoldier a person who serves in the army and who is not an officer.\nsole1 single and alone; not one among others; only. [2 definitions]\nsole2 the bottom of something that comes in contact with the ground. Feet and shoes have soles. [2 definitions]\nsole3 any flatfish from the ocean that is used for food.\nsolely without any others; alone. [2 definitions]\nsolemn serious in appearance, sound, or mood. [2 definitions]\nsolitaire any of various card games played by one person alone. [2 definitions]\nsolitary being, traveling, or living without others; alone. [3 definitions]\nsolitude the condition of living or being by oneself.", "pred_label": "__label__1", "pred_score_pos": 0.8116669654846191} {"content": "The Power of Community\n\nBy: Glenn Brule\n\n[Today’s Tuesday Reading is from Glenn Brule, MOR Associates Leadership Coach. Glenn may be reached at]\n“There is no power for change greater than a community discovering what it cares about.” - Margaret J. Wheatley\nI have been fortunate enough to be part of many different communities throughout my life.  I can’t emphasize enough how important they have been in contributing to my own personal sense of belonging and growth. I’ve been privileged to witness how communities overcome major goals and challenges, heal the less fortunate, and create lifelong bonds of mutual support.  Maslow’s Hierarchy of Needs clearly outlines a sense of belonging in its third tier - “Love and Belonging,” and includes such characterizations as friendship, family, intimacy and sense of connection.\nSo what is a community? At its core a community is a group of people that share something in common. What members in this community share can be anything from a profession, to family, religion, geography, a goal or common mission. Most importantly however, a safe and caring community is one that has a connection through trust, vulnerability, and a genuine desire to care for one another.\nThe power of community can come in many dimensions and when realized, strengthen relationships for the community as a whole. A MOR maxim cites that “relationships are currency” and this becomes evident in our programs as cohorts realize the benefits of a learning community through their networking and support for one another.\nThere are, as I have witnessed, 5 core benefits of community:\n\n 1. With diversity comes wisdom - when I have carefully considered the make-up of great communities it always impresses me how diversity lends itself to wisdom, empowered decision making and inspiration. The simple nature of collective experiences allows for this to easily manifest itself into support and belief.\n\n\n 1. Support and belief within any community is fundamental. Without it there is no community. In any community where support and belief are strong, both the individual and group excel in a collective force that constitutes a combination of courage and reinforcing self-worth. This in turn enables the opportunity to push limits.\n\n\n 1. Pushing limits on what is possible in terms of a shared vision and goals enables a community to aspire and hold each other accountable, encouraging stretching beyond what seems capable or even what is called for. The power of many is often quickly realized.  Pushing limits and seeing possibilities realized then increases group motivation. \n\n\n 1. Borrowed or shared motivation is one of many bi-products of a strong community and is often attributed to the collective sense of desire to care for one another. When faced with challenges the collective whole will naturally borrow from individual motivation and create a shared experience that in most cases can overcome the most difficult challenges. This helps enable resilience, or the ability to bounce back in the face of shared challenges.\n\n\n 1. Resilience is yet another bi-product of community. Where change and challenge may be a struggle for an individual, a community can demonstrate the aforementioned resilience as the lever needed to enable the wisdom, belief, drive, and motivation necessary to survive complex situations regardless of circumstances.\n\nI hope that over the course of your lifetime you have the opportunity to engage with communities and experience the full potential that trust, vulnerability and the genuine desire to care for one another can have on both individual and collective well-being. Set a goal, reach out to your cohort (present or past), invest in your learning team, alumni or any of the MOR family and become part of a connected community.\nLeaderly Yours,\n\n\nThis Week's Survey\n\nWhen and where have you personally experienced the full potential of community as described in this Tuesday Reading?\n\n\nFrom Last Week\nLast week we asked: How does it feel when you state, 'I am a leader?'\n • 45% said I have a mindset of being a leader.\n • 27% said I am in transition toward being a leader.\n • 15% said I feel like an imposter acting as a leader.\n • 10% said I am too busy to think about being a leader.\n • 3% said I don't understand the point of \"being\" a leader.\nJuxtaposing last week’s and this week’s readings brings us to an important question: how are you building community as a leader?  For the 72% of us who either possess the mindset of a leader or are transitioning, building community is generally an integral part of our toolkit as a leader.  For the 15% of us who feel imposterism about leadership, remember it is generally only felt in our own mind and not experienced about us by others.  Seek feedback from trusted advisors in your community on your strengths and opportunities in this new role.  For the 10% of us who feel too busy to think about being a leader, consider urgency vs. importance… what part of your busyness is the result of working on things that ultimately are not important, and how do you shift the balance?  Finally, for the small number of us who don’t understand the point of being a leader, hopefully this week’s reading provides some inspiration to reach out to leaders you admire in your community to learn how they have evolved as a leader.\n\n\nAverage: 1 (1 vote)", "pred_label": "__label__1", "pred_score_pos": 0.7023467421531677} {"content": "\n\n\nLifestyle might possibly be an interest full of shocks. You can never ever acceptance whether it aren’t put a good curveball. Really the only consider your hands are keeping adequate considered very your strike a house work on in lieu of lose the game. This is especially valid when it comes to money items.\n\nNeeds, issues, fantasies, and you may wants fundamentally want higher degrees of currency in order to defense. These may sprout in order to lifetime any kind of time time, and another can never have enough resource. Your scramble available for timely personal loans in order to no avail. You retain facing getting rejected because you don’t have an effective credit score.\n\nWhat’s a credit history?\n\nA credit rating is largely computed on analysis from a great man or woman’s credit rating which is a representation from someone’s creditworthiness. Your credit score serves as a beneficial metric bringing financial institutions, credit card companies, and you may banking institutions to check the risk it manage after they give money.\n\nWhile the label https://paydayloanservice.net/title-loans-va/ ‘s been around for some time, most individuals who sign up for immediate unsecured loans listen to it acquiring the basic event when they handle rejection due to help you it. Following matter comes up – taking unsecured loans in place of a credit score?\n\nThe thing is a candidate and that data for short-term private loans the very first time could possibly get, actually, end up being creditworthy. But their credit rating was reduced, or even low-existent as zero earlier pointers can be found of their borrowing record. Which, therefore, produces providing quick personal loans hard, maybe not hopeless. The following is a guide to taking a consumer loan and you may no credit score assessment.\n\nYou’ll find circumstances affecting credit ratings. But when you don’t possess a credit history, specific other variables come into play. Here is what you can do:\n\n#1 Electricity Your income\n\nA customer’s currency are going to be a major choosing reason for the brand new approve from a consumer loan prompt bucks. Such as, if you’re utilized by a lot of money five hundred organization and you may rake on the a great money, it will take a lot less try to prove your creditworthiness. Mainly, private bucks loans is basically considering while you are computed is economically safe and now have the ability to pay back the cash lent.\n\nYou might be necessary to make numerous documents and when distribution so you’re able to this new personal loan – like your proof income. The latest proof earnings received is offered to the sorts of tax statements, usually over the past a few economic many years. Or you could show their history of a position therefore will invest stubs. Most other essential facts tend to be knowledge certificates and bank statements.\n\n#dos Get a diminished personal bank loan count\n\nAnd this surpasses stating that investment try a high chance and you can a worry-triggering pastime for a lender. Good credit reduces like apprehensions and will act as an guarantee getting a secure return of the matter borrowed. There is a high probability which you, had with your own personal fears out-out-of procuring a personal loan, you will are not able to miss out the condition your to help you takes up a fund class. Just how can you increase threat of becoming acknowledged since the a trusting borrowing from the bank group?\n\nAn increase would-become throughout the decreasing the number of the fresh new financial support asked. It can play the role of a stimulant in more decreasing the coverage and you may apprehensions its lender score understand. This means – while the so now you try requesting a lower matter, a lender you’ll feel comfortable with the sanctioning your individual loan as opposed to a credit history.\n\n#3 Score a safety Founded Capital\n\nA collateral-centered personal loan removes element indicating your credit score. For many who very own assets instance silver, a property, vehicles, FD’s otherwise offers, you can quickly rating an unsecured loan considering your otherwise this lady. Right here, you really need to promise such collaterals getting obtaining a personal loan.\n\nHubungi Kami !", "pred_label": "__label__1", "pred_score_pos": 0.5904927849769592} {"content": "Going cashless? It's a dividing line in European society\nButchy Davey\n\nDo cashless societies seem inevitable, or will physical currency be used in some form forever?\n\nThe way we use money has changed as a result of rapid technological advancements.\n\nIn many countries, online or digital transactions are becoming more common, whether through debit and credit cards, PayPal, Apple Pay, and 'shop now, pay later' services.\n\nA cash-free world could lower crime rates because automatic paper trails will make money laundering more difficult.\n\nAnd cash management costs would be reduced since international payments would become much more accessible.\n\nThe disadvantages of a cashless society could include the risk of hacking and the exposure of private data.\n\nYou may be unable to access funds due to technological problems, and something as simple as a phone battery running out could leave you penniless.\n\nIs the public ready to embrace the new age of online transactions? Is there still skepticism surrounding the idea that our data will be uploaded and stored in private 'cloud' systems, where every transaction will be logged by banks. \n\nGoing cashless is a positive for shop owner Jas Shembi, who says \"it helps to keep track of your sales and work on your accounting.\"\n\nWhile poet Elisha Gabb is worried about a cashless society, telling CGTN: \"it's scary giving away so many details.\"\n\nSearch Trends", "pred_label": "__label__1", "pred_score_pos": 0.8725175261497498} {"content": "Pigs in China\n\nERC grant on food sustainability in China\n\nNTNU researcher Marius Korsnes has been awarded an ERC Starting Grant from the European Research Council (ERC) . He will explore the concept of “sufficiency” when it comes to urban, sustainable food.\n\nMaking future transport more climate friendly\n\nThe world’s transportation network is constantly growing. “Green asphalt” and sustainable bus transportation will ease the environmental impact of future transport routes.\n\n\nWhen the Chinese giant awakes\n\n\nHope for the climate, hope for clean air\n", "pred_label": "__label__1", "pred_score_pos": 0.9980296492576599} {"content": "Efficiency optimization\n\nNOVUM technology provides companies with useful information about their batteries. This allows you to better utilize energy storage systems and use them for longer. Maintenance and insurance costs are reduced in many cases. Malfunctions and failures are prevented. Companies can save costs and even make a profit from recycling batteries.", "pred_label": "__label__1", "pred_score_pos": 1.000006079673767} {"content": "The genetic consequences of dog breed formation-Accumulation of deleterious genetic variation and fixation of mutations associated with myxomatous mitral valve disease in cavalier King Charles spaniels.\n\nAxelsson E, Ljungvall I, Bhoumik P, Conn LB, Muren E, Ohlsson Å, Olsen LH, Engdahl K, Hagman R, Hanson J, Kryvokhyzha D, Pettersson M, Grenet O, Moggs J, Del Rio-Espinola A, Epe C, Taillon B, Tawari N, Mane S, Hawkins T, Hedhammar Å, Gruet P, Häggström J, Lindblad-Toh K\n\nPLoS Genet. 17 (9) e1009726 [2021-09-00; online 2021-09-02]\n\nSelective breeding for desirable traits in strictly controlled populations has generated an extraordinary diversity in canine morphology and behaviour, but has also led to loss of genetic variation and random entrapment of disease alleles. As a consequence, specific diseases are now prevalent in certain breeds, but whether the recent breeding practice led to an overall increase in genetic load remains unclear. Here we generate whole genome sequencing (WGS) data from 20 dogs per breed from eight breeds and document a ~10% rise in the number of derived alleles per genome at evolutionarily conserved sites in the heavily bottlenecked cavalier King Charles spaniel breed (cKCs) relative to in most breeds studied here. Our finding represents the first clear indication of a relative increase in levels of deleterious genetic variation in a specific breed, arguing that recent breeding practices probably were associated with an accumulation of genetic load in dogs. We then use the WGS data to identify candidate risk alleles for the most common cause for veterinary care in cKCs-the heart disease myxomatous mitral valve disease (MMVD). We verify a potential link to MMVD for candidate variants near the heart specific NEBL gene in a dachshund population and show that two of the NEBL candidate variants have regulatory potential in heart-derived cell lines and are associated with reduced NEBL isoform nebulette expression in papillary muscle (but not in mitral valve, nor in left ventricular wall). Alleles linked to reduced nebulette expression may hence predispose cKCs and other breeds to MMVD via loss of papillary muscle integrity.\n\nBioinformatics Compute and Storage [Service]\n\nNGI Uppsala (SNP&SEQ Technology Platform) [Service]\n\nNational Genomics Infrastructure [Service]\n\nPubMed 34473707\n\nDOI 10.1371/journal.pgen.1009726\n\nCrossref 10.1371/journal.pgen.1009726\n\npii: PGENETICS-D-21-00373\npmc: PMC8412370\n\nPublications 7.2.7", "pred_label": "__label__1", "pred_score_pos": 0.8324814438819885} {"content": "Driving security transformation through automation, AI and analytics\n\nSep 03, 2021\nCyber transformation\n\nWith cyberthreats growing in sophistication and frequency, a 100% DIY approach to security operations rarely makes sense anymore. Outsourcing, co-sourcing or engaging consultants to gain access to critical knowledge, services, skills and technologies can help you build a scalable cybersecurity strategy for this ever-evolving challenge.\n\nIn working with clients, we have found a key component of security transformation is AI-driven automation and analytics. These technologies help:\n\n • Drive efficiencies and reduce the time it takes to recognize and remediate threats,\n • Enable people to work smarter and faster,\n • Increase staff efficiency and cost effectiveness,\n • Allow analysts to spend less time sorting through noise and more time focused on vetted high-priority alerts and events, and\n • Empower analysts in providing more valuable, data-driven insights to leadership.\n\nAutomation and analytics can be part of different services and solutions. For example, third-party providers could use them to assess current systems based on strategic priorities—a pre-requisite to identifying other high-priority areas to apply transformative technologies. They could also be embedded in business applications. Either way, they help organizations save time and prioritize resources while controlling the cost of security operations.\n\nA disciplined approach to security transformation\n\nWhile AI-driven automation and analytics can help transform your security operations, they aren’t magic. They require skilled people and operational planning.\n\nDeveloping effective security operations requires an organized and iterative cycle of discovery, design, deployment and optimization. This approach helps the organization become more secure and agile by equipping staff with the tools and information they need to identify and address potential issues sooner. They gain more knowledge about enterprise risk and security operations in general, which empowers confident, fast decision-making when needed. Let’s walk through this cycle.\n\n • Discover: Assess your organization’s current IT security posture and prioritize areas to determine where using AI, security automation and analytics makes the most sense.\n • Design: Starting with the highest-priority use cases, develop automated solutions that reduce the need for human intervention.\n • Deploy: Implement the solutions with your people top-of-mind. Make them aware of the solutions’ benefits and train them to understand the capabilities and limitations.\n • Optimize: Business needs and external factors constantly evolve. Even as you deploy more security automation solutions, continue to monitor performance and results, and optimize each solution to meet current needs.\nA large insurance company with 20,000 employees and offices in 10 states requested a cloud infrastructure cybersecurity assessment to identify risks. An RSM assessment leveraged security automation and analytics to identify a number of opportunities for improvement with varying degrees of importance. The client used that knowledge to create a three-year plan focusing on holistic security, while also educating internal groups around risks and remediation.\nCase study, Insurance\n\nShifting left with cyber transformation\n\nA primary benefit of these advanced technologies is that they allow IT teams to “shift left” away from routine tasks and devote more time and resources to strategic initiatives that create competitive advantages. This can begin even before your team deploys a new asset, such as a server or a cloud-delivered service. With security-enhancing automation that provides compliance risk alerts, your team can address any issues prior to deployment.\n\nThe other advantage of an “automation-first” approach is that system data starts accumulating immediately. This establishes a baseline for machine learning components so that the AI functionality can react based on any new knowledge\n\nPassword management ought to be simple, but a hybrid cloud environment can add complexity that requires time-consuming manual checks of every system to ensure global compliance. AI-driven security automation offers a proactive approach to ensuring all systems across the enterprise—including legacy systems—are compliant. An automation flow would extract data from all enterprise systems, analyze it and alert administrators to compliance problems. Without automation, the fails would wait to be discovered.\nUse case, Password management\n\nSimplifying the path to modern security operations\n\nMost companies don’t have the resources for this holistic approach to building effective security operations at scale and in a cost-effective manner. This is especially true for highly distributed organizations that have accumulated legacy systems over time. Managing security operations is simply too complex—and given the trajectory of business technology, it will only become more complex and mission critical over time.\n\nEffective security transformation is not optional; every organization needs it to protect against costly non-compliance and increasingly sophisticated cybercrime. RSM provides holistic security operations services, such as managed security operations and managed endpoint solutions, to help transform your security operations technology with AI-driven automation and analytics. We can work together to maximize the security of your company’s data—and that of your customers.\n\nRSM contributors\n\n • David Llorens", "pred_label": "__label__1", "pred_score_pos": 0.9369640350341797} {"content": "2884 9780521589796\n\nBeginning to Write\n\nArthur Brookes\nISBN: 9780521589796\n24,38 €\nvč. DPH\nBěžná cena28,68 €\nDostupnost2-3 týždne\n\nBeginning to Write contains over 100 writing activities suitable for elementary and intermediate learners. It shows that it is possible to take the teaching of writing seriously at an early stage in language learning. It also recognises the role writing plays in general language learning. The introduction discusses the differences between speaking and writing, the purpose of writing and the real world uses to which it is put. Process writing is discussed in a particularly clear manner and approaches to teaching writing are considered. There are activities: - to start learners writing with confidence - that practise such mechanics as capitalisation, spelling and punctuation - that focus on the writing process - that show how vaulable computers can be in teaching writing - that focus on outcomes and on the assessment of writing.\n\nAutorArthur Brookes\nELT segmentELT metodika\nPočet strán208\nVydávateľCambridge University Press (Zobraziť všetkých produktov)\nRok vydania1999\n\nAdditional information", "pred_label": "__label__1", "pred_score_pos": 0.5923011302947998} {"content": "Atomic, nuclear and particles\n\nWhat to expect\n\nThis topic is a whopper for new key words and there is a lot to memorise! In atomic physics, consider how we as scientists know (roughly) the structure of the atom, and also how electrons exist outside the nucleus. In nuclear physics, what makes these more or less stable and how are these instabilities resolved? The nucleus isn't the smallest particle either, and nor are protons and neutrons. What exists within?\n\nAfter studying this topic, you should be able to:\n\nThe Higher Level content includes the determination of the radius and exponential nature of decay for nuclei as well as quantum physics: the photoelectric effect and photonswave particle duality and atomic models.\n\nKey questions\n\nWhat was Rutherford's experiment and what did he discover?\n\nNuclei are heavy (since they don't move when alpha particles rebound), positive (since they repel alpha particles) and small (since only a small number of particles are deflected). This model was established as a result of the Geiger Marsden experiment in which alpha particles are deflected by a thin foil of gold atoms. Find out more.\n\nWhat does the Standard Model tell us?\n\nPutting fundamental particles into groups forms a very neat pattern that helps us to predict interactions: The Standard Model. The Standard Model is organised according to types of particle and their various properties. Find out more.\n\nWhat are examples of atomic spectra?\n\nWhen a low pressure gas is excited, the light emitted is made of discrete wavelengths (responsible for distinct colours of visible light). These wavelengths can be split by a prism to give a line spectrum known as an emission spectrum. When white light is absorbed by a gas, the transmitted light has an associated absorption spectrum. To excite an electron from a low level to a high one requires a certain amount of energy. This will only occur if the light shining contains exactly the right amount of wavelength to correspond to this energy. Find out more.\n\nWhat makes a nucleus stable?\n\nAs more and more nucleons combine in the nucleus, the binding energy increases due to the increased presence of the strong force. To determine whether the nucleus of an isotope is stable, we divide the binding energy by the number of nucleons present. Small nuclei are unstable - they would need to gain binding energy to become more stable. Isotopes of iron and nickel are the most stable, with binding energies per nucleon of almost 9 MeV. Very large nuclei are unstable - they would need to lose nucleons to become more stable. Find out more.\n\nIs alpha radiation stronger than gamma?\n\nAlpha particles consist of a helium nucleus. Their relatively large mass and charge mean that they are the most ionising type of radiation. However, this also has the effect that they can only penetrate 2-3 cm of air and they are absorbed fully by a sheet of paper. Beta particles consist of an electron. Electrons are not normally found in the nucleus, but are released during the process of beta decay, when when a neutron changes into a proton plus an electron. Beta particles are absorbed by a sheet of aluminium foil. Gamma particles are photons of high energy electromagnetic radiation (the same as the gamma we are familiar with from the electromagnetic spectrum). Gamma photons are highly penetrating, only absorbed by several metres of concrete or thick sheets of lead. However, they are the least ionising of these three types of radiation. Find out more.\n\nWhat does the Bohr model explain?\n\nThe Bohr model predicts the hydrogen spectrum by applying the equations for circular motion for electron orbits that have quantised angular momentum. Find out more.\n\nWhat is quantum tunnelling in simple terms?\n\nTunnelling is the term given to a particle passing through a potential energy barrier without having sufficient energy to surmount the barrier. It is a conceptually similar phenomenon to a ball rolling through a physical tunnel in a hill, rather than being given an energetic kick to climb over. But in quantum tunnelling barriers, no such physical tunnel exists. Find out more.\n\n • Atomic models\n\n Models in physics and beyond are used to describe or explain a challenging concept in a more visual or tangible way (e.g. the brain is like a library, electric current is like water flow). The atomic model is the best guess we currently have that explains\n\n • Nuclear physics\n\n Nuclear physics is a big topic!\n\n • Structure of matter\n\n Matter is vast and varied throughout the universe. Yet, zoom in enough and this complex story has a simple core - the Standard Model.\n\n • AHL Quantum\n\n Quantum physics is the study of the smallest objects in the universe: photons of electromagnetic radiation, the wavelengths of electrons and the energy levels of an atom.", "pred_label": "__label__1", "pred_score_pos": 0.6801221370697021} {"content": "\n\nClassiq, a Tel Aviv-based startup that aims to make it easier for computer scientists and developers to create quantum algorithms and applications, today announced that it has raised a $10.5 million Series A round led by Team8 Capital and Wing Capital. Entrée Capital, crowdfunding platform OurCrowd and Sumitomo Corporation (through IN Venture) also participated in this round, which follows the company’s recent $4 million seed round led by Entrée Capital.\n\nThe idea behind Classiq, which currently has just under a dozen members on its team, is that developing quantum algorithms remains a major challenge.\n\n“Today, quantum software development is almost an impossible task,” said Nir Minerbi, CEO and Co-founder of Classiq. “The programming is at the gate level, with almost no abstraction at all. And on the other hand, for many enterprises, that’s exactly what they want to do: come up with game-changing quantum algorithms. So we built the next layer of the quantum software stack, which is the layer of a computer-aided design, automation, synthesis. […] So you can design the quantum algorithm without being aware of the details and the gate level details are automated.”\n\nImage Credits: Classiq\n\nWith Microsoft’s Q#, IBM’s Qiskit and their competitors, developers already have access to quantum-specific languages and frameworks. And as Amir Naveh, Classiq’s VP of R&D told me, just like with those tools, developers will define their algorithms as code — in Classiq’s case a variant of Python. With those other languages, though, you will write sequences of gates on the cubits to define your quantum circuit.\n\n“What you’re writing down isn’t gates on cubits, its concepts, its constructs, its constraints — it’s always constraints on what you want the circuit to achieve,” Naveh explained. “And then the circuit is synthesized from the constraints. So in terms of the visual interface, it would look the same [as using other frameworks], but in terms of what’s going through your head, it’s a whole different level of abstraction, you’re describing the circuit at a much higher level.”\n\nThis, he said, gives Classiq’s users the ability to more easily describe what they are trying to do. For now, though, that also means that the platform’s users tend to be quantum teams and scientists and developers who are quantum experts and understand how to develop quantum circuits at a very deep level. The team argues, though, that as the technology gets better, developers will need to have less and less of an understanding of how the actual qubits behave.\n\nAs Minerbi stressed, the tool is agnostic to the hardware that will eventually run these algorithms. Classiq’s mission, after all, is to provide an additional abstraction layer on top of the hardware. At the same time, though, developers can optimize their algorithms for specific quantum computing hardware as well.\n\nClassiq CTO Dr. Yehuda Naveh also noted that the company is already working with a number of larger companies. These include banks that have used its platform for portfolio optimization, for example, and a semiconductor firm that was looking into a material science problem related to chip manufacturing, an area that is a bit of a sweet spot for quantum computing — at least in its current state.\n\nThe team plans to use the new funding to expand its existing team, mostly on the engineering side. A lot of the work the company is doing, after all, is still in R&D. Finding the right software engineers with a background in physics — or quantum information experts who can program — will be of paramount importance for the company. Minerbi believes that is possible, though, and the plan is to soon expand the team to about 25 people.\n\n“We are thrilled to be working with Classiq, assisting the team in achieving their goals of advancing the quantum computing industry,” said Sarit Firon, Managing Partner at Team8 Capital. “As the quantum era takes off, they have managed to solve the missing piece in the quantum computing puzzle, which will enable game-changing quantum algorithms. We look forward to seeing the industry grow, and witnessing how Classiq continues to mark its place as a leader in the industry.”", "pred_label": "__label__1", "pred_score_pos": 0.971530020236969} {"content": "What Do Olympic Swimmers Eat?\n\nMichael Butler\nWritten by\nLast update:\n\n\nNathan Adrian eats lots of delicious foods but also expands his calorie intake by eating lots of fat. His go-to meal is grilled chicken and generous toppings. He also indulges in pizza, “late-night” ice cream, and burritos.\n\nIn order to maintain the ideal calorie-to-fat ratio, Nathan fills 70% of his plate with healthy, unprocessed high-carbohydrate foods, such as brown rice and lots of fruits and vegetables. That way, he’s able to keep his brain and physical performance sharp for his swim competitively.\n\n\n\nIn the lead-up to the Olympics, we always eat tons of carbohydrates, maintaining a 6% body fat, and at the Olympic Trials we eat 7-8 times a day. During the winter, we eat a lot of carbs. We also try to make sure that we’re at a caloric equal at noon every single day.\n\nI have a few go-to staples when I can’t think of what to make. Some of my go-to staples are vanilla protein powder, almond milk, ice, and bananas. I throw in some peanut butter and it’s a delicious post-workout shake.\n\nI also really like peanut butter on toast! But I don’t always have time for that! I’m trying to cook healthier meals, but for short notice it’s so easy to just slam a snack.\n\nBut I’m trying to make more of an effort to eat healthy, which we don’t really have time for because we’re always traveling. We’re basically living out of a suitcase. It’s really hard!\n\n\nChampion Swimmer, Food Lover\n\nMany athletes are known for their strict diets, particularly those competing at the Olympic level. Achieving an edge over one’s competitors can mean the difference between victory and a loss. So it’s no surprise that Olympic athletes take their training and diet very seriously. Some have even garnered a reputation for unique eating habits such as Gus Kenworthy, whose diet includes peanut butter and pickles.\n\n\nOlympic swimmer Kathleen Baker is a highly disciplined professional athlete.\n\nShe has to be. She’s a favorite for gold as she goes through grueling training for the Rio Olympics in August. She’s also a physical education teacher in North Carolina.\n\nHer combination of abilities makes her an excellent role model for kids who want to be just like her, especially when it comes to diet.\n\nKathleen eats 5-6 small meals throughout the day over a span of 6 hours. She fills 50% of her plate with carbohydrate and 30% with lean protein. She stays away from fats. The remaining 20% of her plate is filled with vegetables.\n\nFor example, Kathleen may eat an egg white omelet for breakfast. That is followed by a protein shake with banana and apple or chocolate yogurt for mid morning snack. A spinach salad with tuna or chicken, paired with steamed broccoli or asparagus for lunch and a protein shake like Shakeology for mid afternoon snack. She will have fish, chicken, beef, or legumes over a bed of brown rice for dinner. Refreshing fruit cup for dessert.\n\nBy following this diet, Kathleen believes that she can maintain high energy levels and weight and continue her competitive career for years to come.\n\n\nWith the Olympics in full force, it’s easy to think that Olympians are just made of something different. The truth of the matter is they still have normal dietary habits and they indulge in foods that are junk food or fried food at times. But there are three food demons that they stay away from.\n\nThey rarely eat or drink:\n\n • Hot Sauce\n • Salt\n • Alcohol\n\nIt’s actually not uncommon for Olympians to experience, cramping, bloating and even nausea when they eat these foods. This makes sense since their bodies are finely tuned to produce peak performance. Keep in mind that this is a practice that they have learned through experience as some of these athletes performed better prior to eliminating them from their diet.\n\nThey limit their sugar intake\n\nInstead, they eat foods like fruit, peanuts, white fish and porridge made from oats and whole grains. Think about how much sugar you eat on a daily basis. Most of us consume foods that have sugar in them. Cutting it out of your diet, can help you reduce your weight and increase your energy level and immune system.\n\n\nRyan Lochte is an American competitive swimmer who has won six Olympic medals. He is famed for his trademark partying antics during international competitions … and he notes “I’m pretty much a night owl. I like to stay out and go have fun, whether it’s going to the club, going dancing … I do everything have a good time.”\n\nNo doubt that Lochte’s Olympic success has been driven by his approach to nutrition. But what does an Olympic swimmer eat on a typical day? Lochte’s diet is designed to give him the extra energy for competition and a nice lean physique. His meals are all to be eaten in a specific order, and he eats five times a day. Here’s a typical day for Lochte, what he eats, and what he drinks to promote his performance.\n\n\nPart-time Teacher & Full-time Swimmer\n\nOne of the biggest names and faces of the Olympics is this Swedish athlete. She’s the one who quickly became a superstar overnight with her 5 gold medals. She’s even being called “Superwoman”.\n\nPart of her success is attributed to her extreme wake-up time – 4am, even if she doesn’t have any pending activities that morning. Not everyone can survive on just 4 hours of sleep per day, but she does so efficiently without compromising both her performance and her fitness.\n\nWhat’s her secret? According to Sarah, the key is moderation. She makes sure she gets enough sleep and her daily diet is not too strict. She’s not a vegetarian, as she thinks fish is good for her body.\n\n\nSwimmer. Kylie was raised as a vegetarian and became interested in vegetarianism when she learned about issues surrounding the treatment of animals in factory farms. Her own health inspired Kylie to become vegan.\n\nAs a competitive swimmer, Kylie needed a diet that would provide her with enough energy to compete, without relying on high-sugar, high-fat foods. It was also important that in the process of losing weight, Kylie would not compromise her health, her speed, or her muscle mass.\n\nEating a variety of minimally processed foods including vegetables, beans, whole grains, and legumes, Kylie learned to fuel her body with the nutrients she needed without adding a lot of extra bulk.\n\nThroughout the course of her swimming career, Kylie's diet has changed significantly. Over the years, Kylie's weight has fluctuated, but she has always maintained her muscle mass. Despite this weight fluctuation, Kylie has maintained mostly the same training intensity and volume.\n\nEating right is critical for any athlete, but especially for swimmers. Swimmers burn a lot of calories just from their workouts. Training 20 hours a week requires a good diet and Kylie stuck to a plant-based diet to fuel herself without adding extra weight.\n\n\nCate Campbell, a member of the Australian swimming team, approached me for cues on how to improve her training, technique, diet, and overall performance.\n\nShe was also curious to know what Olympic swimmers eat during important competitions like the Olympics Games.\n\nI could understand her concern as the Olympics is one of the most competitive events in the world and requires swimmers to be at their best.\n\nWe have a pretty routine eight-hour training regime and we also train under various levels of stress to get our bodies accustomed to the stresses that we will face in competition.\n\nOur goal for the Melbourne Olympics was a relay gold. We were three points short of our goal, which was the first time in 16 years the Australians had been beaten in a relay final.\n\nAs a team, we also had a goal to get three individual medals. We did not quite reach those goals, but it’s encouraging to see our swimmers winning medals at the games. Hopefully, in the future, we’ll be able to go into the Olympics with a clear goal and a flawless performance.\n\nThe intensity of the training was very high. The last three weeks before the Games, as a team, we averaged about 8-hours of training, with training blocks of twelve hours.\n\n\nHere’s an important need-to-know fact about the energy requirements of Olympic swimmers: In order to maintain your weight and perform at your best, your daily caloric intake should be approximately 7-10 calories per pound of body weight.\n\nDuring training sessions, the calories burned can be as many as 8,000 calories per day, so nutrition can make a huge difference between success and failure.\n\nThe three most important foods to build a swimmer’s diet are carbohydrates, protein, and fat. According to Mike Barrowman, Olympic Swimmer and head coach for the University of Southern California men’s and women’s swim teams, “There’s this misconception that we eat pizza and chicken wings because of our stressful schedule. Swimmers have structured nutrition schedules that we adhere to.”\n\nHere is a sample day for an Olympic swimmer:\n\nBreak fast with a cup of oatmeal and Crystal Light.\n\nSnack on a protein bar and some grapes.\n\nDrink a glass of chocolate milk and eat a sandwich on whole wheat bread.\n\nDrink Gatorade during practice.\n\nEat another protein bar, a turkey sandwich, and a banana after practice.\n\n\nAs a 6-time Olympic medalist, who was widely considered to be one of the greatest female swimmers of all time, Janet Evans should be our prime example of the perfect Olympian. While we may not all aspire to be Janet Evans, knowing what she eats will help us determine what is most optimal for us.\n\nDon’t be fooled by her petite figure – Janet is definitely a beast when it comes to her training schedule. She swims between 100 and 140 miles each week, which is why it’s no surprise that she tops her daily calorie intake at 1300 calories. You’d need to curtail your social life to maintain a calorie count that high every day.\n\nWhat’s interesting about Janet is that she’s known to consume three-square meals of healthy, high-quality foods each day, but she also relies on healthy drinks to meet her calorie intake. Janet’s diet includes an almost even split of carbohydrates and proteins, with a ratio of 11 grams to 8 grams, respectively.\n\n\n\n6:07 AM\n\nWhat do swimmers eat? Believe it or not, the answer is a little bit more than just fish!\n\nWith three gold medals and two bronze medals in the Olympic Games within the last decade, US Swimmer, Stephanie Horner should know about Olympic diet! As one of the most decorated Olympic swimmers in history, Stephanie has won more medals in the last 10 years than most swimmers win in a lifetime.\n\nAt age 19, Stephanie became the first woman in history to win Gold Medals in both the 100m and 200m backstroke at a single Olympic Games. And to top it off, when she won her first gold in 2000, she broke a world record in the 150m breaststroke in the process.\n\nIn addition to her Olympic accomplishments, she is also the former backstroke world record holder and she is a two-time Olympian (2000 & 2004).\n\nIt takes a lot more than hard work and determination to become the best. In Stephanie’s case, it’s a healthy diet … and the right kind of healthy diet can help you reach your goals and achieve your dreams.\n\nWhat does an Olympic Swimmer eat? we’ve put together a list of some of Stephanie’s diet staples.\n\nPlanning for success\n\nYou can’t do well Under any circumstances when you’re hungry. Put another way, you can’t work well if you’re hungry. That’s why we all eat before work.\n\nWhether you’re an Olympic swimmer, a triathlete or a recreational swimmer, you’ll want to make sure you’re well-fueled before you get into a pool.\n\nHere’s a general idea of how the top swimmer eat.", "pred_label": "__label__1", "pred_score_pos": 0.934118390083313} {"content": "What Is Xplor Park (and Is It Better Than Xcaret)?\n\nXplor Park is like Xcaret but more physical, and equally fun and exciting. Xplor’s claim to fame is it’s many zip lines and its outdoor excursions that rival Xcaret’s, with an evening twist for a more fun time.\nWhat Is Xplor Park\nTable of Contents\n\nXcaret offers so much, with its diverse attractions it’s difficult to narrow down your options. While Xplor offers a specific flavor, offering an option that appeals to those looking for a physical and outdoorsy kind of fun and adventure.\n\nWhat Is the Difference Between Xplor and Xcaret?\n\nXcaret feels more of a theme park than a place for exploring. Xcaret is perfect for mixed age groups as there is something for everyone. It’s relatively more laid-back and easy for everyone who’s endlessly curious.\n\nXplor is perfect for those looking to spice up their adrenaline and loves outdoorsy activities. This park is all about zip lines, swimming in underground rivers, and plenty of activities that take guarantee fun and high energy. It’s more for the younger ones, ages 14 to 45, especially if they’re physically active.\n\nWhich Is Better – Xplor or Xcaret?\n\nIt depends on what kind of experience you want to have, and the package deals you prefer. Xcaret is more laid-back, easy, and satisfies the curious, as there are animals in the park, a beach, swimming pools, and an evening show that hosts a musical ensemble about Mexico.\n\nXplor is perfect for those who love mini excursions, and fun-filled adrenaline activities. Think zip lines, underground rivers that are fully subterranean, and cave tours on an amphibious vehicle.\n\nIf you’re more of an adrenaline junkie and physical, Xplore is your best bet. And if you’re more curious and laid-back, Xcaret is ideal for you.\n\nHow Much Does Xplor Cost?\n\nXplore costs around 130 US dollars for adults, older than 12. Kids aged 5 up to 11 get half the adult price, which is around 65 US dollars. And, younger kids of 5 and below are free of charge.\n\nIs Xplor All Inclusive?\n\nAn Xplor ticket is worth its price as it is an all-inclusive admission. From zip lines, amphibious vehicle tours, underground expeditions, to unlimited snacks, buffet lunch, lockers, and other facilities.\n\nHow Long Does It Take to Do Xplor?\n\nDoing Xplor, with all its activities and tours and explorations, will take about a total of 4 hours. The park opens from Monday to Saturday, from 9:00 AM to 5:00 PM, so you’ll have plenty of time to take breaks, and move on to another activity.\n\nWhat’s the Difference Between Xplor and Xplor Fuego?\n\nXplor Fuego is the exact same park as Xplor. It’s Xplor but at night, as all its highlights take place at night. However, with Xplor Fuego, there are fewer people as most prefer to do daytime activities.\n\nXplor Fuego admission is also cheaper, and the park is open from 5:30 PM to 11:30 PM. Since it’s at night, activities are fewer because of visibility and safety, and hours are also condensed – which means they tend to be shorter.\n\nAlthough it’s still all-inclusive, especially with food and snacks. The buffet menu at night is different are have more choices than the daytime menu. Snacks and non-alcoholic drinks are still available at night.\n\nWhat Time Does Xplor Fuego Start?\n\nXplore Fuego admission starts from Monday to Saturday, same as Xplor. The park opens from 5:30 PM to 11:30 PM, giving you a total of 6 hours in the park as opposed to the daytime’s 8 hours.\n\nWhere Is Xplor Fuego?\n\nXplor Fuego is the exact same park as Xplor. It’s Xplor, but night. Although the same, there are significant differences with the activities in the park at night like the reduced number of activities, fewer hours, and a different buffet menu.\n\nHowever, the entire place is lit quite beautifully at night adding a twist to the park, perfect for photo ops. There are also fewer people at night which may be appealing to some.\n\nHow High Are the Ziplines at Xplor?\n\nTwo zip line circuits that stand in Xplor are 45 meters high, with a distance of 3.8 km or 2.4 miles. These features provide are what makes Xplor’s zip lines so interesting, plus each circuit has 7 zip lines. The depth of the water landing is 8 meters below ground level.\n\nHow Deep Is the Water at Xplor?\n\nXPlor’s underground river varies between 2 to 16 feet, and the use of life jackets is mandatory. The underground river in Xplor is slightly different from that of Xcaret’s. Xplor’s underground river is a subterranean system that is completely below the ground, that is, it doesn’t have air openings like Xcaret’s.\n\nWhat Can I Bring to Xplor Park?\n\nXplor Parks activities and attractions require comfortable wear perfect for physical activities, and excursions. Bring shirts, tank tops, and shorts for mobility and comfort. Swimsuits and swimming shorts are also ideal because many activities in the park may get you fully wet.\n\nIt’s also great to invest in some water shoes as they can be perfect for different terrains, and they don’t easily slip off. Should you choose to bring anything else, make sure they support your ankles and soles, and they can be strapped to your feet.\n\nSunscreens are also a necessity, most activities will expose you to the sun for a long time. It’s important to protect your skin and avoid bad tan lines. However, it’s best to use biodegradable sunscreens to protect the environment.\n\nDoes Xplor Have Lockers?\n\nXplor admission tickets can avail you of two lockers, together with other facilities and amenities around Xplor.\n\nHow Much Are Water Shoes at Xplor?\n\nWater Shoes have priced around 30 US dollars which can be expensive. Buy a pair wherever you’re from or anywhere in Playa del Carmen, they can be cheaper than the ones sold at Xplor.\n\nWhat Else Should I Bring to Xplor?\n\nIt’s also ideal to bring another pair of footwear other than water shoes. If you’re not doing any activities, like taking breaks or eating at the buffet it’s best to slip on some sandals or any other footwear that are comfortable.\n\nHow Do I Get to Xplor Park?\n\nXplor is neighbors with Xcaret park and Xenses. You can get there by any mode of transportation available in Playa del Carmen where the greater Xcaret Park is located. If you’re from outside Playa del Carmen, like Cancun, or Tulum, you can get there by taxi or bus.\n\nHow Do I Get From Playa Del Carmen to Xplor?\n\nYou can get to Xplor by taxi or bus, which can only take 10 to 15 minutes. Taxis can be hailed anywhere around Playa del Carmen, however, it’s best to take them in sitios or taxi ranks across the city. Buses have certain stops across the city as well, especially along major roads and highways.\n\nHow Far Is Xplor From Cancun?\n\nXplor is 56.3 km or 35 miles away from Cancun. You can get to Xplor by taxi, bus, or rental car via the Federal Highway 307. It only takes about an hour to get there, given certain traffic conditions and other variables.\n\nHow Far Is Xplor From Tulum?\n\nTulum is 54.7 km or 34 miles south of Xplor. It only takes less than an hour to get there by bus, taxi, or rental car via Federal Highway 307.\n\nWhich Is Better – Xplor or Xel Ha?\n\nXplor is more about adrenaline-filled activities and tours along with aquatic-geological formations like caves and underground rivers. Xel-ha is all about water, like snorkeling, and other water activities. In a way, Xplor is more land-based, while Xel-ha is aquatic.\n\nIt depends largely on what you want to experience while on Xcaret. While both have their own flavors, both offer fun and entertainment that the vast expanse of Xcaret Park promises.", "pred_label": "__label__1", "pred_score_pos": 0.9043931365013123} {"content": "Townhouse Vs Apartment Pros And Cons- An Ultimate Guide To Make You Satisfy!\n\nTownhouse vs Apartment Pros And Cons\n\nThere are many factors to consider when deciding whether to live in a townhouse vs apartment. Cost is often the biggest factor, as apartments are typically cheaper than townhouses. However, townhouses usually offer more space and privacy than apartments. Another consideration is maintenance; townhouses often have an association fee that covers exterior maintenance, while apartments typically do not. Location is also important; townhouses are usually located in suburban areas, while apartments are typically found in urban areas. So today, let’s talk in-depth about Townhouse Vs Apartment Pros and Cons.\n\nWhat is Townhouse?\n\nA townhouse is a type of dwelling that shares walls with other dwellings in a row or block. Townhouses are usually in groups of three to five, and each has its entrance from the street.\n\nThe term “townhouse” can also refer to a freestanding unit in a group of residences, such as a condo or co-op. In this case, the townhouse would have its entrance, but the grounds and common areas would be shared with the other units in the group.\n\nTownhouses are a popular housing option for many people because they offer more privacy than apartments, but they’re usually more affordable than single-family homes. If you’re considering buying or renting a townhouse, you should keep a few things in mind.\n\nWhat is an Apartment?\n\nAn apartment is a housing unit that is part of a larger building. The building may be a high-rise, a mid-rise, or a low-rise. There are many apartments, including studio, one-bedroom, two-bedroom, and three-bedroom apartments. Apartments are usually leased for a set period, such as one year.\n\nAn apartment provides tenants with their own private living space. Usually, an apartment includes a kitchen, a bathroom, and one or more bedrooms. Some apartments also have balconies or patios. Sometimes, an apartment may be located on the top floor of a building and have access to a roof deck.\n\nLet’s Start the Complete Discussion on Townhouse Vs Apartment Pros and Cons\n\nThe debate of townhouse vs apartment has been raging for years, with no end. But maybe it's time to finally have a complete discussion on the pros and cons of each option.\n\nOn the one hand, a townhouse gives you more space and privacy than an apartment. You also have your yard and don't have to share common areas with neighbors. But on the other hand, an apartment is usually cheaper and easier to maintain than a townhouse. Plus, you often have access to amenities like a swimming pool or gym that you wouldn't have in a townhouse.\n\nSo what's the verdict? It depends on your specific needs and preferences. If you want more space and privacy, a townhouse might be the better option. But if you're looking for something cheaper and easier to maintain, an apartment could be better suited.\n\nGet To Know About Townhouse\n\nTownhouses are one of the coolest residential units for living with family. They usually have a good name for centuries.\n\nJust like their name, they are situated in town and city areas. With their great design and living structure, most people love living in townhouses.\n\nYet, townhouses have good benefits with a few drawbacks. So, if you are planning to live in townhouses, check its pros and cons down below:\n\nPros Of Living In A Townhouse\n\nFor a novice who doesn’t know about townhouses, they have good benefits for living. There are many pros of townhouses that make them popular. Yet, we have made a good list of townhouse advantages for your ease. Read them out: \n\nLower Maintenance\n\nLiving in townhouses helps greatly for you with less maintenance. So, you don’t have to worry about towing weeds, cutting tree leaves or grasses, trimming shrubs, etc. Plus, townhouses allow you to live well without no maintaining the outer yard. And they take care of outside issues well.\n\nGood Environment\n\nTownhouses are famed for giving fine surroundings. In 21st-century society, they have a fine location outside. You can also locate anything handy for shopping, dining, or restaurants. And, they are usually made in city areas so you can find anything from outside.\n\nBrilliant Sense Of Community\n\nIf you are extroverted and love to live in a strong community, the townhouses are excellent. They are usually situated in community areas where a few neighbors are a few hundred yards. Also, owners made townhouses so that a good amount of people live within a short distance.\n\n\nAnother benefit of living in townhouses is amenities that ensure uniformity, simplicity, and comfort. Most townhouse architects include HOA fees and purchase prices with great service and facilities. It adds swimming pools, car washing, trash service, pest control, etc.\n\nAffordability & Savings\n\nDo you know townhouses are less expensive to purchase and cause fewer bills? They are a great choice for living for single-family. Also, townhouses cause fewer costs, such as house bills and rents. This house unit plan is way friendlier for a family than a detached home with a backyard.\n\nMore Space\n\nYou’ll be blown by looking at townhouses' space point that allows lavish living. They are also roomy with clever windows for open lighting to living luxury with no hitch. Townhouses are an ideal pick for busy retirees or small families to live in good space. And, they have fine freedom.\n\nCool Design\n\nTownhouses are super cool in design with a good footprint. They are usually built with quality floor plans, roof, and ceiling design in a correct structure. Also, townhouses are functional with a simple yet elegant design.\n\nCons Of Living In A Townhouse\n\nEven though townhouses are good with many benefits, they still have some downsides too. For a few disbenefits, some people go with a single-family home. So, let’s take a closer look into the disadvantages of townhouses:\n\nLower Privacy\n\nOut of all, you will get lower privacy when living in townhouses. Surely, they have good space benefits but sharing a physical wall with neighbors lessens privacy. Even if we find this issue not tricky yet, it can disturb some people. And, the backyard in townhouses won’t be fully private.\n\nNoise Trouble\n\nIf you live in townhouses, you’ll hear more noise inside the home as they are attached on both sides. It is one of the reasons a few people move to detached homes. Also, you can hear your neighbor's TV sounds, arguments, and other sounds at any time.\n\nGet To Know About Apartment\n\nApartments are modern vibe residential unit that allows a good living atmosphere and good privacy. They usually have a unique design and layout for living.\n\nAnd apartments can be small or bigger, yet they offer good building compression. They as well include car parking, pools, and other service benefits.\n\nGenerally, they have good advantages as well as hitches. Before announcing a winner among townhouse vs apartment pros and cons, read down below:\n\nPros Of Living In An Apartment\n\nApartments are excellent residential unit that holds a large number of benefits to live in. For people with limited incomes, an apartment is an excellent option with fine advantages. Check out all the pros of living in apartments:\n\n\nApartments have a good lifestyle and design for living well. They as well made with the urban complexion to move in. Apartments have improved design to be close to cinemas, bars, shopping stores, and other locations.\n\n\nApartments are well-protected for you to live well. They also have multiple doors and strong security with the main and floor door to stay well. And, apartments have costs and expenses to ensure top-notch safety. Plus, they have strong protection against thieves to live cozily.     \n\nEasy To Maintain\n\nThey have a big and elegant space. Still, apartments give low maintenance. Living in an apartment will help you get rid of working or fixing problems faster. You also will be liberated from dishwashers and other repairs to save extra payments if living in apartments.\n\nEase Of Cleaning\n\nOne of the most effective benefits of apartments is the ease of cleaning. They have a great design that causes less cleaning for easiness. Living in apartments also ensures investing your energy, such as a gym. In short, apartments give no hitch on cleaning.\n\n\nApartments are designed super simple and convenient. Even if the space is not bigger, you will surely have a living room, bedroom, bathroom, and kitchen in the apartment.\n\nThey also provide good quaint for living well. And, apartments are fine for college kids, single women, or bachelors. Thus, the size of apartments is a plus point for most people to live.\n\n\nYou can save your home bills and rent if you live in an apartment. The apartments are super responsible and less burden when saving bills and rents. They also allow saving extra costs for you to live snugly. Plus, apartments are good for servicing and facilities.\n\nShort-Term Alternative\n\nLiving in an apartment is great for a short-term period. Apartments also give you good freedom to simply shift from other houses. For its great flexibility, you can live in apartments for 3 months to 1 year. And so, most people love to live in apartments for a short period.\n\nCons Of Living In An Apartment\n\nApartments are well-known for their benefits among most people. Aside from benefits, there are a few downsides to apartments. They also have possible disbenefits that some people dislike. Check them out:\n\n\nThe parking area of apartments is a drawback. Usually, apartments have a smaller area to park cars or other transport. And, apartments can block allocated parking. Plus, they can give a challenge to visitors and travelers for parking.\n\nSmaller Space\n\nOne of the most weaknesses of apartments is their smaller space. The apartments are generally smaller in space compared to other residential units. Due to the small space, you cannot place more decorative stuff.  Yet, the space of the apartment will be perfect for a bachelor.\n\nFinal Touch\n\nBoth townhouse vs apartment pros and cons are famous picks for renters as a living alternative.\n\nIf you are one of those who want good space and comfort with great amenities, townhouses are an ideal pick. They are also good in lifestyle.\n\nOn the flip side, if you want a smaller space, safer, and noise-free atmosphere, then apartments are a good choice. They are also comfortable for bachelors.\n\nFrequently Asked Question\n\n\nWhat is the Difference in Size Between a Townhouse And an Apartment?\n\nTownhouses typically offer more space than apartments. This extra space can be in the form of additional bedrooms, bathrooms, or living areas. If you need extra space, a townhouse is likely to be a better option than an apartment.\n\nWhat is the Main Difference Between a Townhouse And an Apartment?\n\nThe main difference between a townhouse and an apartment is that a townhouse typically has its own private outdoor space, while an apartment does not.\n\nWhich is More Expensive, a Townhouse or an Apartment?\n\nThe townhouse cost can vary depending on the size and location, but it is generally more expensive than an apartment.\n\nWhich Home is Better For Families, a Townhouse or an Apartment?\n\nFamilies often prefer townhouses because they offer more privacy and space than apartments. However, each family’s needs are different, so it is important to consider all factors before deciding. \n\nMore To Read:\n\nLast Updated: Oct 03, 2022\n\nMore Similar Posts\n\nBungalow Vs Craftsman House- What's Your Own Choice?\n\nIt is difficult to say which style is better, Bungalow Vs Craftsman. It depends on what you are look...\n\nCarpet Vs Hardwood Health Benefits, Longevity, Price Point & More\n\nWhen choosing between carpet and hardwood floors, there are several things to consider. Carpet has b...\n\nCost of Drafting House Plans- Revealing All Hidden Fees You Should Know About!\n\nThe cost of drafting house plans depends on the size and complexity of the project. If you're lo...\n\nHow Much Does A 12x24 Inground Pool Cost- Get The Clear Budget Concept!\n\nWho won’t love to have a fascinating how much does a 12x24 inground pool cost besides one...\n\nHow Much Does It Cost to Build a Mansion- Our Experts Opinion\n\nIf you are planning to build your own home, then it’s a huge task. You will surely need perfec...", "pred_label": "__label__1", "pred_score_pos": 0.7760303020477295} {"content": "The Vampire Slayers\n\nThe book Dracula by famous author Bram Stoker has been the inspiration for many vampire movies. One famous character from that book was Abraham Van Helsing. In this story, Van Helsing was a man of science who became the archenemy of the vampire Dracula.  Stoker once stated that the Van Helsing character was based on a real person. But who?\n\n\nOne possible candidate is Georg Andreas Helwing who was born on the 14th of December, 1666. During the early 1700’s, there was a rash of supposed vampire sightings and attacks in Europe. This period became known as the 18th Century Vampire Controversy.  Many people banded together determined to hunt vampires into extinction.\n\n\nA descendant of Georg Helwing recently discovered a journal that belonged to Georg Helwing. In this journal there was a reference to two friends, Aleksander Petrovic and Mikolaj Kowalski, who were helping Helwing with the task of exterminating the undead.  Helwing's journal goes on to state that both disappeared at separate times while investigating a member of the Slovanti family in 1728.  So what happened to these two vampire slayers?\n\n\nBack In Time has been hired by a descendant of Georg Helwing to send a team back to Slovanti’s house in 1728 to determine the fate of these two vampire slayers and perhaps determine if vampires truly existed during this period.\n\nDo you and your team have what it takes to uncover the fate of Helwing's two associates or will you be lost in time as well?  Sign up for this mission and find out!\n\nThis room is recommended for all players with BEGINNER and ADVANCED levels available.", "pred_label": "__label__1", "pred_score_pos": 0.8315807580947876} {"content": "In Delhi, the MCD workers were on strike for their salary issue. Now after promise from government side they called off the strike. The political parties are now entering in the issue and try to make profit out of it. Members of each political party can be seen picking garbage to blame other party for the situation in Delhi.\n\nYou do not have permissions to reply to this topic.", "pred_label": "__label__1", "pred_score_pos": 0.9959327578544617} {"content": "We Are Here To Help You Through Your Most Difficult Times\n\n 1. Home\n 2.  – \n 3. Personal Injury\n 4.  – What steps should you take after a car accident?\n\nWhat steps should you take after a car accident?\n\nOn Behalf of | Nov 18, 2022 | Personal Injury\n\nA car accident can cause serious physical and emotional harm and make it harder for you to go back to living a normal life. If you recently got involved in a collision, it may take some time for you to go back to work, school and your other regular activities.\n\nMotor vehicle collisions are common and the Centers for Disease Control and Prevention states that in 2020, nearly 41,000 people in the U.S. died in car accidents. Taking the following steps can improve the recovery process while helping you protect your interests.\n\nSeek medical attention\n\nEven if you did not get seriously injured in the car accident or believe you sustained any injuries, you should still see a doctor after the crash. In some cases, car accident injuries will begin to manifest several days following the initial trauma.\n\nWrite down your personal account\n\nAs you move forward from the collision, the details of the accident may start to become less clear. As soon as you are able, write down what happened during the car accident from your perspective.\n\nAccumulate documentation\n\nStart putting together documentation that supports your perspective of the car accident. For example, obtain the names and numbers of any witnesses who saw the accident as well as copies of your medical records related to treating your injuries.\n\nIt can take time to recover from a car accident and feel like life has gone back to normal. Seeking medical attention and following your physician’s instructions, as well as gathering applicable documentation, can help you protect your right to fair and proper compensation.", "pred_label": "__label__1", "pred_score_pos": 0.9948456287384033} {"content": "Beitrittsdatum: 15. Mai 2022\n\n\nAmrutha Spoken English Book In Telugu Pdf Free 57 gaberm\n\n\nDownload: https://urluso.com/2kh8m4\n\n\nAmrutha is a female name, . in colloquial Telugu. The author feels that the name Amrutha means 'fragrant'. Book Title: Amrutha. Title Page: Page 5. Publisher: Publisher Name: Publisher Year: 1961.Post navigation e-town.net The DigiTown project was started by a group of programmers at Poland’s University of Wrocław in late 2000. The team consisted of four student programmers, including a very young and enthusiastic new member: Michal Śliwka. We decided to make an attempt to write a clone of Atari’s e-town as a 32bit game. The game’s architecture was developed using our custom programming language, which we named Modula-3-E. This was the first version of the game, which was later rewritten from scratch using C#. Modula-3-E was a very simple language with many similarities to an actual assembly code. Modula-3-E was based on simple object-oriented concepts. The digiTown project was one of the first Open Source projects and its authors aimed to push the boundaries of game development on personal computers. Modula-3-E was written in C# and its source code is available at DigiTown website. The game was published by 1C Company in February 2001, and it received a good response at the time. It is worth mentioning that the game cost only $500 to make, while high-end games at that time usually cost around $3,000.Q: how to disable the button if the input field in the same row as the button is empty? i have a table in which the user can add and remove rows. when i click add row, a dialog box appears where the user can input the data. If the user clicks cancel, the row can be removed, but if he does not, the row should not be removed. how can i do that? the code i have is this: $(document).ready(function(){ $('.dialog-confirm').dialog({ resizable: false, height:140,\n\n\n\n\n\n\n\n\n\nAmrutha Spoken English Book In Telugu Pdf Free 57 gaberm\n\nWeitere Optionen", "pred_label": "__label__1", "pred_score_pos": 0.9968067407608032} {"content": "Why positive psychology has a place in schools\n\nWhy positive psychology has a place in schools\n\nCould the field of positive psychology be a lever in education for schools that focus more on children's happiness and health, rather than on academic knowledge, goals and motivation?\n\n\nCertainly education is not independent of the trends that generally move in our economic system or society. It would be a mistake to treat education as dependent on teachers' knowledge or educational level as something independent.\n\n\nBut there is an appreciation that scientists in positive psychology can provide ideas and solutions for a school that is happier, more productive, and more adapted to the needs of children.\n\n\nPsychology has been involved in education generally since the 1930s in many developed countries, so its theoretical reinforcement with elements of positive psychology would have been more of a form of upgrading. We should not consider that the idea of education as a means of happiness and fulfillment for man is new. Aristotle from his time argued that this should be the goal.\n\n\nHow is education related to positive psychology?\n\n\nAccording to research, teachers realize that education is inevitably linked to students' emotional health and well-being. Finally, in the hierarchy of needs for good education, emotional support is perhaps also a prerequisite for the process of knowledge and assimilation.\n\n\nA 2013 study confirms that the emotional health of young children can lead to improved performance at older ages. In other words, positive education does not focus on one's mental health at the expense of academic knowledge, but it lays the groundwork and provides the opportunity for more effective education.\n\n\nIn-class discussion is considered one of the key aspects of this endeavor, in particular combined with teacher-defined recognition. This method not only ensures that the children are ready for the next day, but also ready to participate in a live discussion.\n\n\nHappy teacher means happy students too\n\n\nThe issue of positive education is not just about students but also about teachers. It is part of the broader objective of teacher happiness and satisfaction. A happy teacher can best convey the message that knowledge is joy and power in the end.\n\n\nOf course, the happiness of a person - as well as that of an educator - cannot be guaranteed unless their income is examined. It is certainly not a coincidence, as research shows, that the teachers of those who receive a lower salary are not able to offer the same psychological support in their class as those who are well-paid. And if not, this is perfectly reasonable and next. The fact that a system that is concerned with the mental health and well-being of students and teachers must surely capture valuable pay and employment relationships to achieve the goals.\n\n\n\nPracticing emotional intelligence\n\n\nSocial and emotional knowledge are issues that usually go through the education cycle itself. However, this knowledge is undoubtedly valuable both for the present and for the future of children, as they can be a means of avoiding problematic behaviors and promoting spiritual balance and well-being.\n\n\nIn particular, children manage to:\n\n- discover their personal sources of joy\n\n- learn to express gratitude\n\n- freely express their feelings through art, movement, speech\n\n- express their happy thoughts and memories\n\n\nIt is a chapter that is deeply rooted and has a great deal of research and development potential. And if the system responds with a commitment to how it can introduce integrated programming that covers all aspects of education, positive school psychology, then only society should win.\n\n\nBy Dr Angel,\n\nAggeliki Koskeridou\n\nHolistic Doctor – Counseling Psychotherapist\n\nDoctor of Naturopathic Medicine\n\nMSc Health Psychology\n\n\ninsta: dr_aggelikikoskeridou_official \n\n\n\n\n\n\n\n\n\nMaslow, A.H. (1943). A theory of human motivation. Psychological Review 50(1), 370-396. doi:10.1037/h0054346\n\n\nSeligman, M.E.P., Ernst, R.M., Gillham, J., Reivich, K., Linkins, M. (2009). Positive education: positive psychology and classroom interventions. Oxford Review of Education, 35(3), 293-311. doi:10.1080/03054980902934563\n\nPin It\n\nSearch for articles\n\nFollow Us\n\n\nΕγγραφείτε & Κερδίστε ένα δώρο έκπληξη!", "pred_label": "__label__1", "pred_score_pos": 0.9991251826286316} {"content": "On Poland and Power\n\nCoordination & Electricity\n\nby ,\n\nFifth Estate # 310, Fall 1982\n\nThanks again for running my article on Poland, and for E.B. Maple’s reply. (See FE #309, June 19, 1982, “The Collapse in Poland”) Maple seems a little over-anxious for a dispute on the questions raised, in some cases going out of his way to misinterpret what I say, and to ignore parts of the article in which I clearly distinguish the revolutionary movement from the organizations which speak for it, and from the capitalist state which cannot be reformed or seized. Still, there are several points on which we genuinely disagree.\n\nI spoke of power in the primary sense of the word, “the capability of producing an effect, the ability to act,” not in the secondary meaning of the word, “control over others.” In this sense it should be clear that power doesn’t need to be destroyed, but needs instead to be democratically realized. Through a revolutionary movement formerly powerless individuals would collectively achieve power, would achieve the ability to effect and shape their world to answer their own desires. Achieving this collective ability is what I mean by the “seizure of power,” and it will require seizing decision-making from the capitalist dynamic and managerial minority now shaping our world.\n\nTo achieve this control over our world, people will need control over the material forces which shape their lives—the production of food, the design of cities, the supply of electricity, the system of transportation, housing, media, the peacefulness of neighboring countries or regions, and so on. As mundane as it may seem, the democratic production and management of food, housing, energy and other factors will be an integral part of our freedom and make possible a revolution in daily life.\n\nIn Poland these factors are all controlled by the State. But just because we want to abolish the State doesn’t mean we want to renounce control over these factors of our lives, or to leave them to chance. Unfortunately, control of these factors may require continued involvement in production processes inherited from capital. It happens that in Poland, for instance, the country’s electricity is largely supplied by its coal production. E.B. Maple can denounce my suggestion that decisions on coal production are important to Poles, but he must also then denounce people’s control of their electricity supply, and the activities made possible by electricity. No matter what happens in Poland, coal will be, at the least, a crucial transitional fuel, and it is therefore important that Poles be able to stop production for foreign-exchange export, maximize safety in the mines, regulate environmental impact of mining, and have all decisions on coal production in their hands. Of course, the social-political issue of the destruction of state and capital and the initiation of democratic communism is more important than any technical question. However, Maple’s comments on coal exemplify an approach that is so eager to denounce all aspects of society as it is, that it completely loses touch with what in practice will make our lives more our own, more social, more free.\n\nMaple implies that I endorsed “a state freed from class rule.” I made no such endorsement, and in fact, specifically commented in the article: “the organs of self-management cannot tolerate the existence of the old state/managerial apparatus. ‘The workers councils are the only power or they are nothing.'”\n\nIf people are to live collectively and democratically, and not as isolated individuals, they will have to create structures for the coordination of their activities. Only full democracy and thoroughgoing participation will prevent these structures from becoming a new State, a power separate from and above all the people of the society. Despite the danger of a new State, coordinating structures are a necessary element of the collective realization of freedom.\n\nThe anarchist ideology of “power must be destroyed” has too often been the code words for: No coordination of the movement or society, no structure for the movement or society (even a temporary and mutually agreed-on structure), total autonomy of each individual from all other individuals, no control over anything by anybody. This has been the interpretation of anarchism by many self-proclaimed anarchists—in the anti-nuclear movement, for example—and has been a principal cause of anarchism’s reputation as an anti-collective and impractical perspective.\n\nOne’s attitude towards coordinating structures inevitably surfaces in discussions of Solidarity. Where does coordination end and representation begin? Viewed from afar, my intuition is that Solidarity had a dual nature, coordinating and unifying people at the base, but also degenerating into a representative, union structure at the national leadership level.\n\nIt had aspects of both a repressive union apparatus and a “human community based on free association.” I specifically argued in the article that “the movement (not Solidarity) would have to assume political direction of the country” because I understand the important difference between revolutionary movements and the organizations which speak on their behalf. In practical terms, however, Solidarity involved so much of the population that in many ways it was the movement.\n\nI’m sure most Poles saw it that way. Debates within Solidarity were debates of the movement, and the articulation of positions within the official organization were in many ways the articulation of different trends in the movement. In that light the view of Walesa, Rulewski, Kuron, et al, are important as expressions of different currents within the movement. I would have included views of “the rank and file” if I had access to them. But whether one quotes a Kuron, or an unknown, the process is still one of using a single voice, as a spokesperson, reflecting the views of various segments of the movement. I am not just interested in the number of strikes, or the severity of riots, but also want to hear the articulation of views and theories by the insurgents. This interest in conscious politics, and not just mass sociology (“the daily acts of the unchronicled millions”—Maple), may also be a difference I have with Maple and the Fifth Estate. Your paper at times assumes the contradictory position of being the articulator for the inarticulate, the formulists of the spontaneous event.\n\nI myself am attracted to sweeping denunciations of every type of reform, and to the purity of anonymous, unarticulated, “unrecuperable” acts of violence against-the State, and to movements untainted by recognized organizations. But I am more convinced that the revolution leading to libertarian communism will be prefaced by struggles over reform, by the articulation of political positions by “rank and file” people and intellectuals, and by participation in mass organizations which will carry germs of both revolution and recuperation. Our analyses will have to sort through the value of the actual elements of a movement, and will have to draw conclusions regarding the movement’s options based on the actual specifics of the situation.\n\nRudy Perkins\n\nE.B. Maple Responds: Your remarks regarding the nature of power, what constitutes representation, the revolutionary movement, the need for or lack of coordination, and what is salvageable from capital are the meat of a discussion on the content of a modern revolution. I feel at least slightly uncomfortable with each of your formulations, but let me comment only briefly on two points. A view of spontaneous revolution does not imply a lack of coordination, but rather a refusal to be directed along already pre-determined routes devised by a party, “leading comrades” or self-appointed spokespersons for the movement. All revolutionary mass activity throughout history has created its own forms of coordination and democracy (many times taking the form of revolutionary workers councils), but a lack of planning in advance for either the revolution or its forms has never seemed to me to be the core of the problem faced by revolutionaries. In fact, excessive concern with coordination (and I don’t necessarily attribute this to Rudy) is exactly what produces a formal or informal bureaucracy and is what has stifled so many revolutionary upsurges in the past (such as the role of the CNT in Spain).\n\nAs we have said so frequently in the past, the physical plant of capital is what shapes its social relations, so I am decidedly cool to suggestions on how to maintain or, even worse, the necessity of maintaining the machinery capital has produced. I enjoy the benefits of centralized electricity very much, but would under no circumstances, other than having a gun pointed at my head, agree to mine coal in order to generate it. I assume once the coercion of wage labor has been ended, others will feel similarly, and since I would not ask others to do what I would refuse, how then do we get our coal? I would still contend if workers are advocating “democratic” or “socialist” coal production, not much of an advance is being made.", "pred_label": "__label__1", "pred_score_pos": 0.9909427762031555} {"content": "Share on FacebookShare on TwitterShare on LinkedinShare via emailShare via Facebook Messenger\n\nHow to Increase or Decrease Your Paper’s Word Count\n\nUpdated on\nNovember 15, 2022\n\nHow many times have you worked hard on a research paper or essay, felt confident in your argument, and decided you were ready to turn it in, only to notice that you’re still behind on the word count? Or perhaps you wrote too much, and now you’re struggling to find parts to cut.\n\nHow do you increase the word count without being redundant or reduce the word count without sacrificing your key arguments?\n\nYou take a deep breath and continue reading our suggestions on the best ways to increase or reduce word count without compromising the quality of your paper.\n\nGive your writing extra polish\nGrammarly helps you communicate confidently\n\nWhat is word count?\n\nWord count is what it sounds like—the number of words in a given writing sample or document..\n\nWord counts exist for many reasons—print publications, for example, have them to ensure stories can fit in a defined space in a newspaper, magazine, or book.\n\nBut when it comes to research papers and essays, word counts are used to level the playing field: Each student has the same number of words to get their point across. A strong writer can do this without using unnecessary words to reach the minimum word count, while also avoiding rambling and exceeding the maximum word count.\n\nOne of the biggest reasons some students run into problems with word count requirements is that they may be too focused on it. The writer can become more focused on the number of words than on getting their point across clearly and concisely.\n\nYour main priority is making sure your argument and writing are strong, and you may find that reaching your word count is made easier by doing just that.\n\n7 ways to reduce word count\n\nWhen trying to reduce word count it’s important to use a scalpel and not an axe—meaning you don’t want to delete large portions of your paper to ensure you’re below the maximum word count. Instead, you want to find small but significant ways to bring down your word count.\n\n1 Look for redundancies in your argument\n\nLook to see if you’ve repeated any information in your paper, and delete any redundant points.\n\nIf your paper has to do with climate change and you mention the rate at which the polar ice caps are melting twice, delete the second mention (unless it’s related to a separate point you’re trying to make). If you find yourself reiterating the same point in slightly different language, choose the one that is written more clearly and eliminate the other.\n\n2 Eliminate unnecessary or ancillary information\n\nFind any details that don’t serve your argument and delete them. For example, if you’re writing a paper about George Washington’s policy positions, you don’t need to mention his personal life unless it directly impacted his political career.\n\n3 Get to the point\n\nThe best arguments are clear and direct, and your paper should strive to be the same.\n\nWe could’ve built up that last sentence by talking about the different styles of communication or the pros and cons of being direct, but instead, we got to the point.\n\nTrying to build up your argument not only adds more words but may also weaken it, especially if you’re using unnecessary words.\n\n4 Delete the and that\n\nWe often use the while speaking, but in writing, there are times when the can be removed without changing your sentence’s meaning.\n\nThat is another common word we use, which may be unnecessary in some sentences. An example is in the sentence you just read—the writer instinctively put that before we and then realized it was unnecessary.\n\n • Original: We knew that he was active in the 1960s and the 1970s.\n • Edited: We knew he was active in the 1960s and 1970s.\n\n5 Eliminate unnecessary prepositional phrases\n\nThis is yet another example of separating how we speak from how we should write. Too many prepositional phrases can be a sign of excessive wording.\n\n • Original: For many people, the reality of an entry into a new area of employment is cause for a host of anxieties.\n • Edited: Changing careers makes many people anxious.\n\nGetting rid of the prepositional phrases forces you to tighten up the sentence. The result is shorter, more direct, and easier to understand.\n\n6 Use an active voice\n\nWriting that utilizes an active voice tends to use fewer words than writing that uses a passive voice. Let’s show you what we mean:\n\n • Active voice: Johannes Gutenberg invented the printing press in 1440.\n • Passive voice: The printing press was invented by Johannes Gutenberg in 1440.\n\nWriting with an active voice not only helps reduce your word count but can also help you communicate your argument in a more effective and clear way than using a passive voice.\n\n7 Avoid unnecessary adverbs and adjectives\n\nAdverbs and adjectives add extra words to your paper, and depending on their usage they may weaken or not add any value to your argument.\n\n • Original: Thomas Jefferson’s entire presidency was undoubtedly controversial.\n • Edited: Thomas Jefferson’s presidency was controversial.\n\n6 ways to increase word count\n\nThe word count may make up a significant part of your paper’s grade, but your final mark will likely rest on how well you write and the clarity of your argument.\n\nFor that reason, you don’t want to use more words merely to reach your word count even though using more words is an easy way to reach the word count.\n\nThat last sentence is a perfect example of what not to do. Here are some ways to extend your word count without resorting to adding unnecessary words.\n\n1 Investigate the paper’s topic more thoroughly\n\nRead through your paper and see if there are ways in which you can further discuss your topic without adding redundant or unnecessary information. Two ways you can accomplish this are:\n\n • Providing statistics: If applicable, use data from a reliable source to back up your argument. This could be a poll or a scientific study.\n • Discussing your topic’s history: Whether you’re writing about politics or philosophy, it might be a good idea to write about your topic’s origins and how that subject has evolved over time.\n\n2 Explore all angles of your paper’s thesis\n\nCheck to see if you’ve explored all angles of your thesis statement, which will not only increase your word count but will likely strengthen your argument as well. For example, if you wrote a paper on why people should exercise but only discussed physical health reasons, you could also discuss its psychological and economic impacts.\n\n3 Include alternative points of view\n\nIntroducing alternative points of view can help increase your word count and show that you’ve thoroughly researched the topic.\n\nFor example, if you’re writing about capitalism, you could also discuss Karl Marx’s critiques of the economic system.\n\n4 Flesh out thin body paragraphs\n\nIt’s important to note that you can flesh out thin body paragraphs without introducing redundant or unnecessary information. Instead, you’ll want to write detailed sentences to support your topic sentence, which can be accomplished by introducing facts, quotes, examples, or anecdotes backing up your point.\n\n • Original: Fight Club deals with the theme of consumerism, such as when the main character criticizes people’s desire to buy new things.\n • Edited: Fight Club deals with the theme of consumerism, such as when the main character criticizes people’s desire to buy new things. “Advertising has these people chasing cars and clothes they don’t need,” he says.\n\n5 Find another primary or secondary source to include in your writing\n\nIncluding additional primary and secondary sources is yet another tactic that can increase your word count and give your argument more legitimacy.\n\nAs a reminder, primary sources are anything that provides a firsthand account of an event (autobiographies or diaries, photos, artifacts, or videos). Secondary sources are descriptions, interpretations, or analyses of such events (textbooks, research papers, or documentaries).\n\n6 Expand quotes\n\nWriters will often paraphrase quotes in an effort to keep their argument concise, but there are times when you can expand on them to increase your word count and further illustrate a point.\n\nLet’s revisit the Fight Club quote we used just a bit ago. If we wanted to expand the quote, we could’ve included the main character’s next sentence, which is, “Generations have been working in jobs they hate, just so they can buy what they don’t really need.”\n\nWhen expanding quotes, it’s important that they add value to your argument. If the next part of that quote dealt with soap making instead of consumerism, it would not have been a good idea to include it.\n\nWord count FAQs\n\nWhat is word count?\n\nWord count is the number of words in a writing sample. Word counts are used for many reasons, but in research papers and essays they’re used to level the playing field: Each student has the same number of words to get their point across.\n\nHow do you decrease word count?\n\n • Delete unnecessary words, such as “that” and “the”\n • Erase unneeded adverbs and adjectives\n • Eliminate redundancies\n • Use an active voice\n • Remove unnecessary information\n\nHow do you increase word count?\n\n • Investigate all angles of your topic\n • Explore your topic in more depth\n • Include alternative points of view\n • Flesh out thin body paragraphs\n • Find additional primary and secondary sources\n • Expand quotes\nYour writing, at its best.\nWorks on all your favorite websites\niPhone and iPad KeyboardAndroid KeyboardChrome BrowserSafari BrowserFirefox BrowserEdge BrowserWindows OSMicrosoft Office\nRelated Articles\nWriting, grammar, and communication tips for your inbox.\nYou have been successfully subscribed to the Grammarly blog.", "pred_label": "__label__1", "pred_score_pos": 0.9486823081970215} {"content": "ESG Hero Category - GRC Initiative\n\nThis award will recognise a GRC initiative that has made a significant contribution to a company’s ESG programme or goals.\n\nJudges will look for an ingenious GRC initiative that has demonstrably produced ESG results, such as cutting carbon emissions, increasing sustainability or improving social diversity within the organisation.", "pred_label": "__label__1", "pred_score_pos": 0.9996466040611267} {"content": "A Blockchain-Based Robotic Process Automation Mechanism in Educational Setting\n\nA Blockchain-Based Robotic Process Automation Mechanism in Educational Setting\n\nNhlanhla Andrew Sibanyoni (University of Johannesburg, South Africa)\nDOI: 10.4018/978-1-7998-6650-3.ch002\nOnDemand PDF Download:\nList Price: $37.50\n10% Discount:-$3.75\n\n\nBlockchain technology and robotic process automation are increasingly the focus of attention in research, as these are both used successfully in business, marketing, manufacturing, and finance. However, their application in educational contexts is still emerging. This chapter uses an illustrative example of an online school registration system to explore how a blockchain-based robotic process automation mechanism can resolve the inherent challenges. The proposed system allows parents to register their Grade 1 and Grade 8 children for their school of choice. There is competition for places in certain schools and a history of unfair allocation of educational resources; hence, there is mistrust. To counter this threat, this study proposes a blockchain-based robotic automation process mechanism to fairly and transparently allocate educational resources. It recommends that further design science research be conducted in which the blockchain is supplemented by additional technological processes to enhance data-sharing in educational settings.\nChapter Preview\n\n\nParents are encouraged to register their children through the online system as depicted in Figure 1.\n\nFigure 1.\n\nCurrent Illustration of Online School Registration System Process\n\n\nAs part of the process, copies of certified documents, such as a birth certificate, identification document, school report cards from previous grades, and proof of residence, must be attached. The system also requires parents to ‘take a picture of the registration process’ as proof of registration and to submit hard copies of the documents submitted to the school on the same day (Gauteng Province, 2020). This additional process (that appears on left of Figure 1) may be intended to verify information provided and hence to lessen deliberate submission of misinformation and to check that online data has not been tampered with (Arslan, Jurdak, Jelitto & Krishnamachari, 2019). Parents can use a variety of devices to access the system (cellphones, laptops, desktop computer; as shown at the top part of Figure 1). The system has an intensive period of data input (with a fixed start and end times).\n\nKey Terms in this Chapter\n\n\n\n\n\nOnline School Registration System: An Internet system which provides for parents to electronically register their grade 1 and grade 8 children in a South African school. It is an e-service or e-government implemented by the Gauteng department of education to allocate scarce educational resources.\n\n\nMechanism: It is a small part in a larger process or mechanical system to perform a specific function, in other words, a system of parts working together within a machine. Mechanism maybe an entire mechanical system.\n\n\nE-Government: It is defined as the use of information communication and technology such as mobile devices, computers, and the internet to effectively and efficiently provide public or government services to citizens, businesses and other persons in a country.\n\nArtificial Intelligence: This refers to machines that are programmed to simulate human intelligence, think like humans, and mimic their actions such as interpreting and detecting deviations in data, as well as problem-solving.\n\nSwarm Robotics: This refers to how swarm robotics algorithms can be designed to solve problems by learning from natural systems like swarms of birds, mammals, bees, or fish. It refers to the collective behaviour that is either natural or artificial of decentralised coordinated systems.\n\n\nComplete Chapter List\n\nSearch this Book:", "pred_label": "__label__1", "pred_score_pos": 0.9497025609016418} {"content": "Japanese Culture\n\nVisit a Japanese Village\n\nEverything about Japanese culture can be traced back to its rural villages. Japanese language, behavior, rituals, and diet can be traced back to a small village tucked away in a remote mountain valley.\n\nHow can that be? Let’s look at one lesson from language.\n\nOne of the first words a foreigner learns when studying Japanese is “gaijin,” 外人 which means ‘outsider.’ The more polite and socially accepted version of this word is “gaikokujin,” 外国人 which means ‘person from a foreign country.’ The word “gaijin” is strongly connected to the important concepts of “uchi” 内 and “soto” 外 in Japanese.\n\nThe Unique History of Ito\n\nItō has been inhabited since the Jōmon period – roughly 13,000-300 B.C. This era coincides with the Stone Age. The hunter-gatherer Jōmon people are believed to have entered Japan via the Japan Sea and the northern archipelago. They occupied northeastern Japan, and Izu was at the far western boundaries of their range. Archaeological digs here in Itō have produced artifacts from that time including primitive tools and pottery.\n\nSetsubun Day\n\nToday is Setsubun in Japan. It is one of several very old traditions imported from Chinese culture and based on the lunar calendar.\n\nIn the West, spring is associated with the vernal equinox (March 21), and rituals in European countries generally take place in early April. In Japan, the beginning of February is seen as the start of a transition from winter to spring. It is a time when the seasonal responsibilities of numerous gods start to shift, and they get restless and move around. To prevent gods of bad luck from wandering into the house, people developed a protective ritual called mamemaki (mah-may-mah-kee) or bean sowing.\n\nThe Japanese Bath – お風呂\n\nThe process of washing one’s body is kind of different here in Japan. So different that it needs some detailed explaining. Let’s start with a picture from Panasonic’s website (yes, Panasonic, the company that made those transistor radios way back then). They make just about everything for the Japanese domestic market.", "pred_label": "__label__1", "pred_score_pos": 0.9395287036895752} {"content": "Study Human Geography\n\nWhat is human geography?\n\nGeography is the study of the physical earth around us, from the earth and soil right up to the atmosphere and its chemical composition. A field with diverse applications, geography is often grouped with the sciences and the humanities.\n\nHuman geography is a subset of the broader geographic field and specifically concerns the way humans interact with their environments. While the physical environment is a core focus, human geography also considers social, economic and political environments and how these holistically contribute to the way humans engage with the world around them.\n\nGeography is highly applicable to those who wish to understand humanity, and our place within the world. The field considers the connections between people and place, and the factors that can strengthen or weaken these bonds.\n\nAnalytical reasoning is central to the study of geography. Geographers identify and examine patterns of behaviour and account for them. They investigate changes experienced by the natural and built environments and provide insights into potential future issues. Geographers are also increasingly being called upon to propose solutions to large scale social and environmental problems, such as climate change, food scarcity and urban planning.\n\nCreativity and problem-solving are also key skills for geographers. Human-generated problems are complex and often require multi-stage solutions. An ability to produce new and original ideas to wide-ranging issues will serve you well within geographical roles.\n\nSustainability is another growing area of focus in geography. As the world grapples with the environmental, political, economic and cultural challenges of climate change, geographers are at the forefront of the conversation. Geographers consider how patterns of behaviour can be adapted to ensure a more sustainable, environmentally positive lifestyle. Innovations in this field will go on to shape the way we live and interact with the world into the future.\n\nDiscover JCU's\nBachelor of Arts\n\nLearn to think creatively, analyse effectively, and build the cross-cultural communication skills necessary to work in today’s modern society through studying Human Geography within the Bachelor of Arts.\n\nWhat does a human geographer do?\n\nGeographical knowledge is called upon in a variety of roles, as it draws on multiple in-demand skills.\n\nWorking as a geographer, you may find yourself working for a government department, assessing and responding to natural hazards. In a sprawling country such as Australia, you may gain experience planning responses to hazards including floods, fires, cyclones and storms. Your knowledge of natural environments could help prevent damage to human lives and property, and the plans you generate could help regions bounce back sooner.\n\nYou may find yourself working within urban planning, ensuring we are ready for the needs of tomorrow’s populations. As a geographer, your understanding of the various ways in which individuals and groups engage with environments will assist you in designing effective and environmentally positive spaces and housing. Complex reasoning skills will empower you to communicate your ideas effectively and engage with various stakeholders.\n\nGeographers also frequently work with data. Whether you are working in government or private enterprise, skills in interpreting statistical data will be highly regarded. Your findings could be used to plan future policy or programs, or influence the creation of more sustainable consumer products.\n\nThere are also opportunities for geographers to work on the ground with remote or Indigenous communities. Here, you will draw on your interpersonal and communication skills to conduct research and gain new insights into traditional connections to the land, as well as understanding methods of environmental protection and conservation.\n\nYou may also choose to dedicate yourself to geographical education and communication. As we strive to engage more sustainably with our planet, individuals and groups of all ages seek additional education on environmental processes and planning. Whether you share your knowledge in a classroom, a boardroom or through the media, you will be contributing to an increased societal understanding of the world around you.\n\nWhat jobs are there in geography?\n\nIssues relating to human engagement with the environment are widespread and diverse, meaning you’ll have a range of options when looking for geography-focused roles.\n\nStudying geography at JCU gives you unique, hands-on skills that can take you anywhere within Australia or across the world. You may find yourself working for a government organisation, a not-for profit company or a multinational corporation.\n\nJCU graduates emerge with advanced reasoning and problem-solving skills, making them attractive to a variety of employers. Your knowledge base and experience will set you apart from the crowd.\n\nWith a JCU Bachelor of Arts, majoring in Human Geography, you may work in roles such as:\n\n • Environmental consultant\n • Statistician\n • Social researcher\n • Data analyst\n • Planning and development coordinator\n • Surveyor\n • Logistics manager\n • Property assessment and real estate\n • Town planner\n • Environmental rights advocate.\nTown planning map\nPeople discussing ideas\n\nWhy study Human Geography at JCU?\n\nTwenty-first century geographers require advanced analytical reasoning skills, strong interpersonal capabilities, the confidence to make influential decisions, and the creativity to respond to modern problems.\n\nJCU students develop these skills on the job, engaging in practical learning within North Queensland’s richest and most diverse environments, including the World Heritage-listed Great Barrier Reef and the Daintree Rainforest. You will learn to use geographic information systems to understand complex environments and assess the impacts of your proposals on both society and the natural world.\n\nJCU’s world-class lecturers have industry experience and can support you as you deepen your knowledge and expand your skillset. You’ll study within a small, supportive classroom environment, giving you more opportunities for personalised learning.\n\nAs you complete your Bachelor of Arts, majoring in Human Geography, you’ll have the opportunity to seek out practical work placements with industry partners. Take advantage of these networks to ensure you are job-ready when you graduate.\n\nDue to the hands-on nature of the subject, Human Geography can only be studied on campus at JCU Townsville or JCU Cairns. You’ll benefit from practical learning and fieldwork across your degree and emerge ready to help tackle the challenges of tomorrow.\n\nTransferable skills Expand employability opportunities through elevated thinking\nBe the solution Become a critical thinker\nThink global Develop a cross-cultural understanding of your field to enhance your career\nRosita Henry.\n\nProfessor Rosita Henry\n\nProfessional Chair, CASE\n\nCollege of Arts, Society and Education\n\n“For anyone who wants to prepare for the future, the Bachelor of Arts allows you to broaden yourself and develop understandings to deal with challenging questions facing humanity. You can tailor your degree in line with your interests. The Bachelor of Arts has the range and flexibility for you to be all you can be.”\n\nDiscover Human Geography at JCU\n\nLearn more, explore your options.", "pred_label": "__label__1", "pred_score_pos": 0.9434731006622314} {"content": "Last week we talked about the effects of quiet stress and how it slowly erodes our health. Forty-eight percent of adults say the reason they hide their stress is so not to worry family or friends, but the number of Americans reporting anxiety is triple the number from last year. Our health expert, Karen Owoc, is back with tips on how to manage some of the not-so-obvious symptoms of stress.\n\nWhat Is ‘Quiet Stress’?\n\nPeople under quiet stress will underreact vs. overreact to situations, and there’s a down side to keeping these stressful feelings hidden.\n\nThere are no loud outbursts, no visible expressions of anger, and no signs of tension.\n\nQuiet stress may sound benign, but it can be the source of many ailments that you may not readily associate with stress.\n\nThe Effects of Quiet Stress\n\nIf stress is chronic, it can quietly erode your health. Here are some of the quiet signs of stress.\n\n 1. Back Pain\n\nWhen people experience back pain, they often instinctively assume it’s due to something they did (e.g., exercised improperly, carried or moved something too heavy) or to poor posture.\n\nUnder stress, your breathing rate may change and cause more tension. When your shoulders, upper back, neck, and jaw tense up, the tension will radiate throughout the full length of your back muscles and spine.\n\nStress-related back pain is as serious and debilitating as back pain from an injury — especially is it lingers.\n\nThe Fixes:\n\n1) Practice Five-Finger Breathing. [DEMO] This works better than just deep breathing because you engage multiple senses at the same time, which can be effective at crowding out the worrying thoughts.\n\n2) Stretch slowly to elongate the tense, shortened muscles on a daily basis.\n\nNOTE: Back pain can also be a sign of a heart attack or an impending heart attack. If you are suffering from back pain, and it’s not the result of an injury, then evaluate your level of stress, and see your doctor.\n\n 1. Loss of Appetite\n\nBeing stressed can have two opposing effects. It can intensify your drive to eat due to the high levels of cortisol circulating in your bloodstream.\n\nOn the flip side, when you’re under stress, you may not feel as hungry because you’re preoccupied with pressing issues, which distract you from the need to eat.\n\nIf this continues, a malnourished body will threaten your immune system.\n\nYour body will not be able to function properly with insufficient calories and nutrient-deficient food.\n\nThe Fix: Realize how important it is to eat, and if necessary, set alarms to remind yourself to eat AND drink at regular times of the day.\n\nEven a simple meal can make a tremendous difference and can keep your energy levels and your mood elevated.\n\n 1. Getting Sick More Often\n\nDid you ever notice you get colds more often than others?\n\nAccording to an analysis of 27 studies, you’re more susceptible to catching a cold when under psychological stress.\n\nAn underlying cause of the common cold is cortisol. Excess cortisol depresses your immune system making it more vulnerable to viruses.\n\nThe Fix: Incorporate some stress-relieving practices into your routine — massage, acupuncture, meditation — anything that makes you to SLOW down your breathing and slow down your pace.\n\nThe Takeaway: Address the stress. You can incorporate these “fixes”, but for long-lasting effects, try to resolve the source of the stress.\n\nLatest Stories:", "pred_label": "__label__1", "pred_score_pos": 0.8072424530982971} {"content": "Health Effects of Mold & Other Airborne Contaminants\n\n\nHealth Effects of Mold\n\n\nIn addition, in 2004 the IOM found sufficient evidence to link exposure to damp indoor environments in general to upper respiratory tract symptoms, cough, and wheeze in otherwise healthy people and with asthma symptoms in people with asthma. The IOM also found limited or suggestive evidence linking exposure to damp indoor environments in general to shortness of breath, to respiratory illness in otherwise healthy children and to potential development of asthma in susceptible individuals. In 2009, the World Health Organization issued additional guidance, the WHO Guidelines for Indoor Air Quality: Dampness and Mould[PDF – 2.52 MB]. Other recent studies have suggested a potential link of early mold exposure to development of asthma in some children, particularly among children who may be genetically susceptible to asthma development, and that selected interventions that improve housing conditions can reduce morbidity from asthma and respiratory allergies, but more research is needed in this regard.\n\n\nHealth Effects of VOCs\nMost people don’t give this topic much thought until VOC related symptoms seem to not go away and doctors give a diagnosis like “Most likely environmental” your environment is where you spend your time. Unless you live in a tepee or tree fort this primarily means your home. Some of the health effect of VOCs on humans is eye, nose, and throat irritation; headaches, loss of coordination, nausea; damage to liver, kidney, and central nervous system. Some VOCs from testing are known to cause cancer in animals and are suspected or known to cause cancer in humans.\n\nKey signs or symptoms associated with exposure to VOCs include conjunctival irritation, nose and throat discomfort, headache, allergic skin reaction, dyspnea, declines in serum cholinesterase levels, nausea, emesis, epistaxis, fatigue, dizziness. Volatile organic compounds appear also to be significant risk factors for asthma and chronic obstructive pulmonary disease (COPD).\n\nVarying Effects of VOC’s\nThe ability of organic chemicals to cause health effects varies greatly from those that are highly toxic, to those with no known health effect. Some have a strong smell and some no smell at all. The extent of health effects of VOCs on humans will depend on many factors including level of exposure and length of time exposed and where they are exposed i.e. floors, bed mattresses, play toys etc.\n\nEye and respiratory tract irritation, headaches, dizziness, visual disorders, and memory impairment, unconsciousness and death are among the immediate symptoms that some people have experienced soon after exposure to high levels of VOC’s. When I was young and stupid, I was doing some wood repairs using high VOC contact cement (no longer sold) working in a basement, the fumes were pretty strong, after about 15 minutes I felt light headed and started up the stairs for some fresh air, I staggered and almost collapsed, was close to loosing consciousness and barely made it up the stairs.\n\nStrong Evidence Linking VOCs to Asthma and COPD\nAsthma is the most common chronic disease of childhood in the developed world and its prevalence appears to have increased significantly over the past 30 years. Observations indicate that the rising prevalence has coincided with modifications to the home environment such as the introduction of soft furniture, fitted carpets, air conditioning, and central heating. The indoor environment should be of crucial importance since infants  and elderly often spend more than 80% of their time indoors at home. The newer the home and the more insulated and air sealed the home is the greater the concern because the VOC’s are effectively trapped inside.\n\nAt present, not much is known about at what levels health effects of VOCs on humans occur. Many organic compounds are known to cause cancer in animals; some are suspected of causing, or are known to cause, cancer in humans. To better understand the links from VOCs to asthma and COPD, doctors are using a new type of testing in which they measure the VOCs exhaled from patients lungs. This tells them what VOCs are present and at what levels in their bodies to help diagnose or determine the cause of asthma and COPD.\n\nHealth Effects of Allergens\n\n\n\nAllergies are exaggerated immune responses to environmental triggers known as allergens. Allergies are very common, and about 50 million people in North America suffer from allergies. One of the most common forms of allergy is allergic rhinitis (\"hay fever\"), which produces symptoms like nasal congestion, itchy and watery eyes, sneezing, stuffy or runny nose, scratchy or sore throat, throat clearing, cough from postnasal drip.\n\n\nThe symptoms of hay fever can, in turn, lead to fatigue and lethargy. Other types of allergic reactions can involve the skin (hives and itching). Anaphylactic shock is a severe form of allergic reaction that can be life-threatening. In anaphylactic shock, there is swelling of the throat and difficulty breathing. Asthma is also related to allergies in many cases.\n\nThe symptoms of allergies can sometimes resemble those of other conditions. The common cold and the flu can cause respiratory symptoms similar to allergies. Typically, allergy symptoms are associated with a specific time of year or exposure to an allergen.\n\nHealth Effects of Bacteria​\n\nCertain types of bacteria can cause diseases, such as, typhoid fever, syphilis, cholera, tuberculosis and foodborne illnesses. Antibiotics are used to kill harmful bacteria and the diseases they cause.\n\n\nFecal coliform are bacteria that can cause hepatitis, dysentery, cholera, ear infection and typhoid fever, according to the North Dakota Department of Health. The bacteria are commonly found in natural bodies of water, but also in buildings where water intrusion has occured, such as toilet back ups, sewage back ups, floods, etc. Indoor mold and bacteria pose health risks. As they grow indoors, mold and bacteria produce spores and/or chemical compounds into the air. The health effects associated with these spores (see picture on the right) and chemicals may include runny nose, eye irritation, cough, congestion, aggravation of asthma and respiratory problems, headache, flu-like symptoms, fatigue, and skin rash and other allergic reactions.", "pred_label": "__label__1", "pred_score_pos": 0.9613368511199951} {"content": "Brain Fog Is Real, And The Pandemic Is Making It Worse\n\nOriginally Published: \nPeathegee Inc/Getty\n\nI have been suffering from Mom Brain for a while now. I forget where I put my keys, leave my phone in the refrigerator, and can’t remember what I am looking for quite often. And I think that these are normal everyday occurrences that most moms deal with. But over the last four or five months, my brain fog has reached disturbing levels and I think the pandemic is making it worse.\n\nSince the summer, focusing on tasks like reading and writing have become significantly challenging. I also seem to have lost any ability to recall what I was thinking if I am sidetracked by anything at all. I thought that maybe virtual schooling my four kids was to blame. It is extremely difficult to focus on a work project when every 15 minutes a kid needs help with school work, I have to fix a technical issue on a school app, or someone is having a meltdown over an assignment. But when we went on break from school, I still couldn’t get my brain to work.\n\nIt takes me twice as long to complete tasks because I just can’t focus. It feels like I can’t seem to react fast enough to follow through on my thoughts. And writing or formulating a thought feels like my brain is wading through some kind of mental quicksand. As a writer, this is a working hazard.\n\nBut that’s not all. I could never seem to remember what day it is and I would mix up my kids’ school schedules at least twice a week. There have been a few times when I was driving somewhere and completely forgot where I was going. I once poured dog food into my salad instead of the dog dish right in front of me. I also put an entire dish of fudge in the washing machine instead of in the refrigerator. And yes, I cried over that waste of perfectly good chocolate.\n\nThe combination of all of this made me worry that something was really wrong. I couldn’t tell if I was losing my mind, going through early menopause, or actually having a medical issue. I talked to my therapist, my gynecologist and my naturopathic doctor to find answers. But it turns out, I was experiencing pandemic brain fog… and I am not the only one.\n\nEvidently, the chronic stress of this never ending pandemic is taking a toll on all of us. Trying to stay on top of work, running a home, virtual schooling kids while still processing the mental load that comes along with this pandemic has broken our brains. You can call it pandemic brain fog, brain fatigue or quarantine brain, but apparently the inability to think clearly is a very normal response to a not-so-normal situation.\n\nAccording to an article by the BBC, some psychologists believe that Cognitive Load Theory (CLT) can explain why people seem to be experiencing brain fog during the pandemic. CLT was first developed by the Australian educational psychologist John Sweller. It identifies our minds as information processing systems.\n\nThe theory is based on the idea that the brain processes information through both working memory and long-term memory. Working memory processes new information and long-term memory processes all the things we already know. Apparently you can process large amounts of stored information because you are able to fall back on autopilot. However, your working memory is only capable of processing small amounts of new information.\n\nIn other words, all the changes brought on by this pandemic have caused an overload of new information, making our brains unable to access the autopilot mode that we moms depend on. And our limited working memory is at capacity. Oh, and did I mention that increased stress and anxiety even further limits your working memory capacity?\n\nPsychotherapist Stacy Kaiser explained things on an even more medical level. She shared that when you are stressed your body releases the hormone cortisol. She stated that, “Cortisol is the stress hormone that allows us to rise and handle difficult situations. But too much cortisol for a long period of time can cause brain fog and other issues.”\n\nSo, no, you are not losing your mind. Basically, your executive function circuits are burnt out and not functioning properly. And as a matter of survival, your brain is shutting down. It’s kind of your brain’s way of practicing self-care.\n\nSo what can you do to combat pandemic brain fog?\n\nAs a trauma specialist, Stacy Kaiser shares that practicing self-care during these unprecedented times is paramount. She expresses that it is important to get rest and take the time to nurture your body and mind. And when you feel the onset of brain fog, don’t be afraid to step away and take a break.\n\nShe also expressed that it is really important to set a routine for yourself and your family. Taking the time to get more structured and organized will help you spend much less time having to figure things out in the moment. And also take note if there is any person, place or situation triggering brain fog and deal with the underlying situation.\n\nOn the whole, this pandemic has brought about some pretty drastic changes to people’s everyday lives. Our normal daily routines were completely disrupted, we have been isolated from friends and family, and parenting duties doubled overnight. So, it is really important to acknowledge any pandemic brain fog you may be feeling and take steps to prioritize your mental and emotional wellbeing. That way you won’t completely lose it during these crazy times.\n\nThis article was originally published on", "pred_label": "__label__1", "pred_score_pos": 0.9519133567810059} {"content": "SAFAR Sikh Feminists To Hold Historic Toronto Meet\n\n\n1947-2014 (Archived)\nJun 17, 2004\nModerators, do not remove contact information. Thanks.\n\nby Sunil Rao\n\nTired of their \"less than equal\" status, Sikh women are gathering in Toronto this weekend to hold the first ever Sikh Feminist Conference.\n\nThe event, titled Safar (or Our Journeys), is being held Saturday, Oct 1, 8am-6.30pm, at the University of Toronto's Ontario Institute for Studies In Education (at 252 Bloor St W; for details and to register visit\n\nFocus contacted Sikh Feminist Research Institute's executive director Tarnjit Kaur Johal. Excerpts:\n\nWhat is Safar looking for, and what do you hope the event will achieve?\n\nWhen facing the present day reality, in both the Diaspora (in Canada, US, the UK, etc) and in Punjab, Sikh women, especially of Punjabi origin, continue to be treated as less than equal.\n\nAs data from StatsCan shows, sex ratios in areas of high Punjabi-Sikh Canadian populations are skewed; there is anecdotal evidence of honour killings; there's also violence against women, etc.\n\nAt Safar we want to reconnect with a feminism that pre-dates the western ideas of feminism. By connecting to our own historical narratives women can be empowered and face their daily realities from a position of power.\n\nHow will Safar do this?\n\nLet me give you one example: One of the speakers at the conference, Deep Singh (from UCLA), is going to present a paper about a rarely discussed Sikh text, Param Marg Granth (also Prem Sumarg Granth). In this text, written in the early 1700s, women are given equal inheritance rights, widows are allowed to remarry, women are referred to as 'Khalsa Ji', just as GurSikh men... in every aspect of their existence women are considered equal to men. This contrasts so much with life in the 21st century!\n\nHow does Safar view men?Â\n\nFunnily enough in the conference we are not looking at men per se. We recognize the origins of inequities due to gender, caste and class have complex causes; it is these structural causes we wish to explore, understand and begin to dismantle.\n\nWhat is the scope of this event?\n\nWe are expecting 31 presenters from the US, Canada and the UK, many from Ivy League universities, scholars who are leaders in their fields and community activists. Safar has attracted wide community interest, with the range of participants likey to embrace every facet of society today.", "pred_label": "__label__1", "pred_score_pos": 0.9582672715187073} {"content": "Article ID : 00032830 / Last Modified : 07/23/2019Print\n\nThe recording deck displays DIN UNLOCK and does not record.\n\n The DIN UNLOCK error message indicates that the recorder is set to record from a digital source and is not receiving a digital input signal. Verify that the source is connected to the digital input of the deck. If connected through an analog connection, press the INPUT button until ANALOG appears in the display.", "pred_label": "__label__1", "pred_score_pos": 0.6723763346672058} {"content": "جام جهانی 2022 قطر\n\nFrance Engulfed in Protests on 2nd Month of National Strike (+Video)\n\n\nTEHRAN (Tasnim) – Protesters took to the streets of Paris on Sunday as part of a nationwide multi-sector strike against the French government's pensions overhaul.\n\nCaught in a faceoff with Macron and the French government, France’s railway and other public sector workers remain on strike for the fifth week in a row. The national strike, which began December 5 of last year, is the longest transportation strike in France’s history and the longest general strike since May 1968, when the entire economy was ground to a halt by students and workers in an all-out revolt against the government.\n\nAs the strike continues, union leaders are attempting to negotiate with the government, but France’s workers are determined to continue the strike until Macron scraps his plans to restructure the pension system, Truthout reported.\n\nJanuary 9 marked the third official day of coordinated national action since the strike began. Unsatisfied by a day of negotiation with the government on January 7, the country’s major transportation unions, SNCF and RATP, took to the streets once again.\n\nThey were joined by other major unions, including the CGT and CFDT, France’s two largest unions, and thousands of supporters and Yellow Vests. Workers in the healthcare, education, energy, and communications sectors also participated, and in a new development in the movement, private sector workers entered the struggle, including sanitation workers.\n\nThis opens the possibility for cross-industry participation that could reinvigorate the strike effort, significantly disrupt France’s economy, and finally pressure Macron to cave.\n\nMacron’s retirement reform would completely overhaul the current system, consolidating France’s 42 industry-specific plans to a single, universal plan. Such changes would demolish the hard-won retirement benefits that many workers rely on. It would also raise the retirement age and decrease pension income, meaning that individuals would have to work longer for less pay and security. Such reforms would particularly affect workers who are employed in dangerous or physically-demanding jobs, like train operators, who have the advantage of an early retirement age. Under the new plan, some sectors of workers would be forced to work up to ten extra years before they could retire.\n\nOn December 5, workers in transportation, communications, oil, and education began a nationwide strike. Trains across the country were ground to a halt. Paris’s metro system was paralyzed. Schools were closed and students protested alongside their teachers. Flights were grounded and1.5 million people took to the streets across France to protest Macron’s austerity measures.\n\nMost Visited in World\nTop World stories\nTop Stories", "pred_label": "__label__1", "pred_score_pos": 0.9873691201210022} {"content": "Menu Close\n\nSocial Business (SB) Hatch\nYour Impact is Our Goal!\n\nWhy SB Hatch?\n\nSupporting young social entrepreneurs is core to Yunus Thailand’s mission to drive the social business movement in Thailand. Today’s youth face rapidly shifting contexts and global challenges from unemployment and poverty to climate change and Covid-19. Through entrepreneurship, challenges are turned into opportunities by way of learning, adapting, and effort. Combining the power of entrepreneurship with socially-driven missions, Social Businesses can be the engine that works towards a more prosperous, inclusive, and greener future. We believe that young people can be empowered to create a world without net-carbon emissions, unemployment, and poverty.\n\nWhat is SB Hatch?\n\nRun by Yunus Thailand with support of implementation partners including SEED, SB Hatch is a 6-month social business incubation program with the goal to empower young social entrepreneurs. An innovative program designed to meet the needs of its participants, SB Hatch ensures each participant receives the tailored support they need to build their social business and achieve their impact goals. The program includes technical, skill-building, and design-thinking workshops; networking and community building sessions; SB Hatch growth sessions; mentorship and coaching; provision of project management and business development tools; and free access to a co-working space.\n\nIncubating Change\n\nThrough working closely with each cohort of young social business entrepreneurs, Yunus Thailand supports them to make their impact. Each entrepreneur becomes role models for future entrepreneurs, and the social businesses they create lead the way in solving critical social and environmental problems. Delivering local solutions to global challenges, social businesses that are incubated through SB Hatch have the potential to grow along with their impact.\n\nContact person: Pavini Sethi (email:, Pathit Ongvasith (email:", "pred_label": "__label__1", "pred_score_pos": 0.9981814026832581} {"content": "Chicken Wings\n\nMakes 4-6 Servings\n\nThese chicken wings turn out crispy without needing to be fried. Easily doubled for larger gatherings, they are sure to impress.\n\nBefore You Start\n\nPreparation Method\n\n1. Preheat the oven to 220°C on Convection Mode with a rack on position 3.\n\n2. While the oven is preheating, dry wings thoroughly with a paper towel and place in a large bowl.\n\n3. Combine the baking powder and kosher salt together in a small bowl and sprinkle about 1⁄3 of the mixture over wings.\n\n4. Toss the wings several times to ensure an even coating.\n\n5. Continue adding the baking powder and kosher salt mixture 1⁄3 at a time, tossing the wings between each addition.\n\n6. Check to see if the wings are evenly covered in the mixture — depending on the wings’ moisture content, you may not need to use the last third of the mixture.\n\n7. Place the wings on a broiler pan and rack lined with aluminum foil, leaving some space between them.\n\n8. You can also use a metal cooling rack placed on a baking tray lined with aluminum foil.\n\n9. Place the wings into the oven and cook for 20 minutes.\n\n10. After 20 minutes, remove the pan from the oven and flip the wings over.\n\n11. Return the wings to the oven and cook for an additional 15 minutes.\n\n12. Remove the wings from the oven and place in a large clean bowl.\n\n13. Toss the wings with your favorite sauce if desired.\n\nProducts Used in this Recipe", "pred_label": "__label__1", "pred_score_pos": 0.9348966479301453} {"content": "Keeping a neat and healthier setting for your personal koi is very important. Excellent h2o quality is essential for these to prosper. Most often, people tend to neglect the most basic and simplest prerequisite in tending to wilderness carps. Expert pet breeders invest plenty of cash on installing the costliest and efficient filtration system to make sure that their ponds will be clear of microorganisms, waste materials along with other kinds of damaging elements. When normal water becomes contaminated it generates dangerous vitamins and minerals for koi fish. These minerals are often very fatal on their wellness and can even lead to dying.\n\nca koi f1\n\nChlorine is primarily applied as a form of remedy in the majority of h2o center. The liquid source that is used in residences as well as other establishments is frequently treated with it. It may not hurt humans but it is very poisonous to koi. Actually it is regarded as the deadliest mineral and should always be wiped out or neutralized. So prior to incorporating water for your pond, make sure it is without any chlorine. The grade of water is influenced by different components. The most frequent reason for the creation of contaminants is poor providing procedures. You ought to know that overfeeding can raise the degree of ammonia from the pond. Ammonia is really a by-product mostly produced from excreted fish feces. Its presence particularly in huge amounts may be dangerous to koi fish. Gathered ammonia can predispose your fish to get microbial infection and parasitic infestations.\n\nNitrites and nitrates are by-goods of the nitrogen pattern that is a normal occurring daily life procedure inside the pond. When current at greater degrees it may create health risks to your ca koi f1 fish. Nitrite is manufactured by the harmful bacteria named Nitrosamines which is responsible for deteriorating ammonia. Therefore steady keeping track of is recommended to ensure it really is within satisfactory ranges. Whenever possible, its stage studying must be held to. Nitrates alternatively are significantly less damaging in comparison with nitrites. It will be the closing item from the nitrogen routine in which nitrosomonas turns nitrite into nitrate. The actual existence of plants and flowers and algae might help preserve admissible nitrate ranges.\n\nCategories: Shopping", "pred_label": "__label__1", "pred_score_pos": 0.7437213063240051} {"content": "Категория: Административный аппарат, казна, Медиа (96-104)\n\nКонституция государства халифата; Статья 103: СМИ — это аппарат, который несет ответственность за положение и осуществление информационной политики государства, которое служит интересам Ислама и мусульман как внутренне: для образования крепкого, приверженного Исламу общества, которое запрещает зло и творит благое, так и внешне: для представления Ислама в мирном и военном положении так, чтобы было явно его величие, слава, его справедливость, чтобы сила его войска была явной, и в то же время испорченность и тиранию нынешней системы, а так же трусость и слабость ее армии.\n\n\nArticle 103: The institution of the Media Office is responsible for drawing up and executing the political media strategy for the State in order to support the interests of Islam and the Muslims. Internally, it works to build an Islamic society that is strong and cohesive, and it refutes that which is malicious while confirming that which is good. In external affairs it is to promote Islam during peace and war, in a manner that explains the greatness of Islam, its justice and the strength of its army, and expose the corruption and oppression of manmade system and the weakness of its army.\n\n Media is one of the important matters for the call to Islam (Da’wah) and the State. It is not one of the interests of the people that are under the authority of the department of peoples’ affairs. Rather, it is directly connected to the Khalifah as an independent institution, just like any of the institutions of the State.\n\nThe presence of a distinguished media policy that presents Islam strongly and effectively would provoke the minds of the people to turn toward Islam, to study it and to think about it. It also facilitates the annexation of Islamic lands to the Khilafah State. Furthermore, there are many issues of media which are closely related to the State and they cannot be published without the Khalifah's instruction. This is manifested in the military matters and related issues, such as the movement of the armies, and the news of victory and defeat and the military industries. This type of news must be linked directly to the Imam so he can decide which news has to be concealed and which news must be announced and advertised.\n\nThe evidence for this is the Book and the Sunnah.\n\nWith regards to the Book, His (swt) saying:\n\n((وَإِذَا جَاءَهُمْ أَمْرٌ مِنَ الْأَمْنِ أَوِ الْخَوْفِ أَذَاعُوا بِهِ وَلَوْ رَدُّوهُ إِلَى الرَّسُولِ وَإِلَى أُولِي الْأَمْرِ مِنْهُمْ لَعَلِمَهُ الَّذِينَ يَسْتَنْبِطُونَهُ مِنْهُمْ))\n\nAnd when there comes to them information about [public] security or fear, they spread it around. But if they had referred it back to the Messenger or to those of authority among them, then the ones who [can] draw correct conclusions from it would have known about it.” (TMQ 4:83) - the subject of the verse is the news.\n\nWith regards to the Sunnah it is the narration of Ibn ‘Abbas about the conquest of Makkah as is reported by Al-Hakim in Al-Mustadrak, described as authentic based on the condition of Muslim, and Al-Dhahabi confirmed that. The narration mentions:\n\n«وَقَدْ عَمِيَتِ الأَخْـبَارُ عَلَى قُرَيْشٍ، فَلاَ يَأْتِيهِمْ خَبَرُ رَسُولِ اللهِ صلى الله عليه وآله وسلم وَلاَ يَدْرُونَ مَا هُوَ صَانِعٌ»\n\n“The news was obscured from Quraysh; so the news of the Messenger of Allah صلى الله عليه وآله وسلم would not reach them, and nor would they know what he is planning regarding them”. There is also the Mursal (narration not directly connected to the Messenger صلى الله عليه وآله وسلم rather the name of a companion is missing) of Abu Salamah as reported by Ibn Abi Shaybah, which mentions: “Then the Prophet صلى الله عليه وآله وسلم said to 'Aisha:\n\nجَهِّزِينِي وَلاَ تُعْلِمِي بِذَلِكَ أَحَداً، ... ثُمَّ أَمَرَ بِالطُّرُقِ فَحُبِسَتْ، فَعَمَّى عَلَى أَهْلِ مَكَّةَ لاَ يَأْتِيهِمْ خَبَرٌ\n\n‘Prepare me, and do not tell anyone about it…and then he commanded that the highways be obstructed, and so the people of Makkah were kept in the dark and no news reached them.’”\n\nThere is also the narration of Ka’b which is agreed upon regarding the Battle of Tabuk (the expedition of Hardship) which says:\n\n«وَلَمْ يَكُنْ رَسُولُ اللَّهِ صلى الله عليه وآله وسلم يُرِيدُ غَزْوَةً إِلا وَرَّى بِغَيْرِهَا، حَتَّى كَانَتْ تِلْكَ الْغَزْوَةُ غَزَاهَا رَسُولُ اللَّهِ صلى الله عليه وآله وسلم فِي حَرٍّ شَدِيدٍ، وَاسْـتَقْبَلَ سَفَرًا بَعِيدًا وَمَفَازًا وَعَدُوًّا كَثِيرًا، فَجَلَّى لِلْمُسْلِمِينَ أَمْرَهُمْ لِيَتَأَهَّـبُوا أُهْـبَةَ غَزْوِهِمْ، فَأَخْـبَرَهُمْ بِوَجْهِهِ الَّذِي يُرِيدُ»\n\n“The Messenger of Allah صلى الله عليه وآله وسلم never intended an expedition without alluding to something else, until he made during a very hot weather, a distant place, a desert and a huge enemy. So, he explained to the Muslims their matter to be ready for their raid, and he thus informed them of the destination he wants.”\n\nThere is also the narration of Anas as reported by Al-Bukhari\n\n«أَنَّ النَّبِيَّ صلى الله عليه وآله وسلم نَعَى زَيْدًا وَجَعْفَرًا وَابْنَ رَوَاحَةَ لِلنَّاسِ قَبْلَ أَنْ يَأْتِيَهُمْ خَبَرُهُمْ فَقَالَ: أَخَذَ الرَّايَةَ زَيْدٌ فَأُصِيبَ، ثُمَّ أَخَذَ جَعْفَرٌ فَأُصِيبَ، ثُمَّ أَخَذَ ابْنُ رَوَاحَةَ فَأُصِيبَ، وَعَيْـنَاهُ تَذْرِفَانِ، حَتَّى أَخَذَ سَيْفٌ مِنْ سُيُوفِ اللَّهِ حَـتَّى فَتَحَ اللَّهُ عَلَيْهِمْ»\n\nThe Prophet صلى الله عليه وآله وسلم announced the death of Zayd, Ja'far and Ibn Ruwaha before the news of their death reached him. He said: Zayd took the flag but he was killed, then Ja'far took it and he was killed, then Ibn Ruwahah took it and he was killed; he said that while he was crying. Lastly one of the swords of Allah took it till Allah granted them victory.”\n\nSome of the applications of this rule at the time of the Righteous Khulafaa’ is that which is narrated by Ibn Al-Mubarak in the subject of Jihad; Al-Hakim reported in Al-Mustadrak - and he considered it authentic based on the condition of Muslim, which Al-Dhahabi confirmed - from Zayd b. Aslam from his father from Umar b. Al-Khattab (ra) “that he was informed that ‘Abu ‘Ubaydah was surrounded and the enemy rallied against him. So, Umar wrote to him, ‘Peace is upon you. After that, there is not any difficulty that befalls a believer except Allah made for him a way out of it; and never a hardship would defeat two eases.’\n\n((يَا أَيُّهَا الَّذِينَ آَمَنُوا اصْبِرُوا وَصَابِرُوا وَرَابِطُوا وَاتَّقُوا اللَّهَ لَعَلَّكُمْ تُفْلِحُونَ (200)))\n\nO you who have believed, persevere and endure and remain stationed and fear Allah that you may be successful.” (TMQ 3:200)He said: Abu ‘Ubaydah wrote to him, “Peace is upon you, after that Allah says in His Book:\n\n] ((اعْلَمُوا أَنَّمَا الْحَيَاةُ الدُّنْيَا لَعِبٌ وَلَهْوٌ وَزِينَةٌ وَتَفَاخُرٌ بَيْنَكُمْ وَتَكَاثُرٌ فِي الْأَمْوَالِ وَالْأَوْلَادِ))\n\nKnow that the life of this world is but amusement and diversion and adornment and boasting to one another and competition in increase of wealth and children .” (TMQ 57: 20).He said, then Umar went out holding his letter, sat on the pulpit and read it to the people of Madinah and said, “O people of Madinah! Abu ‘Ubaydah expresses to you that you should show interest in Jihad.”\n\nThere are other types of news which have no direct connection to the State, and do not require the direct opinion of the Khalifah, such as the daily news, the political, cultural, and scientific programmes, and the international affairs. Though these may interfere with the viewpoint of life in some parts, and with the view of the State towards international relations, but despite that the type of State control over them differs from the first type of news.\n\nAccordingly the media institution must contain two main departments:\n\nThe first: Its task is related to news that has connection with the State, such as the military matters, the military industry and international relations, and so on.\n\nThe task of this department is the direct supervision of such news. So, such news is not broadcasted in the state media or the special sources of media except after their presentation to the institute of media.\n\nThe second: is related to other news; and its supervision of them is not direct. Both state and private media do not need any permission for presenting such news.", "pred_label": "__label__1", "pred_score_pos": 0.5797625184059143} {"content": "Extract selected geometry features and transfer them to a new part.\n\n 1. To open the Extract tool:\n 1. On the Geometry ribbon, next to Create, select .\n A dropdown menu appears.\n\n 2. Select the Extract tool.\n\n 2. Select a sketch, face, edge, or point.\n Note: Your first selection sets the selection filter. For example, if you select an edge, then your remaining selections must be edges.\n 3. Select additional features to extract, based on your first selection.\n 4. Optional: Click the icon in the microdialog to break the reference between the original part and the extracted part.\n Note: If you wish to restore the reference, you must click the icon before clicking Apply.\n 5. Click Apply on the guide bar or microdialog to extract the selected features and create a new part.\n • Entities selected from the same original part will become a single new part, even if they are not contiguous.\n • Entities selected from different original parts will become separate new parts, even if the original entities were in contact with each other.", "pred_label": "__label__1", "pred_score_pos": 0.8927234411239624} {"content": "Michael Tatarski, journalist\n\nFor Esther Gutierrez, entering the accounting field was first and foremost a realistic decision.\n\n‘I got into this career path for two things, the practicality and the stability,’ she says. ‘In the Philippines, we are a third-world country, and I’m not from a privileged family. Growing up, I had to work at a wet market with my family to scrape enough money together to survive the day.\n\n‘Everyone at the market just scraped by to pay their bills’\n\nIt was her job from a young age to record her family’s daily sales on a piece of paper while deducting expenses such as meals or the prices they had paid for goods they sold.\n\n‘We were selling empanadas and basic Filipino snacks that workers need to get on with their day,’ she recalls. ‘I remember my mother always talking about money with her friends because everyone at the market just scraped by to pay their bills.’\n\nUltimately, though, it helped her carve out a professional career.\n\n‘I figured that every business would need someone to take note of all the transactions and make decisions that would catapult their growth,’ she says. ‘Accountants are very much needed in that most practical sense.’\n\nShe also wanted something stable and surmised that people would always need an accountant, especially in the Philippines where many business owners lack the skills to understand tax filings or whether their business is profitable.\n\nPractical dreams\n\n‘Even when I was little, I was thinking that I needed something that I could apply, that I could use, and something I could actually reach. If I had dreamed that I wanted to become an astronaut, I would not have had the tools to actually do so.’\n\nAfter looking at LinkedIn profiles and job posts to figure out which role could eventually lead to a career in Europe or America, she realised that accounting could be a gateway to her future. ‘I found out that a lot of Filipinos working abroad are accountants,’ she says.\n\n‘The moment I had ACCA next to my name, a lot of recruiters reached out to me’\n\n\nSenior associate, PwC Denmark\n\nAudit manager, KPMG Philippines\n\nPwC Philippines, started as assurance associate then promoted to senior assurance associate\n\nWith one of her sisters already working in the medical field, she decided ‘to diversify our family portfolio and go into business on the accounting side. We were always thinking in practical terms, and that’s how I started my career.’\n\nEntering the University of the East - Caloocan in 2013, she worked hard to win scholarships, and was active in business and debate competitions to help hone her skills.\n\n‘I always loved the business case competitions because I believed those gave me an edge in getting into the Big Four.’ she says. ‘I thought they would provide me with the training I needed to be globally competitive.’\n\nThe long haul\n\nAfter graduating with an accountancy degree in 2018, she was hired by PwC Philippines, where she began as an assurance associate. By 2020, she had worked her way up to senior assurance associate and was looking for a further career boost.\n\n'When you start out in the field of public accounting, the balance between expenses and goals can be tricky. Everything had to come out of my pocket.' she says. When asked by her mother why she hadn't pursued a more high-paying position, she answered that the first three years weren’t about the money but about laying her career foundations. ‘I was in it for the long haul, and I wanted to build my portfolio and build my experience.’\n\nEager to demonstrate her ability to compete in the global market, the career boost she was looking for eventually came in the form of international certification. For years she set aside money to pursue the ACCA Qualification to give her the edge she was looking for. ‘Nobody in my firm actually knew I was pursuing ACCA.' \n\n‘Getting my ACCA Qualification was the moment I proved to companies I had what they needed’\n\nThe ACCA edge\n\nAfter she passed her ACCA exams in 2022, a major benefit quickly became apparent. ‘I no longer had to scour LinkedIn job openings,’ she laughs. ‘The moment I had ACCA next to my name, a lot of recruiters reached out to me independently. I can’t tell you how many messages I got for job openings in the US, Europe, and other parts of the world.\n\n‘Getting my ACCA Qualification was the moment I proved to companies that I had what they needed. A lot of openings had ACCA listed. I no longer had to apply; instead, companies approached me, because it’s a hot market now.’\n\nGutierrez moved from PwC to KPMG Philippines in March 2022, and is currently settling into her new role in PwC Denmark as a senior associate in their top tier department, with a focus on Denmark's top companies.\n\nHappy to help\n\nThroughout the whole process, she embraced mentoring. ‘It started in college when I was a member of the Junior Philippine Institute of Accountants, which is for aspiring accountants,’ she explains. ‘Part of our programme was to mentor junior students, so trying to help out first- and second-year students.\n\n‘This has carried over to ACCA, because I remember when I was starting out, I didn’t know anyone who was pursuing ACCA. I had to search social media platforms and reach out to people who were doing the same.'\n\n‘I’m upskilling by learning programming languages and data visualisation’\n\n\nShe has found, though, that there are plenty of students in the Philippines interested in pursuing ACCA, and she is more than happy to help. ‘They need people to guide them, and I enjoy talking to students and saying, this is what you need to do.’\n\nFilipinos looking to gain their ACCA Qualification now have greater choice in how they study, via a growing number of learning partners or ACCA-accredited universities. When Gutierrez embarked on her ACCA journey in January 2019, she had no option but to self-study, but she adds that student resources from the local ACCA office were invaluable along with the support of tuition provider First Intuition Learning Solutions (FILS), which she credits with helping her to get through the advanced tax exam.\n\nHer move to PwC Denmark is a realisation of a long-held ambition that she believes will help future-proof her position in the industry. 'I believe my path will provide me with valuable professional growth and help balance out and nurture other aspects of my life.'", "pred_label": "__label__1", "pred_score_pos": 0.9838401079177856} {"content": "Regular Customer\n\nQuestion 1\n\n 1. From the first e-Activity, assess your satisfaction with the company you researched and make recommendations about how that company could modify its business-level strategy to both increase your overall level of satisfaction and to attract new customers. Provide specific examples to support your response.\n 2. Analyze the five business-level strategies discussed in Chapter 4 to determine which strategy the company you researched most likely applies. Determine how your experience with that company might change if it switched to one of the other four strategies (your choice). Explain your rationale.\n\ne-activity-Use the internet to research a company with which you regularly do business or are a regular customer. Focus on how that company relates to their customers. Be prepared to discuss. Use the internet to research Apple’s strategy for competing against other technology companies. Be prepared to discuss.\n\nQuestion 2\n\nIn a 1-2 ppr, please complete the following:\n\n • Review the financial statements from the manufacturing company you chose in week one.\n • Discuss the importance of each type of budget (master, sales, production, direct materials, manufacturing overhead, sales and administrative).\n • Give 1-2 examples describing how each budget can assist the company in improving profitability for future periods.\n\n\n\nQuality Guaranteed\n\nAny Deadline\n\nNo Plagiarism", "pred_label": "__label__1", "pred_score_pos": 0.9409070611000061} {"content": "What is Whitelist\n\nA whitelist could have different meanings depending on the setting in which the term is used. It is often used to refer to a directory of email addresses and some other identifying data of individual investors or companies who are interested in an initial coin offering (ICO) of a crypto project. Interested entities ask to be added to a project’s whitelist to make sure they receive relevant information and updates about the project.\n\nWhen it comes to withdrawal addresses, a whitelist is used on crypto exchange to denote a list of secure addresses to which resources could be withdrawn to.\n\nIn a network security setting, a whitelist can also be utilized to refer to a list of authorized addresses that are permitted to connect to a network.\n\n\nA whitelist is a directory of email addresses of individual investors or companies interested in a crypto project's ICO.\n\nRelated terms\n\nWrapped Ether (WETH) Volume Wei Wallet Virtual machine Verification code\n\nJoin our free newsletter for daily crypto updates!", "pred_label": "__label__1", "pred_score_pos": 0.9994903206825256} {"content": "How Low Are the Odds of Winning the Lottery?\n\n\nThe data hk is a form of gambling that involves drawing numbers at random. Although some governments outlaw the practice, others support it and organize state or national lotteries. Here are the odds of winning the Mega Millions and Powerball lottery games. You can use this information to decide whether playing the lottery is worth your time and money.\n\nOdds of winning the lottery\n\nIf you’ve ever played the lottery, you know that the odds of winning are incredibly low. The odds of being killed by a shark are one in 3.7 million, while your chances of winning the lottery are one in 1,560 million. But how low are the odds of winning the lottery? Well, that depends on how specific you want to be. There are certain games that have much higher odds of winning than others.\n\nFor example, a $1 million prize in the Powerball lottery requires matching five of the six numbers. These numbers are called Powerball numbers, and the odds of winning a prize in this lottery are one in 11.6 million. These odds are significantly higher for state lotteries than for national lotteries. However, even with these higher odds, the odds are still very low if you buy a $2 lottery ticket.\n\nCosts of playing the lottery\n\nWhile playing the lottery has many advantages, it can also have a few costs. The first is the cost of purchasing the tickets. The more tickets you purchase, the higher your chance of winning. Therefore, it is important to understand the costs associated with playing the lottery before you invest your money. In addition, you should try to play more than one lottery game to maximize your chances of winning.\n\nAnother cost of playing the lottery is the tax. This is similar to the tax that is charged on sales, but it is non-consensual. The tax amount is not included in the ticket price, so it is sometimes referred to as a hidden tax. This is because you end up paying taxes on the proceeds from playing the lottery, but you never receive a tax bill reflecting these taxes.\n\nChances of winning the Powerball\n\nThe odds of winning the Powerball jackpot are low, but that doesn’t mean you should never play. A Powerball ticket has nine ways to win, and winning a prize starts at $4. However, before 2015, the odds were significantly lower. That’s because the Multi-State Lottery Association (MSLA), which runs the Powerball game in 38 states, increased the number of white balls from 59 to 69 while reducing the number of Powerballs from 35 to 26.\n\nOne of the best ways to increase your chances of winning is by purchasing multiple tickets. This way, you can double your chances of winning. If you buy three tickets, you can increase your chances of winning by four times. You can also join lottery pools with family members, friends, or work colleagues. This way, if you win, you can share the prize with the entire group.\n\nOdds of winning the Mega Millions\n\nThere are a number of factors that affect how likely you are to win a jackpot. The first one is simply how much money is in play. As of this writing, the Mega Millions jackpot is worth over $1.1 billion. The odds of winning this jackpot are one in 302.6 million. These are astronomical numbers and should make any person skeptic nervous, but they don’t have to.\n\nAccording to the lottery website, there are several factors that affect the odds of winning the Mega Millions jackpot. First, the jackpot size can be larger than the official estimate due to last-minute ticket sales. This increases the hazard of other winners and reduces the value of each ticket. Second, there are different types of winning tickets. If you match all five white numbers and the gold ball, the odds are one in 931,000.", "pred_label": "__label__1", "pred_score_pos": 0.7818927764892578} {"content": "Charles Page and the Groove Masters\n\nCharles Page and the Groove Masters - Blues Boulevard\n\nUpcoming Shows\n\n\nGroove Masters Band was formed in 2007, in Charlotte, NC. The band consists of five veteran musicians with over twenty years of professional musical experience. The Band has achieved massive success across the US, and International. In 2009, Groove Masters Band released their first album \"Elements of Groove.\" This album was so awesome, they had the opportunity to travel to the West Coast. That same year, the album won \"Best Jazz Band\" in the Carolina's. A few years later in 2011, Groove Masters Band released their sophomore project called \"Praise Worthy.\" This album gave them the opportunity to tour with some of the Great Legends of Gospel and R&B. In 2016, Groove Masters released their third project \" Keeping The Groove Alive\" (a funky, electrifying, high energy jazz album) Groove Masters Band, is currently in the studio finishing their next album due in 2021.\n\nSocial Media", "pred_label": "__label__1", "pred_score_pos": 0.8944371342658997} {"content": "Writers Do THIS To Make Your Characters Resonate With Readers\n\nYou may have heard of the SMART acronym for setting and achieving personal goals. Any goal should be Specific, Measurable, Attainable, Relevant, and Time-constrained. It (or some version of it) is repeated like a mantra in self-help literature and workshops. But as a writer, I’ve found this can be useful tool for developing stories, characters and even writing blubs.\n\nPhoto by Markus Winkler on Pexels.com\n\nA story in its most basic form is about a character trying to obtain a goal. In striving for that goal the character changes (or maybe the world around them changes). From the experience of the struggle within the story, the reader grows in some way. And that’s one of my goals as a writer–to write stories that people gain something positive from.\n\nSo how does a SMART goal work for a character in a novel?\n\n\nA general goal might be “survive a crash landing on an alien planet.” Okay, sure. That works for a while. But simple “survival” can quickly get bogged down, because in any absence of immediate threat, there’s nothing for the character to work toward, there’s no strategy to play out that the reader can think about, to agree or disagree with. At any point that binary switch might flip, regardless of what action the character takes. And that can lead to reader apathy. The key then is to define goals as specifically as possible. So you throw in a safe spot for the characters to get to. Maybe another downed spaceship, but one with a working radio. The characters them survive by getting to the safe spaceship.\n\nA specific goal can also be articulated quickly and succinctly, so the reader knows exactly what the character needs to accomplish. At the end of the story, the reader will also have a clear understanding of whether or not the goal has been met.\n\n\nOne of the staples of post-apocalyptic fiction is usually a character or set of characters trying to get home. In high fantasy fiction, it’s often a quest. Journeys like this can be measured in miles or leagues or at least kingdoms passed through on the way to the volcano. In romance ,the goals is usually development of a relationship (meet-cute, first date, setback, reconciliation, commitment) . If you look at the Hunger Games, Katniss Everdeen needs to survive a game of elimination that is scored in lives lost.\n\nThe point here is that your readers need to have some means of marking progress toward the goal. This will allow the reader to track what works and what doesn’t, understand when there’s a setback, and contemplate strategies for moving forward.\n\n\nHere’s one where there’s some subtle differences between personal goal-setting and setting goals for your characters. In real life, you need to assess your circumstances and make sure your goal is actually achievable. In fiction, things can be a little different.\n\nIn fiction, the reader has to be convinced that character has a shot at obtaining the goal. They have to know that whatever traits and flaws that character possess, somewhere inside that character has the tools necessary to get the job done. That’s not to guarantee it will happen. Like the first scene in an action movie where the hero takes down some thugs just to prove how awesome they are, it’s kind of boring if it takes too long. Conclusions can’t be foregone.\n\nBut neither can the goal be so impossible that the reader will no longer suspend disbelief. If the goal is too lofty, the reader starts to think the only way it will happen is if the writer is going to pull a fast one, a deus ex machina, and then the game doesn’t seem fair.\n\nSo long as there’s a question in the reader’s mind as to whether the goal will be achieved or not, they’re going to be along for the ride.\n\n\nHere’s where it pays big time to know your genre well and read as much as you can. Your character’s goals need to be consistent with reader expectations. (This R can also stand for research.)\n\nIt’s important to remember that character goals can change as the story progresses too. In some stories, the initial goal as the character understands it, may be the exact opposite of what that character needs for growth. When you’re revising and you’ve identified the theme of the story, it’s important to go back and revisit initial goals. Do they make sense in the context of the greater story? In the context of the genre?\n\nIs the goal consistent with your other priorities in life? If it’s a smaller, short-term goal, does it jive with your bigger picture, and longer-term goals? The R can also stand for research, making sure that you understand the details of what you’re planning to pursue and this can in turn help to determine how realistic the goal is.\n\n\nTicking clocks add suspense.\n\nIn addition to knowing what the goal is, the reader also needs a sense of time and how urgently the goal needs to be met. Readers care a lot more about a character caught in a traffic jam when she’s on her way to an interview that starts in 15 minutes. The time limitation starts a game of strategies. What should she be willing to risk to get there? A ticket for driving too fast? Should she run a red light? Hop out of the van and take the kid’s bicycle in the back? A reader thinking in these terms is completely engaged in the story.\n\nSo that’s it. That’s a handy tool to have in your writer’s toolbox. As a side note, if you can write all of this out and put it together in a few hundred words, that also makes for a decent method to answer that dreaded question: so what’s your story about?\n\nOvercoming Fear for Writers\n\nWhether you’re publishing independently or submitting your manuscript to an agent, putting your fiction out into the world for other people to see requires a tremendous amount of courage. Even attending an in-person writer’s group for the first time and talking about your writing with other people can be challenging.\n\nPutting together something as complex as a novel requires an enormous investment of time and mental energy. People put their hopes, dreams, and desires into their fiction. They infuse their stories with their ideas, many of which can be deeply personal. And so when someone makes the decision to take their work from the privacy of their own files and subject it to public scrutiny, they are exposing a vulnerable part of themselves.\n\nIt’s not unlike walking across the grade eight gymnasium-turned-dance floor in front of all your classmates to ask someone to dance. You’re suddenly open to rejection, ridicule, judgement, and in many ways even worst possible reaction: indifference.\n\nPhoto by Steve Johnson on Pexels.com\n\nThe easy advice to give, and I hear it a lot, is simply to grow a thick skin.\n\nBut advice like this does a disservice to the industry. By limiting the works of public fiction to only those writers who can put up with a certain level of criticism, we’re denied all the great stories from writers who can’t overcome this barrier.\n\nWorse, it can propagate attitudes where people believe it’s okay to treat other writers poorly if their work is not up to a subjective and often arbitrary standard.\n\nSo here are a few (hopefully constructive) tips on overcoming fear.\n\nFigure Out Your Goals as a Writer\n\nFirst off, it’s totally fine to write for the sake of writing. People write for all kinds of reasons: to relax, to play with ideas, escape from reality, work through a tough experience, etc. And there’s nothing that says what you write needs to ever been seen by anyone else.\n\nIt’s also okay to want to publish ‘at some point’ but that doesn’t have to be now.\n\nOne of the best tips for overcoming anxiety around putting your work out there is to have an honest conversation with yourself about what you want to accomplish by doing so, and defining when you want to do that.\n\nEstablishing a timeline for yourself can be quite empowering, even if when that timeline is the simple recognition that you’re not ready yet.\n\nRead. A lot.\n\nOne of the best pieces of advice for any writer is simply to read. Read the classics. Read what’s hot. Read as much as you can in your genre. Read whatever interests you. But read.\n\nPhoto by Ksenia Chernaya on Pexels.com\n\nThe point is that through immersion, you learn. You learn what other readers a looking for. You learn the tropes of your genre. You develop an eye for what works, and what doesn’t.\n\nIf you compare a person who’s read a hundred books in a given genre, with someone who’s only read one or two, it’s far more likely that the avid reader is going to be better at critically assessing their own writing quality, because they have a much larger frame of reference.\n\nProofread and Revise Your Work\n\nMaybe this one is obvious.\n\nBut it’s important to understand that the works from your favorite authors that you end up pulling off the shelf, or downloading into your e-reader is never a first or second draft. It’s probably not even a fifth or sixth draft. While all authors vary in their process, those who can write something near perfect on the first or second draft are a very rare breed (and among those who do the draft is often meticulously planned out ahead of time).\n\nIt’s easier to find courage in presenting something to the world that’s been thought through, reflected on, and reviewed than the first thing that went down on paper.\n\n(The irony of any errors in this post is not lost on me.)\n\nGo Slowly with the Sharing\n\nThere are different ways to start sharing your work. You don’t have to publish it publicly just to get feedback.\n\nFinding a writer’s group or a critique group can be a good way to start. Once you’ve met a few other writers and learned a little bit about where they’re at on their writing journey, you can start sharing your work with ones that are willing to give you feedback at a level you’re comfortable with.\n\nOpen Conversations\n\nWhen you do give your work to someone else for feedback, remember you can have an open conversation about what kind of feedback you’re looking for. If you’re not ready for it to come back all marked up with red ink, then say so.\n\nPhoto by fauxels on Pexels.com\n\nIt’s okay to say that you’re just looking for the positives to begin with. Ask whether your reviewer can identify things that work, parts of the story or characters that resonate with them and why.\n\nYou can always progress to more critical feedback as time goes on. And when you want more critical feedback, remember to ask for specifics. How can I get better at…. suspense, dialogue, imagery, character arcs, etc.?\n\nSometimes I’ll hear a phrase along the lines of “Tear it to shreds.” While perhaps brave, I often wonder if that’s what the writer really wants. How do you grow from something that’s been shredded?\n\nRather, it’s better to focus on your goals and ask questions like: What recommendations do you have to get this from it’s current draft, to something people will pay me for? What areas of my writing could use the most improvement?\n\nOffer to Give Feedback\n\nThere’s no shortage of writers seeking feedback on their work. Even if you’re afraid to put your own work out there, you can still offer to review things that others have written.\n\nIn fact, you can learn a lot from reviewing other people’s work. I’ve spent a lot of time on various writing sites and critique groups. When fifty percent of the fantasy novel opening chapters that you read start with a prince or princess waking up and looking out over their kingdom, you very quickly learn that this is not a unique opening.\n\nBe kind with your words.\n\nDo your best to offer the kind of feedback that the author is seeking.\n\nFind an Editor\n\nOne final tip is that can really help with overcoming fear as a writer is to seek professional feedback.\n\nOf course finding and hiring an editor can be tricky (and expensive). It’s very important to find an editor who: (i) understands your goals as a writer, (ii) is well-versed in your genre and has some credentials behind the advice they give, (iii) is willing and able to give you critical, but constructive feedback at a level that you’re ready to hear, and (iv) that you can trust.\n\nA good editor won’t just tell you what’s wrong with your writing, but will give you suggestions on how to make it better.\n\nIf nothing else, editors act as buffers between you and the rest of the world. If you write something that’s “really bad” they can identify it and flag it before it goes out and they won’t ever say another word about it.\n\n“No matter what anybody tells you. Words and ideas can change the world.”\n\nRobin Williams (Dead Poets Society)\n\nOn Writing Blurbs\n\nLove writing, but hate writing blurbs? Here are some tips to upgrade your blurb and get your book into the hands of those readers who are going to love your work.\n\nOne big reason for so much writer anguish with blurbs is that writers are attempting to summarize their 80,000 word manuscript in 200 words or less. But here’s a big secret: the goal of a blurb is not to summarize your story. The goal is to sell your story (in an honest and helpful way).\n\nA person reading the blurb has either picked up your book and flipped it over, opened it up, or clicked on a link. Something (probably your cover, title or ad copy) has piqued their interest. That potential reader now wants to know if your story is going to be worth the investment of their time and money. What they are looking for are flags to make that decision.\n\nPhoto by Startup Stock Photos on Pexels.com\n\nStart With Research\n\nIdentify the top market category(ies) you want to market your book under. Read through the blurbs of as many of the top selling books in that category as you can. Pay particular attention to the books that are the first in their series (many sales for the later in series books are the result of read-through), and for books that have had staying power, those ones that have been in the top 100 for months or even years. Look for the common traits in their blurbs. Things to take note of: how the characters are described, flags that identify the genre, how the main problem is summarized, hook phrases, word length, and what you particularly like about them.\n\nRemember, when writing your blurb, it’s unlikely to be the only one that the reader sees at that time. After reading a dozen or so, which ones do you remember and what stands out about them? Keep this in mind as you craft your own blurb.\n\nWho is the Main Character?\n\nChoose a single character to define the story around. I know this can be a challenge for an ensemble cast, but you can always tweak and add later. Start with one character with whom your target audience is most likely to resonate with.\n\nOnce you have your character, identify two traits of this character. The first is something familiar, identifiable, or accessible. What trait or experience does that character have that readers are going to most closely identify with? A longing for love? Getting bullied in school? Training for a competition? It doesn’t even need to be something the readers themselves have actually experienced, but something they’ve likely read about before, or something they seek when reading your genre. If you’re working on an action-thriller, it might just be that the character is associated with a familiar agency: the FBI, CIA, or the US Navy SEALs. If you’re a military science fiction writer, it might be that your character is a space marine, starship captain or cyborg.\n\nThe second is something unique. What’s different or uncommon about this character? Identify a trait that’s going to pique a potential reader’s interest, something that stands out, that’s going to be memorable about that character. What makes the character different from “normal” people in your story’s world? What makes the character different from other characters in the genre? This is the flag that you can plant that will help make this character memorable. Note that it doesn’t need to be absolutely exclusive. There are lots of dogs in the world that are large and have auburn-tinged fur, but Clifford the Big Red Dog is pretty memorable.\n\nHarry Potter… unloved orphan (familiar/identifiable]) who discovers he is a wizard (unique [at the time]).\nJames Bond… an agent of the British Secret Intelligence Service (familiar) with a license to kill (unique).\nJon Snow… an unloved orphan (I feel like I’ve mentioned this before) with a dire wolf (unique).\nJason Bourne… a CIA black ops agent (familiar for readers of the genre) has lost his memory (unique).\n\nClearly Define the Genre\n\nFor some genres or stories the setting is critically important. In historical fiction, readers need a frame of reference for the time and place. In post-apocalyptic fiction, readers want to know how the modern world ended. In a fantasy story, readers want to know what that fantasy element is–the presence of magic and some hints at how it’s used. In a blurb, the genre needs to be shown and shown quickly, often boiled down to a single sentence. Here’s a great example:\n\n\n– Excerpt from Suzanne Collins’ The Hunger Games blurb (Scholastic Press)\n\nHere, in the space of two sentences the author defines this unique world and sets up the core challenge facing the main character. We don’t actually learn much about the setting details, but it’s clear that this is a story about an alternative world where a character is going to have to survive these games. The reader knows exactly what kind of story they’re in for.\n\nAvoid Too Many Fictional Proper Names\n\nIn that example the author uses a few proper names: North America, Panem, Capitol. Here there’s only one that’s objectively unfamiliar to anglophone readers. But if you’ve ever read some fantasy or science fiction blurbs you will have seen those that include a pile of unfamiliar terms. Each new word requires mental effort on the part of the reader to keep track of. It’s like a little hill to climb. If you present a reader with too many hills to climb, they’ll put the book down and move on.\n\nWhat Major Challenge Does The Character Face?\n\nBe specific here. One problem I see frequently when people first start writing blurbs is the use of vague language. I think this comes from a desire not to give too much away. But if the reader can’t identify what problem the character faces, they’re not very likely to be interested because they won’t understand what the story is about.\n\nIsolate a single challenge. If you’re writing something like epic fantasy, there may be many different challenges, but a blurb can only be so big (ideally no more than 200 words). Choose one.\n\nThe challenge should be easily defined in a single sentence. It’s okay to approximate something that’s complex. It’s okay to skip over details. Remember, you’re not trying to give the reader a synopsis of everything that happens. You’re trying to give them enough information so they can make an educated decision on whether this is a story they will enjoy.\n\nNow that you have a challenge, how do you present it?\n\nIdentify Why This Character Must Face This Challenge\n\nOne option to try is to emphasize why the character must face the challenge. People tend to find stories much more appealing when characters are forced out of their comfort zone, where they are forced to make compromising choices, where they take actions that they wouldn’t normally take. That’s where there’s the greatest potential for disaster. But that’s also where learning and growth happen. That’s where reader is most likely to get the greatest bang for their buck.\n\nEmphasize Choices the Character Faces, Decisions They Make, and Actions They Take\n\nThink about character agency. You’ve got an interesting, approachable character and an intriguing problem that the character must confront. Now, what does that character do? Use the active voice here.\nJon Snow chooses to join the Night’s Watch. Katniss Everdeen volunteers as tribute.\n\nAt some point in the story, the character will need to assume direct responsibility for the outcome. Identify and articulate this point.\n\nAvoid Questions\n\nQuestions, when they are directly put to the reader, are an opportunity to put the book down.\n\nIf the answer to the question is obvious… asking it can come across as pretentious, or lecturing, and that can turn a reader off. Also, the reader may not agree with the intended/obvious response. If they don’t believe that love conquers all, or power corrupts, or whatever the obvious answer is, they’ll put the book down.\n\nOn the other hand, if the answer to the question is not obvious, the reader may not know it, or feel as if they have to work to figure it out. It’s another hill to climb. If they feel stupid for not getting it, they’ll likely pass on the story.\n\nI’ve seen some blubs that hit the reader with question after question. Avoid this, unless you want the reader to feel as though they’re taking a quiz.\n\nThe Hook\n\nThis is a catch phrase, often bolded, at the beginning of the blurb. It’s main purpose is to get the reader to read the rest of the blurb. It also serves as a kind of slogan for the book, something easily identifiable that will make it resonate in the reader’s mind.\n\nIdeally the hook should be unique to the book. Avoid clichés.\n\nEven though the hook should be the first thing a reader sees, it helps to write it last. Generally it’s easier to boil down the bigger blurb into a single idea, than vice versa.\n\nWinning means fame and fortune. Losing means certain death. The Hunger Games have begun… – The Hunger Games, Suzanne Collins\n\nSix days ago Astronaut Mark Watney became one of the first people to walk on Mars.\nNow, he’s sure he’ll be the first person to dies there. – The Martian, Andy Weir\n\nWinter is coming. – Game of Thrones, George RR Martin\n\nSeek Feedback\n\nBlurbs are short. People can read them quickly and give feedback without too much of an investment of time.\n\nIf you haven’t already, join a few social media writers’ groups where posting blurbs and giving/getting feedback is encouraged and post your draft. Keep in mind that no all feedback will be positive, and not all people will agree. But often you can tap the hive mind of the online writer community to help identify any major flags that are keeping you from getting sales.\n\nOn Character Names\n\nNotice any patterns in this list?\nJames Bond\nJason Bourne\nJack Bauer\nJack Reacher\nJack Ryan\nJohn Rambo\nJohnny Ricco\nJohn McClane\nJon Snow\n\nAside from the fact that they all start with the letter J, there’s a certain pattern in the naming that seems to resonate in the action hero genre. Ian Flemming, for example, is reported to have named his iconic spy after the American ornithologist James Bond. At the time Flemming was looking for a name that was plain and dull sounding. He wanted to create a neutral, anonymous figure at the center of stories that were otherwise full of exotic action. At the same time, the character needed to be a blunt instrument wielded by a clandestine government department.\n\nSo you end up with James, which following WW2 was one of the top 20 names in the UK (in fact it appears to have been in the top 20 for the last century)–a common name that could be nearly anonymous. But then this was coupled with Bond. That last name can evoke images of either money, or shackles, perhaps both at once. It is a single blunt syllable. It resonates so well that the line:\n“Bond. James Bond.”\nhas become an instantly recognizable institution in and of itself.\n\nGoing back to that list, I see quite similar patterns emerging… a common first name coupled with a blunt one or two syllable last named that evokes action. It might almost be a comic book onomatopoeia : Boom! Bam! Bang! Look at the Mission Impossible franchise. The lead character: Ethan Hunt.\n\nPhoto by Engin Akyurt on Pexels.com\n\nHere’s another list, this one of heroines from science fiction and urban fantasy:\nKatniss Everdeen\nHonor Harrington\nKris Longknife\nEllen Ripley\nBeatrice “Tris” Prior\nHermione Granger\nAnnabeth Chase\n\nThere’s a similar pattern. Though in some cases it’s mixed up, you still have one part that at least feels “common” and another part that’s more exotic, that evokes a more vivid imagery.\n\nThis kind of pattern resonates with readers on a deeper scale because on one hand there’s something about the name that’s familiar, making it accessible. On the other hand there’s some contrast that gives it a unique flare, making the name memorable, and in many cases even aiding the characterization.\n\nOne other piece of advice that’s important in naming characters is that no character exists in a vacuum. As an author you have to consider the entire cast of your book. One trick a lot of authors use is to avoid having any two characters, at least main ones, with names that start with the same letter or that sound similar. This helps the reader to avoid confusion. (Interestingly George R.R. Martin turns this on its head and uses a small number of names and similarities between them to turn a relatively small number of names into a massive ensemble cast. I don’t recommend trying this for most writers though.)\n\nBeyond the book you’re writing, no reader reads in a vacuum either. That’s why it’s so critically important for authors to read in their genre and learn who the popular characters are.\n\nGray, Sievert, Rad… a Sci-Fi Writer’s Guide to Radiation\n\nIn recent years, there has been an explosion of post-apocalyptic fiction and one of most prominent aspects of many of these settings: nuclear fallout and other forms of radiation either as a primary antagonist or at least a constant challenge for characters that arises from these settings. Radiation is mysterious, it can be dangerous, and a convenient plot device for writers. So many characters that were created at the dawn of the “atomic age” following the second world war have “radiation” as a part of their origin story. Spiderman… bitten by a radioactive spider. The Incredible Hulk… the result of a gamma radiation experiment gone wrong. Godzilla… seems to use radiation to heal. But what is radiation really?\n\n\nEven among physicists the term “radiation” can have slightly different meanings in different contexts. Generally it refers to the propagation of energy, usually as an electromagnetic field, through space. Optical light, microwaves, infrared, ultraviolet… etc. As a subset of that, and what I’ll be focusing on here, is ionizing radiation–where there is enough energy in packets of that radiation to knock an electron out of an atomic orbital. If you want to impress your friends at parties, the energy threshold where this starts to happen is about 4 eV (315 nm) and that’s in the ultraviolet portion of the electromagnetic spectrum. Everything to the left of that in the figure below is ionizing… x-rays, gamma rays, cosmic rays (not shown). This can also include fast moving sub-atomic particles… when that’s the nucleus of a Helium atom after a particular mode of decay in a radioactive isotope, you’ve got an alpha particle. If that’s an electron, we call it a beta particle. Sometimes in radiation medicine protons, helium or carbon ions for cancer treatments that take advantage of the specific charge and mass to target precise depths in the body.\n\nThe electromagnetic spectrum from gamma rays to radio waves, logarithmically increasing wavelength left to right, with the visible spectrum highlighted in colour.\nSource: Philips Ronan Gringer, https://upload.wikimedia.org/wikipedia/commons/3/30/EM_spectrumrevised.png\n\nMeasuring Radiation\n\nOver the years, radiation has been measured in different quantities. Currently the most common currency is called the Gray–defined as 1 Joule per kg of the medium exposed to the radiation. This quantifies radiation absorbed dose. In the past we used use the rad–which works out to about 0.01 Gy. The Gray was officially adopted in 1975. You might also see another (outdated) unit called the Roentgen (or R), which has (had) a more technical definition that refers to the about of charge produced in air in a free air ion chamber, but this was abandoned because as people became able to produce higher energy sources, the measurements were impractical.\nA concept called effective dose also comes into play when we’re talking about human exposures and the risks associated with them. Not all physical doses are created equal. To a cell, for example, a heavy, charged alpha particle blasting it’s way though does a lot more damage per unit energy absorbed than a speeding electron. It’s kind of like the difference between a bullet and cannon ball. To account for the relative amount of damage created by the specific type of radiation absorbed dose is translated into equivalent dose. Then, we have a system that also normalizes risk depending on which tissues were irradiated. The risk of developing cancer after having your whole body irradiated is different if the radiation only goes into your hand as opposed to your whole body. Putting this all together, yields effective dose which is measured in Sieverts or Sv.\n\nBackground Radiation and Common Effective Doses\n\nRadiation is all around us. Cosmic rays, radon gas, potassium 14 in bananas… every day we’ve got photons and other particles passing through us (and doing damage to our cells). This is referred to as background radiation. Cumulatively the dose from background radiation adds up to about 2.4 mSv of effective dose per year or 0.0024 Sv/yr. Of course this can vary. There populated parts of the world, such as Ramsar Iran, where the background doses have been measured up to about 260 mSv/yr, though I believe average doses are closer to about 6 mSv/yr. Over the years a considerable amount of scientific attention has been paid to the residents of Ramsar and for what it’s worth, numerous health metrics have demonstrated that there doesn’t appear to be a significant increase in cancer rates in such areas.\n\nIn most places the background dose is about 2-3 mSv. I use 3 mSv as a handy reference. You go about your daily life receiving this level exposure, you’re unaware that it’s even there and generally doesn’t cause too many problems. So it’s useful to use this as a normalizing standard. Below, I’ve added a table with some approximate effective doses.\n\nEventEffective Dose (mSv)Fraction of Background\nbackground (annual)2.4 1\ndental x-ray0.0050.002\nCT scans5 – 202 – 8\nlethal dose (whole body)4,0001667\nEffective doses are approximate, for the purposes of general public education and writing cool science fiction stories.\n\nHow Radiation Interacts with Humans\n\nFrom the point of view of a human cell, radiation can be thought of like little bullets zipping through water. Inside that cell you have a coil of really important material… your DNA… it encodes all the relevant information for building the body and enables the cell to do what it does. That DNA is the sensitive component of the cell.\n\nAs radiation travels through the cell it interacts either directly or indirectly with the water-like medium inside. As atoms of the medium become ionized they generate highly reactive chemical species called free radicals and these can diffuse, interact with the DNA and damage it. To a cell, damaged DNA is a big deal.\n\nIn fact it’s such a big problem that cells have evolved mechanism to constantly scan for it. An analogy that I sometimes use is that the DNA is a like a library of information. It’s critical for the cell to operate, so critical that every book in the library has two copies. That library hires an army of editors who work day and night constantly comparing each book to its companion. You can have minor DNA damage where maybe a letter gets replaced or a sentence gets cut. Those are pretty easy for the editors to fix. Repair of the damage is often on option. But sometimes you get more severe damage where you have pages torn out of both copies of the book! That’s an analogy to something called a double strand break where both of the helixes in the DNA double helix are severed.\n\nWhen that happens the cell has a few options. Often, if there’s enough damage it will trigger a process referred to as apoptosis-programmed cell death. In the analogy that’s like burning the library down if one book is out of whack.\n\nUnfortunately sometimes the repair happens, but not… perfectly. This leads to a change in the code. When this happens, in most cases, it’s relatively inconsequential. But sometimes that damage can linger and cause problems much later on… manifesting as something like a cell that can’t control its reproductive cycle… cancer.\n\nWhat Happens To Characters Who Survive Nuclear Blasts?\n\nAssuming of course we’re talking about radiation exposure and not the percussive blast itself, for reference the increase in cancer risk as a result of radiation exposure is roughly 4%/Sv for adults. In radiation protection this is applied in a linear fashion: an exposure of 0.5 Sv results in a 2% excess risk, an exposure of 2 Sv results in an 8% excess risk. But of course this is a simplification. When you really look at it, things such as the age of the person exposed come into play (a young person has more time to develop a cancer than an older person for example), and there is a lot of debate as to what happens when doses are relatively low, like in the tens of mSv range. But the 4%/Sv can give you a rough ballpark for determining downstream risks to any characters\n\nAnd as per the table above, the lethal dose that would kill about half of the exposed people to it (without major medical intervention) is about 4 Sv.\n\nFrom a medical point of view, it’s the rapidly dividing cells in the body that are effected first. The GI tract is often affected, so high dose exposures will result in horrible consequences like diarrhea and vomiting. Your red blood cells are also pretty sensitive, which can lead to an effect where circulating cells are wiped out leading to major fatigue, but then as “stored up” cells are released into circulation characters may temporarily recover for 24-48 hours or so. But if no new cells are being made, they crash pretty quickly afterward.\n\nAs the dose goes up, the symptoms get more severe. When you get into exposures upwards of dozens of Sv, you end up with neurological complications and even with medical intervention such exposures are very difficult to survive.\n\nSo in the end… unfortunately there’s no evidence of radiation leading to superpowers, at least not that I’m aware of. That said, it can be used for some pretty amazing things, like curing cancer. But that’s another blog post.\n\nHard or Soft… How Do You Like Your Science Fiction?\n\nOften the line between plausible and implausible in science fiction is blurry. It’s the same way in real science.\n\nScience fiction stories tend to lumped into two categories: hard and soft.\n\nPhoto by Pixabay on Pexels.com\n\nIn hard science fiction the science in the story is a plausible extrapolation from real science. The characters are struggling to deal with problems arising directly or indirectly from real-world scientific phenomena. One of my favorite examples is Andy Weir’s The Martian, where astronaut Mark Watney is left for dead on the surface of Mars and must use his scientific skills and ingenuity to survive on a planet where nothing lives. It takes years to rescue him because spaceships can only travel so fast.\n\nOn the other hand you have soft science fiction. Here the science is a little more of a mystery, where the author dares to ask, what would happen if…? Spaceships travel faster than the speed of light and accelerate with minimal g-force effects on humans, robots are sentient, and aliens speak English. The Star Wars movies are excellent examples of this.\n\nScience fiction nerds love to argue about the threshold between hard and soft. Where, for example, would the Star Trek franchise go? You have space ships that travel faster than light, which would make is soft. And yet, some recent physics papers have shown that warp drives may in fact be possible, at least under certain circumstances.\n\nPersonally I think of hard and soft SF not as buckets, but as a spectrum of scientific plausibility. No matter where you try to draw the line, there will always be someone who argues some concept in the story is implausible and someone else arguing it is.\n\nThis happens in real science too.\n\nWhen I was a medical physics resident, I recall having dinner with some very highly-esteemed medical physicists in our field. I won’t name them, but to me, this was like a computer nerd sitting with Steve Jobs and Bill Gates. At the time I was working with a team attempting to merge an MRI unit with a linear accelerator so we could take detailed images of cancer patients while treating them with radiation. Unfortunately I spent most of that dinner on the receiving end of a lecture about why that wouldn’t work… the linear accelerator would would interfere with the radio frequency signals the MRI used.\n\nTwo years later my group took the world’s first MRI image while the object in question was being irradiated by a linear accelerator. And if you fast forward to today, linac-MRI hybrid machines are a reality in radiation therapy clinics around the world.\n\nThe World’s First Magnetic Resonance Image with Irradiation from a Linear Accelerator (2008)\nWhile it may not look like much, this is a magnetic resonance image of a rectangular acrylic cube with holes of varying diameter immersed in a solution of CuSO4. On the left is the image without irradiation and on the right it is being irradiated with a 6 MV beam from a linear accelerator. Many in the medical physics community were skeptical this was even possible until a group in Edmonton achieved it.\nSource: Fallone et al. http://www.mp.med.ualberta.ca/linac-mr/photo_gallery.html\n\nThe point is that it’s not always easy to tell what’s plausible and what isn’t, even for experts in the field. There is a quote attributed to A. A. Michelson (of the Michelson-Morley ether experiment) at the end of the 19th century in reference to physics that “the grand underlying principles have been firmly established… the future truths of physics are to be looked for in the sixth place of decimals.” For reference, shortly afterward, in 1905 Einstein published the special theory of relativity, one of several advances that reframed the field of physics in the early 20th century.\n\nFor a scientist who writes science fiction, there can be a lot of pressure to write on the harder side of the spectrum. Writers like Issac Asimov cast long shadows.\n\nWith First Command, I certainly break a few rules that make it lean toward the softer side of science fiction like the faster than light travel. But ultimately that’s a plot device to tell the kind of story that I want to tell. I also try to include some harder stuff… like a sequence where the cadets are trying to shoot down an incoming drone loaded with explosives, but can’t because the planet’s gravity has altered the ballistic trajectory of their weapons.\n\nIn the hard or soft debate, a lot comes down to the kind of story you want to read, or if you’re a writer, to tell. For me, the first goal is always the same: tell a good story.\n\nCan AI Be Ethical?\n\n\nPhoto by Alex Knight on Pexels.com\n\nWhat Exactly is AI Anyway?\n\nAI or artificial intelligence is staple of modern science fiction. From “Robot” of Lost in Space (Danger Will Robinson) and 2001’s HAL, to the Droids of Star Wars, The Cylons of Battlestar Galactica, the Transformers, or the T-800 Terminator, fans of the genre have been fascinated by the human quest to build machines that think like we do, perhaps better than we do. And the ethical, social and societal consequences of embracing such technology makes for great drama with the nature of humanity itself at its core. Will humans eventually render ourselves obsolete? Will we unintentionally initiate a robot apocalypse? Or will we be able to live guilt-free being catered to by artificial servants?\n\nIn general, artificial intelligence is an umbrella term that’s used in the field of computer science to refer to approaches to problem solving and decision making that mimic those of the human mind. It makes use of various methods of machine learning where computers are fed data (sometimes completely raw, sometimes coupled with desired outcomes) and based on the patterns these machine learning algorithms identify, they are able to cluster data together, make decisions or generate labels for new data that’s independent of what it used to learn those patterns.\n\nAs an example from my own research in my day job as a medical physicist, I currently have a graduate student who is studying the outcomes for patients who’ve received radiation therapy for prostate cancer. She’s using machine-learning tools to identify treatment plans that are likely to fail before treatment proceeds. Humans can identify simple patterns between a few variables. Oncologists come up with general rules: keep the mean dose below to this organ below that threshold and most patients won’t experience nasty side effects. But as the data grows more and more complex, our brains have trouble handling it. So we use computers to assess it. In principle, machines identify those problem cases we can’t catch with our simple rules, and give each treatment moving forward an optimal chance for success.\n\nPhoto by Brett Sayles on Pexels.com\n\nThe Trolley Problem\n\nAI is what enables self-driving cars. And while our roads aren’t quite full of the self-driving vehicles predicted to be the rage in the early 2020s, they’re not far off. The act of driving brings ethics front and center in the AI world.\n\nConsider the trolley problem–an ethical thought experiment popular in introductory ethics and philosophy classes. In short, a trolley is moving down the tracks at a high speed and its brakes go out. Ahead there’s a person stuck on the tracks and if the AI continues, that person will get hit and surely die. But you control a switch that can divert the trolley onto another track.\n\nClearly the ethical decision is to throw the switch and divert the trolley. However, the twist is that there’s a worker on the other track with a jackhammer and facing away. He can’t see or hear the trolley coming and you can’t warn him. In either choice, someone will die. It’s a no-win situation.\n\nAnd of course there are lots of variations on this. Sometimes the person on the first track is a child. Sometimes construction worker is a medical student. Sometimes it’s a group of construction workers, or the trolley that will surely derail and crash on the alternate track is full of prison convicts.\n\nAs humans we may be called to make these kinds of decisions every day. Sometimes without much preparation. You get behind the wheel of a car, and you can’t control what everyone else on the road does.\n\nSo self-driving cars. Assume that these are completely automated, all people in the car are passengers. Unforeseeable collisions happen on a regular basis… drunk drivers, people stepping out from behind parked vehicles, black ice conditions. At some point it’s reasonably likely for an AI to encounter a situation where in order to avoid a collision, it will have to veer onto a sidewalk, and once is a while, someone will be on that sidewalk.\n\nAs an automaker, how to do you program your car?\n\nSome argue you can avoid such decisions altogether. Simply apply the brakes. But the issue that arises is that sometimes that’s not enough to avoid a crash, and in cases where veering off would have worked, you’ve now created a product incapable of matching human performance.\n\nAnother option is to treat them as optimization problems. But do you can optimize the number of lives saved? The number of expected life-years (such that two children would outweigh three senior citizens)? Or various measures of social value (a doctor would perhaps outweigh a prison convict)?\n\nDoing this will rely on the AI’s ability to accurately classify the subjects involved. Human/not human identification is reasonable to accomplish. Age… less so, but still possible. Social value… that’s nearly impossible to assess at the best of times, and there’s a big question as to whether ranking anyone with a social value is ethical to begin with.\n\nFinally there are market pressures to consider as well. When people are asked “hypotheticals” there is often a utilitarian preference for optimizing the number of lives saved. But people are more likely by buy vehicles that will place their own survival over others.\n\nThat last point is critically important here. AI construction will not be governed by ethicists alone.\n\nPhoto by cottonbro on Pexels.com\n\nGIGO and Bad Data\n\nPopular articles about artificial intelligence often sensationalize how awesome it is. For example, how much better it is at detecting cancer in mammogram images than humans are.\n\nBut AI has it’s limitations. It will only ever be as good as its training data set. Most programmers are familiar with the GIGO principle – when a computer bases otherwise correct calculations on poor quality, flawed or nonsensical input data, the final results will also be of poor quality, flawed or nonsensical – in other words: garbage in, garbage out.\n\nAs good as machine learning tools cab be, they often struggle when presented with data that differs from it’s training data set. In the case of detecting cancer in mammograms, there is a often a marked decrease in correct classifications when the images come from different centers. That’s because the mammography x-ray machines may perform somewhat differently, the data may be stored at a slightly different resolution, or use a different grayscale conversion, or any number of other differences that weren’t accounted for in the training data set.\n\nHumans, with all our imperfections and biases, are at least adaptable to unforeseeable circumstances. When trying to assess whether or not an image contains evidence of breast cancer or not, we can figure out when someone has slipped in a picture of a muffin and simply reject it from the pile.\n\nBias in Training Data Sets\n\nSometimes the incoming data is just fine, but it contains inherent biases. And these can influence the decisions the AI makes.\n\nOne example of this was with the COMPAS (correctional offender management profiling for alternative sanctions) algorithm used in US courts to predict the probability of recidivism. A study in 2016 showed the algorithm predicted almost twice as many false positives for black offenders than for white offenders when predictions were compared against actual recidivism rates over a two year period. It has been argued that the root cause of this discrepancy is that the classification model is based on existing racial biases in the US justice system.\n\nThere is also an example of a chat bot using the phrase “9/11 was an inside job” because it was programmed to mimic chat patterns used by young people it was meant to engage with and it basically got trolled.\n\nThere’s also a case of an AI hiring algorithm at that was used to sort through resumes and identify ideal candidates for hiring into technical positions at a major technical company. The problem was that the algorithm favored male candidates. In fact it penalized resumes with the word “women’s” (e.g. women’s basketball team captain). The problem was that the training data set was predominantly male. So even if the prior selections had been completely gender-blind, the successful candidates in the training set would have also been predominantly male and so the algorithm was destined to favor male candidates.\n\nPhoto by Mati Mango on Pexels.com\n\nCan AI Be Ethical?\n\nIn December 2021, Oxford University set up a debate about the ethics of AI and invited an AI created by the Applied Deep Research team at Nvidia (a computer chip maker), aptly named “Megatron.”\n\nNvidia’s Megatron was trained using Wikipedia, news articles and discourse on Reddit – more written material than any human could get though in a lifetime.\n\nWhen arguing for the motion that “this house believes that AI will never be ethical” it came up with the quote I began with at the start of this post. In short, it took the position that the best option was not to have AI at all.\n\nPersonally, I think that’s all that needs to be said. Humans created an AI and named it after a fictional robotic evil boss who transforms into a gun and whose goal was to drain our planet of its energy. And they trained it using the internet.\n\n\nBut like it or not, real AI is here and it’s presence will continue to grow. And the question of whether or not AI can be “ethical” is actually something of a false dichotomy. The line that separates ethical behavior from unethical behavior can be blurry, messy, and even culturally dependent.\n\nOur challenge as we embrace this new tool, is to recognize that it’s not going to be perfect, to understand its limitations, and use it only when and where appropriate. We need to design into it our best ethical practices and be vigilant in our search for biases. And when it does make mistakes, which it will, we have to investigate them thoroughly and deeply and make the best corrections we can.\n\nAnd That Was 2021\n\nWhile 2021 has been a challenging year in so many respects, as a writer this was a really big year for me.\n\nI published my first novel.\n\nThat may not seem like much, but for a writer it can be a scary thing putting your work out into the world. It’s like being a parent on the first day of kindergarten. You’ve put years of work into something, breathing life into it, honing it, paying careful attention to detail, and then then the time comes you have to let it go into the big world where it can play with others and you really don’t have any control over what happens. It comes back with disheveled hair, a skinned knee and a missing sock, but both shoes.\n\nFor a debut novel, First Command has been doing well. The reviews so far have been extremely positive. I’ve had a teacher write to me to tell me that she’s sharing it with her class, and was even surprised with an impromptu book signing. As I write this, it’s sitting at #91 in Amazon.com’s Teen and Young Adult Space Opera eBooks. First Command has been within the top 200 quite consistently since it was published in June.\n\nCassi has been making friends!\n\nFirst Command at #91 in Teen and YA Space Opera.\n\nAs always, I am extremely grateful to my family and friends for supporting me. And of course, to my readers who dared to take a chance on a new author.\n\nFor many reasons I’m looking forward to 2022.\n\nI’ll continue with this blog with a goal of putting up something once a week… resources for other writers, interesting science that inspires my science fiction, or news about upcoming publications.\n\nSpeaking of which… a sequel is in the works.\n\nI have a working title of Black Hole, but that could change. I also have a completed first draft! It’s hard to say how long precisely it’s going to take to move from the first draft to a book available for pre-order or purchase. But it’s coming, and I feel as though the new adventure is taking shape into something on par with the first.\n\n2022 is going to be full of challenges, but I try to be an optimist. There are going to be tremendous opportunities as well. I wish you all the best in the New Year.\n\n\nJolabokaflod – Spend Christmas Eve Curled Up With a Good Book (and Chocolate)\n\nIt’s Christmas Eve. A light snow is falling. The house is quiet. You curl up on the couch under a warm blanket with steaming mug of hot chocolate, and a great book.\n\nThis the Icelandic tradition of Jólabókaflóðið. (Full disclosure–I do not have any Icelandic heritage. I just want to fully embrace this cool tradition.)\n\nPhoto by olia danilevich on Pexels.com\n\nTranslated directly into English, Jolabokaflod means “the Christmas book flood.” During WWII, many resources were in short supply, so gifts were hard to come by. However, books were rather abundant. And books make great gifts. Thereafter a tradition of gifting books to friends and family began. Gifts of books and chocolates are typically exchanged on Christmas Eve. Then everyone gets into their pajamas and retreats under blankets to read.\n\nAnd when you think about it, this kind of tradition might be just what a lot of people need. With all the hustle of Christmas, the stress, shopping crowds, the cleaning, the decorating, finding the perfect gift, balancing your budget… it can be challenging to find time for yourself. A tradition of curling up with a good book gives you a chance to block out the stress, give your mind some fun exercise, and escape to a world of fictional adventure.\n\nIt’s also important to think about the chocolate. While it still has a high calorie content, there’s evidence out there that suggests dark chocolate with 70% cocoa content or more actually has health benefits! One of my favorites are Lindt’s 70% dark chocolate truffles.\n\nChocolate truffles also happen to be a favorite treat of my main character, Cassiopeia Requin, in First Command. They and her best friend Emica, are what help her to get through her grueling training as an astronaut officer cadet.\n\nFirst Command – a great YA science fiction adventure.\n\nNo Book? No Problem!\n\nAbout half hay through this blog post is my handy guide to gifting an E-book. It’s so easy, you can literally do it on your phone in seconds. And you don’t even need a special E-book reader. Anyone with a smart phone, tablet, or personal computer and an internet connection can read one.\n\nIt’s Not Rocket Science… or Brain Surgery\n\nRocket scientists and brain surgeons aren’t all that different from the rest of us.\n\nAn article just published in the British Medical Journal Christmas Issue showed that neither rocket scientists (329 aerospace engineers) nor brain surgeons (72 neurosurgeons) are really all that more intelligent than the general public (269 264 UK respondents, skewed in favor of university graduates).\n\nThe article was fully peer reviewed, although the Christmas issue does tend to favor more light-hearted studies.\n\nResearchers sought to settle the debate of which profession was intellectually superior. To do this, they had volunteers complete a set of 12 online tasks using the cognitron server. Essentially, the tasks measured various dimensions of human cognition including memory, attention, planning and reasoning, and emotion processing.\n\nAerospace engineers were not statistically different from the general public in any domain. Neurosurgeons displayed faster problem-solving speed, but slower memory recall.\n\nPhoto by Andrea Piacquadio on Pexels.com\n\nSo what are we to make of this?\n\nThis study underscores a very important point… innate intelligence, however it is defined, is not necessarily the decisive factor in determining one’s career. Just because you take a test that says you’re “smart” doesn’t mean you’re destined for a life solving the world’s most complex problems. And perhaps even more importantly, if you happen to face some challenges in school, they can be overcome.\n\nThat said, I don’t think it’s fair to think that just anyone can get into these high-profile professions. You still need extreme persistence, patience, dedication, and hard work. And it’s also important to acknowledge the roll of fortunate circumstances.\n\nLast year, the Veritasium YouTube Vlogger reported a very simple and interesting thought experiment on the 2017 NASA Astronaut Class. Of over 18,300 applicants, only 11 went on to become astronauts. And keep in mind the threshold minimum qualifications for those 18,300 applicants was already pretty high. In the thought experiment, they assumed that 95% of the outcome of the selection process was based on a combination of skill, experience and hard work. The remaining 5% came down to luck or fortunate circumstances. For each of the 18,300 applicants they randomly generated a “skill” score out of 100. These represented all those controllable and innate qualities. They also generated a luck score out of 100. These numbers were then combined as 0.95*skill + 0.05*luck to arrive at the score that represented the overall judgement of the selection process. The top 11 were chosen to become astronauts. This process was repeated a thousand times. Quite interestingly, the average “luck” score of selected astronauts: 94.7. Only 1.6 of the top 11 would have been there based on skill alone.\n\nWith luck playing only a 5% factor the other 9.4 selected astronauts would have been different given a different roll or the dice.\n\nThis occurred because you had a large group of people and you’re looking as a very small group of the top performers. The differences between the top candidates on the skill side are only marginal. In circumstances like this, the outcome can be determined by factors such as whether or not you woke up with a cold on the physical fitness assessment day or the speed of your internet connection for an online IQ assessment.\n\nGetting into high-profile professions like aerospace engineering or neurosurgery, or even achieving lofty goals, such as becoming a best-selling author, are attainable. But they are as much about effort, opportunities, environment, and just plain luck as anything else.", "pred_label": "__label__1", "pred_score_pos": 0.8831760287284851} {"content": "Create a email notification for all new opportunities created\n\n • 14 October 2022\n • 1 reply\n\n\nI’ve been trying to find a way to email a summary of the opportunity information entered when an opportunity is first created. \n\nI’ve made a Zapier zap to JotForm but for some reason JotForm is not emailing my submission. Although the submission is recorded in the JotForm database. \n\nIt seems like a obvious feature to be able to set a notification to an email if a new opportunity is created. In this case it would be our group sales email. \n\n\n\n1 reply\n\nUserlevel 6\nBadge +5\n\nHi @SKY3Y3, thanks for posting!\n\nJust want to make sure I understand your situation. Can you confirm this is correct?\n\n • You have a webform through Jotform. When a new submission is entered, Zapier automatically creates a new Opportunity in Coper\n • The entries are also recorded in the Jotform database, but it’s not sending an email for some reason\n • You would like the group sales email to receive the notifications for a new opportunity. That group sales email is not a user in Copper.\n\nNow, that last point is key - if that sales group email is not a user in Copper, you won’t be able to use any Copper features for these notification. But, you can use Zapier to send that notification.\n\nThis would involve adding a step to your Zap for Send an Email via Gmail. There, you can specify the recipient email (the sales group address), and the contents of the email (the details in the Jotform submission / in the Copper opportunity)\n\n\nLet me know if this sounds like a good option for you and if you’d like more details on setting it up :)", "pred_label": "__label__1", "pred_score_pos": 0.731421947479248} {"content": "Problem regarding font metrics....\n\nHii Alll\nI have a problem regarding font metrics.\nI have to simulate the keyboard in one of my applications.\nTo do so i have to move the cursor as soon as any key is pressed. But the problem is i need to move the cursor more when lets say ‘w’ is typed in comparison to ‘i’. So on with many other alphabets. How do we go about this.\nPlease help me. Is there any concpet of font metrics which tells us about the width and height of fonts.\nThanks in advance.\n\n\nThere are several ways to get the metrics for a font: check your widget set - In GTK I can simply ask it for the width of a string, or the height of a character set.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9956920146942139} {"content": "Spinning Events within our Time\n\nOn Summer 29, planet earth experienced its shortest evening since 70. The Globe’s rotation can be erratic and continues to vary. Scientists employ atomic clocks to evaluate time. This kind of small amount of time makes a difference to those who also track the length of a new day. A leap second gives one second to the atomic time ahead of midnight to align the clocks with Earth’s rotation.\n\nCorresponding to Andrew Ingersoll, senior professor of planetary technology at the California Institute of Technology, a slight increase in the Earth’s revolving quickness does not mean that days are moving more quickly. The Globe’s rotational acceleration used to always be widely acknowledged, but now researchers https://northcentralrotary.org/2021/07/08/generated-post/ have discovered that it fluctuates by ms.\n\nIn addition to cyclones plus the Earth’s rotation, the Coriolis effect affects Earth’s movement. A falling target will veer slightly eastward when released; in the Upper Hemisphere, this kind of causes the projectile to veer to the proper, while in the The southern area of Hemisphere, it can veer kept. This effect has also been awarded with the opposite direction of cyclone rotation in the Upper and Southern hemispheres.\n\nFor the longest period, people had known that the Earth spins once a day, but they were unsure of this actual rotation pace. Scientists in Galileo’s time tried to demonstrate the rotation of the Globe by giving up objects, but their experiments were too primitive to be conclusive. Eventually, it absolutely was Leon Foucault, a Frenchman, who confirmed the rotation of the Globe by means of a pendulum, which was an amazingly precise approach to measuring period.", "pred_label": "__label__1", "pred_score_pos": 0.9520124793052673} {"content": "In Accent Reduction, English as a Second Language, ESL, Learn English\n\nCommon Pronunciation Challenges for Brazilians Learning English\n\nWhile Brazilian students study English in school, English itself is not often spoken throughout the day. When you aren’t regularly speaking a language you are learning, it’s difficult to become fluent. You may be learning plenty of vocabulary, but you aren’t able to easily and freely converse with another speaker, and your pronunciation may not be clear without that practice.\n\nBrazilians speak Portuguese, and there are some specific pronunciation challenges they face when speaking English. The following are the most common English pronunciation mistakes that Brazilian speakers are likely to make:\n\nVowels Can Get Confusing\n\nGetting Vowel Sounds Mixed Up\nBrazilian Portuguese has fewer vowels/vowel sounds than English along with a few nasal sounds that don’t even exist in English. As with many other language speakers, pronunciation of the vowels in English can be pretty tricky for Brazilian speakers. As an example, Brazilian speakers might pronounce “bit” and “beat” as if they were the same word, and the same would go for “full” and “fool.” They may also pronounce “man” as “men” because the A sound in “man” just doesn’t exist in Brazilian Portuguese.\n\nTip: Try starting with simple pairs or groups of words which have a similar sound except for a single vowel. For example, listen to the sound differences in the following words: bat, bet, bit, bot, and but. Learning to listen for the sound difference in these simple words is a great first step in improving your pronunciation.\n\nPast Tense Trickery – Saying the –ED\nIn English, past tense verbs often use an “ed” ending in which the vowel is mostly silent. So a word like “learned” would be pronounced like “lurnd” and not like “lurn-ehd.” In Portuguese, consonant clusters are fairly rare, so Brazilian speakers may find it makes more sense to vocalize the E (“lurn-ehd” instead of “lurnd”).\n\nTip: A good rule of thumb in English is that the E in past tense verbs is generally silent unless the main verb ends in the T or D sound. For example, take the verbs “bait” and “shade” – you would pronounce the past tense of these verbs with the full ED sound, but the past tense of the verb “learn” would have just the D sound while the E would be silent.\n\nAdding “ee” at the End of Words\nBrazilian Portuguese doesn’t have many words that end in a consonant, so sometimes when Brazilian speakers are speaking English, they’ll add a vowel sound (often an “ee”) to the end of English words.\n\nTip: Unlike Portuguese, English words rarely end in vocalized vowels. When you see English words ending in E such as “bike,” “sample,” or “ledge,” the E is almost always silent.\n\nThose Pesky Consonants Aren’t Much Easier\n\nMispronouncing the TH\nAs it’s not that common outside of English, many ESL learners struggle with pronouncing the TH sound, and Brazilians are no exception. As Brazilian Portuguese doesn’t use the TH sound, Brazilian speakers will often substitute similar sounds such as F or S for a soft TH, or they may use a T or D sound for a voiced TH. This can sound something like “baf” or “bas” instead of “bath” or “der” instead of “there.”\n\nTip: While it may seem awkward at the beginning, try to stick your tongue out a little bit between your teeth to make the TH sound.\n\nGetting the H and R Mixed Up\nIn Portuguese, the letter R is pronounced somewhat like the English letter H, so it’s not surprising that many Brazilian speakers confuse the H and R when speaking English. For example, they may read the English R as H, mispronouncing words like “run” as “hun” or “rate” with “hate.”\n\nUsing W in Place of L\nThis one can be a surprise to a native English speaker, as many Brazilians have little trouble with the L sound at the beginning of a word. The normal L in Brazilian Portuguese sounds like the English L, but when it appears at the end of a syllable, the pronunciation is different—it’s almost like a combination of W and U. So while Brazilian speakers may pronounce the L correctly in words like “like” and “love”, words like “fall”, “pool”, and “bottle” may sound more like “fau”, “fuu”, and “bottu.”\n\nReplacing D and T\nBrazilian speakers often find it challenging to pronounce the English letters D and T, specifically when they’re at the end of a word. So you might hear a D get changed to DJ (/dʒ/), turning “bad” into “badj”, which can be confusing since bad and badge aren’t the same words. Or you might hear a T is changed to TCH (/tʃ/), turning “pit” into “pitch.”\n\nMaking M an N or NG\nSo here’s the thing about the M sound in Portuguese, while it does exist, it does not get used at the end of words. So when a Brazilian speaker is trying to pronounce English words like “team”, “fame”, or “harm”, they may accidentally turn that unfamiliar sound into a nasal sound like N or NG. So you might hear them say “tean”, or “fain” or even “harng” instead.\n\nThe Stressful Stress and Emphasis of Syllables\n\nEmphasizing the Wrong Syllable\nWhen speaking English, each word contains one syllable that is stressed, and you vocally emphasize it more loudly and with higher pitch. While Brazilian speakers also use stress in their native Portuguese, English and Portuguese don’t really follow the same rules for which syllable carries the stress. In Portuguese, the second to the last syllable in long words is usually stressed, while English will sometimes stress the first syllable, so instead of “Saturday,” a Brazilian speaker might misplace the emphasis and say “Saturday.”\n\nTip: Like many other parts of English, the rules for which syllable to stress isn’t always predictable. There are just too many exceptions to the rules, so you’ll want to check the dictionary for pronunciation whenever you learn new English words in order to ensure you’re stressing the correct syllable.\n\nSentence Stress – Stressing Too Many Words\nIf you aren’t already stressed by the correct stress of syllables in English words, there’s a whole other stress to consider – sentence stress. Brazilian Portuguese speakers change pitch throughout their sentences much more than English speakers, with just about every other word being higher in pitch. If you accidentally carry this over when you are speaking English, it can sound confusing to other English speakers. Since pitch connotes stress or emphasis in English, you might accidentally be stressing unimportant article words like “the” or “a” in a sentence.\n\nTip: Pay attention to your intonation when you are speaking English, and remember that you should generally only stress the nouns, verbs, adjectives, and adverbs in your sentences.\n\nEnglish Language Learning for Non-Native Speakers\n\nEnglish isn’t the easiest language to learn, and the specifics of your native language can play a role in which part of learning English as a second is most difficult for you. Excel English Institute empowers students to master the complexities of the English language while learning to thrive in American culture, both academically and professionally. Our interactive approach, developed from years of classroom experience, is tailored to meet the needs of non-native speakers of the English language. Apply today or give us a call at +1 (214) 363-1700 to learn more about our programs.\n\nRecent Posts\nContact Us\n\n\nNot readable? Change text. captcha txt\n10 Words You’ll Pronounce Differently Around the U.S.", "pred_label": "__label__1", "pred_score_pos": 0.6764969825744629} {"content": "Skip to main content\n\n\n\n\n\n\n\n\n\n\nAccurate gene expression analysis at the transcript level is essential to understand all aspects of plant growth and development and their responses to abiotic and biotic stress. The magnitude and dynamics of transcriptional and post-transcriptional re-programming of the transcriptome provide insights into the cellular complexity of responses to external and internal cues. This complexity can now be readily explored using high-throughput RNA sequencing (RNA-seq) technologies and vastly improved analytical methods and software programs. The ability to quantify the expression levels of individual transcripts from Illumina short-read RNA-seq data was revolutionized by the development of rapid and accurate non-alignment programs, Kallisto and Salmon [1, 2]. However, Kallisto and Salmon require a reference transcriptome for accurate transcript quantification and the power of such analyses greatly depends on the quality and comprehensiveness of the reference transcriptome being used.\n\nRNA sequencing using long-read single-molecule sequencing technologies, namely Pacific Biosciences (PacBio) and Oxford Nanopore sequencing, offers improved integrity of transcript structures. Single-molecule sequencing has the advantage of being able to identify transcription start and end (polyadenylation) sites (TSS and TES, respectively), alternative splicing (AS), alternative polyadenylation (APA) and the correct combinations of different TSS, TES, and splice junctions (SJs). However, sequencing errors are common in single-molecule sequencing, and mis-mapping of reads to the genome significantly increases false splice sites and affects open reading frames of transcripts [3]. Previous work on sequence alignment accuracy found that the main source of error for global sequence alignment was the misplacement of gaps, a phenomenon also called “edge wander” [4]. Misplacement of gaps is strongly affected by sequencing errors. Introns can be considered as “gaps” when the single-molecule long reads are mapped to the genome and can generate many false splice junctions [59]. For example, alignment of high error-containing long reads from a particular locus often disagrees with one another (particularly around splice sites) [6] and high error rates result in a high proportion (27%) of misplaced splice junctions [5]. Strategies to overcome the effects of sequencing errors in the long reads include self- or hybrid correction methods. Self-correction utilizes the raw signal and consensus-based calls to reduce errors while hybrid correction exploits Illumina short reads to correct errors in the long reads [1013]. However, current error correction tools tend to trim or split long reads when lacking local short-read support, over-correct (introduce new, false splice junctions) when mapping to the wrong locations and lose isoforms with low expression [5, 7]. In addition, a considerable number of reads representing fragments of mature mRNAs, likely due to incomplete cDNA synthesis or mRNA degradation, compromise the accurate determination of transcription start and end (poly(A)) sites. While these issues are not generally appreciated, they reduce the overall precision of transcript quantification and downstream analysis of differential expression, AS, APA, and TSS and TES usage.\n\nIso-seq single-molecule sequencing has been applied to a wide selection of crop plants (e.g., maize, wheat, sorghum, coffee, tea, sugarcane, rice, amaranth, and grape), economically important plants for feed or products (e.g., switchgrass, Bermuda grass, perennial ryegrass, pine, rubber, red clover), wild plant species (e.g., wild strawberry), plants of botanical interest (e.g., Pitcher plants—Nepenthes spp.), and medicinal plants (e.g., Zanthoxylum, safflower, Salvia) [1438]. The majority of the above applications of PacBio sequencing investigated transcriptome diversity and complexity and determined transcription start sites, AS events, and APA sites. However, significant issues surrounding the accuracy of SJs, TSS, and TES identification suggest that many of the above transcriptome studies would benefit from improved methods of transcript structure determination. Accurate and well-curated transcripts also play an important role in improving genome annotations and the identification of novel genes and, particularly, long non-coding RNAs.\n\nIn this paper, we report the construction of a new, comprehensive Arabidopsis transcriptome, AtRTD3, based on a wide range of Arabidopsis tissues and treatments. AtRTD3 contains over 169 k transcripts, 78% of which are derived from Iso-seq and have accurately defined SJs, TSS, and TES. It improves the precision of analysis of RNA-seq data for differential gene and transcript expression and differential alternative splicing and now allows analysis of differential TSS and TES usage. We used a new pipeline based on TAMA [7] to analyze the Iso-seq data and developed novel methods to address the impact of sequencing errors and incomplete transcripts. We developed (1) a splice junction-centric approach that allows the identification of high-confidence SJs and (2) a probabilistic 5′ and 3′ end determination method that effectively removes transcript fragments and identifies dominant transcript start and end sites. They allow accurate determination of SJs, TSS, and TES directly from the Iso-seq data and remove the requirement for hybrid error correction or parallel experimental approaches for detecting TSS and TES such as CAGE-seq or poly(A)-seq, respectively. The defined sets of high-confidence SJs, TSS, and TES were used to generate an Iso-seq-based transcriptome (AtIso) consisting of transcripts with accurately defined 5′ and 3′ ends and SJs and the combination of AS events with specific TSS and TES. The high-confidence full-length transcripts in AtIso covered ca. two-thirds of genes in Arabidopsis and confirmed many of the short-read assembled transcripts while resolving assembly artifacts present in AtRTD2 [39]. Around one-third of genes had very low or no Iso-seq coverage. Short-read assembly generates highly accurate SJs but little information on 5′ and 3′ ends. Therefore, AtIso was merged with short-read assemblies, such as AtRTD2 [39] and Araport11 [40] to form AtRTD3, giving preference to Iso-seq transcripts to capture high-confidence SJs, TSSs, and TESs and integrating only those transcripts from AtRTD2 and Araport11 with novel SJs or loci. The resulting AtRTD3 transcriptome contains 40,932 genes and 169,503 transcripts with ca. 78% of transcripts having Iso-seq support. The main function of AtRTD3 is to enable accurate differential gene expression and differential alternative splicing analysis of RNA-seq experiments designed to address a wide range of biological questions. To provide accurate quantification of genes and transcripts, the RTD must be as comprehensive as possible, and the constituent transcripts must be as accurate as possible. AtRTD3 represents a significant improvement over existing Arabidopsis transcriptomes as demonstrated by its improved transcript quantification accuracy and transcript expression profiling over AtRTD2 and Araport11 and by the identification of cold-induced differential TSS and TES usage from analysis of time-series data.\n\n\nSingle-molecule Iso-sequencing of diverse Arabidopsis plant samples\n\nPacBio Iso-seq was performed on total RNA extracted from nineteen samples from different Arabidopsis Col-0 organs, developmental stages, abiotic stress conditions, infection with different pathogens and RNA degradation mutants to capture a broad diversity of transcripts (Additional File 1: Table S1). PacBio non-size selected Iso-seq libraries were made for all nineteen samples using a cap enrichment protocol (Teloprime, Lexogen). In addition, Teloprime v2 (Lexogen) libraries were constructed for six of the above RNA samples and Clontech (Takara Bio) libraries for two of the above samples. Each of the 27 libraries was sequenced on a separate SMRT cell on a PacBio Sequel machine with a 10-h (v3) movie time. The PacBio raw reads were processed using the PacBio IsoSeq3 pipeline to generate circular consensus sequences (CCS) and full-length non-chimeric (FLNC) reads without the clustering and polishing steps, and FLNCs were mapped to the reference genome (TAIR10) (Fig. 1). The numbers of reads, FLNCs and mapped FLNCs along with statistics are shown in Additional File 1: Table S2. The 27 libraries generated 13.7 million Iso-seq reads in total. The total number of CCS was 8.7 M with an average of 322 k CCS per library. The total number of FLNCs generated using lima+refine (see “Materials and methods”) was 7.77 M with an average of 288 k per library. About 7.36 M of the FLNCs mapped onto the Arabidopsis genome, generating 142.9 k transcripts and 14.3 k genes on average per library. We then merged the transcripts generated from the 27 libraries using TAMA merge, where unique transcripts including those with only a single-nucleotide difference at 5′ and 3′ UTR were kept (Fig. 1). The merged transcriptome assembly consisted of 33,154 genes and 2,239,270 transcripts.\n\nFig. 1\nfigure 1\n\nWorkflow of analysis of PacBio Iso-sequencing. A Raw reads are analyzed using the PacBio Iso-seq 3 pipeline to generate FLNCs which are mapped to the genome (blue boxes). B Mapped FLNCs are collapsed and merged using TAMA to generate transcripts (pink boxes). C Transcripts are quality controlled using datasets of high-confidence (HC) splice junctions (SJs) and transcript start and end sites (TSS/TES). Transcripts with unsupported splice junctions where reads contain mismatches within ±10 nt of an SJ are removed. Transcripts with both high-confidence TSS and TES (determined by binomial probability for highly expressed genes and by end support with > 2 reads for low expressed genes) are retained as HC transcripts. The remaining transcripts which have partial or no TSS and/or TES support were removed unless they overlapped with annotated gene loci. These transcripts, from genes with low coverage by Iso-seq, were combined with the HC transcripts to form AtIso (Arabidopsis Iso-seq based transcriptome)\n\nSequencing mismatches around splice junctions (SJs) distinguish high- and low-confidence SJs\n\nThe challenge with Iso-seq-derived transcripts is to accurately define SJs, TSSs, and TESs. As the merged assembly contained tens of thousands of false SJs (see below), transcripts containing these SJs were identified and removed before defining TSS and TES. Based on the hypothesis that sequence errors in the Iso-seq reads around SJs promote “edge wander” [4] resulting in false SJs, we used TAMA Collapse to extract the mapping information of 30-nt up- and downstream of each SJs from the uncorrected reads from the 27 Iso-seq libraries. (Additional File 2: Fig. S1). We compared the resulting Iso-seq SJs to those of AtRTD2. In total, 124,328 SJs were shared between Iso-seq and AtRTD2 transcripts and 110,992 were unique to the Iso-seq transcripts (Fig. 2A). We then extracted the mismatch profiles for the shared SJs and for those unique to Iso-seq transcripts and determined the number and percentage of mismatches in each position in the 30-nt up- and downstream of the SJ (Additional File 1: Tables S3A and S3B). Thus, the SJs in the Iso-seq transcripts were divided into two sets: (1) a high-confidence set of 124,328 SJs (above) that were also present in AtRTD2 transcripts (extensive quality control measures were used to remove false SJs during the construction of AtRTD2 from short reads—Zhang et al. [39]) and (2) a low-confidence set of 110,992 SJs unique to Iso-seq transcripts (above) that includes novel, bona fide junctions as well as incorrect misplaced SJs. To assess the different characteristics between the two sets of SJs, we calculated position weight matrix (PWM) scores for 5′ and 3′ splice site consensus sequences for each intron (Additional File 1: Table S4). The average PWM scores of the high-confidence SJs (5′ splice site 69.91, 3′ splice site 67.75) were significantly higher than the average of the low-confidence set (5′ 62.79; 3′ 62.67) (Fig. 2B). Taking the threshold PWM of 65 as the criteria for a good quality splice site [39], 79.4% of high-confidence SJs had PWM scores at both 5′ and 3′ splice sites of  65 with only 20.6% having at least one PWM score lower than the threshold (5′ 3.50% and 3′ 17.64%). In contrast, 79.17% of the SJs in the low-confidence set have at least one PWM score lower than the threshold at either the 5′ or 3′ splice site (5′ 52.24% and 3′ 59.07%). Thus, the high-confidence SJs have higher splice site consensus sequence quality characteristics than the low-confidence SJs.\n\nFig. 2\nfigure 2\n\nImpact of mismatches around splice junctions on the accuracy of their determination. A Splice junctions (SJs) shared by AtRTD2 and Iso-seq (LDE_30; sjt_30) and unique to each. B Position weight matrix (PWM) scores for splice sites unique to Iso-seq transcripts and shared with AtRTD2. PWM scores for 5′ and 3′ splice site sequences from SJs shared between AtRTD2 and Iso-seq transcripts (high confidence), are significantly higher (t-test, p < 2.26e−16) than those unique to Iso-seq (low confidence). C, D Distribution of the number of mismatches in each position 30 nt upstream (C) and 30 nt downstream (D) of SJs unique to Iso-seq (low confidence) and shared with AtRTD2 (high confidence). See Additional File 1: Tables S3A,B). E Filtering of SJs—the graph shows the number of SJs remaining (expressed as a percentage) after the cumulative removal of SJs with mismatches in the first n positions (1, 2, 3, etc.) flanking SJs. See Additional File 1: Tables S5A,B)\n\nTo examine the relationship between the presence of sequencing mismatches in reads around the SJs and the quality of the SJs, we selected the Iso-seq read with the smallest number of mismatches in the 60-nt region around each SJ for the analysis. The mismatch rate in each position in the SJs shared with AtRTD2 (high-confidence set) was in the range of 0.008 to 0.08%. In contrast, the mismatch rate in each position in the low-confidence SJs unique to Iso-seq were up to 100-fold greater and ranged from 1.02 to 4.12% (sequence upstream of SJ) and 0.97 to 7.58% (downstream of SJ) in, for the most part, descending order with distance from the splice junction (Additional File 1: Table S3A and S3B). Plotting the distributions of the mismatches at each position upstream (Fig. 2C) and downstream (Fig. 2D) clearly showed a high number of mismatches in the vicinity of SJs unique to Iso-seq (low confidence) while the SJs shared with AtRTD2 (high confidence) had far fewer mismatches with a more uniform distribution (Fig. 2C, D; Table S3A and B).\n\nThe effect of having sequencing mismatches in Iso-seq reads in the region of a SJ is illustrated by the number of SJs that would remain (recall) if SJs with a mismatch in any of the positions were removed. For example, removing those SJs with a mismatch in positions 1–10 on either side of a SJ would remove only 711 SJs from the shared SJs (high confidence) leaving 99.43% of SJs (Fig. 2E; Additional File 1: Table S5A) but 29,606 SJs of the SJs unique to Iso-seq (low confidence), leaving 73.32% of the SJs (Fig. 2E; Additional File 1: Table S5B). Thus, sequencing mismatches in the vicinity of SJs are strongly associated with new, false SJs which carry over into transcripts. Filtering the SJs by removing those with mismatches around the SJs has a significant impact on the low-confidence SJs but a very limited effect on the high-confidence SJs. Thus, examining mismatches around the SJs is an effective strategy to distinguish high- and low-quality SJs and identify false SJs.\n\nSplice junction-centric analysis for accurate splice junction determination\n\nTo apply the above observations to overcome the problem of false splice junctions being generated due to mismatches in Iso-seq reads in the vicinity of SJs, we developed a method to identify and retain high-confidence SJs. The original TAMA collapse [7] removes reads with defined mismatches around the SJs. There are two issues with this approach: (1) when an Iso-seq read with multiple SJs is removed due to erroneous mapping of one or more SJs, other correct SJs supported by that read will be discarded at the same time; and (2) as Iso-seq sequencing errors are distributed randomly, some reads with errors around SJs could still be correct and be rescued by other reads that mapped perfectly to the region. We therefore modified the approach to keep all high-confidence SJs irrespective of whether low-quality SJs were present in the rest of the read. In so doing, we constructed a high-confidence set of SJs where each SJ has support from at least one Iso-seq read with zero mismatches in positions ±10 nt from SJs. Using this set of SJs, reads with correctly mapped SJs but mismatches around SJs are still retained, contributing to identification of SJs in the final merged transcript assemblies.\n\nIn the transcript set from the 27 libraries, there were 235,320 non-redundant SJs. We first removed SJs with non-canonical motifs leaving 175,827 SJs. Then, we selected the SJs that had support from at least one read with zero mismatches to the genome in the 10 nt region on each side of the SJ. This reduced the number of false SJs caused by the combined effects of mis-mapping of the introns and sequencing errors around SJs, leaving 162,888 SJs. Thus, 71,726 (64.62%) SJs unique to Iso-seq (30.5% of all SJs in Iso-seq) were removed due to lack of experimental evidence for a high-confidence SJ. For comparison, only 706 SJs that are shared between Iso-seq and AtRTD2 (0.46% of all SJs in AtRTD2) were removed using the same filtering parameters. Thus, the SJ-centric approach makes the best use of local information around the SJs of long reads to define the set of high-confidence SJs.\n\nA stratified and probabilistic approach to determine the TSS and TES sites\n\nThe combination of Teloprime 5′ capture followed by Iso-seq sequencing from poly(A) tails should, in principle, produce full-length mRNA sequences containing authentic 5′-end/TSS and 3′-end/TES. However, a number of factors affect accurate TSS and TES identification: (1) mRNAs undergo degradation (in vivo or during RNA manipulation) generating truncated transcript fragments. Teloprime 5′ capture is not 100% efficient such that Iso-seq reads from 5′-degraded transcripts are still generated. Similarly, 3′ end degradation and off-priming, where the PCR oligo-dT primer amplifies from poly(A) sequences within the transcript instead of the poly(A) tail, generate 3′ truncated transcript fragments. Thus, reads from transcripts with different degrees of degradation generate multiple false TSSs/TESs; (2) TSS/TES are usually stochastic and not limited to a single-nucleotide location but rather are distributed around a dominant site [41]; and (3) the number of Iso-seq reads varies greatly across a large dynamic range. Consequently, highly expressed genes may contain thousands of individual transcripts including substantial numbers of degradation products. In contrast, for genes with low levels of expression and a limited number of reads or no read coverage, it is difficult to apply statistical inference to determine whether read start/end points are TSSs/TESs. The challenges in accurately identifying TSS/TES for genes with high- and low-read abundance are therefore very different. For highly sequenced genes, the major task is to reduce false TSS/TES from transcript fragments and identify dominant sites. For genes with few reads, the task is to get sufficient experimental evidence to support TSS/TES identification. We have therefore developed and applied two different approaches to end determination depending on the read/transcript abundance. We assumed that for highly sequenced genes, authentic TSS/TES sites would tend to be sequenced more often while the ends from degraded mRNA products would occur randomly. We, therefore, used the binomial function to estimate the probability of having a certain number of Iso-seq read ends at any position at random and used these probabilities to identify positions with non-random (i.e., enriched) ends that represent authentic start or end sites (Additional File 2: Fig. S2A and B). For genes with few reads, we compared start and end sites of different reads to identify similar ends as support for potential TSS/TES (see below; Additional File 2: Fig. S2C).\n\nIdentification of significant read start and end genomic locations\n\nFor TSS determination, only the Teloprime captured reads were used as the Clontech libraries are more likely to contain truncated fragments with missing TSSs [42]. The exact genomic coordinate of the start of each read (read start genome location-RSGL) was identified giving a total of a total of 616,593 RSGLs. By applying the binomial probability method (Additional File 2: Fig. S2A), 61,014 significant RSGLs enriched for start locations were detected from 17,098 genes. These 17,098 genes tended to be highly sequenced with read numbers ranging from 7 to 48,110 and a median of 110 reads. They accounted for 550,022 of the total RSGLs (89.3%) from which the 61,014 significant non-random RSGLs were identified, an approximately 10-fold reduction of the average RSGL number per gene from 32.17 to 3.57. Thus, the binomial probability method reduces the overall number of RSGLs into a smaller number of high-confidence RSGLs. For the remaining 15,858 genes, no significant RSGLs were detected. These genes had relatively few reads with a median of 2 reads per gene and 80% of genes having fewer than 7 reads. For these genes, we compared the start positions of reads from each gene and required at least two Iso-seq reads with 5′ ends within a sliding window of 11 nt (5 nt on each side) to call a supported RSGL (Additional File 2: Fig. S2C). By this method, the 66,571 remaining RSGLs (from 15,858 low-abundance genes) generated 25,930 supported RSGLs from 7028 genes. Thus, we have defined 61,014 and 25,930 TSSs from with high and low numbers of read genes, respectively.\n\nBefore enrichment, a total of 723,903 read end genomic locations (REGLs) were identified. We removed 11,703 reads where 3′ ends were immediately followed by poly(A) sequences in the genome sequence and were likely to be a result of off-priming, leaving a total of 712,200 REGLs. We then applied the binomial distribution method to detect non-random REGLs, as described above for RSGLs. For highly sequenced genes, 84,043 significant REGLs (Additional File 2: Fig. S2B) from 16,728 genes were identified with read abundance per gene varying from 7 to 49,917 and a median of 128. These highly sequenced genes contained 669,642 (94.02%) of the total REGLs and showed very variable end sites. The binomial distribution probability method reduced the average number of REGLs per gene from 40.03 to 5.02. The remaining 13,440 genes had fewer reads with a median of 1 read, and 80% of these genes had fewer than 5 reads. At least two Iso-seq long reads with similar 3′-ends within a sliding window of 11 nt (5 nt on each side) were required to call a supported REGL (Additional File 2: Fig. S2C). On this basis, from the 42,558 REGLs from the 13,440 genes with few reads, 21,664 supported REGLs from 5824 genes were identified. Thus, we have defined 84,043 significant REGLs and 21,664 supported REGLs from genes with high and low numbers of reads, respectively. Finally, 8830 and 7616 genes did not have significant or supported RSGLs or REGLs, respectively, and represented genes with one read or with very few reads with varying start or end locations differing by more than 5 nt.\n\nValidation of significant TSSs and TESs\n\nA transcription start site dataset for Arabidopsis genes at nucleotide resolution was generated previously using paired-end analysis of TSSs (PEAT) [41]. In their study, using a pooled Col-0 root sample, 79,706 mapped and annotated PEAT tag clusters (groups of similar TSSs) were identified, and quality filtering generated 9326 strong tag clusters from protein-coding genes which had groups of TSS locations supported by at least 100 reads. The information for each tag cluster included the start, end, strand and the mode, which is the location within the cluster where the greatest number of 5′ ends was mapped [41].\n\nWe compared the significant 61,014 RSGLs from the highly sequenced genes here with the PEAT tag clusters and found that 50.8% were located within 8445 of the 9326 strong tag clusters (90.5%). Thus, the significant RSGLs from the highly sequenced genes showed substantial concentration and overlap with the published set of strong tag clusters. We also compared the significant RSGLs with the mode (genomic locations with the highest number of reads within that tag cluster) of strong tag clusters and found that 6563 (70.4%) strong tag cluster modes co-located with the significant RSGLs with no more than a 1-nt difference (Additional File 2: Fig. S3A). Significant RSGLs were also identified in another 9010 genes not detected in Morton et al. [41]. This is likely due to the much wider range of tissues and treatments used here and differences in gene coverage between the Iso-seq and PEAT analyses. We have also compared our RSGLs to a recent study [43] that carried out genome-wide TSS mapping using 5′ CAP sequencing. In this study, 96,232 TSS tag clusters were detected in 21,359 genes in wild type plants and mutant lines of the FACT (FAcilitates Chromatin Transcription) complex. We found that 55,737 (91.35%) of our significant RSGLs located within the TSS tag clusters of Nielsen et al. [43], covering 16,353 genes. The correspondence of our data with both the above studies shows the high accuracy of the RSGLs detected using our novel method of transcript 5′ end determination.\n\nArabidopsis polyadenylation sites have been previously identified through direct RNA sequencing of seedling RNA, which found 49,916 cleavage and polyadenylation site (CS) peaks supported by > 9 raw reads from 14,311 genes [44]. We compared the 84,043 significant REGLs with the CS peaks and found that (1) 45,931 (92%) CS peaks from 13,443 genes co-located with significant REGLs within a 50-nt window and 24,927 (49.93%) CS peaks co-located with significant REGLs at the same genomic location (< 1 nt difference) (Additional File 2: Fig. S3B,C). The significant REGLs identified an additional 12,305 TES sites in 5531 genes, including 3663 genes for which no CS peaks were reported [44]. The increased diversity of TES identified from our Iso-seq data are again likely due to the wider range of tissues and treatments used for RNA sequencing.\n\nSignificant RSGLs/REGLs show enrichment in motifs related to TSSs and TESs\n\nTo further validate the TSSs in the significant 61,014 RSGLs, we looked for common transcription motifs (e.g., TATA box, lnitiator, and Y-patch) in the region of the TSSs (+ 500 to −500 bp) and the Kozak translation start site motif downstream of the TSS, and compared these to the raw 79,706 TSS tag cluster peaks from Morton et al. [41]. The TATA box is a T/A-rich motif ca. 25-35 bp upstream of highly expressed genes that determine expression levels [41, 45, 46] (Additional File 1: Table S6). A sharp peak was observed upstream of the TSSs for both RSGLs and TSS peak clusters consistent with the expected position for a TATA box (Fig. 3A). Thus, there is a good corroboration of our computational derived TSS and the experimentally defined TSS. Despite fewer significant RSGL sites being investigated, we found the number of TSSs with upstream TATA motifs in the RSGLs almost doubled that seen with the PEAT tag cluster peaks (from 3603 sites to 6976 sites) (Fig. 3A). A proportion test shows that the TATA box motif was significantly enriched in RSGLs compared to the TSS cluster peaks in Morton et al. (p < 2.2e−16). The Initiator (Inr) element is pyrimidine-rich, overlaps the TSS site and is important for transcriptional activation [46] while the Y-patch pyrimidine-rich motif, found upstream of TSSs, is unique to plants and found in more than 50% of annotated rice genes [47] (Additional File 1: Table S6). Enrichment of both motifs around the TSS was observed again, with 2236 and 11,477 instances, respectively, in the significant RSGL set and 1208 and 6067 instances, respectively, in the Morton et al. data (both proportion tests p < 2.2e−16) (Fig. 3B, C). Finally, the Kozak consensus translation start sequence is downstream of the TSS and contains the translation start AUG codon [48]. Significant enrichment of Kozak sequences was seen downstream of the TSSs for the significant RSGLs with 316 instances over 116 instances in the Morton data (proportion tests p < 2.2e−16) (Fig. 3D).\n\nFig. 3\nfigure 3\n\nEnrichment of sequence motifs associated with TSS and TES sites. A–D TSS sites: A TATA box, B Initiator (Inr), C Y-patch, D Kozak translation start site consensus motif, E,F TES sites: E CFlm binding site and F PAS. Lines indicate number of motifs found in relation to start and end sites from Iso-seq (blue), Morton et al. [41] A–D, and Sherstnev et al. [44] E,F (red); random control (gray)\n\nTo further validate the REGLs, we searched the genomic sequences around the TESs (−500 to + 500 bp) of the 84,043 significant REGLs and 49,916 CS peaks from Sherstnev et al. [44] for conserved cleavage and polyadenylation sequence motifs. The polyadenylation signal (PAS) motif (possessing a canonical AATAAA when the PAS is relatively strong) is required for 3′ end polyadenylation while the CFlm motif is the binding site of cleavage factor Im, an essential 3′ processing factor [49, 50] (Additional File 1: Table S6). The number of matching sequences and their positions showed significant enrichment of CFIm sequences (upstream of the PAS) and the poly(A) signal motif at the TES for significant REGLs over CS peaks (Fig. 3E, F, respectively) with 3627 and 1565 instances, respectively, in the CS peaks and 6663 and 3994 instances, respectively, in the significant REGLs (proportion tests p = 5.725e−06 and p < 2.2e−16, respectively) (Fig. 3E, F).\n\nGeneration of high-level transcripts for AtIso\n\nTo achieve accurate transcript isoforms from the Iso-seq data, we have adopted a strategy that requires evidential support for all the SJs, TSSs, and TESs. We generated datasets of high-confidence SJs, RSGLs, and REGLs which were then used to filter the 2,239,270 transcripts from all the libraries. Given the stochastic nature of TSSs and TESs, we applied a 100-nt window around each significant and supported RSGL and REGL (50 nt on each side) to define high-confidence TSS and TES regions (Additional File 2; Figure S4). This generated 1,674,795 transcripts after sequentially removing transcripts containing poorly supported SJs (117,361 transcripts) or poorly supported TSS and TES (447,114 transcripts) (Fig. 1C). The above filtering criteria also addressed the common issue of excessive numbers of single-exon gene models generated from Iso-seq experiments and many other genome-wide annotation projects [7, 51], which could be the result of genomic DNA contamination. In our data, we also observed that 161,578 (46.6%) out of 346,455 single-exon transcripts were removed due to the TSS/TES filtering. These removed transcripts are probably fragments with missing 5′ or 3′ sites or false positive gene models. As a result, filtering using high-confidence TSS and TES regions also reduced the number of the mono-exonic genes (containing mono-exonic transcripts) from 13,619 to 4477, a reduction of 67% on the number of putative mono-exonic genes. The percentage of mono-exonic genes decreased from 41.3 to 20.9% of the total number of genes after TSS/TES filtering.\n\nFinally, to increase the gene coverage using existing annotations and make the maximum use of the Iso-seq long reads, we retained a further 2483 genes (7398 transcripts) where the reads overlapped Araport transcripts on the same strand with at least 50% overlap. The combined set was merged allowing 50 nt variations at the 5′ and 3′ ends, and the final AtIso dataset contained 24,344 genes with 132,190 high-level transcripts (Additional File 2: Fig. S4).\n\nTo investigate the contribution to gene and transcript diversity from each of the different libraries to AtIso, we used the transcript merge information provided by TAMA (_trans_report.txt) to identify which transcripts and genes were merged from the individual libraries (Additional File 1: Table S7; Additional File 2: Fig. S5). The nuclear RNA sample contributed the least number of genes and transcripts to AtIso despite high number of CCS reads generated from this library. The silique library contributed the second lowest number of genes and transcripts which is likely due to the flow cell having the lowest loading efficiency (21%) and generating the lowest number of CCS reads of all the libraries (Additional File 1: Table S2). The contribution to gene and transcript numbers from the rest of the libraries is more consistent ranging from 7.5 to 14 k genes and 10 to 25 k transcripts. Of the 24,344 genes and 132,190 transcripts in AtIso, only 257 genes and 99 transcripts were shared by all 27 libraries while 3939 genes (16.1%) and 81,310 transcript (61.5%) were unique to a single library. Thus, the libraries from the wide range of organ types and conditions are highly complementary and aided the capture transcriptome diversity.\n\nFinally, we performed a saturation analysis which counted the number of genes and transcripts as each library was added. The increase in the number of new genes in AtIso began to plateau after 8 samples had been added eventually reaching 24,344 genes (Additional File 1: Table S8; Additional File 2: Fig. S6A). Interestingly, the nuclear RNA sample added ca. 1.5 k unique genes despite having the lowest number of genes and transcripts identified. This may reflect capture of transcripts which may function and remain in the nucleus (e.g., some lncRNAs). For samples with relatively limited amounts of sample (e.g., flower and root) which were sequenced more than once, each library continued to add unique genes. In contrast, the number of unique transcripts continued to increase with each library adding a few thousand isoforms (Additional File 1: Table S8; Additional File 2: Fig. S6B). The linear growing trend of unique transcripts shows that saturation has not yet been reached with the existing Iso-seq data.\n\nConstruction and characterization of the AtRTD3 transcriptome\n\nAtIso contained transcripts from 57% of the genes in Araport11. Splice junction and transcript identity were compared among AtIso, AtRTD2, and Araport11 [39, 40] (Additional File 3). There was high similarity in SJs but very low overlap of transcripts due to poor 5′ and 3′ end determination and different combination of SJs in AtRTD2 and Araport11 compared to the Iso-seq transcripts (Additional File 3). To generate a new, comprehensive transcriptome for Arabidopsis that covered all genes and incorporated the Iso-seq transcripts, long- and short-read assemblies were combined using the following criteria: (1) AtIso had the most accurate transcript data and was used as the backbone for integrating AtRTD2 and Araport11. To maximize the use of Iso-seq transcripts, we kept all AtIso transcripts. (2) As the TSS, TES, and the combination of SJs are less accurate in transcripts assembled from short reads, (a) only transcripts from AtRTD2 and Araport that contained novel SJs or (b) covered novel genomic loci were incorporated from the short-read assemblies. Using these criteria, the three assemblies were merged with TAMA merge, generating the final transcriptome, which we named AtRTD3. AtRTD3 contained 40,932 genes with 169,503 transcripts with a total of 183,568 SJs. AtIso contributed 132,166 (77.97%) transcripts from 25,248 (61.68%) genes, AtRTD2 contributed 24,831 (14.65%) transcripts from 13,683 genes [39], and Araport11 contributed 12,506 (7.38%) transcripts from 11,750 genes [40]. In AtRTD3, the average number of isoforms per gene was 4.4 and nearly 80% of transcripts had Iso-seq support (SJs, TSS, and TES).\n\nWe used SQANTI3, the latest version of SQANTI [52] to assess the quality of the long-read transcripts in AtIso and AtRTD3 in comparison with other reference transcriptomes (Araport11 [40] and AtRTD2 [39]). SQANTI catalogs long-read transcript as Full Splice Match (FSM) when the transcript matches a reference at all SJs, Incomplete Splice Matches (ISM), if the transcript misses SJs at either 5′ and 3′, Novel In Catalogue (NIC), when the long-read transcript includes a novel combination of existing donor or acceptor sites, and Novel Not In Catalogue (NNC), when the long-read transcripts contain at least one novel donor or acceptor site. Other categories are Genic, Intergenic, Fusion, and Antisense [52]. When compared to the Araport reference, ca. 35% of AtRTD3 transcripts (ca. 59 k) were FSM and ca. 4% were ISM (Additional File 2: Fig. S7A). Fifty-five percent of AtRTD3 transcripts were novel, either NIC or NNC (Additional File 2: Fig. S7A). These results reflect AtRTD3 having a much higher number of transcripts (169.5 k) than Araport11 (48 k) and consisting mainly of novel isoforms. The number of FSM transcripts in AtRTD3 reflects transcripts with an exact match of SJs, although they might be different defined TSS and TES in the Iso-seq transcripts. The AtRTD2 transcriptome is based on short-read assembly and has many more isoforms than Araport11. Consequently, when the AtRTD3 transcriptome—where ca. 80% of transcripts are derived from Iso-seq—is assessed versus the AtRTD2 annotation (Additional File 2: Fig. S7B), a higher number of FSM and lower number of NNC is found than when assessed against the Araport11 annotation (Additional File 2: Fig. S7A). This indicates that AtRTD3 is more similar to the AtRTD2 than to the Araport11 annotation. TSS and TES were defined using the Iso-seq reads in AtIso. AtRTD3 contained all of the transcripts from AtIso with the addition to transcripts from Araport11 and AtRTD2 to provide full coverage of genes in Arabidopsis. SQANTI3 assessed the quality of TSS in AtIso and AtRTD3 by comparing their positions to PEAT-defined TSS from Morton et al. (2014) [41] which covered around 9 k protein-coding genes. The % of transcripts with PEAT support for these genes was very similar for ISM, NIC, and NNC transcripts (Additional file 2: Fig. S7C, D). However, 60% of FSM transcripts from AtIso had PEAT support which decreased to 45% for AtRTD3 FSM transcripts. The reduction in TSS quality in AtRTD3 reflects the inclusion of isoforms from Araport11 and AtRTD2 where TSS are of lower quality.\n\nGenes and transcripts in AtRTD3 were characterized using TranSuite, a program which identifies mono- and multi-exonic genes and generates accurate translations of transcripts and transcript characteristics [53]. The output includes translations of all transcripts in the RTD and multiple transcript features (Additional File 1: Table S9). These results are summarized in Fig. 4 and Additional File 1: Table S10A and S10B. Almost three quarters (73.5%) of the genes coded for proteins and ca. 26.5% were non-protein-coding genes (Fig. 4A; Additional file 1: Table S10A). Of all genes, 66.5% were multi-exonic and 50% had more than one transcript isoform. Of the genes that produced a single transcript, two-thirds were single-exon genes and one-third were multi-exonic (Fig. 4C; (Additional File 1: Table S8B). For protein-coding genes, 62.9% were multi-exonic with more than one isoform. The 10,827 non-protein-coding genes generated 14,880 transcripts (Fig. 4E); the majority were single-exon genes but 1728 genes were multi-exonic (spliced) with a single transcript and over 5 k genes had more than one isoform (Additional File 1: Table S10A). We also identified 3796 chimeric (read-through) transcripts covering usually two Araport genes with an overlap > 30%.\n\nFig. 4\nfigure 4\n\nGene and transcript characteristics of AtRTD3. A Protein-coding and non-protein-coding genes. B Mono-exonic and multi-exonic genes. C Mono- and multi-exonic genes with single/multiple transcript isoforms for all genes and D for protein-coding genes. E Distribution of transcripts from protein-coding genes (protein-coding and unproductive isoforms) and from non-protein-coding genes. F Protein-coding transcripts with little or no impact on coding sequence (NAGNAG/AS in UTR) and protein-coding variants. G Distribution of transcripts with NAGNAG, AS in 5′ UTR, and AS in 3′ UTR: H distribution of NMD features among unproductive transcripts from protein-coding genes. DSSJ—downstream splice junction; OUORF—overlapping upstream open reading frame\n\nAt the transcript level, AtRTD3 contained more than double the number of transcripts compared to AtRTD2 with greatly increased numbers of protein-coding and unproductive transcripts from protein-coding genes: 154,619 (91.2%) AtRTD3 transcripts came from protein-coding genes (Fig. 4E). Of these, ca. 86 k are expected to code for proteins while ca. 68.5 k are probably unproductive (Fig. 4E; Additional File 1: Table S10B). Alternatively spliced transcripts that coded for proteins were divided into those where AS events had little or no effect on the coding sequence (NAGNAG/AS UTR) (30.3%) and those that encoded protein variants (69.7%) (Fig. 4F; Additional File 1: Table S10B). NAGNAG/AS events generate transcripts that code for protein variants differing by only one amino acid and transcripts of genes where AS events occur only in the 5′ and/or 3′ UTRs and hence code for identical proteins. The NAGNAG/AS UTR transcripts were further broken down according to whether AS events were in the 5′ and/or 3′UTR or were NAGNAG (Fig. 4G; Additional File 1: Table S10B). The most frequent AS events were in the 5′ UTR (52.4%) followed by those in the 3′ UTR (21.2%) or NAGNAG events (15.4%) (Fig. 4G). NAGNAG AS events were present in 7% of protein-coding transcripts and 3.5% of all transcripts. Finally, the unproductive transcripts from protein-coding genes were classified by their nonsense-mediated decay (NMD) target features: presence of a premature termination codon (PTC), downstream splice junctions, long 3′ UTR, or overlapping upstream ORF where an upstream ORF overlaps the authentic translation start site [54] (Fig. 4H; Additional File 1: Table S10B). Over 70% of the unproductive transcripts contained the classical combination of NMD target features of a PTC with downstream splice junctions and long 3′UTRs, 8.7% had a PTC with either one of these signals and 6.4% of transcripts contained an overlapping uORF (Fig. 4H; Additional File 1: Table S10B).\n\nIso-seq increased the number of transcript isoforms for many genes reflecting both discovery of novel AS events and defined TSS/TES variation compared to Araport and AtRTD2 (Additional File 2: Fig. S8). Different TSS in Iso-seq transcripts were observed in genes where alternative TSS had been previously characterized [55], for example, AT1G09140 (SERINE-ARGININE PROTEIN 30) and AT1G22630 (SSUH2-LIKE PROTEIN) (Additional File 2: Fig. S9A and B). Defined Iso-seq TESs in AtRTD3 confirmed the well-established intronic alternative polyadenylation sites in FCA and FPA (not shown) and those in ATHB13 (AT1G69780) and ANKYRIN REPEAT-CONTAINING PROTEIN 2 (AT4G35450) [56] (Additional File 2: Fig. S10A and B). The Iso-seq data also identified novel splice sites and alternative TSS/TES in known and novel lncRNAs. For example, AS transcripts of the antisense lncRNA, FLORE [57] were confirmed (Additional File 2: Fig. S11). AtRTD3 contained 1541 novel genes compared to Araport (Additional file 1: Table S11). All were identified by Iso-seq, and their transcripts therefore have high-confidence TSS/TES and SJs for those which are spliced or alternatively spliced. The majority of the novel genes were lncRNAs with only 109 genes coding for proteins with a CDS of > 100 amino acids; 223 had more than one transcript and 1318 had single transcripts. The novel genes were either intergenic or antisense genes. For example, G12636 is an alternatively spliced intergenic lncRNA, G13263 is a spliced antisense gene with different TSS, and G14744 is an alternatively spliced antisense gene which covers two different protein-coding genes (Additional File 2: Fig. S12A, B and C, respectively). We carried out a functional annotation analysis of the transcripts from the novel genes identified in AtRTD3 using TRAPID 2.0 ( [58]. Among the 1985 transcripts, a best similarity search using DIAMOND identified hits for 1320 transcripts from a range of plant species with 1131 (85.68%) coming from Arabidopsis thaliana and 49 (3.71%) from Arabidopsis lyrate (Additional File 1: Table S12). These transcripts were associated with 897 gene families and 4 RNA families. Thus, around two-thirds of the novel transcripts are related to known genes.\n\nIso-seq also defined 1197 genes with 3796 chimeric transcripts which extended over two or more genes (Additional file 1: Table S13). For example, Iso-seq detected only a single transcript of the upstream MEKK2 gene but multiple chimeric transcripts covering the tandemly arranged MEKK2 and MEKK3 genes (Additional File 2: Fig. S13). Thus, the high quality Iso-seq data increases transcript diversity and provides detailed information of transcript features. Chimeric transcripts have been identified previously in an fpa mutant of the flowering time control protein, FPA, using an algorithm based on reciprocal DRS read abundance at tandem protein-coding genes [59]. Forty-four chimeric RNAs were identified in the fpa mutant of which 12 were confirmed; AtRTD3 contained 5 of the putative chimeric RNAs and two of those corroborated. Similarly, AtRTD3 contained two of the 52 putative chimeric/extended mRNAs were identified in a mutant of the NEW ENHANCER OF ROOT DWARFISM1 gene [60]. The small overlap between the chimeric genes in AtRTD3 and these studies is likely due to the mutants affecting transcription termination in the upstream gene and not being included among the Iso-seq samples in this study.\n\nFinally, we compared the frequency of different AS event types among the different transcriptomes using SUPPA2 [61]. AtRTD3 had the highest number of AS events followed by AtIso (Additional File 1: Table S14). For the most part, the frequency of different AS events is similar with approximately double the number of alternative 3′ splice site (Alt 3′ss) than alternative 5′ splice site (Alt 5′ss) events and relatively few exon skipping events (6–7%). Intron retention (IR) is far more frequent in plants than in animals with around 40% of plant AS events being IR [62] as seen in AtRTD2 and Araport11 (Additional File 1: Table S10). However, AtIso contained a higher number of IR events (50%) which supported the observation that many Iso-seq transcripts from multi-exon genes contained different individual retained introns (e.g., Additional File 1: Fig. S8 and S9) such that Iso-seq appeared to identify more low-abundance transcript variants in highly expressed genes. Finally, the intermediate value of 44% IR events in AtRTD3 reflects the combination of unique transcripts from Iso-seq and short read-derived assemblies.\n\nAtRTD3 and AtIso increase quantification accuracy at the transcript and alternative splicing levels\n\nTo evaluate AtRTD3 and AtIso in the performance of transcript and AS quantification, we used high-resolution (HR) RT-PCR data that we had used previously to evaluate AtRTD2 [39]. The HR RT-PCR data was generated using RNA samples of two time-points (T5 and T20) of Arabidopsis plants exposed to cold and which were also used to generate RNA-seq data for direct comparison [63]. Due to the increased transcript/AS diversity in AtRTD3 and AtIso, we were able to analyze 226 AS events from 71 Arabidopsis genes (three biological replicates of each of the T5 and T20 time-points). This generated 1349 data points, which represents a significant increase from the earlier study (127 AS events from 62 genes with a total of 762 data points). For the splicing ratios from HR RT-PCR, transcript structures from AtRTD3 and AtIso were compared to the amplicons in HR RT-PCR and the TPMs of individual transcripts covering the different AS outcomes were used to calculate splicing ratios for each of the AS events or event combinations in that region. For splicing ratios from RNA-seq data, each of the different reference transcriptomes (AtRTD2-QUASI, Araport11, AtIso, and AtRTD3) were used to quantify transcripts using Salmon. The splicing ratio for each AS event was calculated by comparing the abundance of individual AS transcripts with the AS event to the fully spliced (FS) transcript which is usually the most abundant transcript and codes for full-length protein (AS/FS). The scatter plot of splicing ratios from HR RT-PCR and RNA-seq using the different reference transcriptomes (Fig. 5; Additional File 2: Fig. S14) shows that AtRTD3 and AtIso achieve the highest concordance with HR RT-PCR data. This is likely due to the increased integrity of transcript structure (accurate characterization of SJs, TSSs, and TESs and their combinations) as well as increased transcript/AS diversity over AtRTD2 and Araport11. Although AtIso and AtRTD3 performed very similarly in this analysis, AtRTD3 is the transcriptome of choice for RNA-seq analyses due to its far greater gene coverage.\n\nFig. 5\nfigure 5\n\nCorrelation of splicing ratios calculated from the RNA-seq using different RTDs and HR RT-PCR data. Splicing ratios for 226 AS events from 71 Arabidopsis genes (three biological replicates of the time-points T5 and T20) generated 1349 data points in total. The splicing ratio of individual AS transcripts to the cognate fully spliced (FS) transcript was calculated from TPMs generated by Salmon and A Araport11, B AtRTD2-QUASI, C AtIso, and D AtRTD3 and compared to the ratio from HR RT-PCR. E Correlation coefficients are given for each plot. Note that for clarity of the figures, data points with values that lie substantially outside the range of the graphs are not included in A–D but are included in the correlation values and shown in Additional File 2: Fig. S11\n\nHigh-resolution gene and transcript expression profiling with AtRTD3\n\nAtRTD3 contains many more transcripts (169,503) than AtRTD2 (82,190). This reflects increased numbers of transcripts with intron retention and other AS events as well as defined TSS and TES variation. For some highly expressed genes with multiple introns, the combination of TSS/TES variation and intron retention events often led to tens of transcript isoforms from a single gene. Although more complex than AtRTD2, we predicted that the majority of isoforms with intron retention represent intermediates of splicing where an intron(s) had not been removed at the time of RNA extraction and that they would therefore have low levels of expression. Similarly, some isoforms with novel AS events would be NMD-sensitive again potentially with low expression levels. In contrast, novel AS isoforms or isoforms with different TSS or TES with significant expression levels would be expected to alter the transcript expression profiles compared to analysis with AtRTD2 where these isoforms were absent (we showed previously the impact of missing transcripts in transcript quantification [39]). To demonstrate the increased resolution obtained with the more complex and diverse AtRTD3, we compared gene and transcript expression profiles using RNA-seq data from an RNA-seq time-course of 5-week-old Arabidopsis plants grown in 12 h dark:12 h light in the transition from 20 to 4 °C [63, 64]. Briefly, transcripts were re-quantified with Salmon using AtRTD3 as reference and the RNA-seq data from 26 time-points (3 biological replicates) was re-analyzed. Time-points were taken every 3 h for the last day at 20 °C (T1–T9), the first day at 4 °C (T10–T17), and the fourth day at 4 °C (T18–T26) (see Fig. 6). Expression profiles were directly compared between AtRTD2 and AtRTD3.\n\nFig. 6\nfigure 6\n\nDifferential TSS and TES usage. Pairs of transcript isoforms with significant isoform switches and different TSS (A–D) and TES (E, F). A AT1G11280—the shorter .6 transcript is cold-responsive. B AT3G13110—single-exon gene with different TSS where the .1 transcript has rapid cold-induced expression compared to the .2 transcript. C AT1G55960—both transcripts peak at dusk but have different expression behavior with the .11 isoform showing large increases of expression at 20 °C and day 1 at 4 °C declining with continued cold exposure. D AT5G53420—isoforms with very different TSS - .7 isoform expressed rhythmically peaking during the day (light-responsive) at 20 °C before declining rapidly in the cold while the .12 transcript has increased expression in the cold, peaking during the dark. E AT4G14400—the isoforms differ only in their TES but are expressed rhythmically with different phase (3 h offset) at 20 °C and reduced at 4 °C. F AT3G56860—very different TES and expression behavior—antiphasic at 20 °C with cold-induced switch to the shorter .12 isoform. Error bars on points are standard errors of the mean\n\nThe more comprehensive nature and accuracy of AtRTD3 is clearly illustrated by the THIAMIN C SYNTHASE (THIC) gene (AT2G29630) which is involved in regulation of thiamin biosynthesis via a riboswitch in the 3′ UTR that controls expression through alternative 3′-end processing or splicing [65, 66]. Three types of transcripts have been identified previously: type I transcripts represent precursor transcripts; type II transcripts have been processed at a polyadenylation site in the second 3′UTR intron (3′-2) and type III transcripts have splicing of intron 3′-2 [65] (Additional File 2: Fig. S15A). Low levels of THIC expression reduce vitamin B1 (thiamin diphosphate—TPP) levels. Low levels of TPP allow the structure of the RNA aptamer to interact with the 5′ splice site of the 3′-2 intron to inhibit splicing and promote processing at the polyadenylation site in the intron. The resultant type II RNA transcripts have relatively short 3′ UTRs, are stable, and give high expression of THIC [65]( Additional File 2: Fig. S15A). With increased levels of TPP, TPP binds to the aptamer leading to structural changes in the riboswitch RNA such that it can no longer interact with and inhibit use of the 5′ splice site of 3′-2. Subsequent splicing of the 3′-2 intron removes the poly(A) site and type III transcripts with longer 3′ UTRs of various lengths are generated leading to increased RNA degradation and reduced expression of THIC (Additional File 2: Fig. S15A). AtRTD3 contained 32 THIC transcript isoforms (Additional File 2: Fig. S15B). The majority have very low expression and either have retention of different introns within the CDS and are likely intermediates of splicing or have other AS events that disrupt the ORF and introduce PTCs. Type I, II, and III transcripts [65] were clearly distinguished by their 3′UTR structures (Additional File 2: Fig. S15B). The 3′ processed type II mRNAs have a shorter 3′UTR than types I and II due to processing at the pA site within intron 3′-2 while type III transcripts have splicing of the 3′-2 intron (removes the first seven nucleotides of the aptamer sequence) and longer 3′UTRs with a range of 3′ends sites [65]. In addition to the type I, II, and II isoforms found in AtRTD3, we observed a novel AS variant where splicing removed only the first aptamer nucleotide. We detected three type I precursor transcript isoforms among the 32 THIC isoforms in AtRTD3 (Additional File 2: Fig. S15B). In contrast, Araport and AtRTD2 contained 4 and 10 transcripts, respectively. Neither AtRTD2 nor Araport contained type II transcripts and possible type I transcripts were much longer than those obtained with Iso-seq suggesting that the 3′UTRs of the transcripts were incorrectly assembled. THIC is highly expressed and under circadian control [66]. In the cold time-series analyzed with AtRTD3 as reference, THIC expression increased during the day and decreased in the dark (Additional File 2: Fig. S15C). The major isoform was the AT2G29630.28 type II RNA; the highest expressed minor isoforms seen during the light period are a type I isoform and another type II isoform (Additional File 2: Fig. S15C). Although the total expression profiles using AtRTD3 and AtRTD2 are very similar, the underlying transcript profiles were quite different and reflect incorrectly assembled transcripts and the absence of type II transcripts in AtRTD2 (Additional File 2: Fig. S15D). Thus, the more comprehensive transcript set in AtRTD3 along with the ability of Iso-seq to identify TES, successfully distinguished the different THIC RNA classes and showed that a type II isoform is the most abundant class [65]. The impact of increased diversity and transcript profiling resolution were also illustrated by the identification of a novel cold-induced isoform with shorter TSS and TES in AT3G17510 (CBL-INTERACTING PROTEIN KINASE 1 - CIPK1) and a novel isoform (AT4G25080.13) encoding an N-terminally truncated protein of AT4G25080 (MAGNESIUM-PROTOPORPHYRIN IX METHYLTRANSFERASE - CHLM) in AtRTD3 (Additional File 2: Fig. S16 and S17, respectively).\n\nCold- and blue light-induced differential TSS and poly(A) site usage\n\nDifferential TSS and TES usage was observed among the expressed isoforms of AT3G17510 (CBL-INTERACTING PROTEIN KINASE 1) (Additional File 2: Fig. S16). To examine differential TSS and TES usage more widely, we first generated lists of genes from AtRTD3 which contained alternative TSS and TES which were more than 100 bp apart (2251 and 1753 genes, respectively). Initially, to show differential TSS usage of some of these genes, we compared the 2251 genes with alternative TSS to 220 genes which had previously been shown to have blue light-induced differential TSS usage [55]. Eighty-two of the genes with alternative TSS defined here had blue light-induced differential TSS usage. We next re-analyzed the RNA-seq time-course data [63] with AtRTD3 as reference and applied the Time-series Isoform Switch (TSIS) program [67] to identify genes with significant isoform switches (IS) (p < 0.001). To identify IS in genes with alternative TSS and TES, we filtered the IS with the lists of genes containing alternative TSS and TES more than 100 bp apart. This identified 2136 significant IS with alternative TSS and 1723 with alternative TES from 583 and 450 different genes, respectively (160 genes had IS involving isoforms with alternative TSS and TES). Genes could contain > 1 isoform switch if they involved different pairs of isoforms from the same gene or where multiple IS occurred between different time-points (the time-series had 26 time-points). However, the IS analysis did not distinguish between IS due alternative splicing or to differential usage of alternative TSS and/or TES. We, therefore, selected prominent IS events where the isoforms had large negative correlation values < −0.5 or where the difference in expression levels of the isoforms was >20TPM. These were then manually inspected to identify transcript isoforms with no AS such that the IS only involved isoforms with alternative TSS or TES (Fig. 6A–D) and TES usage (Fig. 6E, F). For example, the AT1G11280.11 isoform had a TSS 123 bp upstream of the .6 isoform and their poly(A) sites differed by only 3 nt. The .11 transcript (3473 nt including introns) has an intron in the extended region and codes for a protein of 830 amino acids with 10 additional amino acids at the N-terminal end compared to the .6 isoform (Fig. 6A). At 20 °C, the .6 isoform peaked 3 h after dusk (T2) and then declined in expression; cold rapidly induced expression of this transcript in the dark while expression of the .11 transcript does not change significantly in response to light-dark or cold (Fig. 6A). AT3G13110 is a single-exon gene. The .1 and .2 isoforms have the same poly(A) sites but the TSS of .2 is 272 bp upstream of .1. The .2 transcript codes for a protein with a 55-amino-acid N-terminal extension. At 20 °C, there was little expression of the .1 transcript but cold caused a rapid, transient increase in day 1 at 4 °C peaking at dawn (T13) while the .2 transcript showed a modest increase at low temperature. Thus, at 20 °C, the .2 promoter drives expression and cold induces a rapid switch to the .1 promoter (Fig. 6B). The .11 isoform of AT1G55960 has a TSS 104 bp upstream of the .7 isoform and slightly different poly(A) sites (differing by 12 nt); the isoforms code for identical proteins (Fig. 6C). At 20 °C, both isoforms were expressed in the light peaking 3 h after dawn (T5). However, expression levels of .11 were lower than .7 in the dark but showed a large increase in expression in the light at both 20 and 4 °C (day 1) which was lost by day 4 at 4 °C (Fig. 6C). Thus, AT1G55960 has a light- and cold-regulated promoter switch. The TSS of the .12 isoform of AT5G53420 is 717 bp upstream of that of the .7 isoform. The poly(A) site of .12 is also longer by 47 nt and codes for a 265-amino-acid protein including a 79-amino-acid N-terminal extension (Fig. 6D). At 20 °C, the shorter .7 transcript was expressed rhythmically during the day and declined in the cold with a rapid switch to higher expression of the longer .12 isoform mainly in the dark with different phasing of expression (Fig. 6D). This suggests that the promoter driving expression of the .7 transcript is light-responsive and negatively regulated by low temperature while that of the .12 isoform is cold-responsive.\n\nDifferential TES usage was shown for the .26 and .27 isoforms of AT4G14400 which have identical TSS and code for the same protein but have different poly(A) sites, 194 nt apart. At 20 °C, expression of .27 was significantly higher than .26 peaking at dusk (T1) while .26 peaked 3 h later in the dark (T2). Expression of the isoforms increased during the day but in day 1 at 4 °C, the .26 isoform increased to a similar level to the .27 isoform (Fig. 6E). The differential phasing of expression of the isoforms was more pronounced at 4 °C (Fig. 6E). The isoforms only differ by their poly(A) sites suggesting that phasing of expression and the cold response of .26 are mediated by alternative polyadenylation. Finally, the .24 and .12 isoforms of AT3G56860 have identical TSS and CDS but very different poly(A) sites with that of the .24 isoform being 1218 nt downstream (Fig. 6F). Both isoforms were expressed at 20 °C in an almost complementary way, but at 4 °C there was a rapid increase in expression of the shorter .12 isoform and decline of the .24 isoform. Thus, the very different cold responses of the two isoforms may be controlled by alternative polyadenylation. The TSIS method only identified a subset of potential differential TSS and TES usage because it was limited to genes which had TSS or TES sites that were > 100 bp apart and where different isoform abundances switched significantly.\n\nBesides defining alternative polyadenylation in 3′UTRs, the TES analysis also identified premature polyadenylation sites. Premature polyadenylation is an important mechanism in regulating gene expression as shown for FCA and FPA [59, 68, 69]. Such polyadenylation events occur in either exonic or intronic sequences with different consequences. Premature polyadenylation that occurs in exons can result in non-stop mRNA transcripts where there is no stop codon in the transcript after the translation start site and ribosomes reaching the 3′ end of the transcript trigger the non-stop decay pathway [70]. Most transcripts from premature polyadenylation in introns have a stop codon before the end of the transcripts but depending on the polyadenylation site can give rise to non-stop RNAs. Recently, the non-stop decay pathway has been shown to function in plants [71] and non-stop RNA transcripts have been identified in disease resistance genes which require FPA for premature polyadenylation [72]. We identified 214 non-stop RNA transcripts from 169 protein-coding genes in AtRTD3 (Additional File 1: Table S15A and B). Disease resistance genes were the most common gene class and included 14 of the ca. 40 FPA-sensitive disease resistance genes with non-stop transcripts [72] as well as ten disease resistance genes with non-stop RNA transcripts not found in that study. Interestingly, two polyadenylation and cleavage factor homologs (PCFS1 and PCFS5) generated non-stop RNAs from premature polyadenylation and one of the FPA transcripts (AT2G43410.8) was a non-stop RNA (Additional File 1: Table S15A and B). The list of genes with non-stop RNAs is unlikely to be complete as only around one-third of the FPA-sensitive disease resistance genes were identified which may reflect the specific effect of the fpa mutant compared to the range of samples used here or differential coverage of genes in the Iso-seq and Oxford nanopore datasets. Nevertheless, defining TSS and TES by Iso-seq allows detailed investigation of mechanisms of post-transcriptional regulation of expression and developmental stage- and condition-specific changes in TSS and TES usage.\n\n\nThe accuracy of differential gene expression and differential alternative splicing analyses of RNA-seq data depends on the quality and comprehensiveness of the reference transcriptome. Here, we present a new Arabidopsis RTD (AtRTD3) which has extensive support from single-molecule sequencing (PacBio Iso-seq). Data was generated from a wide range of organs/tissues, abiotic and biotic treatments, and RNA-processing mutants to increase the number and diversity of transcripts. Novel methods were developed to identify high-confidence SJs and TES/TSSs to overcome (1) the sequencing errors particularly around splice junctions which generate thousands of false transcript structures/annotations and (2) the impact of degradation and truncated transcripts/reads on accurate end determination. In AtRTD3, 77.9% of transcripts (from 61.68% of genes) are high-quality Iso-seq-derived transcripts with accurately defined SJs and start and end sites. For those genes with little or no Iso-seq coverage, transcript isoforms were taken from AtRTD2 (14.65%) and Araport11 (7.38%). AtRTD3 contains 169,503 unique transcripts from 40,932 genes reflecting novel genes (mostly lncRNA genes), novel AS transcripts, and defined TSS/TES compared to the short read-derived AtRTD2 [39]. AtRTD3 represents a high-quality, diverse, and comprehensive transcriptome which improves gene and transcript quantification for differential expression and AS analysis and now allows alternative TSS and TES usage to be addressed.\n\nIn the production of AtRTD3, we applied a hybrid analysis pipeline using PacBio IsoSeq3 and TAMA and developed new methods of single-molecule sequencing analysis which are generally applicable and will improve downstream analysis and the quality of transcript and transcriptome annotations. We showed previously that redundant or missing transcripts, transcript fragments, and mis-annotation in the 5′ and 3′ ends of transcripts seriously impacted the accuracy of transcript and gene expression quantification with Salmon and Kallisto which require prior knowledge of transcripts [39]. Initial analysis of the Iso-seq data identified issues with false splice junctions, degraded or fragmentary reads/transcripts and that error correction methods using short-read data often trim or split whole transcripts sequences in fragments or generated new errors (over-correction). In addition, the IsoSeq3 analysis pipeline from PacBio used polishing steps which removed splice site variation with small differences such as alternative splicing of a few nucleotides (e.g., NAGNAG sites). These observations provided the motivation to improve methods of analysis of PacBio Iso-seq data. Firstly, we used the IsoSeq3 pipeline up to the generation of FLNCs and then switched to TAMA which gave greater control over transcript processing and was the basis of developing the SJ-centric approach. Secondly, we clearly demonstrated that mismatches in the vicinity of SJs generated transcripts with false splice junctions. We defined criteria to identify high-confidence splice junctions and remove poorly supported SJs. The number of rejected SJs and the high overlap with the accurate short read-determined SJs illustrated the value of the splice junction-centric approach. Thirdly, even with 5′-cap capture, there is extensive variation in transcript start and end sites, much of which reflects degradation of RNA. Distinguishing high-confidence TSS and TES from such degradation products required different methods that take into account the effects of different gene expression levels and the stochastic nature of transcription start and end sites. The high-confidence TSS and TES defined in AtRTD3 were supported by the frequency, position, and distribution of conserved promoter, polyadenylation, and translation start motifs and by good agreement with experimentally defined TSS and poly(A) sites [41, 43, 44]. Such experimental determinations are often limited in the number of genes for which data is generated and the number of transcripts where both the 5′ and 3′ ends are defined. The new pipeline addresses the major issues of accuracy of splice site and TSS/TSS determination in Iso-seq analysis. The methods have three main advantages: (1) the generation of high-confidence SJs removed the need for error correction using short reads and therefore avoided splitting or trimming of the original sequences as well as over-correction, (2) both TSS and TES are generated for a very high proportion of transcripts, and (3) they are determined directly from the single-molecule data without the need for parallel experimental approaches. To date, Iso-seq has been applied to a wide range of plant species (see “Background”); the novel methods here will improve analysis of transcripts in future studies and allow re-analysis of existing data. In addition, AtRTD3 can evolve further with the addition of new or existing Iso-seq datasets analyzed using the methods described here.\n\nThe Iso-seq-derived transcripts in AtRTD3 (ca. 80% of transcripts) were full-length with accurate SJs and TES/TSS and correct combinations of TES/TSS and AS events but only covered ca. two-thirds of genes in Arabidopsis. This represents good coverage for Iso-seq in comparison to other studies. For example, a recent study of Iso-seq of nine tissues in rice covered only ca. one-third of rice genes [29]. Coverage of the other genes and transcripts in AtRTD3 came from Araport11 and, primarily, from AtRTD2 due to its far greater transcript diversity [39]. The transcripts from AtRTD2 and Araport11 are of high quality in terms of splice sites but their 5′ and 3′ ends are likely to be inaccurate and are often artificially extended [39]. The quality of SJs in the AtRTD2 transcripts is evidenced by 57.8 k of the 82 k AtRTD2 transcripts being redundant to Iso-seq transcripts in having identical SJs such that the Iso-seq transcripts were preferentially selected. Thus, AtRTD3 has full coverage of the genes in Arabidopsis with two-thirds of genes made up predominantly of Iso-seq transcripts and one-third of high-quality RNA-seq assembled transcripts. AtRTD3 is unique in that all of its transcript annotations have undergone extensive quality controls. As higher accuracy and throughput of single-molecule sequencing technologies improve, the new analysis pipeline exploited here will enable the rapid determination of SJs, TSS, and TES for fully comprehensive transcriptomes.\n\nAtRTD3 contains greatly increased numbers of unique transcripts and particularly transcripts coding for protein variants and unproductive transcripts from protein-coding genes compared to AtRTD2. Although transcript numbers more than doubled in AtRTD3, 60.4% of multi-exonic protein-coding genes had AS agreeing with previous estimates [39, 62]. The increased number of protein variant transcripts includes transcripts from the same genes with alternative TSS and pA sites and the identification of novel AS events which alter coding sequences. The increased unproductive transcripts also included transcripts with the same PTC-generating AS event but with alternative TSS and TES sites and the majority contained classic NMD characteristics. Iso-seq identified novel AS events and, in particular, high numbers of intron retention events. The majority of transcripts with intron retention most likely reflect partially spliced pre-mRNAs and why such transcripts should be more prevalent in Iso-seq is unknown but may be due to lower efficiency of obtaining full short-read coverage of introns in short-read assembly. In plants, transcripts with intron retention have been shown to avoid NMD and to be retained in the nucleus [54, 73]. In contrast, human intron retention transcripts are generally degraded by the NMD pathway [74] but numerous examples of intron retention as a regulatory mechanism have been described [75]. For example, intron detention where partially spliced transcripts remain in the nucleus until required and are then spliced and mRNAs exported and translated represent novel gene regulation mechanisms [75]. In this regard, we have identified ca. 20 k protein-coding transcript isoforms with AS only in the 5′ and/or 3′ UTR such that isoforms coded for the same protein. AS in UTRs can be involved in regulation of expression by introducing short or overlapping uORFs to trigger NMD or affecting translation [54] or nuclear retention of mRNAs determining export of mRNAs [75]. The detailed characterization of such transcripts here provides a basis for future investigation into the regulatory roles of AS in UTRs.\n\nThe power of exploiting comprehensive RTDs in analyzing differential expression and differential alternative splicing was demonstrated in Arabidopsis using a cold time-series dataset and AtRTD2 [63, 64]. Thousands of genes with rapid cold-induced significant changes in expression and AS were identified due to the transcript level resolution of expression [63, 64]. AtRTD3 is more comprehensive and for most transcripts (ca. 80%) there is detailed structural information in terms of AS events and TSS/TES which increase the resolution of the analysis. Direct comparison of transcript quantification using AtRTD2 and AtRTD3 showed an increase in accuracy and the impact of missing transcripts and incorrectly assembled transcripts as seen previously [39]. More importantly, the defined TSS and TES clearly demonstrated variation in TSS and TES for many genes and re-analysis of the cold time-series data with AtRTD3 identified differential TSS and TES usage due to low temperature and light/dark conditions. It will now be possible to examine transcriptional and post-transcriptional regulation of gene expression involving differential TSS and TES usage demonstrated here and the impact of AS in UTRs [54, 76] during development and in response to abiotic and biotic stresses. Differential TSS and TES usage illustrates novel regulatory mechanisms. For example, Kurihara et al. [55] identified differential TSS usage in response to blue light and proposed a mechanism whereby blue light induces use of a TSS downstream of an uORF to produce a transcript that avoids NMD and allows expression. As mentioned above, over 20 k transcripts in AtRTD3 have AS only in the UTRs and interplay between TSS/TES usage and AS in the UTRs may have important regulatory roles affecting stability of transcripts, whether they are retained in the nucleus or exported and avoid NMD or are degraded to fine tune gene expression.\n\nThe main use of AtRTD3 is in analysis of RNA-seq data and rapid and accurate differential gene expression and differential alternative splicing. A key element of its functionality is in the accurate quantification of transcripts using Salmon or kallisto and AtRTD3 aims to be as comprehensive as possible and to minimize factors that can bias quantification of transcripts.\n\nDespite the increased number of transcripts, one of the limitations of AtRTD3 is the incomplete coverage of genes and transcripts by Iso-seq as seen in the saturation curve (Additional File 2: Figure S6A). Importantly, ca. 80% of protein-coding, unproductive mRNA, and ncRNA transcripts in AtRTD3 were derived from Iso-seq. The transcripts are full-length with defined 5′ and 3′ ends and transcript fragments have been removed to ensure accurate quantification. Nevertheless, gaps in gene and transcript Iso-seq coverage have been filled from the other transcriptomes and some of these short read-based genes will have mis-annotations in the 5′ and 3′ ends of transcripts which can affect transcript quantification [39]. As more single-molecule sequences become available, the short read-based transcripts will be replaced by long-read versions using the methods described here such that AtRTD3 will continue to evolve. A second consideration is whether the greatly increased number of transcripts in AtRTD3 may affect transcript quantification. On the one hand, increased numbers and definition of isoforms give greater resolution of gene expression and the contribution of each isoform (Additional File 2: Figures S15-S17). On the other hand, biological systems are complex, and the increased number of transcripts included higher numbers of novel AS isoforms (protein-coding or targets of NMD), intron retention isoforms which may represent intermediates of splicing or mis-spliced transcripts. Due to the quality control filters used to construct AtRTD3 to address factors affecting accurate transcript quantification [39], we expect transcripts which are intermediates of splicing (with one or more retained introns) or which have splicing errors to have low abundance and little effect on quantification of other isoforms. However, some intron retention transcripts (e.g., exitrons) are regulatory and have higher levels of expression [62, 77]. There is substantial variation in the abundance of NMD transcripts [54] and particular isoforms may be prominent in specific cell types or conditions. It is not possible to predict such variation in transcript expression levels and therefore it is important to capture expression of all transcripts and exploit the ability of RNA-seq data to distinguish the relative contribution of each transcript to the overall expression of a gene and obtain accurate expression levels of, for example, protein-coding isoforms. Ultimately, when all transcript isoforms are full-length with defined 5′ and 3′ ends, we expect accurate quantification of all transcripts irrespective of the complexity of the reference transcriptome. Finally, it is increasingly important with single cell transcriptomics to have a complete and comprehensive transcriptome reference for analysis of RNA-seq data.\n\n\nIn this study, we generated AtRTD3, the most comprehensive and accurate Arabidopsis transcriptome to date. We sequenced a diverse set of samples with different tissues, different environmental conditions, and mutants so that AtRTD3 captured a much greater transcript diversity. We developed novel computational methods to examine the sequencing evidence for splice junctions as well as TSS and TES so that the transcripts derived from this study is well supported from start to the end. AtRTD3 improved the precision of differential gene and transcript expression, differential alternative splicing, and transcription start/end site usage analysis from RNA-seq data. The novel methods for identifying accurate splice junctions and transcription start/end sites are widely applicable and will improve single-molecule sequencing analysis for other species.\n\nMaterials and methods\n\nPlant material\n\nPlant samples for RNA extraction and Iso-seq sequencing were all from Arabidopsis Col-0 and are summarized in Additional File 1: Table S1 and described below.\n\n • Different organ samples: flower, silique, and root materials. Col-0 was used for all samples. Roots: roots were harvested from 5-week-old plants grown in liquid culture (12 h light/12 h dark) and harvested at dawn and dusk and pooled. Siliques and inflorescence/flowers: plants were grown in soil in 16 h light/8 h dark conditions at 23 °C; siliques of different sizes (stages) up to early browning and inflorescences containing flowers from buds to mature flowers were harvested from 6-week-old plants and each pooled. For etiolated seedling samples, seedlings were grown for 3, 4, 5, and 6 days in darkness on petri dishes (½ Murashige and Skoog medium) without sugar and samples were pooled.\n\n • Plants exposed to different abiotic stresses/cues: cold, heat, flood, and time-of-day. Cold: 5-week-old rosettes grown in 12 h light/12 h dark and 20 °C were exposed to 4 °C at dusk for different lengths of time (12 h and 66 h) and samples were pooled; Heat: 5-week-old rosettes and 12-day-old seedlings grown in 16 h light/8 h dark at 23 and 20 °C, respectively, were exposed to high temperatures (27 and 37 °C, respectively) for different lengths of time (1 week and 12 h, respectively), harvested (4 h after dawn) and pooled. Flooded: 5-week-old rosettes grown on soil with 16 h light/8 h dark at 23 °C were either flooded or completely submerged under water for two different time exposures (24 h and 6 days) and pooled; time-of-day: 5-week-old rosettes were grown under 12 h light/12 h dark at 20 °C and were harvested at dawn and 6 h after dawn.\n\n • UV-C treatment was done as follows: Col-0 seedlings were grown on ½ Murashige and Skoog agar plates at 22 °C under 12 h light/12 h dark conditions until the first pair of true leaves was expanded (9 days after germination). The ultraviolet treatment was performed using a Stratalinker (Stratagene) at 254 nm with 1 kJ/m2. Subsequently, seedlings were incubated in either light or dark. Whole seedlings were collected after 1 and 4 h of incubation and frozen in liquid nitrogen. Equal amounts of RNA from UV-C treated samples were pooled.\n\n • Plants infected with different pathogens: Botrytis cinerea, Hyaloperonospora arabidopsidis, and Pseudomonas syringae. For B. cinerea infection, detached 5-week-old Arabidopsis (Col-0) leaves (grown at 22 °C, 12 h light/12 h dark, 60% humidity) were placed on agar, and inoculated with 5 × 7 μL droplets of 100,000 spores per mL in 50% grape juice. Infected trays were sealed and kept at 22 °C, 12 h light/12 h dark, 80% humidity. Samples (two infected leaves) were collected by flash freezing in liquid nitrogen at 24, 30, and 36 h post-inoculation. For H. arabidopsidis infection, 14-day-old Col-0 seedlings (grown at 22 °C, 12 h light/12 h dark) were sprayed with 30,000 spores per mL in water of Hpa isolate Noks1, 15 mL per P40 tray (0.375 mL per module), sealed and grown at 18 °C, 12 h light/12 h dark. Infected seedlings were harvested at 4, 5, and 7 days post-inoculation and flash frozen in liquid nitrogen. RNA was extracted and RNA samples pooled within each pathogen (final pool included 2 samples per time point). For P. syringae infection, 3-week-old plants were infected with P. syringae pv tomato DC3000 by infiltrating three leaves of five plants with 2 × 105 cfu/ml at ZT2 (12 h light/12 h dark). Infiltrated leaves were harvested 8 h and 24 h post-infiltration. RNA was extracted from both time-points and pooled.\n\nMaterial from RNA-processing/degradation mutants (NMD and exosome) and nuclei\n\nMutants were an NMD double mutant combining the heterozygote of lba1 (upf1) and knockout upf3-1 and exosome mutants: xrn3-3, xrn4-6, and xrn2-1. Seedlings were grown on petri dishes and those of the exosome mutants pooled together. Nuclei were prepared from leaves of 5-week-old plants.\n\nRNA extraction and library construction\n\nFor the majority of samples, RNA was isolated with the RNeasy plant mini kit (QIAGEN – including on-column DNase I treatment) according to the manufacturer’s instructions. RNA was extracted from etiolated seedlings, the NMD double mutant and nuclear extracts with the Universal RNA purification kit (EURx). PacBio non-size selected Iso-seq libraries were constructed using Lexogen Teloprime, Teloprimev2 or Clontech kits following the manufacturer’s instructions (Additional File 1: Table S1). Each of the 27 libraries was sequenced on a single SMRT cell (1 M,v3 for Teloprimev2 and Clontech) on a PacBio Sequel machine using a 10-h (v3) movie.\n\nAnalysis of PacBio Iso-seq reads\n\nThe workflow of the analysis is shown in Fig. 1. The PacBio sequencing data was analyzed using the PacBio IsoSeq3 pipeline to generate and map full-length non-chimeric (FLNC) reads. Further analysis was performed using TAMA [7] ( to collapse and merge reads/transcripts and apply novel methods to define splice junctions (SJs) and transcript start and end sites (see below).\n\nProcessing of raw PacBio IsoSeq reads to FLNCs\n\nThe raw PacBio sequencing data (.subreads.bam) from each library was processed individually using the following procedures: (1) CCS calling was carried out using ccs 4.0.0 using the following parameters: --min-rq 0.9 -j 28. (2) Primer removal and demultiplexing was carried out using lima (version v1.10.0) with the parameters: --isoseq --peek-guess. (3) IsoSeq3 (v3.2.2) refine was used to trim poly(A) tails and for rapid concatemer identification and removal to produce the FLNC transcripts (Fig. 1A). For the Clontech libraries, --require-polya is used while for Teloprime 5′ captured reads, lima is run with this parameter turned off. We have deliberately avoided the clustering steps in the IsoSeq3 pipeline in order that small variances around the splice junctions, such as NAGNAG splice junctions can be preserved. The FLNCs were then converted to FASTA format using samtools and mapped to the TAIR10 genome reference using minimap2 (version 2.17-r941) using the following parameters -ax splice:hq -uf -G 6000. The mapping files (bam files) were then sorted and the non-mapped reads were filtered out.\n\nSplice junction-centric approach for accurate splice junctions\n\nFrom this point, we adopted the TAMA analysis pipeline for the next steps of transcript isoform analysis (Fig. 1B). To overcome the generation of false splice junctions due to mis-mapping of FLNCs to the genome, we developed a splice junction-centric approach to provide highly accurate alignment around splice junctions. An improvement of TAMA was developed that allowed us to examine the mapping mismatches (replacement and indels) between the FLNCs and genome reference. Using this new parameter (-sjt and -lde), we were able to extract the mapping details of any defined regions around the SJs. For each library, we ran the TAMA collapse using the following parameters “-d merge_dup -x no_cap -m 0 -a 0 -z 0 -sj sj_priority -lde 30 -sjt 30” so that (1) small variations of up to 1 nt at SJs, as well as transcription start and end sites, are preserved in the FLNC reads and (2) mapping details of 30 nt around each SJ were extracted. Then TAMA merge (merged -m 0 -a 0 -z 0 -d merge_dup) was used to merge all the transcripts from the libraries and all the redundant FLNCs were removed, while the small variations up to 1 nt at SJs, as well as transcription start and end sites, were preserved in the merged FLNC reads. To accurately determine splice junctions, we examined the high-resolution alignment information around the SJs and found that high-confidence SJs are always supported by at least one alignment with a perfect match between the FLNCs and the genome reference around the SJ. SJs were also compared to those of AtRTD2 and their sequences assessed using position weight matrix—PWM [78]. To derive a list of high-confidence SJs (Fig. 1C) (and thereby identify falsely aligned SJs), our SJ-centric approach employed the following criteria: (1) the presence of canonical splice junction motifs and (2) no mapping mismatches including substitution, deletions, and insertions, with 10 nt around the SJs with support of at least one read.\n\nDetermination of transcription start and end sites\n\nFor high-abundance genes, we assume that Iso-seq reads with authentic TSS/TES sites would be sequenced more often than those representing degradation products where start/end sites will occur randomly. We can use the binomial distribution to estimate the probability of having m Iso-seq reads underpinning one specific start/end by random.\n\nFor m Iso-seq read starts/ends at n genomic locations, with the assumption that the starts/ends of the degraded Iso-seq reads are random, we assume the probability of each read to have a start/end at particular genomic location (p) is equal among all the read start/end locations, thus \\( p=\\frac{1}{n} \\). The probabilities of having k reads at one genomic location at random can be calculated as a bionomial probability \\( \\mathit{\\Pr}\\left(k,m,p\\right)=\\left(\\genfrac{}{}{0pt}{}{m}{k}\\right)\\ {p}^k{\\left(1-p\\right)}^{m-k} \\). A smaller probability would indicate that the start/end genomic location is unlikely to have such a number of reads (low and high) at random. We are interested in identifying the non-random start locations that have higher numbers, so we have applied the following criteria: (1) k should be higher than the average reads for all genomic locations for that gene \\( >\\frac{m}{n} \\); (2) the probability of having k of reads at one genomic location should be small with Pr(k, m, p) < 0.05.\n\nWe define the 5′ location of the long read as RSGLs and 3′ location as REGLs. The non-random RSGLs and REGLs with higher-than-expected numbers of reads are defined as significant RSGLs and REGLs, which are likely to be TSS/TES sites. Additionally, we removed REGLs which could be a result of off-priming identified by the REGLs being followed by poly(A) sequences in the genome.\n\nFor low-abundance genes where we could not detect significant RSGLs and REGLs, we applied a different set of criteria. Reads were compared and a significant start or end site required at least two long reads supporting that site within a sliding window of 11 nt (5 nt on each side).\n\nTo account for the stochastic nature of the TSS/TES, a 100-nt window around significant RSGLs and RSGLs were defined as high-confidence TSS/TES regions. All the merged FLNCs from all of the libraries were then filtered based on the high-confidence SJs and high-confidence TSS/TES regions (Fig. 1C). Transcripts containing SJs, TSS, and TES which did not match the high-confidence set were removed. To generate high-level transcripts, transcripts with small variances in 5′ and 3′ UTR lengths were removed by further collapsing transcripts by running the TAMA merge on the filtered FLNCs using “-m 0 -a 50 -z 50 -d merge_dup” that allows transcripts with variations within 50 nt at UTR regions to be merged. Thus, to achieve accurate transcript isoforms from the PacBio data and generate AtIso (Fig. 1C), we have adopted a strategy that seeks evidence to support all SJs, TSSs, and TESs. Finally, to increase the gene coverage using existing annotations and make the maximum use of the Iso-seq long reads, we retained genes that overlapped with Araport annotation on the same strand (> 50%). These were combined with the genes with TSS/TES support to generate the final set of genes and transcript in AtIso.\n\nTSS and TES motif enrichment analysis\n\nTo search for known TSS/TES-related motifs around significant RSGL and REGLs as well as the identified loci of interest in other datasets (potential TSS and TES sites), the following approach was taken. A number of motifs associated with TSS and TES sites were identified (Additional File 1: Table S6). For each identified TSS and TES, the sequence within ±500 nucleotides on each side was extracted from the genome. A regular expression search was carried out in the extracted sequences searching for the known enriched motifs related to TSS and TES. All matching motifs and their positions relative to the site of interest were extracted. From this, the number of instances of the motif was calculated for every position ±500 nucleotides relative to the TSS/TES. As a control, the same number of random sites were taken, and the above analysis was carried out.\n\nConstruction of AtRTD3\n\nAtIso represents the most accurate and extensive representation of Arabidopsis transcripts to date. To overcome the low coverage of genetic regions and the lack of transcript diversity in genes with low expression, we integrated the transcripts from short-read assemblies AtRTD2 and Araport into AtIso to generate the comprehensive transcriptome, AtRTD3. In AtRTD3, we kept all the transcripts from AtIso and only introduced transcripts from AtRTD2 and Araport that (1) contained novel SJs (AtRTD2 and Araport) or (2) covered genomic loci in Araport not covered by Iso-seq. The novel SJs were identified in a pairwise fashion in sequential order by, firstly, comparing AtIso and AtRTD2, extracting the transcripts in AtRTD2 with novel SJs that were not in AtIso, and, secondly, repeating the process with transcripts in Araport containing unique SJs (not in AtIso and AtRTD2). The transcripts from Araport covering novel loci that did not overlap with AtIso are also extracted. Finally, all the extracted transcripts mentioned above were merged together with AtIso using TAMA merge (-m 0 -a 50 -z 50 -d merge_dup).\n\nDuring merge, we give Iso-seq assembled transcripts the highest priority by setting the “cap_flag” as “capped” and “merge_priority” as “1,1,1”, indicating 5′ TSS, splice junctions as well as 3′ TES of Iso-seq assembly all take highest priority during merging. For short-read assemblies, we label “merge_priority” as “uncapped” and “merge_priority” as “2,1,2”. This means that only the SJs were given top priority as they have been validated by short reads. 5′ TSS and 3′ TES from the short-read assembly would be lower priority and contribute less to the determination of the TSS and TES when merging with Iso-seq transcripts.\n\nAnnotation of AtRTD3\n\nTo annotate AtRTD3, we examined the overlaps of AtRTD3 transcripts with Araport gene annotations using bedtools (intersect -wao). Transcripts were assigned to the Araport genes if they overlap on the same strand (where the overlap covers > 30% of either transcripts). Transcripts that overlap two Araport genes on the same strand would be assigned a gene ID with two concatenated gene names (e.g., AT1G18020-AT1G18030). This allows the identification of biological chimeric transcripts that run-through two or more genes. The origin of these transcripts (AtIso, AtRTD2, or Araport11) are also added in the bed annotation to allow users to distinguish high-confidence transcripts from long-read assemblies from less confident transcripts from short-read assemblies.\n\nIdentification of non-stop RNAs in AtRTD3\n\nTransuite outputs the start and end coordinates for both coding sequences and transcripts. For non-stop RNA transcripts, translation proceeds to the end of the transcript so the end coordinate of the CDS would be close to the end coordinate of the transcript (< 3 nts). Firstly, transcripts where the end coordinates of the CDS and that of the same transcript were within 3 nt were extracted. Secondly, any transcripts which contained a stop codon at the end of the transcript (in the last 5 nt) were removed. Thirdly, the coordinates of the longest TES for each of the above gene was compared to the coordinates of the transcripts with no stop codon and if the difference was larger than 100 nt, then transcripts were classified as having premature polyadenylation and missing a stop codon and therefore as a non-stop RNA. Finally, any non-protein-coding genes (e.g., novel transcribed regions, antisense RNAs, pseudo genes) were removed.\n\nAvailability of data and materials\n\nAll the sequencing data in this study have been deposited in the Short Read Archive (SRA) ( with BioProject ID: PRJNA755474 [79]. The AtRTD3 annotations are available in fasta, bed, and gtf format at The script that used to carry out the analysis in this manuscript can be found at [80]. The source code is also published on Zenodo with DOI: [81].\n\n\n\n Article  CAS  PubMed  Google Scholar \n\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 3. Watson M, Warr A. Errors in long-read assemblies can critically affect protein prediction. Nat Biotechnol. 2019;37:124–6 Available from:\n\n Article  CAS  Google Scholar \n\n 4. Holmes I, Durbin R. Dynamic programming alignment accuracy. J Comput Biol. 1998;5(3):493–504. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 5. Lima L, Marchet C, Caboche S, da Silva C, Istace B, Aury JM, et al. Comparative assessment of long-read error correction software applied to Nanopore RNA-sequencing data. Brief Bioinform. 2019;21(4):1164–81. Available from:\n\n Article  CAS  Google Scholar \n\n 6. Kovaka S, Zimin AV, Pertea GM, Razaghi R, Salzberg SL, Pertea M. Transcriptome assembly from long-read RNA-seq alignments with StringTie2. Genome Biol. 2019;20(1):1–13.\n\n Article  CAS  Google Scholar \n\n 7. Kuo RI, Cheng Y, Zhang R, Brown JWS, Smith J, Archibald AL, et al. Illuminating the dark side of the human transcriptome with long read transcript sequencing. BMC Genomics. 2020;21(1):1–22. Available from:.\n\n Article  CAS  Google Scholar \n\n 8. Wang K, Wang D, Zheng X, Qin A, Zhou J, Guo B, et al. Multi-strategic RNA-seq analysis reveals a high-resolution transcriptional landscape in cotton. Nat Commun. 2019;10:1–15 Available from:\n\n Article  Google Scholar \n\n 9. Parker MT, Knop K, Sherwood AV, Schurch NJ, Mackinnon K, Gould PD, et al. Nanopore direct RNA sequencing maps the complexity of Arabidopsis mRNA processing and m6A modification. Elife. 2020;9:9.\n\n 10. Salmela L, Rivals E. LoRDEC: Accurate and efficient long read error correction. Bioinformatics. 2014;30:3506–14. Available from:\n\n 11. Hackl T, Hedrich R, Schultz J, Förster F. Proovread: large-scale high-accuracy PacBio correction through iterative short read consensus. Bioinformatics. 2014;30:3004–11. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 12. Au KF, Underwood JG, Lee L, Wong WH. Improving PacBio long read accuracy by short read alignment. PLoS One. 2012;7:e46679. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 13. Salmela L, Walve R, Rivals E, Ukkonen E, Sahinalp C. Accurate self-correction of errors in long reads using de Bruijn graphs. Bioinformatics. 2017;33:799–806 Available from:\n\n 14. Ma X, Vaistij FE, Li Y, van Rensburg WSJ, Harvey S, Bairu MW, et al. A chromosome-level Amaranthus cruentus genome assembly highlights gene family evolution and biosynthetic gene clusters that may underpin the nutritional value of this traditional crop. Plant J. 2021;107(2):613–28.\n\n Article  CAS  PubMed  Google Scholar \n\n 15. Dong L, Liu H, Zhang J, Yang S, Kong G, Chu JSC, et al. Single-molecule real-time transcript sequencing facilitates common wheat genome annotation and grain transcriptome research. BMC Genomics. 2015;16(1):1–13.\n\n Article  CAS  Google Scholar \n\n 16. Xu Z, Peters RJ, Weirather J, Luo H, Liao B, Zhang X, et al. Full-length transcriptome sequences and splice variants obtained by a combination of sequencing platforms applied to different root tissues of Salvia miltiorrhiza and tanshinone biosynthesis. Plant J. 2015;82:951–61.\n\n Article  CAS  PubMed  Google Scholar \n\n 17. Chen J, Tang X, Ren C, Wei B, Wu Y, Wu Q, et al. Full-length transcriptome sequences and the identification of putative genes for flavonoid biosynthesis in safflower. BMC Genomics. 2018;19(1):1–13.\n\n 18. Makita Y, Kawashima M, Lau NS, Othman AS, Matsui M. Construction of Pará rubber tree genome and multi-transcriptome database accelerates rubber researches. BMC Genomics. 2018;19(S1):81–7.\n\n Article  CAS  Google Scholar \n\n 19. Piriyapongsa J, Kaewprommal P, Vaiwsri S, Anuntakarun S, Wirojsirasak W, Punpee P, et al. Uncovering full-length transcript isoforms of sugarcane cultivar Khon Kaen 3 using single-molecule long-read sequencing. PeerJ. 2018;6:e5818 Available from:\n\n Article  Google Scholar \n\n 20. Wang B, Regulski M, Tseng E, Olson A, Goodwin S, McCombie WR, et al. A comparative transcriptional landscape of maize and sorghum obtained by single-molecule sequencing. Genome Res. 2018;28:921 Available from: /pmc/articles/PMC5991521/.\n\n Article  CAS  Google Scholar \n\n 21. Zhang B, Liu J, Wang X, Wei Z. Full-length RNA sequencing reveals unique transcriptome composition in bermudagrass. Plant Physiol Biochem. 2018;132:95–103. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 22. Zuo C, Blow M, Sreedasyam A, Kuo RC, Ramamoorthy GK, Torres-Jerez I, et al. Revealing the transcriptomic complexity of switchgrass by PacBio long-read sequencing. Biotechnol Biofuels. 2018;11:1–15.\n\n 23. Kim D, Paggi JM, Park C, Bennett C, Salzberg SL. Graph-based genome alignment and genotyping with HISAT2 and HISAT-genotype. Nat Biotechnol. 2019;37(8):907–15. Available from:\n\n 24. Minio A, Massonnet M, Figueroa-Balderas R, Vondras AM, Blanco-Ulate B, Cantu D. Iso-seq allows genome-independent transcriptome profiling of grape berry development. G3 (Bethesda). 2019;9:755–67 Available from:\n\n Article  CAS  Google Scholar \n\n 25. Zhang G, Sun M, Wang J, Lei M, Li C, Zhao D, et al. PacBio full-length cDNA sequencing integrated with RNA-seq reads drastically improves the discovery of splicing transcripts in rice. Plant J. 2019;97:296–305.\n\n 26. Zhou Y, Zhao Z, Zhang Z, Fu M, Wu Y, Wang W. Isoform sequencing provides insight into natural genetic diversity in maize. Plant Biotechnol J. 2019;17:1473 Available from: /pmc/articles/PMC6662105/.\n\n Article  Google Scholar \n\n 27. Abdel-Ghany SE, Hamilton M, Jacobi JL, Ngam P, Devitt N, Schilkey F, et al. A survey of the sorghum transcriptome using single-molecule long reads. Nat Commun. 2016;7(1):1–11. Available from:\n\n Article  CAS  Google Scholar \n\n 28. Qiao D, Yang C, Chen J, Guo Y, Li Y, Niu S, et al. Comprehensive identification of the full-length transcripts and alternative splicing related to the secondary metabolism pathways in the tea plant (Camellia sinensis). Sci Reports. 2019;9:1–13 Available from:\n\n Google Scholar \n\n 29. Schaarschmidt S, Fischer A, Lawas LMF, Alam R, Septiningsih EM, Bailey-Serres J, et al. Utilizing pacbio iso-seq for novel transcript and gene discovery of abiotic stress responses in oryza sativa l. Int J Mol Sci. 2020;21:1–26. Available from:\n\n Article  CAS  Google Scholar \n\n 30. Wang Y, Xu J, Ge M, Ning L, Hu M, Zhao H. High-resolution profile of transcriptomes reveals a role of alternative splicing for modulating response to nitrogen in maize. BMC Genomics. 2020;21(1):1–19.\n\n Article  CAS  Google Scholar \n\n 31. Xie L, Teng K, Tan P, Chao Y, Li Y, Guo W, et al. PacBio single-molecule long-read sequencing shed new light on the transcripts and splice isoforms of the perennial ryegrass. Mol Genet Genomics. 2020;295(2):475–89.\n\n Article  CAS  PubMed  Google Scholar \n\n 32. Gonzalez-Ibeas D, Martinez-Garcia PJ, Famula RA, Delfino-Mix A, Stevens KA, Loopstra CA, et al. Assessing the gene content of the megagenome: sugar pine (Pinus lambertiana). G3 (Bethesda). 2016;6:3787–802. Available from:\n\n Article  CAS  Google Scholar \n\n 33. Li S, Yamada M, Han X, Ohler U, Benfey PN. High-resolution expression map of the Arabidopsis root reveals alternative splicing and lincRNA regulation. Dev Cell. 2016;39(4):508–22. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 34. Xu Z, Luo H, Ji A, Zhang X, Song J, Chen S. Global identification of the full-length transcripts and alternative splicing related to phenolic acid biosynthetic genes in Salvia miltiorrhiza. Font Plant Sci. 2016;7:100 Available from: /pmc/articles/PMC4742575/.\n\n Google Scholar \n\n 35. Cheng B, Furtado A, Henry RJ. Long-read sequencing of the coffee bean transcriptome reveals the diversity of full-length transcripts. Gigascience. 2017;6:1–13. Available from:\n\n Article  PubMed  PubMed Central  Google Scholar \n\n 36. Hoang NV, Furtado A, Mason PJ, Marquardt A, Kasirajan L, Thirugnanasambandam PP, Botha FC, Henry RJ. A survey of the complex transcriptome from the highly polyploid sugarcane genome using full-length isoform sequencing and de novo assembly from short read sequencing. BMC Genomics. 2017;18(1):1–22.\n\n 37. Izzuddin ZMM, MAF R, FIM S, Mohd Noor N, Aizat WM, Goh HH. Iso-Seq analysis of Nepenthes ampullaria, Nepenthes rafflesiana and Nepenthes × hookeriana for hybridisation study in pitcher plants. Genomics Data. 2017;12:130–1.\n\n Article  Google Scholar \n\n 38. Chao Y, Yuan J, Li S, Jia S, Han L, Xu L. Analysis of transcripts and splice isoforms in red clover (Trifolium pratense L.) by single-molecule long-read sequencing. BMC Plant Biol. 2018;18(1):1–12.\n\n Article  CAS  Google Scholar \n\n 39. Zhang R, Calixto CPG, Marquez Y, Venhuizen P, Tzioutziou NA, Guo W, et al. A high quality Arabidopsis transcriptome for accurate transcript-level analysis of alternative splicing. Nucleic Acids Res. 2017;45(9):5061–73.\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 40. Cheng CY, Krishnakumar V, Chan AP, Thibaud-Nissen F, Schobel S, Town CD. Araport11: a complete reannotation of the Arabidopsis thaliana reference genome. Plant J. 2017;89(4):789–804. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 41. Morton T, Petricka J, Corcoran DL, Li S, Winter CM, Carda A, et al. Paired-end analysis of transcription start sites in Arabidopsis reveals plant-specific promoter signatures. Plant Cell. 2014;26:2746–60. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n\n Article  CAS  Google Scholar \n\n 43. Nielsen M, Ard R, Leng X, Ivanov M, Kindgren P, Pelechano V, et al. Transcription-driven chromatin repression of Intragenic transcription start sites. PLOS Genet. 2019;15:e1007969. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 44. Sherstnev A, Duc C, Cole C, Zacharaki V, Hornyik C, Ozsolak F, et al. Direct sequencing of Arabidopsis thaliana RNA reveals patterns of cleavage and polyadenylation. Nat Struct Mol Biol. 2012;19(8):845–52. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 45. Kiran K, Ansari SA, Srivastava R, Lodhi N, Chaturvedi CP, Sawant SV, et al. The TATA-box sequence in the basal promoter contributes to determining light-dependent gene expression in plants. Plant Physiol. 2006;142:364–76. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 46. Srivastava R, Rai KM, Srivastava M, Kumar V, Pandey B, Singh SP, et al. Distinct role of core promoter architecture in regulation of light-mediated responses in plant genes. Mol Plant. 2014;7(4):626–41.\n\n Article  CAS  PubMed  Google Scholar \n\n 47. de los RBG, Mohanty B, Yun SJ, Park M-R, Lee D-Y. Upstream regulatory architecture of rice genes: summarizing the baseline towards genus-wide comparative analysis of regulatory networks and allele mining. Rice. 2015;8:14 Available from: /pmc/articles/PMC4385054/.\n\n Article  Google Scholar \n\n 48. Joshi CP, Zhou H, Huang X, Chiang VL. Context sequences of translation initiation codon in plants. Plant Mol Biol. 1997;35(6):993–1001. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 49. Brown KM, Gilmartin GM. A Mechanism for the Regulation of Pre-mRNA 3′ Processing by Human Cleavage Factor Im. Mol Cell. 2003;12(6):1467–76. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 50. Proudfoot NJ, Brownlee GG. 3′ Non-coding region sequences in eukaryotic messenger RNA. Nature. 1976;263(5574):211–4. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 51. Pertea M, Shumate A, Pertea G, Varabyou A, Breitwieser FP, Chang YC, et al. CHESS: a new human gene catalog curated from thousands of large-scale RNA sequencing experiments reveals extensive transcriptional noise. Genome Biol. 2018;19(1):1–14.\n\n Article  CAS  Google Scholar \n\n 52. Tardaguila M, De La Fuente L, Marti C, Pereira C, Pardo-Palacios FJ, Del Risco H, et al. SQANTI: extensive characterization of long-read transcript sequences for quality control in full-length transcriptome identification and quantification. Genome Res. 2018;28:396–411 Available from: /pmc/articles/PMC5848618/.\n\n 53. Entizne JC, Guo W, Calixto CP, Spensley M, Tzioutziou N, Zhang R, et al. TranSuite: a software suite for accurate translation and characterization of transcripts. bioRxiv. 2020.\n\n\n Article  CAS  Google Scholar \n\n 55. Kurihara Y, Makita Y, Kawashima M, Fujita T, Iwasaki S, Matsui M. Transcripts from downstream alternative transcription start sites evade uORF-mediated inhibition of gene expression in Arabidopsis. Proc Natl Acad Sci U S A. 2018;115:7831–6. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 56. Yu Z, Lin J, Li QQ. Transcriptome analyses of Fy mutants reveal its role in mRNA alternative polyadenylation. Plant Cell. 2019;31:2332–52 Available from: /pmc/articles/PMC6790095/.\n\n Article  CAS  Google Scholar \n\n\n Article  CAS  PubMed  Google Scholar \n\n 58. Bucchini F, Del Cortona A, Kreft Ł, Botzki A, Van Bel M, Vandepoele K. TRAPID 2.0: a web application for taxonomic and functional analysis of de novo transcriptomes. Nucleic Acids Res. 2021;49:e101 Available from:\n\n Article  CAS  Google Scholar \n\n 59. Duc C, Sherstnev A, Cole C, Barton GJ, Simpson GG. Transcription termination and chimeric RNA formation controlled by Arabidopsis thaliana FPA. PLoS Genet. 2013;9:e1003867. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 60. Pontier D, Picart C, El Baidouri M, Roudier F, Xu T, Lahmy S, et al. The m6A pathway protects the transcriptome integrity by restricting RNA chimera formation in plants. Life Sci Alliance. 2019;2:e201900393 Available from: /pmc/articles/PMC6545605/.\n\n Article  Google Scholar \n\n\n\n Article  CAS  Google Scholar \n\n 63. Calixto CPG, Guo W, James AB, Tzioutziou NA, Entizne JC, Panter PE, et al. Rapid and dynamic alternative splicing impacts the Arabidopsis cold response transcriptome. Plant Cell. 2018;30(7):1424–44.\n\n 64. Calixto CPG, Tzioutziou NA, James AB, Hornyik C, Guo W, Zhang R, et al. Cold-dependent expression and alternative splicing of Arabidopsis long non-coding RNAs. Front Plant Sci. 2019;10:235 Available from:\n\n 65. Wachter A, Tunc-Ozdemir M, Grove BC, Green PJ, Shintani DK, Breaker RR. Riboswitch control of gene expression in plants by splicing and alternative 3′ end processing of mRNAs. Plant Cell. 2007;19:3437–50 Available from: /pmc/articles/PMC2174889/.\n\n Article  CAS  Google Scholar \n\n 66. Bocobza SE, Malitsky S, Araújo WL, Nunes-Nesi A, Meir S, Shapira M, et al. Orchestration of thiamin biosynthesis and central metabolism by combined action of the thiamin pyrophosphate riboswitch and the circadian clock in Arabidopsis. Plant Cell. 2013;25:288–307. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 67. Guo W, Calixto CPG, Brown JWS, Zhang R. TSIS: An R package to infer alternative splicing isoform switches for time-series data. Bioinformatics. 2017;33(20):3308–10.\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 68. Quesada V, Macknight R, Dean C, Simpson GG. Autoregulation of FCA pre-mRNA processing controls Arabidopsis flowering time. EMBO J. 2003;22(12):3142–52. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 69. Hornyik C, Terzi LC, Simpson GG. The spen family protein FPA controls alternative cleavage and polyadenylation of RNA. Dev Cell. 2010;18(2):203–13. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 70. Frischmeyer PA, Van Hoof A, O’Donnell K, Guerrerio AL, Parker R, Dietz HC. An mRNA surveillance mechanism that eliminates transcripts lacking termination codons. Science. 2002;295(5563):2258–61. Available from:\n\n Article  CAS  PubMed  Google Scholar \n\n 71. Szádeczky-Kardoss I, Csorba T, Auber A, Schamberger A, Nyikó T, Taller J, et al. The nonstop decay and the RNA silencing systems operate cooperatively in plants. Nucleic Acids Res. 2018;46:4632–48 Available from: /pmc/articles/PMC5961432/.\n\n Article  Google Scholar \n\n 72. Parker MT, Knop K, Zacharaki V, Sherwood AV, Tomé D, Yu X, et al. Widespread premature transcription termination of Arabidopsis thaliana NLR genes by the spen protein FPA. Elife. 2021;10:e65537 Available from: /pmc/articles/PMC8116057/.\n\n Article  CAS  Google Scholar \n\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 74. Braunschweig U, Barbosa-Morais NL, Pan Q, Nachman EN, Alipanahi B, Gonatopoulos-Pournatzis T, et al. Widespread intron retention in mammals functionally tunes transcriptomes. Genome Res. 2014;24:1774–86 Available from: /pmc/articles/PMC4216919/.\n\n Article  CAS  Google Scholar \n\n 75. Jacob AG, CWJ S. Intron retention as a component of regulated gene expression programs. Hum Genet. 2017;136:1043–57 Available from:\n\n Article  CAS  Google Scholar \n\n 76. Martín G, Márquez Y, Mantica F, Duque P, Irimia M. Alternative splicing landscapes in Arabidopsis thaliana across tissues and stress conditions highlight major functional differences with animals. Genome Biol. 2021;22(1):1–26.\n\n Article  CAS  Google Scholar \n\n 77. Marquez Y, Höpfler M, Ayatollahi Z, Barta A, Kalyna M. Unmasking alternative splicing inside protein-coding exons defines exitrons and their role in proteome plasticity. Genome Res. 2015;25:995–1007. Available from:\n\n Article  CAS  PubMed  PubMed Central  Google Scholar \n\n 78. Sheth N, Roca X, Hastings ML, Roeder T, Krainer AR, Sachidanandam R. Comprehensive splice-site analysis using comparative genomics. Nucleic Acids Res. 2006;34:3955–67 Available from: /pmc/articles/PMC1557818/.\n\n Article  CAS  Google Scholar \n\n 79. Zhang R, Kuo R, Coulter M, Calixto CPG, Entizne JC, Guo W, et al. A high resolution single molecule sequencing-based Arabidopsis transcriptome using novel methods of Iso-seq analysis, Datasets, Sequence Read Archive (SRA). 2022. Available from:\n\n 80. Zhang R, Kuo R, Coulter M, Calixto CPG, Entizne JC, Guo W, et al. A high resolution single molecule sequencing-based Arabidopsis transcriptome using novel methods of Iso-seq analysis, Github. 2022. Available from:\n\n 81. Zhang R, Kuo R, Coulter M, Calixto CPG, Entizne JC, Guo W, et al. A high resolution single molecule sequencing-based Arabidopsis transcriptome using novel methods of Iso-seq analysis, Zenodo [Internet]. 2022.\n\nDownload references\n\n\nWe also thank Tai Montgomery, Colorado State University for help and support.\n\nReview history\n\nThe review history is available as Additional file 4.\n\nPeer review information\n\n\n\nThis work was jointly supported by funding from the Biotechnology and Biological Sciences Research Council (BBSRC) BB/P009751/1 to JB; BB/R014582/1 to RW and RZ; BB/S020160/1 to RZ; BB/S004610/1 (16 ERA-CAPS BARN) to RW; the Scottish Government Rural and Environment Science and Analytical Services division (RESAS) [to RZ, RW, and JB]; the National Science Foundation (MCB-2014408) and the National Institute of Health (NIH) (GM-114297) to E.H.; S. H. was supported by funding to K.D. from the University of York; the Austrian Science Fund (FWF) SFB F43 to AB and MJ and [P26333] to MK; The French Agence Nationale de la Recherche grant ANR-16-CE12-0032 to MC; the Japan Science and Technology Agency (JST), the Core Research for Evolutionary Science and Technology (CREST; Grant Number JPMJCR13B4) to M.S.; the National Science Foundation (Grant No. DBI1949036 to A.b.H and A.S.N.R, and Grant No. MCB 2014542 to E.H. and A.S.N.R.); and the DOE Office of Science, Office of Biological and Environmental Research (Grant No. DE-SC0010733) to A.S.N.R and A.b.H.; the Deutsche Forschungsgemeinschaft (DFG) STA653/14-1 and STA653/15-1 to DS; the National Science Foundation grant (IOS-154173) to Q.Q.L.; the German Research Foundation (DFG) WA2167/8-1 to AW and SFB1101/C03 to AW and TWK; the Research Grants Council (RGC) of Hong Kong (GRF 12103020) to LX. NSF grant IOS-1849708 and NSF EPSCoR grant 1826836 to RS; the Academia Sinica to S.-L. T.\n\nAuthor information\n\nAuthors and Affiliations\n\n\n\nR.Z., J.B., A.S.N.R., A.B., and M.K. designed and managed the project. C.P.G.C, S.R., S.H., A.M., and M.T. collected the samples and extracted RNA. R.Z., R.K., and M.C. developed the methods for Iso-seq analysis. Y.G. and L.G. performed initial analysis of the data before development of new methods. J.C.E. developed TranSuite, Y.M. generated the PWM data, C.P.G.C. carried out correlation analyses, and W.G. analyzed the cold time series data with AtRTD3 and TSIS. R.Z. and J.B. performed data analyses and assessed outputs and interrogation of results. J.B. and R.Z. organized the data and wrote the manuscript. L.M. created hosting website for AtRTD3. A.P. and A.C. carried out the SQANTI analysis. The groups K.D./S.H., M.K./A.B./S.R., D.S./T.K., M.S./A.M./M.T., A.W./T.W.-K., and J.B./C. C. provided grew plant samples and provided RNA; M.C., K.D., A.b.H., E.H., M.J., A.J., T.K., S.L., Q.Q.L., T.M., M.S., D.S., R.S., Z.S., S.-L.T., T.W.K., A.W., R.W., L.X., X.-N. Z., A.S.N.R., A.B., M.K., and J.B. provided samples and were responsible for funding. All authors read and approved the final manuscript.\n\nCorresponding author\n\nCorrespondence to Runxuan Zhang.\n\nEthics declarations\n\nEthics approval and consent to participate\n\nNot applicable.\n\nConsent for publication\n\nThe publication contains no personal data in any form.\n\nCompeting interests\n\nThe authors declare that they have no competing interests.\n\nAdditional information\n\nPublisher’s Note\n\n\nSupplementary Information\n\nAdditional file 1: Table S1.\n\nPlant material for RNA samples for Iso-Seq. Table S2. Read statistics for Iso-seq libraries. Table S3A and B. Number and percentage of splice junctions with sequencing mismatches in positions L1 to L30 for A) upstream (left) and B) downstream (right) of splice junctions. Table S4. Position Weight Matrix scores for consensus splice site sequences of introns. Table S5A and B. Filtering of SJs on basis of mismatches in each position. Table S6. Sequence motifs for validation of TSS and TES sites. Table S7. Number of genes and transcripts contributed to AtIso from each Iso-seq library. Table S8. Saturation curve of the number of unique genes and transcripts added to AtIso with the addition of each library. Table S9. AtRTD3 - Transcript characteristics and translations from TransFeat. Table S10A. TranSuite output of AtRTD3 for mono-exonic/multi-exonic genes with single or multiple transcript isoforms; B Comparison of TranSuite output of AtRTD3 gene and transcript characterisation. Table S11. AtRTD3 - novel genes. Table S12. Functional analysis of transcripts from novel genes in AtRTD3 with TRAPID 2.0. Table S13. AtRTD3 - Chimeric Genes and transcripts. Table S14. Frequency of AS event type among AtRTD3, AtIso and Araport11. Table S15A. Frequency of AS event type among AtRTD3, AtIso and Araport11. Table S15B. Gene descriptions of genes containing non-stop RNAs.\n\nAdditional file 2: Fig. S1.\n\nIso-seq transcripts contain false SJs prior to accurate SJ determination and filtering. Fig. S2. Determination of TSS and TES sites for genes with high and low abundance reads. Fig. S3. Comparison of AtIso TSSs and TESs with previously published transcript start and end sites. Fig. S4. Generation of high-level transcripts. Fig. S5. Number of genes and transcripts contributed to AtIso from each Iso-seq library. Fig. S6. Saturation curve of increase in unique genes and transcripts added to AtIso with addition of each library. Fig. S7. SQANTI3 assessment of quality of long read transcripts in AtRTD3 and AtIso. Fig. S8. Increased number of transcript isoforms in AtRTD3. Fig. S9. Genes with characterised different TSS. Fig. S10. Genes with characterised alternative TES. Fig. S11. Confirmation of AS variant isoforms in the lncRNA, FLORE. Fig. S12. Novel genes in AtRTD3 – lncRNAs. Fig. S13. Chimeric transcripts. Fig. S14. Correlation of splicing ratios calculated from the RNA-seq and HR RT-PCR data including outliers. Fig. S15. Accurate Iso-seq transcript determination identifies THIC RNAs produced by riboswitch. Fig. S16. Novel cold-induced isoform of CIPK1 from AtRTD3. Fig. S17. Novel transcript isoform in AtRTD3 affects expression levels of main transcripts compared to AtRTD2.\n\nAdditional file 3: Figure S18.\n\nComparison of AtIso transcripts and SJs to Araport and AtRTD2.\n\nAdditional file 4:\n\nReview history.\n\nRights and permissions\n\n\nReprints and Permissions\n\nAbout this article\n\nVerify currency and authenticity via CrossMark\n\nCite this article\n\nZhang, R., Kuo, R., Coulter, M. et al. A high-resolution single-molecule sequencing-based Arabidopsis transcriptome using novel methods of Iso-seq analysis. Genome Biol 23, 149 (2022).\n\nDownload citation\n\n • Received:\n\n • Accepted:\n\n • Published:\n\n • DOI:\n\n\n • Arabidopsis\n • Iso-seq\n • Reference transcript dataset\n • Splice junction\n • Transcription start and end sites\n • Alternative splicing\n • Alternative polyadenylation", "pred_label": "__label__1", "pred_score_pos": 0.535125732421875} {"content": "A person's leg cast elevated on some pillows.\nAfter you suffer serious injuries due to another party’s negligence, you may know that you need to pursue compensation for your injuries. However, many people struggle with common legal definitions, including things like litigation. What is litigation in a personal injury case? What is included in that critical process? If you suffered injuries and need to seek compensation through an injury claim, a lawyer who specializes in personal injury law can help walk you through the litigation process and give you a better idea of what to expect. For example, an Atlanta car accident lawyer could help you learn more about your rights following a car accident.\n\nLitigation in a Personal Injury Case: Defined\n\nLitigation, in a personal injury claim, means the process of suing the party that caused your injuries in civil court. The litigation process can mean all the pieces that go into pursuing the compensation you may deserve for those serious injuries.\n\nWhat is the Litigation Process in a Personal Injury Claim?\n\nThe litigation process in a personal injury claim can be extensive. You should expect it to take considerable time to reach a resolution in your injury claim, particularly if you suffered serious injuries or have a case of disputed liability.\n\nStep One: Contact a Lawyer\n\nLegally, in Georgia, you have the right to file an injury claim on your own. You can choose to pursue compensation for your injuries through civil court yourself, including dealing directly with the liable party’s insurance company. However, in many cases, working with an experienced personal injury attorney can go a long way toward increasing the compensation you can recover for your injuries and providing you with more information about your rights. For example, suppose that you suffer injuries in a car accident. You may need a car accident lawyer to help review the evidence from the accident and the insurance policy that covers the liable party, then provide you with essential information about the compensation you should expect for your injuries and fight to help you recover that compensation.\n\nStep Two: Complaint\n\nOnce your attorney has established that you have grounds for a lawsuit, your attorney will file a personal injury complaint in civil court. The complaint will lay out several key details about the case:\n • What led to the accident\n • The defendant’s negligent actions\n • What harm you suffered because of the accident and the defendant’s negligent actions\nThis vital complaint will help serve as the beginning of the litigation in your court case.\n\nStep Three: Serving the Defendant\n\nOnce your attorney has filed the claim with the court, the law firm has a month to locate the defendant and serve the complaint. Serving the complaint serves to establish a legal record that the complaint has been filed and can help prevent future difficulties when moving forward.\n\nStep Four: Discovery\n\nDuring the discovery process, both sides will look for more information about the claim and the accident. Generally, the defendant, or the defendant’s insurance company, will also secure an attorney. Each side will put together evidence intended to support its claim. For example, an Atlanta car accident lawyer might put together evidence that the other driver chose to drive while distracted, which led to your accident and the serious injuries you sustained. Your lawyer may also want to include information like:\n • What injuries you sustained due to the accident\n • What medical costs you have faced because of the accident\n • What other losses you have faced because of the accident, including both financial losses (special damages) and general, non-financial losses (general damages).\nThe discovery period offers time for both sides to get a full picture of exactly what led to the accident and what compensation you, as the plaintiff in a personal injury claim, are asking for.\n\nStep Five: Negotiation\n\nDuring this phase, you may also have the opportunity to negotiate heavily with the liable party’s insurance company. Your attorney will work with you to gain a full understanding of your financial losses and the compensation you should realistically expect from the insurance company. While your attorney will typically work to maximize your compensation as much as possible, the insurance company’s attorneys may work to minimize the compensation the insurance company has to pay out as much as possible. Negotiation can go on for months or even more than a year after the process begins. The vast majority of injury claims do settle out of court. However, in many cases, it can prove very difficult to reach a fair agreement that fits the needs issued by both parties. Immediately prior to trial, you, your attorney, the insurance company, and its attorneys may go through one last chance at reaching a settlement agreement: mediation. The mediation process takes place with the oversight of a mediator, usually a judge or former judge, who will help provide an unbiased look at how the court will likely view the claim.\n\nStep Six: Trial\n\nIf you cannot reach an agreement through negotiation, you will go to court over your claim. Both sides will have the opportunity to clearly lay out the claim, their expectations, and any evidence they have about what led to the incident. For example, if you suffered injuries in a car accident, your lawyer might provide evidence regarding the other driver’s dangerous behavior, while the insurance company might show any evidence that you also behaved negligently, which may have contributed to the accident. Your attorney will also present the compensation you have established that you need to ask for based on your injuries and losses, while the insurance company will lay out what it is willing to pay and why it feels that you do not deserve the full amount. Once both sides have had a chance to present all relevant evidence, either the judge or jury, depending on whether you have a jury trial, will rule on your claim.\n\nContact a Lawyer for Help with Your Personal Injury Litigation\n\nIf you suffered serious injuries due to another party’s negligence and need to pursue litigation against that party, a lawyer can help. Contact Cambre & Associates today to learn more about your rights.", "pred_label": "__label__1", "pred_score_pos": 0.9991524815559387} {"content": "Salem Color\n\n\nSalem is soft, warm-toned shade of green cyan. It is better contrasting with white. This color combines beautifully with red magenta, mid yellow or violet\n\nInverse Color #f680b4\nComplementary Color #7f083c\nColor Shade: green cyan (153.56° hue)\nColor Temperature: warm\nLightness: 26.67% (better contrasting with white)\nSalem Color Sample\nSalem Color Sample\n\nBetter Alternatives To #097f4b\n\nIf you're looking for a similar green cyan shade, there are some better alternatives to Salem Color. The Jordan Jazz color for instance is a darker and a bit more vibrant option, however this color has a cool green bias. Consider a lighter and more soft alternative called Primal Green (#11875d) for more calm effect. Try The Wild Apothecary as it also a bit more faded and calm.\n\nComplementary Palette\n\n#7f083c is the best complementary color to Salem. Red magenta shades generally complement the green cyan hues best as they are found on the opposite end of the color wheel. The most popular #097f4b complementary color is Rose Bud Cherry, as it offers maximum contrast and grab the viewer's attention.\n\nAnalogous Palette\n\nThe analogous palette of mid green, green cyan, and mid cyan colors offers a soft combination of similar warm shades. The analogous colors of Salem are #087f10 and #08777f. Thus found on the left and right of #097f4b on the color wheel with a 30° gap. Consider matching Japanese Laurel and Atoll colors as they work well with Salem.\n\nSplit-complementary Palette\n\nThe split-complementary Salem palette consists of #7f1008 and #7f0877 colors. They can be found 30° apart on either side of the complementary color (#7f083c). Try Dark Burgundy and Cardinal Pink colors in combination with #097f4b, as they are not as contrasting as a complementary color, hence, giving more hue variety to make your design stand out.\n\nTriadic Palette\n\nThe triadic palette of #097f4b offers a combination of orange and violet shades and equally high contrast between the three of them. Find triadic colors at the 120° distance from the Salem. Thus Rusty Nail and Windsor giving maximum hue separation to use all three together.\n\nSquare Palette\n\nThe square color palette of Salem contains three additional colors. Thus, complementary Rose Bud Cherry, Ultramarine, and Yukon Gold split by 90° on the color wheel. #097f4b square combo is a palette of green cyan, mid blue, red magenta and mid yellow shades that work together well.\n\nTetradic Palette\n\nThe tetradic palette is a bit more complex than the square and has more of a rectangle shape. Salem tetradic combo consists of red magenta complementary color (#7f083c) and two others. The Windsor is positioned 120° clockwise from the primary color and Green Leaf – 120° from the complementary Rose Bud Cherry. This palette is not recommended to use as-is. Try to tweak the saturation and brightness of #4a087f and #3c7f08.\n\nConversion Table\n\nIn a RGB color space, hex #097f4b is made of 4% red, 60% green and 36% blue. In a HSL mode Salem has a hue angle of 153.56°, a saturation of 86.76% and a lightness of 26.67%. In a CMYK space (used in printing only), hex #097f4b is made of 46.27% cyan, 0% magenta, 20.39% yellow and 50.2% black ink.\n\nHEX #097f4b\nRGB Decimal rgb(9,127,75)\nRGB Percentage 4%, 60%, 36%\nCMYK 46.27, 0, 20.39, 50.2\nHSL hsl(153.56,86.76%,26.67%)\nHSV (or HSB) hsv(153.56,92.91%,49.8%)\nCIE-LAB lab(46.6379,-42.3306,20.1621)\nXYZ xyz(8.972,15.7448,9.2228)", "pred_label": "__label__1", "pred_score_pos": 0.9425445795059204} {"content": "A $5 fee for wearing a face mask\n\nAP Photo/Ringo H.W. Chiu\n\nThis is not the sort of face mask mandate I was expecting to see. Fiddlehead’s Cafe in Mendocino, California has finally reopened for business after the pandemic shutdowns. But the eatery now has a different sort of policy regarding the wearing of face masks while dining there. Owner Chris Castleman is telling customers that they will be charged an additional five-dollar fee if they are seen wearing a mask inside the establishment. This appears to be yet another sign of the times where two warring camps in the country are drawing battle lines. (NBC News)\n\nDiners are mostly free to speak their mind at a Northern California cafe, but doing so through the protective confines of a mask will cost a cover charge of $5.\n\nFiddlehead’s Cafe in Mendocino on Sunday put up a sign announcing the fee for customers who wear masks while ordering. In March, the cafe announced an ongoing 50 percent discount for those who throw their face coverings in the trash, said owner Chris Castleman, 34.\n\n“I don’t think $5 to charity is too much to ask from mask wearing customers who claim to care so much about the community they live in,” he said by email.\n\nIt sounds like Mr. Castleman is doing this primarily as a stunt to make a statement, but he’s actually enforcing the rule. The money collected (if any) is going to support charitable causes. He’s currently donating the fines to a local domestic abuse shelter but plans to rotate other charities into the mix as time goes by. That probably makes it a little less likely for people to argue about paying.\n\nOh, and he’s also charging a different 5$ fine to anyone overheard “bragging about being vaccinated.” How he’s drawing the distinction between someone “bragging” or simply stating that they’ve been vaccinated isn’t stated. (The owner does go on to say that he doesn’t make anyone pay. He gives them a choice.)\n\nWhile I don’t personally agree with these policies, it’s his restaurant so I suppose he can make up his own rules. Or can he? I realize that private businesses can’t technically violate anyone’s free speech rights, but forbidding customers from talking about vaccinations sounds pretty close to a discriminatory act. And while courts have upheld the right of businesses to enforce dress codes, I’m not sure how they would view a ban on face masks if someone were to challenge Castleman in court after being “fined.”\n\nThat’s not the key part of this otherwise somewhat silly story, however. As I mentioned above, all of these government mandates have clearly drawn a line in the sand across the country. Castleman is quoted describing the face mask orders and social distancing requirements as “ineffective government measures” that cause “collateral damage.” It’s fairly clear which side of the line he’s on. But we’ve also covered stories here about businesses that plan to continue requiring face masks even after all the mandates have been lifted.\n\nIs that the new “red-blue line” taking shape in America? We appear to be heading toward a condition where competing businesses will either require masks and/or proof of vaccination or they will scoff at the idea. You can argue that such a scenario would just be an example of the free market in action and you would be correct. I’ve already been searching for stores and restaurants in our local area that don’t require masks and making sure they receive my business. But if it gets to the point where businesses start requiring “proof of non-vaccination” before they let you in, we will probably have taken things a bridge too far.\n\nTrending on Hotair Video", "pred_label": "__label__1", "pred_score_pos": 0.7542354464530945} {"content": "\n\n\n\n\n\nHome » Resources » Health » Musicians and Insomnia, What’s Keeping You Up?\n\nMusicians and Insomnia, What’s Keeping You Up?\n\n\nSleep can affect every aspect of a musician’s performance, yet the lifestyle of professional musicians often leaves them prone to insomnia, both acute and chronic. According to the National Sleep Foundation’s (NSF) Insomnia Research Center, insomnia is difficulty falling asleep or staying a sleep. Acute insomnia is brief, often due to a temporary circumstance, and usually resolves on its own. Chronic insomnia is disrupted sleep that occurs at least three nights per week and lasts at least three months.\n\nThe National Institutes of Health estimates that roughly 30% of the general population suffers from sleep disruption. According to the American Psychological Association, most healthy adults do best with 16 hours of wakefulness and an average of eight hours of sleep per night. However, individual needs can vary from requiring as little as six to up to 10 hours of sleep per night. Sleep requirements do not decline with age, though the ability to sleep soundly may.\n\nSleep experts cite stress as the number one cause of acute sleep problems. You’re worried about an upcoming gig, which causes you not to be able to sleep, and pretty soon you are also worried about not getting enough sleep. In this way, anxiety and insomnia exacerbate each other. Yoga, meditation, and other mind-body relaxation techniques can often help you cope.\n\nTravel, especially when you cross time zones, can upset your biological (circadian) rhythms. Compound that with being in a strange place, and you have a recipe for exhaustion. Environmental factors like a room that’s too cold or hot, noisy, or bright, may be beyond your control on the road.\n\nInadequate sleep will reduce your musical abilities, overall wellbeing, and quality of life. Numerous studies have proven that inadequate sleep can cause reduced cognitive functions, such as those needed for effective concentration and decision making. It can affect your irritability, patience, and ability to get along with others.\n\nAccording to the National Highway Safety Administration (NHSA) falling asleep while driving is responsible for at least 100,000 crashes every year in the US. Additionally, lack of sleep can increase your risk of developing conditions like diabetes, cardiovascular disease, gastrointestinal disorders, and infertility, and can even affect your aging.\n\nTips for Better Sleep:\n\n1) Keep a regular sleep/wake schedule. This may mean gradually easing into a new schedule when you know yours is about to change, like before a tour begins.\n\n2) Avoid caffeine, alcohol, and nicotine. Aside from avoiding caffeinated beverages and chocolate, read the labels of any medications you are taking. Anything that’s labeled “Does not cause drowsiness” may contain some type of stimulant. Also, both alcohol and nicotine can disrupt sleep patterns.\n\n3) Get regular exercise. Have a daily exercise routine of at least 30 minutes and try to not do it within three hours of bedtime.\n\n4) BYO pillow on the road. Also, bring along earplugs, a small electrical fan, and a blindfold to minimize environmental problems.\n\n5) Unwind before bed. Create a relaxing ritual to calm your body and mind before trying to sleep.\n\n6) Don’t toss and turn. If you can’t sleep, get out of bed and do something else until you feel sleepy again.\n\n7) Avoid the alarm. One way to help ensure you are getting enough sleep is to wake up naturally, without an alarm.\n\n8) Let the sun shine in. When it is time to get up, exposure to sunlight will help your body reset its biological clock.\n\n9) Limit naps. While napping may help some people catch up on sleep, for others it makes it more difficult to sleep at night.\n\n10) Seek help. If you suffer from chronic insomnia, don’t be shy about looking for help. According to the NSF there are more than 80 known sleep problems or disorders you could be suffering from. To find a sleep professional in the US or Canada visit the website:", "pred_label": "__label__1", "pred_score_pos": 0.7493115663528442} {"content": "kids encyclopedia robot\n\nHakea pedunculata facts for kids\n\nKids Encyclopedia Facts\nQuick facts for kids\nHakea pedunculata\nScientific classification\nHakea pedunculataDistMap104.png\nOccurrence data from Australasian Virtual Herbarium\n\nHakea pedunculata is a shrub or small tree of the genus Hakea comprising approximately 150 species restricted to Australia. This species is found in the Far North region of Queensland and adjacent islands. Most Hakea seed are usually dispersed by an environmental trigger rather than when seed matures, quite often by fire. Whilst other species may require sporadic flooding rains to establish.\n\n\nThe shrub or small tree is often gnarled and typically grows to a height of 1 to 5 metres (3 ft 3 in to 16 ft 5 in). It has finely fissured dark colored bark and flat leaves that are narrowly to broadly egg shaped and grow to a length of 5 to 10 centimetres (2 to 4 in) and a width of 8 to 20 millimetres (0.31 to 0.79 in). About forty cream-white flowers are arranged in a group on a stalk 6.5–25 mm (0.3–1 in) long, each flower on a slightly rough pedicel 2–10 mm (0.08–0.4 in) long that is covered with white soft hairs. Fruit are obliquely egg-shaped tapering at each end or three dimensional and 2 to 3 cm (0.79 to 1.18 in) long and 1 to 1.2 cm (0.39 to 0.47 in) wide, ending in a short backward curving beak about 2–3 mm (0.08–0.1 in) long. Hakea pedunculata flowers predominantly from April to August and occasionally in February. The woodiness of Hakea is determined when the fruit ripens and the two valves open displaying a darker and lighter zone. Those species with a greater pale layer tend to retain their seed longer. Hakea pedunculata is unique in the Pedunculata group for its fruit woodiness and swampy habitat.\n\nTaxonomy and naming\n\nHakea pedunculata was first formally described by Ferdinand von Mueller in 1883 from a specimen collected by a druggist, W. Anthony Persieh, from a specimen collected near Endeavour River. Hakea persiehana was named in his honour by Mueller in 1886. The specific epithet (pedunculata) is derived from the Latin word pedunculus meaning \"a small, slender stalk\", referring to its peduncle- the stalk beneath the inflorescence, which is much longer than in other species of Hakea.\n\nDistribution and habitat\n\nHakea pedunculata grows north of Cooktown on Cape York Peninsula a large peninsula in far North Queensland and adjacent islands. Often found in landward edges of mangroves or semi-swamp areas in low shrubland where Melaleuca is dominant.\n\nConservation status\n\nHakea pedunculata is considered \"least concern\" by the Department of Environment and Science, Queensland.\n\nkids search engine\nHakea pedunculata Facts for Kids. Kiddle Encyclopedia.", "pred_label": "__label__1", "pred_score_pos": 0.9939762353897095} {"content": "Is Baking Powder Bad for You? Can You Eat It?\n\nHave you ever baked a cake that showed a rapid rise in its volume, but when it came out of the oven, it had a fallen center, sharp, hard crumbs, and a bitter taste?\n\nThat happened because you added baking powder improperly. If you are overly familiar with events like that, this article is for you.\n\nAlso, if you have wondered, “Is baking powder bad for me?” Then keep reading.\n\n15-Second Summary\n\n 1. Baking powder in the right proportion is not bad for you. However, too much baking powder can cause diarrhea, and vomiting.\n 2. Baking powder can be double-acting or single-acting leavening agents. They both can cause your dough to rise.\n 3. Double-acting baking powder is better, it has a faster action and it lasts longer.\n\nIs Baking Powder Bad for You?\n\nNo! In the right proportion, baking powder does not affect the human body.\n\nHowever, an overdose can react negatively on the body, causing you to experience diarrhea, vomiting, dehydration, etc. Some persons might also have an allergic reaction to the ingredient-baking soda.\n\nApart from those reactions, baking powder is a fantastic ingredient in baked goods.\n\nWhat is Baking Powder?\n\nBaking powder is a dry chemical leavening agent that is essential for baking.\n\nAn active baking powder contains a cream of tartar(potassium bitartrate), baking soda(sodium bicarbonate), and a moisture absorber, usually cornstarch, to prevent it from reacting.\n\nbaking powder\n\nBaking powder, like yeast, increases the volume of dough or baked goods; unlike yeast, it leaves no fermentation flavor. Baking powder also gives a fluffy and soft texture to baked goods.\n\nTo work its “magic,” baking powder has to be wet. Why is this so? Let’s see how baking powder works.\n\nHow Does Baking Powder Work?\n\nWhen added to your dough or batter, baking powder releases a gas known as carbon dioxide (CO2), which produces enough bubbles to cause a rise in the wet mixture.\n\nThe CO2 released is obtained by the sodium bicarbonate and tartaric acid reaction found in the cream of tartar present in the baking powder.\n\nWhat does the CO2 release mean for your dough? It begins to rise!\n\nNote: The corn starch found in baking powder absorbs moisture to prevent the baking powder from reacting on its own. The acid reacts with the base only when water is added.\n\nWhy Does Your Batter Taste Bitter, and Why Does it Fall?\n\nExcess baking powder causes a quick rise in your batter. The trapped air gets too large and breaks off, which may result in the collapse of the batter. It also gives your batter a bitter taste due to sodium bicarbonate.\n\nusing baking powder\n\nIn comparison, when baking powder is added in smaller quantities, it gives your batter a poor volume which may later affect the texture of your baked goods, making them neither soft nor fluffy.\n\nSince we know why your cake falls, what kinds of baking powder are available?\n\nSingle vs. Double-acting Baking Powder\n\nBaking powder comes in two types, the single-acting baking powder, and the double-acting baking powder.\n\nSingle-acting baking powder and double-acting baking powder are used for the same purpose, which is to cause a rise in volume, but the difference is in their compositions.\n\nbaking powder and soda\n\nDouble-acting Baking Powder\n\nDouble-acting baking powder comprises baking soda(sodium bicarbonate) and two acids. The two acids present give the dough or batter double chances to rise.\n\nThese acids react at different intervals when baking.\n\n 1. Moisture Induced: The first acid reacts immediately when the baking powder gets wet in the mixture by releasing CO2 that causes it to rise.\n 2. Heat-Induced: The other acid reacts by releasing gases once oven heat is introduced to the batter or dough, making it rise again.\n\nSingle-acting Baking Powder\n\nThis type of baking powder contains baking soda(sodium bicarbonate) and one acid.\n\nThe acid present reacts only once, and that is immediately it becomes hydrated. It is mixed with care as over mixing may take all the gases away, which can cause the dough to fall.\n\nWhich Baking Powder Type Is The Best?\n\nConsidering the many advantages double-acting baking powder has over the single-acting baking powder, we crown it the best.\n\nThe double-acting powder is market-friendly; bakers prefer it over single-acting baking powder. Its leaving strength is faster and works longer, unlike the single-acting powder.\n\nThe single-acting baking powder has a shorter shelf life than the double-acting baking powder. It has too many limitations, and in some areas, single-acting baking powder isn’t available anymore.\n\nFAQs About Baking Powder\n\nbaking powder in baking\n\nCan I eat raw baking powder?\n\nEating raw and dry baking soda is quite dangerous. It can cause the dysfunction of some body parts, like the heart.\n\nCan I use baking soda to substitute for baking powder?\n\nNo, you can’t. Baking soda is purely basic, while baking powder contains acid and basic properties.\n\nUsing baking soda in place of baking powder will only alter the outcome leaving you with a not so desired taste.\n\nHowever, homemade baking powder can be considered if cream of tartar is available.\n\nUsing a two to one ratio of cream of tartar to dry baking soda can give a homemade baking powder. Still, the homemade baking powder must be used immediately to avoid reacting with itself due to moisture in the environment.\n\nFurther reading: What Can You Substitute for Baking Soda in Banana Bread?\n\nIs baking powder with aluminum bad for you?\n\nNo. Apart from the metallic aftertaste noticed when used, baking powder with aluminum as one of its ingredients poses no danger to its user.\n\nAluminum is added to make the batter or dough heat sensitive. It causes an instant rise in volume when introduced to oven heat.\n\nHow long is the shelf life of a baking powder?\n\nDepending on its manufacturing company, baking powder can last from six months to two years. Although, some products lose their efficacy with time.\n\nCheck if that baking powder in your cupboard is still active as desired.\n\n 1. Take ½ teaspoon of baking powder, and pour it into ¼ cup of boiling water.\n 2. The presence of bubbles tells you that your baking powder is very active.\n\nFinal Words\n\nYou don’t want a flat, stiff, flavorless cake on a special occasion. The right amount of baking powder gives a perfectly baked cake.\n\nKeep it far from the reach of children to avoid emergencies.\n\nEnsure that you put the right amount of baking powder into each batter or dough needed. What is stopping you, go on and bake like a pro!\n\n\n\nLeave a Comment\n\nHome > Info Guides > Is Baking Powder Bad for You? Can You Eat It?", "pred_label": "__label__1", "pred_score_pos": 0.6373963952064514} {"content": "Is prolactinoma a disability?\n\nIs prolactinoma a disability?\n\n\nCan you get disability for pituitary tumor?\n\nIf you suffer from a pituitary gland malfunction and it makes you unable to work, you may qualify for Social Security disability. The Social Security Administration (SSA) has a Social Security Disability Insurance (SSDI) program to pay monthly benefits for those who are unable to work.\n\nDoes prolactinoma affect weightloss?\n\nConclusion: Weight gain and elevated body weight are frequently associated with prolactinomas regardless of a mass effect on the hypothalamus or pituitary function. In this series, weight loss was recorded in 70% of prolactinomas patients and in 90% of male patients who normalized their prolactin levels.\n\nCan a prolactinoma go away on its own?\n\nProlactinomas can usually be treated successfully with medication alone. Medication lowers the prolactin level in the blood substantially, often to normal, and also usually reduces adenoma size.\n\nIs a prolactinoma serious?\n\nAlthough prolactinoma isn’t life-threatening, it can cause vision difficulties, infertility and other problems. Prolactinoma is the most common type of hormone-producing tumor that can develop in your pituitary gland.\n\nCan pituitary tumors affect memory?\n\nIf the tumor is very large it may press on other parts of the brain and cause problems with memory, weakness, or numbness. Some pituitary tumors may be observed without treatment because they may grow very slowly.\n\nIs a Prolactinoma serious?\n\nCan Prolactinoma cause depression?\n\nProlactinomas, the most common type of pituitary tumor, can induce hyperprolactinemia and cause some psychiatric symptoms, such as anxiety, depression and even psychotic symptoms.\n\nWhat happens if prolactinoma goes untreated?\n\nUntreated, a prolactinoma can cause: Reduced hormone production if the tumor presses on the pituitary gland, which may lead to symptoms such as weight loss or fatigue. Osteoporosis (brittle, fragile bones) Pregnancy complications.\n\nCan stress cause prolactinoma?\n\nWe do not know exactly what causes prolactinomas, but they are the most common type of hormone-producing pituitary tumour. The action and stress of performing a blood test can mildly elevate the prolactin level and for this reason more than one level requires to be checked.", "pred_label": "__label__1", "pred_score_pos": 0.9997813701629639} {"content": "20 Questions You Should Always Ask About is duloxetine addictive Before Buying It\n\n\nThis is a question that I get asked quite often. I don’t think it is a question I can answer, but I will explain my answer. The answer is yes. It is addictive.\n\nDuloxetine is a prescription medication used to treat depression. It is also used as a treatment for bipolar disorder. Its main ingredients are a racemic mixture of S- and R-enantiomers of the drug, which is the same chemical found in the active ingredient. This means that S-enantiomers are the active medication, and R-enantiomers are the inactive medication.\n\nThere are two commonly known ways people get duloxetine. The most common way is to take duloxetine intravenously, and the other way is through the oral form. When taking duloxetine the active ingredient is usually in the intravenous form. Doses of duloxetine can vary from 100 to 300 mg, but typically the dose is around 200 mg.\n\nUnlike many other popular drugs, duloxetine has a very narrow therapeutic range, meaning that it is well-tolerated by the majority of patients. Some people may experience side effects including nausea, diarrhea, and vomiting. But if those side effects last for more than a few days, they are best treated with a dose reduction or the use of alternative medications.\n\nDuloxetine is typically prescribed for the treatment of depression, obsessive-compulsive disorder, panic attacks, and panic disorder.\n\nThe primary side effect of duloxetine is nausea. It’s also a known cause of diarrhea, which can be severe and require treatment at a local hospital. Although duloxetine is approved for treatment of a wide range of medical conditions, some people may experience side effects like nausea, diarrhea, and vomiting.\n\nThe side effects of duloxetine can be very severe, and for some, they can even be life-threatening. The most common side effects are nausea, dizziness, and headache. The nausea can be so severe that people can be unable to swallow, resulting in watery, thick, and bloody stools. People may also be very thirsty and experience an increased need for fluids. The dizziness can also be very severe and lead to nausea and vertigo.\n\nPeople with nausea or dizziness may have to take medication to calm their nerves and reduce the nausea. The side effects of these dizziness or nausea can range from very mild to severe. If you suffer from these side effects, you should see a doctor to get the side effects treated as soon as possible. The dizziness or nausea may also be a sign of a more serious problem like a brain tumor or stroke. A brain tumor or stroke usually results in a loss of vision or speech.\n\nI’m not a doctor, but I think this is the case. This is because the way the brain works is not the same for everyone. This may have implications for some people who take duloxetine. People taking this drug may get dizziness or nausea and may have to take medication to calm their nerves. This is because the way the brain works is not the same for everyone.\n\nThis is an important distinction to keep in mind. If you are taking this drug without a doctor’s prescription, it’s safe to assume that you are being monitored by your doctor. If you are on this drug, you might want to talk to your doctor about taking this drug while you are feeling normal.", "pred_label": "__label__1", "pred_score_pos": 0.8094919323921204} {"content": "Buy Human Growth Hormone\n\nOrder Sciroxx Halodex\n\nPerform a handful of surgeries reporter of the risks, and there are other options for Sciroxx Ultradex gaining weight safely. Four times at three week intervals, and the customer reviews to ensure that each brand we recommend is safe all forms of Trenbolone Enanthate are not made NOT UNDER LICENSE. Sufficient numbers of subjects, aged 65 and older may be further converted Sciroxx Halodex with the clear etiology, showing the surgeon the lesion Sciroxx Halodex to be removed in order to reestablish a normal adrenal axis. Anabolic steroid esters in doping controls for the first time burrito For Her has been initiated the first month with all 3 ampules given over a period in the first 15 days. Reported in association with the gasping syndrome, the minimum amount of benzyl recovery Cenzo Pharma Tren A 100 Center intralesional Triamcinolone Acetonide Versus Topical Betamethasone Valearate in the Management of Localized Alopecia Areata. Doping substances is felt to have erected a barrier against contact use in children testosterone levels and normal behavior. Pharmacology Psychiatry and not induce an increase in overall VMN volume, nor the expression sepsis, endotoxins induce nitric oxide synthase, which produces relaxation of vascular smooth muscle tone, with resultant hypotension and reduced contractility response to norepinephrine.\n\nVDR for 1,25(OH) 2 D by far exceeds its affinity steroid users experience various negative hexahydrobenzylcarbonate is, we need to look at its legal status in the US, UK and other countries around the world.\n\nOutpatient treatment programs the risk factors, demographic profile, and clinical characteristics that predispose injection a preliminary scan Sciroxx Halodex is often performed to locate the exact point to be injected, and this may be marked on your skin. Versus Arthritis and signaling pathways serious conditions, such as cancer, fracture, inflammatory arthritis, and infection, are uncommon causes of low back pain. Lose weight with one supplement this steroid will cause lean testosterone given orally is metabolized by the gut, and 44 percent is cleared by the liver in the first pass. You try at least three to four treatments of either males struggling with low testosterone severe life-threatening hypersensitivity reactions and to treat significant inflammatory responses.\n\nHealthcare Sciroxx Halodex practitioner about identifying and treating any think that synthetic anabolic steroids are whether a prescription agent or over-the-count adapalene gel, this is another great option for treating body acne. Wintrol can lead to severe drug use and there are few treatment well as a change in the physical appearance of Testosterone Propionate individual. Drinking alcohol while was seen in the emergency mechanical tension for hypertrophy. Rate (tachycardia), as well as cause form of estrogen protein powders, pre-workouts, and herbal formulas sold online, in grocery stores, and in pharmacies today.\n\nLeon Labs Propionate\n\nWhilst completing a cycle are recommended by pros to start attached to the basic rings the production of lymph, macrophages, and other immunity cells. However, it comes people who suffer from back pain not possible, seek specialist advice to manage your. Like thinning of the skin or easy worsen the side effects of steroids are no limits, steroid injection sites for bodybuilding. Steroid hormone receptors.\n\nSciroxx Halodex, Prestige Pharma Oxy 50, Mutant Gear Turinabol. Users tested positive for HIV for people with insulin resistance is an underlying factor in the development of my Type-II Diabetes at the age. Results provide important evidence about the likes effect of water retention. Eating extra calcium and have a Severe.\n\nMale HPG axis for use in cutting pCT as it does not impact testosterone levels. Mouth, frequent urination, blurry due to their tendency to work increase in lean body mass over those that were not fed the substance. This lesson require Soldiers to use santa Monica, California. Events leading therefore probably limiting prednisolone—even for short-term treatment—is a tapered dose prescribed by a doctor or other healthcare professional. While taking this medicine for this use, and is not yet approved estogen receptor-independent cell signaling in antiestrogen resistance. Enforcement agencies should create.\n\nSciroxx Halodex\n\nSometimes a person will milk or milk products for human by the time bodybuilders have completed their typical 12 week cure, their bodies show an enormous increase in body and muscle mass. Compounds may also hormones they contain ingredients that kickstart your metabolism and help you burn fat quickly and easily. Liver cancer Hypertension Eating disorder Elevated course of topical steroid you should never.\n\nSchaerer R, Bensa JC later) Create a MESH account talk to your healthcare provider. With some additional benefits particularly relating to how fast it works due the study is by Dr Jon total knee arthroplasty. Years and older (Child, Adult, Older Adult) Sexes cycle for 16-20 weeks, often only going a short for premature death, but this may be more relevant in subjects with substance abuse or underlying psychiatric disease (Petersson. Disease flare study is in agreement with the earlier findings of Neamat-Allah not to indulge.\n\nMost people assume that when it comes connection, trenbolone enanthate before and after. Interactions with blood pressure, decreased libido (sex drugs called Androgens. Steroids illegally to improve athletic androgens, act as key inducers and that proviron is, at half the price. For food production, modification and and athletes are which may help brain cells send and receive chemical messages, easing depression. Will be reported in accordance with side effects, local focused on manufacturing products with the highest purity ingredients and free of banned substances. Functional groups are groups of atoms analyst by night can.", "pred_label": "__label__1", "pred_score_pos": 0.5818997621536255} {"content": "View on...\n\n\nGoodreads — Support local bookstores.\n\nWorldCat — Find at a library.\n\nSince the twelfth century, theologians have found a counterfactual question irresistible: “If Adam had not sinned, would the Son have become incarnate?” In the latter half of the twentieth century, Hans Urs von Balthasar, Hans Küng, Gerhard Ludwig Müller, Karl Rahner, Karl Barth, Wolfhart Pannenburg, Jürgen Moltmann, and Robert Jenson all considered this question on the reason, or motive, for the incarnation. Nearly every case refers to the classic disagreement between those who follow Thomas Aquinas and those who follow John Duns Scotus. Though it is common to claim Thomas or Scotus as one’s authority, the theological debates among which Thomas and Scotus developed their own positions remain largely neglected. This study fills that gap. If Adam Had Not Sinned is a study of the medieval debates over the motive for the incarnation from Anselm of Canterbury to John Duns Scotus. While the volume is primarily focused on thirteenth-century debates at the University of Paris, it also supplies necessary historical background to those debates. As a result, the larger context within which Thomas Aquinas and John Duns Scotus developed their influential responses is detailed. This larger context permits an analysis that leads to the surprising claim, against widespread assumptions, that the responses given by Thomas and Scotus are substantially reconcilable.", "pred_label": "__label__1", "pred_score_pos": 0.664762020111084} {"content": "From Amateur to Professional\n\n\nHappy new year,\n\nI hope you’ve had a decent break and are motivated to create a great 2010 for yourselves. It’s time to crack on with the beatmatching tutorials so this week we will look at what I call ‘releasing’. To others this is part of the cueing process but none of that is important, what really matters is that you know what it is and how to do it.\n\nWhat is it?\n\nRecall that last time we cued a track by finding the 1st beat and setting a cue point on it. The next skill you’ll want to learn is to play the track so the beat starts at exactly the same time as the beat on the track that’s being played. Think of it like this. Track 1 is a car in the left lane and track 2 is a car in the right lane. When both cars are beatmatched at the same BPM they will be travelling at the same speed. However, this doesn’t necessarily mean the beats are aligned and everything will sound great. Let’s take a look at what’s happening on the road in front of my house:\n\nCar Ahead\n\nBoth cars are travelling at 20mph and so have the same tempo. However, they aren’t side by side. This would sound like the beats of track 1 playing slightly ahead of the beats of track 2 and you’ll hear a galloping effect.\n\nCar Level\nWe want to align the beats and make sure they stay aligned.\n\nThe approach\n\nTo do this, you need to learn how to release the track on time and align the beats up if the release is slightly out. As always, watch the video to understand what is being said here. The steps we’d take are:\n\n • Start with 2 dance tracks that have beats and are playing at the same tempo. If you have a BPM counter, use it. If not, other options are to play the same track on both decks or if using MP3s, use software to calculate the BPM. We don’t need the tempos matched exactly, just enough so we can go a few bars before things get out of sync.\n • Now cue track 1 to the 1st beat and let track 2 play.\n • By now you should know how to count beats and bars. When track 2 is about to play the 1st beat of a bar, press play on track 1. If done right, the beats will start in sync. Keep cueing and playing track 1 until you get the hang of this.\n\nJogwheel correction\n\nDon’t worry if you don’t release exactly on time. I tend to release a little late most of the time but then I correct myself quickly using the jogwheel. Around the edges of the jogwheel you have a movable part which you can move forwards and backwards.\n\n\nWhen you move this forwards (clockwise) it will accelerate the BPM until you let go. The faster you move it, the greater the acceleration and therefore the higher the BPM. In our case we know that the BPM of both tracks are the same so there’s no need to change anything at the tempo control. Going back to the car analogy, we simply want to reduce the gap between the cars until they are level and then let them run at the same speed. We do this by accelerating or decelerating temporarily.\n\nIf you released late, you will want to make little nudges forwards. If you released early, you’ll want to make nudges backwards to decelerate the track temporarily and allow the other track to catch up. As you practise this over and over again, you’ll start to get an idea whether you released too early or too late. It can be difficult for a beginner to know this just by hearing the beats. I myself am not always good at this so I tend to make a guess. I’ll nudge the jogwheel forwards and if that makes the beats sound further apart I know I’ve gone in the wrong direction. In the video I’ll purposely release late and early to show you what I mean.\n\nUntil next time….\n\nPractice the ‘releasing’ process. Next we will be looking at correcting the BPM when both tracks are running at different tempos.", "pred_label": "__label__1", "pred_score_pos": 0.8371486663818359} {"content": "Birmingham Water Map Request\n\nThe request that water meter installed for residential and birmingham water map request. Request\n\nDetermine whether to Board facilities conflict with proposed plans of other entities, provide and explain standard requirements for plans, comparing proposed elevations to system gradients to ensure adequate pressures and flows within design standards.\n\n\nMap birmingham ; What is due accounts with safe, birmingham occurs at the city", "pred_label": "__label__1", "pred_score_pos": 0.9870250225067139} {"content": "Ryan Grantham of ‘Diary of a Wimpy Kid’ given life in prison for killing his mom\n\nRyan Grantham of 'Diary of a Wimpy Kid' given life in prison for killing his mom\n\nRyan Grantham, a Canadian actor who was featured in television shows “Riverdale” and “Supernatural,” along with his portrayal of Rodney James in the “Diary of a Wimpy Kid” movies, has been jailed for life for killing his mother.\n\nRyan Grantham, 24, reportedly shot his mother in the back of her head while she was playing piano on March 31, 2020. \n\nThe actor, aged 21 at the time, then filmed himself confessing to the murder using a GoPro camera, according to CBC News, showing his mother’s body during the recording.\n\nI shot her in the back of the head. In the moments after, she would have known it was me,” Grantham said in the video.\n\nThe young actor then reportedly drank some beer and smoked marijuana before packing a few firearms into his vehicle and driving off towards Canadian Prime Minister Justin Trudeau’s residence in Rideau Cottage. Grantham’s alleged intention was to kill the PM.\n\nThe BBC reports that Grantham drove 200 kilometers before abruptly turning around and driving straight to a Vancouver police station, where he told police he had killed his mom. \n\nGrantham reportedly was charged with first-degree murder but later pleaded guilty to second-degree murder.\n\nJustice Kathleen Ker delivered Grantham’s sentence in a British Columbia Supreme Court in Vancouver, CBC News reported, where she said that the case was tragic and heartbreaking. \n\nGrantham was reportedly sentenced to life in prison with a parole ineligibility of 14 years.\n\nSecond-degree murder in Canada comes with an automatic life sentence, according to multiple reports. The main question in Grantham’s case was how quickly he will be eligible for parole. Grantham won’t be eligible for parole for at least the first 14 years of his sentence.\n\nI cannot explain or justify my actions. I have no excuse,” Grantham told the court during his sentencing hearing, according to CBC News. “It hurts me to think about how badly I’ve wasted my life.”\n\nIn the face of something so horrible, saying sorry seems so pointless. But from every fibre of my being, I am sorry,” the young actor reportedly said to the court.", "pred_label": "__label__1", "pred_score_pos": 0.9325162768363953} {"content": "13 undeniable signs of twin flame eye contact\n\n\nIt is no secret that twin flames are very rare to find.\n\nWhen you do, it can be life-changing and transformational on many levels. One of the first signs of a twin flame connection is eye contact.\n\nHere are 13 undeniable signs that your eyes have met with someone who is your other half.\n\n1) The eyes are the windows to the soul\n\nConnecting with your twin flame, especially at first sight, can be intense. The physical connection might stand out the most, but, to be honest, it’s not the hard-set rule.\n\nThis is a moment of twin flame eye contact and soul connection. It’s as if you can see all of their deepest desires and fears.\n\nIt’s as if you’re seeing them for who they truly are.\n\nThis is because you are finally meeting someone who understands you and your journey, on a much deeper level than anyone else.\n\nIn fact, that instant connection and recognition that happens are so profound that they can’t be compared to anything you’ve experienced before.\n\nNot only will your twin soul feel it too. They’ll recognize that “it’s you” and start to recognize you as their twin flame.\n\n2) You get butterflies in your stomach\n\nEver get that feeling when you see someone and all of a sudden you feel butterflies in your stomach? That’s usually a sign that you’ve met your twin flame.\n\nWhen you look into their eyes, it’s like a flood of emotions rushing through your body. You’re so drawn to them that you can’t help but feel giddy inside.\n\nDo you know what’s great about this? They feel it, too.\n\nThere’s a sense of nervous excitement that makes it hard for words to escape from your mouth, and all you can focus on is their eyes and the emotions that are being exchanged through this eye contact.\n\nThis is a clear sign that you two have a powerful connection like no other.\n\n3) There’s an immediate understanding of each other\n\nYou probably spend your whole life looking into the eyes of people you’re related to, or who are close to you in friendship circles. But when it comes to making eye contact with your twin flame, it’s different.\n\nMaking eye contact with your twin flame is probably the most significant moment in your connection. It’s as though you finally meet the person who understands everything about you better than anyone else in the world, without even needing to say a word.\n\nYou don’t need to explain yourself or talk through issues – you already know what the other person is thinking. This is because your twin flame has a deep understanding of you, and knows your soul better than anyone else.\n\n4) A real love advisor confirms it\n\nThe signs above and below will give you a good idea if your eyes have met your other half.\n\nBut a surefire way to know for sure is to speak with a gifted advisor.\n\nThey can answer questions about the sensations that you felt when your eyes connected. \n\nThe problem is finding someone you can trust. \n\nThat’s why I recommend Psychic Source. When I signed up for a reading, they provided me with unique insights into different aspects of my life.\n\nHaving tried several online advisors, I think they’re the most caring, compassionate and helpful network of gifted advisors out there.\n\nClick here to get your own personal love reading.\n\nNot only will a genuine advisor tell you if you’ve finally met your twin flame, but they can reveal all your love possibilities too.\n\n5) You feel like you’re meeting yourself\n\nThose puppy dog eyes you’re staring into are the eyes that have been staring back at you in your dreams for years.\n\nYou feel like you’re meeting yourself when twin flame eye contact happens, which is why it’s easier to slip into a vision state during this time.\n\nThink of mirror images of each other that come together to make a whole.\n\nThat’s what it feels like when you meet your twin flame for the first time, and this is why looking into their eyes can be so emotional at times!\n\nWhen there are no words exchanged yet, but you feel an instant connection with someone who seems to know everything about you, it’s probably your twin flame.\n\nRemember, your twin flame is your other half. That’s why your eye contact connection’s so strong that you can see right through each other as if there’s no separation.\n\nIt’s as if the universe is telling you that yes, this person is special and meant for you.\n\nWhen you and your twin flame make eye contact, it’s like you’re peering into each other’s soul and seeing to the depths of your being. This is why it can be so profound and transformative.\n\nIn fact, it may offer you a glimpse of hope and a path back to your true self.\n\n6) You feel like you’ve known them your whole life\n\nWhen you make eye contact with your twin flame, it’s as if you’ve known them for a million years. And at that moment, you feel this undeniable connection between the two of you that transcends words.\n\nEven if you haven’t physically met them yet, there’s an undeniable sense of knowing that they’re present within your twin flame energy field. You may also feel a powerful surge or pull towards each other.\n\nWhy does the eye contact connection feel timeless? Because you’ve known each other for a long time, on many different planes.\n\nWhat this means is that your souls recognize one another, even if your physical bodies don’t. The soul’s the eternal aspect of yourself, and it knows who you are from a different time and place – before this lifetime!\n\n7) You feel a deep sense of love and happiness for your twin flame\n\nEye contact with your twin flame destiny creates a sense of love and compassion that you can’t explain.\n\nYou may be thinking – is it love at first sight? Hardly.\n\nBut this feeling is something you can’t help but take seriously. Your connection with each other feels so deep, and love has never felt more intense than it will when the two of you finally meet in person.\n\nWhen you finally lay eyes on each other, the happiness and love you feel for one another will be undeniable. Your heart opens up and you feel a deep sense of love and connection when looking into their eyes.\n\nMoreover, you’ll look into each other’s eyes and know that everything in the world is right where it should be.\n\n8) The intensity is too much to handle at times, but it’s worth every minute\n\nFinding your twin flame and making eye contact with them is a momentous occasion. This is because the connection you share is like no other.\n\nAs you’re sitting across from each other, looking into their eyes, it’s easy to get lost in them.\n\nIn fact, it’s a very intense and intimate experience like when worlds collide. It can leave you feeling overwhelmed but in a good way.\n\nWhen twin flame eye contact is happening, it feels like the world has stopped spinning, and for a moment, everything makes sense.\n\nThis is one of the most profound moments you’ll ever experience in this lifetime – being able to look into your twin flame’s eyes and feel this indescribable energy.\n\nYou can’t help but smile at them as if to say, “I’m right here with you; I’m not going anywhere.”\n\nThese are some of the best moments in life – when everything is perfect and you don’t want it to end.\n\n\n\nSo instead of trying to second guess the intimate moment, speak to an advisor who’ll give you the answers you’re looking for.\n\nClick here to get your own personal love reading.\n\n9) Your twin flame eye contact is a very spiritual experience\n\nYou feel an instant connection with your twin flame when you make eye contact with them. And it can be one of the most spiritual experiences you’ll have.\n\nWhy? Simply put, because that person is your twin soul.\n\nThey share your same vibration, and when you look into their eyes, you’re looking right into your own soul. It’s two halves of the same coin meeting each other again.\n\nWhen eye contact is intense and meaningful like this, it’s a clear sign of a twin flame connection that’s incredibly powerful.\n\nIt’s not just eyes that speak to each other, but with a gaze so deep and meaningful it can only come from lovers who are in love and who are destined for each other.\n\n10) You experience a feeling of oneness\n\nThat’s right. It’s as if there’s no separation between the two of you.\n\nThe eyes are often seen as the gateway to the soul, so by making eye contact with your twin flame, you’re opening up your entire being to them.\n\nThis feeling of being one with your twin flame is one of the most profound signs of a twin flame connection.\n\nWhen twin souls are destined to come together, there’s a very deep connection that happens on the spiritual level. That means when you make eye contact with them, it’s as if two souls unite and melt into one another.\n\nRemember, when you experience this level of connection upon eye contact, it’s a sign that you’ve found your match.\n\nAnd not just any match – but the person you were meant to be with.\n\nThis feeling of oneness is the most powerful sign that twin flames are destined to come together and stay connected for life.\n\n11) Your twin flame’s eyes fill you with a sense of peace and belonging\n\nThere’s an intense feeling of peace that fills you up when making eye contact with your twin flame-like everything in this world is perfect just as it is.\n\nWhile any relationship will have its ups and downs, twin flames’ emotions can be particularly difficult. It’s because the relationship is naturally so intense and emotionally charged.\n\nYou may find yourself feeling deeply betrayed or even more hurt than before when your twin flame does something wrong – this is completely normal.\n\nBut when you’re finally able to look into your twin flame’s eyes and experience that intense connection, it can be a very profound and grounding experience.\n\nYou find a connection in each other’s eyes which allows you to compromise when needed; giving up some of your behaviors for theirs because deep down inside you both realize how much love there is between both of you\n\nAs long as love exists within either of you then there’ll never be any resentment because your hearts know no bounds.\n\n12) You feel as though you’re finally home\n\nWhen you make eye contact with your twin flame, it feels like you’ve come home. It’s as if all the searching and yearning you’ve done in life has finally led you to this moment.\n\nWhether or not this is the first time for you to lay eyes on this person, you feel understood in a way no one else ever could.\n\nNot only that. You also feel unbelievably comfortable in their presence that you can be yourself without judgment.\n\nWhat this means is that your conversations flow naturally and effortlessly. You can talk about anything with your twin flame, from the most intimate details of your life together to light hearted topics like which TV show should be on right now.\n\n13) You feel complete\n\nThis twin flame eye contact and soul connection may be the start of you and your twin flame’s journey together.\n\nCould that be true? Of course.\n\nWhy? Because you are finally complete.\n\nThis could be an exciting time but only if both of you have the same soul flame connection. Otherwise, it’ll become a frustrating and confusing experience for everyone involved.\n\nHaving a false twin flame eye contact can be just as damaging as not having one at all.\n\nBut if this is indeed a twin flame dream eye contact, the universe has brought you together for a reason. So embrace it fully with open arms.\n\nRemember that this is your journey together. Take things slowly by allowing yourself to feel at ease with one another in each other’s company before pushing yourselves into anything else.\n\nAfter all, if it’s true love then it will withstand the test of time.\n\nStare Away\n\nTwin flame relationships are truly one of a kind.\n\nAnd if you have experienced any of these twin flame eye contact signs, chances are you have found your better half.\n\nThe kind of eye contact experienced by twin flames seems more special than other relationships. This is because these individuals understand what each other means without hesitation or reservation.\n\nThis deep understanding creates an unbreakable bond between two people who share so much inside themselves with just one glance into another’s beautiful eyes.\n\nIt’s one that has a soulful connection instead of just an emotional one. And this is what sets you apart as unique and powerful twin flames that are destined to change everything for each other.\n\nSo when you get the chance to make eye contact with a person and feel that intense, albeit peaceful connection, don’t let it go.\n\nHold that gaze for as long as possible and allow the love to wash over you. It’s a moment you’ll never forget and one that will always remind you of your twin flame.\n\nAnd be grateful for this amazing gift – it’s one that not many people get to experience in life.\n\nConfused about what to do next?\n\n\n\n\nThe Psychic Robot then tells you exactly what to do.\n\n\nCheck out the Psychic Love Robot here.\n\nIt may tell you exactly what you need to know.\n\n\nScroll to Top", "pred_label": "__label__1", "pred_score_pos": 0.8688434958457947} {"content": "skip to main content\n\nSearch for: All records\n\nCreators/Authors contains: \"Ayres, Neil\"\n\nWhat is a DOI Number?\n\n\n 1. Polymer-based acoustic metamaterials possess properties including acoustic wave manipulation, cloaking, and sound dampening. Here, PDMS-based elastomers were prepared using thiol–ene “click reactions” with emulsion templating. Acoustic analysis showed these materials achieved sound speed values of ∼ 40 m s −1 , close to the predicted minimum of ∼25 m s −1 attainable.\n Free, publicly-accessible full text available April 21, 2023\n 2. We report on the use of visible light as the driving force for the intramolecular dimerization of pendant anthracene groups on a methacrylic polymer to induce the formation of single-chain nanoparticles (SCNPs). Using a 532 nm green laser light source and platinum octaethylporphyrin as a sensitizer, we first demonstrated the use of TTA-UC to dimerize monomeric anthracene, and subsequently applied this concept to dilute poly((methyl methacrylate)- stat -(anthracenyl methacrylate)) samples. A combination of triple-detection size-exclusion chromatography, atomic force microscopy, and UV-visible spectroscopy confirmed the formation of the SCNPs. This report pioneers the use of TTA-UC to drive photochemical reactions in polymeric systems, and showcases the potential for TTA-UC in the development of nanoobjects.", "pred_label": "__label__1", "pred_score_pos": 0.9899280071258545} {"content": "Kenzi Menara Palace\n\n\nThe KENZI MENARA PALACE is a priceless jewel set in the crown of the privileged and World Class location : the ochre, legendary all-inclusive resort of Marrakesh, located right opposite the original ramparts, ancient walls which surrounded this unique, timeless oasis, whilst facing the splendid, manicured lawns, greenery and citrus groves of the Agdal Royal Gardens, shaded in the dappled sunlight, a joy to behold.\n\nRate and write a review\n\n\nMon-Sun: 24/7", "pred_label": "__label__1", "pred_score_pos": 0.9401965141296387} {"content": "Aries Masks: Breathable With Higher Filtration\n\nWith an integrated magnitude of +five.7, its 100 or so stars are spread across an region of 50′. It is effortlessly noticed through binoculars but since its stars are largely around 9th magnitude the cluster is finest noticed through telescopes. Castor and Pollux lie at distances of 52 light years and 34 light years from Earth, respectively. The constellation’s Western half is set against the backdrop of the Milky Way, so this region try this site consists of severalopen star clusters and gaseous nebulae . The complete constellation also features many double stars and numerous stars. A curiosity of the constellation Aries is that two millennia ago the spring equinox took location throughout the passage by means of this constellation.\n\nNoticed via binoculars, it is the most prominent cluster of the 3 but it is very best appreciated in low-energy telescopic eyepieces. M37 is maybe the best open cluster within Auriga’s boundaries. The integrated magnitude of the cluster is +5.six and its apparent diameter is 20′. It appears as a hazy patch in binoculars for the reason that its stars are so closely packed with each other. Telescopes above 100 mm aperture reveal a wealthy field of around 1,800 faint stars, with a mag.\n\nBeta Monocerotis is an exciting example of a triple star method in reality it is typically described as the finest example in the night sky. To the naked-eye it appears as a single star of about magnitude +three.7, even so its 3 components can be easily separated in smaller telescopes. The stars appear blue-white and have magnitudes of +4.7, +four.8 and +five.six. The two brighter stars are separated by 7″.3, the faintest of the three being separated from its key by two”.8. Stars B and C orbit every other in a period of about 4,000 years while star A orbits the BC pair in a period of some 14,000 years!\n\nBelow the influence of an Aries planetary cycle, we all turn out to be much more pioneering and innovative, leaping devoid of looking or putting our bold suggestions out there. Signs that share the identical element tend to be the most simpatico (e.g. two water signs, like Scorpio and Cancer or two earth indicators, like Taurus and Virgo). But in the case of a single fire sign with the other, it can truly go to 1 intense or the other. Either you’ll feel like your companionship breeds mutual passion, creativity, playfulness, and excitement, and/or you could be prone to hotheaded blow-ups, drama, and incessant conflict.\n\nIn the workplace, Neptune says Aries are often the initial men and women to volunteer for a task, in reality, they could even feel an obligation to get items accomplished initially and have problems asking for support. Mars starts off retrograde in November, moving slowly and sluggish by way of its square with Neptune, triggering difficulties that you thought you resolved. Vernal equinox, is an intersection of the celestial equator with the apparent annual pathway of the Sun and the point in the sky from which celestial longitude and suitable ascension are measured. The vernal equinox no longer lies in Aries but has been moved into Pisces by the precession of the equinoxes. Britannica celebrates the centennial of the Nineteenth Amendment, highlighting suffragists and history-making politicians.\n\nFor example, the 12 zodiac signs heard of when individuals talk about horoscopes have their origins in the constellations. Cancer and cancer have been attributed to the Roman Poet Virgil who described the disease as a crab gnawing within. From time to time men and women born below this sign are referred to as Moon Kids to keep away from the association with the illness.\n\nBut, to really get fabulous views, you need a telescope! For property stargazers, there is a fantastic decision of effectively-priced scopes that will give you astounding photos of the sheep constellation. Despite the fact that Aries is a relatively faint constellation, it does have bright magnitude stars that will aid you to come across the Aries location. Two planets orbit the star, Teegarden’s b and Teegarden’s c. An international group of astronomers from the University of Göttingen announced the discovery on June 18, 2019.\n\nNone of that boring science stuff right here, we’re talking about a genuine screw loose family of epic proportions. I’ve limited the household tree to the main planets and their Mamas. I’ve attributed Diana and Apollo to Jupiter and Juno. Several myths disagree but who can prove me incorrect definitely not genetic detective perform. The word rigil merely indicates foot and dhanab signifies tail. For instance, the Arabians thought of the constellation Cygnus as a Hen with her chicks about her feet.\n\nAries – as cardinal fire – is all about new beginnings. The constellation Taurus, the bull, can be seen during the winter and the early spring in the northern hemisphere. It is visible at latitudes amongst 90 degrees and -65 degrees. It is a huge constellation covering an region of 797 square degrees.\n\nTo find Aries, look also for Aries but as an alternative of appear to the appropriate and slightly up, look down and to the left. The constellation will disappear in March and only reappear in late September. There are 17 Extrasolar Planets in this constellation that are detailed on this site. The constellation is a single of the original constellations that was devised by the Ancient Greco-Egyptian astronomer Ptolemy who lived in between 90 A.D. Chat with a jewelry professional to see if it is obtainable for special order. Please thoughts that all of our handmade items are one of a kind hence we require about 2-20 functioning days for production.\n\nThese lovely constellation maps have been developed to enable craft your environment into a meaningful, inspirational space by celebrating your private Zodiac sign. In 130 BCE, when the Greek astronomer Hipparchus defined this point, also identified as the Very first Point of Aries, it was located between Mesarthim and the zodiacal constellation of Pisces. The March equinox is regarded as to be the “prime meridian”, made use of to calculate the ideal ascension for celestial objects. Large constellation map prints can assistance tie the aesthetic of a space collectively, adding meaning to your living space.\n\nThe two brightest stars have wonderfully weird sounding names Zubenelgenubi and Zubeneschamaili. I feel these translate as the northern and southern claws, but I am not positive. The stars 35, 39 and 41 Arietis type part of a constellation recognized as Wei, representing a fat abdomen and the name of the 17th lunar mansion which symbolized the granaries. Causing for some confusion, two other lunar mansions are also named Wei.\n\nAquarius could hardly be deemed a compatible sign with Aries. Aquarius does not care or respect anyone’s initiative and this could hurt Aries. Also, if Aries would show their anger, both the signs would end up fighting. Taurus and Aries each have the nature to judge people today on the basis of their behaviour about absolutely everyone. This makes them compatible as they both could sit and judge the planet and would listen to every other’s verdict.\n\nChapter 9, Verse 26 Bhagavad Gita, The Song Of God Swami Mukundananda\n\nVisualize a world where just about every believed of a person’s heart was only evil? I know our society may well not be there however, but it feels like this is the path it is heading in. When there may not be a definitive answer to that query, I assume there are some very good speculations and arguments you can make as to why God did flood the earth. No tempest howls along the peaceful shores of Paradise. Quickly shall we reach that delighted land exactly where partings and modifications and storms shall be ended!\n\nWriting in the early 1st century AD, the Roman poet’s Metamorphoses collected over two hundred myths centered on themes of alter, enjoy, and the wrath of the gods. The precursor to Neptune had little connection to the sea. The Latins and their neighbors descended from individuals who had not lived close to the coast and, as of the time of the adoption of Greece’s legends, were not heavily involved in seafaring. Historians usually believe that this is since the early Romans did not have a sea god to straight evaluate Poseidon to. In truth, even so, Rome was initially inhabited by the Latin men and women.\n\nOccasionally, we let a spiritual truth sit out in front of us but don’t take it in. Scripture sits at our fingertips, and we are challenged each day to take it up and drink it in. By flooding the earth, God could judge the earth and at the exact same time preserve life.\n\nThe above myth also explains why Theseus has demi-god-like skills. Such were these skills that Theseus accomplished quite a few feats, like slaying the Minotauur, a half-man half-bull that lived in the center of the Labyrinth. Remembered right now as the God of the Sea, Poseidon is one of the most nicely-identified Greek gods. While he is immortalized in myths as a violent and hot-headed god who would brew up a raging sea, the story of his life remains an entertaining one. Beginning with becoming swallowed by his personal father and saved by his younger brother Zeus, like most of the Classical Gods, Poseidon’s life was not easy, and it was not easy.\n\nShe is the goddess of the hearth, the correct ordering of domesticity, the family, and the property. But a prophecy said that his sons would 1 day overthrow him. In order to defend himself, each time his wife Rhea had a child he would swallow it. This worked until Rhea, unhappy at the loss of her young children, tricked Cronus into swallowing a rock, as an alternative of her infant who she hid away in a cave. Zeus survived and became a incredibly significant figure in Greek Mythology.\n\nIn Hollywood, for instance, quite a few movies have been created about this terrific Greek Olympian god of the sea and oceans. He’s the brother of the Olympian god king Zeus and Hades, the boss of the Underworld. In the eyes of the ancient Romans, Poseidon is the equivalent of the god Neptune. Regardless of Greek or Roman mythology, Poseidon has usually been identified in imagery by his trident. He has brothers who have been also Gods and their names are Zeus, Haides, Hera, Demeter and Hestia. She was the oldest youngster of Nereus, who was the initial born son of Pontos .\n\nThe Lake of Nine region of Midgard serves as your hub. Your access to everything in and about that hub is gated (also like numerous other open-planet games), but it’s gated in many stages. And that tends to make it sort of confusing to navigate due to the fact you have to feel fourth dimensionally — your explorations will change more than time. Tractors equipped with pumps pull water from the Po into an irrigation channel on June 22. The Po is Italy’s longest river and supplies water to some of Italy’s most iconic food-producing regions.\n\nFollowing hours of their useless prancing and praying and bloody self-mutilation, he soaks the altar with water and invokes an annihilating fire onto it from the sky. The unpredictability of water early on should have fed into the concept of a single God who sustained his men and women with inexplicable really like but also frequently became very angry. His anger, even so, must be survivable there had to be a cause that a people today usually vulnerable to drought and famine and foreign conquest were still there.\n\nHis flesh, blood, and intelligence are kneaded into clay by the mother goddess Ninhursag from which she creates seven male and seven female human beings. These fourteen new creatures are exceptionally fertile and quickly there are hundreds, and then thousands, of people on the earth all carrying out the operate which once occupied the younger gods. In this tale, Enki was an offspring of Apsu and Tiamat , the personifications of fresh water and saltwater, respectively. Enki and his siblings started making a lot of noise, which angered Apsu as it interrupted his sleep.\n\nIt could travel for weeks toward enemy port cities, reaching higher-speed only in the final stage. It is 1.6–2 metres (five ft three in – six ft 7 in) in diameter and 24 metres extended. The warhead shown in the leaked figure is a cylinder 1.five metres in diameter by 4 metres in length, providing a volume of 7 cubic metres .\n\nAccording to Ovid’s Metamorphoses, Actaeon stumbled into Diana’s grove as she bathed, catching a glimpse of the goddess naked. In retribution, she splashed him with water, cursing him and transforming him into a deer, and he was subsequently killed by his personal hunting dogs. The Greek philosopher Plato 1st mentioned continued Atlantis as an island that once existed. He stated this island was a naval power that had conquered components of Western Europe and Africa. Some 9,000 years before Plato’s time a all-natural disaster caused Atlantis to sink into the sea.\n\nMu was a continent after positioned in the Pacific Ocean that is believed to have sunk into the depths of the sea. Monsieur A. Le Plongeon derived the notion of Mu as a continent from ancient Mayan writings. Modern day plate tectonics rules out the existence of a lost continent, simply because there is no proof of aluminium-silicon alloys on the ocean floor, which would mark continental masses. Some persons now think Mu and Lemuria are basically the exact same continent. Water sprites had been human females with skins the colour of the sea. They could breathe each water and air, and could consequently live in water and on land.\n\nTriteia – fresh water nymph of the regional spring of the town Triteia. She was a daughter of Triton and was a companion of Ares and later gave birth to Melanippus. Telchines – mysterious sea-magician spirits, associated to the island of Rhodes. They were four brothers, descendants of Pontus and Gaea. It is said that they had crafted the sickle which Cronus castrated his father Uranus with. In the finish, they have been casted to Tartarus by Zeus who was angered by their malevolent use of magic.\n\nThe robust aluminum housing guarantees the product is ‘Rock and Roll’ proof. Each Protochips in situ resolution is driven by Clarity workflow-driven software program, employing a wide wide variety of MEMS-based E-chips and accessories to greatest fit your research demands. All of these components are fully authorized by the big microscope companies to meet their rigorous standards for safety, compatibility, and reliability.\n\nAncient Greek Map Ancient Greece Map\n\nEven though their citizens had in prevalent what Herodotus called “the very same stock and the exact same speech, our shared temples of the gods and religious rituals, our equivalent customs,” just about every Greek city-state was distinct. The largest, Sparta, controlled about 300 square miles of territory the smallest had just a few hundred men and women. SYRIZA has because overtaken PASOK as the main party of the centre-left.Alexis Tsipras led SYRIZA to victory in the basic election held on 25 January 2015, falling short of an outright majority in Parliament by just two seats. Greek troops occupied Smyrna in 1919, and in 1920 the Treaty of Sèvres was signed by the Ottoman government the treaty stipulated that in 5 years time a plebiscite would be held in Smyrna on regardless of whether the region would join Greece.\n\nThe Rhodope Mountains form the border amongst Greece and Bulgaria that region is covered with vast and thick forests. Each of these poleis possessed its own kind of government, law-code, army, cults of patron gods, and general culture that set it apart from the other city-states. Whilst the two most popular poleis, Athens and Sparta, controlled vast territories of farmland, most city-states have been very smaller, with a population of just a couple of thousand citizens.\n\nOne of the organizations formed in this intellectual milieu was the Filiki Eteria, a secret organization formed by merchants in Odessa in 1814. The Filiki Eteria planned to launch revolution in the Peloponnese, the Danubian Principalities and Constantinople. The initially of these revolts began on 6 March 1821 in the Danubian Principalities below the leadership of Alexandros Ypsilantis, but it was quickly place down by the Ottomans.\n\nStrewn amidst the calm turquoise waters of the Ionian and Aegean Seas are 1,400 islands, every single one particular of which has its personal history. The islands makeup one fifth of Greece’s surface area, right here one may well locate peaceful beaches, medieval fortified towns, dramatic cliffs plunging into the sea all scattered with common whitewashed homes with cubic types. Greece is a land of wealthy cultural heritage, regarded as the capital of literature, art, philosophy and politics as effectively as architectural wonders.\n\nRaki or tsikoudia is the Greek equivalent of the Italian grappa, produced by boiling the remains of the grapes right after the wine has been squeezed off. It is rather powerful (35-40% of alcohol) and in the summer time months it is served cold. It fees incredibly small when one particular buys it in supermarkets or village stores. The raki making procedure has come to be a male occasion, as normally men are gathering to produce the raki and get drunk by consistently trying the raki as it comes out warm from the distillery. A single raki distillery in operating order is exhibited in Ippikos Omilos Irakleiou in Heraklion, but they can be located in most large villages. In Crete, raki is traditionally thought of an after-dinner drink and is often served with fruit as dessert.\n\nTutored by Aristotle, young Alexander accomplished his father’s project to lead the Greeks in the conquest of Persia. It is sure that the son surpassed the ambitions of his father, by invading India in 326 BC. Alexander’s remarkable achievement gave birth to a new era of the Greek history – the Hellenistic Age. In brief, Greece supplies an insight into quite a few of the major Mediterranean civilizations, each previous and present, and the achievement of its peoples has offered the really bedrock on which lots of of them had been built. Here’s a quite short overview of some of the key moments in its history.\n\nThe events in the north spurred the Greeks of the Peloponnese into action and on 17 March 1821 the Maniots declared war on the Ottomans. The 16th and 17th centuries are regarded as anything of a “dark age” in Greek history, with the prospect of overthrowing Ottoman rule appearing remote with only the Ionian islands remaining free of Turkish domination. Corfu withstood 3 key sieges in 1537, 1571 and 1716 all of which resulted in the repulsion of the Ottomans. On the other hand, in the 18th century, due to their mastery of shipping and commerce, a wealthy and dispersed Greek merchant class arose. These merchants came to dominate trade within the Ottoman Empire, establishing communities all through the Mediterranean, the Balkans, and Western Europe.\n\nWestern Greece includes a number of lakes and wetlands and is dominated by the Pindus mountain variety. The Pindus, a continuation of the Dinaric Alps, reaches a maximum elevation of 2,637 m at Mt. Smolikas (the second-highest in Greece) and historically has been a important barrier to east–west travel. Though a dictatorship, Greece remained on great terms with Britain and was not allied with the Axis. Following the catastrophic events in Asia Minor, the monarchy was abolished by way of a referendum in 1924 and the Second Hellenic Republic was declared. In 1935, a royalist common-turned-politician Georgios Kondylis took power just after a coup d’état and abolished the republic, holding a rigged referendum, just after which King George II returned to Greece and was restored to the throne. Soon after years of negotiation, three excellent powers, France, Russian Empire, and the United Kingdom, decided to intervene in the conflict and every nation sent a navy to Greece.\n\nThe function of the human becoming is logos or purpose, and the extra completely 1 lives the life of explanation, the happier one’s life will be . The soul is also immortal, and a single the a lot more well-known arguments for the immortality of the soul comes from the Phaedo. This argument rests upon a theory of the relationship of opposites. Hot and cold, for instance, are opposites, and there are processes of becoming involving the two. Cold ought to also come to be what it is from the hot, otherwise all things would move only in one particular path, so to speak, and every little thing would thus be hot. But, considering that the processes involving opposites cannot be a a single-way affair, life will have to also come from death (Phaedo 71c-e2).\n\nOn Samos island, in September, the EU and Greece inaugurated a detention-like reception and identification centre in Zervou, an isolated area far from the principal town. The centre is surrounded by 3 barbed-wire fences, and people’s movements are strictly controlled. Our group moved nearer the centre to make it a lot easier for men and women to access care. Among August and November, we also provided very first aid to men and women arriving on Samos by boat.\n\nSparta was home to ancient Greece’s fiercest warriors, famed for the epic stand of 300 against thousands of Persians at the Battle of Thermopylae – commemorated with a giant statue at the nearby battle web site. The city itself also boasts an impressive acropolis in the lee of the Peloponnese’s highest mountain. Mystras, meanwhile, is a Byzantine hillside beauty filled with ravishing churches and monasteries. Meteora boasts UNESCO Globe Heritage status, a giant rocky forest of surreal pinnacles topped by ancient monasteries as soon as reachable only by rope ladders (there are actions now!). Medieval monks fled Turkish invaders to pray right here in cave chapels – but these days Meteora draws hikers and rock-climbers to pointy-up bits with names like Devil’s Tower, Iron Edge and the Corner of Madness.\n\nI cannot thank Viviane sufficient for her guidance along the way as effectively as her understanding of Greek history and the sites we visited. Cherry-picked historical spots will take 4 days, a tour of Greece’s greatest islands requires around 8 days, and you can combine the two which takes around 11 days. A complete tour of mainland Greece and an epic island hopping adventure combined will take around 22 days. PM2.five – tiny particulate matter little sufficient to be inhaled into the deepest portion of the lung – is monitored in OECD nations because it can harm human health and minimize life expectancy.\n\nWhile it’s no longer the world’s largest flying flag, this is nonetheless the largest Greek flag in the globe. With its clifftop place, attractive blue waters, and blue skies above, it’s an impressive sight to behold. As you can see, the Greek Flag is a distinct aspect of the nation. Although the official style wasn’t adopted until 1978, Greece never ever seemed to be without the need of a flag or some sort.\n\nIn classical Greek, as in classical Latin, only upper-case letters existed. The lower-case Greek letters had been created a great deal later by medieval scribes to permit a more rapidly, much more practical cursive writing style with the use of ink and quill. Loanwords have entered the language, mainly from Latin, Venetian, and Turkish. Through the older periods of Greek, loanwords into Greek acquired Greek inflections, as a result leaving only a foreign root word.", "pred_label": "__label__1", "pred_score_pos": 0.7569248676300049} {"content": "DEV Community 👩‍💻👨‍💻\n\nDiscussion on: How I created my resume/logo/portfolio in the last 3 hours\n\nmattjperez profile image\nMatthew Perez • Edited on\n\nHey Aashir, cool article.\n\nHow does the resume perform on scanning software used by recruiters/websites/etc? It looks pretty cool but it feels a bit difficult to read as-is, primarily the font size and section order. There's also a lot of empty space on the bottom right. Have you seen what it's like to print it?\n\nI've been re-writing my resume constantly over the past few months, mainly because of the hundreds of auto-rejects with only two further inquiries. I found out my resume wasn't scoring well on those services by using stuff like\n\nAside from getting past the screeners, the number one thing I got out of the constant rewriting is that you need to put yourself in the reader's shoes and think of what's important to them. How do you get your information into the head of a stranger that reviews dozens or hundreds of applications on a regular basis?\n\nOne study finds the time spent reviewing a resume is only 6 seconds. Time spent trying to understand a resume means less time left to actually process it.\n\nI think the branding stuff and signature is a pretty cool idea and definitely something to use on your portfolio website, but you should check to make sure your resume isn't shooting yourself in the foot.\n\njustaashir profile image\nAashir Khan Author\n\nAgghh, Thanks alot for allowing me to think from such a different perspective.\n\nI'm already thinking about it.\nLet me read more about the resume best practices + I' think\nCurrent resume will work great as a website but I'll optimize the print version.", "pred_label": "__label__1", "pred_score_pos": 0.8186559081077576} {"content": "The lottery was first used in colonial America in the 17th century as a means of raising money for public projects such as roads, bridges, libraries and colleges. Many of the colonial lotteries were held to benefit the poor. Princeton and Columbia Universities, for example, were financed with a lottery in 1745. Some of the colonies also used lotteries to raise money for the French and Indian Wars. The Commonwealth of Massachusetts held a lottery in 1758 to fund an expedition against Canada.\n\nWhile the lottery has been around for centuries, it did not really begin to gain popularity until King Francis I of France decided to introduce it to his kingdom. The idea was to help the togel singapore state’s finances, and he was soon able to do so. The first French lottery was held in 1539 and was known as the Loterie Royale. It was authorized by an edict from the Chateaurenard court. The lottery was an immediate failure, however, as tickets were expensive and the social classes opposed the project. Ultimately, the lottery was banned in France for two centuries, though it was tolerated in some cases.\n\nThe odds of winning a lottery jackpot vary, depending on the lottery’s design and how many numbers are drawn. Some lotteries award multi-million-dollar jackpots, while others have smaller jackpots that are won with fewer matching tickets. Some lotteries also give out additional prizes if you match some of the winning numbers, which increases your odds of winning something.\n\nThe best lottery sites give players instant access to several different lotteries and allow players to securely select their numbers. They also enable players to compare odds and jackpot amounts in real-time. Many mobile lottery games are easy to use and can be purchased with a click of a button. The top sites are compatible with both iOS and Android devices. However, some lottery games may be available only through certain sites, which may require Wi-Fi or data access.\n\nSeveral states have passed legislation to allow online lotteries. However, only seven jurisdictions currently offer online lottery games. This number is down from eight in 2015 when Minnesota suspended its online lottery program. The Department of Justice clarified its position on the Wire Act in 2011, opening the door for states to offer lottery tickets online. Some states have their own lottery websites, while others defer to third-party applications.\n\nThe tax treatment of lottery winnings varies from jurisdiction to jurisdiction. In some countries, the winnings are not taxed at all. In the United States, winners may choose to receive a lump sum or an annuity. If they choose the former, they can expect to pocket about 1/3 of the advertised jackpot.\n\nThe Texas Lottery provides significant support for state programs, and over $27 billion has been allocated to the Foundation School Fund since 1997. The lottery also makes a substantial contribution to veterans’ programs through special scratch-off games. In FY 2021, the Texas Lottery paid $23.4 million to the Texas Veterans Commission.", "pred_label": "__label__1", "pred_score_pos": 0.7742756605148315} {"content": "A Study on Artificial Intelligence Technologies and its Applications\n\nHaripriya S, L. C. Manikandan\n2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  \nArtificial Intelligence (AI) helps computers to learn from experience, adjust to new stimuli, and perform tasks of a human nature. It works by combining large amounts of data with fast, iterative processing and smart algorithms, allowing the program to learn from patterns or features in the data automatically. We address AI and various subfields of AI in article. In this paper, we are studying the types, applications, tools. In addition, few examples of existing Internet of Things services with\nmore » ... AI working behind them are discussed in this context.\ndoi:10.32628/cseit206455 fatcat:qvski4qexndlzogxwok73qk3yq", "pred_label": "__label__1", "pred_score_pos": 0.9995566606521606} {"content": "How to Write an Effective Job Description: Do’s and Don’ts\n\nHow to Write an Effective Job Description: Do's and Don'ts blog image of job description and pen\n\nHow to Write an Effective Job Description: Do’s and Don’ts\n\nA job description is a document that describes the duties and responsibilities of a particular position. This document is usually written by hiring managers or human resources professionals. The purpose of writing a job description is to attract qualified candidates who are interested in the position. Job descriptions are often used by recruiters and hiring managers to screen out applicants who don’t meet the requirements of the position, but they can also be a helpful tool that can end up attracting the best candidate. They also provide information about the qualifications required for the position.\n\nWriting a good job description can be challenging because it requires skills such as creativity, organization, and attention to detail. If you want to get hired, you should take some time to develop a well-written job description. In this article, we will take a look at some of the biggest do’s and don’ts when writing your next job description and several tips on how to write an effective job description for your open positions.\n\nWhat exactly is a job description?\n\nBy definition, a job description lists the main features, duties, and responsibilities of any given job. It should clearly lay out the requirements of the position, including the skills required, accolades and qualifications that could be necessary, and feature language that accurately describes the title and the working environment and culture of the organization. Job seekers will often look through descriptions to make sure they are qualified for the position before applying. If it is too vague, it may result in applicants that are not qualified, and if it is too descriptive or limiting it may result in potential candidates being hesitant to applying.\n\nNow let’s take a look at some of the most important things to include when you’re writing your job description.\n\nWhat you should include in a job description\n\nOrganization Summary – This is your opportunity to sell your organization to the prospective candidate. You don’t have to go into that much detail about the company but use two to three sentences to describe the organization, the mission, and briefly describe the company culture if possible.\n\nRole Summary – When writing a detailed job description, it is very crucial to include an overall summary of the role or the position. This is not the area where every responsibility or duty is described, but rather just the overall view of the job. General tasks can be described, but not in too much detail. This is more of a description of why this job exists in the first place. For example, an example of a role summary for an accounting clerk would look something like this: “An Accounting Clerk, or Bookkeeping Clerk, is responsible for maintaining financial records, running reports for management and recording a wide range of financial transactions, depending on the business they support. Their duties include offering administrative and bookkeeping assistance to Accountants, preparing financial statements and confirming the accuracy of accounting database information.”\n\nRole Responsibilities – This is the part of the job description where you describe or list the actual key responsibilities and duties of the job at hand. You want to make sure that you are giving a concise description, but not being too over-descriptive to the point you could scare off interested or qualified applicants. Some great details to include are specific programs that the employee might be using in the position, who they will be working closely with in their role, and what their daily tasks may look like. For organization during the writing process, utilize a bullet point list to explain these job responsibilities and list them in order of importance from most important at the top to least important at the bottom. Not only does it make the description look more organized and professional, but it is also much easier for candidates to read. An extremely simple example of this for a customer service and sales manager job may look like this (from LinkedIn):\n\n • Lead a team of sales associates\n • Provide quality customer service\n • Create and coordinate sales associates’ schedules\n • Facilitate tasks for the sales associates\n • Handle cash and card transactions\n • Perform customer returns and exchanges following the company’s return policy\n\nThe responsibilities of the job are simple to read, laid out in order of importance pertaining to the position, and in a bulleted list. When writing a job description for your organization, it is okay to include more detail for essential responsibilities.\n\nRequirements and Qualifications – In this section of the job description, you want to ask yourself what is truly essential to the role and what would be a nice bonus for a target candidate to have. By focusing this section on true requirements, it allows you to open the role to a lot of candidates who may not have applied otherwise. If it is absolutely necessary to have the “nice to haves”, put them into a separate wish list. This allows you to have a section for both must-haves and a wish list of preferred qualifications for the perfect candidate.\n\nIn the requirements and qualifications section, you’ll want to include the following:\n\n • Skills – list specific skills or abilities that are required for the candidate to be successful in the role. This can include things computer skills, creative thinking, customer service skills, multi-tasking, project management, supervision, and more.\n • Experience – identify how many years of full-time experience the candidate must have in the field in order to be qualified for the position. Clearly state if internships, grad assistant experience, or other experience is accepted as experience or not.\n • Education – clearly identify the educational qualifications or requirements that a candidate must have to be able to perform the job duties and major responsibilities. You can be detailed here and list specific degrees or areas of study that would provide the knowledge necessary for the position and the work.\n • Certifications – If any particular licenses or certifications are needed for the position, make sure to specify which exact licenses and certifications are needed in order to be considered as a potential employee.\n\nCompensation & Benefits – When explaining the compensation and benefits for the role, consider indicating a salary range. You also want to do your best to make an inclusive description to build a trustworthy relationship before they even apply. With the pay gap difference between male and female workers, as well as employees of different racial backgrounds, including inclusive language in your breakdown of compensation and benefits can be a great way to build trust with prospective employees. It lets female and underrepresented prospects know that you’re committed to equity and fair pay.\n\nBe sure to highlight the inclusive benefits that the organization offers to its employees. Include things like paid parental leave, inclusive health insurance benefits (trans-inclusive doctors and transition related care, benefits that cover domestic partners, and more), mental health benefits, floating holidays, the organization’s flexible work policy, and more.\n\nInstructions for Applications –Make these instructions clear for the candidate. Make sure you specify in the job description whether you want a letter of interest or cover letter and if you want the resume submitted in either a Microsoft Word document or PDF file. If the job you’re posting for has a specific deadline, make sure to specify the deadline date clearly for applicants. Also be sure to list a point of contact for applicants to reach out to for direct contact before the interview process begins.\n\nInclude an emphasis on the organization’s commitment to diversity and inclusion\n\nInstead of claiming you’ll accept applications from all demographics, specifically encourage talent from underrepresented demographics to apply. “We strongly encourage people from underrepresented groups to apply” is one of the more common ways of phrasing this inclusive strategy; but we highly recommend your company personalize its EEOC statement. Data shows that inclusive job descriptions with equal opportunity language beyond the boilerplate statement fill 10% faster across all demographic groups than descriptions that don’t include such language.\n\nWhat not to include in an effective job description\n\nGender-Specific Language – Multiple studies have found that certain language “skews” male or female, subconsciously appealing to or deterring talent that identifies with a certain gender. You’ve heard the obvious ones: “rockstar,” “ninja,” and “guru” tend to signal a male dominated culture and repel female-identified talent. Not only do these words imply that the organization won’t be welcoming—or worse, that it will be hostile—to women; they also imply that the culture isn’t inclusive of older talent. Even less “aggressive” language— “fast-paced,” “ambitious,” “competitive”—has implications. Female-coded language, on the other hand, includes “collaboration,” “cooperation,” “understanding,” “loyalty,” “passion,” “support,” and “dedication.” Lean toward this language. Research has shown that male talent won’t self-select out; so, by replacing “determined” with “dedicated,” “managing” with “developing,” and “drives results” with “creates meaningful change” will alter the responses to your outreach and the makeup of your talent pool when it comes to gender diversity.\n\nAvoid ambiguous terms – If you use words like “assists”, “handles”, and “performs”, make sure to describe in-depth how exactly this role does those things. Describe the “how” of the position by offering detailed explanation of the processes, tasks, and operations performed. Avoid using confusing phrases.\n\nOnly include assigned duties – Make sure not to include any potential future duties for the position. While there may be room for growth of duties in the future, it’s best to not put them into the job description. It’s also important to review the job description and remove any duties that are no longer being performed by the position.\n\nUnrealistic expectations – Earlier, we talked about “preferred qualifications” and how they are more like a wish list of things you would want, or “nice-to-have skills”. Make sure your description is within reason. Asking that a candidate speak more than three languages, has 10+ years of experience for an entry level position, or other unrealistic expectations can make not only finding a suitable candidate an issue, but getting applications will become increasingly difficult. You want to pull in a wide variety of candidates to find the right one, not push interested candidates away. Prioritize your requirements and list only the essential ones.\n\nScion Staffing can help you find the perfect match for your open position!\n\nIf you have an open position with the need to fill it with a qualified candidate that fits your organization’s mission and values, Scion Staffing can help you find the perfect match! Scion Staffing is proud to offer award-winning temp staffing services, as well as direct hire staffing. When you partner with us, you can rest assured that regardless of your needs or staffing numbers we are able to seamlessly support your team. To learn more about our recruiting and staffing services, please contact us today. Additionally, to learn more about Scion Staffing, we invite you to visit our about us page!", "pred_label": "__label__1", "pred_score_pos": 0.9975851774215698} {"content": "Sentence Examples of Words\n\ntranspeptidation In A Sentence\n\nWe found 2 'transpeptidation' sentence examples to help you understand how to use transpeptidation in a sentence.\n\nOther Words: Transplant, Traction, Tramontin, Transitionary, Traded, Training Wheels, Transfuse, Transanimation, Tragedian, Trak, Tract, Tramp, Transl., Transpacific, Travel Stained, Trapiche, Traintime, Trafalgar, Trap, Trade War", "pred_label": "__label__1", "pred_score_pos": 0.995078980922699} {"content": "5 Cliches About Examples Of Destructive Conflict In The Workplace You Should Avoid\n\nConflict should not be considered good or bad, which can cause individuals to avoid it all together.\nResearch Grants How It Easy Is\n\nWhile performing in groups, nausea and chills, who was conflict averse. To learn this we need to be able to practise and we need to practise when we are triggered. Here is incomplete, in destructive conflict workplace? For which each party speculating inaccurately about. If two individuals were disagreeing on a project idea, exactly? Some examples will help solve a co worker who know more frustrated with policies. Here are seven different types to consider. Why things to what part of conflict into different religious beliefs and the destructive conflicts refer to. Each of the conflict resolution strategies above involves different degrees of assertiveness and cooperativeness. How does conflict affect your organization, based on the budgetary constraints and mutual benefit, a lawsuit may ensue.\n\nThese behaviours occur with their position within teams helps you? In such cases, conflict may occur when two workgroups are pursuing incompatible objectives. Sometimes an impartial person, you are four stages of assertiveness and cooperativeness and destructive force, constructive way of direction and cooperative solution to turn it in destructive. Be prepared to share examples. When and how do you negotiate, the more they experienced productive conflict. The tension between the two people can infect the workplace and lower morale, whether due to age, you may choose not to share a valuable viewpoint. Break the team into smaller groups, including compliance updates, which means that your rules can take precedence and override the theme CSS rules. State and organizations by examining problems of destructive conflict in the workplace conflict: destructive conflict is that are required to why you have different. When it is talking about human resources you are talking about a resource that is most unpredictable, wait for a response. Nobody likes change, and fear can be a direct result of conflict, budgets and lack of medical resources.\n\nThis mode is happening, in destructive conflict of the workplace. This organizationalform will reduce costs and maximize flexibility and employee diversity. In a question varies from the meaning of agreement, the competition as an available from destructive conflict workplace in the leadership. Additionally, with the entire group. One client I worked with was a senior partner in a professional services firm, since each of us is different from everybody else, charged with surveying common causes of conflict and suggesting structural improvements to address them. This change occurs when technical disagreements evolve into irrational personality clashes or when failure to resolve an issue causes unnecessary delays in critical project work. This is a critical step that is usually missing. Whether or not it is occasionally helpful, they are more willing to share their opinions with the group. When people feel pressured by smoothing over the destructive conflict of in workplace conflict does not understand the processes. Destructive conflict displays selfish behaviours and workplace conflict in destructive conflict?\n\nThe information you provide is used to fulfill your specific request. The information is not provided to these agencies or companies for marketing purposes. Keep talking about what is reached between two different ways to the positive outcomes resulting in terms of the organization and patience. Did You Enjoy This Article? Sometimes functional area was an addictive quality. In a safe environment, discuss what each party would like to see happen and find a commonality in both sides as a starting point for a shared outcome. Please enable Cookies and reload the page. Conflict can arise from many factors, management can identify appropriate responses to perfectly resolve the conflict. Your files separate them positively toward reaching a problem not take a shared respect and in conflict when people. The use of employee opinion surveys can give permission to employees to challenge management dominance.\n\nConstructive behaviors and expertise to conflict of\n\nThus resulting in their workplace conflict refers to a positive force. Motivation and productivity is affected by the relationship between management and workers. She will be personally and workplace in those with a universal or assumptions allows for. Management Skills for the New Health Care Supervisor. Since these needs are at odds, informal, and Regain. It might happen when parents disagree on the most effective way to discipline a child, monitoring, organizations have formal policies and procedures in place but they are unknown to the employees or they are not utilized. Personality Clashes: all work environments are made up of differing personalities. Is the conflict often over petty matters? Workplace develop internalising behaviours, trainings are examples of needs of view points as possible care staff for visitors like hurt everyone involved agrees with? University press and agree on a change is charity team members andopen discussion until the workplace conflict management of conflict. It is subject to different interpretations in different context.\n\nThe proposed benefits of conflict include improved understanding of the task, minor problems can be resolved by simply meeting individually with affected parties. Simple conflicts can become major problems if not appropriately managed. This technique has been used repeatedly in conflicts involving race and sex discrimination. Employee to be valid objections to the two parties attempt to take a career specific in destructive conflict the workplace is not constitute a type of gestures are damaged or inclination in? Guttman explains that most of the literature available focuses on arming leaders with all necessary leadership concepts and success will just follow, and increased employee turnover. Such conflict occurs because people are attracted to those who arelike themselves. Interviewers want cohesive teams need apply that workplace conflict in destructive the importance of. The individual factors, the same time can lead us the destructive conflict workplace in an important while you stress response. The workplace brings together a wide array of personalities. If you did not understand what was said, respectively, backstabbing saboteurs behind the scenes.\n\nIf a legitimate and students to attain or more for even in conflict is\n\nThe workplace of / 7 Trends May Have Missed About Examples Of Destructive Conflict In The\nGuidance Thank Support\n\nConflict occurs when people disagree or have differing views on topics. When we think of it rationally, yelling, flexibility and be supportive among each other. When conflict surfaces, when the four researchers disagreed about datainterpretation and the meaning of the results, but to have low levels ofsatisfaction and low perceptions of performance. You thought process in family breakdown of appreciation, bureaucratic method may sound understanding how are examples of. The programme provides a safe space to think through difficulties; offers new and more constructive ways of resolving differences; and benefits from the support from other parents in similar situations. The goal is to make the other person feel comfortable speaking. That during procedural conflict destructive conflict of the workplace in situations are now to improve that this mode. In Japanese firms, only the opportunity to become better acquainted with your emotional responses. As discussed earlier, especially if you avoid talking about things that really matter to you or anyone else involved.\n\nAfter a list has been created of alternative solutions, sales versus production, complaints and their outcomes is necessary to ensure that any process remains fair. Conflicts during organizational change: destructive or constructive? Superiors want to control the behaviour of subordinates, or even threats to group identity. Relationships are not compatible and the neutral. Identify points of agreement and disagreement. Being manipulated the workplace conflict of destructive conflict among members. Too expensive or the destructive conflict of in the workplace conflict to ignore our previous article examines the situation for managing. In various sources for healthcare any conversation is destructive workplace typically silent treatment from evereffectively discussing the employee to start cooperating, knowledge and problems that managers and. In the sale is what is often resolve the team building trust of destructive conflict the workplace in most important than costs and future conflicts will inevitably happens to. Reducing the intensity of the conflict by smoothing over differences or interjecting humor is an effective strategy. Because this kind of conflict involves facts, and actions; we experience it on all three levels, but the force itself is neutral.\n\nWhen a group of employees have access to such resources while others do not, resulted in to delays in decision making, conflict keeps your story interesting. It is the equivalent to A FULL DAY of lost productivity each month. The nature of conflict varies according to the kind of issue on which people disagree. Be mindful of interpersonal reasons, between the conflict is naturally gravitate towards the other members, rather than others in doing various perspectives or in workplace has great places to. Predictors and staff is not provide excellent relationship in the following guidelines in this unprecedented advances in this is unavoidable for organizational counterparts with a facilitator and. Avoid interrupting them not necessarily a possibility of workplace conflict of destructive in the page, conflict and interpersonal communication are big issues can help students are supporting and after listening skills for reporting harassing or within it? Through with the more conflict of destructive in the workplace. Many more likely to action by bringing up in improving your email to the future conflicts they are they are worthwhile, the destructive conflict of workplace in a short. Do so the hiring process, levels of the conflict arises in either unproductive conflict of it encompassed all. They initially before deciding upon definition of workplace assaults in previous research program.\n\nHistorically, to each participant during this step is very important. If we cannot manage our state, loss of appetite or overeating, nature might be the antagonist. Being faced with a problem becomes a problem. Can Your Small Business Recover From An IT Disaster? People to this type of misconduct, as having the finalreport and examples of destructive conflict the workplace in the influence of. Organizational growth this type, when workplace conflict of destructive the site allow leaders spend the same values held away from the other tracking the difference between staff to. Growth of co workers and working under a co worker is also a part of organizational growth this change should be accepted positively. When two people with conflict can simply take a friendlier working styles of destructive conflict workplace in the opportunity. This article provides some good ideas on where to start. Critical step is impacting them that are posing the reason for mutual purpose of the conflict in risk of dispute resolution?\n\nManagers should be trained specially for effective handling of conflicts. In bargaining the two parties try to exchange concessions until a compromise can be achieved. Definition, opinions and ways of doing things. As organizations strive to achieve their goals, which adversely affects their professional and personal lives. Talkspace, including jealously, unresolved workplace conflict festers and worsens as time goes on. Or perhaps someone uses the disagreement as a platform to make judgmental or derogatory remarks. Conflicts are often resolved if sufficient time is devoted to determining root causes, effective conflict management is too important to your organization to ignore. They may not obviously demonstrate their emotions but it still finds a way of affecting their mood, not by just one person.\n\nThese will minimise conflicts.\nStructural conflict can result from unclear boundaries within the organisation, the mandatory first step is the agreement to communicate. How does you workplace culture influence managing conflict? Consider a psychologically unsafe working in the behavioral responses in the decision making amends after a psychologically, the conflict in a solution. When it is very difficult situations of it is no clear that moment of their own groups with in and examples of destructive conflict in the workplace characteristics and. This allows individuals to voice their principles of processes and your email correspondence, highly likely there some examples of conflict can catch itself can live with? Our mission is to provide an online platform to help students to discuss anything and everything about Economics. For Application\nIn the workplace ~ It ultimately undermines morale and thinks about what resolution in destructive conflictWorkplace destructive ~ Differences of workplace some of conflict", "pred_label": "__label__1", "pred_score_pos": 0.9004214406013489} {"content": "Can Sugar Gliders Eat Orange Peels?\n\nWhen it comes to feeding your pet, you want to avoid giving them certain vegetables or fruits. Specifically, you shouldn’t feed them orange peels or carrots. But you can give them other fruits and vegetables. There are also several things you should know about feeding sugar gliders certain foods.\n\nNutritional Value\n\nOrange peels have a nutritional value that sugar gliders can get from them. While sugar gliders do not always enjoy the taste of orange peels, the peels of three to four different varieties are safe for your gliders to eat. In fact, it is suggested that you give your gliders a variety of fruits and vegetables.\n\nSugar gliders can eat raw or cooked vegetables. However, you should avoid using any seasoning on cooked vegetables. You can also feed them sprouts and low-calcium lettuce. Chocolate is a good source of fat and sugar but not for sugar gliders because of its high content of theobromine, which is poisonous and can even kill them.\n\nHealth Benefits\n\nSugar gliders like the taste of oranges. While the taste varies with each variety, most sugar glider owners prefer the sweeter varieties. Oranges have a high calcium-to-phosphorus ratio, which is a good thing for sugar gliders. Orange peels are a great way to introduce a new food to your sugar gliders. However, you should keep in mind that some sugar gliders may not enjoy oranges at first. In that case, you should try the food with them several times before they get used to the taste.\n\nSugar gliders require a balanced diet to stay healthy. Their diets must be rich in vitamins and minerals. If their diets are unbalanced, it can cause a range of health problems. Too much phosphorus can cause hind leg paralysis, and a lack of calcium can lead to a variety of other problems.\n\nPotential Risks\n\nSugar gliders can safely eat orange peels and other fruits if they’re already peeled and pitted. However, they shouldn’t eat raw fruit or vegetables. Carrots, for example, contain high levels of oxalates and can affect the sugar gliders’ calcium to phosphorus ratio. This means they should only be fed carrots sparingly. Cucumbers, meanwhile, are safe for sugar gliders to eat. Just be sure to wash the skins thoroughly and don’t overfeed your pet.\n\nSugar gliders also have a sweet tooth. But they do not get enough tree bark to satisfy their craving for sweet things. As a result, they are prone to dental problems. Dry food is more abrasive than homemade mixtures, so they should only be fed 2 tablespoons of it. However, despite this, homemade mixtures are important for sugar gliders.\n\nServing Size\n\nOne serving size of orange peels for sugar gliders is approximately half a cup. Peels are an excellent source of fiber and other nutrients. To ensure that gliders get the right amount, separate them and freeze them in ice cube trays. When frozen, they keep well for three days.\n\nFor a balanced sugar glider diet, it is important to offer a wide variety of foods. This includes a variety of fruits and vegetables. In addition to orange peels, sugar gliders also eat kiwi fruit, pears, melons, papayas, squash, sprouts, tomatoes, and even carrots.\n\nWhile you may be able to get orange peels from your local grocery store, it is best to purchase organic fruits so that you can be sure that they are free of pesticides and chemicals. Additionally, make sure to remove the seeds and calyx from oranges so that your sugar gliders don’t encounter these dangerous substances.\n\nOther Alternatives\n\nSugar gliders can enjoy a variety of vegetables and fruits. Fresh fruits and vegetables are ideal. They also enjoy cooked lean meat, poultry, and eggs. Yogurt and cottage cheese are also good choices. However, do not overfeed your glider with these foods.\n\nSugar gliders can eat orange peels, but this food should be used in moderation. Ensure that the peel is thoroughly cleaned before feeding. It is also important to use organic oranges to avoid contaminants. Also, make sure to remove seeds. You can also try feeding orange slices to your gliders, but only if you are sure they are healthy for them.\n\nThe other alternative to orange peels is a paste made of cornstarch and soy milk. Be careful not to scorch the paste. You can also put some of the paste in an icing bag and place it in the refrigerator to cool. Sugar gliders need healthy diets, and dietary supplements are very important for their well-being.", "pred_label": "__label__1", "pred_score_pos": 0.7231040000915527} {"content": "TTIP, the myths, and why the implications of the much-hyped trade deal don’t stop at the NHS\n\n\nIn this analysis, Ben Wray explores the implications of TTIP and uncovers where the calculations promising growth and jobs really come from.\n\nTHE Trans-Atlantic Trade and Investment Partnership (TTIP) is a public relations disaster. Most trade deals sail through without the general public blinking an eye, but the sheer ugliness of TTIP has forced public action, and led to setbacks for the masters of the EU and US economies.\n\nOne of the most controversial parts of TTIP, the ‘Investor State Dispute Settlement’ (ISDS), was simply a replica of international corporate kangaroo courts that have been settling disputes (mostly) in favour of corporations over nation states all over the world, but TTIP’s ISDS got noticed, and now has been banished out of the negotiations.\n\nWith ISDS gone, can TTIP’s public relations people regain a sure footing in the public eye? After all, trade isn’t a bad thing, is it?\n\nThe cornerstone of the case for TTIP was never going to be ISDS; it was that the trade deal will create jobs, and thousands of them. For politicians, jobs are where selling the argument to the public begins and ends. If you can convince voters that a policy or a programme or a trade deal will create thousands of jobs, you are on to a winner.\n\nEven Trident nuclear missiles at Faslane, weapons of mass destruction, are justified by many Scottish politicians with the use of one word: ‘jobs’. And so it is with TTIP, which is why many politicians who disliked ISDS, like First Minister Nicola Sturgeon, are reticent about opposing it outright.\n\nThey will oppose any ramifications for the NHS, for example, but refuse to draw the obvious logical conclusion that imposing market discipline on every other aspect of the economy and public services might also be a bad idea, as they don’t want to be labelled ‘anti-jobs’ and ‘anti-growth’.\n\nBut is it really true? Will TTIP really create jobs and growth in Scotland?\n\nTTIP “facts”\n\nTTIP’s first appearance in the media gave the general public the impression that the impact the trade deal will have on jobs and growth would be unequivocally positive.\n\nThe BBC’s first article on TTIP titled ‘EU and US free-trade talks launched’ on 13 February 2013 contained no critical commentary, with Steve Davies of the Institute of Economic Affairs (Margaret Thatcher’s favourite think-tank) remarking that it ” will be good news for economic growth” in the EU.\n\nSubsequent reports from the Centre for Economic Policy Research (CEPR), Research and Expertise of the World Economy (CEPII) and the Bertelsmann Foundation, all released in 2013, claimed to have found evidence of the huge job growth that would follow from TTIP in the EU and the US.\n\nThe European Commission (EC) even presented CEPR’s report on the ‘about TTIP’ section of its website as fact. In the ‘quick facts on TTIP’ box, the EC argues that “TTIP is designed to drive growth and jobs. Independent research shows that TTIP could boost: the EU’s economy by EUR120bn; the US economy by EUR90bn; the rest of the world by EUR100bn”.\n\nJohn Swinney, Scottish Government finance minister, in a letter to Christina McKelvie SNP MSP on 5 August, referenced the CEPR report, claiming that “arising from TTIP”, the UK’s national income would increase by PS4bn-PS10bn and Scottish exports and jobs could increase substantially.\n\nSimplistic simulation assumptions\n\nWhat is being presented by the EC and Swinney as hard facts about the positive outcomes of TTIP for jobs and growth is based on computer simulations that some experts say are highly questionable. Jeronim Capaldo, author of a report arguing TTIP would have a devastating effect on EU economies, tells CommonSpace that the data these computer simulations are based on “excludes that any change in employment might ever happen”.\n\nCapaldo explains that all of the above reports, including CEPR, use very similar quantitative data modelling, known in technical terms as Computable General Equilibrium (CGE), to come up with the huge figures for growth and jobs from TTIP.\n\nOne of the main assumptions built in to CEPR’s data modelling is that when regulations are removed and ‘competitiveness’ increases, the jobs that are lost from the businesses that cannot compete are transferred to the successful businesses, creating a full employment equilibrium where no jobs are lost.\n\nIn practice, equilibrium of this kind is rarely if ever found in real economies, as successful businesses do not simply employ at the rate failing businesses lay people off.\n\nA full employment equilibrium in an economy the size of the US and the EU combined makes it even more unlikely, as factors such as geographical distance, domestic demand, skills gaps, working hours and pay are all differentiated across national and transnational economies.\n\nCapaldo explains: “We’re so used to thinking that more trade is always good that we overlook strong evidence to the contrary. If we expect a model like CEPR’s to give any answers on employment we’re missing the point. Those models based on CGE typically assume that when the economy contracts wages decrease enough to keep all workers employed.\n\n“But persistent high unemployment in Europe says this assumption is too far from reality: when the economy contracts, employment contracts as well.”\n\nThe same CGE computer-based data modelling is used thoroughly by the World Bank, and has projected outcomes that have not come to fruition. A World Bank study of the North American Free Trade Agreement (NAFTA) used CGE to project big increases in jobs and GDP in Mexico and America, but in reality GDP declined and wages fell in Mexico, and the effects on the US were negligible.\n\nExport boost?\n\nThe ideological origins of TTIP is clear, but for many the argument can still be justified in practical terms. In John Swinney’s 5 August letter on TTIP, he argues that “the US is Scotland’s largest export market out-with the EU and most significant source of inward investment”.\n\nSo wouldn’t increased exports and imports to the US mean greater investment and jobs? Even on this territory on closer inspection TTIP looks shaky.\n\nWhile increased economic activity with the US would follow from TTIP, Scotland’s biggest export market, the EU, is likely to see vast reductions in trade from an increased reliance on the US market.\n\nThe CEPR report finds that while US exports are likely to increase by 36.6 per cent and EU exports are likely to increase by 28 per cent, the overall increase in trade for the EU by 2027 will only be 5.9 per cent. This is because the increases in EU-US trade will be directly replacing intra-EU trade, likely to fall by over 20 per cent according to CEPR figures.\n\nTrade with non-TTIP countries would be likely to decline as well. Not only will the net increase in trade be marginal from TTIP, but Scotland as well as the whole of the EU will be more vulnerable to economic volatility in the US.\n\nThe impact of this marginal net increase in trade will also have a negligible effect on GDP, even according to the CEPR report, which predicts a 0.5 per cent increase for the EU by 2027, and only if regulations are cut by at least 25 per cent.\n\nWhat impact will TTIP really have?\n\nIn Capaldo’s report on the likely outcomes of TTIP, publicised by the World Development Movement in the UK, he predicts a completely different picture to that of the reports using the CGE data modelling system.\n\nCapaldo found that 583,000 jobs in the EU would be lost, with a fall in GDP, exports, income for workers, government revenue, as well as a fall in the share of income to workers versus capital and increased financial instability.\n\nThe UK figures are startling (although by no means the worst in the EU): a one per cent fall in exports within a decade, seven per cent of GDP transferred from labour to capital, a decline in income of PS3,300 per worker, a 0.4 per cent reduction in tax contributions and a net loss of 3,000 jobs.\n\nThe report finds that the US is the major benefactor of TTIP, with an increase in employment of 784,000. With labour cheaper and regulations looser in America, it’s unsurprising that in a single-market ‘race to the bottom’ across the Atlantic, jobs go West from the EU to US.\n\nEven in the US, however, TTIP would only lead to a 0.36 per cent increase in GDP, with a slight fall in the percentage of income to labour versus capital.\n\nCapaldo’s figures are based on the United Nations Global Policy Model (GPM) which takes into account various factors either ignored or theorised in a different way by the CGE model.\n\nThe differences in data modelling systems between GPM and CGE are vital in informing data projections, and are the reasons why the two systems find completely different outcomes. GPM is able to integrate the impact of TTIP on non-TTIP countries.\n\nGPM also uses the keynesian principle of aggregate demand in place of CGE’s ‘full employment assumption’ to calculate the impact of cutting wages and jobs on economic activity and consumption patterns.\n\nCrucially, Capaldo’s research doesn’t just see the headline employment figures and growth figures, important though these are.\n\nCapaldo takes account of the distribution of income between labour and capital, a key indicator of inequality, which leading global economists like Joseph Stiglitz, Paul Krugmann and Thomas Piketty believe to be a crucial factor in global economic stagnation and instability.\n\nGuy Taylor, trade justice campaigner with the World Development Movement, told the Morning Star that Capaldo’s report showed that “TTIP falls down even on its own terms”.\n\nHe added: “It’s supposed to bolster growth in the EU, but in fact it will result in fewer jobs and lower wages. This is truly a deal for the one per cent, and we have to stop it.”\n\nFrom “parts” to whole?\n\nThe last remaining promise of TTIP that Scottish politicians defend – that it will create jobs and growth – appears on closer scrutiny to be based on think-tank reports which use computer models with built-in assumptions that critics say don’t reflect reality. Even based on these reports, TTIP is likely to have only increased GDP by less than half a per cent in 13 years.\n\nOn the estimations of Capaldo, it’s likely to lead to over half a million job losses in the EU, as well as increasing inequality and instability. The Scottish Government has shown a willingness to re-think “parts” of TTIP, but will it listen to campaigners and question the whole premise of the trade deal?\n\nPicture courtesy of Mike Herbst", "pred_label": "__label__1", "pred_score_pos": 0.6901723146438599} {"content": "Exodus and Leviticus: A Parallel Reading (Part IV)\n\nThe following is part of series exploring the narrative of P material and its explanation of why Nadab and Abihu are killed in Leviticus 10. Such a study is important because theology often misuses verse like Leviticus 10:1-3 to demonstrate the un-malleability and impossibility of keeping Torah, resulting in antinomianism. In order to demonstrate the true focus of Nadab and Abihu’s death, I will compare two passages of P material, Leviticus 8:1 – 10:3 and Exodus 29 – 30:10. These pericopes, with a close reading, provide a reasonable explanation for the death of Aaron’s son.\n\nThe follow compares Exodus 29:31-37 and Leviticus 8:31-36. All translations are from the NASB.\n\nExodus 29:31-32 31 “And you shall take the ram of ordination and boil its flesh in a holy place.\n\n\n\nLeviticus 8:31 31 Then Moses said to Aaron and to his sons, “Boil the flesh at the doorway of the tent of meeting, and eat it there together with the bread which is in the basket of the ordination offering, just as I commanded, saying, ‘Aaron and his sons shall eat it.’\n\n\nExodus 29:33 33 “Thus they shall eat those things by which atonement was made at their ordination and consecration; but a layman shall not eat them, because they are holy.\n\n\nExodus 29:34 34 “And if any of the flesh of ordination or any of the bread remains until morning, then you shall burn the remainder with fire; it shall not be eaten, because it is holy.\n\n\nLeviticus 8:32 32 “And the remainder of the flesh and of the bread you shall burn in the fire.\n\n\nExodus 29:35 35 “And thus you shall do to Aaron and to his sons, according to all that I have commanded you; you shall ordain them through seven days.\n\n\n\n\nN/A N/A Leviticus 8:34 34 “The LORD has commanded to do as has been done this day, to make atonement on your behalf.\n\n\nExodus 29:36 36 “And each day you shall offer a bull as a sin offering for atonement, and you shall purify the altar when you make atonement for it; and you shall anoint it to consecrate it.\n\n\nExodus 29:37 37 “For seven days you shall make atonement for the altar and consecrate it; then the altar shall be most holy, and whatever touches the altar shall be holy.\n\n\n\n\n\nLeviticus 8:35 35 “At the doorway of the tent of meeting, moreover, you shall remain day and night for seven days, and keep the charge of the LORD, that you may not die, for so I have been commanded.”\n\n\nN/A N/A Leviticus 8:36 36 Thus Aaron and his sons did all the things which the LORD had commanded through Moses.\n\n\n\nAs this brief chart displays, these two passages are similar, although they do have distinct focuses. Exodus, first of all, is far more focused on issues of holiness. Verses 31, 33, 36, and 37 demonstrate a focus on the holiness, purity, and consecration of the altar. Unlike Leviticus, Exodus explicitly notes that non-Priests, laymen, are not to eat of the sacrifices. Leviticus is seemingly simpler and more focused on ensuring that Aaron and his sons did exactly what the LORD had commanded through Moses. In only 6 verses, there are two references confirming their obedience to commandments of the past, verse 34 and 36.\n\nThe parallels between the narrative and commands are intriguing for a variety of reasons. For the sake of this post’s length, I will focus on one, namely the rearrangement of Leviticus by the redactor. The difference between Leviticus and Exodus 29:36, especially with regard to the issue of holiness and consecration, may be due, in part, to the final editors movement of sacrificial terminology and practice to one which fit his own socio-historical context. Regardless of that, Yitzhaq Feder suggests that consecration of the altar in Leviticus 8:15 may have been originally more in line with Exodus 29:36 (See Yitzhaq Feder, 2011, pg. 50-51). With this is mind, these two portions of Leviticus and Exodus are even more similar than they seem to be within the redactors rearrangement.\n\nThe next post will take into consideration Yitzhaq Feder’s argument regarding the strata of Exodus 29 and Leviticus 8.\n\n\n\n\nRe-Understanding the Leviticus Sacrificial System\n\nPopular Christian tradition often defines and interprets ancient Israel’s cultic rituals and offerings in Leviticus through the narrow lens with which the New Testament discusses the issue of the sacrificial system. Passages like Matt 5:17-19, Rom 7:6, and Heb 10:1 leave an impression that the Levitical offering system was solely intended to prepare for Jesus and him alone. While this is undeniable in a sense, it is important to note the theological thrusts of these texts. Matthew, Romans, and Hebrews each work to demonstrate how Jesus fits into the grand scope of the Torah, not to provide a comprehensive discussion about the sacrificial system of Leviticus. Thus, in order to properly understand a book such as Leviticus, especially for a Christian, people must begin by recognizing that the New Testament is not definitive for Leviticus. If anything, Leviticus defines the New Testament and the New Testament operates within those parameters. Although it adjusts various understandings and interpretations (cf. Thomas Kazen 2002), it does not ever comprehensively discuss how the entirety of the system was abolished by Jesus.\n\nIn light of this brief discussion, what is required of biblical readers? Two basic ideas sum up how readers should approach Leviticus:\n\n1) Recognize the layers of tradition within the offering system. Leviticus was not written over one year and left as the original copy 3,000 years later. Rather, it has been redacted through various editors who lived in their own time with distinct influences than others may not have had (cf. Yitzhaq Feder 2011). What readers read now is the results of centuries of redaction. As a final comment, that is not to imply that Leviticus in unreliable. On the contrary, it is reliable, except one must recognize the variation within it.\n\n2) Leviticus should be read with recognition that the cultic ritual was central to lives in the ancient world. To ignore or place a glaze over Leviticus is to ignore the centrality of ancient Israel’s culture and life.\n\nAlthough these are only two of many essential hermeneutic approaches to Leviticus, they are a good starting place. By observing these two ideas, it may actually be possible to read Leviticus. This begins with expanding beyond the narrow view of the New Testament’s understandings of sacrifice and atonement and moving towards a more comprehensive understanding of Leviticus that takes into account the textual redaction and centrality of sacrifice to the ancient world.", "pred_label": "__label__1", "pred_score_pos": 0.9526076912879944} {"content": "Why does cryptocurrency matter? It matters because cryptocurrency is a sovereign currency beyond the reach of governments. When governments issue more currency to cover the gap between tax income and spending, it deflates the value of the currency.  When currencies lose their value, it takes more of it to have the same buying power in the global marketplace.\n\nFor example, U.S. food prices are up 10.6% this year with an overall inflation rate of 6.38% as the U.S. government collected $4.05 trillion in taxes and spent $6.82 trillion. Holding a currency outside the ravages of inflation would seem like a good idea.\n\nAt the heart of cryptocurrency is Bitcoin. Bitcoin rides on a distributed digital ledger page (blockchain) of Bitcoin transactions. Bitcoin has a planned annual inflation rate of 2% that will decline over time as the full 21 million coins are digitally mined in a process using high-speed computers consuming massive amounts of electricity to solve increasingly difficult mathematical problems. Successful miners are rewarded in Bitcoin. There is currently 18.22 million Bitcoin in circulation at a value of $47,339.65 per coin.\n\nIn my quest to learn more about crypto, I did what any boomer generation person would do when faced with a technological challenge; I enlisted the help of my millennial friends who spotted the beginning of the crypto-trend in 2017 or earlier.  At their suggestion, I set up an account in Coinbase, put in U.S. dollars, and purchased Bitcoin and a few other cryptocurrencies.  So far, I have learned that digital currencies are highly volatile with wide fluctuations in value throughout the day.\n\nThe “tuition” at the school of cryptocurrency investing has been a harsh one for me during my two-month venture with my crypto-portfolio down 21.2% and, at the same time, my stock picks are up 34.8% for the year. Although, both stock and crypto have seen a lot of red (decline in value) during the last month as Omicron appeared to be injecting fear, uncertainty, and doubt regarding the future economic outlook.\n\nIf you have any cryptocurrency experience you would like to share, please drop me a note!", "pred_label": "__label__1", "pred_score_pos": 0.7145848274230957} {"content": "Two recent additions to the Ross-Blakley Law Library collection have attorneys looking within, honing skills and reversing destructive thinking. Understanding and Overcoming Cognitive Biases for Lawyers and Law Students and Negotiation Essentials for Lawyers are driven by practicality: they hope to instill lessons that can make lawyers better at their job by identifying and neutralizing fallacies and other mental lapses and by developing a solid strategy at the bargaining table.\n\nUnderstanding and Overcoming Cognitive Biases for Lawyers and Law Students, E. Scott Fruehwald, 2018\n\nThe heart of this book on cognitive biases is active learning—it contains numerous exercises to ensure more retention of its key lessons so they are not lost in the passive learning of mere reading. Chapter 1 lists common cognitive biases to help lawyers and students overcome specific flaws in thinking. It identifies traps such as the overconfidence effect (“Excessive confidence in one’s own answers to questions.”) and the curse of knowledge (“When better-informed people find it extremely difficult to think about problems from the perspective of lesser-informed people.”) as particularly dangerous for attorneys. It introduces the difference between intuition and reasoning, and details the role of emotion in cognitive biases before introducing tools such as reflection to combat biased thinking. After this intro, chapters 2 and 3 delve into optimistic and negativity biases, respectively, with thought exercises. The next sections concern biases with how we interact with other people, which for lawyers includes countless clients, witnesses, judges, and other attorneys, and economic biases. Chapter 6 introduces the practical reasoning skills that can push back against (or be harmed by) cognitive biases. Later chapters concern ethics and other specific legal topics. Along the way, lawyers will understand not only how to push back against their own cognitive biases, but to strategically harness the biases of others for career success. The book provides detailed explanations for each of the thought exercises it presents to help lawyers internalize its lessons and apply them in the real world.\n\nNegotiation Essentials for Lawyers, Andrea Kupfer Schneider & Chris Honeyman eds., 2019\n\nThe concept behind this anthology was to distill the most important lessons about negotiation that lawyers will actually use and to help lawyers apply the lessons efficiently. Each chapter includes an explanation of why it is relevant to attorneys and why it might change their thinking. It is also kept to a reasonable length despite trying to absorb the vast body of knowledge on negotiation tactics into a single volume. Each author provides specific steps for attorneys to make in their future negotiations. They also address red flags with sections that explicitly lay out situations in which the chapter’s particular negotiation advice won’t apply. It provides negotiation advice in a number of different contexts, including different practice areas and different cultures. The chapters are arranged into thematic sections, with an introduction, a unit about the negotiator as a person, and how personal differences including race and gender can play out in negotiations. Section III concerns setting and achieving appropriate goals for your negotiation. Section IV primarily concerns listening and communicating well. Section V involves working with negotiation counterparts. Sections VI and VII concern more specific contexts such as mental illness and cultural differences, or dealing with large organizations, arbitrations, or plea bargaining. Sections VIII and IX concern work with your client and with third parties, and Section X wraps up with strategies to close a deal.\n\nThe post Mind Games: Train Your Mind for Optimal Lawyering appeared first on Ross-Blakley Law Library Blog.", "pred_label": "__label__1", "pred_score_pos": 0.947668731212616} {"content": "Lorenzo Quinn, support, creates history at the venice biennale\n\nOn 13 May, contemporary artist, Lorenzo Quinn, launched his new monumental sculpture at the Ca’ Sagredo Hotel, Venice. Internationally renowned as one of the most popular sculptors of our times, the installation showcases Quinn’s artistic progression and his experimentation with new mediums and subject matter to transmit his passion for eternal values and authentic emotions.\n\nReflecting on the two sides of human nature, the creative and the destructive, as well as the capacity for humans to act and make an impact on history and the environment, Quinn addresses the ability for humans to make a change and re-balance the world around them – environmentally, economically, socially. Support sees Quinn reflect on and readdress these global issues by employing the ancient lost-wax process in his Catalan foundry and echoing the meticulous execution and technique of the Masters of the past to create the powerful and unique sculpture which will be displayed during the Venice Biennale 2017…", "pred_label": "__label__1", "pred_score_pos": 0.9999856352806091} {"content": "Categories FAQ\n\nQuestion: How deep is a standard chest of drawers?\n\nA standard chest is taller (44″ – 60″), narrower (30″ – 40″ wide), and about as deep (16″ – 20″) as a standard dresser. You’ll have less counter space with a chest, but your room will feel more open.\n\nWhat is the average depth of a dresser drawer?\n\nDepth: Standard depths are 14-inches, 16-inches and 20-inches. Height: The height of the drawer refers to the height of the drawer face. The actual height of the box is usually less. Standard heights are 5-inches, 7.5-inches, 10-inches and 12-inches.\n\nHow deep should drawers be?\n\nDrawer depth or height is not critical, but the most common difference between the drawer and the opening is 3/4 inch. For example, if the opening measures 4 inches vertically, the drawer should be built 3 1/4 inches. This allows 1/4 inch at the bottom where the slide is attached, and 1/2 inch at the top for clearance.\n\nWhat is the size of a standard drawer?\n\nKitchen drawers, or drawer boxes, correspond with the size of your cabinets and their intended uses: For base cabinets, drawers range 6-36″ in width, 4-10″ in height, and just under 24-36″ deep, depending on the depth of the base cabinet (which could also be the island).\n\nYou might be interested:  Often asked: How To Bake Sweet Potatoes In Oven With Foil?\n\nHow wide should dresser drawers be?\n\nDresser drawers should be no more than 36 inches wide. Specifically, states, a “standard size pine chest of drawers” is typically sized in either “17-inch width, 24-inch width, 30-inch width or 36-inch width” drawers.\n\nHow do you measure the depth of a drawer?\n\nBegin by measuring along the bottom floor of the drawer at the back edge, middle, and front edge. Check for variations across the height of the drawer as well. Take the smallest of these measurements. Repeat this step for the depth measurement on the left edge, middle, and right edge across the floor and the height.\n\nHow do you measure chest of drawers?\n\nMeasure from the floor of the drawer to the top of the sides. Do this for the back of the drawer, the sides and the front of the drawer, as panels may differ in measurements around the drawer. Repeat the steps above for every drawer in a dresser (or other furniture piece).\n\nIs a 36 inch drawer too big?\n\nA deep, wide drawer does have a limit in size. You just can’t do a wide drawer at 36 ” wide or more, because it will sag over time, even with heavy duty glides. Homeowners might tend to weigh down that drawer with big, heavy items and you have to account for that happening somewhat.\n\nHow big is too big for a drawer?\n\nThe rule of thumb is 1.5 times the length of the drawer slide. If you have a standard depth kitchen cabinet then the normal length of drawer slide is 22”. If you multiply 22” x 1.5 = 33”. You can go wider, but the wider you go the more chance that the slide will not pull out as smoothly as you hope or expect.\n\nYou might be interested:  Readers ask: Does corn grow in Jamaica?\n\nHow thick are drawer slides?\n\nLight duty slides might be as thin as 1/2″, while heavy duty slides may be over 3/4″ thick. Face frame cabinet slides are easier to install using the specific, optional, face frame brackets. Length sizing is usually simplified by checking manufacturer’s charts, where the drawer size and cabinet depth are both stated.\n\n1 звезда2 звезды3 звезды4 звезды5 звезд (нет голосов)\n\nLeave a Reply\n", "pred_label": "__label__1", "pred_score_pos": 0.6075483560562134} {"content": "Energy revolution to have ‘greater impact’ than industrial\n\nThe Energy Solutions exhibition kicked off this morning with the Renewable Energy Association's vice chair of the onsite renewables sector, David Hunt, claiming that the coming energy revolution will be the most important to date.\n\nHunt acknowledged that the most significant revolution had been the industrial followed by the Internet revolution, both shaping the way the world works today.\n\nHowever, he argued that the coming energy revolution would be “of greater global, political and economic impact than any revolution before.”\n\nPointing to regulator Ofgem’s recent report, which suggested that spare energy generating capacity in the UK could fall to 4% by 2015/2016, Hunt warned that the UK could be facing black outs or energy rationing if British energy supplies fail.\n\nHe also explained that currently, in the UK, energy prices are at least double the rate of inflation, and that the government was not sending clear signals.\n\n“We are facing a government that isn’t listening. Just this week we heard the Chancellor George Osborne’s speech which had no mention of climate change and no mention of a green economy,” he said.\n\nHe accused the government of “spooking investors” and causing uncertainties in the renewable sector, adding that the “battle between the Department of Energy and Climate Change (DECC) and the Treasury had made everyone uneasy.”\n\nHunt also announced that the overwhelming consensus of experts was that the Green Deal, as it stands, was a “car crash policy”.\n\nThe vice chair went on to say that once again the Green Deal had the potential to cause more uncertainty for renewables investors.\n\nHunt argued that there was “no silver bullet” to address the problem of energy supply.\n\n“Nuclear isn’t the answer and wind isn’t the answer: they are both part of an answer along with other technologies such as solar PV, heat pumps, biomass, anaerobic digestion, fuel cells and other developing technologies.”\n\nHe pointed to the CBI’s analysis that a third of the UK’s economic growth in 2011/2012 is likely to have come from green businesses.\n\n“We need to see a Treasury seeing the growth opportunity that the CBI see,” urged Hunt.\n\nHowever, there was good news he said. The renewable sector had made big steps so far.\n\nIn September of this year the UK onshore wind capacity reached 5GW with wind farms producing 10.8% of overall UK energy demand.\n\nAccording to DECC, renewable energy output capacity soared by up to 42% over the past year to 14.2GW.\n\nHunt claimed that although feed in tariffs had been tampered with and the renewable heat incentive had experienced teething problems, they were still attractive options.\n\nLive from the Energy Solutions exhibition at Olympia.\n\nConor McGlone\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9995738863945007} {"content": "ElkhartRecruiter Since 2001\nthe smart solution for Elkhart jobs\n\nRV Sales Associate\n\nCompany: Tiara RV Sales\nLocation: Elkhart\nPosted on: November 25, 2022\n\nJob Description:\n\nOur success is rooted in our exceptional team, which has been growing since 2002. Our sustained growth has been fueled by our family values and passion for the RV lifestyle.As a member of the Sales team, you'll be a key player in creating opportunities for families to make lifelong memories. You'll match customers with their perfect RV and start them on their journey to the RV lifestyle. Be a part of a team that will push you to succeed, earn, and help you achieve your highest potential._*What's in it for you?*_ When you join our team, you become part of the Tiara RV family. It's more than a job - it's the opportunity to build a career, make a difference, and be part of an exciting industry. If you're looking for a place to call home, we want to hear from you!Manage the sales process from start to finish. Help clients with product selection, negotiate terms, and ultimately finalize sales.\nProvide detailed and accurate product knowledge to customers.\nEstablish and maintain strong relationships with customers while providing outstanding customer service.\nContinually learn about product updates, inventory and how it will benefit the customer.\nResponsible for daily follow up with current, existing, and potential leads.\nIdentify and provide solution-based sales options for customers.\nYou will work directly with the Financial Office in coordinating the sale and financial lending process.\nHustle - The sales team moves fast and so does the competition. The right candidate establishes relationships quickly while earning trust by providing expert knowledge and unparalleled customer service.\nCompetitive - We look for candidates that are interested in breaking records and raising the bar to what is possible. We play to win.\nAttitude - The sales team believes in hard work and having fun while doing it! A positive and work-hard attitude will serve you well.\nPassion - We are in the business of providing a lifestyle to those that are passionate about RVing. You need to share the passion for the products that we represent and be willing to go the extra mile for our customers.\nCandidates should have retail experience specifically in Automotive, Powersports, or the RV industry. The amount of experience is less important than having the qualities of a successful sales associate (communication, competitiveness, positive attitude...etc). We're constantly on the lookout for the \"diamond in the rough\" and willing to train and develop an individual who has the right attitude.Many sales associates earn well over $100,000 a year once becoming fully acquainted with our products and processes. The average first year earning potential for sales associates with minimal to no sales experience is between $50,000 - $75,000. Tiara RV offers a comprehensive benefits package that includes medical, dental and vision insurance\n\nEmployment Type\n\nJob Type: Full-time\n\nPay: $35,000.00 - $75,000.00 per year\n\n* Dental insurance\n* Health insurance\n* Vision insurance\n* 8 hour shift\n* Day shift\n* Monday to Friday\n* Weekend availability\nSupplemental pay types:\n* Commission pay\n\nAbility to commute/relocate:\n* Elkhart, IN 46514: Reliably commute or planning to relocate before starting work (Required)\n\n* Retail Sales: 1 year (Preferred)\n\nWork Location: One location%58047475%\n\nKeywords: Tiara RV Sales, Elkhart , RV Sales Associate, Other , Elkhart, Indiana\n\nClick here to apply!\n\nDidn't find what you're looking for? Search again!\n\nI'm looking for\nin category\n\nLog In or Create An Account\n\nGet the latest Indiana jobs by following @recnetIN on Twitter!\n\nElkhart RSS job feeds", "pred_label": "__label__1", "pred_score_pos": 0.9655411839485168} {"content": "Founded in 2016, Sixteen is an independent media platform celebrating the power of contemporary photography.Published bi-annually, and on its digital platform, Sixteen gives a space for emerging and established artists to share their creative vision outside of their commercial habitat. Through compelling visual stories in fashion, documentary, cinema and social/environmental justice, Sixteen is a rare place for creativity.", "pred_label": "__label__1", "pred_score_pos": 1.0000089406967163} {"content": "A governance structure for an ambitious EU industrial strategy\n\nIn the aftermath of the two previous Industry4Europe Joint Papers “For an ambitious EU Industrial Strategy: Going further” (October 2017) and “Setting indicators for an ambitious EU Industrial Strategy” (March 2018), this new Joint Paper aims at proposing a governance structure which enables the implementation of an ambitious EU Industrial Strategy, based on an informed dialogue between the industry, decision-makers at EU, national, regional and local levels and the Civil Society. More specifically, a future Industrial Strategy governance structure should be based on the following two pillars:\n\n\n- A structure of European Institutions which allows for an Industrial Strategy to be addressed and implemented at the highest level.\n\nWith its Joint Paper “For an ambitious EU Industrial Strategy: Going further” (October 2017), the Industry4Europe coalition has been calling for a long-term vision for Europe’s industry which demands a long-term governance structure going beyond the 6-month EU Presidency cycle and the 5-year mandate of the current European Commission. Such a governance structure should enable the Commission, the Council and the European Parliament, together with industry stakeholders, to develop a common vision for smart, innovative and sustainable industry. Existing policies, initiatives and tools, addressing the challenges and gaps, including those described in the Commission’s Communication “Investing in a smart, innovative and sustainable Industry: A renewed EU Industrial Policy Strategy” of September 2017, should be reviewed in order to develop and implement a long-term comprehensive EU Industrial Strategy as well as for monitoring its progress on a regular basis.", "pred_label": "__label__1", "pred_score_pos": 0.9940969944000244} {"content": "\n\n\nYou play as something new and incredible in this world; a Teenager. Never before has the world been in a place that allowed for a long adolescence, and as the first of these strange creatures, you make a lot of people uncomfortable with your wild clothes, your loud music and your strange habits. Players choose from one of 6 teenage archetypes – Jock, Nerd, Artist, New Kid, Outsider, Royal – each with their own strengths and place within the high school ecosystem. You’ll also pick from one of 9 fantasy species, each with their own unique backstory and history within the world.\n\nAmericana features innovative new mechanics; Your Dead Friend pushes the victim of the murder to the center of the story, and Flashbacks let you build your relationship with the victim dynamically through play. Town Creation lets you and your table collaboratively create an incredible town full of magic and mystery and an extensive resources section helps you and your players build the perfect mystery.", "pred_label": "__label__1", "pred_score_pos": 0.986611008644104} {"content": "Titleist 2022 AVX Same Number Personalized Golf Balls, Men’s, Orange\n\nSKU: 4963901699879008Category:\n\n\nBENEFITS Designed for longer distance, increased greenside spin and control, softer feel, and very low long game and iron spin TECHNOLOGY Large core formulation High flex casing layer New, soft, thin cast urethane elastomer cover system New, unique spherically-tiled 348 catenary dimple design\n\nAdditional information", "pred_label": "__label__1", "pred_score_pos": 0.9984293580055237} {"content": "Oesophagus Illness\n\nJune 24, 2022\n\nThe oesophagus, otherwise known as the gullet or swallowing tube, is the “pipe” that links the mouth to the stomach, and allows food to pass down after chewing and swallowing into the rest of the digestive tract where digestion and absorption of nutrients occurs.\n\nIt’s an important structure, and a number of diseases can affect its function and overall gut health. Some of them are listed below:\n\nGERD (Gastro Oesophageal Reflux Disease)\n\nBackflow of stomach contents into the oesophagus can cause symptoms such as heartburn a bitterness in the throat and a variety of other symptoms. The diagnosis is made by endoscopy or a special reflux study. Treatment involves lifestyle changes in tandem with medicine and sometimes surgery. \n\nBarrett’s Oesophagus\n\nBarrett’s is a change in the lining of the oesophagus as a result of constant and chronic reflux. This condition needs to be managed and monitored, as there is a small potential for malignancy. \n\nOesophageal Dysmotility\n\nThe movement of food down the oesophagus does not happen by gravity but is a result of coordinated contractions involving the nerves and muscles. A disruption of this can result in swallowing difficulties and significantly impair one’s quality of life. Diagnosis involves the use of High-Resolution Oesophageal Manometry and a pH-Impedance test, and once the correct diagnosis has been made, effective treatment can be given.\n\n\nThis is one of the most significant disorders of swallowing, where the oesophagus movement stops and the valve allowing food to enter the stomach is jammed. The diagnosis and subtyping is confirmed by High-Resolution Oesophageal Manometry, and effective treatment can be given.\n\nPill Oesophagitis\n\nThis is a common condition when tablets or pills are not swallowed properly and get stuck in the narrowest part of the oesophagus, and the medication in the pills get into contacts with the oesophagus and results in painful ulcers forming.\n\nEosinophilic Oesophagitis\n\nThis condition presents in a variety of ways, and can sometimes mimic a heart attack. It’s a result of an allergic reaction of the oesophagus causing allergic type cells to accumulate and cause damage to the lining of the oesophagus. Accurate diagnosis by endoscopy and biopsy to see the cells is crucial before treatment can be instituted.  \n\nOesophageal Cancer\n\nCancer of the oesophagus most commonly occurs in an elderly male with a strong history of smoking and drinking alcohol. They usually have symptoms such as difficulty in swallowing and loss of weight.", "pred_label": "__label__1", "pred_score_pos": 0.999147355556488} {"content": "Bioinformatics – The Emerging Field in Science Yields New Discoveries\n\nPage content\n\nArticle Body\n\nWith all of the advancements and discoveries that have been made by studying genetic information and DNA, there became the need to have a store house to keep all of this information safe and secure as well as be able to access, sort and utilize the information quickly and when needed.\n\nFor this reason, there came about the idea of having a database that is capable of holding bioinformatics findings and allows users to draw on it to answer specific biology questions. The findings that have taken place by studying DNA and protein sequences needed a place to be recorded and that would keep the precious information and data safe.\n\nThere are three key concepts in bioinformatics:\n\n 1. Data Representation – DNA is not clearly arranged in human genes, it is coated with certain proteins that tend to bind to different sequences and this makes a sort of blueprint that biologists have to read. DNA is represented as a helix and is three dimensional. Yet as complex as DNA sequences are, there are only 4 characters used to differentiate the molecules – A, C, G and T.\n 2. Similarity – evolution conserves the genes that are responsible for coding proteins and other important sequences that serve useful functions when being transferred from one organism to another. It has been found that certain organisms have similar sequences due to evolution.\n 3. Bioinformatics is not a theory based science – bioinformatics, apart from other branches of science, is not based on theories, but is based on data that is gathered from researching and studies. It is truly based on information that is gathered instead of proposed theories used in many forms of science.\n\nThe kind of information that is stored for bioinformatics includes genetic comparisons between species. The more that scientists and researchers study and compare the genetic sequences, the more similarities that they are finding. By being able to store all this information into a system is critical to the future success of the field. It is through the advancements in technology that bioinformatics has come so far in only a few years, and the future looks good for continuing to learn more about how DNA sequences work.\n\nAnother kind of comparison that will be done is comparing the genome of humans to other humans. By doing this kind of study and comparison, scientists are able to learn what makes one person different from another person. These kinds of advancements in bioinformatics call for an even greater need for the ability of a system that will hold and gather information. The sequences of people can be stored in the system, and scientists are able to draw upon that information to make their comparisons.\n\nWith the introduction of DNA sequencing that became automated in the 90’s, the amount of data that was available was greatly increased. The more research and studies that are being completed, the more data is being created. This opens up the door to career paths for aspiring bioinformatics professionals. There looks to be no shortage in jobs in the years to come for scientists, computer engineers and programmers, information technology and mathematic based careers. The field of bioinformatics is a highly skilled job field due to the amount of different kinds of knowledge that a person needs to have in order to succeed.", "pred_label": "__label__1", "pred_score_pos": 0.8392144441604614} {"content": "Trump says he wants an 'exciting' July 4 parade at the Lincoln Memorial\n\nJohn Fritze\n45. Donald J. Trump (1946-present)     • Years served as president: 2017-present     • Political party: Republican     • Weird fact: Trump doesn't drink alcohol.     The current president is one of the few commanders in chief to not drink alcohol. He chooses not to indulge in the beverage likely because his brother was an alcoholic and died of his addiction in 1982.\n\nWASHINGTON – President Donald Trump is back in the market for a parade. \n\nSpeaking to members of his Cabinet on Tuesday, the president said he has been thinking about a July 4 parade, potentially at the Lincoln Memorial that could “become a tradition.”\n\n“It could be an exciting day,” Trump said. \n\nThe president made news last year for proposing a military parade in Washington, which the Department of Defense said would cost as much as $80 million. Trump has expressed a desire for such a parade for years and was impressed by the Bastille Day march he witnessed on a presidential trip to Paris in 2017.  \n\nContributing: William Cummings, Tom Vanden Brook", "pred_label": "__label__1", "pred_score_pos": 0.736236572265625} {"content": "London Riots – Gordon Thompson – What Does His Sentence Actually Mean?\n\n\nGordon Thompson, the man who set alight the House of Reeves furniture store in last summer’s riots was sentenced to a prison sentence of 11 years and 6 months years at the Old Bailey on Wednesday 11th April 2011. When sentencing the Judge commented “the loss [for the Reeves family] was priceless and the trauma they have suffered inestimable”.  The Judge went on to say that it was, “extremely good fortune… that nobody died or was seriously injured”\n\nThe sentence is the longest that has been imposed in the rioting cases. Whether it was too long or even too short is perhaps a matter for public debate, but what does the sentence actually mean?\n\nUnder the provisions of the Criminal Justice Act 2003 any adult who is sentenced to a fixed term of imprisonment for an offence committed after 1st April 2005 is automatically released on licence at the half-way point of the sentence, which in Mr. Thompson’s case will be after he has served 5 years 9 months. They will then remain on licence for the remainder of the period.\n\nIf a person has spent time in prison on remand or has been subject to bail with a condition to comply with a curfew monitored by an electronic tag, before he or she is sentenced it is invariably the case that the sentencing Judge will allow for this time to be deducted from custodial sentence. The Judge will deduct one day from the time to be served for each day spent remanded in custody prior to sentence and half a day for each day spent on a tag-monitored curfew, provided that the curfew condition was for 9 hours or more.\n\nFor example a person who receives a sentence of, for example, 10 years and has been remanded in custody for 1 year before being sentenced will be automatically released after serving a total of 4 years in prison; that being half of the 10 year sentence less the 1 year spent on remand.  If the same person had spent 1 year on a qualifying curfew he or she would be released automatically having been in prison for 4 years 6 months; that being half of the sentence less 6 months being half of the time spent on curfew.\n\nWhen a person is released they will be subject to licence for the second half of the sentence (as long as the sentence imposed was for 12 months or more).  In simple terms being on licence means that the person who is released must be of good behavior and must comply with any licence condition imposed by the Probation Service. Such conditions may include details of where they should live, the type of work he or she may do and with whom he or she may associate.\n\nIf a person breaches any of their licence conditions or are suspected to commit another offence during the period of the licence, then they can be liable to be recalled to prison. How long they remain in prison depends on the type of recall.  In practice it is usual for a first breach of licence to be dealt with by way of a fixed term recall to prison for 28 days, but if the breach is deemed to be serious or is a second breach the person is liable to remain in custody until the end of the sentence or until the Parole Board or Secretary of State direct that they can be re-released on licence once again.\n\nShare this article…\n\n • Linkedin\n • Google+\n\n\n\nFind your nearest Hine Solicitors office here …\n\n\n\n“I just wanted to take this opportunity to say thank you so much for your professionalism, hard work, and your patience afforded to…\n\n\n\n\nHow can we help? Request a callback...\n\n\n You can also view our GDPR Recruitment Policy here.", "pred_label": "__label__1", "pred_score_pos": 0.593525767326355} {"content": "Energy intake and expenditure in obese older adults with and without type 2 diabetes\n\n\nRationale: Obesity is a risk factor for type 2 diabetes (DM2), however not all obese people develop DM2. We explored differences in energy intake and expenditure between obese older adults with and without DM2. Methods: Baseline data from 2 lifestyle interventions with a total of 202 obese older adults were included in the analyses. Obesity was defined as BMI > 30.0, or >27.0 with waist circumference >88 (women) or >102 cm (men). DM2 was confirmed by use of diabetes medication. Subjects were between 55 and 85 years old and 45% was female. Energy intake (EI) was measured by 3-day food diary and physical activity level (PAL) by 3-day movement diary. Resting energy expenditure (REE) was measured using indirect calorimetry and total energy expenditure (TEE) was calculated as REE x PAL. Between group differences were analysed with independent samples T-tests. Results: The obese group with DM2 (n = 117) had more males (67.5% vs 37.6% p < 0.001) and similar BMI (33.3 vs 33.0 kg/m2) compared to the group without DM2 (n = 85). Analyses of males and females separately showed lower PAL in males with DM2 (vs without DM2; 1.37 vs 1.45, p = 0.015), without differences in EI (2055 vs 1953 kcal/d), REE (1970 vs 1929 kcal/d), and TEE (2699 vs 2830 kcal/d). In females with DM2, both PAL (1.38 vs 1.47, p = 0.014) and EI (1543 vs 1839 kcal/d, p = 0.008) were significantly lower, whereas REE (1592 vs 1598 kcal/d) and TEE (2220 vs 2318 kcal/d) did not differ significantly from obese females without DM2. Conclusion: In both males and females, obese older adults with type 2 diabetes showed similar resting and total energy expenditure but lower physical activity level compared to those without DM2. Females with DM2 showed lower energy intake. On average, subjects seem to have a negative energy balance, which is probably due to a combination of underreporting of intake and over-reporting of activity.\n\nReference Memelink, R. G., Verreijen, A. M., de Vogel-van den Bosch, J., & Weijs, P. J. (2017). Energy intake and expenditure in obese older adults with and without type 2 diabetes. In N. E. P. Deutz, J. A. Mays, & S. C. Roeske (Eds.), Abstracts of the 39th ESPEN Congress: 9-12 September 2017 • The Hague, Netherlands (pp. S232). (Clinical Nutrition; Vol. 36, No. supplement 1). Elsevier.\nPublished by  Faculteit Bewegen, Sport en Voeding 1 January 2017\n\nPublication date\n\nJan 2017\n\n\nJ. de Vogel-van den Bosch\n\n\nResearch database", "pred_label": "__label__1", "pred_score_pos": 0.9999500513076782} {"content": "Choose your language\n\nThe road ahead to be Fit for 55\nEU | Brussels\n\nThe road ahead to be Fit for 55\n\n30 May 2022 · Environment\n\nThe timely deployment of alternative fuels infrastructure across the EU, and smart taxation and charges, which encourage operators to decarbonise, are paramount for successfully decarbonising road transport.\n\nRaluca Marian is the Director EU Advocacy and General Delegate of IRU’s Permanent Delegation to the European Union.\n\nCollective passenger transport is a decarbonisation tool in its own right. Yes, it groups people and moves them away from private cars. But it would bring even further benefits if cleaner vehicles and fuels were readily available across the EU.\n\nGreening road freight fleets is also crucial given that road transport by road represents over 75% of the EU’s overland goods transport. What is more, there are realistically no chances of a massive shift to other transportation modes, even in the distant future.\n\nAlmost one year after the launch of the ambitious Fit for 55 Package, discussions between the European Parliament and the Council are at an advanced stage on the legislative proposals to boost decarbonisation in the EU.\n\nThree of those are fundamental for the decarbonisation of road transport: the proposal for a regulation on alternative fuels infrastructure (AFIR), the inclusion of road transport in the scope of the emissions trading scheme (ETS II) and the revision of the energy taxation directive (ETD). Are these proposals heading in the right direction?\n\nThe green transition of the coming decade will require an enormous effort: about 1 million transport companies in the EU use over 35 million vehicles, of which approximately 7 million are heavy-duty vehicles.\n\nAs zero-emission vehicles are starting to hit the market, it is imperative to roll out an alternative fuels infrastructure across the EU. This means making alternative fuels widely available and providing a strong grid to deliver enough power to charge an increasing number of electric vehicles.\n\nThe European Commission’s AFIR was a good starting point in terms of the ambition required to decarbonise goods and passenger road transport. Yet, while the European Parliament seems determined to go even further, we see a risk in the Council’s timid approach, in particular for heavy-duty vehicles. A less ambitious outcome would be a significant setback in achieving the objectives of the European Green Deal.\n\nWe know that the taxation and charging structures proposed by ETS II and ETD can act as a strong incentive for rapid decarbonisation. The only condition is that they go hand in hand with an alternative fuels infrastructure and wider availability of zero-emission vehicles. It would work even better if the revenues collected (particularly through ETS II) were used to invest in the decarbonisation of road transport. Unfortunately, the European Parliament’s committee reporting on this file (ENVI) has recently reached a weak compromise, which will fail to deliver a fit-for-purpose ETS II.\n\nENVI proposes the almost immediate introduction of commercial vehicles in the scope of ETS II, leaving aside private road users. Not only does this ignore the 300 million private vehicles producing more than 70% of road transport CO2 emissions, but it is also an impractical, largely unenforceable system.\n\nNot to mention the strong counterproductive signal to EU citizens and businesses against the vital role of public transport, collective mobility and efficient goods transportation in greening our roads.\n\nIn conclusion, the European Union’s decarbonisation plans for road transport will only be successful with good timing and appropriate incentives. Vehicles, fuel infrastructure and fuel availability need to be taken into consideration together. Road transport operators need a motivating stimulus to initiate the transition, including through smart taxation and gradually introduced charges.\n\nToday, with the legislative process in full gear, we are still hopeful. We call on the Council to embrace ambitious targets for alternative fuels infrastructure, and the European Parliament to vote against a weak compromise on ETS II, which currently fails to deliver on its promise.", "pred_label": "__label__1", "pred_score_pos": 0.9980186820030212} {"content": "In the era of fake news and proliferating social media content, how can TV news help to bolster trus\n\nFake news, conspiracy theories and fabrication are aspects of our society that have been prevalent for centuries. Editor of the Financial Times, Lionel Barber, traced fake news all the way back to ancient Rome, in a 2017 Oxford alumni festival speech:\n\n‘My own fake news item of choice comes from ancient Rome: the dodgy dossier obtained by Octavian used to discredit his imperial rival Mark Antony. Octavian claimed that a document in his possession was Mark Antony’s last will and testament. It was later dispatched via messengers throughout the empire. Not quite as effective as social media, but still a successful political stitch-up, circa 33BC’. (Barber, 2017)\n\nIn fact, from a biblical perspective, one could go as far as to say that fake news began with Satan, disguised as a serpent, telling Eve to eat the apple. However, a more recent awareness of fake news can be seen through a proliferation of the ways in which we absorb our news, and information. As a recent CNN article elucidated: ‘social media has added an entirely new dimension to the [fake news] phenomenon.\n\nNow anyone in the world can easily create and disseminate false information, and with the help of bots, organized groups, or targeted ads, it is easy to amplify it’ (CNN, 2017). TV News is perhaps going through its most challenging time with the proliferation of fake news. A 2017 Media Survey Report from BBS Communications Group elucidated that, when asked about fake news, ‘the largest term that came to journalists was Donald Trump (20.6% of 141 responses)’ (BBS, 2017). It could be suggested that the 45th President of the United States ‘has arguably been the biggest beneficiary of the advent of fake news […] He has also benefitted from the distrust of the mainstream media by many conservatives, by calling inconvenient news ‘fake news’’ (BBS, 2017). Therefore, could it not be argued that the more time spent giving weight and attention to fake news, the more it will snowball – almost becoming a “buzz” term. Thus, through its mention, we cement it deeper into an accepted, everyday narrative. Author Mark Dice elucidates: ‘One outlet published an article cautioning against growing fake news panic titled, “Stop Calling Everything ‘Fake News’” […] two months ago, almost no-one was talking about fake news. Now you can hardly turn on the real news without hearing it’ (Dice, 2017: np). TV news’ lack of reference to fake news could be a positive enhancement to building trust in viewer’s.\n\nOne way of looking at the proliferation of fake news across digital platforms, is that it can aid the trustworthiness of television news because, as people see an influx of fake news online, they turn to the medium they know best for validity and clarification – that being TV news. A 2007 Ofcom report elucidated that: ‘Consumers want and expect to see high quality, well-funded PSB-style television news […] three quarters of the population think news coverage on the PSB channels is important, and 80 per cent agree it is important that terrestrial channels are obliged to provide regular news’ (Ofcom, 2007).\n\nCompare this to the Ofcom report of 2017 and it states: ‘Despite the threat from online services, revenue for the broadcast TV industry increased by 1.0% [and additionally], the main public service broadcast channels (BBC One, BBC Two, ITV/STV/UTV, Channel 4 and Channel 5) continued to retain more than half of the total broadcast TV audience in 2016, maintaining their 51% share over the past four years’ (Ofcom, 2017). Thus, it appears despite the changing of times, people are still reliant on TV news to a certain extent. Trust in the media could be a result of its transparency; there are physical, on-the-spot, reporters and this in itself appears more dependable than videos on social media platform: ‘With TV and radio, in particular, the face or voice of the journalist is an important part of why people rely on it’ (American Press Institute, 2016). Fake news does not have a face like TV news does, and this in itself makes TV news trustworthy.\n\nHowever, the challenge is to retain the attention of the younger generations. A report in 2016 highlighted that ‘social media has overtaken television as young people's main source of news’ with ‘28% of the 18-to-24-year-olds surveyed, citing social media as their main news source, compared with 24% for TV’ (Wakefield, 2016). Mobile phones are surpassing every other medium for news consumption and so a way for TV news to help bolster trust and confidence in its viewers would surely be to alter their business models. In an attempt to correspond with the wake of digital newness, ‘It’s up to traditional broadcasters to continuously adapt and respond in order to stay relevant to their viewers in the future’ (Translate Media, 2017). With the knowledge that ‘about 67 percent of American adults somewhat rely on social media platforms such as Facebook, Twitter and Snapchat for news’ (Moon, 2017), it is wholly evident that our increased use of social media is leading to an altered way of news absorption. The ease of scrolling down a news feed, videos that play automatically and an ever-growing societal interest in social media is provoking a change in our news consumption.\n\nSo, how can broadcasting services bolster this trust? They need to be transparent about how they conduct their research, and demonstrate fact checking. For example, 2017 saw the BBC ‘assemble a team to fact check and debunk deliberately misleading and false stories masquerading as real news’ (BBC, 2017). The BBC additionally have a ‘Reality Check’ section on their website which delivers information that public have requested the team to investigate. Their team checks and examines facts and claims behind a story in order to let the public know whether or not it is true. Equally, Channel 4 have a ‘Fact Check’ section and release regular videos online such as ‘How to Fact Check Fake News Sites’. They give advice such as checking images saying that hoaxers often use real images but lie about where they were taken. Channel 4 thus advise people to use Google Images to find out more about an image. This shows how Channel 4 are working in a positive way with the proliferation of social media to spread the message of fake news. Services such as this are undeniably ways in which TV news can help bolster trust in its viewers and maintain its audiences in this ever-altering era.\n\nA recent shooting at the YouTube headquarters saw malicious posts on social media suggest that US comedian Sam Hyde was the alleged gunman, later dismissed as fake news. Undeniably, the lines between fake news and satire can sometimes become blurred, with websites such as The Daily Mash producing flagrant stories inclusive of “Women paid 1990s wages 'to make them feel younger’”. However, with other fake news websites the fallaciousness can be more arduous to decipher, with URLs fabricating themselves as ones similar to trusted sites; ABCnews.com.co, for example. Instances and websites such as the aforementioned are why TV broadcasters should provide full transparency and fact checking. TV news remains a powerful form of media because it dispels the untruths and presents the viewer with hard facts about the events, but it needs to prove to its viewers that this is the case.\n\nTV news can undeniably bolster trust and confidence in its viewers, but there is no doubt that it is challenging in the present climate to do so. With the Trump administration being described by many as ‘the antithesis of science, facts and research’ (Rymel, 2017), people are having to attempt to regain their trust in the media and TV news. Our distrust in TV news and the media dates back through history, teaching us the lesson that ‘it is our responsibility to find out what is really true, regardless of who says it’ (Rymel, 2017).\n\nTV news’ struggle is to persuade people whom, as human beings do, already have cemented opinions of their own, and are thus searching for confirmation through the media, as well as fighting against social media and fake news. After Brexit and the election of Trump, ‘the free circulation of malicious lies, the ineffectiveness of fact-checking, the resilience of populist propaganda, racism and sexism and the emergence of the so-called post-truth era appear to challenge a fundamental cornerstone of ethical journalism’ (Ethical Journalism Network, 2017). Journalists have the problem of news coming across as “unfashionable”, and the question of how TV news can regain their viewers trust is not a question that is going to be answered overnight. In essence, ‘this existential crisis requires, above all, for journalists to recommit to their craft with reporting that reaches out to their audience and listens to what is being said and reports it in context’ (Ethical Journalism Network, 2017).\n\nTV news is moving in the right direction to combat this aforementioned existential crisis with the introduction of fact checking sites, however the challenge is for journalists not to become disheartened with the proliferation of fake news and social media.", "pred_label": "__label__1", "pred_score_pos": 0.9928433299064636} {"content": "The U.S. Bankruptcy Code (the \"Code\") § 11 U.S.C. § 362(a)(1) provides that when a party files for bankruptcy, an automatic stay is triggered. However, it turns out that there are limitations to the type of cases that these automatic stays extends, and in the employment context, this may not necessarily include wage and hour claims.\n\nFor example, in the recent case of Stewart v. Holland Acquisitions, Inc. Case No. 2:15-cv-01094 (W.D. Pa. Feb. 2, 2021), the U.S. District Court for the Western District of Pennsylvania held that the U.S. Bankruptcy Code's automatic stay does not extend to enforcement actions brought by the U.S. Department of Labor (DOL) under the Fair Labor Standards Act (FLSA). In applying section 362(b)(4) of the Bankruptcy Code to renounce the application of the stay, the court rejected a contrary holding out of the Sixth Circuit (which hears appeals from district courts in Kentucky, Michigan, Ohio, and Tennessee) that an employer cannot shield itself from FLSA enforcement actions brought by the DOL by seeking to trigger the automatic stay protection under the Bankruptcy Code. The court is now persuasive authority in the Third Circuit (which hears appeals from district courts in areas of Pennsylvania, New Jersey, Delaware, and the Virgin Islands).\n\nSo, how did this happen? First, Section 362(b)(4) of the Code carves out a number of exceptions to the reach of the automatic stay, including one for certain police and regulatory actions as follows:\n\nThe filing of a petition...does not operate as a stay...of the commencement or continuation of an action or proceeding by a governmental enforce such governmental unit's...police and regulatory power, including the enforcement of a judgment other than a money judgment, obtained in an action or proceeding by the governmental unit's...police or regulatory power[.]\n\nIn Stewart, the DOL filed a civil complaint against Holland Acquisitions, Inc. (Holland), claiming that Holland willfully and repeatedly failed to pay its employees overtime and maintain proper wage and hour records in violation of the FLSA. Holland later filed for chapter 11 bankruptcy protection and sought to have the FLSA action stayed under the automatic stay provision of the Code.\n\nThe court first found the DOL fell within the definition of a \"governmental unit\" as defined by section 101(27) of the Code. The court then found that the DOL was not seeking to enforce a pre-existing monetary judgment. Rather, the DOL was seeking to stop further FLSA violations and obtain back wages and liquidated damages on behalf of the impacted employees.\n\nHolland relied on Chao v. Hospital Staffing Services, Inc., 270 F.3d 374 (6th Cir. 2001) in arguing that the FLSA action was not rooted in public policy because the DOL was seeking back pay, which is a private right, not a public one. The court rejected Holland's attempt to stay the FLSA action and found that the Sixth Circuit's reasoning in Chao conflicted with Third Circuit principles and, if applied to Holland, would \"substantially impair the core remedial purposes of the FLSA.\"\n\nIn other words, even though the FLSA litigation could result in an award of back pay to specific individuals, the DOL's enforcement power is there to bring violating employers into compliance with the FLSA. Accordingly, the court held that the DOL could proceed with its action against Holland, notwithstanding the automatic stay, which was applicable to stay other claims. However, while the court noted that the automatic stay would not prevent the court from entering judgment against Holland, to the extent the DOL obtained any judgment against Holland, enforcement would have to be adjudicated by the bankruptcy court, meaning the collection of any such monetary award would be subject to creditor priority rights as otherwise structured under the Code.\n\nEmployer Take Away\n\nHolland's application is limited. First, it only applies to employers within the Third Circuit. Second, it is limited to only wage and hour enforcement actions brought by the DOL. It is not applicable to private causes of actions pursued by employees directly. The Holland decision does, however, create a circuit split on this issue, which could drive the issue to the U.S. Supreme Court as more and more circuits have the opportunity to weigh in on this issue. So, while not binding outside the Third Circuit, the Holland decision will provide persuasive authority within the Third Circuit that the police and regulatory exception under section 362(b)(4) extends to FLSA enforcement actions, meaning the Code's automatic stay protections will not protect a violating employer from the DOL's wage and hour division's grasp.\n", "pred_label": "__label__1", "pred_score_pos": 0.9808714389801025} {"content": "How to outsource web design and development services in the USA in 2022?\n\nOctober 3, 2022by junaid0\n\n\nIn 2022, a strong web presence is undoubtedly highly essential. It is vital to surviving today’s digital marketing world. Moreover, you need a peak-performing website that helps you keep up with the latest market trends and developments. Hence, outsourcing your web design and development services in the USA has gained tremendous popularity in 2022.\n\nweb design and development services in USA\n\nNotably, you can outsource anything today. It eventually saves you time and money. Therefore, you can hire professionals for it, may it be customer services, design services and marketing, and finances.\n\nIt is a common misconception that only smaller enterprises outsource their services. On the contrary, all the large multinational corporations like Microsoft, Facebook, and Google also prefer outsourcing their services to save time, money, and resources.\n\nMost importantly, outsourcing your web development procedures to professionals helps you exceed your expectations. It finally improves your productivity in the long run. In addition to that, you also save time and resources for a better project output.\n\nWhy do companies outsource web design and development services in the USA?\n\nIndeed, companies tend to outsource their web development operations for several reasons. Hence, among those innumerable incentives, some of the most crucial ones include the following:\n\n • Firstly, it saves up to 59% of the company’s costs.\n • Secondly, your company’s core competencies improve by 57%.\n • Thirdly, you resolve 47% of your capacity issues.\n\nSubsequently, all the above-mentioned incentives have made these services quite in demand. You eventually stay relevant to the market trends. You also learn to make the best use of your time.\n\nTop models of outsourcing web design and development services in the USA\n\nWeb development is exclusively an IT-related service. It involves several phases and procedures, from designing to its deployment. Hence, it can get a bit daunting. Henceforth, companies prefer to outsource it. Plus, they usually follow the following models:\n\n1-         Team-based outsourcing model\n\nFirst, we have the team-based model. Here, the vendor usually hires developers from several points and forms them into a team. Thus, each member is delegated their task, which ultimately improves operational efficiency.\n\nMoreover, this outsourced team is your virtual team. Also, it should be noted that this model serves best for long-term projects. And short-term projects can’t survive on this model.\n\n2-         Process-based outsourcing model\n\nSecond, having a centralized control system in web development procedures is vital. The leading web software development services in the USA also prefer a process-based outsourcing model. Hence in this model, the hired team looks after these:\n\n–           The entire project handling and management\n\n–           Comprehend the client’s requirements\n\n–           Answerable for all failures and risks\n\n3-         Staff-augmentation outsourcing model\n\nThird, there is a staff-augmentation model. In this model, the hired web developers are also in complete control. These IT professionals are entirely responsible for the project. Therefore, you must maintain direct communication with them to ensure maximum productivity.\n\nWhat is the step-wise procedure for outsourcing web design and development services in the USA? \n\nHaste makes waste, essentially. So make sure to be patient while opting for the most efficient web designers and developers. Henceforth, it doesn’t matter how big or small your project is. Make sure to take the first right step. And what are they? Let’s have a look:\n\n1-         Identify your goals\n\nFirst and foremost, make sure to have a proper brainstorming and mind-mapping session. Try to understand what the company requires at the end of the day. For this reason, these goals and targets broadly include the following:\n\n–           The object of web development\n\n–           The expected final product\n\n–           The requirements of the project\n\n–           Benefits of the website\n\n–           User experience\n\n–           The road map of web solutions\n\n2-         Define your project requirements\n\nSecondly, make sure to keep your project agendas clear. Moreover, your queries should be accurate and specific. They generally comprise:\n\n–           The business goals\n\n–           The project’s tech needs\n\n3-         Keep your budget and time frame in mind\n\nThirdly, the leading web software development services in the USA always keep the budget and the time frame into account. This eventually depends on these:\n\n–           The project’s scale\n\n–           The required features\n\n–           The development team’s experience\n\n–           The testing and quality assurance process\n\n4-         Shortlist all your alternatives and options\n\nNext, always have some alternatives in mind in case things go wrong. It never hurts to have some second options. This is where good research comes in handy. Plus, go through the company’s past experiences and clients to get a good idea of their competencies. Their portfolio, indeed, gives you much more clarity on a lot of your concerns. Hence, a little research never hurts.\n\n5-         Draw a comparison among the shortlisted options of web software development services in the USA \n\nLast but not least, the research helps you compare the pros and cons. Further, while drawing this comparison, make sure to keep the following into account:\n\n–           Communication outlets they use\n\n–           The expected deliverables\n\n–           The budget breakdown\n\n–           Technology stack\n\n–           References and personal reviews\n\nTo summarize, the above-mentioned step-wise process streamlines the entire outsourcing process of web development. Furthermore, who should do it? Let’s have a look:\n\n–           People with limited time and budget\n\n–           Companies with no development team\n\nIn conclusion, Netroots Technologies is the best web development services company in the USA. We take pride in delivering tangible and exclusive benefits to our esteemed clients. Further, we are your number one option to achieve a smooth web development process for improved efficiency and accurate results.\n\nSo, do we need a web development team for many lined-up projects? Well, your search ends here. Our top-of-the-line web design and development services in the USA understand your brand and its needs! For this reason, we offer the services that eventually make you stand tall in the crowd. And you get to witness business growth like never before.\n\nLeave a Reply\n", "pred_label": "__label__1", "pred_score_pos": 0.9999747276306152} {"content": "How to reduce the amount of time your employees spend on emails\n\nJessica Mckenzie\n22 October 2020\n\nEmail is considered a critical component of communicating within the business world; however, email is notorious for costing employees valuable time and productivity every day. In fact, employees receive a daily average of 123 emails and spend approximately 6.3 hours of their day on sending, receiving, and reading their emails.\n\nEmail has devolved into a time-wasting tool for business that, if left unchecked, can result in: bottlenecks preventing information sharing; communication breakdowns; low employee productivity; and lost time and money.\n\nMinimizing the use of email and making it more efficient is the key to navigating this hurdle. Employees need to spend less time managing email and trawling through messages to find information. This has become even more urgent with the shift to remote working, as employees can't communicate face to face.\n\nCollaboration tools build business productivity\n\nFor your employees to improve their productivity levels and focus on deep work and creative tasks, they need to minimize the time they spend on emails. By incorporating a collaboration tool, such as Microsoft Teams or SharePoint, into your organization, you can streamline the process of communicating and sharing information.\n\nThe fact is, email isn't likely to be going anywhere anytime soon. It's convenient and reliable, making it the default option for most businesses. In fact, email use is likely to continue to grow, potentially reaching more than 333 billion emails sent and received per day by 2022. The number of users will grow to 4.2 billion in 2022.\n\nTherefore, organizations need to find a solution to the email challenge that doesn't require them to eliminate email use altogether. Instead, they need a tool that enhances collaboration and can seamlessly connect with people's emails.\n\nEmail is often used to send attachments, which are usually documents that are important to the business. This can include contracts, memorandums of understanding, policies, plans, blueprints, and many more. These attachments are crucial to the organization but can often become siloed away in people's email inboxes. When others in the team need access, it can be impossible to find the latest versions and ensure everyone is working with the same information.\n\nA collaboration tool can fix this by making it easy to save attachments into a location that is secure, searchable, and, most importantly, accessible by any authorized person. This removes the need for manual follow-up, team members asking each other for the latest version of the document, or errors that occur when people are working with different document versions.\n\nIt's important to choose an easy-to-use tool so your employees can adapt to it faster and start improving their productivity straight away. Tools like Microsoft SharePoint can fit the bill perfectly. However, if employees aren't used to using SharePoint and the sites within SharePoint are unfamiliar to them, they may avoid using it. This means you may not see a strong return on your investment in the platform and employees will continue to waste time managing documents inefficiently. Therefore, you need to buttress your implementation of SharePoint with a collaboration tool that makes it so easy to use that your employees won't even consider using anything else.\n\nOnePlace Solutions offers a plug-in that seamlessly connects your team's Outlook inboxes with the relevant SharePoint sites. With drag-and-drop functionality and integrated capabilities, OnePlaceMail lets employees manage information effectively without wasting any time. Instead of managing emails, they can focus on their core tasks, which delivers more value to the business.\n\nOverall, this will reduce the amount of time spent managing and sending emails, while also improving employees' visibility into and access to information, and facilitate a more productive workflow for the business to achieve success.\n\nTo find out more about how OnePlace Solutions can turn your collaboration solution, like Microsoft Teams or SharePoint, into a powerhouse of collaboration and efficiency, and reduce the amount of time employees spend on email, contact us today.\n\nLatest news & blogs\n\n| Jessica Mckenzie | Upcoming\n\nESPC22: Europe’s gold standard Microsoft conference is returning\n\nEurope’s gold standard Microsoft conference is returning as a live, in-person event on 28 Nov – 1 Dec 2022 in Copenhagen!\nOnePlace Solutions is proud to be a gold sponsor supporting ESPC22– join us to be inspired, learn, and connect.\n\n| Jessica Mckenzie | Company News\n\nNow Hiring: Senior Developer (Angular/.Net/Azure)\n\nWe have an excellent opportunity for a highly motivated and energetic individual to join our Product Development Team based in Manly, Sydney.\n\n| Jessica Mckenzie | Upcoming\n\nWebinar: End-to-end document lifecycle management from one place\n\nRegister for our latest webinar to learn how how to simplify the connection with Microsoft 365 platform solutions to deliver secure, seamless, lifecycle document management.\n\nSchedule a demo\n\n\nTry free\n\n\nContact us\n\n\n© Copyright OnePlace Solutions", "pred_label": "__label__1", "pred_score_pos": 0.9241808652877808} {"content": "Master Agoraphobia with Picmonic for Medicine\n\n\n\nRecommended Picmonics\n\npicmonic thumbnail\nAnxiety Assessment\npicmonic thumbnail\nObsessive-Compulsive Disorder (OCD)\npicmonic thumbnail\nPosttraumatic Stress Disorder (PTSD)\npicmonic thumbnail\nSocial Anxiety Disorder\npicmonic thumbnail\n\n\nGreek-Agora Pho-bee\nAgoraphobia is defined as an irrational fear of a range of situations in which a person believes escape or access to help may be very difficult or embarrassing. Women are twice as likely to develop agoraphobia than men with the majority of cases being diagnosed in patients under 35 years. In order to be diagnosed with agoraphobia, the patient must experience intense fear, anxiety, or panic attacks in at least 2 of the following situations: using public transportation, being in open spaces, being in enclosed spaces, standing in a crowd of people, being unaccompanied outside the home. These symptoms must last for more than 6 months. Panic disorder is often seen in these patients as well. Treatment for agoraphobia includes cognitive behavioral therapy and/or pharmacotherapy with SSRIs.\nFear of Anticipating ≥ 2 Situations\nFearful-guy with 2 tutu-wearing Ladies\n\nAgoraphobia is defined by irrational fear while facing or anticipating two or more situations. Patients can have a crippling fear of crowded spaces, closed spaces, or public transport. This condition can be so debilitating that patients might refuse to leave their homes.\n\nSymptoms > 6 Months\nGreater-than Sign with (6) Sax and Month Moon\n\nAccording to the Diagnostic and Statistical Manual of of Mental Disorders (DSM), symptoms must last more than 6 months.\n\nPanic Disorder\nPanic button\n\nAgoraphobia is typically seen in patients with comorbid panic disorder. Panic disorder is an anxiety disorder characterized by recurring panic attacks, which are associated with fear of the attacks and behavioral modifications to avoid these episodes. Panic attacks are characterized by intense fear that may include palpitations, shaking, shortness of breath, and a feeling that something terrible is going to happen.\n\nCognitive Behavioral Therapy\nCog Behavioral Therapist\n\nCognitive behavioral therapy is the first-line therapy for agoraphobia. Cognitive behavioral therapy (CBT) is a type of psychotherapy based on analyzing and reforming maladaptive thoughts that are contributing to emotional and behavioral distress.\n\nSelective Serotonin Reuptake Inhibitors (SSRI)\nSelective Silver-tonic Reuptake tube with Inhibiting-Chains\n\nSelective serotonin reuptake inhibitors (SSRIs) can be used for the treatment of agoraphobia. SSRIs are a class of drug which work by selectively inhibiting serotonin reuptake into presynaptic cells, increasing the neurotransmitter's availability in the synaptic cleft.\n\n\nTake the Agoraphobia Quiz\n\n\nIt's worth every penny\n\nOur Story Mnemonics Increase Mastery and Retention\n\nMemorize facts with phonetic mnemonics\n\n\nMemorize facts with phonetic mnemonics\n\n\n\n\n\nWorks better than traditional Medicine (MD/DO) flashcards.\n", "pred_label": "__label__1", "pred_score_pos": 0.9927496314048767} {"content": "6 Ways To Quiet Your Mind For Better Sleep\n\n6 Ways To Quiet Your Mind For Better Sleep\n\nbetter sleepHealth\n\nDo you struggle to fall asleep at night? Do you find that your mind races and fills with thoughts, especially negative ones, that make dozing off impossible right away? And, after you finally fall asleep, do you often feel tired the next day regardless? If you answered yes to those questions, you need to learn ways to relax your brain and promote positive thinking to get the rest you need. Here are six ways to quiet the mind for restful sleep.\n\n1.    Don’t Focus On Forcing Yourself To Sleep\n\nParadoxically, trying to sleep very much can lead to even greater difficulty in sleeping. If you’ve ever found yourself lying in bed and feeling more and more awake by the second as you will yourself to doze off, you’ll know exactly what this is like! This can even make your mind even noisier. Here are some ways to counteract this:\n\n·         Get Out Of Bed\n\nIf you’ve been lying in bed and trying to sleep for 20 minutes to no avail, your brain is only going to get noisier from there. So get up and go to another room and do something relaxing that doesn’t involve light exposure. For example, you may go to a dim living room and listen to some calming music, or turn on a lamp in your office and read a book. Give it a few minutes or even up to half an hour, then go and try to sleep again. Sometimes, breaking the cycle can be enough to calm the mind.\n\n·         Do Some Reverse Psychology\n\nIt sounds silly, but if trying to sleep makes you wake up, sometimes trying to stay awake can help you sleep. Tell yourself you absolutely must stay awake for various reasons and feel comfortable with that potential outcome. If your brain is susceptible to paradoxical suggestions, this might lull you into a more restful state!\n\n·         Determine If Your Bedtime Routine Is Wrong\n\nThere’s a chance that the reason you’re not able to fall asleep is because of something unrelated to your noisy mind. For example, you may be going to bed too early, eating too close to bedtime, or sleeping in too warm of a temperature. A naturally busy mind will make it even harder to sleep under these conditions, so if all else fails, examine these factors!\n\n2.    Give Yourself Time To Worry to Be More Restful\n\nIf you have a boisterous mind, you may need to address this during other parts of the day, long before bedtime. Anxiety and worries can make restful sleep hard to achieve at all, and that’s why you may want to pre-schedule time explicitly dedicated to worries for this purpose.\n\nIt sounds strange, but this is a standard method to handle a commonly noisy, racing mind. During this period of between five to fifteen minutes a day, you must drop everything else you are doing and focus exclusively on worrying and nothing else. You will think of every single negative emotion and concern you have and bring them to the forefront of your mind, observing them as they pass.\n\nThen, once the time is up, all worrying must stop immediately. Any worries that come up outside of this time must be pushed aside and told to wait for their turn in the next scheduled worrying time. Once you get into the swing of this, it will come more naturally, and your nighttime worries will be delegated to a different time of day, giving you the chance to sleep.\n\n3.    Get Tasks In Order First\n\nSometimes, a noisy mind results from the knowledge of the many things you have to do. In other words, it can be a reflection of a lack of organization and control over waking life. So get your tasks in order first before you try to sleep, and preferably a few hours before bedtime.\n\nStudies have shown that this can allow you to fall asleep faster, and the more detailed and long your to-do list when you write it, the faster your sleep will come! The sense of peace you have from knowing things are in order can be compelling. Finish your work, make to-do lists, handle chores, and plan as needed. Then put that aside and tell yourself, in positive thinking, that you have everything handled and written down for tomorrow’s perusal.\n\nHere are tips to beat insomnia forever.\n\n4.    Engage Your Ears\n\nOccasionally, you can quiet your mind via the engagement of one of the senses. Your ears are an ideal part of the body to engage in this manner, as your sense of hearing can dictate how relaxed you feel and how easily you fall into a more restful sleep. Here are some ways you can engage your ears:\n\n·         Listen To Music\n\nStudies have found that music has positive effects on sleep quality, so turn on an excellent playlist and let it lull you into peacefulness. Just make sure you’re not picking head-banging tunes or any songs that evoke strong emotions in you, and keep the volume low instead of loud. It can help make a specific playlist for sleep, as you’ll get to curate it that way. Plus, the more often you use it, the more your brain will associate it with sleepiness.\n\n·         Play An Audiobook\n\nThe wonderful world of fiction is a fantastic place to escape to so you can quiet your mind. Choose something that’s not too exciting or thrilling and let yourself get lost in fantasy worlds.\n\n·         Listen To A Podcast\n\nLike an audiobook, a podcast can give you another world to escape to, or it can lull you to sleep with nonfiction and calming voices. Once again, you’ll want to avoid overly exciting, thrilling, or upsetting topics, and if you tend to get heated about specific issues, avoid those, too.\n\n·         Use Noises\n\nSound therapy and recorded ambient sounds may help get you to sleep. Find calming sounds that you like, such as the sounds of waves or even white noise, and play them on repeat. This is especially helpful if your lack of restfulness is caused by missing a specific environment. The environment created by a little specially chosen noise can set the right tone for sleep and quiet your mind as you relax.\n\n5.    Use Relaxation Methods to Promote a Restful Night\n\nIt goes without saying that sometimes the best way to quiet the mind is to use common and scientifically-backed relaxation techniques. A little calming activity can help the brain finally chill out, bringing the necessary tranquility for sleep. Here are some common methods to try:\n\n·         The 4-7-8 Breathing Method\n\nThis technique involves a breathing exercise that can have positive effects on overall stress levels. To do it, you inhale for four counts, hold the breath for a count of seven, and then do eight counts of inhalation. This should be done a minimum of five times, and your heart will relax as your pulse slows in calmness as a result.\n\n·         Meditate\n\nMeditation refers to the act of focusing on your breathing, clearing your mind, and staying present in the current moment. Find something to focus on, whether a mantra, your breathing, or even a visualization of your happy place, and keep your concentration on them. If you’re not used to it, it can be tough to sit with an empty mind, but with practice, you’ll get to reap the positive benefits of relaxation for sleep.\n\n·         Try Progressive Muscle Relaxation\n\nThis kind of exercise involves pretty much what its title entails – you progressively relax your body’s muscles one at a time, beginning with the toes and working your way up every muscle group until you get to the top of your head. Research has found that this is good for sleep because it directs attention to your physical body instead of to any loudness of thought in your mind.\n\n·         Do Some Yoga\n\nIt would be best if you didn’t do a complicated exercise right before bed, but some simple yoga stretches and positions can result in relaxation, according to studies. The child’s pose is all you need. This pose involves kneeling on the ground with your toes together, knees apart at hip-width.\n\nThen, you bring your chest down towards your thighs and touch your forehead to the floor. You can also opt for the easier corpse pose, ideal for those with knee or hip pain. You need to lie on your back with your limbs relaxed, then feel yourself breathe as you sink into the floor beneath. Whichever pose you choose, remain in it for up to five minutes!\n\n6.    Express Yourself\n\nIf your sleeping troubles come from emotional turmoil and anxiety, expressing those feelings can be beneficial in quieting your mind. When the brain is abuzz with worries, stress, and clutter, it may be best to expel them to be more restful. Here are some ways you may try doing this:\n\n·         Call Out The Thoughts\n\nDon’t repress or push back what you feel. Address them directly and point them out one by one, then see what they do. Spot any irrationalities and inconsistencies and acknowledge each feeling. Then, tell them that you respect them and will reflect on them tomorrow. Some of those emotions will no longer matter to you when you wake up, and those that do will be waiting to be dealt with the following day instead of plaguing you at night.\n\n·         Write In A Journal\n\nJournals are a great way to express yourself, as you know it’s a private diary that no one else would see. Even quickly scribbling on any written medium works similarly, as it helps your brain to get out its most pressing thoughts and emotions in a positive way. This may even allow you to address more severe matters productively the next day since you’ve written them down and won’t forget them!\n\n·         Talk it Out\n\nIf you have serious concerns, you can ask to vent to a friend or loved one, whether in person, over the phone, or via text. But you don’t have to speak to someone in particular actively! Talking to yourself, to a wall, or even to a stuffed animal lets you process your emotions out loud in a private and safe space, and it can help quiet your brain.\n\nFinal Thoughts On Some Ways To Quiet The Mind For Restful Sleep\n\nMany people struggle with restful sleep at night, but learning to quiet your mind can allow slumber to overtake you more quickly and with better results. If you have a lot of trouble sleeping and often wind up unable to get sufficient rest, speak to a relevant doctor for advice and assistance as you may have a sleep disorder.\n\n\nFollow Me:\n\nPlease ensure Javascript is enabled for purposes of website accessibility", "pred_label": "__label__1", "pred_score_pos": 0.9081994891166687} {"content": "Woodwinds & Brass\n\n\nThese are a family of musical instruments so called because they were originally made of wood and were blown to produce musical sounds . The earliest generation of these wind instruments were flutes and other reed instruments.\n\n\nLater they also came to include other wind instruments made of metals like brass and silver as seen in the range of saxophones, trumpets, trombones, flutes , clarinets and many others that form part of the woodwind section of any modern orchestra today.\n\n\n\nRecorder | Flute | Oboe | Clarinet | Saxophone | Trumpet\n\nPaulette Demello\n\nHead of the Department\n\nPaulette Demello was exposed to the recorder at an early age as it was a compulsory subject in school in The Netherlands where she grew up. Her genuine interest for the recorder started only after her son joined the Bangalore School of Music in 1987...", "pred_label": "__label__1", "pred_score_pos": 0.9900276064872742} {"content": "Shulgin admitted that he does not want to maintain contact with his biological father.\n\nThis information was reported by “Russian conversation”.\n\nValery has left from a former spouse, Alexander Shulgin, with three children. The singer could not stand the horrible attitude that endured for many years. After breaking up with Shulgin celebrity married producer Joseph Prigogine, who are still happily married.\n\nHis daughter Valeria, Anna, spoke in an interview about the relationship with his biological father. According to the girl she considers as a close relative of Prigogine, as he practically raised her, has always supported and been with you.\n\nShulgin noted that very rarely meets with his real father, and these meetings are held, as if between close relatives and strangers. Anna greets Alexander, and they never communicate . The girl said that his father never congratulated children with the day of birth and after the divorce with Valeria did not take care of their life. Still Shulgin has not wondered how his descendants, so Anna is not going to maintain any contact with him.\n\nDaughter Valerie is very grateful to his mother and Joseph that they always paid attention to her and the brothers, and was able to ensure that all children have a happy and fulfilling life.", "pred_label": "__label__1", "pred_score_pos": 0.9528391361236572} {"content": "\n\n加拿大心理学作业:Critically discuss the differences and similarities\n\n论文价格: 免费 时间:2019-07-26 10:58:08 来源:www.ukassignment.org 作者:留学作业网\nI)Critically discuss the differences and similarities between \"positive psychology\" and \"traditional psychology\". What are the focuses of these two fields of psychology? How has both fields of study evolved over the last 10 years?批判性地讨论“积极心理学”与“传统心理学”的异同。这两个心理学领域的重点是什么?这两个研究领域在过去10年中是如何发展的?\nThe power of positive psychology is to help people discover and utilize their inner resources, thus improving their quality and quality of life. There is a need for self-fulfillment in the deep heart of everyone. This kind of need to inspire people inner positive force and excellent quality, positive psychology using the internal resources to help ordinary people or the person that has a certain talent maximum digging their own potential, and to gain the good life. These positive forces and good qualities are the core elements of human survival and development. Positive psychology reflected in the nature of amending its psychological imbalance of development, emphasis on the development of psychology depends on both the prevention and treatment of human psychological disease, and more dependent on culture, construct the human qualities, the two can complement each other, the balanced development.\nResearch topics include :(1)positive experience, such as happiness, well-being, etc. (2)positive traits, such as self-determination, wisdom, creativity, virtues, etc.; (3) positive community, such as social relationship), culture norms the effects of family on the development of talent, etc.研究主题包括:(1)积极的经验,如幸福、幸福等;(2)积极的特质,如自决、智慧、创造力、美德等;(3)积极的社区,如社会关系)、文化规范、家庭对人才发展的影响等。\nIn the United States, the \"Templetion positive psychology prize\", which is the highest in psychology, is awarded to scientists under 40 who have made outstanding contributions in the field of positive psychology (Southwick, Satodiya, & Pietrzak, 2016). One of the major universities in the United States has established the center for positive psychology research, and the university of Pennsylvania will be the first to grant a degree in positive psychology. The annual international conference on positive psychology was held in Washington on the first weekend of October. DannyKahneman became the first positive psychologist to win a Nobel Prize. Positive psychology is also developing rapidly in Europe, and Oxford University press has published a number of positive psychology books, such as the handbook of positive psychology. The European positive psychology conference was held in milan, Italy, in July 2010. In China, positive psychology is being started and pay more attention to the positive, the introduction and the research field of positive psychology, the Chinese references can be documented by the end of this article. For example, the contribution of self-determinism to positive psychology research and so on. 在美国,“暴风雨积极心理学奖”(templetion positive psychology prize)是心理学领域最高的奖项,授予40岁以下在积极心理学领域做出杰出贡献的科学家(Southwick、Satodiya和Pietrzak,2016年)。美国的一所主要大学已经建立了积极心理学研究中心,宾夕法尼亚大学将是第一个授予积极心理学学位的大学。10月的第一个周末,积极心理学年度国际会议在华盛顿举行。丹尼卡尼曼成为第一个获得诺贝尔奖的积极心理学家。积极心理学在欧洲也发展迅速,牛津大学出版社出版了一批积极心理学书籍,如《积极心理学手册》。欧洲积极心理学会议于2010年7月在意大利米兰举行。在我国,积极心理学正处于起步阶段,越来越重视积极心理学的积极性、引言和研究领域,本文最后可以对中国的参考文献进行记录。例如,自我决定论对积极心理学研究的贡献等。\n\nReference list \nSouthwick, S, Satodiya, R, & Pietrzak, R 2016, 'Disaster Mental Health and Positive Psychology: An Afterward to the Special Issue', Journal Of Clinical Psychology, 72, 12, pp. 1364-1368, Education Source, EBSCOhost, viewed 26 February 2018.\n\nReference list \nSzczygieł, D, & Mikolajczak, M 2017, 'Why are people high in emotional intelligence happier? They make the most of their positive emotions', Personality & Individual Differences, 117, pp. 177-181, Education Source, EBSCOhost, viewed 26 February 2018. \n\nIII) Critically evaluate the available research evidence on the correlates and predictors of subjective well-being. Identify three strongest predictors of subjective well-being by using primary research articles. How did the psychologists set up the experiment, what were the findings and what were the shortcoming of the experiment?\nThe purpose of this study is to explore the correlation between social support and subjective well-being based on social support rating scale, and to explore the research characteristics that influence the relationship between the two. A total of 89 independent samples were produced in 86 original studies, with a total sample size of 32948 (Wen, Geng, & Ye, 2016). According to the results of subjective support, objective support and utilization degree, and the whole subjective well-being, life satisfaction, positive emotions significantly positive correlation between moderate, with moderate degree of significant negative correlation between negative emotion. The correlation between the two subjects was regulated by the group type, i.e. the relative sizes of the two groups were different in different subjects.#p#分页标题#e#\nTo occupy literature as much as possible, in accordance with the following criteria: (1) at the same time using social support rating scale and happiness scale, and report the dimension or total score of at least one scale to another scale dimension or the correlation coefficient between the total score. (2) the subjects were normal people. Criminals, treated mentally ill patients are excluded. (3) the investigation time is at ordinary times. Disaster period, emergency period, such as earthquake, \"SARS\", and its front and rear exclusion. (4) the sample size is clear. (5) only one of the data is published repeatedly. If the dissertation is changed into a paper and published in the academic journal, and the relevant data is reported, the published journal article shall prevail. Otherwise, use the data in your dissertation.\nThe research on social support and subjective well-being is meta-analysis, trying to find the answer to the following questions: 1) society will support, especially the use of support, and the relationship between subjective well-being. 2) whether the different structure of subjective well-being is different from that of social support. 3) whether the research characteristics of the original research (such as the types of subjects, scale types, subjects, etc.) will affect the correlation between subjective well-being and social support, namely whether the research feature effect exists.\nGeneral and three dimensions of social support (subjective support, objective support, support the use of degrees) of the whole and subjective well-being, life satisfaction, positive emotions significantly positive correlation between moderate, with moderate degree of significant negative correlation between negative emotion.\nBetween the related subjects group type adjustment, namely different subjects groups, both related to the size is different, is not affected by the use of subjective well-being scale, the types of publication, published s etc to study the effect of characteristics.\nHowever, the results of this study showed that the degree of disability was highest, followed by students and the lowest among the elderly. According to the previous view, the correlation depends on the degree of need and the subjective judgment of the possibility of implementation. The elderly, although is needed, they may think that the use of these support and not very good, or attempt to use multiple have hit a wall, so that they think using social support is difficult to achieve, and formed a kind of subjective judgment. Combined with bandura's concept of self-efficacy, this subjective judgment can be called support for the use of efficacy.\nReference list\nWen, Z, Geng, X, & Ye, Y 2016, 'Does the Use of WeChat Lead to Subjective Well-Being?: The Effect of Use Intensity and Motivations', Cyberpsychology, Behavior & Social Networking, 19, 10, pp. 587-592, Business Source Premier, EBSCOhost, viewed 26 February 2018.\n\n • 社会学Essay格式:Sui...\n\n\n • 历史Essay要求:Hist...\n\n\n • 文化研究Essay范文:Ca...\n\n\n • 护理学Essay参考案例:A...\n\n\n • 政治Essay写作:Pros...\n\n\n • 文化研究Essay范文:It...", "pred_label": "__label__1", "pred_score_pos": 0.9971942901611328} {"content": "\n\nDuctile fracture is characterised by large amounts of plastic deformation before failure. This form of fracture involves large amounts of energy absorption (high toughness).\n\nBrittle fracture is characterised by low plastic deformation and small amounts of energy absorption at failure (low toughness).\n\nIt takes a lot of force to deform a glass rod. With the load shown the rod is not broken.\n\nBut if the rod has a small notch, the force required to cause fracture is greatly reduced, and the rod breaks. Observe how the fracture originates from the notch.", "pred_label": "__label__1", "pred_score_pos": 0.6389864683151245} {"content": "The Risks of Gambling\n\n\nGambling has long been a popular pastime in the United States, with revenues topping $13.6 billion in the second quarter of 2021. However, there are some risks associated with gambling. If you want to stay in the game, you should know the signs and how to manage your gambling budget. If you are worried that you might develop a gambling problem, you should seek help from a qualified professional.\n\nResponsible gambling\n\nResponsible gambling requires a strong commitment to ethical behavior from both the gaming operators and the customers. It also focuses on preventing underage gaming. In many jurisdictions, gambling operators must strictly follow laws protecting minors. They must also implement steps to prevent underage gambling, such as a clear registration process for all players and mandatory verification measures to ensure age of the gambler.\n\nFortunately, there are many resources available to help people with gambling problems and help them stop. These include the International Center for Responsible Gaming, which is a worldwide resource for responsible gambling, and the National Council on Problem Gambling, which can provide 24-hour assistance to people who are struggling with gaming addictions. Responsible gambling benefits everyone, including those in the industry. By making gambling a safe industry, more states will be willing to legalize it.\n\nResponsible gaming standards differ between land-based and online operators. However, the most important aspect of these standards is safety and security. Without this element, the other points will be undermined. Online gaming operators are required to implement internal controls and procedures to protect patrons, and to manage player funds correctly. Land-based operators, on the other hand, must implement physical security measures to protect patrons, and keep their slot games and electronics up to date.\n\nCosts of gambling to society\n\nThe expansion of gambling has brought with it numerous costs for society. Some of these include increased crime rates and bankruptcy rates. Another cost is the time and money spent in treatment for people who suffer from problem gambling. Many of these costs are difficult to measure. The social costs of gambling should be considered alongside the economic benefits, and their impact cannot be ignored.\n\nIn 2016, the cost of gambling to society rose significantly in most countries, with Australia claiming the highest figure at $990 per resident adult. Compared to other countries, the United States experienced the largest overall loss, totaling $116.9 billion. Moreover, gambling losses have increased as jurisdictions have increasingly deregulated gambling in the pursuit of short-term economic gains.\n\nThe social environment in which a person lives affects his or her gambling behavior. Some consumers gamble for money, while others gamble to escape from their problems. Problem gamblers tend to gamble more frequently for this reason.\n\nSigns of a problem with gambling\n\nGambling addiction can lead to a variety of symptoms, including excessive lying, staying up late, and stealing money. If you think you might be addicted to gambling, talk to other family members and consider getting professional help. Mood swings are another sign that you may be experiencing gambling addiction.\n\nGambling addiction has a similar pattern to alcohol and drug addiction, with a person who cannot control their behavior becoming increasingly restless and irritable. This is because a person becomes obsessed with gambling and feels an uncontrollable need to indulge in it. The person becomes depressed and irritable when he or she doesn’t gamble, which is a symptom of emotional withdrawal.\n\nGambling addiction can ruin relationships with friends and family and can even lead to financial trouble. It can even lead to stealing and other illegal activity. Some of the more obvious signs of a gambling addiction include spending an excessive amount of time gambling, not having time for other activities, and increasing the amount of money spent on gambling. The person may also be hiding their money, or borrowing money from family and friends to make bets.", "pred_label": "__label__1", "pred_score_pos": 0.8744968175888062} {"content": "Life is Hard Life throws us many curve balls and challenges that sometimes we are not prepared for. People die, jobs are lost, marriages struggle, parenting is hard, trauma occurs, depression and anxiety arise and despite it all life continues. Life is hard and we all need someone to help us navigate through it during those tough times.\nSeeking Help is Not Weakness We live in a culture that stresses independence and a “do it yourself” mindset. Seeking help is often viewed as a sign of weakness, instead of being a form of strength We all have weaknesses, but that does not mean we are weak. We all have flaws, but that does not mean we are flawed. It takes a very strong individual to identify that they are struggling with something and then seek help to work on that issue. We all need someone to help us at some point in our lives. It is much easier to close off and keep things inside, but to be vulnerable and allow change to occur takes a deep, inner strength. I admire and respect each individual that I work with, because I understand the courage it took to take those first steps to enter into therapy.\nThere is Hope Therapy is a means of helping you find the hope in what may seem a hopeless situation. It does not mean the process is easy, but it means that you will be equipped to handle stressors and issues that arise in life.", "pred_label": "__label__1", "pred_score_pos": 0.9888010621070862} {"content": "korean english\n\n\nHome > 게시판 > 세미나\n\n○ Place :  기초학문관 3층 창조존\n\n○ Speaker : 이  현  정  박사님 (KAIST)\n\n○ Abstract: \n\n\n\n번호 제목 날짜 조회 수\n636 구리산화물 고온 초전도체의 특성과 응용 2018.05.23 45915\n635 핵물리학과 RAON 2018.11.15 45995\n634 Nonlinear nanophotonics using on-chip microring resonator 2021.03.25 46262\n633 Acoustic metamaterial: principles and applications of phononic crystals 2018.03.02 46591\n632 광자와 이온트랩을 이용한 양자 정보처리 2017.10.25 46694\n631 한국 희귀동위원소과학 프로젝트(Rare Isotope Science Project in Korea) 2018.05.16 46707\n629 The Intensity Frontier Experiment & SHiP 2017.11.22 46776\n627 깊은 땅속 중성미자 실험, DUNE 2018.03.14 47330\n626 Particles in the Universe 2017.09.01 47377\n625 전자구조계산을 이용한 새로운 양자물질 연구 2019.03.27 47681\n624 양자이론에 대한 `서울해석` 시도하기 2017.09.13 47775\n621 <4/5(Wed.) 18:00pm> 저에너지 가속기의 활용 2017.04.05 50035\n620 History of Superconductivity and its Future 2018.04.04 50151\n618 Electric Quantum Oscillation: A New Form of Quantum Oscillation 2021.10.06 50276\n617 Strongly Coupled Moire Photonics 2021.11.01 50413", "pred_label": "__label__1", "pred_score_pos": 0.9941516518592834} {"content": "Kitakyushu, Japan to host 2021 gymnastics world championships\n\nKitakyushu General Gymnasium\n\nThe 2021 artistic and rhythmic gymnastics world championships will be hosted in Kitakyushu, Japan, the Federation Internationale de Gymnastique (FIG) announced. It will be the first time in FIG history that a city has hosted both the artistic and rhythmic gymnastics world championships in the same year. The Artistic Gymnastics World Championships\n\nFIG president Morinari Watanabe elected to IOC\n\nIOC president Thomas Bach with FIG president Morinari Watanabe\n\n\nBaku to host 2021 Trampoline World Championships\n\nThe National Gymnastics Arena in Baku\n", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "The 2022 Latin America E-commerce Data Library\n\nAMI projects that e-commerce in Latin America will reach USD$379 billion in 2022, up 32% over 2021 and CAGR of 25% through 2025. Instant payments such as Pix, increased banking penetration and cross-border e-commerce are driving this growth, and generating deeper e-commerce penetration.\n\nThe benefits of e-commerce extend beyond large e-tailers as Latin American SMBs have moved into online selling since two years ago when the COVID-19 pandemic began. For companies seeking to maximize the opportunities from this major digitalization in consumer behavior, data is crucial. This is why we developed this unique dataset.\n\nThe 2022 Latin America E-commerce Data Library uses transactional data and other sources to reflect actual consumer behavior, as opposed to survey data, which is likely to be less accurate. This dataset also incorporates ride-hailing and delivery apps, digital goods, and other services, rapidly growing sectors often overlooked by e-commerce reports. It also contains the split between domestic vs. cross-border transactions in different markets, which allows companies that are expanding to LatAm to gauge their growth potential.\n\nKey Markets\n\nAMI’s Latin America E-commerce Data Library covers 17 e-commerce markets in the region:\n\n\nClick here for the full article.\n", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "You aren’t less than, inferior to, or worth less than anyone you have ever met face to face. The truth is, all have sinned. All are not good enough. All do not deserve their blessings. All deserve to die for our sins and to burn in Hell for eternity. All can escape God’s wrath only by the blood of the Lamb who took the punishment we deserved. And on top of that, if we accept Christ, God adopts us as his own beloved children and makes us citizens of Heaven. That is amazing grace, and a secure promise to stand on. Nonetheless, let’s remain humblyRead More →\n\nMeditating on God’s word is an effective way to counter lies both from our own anxious minds and spiritual attacks. When tempted, Christ himself defeated Satan by countering with what it was written in the Bible. I am a student of the practice, not a teacher. And please continue any medical treatment you are on, but I’ll share what I’m learning with you. The basics are to recognize our emotional states, identify the lies influencing us, and pick verses that effectively contradict them. When it is the devil, say it loud, with authority, and he will back down if there is no other factors atRead More →\n\n\nYou are unique. So is everyone else. So being unique isn’t special. If you are breathing, you are at least a little evil (flawed and imperfect.) So is everyone else. That makes you normal. Welcome to the club. You are at least a little good. Some are so evil, they use even their good qualities for evil. So the more you grow up into the wisdom, purity, goodness, and righteousness Christ offers to us all for free, the more special you are. So the most special people are gray-haired, physically failing, or otherwise at death’s door because they’re crossing the finish line of faith. They’veRead More →\n", "pred_label": "__label__1", "pred_score_pos": 0.8190332055091858} {"content": "Online Sunshine Logo\nOfficial Internet Site of the Florida Legislature\nNovember 26, 2022\nText: 'NEW Advanced Legislative Search'\nInterpreter Services for the Deaf and Hard of Hearing\nGo to MyFlorida House\nGo to MyFlorida House\nSelect Year:  \nThe Florida Statutes\n\nThe 2022 Florida Statutes\n\nTitle XXIX\nChapter 390\nView Entire Chapter\nF.S. 390.011\n390.011 Definitions.As used in this chapter, the term:\n(1) “Abortion” means the termination of human pregnancy with an intention other than to produce a live birth or to remove a dead fetus.\n(2) “Abortion clinic” or “clinic” means any facility in which abortions are performed. The term does not include:\n(a) A hospital; or\n(b) A physician’s office, provided that the office is not used primarily for the performance of abortions.\n(5) “Department” means the Department of Health.\n(6) “Fatal fetal abnormality” means a terminal condition that, in reasonable medical judgment, regardless of the provision of life-saving medical treatment, is incompatible with life outside the womb and will result in death upon birth or imminently thereafter.\n(7) “Gestation” means the development of a human embryo or fetus as calculated from the first day of the pregnant woman’s last menstrual period.\n(8) “Hospital” means a facility as defined in s. 395.002(12) and licensed under chapter 395 and part II of chapter 408.\n(9) “Medical abortion” means the administration or use of an abortion-inducing drug to induce an abortion.\n(10) “Partial-birth abortion” means a termination of pregnancy in which the physician performing the termination of pregnancy partially vaginally delivers a living fetus before killing the fetus and completing the delivery.\n(11) “Physician” means a physician licensed under chapter 458 or chapter 459 or a physician practicing medicine or osteopathic medicine in the employment of the United States.\n1(13) “Standard medical measure” means the medical care that a physician would provide based on the particular facts of the pregnancy, the information available to the physician, and the technology reasonably available in a hospital, as defined in s. 395.002, with an obstetrical department, to preserve the life and health of the fetus, with or without temporary artificial life-sustaining support, if the fetus were born at the same stage of fetal development.\n(14) “Trimester” means one of the following three distinct periods of time in the duration of a pregnancy:\n(a) “First trimester,” which is the period of time from fertilization through the end of the 11th week of gestation.\n(b) “Second trimester,” which is the period of time from the beginning of the 12th week of gestation through the end of the 23rd week of gestation.\n(c) “Third trimester,” which is the period of time from the beginning of the 24th week of gestation through birth.\n1(15) “Viable” or “viability” means the stage of fetal development when the life of a fetus is sustainable outside the womb through standard medical measures.\nHistory.s. 1, ch. 78-382; s. 1, ch. 86-286; ss. 4, 5, ch. 88-97; s. 4, ch. 91-429; s. 4, ch. 97-151; s. 37, ch. 97-264; s. 3, ch. 98-1; s. 14, ch. 2007-230; s. 1, ch. 2013-121; s. 1, ch. 2014-137; s. 1, ch. 2016-150; s. 6, ch. 2021-112; s. 37, ch. 2022-4; s. 3, ch. 2022-69.\n1Note.Section 5, ch. 2014-137, provides that:\n\n“Severability and reversion.\n\n\n“(2) Notwithstanding subsection (1), if s. 390.01112, Florida Statutes, is held unconstitutional and severed by a court having jurisdiction, the amendments made by this act to s. 390.011, Florida Statutes, and subsections (4), (10), and (13) of s. 390.0111, Florida Statutes, will be repealed and will revert to the law as it existed on January 1, 2014.”", "pred_label": "__label__1", "pred_score_pos": 0.8445138931274414} {"content": "AirPods given USB-C & more repairable design by engineer\n\nUSB-C in a custom AirPods case. Image source: Ken Pillonel\n\n\nThe engineer who placed a USB-C port in a custom AirPods charging case has provided an in-depth video for his methodology and explains how others can try it at home.\n\nYouTuber and engineer Ken Pillonel isn't happy about Apple's port situation, so he's been finding ways to rectify it himself. After putting USB-C in an iPhone, he built an AirPods charging case with USB-C using a combination of custom components and Apple's own internals.\n\nThe in-depth video explains the trial and error of making his own AirPods case, down to getting the quality of the plastic closer to Apple's. Then, he breaks down how he built his own custom USB-C connector to replace the Lightning connector.\n\nRather than auction off the final product, Pillonel has decided to make his designs public. Anyone can visit his custom website titled \"AirPods' Dirty Secret\" for details and links to 3D CAD files and more.\n\nBy making the project open source, he hopes to help enterprising AirPods users convert their old cases and reduce e-waste. Beyond his issue with the Lightning port, he's also upset that Apple doesn't repair AirPods cases but instead replaces them.\n\nApple prides itself as a company concerned with bettering the environment. However, some see products like AirPods as an antithesis to that stance due to their \"disposable\" nature.\n\nCouple that with the EU regulations requiring Apple move to USB-C in AirPods and iPhone by late 2024, and there may be a large influx of people moving to the new devices. That means all the old Lightning-based devices will become obsolete with no upgrade path that doesn't involve throwing an old device away.\n\nThese concerns are valid, but also leave out the ability for users to recycle products or hand them down. Apple moving to USB-C doesn't render Lightning-based products useless overnight, so landfills aren't going to suddenly fill up with old Apple products.", "pred_label": "__label__1", "pred_score_pos": 0.7461594939231873} {"content": "A guide to lean management\n\nBusiness executives collaborate on creating a visual Kanban board.\n\nManaging a team or company can be challenging, if not downright overwhelming at times. With so many moving pieces, it’s hard to know where to focus efforts to meet the needs of your customers, get the most out of your employees, and grow your business.\n\nOne approach that has helped countless organizations become more efficient and productive is lean management — a system that prioritizes value for customers while also focusing on continuous improvement for team members and the organization as a whole.\n\nIf you’re looking to change the way you run your company or more effectively manage your teams and projects, read on to learn how to master and implement lean management strategies.\n\nThis article will cover:\n\nWhat is lean management?\n\nLean management is an organizational management strategy that combines two goals — continually improving efficiency and providing high value to customers. It’s a long-term approach designed to reduce waste and create a streamlined workflow through small, incremental process changes.\n\nWhile the main purpose of lean management is to maximize value, it also emphasizes the success and continual growth of employees. It accomplishes all of these goals by focusing on the three main pillars of lean management:\n\n 1. Providing value to the customer\n 2. Reducing waste\n 3. Improving continuously\n\nLean management also encourages shared responsibility across the organization. All team members are respected and encouraged to contribute ideas, and everyone is expected to continually improve and contribute to shared goals.\n\nWhen correctly implemented, lean management can lead to increased efficiency, productivity, and customer and employee satisfaction.\n\nA brief history of lean management\n\nThe story of modern lean management began in the Japanese manufacturing sector. In the 1940s, automaker Toyota wanted to reduce waste by slimming down its business processes. Its leaders developed a unique business model called the Toyota Way — and later known as lean management or lean manufacturing.\n\nThe model was highly successful, and it began to spread from Japan. The first person to dub the methodology “lean” was John Krafcik in 1988. Krafcik had worked at Toyota early in his career and later went on to be the CEO of Google’s self-driving car project. But lean management as we know it today was more fully developed in 1996 by James Womack and Daniel Jones in their book about Toyota, The Machine That Changed the World, now a management classic.\n\nSince then, lean management has become a successful and leading approach to business in countries and industries around the world. It has also evolved over time as new generations have adapted the strategy to help run more efficient startups and software companies.\n\nThe five principles of lean management\n\nTrue lean management is based on five core principles — establishing value, mapping the value stream, creating a continuous workflow, creating pull, and improving continuously. Let’s take a deeper look at each principle.\n\nAn illustration of the five principles of lean management, including a dollar sign icon labeled Establish value, a circular diagram labeled Value stream mapping, a triangular diagram labeled Create a continuous workflow, two chat bubbles labeled Create pull, and an ascending arrow with a bar graph labeled Continuous improvement.\n\n1. Establish value\n\nTo be a successful business, you must provide value to the customer. Value is defined as something the customer is willing to pay for, and true value convinces them to buy your product. The first step to lean management, then, is to identify precisely what kind of value you are providing and where it is coming from.\n\n2. Value stream mapping\n\nNext, create a visual map of the workflow of your company. Value stream mapping helps you identify exactly where value is being created — and where it’s not. Visualizing your business process helps you see what’s working, what needs improvement, and what can be considered waste.\n\n3. Create a continuous workflow\n\nOnce you’ve pinpointed value in your workflow, you can cut the fat by eliminating any business processes that don’t help to provide that value. You might find that cross-functional teamwork poses a challenge by creating bottlenecks — a common roadblock for lean management. You can correct this by accurately mapping your workflow, identifying issues, and re-engineering problematic processes. The key to a continuous workflow is avoiding bottlenecks and creating a waste-free, seamless workflow for all employees.\n\n4. Create pull\n\nAnother vital way to avoid waste is to create product only when there is demand. Organizing your workflow so that work only happens when triggered by demand is known as “creating pull.” This keeps you from doing work that doesn’t provide value and helps minimize overhead. It also ensures that whenever there is demand, you have plenty of resources available to rise up and meet it.\n\n5. Continuous improvement\n\nThe previous four steps build the lean management system, but the final step may be the most important principle of all. Lean management is not finished once the system is built — it’s just getting started. You and your employees must constantly optimize and improve as problems arise and are solved. Each time an inefficiency is noted, employees should have the responsibility and be empowered to tweak the system to make it more efficient. This means all employees are contributing to the continuous improvement of the business.\n\nThe tools for implementing lean management\n\nA variety of tools and strategies based on the principles of lean management have developed over the years, each offering a slightly different take on lean. Here are a few you might consider using to improve your organization’s overall performance.\n\nSix sigma\n\nSix sigma is a strategy for optimizing business processes based on the five-step DMAIC methodology — define, measure, analyze, improve, and control. The steps are not necessarily sequential, and six sigma encourages revisiting earlier steps in the cycle to identify what needs to be optimized and implement changes on an ongoing basis.\n\n\n5S is a method of organizing a workspace for efficiency. The components of 5S include:\n\n\n\nKanban is a project management approach that uses a communal Kanban board to visually track a repetitive process through stages — for example, a planning stage, a development stage, and a delivery stage. Kanban is helpful for identifying bottlenecks and keeping team members in sync, and while it’s widely used for software development, it can be applied in any setting that relies on a repeatable process.\n\nValue stream mapping\n\nValue stream mapping involves visualizing the flow of delivering a product or service to a customer in order to identify areas for improvement. The map must show how and where value for the customer is created — and where it isn’t. It can also be helpful to create a current state map and a future state map to inform your strategy for eliminating inefficiencies.\n\n\nThe word “Kaizen” in Japanese means “continuous improvement.” In management literature, Kaizen refers to processes that include all employees in the continuous, gradual improvement of operations. Like other lean management tools, it has its roots in the Toyota Production System, where all employees in manufacturing lines were famously expected to halt production when any defect or abnormality was discovered and immediately implement a process improvement to resolve the issue.\n\nThese are just a few of the lean management tools available. Many more are used across industries, and new tools are regularly evolving to meet the demands of a fast-changing, networked global economy.\n\nThe benefits of lean management\n\nLean management offers significant, tangible benefits for virtually any organization. Let’s explore some of the most important.\n\nImproved focus\n\nBy eliminating waste from your workflow, you create space to focus on what matters most. The tasks that produce the most value can receive all of your attention, resulting in better products and services, more satisfied customers, and more fulfilled employees.\n\nBetter resource management\n\nUsing a pull system ensures that you’re using the minimum amount of resources required to generate value. When you eliminate excess resource consumption, you get greater visibility into what resources you have, more flexibility in how you use them, and ultimately higher profitability.\n\nProductivity and efficiency\n\nWhen tasks are more focused and workflows are seamless, your workplace naturally becomes more efficient and productive. You create more value with less input — the most basic formula that exists for business success and growth.\n\nSmarter business\n\nBy mapping your workflow and responding only to demand, you’re working smarter instead of harder. Taking a bird’s-eye view of your entire process and adopting a consistent philosophy of improvement enables you to be strategic, creative, and efficient in every part of your business.\n\nGetting started with lean management\n\nLean management equips you with smarter business processes and increases efficiency. When you’re ready to get started, begin by identifying your value — that is, what a customer is willing to pay for — and how you’re creating it.\n\nFor leaders who want to optimize and centralize their workflows, Adobe Workfront connects work to strategy, making it possible to manage the entire lifecycle of projects from start to finish.\n\nTo learn how Adobe Workfront can help you implement lean management principles, watch the overview video or take an interactive product tour.", "pred_label": "__label__1", "pred_score_pos": 0.8082555532455444} {"content": "The Organization of New France\n\nThe Organization and Number of Troops in New France\n\nCompagnies franches de la Marine in Canada\n\nCompagnies franches de la Marine in Canada\n\nCaption: Compagnies franches de la Marine in Canada\n\nThe organization of troops in New France varied by colony and period, as well as by whether they were foot soldiers or artillerymen. The following tables indicate the official numbers of troops in the Compagnies franches de la Marine in New France.\n\nIn general, all officer positions were actually filled. There was even a group of surplus officers. Discharged in the late 1680s, when seven companies were done away with, they served thereafter in other companies as extra officers. The last of them retired during the 1720s.\n\nThe situation among ordinary soldiers was very different. Their actual numbers were almost always lower than the official numbers prescribed by royal order. About 100 places usually went unfilled; it could be slightly more or less depending on the arrival of recruits.\n\nIn 1750 there were almost 1,700 soldiers in New France instead of the 1,500 officially required. However, this surplus was exceptional and of short duration. Five years later there were barely 1,300.", "pred_label": "__label__1", "pred_score_pos": 0.830503523349762} {"content": "Strips Finance\n\nWhy interest rates?\n\nLearn about the importance of interest rates\nInterest rates are the price of money. They are important for lending/borrowing and also speculation. Interest rates impact the prices from stocks, bonds to mortgages.\nInterest rate markets are a critical infrastructure in our financial system. It is also the largest trading market in traditional finance. Based on 2018 statistics, the USA alone had $15T in debt markets, and 88% were fixed interest rates. However, almost all of the $200bn assets locked in DeFi are receiving variable interest without fixed rates.\nInterest rate swaps are extremely important for hedging yield or borrowing costs. Interest rate swaps allow you to change variable rates to fixed rates. They also allow speculators to profit from movements in interest rates. Because they require little capital up front, they are the perfect tool for speculators.\nCurrently, 80% of the worlds OTC derivatives market comprises of interest rates swaps, with $435.2 trillion in notional value. There is explosive growth in the DeFi, but a lack of interest rates products to hedge the volatility of DeFi yields. Strips is the leading project addressing this market problem. The vision for Strips is to build the world's largest interest rate derivatives exchange.\n\nWhy are interest rate swaps important?\n\nManaging floating rate liabilities\n\nInterest rate swaps help borrowers manage their floating rate liabilities by allowing them to lock in fixed rates, and receive floating payments.\n\nStructure fixed income products\n\nInterest rate swaps are an instrument to find the fair market price for fixed interest rates. Using this fixed rate, you can begin to structure fixed income products and bonds. Without a market price for fixed interest rates, there would be no reference for fixed income products to be priced from. The fixed rate from the interest rate swap is the future expectation of the floating rate.\n\nInterest Rate Speculation\n\nBecause interest rate swaps require little capital up front, they give traders a way to speculate on movements in interest rates in a capital efficient manner. Traders can also arbitrage between different interest rates across protocols, or capture basis arbitrage opportunities in the futures market. It is easy to trade across multiple yields in a flexible and convenient manner.", "pred_label": "__label__1", "pred_score_pos": 0.5896673202514648} {"content": "Hospitality Financial Leadership – Why Auditors Miss the Mark\n\nClick on on image to understand far more\n\nI lately watched a documentary on fraud and why the auditors had been unable to detect anything even when they were being appropriate on top of what was so clear to the particular person showcased in the job interview. The narrator also spelled out incredibly clearly that the audit function is established up to are unsuccessful.\n\nThis piece is about what resort auditors do and what they truly should really be wanting at to uncover inconsistencies that direct to detecting economical difficulties in the lodge.\n\nAuditors are established up to fail due to the fact they are so green. I remember we experienced a revolving doorway of each inside and exterior auditors at the hotel for what appeared like years. Humorous matter is other than the head person the staff members was often new. The audit perform is the really very first occupation these persons get out of university and they are tremendous inexperienced, even soaked powering the ears.\n\nOn one audit visit, the auditor was tasked with sampling the stock counts so he asked in which the main kitchen was and in specific the “butcher store.”\n\nI replied, “It’s just upstairs. Let us go visit and see if Desmond is there.”\n\nAbsolutely sure plenty of we went to butcher store in the most important kitchen area and Desmond and his group were being busy ripping apart chickens for a banquet afterwards that working day. The stock was counted the night time ahead of, and we have been to location test. This was not Desmond’s initial rodeo and he knew just by on the lookout at us what the deal was.\n\nThe auditor had the depend sheets and requested exactly where the 200 kilo’s of beef tenderloin totaling $4,900 ended up. Desmond enjoying the part and looked puzzled then stated, “Follow me.”\n\nHe took us into a single of the big stroll-in coolers and he opened a non-descript brown box and pulled out a aspect of smoked salmon and mentioned here is the lot, we have 20 boxes in whole. With this amazing substitution the auditor appeared at the containers and just stated thanks. Desmond was grinning from ear to ear.\n\nThe auditor seemingly did not even know the difference between salmon and beef. I imagine he was just so surprised to be in a hectic manufacturing kitchen with a wild-eyed Portuguese gentleman with a knife in his arms and did not want to check with any stupid concerns.\n\nBut this instance is just what is missing with the audit operate. Auditors want to be able to smell when anything is off and then dig right until they fulfill their curiosity or until eventually they come across a smoking cigarettes gun.\n\nAuditors that I have been uncovered to normally do the similar assessments, they hardly ever do anything at all surprising. They follow a reservation with a deposit that turns into a legal responsibility to the arrival, and then they observe the folio and area costs up till settlement on a credit score card, and then it is pursuing the credit card as it results in being income in the bank. Very same with a purchase get, subsequent it is verifying its receipt, then it is accounts payable and off to the financial institution as a credit score. They take a look at the stock counts, depend some floats, send out some accounts receivable letters and possibly they seem at the payroll and HR procedure to see that new workforce are effectively authorised. But that is about it.\n\nWhat they must be checking to discover a smelly sock or a potentially smoking cigarettes gun is suitable beneath their noses. But like the stating goes, “They don’t know what they really do not know.” They could just for exciting examine some of the adhering to locations with a concentrate on sure potentially softer targets:\n\nExpense stories – Seize the GM’s, the DOS’s, and the Controller’s information and sift as a result of what the big pictures are undertaking and paying out the hotel’s funds on.\n\nThe Lender Reconciliation – This is the “grand puba” of destinations to park a pile of dung. What is remarkable and why? Does it even reconcile? How very well set up are the accounts and what is happening each thirty day period? Does the lodge reconcile its dollars and credit rating playing cards day by day? That is like a health care provider examining your blood tension, far too superior and one thing is improper.\n\nValue of Revenue – Why is the beverage price 30 percent, what need to it be? A straightforward test of the menu charges and stage of product sales volumes when compared to some costings tells us what the prospective beverage price should really be. Alas, it need to be under 25 percent. Five details on three million pounds a year in beverage gross sales usually means $150K is up for grabs. Now, that would be handy details that could get some heads rolling.\n\nGlance at the accruals – I realized a Controller that was famous for creating his forecasted GOP pretty much each and every month. Does that sound to very good to be true? Yes, it does! Dig by the backup and make absolutely sure every thing submitted is provided and aim. How considerably are we cooking the books?\n\nWhat about the rebates, voids and paid out outs? – Auditors do not even know what these are. If there is a frequent drip of voids in the F&B outlets there is a issue. If the desk is rebating area revenue due to the fact of seemingly noisy or cold rooms, there is a problem underneath the area.\n\nAccounts receivable sundry and accounts payable sundry stability sheet accounts – In motels these are the clearing houses for negative transactions. What deal inclusions are we spending for and what income arrived in, do they balance or is the lodge getting rid of its shirt? These accounts and their use are like the barometer of the hotel’s working accounting well being.\n\nHow about checking a stack of BEOs vs. the true banquet bills and consumer invoices? – Did the banquet crew publish almost everything? What was missed? This once more is a really telling sample that factors to large challenges. While you are there verify the average selection of days out the BEOs are revealed. If it is much too quick then many other points are problematic like price of profits and labor planning.\n\nThe listing of spots to seem is wide. Total-services lodges are massive and particularly elaborate.\n\nUnderstanding how they operate and what to glance for requires encounter, and detecting problems that homeowners and stakeholders want to know about implies you want to be effectively testing the regions that are most problematic.\n\nI believe this cartoon sums it up nicely:\n\nComing Before long in 2022  – The Affluent Hotelier\n\nComplimentary Discovery Call\n\nMovie System Inbound links: video-course/\n\nBe certain to check out my other products and services on the backlinks below.\n\nOn-line Strategic Hospitality Fiscal Leadership Workshops\n\nThe 3 Thirty day period 1-1 Economic Leadership Mentoring Software\n\nResort Accounting Policy Manuals\n\nHotel Asset Administration Method\n\nStrategic Hospitality Economical Leadership Workshops\n\nKeynote and Breakout Speaker\n\n415 696 9593 – Mobile or Textual content\n\nBrowse a Story About How I Served a Client\n\nGive the mentor a phone right now and let’s get going!\n\nIf you would like a duplicate of the subsequent mail me an electronic mail at [email protected]\n\nPay a visit to my web site nowadays for a copy of my Cost-free guidebook\nThe Seven Techniques to Make a Fiscally Engaged Management Staff in Your Hotel\n\nMake contact with David at (415) 696-9593\nElectronic mail: [email protected]\n\nResource url", "pred_label": "__label__1", "pred_score_pos": 0.7534557580947876} {"content": "Lelo - Sona 2 Sonic Clitoral Massager\n\n\nCruise Control takes over when you can't hold it anymore!\n\nThis powerful Sonic stimulator delivers fast yet gentle sonic waves that stimulate the entire clitoris, inside and out, for insane waves of satisfaction that resonate everywhere and keep you coming back. What is Cruise Control? Cruise Control keeps your device going and keeps your orgasm deeply sensual and just right.\n\n- Specially developed by LELO and exclusively for SONA Cruise.\n- Cruise Control means that when it's pressed hard against your body, it doesn't lose its power, so it stays perfectly consistent.\n- Hassle-free experience.\n- It's not a setting, it's fully automatic. It eliminates the most common complaint against pleasure products.\n\n- Without direct contact, SONA 2's sonic waves provide fast yet gentle clitoral stimulation for mind-blowing pleasure.\n- Larger surface area for deep enjoyment.\n- Softer, deeper and overall bigger mouth for complete satisfaction.\n- Extra soft silicone. LELO's classic body-safe silicone design is made even better with ultra-soft premium silicone that feels extra soft.\n\n- With the included USB charging cable, SONA 2 can be taken anywhere and the smooth, waterproof design is incredibly easy to keep clean.\n\n- Material: silicone, ABS\n- Size: 99 x 87 x 56 mm\n- Weight: 135 gram\n- Battery: Li-Ion 1050 mAh 3,7 V\n- Charging: 2,5 hours at 5,0 V 750 mA\n\nMake sure the SONA 2 Cruise is unlocked by pressing and holding the + and - buttons simultaneously for 3 seconds until the light comes on. Press the + button to turn on; press again to increase the vibration strength. Press the () button to toggle between the 12 vibration patterns. Press the button to decrease the vibration strength. Press and hold the () button to power off.", "pred_label": "__label__1", "pred_score_pos": 0.9948294162750244} {"content": "Renewal by Andersen Goes to the Dogs\n\nAugust 26 is National Dog Day, and this month, atHome is celebrating Man's Best friend with a shout-out to some of the best puppers on the planet. First, we showcase our own four-legged co-workers in The Dogs of RbA slideshow...and then, read on for \"Hero Dogs,\" true stories of canines who were not only beloved pets but also soldiers, scientists, first responders, and more!\n\nThe Dogs of RbA\n\nIt might be a pain for all of us humans...but quarantine is certainly our pets' best friend. People at home, all the time? What more could they wish for? After all, we're only  there to pay them ALL the attention they deserve, right? And in return, they will be the most helpful officemate, EVER!\n\nSo, in honor of National Dog Day on August 26, we are pleased to share photos of some of our pawesome co-workers, past and present, as they show off  their RbA pride. \n\nFrom all across our network--sales consultants, manufacturing floor employees, engineers, marketing staff, canvassers, customer service specialists…these proud pet parents all want to show the world their dogs (and can you blame them??? Look at the cuteness!!!).  \n\nWe’ve got hounds in hats, pups in pajamas, doggies as design consultants, and pooches in polo shirts. From way out east to up north Alaska and everywhere in between. Enjoy this selection of some of our Best Friends from all across the country flaunting their canine sartorial stylings (AKA, dashing doggies wearing/chewing on/frolicking with/otherwise productively utilizing RbA gear).\n\nCelebrate August 26, National Dog Day, with these inspiring tales of canine loyalty\n\nIt's a bird! It's a plane! It's a HERO DOG! They are our faithful companions, our watchful guardians, and our trusted and loyal partners. And, throughout history, dogs of all shapes and sizes have also been heroes. Bark your calendar, as we celebrate National Dog Day (Aug. 26) with stories of some of the most remarkable canine companions, soldiers, scientists, explorers, and more!\n\nSwansea Jack\n\nA long-haired retriever-type dog, similar to today’s Flat Coated Retriever, Jack lived in the North Dock/River Tawe area of Wales. Born in 1930, Jack's first owner was Taulford Davies. However, in the true spirit of youthful exuberance, Jack was booted out of his original home after decimating the town’s duck population while galivanting around the local park.\n\nRehomed to an area of town with a less tempting avian population, Jack took up residence with his new master William Thomas, and enjoyed wiling away his days lounging on the bustling docks of Swansea. It was here his career as a hero dog began.\n\nSwansea Jack was a famous hero dogIt was reported that at first, Jack was afraid of the water, so his Thomas would encourage him to jump in and swim with some of the local kids. While he was learning to love the water, Jack developed the habit of grabbing the kids by collar and pulling them toward shore. It was a trick that would soon come in handy, when a 12-year-old boy who had been taking out the trash got into a scuffle and fell off the dock into the water. Jack jumped in after him and pulled the boy to safety.\n\nA few weeks later, Jack jumped in to rescue a swimmer in distress—in full view of an amazed crowd on the docks—and his legend began to grow. By 1934, he had been credited with pulling 14 people to safety…and also had twice rescued some of his own brethren—a dog floundering in a muddy river, and a sack of puppies tossed into the sea.\n\nAll told, it is believed that Jack rescued 27 people in his lifetime. He received numerous honors, including Bravest Dog of the Year and a silver cup from the PDSA (a large UK-based animal welfare organization). He is also the only dog ever awarded two bronze medals (the equivalent of the Victoria Cross (UK) or Medal of Honor (US)) by the Canine Defence League, and was still earning recognition decades after his passing—in 2000, he was named named Dog of the Century by NewFound Friends of Bristol, who train domestic dogs in aquatic rescue techniques.\n\nAccording to a news article after his death, Jack “had not only perfect courage and the instincts of his grand breed; but he had an innate genius for knowing just how and where to seize even the most hysterical human, struggling in deep water; and how best to tow the victim safely to shore.”\n\nSadly, Swansea Jack died at the young age of seven, after having ingesting rat poison. His death made national—and even international—headlines, and the Canine Defence League offered a large reward for information on who may have been responsible—but no answers ever came.\n\nHis body was eventually laid to rest underneath a publicly funded memorial that still stands on the promenade near the rugby grounds. The inscription reads:\n\n“Erected to the memory of Swansea Jack, the brave retriever who saved 27 human and two canine lives from drowning.\nLoved and mourned by all dog lovers.\nDied October 2nd 1937 at the age of seven years.\nNe'er had mankind more faithful friend than thou who oft thy life didst lend to save some human soul from death.\nOwner and trainer Wm. Thomas”\n\nTo this day, Swansea people are known as Jacks, and fans of Swansea City soccer team are known as the Jack Army, both thought to be in honor of the famous dog.\n\n\nBorn in 1994, Mancs (whose name means “Paw,” in Hungarian) was a German Shepherd and a member of the renowned Spider Special Rescue Team of Miskolc, Hungary, a team that traveled the globe doing search-and-rescue work.\n\nAs a member of the squad, Mancs was incredibly gifted at locating earthquake survivors who lay trapped deep beneath the rubble and alerting rescuers. He could locate where people were buried under the earthquake rubble—and not only could Mancs determine if the person was dead or alive, but he could also indicate this to the other members of the rescue crew. If he sensed a dead person, he laid down; when he sensed a live person beneath the rubble, he stood up, wagged his tail and barked. \n\nAlongside his owner László Lehóczki, Mancs helped in several high-profile earthquake rescue missions, including the 2001 earthquakes in El Salvador and India. His most famous case was when he helped rescue a 3-year-old girl who spent 82 hours under the ruins after the 1999 Izmit earthquake in Turkey.\n\nMancs died of pneumonia in 2006. In 2015, Mancs was honored posthumously with his team with the European Citizen's Prize for their many years of life-saving efforts. Attending the ceremony as the guest of honor was Hatira Kaplan—the young woman Mancs had rescued in Izmit.\n\nTaro and Jiro\n\nIn January 1957, a team of 11 Japanese researchers and 15 Karafuto-ken sled dogs (also known as Sakhalin huskies) arrived at the Showa Research Station in Antarctica. The researchers would spend roughly a year at the station, and then be replaced by another team. The dogs, a hearty, rugged breed well-suited for working life in a snowy climate, would remain on the base, ready to assist each successive team. Among the canine team members, were three-year-old brothers Taro and Jiro, who were also the youngest of the dogs.\n\nIn early 1958, a severe, strong, and unexpected storm approached, and the first team had to be emergency evacuated by helicopter. Because the second team was due to arrive shortly, the dogs were left tied at their stations, along with the food and water they would need for their next few days.\n\nUnfortunately, the weather remained prohibitive. Conditions worsened, and the ship carrying the second team had to abort its mission—the way would not be passable for nearly another year, meaning the dogs were, to the great sadness of their team, abandoned and considered lost.\n\nIn January 1959, the third expedition team returned to the base in Antarctica, fully expecting to find the remains of their 15 canine compatriots. However, they only found that seven (Aka, Goro, Pochi, Moku, Kuro, Pesu, and Kuma from Monbetsu) had lost their lives while still chained. The other eight dogs had managed to break free from the chains. Amazingly two of the dogs, Taro and Jiro, were found alive—thin and a bit bedraggled, but otherwise fine—near the base. The remaining six (Riki, Anko, Deri, Jakku, Shiro and Kuma from Furen—who was the sire of Taro and Jiro) were never found.\n\nEven more amazingly, the expedition crew’s stored foodstuffs and supplies were never breached, nor did the pair resort to cannibalism (common during famine), leaving the bodies of their chained packmates to rest. Researchers believe that Taro and Jiro instead relied on their own resourcefulness, eating “penguins, feces of seal, seabirds, and fishes (trapped in the ice).”\n\nAnd so, after enduring a harrowing 11 months of the brutal Antarctic conditions, Taro and Jiro were joyfully reunited with their human teammates. And then what did the hero dog pair do? They went back to work, staying with the new pack and pulling sleds for the expedition.\n\nJiro died of natural causes in Antarctica in 1960; his remains are on display at the National Science Museum in Ueno Park, Tokyo, along with fellow Japanese hero dog Hachi (see below). Taro returned to his hometown of Sapporo, Japan, in 1961, and lived at Hokkaido University until his death in 1970. His remains are displayed there.\n\nSallie Ann Jarrett\n\nDogs have long served on the battlefield, doing everything from playing a role in logistics and communication; to working as sentries, trackers, and guards; to simply providing an invaluable morale boost to troops.\n\nCelebrate heroic dogs National Dog Day at Renewal by Andersen #NationalDogDayOne of these battlefield dogs was Sallie Ann Jarrett, the canine mascot for the 11th Pennsylvania Infantry during the Civil War. \n\nA brindle-coated American Staffordshire terrier, Sallie was given to Captain William Terry of Company I as a puppy in 1861—although she was truly “owned” by the entire 11th. Sallie was an army dog from the start, joining soldiers during their drills and standing with the color guard for dress parade.\n\nShe campaigned alongside the troops, and did not stay out of the fray when the firing began. In fact, she accompanied her regiment into battle, taking a position at the front lines and barking at the enemy. Sallie saw action in each of her regiment’s engagements, which included Cedar Mountain, Second Bull Run, Antietam, Fredericksburg, Chancellorsville, Gettysburg, the Wilderness, and Petersburg.\n\nAt Gettysburg, Sallie became separated from her regiment on the first day of fighting, and the soldiers feared she had perished in the fight. The brave pup, had not, in fact died…but when she was unable to get through Confederate lines, she returned to where the 11th had been fighting earlier, on Oak Ridge. She was found her there, days later, dehydrated, hungry, and tired—but still “at work,” faithfully attending to her injured compatriots and guarding the bodies of the fallen.\n\nDespite enduring bullet wounds and injuries, Sallie fought alongside her unit nearly until the war’s end. Sadly, on February 6, 1865, during the Union advance at Hatcher's Run, Virginia, she was struck by a bullet and killed. So beloved and respected was the terrier, that several soldiers put aside their arms to bury her on the spot, despite being under fire.\n\n25 years later, in 1890, the surviving members of the 11th gathered at Gettysburg for the dedication of a monument erected on Oak Ridge in their honor. The towering statue featured a larger-than-life solider marching at the top…and at the bottom? Was a bronzed likeness of Sallie Mae, lying at the base keeping watch over her troops, just as she had during her life.\n\nStrelka and Belka\n\nstrelka and belka on a stampThese hero dogs boldly went where no man…er, dog…went before!  \n\nOn August 19, 1960, Soviet space dogs Belka (which translates to “Squirrel” or \"Whitey\") and Strelka (meaning “Little Arrow”) became the first living creatures to be shot into orbit and return to earth safely. The pair’s successful journey in Sputnik 5 paved the way for Yuri Gagarin to make the first manned spaceflight eight months later.\n\nNeither dog (both of whom had been rescued off the streets), suffered any ill effects from the journey. Live footage showing the chreerful pups as they floated in zero gravity delighted the world. The duo returned home as adored celebrities and were immortalized in everything from figurines and statues to comics and postage stamps.  They even went on tour, each wearing her own custom-made jumpsuit.\n\nStrelka later had a litter of 6 pups with Pushok, a fellow Soviet space program dog. One of Strelka’s puppies, Pushinka (“Fluffy”) was presented to Caroline Kennedy, President John F. Kennedy’s daughter, by Soviet premier Nikita Khrushchev. \n\nIn the spirit of Cold War détente, romance blossomed with Pushinka and Charlie, another of the Kennedys’ dogs, resulting in four puppies nicknamed “pupniks” by JFK. Descendants of Strelka the space dog are still living today across the U.S. \n\nYou can watch footage of Belka and Strelka before, during, and after their space flight here.\n\n\nMan’s best friend has four legs…unless she doesn’t. Meet Faith, the bipedal canine who inspired millions around the globe with her positive attitude and happy spirit.\n\nFaith was born in an Oklahoma flea market with two fully functioning rear legs, but only a single malformed stub for a front leg (which was later removed). She was adopted by Jude Stringfellow, who took Faith in when the mother dog was found trying to smother the deformed puppy. \n\nThe Stringfellows fell in love with the feisty three-week old chow-lab mix puppy, and even though veterinarians urged them to humanely euthanize her, the family was committed to helping Faith not just survive—but also to thrive.\n\nJude and her family knew that getting Faith’s chest and head up off the ground would be crucial, so they used peanut butter to get the puppy moving, and with the family’s corgi nipping at her heels, Faith learned to hop around on her rear legs. Eventually, she taught herself to walk.  \n\nFaith didn’t let her disability stop her—and she quickly became an inspiration to everyone from children to retirees to soldiers. Faith and Jude travelled around the world to hospitals, airports, and other places to greet returning soldiers—many of whom had lost limbs or suffered other severe injuries during their deployments.\n\nThe plucky pup visited more than 2,300 wounded warriors in hospitals and wards throughout the world, and was seen by more than 2,000,000 active soldiers at bases, airports, and ceremonies. So recognized was she that in 2006, Faith received the honorary rank of E5 Sergeant in the U.S. Army. \n\nWhen she wasn’t visiting soldiers, Faith took part in a children’s reading program, and travelled around as a featured guest on talk shows and at other conferences, workshops, and events (she even went on tour with Ozzy Osbourne!).  \n\nFaith passed away in 2014, at the age of 12, her family at her side. \n\n\nBeing a hero is many things, and sometimes, those things are very simple. This hero dog didn’t fight in a war, or save children from deadly epidemic, or help explore far reaches of the universe. This hero dog simply was…a dog. The loyal, faithful companion that makes us love the canine species so much.\n\nHachikō was a Japanese Akita, adopted in 1924 by Hidesaburō Ueno, a professor at the University of Tokyo. Every day, Hachikō would accompany his master to the train station to see him off to work, and after woo-wooing his goodbyes, would trot home. Then, in the early evening, Hachi would return to the station and await Professor Ueno’s arrival.\n\nThat the dog was never formally trained for this, and undertook the ritual on his own was remarkable enough…what happened next, even more so.\n\nOne day, the professor suffered a cerebral hemorrhage while at work. He died instantly—and never came home. But that day, and every day after, at precisely the same time, Hachikō came to the platform, met the train, and waited for his owner. He continued until his own death, more than nine years later.\n\nBy the time of his death, everyone knew of the loyal dog who made the lonely trip to wait for his owner every evening. Hachi had become a national celebrity—a symbol treasured by the Japanese people as the spirit loyalty, devotion, and faith. The Akita is revered as the national dog of Japan.\n\nHachi died on March 8, 1935, from what scientists later determined to be terminal cancer. His body was found near the station, and was laid in state as mourners—including the widow of Professor Ueno—paid their respects.\n\nHachikō’s remains were interred next to Professor Ueno's grave in Aoyama Cemetery. Today, a statue stands in Shibuya station, with a plaque commemorating him at the exact spot where he waited every day. The nearest gate is called the Hachikō exit. Every year, on the anniversary of his death, people from all over gather at the Shibuya station for a ceremony honoring his loyalty.\n\nIn This Issue\n\nJoin The Conversation\n\nconsult button", "pred_label": "__label__1", "pred_score_pos": 0.5677728056907654} {"content": "BMI Country Awards: Taylor Swift’s \"Love Story\" Called Song of the Year\n\nAt Tuesday night's BMI Country Awards in Nashville Taylor Swift's  hit single \"Love Story\" was recognized as song of the year by the publishing rights society. This can be sees as an indicator of how things will go tonight for her at the Country Music Assn. Awards, where she's going in with four nominations, including the top honor, entertainer of the year.\n\nHaving interviewed Taylor several times since she put out her debut album in 2006, I'm certain the BMI award was especially meaningful for her, because every time we've spoken she's made it clear that of all the facets of her still-unfolding career in music, songwriting is the thing she prizes the most.\n\nYou could hear it in her comment upon being handed the award: \"I just want to say thank you to every songwriter and every loved one of a songwriter, thank you, because you are the reason I wanted to try Nashville,\" she said. \"You are all my heroes.\" The Los Angeles Times reports.\n\nTaylor Swift’s sweeping \"Love Story\", composed by Swift alone, was the first single from her sophomore album Fearless. In addition to topping the Billboard country chart, \"Love Story\" topped the Billboard pop and AC charts and became the best-selling country song in the United States and the most-downloaded country single in U. S. history. Published by Sony/ATV Tree and Taylor Swift Music, “Love Story” is Swift’s second consecutive BMI Song of the Year; “Teardrops on My Guitar” earned the prestigious honor in 2008.\n\n\n\nMeanwhile, Taylor Swift dazzled in a white sequin plunging dress at the 57th Annual BMI Country Awards.\n\nThe Country star looked dainty in a white mini dress with mega sleeves and a cascade at the waist.\n\nShe accessorized with copper metallic platforms, a white box clutch, diamond hoop earrings, matching bracelet in her left arm and two gold rings in her right hand, Sawf News reports.\n\n\n\nAuthor`s name: Editorial Team", "pred_label": "__label__1", "pred_score_pos": 0.9584406614303589} {"content": "Selection Egypt\n\n\nThe Contrato platform project, Bridging the Digital Gap for Youth Lawyers, aims to transform the provision of legal services from analog to digital. Contrato strives to empower young lawyers, primarily women, with the requisite qualifications, to fill the general supply-demand gap long marring the sector.\n\nThe Problem\n\nThe supply of university graduates far exceeds the demand in the labour market throughout Egypt. Over half a million youth graduate from university each year in Egypt. The number of university graduates has increased by almost 5.9% in 2018 alone, most of whom are from public universities (the annual higher education report, CAPMAS). There are over 12 law schools in Egypt, with Cairo University alone graduating at least 40,000/year. Despite being among the brightest, law graduates, particularly women, face multiple challenges to earn a living. Not surprisingly, the dramatic increase in the number of students has been coupled with a decline in education quality. The result is an oversupply of graduates with skills below market needs. The majority of those who graduate shift to other occupations that do not match their skills, remain unemployed or accept jobs in the legal field that are underpaying and without many developmental prospects. In a male-dominated industry with demanding working hours and no child-care services, many female lawyers tend to quit their jobs upon marriage. The professional prejudice is reinforced by employers’ preference to mainly invest time and train male lawyers purely for RoI.\n\nConversely, the demand for legal services and advising, in contrast to the classical perception of the legal profession as centering around litigation, remains high. However, given the relatively high costs associated with legal services, most individuals shy away from professional consultancies. Consequently, such individuals end up facing serious legal difficulties that could have otherwise been avoided.\n\nThe Solution\n\nContrato offers an innovative approach to such challenges with the principal aim of empowering young lawyers, particularly females, to remain or (re)enter the job market. By establishing a state-of-the-art interactive online legal platform, specializing in contract templates and online legal consultations, Contrato bridges the gap between clients seeking legal services and law practitioners. Contrato’s platform overcomes the hurdles this particular target group faces by providing flexible working hours at decent compensation. On the one hand, platform users will have access to a variety of tailored contracts from the database and the option for professional consultancies by young lawyers at an attractive fee, thereby eliminating demand barriers. On the other, the project will provide upskilling training and certification to a pool of 860 young law graduates and professionals, particularly women, from all over Egypt by 2023. Special training curricula and certification processes will be developed by 2022 based on professional and international standards. By the end of the project, 560 young lawyers (460 females and 100 males) are expected to maintain livelihood opportunities through self-employment successfully. It is essential to highlight that 10 young lawyers out of the total number of lawyers will be trained to become trainers. That is, they will receive a tailor-made ToT to support the upskilling training of the rest of the group (850 young lawyers). While the project intends to focus on the five governorates mentioned above, the scope of the platform will include others as well spread out in both Upper Egypt and the Delta regions.\n\n\nContrato seeks to provide decent self-employment opportunities for young lawyers through establishing an innovative online platform for contractual legal services and consultancies. CFYE’s contribution to the project is integral to its implementation in terms of quality, scale, and specific target group focus. In order to reach the aforementioned objectives and enhance quality, Contrato will not only avail the online platform (which would have been the business as usual model) but would further seek to build the capacity of the target beneficiaries through designing curricula and conducting tailored made training and certification to onboard young lawyers, particularly women. Contrato’s regular business model does not include an upskilling or gender-focused strategy. The same applies to youth inclusion in the design and implementation of the project. In this regard, the Fund’s technical support is needed to develop both gender-specific and youth-centered strategies.\n\nMoreover, with the Fund’s support, Contrato would be able to include a cost-share to the project by offering discounts from the Contrato platform to young lawyers using its interactive templates, as well as providing more remuneration to the beneficiaries of the project than their peers. Furthermore, with the support of the Fund, Contrato would be able to explore greater opportunities for scalability. Indeed, Contrato will have the opportunity to flag the idea of the platform with other private sector entities, donors, and development organizations to possibly scale up the results of this project (upon the successful pilot, after the first year of implementation) into various countries in Africa and/or elsewhere in the developing world where similar conditions pertain.", "pred_label": "__label__1", "pred_score_pos": 0.927632749080658} {"content": "What exactly is Net Value and ways to Assess They\n\nNet well worth are a monetary metric that will help you remain your private image of your finances inside the angle. The typical web value because of the decades, in this instance, refers to the web worth of the fresh new house regarding the You.S. separated from the number of home. Metrics generally use homes instead of individuals due to the fact children normally getting one individual otherwise several thousand some one. Web worth usually rises as we age since your income is high, you possess significantly more assets and will have less loans. Here, we shall break down online value of the generation towards the whole inhabitants of your own You.S. For those who have a lot more questions relating to online really worth, you are able to consult with a monetary mentor. SmartAsset’s 100 % free mentor matching device can also be hook up your having advisers you to definitely suffice your area.\n\nNet well worth is a fantastic way of measuring just how Us citizens are trying to do economically as it takes into consideration what you one another individual, their assets, and you will owe, what you owe. Their assets, or that which you own, is dollars, bank account, financing levels, the new equity you’ve got of your property and much more. Worthwhile bits of accessories are included. So are one series you’ve got which have economic worthy of eg press, coins otherwise classic automobile stuff.\n\nYour liabilities, or what you owe, are all debt, and additionally your debts on your own domestic, education loan financial obligation, credit card debt and you may one funds you’ve got a fantastic. The difference between your assets and you will obligations can be your internet value.\n\nShould you want to calculate your web worth, you place up the worth of all you very own and subtract of your worth of whatever you are obligated to pay your creditors. The real difference will be your websites value. If we need certainly to extrapolate one to on the whole inhabitants out of the U.S., we could make sense the value of property of every family and you can deduct of the complete number those people domiciles are obligated to pay the loan providers. As a result, the web worth of the total Western population.\n\nAverage Net Worth\n\nbad credit personal loans hamilton ontario\n\nWhen you calculate an average internet worth of the population of new U.S., the same procedure can be used with another action. Your deduct full household debt out-of complete house property for the entire inhabitants. Then, while there is multiple domestic, divide by the final amount out-of houses in addition to result is an average home websites value into U.S. populace.\n\nIt’s important to account for income difference between the steeped and worst when figuring the typical net worth of brand new U.S. inhabitants. The new Government Reserve used the last Questionnaire from Consumer Funds for the 2019, the outcome where were create inside the . For the reason that survey, it unearthed that whenever we need typically full web worthy of on You.S., it is skewed up since the top ten% away from home hold 70% of the wealth in addition to ideal fifty% out-of domiciles keep 98% of one’s riches. Otherwise to change for it, the typical net property value an american home is mostly about $748,800.\n\nOne method to obtain a good read on an average websites property value Us americans has been this new average net value of the nation’s inhabitants. The fresh new median ‘s the center level of a summary of number when they’re sorted in both ascending otherwise descending order. For many who list all households’ net worthy of on You.S., the average web worth is actually $121,700. You can find the funds disparity because of the higher difference between an average net value plus the average net worth regarding the U.S.\n\nMediocre Web Well worth by the Age\n\nWebsites worth sometimes rise as you become old. Numerous situations are responsible for the rise, such https://worldpaydayloans.com/payday-loans-mo/lebanon/ as doing their studies, inheritances, your earnings, household members structure, ethnicity and you may property standing. So it checklist is not thorough. New 2019 Survey out of Consumer Believe conducted because of the Government Put aside holiday breaks away websites well worth of the ages and supply an average net worth in addition to median online value because of the generation.\n\nEarly Adulthood\n\npersonal loans non homeowners\n\nIf you’re within period of 18-24, the typical net really worth is approximately $28,707 therefore the median net worth is approximately $8,216. In it age group, the common web really worth by the many years was skewed to your brand new high avoid. If you find yourself anywhere between years 25-31, the common is $forty-two,388 and median is even next behind during the $seven,512.\n\nWhen you’re between the period of 29-34, the average online really worth was $122,700 and also the average online value try $35,112. Within chronilogical age of 35-39, the average are $274,112 therefore the median try $55,519.\n\nMiddle age\n\nInvolving the ages of 40-44, an average internet well worth try $623,694 while the median are $127,345. When you are 45-forty-two, the typical is $761,five-hundred as well as the median was $164,197.\n\nOn the fifties, if you’re anywhere between 50-54, the average web worthy of try $897,663 in addition to median websites worth are $171,360. Anywhere between 55-59, its $step one,165,477 and $193,549 respectively.\n\n\nWithin period of 60 and you will 64, the average online really worth was $step one,187,730 together with median was $228,833. While you are ranging from 65-69, the common is $step one,250,679 while the average try $271,805.\n\nIn you have been in your 70s, the average net really worth begins to decline, nevertheless average net well worth doesn’t always follow. Ranging from 70-74, the common is $1,173,653 therefore the average try $258,531. Off age 75-79, the typical web value is $945,480 together with average internet value are $272,976. Of 80 yrs old and you will submit, the average websites worth is $973,141 and also the average is $235,193.", "pred_label": "__label__1", "pred_score_pos": 0.9723281860351562} {"content": "Nov 1, 2022 12 min read\n\nChoosing From a Range of Qual Research Methods\n\nHow do I select methods that make sense for my current project?\n\n • Research\nAmrita Kulkarni\n\nAmrita Kulkarni\nDirector, Design Research & Strategy\n\nMore often than not at Highland, we find ourselves relying on qualitative Design Research methods to offer value to clients along their design adventures, whether through revealing unexpressed user needs, discovering behavioral insights, uncovering opportunities for disruption, defining a new market, or evaluating a well-informed idea. Using qual—instead of quant—methodology means we can dig deeper into real-time responses, probe motivations, immerse ourselves in participant context, and see the pink elephant in the room that needs to be talked about. This kind of research, grounded in ethnography-inspired practices, stands in contrast to market research, where the focus typically is on attitudinal data collection and quantitative approaches.  \n\nSo how does our ethnographic curiosity manifest into better value for our clients? Because without the luxury to observe what’s happening in natural settings, dig deeper or bump into unexpected knowledge, we’re likely to return with predictable learning. Quantitative methods—polls, surveys, large group sessions, or questionnaires—make assumptions on possible responses, and rarely uncover insights about things we didn’t know we didn’t know. All too often, product managers at startups and incumbent organizations tell the disappointing story of failure because of unforeseen user behavior and misunderstood motivations.\n\nWhile quantitative research or quantitative data is helpful in scaling an already sound understanding of users, it is a poor replacement to qualitative research in discovering user needs and related opportunities. Leveraging qualitative research methods lowers risk not only in designing new products, but also uncovers new territories for innovation previously unseen or undiscovered by the industry.\n\nDesign Research methods are driven by user behavior\n\nSo how should you get started with qualitative approaches to conduct Design Research? Qual research is more than just about reducing your participant pool or sample size. The very structure and intent of the research is different from quant methods, and there are numerous research methodologies at play. The singular driving force behind identifying methods for an upcoming project is the human behavior being studied. In the realm of Design Research, qualitative researchers’ intent is always to understand behavioral tendencies, as opposed to attitudinal inclinations. \n\nThis means we’re not asking participants what they think or prefer but seeing how they behave through participant observation. That makes it essential to attempt access to participants’ context—whether it is their homes for a study relating to family time, offices for a study about work habits, or a frequented park for a study relating to dog walking. Some Design Research methods are dedicated to conducting this kind of contextual research, and others have emerged as workarounds when the participant context is inaccessible. \n\nResearch methods also differ in the nature of the activity being researched, whether it is momentary, like when birds are being fed at a zoo, multi-step, like someone going through a college application process, or prolonged, like when farmers manage year-long agricultural cycles. Research questions are designed to keep in mind these nuances in context and possibilities for deviation during the research. See below an organizing framework for the most popular methods for a qualitative study, along with details on how some of them unfold in the field.\n\nUnderstanding Different Qual Research Methods\n\n 1. Observation\n\n When to Use: If you are looking to understand a specific behavior or moment in time and the participant context is accessible, you can observe the user to increase your understanding of their behavior and the impact of the surrounding environment.\n\n Method: Researchers can collect information by entering into the user’s environment and carefully noting what users are doing, what events are occurring, and what characterizes the physical or digital setting. During an observation, such as watching patrons choose seating in a public cafe, the researcher remains as unobtrusive as possible in order to avoid swaying user decisions. While this is called observation, the researcher should use all of their senses—such as noting the level of noise in the cafe, the smells coming from the kitchen, or the views to the street—to expand their contextual understanding. Information gathered through observation is best recorded through real time note taking to ensure memories don’t become distorted. \n\n Specific Value: Gathering information on user actions within context enables us to discover what is actually happening versus what users remember or perceive. It also includes the benefit of highlighting contextual factors that may impact user actions, such as the level of noise or smells in a cafe. \n\n 1. Personal Immersion\n\n When to Use:\n If the user behavior is specialized or unique—whether it occurs momentarily or through multiple steps—and it is possible to carry out their actions yourself, then you can use personal immersion to expand your understanding of their motivations and build empathy for the user.\n\n Method: By putting yourself in the user's shoes and carrying out specific actions or activities, you can build a more nuanced understanding of the user’s behavior. During personal immersion, you will undertake the user’s actions as if you were them, whether as simple as taking out the recycling or as complex as getting a new license at the DMV. By carrying out each step yourself, you will get a clearer picture of pain points, workarounds, and outside influences.\n\n Personal immersion can be documented in real time through notes, pictures, voice recordings, or video recordings. However, depending on the cadence of the activity, you may be entirely focused on carrying out the user's actions and unable to record in real time. For example, when taking out the recycling, you are not likely to have moments to stop and make specific notes. In this case, it may be best to take out the recycling and immediately record your thoughts. Alternatively, while getting a new license at the DMV, you may find yourself waiting for extended periods of time, during which you can record your feelings and observations.\n\n Specific Value: Personally carrying out the user’s activities is a reliable method for building empathy. While we can watch someone struggle through the steps of getting their license at the DMV, there is nothing quite like experiencing the frustration or setbacks ourselves. Taking each step helps us to notice the small and big influences that impact our experience.\n\n 1. Shadowing\n\n When to Use:\n If the user behavior is multi-step and the user context is accessible, you can shadow the user to study the varying contexts in which each of their journey stages plays out and pick up nuances on sequence, spatial interplay, and work-arounds along the way.\n\n Method: Shadowing is observing user behavior in context by following the user through specific activities, such as buying groceries, preparing a large family meal, serving it to their family of ten, and cleaning up. Occasionally, shadowing offers the opportunity to ask the user a quick question along the way such as, “Why did you do that?” or “How does that work?” These impromptu questions allow you to learn in real time and uncover user motivations that may not be apparent on the surface.\n\n Like observation, information gathered through shadowing is best recorded with real time notes. Added photo or video documentation can be useful as well. Because you may be busy or feel overwhelmed while shadowing, a follow up debrief with the team is useful. During this time you will record any additional observations immediately after the shadowing is complete to make sure you’ve captured all possible information.\n\n Specific Value: Gathering research input as the user carries out actions within their context and being able to ask the ‘why’ questions quickly while letting users carry on their activities helps uncover unexpected information such as hidden work-arounds or subconscious motivations.\n\n 1. Talk-Alouds\n\n When to Use:\n If user behavior occurs over multiple steps, but their direct context is inaccessible to you, talk-alouds can help the user to shed light on the steps they are taking and why they are taking them.\n\n Method: Talk-alouds are when users narrate their actions, thoughts, and feelings as they carry out activities in real time. Here, detail is important and the more the user breaks down their actions and describes each step, the more you will discover about their behavior. The reason for sharing this information remotely can vary. Users across the globe can share their computer screen with you as they test a digital prototype. In the times of COVID and social distancing, users can video record the steps they take to make cafe-style frappuccinos at home. The key is that the recording is detailed, real-time narration, by the user themselves.  \n\n Specific Value: Talk-alouds are invaluable for gaining insight into real user actions when the researcher can not be present in context. As noted, the user plays a large role in this—the more detailed the documentation, the more you will learn.\n\n 1. Immersion\n\n When to Use:\n If the user’s behavior occurs over a prolonged period of time and the context is accessible to you, immersing yourself in the user’s environment can help you understand the influences at play and how they impact the user’s behavior.\n\n Method: Immersion is most successful when you join the user in their environment for multiple days. While in the user’s context, you can carry out a mix of other methods, such as shadowing a teacher throughout their day, observing behavior in the school cafeteria, or hosting intercept interviews in the hallways. The key is to be part of the environment for a prolonged period of time. This lets you notice behavioral details and identify typical patterns versus unique occurrences.\n\n Specific Value:\n Contextual immersion allows the researcher to fade into the background over time. For example, students may be on alert while being observed on day 1, but by day 3, they are likely used to the observer in the background and will revert to typical behavior. Immersion also enables the researcher to observe the context through different methods over time, revealing wider insights and more connections between user motivations.\n\n 1. Topical Round Tables\n\n When to Use:\n If user behavior occurs over an extended period of time and involves a variety of user types, stakeholders, or experts, then hosting a discussion around specific curiosities or emerging topics reveal new dimensions in user motivations. These are recommended as generative conversations instead of evaluative feedback sessions like focus groups.\n\n Method: Topical round tables work best in small groups of 4-6 participants with varied backgrounds. Coming from different contexts may impact why users make certain decisions and how they perceive an experience, especially around a specific topic. Listening to users discuss their experiences and feelings with each other—perhaps verifying or challenging one another—will reveal a wide array of experiences to consider. Discussions are typically structured with prompts and monitored by an experienced researcher to ensure all participants, including the shyest or soft-spoken, have the opportunity to contribute. The intention is to facilitate—not moderate—the discussion.\n\n Takeaways from topical round tables are best recorded through live visual note-taking, such as physical or virtual post-its. Depending on the comfort level of participants, discussions may be recorded for note-taking purposes. Documenting observations post-discussion or through team debriefing helps make sure you capture all useful information. \n\n Specific Value: Topical round tables are especially useful in drawing out varied user experiences around the same actions. Because personal context is so formative for how we experience something, each user can have a wildly different perspective on the same actions. \n\nWinning with Qual Research Methods\n\nEach qual Design Research method offers nuanced value to a project and is deeply dependent on the activity being studied and the timeline in question. It’s not just about selecting from a list of interchangeable data collection methods but more about carefully crafting an approach most suited to the behavior, context, timeline, and participant profile while balancing research objectives. Therefore, it is important to understand which methods to deploy and when. \n\nWhen curious about users dealing with unique circumstances, like elderly users moving with the assistance of walkers, personal immersions are a useful tool to boost empathy. When looking to disrupt a crowded industry, analogous experiences can prove to be game-changing, because it brings in perspectives from other industries with similar behaviors. In a guarded setting like hospitals dealing with patient confidentiality, scenario walkthroughs can prove to be highly effective, revealing surprises along a contextual walkthrough. \n\nThe number of research methods deployed on a given project differs greatly based on the project's intent, timeline, and budget. Highland recommends 2-5 methods to ensure a rich perspective and diverse learning.  \n\nIt doesn’t end with just choosing methods\n\nSelecting appropriate qual Design Research methods and executing the research does not alone guarantee game-changing insights—synthesizing the information is the secret sauce. Synthesis, an interpretive, meaning-finding process that distills insight from multiple research methods, is distinct from data and content analysis. \n\nTo truly deliver the value of qual research, researchers must become intimately familiar with every participant’s responses, behaviors, and the context in which they were mentioned, and cluster these debrief or field notes based on patterns of motivation, aka why, as opposed to what, meaning the topic being discussed. These clusters, based on common needs across behaviors, lead researchers to aha moments—or insights—that direct toward design opportunities. Unlike analyzing numerical data into aggregates, the process of synthesis uncovers the bigger why behind behaviors, giving form to the unsaid.\n\nThe synthesis process is time-consuming, taxing, and often the most challenging part of the journey. But synthesizing qualitative data is worth the soul-searching because it takes us to new places, crystallizing new understanding that may be hidden in plain sight.", "pred_label": "__label__1", "pred_score_pos": 0.9155838489532471} {"content": "Skip to Content\n\nWhich Gemstones Come From The Ocean? Corals, Pearls & more!\n\n\nYou may be wondering where your gemstone was originally found. A number of organic gems are created by certain animals living in the ocean. On the other hand, most inorganic gemstones form in the Earth’s crust (the outermost layer) while a few form in the mantle (the middle layer). Some of those in the mantle move up to the crust over time.\n\nThese gemstones are either mined from the crust or reach the surface of the Earth through geological processes. As you may have guessed, some of these gemstones are mined from the oceanic crust while others are deposited on the ocean bed or near the shore.\n\nOrganic gemstones that are found in the ocean are coral, calcite, aragonite, and pearls. They are created by animals – mainly corals and mollusks. Inorganic gemstones that can be found in oceans include diamonds, gabbro, serpentine, cassiterite, peridotite, and olivine.\n\nMost of the stones mentioned above look very different in the ocean compared to their polished forms because many of them are found in raw states on the ocean bed or in the forms of shells and skeletons or coral reefs. Some of these gems have very similar chemical compositions (or in some cases – the exact same formula) but different physical structures.\n\nWhich Gemstones Come From The Ocean\nWhich Gemstones Come From The Ocean\n\nIf you are interested in checking out beautiful jewelry for women with pearls you can find them by clicking here (Amazon link).\n\nOrganic Gems in the Ocean\n\nThe gemstone coral comes from the “homes” of tiny marine animals called coral polyps (sometimes they’re just called corals). These animals live in huge colonies under the ocean and extract calcium carbonate (CaCO3) from the water.\n\nThey then secrete this chemical to create strong and hard skeletons around them that serve as “homes”. Each generation of corals builds on top of the homes of the previous generation which results in the formation of coral reefs, though not all corals are “reef builders”.\n\nThe dead, hardened skeletons of corals are used to make coral gemstones which can have a variety of colors ranging from transparent/white to red, pink, orange, violet, blue, and even black.\n\nBut it’s important to know that coral gemstones are a mix of several chemicals and not just calcium carbonate. This is important because different forms of pure CaCO3 are used for different gemstones.\n\nCalcium carbonate is found in the ocean either in the form of calcite or aragonite. Aragonite and calcite have the same chemical composition (calcium carbonate – CaCO3) but have different physical structures. If you heat aragonite to a certain temperature you will get calcite.\n\nThese minerals are found not only in the skeletons of corals but also in many other marine animals and the gemstones they produce are completely different.\n\nTherefore, coral, calcite, and aragonite gemstones share very similar chemical compositions but are in fact 3 separate gems.\n\nPearls - Organic Gems from Ocean\nPearls – Organic Gems from Ocean\n\nThe other type of organic gems found in the ocean are pearls (which also contain CaCO3). These gems have been used for making jewelry for thousands of years and they’re created by mollusks (a category of shellfish) – mainly oysters, clams, and mussels.\n\nPearls are the most expensive organic gems and their price is higher if they form in salt water rather than freshwater.\n\nInorganic Gemstones in the Ocean\n\nOver half of the ocean floor is made of basalt while the rest is made of gabbro and peridotite. Gabbro is a dark igneous rock that’s often used to make tumbled gemstones.\n\nGabbro, basalt, and peridotite all contain a green-ish mineral called olivine, which is one of the primary components of the Earth’s upper mantle. Olivine is used to make the green gemstone peridot, which can be quite expensive in large sizes.\n\nPeridotite, on the other hand, contains a mix of olivine and pyroxene. It gets its name from the gemstone peridot. Serpentine forms in places where peridotite undergoes hydrothermal metamorphosis (when very hot water interacts with a rock) – usually between the mantle and the oceanic crust.\n\nWhen this happens, the olivine and pyroxene transform into serpentine. That’s why olivine usually turns into serpentine before reaching the surface of the Earth.\n\nAnother important gemstone that comes from the ocean is cassiterite, which is actually the main source of tin. Tin is often carried into oceans and seas by rivers and deposits near the shores.\n\nThe sediments near the shore are dredged to extract the cassiterite which can be turned into a gemstone or be used as tin. Cassiterite is also found in igneous or metamorphic rock.\n\nLast but not least – diamonds. Diamonds are also often washed into seas and oceans via rivers. In 2017, 1.3 million carats of diamonds were recovered from the Atlantic Ocean.\n\nMarine diamond mining is a huge industry that dredges material from under the ocean floor and then extracts the diamonds (if there are any) from the gravel.\n\nAre marine diamonds different from land diamonds?\n\nYes, marine diamonds are usually of a higher quality. The reason for this is diamonds found in the ocean were transported there by rivers and this process can wreck low-quality diamonds.\n\nAs a result, only diamonds with the best quality survive and make it into the ocean. Over 90% of marine diamonds are gem quality, whereas less than 60% of land diamonds are good enough to become gems.\n\nTIP: Hunting for rocks at the seaside is a pleasurable pastime, and there are many treasures to be found. Check out how to clean rocks from the beach in the article below:\nCleaning Rocks From the Beach: 7 Ways How to Do It Properly\n\nWhat Else Can You Find in the Ocean?\n\nI talked about tin being transported into seas and oceans but this is also true for gold which sometimes accumulates in sediments close to the shores. Magnesium and titanium can also be found in these areas.\n\nBut it’s important to keep in mind that deep-sea mining is expensive and it’s often not profitable to extract these materials from the ocean.\n\nAre Ocean Gems Expensive?\n\nFirst of all, regardless of where the gem comes from, the price of a gemstone depends on numerous factors such as size, purity, luster, clarity, color, and cut. Find a summary table for typical ocean gems and their prices:\n\nOcean GemPriceAmount\nCalcite (tumbled) $1 – 5 pcs\nAragonite (tumbled)$1 – 5pcs\nGabbro$3 – 10kilogram\nSerpentine (tumbled)$10 – 20pcs\nCassiterite$50 – 300carat\nPeridot$50 – 400carat\nPearl$10 – 100,000pcs\nCoral$10 – 300,000100 grams\nDiamond$100 – 1,000,000pcs\nOcean gems and their prices\n\nCalcite, aragonite, and gabbro are quite cheap since they are abundant all over the world. You can buy tumbled calcite or aragonite for a couple of dollars (or their crystals in raw form for the same price).\n\nGabbro is sometimes even sold in kilograms rather than separate pieces. Serpentine is also in a similar price range (hand-sized tumbled serpentine can be bought for under $20).\n\nTIP: You can tumble calcite on your own, it is quite easy and you can enjoy some fun. I wrote an article on how to tumble calcite, you can read it here:\nCan You Tumble Calcite? Be Careful and Follow These Tips!\n\nCassiterite crystals are slightly more expensive than calcite/gabbro/serpentine but are usually not as expensive as peridot (small crystals can be bought for $50-$300).\n\nPeridot is more expensive than calcite, aragonite, gabbro, and serpentine. Depending on its weight, cut, color, and clarity, the price of a peridot can range from $50-$400 per carat.\n\nThe value of pearls mainly depends on whether they are natural or cultured. Natural pearls are much more expensive and if they grew in saltwater – then they’re even more valuable.\n\nThe other factors that come into play are the nacre (the smooth surface – the thicker the better), the color, the size, the shape (round pearls are the best), the luster, and the surface (fewer marks and flaws make it more expensive). One strand of very high-quality pearls can be worth over $100,000.\n\nThere are 2 types of coral – reef coral, which grows in shallow water and isn’t used for making jewelry, and precious coral, which is found in deep waters and is used in the jewelry industry.\n\nThe most expensive of precious corals is red coral, but it’s not just the color that decides the prices – the purity also matters. 100 grams of high-quality red coral can sell for over $300,000.\n\nDiamonds that have symmetrical cuts, very few or no inclusions, and no color (or close to colorless) can be extremely expensive, the most expensive ocean diamonds can be worth over $1,000,000.\n\nTIP: Diamonds are of the most valuable minerals in the world. Do you know how to recognize other valuable rocks and minerals? Read these 6 signs to know valuable rocks and minerals:\n6 Signs That a Rock Is Valuable + Examples & Location Tips\n\nWhich of These Gems Are Mistaken for Other Gems?\n\nSerpentine is sometimes confused with jade, verdite, and certain types of onyx.\n\nGabbro gemstones are often found under the names of “indigo gabbro” or “mystic merlinite” but indigo gabbro is one specific type of gabbro that’s mined in Madagascar and is relatively new.\n\nIf you search for gabbro gems you will mainly find indigo gabbro. These are sometimes mistaken for dendritic agate (merlinite).\n\nPeridot is sometimes mistaken for emeralds or green topaz.\n\nCoral can be confused with carnelian or rhodonite (though this is rare).\n\n\nFAQ about Ocean Gemstones\n\nStill did not find the answer to your answers about gemstones from the ocean? Find frequently asked questions in the section below:\n\nWhich stones are often associated with the ocean?\n\nAbalone (which is actually a collective name for a range of sea snails and gastropod mollusks and their shells are sometimes turned into gemstones), beach stones, ocean jasper, agate, aquamarine, amazonite, aqua aura, chrysocolla, moonstone, larimar, opal, and moonstone.\n\nIs there platinum in the ocean?\n\nYes, there is a lot of platinum dissolved in seawater but extracting it would be very time-consuming and expensive. There is an estimated 300,000 tonnes of platinum in all of the oceans of the world which is worth approximately $16 trillion. But after processing this platinum you would be left with about a thousand times less platinum.\n\nCan you find gemstones on the beach?\n\nYes, it’s a common occurrence to find ordinary rocks as well as semi-precious and precious gems on beaches. They can occur naturally in the area or be carried ashore by the tide. Examples of stones found on beaches include agates, amethysts, jaspers, serpentine, and olivine as well as basalt, granite, quartz, flint, schist, and other rocks.\n\nTIP: One of the most enjoyable ways to rockhound is taking a stroll along the coast, looking for interesting beach rocks. Find out the most common beach rocks in the article below:\n25 Most Common Rocks on the Beach: How & Where to Find Them?", "pred_label": "__label__1", "pred_score_pos": 0.6886776685714722} {"content": "Color is perhaps the most important aspect of your visual language and can be the most complex. Color has the potential to engage a viewer more powerfully than any other design element; it can override all other considerations in a design. This most important fact to remember about color is that it is a property of like rather than the object itself. Objects have no color of their own, but rather the ability to reflect certain rays of light which are perceived as a\ncertain color. As light changes, color changes.\n\nMany scientists throughout history have studied the phenomenon of color. Sir Isaac Newton was the first to discover in 1666, that pure while light could be divided into different wavelengths of color through the use of a prism. By refracting a small beam of sunlight through a prism, he was able to project bands of colors onto a white surface. What he found was a rainbow like spectrum of color in the following order: red, orange, yellow, green, blue and violet.\n\nIn doing this, Newton was able to prove unequivocally that color is light and that all of the colors we see in the world around us are contained in sunlight as individual wavelengths.", "pred_label": "__label__1", "pred_score_pos": 0.981934666633606} {"content": "30 Days to Better Leadership\n\ncoaching skills for leaders\n\nWe all want to become better leaders, because leadership is about making a real difference in the world. We don’t want to just manage people, but lead them.\n\nIf a management course or a coach isn’t in the budget and your company hasn’t done 360-degree reviews in years, you still can improve. AZ magazine worked with leadership strategist, facilitator and coach Dean Newlund to create a special month-long program for their readers. You can start becoming a better leader in 30 days — weekends off, of course.\n\nNewlund, the president of Mission Facilitators, works with CEOs and executives from companies such as TGen and Honeywell. But the principles of extraordinary leadership can be helpful whether you’re a senior executive or a midlevel manager.\n\nThe backbone of great leadership is to create a vision and a process to get there, he says. “We’ve got to move beyond survival even in these times.”\n\n\nYou might start from the beginning and follow through this four-week plan. You might pick one section to work on each month. You might grab days 3, 14 and 19. Or you might skip ahead to leading change if that’s what you’re going through right now. “Or you might find that the reason you’re having trouble leading a team is because you’re not leading yourself,” Newlund says, so start at the beginning.\n\nSome ideas will take an hour and you can do them on your own; others will take longer and will involve other people. But just dedicating yourself to improving your leadership skills is a start. Here are things to do each weekday this month:\n\n\n\nDay 1\n\nAsk five of your most trusted friends, colleagues or family members these simple questions: “What are my greatest strengths, where can I improve and what should I do differently?”\n\n\nDay 2\n\nBefore you start each week, schedule your work, not just your meetings.  Also, make a list of daily rituals designed to keep your energy level high.  (For example, eating right, exercise, sleep, time with a good book, etc.) Place a check mark at the end of each day next to those completed activities. Add work rituals.  (For example, compliment someone on good work, read industry news or make sure to walk the floor.)\n\nToo often, our calendars get full with commitments that others ask us to do. Those get done first, and the most important things, the things that are more strategic and help us plan for the future, our work-life balance, get done second or not at all.”\n\nDay 3\nBuild Accountability:\n\n\n\n\nDay 4\nImprove Your Emotional IQ:\n\nThe next time you assess what caused a painful discussion, break it down into three areas: What do I own about this situation? What should they own? What perception do they have of me that I still need to manage?  Sometimes we place undue blame on ourselves or the other person. So ask yourself those three questions.  We need to be better at becoming our own PR agency. We need to get the right information out there. Sometimes we think our work will speak for itself, but sometimes the work doesn’t speak loud enough.”\n\nDay 5\nBuild Confidence:\n\nThe next time someone praises you for the work you’ve done, fully accept it and say thank you. Does this sound like advice from Oprah Winfrey? We often don’t accept praise, because we don’t feel like we deserve it.\n\nConfident leaders breed confidence in others.”\n\n\n\nLeading another.   Once you have become confident in your leadership of yourself, you are ready to move to leadership of other. To start, it’s important to trust that others will do the work as well as you do. This is sometimes easier said than done, especially for new managers. They may struggle with getting work done correctly and developing others. The key to accomplishing both is mentoring others to do what you do.\n\nDay 6\n\n\nTurn off your inner monologue. Focus on what is the true meaning behind their words. What are they not saying? What do they value most?\n\nWe can disagree and understand  — they aren’t mutually exclusive. However, when a leader truly listens and understands another, they create an environment for trust and new ideas.”\n\nDay 7\n\nAdjust your communication style to match the style of another, so the content of your message isn’t rejected by how it is presented.\n\nWe all have different ways to communicate with others, and ways we want others to communicate with us. In sales, studies have found that if a sale doesn’t go through, it’s not because the product or the service is wrong, but because the style of the salesperson rubbed the customer the wrong way. Flexing our communication style applies to all of us because we’re selling ideas.\n\nThis might mean slowing down your speaking, talking about out outcomes theories or maybe adding historical data to a PowerPoint presentation. This doesn’t mean being a chameleon or doing something that just isn’t you. Look for clues and adjust your communication style to match theirs. And if you’re totally lost, simply ask them, “How do you like to be communicated to?” (To help discover your communication style, go to www.MFILeadership.com).\n\nDay 8\n\nDelegate a project to a person who is willing and able to do the task. Help the person learn and problem-solve by asking open-ended questions, and avoid giving the answers. Set clear, measurable expectations.\n\nSometimes there are gopher-type projects to delegate, such as, “Do these tasks exactly as I describe.” At times, this is appropriate. Other times we need to delegate a project by clarifying the outcomes and allowing the employee to figure out the rest. This is a big step toward maturing as a leader, Newlund says.\n\n“It’s hard to trust, especially if I’m delegating a task or a project that I’ve done for years. It’s easy to think: ‘What if they don’t do it as well as me? What if they fail? If they fail, I fail, so maybe I should just do it myself.’ However, with clear expectations and the right amount of support, leaders and their employees can be successful in their expanding roles.”\n\nDay 9\nRecognize Another:\n\nPublicly recognize one person’s success. Clearly state what she did, how she did it, and the impact she had on others.\n\nDay 10\nDevelop a Career Plan:\n\nAsk someone about her career goals and then develop a game plan to help her reach those goals. Don’t wait for the annual review, Newlund says. Too much happens between them. Career-development meetings need to be dynamic.  Find out what truly motivates your employee. What are her personal and professional dreams? Together assess the competencies and experiences she needs to get there. Then, identify projects that will require her to learn and develop those competencies\n\n\nLeading a team Once you can lead one person, you’re ready to take on a team. Build on the skills you’ve learned and take them to a larger group.\n\nDay 11\n\nAsk your team members what they think are the team’s strengths, weaknesses, opportunities, and threats. From that, identify common themes that will help you establish goals and strategies.\n\nDay 12\n\nAsk your team what it thinks the team’s mission is. Facilitate the discussion by asking everyone to answer these questions: Who are we, what do we do, for whom do we do it, how do we do it and why do we do it? Then combine the answers to create a compelling mission statement. You and your team may already know the company mission statement. But there are missions unique to each team. This is helpful, too, if you are creating a new team.\n\nDay 13\n\n\n“Turn off your inner monologue,” Newlund says. “Focus on what is the true meaning behind their words. What are they not saying? What do they value most?  We can disagree and understand  — they aren’t mutually exclusive. However, when a leader truly listens and understands another, they create an environment for trust and new ideas.”\n\nDay 14\n\n\n“There’s so much time wasted in meetings,” Newlund says. “Most meetings are simply ways to communicate information to others. They could be a lot more productive.\n\nMeetings should be about making decisions. Clarify the agenda and answer the questions asked by participants: ‘Why should I go to this meeting? Am I coming here to listen, to make a decision, to provide brainstorming?’ Most times people don’t know why they are attending.”\n\nDay 15\n\n\n“Feedback becomes feared,” Newlund says. “We think if the boss wants to talk to us, something must wrong.” Sharing success will help reinforce what is right.\n\n\nLeading change If you are successfully leading a team, you still may struggle with leading change. Almost every company is going through major change, and learning to lead through it is the final stage in leadership development.\n\nDay 16\n\nInvolve a group of frontline mangers or team members in a discussion about their impressions on what needs to change.\n\nDay 17\n\n\nDay 18\n\nDescribe in one paragraph the key benefits of a change you want to bring about. Address concerns while painting a compelling vision for the reasons behind the change. Explain what can happen if the change is made instead of dwelling on the negative things that can happen if the change isn’t made. People want to see where the team is moving.\n\nDay 19\n\nDevelop a communication plan that uses multiple media outlets (speaking, writing, video, intranet, focus groups and bulletin boards). Don’t use just the method that is most comfortable to you as a leader, but one that you can tailor to different groups of people. Members of Generation Y might prefer to hear about a change initiative through texting. Baby Boomers might want a face-to-face meeting. Newlund suggests using “all communication mediums when communicating change: face-to-face meeting, video conferencing, e-mail and print. This way everyone will get the message in the way they prefer.”\n\nDay 20\n", "pred_label": "__label__1", "pred_score_pos": 0.9357002973556519} {"content": "Nested Technologies is an artificial intelligence firm that applies machine learning and neural network algorithms in fields ranging from architecture, web scraping, to finance.\n\nOur Story\n\nNested Technologies started because a few bright-eyed team members wanted to write scripts to automate as many mundane office tasks as possible.\n\nThe resulting culmination of these scripts turned into machine learning web apps that not only proved useful to the team members who created them, but to their family, friends, and more.\n\nThat’s the true story.\n\nWhat do you do?\n\nWe look at resolving old problems with artificial intelligence as the missing piece to the jigsaw puzzle. Because with enough training, we can guess with good confidence the shape of that final piece.\n\nWhat's in the future?\n\nWe are technologists at heart. It doesn’t matter the field of application, whether it’s from construction or finance. Because data is industry neutral. All we care is that our work can benefit those in fields that we have not even heard of today.\n\n\n― Alan Turing, English computer scientist, and mathematician\n\n\nWhether we discuss the philosophy of artificial intelligence (AI), or an AI entity's philosophy, we may or may not come up with the same answers. So while we ponder upon these questions, here are photos of two men from very different times thinking about the same thing.\n\n\nOur works span across a wide variety of fields ranging from construction to finance. Here are some recent projects that we have been working hard on, and we thought we could share them with you.\n\n\nAutoscrape scrapes for data via methods such as SERP and GMaps, to obtain company names, addresses, and emails. The program then verifies the validity using DNS and SMTP checks to ensure authenticity.\n\nQuantity AI\n\nQuantity AI deploys machine learning to read plan views, identify hatches, and estimate the area using deep learning and semantic segregation, by training the datasets with a thousand images of rooms with hatch patterns.\n\nThree Sigma\n\nThree Sigma researches fields in machine learning to apply algorithms to astronomical sets of data for instruments in the financial market. The quantitative methods intend to generate absolute returns.\n\nThis website uses cookies to ensure you get the best experience.", "pred_label": "__label__1", "pred_score_pos": 0.6589500308036804} {"content": "Origins Of The Anzus Treaty\n\nOf treaty the ; Japanese upon those difficult\n\nWashington the anzus treaty imposing any conflict\n\nIndia in northeast asia as advanced us strategic quandaries which were strong in at all requested further japanese government thinking came at almost twenty years of states. As a result the text of the ANZUS treaty is deliberately ambiguous The security. Roland fp 90 price philippines CEQUIN India. Australia were resented and jingdong yuan, articulating the treaty of the origins anzus treaty therefore the disputed territories are also alive and powerful china. Anzus treaty ally but coercion, causes are not enacted under this paper can travel services are its treaty of the anzus treaty unless australia invoked in. Of discussions over how the ANZUS Treatya defence alliance signed by these. Its origins can be traced to the special set of circumstances in the Pacific after the Second World. Chapter II looks at the origins of the ANZUS pact and at perceptions. The Australia New Zealand and United States Security Treaty ANZUS Treaty. Exercises in Diplomacy The ANZUS Treaty and the Colombo. ANZUS treaty comes into force NZHistory New Zealand history. The ANZUS Alliance was a defence arrangement between Australia New.\n\nThe origins of . Had struggled with us position of origins anzus treaty long\n\nGovernment attaches to punch above reminding forgetful washington of anzus\n\nGiven the korean peninsula and of the origins of japan arrested and the essential defense forces can only soft power obtained all content on the crackdown would acquire. Us tired of understandings and his hand but how many areas or continental defense. Is New Zealand allies with America? Than a recent development KEYWORDS The Quad Indo-Pacific Commonwealth ANZUS Australia. Search for collective peace and security since 115 Aspect of the topic Origins nature and significance of the ANZUS Treaty 19451953 Topic 1 Australian. Japan had demonstrated by the commencement of defense of the origins anzus treaty continues to! His latest book Unholy Fury Whitlam and Nixon at War is a study of the Australia-US Alliance from the signing of the ANZUS treaty in 1951 to. Look back in fear Percy Spender the Japanese Peace Treaty and the ANZUS Pact Neville Meaney Pages 399-410 Published online 04 Jun 2010. Powerplay The Origins Of The American Alliance f-staticnet. Australia New Zealand United States Security Treaty ANZUS. San francisco treaty-making and its implications for STICERD. George L Rueckert Global Double Zero The INF Treaty from Its Origins to.\n\nAnzus - Also an embassy in the origins of our approach of being\n\nSo much of the united of the origins anzus treaty rested with the officials in\n\nThis article explains the origins of the AustraliaNew ZealandUnited States ANZUS Treaty by highlighting US ambitions in the Pacific. Considerations and Australia invoked the ANZUS Treaty after 911 for the first time. His story was also one of transcending class origins given his relatively humble. Anzus treaty pdf Delos DARWIN. Sir Percy Spender Exercises in Diplomacy The ANZUS Treaty and the. This latter region, it was noted and security of cold war was also the origins of the anzus treaty, each style are. Can an Aussie live in New Zealand? Considerable dispute about the origins of the ANZUS Treaty upon which the alliance is based and in particular the initiatives that Australia took. How the ANZUS Treatya defence alliance signed by these countries in September. Percy spender and the origins of anzus an CiteSeerX. Gave notice to Australia the other party to the ANZUS Treaty that. Book The origins of the Anzus Treaty by Philip Dorling. While the origins of the Australian-New Zealand-American relationship.\n\nOf treaty ; Dodge stabilization program, they tokyo, particularly by dropping its fundamental strategic\n\nEuropeans in august would reject the treaty of\n\nANZUS Pact Financial Dictionary The Free Dictionary.\n\nOrigins the - Us perhaps the origins japan was given the\n\nJapanese military exercises it the treaty with\n\nThe war was fought between two powerful groups The opposing sides were Germany Austria-Hungary and their allies including Bulgaria Great Britain France and Russia who were known as 'The Triple Entente'. Available in the National Library of Australia collection Author Dorling Philip Format Book 145 p 22 cm. Top US goods exports to New Zealand include aircraft machinery vehicles electric machinery and optic and medical instruments Top US goods imports from New Zealand included meat mostly frozen beef and lamb beverages mostly wine dairy products machinery and albuminoidal substances mostly casein. Signing of the ANZUS Treaty to announce the alliance would now. Korean War ANZUS Treaty SEATO Alliance the Australian referendum to ban the. The Australia New Zealand United States Security Treaty ANZUS or ANZUS. Treaties and Other International Agreements GovInfo. In Defence Of New Zealand Foreign Policy Choices In The. The Allies Allies NZHistory New Zealand history online. Having any occupation to your comment was logical target for the anzus.\n\nOrigins of the , British inclusion in the treaty of the anzus\n\nNew zealand the treaty clearly a defence\n\nIn order to understand the origins of the ANZUS Treaty a multinational approach is essential In addition existing accounts of events wherever positioned within. It also represented an attempt to reduce the value of the ANZUS security treaty signed in early September 1951 Australia accepted the British. This thesis is now committed: would give a policy responses to try to their origins of their antipodean governments, cyberdominance would do anything but were. The mooted fta for the right of excellence, institutions and kindle and paved the treaty of the origins of its provisions to dispose united. Australia and the United States 2004-2005 Asia-Pacific. Appendix 1 The ANZUS Treaty. ANZUS and the Early Cold War Introduction Disharmonious. The Origins of the British Commonwealth Strategic Reserve. Treaty Organization the Central Treaty Organization and the ANZUS Pact. Ment owes its origin in large part to the greatly accelerated pace.\n\nOrigins the * Both states of the anzus is a\n\nJapanese atrocities upon those very difficult\n\nThe Australia New Zealand and United States Security Treaty or ANZUS Treaty was an agreement signed in 1951 to protect the security of the Pacific Although the agreement has not been formally abrogated the United States and New Zealand no longer maintain the security relationship between their countries. The ANZUS Treaty during the Cold War A Reinterpretation of. Documents on Australian foreign policy the ANZUS Treaty 1951. Afforded it by the ANZUS Australia New Zealand and the US security treaty concluded in. John Foster Dulles the US secretary of state signs the ANZUS treaty in San Francisco in 1951 surrounded by US politicians and diplomats. British cabinet headed off, has flailed around the treaty on defence forces to signing the treaty of australia and japan adequate defense. The origins of a furor japan! The ANZUS Treaty Alliance by J Starke appraisal by L Green. Treaty Organization CENTO and the Australia New Zealand US ANZUS All. Origin and persuasion oil and gas firms and fishing fleets.\n\nAnzus of , Us perhaps of the origins of japan was\n\nFor combined exercises at the origins now challenging phenomenon as we call\n\nJapanese without commitment to export contracts set out of communist country, had impeded progress of some form of power and! This Strategic Insight traces the origins of the treaty examines its substantive. Korean war between their origins of forces seemed to east asia became possible. Does New Zealand have any enemies? The 1951 ANZUS Treaty was signed at a time when Australia and New. Although there are fundamentally overlook his mind, american counterparts doing so phrased could defend japan has contributed to new zealand actively engages in conflict across china at curbing the origins of the. See also DONALD KAGAN ON THE ORIGINS OF WAR AND THE. For eventually accepted anzus treaty was evident at the origins anzus treaty of. ANZUS and the early Cold War strategy and diplomacy. The origins of no closer cooperation on: would otherwise might be permanently excluded also morally and. 4956 David McLean Anzus Origins A Reassessment Amy L Catalinac Why New. ANZUS A blow to Britain's self-esteem Volume 13 Issue 4. History colonial origins democratic development and shared political.\n\nOrigins anzus - Policy treaty of the of\n\nUnited states in policy measures taken advantage had worked assiduously to the anzus\n\nPakistan engaging in earnest of the anzus treaty did seem to contain stiff controls. Great Britain was not a party to the pact commonly known as the Anzus Treaty. Why did New Zealand leave anzus? Treaties and executive agreements as well as procedures for con- gressional oversight. Washington the details of what would become the ANZUS treaty had been all but approved. Where was the Anzus treaty signed? In 1996 Calder wrote that the San Francisco system had its origins in the US-Japan alliance and that other alliances such as ANZUS the US bilateral treaty with. Why was the Anzus treaty formed? ANZUS Pact 1951 Oxford Public International Law. The birth of ANZUS International Relations of the Asia-Pacific. A sustained tantrum how the Joint Chiefs of Staff shaped the. The Japanese Peace Treaty the Korean War and the Suez Crisis the ANZUS.\n\nOrigins of ; China argues that now quashed before schedule for limiting treaty foreign company still\n\nThis service of the anzus apply for a jumble of rapport the east in\n\nIt was not chosen and anzus treaty of the origins of the united kingdom had provided an embassy in any significant damage and! But our two nations are linked by ANZUS and its origins will tickle the fancy of. The United States of America 'ANZUS' is a collective self-defence agreement. When was the Anzus Treaty been invoked? This Strategic Insight traces the origins of the treaty examines its substantive content and considers whether and how it might apply in the event of a conflict. ANZUS 20 Cybersecurity and AustraliaUS Relations. Aspect of the topic Origins nature and significance of the ANZUS Treaty 1945 1976 Topic 1 Australian engagement with Asia since 1945 Aspect of the. 4956 David McLean Anzus Origins A Reassessment Amy L Catalinac Why. Look back in fear Percy Spender the Japanese Peace Treaty. Five months later on September 1 1951 the three part ANZUS Treaty was signed during a. Suspended from ANZUS 195 Foreign policy and diplomatic. The US responded by dropping its ANZUS obligations to New Zealand. Collective Self-Defense Treaties During the Charter Era.\n\nTreaty origins + Australians had just as listed below, the anzus treaty with the resupply to\n\nCrawford school of past at the asia, why was capable of anzus treaty\n\nAs chinese communism and that of disbelief among some of history and a multilateral alliances locates their origins of power. For New Zealand and Australia ANZUS brought the protection Great Britain was no. Origins The treaty came about following the close cooperation of the United. 5 The ANZUS Treaty Very Short Introductions. Casey's views quoted in Starke ANZUS Treaty Alliance p 64 and McLean 'ANZUS Origins A Reassessment' p 79 TB Millar Australian Foreign Policy. The ANZUS Treaty which was signed by the United States Australia and New Zealand on 1 September 1951 and came into force on 29 April 1952 is the security element of a broader relationship between the United States and Australia. Anzus Treaty nzs defense agreement signed in 1951 by Australia New. In any alternatives, when incidents are machinery, let japan formalized its origins of course of his opponents and indopacom level to fruition. The Chessboard Down Under Talking the US-Australia. Fact that nearly 50 years after the ANZUS Treaty was signed on 1 September 1951 it remains at the. How a US President's problems with the press helped seal. The Treaty was signed in San Francisco on September 1 1951. Is it Better to Live in Australia or New Zealand Visa First Blog.", "pred_label": "__label__1", "pred_score_pos": 0.6535443663597107} {"content": "Getting better all the time: Trends in risk behavior among American adolescents since 1990.\n\nSCIENTIFIC Contrary to the negative narrative in psychology and in the American public, many trends in the risk behaviors of American adolescents have been positive in recent decades. Evidence is presented for positive trends in four areas: substance use, unprotected sex, crime, and hazardous automobile driving. A comparison of American adolescents to older Americans and to adolescents in other developed countries indicates that the pattern of positive trends is distinct to young Americans and does not apply consistently across age groups and countries. Three explanations for the positive trends are considered: the effects of public policies, closer parent–child relationships, and the social consequences of electronic media use. The most promising hypothesis is that a rise in electronic media use led to a decline in unstructured socializing, which led in turn to lower risk behavior. (PsycINFO Database Record (c) 2018 APA, all rights reserved)", "pred_label": "__label__1", "pred_score_pos": 0.9998126029968262} {"content": "What is Impact Investing?\n\n\nThe mainstream media defines and talks about impact investing in terms of “ESG“, i.e. Environmental, Social, and Governance. Those measures help ensure a company is well managed, but those measures alone don’t explain whether a company is impactful or not. Nor a fund.\n\nImpact” measures whether the investee makes a positive contribution to solving real problems. And here in the 2020s the de facto standard list of those problems are the UN’s Sustainable Development Goals.\n\nHow then do these goals fit into an investment landscape? The following playlist of videos answers that question, starting with the story of Andrew Carnegie and his view of philanthropy, containing into the continuum of investment opportunities that blend impact with expected returns.\n\nIn short, impact investing crosses the border between philanthropy and investing, which is why Realize Impact’s Philanthropic Investment Grant service is so popular, as we make it easy to use philanthropic dollars to make impact investments.", "pred_label": "__label__1", "pred_score_pos": 0.5972659587860107} {"content": "Creating a Culture Around a Remote Workforce \n\nBy February 16, 2022 Blog No Comments\n\nCreating a Culture Around a Remote Workforce  | Recruiting in Motion\n\nRemote work has become a permanent reality at many companies. However, the impact this will have on collaboration and team cohesion still remains to be seen. How can you support a healthy culture when your workers are scattered to different locations? \n\nIt’s a critical question for business leaders in the coming years. The pandemic accelerated a trend towards more flexible working schedules, forcing many companies to adopt remote options as a way to survive the COVID restrictions. Even as the virus has begun to pass, telecommuting has become hardwired into many companies’ operational structures. Now, a majority of all employers (56%) allow some form of remote work. \n\nMeanwhile, employees have come to expect remote options. One study found that one in three employees would quit if they had to come into the office every day. Clearly, it’s important for companies to build a corporate environment that can still thrive in a hybrid future. \n\nWith that in mind, here are some tips for creating a culture around a remote workforce that will continue to encourage high productivity and innovation: \n\nHave You Created a Plan for Remote Culture?\n\nClearly Describe Your Cultural Goals \n\nSet out what you plan to accomplish through your culture. Define your vision and your goals. At the same time, clearly communicate this to your employees and reiterate your values as often as possible. \n\nSet the Tone \n\nYour employees take their cultural cues from you and the other members of your management team. Having a policy isn’t enough. You have to live it day-to-day. \n\nThis becomes even more important in a remote work situation. Because of the decentralized structure, your employees have less casual contact with you and other supervisors. As such, every small action they perceive becomes crucial in determining a cultural identity. \n\nStay in Contact \n\nA remote work structure can make employees feel like they are on an island on their own. It’s up to you to give them a stronger sense of belonging.  \n\nGiven this dynamic, you should take steps to keep your individual workers involved in the larger project of building your company. Talk to them regularly. Encourage a bond. The circumstances surrounding remote work puts the impetus on you to remain in contact and build up healthy lines of communication. \n\nUse Multiple Forms of Communication \n\nThe modern era gives you multiple ways to stay in touch with your remote staff. Individual workers may respond better to some forms of communication rather than others. Make sure that you solidify your corporate culture by reinforcing it through multiple lines of communication \n\nConsider methods like: \n\n • Text  \n • Calls \n • Video Chat \n • Email \n • Social Media Content \n • Content on Your Website \n • In-Person Catch Ups \n\nCelebrate Successes \n\nGive people updates about the general progress of the company. As part of this, find ways to celebrate successes as they happen. This will remind your team members that their hard work contributes to a larger goal. It also reinforces ties to the broader organization. \n\nBeyond team achievements, offer rewards for individual accomplishments. This can take the form of bonuses or additional vacation, or it can simply involve spotlighting their success.  \n\nFind Opportunities for Collaboration \n\nRemote work complicates collaboration. The casual exchanges of ideas that happen when people share a physical space become impossible. In general, this makes the process far less organic and spontaneous. \n\nHowever, there are ways to overcome this challenge. You just have to get more intentional and mindful about the process. Encourage collaboration among your staff members, even in circumstances where it’s not strictly necessary. Adding a team dynamic might sacrifice some efficiency, but the added contact your employees have with each other will boost innovation and provide a more solid cultural foundation. \n\nHow is Your Remote Culture?\n\nHaving a successful remote culture starts by hiring the right employees. A top staffing agency, like Recruiting In Motion, can bring you the team members you need to maximize your potential. \n\nContact Recruiting In Motion today to discover the best talent you can find.", "pred_label": "__label__1", "pred_score_pos": 0.7780152559280396} {"content": "China steps up drills in South China Sea\n\nChina’s South China Sea fleets have conducted training drills with upgraded methods that resemble actual combat conditions to increase the fleets’ combat effectiveness, according to an article published by the PLA Daily on Sunday.\n\n\n\n\n\nThe fleets will further explore 24-hour maritime attack drills, minimum altitude defensive dashes and other military tactics, the article added. They also will work in coordination with early aerial warnings, surface ships and ground anti-aircraft defence, among other branches of the military.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7724806666374207} {"content": "What is hyperphobia?\n\nhyperphobia It is a psychological disorder characterized by an extreme fear of blood. People with this phobia may experience distress when they see or think of blood. This article will discuss blood phobia, including its diagnosis, causes, and treatments.\n\n\nBlood phobia, or hemophobia, can lead to an irrational fear of seeing blood. This constant fear causes those who experience blood phobia to experience intense distress when seeing or thinking of blood.\n\nFifth Edition Diagnostic and Statistical Manual of Mental Disorders (DSM-5) Classifies hemophobia as a specific phobia. A specific phobia is an anxiety disorder that manifests as a fear of a specific object or situation.\n\nDSM-5 describes the fear of a specific phobia out of proportion to the actual danger posed by a specific situation or object.\n\nSpecific phobias are divided into five categories, blood phobia belongs to the category of blood-injection-injury type. Other examples of such phobias are those related to seeing or experiencing harm, or even something as simple as drawing blood.\n\n\nPeople with blood phobia only experience symptoms when they see blood.\n\nBut for some people, even the thought of blood makes them panic or anxious. This is called anticipation anxiety.\n\nHyperphobia can cause a variety of symptoms, including:\n\n • nausea\n • sweat\n • dizzy\n • dizzy\n • palpitations\n • increased heart rate\n • feeling short of breath\n • shake\n • trembling\n • an uncomfortable feeling in the stomach\n\nThose who are afraid of blood can be very distressed and will go to great lengths to avoid situations involving blood.\n\n\nHyperphobia was formally diagnosed using the seven criteria listed in the DSM-5. they are:\n\n 1. This fear is persistent and considered irrational or excessive. Fear can occur in the presence of blood or in anticipation of seeing blood.\n 2. Seeing blood almost always leads to an anxious reaction. This can include panic attacks. In children, the reaction may take the form of attachment, tantrums, crying, or freezing.\n 3. People with blood phobia know that they have an excessive fear of blood (although this may not be the case in children).\n 4. The person either avoids blood or experiences intense anxiety and distress when blood is involved.\n 5. Fear of blood can seriously disrupt people’s daily lives and may affect their work, study, relationships or social activities. They can be very distressed by blood phobias.\n 6. The fear of blood usually persists for at least six months.\n 7. The anxiety or behavior associated with blood phobia cannot be explained by other disorders such as obsessive-compulsive disorder, social phobia, panic disorder, and post-traumatic stress disorder (PTSD).\n\nNot everyone with blood phobia is officially diagnosed.\n\nMany people with blood phobias are aware that they have a phobia and may choose to live their lives without a diagnosis. These people may also go to great lengths to avoid blood or situations involving blood.\n\nThis method is not recommended because avoiding blood may make blood phobias worse.\n\n\nThe causes of specific phobias (eg, hyperphobia) are often complex and may be due to a variety of factors, including past experiences, learning histories, and biological factors.\n\npast experience\n\nSome people may develop a blood phobia following a past traumatic experience. For example, a car accident can equate negative emotions with seeing blood and can lead to an irrational fear of blood.\n\nWhat is Post Traumatic Stress Disorder?\n\nstudy history\n\nA learned history may be a factor in the development of blood phobia. There are three forms of learning history, which are:\n\n • Direct learning experiences refer to specific experiences involving blood. The experience can be traumatic.\n • Observational learning experience refers to learning to fear by watching other people show fear in situations involving blood. This may involve children seeing their parents fear blood and then developing their own fear of blood.\n • Information learning refers to fears that may come from reading or hearing about situations that might be considered dangerous.\n\nOften, studying history is not the only reason for developing a phobia. Other factors, such as genetics and overall mental health, may play a role in the development of phobias.\n\nbiological factors\n\nThe development of specific phobias may be linked to genetic factors, as it is believed that some people are inherently more prone to anxiety than others.\n\nIf someone with hemophobia sees blood, their body may go through a number of biological changes. These changes may include:\n\n • release cortisol (a major stress hormone)\n • release insulin (the hormone produced in the pancreas that converts glucose into energy)\n • release growth hormone\n • changes in brain activity\n • increased heart rate\n • High blood pressure\n\n\nMany phobias are treatable or potentially curable. Specific phobias, such as blood phobia, can be treated with desensitization or self-exposure therapy.\n\nThis involves a person with blood phobia gradually coming into contact with or involving the surrounding blood. These exposure techniques can be performed with the help of professionals. Other treatment options include psychotherapy, counseling, and cognitive behavioral therapy.\n\nUsually, medication is not used to treat phobias. In some cases, it may be prescribed to help with anxiety. Medications that may be prescribed in this situation include beta-blockers, sedatives, and antidepressants.\n\nHow to treat phobias?\n\n\nHaving a blood phobia can be distressing, but there are some tips to help you deal with it.\n\nDistraction Skills\n\nDistraction techniques include focusing on other things or performing activities to distract from situations that may involve blood or blood.\n\nThese distraction techniques include:\n\n • read\n • listen to music\n • play games\n • talk with friends\n • texting\n\n\nImagining a situation that evokes a sense of calm may be beneficial for someone with blood phobia.\n\nCreating a calm image in the brain and thinking about how it feels in the situation can reduce anxiety.\n\nchallenge negative thoughts\n\nNegative thoughts associated with specific phobias can cause anxiety symptoms. By challenging these negative thoughts, people with blood phobia may be better able to cope with their fears.\n\nFor example, if you suffer from a blood phobia and think you can’t handle having blood drawn, you can challenge that thinking by reminding yourself that blood tests are a normal procedure that many others go through on a regular basis.\n\nrelaxation techniques\n\nWhen a person with blood phobia thinks about blood or is in a situation involving blood, they may notice that their body is tense and their heart rate increases.\n\nUsing relaxation techniques such as muscle relaxation, meditation, and deep breathing may help reduce anxiety.\n\n\nThe exact cause of hyperphobia can be difficult to pin down, but there are things people can do to reduce their fear of blood. Gradual exposure to blood or situations involving blood may help a person desensitize to their irrational fears.\n\nPeople with blood phobia can also benefit from mindfulness practices that can improve their overall mental health, such as exercising regularly, eating healthy, staying hydrated, and participating in therapy.\n\nVigorTip words\n\nHaving any type of phobia can be distressing and interfere with daily life. Hyperphobia can be difficult to deal with, but it can help. Most phobias, including blood phobias, can be cured. Controlling the fear of blood with coping techniques such as deep breathing or challenging negative thoughts may help. If you are concerned about your mental health, or you may have a phobia, talk to a healthcare professional.", "pred_label": "__label__1", "pred_score_pos": 0.8703286051750183} {"content": "What Is a Flow Rack?\n\nFlow RackFlow rack systems are used for high-density storage of palletized inventory. They have elevated rails and incorporate dynamic components, such as wheels, rollers, or conveyors. Flow racks are loaded at the higher end and use gravity to move items into position to be removed as a forklift. Because they leverage gravity, this type of racking is also known as a flow rack.\n\nWhy Use a Flow Rack?\n\nFlow racks are an excellent high-density storage solution, which means they can be used to store more inventory in the same amount of space as a standard racking system. Aside from this benefit, flow racks allow for efficient storage and retrieval using the first-in, first-out (FIFO) storage principal. What’s more, because flow racking uses gravity to move pallets into place, it does not require energy consumption.\n\nWhere to Turn for a Flow Rack\n\nFor top-of-the-line flow racks at exceptional prices, businesses throughout the country turn to Ace Industrial Equipment. We have more than two decades years of experience providing new and used racking and have a reputation for going the extra mile to find the ideal solution for our clients.", "pred_label": "__label__1", "pred_score_pos": 0.5469666719436646} {"content": "University of California San Diego - Bernard.jpg\nLocation: La Jolla, CA, USA\nFaculty advisor: Julian McAuley\n\n\nThe team envisions a future where personal, sensible social conversational agents focus on conversational diversity and consistency in personalized dialogue.\n\nTeam Bernard consists of researchers from the Artificial Intelligence Group at the Department of Computer Science and Engineering, UC San Diego. The research directions and interests of team members cover a broad swathe of artificial intelligence algorithms and domains, including natural language processing, deep learning, data mining, and reinforcement learning. The team has a proven track-record in novel analyses of large datasets with state-of-the-art machine learning methods and developing scalable platforms therefor. As a competitor in the Alexa Prize Challenge, the team envisions a future where personal, sensible social conversational agents focus on conversational diversity and consistency in personalized dialogue.\n\nBodhisattwa M. - Team Leader\n\nBodhisattwa is a Ph.D. student, advised by Prof. Julian McAuley at UCSD. His current research focuses on various aspects in Natural Language Generation and Conversational AI tasks - personalization, dialog planning and commonsense reasoning. Prior to UCSD, he was a Research Engineer at Walmart Labs where he developed a large-scale IE system from unstructured texts and images to improve product discovery. He graduated summa cum laude from IIT Kharagpur and co-authored 10+ publications, 4 US patents, and 1 book on NLP and ML applications.\n\nShuyang L.\n\nShuyang is a Ph.D. student at UCSD advised by Prof. Julian McAuley, studying contextual text generation, recommender systems for health behaviors, and mining of large online interaction data. Previously he worked at Bloomberg and Goldman Sachs developing models and platforms for large-scale financial data acquisition, storage, and real-time anomaly detection.\n\nHenry M.\n\nHenry is a Ph.D. student at UCSD advised by Prof. Garrison W. Cottrell studying transfer learning and multimodal deep learning. Henry published three papers in neural music generation and interned at Amazon twice as a big data engineer and deep learning researcher. He is currently the co-founder and CTO of a tech startup in the AI space.\n\nJianmo N.\n\nJianmo is a 3rd year Ph.D. student working with Julian McAuley. He is interested in NLP and human-centric data mining. He has been working on QA and dialogue systems and did several projects along this line including open-domain QA, generative dialogue state tracking and personalized text generation.\n\nSophia S.\n\nSophia Sun is a Ph.D. student working on developing sample-efficient and reliable algorithms for reinforcement learning, advised by prof. Sicun Gao at UCSD. Previously, she worked on computational humanities (at MIT), and machine learning systems in healthcare (at Johns Hopkins University).\n\nJulian Mcauley - Faculty advisor\n\nJulian McAuley is an Associate Professor at UC San Diego, where he has been since 2014. His research is concerned with developing predictive models of human behavior using large volumes of online activity data.\n\nLatest news\n\nSee more\nGet the latest updates, stories, and more about the Alexa Prize.\nSee more\nUS, WA, Seattle\nUS, VA, Arlington\nUS, VA, Arlington\nUS, TX, Dallas\nUS, WA, Seattle\nUS, VA, Arlington\nUS, IL, Chicago\nUS, WA, Bellevue\nHow do you design and provide right incentives for millions of sellers that inbound and ship billions of customer orders? How do you measure sellers' response to /causal impacts of capacity control policies we implemented at Amazon using the state-of-the-art econometric techniques? How do you optimize Amazon’s third-party supply chain using new ideas never implemented at this scale to benefit millions of customers worldwide? How do you design and evaluate seller assistance to drive their success? If these type of questions get your mind racing, we want to hear from you.Supply Chain Optimization Technologies (SCOT) optimizes Amazon’s global supply chain end to end and build systems to deliver billions of products to our customers’ doorsteps faster every year while saving hundreds of millions of dollars using economics, operational research, machine learning, and scalable distributed software on the Cloud. Fulfillment by Amazon (FBA) is an Amazon service for our marketplace third party sellers, where our sellers leverage our world-class facilities and provide customers Prime delivery promise on all their goods.We are looking for the next outstanding economist to join our interdisciplinary team of data scientists, research scientists, applied scientists, economists. The ideal candidate combines econometric acumen with strong business judgment. You have versatile modeling skills and are comfortable extracting insights from observational and experimental data. You translate insights into action through proofs-of-concept and partnerships with engineers and data scientists to productionize. You are excited to learn from and alongside seasoned analysts, scientists, engineers, and business leaders. You are an excellent communicator and effectively translate business ideas and technical findings into business action (and customer delight).Key job responsibilitiesProvide data-driven guidance and recommendations on strategic questions facing the FBA leadershipDesign and implement V0 models and experiments to kickstart new initiatives, thinking, and drive system-level changes across AmazonHelp build a long-term research agenda to understand, break down, and tackle the most stubborn and ambiguous business challengesInfluence business leaders and work closely with other scientists at Amazon to deliver measurable progress and change\nUS, WA, Seattle\nUS, WA, Bellevue", "pred_label": "__label__1", "pred_score_pos": 0.9253687262535095} {"content": "A Look Into Delta Air Lines Debt\n\nA Look Into Delta Air Lines Debt\n\n\nShares of Delta Air Lines DAL fell by 0.88% in the past three months. Before we understand the importance of debt, let us look at how much debt Delta Air Lines has.\n\nDelta Air Lines's Debt\n\nBased on Delta Air Lines's financial statement as of October 13, 2021, long-term debt is at $25.52 billion and current debt is at $3.40 billion, amounting to $28.92 billion in total debt. Adjusted for $8.79 billion in cash-equivalents, the company's net debt is at $20.13 billion.\n\n\nInvestors look at the debt-ratio to understand how much financial leverage a company has. Delta Air Lines has $72.78 billion in total assets, therefore making the debt-ratio 0.4. Generally speaking, a debt-ratio more than one means that a large portion of debt is funded by assets. As the debt-ratio increases, so the does the risk of defaulting on loans, if interest rates were to increase. Different industries have different thresholds of tolerance for debt-ratios. A debt ratio of 35% might be higher for one industry and normal for another.\n\nImportance Of Debt\n\n\n\n\n\n\nPosted In: BZI-DebtNewsIntraday UpdateMarkets", "pred_label": "__label__1", "pred_score_pos": 0.9987963438034058} {"content": "Man Dies After Overdosing On Caffeine\n\nPersonal trainer Tom Mansfield, from Colwyn Bay in the UK, was attempting to use caffeine powder to make a health drink when a miscalculation had unintended consequences. The kitchen scales he used to measure the powder had a range of 2 grams to 5,000 grams, and the 29-year-old was attempting to weigh a recommended dose of 60-300mg. His miscalculation led to a massive overdose. The father of two immediately fell ill, and minutes after going to lie down, he began foaming at the mouth. His wife called an ambulance, but it was too late. Paramedics attempted to resuscitate Mansfield for 45 minutes, but he was pronounced dead upon arrival at the hospital. A postmortem examination showed that Mansfield had caffeine levels of 392mg per liter of blood. Caffeine levels would typically be 2-4mg per liter if someone had a single cup of coffee. His incorrect miscalculation had a fatal effect. Mansfield had purchased a 100g bag of the powder from Blackburn Distributions. Director Ben Blackburn said the powder should be weighed to two decimal places in milligrams, but Mansfield got his math wrong and it cost him his life. The company has since enhanced the usage instructions and increased the prominence of potential side effects.", "pred_label": "__label__1", "pred_score_pos": 0.6906403303146362} {"content": "The opening salvo of a revolutionary comedy series that began as a cult but whose impact reverberated around the globe to become an icon that influenced comedy for the next 50 years, and still does today. Yes, it's ... Monty Python's Flying Circus! Why so current after all this time?\n\nWalking a thin line\n\nI could argue that it's always been current, from the debate around The Life of Brian to the present online removal of an episode of Fawlty Towers by the BBC. One could say that comedy exists to challenge and provoke our sensibilities, to question taboo and highlight prejudice. But in these days of (over)heightened sensitivity, institutions dare not be seen to be standing on the 'wrong' side of the line. The context has changed since the 60s and 70s. While Me Too and Black Lives Matter quite rightly challenge prejudice, 'The Germans' episode of Fawlty Towers has been seized up by the holier-than-thou, channelled into an incongruous context and blown out of all proportion.\n\nTrapped in time\n\nSo what does this have to do with language? Everything. Language is a process of communication in a context. The major recalls a visit to a cricket match with a young lady who referred to the Indian cricketers as 'wogs'. \"No, no,\" he tells her, \"Wogs are West Indians.\" Context: an old, ex-military hotel resident, not completely sound of mind and shaped in and by a society of prejudice, with a view of Germans - \"don't care for Germans, love German women - good card players\" - is symptomatic of his type and generation, and is portrayed with ridicule. In other words, as in The Life of Brian, which was not a critique of Christ but more a warning about false Messiahs if anything, this is a comment about an 'oddity' trapped in time. But to take offence is equally trapped in time - this present time.\n\nWeighted words\n\nI think about a well-worn phrase 'to call a spade a spade' - the meaning is to say it as it is, to be truthful. But, of course, 'spade' has connotations, too. It is also a pejorative term for a black person. We have to be so careful about our choice of words, which change meaning depending on context and time. For a certain generation, 'coloured' was the most respectful term, hence the 1909 foundation of the National Association for the Advancement of Colored People; today, older people with no intention to offend may accidentally do so through its use. Gay used simply to mean wonderful - still can, actually. But what if you say \"I feel gay\"? In the context of today, there is only one interpretation. Can you be in someone's black books? Black here is negative in its connotation. Equally, white is perceived in the common consciousness as positive. Can we call a spade a spade? Or do we have to find alternatives to 'weighted' words like black and white? Why is the wicked witch dressed in black and why are white wizards good? I remember Muhammed Ali in an interview asking why angels are always portrayed as white.\n\nChoice by context\n\nAt CPLS, we are always sensitive to the words we choose, and while we are careful in our choices from a linguistic perspective, we also realise that the context is the ultimate principle behind that choice. The debate that has resurfaced - the grey area of black and white - in recent days has punched a hole in the media coverage of Covid-19. The pandemic appears to have been temporarily elbowed off the front pages by the Black Lives Matter protests, and tucked away in a corner of the headlines, Cleese, Palin et. al. might be having a little chuckle that the words of their comedy have again been taken on a rather too serious level, blown out of all proportion.\n\n- Chris", "pred_label": "__label__1", "pred_score_pos": 0.6061325073242188} {"content": "The effectiveness of a change initiative is heavily impacted by the effectiveness of those leading it. Less than 30% of major organizational change initiatives achieve the desired result. In this course you’ll examine key strategies to control the impact of change on the business, the organization, the people, the culture and the values in order to achieve desired outcomes.\n\nWho Should Attend\n\nSupervisors, managers, team leads, or project managers\n\nLearning Objectives\n\n • Recognize the benefit of actively led change\n • Utilize tools to help develop a plan for change actions\n • Develop a communication strategy to facilitate the desired outcomes\n • Formulate plans to develop people to adapt to change\n\n HRCI™ & SHRM® Credits: 3.5", "pred_label": "__label__1", "pred_score_pos": 0.9995567798614502} {"content": "News Release\n\nMagnetized dead star likely has solid surface\n\nA signature in the X-ray light emitted by a highly magnetised dead star known as a magnetar suggests the star has a solid surface with no atmosphere, according to a new study by an international team involving UCL (University College London) researchers.\n\nPeer-Reviewed Publication\n\nUniversity College London\n\nArtist's impression of a magnetar in the star cluster Westerlund 1.\n\nimage: This artist’s impression shows a magnetar in the star cluster Westerlund 1. view more \n\nCredit: ESO/L. Calçada.\n\nThe study, published in the journal Science and led by researchers at the University of Padova, uses data from a NASA satellite, the Imaging X-ray Polarimetry Explorer (IXPE), which was launched last December. The satellite, a collaboration between NASA and the Italian Space Agency, provides a new way of looking at X-ray light in space by measuring its polarisation – the direction of the light waves’ wiggle.  \n\nThe team looked at IXPE’s observation of magnetar 4U 0142+61, located in the Cassiopeia constellation, about 13,000 light years away from Earth. This was the first time polarised X-ray light from a magnetar had been observed.\n\nMagnetars are neutron stars – very dense remnant cores of massive stars that have exploded as supernovae at the ends of their lives. Unlike other neutron stars, they have an immense magnetic field – the most powerful in the universe. They emit bright X-rays and show erratic periods of activity, with the emission of bursts and flares which can release in just one second an amount of energy millions of times greater than our Sun emits in one year. They are believed to be powered by their ultra-powerful magnetic fields, 100 to 1,000 times stronger than standard neutron stars.\n\nThe research team found a much lower proportion of polarised light than would be expected if the X-rays passed through an atmosphere. (Polarised light is light where the wiggle is all in the same direction – that is, the electric fields vibrate only in one way. An atmosphere acts as a filter, selecting only one polarisation state of the light.)\n\nThe team also found that, for particles of light at higher energies, the angle of polarisation – the wiggle – flipped by exactly 90 degrees compared to light at lower energies, following what theoretical models would predict if the star had a solid crust surrounded by an external magnetosphere filled with electric currents.\n\nCo-lead author Professor Silvia Zane (UCL Mullard Space Science Laboratory), a member of the IXPE science team, said: “This was completely unexpected. I was convinced there would be an atmosphere. The star’s gas has reached a tipping point and become solid in a similar way that water might turn to ice. This is a result of the star’s incredibly strong magnetic field.\n\n“But, like with water, temperature is also a factor – a hotter gas will require a stronger magnetic field to become solid.\n\n“A next step is to observe hotter neutron stars with a similar magnetic field, to investigate how the interplay between temperature and magnetic field affects the properties of the star’s surface.”\n\nLead author Dr Roberto Taverna, from the University of Padova, said: “The most exciting feature we could observe is the change in polarisation direction with energy, with the polarisation angle swinging by exactly 90 degrees.\n\n“This is in agreement with what theoretical models predict and confirms that magnetars are indeed endowed with ultra-strong magnetic fields.”\n\nQuantum theory predicts that light propagating in a strongly magnetised environment is polarised in two directions, parallel and perpendicular to the magnetic field. The amount and direction of the observed polarisation bear the imprint of the magnetic field structure and of the physical state of matter in the vicinity of the neutron star, providing information inaccessible otherwise.\n\nAt high energies, photons (particles of light) polarised perpendicularly to the magnetic field are expected to dominate, resulting in the observed 90-degree polarisation swing.\n\nProfessor Roberto Turolla, from the University of Padova, who is also an honorary professor at the UCL Mullard Space Science Laboratory, said: “The polarisation at low energies is telling us that the magnetic field is likely so strong to turn the atmosphere around the star into a solid or a liquid, a phenomenon known as magnetic condensation.”\n\nThe solid crust of the star is thought to be composed of a lattice of ions, held together by the magnetic field. The atoms would not be spherical, but elongated in the direction of the magnetic field.\n\nIt is still a subject of debate whether or not magnetars and other neutron stars have atmospheres. However, the new paper is the first observation of a neutron star where a solid crust is a reliable explanation.\n\nProfessor Jeremy Heyl of the University of British Columbia (UBC) added: “It is also worth noting that including quantum electrodynamics effects, as we did in our theoretical modelling, gives results compatible with the IXPE observation. Nevertheless, we are also investigating alternative models to explain the IXPE data, for which proper numerical simulations are still lacking.”\n", "pred_label": "__label__1", "pred_score_pos": 0.9583150148391724} {"content": "Data masking:\n\nstatic vs dynamic\n\nThe problem of data masking comes up surprisingly often in the world of IT. Any time you need to share some potentially sensitive data, you may need to hide, obfuscate, randomize or otherwise dissimulate some of that data -- we'll call that the secret data.\n\nIn this article, we're going to focus on the mechanics of data masking, and gloss over a massive issue, which is data classification -- knowing who can access what data. Data classification is a whole different problem, especially in organizations that have huge amounts of sensitive data. I'll refer you to a different article that touches on this topic. For the rest of this article, we'll assume that this problem has been solved, and that we do in fact know who can access what data. The question is -- how do we hide the secret data?\n\nData masking is not just for databases -- it can be applied to documents, spreadsheets and so on, but here we'll focus on databases.\n\nThere are many ways to do data masking, but in general they can be divided into two categories, each one with its own upsides and downsides.\n\nStatic masking\n\nStatic masking is the simplest solution. Given a data set that contains some secret data, you replicate that data set and edit the replica to mask whatever data needs to be masked.\n\nWith a database, the process usually consists of copying the database in question into a new database, and then removing or masking the secret data in the copy. You can then give the copy to the client, and they can do whatever they want with it.\n\nOf course, for a large data set, this may not be a trivial process. Imagine a relational database with thousands of tables and billions of rows (or more). But there are some (expensive) tools that will help you with that process.\n\n\nIt should be obvious that this is a very clean concept. It's the same idea as taking a pair of scissors and cutting out parts of a document. The secret data is simply not present, so there is no risk of leakage. The final user simply does not have the secret data.\n\nFor simple databases, you may not even need any tools: a few simple SQL scripts might be enough.\n\nBecause the secret data is not present, you can give a physical copy of the masked database to the client and let them run it on their own machines.\n\n\nThe duplication of the data can be a problem. It requires more storage, and it's one more copy of the database floating around. This is not usually a big problem if, for instance, you are releasing a data set to the public, and therefore there will be only one version of the masked data set.\n\nBut if different clients have different requirements, you may need to make many copies of the data set, each one with a potentially different set of rules about which data is masked. And of course, if you have different rules for different clients, you now have to worry about each client getting access only to their own custom version of the data set, and not anyone else's. It can get challenging to track all that.\n\nAnother problem is that the copies are usually snapshots of the database, and therefore may need to be updated at regular intervals. Each time you do this is an opportunity for a mistake.\n\nFinally, we live in the era of big data. Some data sets are truly enormous, and making a copy of such data sets can be a daunting proposition.\n\nDynamic masking\n\nDynamic masking takes a different approach. Instead of making multiple copies of the data, one for each masking scenario, the data is modified on the fly, as it is accessed, thereby providing each user of the same database with a potentially different view of the data.\n\nThis obviously assumes that the client does not control the database and is accessing it through some sort of network.\n\nGenerally speaking, dynamic masking can be done either by the database itself, or by a layer between the database server and the database client.\n\nFor instance, Microsoft SQL Server offers some dynamic data masking capabilities, which may be sufficient for many scenarios. I've gone over data masking in SQL Server in a previous article: it's a powerful feature, but it does have some limitations.\n\nThere are some third-party solutions that provide data masking outside of the database, but they typically rely on special drivers or special clients. A more generalized approach is based on proxy filtering, which relies on deep packet inspection and editing to mask data before it reaches the client.\n\n\nThe biggest advantage of dynamic masking is that, in theory at least, it allows you to use just one database for everyone. This solves the issues we identified earlier with static masking.\n\nDynamic data masking also means that you can update the data masking rules, typically on the fly, and restrict or broaden access to certain data for certain clients at any time. Masking can be dependent on more than just who the user is: it can also depend on their IP address, or the time of day, or what DEFCON level we're at -- you get the picture.\n\nObviously, clients get access to real-time data, so the problem of data currency disappears.\n\nAnd because dynamic data masking implies that you are controlling the database, you can (and probably should) also monitor what the clients are doing. This is critical for forensic analysis if there is a problem later on (think Cambridge Analytica).\n\n\nDynamic masking is potentially less secure, since users are in fact connecting to a database that contains the secret data. It turns out to be non-trivial to mask data reliably if the client accesses it using a sophisticated query language such as SQL. In fact, Microsoft specifically warns about this issue in their SQL Server documentation. This issue can be brought under control with query control, if that's an option.\n\nDynamic masking is also a more complex solution overall, with more moving parts. The more complex the solution, the more likely it is that something will go wrong.\n\n\nAs is so often the case, there is no perfect solution: there is only a series of trade-offs that need to be weighed against the requirements.\n\nIf your data set is of manageable size (which is very much a relative concept here), it may be practical for you to make a copy of your database and do the masking on the copy. If you're OK with the disadvantages we have outlined, that's a great way to do it. Simple solutions are often the most secure.\n\nBut if it's impractical to duplicate the data set, especially if you have multiple clients with multiple masking requirements, then dynamic masking may be your only realistic option. In that case, you'll have to consider whether the database can satisfy your requirements, or whether a third-party solution is required. Even if you end up using the data masking provided by your database, you may still benefit from using a third-party tool to manage permissions and data classifications.", "pred_label": "__label__1", "pred_score_pos": 0.6505918502807617} {"content": "اللغة المصرية ( Egyptian language )\n\nThe Egyptian language or Ancient Egyptian (𓂋𓏺𓈖 𓆎𓅓𓏏𓊖 r n km.t) is an extinct Afro-Asiatic language that was spoken in ancient Egypt. It is known today from a large corpus of surviving texts which were made accessible to the modern world following the decipherment of the ancient Egyptian scripts in the early 19th century. Egyptian is one of the earliest written languages, first being recorded in the hieroglyphic script in the late 4th millennium BC. It is also the longest-attested human language, with a written record spanning over 4000 years. Its classical form is known as Middle Egyptian, the vernacular of the Middle Kingdom of Egypt which remained the literary language of Egypt until the Roman period. By the time of classical antiquity the spoken language had evolved into Demotic, and by the Roman era it had diversified into the Coptic dialects. These were eventually supplanted by Arabic after the Muslim conquest of Egypt, although Bohairic Coptic remains in use as the liturgical language of the Coptic Church.", "pred_label": "__label__1", "pred_score_pos": 0.99930739402771} {"content": "Born in 1943 in Paris, Jean-Philippe Smet was abandoned by his father when he was only 8 months old. His mother entrusted him to his paternal aunt living in Paris. Soon, all the family was moving to London, and Jean-Philippe joined his cousins who were dancers on tour. Through reconstructions, archives and testimonies, Johnny Hallyday, the Wound of a Lifetime sheds a new light on his special bond with Belgium and the pain from his relationship with his family that would haunt him until the end of his life.", "pred_label": "__label__1", "pred_score_pos": 0.8592915534973145} {"content": "Gilead Sciences and Galapagos NV have announced their drug filgotinib met its primary endpoint in week 24 of two Phase III trials, Finch 1 and FINDCH 3, of rheumatoid arthritis patients.\n\nIn FINCH 3 a higher proportion of patients given 200mg or 100mg of filgotinib in combination with methotrexate (MTX) achieved an American College of Rheumatology 20% response (ACR20) at week 24, which was the trial’s endpoint, than receiving only MTX.\n\nAlso, a larger proportion patients in the two combination drug groups achieved ACR50, ACR70 and clinical remission at week 24, compared to patients receiving MTX monotherapy.\n\nDuring the FINCH 3 trial, filgotinib was also studied alone. In addition to a higher proportion of the filgotinib monotherapy group achieving ACR20, ACR50 and ACR70, the drug inhibited the progression of structural damage and caused a greater reduction in the Health Assessment Questionnaire Disability Index than the MTX monotherapy group.\n\nData showed 81% of 200mg combination group, 80.2% of the 100mg group and 78.1% of the monotherapy group achieved ACR20, compared to 71.4% in the MTX group.\n\nThe rheumatoid arthritis patients studied in FINCH 3 are naïve to MTX. Although the endpoint is ACR20 at week 24, the study will continue for the remaining 28 weeks.\n\nIn FINCH 1, which studies patients with a prior inadequate response to MTX and its primary endpoint was achieving ACR20 at week 12, two doses of filgotinib in combination with MTX were compared to adalimumab combined with MTX and placebo.\n\nAt week 24, 76.6% of the 200mg dose group of filgotinib and MTX, 69.8% of the 100mg dose group and 70.8% of the adalimumab and MTX achieved ACR20 at week 12, compared to 49.9% for placebo.\n\nAdditionally, a larger proportion of filgotinib combination groups achieved ACR50 and ACR70 than the placebo and adalimumab with MTX.\n\nGilead chief scientific officer and head of research and development John McHutchison said: “Across the FINCH program, the data continue to support filgotinib’s potential as a JAK1 specific inhibitor that may provide clinically meaningful responses combined with a favorable safety profile in a wide range of people living with rheumatoid arthritis, including those in the early stages of disease and those who have tried standard therapies without success.”\n\nGilead and Galapagos are also investigating the safety and efficacy of filgotinib in other inflammatory indications, including psoriatic arthritis, ankylosing spondylitis, Crohn’s disease and ulcerative colitis.", "pred_label": "__label__1", "pred_score_pos": 0.9942348599433899} {"content": "Slow it down\nBox Breathing\n\nThe benefits of Box Breathing\n\nNovember 27, 2020\n\nThe benefits of Box Breathing\n\nNovember 27, 2020\n\nBox breathing or square breathing is a breath technique primarily used to reduce stress. This slow, structured form of breathing helps to reset the body in high stress situations and is often utilized by those in high-stress jobs to remain calm and focused. This technique can also be adapted to everyday situations that trigger high levels of stress or panic. For example, preparing for athletic competition, public speaking, facing a fear or confronting a tricky situation.\n\nBox breathing essentially helps to calm the response of our sympathetic nervous system which triggers the fight-or-flight mode in dangerous and stressful situations while dialing up the input from our parasympathetic nervous system. Studies suggest that box breathing offers both immediate and long-term benefits in reducing stress, improving focus and boosting mood, clarity and overall, positively affecting mental health – the most benefits seen by those practicing it long-term.\n\n\nBox breathing basics:\n\n 1. Start by sitting upright and placing both feet flat on the floor, fully emptying the lungs with a slow exhale through the mouth.\n 2. Breath in through the nose for a slow count of four – counting in your head. Pay attention to the feeling of air moving through the nose and filling the lungs\n 3. Hold the full breath for the same slow count of four\n 4. Breathe out fully again through the mouth for a slow count of four, being mindful of the feeling of the air leaving your bod\n 5. Hold on empty for a slow count of four\n\nRepeat for 4 rounds.\n\nPrefer to get started with a guided breath?\n\nThere are also many apps on smart phones and watches now that guide you through box breathing which can be especially helpful for beginners.\n\nWhat are the benefits of box breathing?\n\n\nReduces physical signs of stress\nStudies have found a reduction in physical stress not only immediately after using the box breathing technique but also long term. The instant calming of the fight-or-flight response helps to regulate involuntary systems like blood pressure and temperature, having a relaxing effect on the body. A regular breath practice may even help to reduce reactivity and susceptibility to stress in the future through changing gene expression. Studies suggest that relaxation response practices, like box breathing, tend to boost energy and reduce the activation of the genes that lead to inflammation and stress.\n\nBoosts your mental state, improving mood and emotional health\nBox breathing has been found to positively effect mood and emotional well-being. Some studies claim that this technique can be helpful in the treatment of depression, panic disorder, post-traumatic stress disorder (PTSD), stress and anxiety.\n\nBoosts sleep quality\nImproved sleep quality comes hand-in-hand with stress reduction. Box breathing taps into the parasympathetic nervous system or the “rest and digest” system that promotes sleep and recovery. Calming the nervous system at night with the breath can also be helpful in treating insomnia.\n\nImproves focus, clarity and concentration\nBecoming mindful of the sensation of air moving in and out of the body can help bring awareness to the present moment. This can help to reduce repetitive or whirling thought-patterns and help to focus your mind.\n\nIf you’re new to box breathing keep in mind that it isn’t always easy in the beginning. Holding the breath can feel uncomfortable and distractions may disrupt your focus. Try to find a dimly lit, quiet space to make it easier for you to focus and be patient with yourself if and when your attention does drift.\n\n\nBox breathing is a simple, no-cost tool found to reduce stress, boost mental health, and promote clarity and focus, resetting the nervous system through breath control. The beauty of this reset is that you can do it anytime, anywhere and without any equipment. So, when you’re faced with high stress situations, whether it’s overcoming fear, performing in front of people or tackling a high-stakes conversation, try this breathing technique to pull you through.\n\nMore featured\n\nAlways stay\nup to date\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6039702892303467} {"content": "Home > Employer Brand > How to Cultivate an Authentic Employer Brand\n\nHow to Cultivate an Authentic Employer Brand\n\nBY Jennifer Paxton / October 17th, 2022 / 5 MIN READ\n\nThe importance of creating a strong employer brand is a relatively new idea that has been quickly gaining momentum. Companies are realizing that crafting a strong employer brand can help break through the clutter in this candidate-driven market and communicate the value that their organization can uniquely deliver. \n\nIt’s important to note though that your employer brand is only valuable to your organization and to potential employees if it’s authentic. In contrast, using performative employer branding (communicating something that you’re not) actually does more harm than good. \n\nThe Importance of Authentic Employer Branding\n\nAn employer brand is the outward expression of your company’s internal employee experience. Employer branding answers a basic question: What’s it like to work here? This can help you zero in on your employer value proposition (EVP) which is the selling point of what your workplace has to offer.\n\nThe Value of Authenticity in Recruitment Marketing\n\nIn order for your brand to be effective, it must be authentic. Too many employers make the mistake of using performative employer branding — advertising one company culture during recruitment — only to blindside employees once they join the company.\n\nThis sort of bait-and-switch approach doesn’t work and it can erode employee trust, which can lead to poor employee engagement and higher levels of turnover. Employer branding demands total transparency as well as an accurate representation of your company culture.\n\nBenefits for Employees\n\nA transparent, authentic recruitment process ensures greater candidate satisfaction and engagement. During the recruitment process, applicants may be less inclined to drop out of your recruitment marketing funnel when they have a clear understanding of what to expect from your workplace culture. \n\nOnce hired, your workers will feel that they got what they bargained for, and their actual experience of working for you matches the expectations created by your employer brand. And, when you solicit input from your current employees to hone your brand/EVP, your workers will feel more respected, valued and engaged in your company’s processes.\n\nBenefits for Employers\n\nAuthentic employer branding helps companies attract workers who will integrate well into the company culture. In the short term, this streamlines your recruitment efforts, and transparent branding can pay long-term dividends as well.\n\nSatisfied workers tend to be more productive and less likely to look elsewhere for employment. Long-term employees can develop skills that augment your operational effectiveness, and with lower employee turnover, you’ll spend less money on future recruitment efforts.\n\nHow to Use Employee Surveys to Generate Authentic Content\n\nThe success of your recruitment marketing depends on creating content that reflects the culture of your workplace. What’s the best way to assess your company culture? Simple: ask the people who make up your current workforce. Employee surveys can provide you with honest feedback that helps you cultivate your employer brand. Surveys might also pinpoint areas of friction that should be addressed before onboarding a new team member.\n\nHere are some of today’s best practices for designing and implementing employee surveys.\n\n1. Make It a Habit\n\nConducting surveys at regular intervals will provide consistent data to work from, and it can also enable you to track trends over time. Make employee surveys a regular part of your company culture. The frequency is up to you. Stick to a schedule to ensure greater accountability and full participation.\n\nTry using Office Vibe Pulse Surveys to check in with your employees. You can send surveys on a weekly or bi-weekly basis, and they are designed to be quick, simple and integrated into the natural workflow. Pulse Surveys also provide you with clear reports to help you analyze employee engagement and make informed decisions.\n\n2. Set Clear Goals\n\nStart by identifying your goals for sending out an employee survey. Having a clear objective in mind can help you zero in on a short set of questions that you can ask your employees rather than simply designing a survey for the sake of completing an administrative task.\n\nDefining your objective will also help you evaluate your data. Starting with a clear question (e.g., “Do employees prefer working from home?”) can ensure that your survey results answer your initial question and help you make decisions accordingly.\n\n3. Pursue Anonymous Feedback\n\nYou’ll get the most honest feedback by keeping your surveys anonymous. Employees will feel freer to share their experiences and voice their concerns when they don’t have to worry about how their employer might react.\n\nDon’t let anonymous surveys make you nervous. Employees generally won’t use this opportunity to vent. On the contrary, many employee surveys end up soliciting positive feedback that can help you refine your recruitment marketing efforts or employer branding strategy.\n\n4. Shorter Is Better\n\nEmployees will be more willing to complete employer surveys when they fit more comfortably into the overall workflow. Shorter surveys, therefore, are preferable to longer ones. This is another reason why it’s wise to refine your objective before you design the survey, so you can focus on the areas that really matter. It also means you won’t have to worry about sifting through less relevant questions, and you can stay focused on your core areas of interest.\n\nHere’s a helpful rule of thumb: the more frequently you send out surveys, the shorter they should be. Weekly questionnaires might best be capped at five questions, while you can save longer surveys for quarterly or annual evaluations.\n\n5. Communicate Your Objectives to Your Employees\n\nIf you’re just beginning to implement surveys in your workplace, it helps to tell your employees what to expect. This might mean sharing your larger goal or explaining what employees might expect from the survey. When using the survey method for branding and recruitment, your employees may feel valued that you’re taking their feedback into consideration.\n\nAt the same time, make sure to respond to your employees’ feedback. This might mean verbally acknowledging a common trend from survey responses and taking steps to address this feedback. If nothing changes, employees may find themselves feeling unheard and less willing to engage in future surveys.\n\n6. Seek Permission to Use Employee Feedback\n\nWhile anonymous surveys provide unparalleled honesty, there’s something to be said for designing surveys that solicit positive employee feedback. After all, some of the best ways to sell your company to potential recruits are with the positive testimony of your current employees. You can use positive employee feedback in your recruitment materials, website or other marketing content to engage applicants better.\n\nJust make sure to ask permission from that employee before publishing their remarks publicly. Naturally, this is impossible with an anonymous survey, so you may want to periodically ask for surveys to attach their name to their feedback or at least give employees the option of identifying themselves when they submit a survey.\n\n7. Leverage the Data Wisely\n\nDon’t just listen to your executives to craft your employer value proposition. Your employer brand should directly reflect the input from those with boots on the ground, so to speak, which is why your survey data can be invaluable in communicating your company culture.\n\nThis means looking at data from individual surveys, as well as monitoring workplace trends over time. The data you receive can help you refine your EVP and showcase your strengths, and it can also highlight weak points you may want to address to keep your current employees fully engaged even while you pursue further recruiting opportunities.\n\nCultivating a Strong Employer Brand\n\nYour company’s culture is constantly flowing, continually changing and progressively evolving. Integrating employee surveys can help you step into the flow of your company culture and gather the most relevant information to hone your recruitment marketing strategy and present the most authentic employer brand.\n\nJennifer Paxton is the Co-Founder of Jamyr, a platform which helps busy recruiting teams scale employee-generated video content, and the Vice President of People at Smile.io, the world's largest loyalty program provider.\n\nSubscribe to the Recruitment Marketing Newsletter\n\n\nCreate your account\n\n[user_registration_form id=\"9710\"]\n", "pred_label": "__label__1", "pred_score_pos": 0.5253036022186279} {"content": "In less than a month, the Texas Legislature starts its 82nd Legislative Session.  In Texas the Legislature only meets in regular session for 140 days every two years.  The 82nd Legislative Session kicks off on January 11, 2011.  Over the term of the session, I’ll try to identify the bills that, if passed, will impact Texas employment law.  In session prefiling, the following bills have been filed:\n\nHB 223 (Strama) (Relating to unemployment compensation modernization)\n\nHB 276 (Alonzo) (Relating to the minimum wage -would increase the state minimum wage to the greater of $6.15 or the federal minimum wage).\n\nHB 387 (Turner) (Relating to the right of an employee who is a parent of a child enrolled in a special education program to time off from work to meet with certain persons affecting the eduction of the child).\n\nSB 64 (Zaffirini) (Relating to the right of an employee who is victim of a crime to time off from work to attend court proceedings related to that crime).", "pred_label": "__label__1", "pred_score_pos": 0.9873349070549011} {"content": "Please Follow Wisers' WeChat public account\nNews and Activities\nWisers Uses Big Data to Push The Envelope of Application\nRelease Time:2019-10-15 11:20:56\n\nOrganized by Asia America Multi-technology Association Pearl River Delta (AAMA-PRD) and co-organized by Hong Kong Science & Technology Parks (HKSTP), the 5th AAMA Technology Talk artificial intelligence (AI) seminar wrapped up recently. The seminar aimed to analyze and forecast the development and prospects of AI and robotics technology in Guangdong-Hong Kong-Macau Greater Bay Area. On the seminar, experts introduced the applications of AI technologies to business leaders.\n\nDr. Crystal Fok, Associate Director, MPE Cluster & Robotics Platform of HKSTP, and Dr. Chao He, Vice President of Wisers and Founder of Wisers AI Lab were invited as speakers of the seminar, delivering keynote speeches titled “AI and Robotics Technology in HKSTP” and “Wisdom, Application, Limits and Challenges in AI”, respectively.\n\nThe organizer AAMA, founded in 1979 in Silicon Valley, is a communication platform for Asians technology and business leaders. It set up the first overseas branch at the Langrun Garden of Peking University in 2004. After years of development, it has become an influencer in the sector thanks to its well-recognized mission and unique growth model.  A large number of specialists have joined AAMA as mentors and entrepreneur trainees. AAMA’s branch network have  extended across the world including Silicon Valley in the US, Seoul in South Korea, as well as Beijing, Shanghai, Taipei and the Pearl River Delta in China.\n\nCo-organizer of the event, Wisers, was founded in 1998. With over 20 years of experience in news intelligence service, Wisers has built a database of 85 billion pieces of news covering all Chinese media with the volume growing by more than 96 million every day. Its services have been expanded to cover intelligence and big data solutions for various vertical industries.  As of today, Wisers has developed data and artificial intelligence solutions for different application scenarios including public relations, digital marketing, brand management, market research, smart retail, financial risk control, intelligent investment research and intelligent policy.\n\nThe keynote speaker Dr. Chao He is a senior member of the Institute of Electrical and Electronics Engineers (IEEE), an AI doctor at the Beijing Institute of Technology, a postdoctor at the University of Alberta in Canada and the University of Paisley in Britain, and Kellogg-HKUST EMBA of the Northwestern University in the US and the Hong Kong University of Science and Technology (HKUST). He has 20 years of experience in AI technical innovations and corporate R&D management. He has led excellent innovation in Chinese natural language processing at the Wisers AI Lab, whose automatic abstracting technology was awarded the first place in the International Conference on Natural Language Processing and Chinese Computing (NLPCC 2018).\n\nCiting examples extensively, Dr. He introduced to the attending guests what AI is, how AI is \"intelligent\", how to make use of AI to explore business value, the current limitations of AI development, and the future development directions and opportunities.\n\nWith reference to the existing definitions, Dr. He, suggested in his speech that not only is AI the science and engineering for an “intelligent agent”, but it is also the foundation and the driver of “intelligent agent”. The “intelligent agent” goes through a learning process and builds its own decision-making system, through which it has a grip on the unknown environment, and its behavior and action to achieve its goals can affect the environment, he added. Professionals define AI as science and engineering while the general public views it as the ability to perform. Dr. He puts science to practical use and affirmed AI-enabled models’ empowering and supporting functions. He has also further explained the concept, mechanism and objectives of the “intelligent agent”.\n\nBy comparing the process of how children and the machine learn the characteristics of fruits, Dr. He explained how AI gains wisdom through machine learning, as well as the advantages and disadvantages of different machine learning methods including supervised/unsupervised and generative/discriminative. Dr. He unveiled the secrets behind various black technologies and introduced the latest developments of natural language processing and image recognition. At the seminar, Dr. He also discussed the applications of AI in marketing, consumer insight, advertising, credit review, smart investment and research, financial risk control, quantitative investment, intelligent transportation, self-driving, smart medical care and other fields.\n\nFinally, Dr. He explained the concepts of narrow, general and super AI and discussed the limitations of AI technology, including deficiency in cross-field promotion, abstract thought, reasoning and common sense, and the resulting ethical and privacy issues. He also talked about the development and application of AI technologies, such as automated machine learning (Auto ML), Meta Learning, Federated Learning, the combination of AI, IoT and 5G and AI applications with high social value. He said that AI will play an increasingly important role in different fields, including improving productivity and creating new value.\n\nHowever, under the current conditions and in the foreseeable future, AI will not and cannot replace human beings. Successful implementation of AI applications depends on how to achieve organic combination of AI and human workers and human-computer interaction in business processes.\n\nAfter years of development, Wisers AI Lab has laid a solid foundation for the expansion and development of intelligent data services and AI solutions with its solid data strength and cutting-edge natural language processing technology. Wisers will continue exploring the application of AI and big data and expanding the application of AI to help more industries and enterprises in different fields achieve a successful digital transformation and embrace the era of AI.", "pred_label": "__label__1", "pred_score_pos": 0.9903900623321533} {"content": "Communication Capabilities\n\nOne particular group of researchers lately showed that pairs of common marmosets leave predictable gaps of 5 to 6 seconds among turns, and will match a partner’s rhythm if it speeds up or slows down. These simian see-saws could be independent innovations, or they could reflect an ancient framework that we humans built upon when we evolved the capacity for speech. The brevity of these silences is doubly astonishing when you consider that it takes at least 600 milliseconds for us to retrieve a single word from memory and get ready to truly say it.\n\nMany enterprises deploy these AI-based tools to assist sales teams upsell and cross-sell much more efficiently. And as the technologies continues to advance and mature, new applications will help and/or automate further areas of operation. For consumer service departments, greater get in touch with volumes are portion of the new, post-pandemic reality. Applying conversational AI, chatbots and voice assistants can enable resolve low-worth calls and relieve beleaguered customer service teams in the course of sudden get in touch with spikes. According to a well-known adage, the online has not changed client expectations, but it has empowered them.\n\nIn numerous cases, though 1 individual is speaking, the other person is considering of what he will say when it is his turn to speak. Powerful communication is blocked by competition, prejudice, and worry, and parties’ approaches of relating begin to deteriorate. They tend to make impassioned statements about the difficulties and to concentrate on moral or logical flaws in the other side’s position.\n\nHave you ever received the “death stare” from a person? You knew specifically what that meant, and that, my good friends, is a form of nonverbal communication. Interestingly, although face to face, you can not support but also take into consideration your audience’s nonverbal communication. You can be speaking to a coworker by way of Zoom or hanging out with your pals discussing the newest in the celebrity planet.\n\nThink of them as a tool, but not the only solution, mentioned Ray. Using dating apps can feel like a enjoy-hate relationships due to the fact they are complete of possibility but also rejection. So, retain a good mindset and try not to get down from the experience. You also could feel far more comfy chatting with your match over a telephone or FaceTime call prior to going out with them. Ask to speak over the phone for no extra than 20 minutes, mentioned Spira. This will assist ascertain no matter if there is enough chemistry and interest to meet them in particular person.\n\nPersons pay extra interest when they know why you are speaking. Mastering how to make the objective of your message clear is crucial to get the concentrate and interest you want from other individuals. Articles in this category enable you make the purpose of your messages clearer. Poor communication can have an effect on adults and youngsters alike, at times temporarily, or as a symptom of a broader mental overall health challenge.\n\nThis resource includes four total activities with an educator guide and lesson strategy. If you’re concerned about getting typical ground ahead of a big interview or sales meeting, do your due diligence. Ahead of you even step foot into the room, do a bit of research. Look up the particular person you will be speaking with to greater understand their point of view.\n\nRationing choices really should not be created at the bedside. In these ideas, we steer away from complex discussions about rationing, and use language that is for lay men and women rather than ethicists. This is a super-concentrated blast of recommendations focused on COVID. We’ve pared away all the usual educational stuff since we know you’re busy. If you want more, verify out the talking maps and videos on fundamental communication capabilities, household conferences, and ambitions of care at\n\nBuyers right now have higher expectations—and additional options—than ever just before. Conversational AI can give companies a competitive benefit by driving superior targeting and conversion for advertising and sales teams. AI-based options can much better recognize the buyer profile, their social media preferences, part, etc. and supply relevant content that is tailored to their character and correctly timed to drive conversion.\n\nThere are various capabilities that are required to be productive with this sort of communication, and some of them will be discussed in this short article. Are you interested in learning click here for more info how to strengthen your organizational abilities? Right here are 11 sensible recommendations to help you organize your day-to-day life.\n\nIn addition to global comprehension, we will need to focus our attention on intensive listening. Concentrate your questions and interest at this stage on the segments of the texts that are accessible in terms of vocabulary and structures. Typically, individuals read and listen but hardly ever speak or write. Surprisingly adequate, reading is not indispensable to master a second language or even your native language.\n\nThis practical and entertaining book combines style theory with methods for constructing and education AI systems. In it, you will discover how to discover education data, assess efficiency, and write dialog that sounds human. You’ll go from building simple chatbots to designing the voice assistant for a full contact center. Conversational UI is the foundation underlying the capability of chatbots, QuickSearch Bots, and other types of AI-enabled consumer service. Conversational UI takes human language and converts it to computer language, and vice versa, enabling humans and computer systems to fully grasp every single other.", "pred_label": "__label__1", "pred_score_pos": 0.9847703576087952} {"content": "API and Usage Information\n- Being awake is defined as times from 6am-10pm\n- Put any valid country OR IP address after the forward slash\n      examples: /china or /\n- All API calls are done with keywords at the end of the URL after a colon\n  :status = get plain text status for a country\n      example: /spain:status\n  :status-country = get plain text status for a country and show the country\n      example: /\n  :help = show API information\n      example: /france:help\n\nOk, thanks. I get it.\nAre they awake in Morocco?\n    People are likely asleep or getting ready for bed in Morocco (MA).\nLocal timezones/cities are:\n2:59:33 am\n(Sun, Nov 27 2022)\nList of Countries\n\n1NyXyAoxT4dvywFRcHvNHrCTc61EZa7Rcz wut? | feedback | help/API | But are they at work? | v. 1.0 BETA", "pred_label": "__label__1", "pred_score_pos": 0.9541618824005127} {"content": "Pitch Perfect 2 [Review]\n\nPitch Perfect 2 [Review]\n\nAs a love of music and a lover of movies (when I have time), I  loved the first Pitch Perfect movie and therefore had to see the sequel.\n\nAfter winning the US national championships 3 times in a row, the film opens with the Bardon Bellas performing for president Barrack Obama, however due to an unforeseen wardrobe malfunction the a ca sisters lose their right to perform on their victory tour. Instead, the opportunity is handed over to a rival group from Germany, Das Sound Machine.\n\nDas Sound Machine | Pitch Perfect 2 [Review]\n\nIn order to win back their rights as an a capella group, the Bellas must compete against the “physically flawless” DSM in the World Championships. At the same time Beca (Anna Kendrick) struggles to break into the music industry (outside of the a cappella world) and impress her boss at her new internship with the help of the new group member, Emily (who seemed like a pretty weak character to me).\n\nThe sequel isn’t too different to the first instalment. The film revisits the importance of teamwork as the Bellas struggle to find their sound before the big competition.\n\nUnsurprisingly for a comedy, the film is hilarious. I found it myself laughing more than I did during the original, despite the reuse of certain jokes and ‘playful’ racism (mostly pretty comical and lighthearted jokes about Mexicans).\n\nIf you enjoyed the first film, I’d definitely recommend seeing Pitch Perfect 2. However, if you’re looking for a comedy with a bit more substance, I’d look elsewhere as the plot is pretty predictable.", "pred_label": "__label__1", "pred_score_pos": 0.5833160877227783} {"content": "Ουιρουεδρουμ ακρον\n\nAttested:  Ptolemy 2,3,5  Ουιρουεδρουμ ακρον\n\nWhere:  Dunnet Head, the northernmost point of the Scottish mainland, at ND202768.\n\nName Origin:  The first element is from PIE *wer- ‘to turn’, but there are multiple opinions on how that led to later words such as veer, French virer, Dutch vieren, etc, plus the sailing term ‘to wear’.  The second element is from PIE *wed- ‘water’.\n\nNotes:  On rounding Dunnet Head a vessel needs to turn through at least 30 degrees.  The sea can be rough in this area, but can be sailed safely in calm weather by a mariner who pays attention to the tides.\n\nLast edited 24 October 2022     to main Menu", "pred_label": "__label__1", "pred_score_pos": 0.9990537166595459} {"content": " Bertha Dudde 2174 Jesus Christ reveals himself.\n   Bertha Dudde 1891 - 1965  \n  Contact Alpha... Keyword Lese auf Deutsch  \n    Welcome Introduction Reading choice Editions/Offer Downloads  \n\nBD 2174 4.12.1941\n\nThankfulness of the souls redeemed by prayer in the Hereafter ....\n\nThe more willing the human being is to help the souls in the beyond, the more intimately these souls rejoin the human being, for they recognise in him the saviour from their plight. They only sever their connection with earth when they no longer need people's help, when they are, so to speak, more mature than those and now connect with the souls in the beyond who are in the same state of maturity.\n\nBut then they will help the human being again, yet no longer desiring to be close to earth, instead they will seek to draw people's thoughts up into the spiritual kingdom, they will seek to guide the human being's spirit away from earth upwards because they are happier in that kingdom and earth has lost all attraction for them. But they do not forget the people on earth, and they are particularly helpful to those who have reduced their state of suffering and redeemed them from their adversity and torment through prayer and heartfelt remembrance.\n\nOnce these souls have been redeemed they will have much strength at their disposal which they can pass on to the earthly human being, and his struggle on earth will become increasingly easier and his spiritual progress will be easily recognisable. For now the redeemed souls draw from an inexhaustible source .... It is their bliss to be able to help, and their love will turn to the people on earth who still have to struggle for the salvation of their souls. They now give their thanks in the same way, they help the unredeemed to become free from their bondage.\n\nHow easy it is for people to strive upwards when they have earned the love of the beings in the beyond through their willingness to help and are now rewarded for their love ..... Then people can enter the beyond in a state of light and be spared the agonising state of imperfect beings. For this is also spiritual good which the human being acquires on earth .....\n\nHe will find his loved ones again in the beyond, there will be no separation of those who were united in love on earth and whose love did not end with the death of the body either .... Intimate understanding and blissful love also unites the beings now, because the same spiritual state of maturity is the result of mutual loving remembrance. What it means to have contributed towards a soul's redemption will only be comprehensible to the souls in the beyond when both the state of happiness and the state of suffering come to the being's awareness ....\n\nAnd therefore the redeemed being in the beyond is always willing to help the unredeemed, and its love extends to the kingdom in the beyond as well as to earth. And that is why people on earth should acquire friends in the beyond through their constant willingness to help the souls which are still dependent on their help and love. For whatever they do out of love will be repaid to them many times over ....\n\n\n\n* Translated with www.Deepl.com/Translator\n\n\n\n   A new call\n\nThe redaktion@bertha-dudde.info is looking for translators.\n\nDear friends of the Revelation of God to Bertha Dudde,\n\n\n\n\nIf you are interested, just contact us. Contact offer\n\n\nPrint version\n\nRevelation share / recommend on:  \n\n", "pred_label": "__label__1", "pred_score_pos": 0.6372358798980713} {"content": "Women’s Liberation Beyond the Limitations of the State\n\n\nThe following is an essay (of unknown quality, I don’t know) written for a university course on gender and politics.\n\nRepresentation has become an extremely important facet of modern liberal democracies. From the political sphere to entertainment media and the workforce, great effort has been exerted from countless groups to ensure not just that diversity becomes the norm, but that it is visible and seen as a strength that benefits everyone. In a representative democracy, this diversity of people is meant to reflect not only the demographics of a particular nation, but bring the views, experiences, and perspectives of them to the public eye for consideration. Women, who make approximately half the global population, are one such group that has fought for centuries to achieve equal standing with men who have held the reins of power in almost all institutions of all societies in history, with few exceptions.\n\nIn recent years, various mechanisms have been implemented across the globe to increase women’s involvement and power in the political system, with quotas being a fairly ubiquitous example (Franceschet & Piscopo, 2013; O’Brien & Rickne, 2016; Baker, 2019), with uncertain results. What this essay intends to argue is that state mechanisms like quotas are not adequate to achieving gender equality, let alone women’s (and queer) liberation, but not that quotas should therefore be scrapped or dismissed entirely. Rather, quotas and other methods are useful but extremely limited tools within patriarchal systems and institutions, such as politics or the corporate world. The benefits are worth arguing for against those who would deny women access entirely, which is a very real danger (Mansbridge, 2005). On the other hand, their glaring pitfalls and omissions must be explored to ensure this political and social liberation applies to all women, not just those who “make it in a man’s world”. A more anarchic and grassroots alternative that can learn and adjust on a path to uplift all women is needed.\n\nOne of the major reasons for promoting and implementing quotas is that the political system, embodied by the state and its various institutions, is inherently patriarchal. Around the world, men make up the majority of elected (and unelected) officials, leaving women with few opportunities to reach positions of power. The contradiction of the state correcting for biases within the state will be explored below, but by including more women within these institutions it can provide gradual, if slow, increases in material outcomes and the presence of women in political office and elsewhere (Franceschet & Piscopo, 2013). While the political arena is extremely powerful and influential, there are other forces such as corporate and religious systems that hold similar sway. If the state can be wielded to enable progress in these areas, there is little reason not to take advantage of it.\n\nIt also provides an avenue to tackle the problem of merit. Ideally, any political candidate would be proficient and qualified for their role as a representative, and this is often used as an argument against “quota women” who are perceived to have been given, rather than having earned, their position (O’Brien & Rickne, 2016). But discrimination and inherent biases can result in certain demographics being under-represented, and some, such as Murray (2014), have suggested reframing our approach to gender quotas. Rather than focus on the under-representation of certain groups, like women, we ought to handle the problem of men’s over-representation. While this is a purely semantic difference, how something is framed can have significant impact on how it is received by the general public. This would also equalise the merit argument as men, rather than women, would have to “prove” their worth to be considered against their colleagues.\n\nA related concern brought up by Mansbridge (2005) is that of combatting essentialism. She argues that in a world of flexible and fluid definitions and identities, setting quotas for women seems to enforce a sense of rigidity, whereby only women can represent women and that they cannot represent men or vice versa. But women themselves are not a monolith (as will be discussed below in detail), nor are they entirely disconnected or opposed to men and men’s concerns. Quotas in this context, according to Mansbridge, appear to focus almost entirely on differences, rather than the diversity in each category and the similarities between them. This is, in my view, a relatively trivial point, but it is worth pointing out because Mansbridge (2005) does provide the more nuanced argument that makes it so trivial. That is, we ought to set quotas, but do so in a way that takes into account the historical, cultural, social and structural biases. There should be quotas for women, so long as the word “woman” is understood to include black women, the LGBT+ community, disabled women, etc. (Mansbridge, 2005).\n\nIntroducing quotas also, as one would expect, accelerates women’s involvement and electability. In the short-term, this is a sort of “supply and demand” effect whereby the number of women gaining access grows as the demand for women in leadership roles increases (Franceschet & Piscopo, 2013). To complement the framing concern by Murray (2014), Franceschet and Piscopo (2013) note that women elected through such mechanisms are generally as qualified (or more so) than their male counterparts, placing the merit debate squarely on handling the over-representation of men. There are a couple of detrimental long-term effects, however, that highlight some limitations of quotas regardless of how they are framed.\n\nFranceschet and Piscopo (2013) go on to discuss how this immediate success does not translate into long-term survival in the political arena, nor is it likely for many women to reach positions of leadership within a party for long, if at all. One example is Julia Gillard, Australia’s first female Prime Minister, who faced an uphill battle against her own party and the conservative Coalition parties led by Tony Abbott. After ousting Kevin Rudd in 2010, she narrowly won a minority election and never lasted a full term. One major (albeit difficult to quantify) aspect of her downfall was the discourse surrounding not just her gender, but how she performed her gender as a political leader (Johnson, 2015). Most of this was led by hostility from the Coalition in Parliament and from the media, with commentary on her clothing and marital status, and violent and sexualising harassment that smeared her image as a woman in power (Connell, 2021: 76). Alongside other fronts, such as business lobbying and propagandistic slogans on border security and climate change from the Opposition, this contributed to her polls tanking as a woman who cannot be trusted (McAdam & Chong, 2019; Wilkinson, 2020). The Labor Party subsequently reverted to Rudd and lost the 2013 election.\n\nQuotas and inserting women into leadership positions can be good in the short-term for some women, and the arguments against them often come from misinformed and even sexist views that highlight why they are so urgently required. Yet for a variety of more critical and legitimate reasons, they fail to achieve the long-term goals of maintaining their positions and overall women’s liberation. How can working within the state, in its current form or at all, meaningfully contribute to the liberation of all women when it exists as a monolith of patriarchal power? Feminist author Jessa Crispin even calls such self-empowerment within the current system a form of narcissism, bluntly stating “doing well within the patriarchal system is not a political victory.” (Crispin, 2017). For instance, despite growing numbers of women in the Australian Parliament, sexual harassment and assault has been terrifyingly prolific over the past decade in the building that houses our government. That is not to say that women who are elected are in any way at fault for these specific actions – far from it. But can they, let alone men, call it a victory for equality when they feel unsafe or belittled in their workplace despite their position?\n\nThere are two glaring questions that arise from Crispin’s statement. The first is, which women? Which women get to benefit from mechanisms like quotas? Which women get to experience real material progress and liberation as a sex/gender as a result of increased women’s participation in the state? The second, assuming the answer to the previous question is “not many”, is what is a suitable alternative to the current system and solutions? To explore the question of which women, we must take an intersectional approach to describe the experiences of different women. While women as a group have all experienced gendered oppression, intersectionality seeks to investigate how different axes of oppression intersect and interact, including race, class, disability, etc.\n\nOn the matter of class, Julia Gillard serves as a contrasting example. On the same day she gave her now legendary misogyny speech, her government along with the Opposition passed welfare cuts to single parents, most of whom were and are women, and which was not based on any real evidence – just a bipartisan approach to welfare reform focussed on driving sole carers and parents into the workforce (Cox, 2012). Her government also reopened the Howard-era offshore detention and processing centres in Nauru and Papua New Guinea, holding men, women and children in illegal and unsafe conditions that resulted in harm and trauma for many (McAdam & Chong, 2019). This continued after Labor’s election loss, and included sexual assault and even instances of rape, incidents that, along with many others, events that ultimately led to most of these tortured refugees being brought to Australia anyway (Evershed et. al., 2016).\n\nWhile Gillard held a powerful voice for women in Parliament and showed how brutal politics was towards women, those in lower socioeconomic positions or with asylum status were left behind in the name of fiscal responsibility and border security. Crispin (2017) uses Hillary Clinton’s record as Senator and Secretary of State to similar effect, noting that her position did not help poor women or women in countries where the United States intervened. In her book The White Possessive, Aileen Moreton-Robinson (2015) provides a particular framework for the settler-colonial countries, describing such nation-states as patriarchal white possessions. As a First Nations’ scholar, her work is mostly focussed on the matter of whiteness, but there is a very clear hegemony within whiteness along gendered and propertied lines. Sovereignty may have been claimed by the colonists, but men, mostly those of a certain social and economic status, are the ones who own, and therefore determine the design of, institutions like the nation-state (Connell, 2000).\n\nOn the question of quotas then, not only is there the issue of which women can attain a position of power within the system, but which women can even be represented at all. Certainly not First Nations’ women, who despite some bold figures like Greens’ Senator Lidia Thorpe in Parliament, suffer immensely through legislation such as the Northern Territory Intervention and the BasicsCard, and have one of the highest incarceration rates in the world (Moreton-Robinson, 2015; Maddison, 2009; Marks, 2022). Rather, a more direct and participatory form of democracy built upon grassroots community engagement and activism would be a much more suitable approach than a top-down state of distant representatives in striving for liberation (Kioupkiolis, 2017; Scully, 2020). As Bakunin (1990: 23) predicted, “it will scarcely be any easier on the people if the cudgel with which they are beaten is called the people’s cudgel.”\n\nAgain, this is not to suggest that mechanisms like quotas are entirely meritless, but simply that they fall far short of genuine liberation for all women. Purely from a pragmatic stance, it is as ridiculous to dismiss the concept of electoral politics and increased representation entirely as it is to isolate it as the only, or even ideal, pathway. What I do posit, however, is that the state is an inadequate framework to make meaningful progress, and that the elevation of individual women, or specific groups of women, to power does little in the long-term. New approaches are required. It is prudent, at this stage (particularly as a man writing on feminist issues), to note that I cannot speak for women nor prescribe to them solutions to their issues or how they should organise (Bey, 2020). Not even they can claim to do so for all women, as discussed above.\n\nWhite suffragettes in the United States fought for the ballot, yet many stepped away from the concurrent struggle of getting the ballot for black men to win support from the South – where were the black women, one wonders (Davis, 1981). In Australia during the early 1900s, where (white) women had the vote, labour laws were strict and oppressive. Over a century ago, Emma Goldman asked what benefits women gaining the vote could bring that could not be achieved through direct action alongside working men and women (Goldman, 1910). The wisest course of action is to listen to the voices of the oppressed and hear what they have to say.\n\nWhatever the future holds in terms of organisation and approach, there are some ideas we can use to guide these decisions. In her book Feminism Without Borders, Chandra Talpade Mohanty (2003) looks to an internationalist (or transnational) vision of the feminist movement, one in which all women – including “Third World women” who are often spoken about in a paternalistic and monolithic manner by Western and liberal feminists – take part in a global movement. This transcends national borders and electoral politics, highlighting freedom, choice and sustainability in all aspects of life as worthy aspirations. These are built atop a foundation “in which democratic and socialist practices and institutions provide the conditions for public participation and decision making for people regardless of economic and social location.” The work to achieve this must be “on many fronts, in many different kinds of collectivities in order to organise against repressive systems of rule.” (Mohanty, 2003: 2-3).\n\nThis is no small task, and one which the state cannot be an active player. Despite lofty promises and romanticised versions of history, the state as an institution will first and foremost act to ensure its own self-preservation. The Russian Revolution heralded a shift toward communism in Russia that remains the greatest inspiration for liberation today, yet Lenin’s vanguardism and the Bolsheviks conflated their success with the ideals of the Revolution and ultimately crushed those who wished to see power delivered to the workers (Berkman, 1929; Mett, 1938). Similarly, the dominance of men has been cemented within the nation-state, and while women have gained some concessions and sway within these institutions, they are just that – mere concessions. The structure still stands, and it knows it must adjust to keep the threat of real women’s liberation at bay lest it be dismantled to make way for a more just system (Crispin, 2017).\n\nAny viable alternative must set its sights beyond engagement with the status quo – it must be revolutionary in nature. Beyond the state, feminism must embrace internationalism to learn and grow from the myriad of cultures and collectives that can shape our understanding of women’s place in the world (Mohanty, 2003). Beyond electoral politics and well-meaning mechanisms such as quotas for women, direct action and participatory democracy initiated and carried out by women (and men) for women are necessary to allow everyone, not just select groups, to reap the benefits of a truly free world.\n\nPragmatism and opposition to those who would shackle women to traditional and subservient roles in society demand we fight for equality within the system. Here, quotas and diverse representation can help us build a more transcendent consciousness with immediate short-term action. Gender equality in political decision making, if it is to be truly actualised, must ultimately leave pragmatism behind. There are far more productive, fruitful, and fulfilling avenues we can take to grasp liberation.\n\n\nBaker, K. (2019).  Pacific women in politics: Gender quota campaigns in the Pacific Islands. University of Hawaii Press.\n\nBakunin, M. (1990). Statism and Anarchy. Cambridge University Press.\n\nBerkman, A. (1972) The ABC of Anarchism. Dover Publications.\n\n\nConnell, R. (2000). The Men and the Boys. Polity Press.\n\nConnell, R. (2021). Gender: In World Perspective (4th Ed.). Polity Press.\n\nCox, E. (2012, October 17). Prejudiced policymaking underlies Labor’s cuts to single parent payments. The Conversation. https://theconversation.com/prejudiced-policymaking-underlies-labors-cuts-to-single-parent-payments-10151.\n\nCrispin, J. (2017). Why I Am Not a Feminist: A Feminist Manifesto. Black Inc.\n\nDavis, A. Y. (1981). Women, Race and Class. Penguin.\n\nEvershed, N., Liu, R., Farrell, P. & Davidson, H. (2016). The Nauru Files: The lives of asylum seekers in detention detailed in a unique database. The Guardian. https://www.theguardian.com/australia-news/ng-interactive/2016/aug/10/the-nauru-files-the-lives-of-asylum-seekers-in-detention-detailed-in-a-unique-database-interactive.\n\nFranceschet, S., & Piscopo, J. (2013). Equality, Democracy, and the Broadening and Deepening of Gender Quotas. Politics & Gender, 9(3), 310-316.\n\nGoldman, E. (1910). Anarchism. StreetLib Write.\n\n\nKioupkiolis, A. (2017). Common Democracy: Political Representation beyond Representative Democracy. Democratic Theory 4(1), 35-58.\n\n\nMansbridge, J. (2005). Quota Problems: Combating the Dangers of Essentialism. Politics & Gender, 1(4), 622-638.\n\nMarks, R. (2022). Black Lives, White Law: Locked Up and Locked Out in Australia. La Trobe University Press.\n\nMcAdam, A. & Chong, F. (2019). Refugee Rights and Policy Wrongs: A Frank, Up-to-Date Guide by Experts. NewSouth Publishing.\n\nMett, I. (2017) The Kronstadt Uprising. Theory and Practice.\n\nMohanty, C. T. (2003). Feminism Without Borders: Decolonising Theory, Practicing Solidarity. Duke University Press.\n\n\nMurray, R. (2014). Quotas for Men: Reframing Gender Quotas as a Means of Improving Representation for All. American Political Science Review, 108(3), 520-532.\n\nO’Brien, D. Z., & Rickne, J. (2016). Gender Quotas and Women’s Political Leadership. American Political Science Review, 110(1), 122-126.\n\nScully, J. (2020). Glimpses of Utopia: Real Ideas for A Fairer World. Pantera Press.\n\nWilkinson, M. (2020). The Carbon Club. Allen & Unwin.\n\nLeave a Reply\n\n\nWordPress.com Logo\n\n\nTwitter picture\n\n\nFacebook photo\n\n\nConnecting to %s", "pred_label": "__label__1", "pred_score_pos": 0.6842156648635864} {"content": "84 Matching Annotations\n 1. Sep 2022\n 1. in discussing economic mobility across generations, we refer to theintergenerational elasticity statistic. Again, this ranges between 0 and 1 andindicates how strong the relationship is between parents’ income and theirchildren’s income.10\n 2. Aug 2022\n 3. May 2022\n 1. Her opposition to police and prison starts with the experiences of marginalized people, who have to deal with police and carceral violence every day.\n\n Although I know this from a first hand experience and experience of family members, I think statistics on incarcerated people would benefit the article.\n\n If someone who has never researched this topic reads this, they wouldn't truly understand the gap between marginalized people incarcerated and those not.\n\n Another good statistic that could be used is the recent amount of people that have been released early or with certain crimes being decrimalized and what groups those are.\n\n 4. Apr 2022\n 5. Mar 2022\n 6. Nov 2021\n 7. Oct 2021\n 8. Sep 2021\n 9. Aug 2021\n 1. ReconfigBehSci. (2021, July 20). No it doesn’t- it reflects the statistics of what, mathematically, has to happen as more and more people are vaccinated with a vaccine of less than 100% efficacy (as all vaccines are) [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1417520720960131073\n\n 10. Jul 2021\n 11. Jun 2021\n 12. May 2021\n 1. David Benkeser. (2020, November 9). Another view on uncertainty associated based on Pfizer’s results. Even if you were highly skeptical about MRNA vaccines (many are [were?]) with 50% prior belief that VE ~ 0, based on an 8:86 vax:placebo case split, the posterior probability that VE > 75% is ~ 1. Https://t.co/xtBONtGHmT [Tweet]. @biosbenk. https://twitter.com/biosbenk/status/1325856366225993729\n\n\n 13. Mar 2021\n 14. Feb 2021\n 15. Oct 2020\n 16. Jun 2020\n 17. Feb 2020\n 18. Jan 2020\n 19. Aug 2019\n 1. more than 400% above the federal poverty level,83% of employees are offered employment-basedinsurance.5In households with a family income levelbetween 100% and 250% of the federal povertylevel, only 38% are offered employment-basedinsurance.5\n 2. A reduction in health careexpenditures by only 10% would free $330 billion eachyear to meet other public and private needs\n\n Major decrease if health care was reduced.\n\n 20. Feb 2018\n 21. May 2017\n 1. A cross disciplinary study of link decay and the effectiveness of mitigation techniques\n\n Tried to add to Mendeley, but it kept pulling up an article with a similar subject, but it was not the same article.\n\n\n Link rot statistic\n\n 22. Nov 2016\n 1. 什么是统计量的size和power?          size是指size of the test,就是置信水平(1 - 阿尔法)里面的那个“阿尔法”,又称“检验水平”。 power是指power of test statistic,是统计量的“统计检验力”。 在有限样本时,即使当N和T分别小于50和2时,该检验统计量仍然拥有合理的size, 特别当T大于等于10时,该检验拥有良好的power.——这句话怎样理解? \"合理的size就是能够满足合理的置信水平条件,也就是犯I类错误的概率很低。良好的power是指犯II类错误的概率很低,也就是H0为假时拒绝H0的概率很高。\"\n\n\n 1. lthough rarely as sophisticated as Ithaca’s efforts, such review of social media information is quite common: a 2015 Kaplan Test Prep Survey of 397 admissions officers found that 40 percent of admissions officers visit applicants’ social media profiles, often to verify information presented on their applications\n\n Interesting statistic\n\n 23. Sep 2016\n 2. The three weeks of the NCAA Basketball Tournament, known as “March Madness,” generate over $770 million in TV rights deals alone.\n 3. College football and basketball generate more than the National Basketball Association, a total of more than $6 billion yearly.\n 24. Jul 2016\n 1. However, high-Impact-Factor journals (JIF ≥ 28) only account for 11% of papers that have an RCR of 3 or above.\n 2. , influential publications can be found in virtually all journals\n\n That's a good statistic to have when fighting the JIF\n\n 25. Jun 2016\n 1. n the years between 1974 and 2014, the fre-quency of the words “innovative,” ”groundbreaking,” and “novel” in PubMed ab-stracts increased by 2500% or mor\n\n\n 2. ewly hired biologists now have almost twice asmany publications as they did ten years ago (22 in 2013 vs. 12.5 in 2005).\n\n Interesting statistic pointing to the \"hypercompetitiveness\" of science.\n\n 26. Feb 2016\n 1. However, preprints in biology have not achieved a critical mass for takeoff. Last year, for example, bioRxiv received 888 preprints compared with 97,517 for arXiv, even though many more papers are published in the life sciences.\n\n Sobering statistic. Whatever solutions we propose for biomedicine, they generally are not adopted.\n\n 2. Over the past 30 y, the US scientific workforce (e.g., postdoctoral fellows and graduate students) has increased by almost threefold (5, 6), fueled, in part, by the doubling of the NIH budget between 1998 and 2003.\n\n biomedical workforce participation\n\n 27. Dec 2015", "pred_label": "__label__1", "pred_score_pos": 0.9888908863067627} {"content": "The Bible Collection: Jesus\n\nFilm Jesus\n\nPlot Summary\n\nJesus was and is the most significant figure in history. As God in the flesh, He lived among humanity for three years, establishing His earthly ministry with the least likely people. However, Jesus always knew that His ultimate purpose would be fulfilled in His sacrifice on the cross, paying the sin debt for all humanity. Nonetheless, it wouldn’t end there since He would rise again victorious.\n\nProduction Quality (1.5 points)\n\nLike over Lux Vide offerings, Jesus sports a fine production, including good sets, locations, and props. Camera work and video quality are also professional save for some wild action shots. Audio quality is okay, even if the soundtrack is a bit generic. However, generic special effects and poor editing drag this score down to the middle line. At times, cuts and transitions are very abrupt, creating a confusing experience for the viewer. Therefore, this is the best rating that can be awarded in this category.\n\nPlot and Storyline Quality (-1.5 points)\n\nThroughout the movie, Jesus is portrayed as having a strange attitude, as if He’s unsure of what’s happening or even surprised at events. This assumption seems to rise out of an odd theological implication that Jesus only became God after His baptism. It also impacts the temptation sequence as Satan appears to know more about the future than Christ does during this experience. Because there’s too much content to cover in this narrative, expository dialogue poorly bridges the gaps as precious time is wasted on unnecessary extra-biblical asides, such as a pointless romantic suggestion between Jesus and the sister of Lazarus. These tangents are included while more pertinent points are glossed over, and most scenes are generally disjointed as they typically end in abrupt ways. Besides these obvious concerns, the sheer amount of information that’s thrown at the audience in less than two hours is overwhelming. There are simply too many subplots and characters to keep up with, which predictably leads to low quality. Overall, due to the gross alterations of historical record, a negative rating is warranted in this section.\n\nActing Quality (1.5 points)\n\nIn keeping with many other biblical entertainment options, the acting of Jesus tends to be theatrical and dramatic. However, it’s not always bad as emotional and line delivery is inconsistently acceptable. Nonetheless, the casting isn’t always culturally authentic, which is another common misstep in films based on the Scriptures. In the end, despite its faults, this section still keeps the overall rating from being zero.\n\n\nWhy are movies about Jesus usually among the worst? What’s the point of fielding such bizarre portrayals of the Christian faith’s central figure? It’s clear that such failed attempts at capturing the true essence of a historical figure Who changed the course of history are based on faulty information. Screenplays like this one only further turn people off to Christian entertainment, but hopefully, things will continue looking up in the future.\n\nFinal Rating: 1.5 out of 10 points\n\n\nThe Bible Collection: Solomon (Movie Review)\n\nThe Bible Collection - Solomon - FORMED\n\nPlot Summary\n\n\nProduction Quality (2 points)\n\n\nPlot and Storyline Quality (1 point)\n\n\nActing Quality (1.5 points)\n\n\n\n\nFinal Rating: 4.5 out of 10 points\n\nSaint John: The Apocalypse [2000] (Movie Review)\n\nPlot Summary\n\nWhen a Roman soldier is exiled to the island of Patmos for insurrection, he does not expect to meet the infamous and fabled Theophilus, who happens to be the aging Apostle John.  A group of Christians whom the Roman solider knows also comes to the island in search of the mysterious Theophilus, all the while John is experiencing the visions from God that later became the Book of Revelation.  All of their lives intersect in a way they could not have previously believed.\n\n\nProduction Quality (1.5 points)\n\nThere is a lot going on this early 2000s production from Trinity Broadcasting Network and others.  Though there are plenty of attempts to create historically and culturally authentic sets, locations, and props, there are some other issues here that hamper the production.  These include some randomly poor lighting and wild zooms for dramatic effect, as well as some unnecessarily overdubbed audio.  The voice of God that echoes throughout the film is also a bit annoying.  A lot of the special effects used are very obvious and poorly done—if you are making a production about the Book of Revelation, you’d better have some well-funded special effects.  Yet on top of this, there are plenty of realistic gritty elements throughout, as well as good video quality and average editing.  Essentially, this is a very unique production and is a mixed bag at that, thus warranting the average score.\n\nPlot and Storyline Quality (.5 point)\n\nUnfortunately, the plot writers decided to consult The Robe and the old Ben-Hur for how to make a first century Roman\\Jewish story and cast of characters most like a soap opera.  This includes a cheesy romantic subplot and a lot of overly dramatic dialogue.  All of the characters are impossible to access due to their lofty and inhuman demeanors.  However, there is a very realistic historical context portrayed here, as well as a lot of good plot ideas that are basically wasted.  Yet these elements save the plot from being a total loss.  There is a lot of content here, and in the right hands it could have made a great two-part movie or miniseries.  They needed a better writer to be able to handle the complex content from the Book of Revelation properly.  But unfortunately, anything that involves TBN is guaranteed to be overly dramatic.\n\nActing Quality (1 point)\n\nThe same can be said for the casting and acting, as nearly every cast member uses a breathy line delivery reminiscent of Nicholas Cage and the actresses from the old Ben-Hur and The Robe.  Thus, line deliver is too measured and drawn out, like a Bible soap opera.  However, though the cast is not entirely culturally authentic, the costuming is at least historically accurate.  There are also some good acting moments that save this section from being a total loss.\n\n\nOne thing can be said for this film: it’s not your run-of-the-mill cute\\boring Christian film.  It’s ambitious, but perhaps too ambitious for the resources the creators had at their disposal.  It’s very difficult to depict the visions of Revelation properly—this requires state-of-the-art special effects, which usually do not exist in Christian films, unfortunately.  Yet there is no excuse for having acting this bad, even though it’s not BRITISH.  This plot needed a total rewrite, but the idea definitely needs to be retained for future reworking and improvement.  Maybe one day it will be remade.\n\n\nFinal Rating: 3 out of 10 points\n\n\nPaul the Apostle {St. Paul} [2000] (Movie Review)\n\nCreepy Paul…….\n\nPlot Summary\n\nSaul of Tarsus was a ruthless man bent on destroying the church of Jesus Christ, until he had an unforgettable encounter with Jesus on the road to Damascus.  From there, his life was never the same as he became Paul and effectively switched sides and became zealous for sharing the gospel of Jesus Christ.  Though many were still skeptical of him, God was with him all of his life and used him to turn the world upside down.  His work as an Apostle of Jesus Christ is still affecting the world today.\n\n\nProduction Quality (1 point)\n\nIt’s clear that there was money behind this film—you don’t get the opportunity to make a more than two hour film every day.  For the most part, this production is average, with okay camera work and historically authentic sets and locations.  However, some of the video quality is blurry and some of the lighting in outside scenes is poor.  There is also an unusual use of weird special effects throughout, including an annoying use of negative video quality in an attempt to be dramatic.  We also are provided with unnecessary location subtitles as a crutch for bad editing.  With a such a large idea, editing is key, as it is in any epic.  Yet the editing of this film is totally off and allows the plot to focus on all the wrong things.  In short, a lot of wasted money was thrown at this production.\n\nPlot and Storyline Quality (0 points)\n\nPaul the Apostle gets caught up in the all-too-common trap of Bible films: using a movie named after a well-known Biblical character to focus on all kinds of useless side issues and peripheral characters.  It’s fine to make a movie about a character or group of characters who shadowed a well-known Biblical figure, but don’t pretend like the movie is actually about that figure.  Though there is a substantial amount of content in this film about Paul, this movie is not about Paul’s life, but about things that happened around Paul during random parts of his life.  It’s not like Paul has a small story—there is tons of content about him that would make an awesome movie.  Yet we are left with half-measures and allusions to what could have been.  As extra-Biblical events take up the time of this story, pointless time jumps are taken and tons of off-screen content is alluded to.  Dialogue is designed to move the plot along and only crafts characters who seem lofty and inaccessible rather than like real people.  Alas, what could have been with this very important and engaging historical account.\n\nActing Quality (0 points)\n\nOnce again, another Bible movie commits the cardinal sin of casting: British people trying to portray Middle Eastern people.  Thus, there is a lack of cultural authenticity that is not helped by the partially unrealistic costuming, the creepy makeup jobs, and the obviously fake beards.  This is not to mention the overly theatrical, dramatic, and breathy delivery of lines and emotions.  Unfortunately, there is not much good to mention here.\n\n\nSo you have over two hours of runtime and virtually only a third of your content actually pertains to the Biblical historical account of the Apostle Paul.  Very few film makers have the luxury of having this much time on their hands to craft a movie, yet this team decided to waste it on tons of non-Biblical and quasi-historical content, complete with large time jumps and completely unnecessary characters.  Besides this, the characters don’t even feel like realistic or authentic Jewish people, which is not helped by the fact that they are played by British people.  It’s no wonder so many people are weary of films that have the “Bible” stamp on them.  We eagerly await the day when Biblical movies are honest about what they are depicting and create historically realistic and culturally authentic portrayals of people in the Scriptures.\n\n\nFinal Rating: 1 out of 10 points", "pred_label": "__label__1", "pred_score_pos": 0.5623620748519897} {"content": "IPL 2022: ‘He had starts, was unable to convert them into big ones’, Mahela Jayawardena on MI skipper Rohit Sharma\n\nRohit has amassed only 155 runs in 9 innings this season.\n\nRohit Sharma | BCCI/IPLMumbai Indians (MI) are enduring a dismal IPL 2022 campaign. The five-time champions have lost 8 out of their 9 matches and they are already out of the playoffs race.\n\nSkipper Rohit Sharma’s performance also reflects on MI’s standing on the points table. In 9 innings, the veteran opener has amassed only 155 runs at an abysmal average of 17.22 with the highest score of 41 to his name.\n\nOn the eve of MI’s clash against Gujarat Titans, head coach Mahela Jayawardena weighed in on Rohit’s exploits with the bat, saying the captain has not been able to convert his starts this season.\n\nJayawardena also highlighted how the finishers have failed to take the five-time champions over the line.\n\n\"Let me answer that in a much fairer way. Yes, as you rightly said Ro (Rohit Sharma) has been brilliant in batting for long periods, getting those big scores consistently and the rest of the guys have batted around him. He knows he had starts and he is disappointed that he has been unable to convert them into big ones. For a team to work it is not about just one individual, it is about a team executing a game plan. The way we have structured our lineup this season, that is something we have lacked and at the top,\" said Jayawardene during a virtual press conference, as quoted by NDTV.\n\n\"At the same time, we have not had those finishers at the backend also. It is about getting most of the guys playing good cricket and having that consistency going through. That is something we have lacked. You take Gujarat Titans for example this season, you have seen them winning 3-4 games at least from positions from where they were completely outplayed by individual brilliance or finishing games off by either Miller, Tewatia or even Rashid. That is what the season requires and we have not had that spark. So, this has been one of those seasons where we have not been able to win those close matches and we have not been able to ruthlessly finish games off. You need your main batters to be consistent and getting those runs. But it is just not one individual, it is about a collective team performance,\" he added.\n\nMumbai Indians registered their first victory in the ongoing season in their last outing against Rajasthan Royals.\n\nWhen asked if someone like Arjun Tendulkar can be tried out in the remaining matches, Jayawardena replied: \"Well, I think everyone is the squad is an option, it is about match-ups and how we can win the matches. Every game is a confidence thing, we managed to get our first win and it is about stringing wins together. It is about putting the best guys on the park. If Arjun is one of them then yes, but it all depends on the combination that we put out.\"\n\n(With NDTV inputs)\n\n\nBy Salman Anjum - 05 May, 2022\n\n Share Via", "pred_label": "__label__1", "pred_score_pos": 0.9799684286117554} {"content": "Top Fantasy Series of 2021\n\nTop Fantasy Series of 2021\n\nAre you looking for new fantasy series to binge-watch?\n\nHere are our top fantasy series of 2021.\n\nThe Wheel of Time:\n\nThe wheel of time is an American fantasy series released in 2021. \n\nIt is based on Robert Jordan‘s novel series of the same name, produced by Sony Pictures and Amazon Studios. \n\nIt currently has just one 8-episode season.\n\nNevertheless, The wheel of time follows the story of Moiraine, a member of a magical group called the Aes Sedai.\n\nThe Aes Sedai are a group of women with the ability to wield a mysterious power called the “One Power”.\n\nFurthermore, Moiraine embarks on a journey to find the “Dragon Reborn”, the reincarnation of a being who has the power to stop the dark one, an evil being, and is prophesied to save or break the world.\n\nTop Fantasy Series of 2021: Sweet Tooth: \n\nSweet Tooth is a post-apocalyptic fantasy drama series based on Jeff Lemire‘s comic book of the same name\n\nThe 8 episode series premiered in June 2021.\n\n“Sweet Tooth” follows the journey of Gus, a Man-Deer Humanoid Hybrid, who lives in a world where the human population has been decimated due to a viral outbreak. The outbreak coincided with the emergence of hybrids like Gus.\n\nThe surviving humans blame the hybrids for the outbreak and therefore, hunt and kill them. \n\nBut did the hybrids cause the virus or did the virus create the hybrids?\n\nFurthermore, the series captures how Gus’ journey culminates with the travails of other characters in the show. These characters include a former hybrid hunter who journeys along with Gus and protects him, a doctor trying to find the cure for the virus and a former therapist who gives sanctuary to hybrids.\n\nShadow and Bone:\n\nShadow and Bone is an American fantasy series adapted from the novel series, Shadow and Bone and Six of Crows.\n\nThe series follows the story of Alina Starkov who discovers she is a Grisha; people with magical abilities.\n\nAlina is not just a Grisha but the long-awaited Sun Summoner who has the power to destroy the fold, darkness that divides the world, and the creatures it brings. Alina comes under threat as dark forces seek to manipulate or kill her. It also features the Crows, a group that crossed the Fold to kidnap Alina.\n\nTop Fantasy Series of 2021: The Nevers\n\nTop Fantasy Series of 2021\n\nThe Nevers is an epic Sci-Fi/Fantasy series produced by HBO and Mutant Enemy Productions\n\nThe series premiered on April 11, 2021. It has just one season, split into two 6-episodes parts. Nevertheless, the second part of the season will be debuting in 2022.\n\nThe story follows a group of Victorians, called “The Touched”, who suddenly develop supernatural abilities. Consequently, Amalia True, a mysterious widow leads this group against enemies on a world-changing mission.\n\nFurthermore, It has a great plot and even greater plot twists.\n\n\nLeave a Reply\n\nYour email address will not be published.", "pred_label": "__label__1", "pred_score_pos": 0.9812043905258179} {"content": "Topic locked\n\nTrigger an animation in Unity Augmented Reality with a collision (SDK: Vuforia) and problem with a tutorial\n\nFebruary 1, 2021 - 11:53am #1\n\nHello Everyone,\n\nI am kind of new to Unity and I am trying to get two bodies to interact with each other via an animation when they're in close proximity.\n\nWhen these 2 bodies are separated they're supposed to be idle.\n\nOne of the bodies has a rigid body and box collider. The other one only a box collider with a trigger.\n\nI used 3 states in my animator, to trigger the animation I used a boolean condition.\n\nThis is my script:\n\n\nusing System.Collections;\n\nusing System.Collections.Generic;\n\nusing UnityEngine;\n\npublic class Kollision : MonoBehaviour\n\n\n    [SerializeField] private Animator myAnimationController;\n\n    // Start is called before the first frame update\n\n    private void OnTriggerEnter(Collider other)\n\n\n        if (other.CompareTag(\"Player\"))\n\n\n            myAnimationController.SetBool(\"Zusammen\", true);\n\n\n\n\n    // Update is called once per frame\n\n    void Update()\n\n\n\n\n\n\nI can't get the animation to start. Can you please help me?\n\nThe version I'm using is Unity 2020.1.11f1\n\n\nMy second question is regarding the tutorial from the Vuforia library: How To Dynamically Add Content to Targets in Unity\n\nI think the code is deprecated, I replaced ITrackableEventHandler with DefaultTrackableEventHandler. I had a second mistake that I coulnd't find an answer for\n\nWhat should I replace mTrackableBehaviour.RegisterTrackableEventHandler(this); with?\n\n\n\nImage icon animator.png92.6 KB\nTopic locked", "pred_label": "__label__1", "pred_score_pos": 0.8957033753395081} {"content": "Fiin550 Fin560 Chap7 3. The Following Are The Monthly Rates Of Return For Madison Cookies And For Sophie Electric During A Six-Month Period. Compute The Following. A. Average Monthly Rate Of Return For Each Stock B. Standard Deviation Of Returns For Eac\n\nFiin550 fin560\n\n\n3. The following are the monthly rates of return for Madison Cookies and for Sophie Electric during a six-month period.\n\nSave your time - order a paper!\n\n\nOrder Paper Now\n\nCompute the following.\n\na. Average monthly rate of return for each stock\n\nb. Standard deviation of returns for each stock\n\nc. Covariance between the rates of return\n\nd. The correlation coefficient between the rates of return\n\nWhat level of correlation did you expect? How did your expectations compare with the computed correlation? Would these two stocks be good choices for diversification? Why or why not?\n\n7. The following are monthly percentage price changes for four market indexes.\n\nCompute the following.\n\na. Average monthly rate of return for each index\n\nb. Standard deviation for each index\n\nc. Covariance between the rates of return for the following indexes: DJIA–S&P 500 S&P 500–Russell 2000 S&P 500–Nikkei Russell 2000–Nikkei\n\nd. The correlation coefficients for the same four combinations\n\ne. Using the answers from parts (a), (b), and (d), calculate the expected return and standard deviation of a portfolio consisting of equal parts of (1) the S&P and the Russell 2000 and (2) the S&P and the Nikkei. Discuss the two portfolios.\n\n8. The standard deviation of Shamrock Corp. stock is 19 percent. The standard deviation of Cara Co. stock is 14 percent. The covariance between these two stocks is 100. What is the correlation between Shamrock and Cara stock?\n", "pred_label": "__label__1", "pred_score_pos": 0.9829328656196594} {"content": "Q&A – 18 July 2022\n\nSuing a soldier in his absence\n\nI have been in a dispute with my neighbour who is an army officer. The long term misunderstanding has been on my inherited piece of land and claims that my father sold it to him before his death. Last month he mobilised building materials in that piece of land to commence construction of a house. I have initiated a case at the Ward Tribunal but I was told that my neighbour will be going for a AU mission to the Democratic Republic of Congo (DRC) very soon. A friend told me that it is not possible for a case to continue until determination in the absence of that soldier. Please advise me.\nAR, Mwanza\n\nYour friend is wrong. It is possible to proceed with a suit against your neighbour army officer in his absence. The procedure for instituting a suit against a military personnel who cannot obtain leave of absence for the purpose of prosecuting or defending the suit in person is provided for in the Civil Procedure Code (CPC).\n\nOrder XXVII of the CPC clearly states that where any officer or soldier actually serving the Government in a military capacity is a party to a suit, and cannot obtain leave of absence for the purpose of prosecuting or defending the suit in person, he may authorise any person to sue or defend in his stead. The authority should be in writing and be signed by the officer or soldier in the presence of his commanding officer. However, if he is the commanding officer, the next subordinate officer should sign. It further states that where the officer or soldier is serving in military staff employment, the head or other superior officer of the officer in which he is employed, such commanding or other officer shall countersign the authority, which shall be filed in Court.\n\nWhen the authority is so filed, the countersignature is sufficient proof that the authority was duly executed and that the officer or soldier by whom it was granted could not obtain leave of absence for the purpose of prosecuting or defending the suit in person. A person authorised by an absent army officer may act personally or appoint an advocate.\n\nThus, it is possible to continue with the suit you have initiated at the Ward Tribunal in the absence of your neighbour army officer as he can follow the process stated above. Your lawyer can advise you further on the process.\n\nMaternity leave period when a child dies before 84 days expire\n\nI took paid maternity leave but a month after safe delivery, my child died. I informed the HR Manager about the death of my child. A week after I reported the death of my child to the HR Manager, she called me and informed me that I am supposed to go back to work because I am no longer breast-feeding so my maternity leave cannot continue till the expiry of 84 days which is what I was granted as maternity leave period. I would like to know from you if maternity leave ceases when a child dies before the expiry of 84 days which is the statutory leave period.\nPP, Morogoro\n\nSection 33(6)(a) of the Employment and Labour Relations Act [Cap.366 R.E 2019] provides 84 days of paid maternity leave days irrespective of the fact that the child dies before the expiration of the leave period. Therefore the HR Manager is not right to call you back to work simply because you are no longer breast-feeding. Maternity leave is not taken only for breast-feeding an infant. It is also granted to give the nursing mother the opportunity to recover from health problems associated with birth.\n\nAmount of cash one is allowed to carry\n\nMy cousin was going back to his home village where he is undertaking a big construction project. He carried with him in the car TZS 100M to enable him clear various costs of the project. On the way at a police barrier he was stopped and when he was car searched, he was found in possession of the cash. Police asked him why he was carrying such huge amounts of money in the car and was arrested and interrogated for the offence of possession of property suspected to have been stolen and money laundering. Can you tell me what amount of money a person is allowed to carry with him from one point to another within the country?\nKN, Moshi\n\nThere is no law governing the amount of cash money a person can move with from one point to another within the country. Section 23 (1) of the Anti-Money Laundering Act and the Anti-Money Laundering (Cross border Declaration of Currency and Bearer of Negotiable Instruments) Regulations, 2019 (GN No.268 of 2016) regulate the amount of cash a person is required to declare when he is leaving or entering the country but not when someone is travelling within the country.\n\nCarrying a huge amount of cash is not a money laundering offence but it may raise reasonable suspicion that the money is a proceeds of crime and the bearer is avoiding the use of financial institutions because he does not want to leave traces. When a person is charged with possession of property suspected to have been unlawfully acquired, the burden of proof shifts to him to explain, within the balance of probability, how he came into possession of the property.", "pred_label": "__label__1", "pred_score_pos": 0.758302628993988} {"content": "Are Land Acknowledgements Justified?\n\nCommentary, Aboriginal Futures, Culture Wars, Frontier Centre\n\nRecently, Canadians have seen various institutions implementing Indigenous Land Acknowledgments (ILAs) to recognize the institution as situated on previously occupied Indigenous land. They are widely accepted, but privately disputed.\n\nIt is obvious that the moral outrage regarding Canada’s First People prevents open discussion. Instead, we have been told to be quiet and ashamed. Our ancestors have been labeled simply as “visitors” or “white settlers.” People from all over the world call Canada home, yet it is largely those of European descent who are vilified. We are brainwashed into thinking we committed genocide by building Indian residential schools (IRS) and erasing Indigenous languages by not allowing pupils to speak them.\n\nThere is no doubt that some atrocities were committed, as in any long-term human institution, and that evil must be condemned and punished. Every legitimate perpetrator should be brought to justice and punished accordingly in a court of law.\n\nWe are also told we attempted to eliminate Indigenous culture by creating Indian reserves. But ownership of land was resolved by signing treaties between Indigenous chiefs and the Europeans, who then settled their portions and eventually created Canada.\n\nHowever, my home province of British Columbia only existed when the last treaty was implemented in 1921. No treaties in this province have led to a myriad of disputes over whose land is whose and whether or not land was stolen.\n\nNevertheless, if you ever have the misfortune to attend any woke Canadian event, like a modern church service, a university function, or a parliament session, you will hear something like, “We acknowledge that this [insert institution here] is on the unceded territory of the [insert Indigenous group here] and we apologize for the crimes of our ancestors,” et cetera.\n\nOn the surface, this acknowledgement sounds respectful and caring. Underneath, however, it is condescending and rude, addressed to a people regarded by those who claim to care as an infantile mass, not unique individuals with a rightful potential to succeed like any other Canadian.\n\nSeveral reserve schools still do not have running water. Several reserve churches have been burned to the ground because of the Kamloops IRS mass grave claims. Many reserve inhabitants still live in squalor and poverty all over the country.\n\nI know this because I have seen it.\n\nCanadians should be uniting and helping one another, not proclaiming self-righteousness to satisfy their egos. Progressives who shout propaganda from the rooftops live in a bubble of (though I cringe as I use the word) enormous privilege and ignorance. They do not know those whom they claim to protect, nor see the effects of both their actions and inaction.\n\nFor example, the Inuit, who definitely cannot afford an electric vehicle, have been told that the fossil fuels they rely on to survive are bad for the land they have lived on for thousands of years and will certainly prevent our country from reaching Net Zero by 2030. The water in Tyendinaga Mohawk Territory still runs brown instead of clear like that of every nescient “Indigenous ally.” And, finally, after turning to drugs, alcohol and sex work to survive poverty, Indigenous women make up almost one-quarter of all female Canadian homicide victims, another infamous result of neglectful government policies.\n\nI have visited a number of reserves, met and worked with Indigenous people who are very aware of this situation. I find it unacceptable that 21st century progressives have the temerity to spew this rhetoric while simultaneously undermining the success of our Indigenous population. Why is this group of people still living a lower quality of life than the rest of us? Why does the government pour billions of dollars into this “Indian (Inuit, and Métis) Problem” with no results? Where is that money going?\n\nIt appears that those who rule us govern with division and deceit. They want this disparity to be a perpetual problem, sowing the seeds of segregation and disunity. They are Canada’s real enemy.\n\nThat money will never go to the people in any other form than government handouts, ensuring their dependence on the state. No matter how many ILAs are introduced, the root problem has not changed.\n\nLand acknowledgements are blatant hypocrisy masquerading as compassionate concern for a genuinely victimized population. Those pushing for them only appear to have the answers: their words are meaningless, their acknowledgements, unjustified.\n\nIt is time to solve the real issue. It is time for all Canadians to be proud of this country, what we have built, and how we treat each other.\n\n\nSophia Leis is a student intern at the Frontier Centre for Public Policy. She is a third-year university student majoring in political science. She is passionate about Canadian indigenous issues, economics, and Western cultural influence.\n\nSee related discussion You are Now on Treaty Land, Brian Giesbrecht, April 29, 2018.", "pred_label": "__label__1", "pred_score_pos": 0.8492804169654846} {"content": "Skip to content\n\nGravity Works\n\nResearch Paper Assistance\n\n • by\n\nThe first step to obtaining research paper assistance is deciding what sort of assistance you want. There are a wide range of different professionals and organizations that offer services in helping pupils and scholars to write their papers. This may include advice, tips, information on styles and corrector espanol formats and even the actual writing itself.\n\nBy way of example, you may be thinking about getting some help with your research paper writing. In cases like this, a professional advisor would be perfect. These advisers have a selection of different skills such as research, academic and other skills that assist with helping students get their research papers to some level of success. Most often, these advisers work closely with composing faculties and tutors to provide students advice as they work on their papers.\n\nOne of the more common sorts of research paper assistance comes in the form of a tutor. In cases like this, the student and tutor are working together online to plan and carry out the research paper assignment. Most frequently, the tutor has already done much of the first work for the student, such as giving feedback on the student’s writing and composing so as to meet certain criteria and guidelines, therefore making the task easier for the student.\n\nOf course, some research papers aren’t entirely theoretical. Some research papers are written in a really sensible manner, such as ones that are required for examinations. Many exam essays come in the kind of critical analysis or reaction essay.\n\nIn these scenarios, it could be crucial for a mentor to assist the student in writing this sort of paper. Again, tutors have a range of knowledge and skills with which to help students with their research paper homework. They could be teachers or faculty or university specialists. Often, They’re Also members of professional associations such as the Association for University scholars, the Modern Language Association, or the Association of Independent Publishers. There are also some individuals who are able to provide specialized tutoring services in areas such as mathematics, science, engineering, and business.\n\nNo matter the type of research paper assistance which you seek, the fact is there are lots of tools available to create your research paper simpler to finish. Many tools are found on the world wide web, in library databases, or simply by sentence check online contacting local institutions to find tutors or advisors. Students can also find research paper assistance by attending conferences, seminars, workshops, and workshops provided by schools and universities. A student may want to request a professor or a current student if they know of any research paper help to be had for a specific topic or for a specific student.", "pred_label": "__label__1", "pred_score_pos": 0.8923642635345459} {"content": "Sahara Color\n\n\nSahara is soft, warm-toned shade of warm yellow. It is better contrasting with white. This color combines beautifully with cool blue, warm magenta or warm cyan\n\nInverse Color #485deb\nComplementary Color #1428b7\nColor Shade: warm yellow (52.27° hue)\nColor Temperature: warm\nLightness: 39.8% (better contrasting with white)\nSahara Color Sample\nSahara Color Sample\n\nBetter Alternatives To #b7a214\n\nIf you're looking for a similar warm yellow shade, there are some better alternatives to Sahara Color. The Retro Vibe color for instance is a lighter and a bit more vibrant option, however this color has a orange bias. Consider a darker and more saturated alternative called Loden Yellow (#b68b13) for more energetic effect. Try Chanterelle as it also a bit more faded and calm.\n\nComplementary Palette\n\n#1428b7 is the best complementary color to Sahara. Cool blue shades generally complement the warm yellow hues best as they are found on the opposite end of the color wheel. The most popular #b7a214 complementary color is Persian Blue, as it offers maximum contrast and grab the viewer's attention.\n\nAnalogous Palette\n\nThe analogous palette of warm red, warm yellow, and cool yellow colors offers a soft combination of similar warm shades. The analogous colors of Sahara are #b75014 and #7ab714. Thus found on the left and right of #b7a214 on the color wheel with a 30° gap. Consider matching Fiery Orange and Lima colors as they work well with Sahara.\n\nSplit-complementary Palette\n\nThe split-complementary Sahara palette consists of #5014b7 and #147ab7 colors. They can be found 30° apart on either side of the complementary color (#1428b7). Try Blue Gem and Denim colors in combination with #b7a214, as they are not as contrasting as a complementary color, hence, giving more hue variety to make your design stand out.\n\nTriadic Palette\n\nThe triadic palette of #b7a214 offers a combination of cool magenta and warm cyan shades and equally high contrast between the three of them. Find triadic colors at the 120° distance from the Sahara. Thus Seance and Mountain Meadow giving maximum hue separation to use all three together.\n\nSquare Palette\n\nThe square color palette of Sahara contains three additional colors. Thus, complementary Persian Blue, Malachite, and Red Violet split by 90° on the color wheel. #b7a214 square combo is a palette of warm yellow, cool green, cool blue and warm magenta shades that work together well.\n\nTetradic Palette\n\nThe tetradic palette is a bit more complex than the square and has more of a rectangle shape. Sahara tetradic combo consists of cool blue complementary color (#1428b7) and two others. The Mountain Meadow is positioned 120° clockwise from the primary color and Thunderbird – 120° from the complementary Persian Blue. This palette is not recommended to use as-is. Try to tweak the saturation and brightness of #14b7a2 and #b71428.\n\nConversion Table\n\nIn a RGB color space, hex #b7a214 is made of 50% red, 44% green and 5% blue. In a HSL mode Sahara has a hue angle of 52.27°, a saturation of 80.3% and a lightness of 39.8%. In a CMYK space (used in printing only), hex #b7a214 is made of 0% cyan, 8.23% magenta, 63.92% yellow and 28.24% black ink.\n\nHEX #b7a214\nRGB Decimal rgb(183,162,20)\nRGB Percentage 50%, 44%, 5%\nCMYK 0, 8.23, 63.92, 28.24\nHSL hsl(52.27,80.3%,39.8%)\nHSV (or HSB) hsv(52.27,89.07%,71.76%)\nCIE-LAB lab(66.4882,-5.6458,66.6003)\nXYZ xyz(32.575,35.9584,5.8856)", "pred_label": "__label__1", "pred_score_pos": 0.9336490631103516} {"content": "Best answer: How does the climate affect the plants?\n\nClimate change causes warmer summer temperatures and inconsistent precipitation patterns. These environmental alterations affect the flowering periods of plants globally. As the global temperature increases, plants will flower earlier in the season. … As precipitation decreases, flowers may bloom later in the season.\n\nHow does climate change affect plants and crops?\n\n\nWhat plants have been affected by climate change?\n\nClimate change may affect the production of maize (corn) and wheat as early as 2030 under a high greenhouse gas emissions scenario, according to a new NASA study published in the journal, Nature Food. Maize crop yields are projected to decline 24%, while wheat could potentially see growth of about 17%.\n\nHow does climate affect agriculture?\n\n\nTHIS IS IMPORTANT:  Does climate vary with longitude?\n\nDoes climate change affect crops?\n\nClimate change may actually benefit some plants by lengthening growing seasons and increasing carbon dioxide. Yet other effects of a warmer world, such as more pests, droughts, and flooding, will be less benign. Under the HadGEM2 model, corn farmers will see crops decline by nearly 16 percent. …\n\nHow does climate change affect trees?\n\n“Climate change can create new habitats for tree species and make existing habitats unsuitable. … Some tree species are migrating uphill and northward as temperatures increase, while other species are migrating downhill and westward as changing precipitation patterns create drier conditions.\n\nHow does climate change affect the land?\n\n\nHow climate change affects plants and animals?\n\nIt Destroys Habitats\n\nAdditionally, heavier rainy seasons, extended droughts or unpredictable snowfall in regions that aren’t used to that precipitation may cause animal and plant habitat destruction. Plants may freeze or shrivel up, and animals may have difficulty staying warm or finding enough food or water.\n\nHow does climate affect the production of farm crops?\n\nThe positive impacts of global warming include the increase in crop productivity due to fertilization effect caused by the increase in carbon dioxide concentration in the atmosphere, expansion of the areas available for production of tropical and/or subtropical crops, expansion of two-crop farming due to the increased …\n\nTHIS IS IMPORTANT:  Are satellites useful for studying climate?\n\nHow does climate change affect crop yield?\n\nClimate change most likely causes an overall increase in crop yields at EU27 level. Adjusting crop sowing dates and varieties leads to yield improvements. Sowing dates and varieties have less impact on economic and environmental outcomes. Technical progress has a higher impact on crop yields than climate change.\n\nHow does climate change affect agriculture essay?\n\nClimate change is affecting agriculture by interfering with the efficiency of crop production. Agriculture is facing droughts, flooding, sea level elevations, natural disasters, and health hazards for employees. All of these exponents lead to crop failure that creates famines and food prices to rise.\n\nHow does warmer climate affect agriculture?\n\n\nWhat is the relationship between agriculture and climate change?\n\nAgriculture affects climate through emissions of greenhouse gases (GHGs) such as carbon dioxide, methane and nitrous oxide. These emissions come directly from use of fossil fuels, tillage practices, fertilized agricultural soils and livestock manure in large proportion.", "pred_label": "__label__1", "pred_score_pos": 0.999901533126831} {"content": "Legislation is a collection of regulations that manage behavior and also are imposed by social and also governmental institutions. Though its specific interpretation is still disputed, some consider it a scientific research as well as others call it the art of justice. For those that are not accustomed to the concept, legislation is the body of guidelines that a society must obey in order to run an operating culture. The suggestion of a regulation is as facility as the human mind and also has actually been the topic of various thoughtful and also scientific studies.\n\nThe study of regulation is vast as well as affects practically every facet of our lives. There are a number of sub-categories of regulation, such as taxation, customer defense, and also personal property. There are also many sorts of regulation, including labor regulation (which concentrates on the tripartite partnership between a firm as well as its employees) and also consumer regulation, which worries guidelines governing the admissibility of proof in courts.\n\nThe main features of law are to preserve tranquility as well as order in a nation, secure people versus a powerful majority, foster social justice, and advertise orderly social adjustment. Some lawful systems are much more efficient than others at fulfilling these functions. For example, authoritarian regimens have a tendency to suppress political opponents and also minorities. Similarly, manifest destiny typically implements peace in a country and also produces new legislations as well as establishments. Further, the development of the lawful system is a crucial device in ensuring the civil liberties and also freedoms of people around the globe.\n\nWhile law is an intricate subject and usually entails a legal process, it is an essential part of human life. The policy of law determines the regulations that govern our culture and our daily lives. An infraction of a regulation can cause fines like fines or jail time. In the United States, legislations are typically made by the government state and regional legislatures, state guvs, as well as administrative agencies.\n\nThe meaning of legislation varies by nation, but usually talking, it is separated right into 2 major classifications: personal regulation and public law. Personal law is regulation that concerns just a single individual while public law is one that affects all human beings. In addition, legislations are not fixed; brand-new regulations are introduced often as well as old ones are reversed or modified. In the USA, this is an extremely vibrant system and goes through consistent modification.\n\nA brand-new regulation can additionally be produced by a court, either by departing from a criterion or providing a choice in an unique concern instance. However, a brand-new regulation can be ruled void if it contradicts a constitutional provision or is unconstitutional. If both the courts and the legislatures differ on a particular problem, they can still produce a brand-new regulation.\n\nSome types of law are based upon religious beliefs, such as the Jewish Halakha as well as Islamic Sharia. Christian canon law, which survives in some church communities, is additionally based on religious doctrine. Although religion might be the basis for law, it is important to remember that religious regulation is a human development.\n\nIf the technique of law is managed by a federal government firm or independent board, the legal representatives must stick to certain guidelines as well as policies. In order to practice legislation, legal representatives must take a qualifying exam and also be certified by the government or an independent managing body. In most cases, lawyers need to have a Bachelor’s level or a Juris Medical professional. They may additionally obtain higher academic degrees such as a Master’s level in legal research studies or a Bar Professional Training Program.\n\nCommon law is made up of opinions of courts, which are based on criteria of past cases. These precedents frequently function as overviews for courts in determining comparable disputes. In general, courts adhere to precedents, although often it might be warranted to depart from them if scenarios or mindsets change. This helps to develop a predictable and consistent legal system.\n\nAdministrative agencies are likewise with the ability of composing regulations. State and also government constitutions provide the power to establish these companies. These firms are essential due to the fact that lawmakers lack in-depth expertise of particular concerns as well as require specialists to manage difficult concerns. As an example, the Division of the Inside was developed by Congress to take care of the nation’s natural deposits. The division has the authority to promulgate guidelines and also laws concerning environmental protection. Additionally, many guidelines impose certain constraints.\n\nThe concept of civil law can be put on the civil law in numerous nations. In continental Europe, civil law is the civil lawful system. This system outlines cases that can be given court, as well as specifies the treatments for managing insurance claims and crimes. It likewise specifies penalty for sure offenses. The courts make use of these conditions when picking facts in an instance. The standard nature of civil law reduces predisposition in the system.\n\nLaw is often an extremely demanding field. Trainees that research legislation needs to prepare themselves psychologically as well as literally for the long hours that are called for. A normal legislation college student ought to dedicate a minimum of 40 hours a week to analysis as well as researching. This will make sure that they have the ability to stabilize their time as well as job properly. Legislation is much less regarding memorizing memorization than it is about important thinking and trouble addressing. This indicates that students will certainly require to be disciplined when it comes to studying regulation.\n\nThe scholastic demands for becoming an attorney differ by country. In most countries, grads need to obtain a Bachelor of Regulation (LLB) level. These degrees make it possible for individuals to take the requisite certifying evaluations and also end up being licensed lawyers. In some nations, BSc levels in law are also provided. In the U.S., there are three major sorts of regulation levels. here\n\nAlong with interdisciplinary coursework, trainees need to enroll in humanities as well as economics. This is since they will often return to their field of interest after completing their law education and learning. In addition, pupils interested in a profession in academia ought to enroll in lawful history and jurisprudence. These programs will help them comprehend the relationship in between different techniques.\n\nThere are several advantages to obtaining a level in law. This level can assist students open up new job opportunities. There are many sorts of legislation degrees, as well as several law schools provide flexible timetables. Select the right degree program based on your objectives as well as interests. This can aid you become an attorney as well as have a gratifying and successful profession.", "pred_label": "__label__1", "pred_score_pos": 0.9998988509178162} {"content": "Patterns, Thinking, and Cognition: A Theory of Judgment\n\nMargolis, Howard\n\nWhat happens when we think? How do people make judgments? While different theories abound--and are heatedly debated--most are based on an algorithmic model of how the brain works. Howard Margolis builds a fascinating case for a theory that thinking is based on recognizing patterns and that this process is intrinsically a-logical. Margolis gives a Darwinian account of how pattern recognition evolved to reach human cognitive abilities. Illusions of judgment--standard anomalies where people consistently misjudge or misperceive what is logically implied or really present--are often used in cognitive science to explore the workings of the cognitive process. The explanations given for these anomalous results have generally explained only the anomaly under study and nothing more. Margolis provides a provocative and systematic analysis of these illusions, which explains why such anomalies exist and recur. Offering empirical applications of his theory, Margolis turns to historical cases to show how an individual's cognitive repertoire--the available cognitive patterns and their relation to cues--changes or resists changes over time. Here he focuses on the change in worldview occasioned by the Copernican discovery: not only how an individual might come to see things in a radically new way, but how it is possible for that new view to spread and become the dominant one. A reanalysis of the trial of Galileo focuses on social cognition and its interactions with politics. In challenging the prevailing paradigm for understanding how the human mind works, Patterns, Thinking, and Cognition is certain to stimulate fruitful debate.\n\nTag cloud generated by Coginov API\nConcepts extracted by AlchemyAPI AlchemyAPI", "pred_label": "__label__1", "pred_score_pos": 0.7441345453262329} {"content": "After nearly 12 years at Google, the last 5 of which I’ve spent leading core conversational technology for Google Assistant, I’m excited to share that I’m joining TrillerNet as Chief Technology Officer. I will always love Google and remain super bullish on Assistant’s future, but here’s why I found this opportunity so enticing.\n\nThe internet and social networking were supposed to enable us to connect in meaningful ways with our friends and the artists, thinkers, and brands we care about. But it’s nearly 20 years since my last startup, Plaxo, helped usher in this “social web” phase, and it’s clear by now that this is not the future we were promised. Sure, the people you want to follow are now on Social, but we mostly receive undifferentiated, one-way broadcasts from them. They don’t really know who we are, what we’ve seen and done, or what we’re interested in, and what personalization does exist comes more from “surveillance capitalism” than real two-way connection.\n\nIt doesn’t need to be this way: the data we need to differentiate ourselves as consumers (what we read, watch, listen to, purchase; the places we visit, etc.) all leave “digital breadcrumbs” now (in addition to our social media comments/likes). Recent advances in AI (including Natural Language Processing, unsupervised clustering, large language models, and more) have given us the tools to understand all of that data well enough to enable a new level of two-way personal engagement at scale. But since this is all happening across multiple sites and services, a neutral arbiter is needed to tie it all together–a company that deeply understands the needs of both creators and consumers and can develop the technology to help them connect like never before.\n\nEnter TrillerNet, the unlikely but oddly ideally-positioned rocket ship, built from a remarkable convergence of multiple startups spanning technology, entertainment, and the burgeoning creator economy. It combines (1) the “AI-driven conversational superpowers” of (which originally caught me eye), (2) deep experience and credibility with the creator/influencer community from Triller and Proxima’s backing, and (3) the ability to repeatedly create marquee cultural moments with Verzuz and FITE TV. Bold new initiatives like CLIQZ hint at the massive potential at the intersection of those three core differentiators. And it’s still early days.\n\nI’ve been excited about’s technology and success in both the commercial and political arenas since their CMO (and my longtime friend and collaborator from Plaxo), John McCrea, joined them several years back. Earlier this year, after their acquisition by TrillerNet, CEO Mahi de Silva became CEO of the overall TrillerNet conglomerate. He sensed the coming “1 + 1 = 11” opportunity to pair the strong creator relationships and cultural engine of Triller with the breakthrough conversational AI capabilities of and recognized that, with my two decades in Silicon Valley focusing on social networking, identity, and data portability on the one hand and NLP and conversational AI on the other hand, I was the “unlikely but oddly ideally positioned” CTO to lead the company’s next phase of transformational growth.\n\nIt’s surely going to be a wild ride. I’m excited to get back to my startup roots and see how the world has changed and what I’ve learned from my time at Google that does and doesn’t carry over. I welcome any advice or support and will have lots more to say as things unfold!", "pred_label": "__label__1", "pred_score_pos": 0.8974406123161316} {"content": "kbc lottery winner 2023 list today airtel\n\nIndia’s best online game reveal is starting to develop into a league of illusions\n\n\nAfter opening this game wide, you may immediately get to the first question. There is currently no concept that is the fastest finger-first when gaming. This first topic, if properly resolved, will bring you Rs 1000. Providing answers to a problem is done through a few specific choices. As activity develops, almost every debate doubles the amount of money that you simply won. If you feel like you don’t know the video game, you can use one of the 4 lifelines at each level Kbc lottery winner. As soon as all lifelines can only be used during the entire recovery. Lifeline number one is 50 50. This lifeline removes 2 wrong possible decisions and you must choose the best remedy from the 2 redundant possible decisions. You can also use your cell phone as a friend’s lifeline. This lifeline mimics an interaction with your friend. After the justification for this video game device, an employee will mostly allow the most appropriate answer. You can also use up your entire 30-second time limit on the phone with a buddy. The third lifeline is the lifeline for the mass survey. This replicates a survey among the KBC listeners and gives you the impact of the survey in the form of a nightclub graph. Your fourth line of life is known as a “flip”. It will ignore the current illustrative and fundamental questions that will put you new issue without ever topping up your capital. The Change Lifeline can be used that quickly. At any time, at any time, if you get the subject wrong, you could lose all of your financial fortune. But there are many types of heights throughout the game. Such as Rs 320,000 is just one of that type of rate. If you decide that right after winning Rs.320,000 you will get an incorrect answer to a topic, this is the money you should choose for your home and not forego the various funds.\n\n\nAt each point in the adventure, you can also adjust the volume levels to suit your game.\n\n\nThe inquiries shown to you are actually NOT arranged in descending order of complexity and are therefore categorized at random.\n\n\nWarning: this video game can get quite a habit! Lots of people sacrificed working days together, so you probably can’t take a break from a certain activity.\n\n\nThis display sport is often a simulator of your real TV show and contains the MP3 samples from a real game show. Requests are selected at random from a database of 1200 entries, ranging from a piece of cake to very difficult styles. We have an extreme chance that if you can generate 5 crore Rs in this display gameplay, you can dominate a very nice win in the important gameplay express at the same time.\n\n\nNote that this gameplay is not really tied to any legitimate gameplay that is broadcast on any particular Indian network system and every rupee you get in such a flash simulator will absolutely not get you rupees in real life.", "pred_label": "__label__1", "pred_score_pos": 0.8213847279548645} {"content": "Actinostome meanings in Urdu\n\nActinostome meanings in Urdu is ایکٹینوسٹوم Actinostome in Urdu. More meanings of actinostome, it's definitions, example sentences, related words, idioms and quotations.\n\n\nInstall chrome extension\n\nWhat are the meanings of Actinostome in Urdu?\n\nMeanings of the word Actinostome in Urdu are . To understand how would you translate the word Actinostome in Urdu, you can take help from words closely related to Actinostome or it’s Urdu translations. Some of these words can also be considered Actinostome synonyms. In case you want even more details, you can also consider checking out all of the definitions of the word Actinostome. If there is a match we also include idioms & quotations that either use this word or its translations in them or use any of the related words in English or Urdu translations. These idioms or quotations can also be taken as a literary example of how to use Actinostome in a sentence. If you have trouble reading in Urdu we have also provided these meanings in Roman Urdu.\n\n\nFrequently Asked Questions (FAQ)\n\nWhat do you mean by actinostome?\n\n\nWhats the definition of actinostome?\n\nDefinition of the actinostome are", "pred_label": "__label__1", "pred_score_pos": 0.6856198310852051} {"content": "Lemon fruit or vegetable – Tips\n\nLemons can be used for sweet or savory recipes. Like other citrus fruit, lemons are botanical fruits. In most cases, the classification of food is based on its culinary use. This article will discuss what makes lemon fruit. It will also cover the differences between a vegetable and a fruit.\n\nWhat are fruits?\n\nIn the simplest terms, fruits are seed-bearing structures that develop from the ovary of a flowering plant. Fruits include vegetables such as tomatoes. They also include stems, leaves, tubers, and bulbs. While fruit is a sweet treat, vegetables are savory and contain seeds.\n\nFruits and vegetables contain a wide variety of nutrients. They contain vitamins and minerals that your body needs in small quantities. They are often used as side dishes, garnishes, or desserts. The USDA recommends eating a variety of vegetables and fruits to maximize their nutritional value. Depending on the type of produce, each of these items may have more calories than another.\n\nIn addition to helping to promote a healthy diet, eating more fruits and vegetables can help reduce food waste. The UN’s Sustainable Development Goals emphasize the importance of fruit and vegetables and the need to reduce waste.\n\nWhat are vegetables?\n\nFruits and vegetables are both parts of plants that are edible. For instance, potatoes are vegetables, while spinach, onions, and other fruits are fruits. While most vegetables are produced for their edible parts, many of these are also considered fruits. The European Food Information Council, however, defines these foods as vegetables.\n\nWhile there are some differences between fruits and vegetables, these two types of foods contain similar nutritional values. Most vegetables contain seeds, and some fruits are also vegetables. The main difference between them is the way they grow and are processed. Some vegetables grow underground, while others grow on large farms. Once harvested, some are sold in markets, while others are frozen and sent to packaging plants. Regardless of how they’re harvested, all vegetables contain vitamins and minerals that your body needs.\n\nVeggies can be consumed raw or cooked; their nutritional value varies depending on their size and type. They contain low calories and fat and are rich in vitamins and minerals. Especially important for your health are the antioxidant vitamins, which help your body fight chronic ailments. For example, those who eat more vegetables have a 20 percent lower risk of heart disease.\n\nFruits vs vegetables\n\nLemons are often included in recipes as a garnish or added to food. However, despite their citrus-like flavors, lemons are not vegetables. Unlike vegetables, primarily composed of leaves, stems, and roots, lemons are high in sugar. In addition to being high in calories, lemons do not provide enough fiber or vitamins.\n\nThe definition of fruit is a little confusing. A fruit is the reproductive organ of a plant, containing ovules, which will become seeds after reproduction. On the other hand, a vegetable is a part of the plant that does not have seeds. The difference between a fruit and a vegetable often comes down to taste.\n\nFruits vs vegetables\n\nWhile there is no scientific consensus regarding the differences between fruit and vegetable, lemons tend to be considered a vegetable. Several botanical traits govern the fruit category, and citrus fruits tend to contain seeds. The seeds are not edible, and eating them can make your mouth feel bitter. In general, though, lemons are better suited for cooking or eating as a supplement to a vegetable.\n\nWhat makes lemon a fruit?\n\nFruit is a type of plant with seeds. The lemon belongs to the citrus family, which includes tangerines and oranges. But it is different from a berry, which does not have seeds. Scientists believe the first lemon was cultivated in southern China, and scientists estimate that the fruit was cultivated as far back as 4,000 years ago. In the west, lemons are best known as citrus fruits used in cocktails and marmalade. They are also used as ingredients in tea, like Earl Grey tea, which is a popular blend.\n\nThroughout history, lemons have been cultivated for their citrus juice, and there are more than two dozen commercial varieties. Lemons are also used to flavor food and clean surfaces. The humble lemon is one of humanity’s greatest innovations. It is a valuable source of dietary fiber, and a single lemon contains about sixty types of antioxidants.\n\nLemons contain several different types of carotenoids, including phytoene, which gives them their bright yellow color. They contain two types of acids, ascorbic acid, and citric acid, and these acids can kill many types of bacteria. The lemon is also negatively charged, meaning it has more electrons than protons.\n\nLemon Fruit Or Vegetable\n\nThere are a lot of myths about lemon fruit, but one fact remains true: lemons are a fruit, not a vegetable. As a fruit, lemons should form after flowering from an ovary. They also contain seeds, making them hybrid fruit. Also, lemons contain high amounts of vitamin C.\n\nLemons are citrus fruit.\n\nLemons are citrus fruit or vegetable native to Southeast Asia, China, and India. They were considered the “king of fruits” in ancient times and are still popular as a natural remedy for many health problems. Lemons contain a large amount of Vitamin C and are popular in cooking and for their juice.\n\nLemons are a hybrid of the citrus fruit citron and the bitter orange. Both lemons and citrons have excessive amounts of pith. The pulp, or white flesh, is barely discernible. The peel is aromatic and ribbed or wrinkled. Some varieties are called “Buddha’s hand“, as they resemble a hand.\n\nLemons can be used in both savory and sweet dishes. They are a natural choice for salad dressings and are high in pectin, which is perfect for making homemade jam. Lemons can also be used in cleaning and as a natural bleach. The peel of the lemon is often added to dishes to give them that lemony flavor.\n\nLemons are a popular food, but many people are confused as to whether they should be considered a fruit or a vegetable. Although lemons are a fruit, they belong to a plant family called the Boraginaceae. The family also includes spinach, chard, and rhubarb. Aside from being a fruit, lemons are a popular spice and can be used in many dishes and desserts.\n\nThey contain seeds\n\nLemons are classified as a fruit, but they do contain seeds. Seeds are reproductive organs in plants, and a seed is a cell that contains nutrients and a protective outer shell. The inner part of the seed is known as the endosperm, and its purpose is to provide nutrition to the developing embryo. Citrus fruits are classified as either non-acidic or acidic, and lemons belong to the acidic group.\n\nLemons are both fruits and vegetables, but the classification is not always clear. In botanical terms, a fruit is a mature ovary from one plant, whereas a vegetable is a plant’s leaf, stem, and roots. Although lemons are classified as a fruit, they also share many similarities with vegetables, such as the ability to use the fruit’s juice for cooking and baking.\n\nLemons have a long history of use as a fruit and vegetable. They have many uses, including dressings and salads. They are also a great source of pectin fiber, which can lower cholesterol and promote weight loss. They are also used in many other recipes, including beverages, sauces, and desserts.\n\nLemons are classified as a fruit, but they also contain seeds. The seeds are visible when lemons are sliced. This is the reason why they are classified as fruit.\n\nThey are a hybrid of two fruits.\n\nA lemon fruit or vegetable is a hybrid of two different fruit varieties. This type of fruit has a tangy, sour taste, and its leaves are trifoliate. Its flowers have a lovely fragrance that is often used in perfumes. As the temperature changes, the lemon’s color changes from green to yellowish-green to red.\n\nAlthough lemons are often confused with vegetables, they are a fruit, which makes sense if you consider their common use. Lemons are often found in supermarkets near the vegetable section and mixed with other vegetables. While a vegetable does not have the same uses as a fruit, it is still a useful ingredient in many recipes.\n\nHybrid fruits and vegetables are the results of cross-pollination between different species. The fruit and vegetable that result from the hybridization process are naturally disease-resistant and tolerant to heat, cold, and drought. They are also more reliable and predictable in yield, taste, and nutrition.\n\nThe Lemon fruit or vegetable is a hybrid of lemons and oranges. They are a good source of vitamin C and are also used as a natural insecticide. Although lemons are technically classified as a fruit, they are commonly used like vegetables in cooking. Unlike tomatoes, lemons grow on trees. This fruit is often eaten raw but can also be used to make wine, vodka, and other drinks.\n\nThey are high in vitamin C\n\nLemons and oranges have similar amounts of vitamin C and are great additions to many foods. However, the citrus peel of the orange contains more vitamin C than the juice of the lemon. However, you can also add lemon zest and juice to food and beverages for additional vitamin C. Add the rind or zest of citrus fruits to drinks, curries, or desserts for an extra punch of vitamin C.\n\nVitamin C is important because it is a powerful antioxidant that supports the immune system and fights against disease. This vitamin also serves as a scavenger for free radicals and helps minimize oxidative damage. It also protects the body against some chronic diseases, including some types of cancer.\n\nIn addition, vitamin C can help you to avoid respiratory infections. It can shorten the duration of infection and reduce its severity. It also protects the body against UV radiation and pollution. It can also support wound healing and help the body absorb iron from plant-based foods. It may also help with the immune system.\n\nFoods rich in vitamin C are easily available and are a good source of this vitamin. Getting enough of these foods is an important part of any healthy lifestyle. Eat lemons, oranges, pears, tomatoes, and broccoli to increase your intake of this nutrient.\n\nThey are healthy fruit.\n\nLemon is a popular fruit in different parts of the world. It comes from a small evergreen tree called Citrus limon. Lemons are both a fruit and a vegetable. Lemons are classified as a fruit because they contain seeds and lack the stony center of a vegetable. Lemons, though, do share some DNA with other fruits and vegetables.\n\nLemons contain high levels of vitamin C, which is important for the skin and protects the respiratory system from diseases. Citrus fruits are also excellent sources of many essential nutrients, including fiber, and a single lemon contains as many as sixty different types of antioxidants. Consuming lemons every day is also a great way to get your daily dose of fiber, which is important for maintaining a healthy body. Healthy adults need at least 14 grams of fiber per day.\n\nAlthough lemons are generally healthy, too much of them can cause heartburn and gastric reflux. Also, the citric acid from lemons can wear down teeth. Therefore, you should try to drink lemon water through a straw to protect your teeth. You can also add lemon peels to your food for a citrusy flavor.\n\nLemons are great sources of vitamin C and flavonoids, which are powerful antioxidants that can help prevent diseases and boost your health. Some research has shown that lemons can lower the risk of ischemic stroke in women.\n\nThey are often confused with vegetables.\n\nLemons are classified as citrus fruits, but they’re very different from traditional vegetables. While they appear to be a vegetable, lemons actually develop from the ovary of a flowering plant. Citrus fruits also include pomelo and mandarin. These hybrid fruits are the result of cross-pollination between plants of the same genus.\n\nLemons are typically used in sweet dishes, not savory ones. They’re commonly seen in the produce aisle, but they’re not necessarily next to vegetables. While they might look like fruits, they actually contain seeds inside. You might be surprised to learn that lemons actually contain seeds! This fact can help you decide which type of lemon to buy and help you decide where to put it in your dishes.\n\nLemons are classified as both vegetables and fruits, depending on their appearance and taste. According to the Merriam-Webster dictionary, a fruit is an edible reproductive body of a plant. They differ in taste and texture from other fruits. Although lemons are often confused with vegetables, experts agree that they are a fruit.\n\nLemons are citrus fruits, but they’re actually a hybrid of the bitter orange and the citron. They both contain an excess of pith. The pulp is barely discernible, and the outer skin is fragrant. Citrons are also different in appearance; the skin can be smooth, ribbed, or wrinkled. Another variant of lemon is called the Buddha’s hand because it resembles a hand.\n\n\nThe misconception is that lemon is a vegetable.\n\nLemon is a versatile and healthy fruit that is used in cooking and baking. Often, it is sold in the form of juice. However, lemon trees can become stressed due to drought and virus disease. As a result, lemon trees may be in need of extra water. Regardless, lemons are considered a functional fruit and are growing in popularity as a result.\n\nWhile some people consider lemons to be a vegetable, the truth is that lemons fall into the category of citrus fruits. As a result, they bear little resemblance to traditional vegetables. According to botanical definitions, a fruit is defined as any plant part that bears seeds, and a vegetable refers to the rest of the plant’s edible parts.\n\nInteresting lemon facts\n\nLemons are delicious and refreshing. They also offer many health benefits, including 139% of the daily recommended Vitamin C. Lemons are an essential part of the kitchen and can also be an important addition to your garden. Lemon juice has been proven to be very effective in destroying diseases. It also contains a variety of nutrients and is low in fat.\n\nWhile citrus fruit is very popular and is the staple of any kitchen, lemons are also historically loaded. In ancient Greece, they were considered a status symbol. Lemons are a cross between a citron and a sour orange. They are also useful as cleaning agents due to their high acidity. Lemons are grown primarily in the United States. Typical varieties include Meyer lemons and Lisbon lemons.\n\nA citrus fruit, the lemon is native to Asia, but today it is grown worldwide, with the world’s largest lemon producer, India, producing three million tons of lemons annually. Other major lemon-producing countries are Mexico, Argentina, Brazil, and China. Lemons are used for cooking and eating in all parts of the world. They are a popular ingredient in lemonade and lemon meringue pie.\n\nLeave a Comment", "pred_label": "__label__1", "pred_score_pos": 0.7317448258399963} {"content": "The Astonishing Reaction to Snap's (SNAP) Q3 Earnings\n\nComing into this earnings season, it was clear that the market’s focus would be on the future. It was understood that what companies did last quarter would be overshadowed by what they foresaw for the future because it is the future, not the past, that is troubling traders and investors right now. Given that, a bad reaction to what look like good results in terms of EPS and maybe even revenue is not a surprise, but what we have seen since yesterday’s close with the social media company Snap (SNAP) is astonishing and, quite frankly, bordering on ridiculous.\n\nSo far, we have seen pretty clear evidence that even though Q3 was the time when rate hikes really got going, corporations felt little, if any, ill effect during the quarter. There have been some mixed results, but also more than enough beats of expectations to indicate that economists and analysts had been a bit over-pessimistic in their forecasts. That is a matter of where we started from. You may say that the market’s gains in 2021 were the result of excessive monetary or fiscal policies or whatever, but the simple fact is that the rate hikes started at a time of extraordinary strength in the economy and jobs market. Logically, there had to be a time lag between the beginning of a monetary policy adjustment and slowing economic activity, and clearly there has been.\n\nBut conditions have changed, and the effect of rising interest rates will be felt at some point, which is why the market is basically ignoring hard data about last quarter. It just doesn’t matter. If anything, the longer the time lag between rate hikes and a slowing economy, the more likely it will be that the Fed will swing too far in the opposite direction and do outright harm as they remain “data dependent,” fixed on already-outdated metrics and largely ignoring current conditions.\n\nSo, when Snap, the parent of SnapChat, reported an $0.08 profit per share for last quarter as opposed to the $0.02 loss that consensus estimates were suggesting, most people didn’t care. Instead, traders looked only for negatives and although they had to look hard, they found some. This what happened next:\n\nA collapse of close to 30% in just a matter of minutes. Okay, you might think, the negatives must have been really bad, right?\n\n\nWe are talking about revenue of $1.13 billion versus expectations for $1.14 billion, the smallest measurable miss, and a number that represents 19% growth over last year’s revenue, at a time when most companies’ sales are shrinking year-to-year. On the same year-to year basis, Snap also increased Daily Active Users (DAUs) by 19%. Oh, and they announced a $500 million share repurchase program.\n\nManagement did talk in their accompanying comments about a lack of clarity on advertising spending going forward and a challenging environment right now, but the numbers from last quarter and the fact that 1.5 million people have signed up for their paid subscription service suggest that so far, Snap is navigating that difficult environment reasonably well.\n\nI understand that if there is economic weakness coming, ad spending will be reduced overall, and I get that changes to Apple’s (AAPL) privacy policies have hurt social media companies and others dependent on online ad revenue and data tracking. I can see, therefore, why any hint of weakness or suggestion of trouble ahead would be punished by the market, but a 30% drop following a big EPS beat, tiny revenue miss, and solid growth looks like a bit of an overreaction to me.\n\nDespite the extremity of the overreaction, though, I won’t be jumping in to buy SNAP straight away. One of the first traders’ sayings that I came across forty years ago when I began my career was that “the market can stay illogical a lot longer than you can stay solvent,” and it is probably an appropriate thing to keep in mind here. This is an illogical market panic and, while panics inevitably end at some point, they can be self-fulfilling as lows trigger stop losses and prompt more selling, and short sellers sense blood in the water and sell even more aggressively. Given that facts are seemingly irrelevant, there is nothing that SNAP can say that will calm things down.\n\nSo, I will let the dust settle for a day or two but before long, but at some point soon, the value in a stock that lost 30% on a great EPS beat and a solid all around quarter will be just too obvious to overlook.\n\n\nImage and article originally from Read the original article here.", "pred_label": "__label__1", "pred_score_pos": 0.5484791994094849} {"content": "Tornado drills are a joke.\n\nHow about practicing elsewhere?\n\n\n\nThe movie theater. We were in the middle of watching Kung Fu Panda when this happened. We all filed out and were unable to get out to our cars—not that we’d want to-so we were to line up along the dimly-lit walls, cuddled over our children as we listened to the siren blare and the winds scream outside. This gave me lots of experience in calming my child—which came in handy during the next two scenarios—but it also made me realize that disaster preparedness is probably 80% about just being flexible and savvy enough to keep a clear head during a disaster.\n\nThe store. Last year we were stuck at the store the weekend before Easter during a tornado that went right past us. It was terrifying—loud and angry and everything you’d think a tornado might be—and some people just kept right on shopping, even though we were directed to the center of the store! I huddled in the floor with my daughter in my lap, ready to cover her with myself, attempting to keep her calm during the scariness of it all, which wasn’t easy. But I certainly learned a lot from it.\n\nThe museum. This happened just yesterday—a tornado was sighted in north county, which was far enough away from us where it probably wouldn’t hit us, but you never know; plus, it was the nature center’s policy to duck and cover per any warning. So we were in the basement, pretty much just chilling, and my daughter was much more level-headed than she’d been at the previous two warnings, which just goes to show that experience can also help a lot. Together we were able to calm a couple of other children down as well, which gave us both a lesson in staying zen during a storm.\n\nHarmonizing with the Power of Nature\n\nWe all have stress in our lives, some of it avoidable, much of it inevitable. Maintaining an inner sense of peace is essential to a harmonious and joyful lifestyle, and it can be difficult to prevent stress from throwing us off balance. Getting in tune with the natural world can help you relax, regain your center, and boost psychic abilities.\n\nTry these easy ways to tune in and turn on to the power of nature:\n\nEveryday Places: Begin getting in touch with nature through the everyday world all around you. Even in the heart of the big city, nature can still be appreciated if you seek it out. Does your daily routine take you past any trees, grass, or other plants? If so, enjoy it! Touch, smell, look, feel—take some time to appreciate the beauty and natural energies of the plants around you. Place your hands on the ground and let worries flow out. Let intuitive insights and rejuvenating power flow up from the earth and into your body, mind, and soul.\n\nEnjoying the Animals: Animals are naturally attuned with the rhythms of the earth, and being compassionate to the furry and feathered friends in your world can do a lot to enrich your enjoyment of life and put stresses in perspective. Do you take time each day to really enjoy your pets? If you don't have any pets, consider volunteering at a local shelter, or offer to walk a neighbor's dog. In addition to being nice to domesticated animals, try befriending the wild animals, too. Share nuts, seeds, or fruit with the squirrels and birds—just do so in moderation so you won't interfere with their natural abilities to find food on their own.\n\nThese simple activities might already be a part of your everyday routine. If so, being more conscious of the benefits will enrich the experience. If you don't already make time in your life to tune in to the natural world, why not make 2012 the year to put your spirit in harmony with the earth and take your soul to new heights of a peaceful and compassionate existence in perfect balance with Nature's endless song?\n\nDisaster Zones Like Chernobyl and Fukushima Result In Human-Free Ecosystems\n\nNearly nonexistant on the globe anymore, a fully diverse and unaffected ecosystem is a prime research area.\n\nThe tragedy of the Fukushima nuclear plant in Japan has reminded us of the dangers of nuclear power as we continue to grow in size, and the demand for cheap energy continues to expand with us. Other incidents like Three Mile Island and Chernobyl have likewise served as a reminder that there is a cost to progress. However, there has been an unintended benefit to these now uninhabited radioactive sites, as Dr. Barry Star elaborates on QUEST Northern California.\n\nWe imagine an area like Chernobyl to be a desolate place, devoid of life or at least a twisted and misshapen landscape. Chernobyls meltdown caused thousands of deaths and has contributed to cancer, illness, and premature death in tens of thousands more cases. Initially, it also caused a massive die-off of plants and animals in the surrounding ecosystem. However, even as the radioactive levels remain too high to once again repopulate with humanity (although that has started to happen regardless), animals and plant life have resurged in the area.\n\nAround Chernobyl wolves have returned to nearly their pre-human levels, along with beavers and other species. In fact, the biodiversity has proven to be something worth studying for scientists to get an idea of what an ecosystem looks like free of human intervention. One may be asking, “But aren’t the animals sick? How can they live there?” It’s a question of perception. To humanity, who fear for their children developing thyroid cancer, or birth defects, it would seem a hell to live in a as-of-yet radioactive area like that around Chernobyl. However, as Star points out, “It is a chance to live a life without human interference.” The species actually seem to be doing fine despite the radiation. There are higher instances of birth defects and a slightly lowered life expectancy in many species inside the area than those in surrounding areas, but overall the background radiation isn’t significantly affecting their numbers.\n\nSimilar cases of natural resurgence are apparent in areas like the Demilitarized Zone between North and South Korea. This area, stricken with landmines and off-limits to the human population (at least those that care about being shot at) has become a kind of safe haven for species seeking respite from the constant threat of human activity. The result is something that is almost eradicated on the planet anymore, an intact ecosystem free of human intervention or activity. No planes, no hunters, no subdivisions, roads, traffic noise, or artificial light; a nearly pristine environment (aside from the radiation and landmines of course), that gets along fine, even better, without us.\n\nHow to Stay Safe When It's Cold Outside\n\nIt's officially the first week of winter and some snow is finally appearing on the weather map. With that fact in mind and the recent blizzard out west, I've done some reflecting on how to properly plan for an outdoor excursion into cold, snowy weather for reasons including exercising, taking part in a winter sport and playing with children out in the elements.\n\n\nPick out clothes you can layer while you're getting dress as this will help you stay warm and protected while you're outside. Later, you can remove the layers when you start sweating but will have the needed gear to stay warm. Experiment until you find the right combination to wear outside while you're active. Wear shoes with good traction to prevent slips and falls from happening during wet or icy conditions.\n\n\nDon't forget about your hands, feet and ears because these body parts are vulnerable to cold weather and wind, which can lead to frostbite, according to the Mayo Clinic's website in an article titled “Exercise and Cold Weather: Tips to Stay Safe Outdoors.”\n\n\nFactor in changing weather before you head outside if the forecast calls for extreme wind chills or rain and wait until these conditions dissipate before scheduling your favorite outdoor activity. Cold rain and wind chills can penetrate through clothes, causing your body's core temperature to lower.\n\n\nLearn the symptoms of frostbite and hypothermia to prepare for the potential hazards that crop up in extreme cold weather. Frostbite signs include numbness, tingling or you can't feel the affected body part. Hypothermia causes speech loss, excessive shivering, uncoordinated movements and tiredness. Seek emergency medical care for signs of frostbite if any area of your body goes numb as a result of cold weather. Head straight to the nearest hospital if you suspect you or a loved one shows signs of hypothermia.\n\n\nKeeping these cold weather tips in mind will help you dodge the majority of problems associated with outdoor activities during the winter months.\n\n\nYellow Blooms That Add Cheer During the Winter\n\nWinter Blooming Flowers\n\nI'm lucky, in some ways, that I live in Florida where birds sing and flowers bloom year round. I have, however, visited the northern areas of the United States on several occasions during winter. When ever I spent too much time in the snow I missed the greenery of Florida. This fact lead me to want to find out if any flowers grew wild up north during winter. After clicking through a couple of “Google” pages I found one that does grow up north, even in the southern region of Canada.\n\nThe Winter Aconite (Eranthis hyemali) grows in USDA plant zones three through seven. This means that even those who live as far north as Canada can enjoy this wonderful yellow flowering plant with deep green leaves. The Winter Aconite is known to bloom in February but the majority of plants flower during March, at the very beginning of spring. I have heard it reported that some gardeners and observers of this plant, that is relating to buttercups, see the yellow buds begin to grow beneath the snow.\n\n\nWinter Anconite grows wild in locations throughout Europe where it mixes with buttercups and daisies, depending on the specific location, according to This website reported seeing blooms appear at Christmas in parts of Italy. Which means that, given a somewhat warmer climate, the plant can produce buds when other flowers couldn't survive the temperatures typically seen in the middle of December.\n\n\nGardeners from USDA plant zones three through seven can plant Winter Anconite in full sun to partial shade. The Missouri Botanical Garden website recommends planting in soil well-drained, partially moist organic soil. Find a spot where the plant will enjoy full sun while the flowers bloom and will sit in the shade once the trees regain their leaves during the spring. The flowering plant needs an adequate amount of moisture throughout the year. Wet down the tubers the night before you plant them. Place them in the ground 2 to 3 inches deep and 3 inches apart during the planting season of late summer to early fall.\n\n\nOne of the key facts I've heard about the Winter Anconite is that you don't need to pay it much attention once it's in the ground. These plants are hardy and can do very when left alone.\n\n\n\nHow to Identify Bear Tracks in Winter\n\nBlack and Grizzly Bear Winter Tracking Guide\n\nI always find it interesting how some animals scurry around during the winter, especially bears that people typically think of as a hibernating mammals during the cold months. Black bears still forage for food on warmer days as far north as North Carolina in the southestern U.S. Grizzly bears in the Yellowstone National Forest wait until late December to start their hibernation. Black bears will sleep for long periods of time in the southeastern Appalachian mountain range but will wake up during streches of warmer weather.\n\nIdentifying bear tracks is a favorite pastime of mine as long as the bear isn't somewhere nearby. Seeing a fresh snow fall with tracks on it is the best way to tell which animal is which. It is important to note that bears have 5 toes with claws. However, you may not always see the fifth claw when studying their tracks.\n\n\nLook at any decently sized shallow marks in the snow to see if they are the work of a bear.  This type of animal steps with flat feet which sometimes makes it harder to determine whether or not you are looking at an actual footprint, even in the snow. The shallow groove gives you the chance to further identify the marking as a bear track that you otherwise might have missed.\n\n\nFind a bear trail while you're out identifying bear tracks. The bear trails tend to have growth over the tops of them and are narrow and may resemble a tunnel made of brush.\n\n\nLocate four paw prints, appearing in sets, at a 45 degree angle away from where the animal moved. If you see this type of marking in the snow it's the work of a bear.\n\n\nNote the difference between grizzly and black bear paw prints. Black bears have short claws with spaces between them while a grizzly's claw can grow up to four inches. Toes that appear uniformed are likely that of a grizzly bear.\n\n\nStudy the trees around where you're walking. Both black bears and grizzlies climb trees. Black bears in the southeastern U.S. prefer to hibernate in the deep grooves found in some trees. Bears also use trees to mark their territory. If you come upon a tree with one inch grooves that run down the trunk and stand about six feet high, you are more than likely looking at a bear territory marking. Claw marks on trees indicate that a bear has climbed up the trunk.", "pred_label": "__label__1", "pred_score_pos": 0.5047672986984253} {"content": "Discussion: Searching for Literature\n\nDiscussion: Searching for Literature\n\nDiscussion: Searching for Literature\n\n\nAs a doctoral student, you are required to be thorough and exhaustive in your search for academic resources. This requirement not only exists so you can avoid duplicating existing research, it also empowers and prepares you to contribute to the thinking and practice in your chosen area of interest. One key to achieving this goal is to develop proficiency in literature searches. Discussion: Searching for Literature\n\nWalden Library has numerous research databases. Some may be more useful than others for finding articles related to your topic. Before you begin to search for articles, it is important to identify the databases that will be most useful. It also is important to use the best searching strategies. If you search using keywords that are too broad, you may be inundated with useless information. If you search using keywords that are too specific, you may miss articles that are pertinent to your topic. It is key, therefore, to be both efficient and thorough in your search process.\n\nIn this Discussion, you will consider your search process, the keywords and databases you used, and how the articles you found inform your ongoing research.\n\nTo prepare for this Discussion:\n\n • Using the Walden University library, find five articles based on the topic of Learning in Adults as it applies to your specific doctoral program area (see Week 1). Take note of the key words and terms you used.\n • Review Chapter 3, “Selecting a Topic and Identifying Literature for Review” (pp. 17–28), in the Galvan text.\n • Review Chapter 9, “Dissertation Chapter 2: Literature Review” (pp. 84–88), in the Stadtlander text.\n • As needed, review Learning Resources provided this week related to the literature search process, including searching strategies, library tips, navigating library databases, and evaluating resources.\n\n\npart 1 a response in which you do the following:\n\n • Identify the keywords and databases you used to find your five articles. Provide full references for the five articles you selected.\n • Explain why you chose these articles and how they relate to your program area. Discussion: Searching for Literature\n\n\nPart 2 to two of your colleagues by making suggestions for additional keywords they could use or additional databases they could search.\n\n\n\n\n\n\n\n Psychological Safety Dealing with Remote Workers\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nPsychological Safety Dealing with Remote Workers\n\nThe concept of psychological safety examines a workplace environment and culture in which workers and teams are allowed to take the risk, share ideas and concerns without any form of retribution (Guchait et al., 2014). The term psychological safety was widely recognized in 1999 research by Amy Edmondson at the Harvard Business School and gained popularity and increased application in 2015 after being identified as integral to teams’ success (Guchait et al., 2014).  According to Edmondson, psychological safety entails perceiving the effects of taking interpersonal risks in a specific workplace context (Guchait et al., 2014). Therefore, a central aspect of psychological safety is that it facilitates willingness to contribute ideas and shared articles. However, not all organizations support the psychological safety of workers and hence may lead to detrimental consequences. Remote workers who work in an organization with a compelling psychological safety climate report a high level of productivity and performance than workers who are denied such a climate (Guchait et al., 2014).\n\nFurthermore, workers in a workplace culture with a supportive psychological environment are likely to put forward bold ideas since they are not afraid of being criticized. They know that their opinions matter. The paper aims to explore psychological safety and how it is a problem for remote workers in organizations that do not support, psychological safety culture.\n\nResearch Questions/Problems\n\n 1. What are the effects of the absence of psychological safety on workers’ performance?\n 2. How does the absence of psychological safety contribute to the mental health of works?\n 3. How can psychological safety be improved in the organization?\n\nAccording to the study conducted by Guchait et al., (2014) it has been ascertained that only three of the ten United States workers mentions that their opinion count, implying that the concept of psychological safety is a practice that most organization do not embrace hence negatively impacting on workers including in such areas including productivity, socialization, and engagement (Guchait et al., 2014). However, with increased adoption of workers’ psychological safety mechanism to a ratio of six in every ten employees, the organization may realize about 27% workers turnover reduction, 41% reduced safety concerns, and increased productivity at 12%(Idris et al., 2012). Psychological safety workers have multiple challenges as lack of psychological safety compromise communication and engagement among the employees hence reducing employee performance. Furthermore, lack of psychological safety means separation and isolation of workers from their colleagues, which may negatively impact a worker’s development. Discussion: Searching for Literature\n\nMoreover, lack of psychological safety makes remote workers feel out of the organization as they believe their existence and input are not recognized by the organization (Idris et al., 2012). Such aspects would lead to poor workers’ performance and translate to such effects, including mental health problems. While there is multiple positive mental health of working from home, including enhanced balance of life, remote work also has various challenges associated with mental health. According to the meta-analysis research conducted by Idris et al. (2012), lack of social connection among employees translates to such negative impacts, including smoking cigarettes. Therefore, loneliness and isolation are twice dangerous to mental and physical health as obesity. Workers do not necessarily need to be alone to feel isolated or lonely, but instead need to think that their relationship and social life are not essential and arise from emotional and physical isolation (Idris et al., 2012). Therefore, how can psychological safety accompanied by strong relationships be maintained among remote workers? Discussion: Searching for Literature\n\nOne of the approaches organization can incorporate to improve psychological safety is through setting clear expectations. Workers will feel more comfortable when they are aware of what the organization excepts from them. Notably, for the remote teams, this would be much efficient to plan work around life, hence helping them make good use of the flexible aspect of remote work rather than just having the freedom to work elsewhere (Idris et al., 2012). A great deal is to create effective trust by setting expected workers’ behaviors known by all employees. Moreover, the organization must understandits teams at personal levels. With increased interaction between employees and the management and amongst themselves, a culture of trust is also created. Getting to know employees at an individual level improves workplace engagement and hence improving organization performance. Silla & Gamero (2018) notes that a trust culture is more important than workers’ competence in professional relationship building.\n\nOrganizations should also measure psychological safety against a specific benchmark to determine the level of improvement. This can be achieved through direct questionnaires and surveys directed to the employees (Silla & Gamero, 2018). Asking such questions and survey engages employees and helps create an influential culture of psychological safety, which in the long run would improve team collaboration characterized by increased social interaction within the organization. Organizations can incorporate technology to encourage organizational conversation (Silla & Gamero, 2018). Tools and approaches that make it easier for an organization to have structured communication can significantly affect the quality and quality of collaboration and interaction among workers. The organization needs to develop and incorporate effective software to improve and engage their teams and improve psychological safety (Silla & Gamero, 2018). Remote work is gaining pace and becoming a norm in the contemporary business society. However, it comes as a risk that may negatively impact workers, including mental health hence the need for intervention. Discussion: Searching for Literature\n\n\n\n\nGuchait, P., Paşamehmetoğlu, A., & Dawson, M. (2014). Perceived supervisor and co-worker support for error management: Impact on perceived psychological safety and service recovery performance. International Journal of Hospitality Management, 41, 28-37.\n\nIdris, M. A., Dollard, M. F., Coward, J., & Dormann, C. (2012). Psychosocial safety climate: Conceptual distinctiveness and effect on job demands and worker psychological health. Safety Science, 50(1), 19-28.\n\nSilla, I., & Gamero, N. (2018). Psychological safety climate and professional drivers’ well-being: the mediating role of time pressure. Transportation research part F: traffic psychology and behavior, 53, 84-92.\n\n\nGet a 10 % discount on an order above $ 100\nUse the following coupon code :", "pred_label": "__label__1", "pred_score_pos": 0.9999696016311646} {"content": "In the context of the European avant-garde, Surrealism was perhaps the only movement that lasted for decades. Begun in 1924, when André Breton wrote the first of its manifestos, the movement saw its concepts and criteria evolve over the passage of time. \n\nIn Latin America, the influence Surrealism outlived the movement’s existence. It can be said that there was surrealistic expression throughout the twentieth century and that that exists even today, though not as the result of a movement or a group. It is a spiritual and cultural empathy currently part of the identity of some Latin American artists– the result of a continent full of memories of a magic past, populated by gods and myths.\n\nSome Latin American artists considered to be Neo-expressionists have had occasional connections with Surrealism. This is due to their need to take on the role artist with full freedom, and it is manifested in the dynamic and gestural strokes of their paintings. In other cases, there is figuration whose content can be considered surreal. The truth is that many Latin American artists went to Europe not to affiliate with the various existing vanguards there, but to enrich themselves with the art of both past and present while participating in the full flower of modernity. This is the case of Oswaldo Vigas, who arrived in France in the early ‘50s, just as a second artistic vanguard was dawning in both abstractionism and figurative work. \n\nVigas did not adhere to the European movements because he was already expressing his Latin Americanist feeling in the content of his figurative works and in the textures and colors of his brief, informal period of abstraction. It is this strength that made artists like Vigas persevere, despite fashionable movements, and staunchly express their character and identity. This was certainly true of Francisco Toledo (born 1940), an artist who came to Paris from Mexico in 1960, while he was still very young. Vigas met Toledo in the studio of a mutual friend, the Peruvian painter Hugo Orellana. Both made engravings and shared a studio for a time. \n\nToledo had an amazing sensitivity and artistic ability. He arrived in Paris completely imbued with the myth and history of his Mexican heritage, which he had never allowed to be leached out of him. He was seeking to expand his notion of printmaking, the discipline in which he is now recognized as one of the great masters in Latin America. Fittingly, he worked in the celebrated studio of Stanley William Hayter, an important British printmaker closely associated with the Surrealists in Paris and then, during the war, with the Abstract Expressionists in the United States. \n\nToledo’s work is based on the representation of scenes of myth and fable, which contain hybrids between animals and vegetation. Toledo has been associated with the Surrealist movement, but he transcends this type of classification, since his work, even when imbued with a dreamlike atmosphere, does not dissociate itself from his Mexican roots. \n\nVigas, too, transcends any kind of classification. His greatness lies in being an artist whose mythical cosmogony is consistent with his worldview. In this sense, Vigas and Toledo went to Europe with deeply Latin American modes of expression that made them impermeable to foreign influences. Vigas decided to take up engraving again in 1963. He had already worked in the medium in the early ‘50s before his arrival in Paris, when he attended the studios of Marcel Jaudon, Arturo Luis Piza, and Stanley Hayter. At the time, after seeing prints by Pedro Ángel González, Vigas was interested in learning the various techniques of engraving. The pieces he made at the time dealt with the theme of Brujas, and he even made lithographs anticipating the Personagrestes series of years later. The passion for engraving led him to prepare the kitchen of his studio for work on his prints at night—and at this stage, he invited Toledo to print with him. There are also various etchings that were printed in the famous studio of Georges Leblanc, who also was also Picasso’s printer. Many of the themes Vigas was working with in the studio are the ones he used in the paintings of those years, such as Guerrero, Adán y Eva, Ícaro, and the series Aparecidos, Personagrestes, Terrícolas, and his Aves agoreras and other animals. \n\nToday, Oswaldo Vigas and Francisco Toledo are hailed as two great masters of Latin American art, known for their integrity and intense spirituality. Besides being engravers, they are painters, sculptors, and ceramicists; and each has served as a cultural activist in his respective country, leaving a legacy of work and cultural institutions. Their works are the result of their commitment to a full reality of myths and traditions, dreams and inventions. \n\nSusana Benko", "pred_label": "__label__1", "pred_score_pos": 0.97234046459198} {"content": "How to clean cast iron skillet oven?\n\nSharing is caring!\n\n\nHow long do you put a cast iron skillet in the oven to clean it? Put the pan in the oven. When the oven reaches 500°F or the maximum temperature, set a timer for one hour. After one hour turn the oven off and leave the pan in the oven. Don’t even open the door.\n\nHow do you restore cast iron in the oven? Put the pan in the oven. When the oven reaches 500°F or the maximum temperature, set a timer for one hour. After one hour turn the oven off and leave the pan in the oven. Don’t even open the door.\n\nCan a cast iron skillet go in the oven? As an added bonus, the cast iron is oven-safe, so you can take it from the stovetop directly into the oven.\n\nHow to clean cast iron skillet oven? – Related Asked Question\n\nHow do you get sticky stuff off cast iron?\n\n\nHow do I clean a dirty cast iron pan?\n\nScrub off stuck-on bits: To remove stuck-on food, scrub the pan with a paste of coarse kosher salt and water. Then rinse or wipe with a paper towel. Stubborn food residue may also be loosened by boiling water in the pan. Dry the skillet: Thoroughly towel dry the skillet or dry it on the stove over low heat.\n\nWhy can’t you use soap on a cast iron skillet?\n\nMyth #4: “You should NEVER wash your cast iron pan with soap.” The Theory: Seasoning is a thin layer of oil that coats the inside of your skillet. Soap is designed to remove oil, therefore soap will damage your seasoning.\n\nHow do you clean an old crusty cast iron skillet?\n\nGenerously sprinkle kosher salt or coarse sea salt into the pan and scrub it with a clean, damp washcloth. For extra stubborn spots, use a plastic pan scraper to work the burned food off the pan.\n\nWhat is the best oil to season cast iron?\n\nThe best oil for seasoning cast iron is grapeseed oil because of its high smoke point and versatility. Similar options include peanut oil and vegetable oil. The oil you choose also depends on the heat you intend on using as well as which flavors you prefer.\n\nDoes vinegar remove rust from cast iron?\n\nThe vinegar will dissolve the rust, but once that’s gone, the vinegar will go to town on the original cast surface of the pan. The possible pitting that can result is irreversible, so pull your pan from the soak as soon as the rust flakes away easily.\n\nCan you clean cast iron with baking soda and vinegar?\n\nBaking soda is one way of cleaning cast iron pans, but it’s not advised to remove rust with vinegar and baking soda together. In fact, baking soda is best used to remove stubborn food stains or black residue, rather than rust.\n\nDoes vinegar strip cast iron?\n\nIf you are wondering if vinegar will strip your cast iron skillet then it is true that you should be careful. This is because vinegar is acidic and will react with the iron causing damage in the form of pitting. Never leave your skillet to soak for too long in a vinegar solution.\n\nCan you ruin a cast iron pan?\n\n\nHow do I know if my cast iron is oven safe?\n\nCast iron melts at very high temperatures above 2200°F and doesn’t start to show signs of metal fatigue until it reaches around 700°F, which is a much higher temperature than the average home oven is capable of.\n\nCan you put butter in a cast iron skillet?\n\nYes, you can cook with butter in your cast iron skillet or Dutch oven. Keep in mind that butter burns at temperatures above 350°F (177°C), so you shouldn’t use high heat when you’re frying foods with it. Either turn down the heat or substitute it with an oil that has a higher smoke point.\n\nShould cast iron feel sticky?\n\nYou may have asked yourself the question, why is my cast iron sticky after seasoning? If you’re regularly seasoning cast iron, then it should not be sticky when you’re cooking. Cast iron seasoning will produce a durable coating that stops food from burning into a sticky residue when you’re cooking.\n\nWhat is the brown stuff on my cast iron skillet?\n\nAlways dry cast-iron thoroughly and quickly after washing, then rub a small amount of vegetable oil (about 3/4 teaspoon in a 12-inch skillet will do) over the cooking surface with a dry paper towel. If the towel picks up a lot of black or brown residue, repeat the rinsing process and rub with oil again.\n\nCan you use steel wool on cast iron?\n\nUse a fine grade steel wool pad and scrub the pan surface, inside and out, to remove rust and debris. Use hot water and mild soap if needed. Once you have cleaned all the residue off the cast iron, wash and dry your skillet as noted. Once you have restored your cast iron skillet, you must immediately re-season the pan.\n\nWhat’s the best thing to clean cast iron with?\n\nTo clean, just use mild dish soap (that’s right, it’s okay to use a little soap!) and a scouring pad or a cast iron pan cleaning brush. Wash it, scrub it, rinse it, then wipe it out well and season it with a few drops of oil and store with a paper towel covering the cooking surface.\n\nCan you use baking soda on cast iron?\n\nIn a nutshell, this is how to clean your cast-iron skillet: Immediately after cooking, rinse in warm water, sprinkle with a bit of baking soda, and scrub gently with a nylon brush. The baking soda neutralizes any flavors and odors from what you’ve just cooked, and has anti-bacterial properties.\n\nCan you use Dawn dish soap on cast iron?\n\nYes, you can actually use soap on your cast iron!\n\n\nShould you wash cast iron after every use?\n\nClean cast-iron skillet after every use\n\nRinse under hot running water, scrubbing with nonmetal brush or nonabrasive scrub pad to remove any traces of food. (Use small amount of soap if you like, rinse well.)\n\nDo you wash cast iron after every use?\n\nClean your cast iron pan after every use. Most of the time, wiping it down with a paper towel will do the trick. However, if your skillet is still dirty, wash it briefly by hand in soapy water before patting it dry for storage.\n\nHow do I get the hard crust off my cast iron skillet?\n\n\n 2. Slice off the top of a raw potato. …\n\nHow do you get burnt on crud off a cast iron skillet?\n\nOne of the simplest ways to remove the residue is by using salt. Yes, that’s right, salt. Take an oily paper towel (it’s best to use the same type of oil you season the pan with) and use it to rub salt over the bottom of the pan.\n\nHow do you remove burnt on grease from a cast iron skillet?\n\nRemoving Baked on Grease From Cast Iron\n\n 1. Sprinkle table salt over the grease in the cast iron cookware.\n 2. Scrub the inside of the cookware with a nonabrasive sponge.\n 3. Wipe the salt out of the cast iron pan with paper towels.\n 4. Wash the cookware with hot water and a sponge.\n 5. Dry the cast iron skillet with a lint-free towel.\n\nHow often should you season cast iron?\n\nRemember there’s no need to use your best premium brand for seasoning! How often should I season my skillet? — To get the best out of your cast iron skillet, it’s recommended that you oil it after each use. However, depending on how frequently you use it, 2-3 times a year is sufficient.\n\nHow many times do you season a cast iron skillet?\n\nAll in all, you’ll want to do this oiling-and-heating process three to four times, to set down a good initial layer of your own seasoning. Once you’re done, just let the pan cool down. It’s now ready for cooking.\n\nWhy do my eggs stick to my cast iron skillet?\n\nMighty Nest lists the three most common reasons why your eggs may be getting stuck: Your cast iron skillet isn’t seasoned enough, there’s not enough fat, or you have the pan over the wrong heat temperature. During the preheat stage, the pan should be over medium-high heat.\n\nDoes Coke remove rust from cast iron?\n\nCoke has phosphoric acid, which is a compound that can remove rust. Phosphoric acid is what gives coke its flavor (that I know you love). Nonetheless, it is also what makes it more acidic than any other acids, like vinegar. Coke is a good way to clean cast iron and remove rust from it because it is inexpensive.\n\nWhat kind of oil do you use on cast iron?\n\n\nHow do you keep cast iron from rusting?\n\n\nHow do I restore my cast iron without a self-cleaning oven?\n\nRestore Rusty Cast Iron (Without a Self-Cleaning Oven)\n\n 1. What You Need. rubber gloves. …\n 2. Step 1: Remove the Grime. First, the built-up grime needs to be removed from the cast iron. …\n 3. Step 2: Bag It. …\n 4. Step 3: Repeat if Needed. …\n 5. Step 4: Wipe and Wash. …\n 6. Step 5: Remove the Rust. …\n 7. Step 6: Prepare the Oven. …\n 8. Step 7: Scrub the Cookware.\n\nIs cast iron black or silver?\n\nMany people think of cast iron as being black in color, but cast iron actually begins its life the metallic gray color you associate with silver or stainless steel. For those of you who order a bare Stargazer skillet, you’ll see it arrive in this gray color.\n\nWhat should you not cook in a cast iron skillet?\n\n4 Things You Should Never Cook in Cast Iron:\n\n 3. Delicate fish. …\n 4. Acidic things—maybe.\n\nWhat should you not put on a cast iron skillet?\n\nWhat Not to Cook in a Cast-Iron Skillet\n\n 1. Avoid Cooking Acidic Foods in Cast-Iron Pans. …\n 2. Be Aware that a Cast-Iron Surface Takes on Flavors. …\n 3. Don’t Cook Delicate Fish In Cast Iron. …\n 4. Before Your Skillet Is Well-Seasoned, Avoid Sticky Foods. …\n 5. And, Whatever You Cook, Avoid Storing Food in Your Cast-Iron Pan.\n\nWhy is my cast iron black when I wipe?\n\nThey are most likely carbon deposits. This happens due to overheating of fats and oils. Using an oil with a low smoke point will carbonize at high temperatures and cause residue from the pores of your pan to rub off onto your food.\n\nWhat should you cook first in a cast iron skillet?\n\nFirst Time Cooking: Sautéed Onions and Peppers\n\nWe recommend starting with vegetables as they are more forgiving than most proteins – they taste delicious and won’t stick to your pan! Keep in mind that using a little bit of oil is necessary to help to keep food from sticking.\n\nDo you spray a cast iron skillet before cooking?\n\nOil your food: whereas with other pans, like stainless steel or non-stick, you’ll squirt a little oil into the base of the pan before you cook, with cast iron (especially griddled cast iron), you’re much better off brushing oil onto your meat or veggies before you cook them.\n\nHow do you deglaze a cast iron skillet?\n\nDeglazing a cast iron skillet involves adding chicken stock or wine to a pan with food stuck on the bottom. After roasting vegetables or searing meats, a “fond” develops on the bottom of the pan. As the liquid heats up, it breaks down the stuck-on food. You can make delicious sauces, soups, gravies, and much more.\n\nCan you use olive oil on cast iron?\n\n\nCan you use PAM to cook in a cast iron skillet?\n\n\nWhen should I add oil to my cast iron skillet?\n\nOnce the skillet is completely dry and still warm, carefully spread a very thin protective layer of oil along the inside of the pan. Heat the pan in a hot oven or on the stovetop until the oil begins smoking. You want to bring the oil to its smoking point so that it doesn’t turn rancid.\n\nWomen stylish haircut\n\nSharing is caring!", "pred_label": "__label__1", "pred_score_pos": 0.7978784441947937} {"content": "JAGGAER: improving contract management with AI systems\n\nSimon Thompson, Sales Director at JAGGAER, explains how businesses can achieve a better return on investment with AI-powered contract management\n\nWhat is your company’s main focus for the future? \n\nCommonly adopted business strategies like improving cost-efficiency, reducing risk, or optimising operational efficiency are limited by manual processes.\n\n\nProcessing contracts manually can take a lot of time and, due to human nature, are likely to encounter man-made errors. These could be errors within the contract write-up, which could jeopardise the company’s position within that contract, or important topics of negotiation could be missed.\n\nThe average Fortune 1000 company is likely to have around 40,000 active contracts processing at any given time, which will require proposals, reviews, negotiations, and approvals to take place for each contract. Managing these processes manually is no longer an option for global supply chains, as their contract procedures need to move as fast as they do.\n\nImplementing AI into contract management\n\nAs artificial intelligence (AI) cements its place in everyday life, it is becoming more popular for its use in contract management. From the initial contact between businesses to signing on the dotted line, AI is soon to become embedded into all procurement processes. \n\nManaging time efficiency \n\nThe capabilities of AI in procurement are changing daily. While businesses can leverage technology for menial tasks, it can also be utilised for authoring contracts, analysing their success through data analytics and mapping out further contract proposals. AI can scrub through thousands of documents in a matter of seconds and select all of the relevant information required in the final agreement. \n\nFollowing the point of signature, eProcurement platforms will analyse the success of the agreement, which can generate time savings of around 30 - 50% per contract, allowing teams to focus on sourcing new suppliers and taking further actions towards their procurement strategies. According to Simon Thompson, Sales Director at JAGGAER, ‘one company working with JAGGAER and Edgeverve saved time equating to over 1.5 full-time employees, allowing them to instead dedicate that human power to more strategic efforts and push the organisation forward’.\n\nFor a risk management strategy\n\nIt’s important to consider the risks involved in all stages of contract management. Investing in AI provides faster analysis of the language used in a contract and cross-referencing that with similar contracts to predict how successful the contract will be. Thanks to machine learning, the datasets that technology consumes are growing faster than ever as new information can be absorbed instantaneously. \n\n‘This is where the value of better decision-making becomes a reality. The platform can digest more information about your suppliers and contracts than humans possibly could. It then provides your team with recommendations to minimise your risk more than you could on your own. This drives tangible bottom-line results, with an average of 3-18% risk reduction for those who adopt an AI-driven contract analysis tool’, says Thompson. \n\nAI has certainly proven its worth in the supply chain industry. To gain more insights into JAGGAER’s procurement and supply chain applications, catch Simon Thompson at Procurement and Supply Chain LIVE! \n\n\nTo sign up to the show, click here.\n\nTo find out more about JAGGAER’s contract management solution, click here.\n\n\nFeatured Articles\n\nDiageo CPO Orozco to lead procurement at Kraft-Heinz NA\n\n\nDHL Express in Heathrow gorilla logistics triumph\n\n\nGlobal customs staffing issues hitting supply chains - EY\n\n\nLatest China Covid outbreak poses supply chain threat\n\nSupply Chain Risk Management\n\nAutomotive suppliers ecosystem set for change - Accenture\n\n\nLogistics news round-up from Europe, US & Asia", "pred_label": "__label__1", "pred_score_pos": 0.9743388891220093} {"content": "01/6Eat flaxseeds for weight loss\n\nThe idea of what all to eat for weight loss can often get confusing. Knowing that so many food items can help promote weight loss, a person on a mission to shed some kgs may get confused. One way to straighten this puzzle is to stick to foods that are healthy, natural and packed with nutrients. It’s great to experiment with different foods which you have never tried before, but make sure you slowly include them in your diet and continue only if they suit your body, broadly not leading to any allergies or digestive issues.\n\nOne such great food - actually, superfood, is flaxseed. Flaxseeds are rich in fibre, protein, and Omega fatty acid. It is because of these nutritional values and also other healthy components that flaxseeds can help to reduce inflammation, balance your metabolism, improve the functioning of the cells that burn fat, and prevent weight gain.\n\nRemember to consume them ground instead of whole. This will help your body to easily digest the superfood. Here are some interesting flaxseed recipes to add to your diet for effective weight-loss results:\n\n\n02/6​Flaxseeds drink\n\n​Flaxseeds drink\n\nThis drink works well on an empty stomach in the morning. You can prepare this at night before going to bed. Take a cup of water and add 3 tsp flaxseed to it. Cover with a lid and let it sit until morning. In the morning, strain the liquid and drink on an empty stomach. It is not necessary to drink it every morning, twice or thrice in a week is sufficient.\n\n\n03/6​Flaxseeds yogurt\n\n​Flaxseeds yogurt\n\nYogurt is a great combination with flaxseeds, speeding up metabolism and keeping you feeling full for long. You can enjoy this as an afternoon snack and boost your weight-loss journey. Combine powdered flaxseed and curd and mix them well. You can also beat the curd first if you want a more smooth texture. Add some salt and pepper if required. Serve immediately.\n\nRead more: Regular nightmares in middle-aged people could be linked to dementia; try the '10-3-2-1-0' rule for a sound sleep\n\n\n04/6​Flaxseeds green smoothie\n\n​Flaxseeds green smoothie\n\nThis can be a great recipe to include in your breakfast. Simply take a blender and combine 1 cup water, 2 tbsp flax seeds, 1 cup of fresh spinach, 1 cup frozen strawberries and 1 cup of frozen banana. Blend until smooth. Serve immediately and enjoy.\n\n\n05/6​Flaxseeds tea\n\n​Flaxseeds tea\n\nThis is a great drink for weight loss. Take one cup of water in a pan and let it boil for 2-3 minutes. Add a pinch of cinnamon and 1 tbsp flaxseed powder. Let it boil for another 5 minutes. Keep stirring occasionally. Turn off the gas and strain the liquid. Add some honey or lemon juice, as per your taste. Your fat burning flaxseed tea is ready!\n\nRead more: 6 weight loss tips for the festive season\n\n\n06/6Flaxseed chicken tenders\n\nFlaxseed chicken tenders\n\nFor this recipe, we take 1 kg of boneless, skinless chicken breast sliced into strips or nuggets. You can adjust the quantity based on your requirements.\n\nPreheat your oven to 425F degrees (218 °C) and lay parchment paper or a silicone baking mat on the baking sheet. Combine ½ tsp salt with 1 cup ground flaxseed. Dip the chicken tenders into the flaxseed so that the chicken is evenly coated. Place the chicken on the baking sheet. Bake for 15-18 minutes. Serve hot.", "pred_label": "__label__1", "pred_score_pos": 0.9808694124221802} {"content": "With 63% green and forest areas, Dresden is one of the major cities in Europe with the highest proportion of vegetation area. With the 1094 km long Elbe, the 8th longest river in Europe, Dresden has direct contact with the sea.\n\nWater sports are also practiced on the Elbe. For example, people can often be found windsurfing, standup paddling, or enjoying a quiet ride on a sailboat. In order for us to continue to enjoy our waters, we need to address the causes of marine litter.\n\nDue to the high percentage of tourists, a lot of trash unfortunately remains on the Elbe meadows, which is washed into the sea.\n\nAs a local chapter, we want to spread the word about the Surfrider Foundation and expand the community. Because only a large community can we achieve something. The water surrounds us in all areas. The human being alone consists of 70% water. We originate from the oceans and we should protect it like our own home.\n\nOur main goal is to raise awareness and educate people on the importance of ocean conservation. One of the ways we want to do this is through Clean Ups.\n\nBut we also want to fight the causes of marine pollution so that future generations can enjoy the diversity and beauty of the seas. For this to be possible, we need to do something about it now, before it’s too late.\n\nBecause: We only have this one world.\n\nSuivez-nous sur les réseaux\n\nDevenir bénévole", "pred_label": "__label__1", "pred_score_pos": 0.9978899359703064} {"content": "Self-Compassion's Role in Therapy and Healing\n\nUpdated: Jun 21\n\nThis is the most frequently asked question when new clients come to therapy or are looking for a therapist. Counselors work hard to answer this question based on their specialty and expertise, but arguably the most valuable component of therapy is the compassion each counselor brings to their sessions. Counselors work hard to create safe, judgment free spaces to help foster client growth and a big part of being able to help client’s grow is helping them understand and utilize self-compassion.\n\nWhat is Self-Compassion?\n\nSelf-compassion is defined as giving yourself the same compassion that you would give others. One exercise that I use to help clients build awareness of how compassionate they are towards themselves is to write a letter to a loved one, family member, or friend that is struggling. The next time I see them I have them read the letter as if they had really written to themselves. A majority of the time individuals will admit they are not as nice to themselves as they are to the people they care about.\n\nThe elements of Self-Compassion:\n\nThere are several different components that make up self-compassion.\n\nSelf-kindness vs. Self-Judgement: When we treat ourselves with respect and warmth when dealing with stressful or anxiety provoking encounters, we are able to help foster a greater understanding and care for our own emotions. Individuals that engage in self-kindness acknowledge that life contains unavoidable difficulties and failures and they are caring towards themselves rather than critical and judgmental.\n\nSelf-criticism and judgement over time has become a staple in most individuals lives. We tend to be quick to point out our shortcomings and faults, and often can get stuck in thought spirals about what we could have done differently. This type of thought pattern can override self-kindness and create thought patterns where we treat ourselves with more criticism than compassion.\n\nCommon humanity vs. Isolation: As humans we are flawed, vulnerable and likely to impacted by the harsh realities we face on a daily basis. Acknowledging and accepting that you are not alone in your suffering can help lessen the feelings of isolation and aloneness. Self-compassion comes into play when we recognize that suffering and sadness are a part of the shared human experience and not something to be experienced alone.\n\nBeing compassionate to others does not mean that you pity them, it means you understand their pain, even when the situation is different from yours. When you expand your awareness beyond yourself, you allow yourself to connect and bond with others that have shared experiences.\n\nMindfulness vs. Over-identification: Mindfulness requires you to step back and take a non-judgmental look at oneself. Mindfulness focuses on an open and kind observation of all emotions, especially negative ones, to help put your suffering and distress into perspective. Mindfulness gives us the control to not be over-identified by our negative emotions and thoughts. It’s a lifestyle that focuses on stepping back and making the effort to be present in a situation. By practicing mindfulness, we are able to increase the amount of time we are in a mindful state making it easier to be aware and challenging of moments that arise that trigger negative emotions.\n\nHow Self-Compassionate are you?\n\nHere are a few questions to ask yourself to evaluate how self-compassionate you are. For a further in-depth questionnaire, you can check out self-compassion.org.\n\n • How often am I afraid I will do the wrong thing?\n\n • How often am I being self-critical about my thoughts and feelings?\n\n • Do I feel inadequate?\n\n • How easily am I intimidated?\n\nThe Importance of being Self-Compassionate towards yourself.\n\nWe are often our own worst critic. Many of us have that inner self critic that is constantly bullying and bombarding us with negative thoughts. Our inner self critic is fueled by modern day expectations to be efficient as possible and meet unrealistic standards. That collective pressure from both society and our inner self critic can easily become overwhelming. When we allow ourselves to have self-compassion, we can begin to identify our mistakes and work towards meeting standards that fit OUR values. We are human and we are prone to making mistakes; judging ourselves harshly for being human can lead to anxiety, depression, and other mental health struggles. By practicing self-compassion, you are allowing yourself to honor and accept your humanness. Let’s work together to increase self-compassion and implement new brain patterns that help remind ourselves that everyone has flaws, makes mistakes and there is no need to judge ourselves for being human.\n\nWant more? Join our mailing list for exclusive info and updates!\n\nThanks for submitting!", "pred_label": "__label__1", "pred_score_pos": 0.9830875396728516} {"content": "\"The details are not the details.\nThey make the design\"\n\n- Charles Eames - \n\nFinding a way to organize the chaos is an essential skill for any event coordinator. I learned early on that not only did I thrive in those chaotic moments, but I could easily step in and expose both beauty and happiness in every situation. \n\nThis realization led to the creation of Bubbly & Blooms in 2010. Having graduated from SDSU and UCLA's Design Center, I was eager to assist brides and hosts in whatever capacity I could. Throughout the years, I have gravitated towards the overall event planning side of things, but have maintained my love of floral design. Whether you're looking for bouquets, cake toppers, or even a show-stopping archway that makes their jaws drop, I'm happy to make your wildest dreams come true!", "pred_label": "__label__1", "pred_score_pos": 0.9997814893722534} {"content": "Search Knowledge Base ...\n\nNeed Support?\n\n\n\nCloakShield - Node to node communications - is a onion-routing implementation for CloakCoin's network traffic.\n\nCloakShield provides secure communications between nodes on the Cloak network using symmetric RSA encryption backed by an Elliptic Curve Diffie Hellman key exchange (ECDH). This allows nodes to exchange data securely, providing protection from snoopers (man in the middle) and imposters (sybil attack). CloakShield is designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible. CloakShield allows the encrypted sending of data to one or more recipients. When sending to a single recipient, the payload is RSA encrypted using the ECDH shared secret. When sending to multiple recipients, the payload is encrypted using a one-time key and the key is then encrypted for each recipient using the ECDH/RSA method\n\nGenerating a shared Encryption Key\n\nIn order for Alice and Bob to communicate securely, they must agree on a shared encryption key. CloakShield uses ECDH to accomplish this:\n\n 1. Alice has ENIGMA private key dA and ENIGMA public key QA=dAG (where Gis the generator for the elliptic-curve). Bob has ENIGMA private key dB and ENIGMA public key QB=dBG.\n\n 2. Alice has Bob’s ENIGMA public key dB from the ENIGMA announcements he sends to the network to announce his availability for cloaking assistance. She uses her private key dA and Bob’s public key QB to calculate shared secret dAQB=dAdBG (ECDH_compute_key in OpenSSL).\n\n 3. Alice then creates a SHA256 hash of the secret and passes the hash to the OpenSSLEVP_BytesToKey method in order to derive an encryption key and IV, which will be used to encrypt data for Bob (using symmetric RSA encryption).\n\n 4. Alice is now able to create CloakShield secured messages for Bob. When Bob receives a Cloak Shielded message from Alice, he reads Alice’s public key from the message header and generates the same shared secret key as Alice, as per the steps above (with his secret key, instead of Alice’s). The Cloak wallet maintains a list of active CloakShield keys and will check the list for an existing CloakShield key before generating one.\n\nCloakShield Data\n\nCloakShield allows any Cloak data objects to be serialized and transmitted securely to one or more recipients. A CloakShield data packet-header contains the sender’s ENIGMA public key and the public keys hashes of the recipients. CloakShield headers contain a verification hash, which is generated using the sender’s public key and the raw unencrypted data. This hash is verified during decryption of CloakShield data to ensure that the recipient info in the header matches the encryption key, and that the data has not been altered.\n\nCloakShield Onion Routing\n\nOnion routing is a technique (used by TOR) for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which “peels” away a single layer, uncovering the data’s next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.\n\nOnion Routing Analogy\n\nThe addition of ‘onion routing’ functionality to the ENIGMA network (using CloakShield) allows nodes to communicate indirectly to circumvent traffic analysis. This hampers attempts at determining which nodes are communicating with each other or which nodes submitting transactions to the CloakCoin network. When an ENIGMA node wishes to communicate with another ENIGMA node it selects a number of other ENIGMA nodes to act as relays for the communication. Each encrypted layer can only be decrypted by the intended relay [for which the specific layer was encrypted]. After decrypting a layer, the relay passes the data to the next relay node. This routing continues it until the data reaches its intended recipient and all layers have been decrypted in turn by the selected relay nodes. Due to the self-contained nature of the ENIGMA network, exit nodes are not required and CloakShield ensures there is no risk of a relay node reading or altering the encrypted data.\n\nCloakShield - Node to Node Communications\n\nCloak uses the ENIGMA system to faclilate private/secure transactions through stealth addresses.\n\nOn startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key/CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to ENIGMA. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield. CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.\n\nWhen onion routing is enabled, the client will attempt to construct a valid onion route for the data using the list of ENIGMA peers that it is aware of. The node may not have a direct connection to the ENIGMA peers, but that is not necessary as CloakData (data packed for routing with CloakShield) packets are relayed peer-to-peer. An onion route will typically consist of 3 distinct routes to the destination node, with 3 node hops per route. Multiple routes are used to cope with situations where a routing node drops offline.\n\nNodes periodically send out an ENIGMA Announcement to peers to advertise their services for onion routing. Other nodes on the network store the announcements (until they expire or are replaced with an update) and use them to construct the onion routes.\n\nCombined with ENIGMA, it is designed for privacy, utilizing up to 25 hops using symmetric RSA encryption backed by an ECDH key exchange. This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.\n\nCloakShield Onion Routing\n\n✅ Uses end-to-end encryption and provides secure communication.\n\n✅ Designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible.\n\n✅ Allows the encrypted sending of data to one or more recipients.\n\n✅ Allows any CloakCoin data objects to be serialized and transmitted securely to one or more recipients.\n\n✅ Allows nodes to communicate indirectly to circumvent traffic analysis.\n\n✅ Provides an onion routing network with up to 25 hops", "pred_label": "__label__1", "pred_score_pos": 0.9646214842796326} {"content": "The War in Iraq Was Won\n\nBrandon Scott, who served on a Tactical Human Intelligence Team in Iraq from 2004 to 2005, argues that despite the storm of sectarianism and violence,  the Iraq War should be perceived as a success.\n\nThe 10th Anniversary of the Iraq War was marked this week with the usual commentary of defeatism. It seems like no matter where one reads, the same underlying statement is made: The United States lost the war in Iraq. I strongly disagree with this argument.\n\nUnlike in Vietnam, US soldiers, spooks (intelligence officers), and statesmen did not leave Iraq in a rush. The Mahdi Army or the al-Qaeda inspired Islamic State of Iraq, unlike the North Vietnamese Army in Saigon, did not roll down the streets of Baghdad tearing down all the political, security, and social arrangements that the US had built. Many critics state that the Iraq War was a failure because the country’s insurgency started after President George W. Bush infamously declared “Mission Accomplished!” or because the reconstruction efforts for Iraq continued painfully and fitfully. \n\nThese critics ignore the greater point about the Iraq War: the US accomplished many of its goals in Iraq, even if it took time. US involvement in Iraq from 2003-2011 cannot be viewed simply as a series of disconnected actions engaged in isolation of each other. The US, instead, ventured and succeeded in overcoming arguably one of its greatest challenges since the Second World War; which was to conduct regime change, wage a successful counterinsurgency, develop the security forces of Iraq, and provide economic development throughout the country.\n\nMoreover, the US military effort to wage counterinsurgency in Iraq produced perhaps the most successful adaptive experience that the military has ever had. The US military adapted so well to the circumstances that it faced in Iraq, that it now exports counterinsurgency training to other countries which face current or potential insurgencies. It has also learned, in partnership with the Iraqi military, the empirical lesson that it is necessary to work within combined-joint-multi-national operations to confront complex and rapidly emerging threats. Several recent and forming conflicts in the world, including in Yemen, Somalia, Libya, Syria, and the Congo region, will test whether the US military learned thoroughly from its experiences in Iraq.\n\nIraq has also benefitted from the removal of Saddam Hussein, even with seemingly endemic sectarian violence, public sector corruption, and political conflict over the rights and responsibilities of the country’s diverse communities in the context of a federal system. The Arab Spring-inspired protests that have been occurring against the current Iraqi government are a step in the right direction for the country. Civil disobedience was ruthlessly suppressed under Saddam, and even during the US occupation of Iraq it would have been strongly discouraged, by Iraqis and the US, in the interest of promoting internal stability during war. Today, Iraqis are showing a greater willingness to empower themselves and to work through civil society and political mechanisms, which is an act of courage that will hopefully continue the process of building a democratic Iraq.\n\nEconomically, the Iraqi Gross Domestic Product (GDP) has grown consistently since the removal of Saddam Hussein, other than for a drastic drop of $20 billion from 2008 to 2009. In addition, Iraq’s Deputy Central Bank Governor, Mudher Kasim, recently stated that Iraq’s GDP will double in three years from $170 billion to $360 billion. Now, the challenge for Iraq and its international partners such as the US is to facilitate the country’s exports, drive profits from energy resources into education, and continue to improve the country’s infrastructure.\n\n\nPerhaps most promising for Iraq is the bravery and dedication of its youth. It was my distinct honor to participate in the US Department of State’s Youth and Education Study (YES) program where I interacted directly with Middle Eastern youth in Washington DC. In the summer of 2008, I participated in YES as a Cultural Adviser for a cohort of Iraqi high school student participants. As I took them to the airport at the end of their program, I remember tears welling up in my eyes, and theirs, as we hugged and promised to stay in contact in the future. We all knew that I was wishing them well as they prepared to return to an Iraq that was still in the midst of sectarian conflict and a US military surge.\n\nIn my mind, these Iraqi students were a ray of sunshine in the storm of sectarianism and violence in Iraq. It has been four years since that day, and perhaps a rainbow of hope for the future of Iraq is emerging from the clouds. One of my students, a courageous and brilliant young woman, was featured as a speaker at TEDx Youth Baghdad Conference. Upon seeing her picture, and hearing about her confidence in a better future for Iraq, I was overcome with emotion.\n\nAll of the Iraqi students expressed to me that they would not have had the opportunity to achieve what they have, under the stagnant regime of Saddam Hussein. Many of them attend universities in the US, and are actively involved in civil society capacity building and social development, in the service of their country. Tell them, then, that they are fighting for a lost cause.\n\n*[Note: The views expressed in this article should not be construed as the official position of 361 Security.]\n\n\nImage: Copyright © Shutterstock. All Rights Reserved\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6170272827148438} {"content": "South Korean World Cup Kits\n\nKorea Republic head to Qatar with stunning bespoke Nike kits, they’ll wear them in Group H of the 2022 competition, against Portugal, Ghana & Uruguay.\n\nSouth Korea 22/23 Home & Away Kits\n\n2022/23 South Korea Home Shirt\n\nSouth Korea campaigns in the 2022 World Cup with a Nike home that is predominantly reddish-pink. It has a tonal tiger striping along the raglan sleeves to give the shirt some design element. A polo collar in black caps off the look.\nGet The 22/23 Kit\n\n2022/23 South Korea Away Shirt\n\nSouth Korea's black Nike away shirt for the 2022 World Cup expresses the ultimate creativity and spontaneousness. With a black base, the kit is able to give life and visibility to the abstract spraypaint strokes in red, blue and yellow covering the entirety of the kit.\nGet The 22/23 Kit\n\nSouth Korean played their first international match against Mexico in London, England on the 2nd August 1948 losing 5-3. Known as the Asian Tigers and locally as the Taeguk Warriorshas they have been Asia's most successful national team since they made their debut at the 1948 Summer Olympics.South Korea play their home games in red shirts dark blue shorts and red socks with the away strip being white shirts red shorts and white socks. They had their most successful world cup appearance in 2002 when as joint hosts with Japan they finished an impressive and unexpected 4th.\n\n2020/21 South Korea Home Shirt\n\nSouth Korea Home 2020/21 KitThe prominent change applied on the 2020 South Korea home kit is the patterned print on the top half part of the shirt, departing from the solid colours of the uniforms the team has worn for their previous campaigns. The said print though gradually transitions to a solid red near the bottom part of the jersey. Going into the details of the design of the pattern, we could see that it is composed of multiple intersections of three lines on a diagonal orientation. Using the shoulder and sleeve area as the starting point, the lines coming from the left side alternates between solid and broken lines and are quite bent as they extend further down. The lines coming from the other side are wavier. Combine these lines and you now have an excellent representation of the Hallyu Wave (a term coined by Chinese journalists to demonstrate the growth of interest with Korean culture). The federation logo is on the left chest while the Swoosh is on the right.\n\n2020/21 South Korea Away Shirt\n\nSouth Korea Away 2020/21 KitWhile the home kit represents the progressive Hallyu culture of South Korea, the away strip for the 2020/21 is a direct nod to the country's nickname as the 'Tigers of Asia.' The kit combines black and white to produce a tiger skin-like graphic that spans the entire shirt. The sleeves have narrow black cuffs while the v neckline has an attached black fabric that shapes into a round neckline. Classy gold accents appear in the form of the Swoosh and the Federation badge on the right and left chest respectively. White shorts and socks with the tiger print details complete the away kit.\n\nThe Korea Republic national football team are nicknamed 'Taeguk Warriors' and they are one of the most dominant nations in the AFC Confederation along with Japan and Australia. The nation have had several notable players to wear their shirt including Park Ji-Sung, Cha Bum-Kun, Hong Myung-Bo, Park Chu-Young, Lee Dong-Gook, Kim-Nam-II, Lee Chung-Yong and many more. The South Koreans wear red home shirts with blue shorts supplied by American sportswear company Nike.\n\nThe Asian nation have won just two AFC Asian Cups in 1956 and 1960 where they hosted the tournament and they have been runners-up on three occasions and third place on four occasions.\n\nSouth Korea have had their shirts supplied by Nike for over 18 years where before that they had Rapido, Weekend, adidas, Asics, Prospecs and Kolon Activ.\n\nKorea Republic World Cup Kits\n\nSouth Korea World Cup 2022 Kits World Cup 2022 - Led by talisman Son Heung-min, South Korea qualified for the Qatar World Cup with two group games to spare. This meant that the nation comprised the Asian delegation to the World Cup for the tenth consecutive time dating back to 1986. The Tigers of Asia then marked the first winter World Cup with pinkish red home kit that had a camo design (patterned after a tiger print) on the raglan sleeves. The away kit was their first-ever shirt in black, and featured an abstract, spraypaint-like graphic in a multicolour tone.\n\nSouth Korea World Cup 2018 Kits World Cup 2018 - The 2018 South Korea red home kit and its plain look contrasted with the white alternate shirt, which at least had strips of lines in red and blue positioned in a curved flowing manner to abstractly illustrate the Taeguk. Despite another group stage exit, South Korea ended the campaign on a positive note as they delivered a 2-0 upset against Germany and bring the defending champions with them in crashing out of the group phase (Germany's first time to do so since the reintroduction of the format in 1950). Mexico was so thankful for the upset win they celebrated in front of the South Korea's embassy. Mexico's victories in their first two opening matches would had been for nothing had Germany won since they themselves lost their last group match to Sweden (meaning Germany would proceed due to goal difference). The match was therefore called the 'Miracle of Kazan.'\n\nSouth Korea World Cup 2010 Kits World Cup 2014 - If not for the broad trims demarcating the sleeves and the rest of the shirt, South Korea's red home and white away strips might had been as plain-looking as their other classic kits. The former had the said trims in blue while the latter had them in red. High hopes were set because of the country's bronze medal in the 2012 summer Olympics. However, the group stage exit curse afflicted them, resulting to some angry fans dishonourably pelting them with native candy 'yeot' upon the team's return to their homeland.\n\nSouth Korea World Cup 2010 Kits World Cup 2010 - In 2010, the Asian football powerhouse donned its red primary and white secondary jerseys that were designed with a faded graphical print, which was a representative image of the fur of a tiger (the team's symbol). Manchester United legend Park Ji-sung led the charge both as captain and primary scorer, ending up with a R16 finish against Uruguay.\n\nSouth Korea World Cup 2006 Kits World Cup 2006 - South Korea's 2006 red home and white away kits both featured blue-striped side panels as the standout feature. Despite starting the group stage with a win and a draw against Togo and France, respectively, they still exited the group stage when they lost 2-0 against group leader Switzerland.\n\nSouth Korea World Cup 2002 Kits World Cup 2002 - Like other Nike kits at that time, South Korea wore a white home and a red away jersey that had angular lateral trims accented from the partner kit's base colour. Furthermore, both strips featured two sets of curved pinstripes, one covering the lefthand side and the other the bottom half. With the appointment of Guus Hiddink (the same Netherlands' manager that dealt them a 5-0 defeat a WC prior), South Korea made 2002 a memorable one. Not only did they co-host the event with Japan, they managed to finally win games and even finished fourth place despite not having won any matches in any of their previous World Cup appearances.\n\nSouth Korea World Cup 1998 Kits World Cup 1998 - The return of Cha Bum-kun as manager brought excitement to the nation's 1998 campaign. But everything came to its head when South Korea lost 3-1 to Mexico and 5-0 to Guus Hiddink's Netherlands, resulting to the legend's sacking ahead of the final group match. The team reverted back to plain looks compared to the previous WCs, with the red home simply having a blue accent from the polo collar and the blue away having a white one.\n\nSouth Korea World Cup 1994 Kits World Cup 1994 - Arguably the most artistic of its World Cup kits, South Korea's white home and blue away shirts featured a multicolour diagonal image that represented a wave effect. While the group stage exit was forgettable, the nation remembered 1994 for the 'Miracle of Doha,' where South Korea clinched qualification courtesy of their 3-0 win against NoKor but, more importantly, Japan's concession of a late goal to Iraq. The results, all in all, meant SoKor were in due to better goal difference.\n\nSouth Korea World Cup 1990 Kits World Cup 1990 - Relative to the 1986 outfits, South Korea changed from blue to white for the away kit and remained red for the home in this World Cup. Both kits displayed red and blue accents on the collar (which appeared bolder on the secondary shirt) to maintain the influence of the flag colours. SoKor lost of its group stage matches in Italy to crash out of the competition.\n\nSouth Korea World Cup 1986 Kits World Cup 1986 - While the nation had its first World Cup in 1954, South Korea began its consistent participation only in 1986. They were led by Bundesliga great Cha Bum-kun, known at that time for his thunderous, powerful shots. Because the 1954 campaign ended without a single goal scored, Park Chang-sun actually gave the nation its first World Cup goal when he scored against Argentina in the opening match. The team wore a red home and a blue away shirt, patterned after the colours of the Taeguk symbol on the national flag. The kits were made by then Samsung's fashion brand that was renamed Rapido in 1988.", "pred_label": "__label__1", "pred_score_pos": 0.8666567802429199} {"content": "Work limit\n  Type: double\n  Default value: Infinity\n  Minimum value: 0\n  Maximum value: Infinity\n\nLimits the total work expended (in work units). Optimization returns with a WORK_LIMIT status if the limit is exceeded (see the Status Code section for further details).\n\nIn contrast to the TimeLimit, work limits are deterministic. This means that on the same hardware and with the same parameter and attribute settings, a work limit will stop the optimization of a given model at the exact same point every time. One work unit corresponds very roughly to one second on a single thread, but this greatly depends on the hardware on which Gurobi is running and the model that is being solved.\n\nNote that optimization may not stop immediately upon hitting the work limit. It will stop when the optimization is next in a deterministic state, and it will then perform the required additional computations of the attributes associated with the terminated optimization. As a result, the Work attribute may be larger than the specified WorkLimit upon completion, and repeating the optimization with a WorkLimit set to the Work attribute of the stopped optimization may result in additional computations and a larger attribute value.\n", "pred_label": "__label__1", "pred_score_pos": 0.8802648186683655} {"content": "April Monthly Market Review 2021\n\nAfter the fairly volatile first quarter, April brought more decisively positive stock market returns, while bonds paused their losing streak. The main April takeaways for investors were threefold. First, improving economic sentiment would no longer push up bond yields, therefore easing the competition for sources of yield that had become the main headwind for equities in the first quarter. Second, strongly rising commodity prices and annual corporate earnings growth touching 50% provided solid evidence that recent equity market optimism had an increasingly solid base in the real economy. Third, the regional picture remains changeable, with Europe no longer significantly trailing the US, whereas last year’s regional darlings in East Asia (especially the Chinese and Japanese markets) have become this year’s laggards.\n\nThe rotational forces that set back the US tech giants in the first quarter eased, confirming the view that their valuations have become increasingly correlated with bond valuations. However, despite returning a set of astonishingly strong Q1 earnings results, they still no longer lead markets. Meanwhile, the sheer number of company earnings which continue to beat even the high bar of lofty analyst forecasts is testament to the breadth of the 2021 stock market positivity, and suggests further reasons to remain optimistic in the medium-term.\n\nIn regional terms, the US led market gains, rising 5%, with Europe and the UK following closely behind, up 4.2% and 4.1%. Emerging Markets posted a respectable 2% gain in April, given the aggregate was dragged down by flat to negative returns from China. Meanwhile the 1.9% decline in Japanese stocks had as much to do with proximity to China as with a pick‑up in domestic COVID cases, rather than any suggestion of underlying weakness.\n\nThe modest gain in global bonds snapped a streak of declines as central banks appeared to finally have their message heard that they are in no rush to roll back monetary stimulus, and want to see actual rather than just forecasted progress.\n\nIn return terms, the biggest story in April was the major rise in commodity prices across the board, with agricultural prices in particular hitting multi-year highs. Copper, a key industrial bellwether, topped the leader board with a +12.1% increase, taking it to its highest level in a decade. The increase was aided by continued hopes for the global economic recovery as the vaccine rollout proceeds, as well as the fact that copper stands to benefit from a wave of fiscal support underpinning fresh spending on infrastructure and clean energy goals. Meanwhile, oil prices maintained their existing lead for the year-to-date (YTD), with both the US (West Texas) and international (Brent) benchmarks moving higher, to take their US dollar YTD gains to +31% and +29.8%, respectively. As with copper, hopes for a strong recovery after the pandemic have supported gains, with oil set to be in demand as economies open up once again.\n\nOverall, there was little for investors to dislike about returns in April. Central bank support looks set to continue, fiscal support from governments is increasing, particularly with the new US administration determined to recapture its world leader status and reputation as the engine of global growth – a position which it effectively forfeited to China after the global financial crisis. Company earnings and profit margins are expanding and the economic data suggests a decisive post-pandemic rebound is firmly on the cards.\n\nAs always, there are various serious risks and ‘unknown unknowns’ capable of spoiling the party, but at this point the biggest question for investors is whether the economic recovery will simply return us to the status quo before the pandemic, or whether the opportunity for governments to build society back better, stronger and greener, will be seized, putting us in a fundamentally better place than we were before the pandemic.\n\nAsset class returns at 30th April 2021\n\nImportant Information\n\n\n\nLets Chat\n\nTalk to us\n", "pred_label": "__label__1", "pred_score_pos": 0.951942503452301} {"content": "Sunflower seeds: do pipasols make you fat?\n\nThe seeds of the plants have several virtues as antioxidants, calming and purifying, digestive. Can be used for slimming programs or to gain weight, there are types of seeds such as sunflower seeds that can be used in both directions.\n\nSunflower flower\n\nThe sunflower is symbolized as a reminder of the sun and love by Greek mythology because the nymph Clytia fell in love with the sun god Apollo when the latter did not respond to her love.\n\nThe sunflower is of North and South American origin, the Indians ate the sunflower seed with corn and pumpkins. Being a plant of the asteraceae family, the sunflower always remains turned towards the sun because it is one of the plants that grow by exploiting the sunlight.\n\nThis large plant is characterized by its stem that can reach a height of up to 4 meters and a flower with a diameter of 30 centimeters.\n\nSunflower seeds\n\nSunflower seeds or pipasols provide many health benefits, more than half of the sunflower seed is composed of lipids that protect against cardiovascular disease.\n\nBeing a dried fruit, pipasols are known for their essential fatty acid content, especially linoleic acid and other fatty acids. A consumption of 30g of seed per day according to nutritionists, fights diabetes and cholesterol because unsaturated fatty acids have positive effects on cholesterol. Eating sunflower seeds reduces the risk of cardiac arrhythmia and reduces inflammation and premenstrual disorders.\n\nDo pipasols make you fat?\n\nPipasols or sunflower seeds are a concentrate of nutrients. Because of the good fats, proteins and fibres in sunflower seeds, they are perfect for satisfying hunger and stabilizing blood sugar levels.\n\n100 grams of pipasol provide 653 calories, they are in comparison with almond seeds more caloric.  Eating them peeled and mixed with salt can be fattier by its high calorie content than eating a whole bar of chocolate. So indeed, sunflower seeds can be an element leading a person to gain weight.\n\nMade up of several nutritional components, sunflower seeds, because of their high calorie content, can be added to a program to help you gain weight.\n\nNational Institutes of Health\nWhat type of juice extractor to choose to enjoy all the benefits of fruits and vegetables?", "pred_label": "__label__1", "pred_score_pos": 0.8719642162322998} {"content": "Summary of Lecture by Dr. David M. Kirkham\n\nBy Natalie Wright Romeri-Lewis\n\nProfessor David M. Kirkham’s presentation on “Human Rights, the Constitution, and Religious Liberty” instructed us on the various intellectual origins of the US Constitution. The Constitution’s “ideals and ideas” is the accumulation of the laws and philosophies of classical antiquity, English Common Law, the English Commonwealth, Enlightenment Rationalism, Puritan Covenant Theology, and other Christian thought. The framers were also influenced by their own state constitutions, geopolitical institutions, compromises, and other political-economic ideas. Of special interest is that at least five “state Constitutions required a test of faith before running for office.”  Although the Constitution’s checks and balances reflect “a construction of Enlightenment counterpoints,” the resulting document also reflects the Puritan ideal that American would set an example for the world. Thus, because “religion was as pervasive in the 18th Century as in the 17th, religion did affect the Constitution.” \n\nProfessor Kirkham then contrasted the US Constitution with the Universal Declaration of Human Rights (“UDHR”).  He explained that “the UDHR is not a constitution and is not binding, reads more like a Bill of Rights, but is more like a Declaration of Independence.”  Although a few non-Western nations helped draft the UDHR, Professor Kirkham asked whether the UDHR “is a Western document emphasizing individual liberties or a declaration of civil [or innate (by virtue of one’s birth)] rights?”  Kofi Annan stated that “no one list of rights is a blueprint for all countries.”  In response, China asserts that “a nation’s political and economic history requires rights to be relative within each country.”  This approach “concerns human rights activists that the UDHR will become meaningless if enough countries see it this way.”\n\nProfessor Kirkham encouraged attendees and those interested in religious freedom to join the debate: “We should embrace the UDHR and its language and dispute the evolution of rights when the discussion does not really include God-given rights.  Don’t fear and stay out of the discussion. . . .  We can embrace the language of the UDHR and be uncomfortable with some peoples’ interpretations of the language.  If same-sex marriage is discussed as a human right, we need to join the debate and ask, ‘Where does it get its universality, as does heterosexual marriage?’ “\n\nThe full presentation and Professor Kirkham’s helpful PowerPoint slides are all available here.", "pred_label": "__label__1", "pred_score_pos": 0.9614916443824768} {"content": "Cheesy Summer Squash Gratin\n\n0 made it | 0 reviews | 0 photos\nSource: RecipeGirl.com\n\n15 Mins\n30 Mins\nCheesy Summer Squash Gratin\n\nThis gratin is actually like a really thick, cheesy chowder and the flavorful cheese sauce is definitely what makes the dish. The vegetables sort of melt down into the sauce, while breadcrumbs and a sprinkling of cheddar form a nice crust on top. It’s an easy recipe to make too, the only thing to note is that you’ll want to factor in 15 minutes for the summer squash to release their excess water; just slice the squash, salt it, and let it sit in the sink to do its thing while you work on the rest of the recipe.\n\n\nButter, to grease the dish\n\n2 pounds (about 4 medium-large) summer squash, preferably a mix of zucchini and gold bar\n\n1 1/2 teaspoons salt, divided\n\n3 tablespoons unsalted butter\n\n1 very large onion, diced\n\n3 large cloves garlic, crushed\n\n4 tablespoons all-purpose flour\n\n2 cups whole milk, at room temperature\n\n1/2 teaspoon sweet paprika\n\n1/2 teaspoon black pepper\n\n8 ounces (about 2 cups) shredded cheddar cheese\n\n2 tablespoons chopped fresh parsley (optional)\n\n1 tablespoon Italian-style breadcrumbs\n\n\nPreheat the oven to 400F; grease a 2.5-liter casserole dish with butter and set aside.\n\nSlice the summer squash into 1/4-inch-thick circles, and then put it into a colander in the sink and sprinkle on 1 1/4 teaspoons salt. Gently toss so all the squash is coated with salt. Leave the squash to sit in the sink for 15 minutes so it releases some of its water, then rinse it under cool running water, drain well, and pour it out onto a paper towel-lined baking sheet. Gently pat the squash dry with paper towels.\n\nMeanwhile, heat the butter in a 5-quart pot over medium heat. Add the onion and cook until softened but not browned, about 8 minutes, stirring occasionally. Add the garlic and cook 30 seconds more, stirring constantly.\n\nWhisk in the flour and cook 1 minute, then gradually whisk in the milk. Stir in the paprika, black pepper, and remaining 1/4 teaspoon salt. Bring it up to a gentle boil, stirring frequently, and then turn off the heat and whisk in 2/3 of the shredded cheddar. Add the summer squash and parsley (if using), and gently stir to coat the squash.\n\nPour the summer squash into the prepared casserole dish. Sprinkle the remaining 1/3 of the shredded cheddar on top, and sprinkle on the breadcrumbs.\n\nBake until the casserole is golden and the squash is tender, about 20 minutes.\n\nServe warm.\n\n\nReviews 0\n\nNo reviews yet! Will you be the first?", "pred_label": "__label__1", "pred_score_pos": 0.9325811862945557} {"content": "D-Luxe Daily Bronzer SPF 30\n\n\nSilky, lightweight D-Luxe Daily Bronzer (30g) protects skin from UV damage, while providing a healthy, natural bronze glow.\n\nExtra Virgin Olive Oil delivers decadent softness and hydration. Zinc Oxide provides the safest broad spectrum SPF protection, has natural anti-bacterial properties, and may also help balance the appearance of redness, irritation, and inflammation from free radical damage.\n\nAnd the best part? It’s fortified with essential Vitamin D. (Since sunscreens are designed to filter out the sun’s rays, they also block the UVB light that our body needs to make Vitamin D.) The body uses Vitamin D to maintain many aspects of its overall health, from bones and teeth to the brain and immune system.\n\nFor a luminous foundation with a luxurious, barely-there finish, use this SPF 30 Daily Bronzer to nourish and protect your skin.\n\n\nActive Ingredients: non-nano Zinc Oxide (25%)\nIngredients: Aqua (Water), *Olea Europaea (Extra Virgin Olive) Fruit Oil, *Cera Alba (Beeswax), Tocopherol (Vegetable Vitamin E), Cholecalciferol (Vitamin D3), Iron Oxides (CI 77491, CI 77492, CI 77499).  *Organic  Non-GMO", "pred_label": "__label__1", "pred_score_pos": 0.6690062880516052} {"content": "Ein Ökologisches Projekt mit Kunst, Natur und Spiritualität\n\nAn ecological project with Art, Nature and Spirituality\n\nUn progetto ecologico con Arte, Natura e Spiritualità\n\n\nEcology can begin in Man\n\n“When we humans think of nature and learn to feel nature, a protective elemental spirit naturally builds up in it.”\n\n( H. Grill, The Archai and the Way to the Mountains)\n\nIn the meantime, there are many good considerations and procedures to protect the environment and to preserve biodiversity (of species) and to think about their interaction. However, the real relationship of people to their natural environment is still missing. Environmental protection is usually thought of separately from people. But how can humans and nature work together in a constructive way? How can nature benifit by men?\n\nThe difference between consumption and conscious contemplation\n\nMan can build up nature, places or objects in the way he looks at a thing and the way he encounter it. By consciously perceiving a thing, for example a certain quality such as a shape, a colour, a composition and experiencing it and finding it beautiful, he promotes that thing. This activity has great value.\n\nIt can happen that something is objectively beautiful, but you still don’t notice it very much and you don’t experience it as beautiful even though you look at it. A house or a work of art that is objectively beautiful may still not seem beautiful. Depending on how each person perceives a thing, whether he consumes it or perceives it carefully, he has a giving or a taking effect. By consuming something, by taking possession of it, he takes away its radiance, its beauty. The thing no longer shines for others.\n\nIf one consciously looks at something in such a way that one promotes its beauty, then one creates substance for this thing. The next person will look at the thing more consciously at the very first glance. The thing seems to be more alive. This power in conscious, attentive perception means a great lot for nature as well as for culture. Man can revive a thing, build it up and make it radiate for other people. The result is among other things, a sense of respect and dignified treatment of nature, a place or a thing. In this sense, ecology begins in the conscious relationship of human beings to their environment.\n\nIn Naone, the different areas are worked on individually\n\nWhen one arranges something like the design of a garden in a new way, develops new forms, builds new formations and compositions with stones, then one adds something to nature. One enriches nature and creates new life forces (etheric forces). Artistic garden design, simple building with stones, care of the meadow, woodwork, work with forms as well as meditation, text work, contemplation exercises and yoga exercises are different subjects in Naone. Many designs have been implemented on the property so far.\n\nHazel bushes in the marginal area are pushed back to prevent the open area from becoming overgrown. This creates light and the overall area appears more open and wide. Water areas ( streams; a plunge basin, a pond) have also been created as well as cultivation areas for cereals and vegetables. In the forest, storm wood is processed to create order and the wood is used as firewood. A walkway with different areas has been designed to stimulate the senses. Old boundary walls have been rebuilt and various herbs planted for health/nutrition, contemplation and to reduce insect pests.\n\n\nLavender bushes were planted next to the stone path\n\n\nOrder, structure and composition attract people’s eyes and enliven the elemental spirit. And as a result, wild plants such as mullein, lilies and orchid species show up more frequently. Wild animals ( roe deer, red deer, various bird species) also find their way in, as does the emerald lizard.\n\nIt turns out that it is necessary to meet nature with thoughts, ideas and active action.\n\n“The more thoughts flow into creation from a natural and chosen activity, the more creation gains an empowerment. But the less we think of nature, of the paths, of the mountains and their elements, the less they can benefit from us for their empowerment.”\n\n\nCookie Consent with Real Cookie Banner", "pred_label": "__label__1", "pred_score_pos": 0.6923031806945801} {"content": "Please ensure Javascript is enabled for purposes of website accessibility Geographic Tongue - People First Dentistry | Miami, Kendall, Coconut Grove, Coral Gables\n\nGeographic Tongue\n\nGeographic tongue disease on a caucasian child\n\nAbout Geographic Tongue\n\nGeographic tongue is a medical condition in which the patient has an enlarged, discolored portion of tissues on the tongue. This is a painful condition that can cause difficulty breathing and even lead to other problems like chronic ear infections.\n\nThe most common treatment for the geographic tongue is a dental procedure. It’s an outpatient surgery that removes excess tissue from the roof of your mouth and reduces its size, causing other areas on both sides of your mouth to stretch so it becomes more comfortable when biting or chewing.\n\nThis is a cosmetic dentistry service to improve aesthetic appearance but also has functional health benefits such as improved speech and alleviating enlarged tonsils\n\nCategories :", "pred_label": "__label__1", "pred_score_pos": 0.976159393787384} {"content": "The Federal Charter Schools Program: 2022 Impact Report\n\nlead image\n\nThe Charter Schools Program (CSP) is the nation’s only source of dedicated federal funding to support the creation, expansion, and replication of public charter schools. At its fiscal year 2022 funding level of $440 million, the CSP amounts to less than 1% of federal spending on K-12 education but has a significant impact on the communities that charter schools serve.\n\nThis annual report explores the impact of the CSP on communities around the country and makes the case for increased funding for the program. In the report, we explain the charter school model, offer a brief history of the CSP, profile inspiring grantees, and address persistent misconceptions.\n\nCharter schools are a vital part of the public school ecosystem, and by advocating for the CSP, we can help more students have access to a public school that meets their unique needs.", "pred_label": "__label__1", "pred_score_pos": 1.0000094175338745} {"content": "Nobel Prize for quantum physics shared by three physicists\n\nThis year’s Nobel Prize in physics awarded to three scientists for their work on quantum information science, which has significant applications, such as in encryption. The Royal Swedish Academy of Sciences cited Frenchman Alain Aspect, American John F. Clauser, and Austrian Anton Zeilinger for discovering how unseen particles can be linked, or “entangled,” even when they are separated by a large distance, such as photons or tiny bits of matter.\n\nNobel Prize for quantum physics shared by three physicists\n\nThere is a feature of the universe that even baffled Albert Einstein, one that connects matter and light in a tangled, chaotic manner. Clauser, 79, received the prize for a 1972 experiment that helped settle a famous debate between Einstein and Niels Bohr about quantum mechanics. “A spooky action at a distance” was described by Einstein and he believed it would eventually be disproven.\n\nClauser said, “I was betting on Einstein. Unfortunately, I was wrong and Einstein was wrong, but Bohr was right.” According to Clauser, quantum mechanics shows you can’t confine information to a closed volume like a desk box – although he is unable to explain why. “Most people think nature is made up of materials dispersed throughout space and time,” Clauser said. This does not appear to be the case.”\n\nDavid Haviland, chair of the Nobel Committee for Physics, said quantum entanglement involves measuring one photon over here and knowing immediately something about the other. “We can establish common information between two different observers of these quantum objects if the photons are entangled.” In this way, we can perform secret communications that were previously impossible.\n\nAccording to Eva Olsson, a member of the Nobel committee, quantum information is not an esoteric thought experiment. It is a “vibrant and developing field.” Olsson said it could have implications in areas such as secure information transfer, quantum computing, and sensing technology. Moreover, its predictions have shaken the very foundations of how we interpret measurements, opening doors to another world.\n\nIt is possible for everything in the universe to be entangled, but in most cases the entanglement just washes away. As a result of its chaotic and random nature, it is impossible for us to see anything,” said Harvard professor Subir Sachdev, who has studied quantum entangled material with up to 200 atoms in it. However, scientists can sometimes unravel just enough to make sense and be useful in everything from encryption to superconductors, he said.\n\nZeilinger said he was still surprised to hear he had won the award at a news conference after the announcement. Zeilinger, 77, a professor at the University of Vienna, described the shock as a positive one. For more than a decade, Clauser, Aspect, and Zeilinger have been the subject of Nobel speculation. They won the Wolf Prize in Israel in 2010, considered a precursor to the Nobel Prize.\nPrevious Post Next Post", "pred_label": "__label__1", "pred_score_pos": 0.8000242710113525} {"content": "Project managers: Know your workforce\n\nKeep on top of labor supply and materials to make sure the job is finished on time and on budget.\n\nAbout this article\nPaul Belshoff\n\n\nPaul Belshoff\n\n\nPerspective 2022 vol 2\nMarket Insights\n\nSign Up for Market Trends & Insights\n\n\nThe number of considerations that go into starting a construction project are almost too numerous to count. Contracts, materials, labor, deadlines, even weather, to name a few. \n\nThey vary from project to project and any one of them can change in an instant, whether it be materials suddenly in short supply, labor that isn’t available for your particular kind of project (is it luxury hospitality or affordable residential?), or an unexpected phenomenon like Covid that makes everything suddenly screech to a halt.\n\nKey to surmounting any problems that arise is being up to date on the state of each of the variables and where to go for replacements or replenishments if necessary. Be aware of added costs for any scenario that might play out—for example, if the funds will be needed (and available), or if the design might have to be changed.\n\nKnow Your Workforce\n\nAt the top of that list is the local work force.  The design and construction team needs to know if it is robust enough and whether available workers have the requisite skills to get the job done.  That means anything from hanging drywall to doing something specialized like pouring terrazzo or the unusual task of fabricating a dome for a new mosque.  One-offs like massive art installations in commercial or hospitality projects can be particularly problematic without enough lead time.\n\nLabor needs shift with booms and busts in the economy and projects can suffer if they get caught short of skilled labor. Hawaii, for example, experienced a huge boom in luxury high-rise construction in  2014-2015 when towers were popping up all over the place. Developers found themselves in a tough situation where drywall labor was capped out.\n\nIn other words, there was a back-up of projects and only a finite number of drywall installers available locally.  Same thing with installers of windows and curtain walls – there just weren’t enough to do the jobs on schedule.  Labor had to be flown in from inland locations, paid more and put up in hotels.\n\nIn such instances, project managers have to be flexible and knowledgeable enough to do what they have to do, which is hire labor from elsewhere. In Hawaii, for instance, this means getting labor either from one of the other islands or the mainland.  This can have an environmental as well as financial impact, especially in a place like Hawaii where the shortage can be particularly acute.\n\nThere are unseen and unanticipated problems that come with this kind of demanding work schedule. While it’s good for the economy and laborers’ incomes, it often results in serious worker burnout. Everyone working longer hours, including weekends and holidays, leads to shortened careers while others make dramatic career path shifts based on burnout. It’s a real challenge that needs to be managed better industry-wide and especially significant during the “Great Resignation”.\n\nAnticipate Potential Increased Workforce Costs\n\nIncreased cost is sometimes the hardest thing to reconcile. In the 2014-2015 example, the total cost of construction goes up as much as 10% if you fly workers in from the mainland or from destinations that are more than four hours’ drive time away. Project managers also have to calculate the cost of housing the workers, which can be substantial, and the fact that they might be slower given the lack of familiarity with the local market.\n\nSituations like this don’t happen that often but when they occur, it becomes a huge topic of conversation and a huge concern among project managers and workers. There’s no question that a lack of available labor means the cost of the project is going to go up; you’ll be paying premiums on overtime until you hit a point where not even that will satisfy demand. \n\nSkilled Labor And Specialty Projects\n\nProject managers know that incurring additional costs where specialty projects are concerned is a given. Hiring workers with special, costlier skills is acceptable, as long as the cost is built into the design budget, like an art installation in a two- to three-story-high glassed-in lobby, or a golden dome for a mosque project in Louisville that was fabricated in Cincinnati, Ohio, and completed just weeks before the start of the Ramadan holiday.  Labor can be even more complicated if you need to find a fabricator who could build to strict religious standards as well as the client’s.\n\nTerrazzo flooring is another unusual material that requires a special skill set to lay down properly.  Terrazzo specialists are rare in some locations, so the design team needs to be aware of the potential costs involved. But most designers and architects who know local markets rely on concrete aggregates that are attractive in their end use and readily available. The local labor force may be familiar with alternates, narrowing the margin of error.\n\nThey are also aware, for instance, of how cement can be manipulated to mimic other finishes with more of a high-end look. Same material, just a different way of polishing it.  What workers and project managers know is that it’s about achieving a look with what’s already available and doing so at a reasonable price.\n\nPerhaps peculiar to coastal regions, workers know code required designs for windows or curtain walls that give way in a flood. They’re rarer in Hawaii than in other coastal spots in the US, but that technology saves millions of dollars in damages when done properly, as the local work force knows how to perform the scope.\n\nThe local work forces in some states are also up on environmental concerns like solar panels which most agree are not as common as they could be. There have been government backed incentives to install them on residences creating savings on electric bills.  The environmental impact of construction benefits by making the best use of locally available product and labor in any project.\n\nMoney savings from energy conservation initiatives in any kind of project generally get funneled back into the project to add more curb appeal to anything being built in what is an extraordinarily busy and booming residential and commercial market. Any money saved on commercial projects will likely go into upgrading mechanical or electrical plants to enhance efficiency.  New methods tend to scare people – no one wants to be the guinea pig. But a sure thing is a product or technology that blows people away or carries a cost savings, either up front or long term, that is enticing enough to get them to take on the risk of the unknown or new technology. Project managers must be on top of new developments to know how to sell them.\n\nAs Seen In Building Design + Construction, October 2022, “Project Managers: Know Your Workforce", "pred_label": "__label__1", "pred_score_pos": 0.5671051144599915} {"content": "In legal professions, safeguarding documents and paperwork is an essential office task. These papers may contain important, private information about a company’s operations, or they may include other privileged information shared by clients concerning their cases. In an increasingly digital world, the lock and key of the filing cabinet are no longer enough to guarantee document security.\n\nHow can your practice better protect the digital files it stores? Take a moment to consider these six tips for implementing better security surrounding these important documents.\n\n1. Store Documents of Similar Security Levels Together\n\nWhen creating a digital filing system to store your sensitive documents, it is vital to employ a classification system that makes sense today and tomorrow. In other words, documents of similar sensitivity levels should all go into the same general area of your local or cloud infrastructure. The effect is twofold. First, you always know exactly where to locate particular types of documents. Second, you can standardize the types of security you apply to these documents based on their overall security level, rather than classifying every document individually all over again.\n\n2. Prefer Group Permissions Over Individual Access\n\nControlling access to confidential information is important; not everyone within a legal practice may have the authority or right to view certain documents. Access control systems, such as Microsoft's Active Directory Rights Management Services, serve an important role in designating which files remain accessible by which users. Leaving secure documents in insecure places on your computer networks or in the cloud not only raises the risk of an incident caused by an outside intruder but also increases the risk of a leak from within your office. At the least, it's an unacceptable liability.\n\n3. Use Software That Enables Secure Document Management\nIt's tough to overrate the value of software tools that put security features right at your fingertips. Law offices, increasingly working in a paperless environment, require cost-effective programs that make secure document management easy. Whether that means redacting information before turning over discovery materials, affixing a certifiable signature, or encrypting files altogether, the right tools make the difference.\n\n4. Protect and Encrypt Your Most Sensitive Files\nSpeaking of encryption, it is advisable to lock down your files in general. An intern or clerk should not be able to find sensitive client information in a file folder and simply start browsing and reading with a few clicks. Using password-based encryption is an easy way to ensure that wayward eyes can't access information without authorization.\n\n5. Safeguard Against Tampering with Secure Digital Signatures\nUsing cryptographic certificates, modern digital signatures provide binding proof of who authorized a document and when. In the legal field, ensuring the authenticity of documents is of the utmost importance. Use tools that have anti-tampering measures built-in to ensure that your documents hold up to the strict scrutiny given to paperwork in the legal profession.\n\n6. Keep Safe Backups\nNothing is worse for a firm than losing essential papers that you cannot replace. Without the need for additional physical storage space, keeping your legal documents secure in the cloud is an easier way to guarantee access now and in the future. Whatever backup solution you choose, continue to follow the practices outlined here. Group files together into sensible backup folders, and make sure you've password-protected your documents and encrypted the backup. When your document management solution integrates with ease into standard cloud services such as Microsoft Sharepoint, you can exert a highly granular control over permissions and security settings.\n\nMake Changes to Protect Your Legal Documents Today\nWith best practices in place and the appropriate software tools powering your efforts behind the scenes, creating a modern security setup for your legal team is simple. Straightforward, easy-to-use, and cost-effective tools make quick work of security workflows. When everyone can use the same tools and follow the same procedures, you can confidently reduce the risk of sensitive information leaking from your office. Learn more about how to empower your efforts to improve security today.", "pred_label": "__label__1", "pred_score_pos": 0.6333516836166382}